@@ -26,9 +26,9 @@ var _ = Describe("ValidateProviderSpecNSecret", func() {
2626 }
2727 secret = & corev1.Secret {
2828 Data : map [string ][]byte {
29- "projectId" : []byte ("11111111-2222-3333-4444-555555555555" ),
30- "serviceAccountKey " : []byte (`{"credentials":{"iss":"test"}}` ),
31- "region" : []byte ("eu01-1" ),
29+ "project-id" : []byte ("11111111-2222-3333-4444-555555555555" ),
30+ "serviceaccount.json " : []byte (`{"credentials":{"iss":"test"}}` ),
31+ "region" : []byte ("eu01-1" ),
3232 },
3333 }
3434 })
@@ -44,46 +44,46 @@ var _ = Describe("ValidateProviderSpecNSecret", func() {
4444 secret .Data = map [string ][]byte {}
4545 errors := ValidateProviderSpecNSecret (providerSpec , secret )
4646 Expect (errors ).NotTo (BeEmpty ())
47- Expect (errors [0 ].Error ()).To (ContainSubstring ("projectId " ))
47+ Expect (errors [0 ].Error ()).To (ContainSubstring ("project-id " ))
4848 })
4949
5050 It ("should fail when projectId is empty in secret" , func () {
51- secret .Data ["projectId " ] = []byte ("" )
51+ secret .Data ["project-id " ] = []byte ("" )
5252 errors := ValidateProviderSpecNSecret (providerSpec , secret )
5353 Expect (errors ).NotTo (BeEmpty ())
54- Expect (errors [0 ].Error ()).To (ContainSubstring ("projectId " ))
54+ Expect (errors [0 ].Error ()).To (ContainSubstring ("project-id " ))
5555 })
5656
5757 It ("should fail when projectId is not a valid UUID" , func () {
58- secret .Data ["projectId " ] = []byte ("invalid-uuid" )
58+ secret .Data ["project-id " ] = []byte ("invalid-uuid" )
5959 errors := ValidateProviderSpecNSecret (providerSpec , secret )
6060 Expect (errors ).NotTo (BeEmpty ())
61- Expect (errors [0 ].Error ()).To (ContainSubstring ("projectId ' must be a valid UUID" ))
61+ Expect (errors [0 ].Error ()).To (ContainSubstring ("project-id ' must be a valid UUID" ))
6262 })
6363
64- It ("should fail when serviceAccountKey is missing from secret" , func () {
65- delete (secret .Data , "serviceAccountKey " )
64+ It ("should fail when serviceaccount.json is missing from secret" , func () {
65+ delete (secret .Data , "serviceaccount.json " )
6666 errors := ValidateProviderSpecNSecret (providerSpec , secret )
6767 Expect (errors ).NotTo (BeEmpty ())
68- Expect (errors [0 ].Error ()).To (ContainSubstring ("serviceAccountKey " ))
68+ Expect (errors [0 ].Error ()).To (ContainSubstring ("serviceaccount.json " ))
6969 })
7070
71- It ("should fail when serviceAccountKey is empty in secret" , func () {
72- secret .Data ["serviceAccountKey " ] = []byte ("" )
71+ It ("should fail when serviceaccount.json is empty in secret" , func () {
72+ secret .Data ["serviceaccount.json " ] = []byte ("" )
7373 errors := ValidateProviderSpecNSecret (providerSpec , secret )
7474 Expect (errors ).NotTo (BeEmpty ())
75- Expect (errors [0 ].Error ()).To (ContainSubstring ("serviceAccountKey " ))
75+ Expect (errors [0 ].Error ()).To (ContainSubstring ("serviceaccount.json " ))
7676 })
7777
78- It ("should fail when serviceAccountKey is not valid JSON" , func () {
79- secret .Data ["serviceAccountKey " ] = []byte ("not-valid-json" )
78+ It ("should fail when serviceaccount.json is not valid JSON" , func () {
79+ secret .Data ["serviceaccount.json " ] = []byte ("not-valid-json" )
8080 errors := ValidateProviderSpecNSecret (providerSpec , secret )
8181 Expect (errors ).NotTo (BeEmpty ())
8282 Expect (errors [0 ].Error ()).To (ContainSubstring ("must be valid JSON" ))
8383 })
8484
85- It ("should fail when serviceAccountKey is malformed JSON (missing closing brace)" , func () {
86- secret .Data ["serviceAccountKey " ] = []byte (`{"credentials":{"iss":"test"` )
85+ It ("should fail when serviceaccount.json is malformed JSON (missing closing brace)" , func () {
86+ secret .Data ["serviceaccount.json " ] = []byte (`{"credentials":{"iss":"test"` )
8787 errors := ValidateProviderSpecNSecret (providerSpec , secret )
8888 Expect (errors ).NotTo (BeEmpty ())
8989 Expect (errors [0 ].Error ()).To (ContainSubstring ("must be valid JSON" ))
0 commit comments