diff options
| author | Ishita Sequeira <46771830+ishitasequeira@users.noreply.github.com> | 2024-12-04 21:34:58 +0530 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2024-12-04 11:04:58 -0500 |
| commit | 8076d2005ea625c73604073fca43df38eb675751 (patch) | |
| tree | 1570ba5969882a26e021875da86bee6850a9cfc6 /registry-scanner/test/fixture/kubernetes.go | |
| parent | c3f0eff54daf871fa1c274462b17f5149c11d368 (diff) | |
Add image folder to registry scanner (#952)
Signed-off-by: Ishita Sequeira <ishiseq29@gmail.com>
Diffstat (limited to 'registry-scanner/test/fixture/kubernetes.go')
| -rw-r--r-- | registry-scanner/test/fixture/kubernetes.go | 63 |
1 files changed, 63 insertions, 0 deletions
diff --git a/registry-scanner/test/fixture/kubernetes.go b/registry-scanner/test/fixture/kubernetes.go new file mode 100644 index 0000000..d9afa81 --- /dev/null +++ b/registry-scanner/test/fixture/kubernetes.go @@ -0,0 +1,63 @@ +package fixture + +import ( + "encoding/json" + + v1 "k8s.io/api/core/v1" + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" +) + +// func AddPartOfArgoCDLabel(objs ...metav1.Object) { +// for _, obj := range objs { +// labels := obj.GetLabels() +// if labels == nil { +// labels = map[string]string{} +// } +// labels["app.kubernetes.io/part-of"] = "argocd" +// obj.SetLabels(labels) +// } +// } + +// NewSecret creates a new Kubernetes secret object in given namespace, with +// given name and with given data. +func NewSecret(namespace, name string, entries map[string][]byte) *v1.Secret { + secret := v1.Secret{ + ObjectMeta: metav1.ObjectMeta{ + Namespace: namespace, + Name: name, + }, + Data: entries, + } + return &secret +} + +// NewSecret creates a new Kubernetes secret object in given namespace, with +// given name and with given data. +func NewConfigMap(namespace, name string, entries map[string]string) *v1.ConfigMap { + configMap := v1.ConfigMap{ + ObjectMeta: metav1.ObjectMeta{ + Namespace: namespace, + Name: name, + }, + Data: entries, + } + return &configMap +} + +// MustCreateSecretFromFile reads a Kubernetes secret definition from filepath +// and returns a Secret object. Panics on error. +func MustCreateSecretFromFile(filepath string) *v1.Secret { + jsonData := MustReadFile(filepath) + return MustCreateSecretFromJson(jsonData) +} + +// MustCreateSecretFromJson creates a Kubernetes secret from given JSON data +// and returns a Secret object. Panics on error. +func MustCreateSecretFromJson(jsonData string) *v1.Secret { + var s v1.Secret + err := json.Unmarshal([]byte(jsonData), &s) + if err != nil { + panic(err) + } + return &s +} |
