summaryrefslogtreecommitdiff
path: root/registry-scanner/test/fixture/kubernetes.go
diff options
context:
space:
mode:
authorIshita Sequeira <46771830+ishitasequeira@users.noreply.github.com>2024-12-04 21:34:58 +0530
committerGitHub <noreply@github.com>2024-12-04 11:04:58 -0500
commit8076d2005ea625c73604073fca43df38eb675751 (patch)
tree1570ba5969882a26e021875da86bee6850a9cfc6 /registry-scanner/test/fixture/kubernetes.go
parentc3f0eff54daf871fa1c274462b17f5149c11d368 (diff)
Add image folder to registry scanner (#952)
Signed-off-by: Ishita Sequeira <ishiseq29@gmail.com>
Diffstat (limited to 'registry-scanner/test/fixture/kubernetes.go')
-rw-r--r--registry-scanner/test/fixture/kubernetes.go63
1 files changed, 63 insertions, 0 deletions
diff --git a/registry-scanner/test/fixture/kubernetes.go b/registry-scanner/test/fixture/kubernetes.go
new file mode 100644
index 0000000..d9afa81
--- /dev/null
+++ b/registry-scanner/test/fixture/kubernetes.go
@@ -0,0 +1,63 @@
+package fixture
+
+import (
+ "encoding/json"
+
+ v1 "k8s.io/api/core/v1"
+ metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+)
+
+// func AddPartOfArgoCDLabel(objs ...metav1.Object) {
+// for _, obj := range objs {
+// labels := obj.GetLabels()
+// if labels == nil {
+// labels = map[string]string{}
+// }
+// labels["app.kubernetes.io/part-of"] = "argocd"
+// obj.SetLabels(labels)
+// }
+// }
+
+// NewSecret creates a new Kubernetes secret object in given namespace, with
+// given name and with given data.
+func NewSecret(namespace, name string, entries map[string][]byte) *v1.Secret {
+ secret := v1.Secret{
+ ObjectMeta: metav1.ObjectMeta{
+ Namespace: namespace,
+ Name: name,
+ },
+ Data: entries,
+ }
+ return &secret
+}
+
+// NewSecret creates a new Kubernetes secret object in given namespace, with
+// given name and with given data.
+func NewConfigMap(namespace, name string, entries map[string]string) *v1.ConfigMap {
+ configMap := v1.ConfigMap{
+ ObjectMeta: metav1.ObjectMeta{
+ Namespace: namespace,
+ Name: name,
+ },
+ Data: entries,
+ }
+ return &configMap
+}
+
+// MustCreateSecretFromFile reads a Kubernetes secret definition from filepath
+// and returns a Secret object. Panics on error.
+func MustCreateSecretFromFile(filepath string) *v1.Secret {
+ jsonData := MustReadFile(filepath)
+ return MustCreateSecretFromJson(jsonData)
+}
+
+// MustCreateSecretFromJson creates a Kubernetes secret from given JSON data
+// and returns a Secret object. Panics on error.
+func MustCreateSecretFromJson(jsonData string) *v1.Secret {
+ var s v1.Secret
+ err := json.Unmarshal([]byte(jsonData), &s)
+ if err != nil {
+ panic(err)
+ }
+ return &s
+}