@@ -117,10 +117,12 @@ def test_ensure_empty_files_but_not_secrets_is_ok(self):
117
117
118
118
calls = [
119
119
call (
120
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/config-demo' secret='VALUE'\" " # noqa: E501
120
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/config-demo' secret='VALUE'\" " , # noqa: E501
121
+ attempts = 3 ,
121
122
),
122
123
call (
123
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/aws' access_key_id='VALUE' secret_access_key='VALUE'\" " # noqa: E501
124
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/aws' access_key_id='VALUE' secret_access_key='VALUE'\" " , # noqa: E501
125
+ attempts = 3 ,
124
126
),
125
127
]
126
128
mock_run_command .assert_has_calls (calls )
@@ -163,7 +165,8 @@ def test_ensure_empty_secrets_but_not_files_is_ok(self):
163
165
164
166
calls = [
165
167
call (
166
- "cat '/home/michele/.ssh/id_rsa.pub' | oc exec -n vault vault-0 -i -- sh -c 'cat - > /tmp/vcontent'; oc exec -n vault vault-0 -i -- sh -c 'base64 --wrap=0 /tmp/vcontent | vault kv put secret/hub/publickey b64content=- content=@/tmp/vcontent; rm /tmp/vcontent'" # noqa: E501
168
+ "cat '/home/michele/.ssh/id_rsa.pub' | oc exec -n vault vault-0 -i -- sh -c 'cat - > /tmp/vcontent'; oc exec -n vault vault-0 -i -- sh -c 'base64 --wrap=0 /tmp/vcontent | vault kv put secret/hub/publickey b64content=- content=@/tmp/vcontent; rm /tmp/vcontent'" , # noqa: E501
169
+ attempts = 3 ,
167
170
),
168
171
]
169
172
mock_run_command .assert_has_calls (calls )
@@ -188,31 +191,40 @@ def test_ensure_command_called(self):
188
191
189
192
calls = [
190
193
call (
191
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/config-demo' secret='demo123'\" " # noqa: E501
194
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/config-demo' secret='demo123'\" " , # noqa: E501
195
+ attempts = 3 ,
192
196
),
193
197
call (
194
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/googleapi' key='lskdjflskjdflsdjflsdkjfldsjkfldsj'\" " # noqa: E501
198
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/googleapi' key='lskdjflskjdflsdjflsdkjfldsjkfldsj'\" " , # noqa: E501
199
+ attempts = 3 ,
195
200
),
196
201
call (
197
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/cluster_alejandro' name='alejandro' bearerToken='sha256~bumxi-012345678901233455675678678098-abcdef'\" " # noqa: E501
202
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/cluster_alejandro' name='alejandro' bearerToken='sha256~bumxi-012345678901233455675678678098-abcdef'\" " , # noqa: E501
203
+ attempts = 3 ,
198
204
),
199
205
call (
200
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/test' s3.accessKey='1234' s3.secretKey='4321' s3Secret='czMuYWNjZXNzS2V5OiAxMjM0CnMzLnNlY3JldEtleTogNDMyMQ=='\" " # noqa: E501
206
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/test' s3.accessKey='1234' s3.secretKey='4321' s3Secret='czMuYWNjZXNzS2V5OiAxMjM0CnMzLnNlY3JldEtleTogNDMyMQ=='\" " , # noqa: E501
207
+ attempts = 3 ,
201
208
),
202
209
call (
203
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/test2' s3.accessKey='accessKey' s3.secretKey='secretKey' s3Secret='fooo'\" " # noqa: E501
210
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/test2' s3.accessKey='accessKey' s3.secretKey='secretKey' s3Secret='fooo'\" " , # noqa: E501
211
+ attempts = 3 ,
204
212
),
205
213
call (
206
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/test3' s3.accessKey='aaaaa' s3.secretKey='bbbbbbbb' s3Secret='czMuYWNjZXNzS2V5OiBhYWFhYQpzMy5zZWNyZXRLZXk6IGJiYmJiYmJi'\" " # noqa: E501
214
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/test3' s3.accessKey='aaaaa' s3.secretKey='bbbbbbbb' s3Secret='czMuYWNjZXNzS2V5OiBhYWFhYQpzMy5zZWNyZXRLZXk6IGJiYmJiYmJi'\" " , # noqa: E501
215
+ attempts = 3 ,
207
216
),
208
217
call (
209
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/region-one/config-demo' secret='region123'\" " # noqa: E501
218
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/region-one/config-demo' secret='region123'\" " , # noqa: E501
219
+ attempts = 3 ,
210
220
),
211
221
call (
212
- "cat '/home/michele/ca.crt' | oc exec -n vault vault-0 -i -- sh -c 'cat - > /tmp/vcontent'; oc exec -n vault vault-0 -i -- sh -c 'base64 --wrap=0 /tmp/vcontent | vault kv put secret/hub/cluster_alejandro_ca b64content=- content=@/tmp/vcontent; rm /tmp/vcontent'" # noqa: E501
222
+ "cat '/home/michele/ca.crt' | oc exec -n vault vault-0 -i -- sh -c 'cat - > /tmp/vcontent'; oc exec -n vault vault-0 -i -- sh -c 'base64 --wrap=0 /tmp/vcontent | vault kv put secret/hub/cluster_alejandro_ca b64content=- content=@/tmp/vcontent; rm /tmp/vcontent'" , # noqa: E501
223
+ attempts = 3 ,
213
224
),
214
225
call (
215
- "cat '/home/michele/ca.crt' | oc exec -n vault vault-0 -i -- sh -c 'cat - > /tmp/vcontent'; oc exec -n vault vault-0 -i -- sh -c 'base64 --wrap=0 /tmp/vcontent | vault kv put secret/region-one/ca b64content=- content=@/tmp/vcontent; rm /tmp/vcontent'" # noqa: E501
226
+ "cat '/home/michele/ca.crt' | oc exec -n vault vault-0 -i -- sh -c 'cat - > /tmp/vcontent'; oc exec -n vault vault-0 -i -- sh -c 'base64 --wrap=0 /tmp/vcontent | vault kv put secret/region-one/ca b64content=- content=@/tmp/vcontent; rm /tmp/vcontent'" , # noqa: E501
227
+ attempts = 3 ,
216
228
),
217
229
]
218
230
mock_run_command .assert_has_calls (calls )
@@ -242,7 +254,8 @@ def test_ensure_good_template_checking(self):
242
254
243
255
calls = [
244
256
call (
245
- "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/config-demo' secret='VALUE' additionalsecret='test'\" " # noqa: E501
257
+ "oc exec -n vault vault-0 -i -- sh -c \" vault kv put 'secret/hub/config-demo' secret='VALUE' additionalsecret='test'\" " , # noqa: E501
258
+ attempts = 3 ,
246
259
),
247
260
]
248
261
mock_run_command .assert_has_calls (calls )
0 commit comments