@@ -2,6 +2,8 @@ package controllers
22
33import (
44 "context"
5+ "encoding/base64"
6+ "fmt"
57 "reflect"
68 "time"
79
@@ -228,6 +230,11 @@ var _ = Describe("SyncedSecret Controller", func() {
228230 resourceVersion := ""
229231
230232 It ("Should Create K8S Secrets for SyncedSecret CRD with AWSAccountID" , func () {
233+ MockSecretsOutput .SecretsValueOutput = & secretsmanager.GetSecretValueOutput {
234+ SecretString : _s (`{"database_name":"secretDB","database_pass":"cupofcoffee", "database_name1":"secretDB02"}` ),
235+ VersionId : _s (`005` ),
236+ }
237+
231238 toCreate := & secretsv1.SyncedSecret {
232239 ObjectMeta : metav1.ObjectMeta {
233240 Name : secretKey .Name ,
@@ -284,12 +291,23 @@ var _ = Describe("SyncedSecret Controller", func() {
284291 fetchedSecret := & corev1.Secret {}
285292 Eventually (func () bool {
286293 err := k8sClient .Get (context .Background (), secretKey , fetchedSecret )
287- Expect (err ).ToNot (HaveOccurred ())
294+ // Expect(err).ToNot(HaveOccurred())
288295 return k8serrors .IsNotFound (err )
289296 }, timeout , interval ).Should (BeFalse ())
290297
291298 // we need to ensure that that secretExpect.Data is a subset of fetchedSecret.Data
292299 // the kubernetes client.go doesn't base64 values this is something that kubectl maybe does
300+ for k , v := range fetchedSecret .Data {
301+ decoded , _ := base64 .StdEncoding .DecodeString (string (v ))
302+ fmt .Printf ("fetchedSecret.Data[%s]: %s\n " , k , decoded )
303+ fmt .Printf ("fetchedSecret.Data1[%s]: %s\n " , k , v )
304+ }
305+ for k , v := range secretExpect .Data {
306+ decoded , _ := base64 .StdEncoding .DecodeString (string (v ))
307+ fmt .Printf ("secretExpect.Data[%s]: %s\n " , k , decoded )
308+ fmt .Printf ("secretExpect.Data1[%s]: %s\n " , k , v )
309+ }
310+ //fmt.Printf("secretExpect.Data: %v\n", secretExpect.Data)
293311 Expect (reflect .DeepEqual (fetchedSecret .Data , secretExpect .Data )).To (BeTrue ())
294312
295313 fetchedCfSecret := & secretsv1.SyncedSecret {}
0 commit comments