Skip to content

Commit b99e568

Browse files
committed
Adapt secret validation tests to hide sensitive values in error messages
1 parent ab5b823 commit b99e568

1 file changed

Lines changed: 15 additions & 15 deletions

File tree

pkg/apis/aws/validation/secrets_test.go

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ var _ = Describe("Secret validation", func() {
8787
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
8888
"Type": Equal(field.ErrorTypeInvalid),
8989
"Field": Equal("secret.data[accessKeyID]"),
90-
"BadValue": Equal("AKIAIOSFODNN7EXAMPL"),
90+
"BadValue": Equal("(hidden)"),
9191
}))))
9292
})
9393

@@ -101,7 +101,7 @@ var _ = Describe("Secret validation", func() {
101101
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
102102
"Type": Equal(field.ErrorTypeInvalid),
103103
"Field": Equal("secret.data[accessKeyID]"),
104-
"BadValue": Equal("AKIAIOSFODNN7EXAMPLE1"),
104+
"BadValue": Equal("(hidden)"),
105105
}))))
106106
})
107107

@@ -115,7 +115,7 @@ var _ = Describe("Secret validation", func() {
115115
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
116116
"Type": Equal(field.ErrorTypeInvalid),
117117
"Field": Equal("secret.data[accessKeyID]"),
118-
"BadValue": Equal("AKIAIOSFODNn7EXAMPLE"),
118+
"BadValue": Equal("(hidden)"),
119119
}))))
120120
})
121121

@@ -129,7 +129,7 @@ var _ = Describe("Secret validation", func() {
129129
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
130130
"Type": Equal(field.ErrorTypeInvalid),
131131
"Field": Equal("secret.data[accessKeyID]"),
132-
"BadValue": Equal("AKIAIOSFODNN7EXAMPL_"),
132+
"BadValue": Equal("(hidden)"),
133133
}))))
134134
})
135135

@@ -168,7 +168,7 @@ var _ = Describe("Secret validation", func() {
168168
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
169169
"Type": Equal(field.ErrorTypeInvalid),
170170
"Field": Equal("secret.data[secretAccessKey]"),
171-
"BadValue": Equal("wJalrXUtnFEMI/K7MDEN+/=PxRfiCYEXAMPLEKE"),
171+
"BadValue": Equal("(hidden)"),
172172
}))))
173173
})
174174

@@ -182,7 +182,7 @@ var _ = Describe("Secret validation", func() {
182182
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
183183
"Type": Equal(field.ErrorTypeInvalid),
184184
"Field": Equal("secret.data[secretAccessKey]"),
185-
"BadValue": Equal("wJalrXUtnFEMI/K7MDEN+/=PxRfiCYEXAMPLEKEY1"),
185+
"BadValue": Equal("(hidden)"),
186186
}))))
187187
})
188188

@@ -196,7 +196,7 @@ var _ = Describe("Secret validation", func() {
196196
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
197197
"Type": Equal(field.ErrorTypeInvalid),
198198
"Field": Equal("secret.data[secretAccessKey]"),
199-
"BadValue": Equal("wJalrXUtnFEMI/K7MDEN+/=PxRfi!#EXAMPLEKEY"),
199+
"BadValue": Equal("(hidden)"),
200200
}))))
201201
})
202202

@@ -278,7 +278,7 @@ var _ = Describe("Secret validation", func() {
278278
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
279279
"Type": Equal(field.ErrorTypeInvalid),
280280
"Field": Equal("secret.data[AWS_ACCESS_KEY_ID]"),
281-
"BadValue": Equal("AKIAIOSFODNN7EXAMPL"),
281+
"BadValue": Equal("(hidden)"),
282282
}))))
283283
})
284284

@@ -292,7 +292,7 @@ var _ = Describe("Secret validation", func() {
292292
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
293293
"Type": Equal(field.ErrorTypeInvalid),
294294
"Field": Equal("secret.data[AWS_ACCESS_KEY_ID]"),
295-
"BadValue": Equal("AKIAIOSFODNN7EXAMPL_"),
295+
"BadValue": Equal("(hidden)"),
296296
}))))
297297
})
298298

@@ -331,7 +331,7 @@ var _ = Describe("Secret validation", func() {
331331
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
332332
"Type": Equal(field.ErrorTypeInvalid),
333333
"Field": Equal("secret.data[AWS_SECRET_ACCESS_KEY]"),
334-
"BadValue": Equal("wJalrXUtnFEMI/K7MDEN+/=PxRfi!#EXAMPLEKE"),
334+
"BadValue": Equal("(hidden)"),
335335
}))))
336336
})
337337

@@ -345,7 +345,7 @@ var _ = Describe("Secret validation", func() {
345345
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
346346
"Type": Equal(field.ErrorTypeInvalid),
347347
"Field": Equal("secret.data[AWS_SECRET_ACCESS_KEY]"),
348-
"BadValue": Equal("wJalrXUtnFEMI!K7MDENG#bPxRfiCYEXAMPLEKEY"),
348+
"BadValue": Equal("(hidden)"),
349349
}))))
350350
})
351351

@@ -397,7 +397,7 @@ var _ = Describe("Secret validation", func() {
397397
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
398398
"Type": Equal(field.ErrorTypeInvalid),
399399
"Field": Equal("secret.data[accessKeyID]"),
400-
"BadValue": Equal("AKIAIOSFODNN7EXAMPL"),
400+
"BadValue": Equal("(hidden)"),
401401
}))))
402402
})
403403

@@ -411,7 +411,7 @@ var _ = Describe("Secret validation", func() {
411411
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
412412
"Type": Equal(field.ErrorTypeInvalid),
413413
"Field": Equal("secret.data[accessKeyID]"),
414-
"BadValue": Equal("AKIAIOSFODNN7EXAMPL_"),
414+
"BadValue": Equal("(hidden)"),
415415
}))))
416416
})
417417

@@ -437,7 +437,7 @@ var _ = Describe("Secret validation", func() {
437437
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
438438
"Type": Equal(field.ErrorTypeInvalid),
439439
"Field": Equal("secret.data[secretAccessKey]"),
440-
"BadValue": Equal("wJalrXUtnFEMI/K7MDEN+/=PxRfi!#EXAMPLEKE"),
440+
"BadValue": Equal("(hidden)"),
441441
}))))
442442
})
443443

@@ -451,7 +451,7 @@ var _ = Describe("Secret validation", func() {
451451
Expect(errs).To(ContainElement(PointTo(MatchFields(IgnoreExtras, Fields{
452452
"Type": Equal(field.ErrorTypeInvalid),
453453
"Field": Equal("secret.data[secretAccessKey]"),
454-
"BadValue": Equal("wJalrXUtnFEMI!K7MDENG#bPxRfiCYEXAMPLEKEY"),
454+
"BadValue": Equal("(hidden)"),
455455
}))))
456456
})
457457

0 commit comments

Comments
 (0)