Skip to content

Commit ec0a454

Browse files
Use k8s.io/apimachinery/pkg/util/sets for sets
1 parent 3e22290 commit ec0a454

File tree

6 files changed

+31
-35
lines changed

6 files changed

+31
-35
lines changed

internal/controller/acl_controller_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ var _ = Describe("AccessControlList Controller", func() {
9191

9292
By("Ensuring the resource is deleted from the provider")
9393
Eventually(func(g Gomega) {
94-
g.Expect(testProvider.ACLs).NotTo(HaveKey(name), "Provider shouldn't have AccessControlList configured anymore")
94+
g.Expect(testProvider.ACLs.Has(name)).To(BeFalse(), "Provider shouldn't have AccessControlList configured anymore")
9595
}).Should(Succeed())
9696
})
9797

@@ -130,7 +130,7 @@ var _ = Describe("AccessControlList Controller", func() {
130130

131131
By("Ensuring the resource is created in the provider")
132132
Eventually(func(g Gomega) {
133-
g.Expect(testProvider.ACLs).To(HaveKey(name), "Provider should have AccessControlList configured")
133+
g.Expect(testProvider.ACLs.Has(name)).To(BeTrue(), "Provider should have AccessControlList configured")
134134
}).Should(Succeed())
135135
})
136136
})

internal/controller/certificate_controller_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ var _ = Describe("Certificate Controller", func() {
103103

104104
By("Ensuring the resource is deleted from the provider")
105105
Eventually(func(g Gomega) {
106-
g.Expect(testProvider.Certs).NotTo(HaveKey("cert1"), "Certificate should be deleted from the provider")
106+
g.Expect(testProvider.Certs.Has("cert1")).To(BeFalse(), "Certificate should be deleted from the provider")
107107
}).Should(Succeed())
108108
})
109109

@@ -142,7 +142,7 @@ var _ = Describe("Certificate Controller", func() {
142142

143143
By("Ensuring the resource is created in the provider")
144144
Eventually(func(g Gomega) {
145-
g.Expect(testProvider.Certs).To(HaveKey("cert1"), "Certificate should be present in the provider")
145+
g.Expect(testProvider.Certs.Has("cert1")).To(BeTrue(), "Certificate should be present in the provider")
146146
}).Should(Succeed())
147147
})
148148
})

internal/controller/interface_controller_test.go

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,7 @@ var _ = Describe("Interface Controller", func() {
7575

7676
By("Ensuring the resource is deleted from the provider")
7777
Eventually(func(g Gomega) {
78-
_, ok := testProvider.Ports[name]
79-
g.Expect(ok).To(BeFalse(), "Resource should not exist in the provider")
78+
g.Expect(testProvider.Ports.Has(name)).To(BeFalse(), "Provider shouldn't have Interface configured anymore")
8079
}).Should(Succeed())
8180
})
8281

@@ -119,11 +118,7 @@ var _ = Describe("Interface Controller", func() {
119118

120119
By("Ensuring the resource is created in the provider")
121120
Eventually(func(g Gomega) {
122-
item, ok := testProvider.Ports[name]
123-
g.Expect(ok).To(BeTrue(), "Resource should exist in the provider")
124-
resource, ok := item.(*v1alpha1.Interface)
125-
g.Expect(ok).To(BeTrue(), "Resource should be of type Interface")
126-
g.Expect(resource.Name).To(Equal(name))
121+
g.Expect(testProvider.Ports.Has(name)).To(BeTrue(), "Provider should have Interface configured")
127122
}).Should(Succeed())
128123
})
129124
})

internal/controller/isis_controller_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ var _ = Describe("ISIS Controller", func() {
7777

7878
By("Ensuring the resource is deleted from the provider")
7979
Eventually(func(g Gomega) {
80-
g.Expect(testProvider.ISIS).ToNot(HaveKey("UNDERLAY"), "Provider should not have ISIS instance configured")
80+
g.Expect(testProvider.ISIS.Has("UNDERLAY")).To(BeFalse(), "Provider should not have ISIS instance configured")
8181
}).Should(Succeed())
8282
})
8383

@@ -116,7 +116,7 @@ var _ = Describe("ISIS Controller", func() {
116116

117117
By("Ensuring the resource is created in the provider")
118118
Eventually(func(g Gomega) {
119-
g.Expect(testProvider.ISIS).To(HaveKey("UNDERLAY"), "Provider should have ISIS instance configured")
119+
g.Expect(testProvider.ISIS.Has("UNDERLAY")).To(BeTrue(), "Provider should have ISIS instance configured")
120120
}).Should(Succeed())
121121
})
122122
})

internal/controller/suite_test.go

Lines changed: 21 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ import (
1717

1818
corev1 "k8s.io/api/core/v1"
1919
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
20+
"k8s.io/apimachinery/pkg/util/sets"
2021
"k8s.io/client-go/kubernetes/scheme"
2122
"k8s.io/client-go/tools/record"
2223
ctrl "sigs.k8s.io/controller-runtime"
@@ -256,26 +257,26 @@ var (
256257
type Provider struct {
257258
sync.Mutex
258259

259-
Ports map[string]client.Object
260-
User map[string]struct{}
260+
Ports sets.Set[string]
261+
User sets.Set[string]
261262
Banner *string
262263
DNS *v1alpha1.DNS
263264
NTP *v1alpha1.NTP
264-
ACLs map[string]struct{}
265-
Certs map[string]struct{}
265+
ACLs sets.Set[string]
266+
Certs sets.Set[string]
266267
SNMP *v1alpha1.SNMP
267268
Syslog *v1alpha1.Syslog
268269
Access *v1alpha1.ManagementAccess
269-
ISIS map[string]struct{}
270+
ISIS sets.Set[string]
270271
}
271272

272273
func NewProvider() *Provider {
273274
return &Provider{
274-
Ports: make(map[string]client.Object),
275-
User: make(map[string]struct{}),
276-
ACLs: make(map[string]struct{}),
277-
Certs: make(map[string]struct{}),
278-
ISIS: make(map[string]struct{}),
275+
Ports: sets.New[string](),
276+
User: sets.New[string](),
277+
ACLs: sets.New[string](),
278+
Certs: sets.New[string](),
279+
ISIS: sets.New[string](),
279280
}
280281
}
281282

@@ -306,14 +307,14 @@ func (p *Provider) GetDeviceInfo(context.Context) (*provider.DeviceInfo, error)
306307
func (p *Provider) EnsureInterface(ctx context.Context, req *provider.InterfaceRequest) error {
307308
p.Lock()
308309
defer p.Unlock()
309-
p.Ports[req.Interface.Name] = req.Interface
310+
p.Ports.Insert(req.Interface.Spec.Name)
310311
return nil
311312
}
312313

313314
func (p *Provider) DeleteInterface(_ context.Context, req *provider.InterfaceRequest) error {
314315
p.Lock()
315316
defer p.Unlock()
316-
delete(p.Ports, req.Interface.Name)
317+
p.Ports.Delete(req.Interface.Spec.Name)
317318
return nil
318319
}
319320

@@ -340,14 +341,14 @@ func (p *Provider) DeleteBanner(context.Context) error {
340341
func (p *Provider) EnsureUser(_ context.Context, req *provider.EnsureUserRequest) error {
341342
p.Lock()
342343
defer p.Unlock()
343-
p.User[req.Username] = struct{}{}
344+
p.User.Insert(req.Username)
344345
return nil
345346
}
346347

347348
func (p *Provider) DeleteUser(_ context.Context, req *provider.DeleteUserRequest) error {
348349
p.Lock()
349350
defer p.Unlock()
350-
delete(p.User, req.Username)
351+
p.User.Delete(req.Username)
351352
return nil
352353
}
353354

@@ -382,28 +383,28 @@ func (p *Provider) DeleteNTP(context.Context) error {
382383
func (p *Provider) EnsureACL(_ context.Context, req *provider.EnsureACLRequest) error {
383384
p.Lock()
384385
defer p.Unlock()
385-
p.ACLs[req.ACL.Spec.Name] = struct{}{}
386+
p.ACLs.Insert(req.ACL.Spec.Name)
386387
return nil
387388
}
388389

389390
func (p *Provider) DeleteACL(_ context.Context, req *provider.DeleteACLRequest) error {
390391
p.Lock()
391392
defer p.Unlock()
392-
delete(p.ACLs, req.Name)
393+
p.ACLs.Delete(req.Name)
393394
return nil
394395
}
395396

396397
func (p *Provider) EnsureCertificate(_ context.Context, req *provider.EnsureCertificateRequest) error {
397398
p.Lock()
398399
defer p.Unlock()
399-
p.Certs[req.ID] = struct{}{}
400+
p.Certs.Insert(req.ID)
400401
return nil
401402
}
402403

403404
func (p *Provider) DeleteCertificate(_ context.Context, req *provider.DeleteCertificateRequest) error {
404405
p.Lock()
405406
defer p.Unlock()
406-
delete(p.Certs, req.ID)
407+
p.Certs.Delete(req.ID)
407408
return nil
408409
}
409410

@@ -452,13 +453,13 @@ func (p *Provider) DeleteManagementAccess(context.Context) error {
452453
func (p *Provider) EnsureISIS(_ context.Context, req *provider.EnsureISISRequest) error {
453454
p.Lock()
454455
defer p.Unlock()
455-
p.ISIS[req.ISIS.Spec.Instance] = struct{}{}
456+
p.ISIS.Insert(req.ISIS.Spec.Instance)
456457
return nil
457458
}
458459

459460
func (p *Provider) DeleteISIS(_ context.Context, req *provider.DeleteISISRequest) error {
460461
p.Lock()
461462
defer p.Unlock()
462-
delete(p.ISIS, req.ISIS.Spec.Instance)
463+
p.ISIS.Delete(req.ISIS.Spec.Instance)
463464
return nil
464465
}

internal/controller/user_controller_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ var _ = Describe("User Controller", func() {
9797

9898
By("Ensuring the resource is deleted from the provider")
9999
Eventually(func(g Gomega) {
100-
g.Expect(testProvider.User).ToNot(HaveKey(username), "User should not exist")
100+
g.Expect(testProvider.User.Has(username)).To(BeFalse(), "User should not exist")
101101
}).Should(Succeed())
102102
})
103103

@@ -136,7 +136,7 @@ var _ = Describe("User Controller", func() {
136136

137137
By("Ensuring the resource is created in the provider")
138138
Eventually(func(g Gomega) {
139-
g.Expect(testProvider.User).To(HaveKey(username), "User should exist")
139+
g.Expect(testProvider.User.Has(username)).To(BeTrue(), "User should exist")
140140
}).Should(Succeed())
141141
})
142142
})

0 commit comments

Comments
 (0)