diff --git a/controllers/deployment_controller_test.go b/controllers/deployment_controller_test.go index ee16887..509e8d6 100644 --- a/controllers/deployment_controller_test.go +++ b/controllers/deployment_controller_test.go @@ -46,6 +46,12 @@ var _ = Describe("Deployment controller", func() { } }) + // TODO: Implement the following test cases: + // - Updating Existing K8s Secret using Deployment + // - Do not update if Annotations have not changed + // - Delete Deployment where secret is being used in another deployment's container + // - Delete Deployment where secret is being used in another deployment's volumes + Context("Deployment with secrets from 1Password", func() { It("Should Handle a deployment correctly", func() { ctx := context.Background() diff --git a/controllers/onepassworditem_controller_test.go b/controllers/onepassworditem_controller_test.go index 0ec98fd..3971482 100644 --- a/controllers/onepassworditem_controller_test.go +++ b/controllers/onepassworditem_controller_test.go @@ -44,6 +44,13 @@ var _ = Describe("OnePasswordItem controller", func() { } }) + // TODO: Implement the following missing tests: + // - K8s secret is not updated if OnePasswordItem Version or VaultPath has not changed + // - Update type of existing K8s Secret using OnePasswordItem + // - Create a custom K8s Secret type using OnePasswordItem (e.g. .dockerconfigjson) + // - Operator should throw an error if secret type is changed + // - Secret from 1Password item with `-`, `_` and `.` + Context("Happy path", func() { It("Should handle 1Password Item and secret correctly", func() { ctx := context.Background()