@@ -222,12 +222,10 @@ func TestGetEnvironmentVariables(t *testing.T) {
222222 tests := []struct {
223223 name string
224224 role string
225- enabledMetric bool
226225 enabledPassword * bool
227226 secretName * string
228227 secretKey * string
229228 persistenceEnabled * bool
230- exporterEnvVar * []corev1.EnvVar
231229 tlsConfig * redisv1beta2.TLSConfig
232230 aclConfig * redisv1beta2.ACLConfig
233231 envVar * []corev1.EnvVar
@@ -236,14 +234,10 @@ func TestGetEnvironmentVariables(t *testing.T) {
236234 {
237235 name : "Test with role sentinel, metrics true, password true, persistence true, exporter env, tls enabled, acl enabled and env var" ,
238236 role : "sentinel" ,
239- enabledMetric : true ,
240237 enabledPassword : pointer .Bool (true ),
241238 secretName : pointer .String ("test-secret" ),
242239 secretKey : pointer .String ("test-key" ),
243240 persistenceEnabled : pointer .Bool (true ),
244- exporterEnvVar : & []corev1.EnvVar {
245- {Name : "TEST_EXPORTER_ENV" , Value : "exporter-value" },
246- },
247241 tlsConfig : & redisv1beta2.TLSConfig {
248242 TLSConfig : common.TLSConfig {
249243 CaKeyFile : "test_ca.crt" ,
@@ -266,10 +260,6 @@ func TestGetEnvironmentVariables(t *testing.T) {
266260 {Name : "ACL_MODE" , Value : "true" },
267261 {Name : "PERSISTENCE_ENABLED" , Value : "true" },
268262 {Name : "REDIS_ADDR" , Value : "redis://localhost:26379" },
269- {Name : "REDIS_EXPORTER_SKIP_TLS_VERIFICATION" , Value : "true" },
270- {Name : "REDIS_EXPORTER_TLS_CA_CERT_FILE" , Value : "/tls/ca.crt" },
271- {Name : "REDIS_EXPORTER_TLS_CLIENT_CERT_FILE" , Value : "/tls/tls.crt" },
272- {Name : "REDIS_EXPORTER_TLS_CLIENT_KEY_FILE" , Value : "/tls/tls.key" },
273263 {Name : "TLS_MODE" , Value : "true" },
274264 {Name : "REDIS_TLS_CA_KEY" , Value : path .Join ("/tls/" , "test_ca.crt" )},
275265 {Name : "REDIS_TLS_CERT" , Value : path .Join ("/tls/" , "test_tls.crt" )},
@@ -285,18 +275,15 @@ func TestGetEnvironmentVariables(t *testing.T) {
285275 {Name : "SERVER_MODE" , Value : "sentinel" },
286276 {Name : "SETUP_MODE" , Value : "sentinel" },
287277 {Name : "TEST_ENV" , Value : "test-value" },
288- {Name : "TEST_EXPORTER_ENV" , Value : "exporter-value" },
289278 },
290279 },
291280 {
292281 name : "Test with role redis, metrics false, password nil, persistence nil, exporter nil, tls nil, acl nil and nil env var" ,
293282 role : "redis" ,
294- enabledMetric : false ,
295283 enabledPassword : nil ,
296284 secretName : nil ,
297285 secretKey : nil ,
298286 persistenceEnabled : nil ,
299- exporterEnvVar : nil ,
300287 tlsConfig : nil ,
301288 aclConfig : nil ,
302289 envVar : nil ,
@@ -309,12 +296,10 @@ func TestGetEnvironmentVariables(t *testing.T) {
309296 {
310297 name : "Test with role redis, metrics false, password nil, persistence false, exporter nil, tls nil, acl nil and nil env var" ,
311298 role : "sentinel" ,
312- enabledMetric : false ,
313299 enabledPassword : nil ,
314300 secretName : nil ,
315301 secretKey : nil ,
316302 persistenceEnabled : pointer .Bool (false ),
317- exporterEnvVar : nil ,
318303 tlsConfig : nil ,
319304 aclConfig : nil ,
320305 envVar : nil ,
@@ -327,16 +312,12 @@ func TestGetEnvironmentVariables(t *testing.T) {
327312 {
328313 name : "Test with role cluster, metrics true, password true, persistence true, exporter env, tls nil, acl enabled and env var" ,
329314 role : "cluster" ,
330- enabledMetric : true ,
331315 enabledPassword : pointer .Bool (true ),
332316 secretName : pointer .String ("test-secret" ),
333317 secretKey : pointer .String ("test-key" ),
334318 persistenceEnabled : pointer .Bool (true ),
335- exporterEnvVar : & []corev1.EnvVar {
336- {Name : "TEST_EXPORTER_ENV" , Value : "exporter-value" },
337- },
338- tlsConfig : nil ,
339- aclConfig : & redisv1beta2.ACLConfig {},
319+ tlsConfig : nil ,
320+ aclConfig : & redisv1beta2.ACLConfig {},
340321 envVar : & []corev1.EnvVar {
341322 {Name : "TEST_ENV" , Value : "test-value" },
342323 },
@@ -355,36 +336,70 @@ func TestGetEnvironmentVariables(t *testing.T) {
355336 {Name : "SERVER_MODE" , Value : "cluster" },
356337 {Name : "SETUP_MODE" , Value : "cluster" },
357338 {Name : "TEST_ENV" , Value : "test-value" },
358- {Name : "TEST_EXPORTER_ENV" , Value : "exporter-value" },
359339 },
360340 },
361341 {
362342 name : "Test with cluster role and only metrics enabled" ,
363343 role : "cluster" ,
364- enabledMetric : true ,
365344 enabledPassword : nil ,
366345 secretName : nil ,
367346 secretKey : nil ,
368347 persistenceEnabled : nil ,
369- exporterEnvVar : & []corev1.EnvVar {
370- {Name : "TEST_EXPORTER_ENV" , Value : "exporter-value" },
371- },
372- tlsConfig : nil ,
373- aclConfig : nil ,
374- envVar : nil ,
348+ tlsConfig : nil ,
349+ aclConfig : nil ,
350+ envVar : nil ,
375351 expectedEnvironment : []corev1.EnvVar {
376352 {Name : "REDIS_ADDR" , Value : "redis://localhost:6379" },
377353 {Name : "SERVER_MODE" , Value : "cluster" },
378354 {Name : "SETUP_MODE" , Value : "cluster" },
379- {Name : "TEST_EXPORTER_ENV" , Value : "exporter-value" },
380355 },
381356 },
382357 }
383358
384359 for _ , tt := range tests {
385360 t .Run (tt .name , func (t * testing.T ) {
386- actualEnvironment := getEnvironmentVariables (tt .role , tt .enabledMetric , tt .enabledPassword , tt .secretName ,
387- tt .secretKey , tt .persistenceEnabled , tt .exporterEnvVar , tt .tlsConfig , tt .aclConfig , tt .envVar )
361+ actualEnvironment := getEnvironmentVariables (tt .role , tt .enabledPassword , tt .secretName ,
362+ tt .secretKey , tt .persistenceEnabled , tt .tlsConfig , tt .aclConfig , tt .envVar )
363+
364+ assert .ElementsMatch (t , tt .expectedEnvironment , actualEnvironment )
365+ })
366+ }
367+ }
368+
369+ func Test_getExporterEnvironmentVariables (t * testing.T ) {
370+ tests := []struct {
371+ name string
372+ tlsConfig * redisv1beta2.TLSConfig
373+ envVar * []corev1.EnvVar
374+ expectedEnvironment []corev1.EnvVar
375+ }{
376+ {
377+ name : "Test with tls enabled and env var" ,
378+ tlsConfig : & redisv1beta2.TLSConfig {
379+ TLSConfig : common.TLSConfig {
380+ CaKeyFile : "test_ca.crt" ,
381+ CertKeyFile : "test_tls.crt" ,
382+ KeyFile : "test_tls.key" ,
383+ Secret : corev1.SecretVolumeSource {
384+ SecretName : "tls-secret" ,
385+ },
386+ },
387+ },
388+ envVar : & []corev1.EnvVar {
389+ {Name : "TEST_ENV" , Value : "test-value" },
390+ },
391+ expectedEnvironment : []corev1.EnvVar {
392+ {Name : "REDIS_EXPORTER_TLS_CLIENT_KEY_FILE" , Value : "/tls/tls.key" },
393+ {Name : "REDIS_EXPORTER_TLS_CLIENT_CERT_FILE" , Value : "/tls/tls.crt" },
394+ {Name : "REDIS_EXPORTER_TLS_CA_CERT_FILE" , Value : "/tls/ca.crt" },
395+ {Name : "REDIS_EXPORTER_SKIP_TLS_VERIFICATION" , Value : "true" },
396+ {Name : "TEST_ENV" , Value : "test-value" },
397+ },
398+ },
399+ }
400+ for _ , tt := range tests {
401+ t .Run (tt .name , func (t * testing.T ) {
402+ actualEnvironment := getExporterEnvironmentVariables (tt .tlsConfig , tt .envVar )
388403
389404 assert .ElementsMatch (t , tt .expectedEnvironment , actualEnvironment )
390405 })
0 commit comments