A Kubernetes operator that bridges Hardware Security Module (HSM) data storage with Kubernetes Secrets, providing true secret portability th
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

fix tests

+2 -2
+1 -1
internal/controller/discovery_daemonset_controller_test.go
··· 136 136 container := podSpec.Containers[0] 137 137 Expect(container.Name).To(Equal("discovery")) 138 138 Expect(container.Image).To(Equal(discoveryImage)) 139 - Expect(container.Command).To(Equal([]string{"/entrypoint.sh", "discovery"})) 139 + Expect(container.Args).To(ContainElement("--mode=discovery")) 140 140 141 141 // Check environment variables 142 142 envVars := container.Env
+1 -1
internal/controller/hsmpool_agent_controller_test.go
··· 216 216 container := podSpec.Containers[0] 217 217 Expect(container.Name).To(Equal("agent")) 218 218 Expect(container.Image).To(Equal("test-agent:latest")) 219 - Expect(container.Command).To(Equal([]string{"/entrypoint.sh", "agent"})) 219 + Expect(container.Args).To(ContainElement("--mode=agent")) 220 220 Expect(container.Args).To(ContainElement("--device-name=" + hsmDeviceName)) 221 221 222 222 // Note: Services are no longer created for gRPC agents - direct pod-to-pod communication is used