@@ -138,7 +138,7 @@ func TestVerifyTask_Configmap_Success(t *testing.T) {
138
138
t .Fatal ("fail to sign task" , err )
139
139
}
140
140
141
- err = VerifyTask (ctx , signedTask , nil , "" , []* v1alpha1.VerificationPolicy {})
141
+ err = VerifyTask (ctx , * signedTask , nil , "" , []* v1alpha1.VerificationPolicy {})
142
142
if err != nil {
143
143
t .Errorf ("VerifyTask() get err %v" , err )
144
144
}
@@ -161,7 +161,7 @@ func TestVerifyTask_Configmap_Error(t *testing.T) {
161
161
162
162
tcs := []struct {
163
163
name string
164
- task v1beta1.TaskObject
164
+ task * v1beta1.Task
165
165
keypath string
166
166
expectedError error
167
167
}{{
@@ -185,7 +185,7 @@ func TestVerifyTask_Configmap_Error(t *testing.T) {
185
185
for _ , tc := range tcs {
186
186
t .Run (tc .name , func (t * testing.T ) {
187
187
ctx = test .SetupTrustedResourceKeyConfig (ctx , tc .keypath , config .EnforceResourceVerificationMode )
188
- err := VerifyTask (ctx , tc .task , nil , "" , []* v1alpha1.VerificationPolicy {})
188
+ err := VerifyTask (ctx , * tc .task , nil , "" , []* v1alpha1.VerificationPolicy {})
189
189
if ! errors .Is (err , tc .expectedError ) {
190
190
t .Errorf ("VerifyTask got: %v, want: %v" , err , tc .expectedError )
191
191
}
@@ -243,7 +243,7 @@ func TestVerifyTask_VerificationPolicy_Success(t *testing.T) {
243
243
244
244
tcs := []struct {
245
245
name string
246
- task v1beta1.TaskObject
246
+ task * v1beta1.Task
247
247
source string
248
248
signer signature.SignerVerifier
249
249
}{{
@@ -262,7 +262,7 @@ func TestVerifyTask_VerificationPolicy_Success(t *testing.T) {
262
262
263
263
for _ , tc := range tcs {
264
264
t .Run (tc .name , func (t * testing.T ) {
265
- err := VerifyTask (ctx , tc .task , k8sclient , tc .source , vps )
265
+ err := VerifyTask (ctx , * tc .task , k8sclient , tc .source , vps )
266
266
if err != nil {
267
267
t .Fatalf ("VerifyTask() get err %v" , err )
268
268
}
@@ -287,31 +287,31 @@ func TestVerifyTask_VerificationPolicy_Error(t *testing.T) {
287
287
288
288
tcs := []struct {
289
289
name string
290
- task v1beta1.TaskObject
290
+ task v1beta1.Task
291
291
source string
292
292
verificationPolicy []* v1alpha1.VerificationPolicy
293
293
expectedError error
294
294
}{{
295
295
name : "modified Task fails verification" ,
296
- task : tamperedTask ,
296
+ task : * tamperedTask ,
297
297
source : "git+https://github.com/tektoncd/catalog.git" ,
298
298
verificationPolicy : vps ,
299
299
expectedError : ErrorResourceVerificationFailed ,
300
300
}, {
301
301
name : "task not matching pattern fails verification" ,
302
- task : signedTask ,
302
+ task : * signedTask ,
303
303
source : "wrong source" ,
304
304
verificationPolicy : vps ,
305
305
expectedError : ErrorNoMatchedPolicies ,
306
306
}, {
307
307
name : "verification fails with empty policy" ,
308
- task : tamperedTask ,
308
+ task : * tamperedTask ,
309
309
source : "git+https://github.com/tektoncd/catalog.git" ,
310
310
verificationPolicy : []* v1alpha1.VerificationPolicy {},
311
311
expectedError : ErrorEmptyVerificationConfig ,
312
312
}, {
313
313
name : "Verification fails with regex error" ,
314
- task : signedTask ,
314
+ task : * signedTask ,
315
315
source : "git+https://github.com/tektoncd/catalog.git" ,
316
316
verificationPolicy : []* v1alpha1.VerificationPolicy {
317
317
{
@@ -328,7 +328,7 @@ func TestVerifyTask_VerificationPolicy_Error(t *testing.T) {
328
328
expectedError : ErrorRegexMatch ,
329
329
}, {
330
330
name : "Verification fails with error from policy" ,
331
- task : signedTask ,
331
+ task : * signedTask ,
332
332
source : "git+https://github.com/tektoncd/catalog.git" ,
333
333
verificationPolicy : []* v1alpha1.VerificationPolicy {
334
334
{
0 commit comments