Cleanup and standardization of e2e test definitions (#5090)
This commit is contained in:
parent
45c9f94b17
commit
cc318cdec1
76 changed files with 90 additions and 133 deletions
|
|
@ -26,7 +26,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Configmap change", func() {
|
||||
var _ = framework.DescribeSetting("Configmap change", func() {
|
||||
f := framework.NewDefaultFramework("configmap-change")
|
||||
|
||||
BeforeEach(func() {
|
||||
|
|
@ -39,12 +39,9 @@ var _ = framework.IngressNginxDescribe("Configmap change", func() {
|
|||
ing := framework.NewSingleIngress(host, "/", host, f.Namespace, framework.EchoService, 80, nil)
|
||||
f.EnsureIngress(ing)
|
||||
|
||||
wlKey := "whitelist-source-range"
|
||||
wlValue := "1.1.1.1"
|
||||
|
||||
By("adding a whitelist-source-range")
|
||||
|
||||
f.UpdateNginxConfigMapData(wlKey, wlValue)
|
||||
f.UpdateNginxConfigMapData("whitelist-source-range", "1.1.1.1")
|
||||
|
||||
checksumRegex := regexp.MustCompile(`Configuration checksum:\s+(\d+)`)
|
||||
checksum := ""
|
||||
|
|
|
|||
|
|
@ -28,7 +28,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Add custom header", func() {
|
||||
var _ = framework.DescribeSetting("Add custom headers", func() {
|
||||
f := framework.NewDefaultFramework("custom-header")
|
||||
host := "custom-header"
|
||||
|
||||
|
|
|
|||
|
|
@ -1,46 +0,0 @@
|
|||
/*
|
||||
Copyright 2017 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package settings
|
||||
|
||||
import (
|
||||
"strings"
|
||||
|
||||
. "github.com/onsi/ginkgo"
|
||||
. "github.com/onsi/gomega"
|
||||
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Customize health check path", func() {
|
||||
f := framework.NewDefaultFramework("custom-health-check-path")
|
||||
|
||||
Context("with a plain HTTP ingress", func() {
|
||||
It("should return HTTP/1.1 200 OK on custom health port", func() {
|
||||
|
||||
f.WaitForNginxConfiguration(func(server string) bool {
|
||||
return strings.Contains(server, "location /healthz")
|
||||
})
|
||||
|
||||
err := framework.WaitForPodsReady(f.KubeClientSet, framework.DefaultTimeout, 1, f.Namespace, metav1.ListOptions{
|
||||
LabelSelector: "app.kubernetes.io/name=ingress-nginx",
|
||||
})
|
||||
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
})
|
||||
})
|
||||
})
|
||||
|
|
@ -29,7 +29,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("default-ssl-certificate", func() {
|
||||
var _ = framework.IngressNginxDescribe("[SSL] [Flag] default-ssl-certificate", func() {
|
||||
f := framework.NewDefaultFramework("default-ssl-certificate")
|
||||
var tlsConfig *tls.Config
|
||||
secretName := "my-custom-cert"
|
||||
|
|
|
|||
|
|
@ -31,7 +31,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Disabled catch-all", func() {
|
||||
var _ = framework.IngressNginxDescribe("[Flag] disable-catch-all", func() {
|
||||
f := framework.NewDefaultFramework("disabled-catch-all")
|
||||
|
||||
BeforeEach(func() {
|
||||
|
|
|
|||
|
|
@ -28,7 +28,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("X-Forwarded headers", func() {
|
||||
var _ = framework.DescribeSetting("use-forwarded-headers", func() {
|
||||
f := framework.NewDefaultFramework("forwarded-headers")
|
||||
|
||||
setting := "use-forwarded-headers"
|
||||
|
|
|
|||
|
|
@ -27,7 +27,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Geoip2", func() {
|
||||
var _ = framework.DescribeSetting("Geoip2", func() {
|
||||
f := framework.NewDefaultFramework("geoip2")
|
||||
|
||||
host := "geoip2"
|
||||
|
|
|
|||
|
|
@ -27,7 +27,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Global access block", func() {
|
||||
var _ = framework.DescribeSetting("[Security] block-*", func() {
|
||||
f := framework.NewDefaultFramework("global-access-block")
|
||||
|
||||
host := "global-access-block"
|
||||
|
|
@ -47,8 +47,6 @@ var _ = framework.IngressNginxDescribe("Global access block", func() {
|
|||
strings.Contains(cfg, "deny 10.0.0.0/8;")
|
||||
})
|
||||
|
||||
// This test works for minikube, but may have problems with real kubernetes clusters,
|
||||
// especially if connection is done via Internet. In this case, the test should be disabled/removed.
|
||||
resp, _, errs := gorequest.New().
|
||||
Get(f.GetURL(framework.HTTP)).
|
||||
Set("Host", host).
|
||||
|
|
|
|||
|
|
@ -28,7 +28,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Global External Auth", func() {
|
||||
var _ = framework.DescribeSetting("[Security] global-auth-url", func() {
|
||||
f := framework.NewDefaultFramework("global-external-auth")
|
||||
|
||||
host := "global-external-auth"
|
||||
|
|
|
|||
|
|
@ -30,7 +30,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Ingress class", func() {
|
||||
var _ = framework.IngressNginxDescribe("[Flag] ingress-class", func() {
|
||||
f := framework.NewDefaultFramework("ingress-class")
|
||||
|
||||
BeforeEach(func() {
|
||||
|
|
|
|||
|
|
@ -30,7 +30,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Listen on nondefault ports", func() {
|
||||
var _ = framework.IngressNginxDescribe("[Flag] custom HTTP and HTTPS ports", func() {
|
||||
|
||||
host := "forwarded-headers"
|
||||
|
||||
|
|
|
|||
|
|
@ -23,7 +23,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("LuaSharedDict", func() {
|
||||
var _ = framework.DescribeSetting("[Lua] lua-shared-dicts", func() {
|
||||
f := framework.NewDefaultFramework("lua-shared-dicts")
|
||||
host := "lua-shared-dicts"
|
||||
|
||||
|
|
|
|||
|
|
@ -24,7 +24,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Main Snippet", func() {
|
||||
var _ = framework.DescribeSetting("main-snippet", func() {
|
||||
f := framework.NewDefaultFramework("main-snippet")
|
||||
mainSnippet := "main-snippet"
|
||||
|
||||
|
|
|
|||
|
|
@ -24,7 +24,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Modsecurity Snippet", func() {
|
||||
var _ = framework.DescribeSetting("[Security] modsecurity-snippet", func() {
|
||||
f := framework.NewDefaultFramework("modsecurity-snippet")
|
||||
|
||||
It("should add value of modsecurity-snippet setting to nginx config", func() {
|
||||
|
|
|
|||
|
|
@ -24,7 +24,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Multi Accept", func() {
|
||||
var _ = framework.DescribeSetting("enable-multi-accept", func() {
|
||||
multiAccept := "enable-multi-accept"
|
||||
f := framework.NewDefaultFramework(multiAccept)
|
||||
|
||||
|
|
|
|||
|
|
@ -32,7 +32,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("No Auth locations", func() {
|
||||
var _ = framework.DescribeSetting("[Security] no-auth-locations", func() {
|
||||
f := framework.NewDefaultFramework("no-auth-locations")
|
||||
|
||||
setting := "no-auth-locations"
|
||||
|
|
|
|||
|
|
@ -38,7 +38,7 @@ const (
|
|||
ingressControllerPSP = "ingress-controller-psp"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Pod Security Policies", func() {
|
||||
var _ = framework.IngressNginxDescribe("[Security] Pod Security Policies", func() {
|
||||
f := framework.NewDefaultFramework("pod-security-policies")
|
||||
|
||||
BeforeEach(func() {
|
||||
|
|
|
|||
|
|
@ -34,7 +34,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Pod Security Policies with volumes", func() {
|
||||
var _ = framework.IngressNginxDescribe("[Security] Pod Security Policies with volumes", func() {
|
||||
f := framework.NewDefaultFramework("pod-security-policies-volumes")
|
||||
|
||||
It("should be running with a Pod Security Policy", func() {
|
||||
|
|
|
|||
|
|
@ -29,7 +29,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Proxy host variable", func() {
|
||||
var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
|
||||
test := "proxy-host"
|
||||
f := framework.NewDefaultFramework(test)
|
||||
|
||||
|
|
|
|||
|
|
@ -28,7 +28,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Proxy Protocol", func() {
|
||||
var _ = framework.DescribeSetting("use-proxy-protocol", func() {
|
||||
f := framework.NewDefaultFramework("proxy-protocol")
|
||||
|
||||
setting := "use-proxy-protocol"
|
||||
|
|
|
|||
|
|
@ -27,7 +27,7 @@ import (
|
|||
"k8s.io/ingress-nginx/test/e2e/framework"
|
||||
)
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Server Tokens", func() {
|
||||
var _ = framework.DescribeSetting("server-tokens", func() {
|
||||
f := framework.NewDefaultFramework("server-tokens")
|
||||
serverTokens := "server-tokens"
|
||||
|
||||
|
|
|
|||
|
|
@ -34,7 +34,7 @@ func noRedirectPolicyFunc(gorequest.Request, []gorequest.Request) error {
|
|||
return http.ErrUseLastResponse
|
||||
}
|
||||
|
||||
var _ = framework.IngressNginxDescribe("Settings - TLS)", func() {
|
||||
var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", func() {
|
||||
f := framework.NewDefaultFramework("settings-tls")
|
||||
host := "settings-tls"
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue