Skip to content

Commit b924e34

Browse files
committed
Merge remote-tracking branch 'origin/release-v2-dev' into fix/conformance_test_apisix
2 parents d9ccb03 + 0a97f82 commit b924e34

File tree

16 files changed

+351
-100
lines changed

16 files changed

+351
-100
lines changed

.github/workflows/e2e-test.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,18 @@ jobs:
7070
echo "building images..."
7171
make build-image
7272
73+
- name: Build Dockerfile.dev and extract adc binary
74+
run: |
75+
echo "Building Dockerfile.dev..."
76+
docker build -f Dockerfile.dev -t adc-builder:latest .
77+
echo "Extracting adc binary..."
78+
docker run --name adc-temp --entrypoint="" adc-builder:latest /bin/true
79+
docker cp adc-temp:/bin/adc ./bin/adc
80+
docker rm adc-temp
81+
chmod +x ./bin/adc
82+
mv ./bin/adc /usr/local/bin/adc
83+
echo "ADC binary extracted to /usr/local/bin/adc"
84+
7385
- name: Launch Kind Cluster
7486
run: |
7587
make kind-up

Dockerfile.dev

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ ARG ENABLE_PROXY=false
33
FROM node:22 AS node_builder
44

55
ARG TARGETARCH
6-
ARG ADC_COMMIT=78484e87a0168e0f86d130bfae8f808d0d1a1e41
6+
ARG ADC_COMMIT=e948079ed0576dbac29320ebfa01c9b7a298924c
77

88
WORKDIR /app
99

@@ -22,10 +22,13 @@ RUN apt update \
2222
&& rm -rf /app
2323

2424
FROM debian:bullseye-slim
25+
26+
ARG TARGETARCH
27+
2528
WORKDIR /app
2629

2730
COPY --from=node_builder /bin/adc /bin/adc
28-
COPY ./bin/apisix-ingress-controller .
31+
COPY ./bin/apisix-ingress-controller_${TARGETARCH} ./apisix-ingress-controller
2932
COPY ./config/samples/config.yaml ./conf/config.yaml
3033

3134
ENTRYPOINT ["/app/apisix-ingress-controller"]

test/e2e/crds/backendtrafficpolicy.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ import (
1919
. "github.com/onsi/ginkgo/v2"
2020
. "github.com/onsi/gomega"
2121

22-
"github.com/apache/apisix-ingress-controller/test/e2e/framework"
2322
"github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
2423
)
2524

@@ -216,7 +215,7 @@ spec:
216215
`
217216
var beforeEach = func() {
218217
By("create GatewayProxy")
219-
gatewayProxy := fmt.Sprintf(defaultGatewayProxy, framework.DashboardTLSEndpoint, s.AdminKey())
218+
gatewayProxy := fmt.Sprintf(defaultGatewayProxy, s.Deployer.GetAdminEndpoint(), s.AdminKey())
220219
err := s.CreateResourceFromStringWithNamespace(gatewayProxy, "default")
221220
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
222221

test/e2e/crds/consumer.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@ import (
2020
. "github.com/onsi/ginkgo/v2"
2121
. "github.com/onsi/gomega"
2222

23-
"github.com/apache/apisix-ingress-controller/test/e2e/framework"
2423
"github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
2524
)
2625

@@ -494,7 +493,7 @@ spec:
494493
Status(404)
495494

496495
By("update GatewayProxy with new admin key")
497-
updatedProxy := fmt.Sprintf(updatedGatewayProxy, framework.DashboardTLSEndpoint, resources.AdminAPIKey)
496+
updatedProxy := fmt.Sprintf(updatedGatewayProxy, s.Deployer.GetAdminEndpoint(resources.DataplaneService), resources.AdminAPIKey)
498497
err = s.CreateResourceFromString(updatedProxy)
499498
Expect(err).NotTo(HaveOccurred(), "updating GatewayProxy")
500499
time.Sleep(5 * time.Second)

test/e2e/framework/manifests/apisix-standalone.yaml

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,21 +4,20 @@ metadata:
44
name: apisix-conf
55
data:
66
config.yaml: |
7-
apisix:
8-
enable_admin: true
9-
admin_key:
10-
- name: admin
11-
key: {{ .AdminKey }}
12-
role: admin
13-
ssl:
14-
enabled: true
15-
nginx_config:
16-
worker_processes: 2
17-
error_log_level: info
187
deployment:
198
role: traditional
209
role_traditional:
2110
config_provider: yaml
11+
admin:
12+
allow_admin:
13+
- 0.0.0.0/0
14+
admin_key:
15+
- key: {{ .AdminKey }}
16+
name: admin
17+
role: admin
18+
nginx_config:
19+
worker_processes: 2
20+
error_log_level: info
2221
---
2322
apiVersion: apps/v1
2423
kind: Deployment

test/e2e/gatewayapi/controller.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@ import (
2020
. "github.com/onsi/gomega"
2121
"github.com/stretchr/testify/assert"
2222

23-
"github.com/apache/apisix-ingress-controller/test/e2e/framework"
2423
"github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
2524
)
2625

@@ -101,7 +100,7 @@ metadata:
101100
By(fmt.Sprintf("create GatewayClass for controller %s", s.GetControllerName()))
102101

103102
By("create GatewayProxy")
104-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
103+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
105104
err = s.CreateResourceFromStringWithNamespace(gatewayProxy, gatewayName)
106105
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
107106
time.Sleep(5 * time.Second)

test/e2e/gatewayapi/gateway.go

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ spec:
107107

108108
It("Create Gateway", func() {
109109
By("create GatewayProxy")
110-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
110+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
111111
err := s.CreateResourceFromString(gatewayProxy)
112112
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
113113
time.Sleep(5 * time.Second)
@@ -150,7 +150,7 @@ spec:
150150
Context("Gateway SSL", func() {
151151
It("Check if SSL resource was created", func() {
152152
By("create GatewayProxy")
153-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
153+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
154154
err := s.CreateResourceFromString(gatewayProxy)
155155
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
156156
time.Sleep(5 * time.Second)
@@ -204,14 +204,15 @@ spec:
204204
tls, err := s.DefaultDataplaneResource().SSL().List(context.Background())
205205
assert.Nil(GinkgoT(), err, "list tls error")
206206
assert.Len(GinkgoT(), tls, 1, "tls number not expect")
207-
assert.Equal(GinkgoT(), Cert, tls[0].Cert, "tls cert not expect")
207+
assert.Len(GinkgoT(), tls[0].Certificates, 1, "length of certificates not expect")
208+
assert.Equal(GinkgoT(), Cert, tls[0].Certificates[0].Certificate, "tls cert not expect")
208209
assert.ElementsMatch(GinkgoT(), []string{host, "*.api6.com"}, tls[0].Snis)
209210
})
210211

211212
Context("Gateway SSL with and without hostname", func() {
212213
It("Check if SSL resource was created and updated", func() {
213214
By("create GatewayProxy")
214-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
215+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
215216
err := s.CreateResourceFromString(gatewayProxy)
216217
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
217218
time.Sleep(5 * time.Second)
@@ -277,7 +278,8 @@ spec:
277278
tls, err := s.DefaultDataplaneResource().SSL().List(context.Background())
278279
assert.Nil(GinkgoT(), err, "list tls error")
279280
assert.Len(GinkgoT(), tls, 1, "tls number not expect")
280-
assert.Equal(GinkgoT(), Cert, tls[0].Cert, "tls cert not expect")
281+
assert.Len(GinkgoT(), tls[0].Certificates, 1, "length of certificates not expect")
282+
assert.Equal(GinkgoT(), Cert, tls[0].Certificates[0].Certificate, "tls cert not expect")
281283
assert.Equal(GinkgoT(), tls[0].Labels["k8s/controller-name"], "apisix.apache.org/apisix-ingress-controller")
282284

283285
By("update secret")
@@ -289,7 +291,10 @@ spec:
289291
if len(tls) < 1 {
290292
return ""
291293
}
292-
return tls[0].Cert
294+
if len(tls[0].Certificates) < 1 {
295+
return ""
296+
}
297+
return tls[0].Certificates[0].Certificate
293298
}).WithTimeout(8 * time.Second).ProbeEvery(time.Second).Should(Equal(framework.TestCert))
294299
})
295300
})

test/e2e/gatewayapi/gatewayproxy.go

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@ import (
2020
. "github.com/onsi/ginkgo/v2"
2121
. "github.com/onsi/gomega"
2222

23-
"github.com/apache/apisix-ingress-controller/test/e2e/framework"
2423
"github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
2524
)
2625

@@ -214,7 +213,7 @@ spec:
214213
Expect(gcYaml).To(ContainSubstring("message: the gatewayclass has been accepted by the apisix-ingress-controller"), "checking GatewayClass condition message")
215214

216215
By("Create GatewayProxy with enabled plugin")
217-
err = s.CreateResourceFromString(fmt.Sprintf(gatewayProxyWithEnabledPlugin, framework.DashboardTLSEndpoint, s.AdminKey()))
216+
err = s.CreateResourceFromString(fmt.Sprintf(gatewayProxyWithEnabledPlugin, s.Deployer.GetAdminEndpoint(), s.AdminKey()))
218217
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy with enabled plugin")
219218
time.Sleep(5 * time.Second)
220219

@@ -234,7 +233,7 @@ spec:
234233
By("Clean up resources")
235234
_ = s.DeleteResourceFromString(fmt.Sprintf(httpRouteForTest, "apisix"))
236235
_ = s.DeleteResourceFromString(fmt.Sprintf(gatewayWithProxy, gatewayClassName))
237-
_ = s.DeleteResourceFromString(fmt.Sprintf(gatewayProxyWithEnabledPlugin, framework.DashboardTLSEndpoint, s.AdminKey()))
236+
_ = s.DeleteResourceFromString(fmt.Sprintf(gatewayProxyWithEnabledPlugin, s.Deployer.GetAdminEndpoint(), s.AdminKey()))
238237
})
239238

240239
Context("Test Gateway with enabled GatewayProxy plugin", func() {
@@ -252,7 +251,7 @@ spec:
252251
resp.Header("X-Proxy-Test").IsEqual("enabled")
253252

254253
By("Update GatewayProxy with disabled plugin")
255-
err := s.CreateResourceFromString(fmt.Sprintf(gatewayProxyWithDisabledPlugin, framework.DashboardTLSEndpoint, s.AdminKey()))
254+
err := s.CreateResourceFromString(fmt.Sprintf(gatewayProxyWithDisabledPlugin, s.Deployer.GetAdminEndpoint(), s.AdminKey()))
256255
Expect(err).NotTo(HaveOccurred(), "updating GatewayProxy with disabled plugin")
257256
time.Sleep(5 * time.Second)
258257

@@ -277,7 +276,7 @@ spec:
277276

278277
It("Should work OK with error-page", func() {
279278
By("Update GatewayProxy with PluginMetadata")
280-
err = s.CreateResourceFromString(fmt.Sprintf(gatewayProxyWithPluginMetadata0, framework.DashboardTLSEndpoint, s.AdminKey()))
279+
err = s.CreateResourceFromString(fmt.Sprintf(gatewayProxyWithPluginMetadata0, s.Deployer.GetAdminEndpoint(), s.AdminKey()))
281280
Expect(err).ShouldNot(HaveOccurred())
282281
time.Sleep(5 * time.Second)
283282

@@ -293,7 +292,7 @@ spec:
293292
Body().Contains("404 from plugin metadata")
294293

295294
By("Update GatewayProxy with PluginMetadata")
296-
err = s.CreateResourceFromString(fmt.Sprintf(gatewayProxyWithPluginMetadata1, framework.DashboardTLSEndpoint, s.AdminKey()))
295+
err = s.CreateResourceFromString(fmt.Sprintf(gatewayProxyWithPluginMetadata1, s.Deployer.GetAdminEndpoint(), s.AdminKey()))
297296
Expect(err).ShouldNot(HaveOccurred())
298297
time.Sleep(5 * time.Second)
299298

@@ -306,7 +305,7 @@ spec:
306305
Body().Contains(`{"error_msg":"404 Route Not Found"}`)
307306

308307
By("Delete GatewayProxy")
309-
err = s.DeleteResourceFromString(fmt.Sprintf(gatewayProxyWithPluginMetadata0, framework.DashboardTLSEndpoint, s.AdminKey()))
308+
err = s.DeleteResourceFromString(fmt.Sprintf(gatewayProxyWithPluginMetadata0, s.Deployer.GetAdminEndpoint(), s.AdminKey()))
310309
Expect(err).ShouldNot(HaveOccurred())
311310
time.Sleep(5 * time.Second)
312311

test/e2e/gatewayapi/httproute.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ spec:
123123

124124
var beforeEachHTTP = func() {
125125
By("create GatewayProxy")
126-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
126+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
127127
err := s.CreateResourceFromString(gatewayProxy)
128128
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
129129
time.Sleep(5 * time.Second)
@@ -154,7 +154,7 @@ spec:
154154

155155
var beforeEachHTTPS = func() {
156156
By("create GatewayProxy")
157-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
157+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
158158
err := s.CreateResourceFromString(gatewayProxy)
159159
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
160160
time.Sleep(5 * time.Second)
@@ -322,7 +322,7 @@ spec:
322322
Expect(gcyaml).To(ContainSubstring(`status: "True"`), "checking additional GatewayClass condition status")
323323
Expect(gcyaml).To(ContainSubstring("message: the gatewayclass has been accepted by the apisix-ingress-controller"), "checking additional GatewayClass condition message")
324324

325-
additionalGatewayProxy := fmt.Sprintf(additionalGatewayProxyYaml, framework.DashboardTLSEndpoint, resources.AdminAPIKey)
325+
additionalGatewayProxy := fmt.Sprintf(additionalGatewayProxyYaml, s.Deployer.GetAdminEndpoint(resources.DataplaneService), resources.AdminAPIKey)
326326
err = s.CreateResourceFromStringWithNamespace(additionalGatewayProxy, additionalNamespace)
327327
Expect(err).NotTo(HaveOccurred(), "creating additional GatewayProxy")
328328

@@ -1688,7 +1688,7 @@ spec:
16881688
Status(404)
16891689

16901690
By("update GatewayProxy with new admin key")
1691-
updatedProxy := fmt.Sprintf(updatedGatewayProxy, framework.DashboardTLSEndpoint, resources.AdminAPIKey)
1691+
updatedProxy := fmt.Sprintf(updatedGatewayProxy, s.Deployer.GetAdminEndpoint(resources.DataplaneService), resources.AdminAPIKey)
16921692
err = s.CreateResourceFromString(updatedProxy)
16931693
Expect(err).NotTo(HaveOccurred(), "updating GatewayProxy")
16941694
time.Sleep(5 * time.Second)

test/e2e/ingress/ingress.go

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ spec:
6767
Context("Ingress TLS", func() {
6868
It("Check if SSL resource was created", func() {
6969
By("create GatewayProxy")
70-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
70+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
7171

7272
By("create GatewayProxy")
7373
err := s.CreateResourceFromStringWithNamespace(gatewayProxy, "default")
@@ -131,7 +131,8 @@ spec:
131131
tls, err := s.DefaultDataplaneResource().SSL().List(context.Background())
132132
assert.Nil(GinkgoT(), err, "list tls error")
133133
assert.Len(GinkgoT(), tls, 1, "tls number not expect")
134-
assert.Equal(GinkgoT(), Cert, tls[0].Cert, "tls cert not expect")
134+
assert.Len(GinkgoT(), tls[0].Certificates, 1, "length of certificates not expect")
135+
assert.Equal(GinkgoT(), Cert, tls[0].Certificates[0].Certificate, "tls cert not expect")
135136
assert.ElementsMatch(GinkgoT(), []string{host}, tls[0].Snis)
136137
})
137138
})
@@ -202,7 +203,7 @@ spec:
202203

203204
It("Test IngressClass Selection", func() {
204205
By("create GatewayProxy")
205-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
206+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
206207
err := s.CreateResourceFromStringWithNamespace(gatewayProxy, "default")
207208
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
208209
time.Sleep(5 * time.Second)
@@ -227,7 +228,7 @@ spec:
227228

228229
It("Proxy External Service", func() {
229230
By("create GatewayProxy")
230-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
231+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
231232
err := s.CreateResourceFromStringWithNamespace(gatewayProxy, "default")
232233
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
233234
time.Sleep(5 * time.Second)
@@ -252,7 +253,7 @@ spec:
252253

253254
It("Delete Ingress during restart", func() {
254255
By("create GatewayProxy")
255-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
256+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
256257
err := s.CreateResourceFromStringWithNamespace(gatewayProxy, "default")
257258
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
258259
time.Sleep(5 * time.Second)
@@ -434,7 +435,7 @@ spec:
434435

435436
It("Test IngressClass with GatewayProxy", func() {
436437
By("create GatewayProxy")
437-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
438+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
438439

439440
By("create GatewayProxy")
440441
err := s.CreateResourceFromStringWithNamespace(gatewayProxy, "default")
@@ -477,7 +478,7 @@ stringData:
477478
time.Sleep(5 * time.Second)
478479

479480
By("create GatewayProxy with Secret reference")
480-
gatewayProxy := fmt.Sprintf(gatewayProxyWithSecretYaml, framework.DashboardTLSEndpoint)
481+
gatewayProxy := fmt.Sprintf(gatewayProxyWithSecretYaml, s.Deployer.GetAdminEndpoint())
481482
err = s.CreateResourceFromStringWithNamespace(gatewayProxy, "default")
482483
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy with Secret")
483484
time.Sleep(5 * time.Second)
@@ -520,7 +521,7 @@ spec:
520521
type: AdminKey
521522
adminKey:
522523
value: "%s"
523-
`, framework.DashboardTLSEndpoint, s.AdminKey())
524+
`, s.Deployer.GetAdminEndpoint(), s.AdminKey())
524525
}
525526

526527
const ingressClassSpec = `
@@ -806,7 +807,7 @@ spec:
806807

807808
BeforeEach(func() {
808809
By("create GatewayProxy")
809-
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, framework.DashboardTLSEndpoint, s.AdminKey())
810+
gatewayProxy := fmt.Sprintf(gatewayProxyYaml, s.Deployer.GetAdminEndpoint(), s.AdminKey())
810811
err := s.CreateResourceFromStringWithNamespace(gatewayProxy, "default")
811812
Expect(err).NotTo(HaveOccurred(), "creating GatewayProxy")
812813
time.Sleep(5 * time.Second)
@@ -848,7 +849,7 @@ spec:
848849
Expect(exists).To(BeTrue(), "additional gateway group should exist")
849850

850851
By("update GatewayProxy with new admin key")
851-
updatedProxy := fmt.Sprintf(updatedGatewayProxy, framework.DashboardTLSEndpoint, resources.AdminAPIKey)
852+
updatedProxy := fmt.Sprintf(updatedGatewayProxy, s.Deployer.GetAdminEndpoint(resources.DataplaneService), resources.AdminAPIKey)
852853
err = s.CreateResourceFromStringWithNamespace(updatedProxy, "default")
853854
Expect(err).NotTo(HaveOccurred(), "updating GatewayProxy")
854855
time.Sleep(5 * time.Second)
@@ -940,7 +941,7 @@ spec:
940941
Expect(err).NotTo(HaveOccurred(), "creating secret")
941942

942943
By("create GatewayProxy")
943-
err = s.CreateResourceFromStringWithNamespace(fmt.Sprintf(gatewayProxySpec, framework.DashboardTLSEndpoint), s.Namespace())
944+
err = s.CreateResourceFromStringWithNamespace(fmt.Sprintf(gatewayProxySpec, s.Deployer.GetAdminEndpoint()), s.Namespace())
944945
Expect(err).NotTo(HaveOccurred(), "creating gateway proxy")
945946

946947
By("create IngressClass")

0 commit comments

Comments
 (0)