@@ -69,6 +69,7 @@ _refute_condition_and_warn() {
6969 _refute_condition_and_warn .\" ingressNginx\" .\" controller\" .\" service\" .\" annotations\"
7070}
7171
72+ # bats test_tags=conditional_set_me_letsencrypt
7273@test " conditional-set-me - singular conditions: letsencrypt" {
7374
7475 yq_set common .issuers.letsencrypt.enabled ' true'
@@ -88,6 +89,7 @@ _refute_condition_and_warn() {
8889 _refute_condition_and_warn .\" issuers\" .\" letsencrypt\" .\" staging\" .\" email\"
8990}
9091
92+ # bats test_tags=conditional_set_me_opsgenie_alerts
9193@test " conditional-set-me - singular conditions: opsgenie alerts" {
9294
9395 yq_set common .alerts.opsGenieHeartbeat.enabled ' true'
@@ -99,6 +101,7 @@ _refute_condition_and_warn() {
99101 _refute_condition_and_warn .\" alerts\" .\" opsGenieHeartbeat\" .\" name\"
100102}
101103
104+ # bats test_tags=conditional_set_me_slack_alerts
102105@test " conditional-set-me - singular conditions: slack alerts" {
103106
104107 yq_set common .alerts.alertTo \" slack\"
@@ -110,7 +113,7 @@ _refute_condition_and_warn() {
110113 _refute_condition_and_warn .\" alerts\" .\" slack\" .\" channel\"
111114}
112115
113- # bats test_tags=conditional_set_me_netpol_singular
116+ # bats test_tags=conditional_set_me_netpol_singular_sc
114117@test " conditional-set-me - singular conditions: network policies sc" {
115118
116119 yq_set common .trivy.enabled ' true'
@@ -155,6 +158,7 @@ _refute_condition_and_warn() {
155158
156159}
157160
161+ # bats test_tags=conditional_set_me_netpol_singular_wc
158162@test " conditional-set-me - singular conditions: network policies wc" {
159163
160164 yq_set common .trivy.enabled ' true'
@@ -180,6 +184,7 @@ _refute_condition_and_warn() {
180184 _refute_condition_and_warn .\" networkPolicies\" .\" ingressNginx\" .\" ingressOverride\" .\" ips\"
181185}
182186
187+ # bats test_tags=conditional_set_me_netpol_kured
183188@test " conditional-set-me - multiple conditions: network policies kured" {
184189
185190 yq_set common .kured.enabled ' true'
@@ -211,6 +216,7 @@ _refute_condition_and_warn() {
211216 _refute_condition_and_warn .\" networkPolicies\" .\" kured\" .\" notificationSlack\" .\" ips\"
212217}
213218
219+ # bats test_tags=conditional_set_me_netpol_falco
214220@test " conditional-set-me - multiple conditions: network policies falco" {
215221
216222 yq_set common .falco.enabled ' true'
@@ -274,6 +280,7 @@ _refute_condition_and_warn() {
274280 _refute_condition_and_warn .\" networkPolicies\" .\" externalDns\" .\" ips\"
275281}
276282
283+ # bats test_tags=conditional_set_me_netpol_harbor
277284@test " conditional-set-me - multiple conditions: network policies harbor" {
278285
279286 yq_set sc .harbor.enabled ' true'
@@ -305,6 +312,7 @@ _refute_condition_and_warn() {
305312 _refute_condition_and_warn .\" networkPolicies\" .\" harbor\" .\" trivy\" .\" ips\"
306313}
307314
315+ # bats test_tags=conditional_set_me_netpol_monitoring
308316@test " conditional-set-me - multiple conditions: network policies monitoring" {
309317
310318 yq_set sc .networkPolicies.monitoring.enabled ' true'
@@ -332,6 +340,7 @@ _refute_condition_and_warn() {
332340 _refute_condition_and_warn .\" networkPolicies\" .\" monitoring\" .\" grafana\" .\" externalDataSources\" .\" ports\"
333341}
334342
343+ # bats test_tags=conditional_set_me_netpol_rclone_s3
335344@test " conditional-set-me - multiple conditions: network policies rclone s3" {
336345
337346 yq_set sc .objectStorage.sync.enabled ' true'
0 commit comments