Skip to content
This repository was archived by the owner on May 17, 2024. It is now read-only.

Commit 0deb0ac

Browse files
committed
Replaces context.Background() to context.TODO() in e2e tests
Signed-off-by: JoshVanL <[email protected]>
1 parent 5b5e17c commit 0deb0ac

File tree

12 files changed

+71
-71
lines changed

12 files changed

+71
-71
lines changed

test/e2e/framework/helper/deploy.go

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ func (h *Helper) DeployProxy(ns *corev1.Namespace, issuerURL *url.URL, clientID
9898
},
9999
}
100100

101-
_, err := h.KubeClient.CoreV1().Secrets(ns.Name).Create(context.Background(), sec, metav1.CreateOptions{})
101+
_, err := h.KubeClient.CoreV1().Secrets(ns.Name).Create(context.TODO(), sec, metav1.CreateOptions{})
102102
if err != nil {
103103
return nil, nil, err
104104
}
@@ -111,7 +111,7 @@ func (h *Helper) DeployProxy(ns *corev1.Namespace, issuerURL *url.URL, clientID
111111
pTrue := true
112112
pFalse := false
113113

114-
crole, err := h.KubeClient.RbacV1().ClusterRoles().Create(context.Background(), &rbacv1.ClusterRole{
114+
crole, err := h.KubeClient.RbacV1().ClusterRoles().Create(context.TODO(), &rbacv1.ClusterRole{
115115
ObjectMeta: metav1.ObjectMeta{
116116
GenerateName: kind.ProxyImageName + "-",
117117
OwnerReferences: []metav1.OwnerReference{
@@ -142,7 +142,7 @@ func (h *Helper) DeployProxy(ns *corev1.Namespace, issuerURL *url.URL, clientID
142142
return nil, nil, err
143143
}
144144

145-
_, err = h.KubeClient.RbacV1().ClusterRoleBindings().Create(context.Background(),
145+
_, err = h.KubeClient.RbacV1().ClusterRoleBindings().Create(context.TODO(),
146146
&rbacv1.ClusterRoleBinding{
147147
ObjectMeta: metav1.ObjectMeta{
148148
GenerateName: kind.ProxyImageName + "-",
@@ -235,7 +235,7 @@ func (h *Helper) DeployFakeAPIServer(ns string) ([]corev1.Volume, *url.URL, erro
235235
return nil, nil, err
236236
}
237237

238-
sec, err := h.KubeClient.CoreV1().Secrets(ns).Create(context.Background(), &corev1.Secret{
238+
sec, err := h.KubeClient.CoreV1().Secrets(ns).Create(context.TODO(), &corev1.Secret{
239239
ObjectMeta: metav1.ObjectMeta{
240240
GenerateName: "fake-apiserver-ca-",
241241
Namespace: ns,
@@ -293,7 +293,7 @@ func (h *Helper) DeployAuditWebhook(ns, logPath string) (corev1.Volume, *url.URL
293293
return corev1.Volume{}, nil, err
294294
}
295295

296-
sec, err := h.KubeClient.CoreV1().Secrets(ns).Create(context.Background(), &corev1.Secret{
296+
sec, err := h.KubeClient.CoreV1().Secrets(ns).Create(context.TODO(), &corev1.Secret{
297297
ObjectMeta: metav1.ObjectMeta{
298298
GenerateName: "audit-webhook-ca-",
299299
Namespace: ns,
@@ -323,7 +323,7 @@ func (h *Helper) deployApp(ns, name string, serviceType corev1.ServiceType, cont
323323

324324
var netIPs []net.IP
325325
if serviceType == corev1.ServiceTypeNodePort {
326-
nodes, err := h.KubeClient.CoreV1().Nodes().List(context.Background(), metav1.ListOptions{})
326+
nodes, err := h.KubeClient.CoreV1().Nodes().List(context.TODO(), metav1.ListOptions{})
327327
if err != nil {
328328
return nil, nil, err
329329
}
@@ -419,7 +419,7 @@ func (h *Helper) deployApp(ns, name string, serviceType corev1.ServiceType, cont
419419
},
420420
}
421421

422-
svc, err = h.KubeClient.CoreV1().Services(ns).Create(context.Background(), svc, metav1.CreateOptions{})
422+
svc, err = h.KubeClient.CoreV1().Services(ns).Create(context.TODO(), svc, metav1.CreateOptions{})
423423
if err != nil {
424424
return nil, nil, err
425425
}
@@ -429,17 +429,17 @@ func (h *Helper) deployApp(ns, name string, serviceType corev1.ServiceType, cont
429429
strconv.FormatUint(uint64(svc.Spec.Ports[0].NodePort), 10))
430430
}
431431

432-
_, err = h.KubeClient.CoreV1().Secrets(ns).Create(context.Background(), sec, metav1.CreateOptions{})
432+
_, err = h.KubeClient.CoreV1().Secrets(ns).Create(context.TODO(), sec, metav1.CreateOptions{})
433433
if err != nil {
434434
return nil, nil, err
435435
}
436436

437-
_, err = h.KubeClient.CoreV1().ServiceAccounts(ns).Create(context.Background(), sa, metav1.CreateOptions{})
437+
_, err = h.KubeClient.CoreV1().ServiceAccounts(ns).Create(context.TODO(), sa, metav1.CreateOptions{})
438438
if err != nil {
439439
return nil, nil, err
440440
}
441441

442-
_, err = h.KubeClient.AppsV1().Deployments(ns).Create(context.Background(), deploy, metav1.CreateOptions{})
442+
_, err = h.KubeClient.AppsV1().Deployments(ns).Create(context.TODO(), deploy, metav1.CreateOptions{})
443443
if err != nil {
444444
return nil, nil, err
445445
}
@@ -468,24 +468,24 @@ func (h *Helper) DeleteFakeAPIServer(ns string) error {
468468
}
469469

470470
func (h *Helper) deleteApp(ns, name string, extraSecrets ...string) error {
471-
err := h.KubeClient.AppsV1().Deployments(ns).Delete(context.Background(), name, metav1.DeleteOptions{})
471+
err := h.KubeClient.AppsV1().Deployments(ns).Delete(context.TODO(), name, metav1.DeleteOptions{})
472472
if err != nil && !k8sErrors.IsNotFound(err) {
473473
return err
474474
}
475475

476476
for _, s := range append(extraSecrets, name) {
477-
err = h.KubeClient.CoreV1().Secrets(ns).Delete(context.Background(), s, metav1.DeleteOptions{})
477+
err = h.KubeClient.CoreV1().Secrets(ns).Delete(context.TODO(), s, metav1.DeleteOptions{})
478478
if err != nil && !k8sErrors.IsNotFound(err) {
479479
return err
480480
}
481481
}
482482

483-
err = h.KubeClient.CoreV1().Services(ns).Delete(context.Background(), name, metav1.DeleteOptions{})
483+
err = h.KubeClient.CoreV1().Services(ns).Delete(context.TODO(), name, metav1.DeleteOptions{})
484484
if err != nil && !k8sErrors.IsNotFound(err) {
485485
return err
486486
}
487487

488-
err = h.KubeClient.CoreV1().ServiceAccounts(ns).Delete(context.Background(), name, metav1.DeleteOptions{})
488+
err = h.KubeClient.CoreV1().ServiceAccounts(ns).Delete(context.TODO(), name, metav1.DeleteOptions{})
489489
if err != nil && !k8sErrors.IsNotFound(err) {
490490
return err
491491
}

test/e2e/framework/helper/poll.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ func (h *Helper) WaitForDeploymentReady(namespace, name string, timeout time.Dur
1717
log.Infof("Waiting for Deployment to become ready %s/%s", namespace, name)
1818

1919
err := wait.PollImmediate(time.Second*2, timeout, func() (bool, error) {
20-
deploy, err := h.KubeClient.AppsV1().Deployments(namespace).Get(context.Background(), name, metav1.GetOptions{})
20+
deploy, err := h.KubeClient.AppsV1().Deployments(namespace).Get(context.TODO(), name, metav1.GetOptions{})
2121
if err != nil {
2222
return false, err
2323
}
@@ -49,7 +49,7 @@ func (h *Helper) WaitForPodReady(namespace, name string, timeout time.Duration)
4949
log.Infof("Waiting for Pod to become ready %s/%s", namespace, name)
5050

5151
err := wait.PollImmediate(time.Second*2, timeout, func() (bool, error) {
52-
pod, err := h.KubeClient.CoreV1().Pods(namespace).Get(context.Background(), name, metav1.GetOptions{})
52+
pod, err := h.KubeClient.CoreV1().Pods(namespace).Get(context.TODO(), name, metav1.GetOptions{})
5353
if err != nil {
5454
return false, err
5555
}
@@ -91,7 +91,7 @@ func (h *Helper) WaitForDeploymentToDelete(namespace, name string, timeout time.
9191
log.Infof("Waiting for Deployment to be deleted: %s/%s", namespace, name)
9292

9393
err := wait.PollImmediate(time.Second*2, timeout, func() (bool, error) {
94-
_, err := h.KubeClient.AppsV1().Deployments(namespace).Get(context.Background(), name, metav1.GetOptions{})
94+
_, err := h.KubeClient.AppsV1().Deployments(namespace).Get(context.TODO(), name, metav1.GetOptions{})
9595
if k8sErrors.IsNotFound(err) {
9696
return true, nil
9797
}

test/e2e/framework/helper/secrets.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ import (
99
)
1010

1111
func (h *Helper) GetServiceAccountSecret(ns, name string) (*corev1.Secret, error) {
12-
sa, err := h.KubeClient.CoreV1().ServiceAccounts(ns).Get(context.Background(), name, metav1.GetOptions{})
12+
sa, err := h.KubeClient.CoreV1().ServiceAccounts(ns).Get(context.TODO(), name, metav1.GetOptions{})
1313
if err != nil {
1414
return nil, err
1515
}
16-
sec, err := h.KubeClient.CoreV1().Secrets(ns).Get(context.Background(), sa.Secrets[0].Name, metav1.GetOptions{})
16+
sec, err := h.KubeClient.CoreV1().Secrets(ns).Get(context.TODO(), sa.Secrets[0].Name, metav1.GetOptions{})
1717
if err != nil {
1818
return nil, err
1919
}

test/e2e/framework/util.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,12 @@ func (f *Framework) CreateKubeNamespace(baseName string) (*corev1.Namespace, err
2525
},
2626
}
2727

28-
return f.KubeClientSet.CoreV1().Namespaces().Create(context.Background(), ns, metav1.CreateOptions{})
28+
return f.KubeClientSet.CoreV1().Namespaces().Create(context.TODO(), ns, metav1.CreateOptions{})
2929
}
3030

3131
// DeleteKubeNamespace will delete a namespace resource
3232
func (f *Framework) DeleteKubeNamespace(namespace string) error {
33-
return f.KubeClientSet.CoreV1().Namespaces().Delete(context.Background(), namespace, metav1.DeleteOptions{})
33+
return f.KubeClientSet.CoreV1().Namespaces().Delete(context.TODO(), namespace, metav1.DeleteOptions{})
3434
}
3535

3636
// WaitForKubeNamespaceNotExist will wait for the namespace with the given name
@@ -41,7 +41,7 @@ func (f *Framework) WaitForKubeNamespaceNotExist(namespace string) error {
4141

4242
func namespaceNotExist(c kubernetes.Interface, namespace string) wait.ConditionFunc {
4343
return func() (bool, error) {
44-
_, err := c.CoreV1().Namespaces().Get(context.Background(), namespace, metav1.GetOptions{})
44+
_, err := c.CoreV1().Namespaces().Get(context.TODO(), namespace, metav1.GetOptions{})
4545
if apierrors.IsNotFound(err) {
4646
return true, nil
4747
}

test/e2e/suite/cases/audit/audit.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ var _ = framework.CasesDescribe("Audit", func() {
2727

2828
It("should be able to write audit logs to file", func() {
2929
By("Creating policy file ConfigMap")
30-
cm, err := f.Helper().KubeClient.CoreV1().ConfigMaps(f.Namespace.Name).Create(context.Background(), &corev1.ConfigMap{
30+
cm, err := f.Helper().KubeClient.CoreV1().ConfigMaps(f.Namespace.Name).Create(context.TODO(), &corev1.ConfigMap{
3131
ObjectMeta: metav1.ObjectMeta{
3232
GenerateName: "kube-oidc-proxy-policy-",
3333
},
@@ -61,7 +61,7 @@ rules:
6161

6262
It("should be able to write audit logs to webhook", func() {
6363
By("Creating policy file ConfigMap")
64-
cmPolicy, err := f.Helper().KubeClient.CoreV1().ConfigMaps(f.Namespace.Name).Create(context.Background(), &corev1.ConfigMap{
64+
cmPolicy, err := f.Helper().KubeClient.CoreV1().ConfigMaps(f.Namespace.Name).Create(context.TODO(), &corev1.ConfigMap{
6565
ObjectMeta: metav1.ObjectMeta{
6666
GenerateName: "kube-oidc-proxy-policy-",
6767
},
@@ -77,7 +77,7 @@ rules:
7777
extraWebhookVol, webhookURL, err := f.Helper().DeployAuditWebhook(f.Namespace.Name, "/audit-log")
7878
Expect(err).NotTo(HaveOccurred())
7979

80-
cmWebhook, err := f.Helper().KubeClient.CoreV1().ConfigMaps(f.Namespace.Name).Create(context.Background(), &corev1.ConfigMap{
80+
cmWebhook, err := f.Helper().KubeClient.CoreV1().ConfigMaps(f.Namespace.Name).Create(context.TODO(), &corev1.ConfigMap{
8181
ObjectMeta: metav1.ObjectMeta{
8282
GenerateName: "kube-oidc-proxy-webhook-config-",
8383
},
@@ -163,7 +163,7 @@ func testAuditLogs(f *framework.Framework, podLabelSelector string) {
163163

164164
By("Copying audit log from proxy locally")
165165
// Get pod
166-
pods, err := f.Helper().KubeClient.CoreV1().Pods(f.Namespace.Name).List(context.Background(), metav1.ListOptions{
166+
pods, err := f.Helper().KubeClient.CoreV1().Pods(f.Namespace.Name).List(context.TODO(), metav1.ListOptions{
167167
LabelSelector: podLabelSelector,
168168
})
169169
Expect(err).NotTo(HaveOccurred())

test/e2e/suite/cases/impersonation/impersonation.go

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ var _ = framework.CasesDescribe("Impersonation", func() {
7070
f.DeployProxyWith(nil, "--disable-impersonation")
7171

7272
By("Creating ClusterRole for system:anonymous to impersonate")
73-
roleImpersonate, err := f.Helper().KubeClient.RbacV1().ClusterRoles().Create(context.Background(), &rbacv1.ClusterRole{
73+
roleImpersonate, err := f.Helper().KubeClient.RbacV1().ClusterRoles().Create(context.TODO(), &rbacv1.ClusterRole{
7474
ObjectMeta: metav1.ObjectMeta{
7575
GenerateName: fmt.Sprintf("test-user-role-impersonate-"),
7676
},
@@ -81,7 +81,7 @@ var _ = framework.CasesDescribe("Impersonation", func() {
8181
Expect(err).NotTo(HaveOccurred())
8282

8383
By("Creating Role for user foo to list Pods")
84-
rolePods, err := f.Helper().KubeClient.RbacV1().Roles(f.Namespace.Name).Create(context.Background(), &rbacv1.Role{
84+
rolePods, err := f.Helper().KubeClient.RbacV1().Roles(f.Namespace.Name).Create(context.TODO(), &rbacv1.Role{
8585
ObjectMeta: metav1.ObjectMeta{
8686
GenerateName: fmt.Sprintf("test-user-role-pods-"),
8787
},
@@ -92,7 +92,7 @@ var _ = framework.CasesDescribe("Impersonation", func() {
9292
Expect(err).NotTo(HaveOccurred())
9393

9494
By("Creating ClusterRoleBinding for user system:anonymous")
95-
rolebindingImpersonate, err := f.Helper().KubeClient.RbacV1().ClusterRoleBindings().Create(context.Background(),
95+
rolebindingImpersonate, err := f.Helper().KubeClient.RbacV1().ClusterRoleBindings().Create(context.TODO(),
9696
&rbacv1.ClusterRoleBinding{
9797
ObjectMeta: metav1.ObjectMeta{
9898
GenerateName: "test-user-binding-system-anonymous",
@@ -103,7 +103,7 @@ var _ = framework.CasesDescribe("Impersonation", func() {
103103
Expect(err).NotTo(HaveOccurred())
104104

105105
By("Creating RoleBinding for user [email protected]")
106-
rolebindingPods, err := f.Helper().KubeClient.RbacV1().RoleBindings(f.Namespace.Name).Create(context.Background(),
106+
rolebindingPods, err := f.Helper().KubeClient.RbacV1().RoleBindings(f.Namespace.Name).Create(context.TODO(),
107107
&rbacv1.RoleBinding{
108108
ObjectMeta: metav1.ObjectMeta{
109109
GenerateName: "test-user-binding-user-foo-example-com",
@@ -123,23 +123,23 @@ var _ = framework.CasesDescribe("Impersonation", func() {
123123

124124
// Should not error since we have authorized system:anonymous to
125125
// impersonate and [email protected] to list pods
126-
_, err = client.CoreV1().Pods(f.Namespace.Name).List(context.Background(), metav1.ListOptions{})
126+
_, err = client.CoreV1().Pods(f.Namespace.Name).List(context.TODO(), metav1.ListOptions{})
127127
Expect(err).NotTo(HaveOccurred())
128128

129129
By("Deleting RoleBinding for user [email protected]")
130-
err = f.Helper().KubeClient.RbacV1().RoleBindings(f.Namespace.Name).Delete(context.Background(), rolebindingPods.Name, metav1.DeleteOptions{})
130+
err = f.Helper().KubeClient.RbacV1().RoleBindings(f.Namespace.Name).Delete(context.TODO(), rolebindingPods.Name, metav1.DeleteOptions{})
131131
Expect(err).NotTo(HaveOccurred())
132132

133133
By("Deleting Role for list Pods")
134-
err = f.Helper().KubeClient.RbacV1().Roles(f.Namespace.Name).Delete(context.Background(), rolePods.Name, metav1.DeleteOptions{})
134+
err = f.Helper().KubeClient.RbacV1().Roles(f.Namespace.Name).Delete(context.TODO(), rolePods.Name, metav1.DeleteOptions{})
135135
Expect(err).NotTo(HaveOccurred())
136136

137137
By("Deleting ClusterRoleBinding for user system:anonymous")
138-
err = f.Helper().KubeClient.RbacV1().ClusterRoleBindings().Delete(context.Background(), rolebindingImpersonate.Name, metav1.DeleteOptions{})
138+
err = f.Helper().KubeClient.RbacV1().ClusterRoleBindings().Delete(context.TODO(), rolebindingImpersonate.Name, metav1.DeleteOptions{})
139139
Expect(err).NotTo(HaveOccurred())
140140

141141
By("Deleting ClusterRole for Impersonate")
142-
err = f.Helper().KubeClient.RbacV1().ClusterRoles().Delete(context.Background(), roleImpersonate.Name, metav1.DeleteOptions{})
142+
err = f.Helper().KubeClient.RbacV1().ClusterRoles().Delete(context.TODO(), roleImpersonate.Name, metav1.DeleteOptions{})
143143
Expect(err).NotTo(HaveOccurred())
144144
})
145145
})
@@ -151,7 +151,7 @@ func tryImpersonationClient(f *framework.Framework, impConfig rest.Impersonation
151151
client, err := kubernetes.NewForConfig(config)
152152
Expect(err).NotTo(HaveOccurred())
153153

154-
_, err = client.CoreV1().Pods(f.Namespace.Name).List(context.Background(), metav1.ListOptions{})
154+
_, err = client.CoreV1().Pods(f.Namespace.Name).List(context.TODO(), metav1.ListOptions{})
155155
kErr, ok := err.(*k8sErrors.StatusError)
156156
if !ok {
157157
Expect(err).NotTo(HaveOccurred())

test/e2e/suite/cases/passthrough/passthrough.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ var _ = framework.CasesDescribe("Passthrough", func() {
2424

2525
JustBeforeEach(func() {
2626
By("Creating List Pods Role")
27-
_, err := f.Helper().KubeClient.RbacV1().Roles(f.Namespace.Name).Create(context.Background(),
27+
_, err := f.Helper().KubeClient.RbacV1().Roles(f.Namespace.Name).Create(context.TODO(),
2828
&rbacv1.Role{
2929
ObjectMeta: metav1.ObjectMeta{
3030
Name: "e2e-impersonation-pods-list",
@@ -41,7 +41,7 @@ var _ = framework.CasesDescribe("Passthrough", func() {
4141

4242
// Create bindings for both the OIDC user and default ServiceAccount
4343
By("Creating List Pods RoleBinding")
44-
_, err = f.Helper().KubeClient.RbacV1().RoleBindings(f.Namespace.Name).Create(context.Background(),
44+
_, err = f.Helper().KubeClient.RbacV1().RoleBindings(f.Namespace.Name).Create(context.TODO(),
4545
&rbacv1.RoleBinding{
4646
ObjectMeta: metav1.ObjectMeta{
4747
Name: "e2e-impersonation-pods-list",
@@ -71,20 +71,20 @@ var _ = framework.CasesDescribe("Passthrough", func() {
7171

7272
JustAfterEach(func() {
7373
By("Deleting List Pods Role")
74-
err := f.Helper().KubeClient.RbacV1().Roles(f.Namespace.Name).Delete(context.Background(),
74+
err := f.Helper().KubeClient.RbacV1().Roles(f.Namespace.Name).Delete(context.TODO(),
7575
"e2e-impersonation-pods-list", metav1.DeleteOptions{})
7676
Expect(err).NotTo(HaveOccurred())
7777

7878
By("Creating List Pods RoleBinding")
79-
err = f.Helper().KubeClient.RbacV1().RoleBindings(f.Namespace.Name).Delete(context.Background(),
79+
err = f.Helper().KubeClient.RbacV1().RoleBindings(f.Namespace.Name).Delete(context.TODO(),
8080
"e2e-impersonation-pods-list", metav1.DeleteOptions{})
8181
Expect(err).NotTo(HaveOccurred())
8282
})
8383

8484
It("error when a valid OIDC token is used but return correct when passthrough is disabled", func() {
8585
By("A valid OIDC token should respond without error")
8686
proxyClient := f.NewProxyClient()
87-
_, err := proxyClient.CoreV1().Pods(f.Namespace.Name).List(context.Background(), metav1.ListOptions{})
87+
_, err := proxyClient.CoreV1().Pods(f.Namespace.Name).List(context.TODO(), metav1.ListOptions{})
8888
Expect(err).NotTo(HaveOccurred())
8989

9090
By("Using a ServiceAccount token should error by the proxy")
@@ -96,7 +96,7 @@ var _ = framework.CasesDescribe("Passthrough", func() {
9696
client, err := kubernetes.NewForConfig(config)
9797
Expect(err).NotTo(HaveOccurred())
9898

99-
_, err = client.CoreV1().Pods(f.Namespace.Name).List(context.Background(), metav1.ListOptions{})
99+
_, err = client.CoreV1().Pods(f.Namespace.Name).List(context.TODO(), metav1.ListOptions{})
100100
kErr, ok := err.(*k8sErrors.StatusError)
101101
if !ok {
102102
Expect(err).NotTo(HaveOccurred())
@@ -119,7 +119,7 @@ var _ = framework.CasesDescribe("Passthrough", func() {
119119

120120
By("A valid OIDC token should respond without error")
121121
proxyClient := f.NewProxyClient()
122-
_, err := proxyClient.CoreV1().Pods(f.Namespace.Name).List(context.Background(), metav1.ListOptions{})
122+
_, err := proxyClient.CoreV1().Pods(f.Namespace.Name).List(context.TODO(), metav1.ListOptions{})
123123
Expect(err).NotTo(HaveOccurred())
124124

125125
By("Using a ServiceAccount token should not error")
@@ -130,7 +130,7 @@ var _ = framework.CasesDescribe("Passthrough", func() {
130130
kubeProxyClient, err := kubernetes.NewForConfig(proxyConfig)
131131
Expect(err).NotTo(HaveOccurred())
132132

133-
_, err = kubeProxyClient.CoreV1().Pods(f.Namespace.Name).List(context.Background(), metav1.ListOptions{})
133+
_, err = kubeProxyClient.CoreV1().Pods(f.Namespace.Name).List(context.TODO(), metav1.ListOptions{})
134134
Expect(err).NotTo(HaveOccurred())
135135
})
136136
})

0 commit comments

Comments
 (0)