@@ -46,7 +46,7 @@ func TestParseConfigMapWithAppProtectCompressedRequestsAction(t *testing.T) {
4646 "app-protect-compressed-requests-action" : test .action ,
4747 },
4848 }
49- result := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
49+ result , _ := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
5050 if result .MainAppProtectCompressedRequestsAction != test .expect {
5151 t .Errorf ("ParseConfigMap() returned %q but expected %q for the case %s" , result .MainAppProtectCompressedRequestsAction , test .expect , test .msg )
5252 }
@@ -115,7 +115,7 @@ func TestParseConfigMapWithAppProtectReconnectPeriod(t *testing.T) {
115115 "app-protect-reconnect-period-seconds" : test .period ,
116116 },
117117 }
118- result := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
118+ result , _ := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
119119 if result .MainAppProtectReconnectPeriod != test .expect {
120120 t .Errorf ("ParseConfigMap() returned %q but expected %q for the case %s" , result .MainAppProtectReconnectPeriod , test .expect , test .msg )
121121 }
@@ -156,7 +156,7 @@ func TestParseConfigMapWithTLSPassthroughProxyProtocol(t *testing.T) {
156156 "real-ip-header" : test .realIPheader ,
157157 },
158158 }
159- result := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
159+ result , _ := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
160160 if result .RealIPHeader != test .want {
161161 t .Errorf ("want %q, got %q" , test .want , result .RealIPHeader )
162162 }
@@ -198,7 +198,7 @@ func TestParseConfigMapWithoutTLSPassthroughProxyProtocol(t *testing.T) {
198198 "real-ip-header" : test .realIPheader ,
199199 },
200200 }
201- result := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
201+ result , _ := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
202202 if result .RealIPHeader != test .want {
203203 t .Errorf ("want %q, got %q" , test .want , result .RealIPHeader )
204204 }
@@ -245,7 +245,7 @@ func TestParseConfigMapAccessLog(t *testing.T) {
245245 "access-log-off" : test .accessLogOff ,
246246 },
247247 }
248- result := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
248+ result , _ := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
249249 if result .MainAccessLog != test .want {
250250 t .Errorf ("want %q, got %q" , test .want , result .MainAccessLog )
251251 }
@@ -277,7 +277,7 @@ func TestParseConfigMapAccessLogDefault(t *testing.T) {
277277 "access-log-off" : "False" ,
278278 },
279279 }
280- result := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
280+ result , _ := ParseConfigMap (context .Background (), cm , nginxPlus , hasAppProtect , hasAppProtectDos , hasTLSPassthrough , makeEventLogger ())
281281 if result .MainAccessLog != test .want {
282282 t .Errorf ("want %q, got %q" , test .want , result .MainAccessLog )
283283 }
0 commit comments