@@ -189,12 +189,14 @@ var yamlSecrets = []yamlSecret{
189189 "/tests/data/virtual-server-tls/tls-secret.yaml" ,
190190 "/tests/data/prometheus/secret.yaml" ,
191191 "/tests/data/service-insight/secret.yaml" ,
192+ "/tests/data/transport-server-tcp-load-balance/tcp-tls-secret.yaml" ,
192193 },
193194 usedIn : []string {
194195 "tests/suite/test_tls.py - needed for subject info and common name" ,
195196 "tests/suite/test_virtual_server_tls.py - needed for subject info and common name" ,
196197 "tests/suite/test_prometheus_metrics.py - needed for common name and subject info" ,
197198 "tests/suite/test_transport_server_service_insight.py - needed for subject info and common name" ,
199+ "tests/suite/test_transport_server_tcp_load_balance.py - needed for subject info and common name" ,
198200 },
199201 },
200202 {
@@ -338,4 +340,25 @@ var yamlSecrets = []yamlSecret{
338340 "suite/test_transport_server_backup_service.py - needed for the common name and secret name" ,
339341 },
340342 },
343+
344+ {
345+ secretName : "tls-secret" ,
346+ fileName : "kic-tls-secret.yaml" ,
347+ templateData : templateData {
348+ country : []string {"IE" },
349+ organization : []string {"F5 NGINX" },
350+ organizationalUnit : []string {"NGINX Ingress Controller" },
351+ locality : []string {"Cork" },
352+ province : []string {"Cork" },
353+ commonName : "kic.example.com" ,
354+ dnsNames : []string {"kic.example.com" },
355+ },
356+ valid : secretShouldHaveValidTLSCrt ,
357+ symlinks : []string {
358+ "/tests/data/transport-server-tcp-load-balance/tcp-tls-secret.yaml" ,
359+ },
360+ usedIn : []string {
361+ "tests/suite/test_transport_server_tcp_load_balance.py - needed for subject info and common name" ,
362+ },
363+ },
341364}
0 commit comments