@@ -3,7 +3,6 @@ package cel
3
3
import (
4
4
"testing"
5
5
6
- . "github.com/onsi/gomega"
7
6
controllerruntime "sigs.k8s.io/controller-runtime"
8
7
gatewayv1alpha2 "sigs.k8s.io/gateway-api/apis/v1alpha2"
9
8
@@ -13,19 +12,16 @@ import (
13
12
14
13
func TestClientSettingsPoliciesTargetRefKind (t * testing.T ) {
15
14
t .Parallel ()
16
- g := NewWithT (t )
17
-
18
- k8sClient , err := getKubernetesClient (t )
19
- g .Expect (err ).ToNot (HaveOccurred ())
15
+ k8sClient := getKubernetesClient (t )
20
16
21
17
tests := []struct {
22
- policySpec ngfAPIv1alpha1.ClientSettingsPolicySpec
18
+ spec ngfAPIv1alpha1.ClientSettingsPolicySpec
23
19
name string
24
20
wantErrors []string
25
21
}{
26
22
{
27
23
name : "Validate TargetRef of kind Gateway is allowed" ,
28
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
24
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
29
25
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
30
26
Kind : gatewayKind ,
31
27
Group : gatewayGroup ,
@@ -34,7 +30,7 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
34
30
},
35
31
{
36
32
name : "Validate TargetRef of kind HTTPRoute is allowed" ,
37
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
33
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
38
34
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
39
35
Kind : httpRouteKind ,
40
36
Group : gatewayGroup ,
@@ -43,7 +39,7 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
43
39
},
44
40
{
45
41
name : "Validate TargetRef of kind GRPCRoute is allowed" ,
46
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
42
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
47
43
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
48
44
Kind : grpcRouteKind ,
49
45
Group : gatewayGroup ,
@@ -53,7 +49,7 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
53
49
{
54
50
name : "Validate Invalid TargetRef Kind is not allowed" ,
55
51
wantErrors : []string {expectedTargetRefKindError },
56
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
52
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
57
53
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
58
54
Kind : invalidKind ,
59
55
Group : gatewayGroup ,
@@ -63,7 +59,7 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
63
59
{
64
60
name : "Validate TCPRoute TargetRef Kind is not allowed" ,
65
61
wantErrors : []string {expectedTargetRefKindError },
66
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
62
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
67
63
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
68
64
Kind : tcpRouteKind ,
69
65
Group : gatewayGroup ,
@@ -75,35 +71,32 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
75
71
for _ , tt := range tests {
76
72
t .Run (tt .name , func (t * testing.T ) {
77
73
t .Parallel ()
78
- policySpec := tt .policySpec
79
- policySpec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
74
+ spec := tt .spec
75
+ spec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
80
76
clientSettingsPolicy := & ngfAPIv1alpha1.ClientSettingsPolicy {
81
77
ObjectMeta : controllerruntime.ObjectMeta {
82
- Name : uniqueResourceName (testPolicyName ),
78
+ Name : uniqueResourceName (testResourceName ),
83
79
Namespace : defaultNamespace ,
84
80
},
85
- Spec : policySpec ,
81
+ Spec : spec ,
86
82
}
87
- validateCrd (t , tt .wantErrors , g , clientSettingsPolicy , k8sClient )
83
+ validateCrd (t , tt .wantErrors , clientSettingsPolicy , k8sClient )
88
84
})
89
85
}
90
86
}
91
87
92
88
func TestClientSettingsPoliciesTargetRefGroup (t * testing.T ) {
93
89
t .Parallel ()
94
- g := NewWithT (t )
95
-
96
- k8sClient , err := getKubernetesClient (t )
97
- g .Expect (err ).ToNot (HaveOccurred ())
90
+ k8sClient := getKubernetesClient (t )
98
91
99
92
tests := []struct {
100
- policySpec ngfAPIv1alpha1.ClientSettingsPolicySpec
93
+ spec ngfAPIv1alpha1.ClientSettingsPolicySpec
101
94
name string
102
95
wantErrors []string
103
96
}{
104
97
{
105
98
name : "Validate gateway.networking.k8s.io TargetRef Group is allowed" ,
106
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
99
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
107
100
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
108
101
Kind : gatewayKind ,
109
102
Group : gatewayGroup ,
@@ -113,7 +106,7 @@ func TestClientSettingsPoliciesTargetRefGroup(t *testing.T) {
113
106
{
114
107
name : "Validate invalid.networking.k8s.io TargetRef Group is not allowed" ,
115
108
wantErrors : []string {expectedTargetRefGroupError },
116
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
109
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
117
110
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
118
111
Kind : gatewayKind ,
119
112
Group : invalidGroup ,
@@ -123,7 +116,7 @@ func TestClientSettingsPoliciesTargetRefGroup(t *testing.T) {
123
116
{
124
117
name : "Validate discovery.k8s.io/v1 TargetRef Group is not allowed" ,
125
118
wantErrors : []string {expectedTargetRefGroupError },
126
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
119
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
127
120
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
128
121
Kind : gatewayKind ,
129
122
Group : discoveryGroup ,
@@ -135,35 +128,32 @@ func TestClientSettingsPoliciesTargetRefGroup(t *testing.T) {
135
128
for _ , tt := range tests {
136
129
t .Run (tt .name , func (t * testing.T ) {
137
130
t .Parallel ()
138
- policySpec := tt .policySpec
139
- policySpec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
131
+ spec := tt .spec
132
+ spec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
140
133
clientSettingsPolicy := & ngfAPIv1alpha1.ClientSettingsPolicy {
141
134
ObjectMeta : controllerruntime.ObjectMeta {
142
- Name : uniqueResourceName (testPolicyName ),
135
+ Name : uniqueResourceName (testResourceName ),
143
136
Namespace : defaultNamespace ,
144
137
},
145
- Spec : policySpec ,
138
+ Spec : spec ,
146
139
}
147
- validateCrd (t , tt .wantErrors , g , clientSettingsPolicy , k8sClient )
140
+ validateCrd (t , tt .wantErrors , clientSettingsPolicy , k8sClient )
148
141
})
149
142
}
150
143
}
151
144
152
145
func TestClientSettingsPoliciesKeepAliveTimeout (t * testing.T ) {
153
146
t .Parallel ()
154
- g := NewWithT (t )
155
-
156
- k8sClient , err := getKubernetesClient (t )
157
- g .Expect (err ).ToNot (HaveOccurred ())
147
+ k8sClient := getKubernetesClient (t )
158
148
159
149
tests := []struct {
160
- policySpec ngfAPIv1alpha1.ClientSettingsPolicySpec
150
+ spec ngfAPIv1alpha1.ClientSettingsPolicySpec
161
151
name string
162
152
wantErrors []string
163
153
}{
164
154
{
165
155
name : "Validate KeepAliveTimeout is not set" ,
166
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
156
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
167
157
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
168
158
Kind : gatewayKind ,
169
159
Group : gatewayGroup ,
@@ -173,7 +163,7 @@ func TestClientSettingsPoliciesKeepAliveTimeout(t *testing.T) {
173
163
},
174
164
{
175
165
name : "Validate KeepAlive is set" ,
176
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
166
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
177
167
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
178
168
Kind : gatewayKind ,
179
169
Group : gatewayGroup ,
@@ -189,7 +179,7 @@ func TestClientSettingsPoliciesKeepAliveTimeout(t *testing.T) {
189
179
{
190
180
name : "Validate Header cannot be set without Server" ,
191
181
wantErrors : []string {expectedHeaderWithoutServerError },
192
- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
182
+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
193
183
TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
194
184
Kind : gatewayKind ,
195
185
Group : gatewayGroup ,
@@ -206,16 +196,16 @@ func TestClientSettingsPoliciesKeepAliveTimeout(t *testing.T) {
206
196
for _ , tt := range tests {
207
197
t .Run (tt .name , func (t * testing.T ) {
208
198
t .Parallel ()
209
- policySpec := tt .policySpec
210
- policySpec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
199
+ spec := tt .spec
200
+ spec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
211
201
clientSettingsPolicy := & ngfAPIv1alpha1.ClientSettingsPolicy {
212
202
ObjectMeta : controllerruntime.ObjectMeta {
213
- Name : uniqueResourceName (testPolicyName ),
203
+ Name : uniqueResourceName (testResourceName ),
214
204
Namespace : defaultNamespace ,
215
205
},
216
- Spec : policySpec ,
206
+ Spec : spec ,
217
207
}
218
- validateCrd (t , tt .wantErrors , g , clientSettingsPolicy , k8sClient )
208
+ validateCrd (t , tt .wantErrors , clientSettingsPolicy , k8sClient )
219
209
})
220
210
}
221
211
}
0 commit comments