@@ -57,10 +57,14 @@ func TestTunnelingHandler_UpgradeStreamingAndTunneling(t *testing.T) {
57
57
defer close (stopServerChan )
58
58
spdyServer := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , req * http.Request ) {
59
59
_ , err := httpstream .Handshake (req , w , []string {constants .PortForwardV1Name })
60
- require .NoError (t , err )
60
+ if err != nil {
61
+ t .Errorf ("unexpected error %v" , err )
62
+ }
61
63
upgrader := spdy .NewResponseUpgrader ()
62
64
conn := upgrader .UpgradeResponse (w , req , justQueueStream (streamChan ))
63
- require .NotNil (t , conn )
65
+ if conn == nil {
66
+ t .Error ("connect is unexpected nil" )
67
+ }
64
68
defer conn .Close () //nolint:errcheck
65
69
<- stopServerChan
66
70
}))
@@ -97,9 +101,13 @@ func TestTunnelingHandler_UpgradeStreamingAndTunneling(t *testing.T) {
97
101
var actual []byte
98
102
go func () {
99
103
clientStream , err := spdyClient .CreateStream (http.Header {})
100
- require .NoError (t , err )
104
+ if err != nil {
105
+ t .Errorf ("unexpected error %v" , err )
106
+ }
101
107
_ , err = io .Copy (clientStream , bytes .NewReader (randomData ))
102
- require .NoError (t , err )
108
+ if err != nil {
109
+ t .Errorf ("unexpected error %v" , err )
110
+ }
103
111
clientStream .Close () //nolint:errcheck
104
112
}()
105
113
select {
@@ -169,7 +177,9 @@ func TestTunnelingHandler_BadHandshakeError(t *testing.T) {
169
177
spdyServer := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , req * http.Request ) {
170
178
// Handshake fails.
171
179
_ , err := httpstream .Handshake (req , w , []string {constants .PortForwardV1Name })
172
- require .Error (t , err , "handshake should have returned an error" )
180
+ if err == nil {
181
+ t .Errorf ("handshake should have returned an error %v" , err )
182
+ }
173
183
assert .ErrorContains (t , err , "unable to negotiate protocol" )
174
184
w .WriteHeader (http .StatusForbidden )
175
185
}))
@@ -223,7 +233,9 @@ func TestTunnelingHandler_UpstreamSPDYServerErrorPropagated(t *testing.T) {
223
233
// Create fake upstream SPDY server, which returns a 500-level error.
224
234
spdyServer := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , req * http.Request ) {
225
235
_ , err := httpstream .Handshake (req , w , []string {constants .PortForwardV1Name })
226
- require .NoError (t , err , "handshake should have succeeded" )
236
+ if err != nil {
237
+ t .Errorf ("handshake should have succeeded %v" , err )
238
+ }
227
239
// Returned status code should be incremented in metrics.
228
240
w .WriteHeader (statusCode )
229
241
}))
0 commit comments