Skip to content

Commit a6039c4

Browse files
author
Kenichi Omichi
committed
Use framework.ExpectNoError() for e2e/auth
The e2e test framework has ExpectNoError() for readable test code. This replaces Expect(err).NotTo(HaveOccurred()) with it for e2e/auth.
1 parent e0a1913 commit a6039c4

File tree

3 files changed

+13
-14
lines changed

3 files changed

+13
-14
lines changed

test/e2e/auth/metadata_concealment.go

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ import (
2424
jobutil "k8s.io/kubernetes/test/e2e/framework/job"
2525

2626
. "github.com/onsi/ginkgo"
27-
. "github.com/onsi/gomega"
2827
imageutil "k8s.io/kubernetes/test/utils/image"
2928
)
3029

@@ -56,10 +55,10 @@ var _ = SIGDescribe("Metadata Concealment", func() {
5655
},
5756
}
5857
job, err := jobutil.CreateJob(f.ClientSet, f.Namespace.Name, job)
59-
Expect(err).NotTo(HaveOccurred(), "failed to create job (%s:%s)", f.Namespace.Name, job.Name)
58+
framework.ExpectNoError(err, "failed to create job (%s:%s)", f.Namespace.Name, job.Name)
6059

6160
By("Ensuring job reaches completions")
6261
err = jobutil.WaitForJobComplete(f.ClientSet, f.Namespace.Name, job.Name, int32(1))
63-
Expect(err).NotTo(HaveOccurred(), "failed to ensure job completion (%s:%s)", f.Namespace.Name, job.Name)
62+
framework.ExpectNoError(err, "failed to ensure job completion (%s:%s)", f.Namespace.Name, job.Name)
6463
})
6564
})

test/e2e/auth/node_authn.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
3838
ns = f.Namespace.Name
3939

4040
nodeList, err := f.ClientSet.CoreV1().Nodes().List(metav1.ListOptions{})
41-
Expect(err).NotTo(HaveOccurred(), "failed to list nodes in namespace: %s", ns)
41+
framework.ExpectNoError(err, "failed to list nodes in namespace: %s", ns)
4242
Expect(len(nodeList.Items)).NotTo(BeZero())
4343

4444
pickedNode := nodeList.Items[0]
@@ -49,7 +49,7 @@ var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
4949
// make sure ServiceAccount admission controller is enabled, so secret generation on SA creation works
5050
saName := "default"
5151
sa, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Get(saName, metav1.GetOptions{})
52-
Expect(err).NotTo(HaveOccurred(), "failed to retrieve service account (%s:%s)", ns, saName)
52+
framework.ExpectNoError(err, "failed to retrieve service account (%s:%s)", ns, saName)
5353
Expect(len(sa.Secrets)).NotTo(BeZero())
5454
})
5555

@@ -73,7 +73,7 @@ var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
7373
AutomountServiceAccountToken: &trueValue,
7474
}
7575
_, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Create(newSA)
76-
Expect(err).NotTo(HaveOccurred(), "failed to create service account (%s:%s)", ns, newSA.Name)
76+
framework.ExpectNoError(err, "failed to create service account (%s:%s)", ns, newSA.Name)
7777

7878
pod := createNodeAuthTestPod(f)
7979

test/e2e/auth/node_authz.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -51,24 +51,24 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
5151
ns = f.Namespace.Name
5252

5353
nodeList, err := f.ClientSet.CoreV1().Nodes().List(metav1.ListOptions{})
54-
Expect(err).NotTo(HaveOccurred(), "failed to list nodes in namespace: %s", ns)
54+
framework.ExpectNoError(err, "failed to list nodes in namespace: %s", ns)
5555
Expect(len(nodeList.Items)).NotTo(Equal(0))
5656
nodeName = nodeList.Items[0].Name
5757
asUser = NodeNamePrefix + nodeName
5858
saName := "default"
5959
sa, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Get(saName, metav1.GetOptions{})
6060
Expect(len(sa.Secrets)).NotTo(Equal(0))
61-
Expect(err).NotTo(HaveOccurred(), "failed to retrieve service account (%s:%s)", ns, saName)
61+
framework.ExpectNoError(err, "failed to retrieve service account (%s:%s)", ns, saName)
6262
defaultSaSecret = sa.Secrets[0].Name
6363
By("Creating a kubernetes client that impersonates a node")
6464
config, err := framework.LoadConfig()
65-
Expect(err).NotTo(HaveOccurred(), "failed to load kubernetes client config")
65+
framework.ExpectNoError(err, "failed to load kubernetes client config")
6666
config.Impersonate = restclient.ImpersonationConfig{
6767
UserName: asUser,
6868
Groups: []string{NodesGroup},
6969
}
7070
c, err = clientset.NewForConfig(config)
71-
Expect(err).NotTo(HaveOccurred(), "failed to create Clientset for the given config: %+v", *config)
71+
framework.ExpectNoError(err, "failed to create Clientset for the given config: %+v", *config)
7272

7373
})
7474
It("Getting a non-existent secret should exit with the Forbidden error, not a NotFound error", func() {
@@ -98,7 +98,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
9898
},
9999
}
100100
_, err := f.ClientSet.CoreV1().ConfigMaps(ns).Create(configmap)
101-
Expect(err).NotTo(HaveOccurred(), "failed to create configmap (%s:%s) %+v", ns, configmap.Name, *configmap)
101+
framework.ExpectNoError(err, "failed to create configmap (%s:%s) %+v", ns, configmap.Name, *configmap)
102102
_, err = c.CoreV1().ConfigMaps(ns).Get(configmap.Name, metav1.GetOptions{})
103103
Expect(apierrors.IsForbidden(err)).Should(Equal(true))
104104
})
@@ -115,7 +115,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
115115
},
116116
}
117117
_, err := f.ClientSet.CoreV1().Secrets(ns).Create(secret)
118-
Expect(err).NotTo(HaveOccurred(), "failed to create secret (%s:%s)", ns, secret.Name)
118+
framework.ExpectNoError(err, "failed to create secret (%s:%s)", ns, secret.Name)
119119

120120
By("Node should not get the secret")
121121
_, err = c.CoreV1().Secrets(ns).Get(secret.Name, metav1.GetOptions{})
@@ -148,7 +148,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
148148
}
149149

150150
_, err = f.ClientSet.CoreV1().Pods(ns).Create(pod)
151-
Expect(err).NotTo(HaveOccurred(), "failed to create pod (%s:%s)", ns, pod.Name)
151+
framework.ExpectNoError(err, "failed to create pod (%s:%s)", ns, pod.Name)
152152

153153
By("The node should able to access the secret")
154154
itv := framework.Poll
@@ -161,7 +161,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
161161
}
162162
return true, nil
163163
})
164-
Expect(err).NotTo(HaveOccurred(), "failed to get secret after trying every %v for %v (%s:%s)", itv, dur, ns, secret.Name)
164+
framework.ExpectNoError(err, "failed to get secret after trying every %v for %v (%s:%s)", itv, dur, ns, secret.Name)
165165
})
166166

167167
It("A node shouldn't be able to create another node", func() {

0 commit comments

Comments
 (0)