This is an automated email from the ASF dual-hosted git repository.
zhangjintao pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix-ingress-controller.git
The following commit(s) were added to refs/heads/master by this push:
new 915a5d1 test: add assert for test cases (#613)
915a5d1 is described below
commit 915a5d1d99d68f9c08b4d59e9b2e9cb8fa0dde31
Author: okaybase <[email protected]>
AuthorDate: Wed Aug 4 14:51:00 2021 +0800
test: add assert for test cases (#613)
Co-authored-by: lixingwang <[email protected]>
---
pkg/apisix/resource_test.go | 2 ++
pkg/config/config_test.go | 2 ++
pkg/kube/translation/apisix_route_test.go | 1 +
pkg/kube/translation/ingress_test.go | 10 +++++-----
pkg/kube/translation/plugin_test.go | 5 +++++
test/e2e/ingress/resourcepushing.go | 2 +-
test/e2e/scaffold/httpbin.go | 5 +----
7 files changed, 17 insertions(+), 10 deletions(-)
diff --git a/pkg/apisix/resource_test.go b/pkg/apisix/resource_test.go
index 4443adc..6723727 100644
--- a/pkg/apisix/resource_test.go
+++ b/pkg/apisix/resource_test.go
@@ -40,6 +40,7 @@ func TestItemUnmarshalJSON(t *testing.T) {
}
`
err = json.Unmarshal([]byte(emptyData), &items)
+ assert.NotNil(t, err)
assert.Equal(t, err.Error(), "unexpected non-empty object")
emptyArray := `
@@ -84,6 +85,7 @@ func TestRouteVarsUnmarshalJSONCompatibility(t *testing.T) {
data = `{"vars":{"a":"b"}}`
err = json.Unmarshal([]byte(data), &route)
+ assert.NotNil(t, err)
assert.Equal(t, err.Error(), "unexpected non-empty object")
data = `{"vars":[]}`
diff --git a/pkg/config/config_test.go b/pkg/config/config_test.go
index 93be369..ad6b535 100644
--- a/pkg/config/config_test.go
+++ b/pkg/config/config_test.go
@@ -136,6 +136,7 @@ func TestConfigInvalidation(t *testing.T) {
newCfg, err := NewConfigFromFile(tmpYAML.Name())
assert.Nil(t, err, "failed to new config from file: ", err)
err = newCfg.Validate()
+ assert.NotNil(t, err)
assert.Equal(t, err.Error(), "apisix base url is required", "bad error:
", err)
yamlData = `
@@ -155,5 +156,6 @@ apisix:
newCfg, err = NewConfigFromFile(tmpYAML.Name())
assert.Nil(t, err, "failed to new config from file: ", err)
err = newCfg.Validate()
+ assert.NotNil(t, err)
assert.Equal(t, err.Error(), "controller resync interval too small",
"bad error: ", err)
}
diff --git a/pkg/kube/translation/apisix_route_test.go
b/pkg/kube/translation/apisix_route_test.go
index 0615838..424b412 100644
--- a/pkg/kube/translation/apisix_route_test.go
+++ b/pkg/kube/translation/apisix_route_test.go
@@ -320,6 +320,7 @@ func TestTranslateApisixRouteV2alpha1WithDuplicatedName(t
*testing.T) {
}
_, err = tr.TranslateRouteV2alpha1(ar)
+ assert.NotNil(t, err)
assert.Equal(t, err.Error(), "duplicated route rule name")
}
diff --git a/pkg/kube/translation/ingress_test.go
b/pkg/kube/translation/ingress_test.go
index 6c33749..57d119b 100644
--- a/pkg/kube/translation/ingress_test.go
+++ b/pkg/kube/translation/ingress_test.go
@@ -118,9 +118,9 @@ func TestTranslateIngressV1NoBackend(t *testing.T) {
}
tr := &translator{}
ctx, err := tr.translateIngressV1(ing)
+ assert.Nil(t, err)
assert.Len(t, ctx.Routes, 1)
assert.Len(t, ctx.Upstreams, 0)
- assert.Nil(t, err)
assert.Equal(t, ctx.Routes[0].UpstreamId, "")
assert.Equal(t, ctx.Routes[0].Uris, []string{"/foo", "/foo/*"})
}
@@ -285,9 +285,9 @@ func TestTranslateIngressV1(t *testing.T) {
<-processCh
<-processCh
ctx, err := tr.translateIngressV1(ing)
+ assert.Nil(t, err)
assert.Len(t, ctx.Routes, 2)
assert.Len(t, ctx.Upstreams, 2)
- assert.Nil(t, err)
assert.Equal(t, ctx.Routes[0].Uris, []string{"/foo", "/foo/*"})
assert.Equal(t, ctx.Routes[0].UpstreamId, ctx.Upstreams[0].ID)
@@ -341,9 +341,9 @@ func TestTranslateIngressV1beta1NoBackend(t *testing.T) {
}
tr := &translator{}
ctx, err := tr.translateIngressV1beta1(ing)
+ assert.Nil(t, err)
assert.Len(t, ctx.Routes, 1)
assert.Len(t, ctx.Upstreams, 0)
- assert.Nil(t, err)
assert.Equal(t, ctx.Routes[0].UpstreamId, "")
assert.Equal(t, ctx.Routes[0].Uris, []string{"/foo", "/foo/*"})
}
@@ -505,9 +505,9 @@ func TestTranslateIngressV1beta1(t *testing.T) {
<-processCh
<-processCh
ctx, err := tr.translateIngressV1beta1(ing)
+ assert.Nil(t, err)
assert.Len(t, ctx.Routes, 2)
assert.Len(t, ctx.Upstreams, 2)
- assert.Nil(t, err)
assert.Equal(t, ctx.Routes[0].Uris, []string{"/foo", "/foo/*"})
assert.Equal(t, ctx.Routes[0].UpstreamId, ctx.Upstreams[0].ID)
@@ -617,9 +617,9 @@ func TestTranslateIngressExtensionsV1beta1(t *testing.T) {
<-processCh
<-processCh
ctx, err := tr.translateIngressExtensionsV1beta1(ing)
+ assert.Nil(t, err)
assert.Len(t, ctx.Routes, 2)
assert.Len(t, ctx.Upstreams, 2)
- assert.Nil(t, err)
assert.Equal(t, ctx.Routes[0].Uris, []string{"/foo", "/foo/*"})
assert.Equal(t, ctx.Routes[0].UpstreamId, ctx.Upstreams[0].ID)
diff --git a/pkg/kube/translation/plugin_test.go
b/pkg/kube/translation/plugin_test.go
index 0072da6..2cfa206 100644
--- a/pkg/kube/translation/plugin_test.go
+++ b/pkg/kube/translation/plugin_test.go
@@ -514,6 +514,7 @@ func TestTranslateTrafficSplitPluginBadCases(t *testing.T) {
cfg, err := tr.translateTrafficSplitPlugin(ctx, ar1.Namespace, 30,
backends)
assert.Nil(t, cfg)
assert.Len(t, ctx.Upstreams, 0)
+ assert.NotNil(t, err)
assert.Equal(t, err.Error(), "service \"svc-2\" not found")
backends[0].ServiceName = "svc-1"
@@ -521,6 +522,7 @@ func TestTranslateTrafficSplitPluginBadCases(t *testing.T) {
ctx = &TranslateContext{upstreamMap: make(map[string]struct{})}
cfg, err = tr.translateTrafficSplitPlugin(ctx, ar1.Namespace, 30,
backends)
assert.Nil(t, cfg)
+ assert.NotNil(t, err)
assert.Equal(t, err.Error(), "service.spec.ports: port not defined")
backends[1].ServicePort.StrVal = "port2"
@@ -528,6 +530,7 @@ func TestTranslateTrafficSplitPluginBadCases(t *testing.T) {
ctx = &TranslateContext{upstreamMap: make(map[string]struct{})}
cfg, err = tr.translateTrafficSplitPlugin(ctx, ar1.Namespace, 30,
backends)
assert.Nil(t, cfg)
+ assert.NotNil(t, err)
assert.Equal(t, err.Error(), "conflict headless service and backend
resolve granularity")
}
@@ -584,6 +587,7 @@ func TestTranslateConsumerKeyAuthWithSecretRef(t
*testing.T) {
cfg, err = tr.translateConsumerKeyAuthPlugin("default2", keyAuth)
assert.Nil(t, cfg)
+ assert.NotNil(t, err)
assert.Contains(t, err.Error(), "not found")
delete(sec.Data, "key")
@@ -658,6 +662,7 @@ func TestTranslateConsumerBasicAuthWithSecretRef(t
*testing.T) {
cfg, err = tr.translateConsumerBasicAuthPlugin("default2", basicAuth)
assert.Nil(t, cfg)
+ assert.NotNil(t, err)
assert.Contains(t, err.Error(), "not found")
delete(sec.Data, "password")
diff --git a/test/e2e/ingress/resourcepushing.go
b/test/e2e/ingress/resourcepushing.go
index 555b2f8..0dbc891 100644
--- a/test/e2e/ingress/resourcepushing.go
+++ b/test/e2e/ingress/resourcepushing.go
@@ -216,7 +216,7 @@ spec:
s.NewAPISIXClient().GET("/ip").WithHeader("Host",
"httpbin.com").Expect().Status(http.StatusNotFound)
s.NewAPISIXClient().GET("/ip").WithHeader("Host",
"httpbin.com").WithHeader("X-Foo", "barbaz").Expect().Status(http.StatusOK)
// remove k8s service first
- s.DeleteHTTPBINService()
+ assert.Nil(ginkgo.GinkgoT(), s.DeleteHTTPBINService())
// remove
assert.Nil(ginkgo.GinkgoT(),
s.RemoveResourceByString(apisixRoute))
// TODO When ingress controller can feedback the lifecycle of
CRDs to the
diff --git a/test/e2e/scaffold/httpbin.go b/test/e2e/scaffold/httpbin.go
index 0850a9c..eb15bb1 100644
--- a/test/e2e/scaffold/httpbin.go
+++ b/test/e2e/scaffold/httpbin.go
@@ -118,10 +118,7 @@ func (s *Scaffold) ScaleHTTPBIN(desired int) error {
// DeleteHTTPBINService deletes the HTTPBIN service object.
func (s *Scaffold) DeleteHTTPBINService() error {
- if err := k8s.KubectlDeleteFromStringE(s.t, s.kubectlOptions,
_httpService); err != nil {
- return err
- }
- return nil
+ return k8s.KubectlDeleteFromStringE(s.t, s.kubectlOptions, _httpService)
}
// WaitAllHTTPBINPodsAvailable waits until all httpbin pods ready.