Skip to content

Commit 90561a7

Browse files
committed
Creates a consts for common values in conformance
1 parent 241acbe commit 90561a7

File tree

122 files changed

+511
-473
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

122 files changed

+511
-473
lines changed

conformance/tests/backendtlspolicy-conflict-resolution.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,15 @@ import (
2525
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
2626
h "sigs.k8s.io/gateway-api/conformance/utils/http"
2727
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
28-
"sigs.k8s.io/gateway-api/conformance/utils/suite"
28+
confsuite "sigs.k8s.io/gateway-api/conformance/utils/suite"
2929
"sigs.k8s.io/gateway-api/pkg/features"
3030
)
3131

3232
func init() {
3333
ConformanceTests = append(ConformanceTests, BackendTLSPolicyConflictResolution)
3434
}
3535

36-
var BackendTLSPolicyConflictResolution = suite.ConformanceTest{
36+
var BackendTLSPolicyConflictResolution = confsuite.ConformanceTest{
3737
ShortName: "BackendTLSPolicyConflictResolution",
3838
Description: "Verifies that when multiple BackendTLSPolicies target the same Service, only one policy is accepted while conflicting policies are rejected, and traffic continues to route successfully.",
3939
Features: []features.FeatureName{
@@ -42,8 +42,8 @@ var BackendTLSPolicyConflictResolution = suite.ConformanceTest{
4242
features.SupportBackendTLSPolicy,
4343
},
4444
Manifests: []string{"tests/backendtlspolicy-conflict-resolution.yaml"},
45-
Test: func(t *testing.T, suite *suite.ConformanceTestSuite) {
46-
ns := "gateway-conformance-infra"
45+
Test: func(t *testing.T, suite *confsuite.ConformanceTestSuite) {
46+
ns := confsuite.InfrastructureNamespace
4747
routeNN := types.NamespacedName{Name: "backendtlspolicy-conflict-resolution", Namespace: ns}
4848
gwNN := types.NamespacedName{Name: "same-namespace", Namespace: ns}
4949

conformance/tests/backendtlspolicy-invalid-ca-certificate-ref.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,15 @@ import (
2525
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
2626
h "sigs.k8s.io/gateway-api/conformance/utils/http"
2727
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
28-
"sigs.k8s.io/gateway-api/conformance/utils/suite"
28+
confsuite "sigs.k8s.io/gateway-api/conformance/utils/suite"
2929
"sigs.k8s.io/gateway-api/pkg/features"
3030
)
3131

3232
func init() {
3333
ConformanceTests = append(ConformanceTests, BackendTLSPolicyInvalidCACertificateRef)
3434
}
3535

36-
var BackendTLSPolicyInvalidCACertificateRef = suite.ConformanceTest{
36+
var BackendTLSPolicyInvalidCACertificateRef = confsuite.ConformanceTest{
3737
ShortName: "BackendTLSPolicyInvalidCACertificateRef",
3838
Description: "A BackendTLSPolicy that specifies a single invalid CACertificateRef should have the Accepted and ResolvedRefs status condition set False with appropriate reasons, and HTTP requests to a backend targeted by this policy should fail with a 5xx response.",
3939
Features: []features.FeatureName{
@@ -42,8 +42,8 @@ var BackendTLSPolicyInvalidCACertificateRef = suite.ConformanceTest{
4242
features.SupportBackendTLSPolicy,
4343
},
4444
Manifests: []string{"tests/backendtlspolicy-invalid-ca-certificate-ref.yaml"},
45-
Test: func(t *testing.T, suite *suite.ConformanceTestSuite) {
46-
ns := "gateway-conformance-infra"
45+
Test: func(t *testing.T, suite *confsuite.ConformanceTestSuite) {
46+
ns := confsuite.InfrastructureNamespace
4747
routeNN := types.NamespacedName{Name: "backendtlspolicy-invalid-ca-certificate-ref", Namespace: ns}
4848
gwNN := types.NamespacedName{Name: "same-namespace", Namespace: ns}
4949

conformance/tests/backendtlspolicy-invalid-kind.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,15 @@ import (
2525
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
2626
h "sigs.k8s.io/gateway-api/conformance/utils/http"
2727
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
28-
"sigs.k8s.io/gateway-api/conformance/utils/suite"
28+
confsuite "sigs.k8s.io/gateway-api/conformance/utils/suite"
2929
"sigs.k8s.io/gateway-api/pkg/features"
3030
)
3131

3232
func init() {
3333
ConformanceTests = append(ConformanceTests, BackendTLSPolicyInvalidKind)
3434
}
3535

36-
var BackendTLSPolicyInvalidKind = suite.ConformanceTest{
36+
var BackendTLSPolicyInvalidKind = confsuite.ConformanceTest{
3737
ShortName: "BackendTLSPolicyInvalidKind",
3838
Description: "A BackendTLSPolicy that specifies a single CACertificateRef with an invalid kind should have the Accepted and ResolvedRefs status condition set False with appropriate reasons, and HTTP requests to a backend targeted by this policy should fail with a 5xx response.",
3939
Features: []features.FeatureName{
@@ -42,8 +42,8 @@ var BackendTLSPolicyInvalidKind = suite.ConformanceTest{
4242
features.SupportBackendTLSPolicy,
4343
},
4444
Manifests: []string{"tests/backendtlspolicy-invalid-kind.yaml"},
45-
Test: func(t *testing.T, suite *suite.ConformanceTestSuite) {
46-
ns := "gateway-conformance-infra"
45+
Test: func(t *testing.T, suite *confsuite.ConformanceTestSuite) {
46+
ns := confsuite.InfrastructureNamespace
4747
routeNN := types.NamespacedName{Name: "backendtlspolicy-invalid-kind-test", Namespace: ns}
4848
gwNN := types.NamespacedName{Name: "same-namespace", Namespace: ns}
4949

conformance/tests/backendtlspolicy-observed-generation-bump.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,15 +29,15 @@ import (
2929

3030
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
3131
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
32-
"sigs.k8s.io/gateway-api/conformance/utils/suite"
32+
confsuite "sigs.k8s.io/gateway-api/conformance/utils/suite"
3333
"sigs.k8s.io/gateway-api/pkg/features"
3434
)
3535

3636
func init() {
3737
ConformanceTests = append(ConformanceTests, BackendTLSPolicyObservedGenerationBump)
3838
}
3939

40-
var BackendTLSPolicyObservedGenerationBump = suite.ConformanceTest{
40+
var BackendTLSPolicyObservedGenerationBump = confsuite.ConformanceTest{
4141
ShortName: "BackendTLSPolicyObservedGenerationBump",
4242
Description: "A BackendTLSPolicy in the gateway-conformance-infra namespace should update the observedGeneration in all of its Status.Conditions after an update to the spec",
4343
Features: []features.FeatureName{
@@ -46,16 +46,16 @@ var BackendTLSPolicyObservedGenerationBump = suite.ConformanceTest{
4646
features.SupportBackendTLSPolicy,
4747
},
4848
Manifests: []string{"tests/backendtlspolicy-observed-generation-bump.yaml"},
49-
Test: func(t *testing.T, suite *suite.ConformanceTestSuite) {
50-
ns := "gateway-conformance-infra"
49+
Test: func(t *testing.T, suite *confsuite.ConformanceTestSuite) {
50+
ns := confsuite.InfrastructureNamespace
5151
policyNN := types.NamespacedName{Name: "observed-generation-bump", Namespace: ns}
5252
gwNN := types.NamespacedName{Name: "same-namespace", Namespace: ns}
5353

5454
t.Run("observedGeneration should increment", func(t *testing.T) {
5555
ctx, cancel := context.WithTimeout(context.Background(), suite.TimeoutConfig.LatestObservedGenerationSet)
5656
defer cancel()
5757

58-
namespaces := []string{"gateway-conformance-infra"}
58+
namespaces := []string{confsuite.InfrastructureNamespace}
5959
kubernetes.NamespacesMustBeReady(t, suite.Client, suite.TimeoutConfig, namespaces)
6060

6161
original := &gatewayv1.BackendTLSPolicy{}

conformance/tests/backendtlspolicy-san.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,15 @@ import (
2525
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
2626
h "sigs.k8s.io/gateway-api/conformance/utils/http"
2727
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
28-
"sigs.k8s.io/gateway-api/conformance/utils/suite"
28+
confsuite "sigs.k8s.io/gateway-api/conformance/utils/suite"
2929
"sigs.k8s.io/gateway-api/pkg/features"
3030
)
3131

3232
func init() {
3333
ConformanceTests = append(ConformanceTests, BackendTLSPolicySANValidation)
3434
}
3535

36-
var BackendTLSPolicySANValidation = suite.ConformanceTest{
36+
var BackendTLSPolicySANValidation = confsuite.ConformanceTest{
3737
ShortName: "BackendTLSPolicySANValidation",
3838
Description: "BackendTLSPolicySANValidation extend BackendTLSPolicy with SubjectAltNames validation",
3939
Features: []features.FeatureName{
@@ -43,8 +43,8 @@ var BackendTLSPolicySANValidation = suite.ConformanceTest{
4343
features.SupportBackendTLSPolicySANValidation,
4444
},
4545
Manifests: []string{"tests/backendtlspolicy-san.yaml"},
46-
Test: func(t *testing.T, suite *suite.ConformanceTestSuite) {
47-
ns := "gateway-conformance-infra"
46+
Test: func(t *testing.T, suite *confsuite.ConformanceTestSuite) {
47+
ns := confsuite.InfrastructureNamespace
4848
routeNN := types.NamespacedName{Name: "backendtlspolicy-san-test", Namespace: ns}
4949
gwNN := types.NamespacedName{Name: "same-namespace", Namespace: ns}
5050

conformance/tests/backendtlspolicy.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ import (
2929
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
3030
h "sigs.k8s.io/gateway-api/conformance/utils/http"
3131
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
32-
"sigs.k8s.io/gateway-api/conformance/utils/suite"
32+
confsuite "sigs.k8s.io/gateway-api/conformance/utils/suite"
3333
"sigs.k8s.io/gateway-api/conformance/utils/tls"
3434
"sigs.k8s.io/gateway-api/pkg/features"
3535
)
@@ -38,7 +38,7 @@ func init() {
3838
ConformanceTests = append(ConformanceTests, BackendTLSPolicy)
3939
}
4040

41-
var BackendTLSPolicy = suite.ConformanceTest{
41+
var BackendTLSPolicy = confsuite.ConformanceTest{
4242
ShortName: "BackendTLSPolicy",
4343
Description: "BackendTLSPolicy must be used to configure TLS connection between gateway and backend",
4444
Features: []features.FeatureName{
@@ -47,8 +47,8 @@ var BackendTLSPolicy = suite.ConformanceTest{
4747
features.SupportBackendTLSPolicy,
4848
},
4949
Manifests: []string{"tests/backendtlspolicy.yaml"},
50-
Test: func(t *testing.T, suite *suite.ConformanceTestSuite) {
51-
ns := "gateway-conformance-infra"
50+
Test: func(t *testing.T, suite *confsuite.ConformanceTestSuite) {
51+
ns := confsuite.InfrastructureNamespace
5252

5353
acceptedCond := metav1.Condition{
5454
Type: string(gatewayv1.PolicyConditionAccepted),

conformance/tests/gateway-http-listener-isolation.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,15 @@ import (
2323

2424
"sigs.k8s.io/gateway-api/conformance/utils/http"
2525
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
26-
"sigs.k8s.io/gateway-api/conformance/utils/suite"
26+
confsuite "sigs.k8s.io/gateway-api/conformance/utils/suite"
2727
"sigs.k8s.io/gateway-api/pkg/features"
2828
)
2929

3030
func init() {
3131
ConformanceTests = append(ConformanceTests, GatewayHTTPListenerIsolation)
3232
}
3333

34-
var GatewayHTTPListenerIsolation = suite.ConformanceTest{
34+
var GatewayHTTPListenerIsolation = confsuite.ConformanceTest{
3535
ShortName: "GatewayHTTPListenerIsolation",
3636
Description: "Listener isolation for HTTP listeners with multiple listeners and HTTPRoutes",
3737
Features: []features.FeatureName{
@@ -43,8 +43,8 @@ var GatewayHTTPListenerIsolation = suite.ConformanceTest{
4343
"tests/gateway-http-listener-isolation.yaml",
4444
"tests/gateway-http-listener-isolation-with-hostname-intersection.yaml",
4545
},
46-
Test: func(t *testing.T, suite *suite.ConformanceTestSuite) {
47-
ns := "gateway-conformance-infra"
46+
Test: func(t *testing.T, suite *confsuite.ConformanceTestSuite) {
47+
ns := confsuite.InfrastructureNamespace
4848

4949
kubernetes.NamespacesMustBeReady(t, suite.Client, suite.TimeoutConfig, []string{ns})
5050

conformance/tests/gateway-invalid-default-frontend-client-certificate-validation.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ import (
2727
gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
2828
"sigs.k8s.io/gateway-api/conformance/utils/http"
2929
"sigs.k8s.io/gateway-api/conformance/utils/kubernetes"
30-
"sigs.k8s.io/gateway-api/conformance/utils/suite"
30+
confsuite "sigs.k8s.io/gateway-api/conformance/utils/suite"
3131
"sigs.k8s.io/gateway-api/conformance/utils/tls"
3232
"sigs.k8s.io/gateway-api/pkg/features"
3333
)
@@ -36,7 +36,7 @@ func init() {
3636
ConformanceTests = append(ConformanceTests, GatewayFrontendInvalidDefaultClientCertificateValidation)
3737
}
3838

39-
var GatewayFrontendInvalidDefaultClientCertificateValidation = suite.ConformanceTest{
39+
var GatewayFrontendInvalidDefaultClientCertificateValidation = confsuite.ConformanceTest{
4040
ShortName: "GatewayFrontendInvalidDefaultClientCertificateValidation",
4141
Description: "Invalid Gateway's default Client Certificate Validation Config should only affect HTTPS traffic",
4242
Features: []features.FeatureName{
@@ -45,8 +45,8 @@ var GatewayFrontendInvalidDefaultClientCertificateValidation = suite.Conformance
4545
features.SupportGatewayFrontendClientCertificateValidation,
4646
},
4747
Manifests: []string{"tests/gateway-invalid-default-frontend-client-certificate-validation.yaml"},
48-
Test: func(t *testing.T, suite *suite.ConformanceTestSuite) {
49-
ns := "gateway-conformance-infra"
48+
Test: func(t *testing.T, suite *confsuite.ConformanceTestSuite) {
49+
ns := confsuite.InfrastructureNamespace
5050

5151
gwNN := types.NamespacedName{Name: "invalid-default-client-validation-config", Namespace: ns}
5252

@@ -90,7 +90,7 @@ var GatewayFrontendInvalidDefaultClientCertificateValidation = suite.Conformance
9090
Request: http.Request{Host: "example.org", Path: "/"},
9191
Response: http.Response{StatusCode: 200},
9292
Backend: "infra-backend-v1",
93-
Namespace: "gateway-conformance-infra",
93+
Namespace: confsuite.InfrastructureNamespace,
9494
}
9595
// send request to the first listener and validate that it is passing
9696
http.MakeRequestAndExpectEventuallyConsistentResponse(t, suite.RoundTripper, suite.TimeoutConfig, httpAddr, expectedSuccess)
@@ -119,7 +119,7 @@ var GatewayFrontendInvalidDefaultClientCertificateValidation = suite.Conformance
119119
httpsAddr := gwAddr + ":443"
120120
expectedFailure := http.ExpectedResponse{
121121
Request: http.Request{Host: "example.org", Path: "/"},
122-
Namespace: "gateway-conformance-infra",
122+
Namespace: confsuite.InfrastructureNamespace,
123123
}
124124
// send request to the second listener and validate that it is failing
125125
tls.MakeTLSRequestAndExpectFailureResponse(t, suite.RoundTripper, httpsAddr, serverCertPem, nil, nil, "example.org", expectedFailure)

conformance/tests/gateway-invalid-route-kind.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ var GatewayInvalidRouteKind = suite.ConformanceTest{
4141
Manifests: []string{"tests/gateway-invalid-route-kind.yaml"},
4242
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {
4343
t.Run("Gateway listener should have a false ResolvedRefs condition with reason InvalidRouteKinds and no supportedKinds", func(t *testing.T) {
44-
gwNN := types.NamespacedName{Name: "gateway-only-invalid-route-kind", Namespace: "gateway-conformance-infra"}
44+
gwNN := types.NamespacedName{Name: "gateway-only-invalid-route-kind", Namespace: suite.InfrastructureNamespace}
4545
listeners := []v1.ListenerStatus{{
4646
Name: v1.SectionName("http"),
4747
SupportedKinds: []v1.RouteGroupKind{},
@@ -57,7 +57,7 @@ var GatewayInvalidRouteKind = suite.ConformanceTest{
5757
})
5858

5959
t.Run("Gateway listener should have a false ResolvedRefs condition with reason InvalidRouteKinds and HTTPRoute must be put in the supportedKinds", func(t *testing.T) {
60-
gwNN := types.NamespacedName{Name: "gateway-supported-and-invalid-route-kind", Namespace: "gateway-conformance-infra"}
60+
gwNN := types.NamespacedName{Name: "gateway-supported-and-invalid-route-kind", Namespace: suite.InfrastructureNamespace}
6161
listeners := []v1.ListenerStatus{{
6262
Name: v1.SectionName("http"),
6363
SupportedKinds: []v1.RouteGroupKind{{

conformance/tests/gateway-invalid-tls-backend-configuration.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,27 +50,27 @@ var GatewayInvalidTLSBackendConfiguration = suite.ConformanceTest{
5050
}{
5151
{
5252
name: "Nonexistent secret referenced as ClientCertificateRef in Gateway backend TLS configuration",
53-
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-nonexistent-secret", Namespace: "gateway-conformance-infra"},
53+
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-nonexistent-secret", Namespace: suite.InfrastructureNamespace},
5454
resolveRefsReason: gatewayv1.GatewayReasonInvalidClientCertificateRef,
5555
},
5656
{
5757
name: "Unsupported group resource referenced as ClientCertificateRef in Gateway backend TLS configuration",
58-
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-unsupported-group", Namespace: "gateway-conformance-infra"},
58+
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-unsupported-group", Namespace: suite.InfrastructureNamespace},
5959
resolveRefsReason: gatewayv1.GatewayReasonInvalidClientCertificateRef,
6060
},
6161
{
6262
name: "Unsupported kind resource referenced as ClientCertificateRef inGateway backend TLS configuration",
63-
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-unsupported-kind", Namespace: "gateway-conformance-infra"},
63+
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-unsupported-kind", Namespace: suite.InfrastructureNamespace},
6464
resolveRefsReason: gatewayv1.GatewayReasonInvalidClientCertificateRef,
6565
},
6666
{
6767
name: "Malformed secret referenced as ClientCertificateRef in Gateway backend TLS configuration",
68-
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-malformed-secret", Namespace: "gateway-conformance-infra"},
68+
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-malformed-secret", Namespace: suite.InfrastructureNamespace},
6969
resolveRefsReason: gatewayv1.GatewayReasonInvalidClientCertificateRef,
7070
},
7171
{
7272
name: "Secret referenced from another namespace without any ReferenceGrant as ClientCertificateRef in Gateway backend TLS configuration",
73-
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-missing-reference-grant", Namespace: "gateway-conformance-infra"},
73+
gatewayNamespacedName: types.NamespacedName{Name: "gateway-client-certificate-missing-reference-grant", Namespace: suite.InfrastructureNamespace},
7474
resolveRefsReason: gatewayv1.GatewayReasonRefNotPermitted,
7575
},
7676
}

0 commit comments

Comments
 (0)