mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-30 23:15:14 +00:00
fix: enable and fixes rules from testifylint on test package
Signed-off-by: Matthieu MOREL <matthieu.morel35@gmail.com>
This commit is contained in:
parent
fa75b4371d
commit
7bccbaf996
@ -39,9 +39,6 @@ import (
|
||||
admissionapi "k8s.io/pod-security-admission/api"
|
||||
|
||||
"github.com/onsi/ginkgo/v2"
|
||||
|
||||
// ensure libs have a chance to initialize
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
var _ = SIGDescribe("ServerSideApply", func() {
|
||||
|
@ -44,9 +44,6 @@ import (
|
||||
|
||||
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
|
||||
"k8s.io/apiextensions-apiserver/test/integration"
|
||||
|
||||
// ensure libs have a chance to initialize
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
const (
|
||||
|
@ -17,14 +17,12 @@ limitations under the License.
|
||||
package apimachinery
|
||||
|
||||
import (
|
||||
// ensure libs have a chance to initialize
|
||||
"context"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"strings"
|
||||
|
||||
"github.com/onsi/ginkgo/v2"
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
|
||||
apiextensionclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
|
||||
"k8s.io/apiextensions-apiserver/test/integration/fixtures"
|
||||
|
@ -42,9 +42,6 @@ import (
|
||||
samplev1beta1 "k8s.io/sample-apiserver/pkg/apis/wardle/v1beta1"
|
||||
|
||||
"k8s.io/kubernetes/test/e2e/framework"
|
||||
|
||||
// ensure libs have a chance to initialize
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
var _ = SIGDescribe("OpenAPIV3", func() {
|
||||
|
@ -52,9 +52,6 @@ import (
|
||||
|
||||
"github.com/onsi/ginkgo/v2"
|
||||
"github.com/onsi/gomega"
|
||||
|
||||
// ensure libs have a chance to initialize
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
const (
|
||||
|
@ -44,7 +44,7 @@ func TestNewGomega(t *testing.T) {
|
||||
t.Errorf("unexpected failure: %s", err.Error())
|
||||
}
|
||||
err := Gomega().Expect("hello").ToNot(gomega.Equal("hello"))
|
||||
require.NotNil(t, err)
|
||||
require.Error(t, err)
|
||||
assert.Equal(t, `Expected
|
||||
<string>: hello
|
||||
not to equal
|
||||
|
@ -27,7 +27,7 @@ import (
|
||||
)
|
||||
|
||||
func TestBugs(t *testing.T) {
|
||||
assert.NoError(t, framework.FormatBugs())
|
||||
require.NoError(t, framework.FormatBugs())
|
||||
RecordBugs()
|
||||
Describe()
|
||||
|
||||
|
@ -20,6 +20,7 @@ import (
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
v1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/utils/pointer"
|
||||
@ -65,7 +66,7 @@ func TestMixinRestrictedPodSecurity(t *testing.T) {
|
||||
for _, pod := range restrictablePods {
|
||||
t.Run(pod.Name, func(t *testing.T) {
|
||||
p := pod // closure
|
||||
assert.NoError(t, MixinRestrictedPodSecurity(&p))
|
||||
require.NoError(t, MixinRestrictedPodSecurity(&p))
|
||||
assert.Equal(t, GetRestrictedPodSecurityContext(), p.Spec.SecurityContext,
|
||||
"Mixed in PodSecurityContext should equal the from-scratch PodSecurityContext")
|
||||
assert.Equal(t, GetRestrictedContainerSecurityContext(), p.Spec.Containers[0].SecurityContext,
|
||||
|
@ -21,6 +21,7 @@ import (
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
)
|
||||
|
||||
var (
|
||||
@ -49,13 +50,13 @@ func TestEmbeddedFileSource(t *testing.T) {
|
||||
// read a file which exists and compare the contents
|
||||
b, err := s.ReadTestFile(fooPath)
|
||||
|
||||
assert.NoError(t, err)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, fooContents, string(b))
|
||||
|
||||
// read a non-existent file and ensure that the returned value is empty and error is nil
|
||||
// Note: this is done so that the next file source can be tried by the caller
|
||||
b, err = s.ReadTestFile(notExistsPath)
|
||||
assert.NoError(t, err)
|
||||
require.NoError(t, err)
|
||||
assert.Empty(t, b)
|
||||
|
||||
// describing the test filesystem should list down all files
|
||||
|
@ -35,8 +35,6 @@ import (
|
||||
admissionapi "k8s.io/pod-security-admission/api"
|
||||
|
||||
"github.com/onsi/ginkgo/v2"
|
||||
// ensure libs have a chance to initialize
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
const (
|
||||
|
@ -48,9 +48,6 @@ import (
|
||||
|
||||
"github.com/onsi/ginkgo/v2"
|
||||
"github.com/onsi/gomega"
|
||||
|
||||
// ensure libs have a chance to initialize
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
const (
|
||||
|
@ -48,9 +48,6 @@ import (
|
||||
|
||||
"github.com/onsi/ginkgo/v2"
|
||||
"github.com/onsi/gomega"
|
||||
|
||||
// ensure libs have a chance to initialize
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
type priorityPair struct {
|
||||
|
@ -26,9 +26,6 @@ import (
|
||||
"github.com/onsi/ginkgo/v2"
|
||||
"github.com/onsi/gomega"
|
||||
|
||||
// ensure libs have a chance to initialize
|
||||
_ "github.com/stretchr/testify/assert"
|
||||
|
||||
v1 "k8s.io/api/core/v1"
|
||||
"k8s.io/apimachinery/pkg/api/resource"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
|
3
test/e2e/storage/external/external_test.go
vendored
3
test/e2e/storage/external/external_test.go
vendored
@ -20,6 +20,7 @@ import (
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
|
||||
"k8s.io/apimachinery/pkg/util/sets"
|
||||
e2evolume "k8s.io/kubernetes/test/e2e/framework/volume"
|
||||
@ -68,7 +69,7 @@ func TestDriverParameter(t *testing.T) {
|
||||
for _, testcase := range testcases {
|
||||
actual, err := loadDriverDefinition(testcase.filename)
|
||||
if testcase.err == "" {
|
||||
assert.NoError(t, err, testcase.name)
|
||||
require.NoError(t, err, testcase.name)
|
||||
} else {
|
||||
if assert.Error(t, err, testcase.name) {
|
||||
assert.Equal(t, testcase.err, err.Error())
|
||||
|
@ -260,7 +260,7 @@ jwt:
|
||||
configureClient: configureClientFetchingOIDCCredentials,
|
||||
assertErrFn: func(t *testing.T, errorToCheck error) {
|
||||
expectedError := new(apierrors.StatusError)
|
||||
assert.ErrorAs(t, errorToCheck, &expectedError)
|
||||
require.ErrorAs(t, errorToCheck, &expectedError)
|
||||
assert.Equal(
|
||||
t,
|
||||
`pods is forbidden: User "system:anonymous" cannot list resource "pods" in API group "" in the namespace "default"`,
|
||||
@ -552,7 +552,7 @@ func TestUpdatingRefreshTokenInCaseOfExpiredIDToken(t *testing.T) {
|
||||
|
||||
ctx := testContext(t)
|
||||
_, err = expiredClient.CoreV1().Pods(defaultNamespace).List(ctx, metav1.ListOptions{})
|
||||
assert.Error(t, err)
|
||||
require.Error(t, err)
|
||||
|
||||
tt.configureUpdatingTokenBehaviour(t, oidcServer, signingPrivateKey)
|
||||
idToken, stubRefreshToken := fetchOIDCCredentials(t, tokenURL, caCert)
|
||||
|
@ -788,9 +788,9 @@ func testAPIGroupList(ctx context.Context, t *testing.T, client rest.Interface)
|
||||
if err != nil {
|
||||
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis", err)
|
||||
}
|
||||
assert.Equal(t, 1, len(apiGroupList.Groups))
|
||||
assert.Len(t, apiGroupList.Groups, 1)
|
||||
assert.Equal(t, wardlev1alpha1.GroupName, apiGroupList.Groups[0].Name)
|
||||
assert.Equal(t, 2, len(apiGroupList.Groups[0].Versions))
|
||||
assert.Len(t, apiGroupList.Groups[0].Versions, 2)
|
||||
|
||||
v1alpha1 := metav1.GroupVersionForDiscovery{
|
||||
GroupVersion: wardlev1alpha1.SchemeGroupVersion.String(),
|
||||
@ -818,7 +818,7 @@ func testAPIGroup(ctx context.Context, t *testing.T, client rest.Interface) {
|
||||
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis/wardle.example.com", err)
|
||||
}
|
||||
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.Group, apiGroup.Name)
|
||||
assert.Equal(t, 2, len(apiGroup.Versions))
|
||||
assert.Len(t, apiGroup.Versions, 2)
|
||||
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.String(), apiGroup.Versions[1].GroupVersion)
|
||||
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.Version, apiGroup.Versions[1].Version)
|
||||
assert.Equal(t, apiGroup.PreferredVersion, apiGroup.Versions[0])
|
||||
@ -836,7 +836,7 @@ func testAPIResourceList(ctx context.Context, t *testing.T, client rest.Interfac
|
||||
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis/wardle.example.com/v1alpha1", err)
|
||||
}
|
||||
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.String(), apiResourceList.GroupVersion)
|
||||
assert.Equal(t, 2, len(apiResourceList.APIResources))
|
||||
assert.Len(t, apiResourceList.APIResources, 2)
|
||||
assert.Equal(t, "fischers", apiResourceList.APIResources[0].Name)
|
||||
assert.False(t, apiResourceList.APIResources[0].Namespaced)
|
||||
assert.Equal(t, "flunders", apiResourceList.APIResources[1].Name)
|
||||
|
@ -108,7 +108,7 @@ second error`,
|
||||
assert.Equal(t, !tc.expectNoFail, tCtx.Failed(), "Failed()")
|
||||
if tc.expectError == "" {
|
||||
assert.NoError(t, err)
|
||||
} else if assert.NotNil(t, err) {
|
||||
} else if assert.Error(t, err) {
|
||||
assert.Equal(t, tc.expectError, err.Error())
|
||||
}
|
||||
})
|
||||
|
@ -56,11 +56,11 @@ func (tc testcase) run(t *testing.T) {
|
||||
}
|
||||
|
||||
duration := time.Since(start)
|
||||
assert.InDelta(t, tc.expectDuration.Seconds(), duration.Seconds(), 0.1, fmt.Sprintf("callback invocation duration %s", duration))
|
||||
assert.InDelta(t, tc.expectDuration.Seconds(), duration.Seconds(), 0.1, "callback invocation duration %s", duration)
|
||||
assert.Equal(t, !tc.expectNoFail, tCtx.Failed(), "Failed()")
|
||||
if tc.expectError == "" {
|
||||
assert.NoError(t, err)
|
||||
} else if assert.NotNil(t, err) {
|
||||
} else if assert.Error(t, err) {
|
||||
t.Logf("Result:\n%s", err.Error())
|
||||
assert.Equal(t, tc.expectError, normalize(err.Error()))
|
||||
}
|
||||
|
@ -74,7 +74,7 @@ step: Errorf a b 42`,
|
||||
tCtx.Log(buffer.String())
|
||||
|
||||
noSuchValue := tCtx.Value("some other key")
|
||||
assert.Equal(tCtx, nil, noSuchValue, "value for unknown context value key")
|
||||
assert.Nil(tCtx, noSuchValue, "value for unknown context value key")
|
||||
},
|
||||
expectLog: `<klog header>: step: You requested a progress report.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user