mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-03 17:30:00 +00:00
fix: enable and fixes rules from testifylint on test package
Signed-off-by: Matthieu MOREL <matthieu.morel35@gmail.com>
This commit is contained in:
parent
fa75b4371d
commit
7bccbaf996
@ -39,9 +39,6 @@ import (
|
|||||||
admissionapi "k8s.io/pod-security-admission/api"
|
admissionapi "k8s.io/pod-security-admission/api"
|
||||||
|
|
||||||
"github.com/onsi/ginkgo/v2"
|
"github.com/onsi/ginkgo/v2"
|
||||||
|
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = SIGDescribe("ServerSideApply", func() {
|
var _ = SIGDescribe("ServerSideApply", func() {
|
||||||
|
@ -44,9 +44,6 @@ import (
|
|||||||
|
|
||||||
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
|
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
|
||||||
"k8s.io/apiextensions-apiserver/test/integration"
|
"k8s.io/apiextensions-apiserver/test/integration"
|
||||||
|
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -17,14 +17,12 @@ limitations under the License.
|
|||||||
package apimachinery
|
package apimachinery
|
||||||
|
|
||||||
import (
|
import (
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
"context"
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/onsi/ginkgo/v2"
|
"github.com/onsi/ginkgo/v2"
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
|
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
|
||||||
apiextensionclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
|
apiextensionclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
|
||||||
"k8s.io/apiextensions-apiserver/test/integration/fixtures"
|
"k8s.io/apiextensions-apiserver/test/integration/fixtures"
|
||||||
|
@ -42,9 +42,6 @@ import (
|
|||||||
samplev1beta1 "k8s.io/sample-apiserver/pkg/apis/wardle/v1beta1"
|
samplev1beta1 "k8s.io/sample-apiserver/pkg/apis/wardle/v1beta1"
|
||||||
|
|
||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
|
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = SIGDescribe("OpenAPIV3", func() {
|
var _ = SIGDescribe("OpenAPIV3", func() {
|
||||||
|
@ -52,9 +52,6 @@ import (
|
|||||||
|
|
||||||
"github.com/onsi/ginkgo/v2"
|
"github.com/onsi/ginkgo/v2"
|
||||||
"github.com/onsi/gomega"
|
"github.com/onsi/gomega"
|
||||||
|
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -44,7 +44,7 @@ func TestNewGomega(t *testing.T) {
|
|||||||
t.Errorf("unexpected failure: %s", err.Error())
|
t.Errorf("unexpected failure: %s", err.Error())
|
||||||
}
|
}
|
||||||
err := Gomega().Expect("hello").ToNot(gomega.Equal("hello"))
|
err := Gomega().Expect("hello").ToNot(gomega.Equal("hello"))
|
||||||
require.NotNil(t, err)
|
require.Error(t, err)
|
||||||
assert.Equal(t, `Expected
|
assert.Equal(t, `Expected
|
||||||
<string>: hello
|
<string>: hello
|
||||||
not to equal
|
not to equal
|
||||||
|
@ -27,7 +27,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func TestBugs(t *testing.T) {
|
func TestBugs(t *testing.T) {
|
||||||
assert.NoError(t, framework.FormatBugs())
|
require.NoError(t, framework.FormatBugs())
|
||||||
RecordBugs()
|
RecordBugs()
|
||||||
Describe()
|
Describe()
|
||||||
|
|
||||||
|
@ -20,6 +20,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
v1 "k8s.io/api/core/v1"
|
v1 "k8s.io/api/core/v1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/utils/pointer"
|
"k8s.io/utils/pointer"
|
||||||
@ -65,7 +66,7 @@ func TestMixinRestrictedPodSecurity(t *testing.T) {
|
|||||||
for _, pod := range restrictablePods {
|
for _, pod := range restrictablePods {
|
||||||
t.Run(pod.Name, func(t *testing.T) {
|
t.Run(pod.Name, func(t *testing.T) {
|
||||||
p := pod // closure
|
p := pod // closure
|
||||||
assert.NoError(t, MixinRestrictedPodSecurity(&p))
|
require.NoError(t, MixinRestrictedPodSecurity(&p))
|
||||||
assert.Equal(t, GetRestrictedPodSecurityContext(), p.Spec.SecurityContext,
|
assert.Equal(t, GetRestrictedPodSecurityContext(), p.Spec.SecurityContext,
|
||||||
"Mixed in PodSecurityContext should equal the from-scratch PodSecurityContext")
|
"Mixed in PodSecurityContext should equal the from-scratch PodSecurityContext")
|
||||||
assert.Equal(t, GetRestrictedContainerSecurityContext(), p.Spec.Containers[0].SecurityContext,
|
assert.Equal(t, GetRestrictedContainerSecurityContext(), p.Spec.Containers[0].SecurityContext,
|
||||||
|
@ -21,6 +21,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@ -49,13 +50,13 @@ func TestEmbeddedFileSource(t *testing.T) {
|
|||||||
// read a file which exists and compare the contents
|
// read a file which exists and compare the contents
|
||||||
b, err := s.ReadTestFile(fooPath)
|
b, err := s.ReadTestFile(fooPath)
|
||||||
|
|
||||||
assert.NoError(t, err)
|
require.NoError(t, err)
|
||||||
assert.Equal(t, fooContents, string(b))
|
assert.Equal(t, fooContents, string(b))
|
||||||
|
|
||||||
// read a non-existent file and ensure that the returned value is empty and error is nil
|
// read a non-existent file and ensure that the returned value is empty and error is nil
|
||||||
// Note: this is done so that the next file source can be tried by the caller
|
// Note: this is done so that the next file source can be tried by the caller
|
||||||
b, err = s.ReadTestFile(notExistsPath)
|
b, err = s.ReadTestFile(notExistsPath)
|
||||||
assert.NoError(t, err)
|
require.NoError(t, err)
|
||||||
assert.Empty(t, b)
|
assert.Empty(t, b)
|
||||||
|
|
||||||
// describing the test filesystem should list down all files
|
// describing the test filesystem should list down all files
|
||||||
|
@ -35,8 +35,6 @@ import (
|
|||||||
admissionapi "k8s.io/pod-security-admission/api"
|
admissionapi "k8s.io/pod-security-admission/api"
|
||||||
|
|
||||||
"github.com/onsi/ginkgo/v2"
|
"github.com/onsi/ginkgo/v2"
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -48,9 +48,6 @@ import (
|
|||||||
|
|
||||||
"github.com/onsi/ginkgo/v2"
|
"github.com/onsi/ginkgo/v2"
|
||||||
"github.com/onsi/gomega"
|
"github.com/onsi/gomega"
|
||||||
|
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -48,9 +48,6 @@ import (
|
|||||||
|
|
||||||
"github.com/onsi/ginkgo/v2"
|
"github.com/onsi/ginkgo/v2"
|
||||||
"github.com/onsi/gomega"
|
"github.com/onsi/gomega"
|
||||||
|
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type priorityPair struct {
|
type priorityPair struct {
|
||||||
|
@ -26,9 +26,6 @@ import (
|
|||||||
"github.com/onsi/ginkgo/v2"
|
"github.com/onsi/ginkgo/v2"
|
||||||
"github.com/onsi/gomega"
|
"github.com/onsi/gomega"
|
||||||
|
|
||||||
// ensure libs have a chance to initialize
|
|
||||||
_ "github.com/stretchr/testify/assert"
|
|
||||||
|
|
||||||
v1 "k8s.io/api/core/v1"
|
v1 "k8s.io/api/core/v1"
|
||||||
"k8s.io/apimachinery/pkg/api/resource"
|
"k8s.io/apimachinery/pkg/api/resource"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
3
test/e2e/storage/external/external_test.go
vendored
3
test/e2e/storage/external/external_test.go
vendored
@ -20,6 +20,7 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
"k8s.io/apimachinery/pkg/util/sets"
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
e2evolume "k8s.io/kubernetes/test/e2e/framework/volume"
|
e2evolume "k8s.io/kubernetes/test/e2e/framework/volume"
|
||||||
@ -68,7 +69,7 @@ func TestDriverParameter(t *testing.T) {
|
|||||||
for _, testcase := range testcases {
|
for _, testcase := range testcases {
|
||||||
actual, err := loadDriverDefinition(testcase.filename)
|
actual, err := loadDriverDefinition(testcase.filename)
|
||||||
if testcase.err == "" {
|
if testcase.err == "" {
|
||||||
assert.NoError(t, err, testcase.name)
|
require.NoError(t, err, testcase.name)
|
||||||
} else {
|
} else {
|
||||||
if assert.Error(t, err, testcase.name) {
|
if assert.Error(t, err, testcase.name) {
|
||||||
assert.Equal(t, testcase.err, err.Error())
|
assert.Equal(t, testcase.err, err.Error())
|
||||||
|
@ -260,7 +260,7 @@ jwt:
|
|||||||
configureClient: configureClientFetchingOIDCCredentials,
|
configureClient: configureClientFetchingOIDCCredentials,
|
||||||
assertErrFn: func(t *testing.T, errorToCheck error) {
|
assertErrFn: func(t *testing.T, errorToCheck error) {
|
||||||
expectedError := new(apierrors.StatusError)
|
expectedError := new(apierrors.StatusError)
|
||||||
assert.ErrorAs(t, errorToCheck, &expectedError)
|
require.ErrorAs(t, errorToCheck, &expectedError)
|
||||||
assert.Equal(
|
assert.Equal(
|
||||||
t,
|
t,
|
||||||
`pods is forbidden: User "system:anonymous" cannot list resource "pods" in API group "" in the namespace "default"`,
|
`pods is forbidden: User "system:anonymous" cannot list resource "pods" in API group "" in the namespace "default"`,
|
||||||
@ -552,7 +552,7 @@ func TestUpdatingRefreshTokenInCaseOfExpiredIDToken(t *testing.T) {
|
|||||||
|
|
||||||
ctx := testContext(t)
|
ctx := testContext(t)
|
||||||
_, err = expiredClient.CoreV1().Pods(defaultNamespace).List(ctx, metav1.ListOptions{})
|
_, err = expiredClient.CoreV1().Pods(defaultNamespace).List(ctx, metav1.ListOptions{})
|
||||||
assert.Error(t, err)
|
require.Error(t, err)
|
||||||
|
|
||||||
tt.configureUpdatingTokenBehaviour(t, oidcServer, signingPrivateKey)
|
tt.configureUpdatingTokenBehaviour(t, oidcServer, signingPrivateKey)
|
||||||
idToken, stubRefreshToken := fetchOIDCCredentials(t, tokenURL, caCert)
|
idToken, stubRefreshToken := fetchOIDCCredentials(t, tokenURL, caCert)
|
||||||
|
@ -788,9 +788,9 @@ func testAPIGroupList(ctx context.Context, t *testing.T, client rest.Interface)
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis", err)
|
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis", err)
|
||||||
}
|
}
|
||||||
assert.Equal(t, 1, len(apiGroupList.Groups))
|
assert.Len(t, apiGroupList.Groups, 1)
|
||||||
assert.Equal(t, wardlev1alpha1.GroupName, apiGroupList.Groups[0].Name)
|
assert.Equal(t, wardlev1alpha1.GroupName, apiGroupList.Groups[0].Name)
|
||||||
assert.Equal(t, 2, len(apiGroupList.Groups[0].Versions))
|
assert.Len(t, apiGroupList.Groups[0].Versions, 2)
|
||||||
|
|
||||||
v1alpha1 := metav1.GroupVersionForDiscovery{
|
v1alpha1 := metav1.GroupVersionForDiscovery{
|
||||||
GroupVersion: wardlev1alpha1.SchemeGroupVersion.String(),
|
GroupVersion: wardlev1alpha1.SchemeGroupVersion.String(),
|
||||||
@ -818,7 +818,7 @@ func testAPIGroup(ctx context.Context, t *testing.T, client rest.Interface) {
|
|||||||
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis/wardle.example.com", err)
|
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis/wardle.example.com", err)
|
||||||
}
|
}
|
||||||
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.Group, apiGroup.Name)
|
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.Group, apiGroup.Name)
|
||||||
assert.Equal(t, 2, len(apiGroup.Versions))
|
assert.Len(t, apiGroup.Versions, 2)
|
||||||
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.String(), apiGroup.Versions[1].GroupVersion)
|
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.String(), apiGroup.Versions[1].GroupVersion)
|
||||||
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.Version, apiGroup.Versions[1].Version)
|
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.Version, apiGroup.Versions[1].Version)
|
||||||
assert.Equal(t, apiGroup.PreferredVersion, apiGroup.Versions[0])
|
assert.Equal(t, apiGroup.PreferredVersion, apiGroup.Versions[0])
|
||||||
@ -836,7 +836,7 @@ func testAPIResourceList(ctx context.Context, t *testing.T, client rest.Interfac
|
|||||||
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis/wardle.example.com/v1alpha1", err)
|
t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis/wardle.example.com/v1alpha1", err)
|
||||||
}
|
}
|
||||||
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.String(), apiResourceList.GroupVersion)
|
assert.Equal(t, wardlev1alpha1.SchemeGroupVersion.String(), apiResourceList.GroupVersion)
|
||||||
assert.Equal(t, 2, len(apiResourceList.APIResources))
|
assert.Len(t, apiResourceList.APIResources, 2)
|
||||||
assert.Equal(t, "fischers", apiResourceList.APIResources[0].Name)
|
assert.Equal(t, "fischers", apiResourceList.APIResources[0].Name)
|
||||||
assert.False(t, apiResourceList.APIResources[0].Namespaced)
|
assert.False(t, apiResourceList.APIResources[0].Namespaced)
|
||||||
assert.Equal(t, "flunders", apiResourceList.APIResources[1].Name)
|
assert.Equal(t, "flunders", apiResourceList.APIResources[1].Name)
|
||||||
|
@ -108,7 +108,7 @@ second error`,
|
|||||||
assert.Equal(t, !tc.expectNoFail, tCtx.Failed(), "Failed()")
|
assert.Equal(t, !tc.expectNoFail, tCtx.Failed(), "Failed()")
|
||||||
if tc.expectError == "" {
|
if tc.expectError == "" {
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
} else if assert.NotNil(t, err) {
|
} else if assert.Error(t, err) {
|
||||||
assert.Equal(t, tc.expectError, err.Error())
|
assert.Equal(t, tc.expectError, err.Error())
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
@ -56,11 +56,11 @@ func (tc testcase) run(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
duration := time.Since(start)
|
duration := time.Since(start)
|
||||||
assert.InDelta(t, tc.expectDuration.Seconds(), duration.Seconds(), 0.1, fmt.Sprintf("callback invocation duration %s", duration))
|
assert.InDelta(t, tc.expectDuration.Seconds(), duration.Seconds(), 0.1, "callback invocation duration %s", duration)
|
||||||
assert.Equal(t, !tc.expectNoFail, tCtx.Failed(), "Failed()")
|
assert.Equal(t, !tc.expectNoFail, tCtx.Failed(), "Failed()")
|
||||||
if tc.expectError == "" {
|
if tc.expectError == "" {
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
} else if assert.NotNil(t, err) {
|
} else if assert.Error(t, err) {
|
||||||
t.Logf("Result:\n%s", err.Error())
|
t.Logf("Result:\n%s", err.Error())
|
||||||
assert.Equal(t, tc.expectError, normalize(err.Error()))
|
assert.Equal(t, tc.expectError, normalize(err.Error()))
|
||||||
}
|
}
|
||||||
|
@ -74,7 +74,7 @@ step: Errorf a b 42`,
|
|||||||
tCtx.Log(buffer.String())
|
tCtx.Log(buffer.String())
|
||||||
|
|
||||||
noSuchValue := tCtx.Value("some other key")
|
noSuchValue := tCtx.Value("some other key")
|
||||||
assert.Equal(tCtx, nil, noSuchValue, "value for unknown context value key")
|
assert.Nil(tCtx, noSuchValue, "value for unknown context value key")
|
||||||
},
|
},
|
||||||
expectLog: `<klog header>: step: You requested a progress report.
|
expectLog: `<klog header>: step: You requested a progress report.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user