@@ -3,7 +3,6 @@ package cel
33import (
44 "testing"
55
6- . "github.com/onsi/gomega"
76 controllerruntime "sigs.k8s.io/controller-runtime"
87 gatewayv1alpha2 "sigs.k8s.io/gateway-api/apis/v1alpha2"
98
@@ -13,19 +12,16 @@ import (
1312
1413func TestClientSettingsPoliciesTargetRefKind (t * testing.T ) {
1514 t .Parallel ()
16- g := NewWithT (t )
17-
18- k8sClient , err := getKubernetesClient (t )
19- g .Expect (err ).ToNot (HaveOccurred ())
15+ k8sClient := getKubernetesClient (t )
2016
2117 tests := []struct {
22- policySpec ngfAPIv1alpha1.ClientSettingsPolicySpec
18+ spec ngfAPIv1alpha1.ClientSettingsPolicySpec
2319 name string
2420 wantErrors []string
2521 }{
2622 {
2723 name : "Validate TargetRef of kind Gateway is allowed" ,
28- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
24+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
2925 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
3026 Kind : gatewayKind ,
3127 Group : gatewayGroup ,
@@ -34,7 +30,7 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
3430 },
3531 {
3632 name : "Validate TargetRef of kind HTTPRoute is allowed" ,
37- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
33+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
3834 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
3935 Kind : httpRouteKind ,
4036 Group : gatewayGroup ,
@@ -43,7 +39,7 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
4339 },
4440 {
4541 name : "Validate TargetRef of kind GRPCRoute is allowed" ,
46- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
42+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
4743 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
4844 Kind : grpcRouteKind ,
4945 Group : gatewayGroup ,
@@ -53,7 +49,7 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
5349 {
5450 name : "Validate Invalid TargetRef Kind is not allowed" ,
5551 wantErrors : []string {expectedTargetRefKindError },
56- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
52+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
5753 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
5854 Kind : invalidKind ,
5955 Group : gatewayGroup ,
@@ -63,7 +59,7 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
6359 {
6460 name : "Validate TCPRoute TargetRef Kind is not allowed" ,
6561 wantErrors : []string {expectedTargetRefKindError },
66- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
62+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
6763 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
6864 Kind : tcpRouteKind ,
6965 Group : gatewayGroup ,
@@ -75,35 +71,32 @@ func TestClientSettingsPoliciesTargetRefKind(t *testing.T) {
7571 for _ , tt := range tests {
7672 t .Run (tt .name , func (t * testing.T ) {
7773 t .Parallel ()
78- policySpec := tt .policySpec
79- policySpec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
74+ spec := tt .spec
75+ spec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
8076 clientSettingsPolicy := & ngfAPIv1alpha1.ClientSettingsPolicy {
8177 ObjectMeta : controllerruntime.ObjectMeta {
82- Name : uniqueResourceName (testPolicyName ),
78+ Name : uniqueResourceName (testResourceName ),
8379 Namespace : defaultNamespace ,
8480 },
85- Spec : policySpec ,
81+ Spec : spec ,
8682 }
87- validateCrd (t , tt .wantErrors , g , clientSettingsPolicy , k8sClient )
83+ validateCrd (t , tt .wantErrors , clientSettingsPolicy , k8sClient )
8884 })
8985 }
9086}
9187
9288func TestClientSettingsPoliciesTargetRefGroup (t * testing.T ) {
9389 t .Parallel ()
94- g := NewWithT (t )
95-
96- k8sClient , err := getKubernetesClient (t )
97- g .Expect (err ).ToNot (HaveOccurred ())
90+ k8sClient := getKubernetesClient (t )
9891
9992 tests := []struct {
100- policySpec ngfAPIv1alpha1.ClientSettingsPolicySpec
93+ spec ngfAPIv1alpha1.ClientSettingsPolicySpec
10194 name string
10295 wantErrors []string
10396 }{
10497 {
10598 name : "Validate gateway.networking.k8s.io TargetRef Group is allowed" ,
106- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
99+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
107100 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
108101 Kind : gatewayKind ,
109102 Group : gatewayGroup ,
@@ -113,7 +106,7 @@ func TestClientSettingsPoliciesTargetRefGroup(t *testing.T) {
113106 {
114107 name : "Validate invalid.networking.k8s.io TargetRef Group is not allowed" ,
115108 wantErrors : []string {expectedTargetRefGroupError },
116- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
109+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
117110 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
118111 Kind : gatewayKind ,
119112 Group : invalidGroup ,
@@ -123,7 +116,7 @@ func TestClientSettingsPoliciesTargetRefGroup(t *testing.T) {
123116 {
124117 name : "Validate discovery.k8s.io/v1 TargetRef Group is not allowed" ,
125118 wantErrors : []string {expectedTargetRefGroupError },
126- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
119+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
127120 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
128121 Kind : gatewayKind ,
129122 Group : discoveryGroup ,
@@ -135,35 +128,32 @@ func TestClientSettingsPoliciesTargetRefGroup(t *testing.T) {
135128 for _ , tt := range tests {
136129 t .Run (tt .name , func (t * testing.T ) {
137130 t .Parallel ()
138- policySpec := tt .policySpec
139- policySpec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
131+ spec := tt .spec
132+ spec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
140133 clientSettingsPolicy := & ngfAPIv1alpha1.ClientSettingsPolicy {
141134 ObjectMeta : controllerruntime.ObjectMeta {
142- Name : uniqueResourceName (testPolicyName ),
135+ Name : uniqueResourceName (testResourceName ),
143136 Namespace : defaultNamespace ,
144137 },
145- Spec : policySpec ,
138+ Spec : spec ,
146139 }
147- validateCrd (t , tt .wantErrors , g , clientSettingsPolicy , k8sClient )
140+ validateCrd (t , tt .wantErrors , clientSettingsPolicy , k8sClient )
148141 })
149142 }
150143}
151144
152145func TestClientSettingsPoliciesKeepAliveTimeout (t * testing.T ) {
153146 t .Parallel ()
154- g := NewWithT (t )
155-
156- k8sClient , err := getKubernetesClient (t )
157- g .Expect (err ).ToNot (HaveOccurred ())
147+ k8sClient := getKubernetesClient (t )
158148
159149 tests := []struct {
160- policySpec ngfAPIv1alpha1.ClientSettingsPolicySpec
150+ spec ngfAPIv1alpha1.ClientSettingsPolicySpec
161151 name string
162152 wantErrors []string
163153 }{
164154 {
165155 name : "Validate KeepAliveTimeout is not set" ,
166- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
156+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
167157 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
168158 Kind : gatewayKind ,
169159 Group : gatewayGroup ,
@@ -173,7 +163,7 @@ func TestClientSettingsPoliciesKeepAliveTimeout(t *testing.T) {
173163 },
174164 {
175165 name : "Validate KeepAlive is set" ,
176- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
166+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
177167 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
178168 Kind : gatewayKind ,
179169 Group : gatewayGroup ,
@@ -189,7 +179,7 @@ func TestClientSettingsPoliciesKeepAliveTimeout(t *testing.T) {
189179 {
190180 name : "Validate Header cannot be set without Server" ,
191181 wantErrors : []string {expectedHeaderWithoutServerError },
192- policySpec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
182+ spec : ngfAPIv1alpha1.ClientSettingsPolicySpec {
193183 TargetRef : gatewayv1alpha2.LocalPolicyTargetReference {
194184 Kind : gatewayKind ,
195185 Group : gatewayGroup ,
@@ -206,16 +196,16 @@ func TestClientSettingsPoliciesKeepAliveTimeout(t *testing.T) {
206196 for _ , tt := range tests {
207197 t .Run (tt .name , func (t * testing.T ) {
208198 t .Parallel ()
209- policySpec := tt .policySpec
210- policySpec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
199+ spec := tt .spec
200+ spec .TargetRef .Name = gatewayv1alpha2 .ObjectName (uniqueResourceName (testTargetRefName ))
211201 clientSettingsPolicy := & ngfAPIv1alpha1.ClientSettingsPolicy {
212202 ObjectMeta : controllerruntime.ObjectMeta {
213- Name : uniqueResourceName (testPolicyName ),
203+ Name : uniqueResourceName (testResourceName ),
214204 Namespace : defaultNamespace ,
215205 },
216- Spec : policySpec ,
206+ Spec : spec ,
217207 }
218- validateCrd (t , tt .wantErrors , g , clientSettingsPolicy , k8sClient )
208+ validateCrd (t , tt .wantErrors , clientSettingsPolicy , k8sClient )
219209 })
220210 }
221211}
0 commit comments