Browse code

Change code to use /testdata/ instead of /fixtures directories

Clayton Coleman authored on 2016/06/11 03:53:34
Showing 61 changed files
... ...
@@ -104,14 +104,14 @@ func TestExampleObjectSchemas(t *testing.T) {
104 104
 			"postgresql-ephemeral-template":  &templateapi.Template{},
105 105
 			"mongodb-ephemeral-template":     &templateapi.Template{},
106 106
 		},
107
-		"../test/extended/fixtures/ldap": {
107
+		"../test/extended/testdata/ldap": {
108 108
 			"ldapserver-buildconfig":         &buildapi.BuildConfig{},
109 109
 			"ldapserver-deploymentconfig":    &deployapi.DeploymentConfig{},
110 110
 			"ldapserver-imagestream":         &imageapi.ImageStream{},
111 111
 			"ldapserver-imagestream-testenv": &imageapi.ImageStream{},
112 112
 			"ldapserver-service":             &kapi.Service{},
113 113
 		},
114
-		"../test/integration/fixtures": {
114
+		"../test/integration/testdata": {
115 115
 			// TODO fix this test to  handle json and yaml
116 116
 			"project-request-template-with-quota": nil, // skip a yaml file
117 117
 			"test-deployment-config":              &deployapi.DeploymentConfig{},
... ...
@@ -123,7 +123,7 @@ func TestExampleObjectSchemas(t *testing.T) {
123 123
 			"test-buildcli":                       &kapi.List{},
124 124
 			"test-buildcli-beta2":                 &kapi.List{},
125 125
 		},
126
-		"../test/templates/fixtures": {
126
+		"../test/templates/testdata": {
127 127
 			"crunchydata-pod": nil, // Explicitly fails validation, but should pass transformation
128 128
 			"guestbook_list":  &templateapi.Template{},
129 129
 			"guestbook":       &templateapi.Template{},
... ...
@@ -31,7 +31,7 @@ func GivenRequestWithPayload(t *testing.T, filename string) *http.Request {
31 31
 }
32 32
 
33 33
 func GivenRequestWithPayloadAndContentType(t *testing.T, filename, contentType string) *http.Request {
34
-	data, err := ioutil.ReadFile("fixtures/" + filename)
34
+	data, err := ioutil.ReadFile("testdata/" + filename)
35 35
 	if err != nil {
36 36
 		t.Errorf("Error reading setup data: %v", err)
37 37
 		return nil
... ...
@@ -42,7 +42,7 @@ func GivenRequestWithPayloadAndContentType(t *testing.T, filename, contentType s
42 42
 }
43 43
 
44 44
 func GivenRequestWithRefsPayload(t *testing.T) *http.Request {
45
-	data, err := ioutil.ReadFile("fixtures/post-receive-git.json")
45
+	data, err := ioutil.ReadFile("testdata/post-receive-git.json")
46 46
 	if err != nil {
47 47
 		t.Errorf("Error reading setup data: %v", err)
48 48
 		return nil
... ...
@@ -249,7 +249,7 @@ func postFile(eventHeader, eventName, filename, url string, expStatusCode int, t
249 249
 }
250 250
 
251 251
 func postFileWithCharset(eventHeader, eventName, filename, url, charset string, expStatusCode int, t *testing.T) *http.Request {
252
-	data, err := ioutil.ReadFile("fixtures/" + filename)
252
+	data, err := ioutil.ReadFile("testdata/" + filename)
253 253
 	if err != nil {
254 254
 		t.Errorf("Failed to open %s: %v", filename, err)
255 255
 	}
... ...
@@ -318,7 +318,7 @@ func setup(t *testing.T, filename, eventType, ref string) *testContext {
318 318
 		},
319 319
 		path: "/foobar",
320 320
 	}
321
-	event, err := ioutil.ReadFile("fixtures/" + filename)
321
+	event, err := ioutil.ReadFile("testdata/" + filename)
322 322
 	if err != nil {
323 323
 		t.Errorf("Failed to open %s: %v", filename, err)
324 324
 	}
... ...
@@ -14,7 +14,7 @@ import (
14 14
 
15 15
 func TestNewClient(t *testing.T) {
16 16
 	o := testclient.NewObjects(kapi.Scheme, kapi.Codecs.UniversalDecoder())
17
-	if err := testclient.AddObjectsFromPath("../../../test/integration/fixtures/test-deployment-config.yaml", o, kapi.Codecs.UniversalDecoder()); err != nil {
17
+	if err := testclient.AddObjectsFromPath("../../../test/integration/testdata/test-deployment-config.yaml", o, kapi.Codecs.UniversalDecoder()); err != nil {
18 18
 		t.Fatal(err)
19 19
 	}
20 20
 	oc, _ := NewFixtureClients(o)
... ...
@@ -52,7 +52,7 @@ func TestProjectStatus(t *testing.T) {
52 52
 			},
53 53
 		},
54 54
 		"empty service": {
55
-			Path: "../../../../test/fixtures/app-scenarios/k8s-service-with-nothing.json",
55
+			Path: "../../../../test/testdata/app-scenarios/k8s-service-with-nothing.json",
56 56
 			Extra: []runtime.Object{
57 57
 				&projectapi.Project{
58 58
 					ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
... ...
@@ -67,7 +67,7 @@ func TestProjectStatus(t *testing.T) {
67 67
 			},
68 68
 		},
69 69
 		"service with RC": {
70
-			Path: "../../../../test/fixtures/app-scenarios/k8s-unserviced-rc.json",
70
+			Path: "../../../../test/testdata/app-scenarios/k8s-unserviced-rc.json",
71 71
 			Extra: []runtime.Object{
72 72
 				&projectapi.Project{
73 73
 					ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
... ...
@@ -140,7 +140,7 @@ func TestProjectStatus(t *testing.T) {
140 140
 			},
141 141
 		},
142 142
 		"unstarted build": {
143
-			Path: "../../../../test/fixtures/app-scenarios/new-project-no-build.yaml",
143
+			Path: "../../../../test/testdata/app-scenarios/new-project-no-build.yaml",
144 144
 			Extra: []runtime.Object{
145 145
 				&projectapi.Project{
146 146
 					ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
... ...
@@ -196,7 +196,7 @@ func TestProjectStatus(t *testing.T) {
196 196
 			},
197 197
 		},
198 198
 		"running build": {
199
-			Path: "../../../../test/fixtures/app-scenarios/new-project-one-build.yaml",
199
+			Path: "../../../../test/testdata/app-scenarios/new-project-one-build.yaml",
200 200
 			Extra: []runtime.Object{
201 201
 				&projectapi.Project{
202 202
 					ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
... ...
@@ -215,7 +215,7 @@ func TestProjectStatus(t *testing.T) {
215 215
 			Time: mustParseTime("2015-04-06T21:20:03Z"),
216 216
 		},
217 217
 		"a/b test DeploymentConfig": {
218
-			Path: "../../../../test/fixtures/app-scenarios/new-project-two-deployment-configs.yaml",
218
+			Path: "../../../../test/testdata/app-scenarios/new-project-two-deployment-configs.yaml",
219 219
 			Extra: []runtime.Object{
220 220
 				&projectapi.Project{
221 221
 					ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
... ...
@@ -235,7 +235,7 @@ func TestProjectStatus(t *testing.T) {
235 235
 			Time: mustParseTime("2015-04-06T21:20:03Z"),
236 236
 		},
237 237
 		"with real deployments": {
238
-			Path: "../../../../test/fixtures/app-scenarios/new-project-deployed-app.yaml",
238
+			Path: "../../../../test/testdata/app-scenarios/new-project-deployed-app.yaml",
239 239
 			Extra: []runtime.Object{
240 240
 				&projectapi.Project{
241 241
 					ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
... ...
@@ -294,7 +294,7 @@ func TestProjectStatus(t *testing.T) {
294 294
 			},
295 295
 		},
296 296
 		"monopod": {
297
-			Path: "../../../../test/fixtures/app-scenarios/k8s-lonely-pod.json",
297
+			Path: "../../../../test/testdata/app-scenarios/k8s-lonely-pod.json",
298 298
 			Extra: []runtime.Object{
299 299
 				&projectapi.Project{
300 300
 					ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
... ...
@@ -308,7 +308,7 @@ func TestProjectStatus(t *testing.T) {
308 308
 			},
309 309
 		},
310 310
 		"deploys single pod": {
311
-			Path: "../../../../test/fixtures/simple-deployment.yaml",
311
+			Path: "../../../../test/testdata/simple-deployment.yaml",
312 312
 			Extra: []runtime.Object{
313 313
 				&projectapi.Project{
314 314
 					ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
... ...
@@ -58,7 +58,7 @@ func TestBootstrapClusterRoles(t *testing.T) {
58 58
 }
59 59
 
60 60
 func testObjects(t *testing.T, list *api.List, fixtureFilename string) {
61
-	filename := filepath.Join("../../../../test/fixtures/bootstrappolicy", fixtureFilename)
61
+	filename := filepath.Join("../../../../test/testdata/bootstrappolicy", fixtureFilename)
62 62
 	expectedYAML, err := ioutil.ReadFile(filename)
63 63
 	if err != nil {
64 64
 		t.Fatal(err)
... ...
@@ -15,7 +15,7 @@ import (
15 15
 )
16 16
 
17 17
 func TestCredentialsForSecrets(t *testing.T) {
18
-	data, err := ioutil.ReadFile("../../../test/fixtures/image-secrets.json")
18
+	data, err := ioutil.ReadFile("../../../test/testdata/image-secrets.json")
19 19
 	if err != nil {
20 20
 		t.Fatal(err)
21 21
 	}
... ...
@@ -33,7 +33,7 @@ func makeParameter(name, value, generate string, required bool) api.Parameter {
33 33
 func TestAddParameter(t *testing.T) {
34 34
 	var template api.Template
35 35
 
36
-	jsonData, _ := ioutil.ReadFile("../../test/templates/fixtures/guestbook.json")
36
+	jsonData, _ := ioutil.ReadFile("../../test/templates/testdata/guestbook.json")
37 37
 	json.Unmarshal(jsonData, &template)
38 38
 
39 39
 	AddParameter(&template, makeParameter("CUSTOM_PARAM", "1", "", false))
... ...
@@ -383,12 +383,12 @@ func TestEvaluateLabels(t *testing.T) {
383 383
 
384 384
 func TestProcessTemplateParameters(t *testing.T) {
385 385
 	var template, expectedTemplate api.Template
386
-	jsonData, _ := ioutil.ReadFile("../../test/templates/fixtures/guestbook.json")
386
+	jsonData, _ := ioutil.ReadFile("../../test/templates/testdata/guestbook.json")
387 387
 	if err := runtime.DecodeInto(kapi.Codecs.UniversalDecoder(), jsonData, &template); err != nil {
388 388
 		t.Fatalf("unexpected error: %v", err)
389 389
 	}
390 390
 
391
-	expectedData, _ := ioutil.ReadFile("../../test/templates/fixtures/guestbook_list.json")
391
+	expectedData, _ := ioutil.ReadFile("../../test/templates/testdata/guestbook_list.json")
392 392
 	if err := runtime.DecodeInto(kapi.Codecs.UniversalDecoder(), expectedData, &expectedTemplate); err != nil {
393 393
 		t.Fatalf("unexpected error: %v", err)
394 394
 	}
... ...
@@ -69,7 +69,7 @@ func TestBuilder(t *testing.T) {
69 69
 		ErrFn      func(err error) bool
70 70
 	}{
71 71
 		{
72
-			Dockerfile: "fixtures/dir/Dockerfile",
72
+			Dockerfile: "testdata/dir/Dockerfile",
73 73
 			From:       "busybox",
74 74
 			Copies: []Copy{
75 75
 				{Src: ".", Dest: []string{"/"}, Download: false},
... ...
@@ -81,7 +81,7 @@ func TestBuilder(t *testing.T) {
81 81
 			},
82 82
 		},
83 83
 		{
84
-			Dockerfile: "fixtures/ignore/Dockerfile",
84
+			Dockerfile: "testdata/ignore/Dockerfile",
85 85
 			From:       "busybox",
86 86
 			Copies: []Copy{
87 87
 				{Src: ".", Dest: []string{"/"}},
... ...
@@ -91,7 +91,7 @@ func TestBuilder(t *testing.T) {
91 91
 			},
92 92
 		},
93 93
 		{
94
-			Dockerfile: "fixtures/Dockerfile.env",
94
+			Dockerfile: "testdata/Dockerfile.env",
95 95
 			From:       "busybox",
96 96
 			Config: docker.Config{
97 97
 				Env:   []string{"name=value", "name2=value2a            value2b", "name1=value1", "name3=value3a\\n\"value3b\"", "name4=value4a\\\\nvalue4b"},
... ...
@@ -99,7 +99,7 @@ func TestBuilder(t *testing.T) {
99 99
 			},
100 100
 		},
101 101
 		{
102
-			Dockerfile: "fixtures/Dockerfile.edgecases",
102
+			Dockerfile: "testdata/Dockerfile.edgecases",
103 103
 			From:       "busybox",
104 104
 			Copies: []Copy{
105 105
 				{Src: ".", Dest: []string{"/"}, Download: true},
... ...
@@ -126,7 +126,7 @@ func TestBuilder(t *testing.T) {
126 126
 			},
127 127
 		},
128 128
 		{
129
-			Dockerfile: "fixtures/Dockerfile.exposedefault",
129
+			Dockerfile: "testdata/Dockerfile.exposedefault",
130 130
 			From:       "busybox",
131 131
 			Config: docker.Config{
132 132
 				ExposedPorts: map[docker.Port]struct{}{"3469/tcp": {}},
... ...
@@ -134,7 +134,7 @@ func TestBuilder(t *testing.T) {
134 134
 			},
135 135
 		},
136 136
 		{
137
-			Dockerfile: "fixtures/Dockerfile.add",
137
+			Dockerfile: "testdata/Dockerfile.add",
138 138
 			From:       "busybox",
139 139
 			Copies: []Copy{
140 140
 				{Src: "https://github.com/openshift/origin/raw/master/README.md", Dest: []string{"/README.md"}, Download: true},
... ...
@@ -220,14 +220,14 @@ func TestCalcCopyInfo(t *testing.T) {
220 220
 	}{
221 221
 		{
222 222
 			origPath:       "subdir/*",
223
-			rootPath:       "fixtures/dir",
223
+			rootPath:       "testdata/dir",
224 224
 			allowWildcards: true,
225 225
 			errFn:          nilErr,
226 226
 			paths:          map[string]struct{}{"subdir/file2": {}},
227 227
 		},
228 228
 		{
229 229
 			origPath:       "*",
230
-			rootPath:       "fixtures/dir",
230
+			rootPath:       "testdata/dir",
231 231
 			allowWildcards: true,
232 232
 			errFn:          nilErr,
233 233
 			paths: map[string]struct{}{
... ...
@@ -238,7 +238,7 @@ func TestCalcCopyInfo(t *testing.T) {
238 238
 		},
239 239
 		{
240 240
 			origPath:       ".",
241
-			rootPath:       "fixtures/dir",
241
+			rootPath:       "testdata/dir",
242 242
 			allowWildcards: true,
243 243
 			errFn:          nilErr,
244 244
 			paths: map[string]struct{}{
... ...
@@ -249,7 +249,7 @@ func TestCalcCopyInfo(t *testing.T) {
249 249
 		},
250 250
 		{
251 251
 			origPath:       "/.",
252
-			rootPath:       "fixtures/dir",
252
+			rootPath:       "testdata/dir",
253 253
 			allowWildcards: true,
254 254
 			errFn:          nilErr,
255 255
 			paths: map[string]struct{}{
... ...
@@ -260,7 +260,7 @@ func TestCalcCopyInfo(t *testing.T) {
260 260
 		},
261 261
 		{
262 262
 			origPath:       "subdir/",
263
-			rootPath:       "fixtures/dir",
263
+			rootPath:       "testdata/dir",
264 264
 			allowWildcards: true,
265 265
 			errFn:          nilErr,
266 266
 			paths: map[string]struct{}{
... ...
@@ -269,7 +269,7 @@ func TestCalcCopyInfo(t *testing.T) {
269 269
 		},
270 270
 		{
271 271
 			origPath:       "subdir",
272
-			rootPath:       "fixtures/dir",
272
+			rootPath:       "testdata/dir",
273 273
 			allowWildcards: true,
274 274
 			errFn:          nilErr,
275 275
 			paths: map[string]struct{}{
... ...
@@ -278,7 +278,7 @@ func TestCalcCopyInfo(t *testing.T) {
278 278
 		},
279 279
 		{
280 280
 			origPath:       "subdir/.",
281
-			rootPath:       "fixtures/dir",
281
+			rootPath:       "testdata/dir",
282 282
 			allowWildcards: true,
283 283
 			errFn:          nilErr,
284 284
 			paths: map[string]struct{}{
... ...
@@ -286,17 +286,17 @@ func TestCalcCopyInfo(t *testing.T) {
286 286
 			},
287 287
 		},
288 288
 		{
289
-			origPath:       "fixtures/dir/subdir/.",
289
+			origPath:       "testdata/dir/subdir/.",
290 290
 			rootPath:       "",
291 291
 			allowWildcards: true,
292 292
 			errFn:          nilErr,
293 293
 			paths: map[string]struct{}{
294
-				"fixtures/dir/subdir/": {},
294
+				"testdata/dir/subdir/": {},
295 295
 			},
296 296
 		},
297 297
 		{
298 298
 			origPath:       "subdir/",
299
-			rootPath:       "fixtures/dir",
299
+			rootPath:       "testdata/dir",
300 300
 			allowWildcards: true,
301 301
 			errFn:          nilErr,
302 302
 			paths: map[string]struct{}{
... ...
@@ -305,7 +305,7 @@ func TestCalcCopyInfo(t *testing.T) {
305 305
 		},
306 306
 		{
307 307
 			origPath:       "subdir/",
308
-			rootPath:       "fixtures/dir",
308
+			rootPath:       "testdata/dir",
309 309
 			allowWildcards: true,
310 310
 			errFn:          nilErr,
311 311
 			paths: map[string]struct{}{
... ...
@@ -65,23 +65,23 @@ type conformanceTest struct {
65 65
 func TestConformanceInternal(t *testing.T) {
66 66
 	testCases := []conformanceTest{
67 67
 		{
68
-			ContextDir: "fixtures/dir",
68
+			ContextDir: "testdata/dir",
69 69
 		},
70 70
 		// TODO: Fix this test
71 71
 		// {
72
-		// 	ContextDir: "fixtures/ignore",
72
+		// 	ContextDir: "testdata/ignore",
73 73
 		// },
74 74
 		{
75
-			Dockerfile: "fixtures/Dockerfile.env",
75
+			Dockerfile: "testdata/Dockerfile.env",
76 76
 		},
77 77
 		{
78
-			Dockerfile: "fixtures/Dockerfile.edgecases",
78
+			Dockerfile: "testdata/Dockerfile.edgecases",
79 79
 		},
80 80
 		{
81
-			Dockerfile: "fixtures/Dockerfile.exposedefault",
81
+			Dockerfile: "testdata/Dockerfile.exposedefault",
82 82
 		},
83 83
 		{
84
-			Dockerfile: "fixtures/Dockerfile.add",
84
+			Dockerfile: "testdata/Dockerfile.add",
85 85
 		},
86 86
 	}
87 87
 
... ...
@@ -178,7 +178,7 @@ os::cmd::expect_success 'oadm policy reconcile-cluster-roles clusterrole/cluster
178 178
 os::cmd::expect_success 'oc get clusterrole/cluster-status'
179 179
 
180 180
 # test reconciliation protection by replacing the basic-user role with one that has missing default permissions, and extra non-default permissions
181
-os::cmd::expect_success 'oc replace --force -f ./test/fixtures/basic-user-with-groups-without-projectrequests.yaml'
181
+os::cmd::expect_success 'oc replace --force -f ./test/testdata/basic-user-with-groups-without-projectrequests.yaml'
182 182
 # 1. mark the role as protected, and ensure the role is skipped by reconciliation
183 183
 os::cmd::expect_success 'oc annotate clusterrole/basic-user openshift.io/reconcile-protect=true'
184 184
 os::cmd::expect_success_and_text     'oadm policy reconcile-cluster-roles basic-user --additive-only=false --confirm' 'skipped: clusterrole/basic-user'
... ...
@@ -194,7 +194,7 @@ os::cmd::expect_success_and_text     'oadm policy reconcile-cluster-roles basic-
194 194
 os::cmd::expect_success_and_not_text 'oadm policy reconcile-cluster-roles basic-user --additive-only=false --confirm' 'clusterrole/basic-user'
195 195
 
196 196
 # test label/annotation reconciliation by replacing the basic-user role with one that has custom labels, annotations, and permissions
197
-os::cmd::expect_success 'oc replace --force -f ./test/fixtures/basic-user-with-annotations-labels-groups-without-projectrequests.yaml'
197
+os::cmd::expect_success 'oc replace --force -f ./test/testdata/basic-user-with-annotations-labels-groups-without-projectrequests.yaml'
198 198
 # display shows customized labels/annotations
199 199
 os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-roles' 'custom-label'
200 200
 os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-roles' 'custom-annotation'
... ...
@@ -217,7 +217,7 @@ os::cmd::expect_failure 'oc get clusterrolebinding/cluster-status-binding'
217 217
 os::cmd::expect_success 'oadm policy reconcile-cluster-role-bindings --confirm'
218 218
 os::cmd::expect_success 'oc get clusterrolebinding/cluster-status-binding'
219 219
 # Customize a binding
220
-os::cmd::expect_success 'oc replace --force -f ./test/fixtures/basic-users-binding.json'
220
+os::cmd::expect_success 'oc replace --force -f ./test/testdata/basic-users-binding.json'
221 221
 # display shows customized labels/annotations
222 222
 os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-role-bindings' 'custom-label'
223 223
 os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-role-bindings' 'custom-annotation'
... ...
@@ -242,11 +242,11 @@ echo "admin-reconcile-cluster-role-bindings: ok"
242 242
 os::test::junit::declare_suite_end
243 243
 
244 244
 os::test::junit::declare_suite_start "cmd/admin/role-reapers"
245
-os::cmd::expect_success "oc create -f test/extended/fixtures/roles/policy-roles.yaml"
245
+os::cmd::expect_success "oc create -f test/extended/testdata/roles/policy-roles.yaml"
246 246
 os::cmd::expect_success "oc get rolebinding/basic-users"
247 247
 os::cmd::expect_success "oc delete role/basic-user"
248 248
 os::cmd::expect_failure "oc get rolebinding/basic-users"
249
-os::cmd::expect_success "oc create -f test/extended/fixtures/roles/policy-clusterroles.yaml"
249
+os::cmd::expect_success "oc create -f test/extended/testdata/roles/policy-clusterroles.yaml"
250 250
 os::cmd::expect_success "oc get clusterrolebinding/basic-users2"
251 251
 os::cmd::expect_success "oc delete clusterrole/basic-user2"
252 252
 os::cmd::expect_failure "oc get clusterrolebinding/basic-users2"
... ...
@@ -340,7 +340,7 @@ os::test::junit::declare_suite_start "cmd/admin/complex-scenarios"
340 340
 os::cmd::expect_success 'oadm new-project example --admin="createuser"'
341 341
 os::cmd::expect_success 'oc project example'
342 342
 os::cmd::try_until_success 'oc get serviceaccount default'
343
-os::cmd::expect_success 'oc create -f test/fixtures/app-scenarios'
343
+os::cmd::expect_success 'oc create -f test/testdata/app-scenarios'
344 344
 os::cmd::expect_success 'oc status'
345 345
 os::cmd::expect_success 'oc status -o dot'
346 346
 echo "complex-scenarios: ok"
... ...
@@ -384,7 +384,7 @@ os::test::junit::declare_suite_end
384 384
 
385 385
 os::test::junit::declare_suite_start "cmd/admin/policybinding-required"
386 386
 # Admin can't bind local roles without cluster-admin permissions
387
-os::cmd::expect_success "oc create -f test/extended/fixtures/roles/empty-role.yaml -n cmd-admin"
387
+os::cmd::expect_success "oc create -f test/extended/testdata/roles/empty-role.yaml -n cmd-admin"
388 388
 os::cmd::expect_success "oc delete policybinding/cmd-admin:default -n cmd-admin"
389 389
 os::cmd::expect_success 'oadm policy add-role-to-user admin local-admin  -n cmd-admin'
390 390
 os::cmd::try_until_text "oc policy who-can get policybindings -n cmd-admin" "local-admin"
... ...
@@ -22,29 +22,29 @@ os::cmd::expect_success 'oc login -u system:admin'
22 22
 username=$(oc get user/scoped-user -o jsonpath={.metadata.name})
23 23
 useruid=$(oc get user/scoped-user -o jsonpath={.metadata.uid})
24 24
 
25
-whoamitoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=whoami SCOPE=user:info USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
25
+whoamitoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=whoami SCOPE=user:info USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
26 26
 os::cmd::expect_success_and_text 'oc get user/~ --token="${whoamitoken}"' "${username}"
27 27
 os::cmd::expect_failure_and_text 'oc get pods --token="${whoamitoken}" -n cmd-authentication' 'prevent this action; User "scoped-user" cannot list pods in project "cmd-authentication"'
28 28
 
29
-listprojecttoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=listproject SCOPE=user:list-projects USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
29
+listprojecttoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=listproject SCOPE=user:list-projects USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
30 30
 os::cmd::expect_success_and_text 'oc get projects --token="${listprojecttoken}"' 'cmd-authentication'
31 31
 os::cmd::expect_failure_and_text 'oc get user/~ --token="${listprojecttoken}"' 'prevent this action; User "scoped-user" cannot get users at the cluster scope'
32 32
 os::cmd::expect_failure_and_text 'oc get pods --token="${listprojecttoken}" -n cmd-authentication' 'prevent this action; User "scoped-user" cannot list pods in project "cmd-authentication"'
33 33
 
34
-adminnonescalatingpowerstoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=admin SCOPE=role:admin:* USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
34
+adminnonescalatingpowerstoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=admin SCOPE=role:admin:* USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
35 35
 os::cmd::expect_failure_and_text 'oc get user/~ --token="${adminnonescalatingpowerstoken}"' 'prevent this action; User "scoped-user" cannot get users at the cluster scope'
36 36
 os::cmd::expect_failure_and_text 'oc get secrets --token="${adminnonescalatingpowerstoken}" -n cmd-authentication' 'prevent this action; User "scoped-user" cannot list secrets in project "cmd-authentication"'
37 37
 os::cmd::expect_success_and_text 'oc get projects/cmd-authentication --token="${adminnonescalatingpowerstoken}" -n cmd-authentication' 'cmd-authentication'
38 38
 
39
-allescalatingpowerstoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=clusteradmin SCOPE='role:cluster-admin:*:!' USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
39
+allescalatingpowerstoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=clusteradmin SCOPE='role:cluster-admin:*:!' USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
40 40
 os::cmd::expect_success_and_text 'oc get user/~ --token="${allescalatingpowerstoken}"' "${username}"
41 41
 os::cmd::expect_success 'oc get secrets --token="${allescalatingpowerstoken}" -n cmd-authentication'
42 42
 # scopes allow it, but authorization doesn't
43 43
 os::cmd::expect_failure_and_text 'oc get secrets --token="${allescalatingpowerstoken}" -n default' 'cannot list secrets in project'
44 44
 os::cmd::expect_success_and_text 'oc get projects --token="${allescalatingpowerstoken}"' 'cmd-authentication'
45 45
 
46
-accesstoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=access SCOPE=user:check-access USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
47
-os::cmd::expect_success_and_text 'curl -k -XPOST -H "Content-Type: application/json" -H "Authorization: Bearer ${accesstoken}" ${API_SCHEME}://${API_HOST}:${API_PORT}/oapi/v1/namespaces/cmd-authentication/localsubjectaccessreviews -d @${OS_ROOT}/test/fixtures/authentication/localsubjectaccessreview.json' '"kind": "SubjectAccessReviewResponse"'
46
+accesstoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=access SCOPE=user:check-access USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
47
+os::cmd::expect_success_and_text 'curl -k -XPOST -H "Content-Type: application/json" -H "Authorization: Bearer ${accesstoken}" ${API_SCHEME}://${API_HOST}:${API_PORT}/oapi/v1/namespaces/cmd-authentication/localsubjectaccessreviews -d @${OS_ROOT}/test/testdata/authentication/localsubjectaccessreview.json' '"kind": "SubjectAccessReviewResponse"'
48 48
 os::cmd::expect_success_and_text 'oc policy can-i create pods --token=${accesstoken} -n cmd-authentication --ignore-scopes' 'yes'
49 49
 os::cmd::expect_success_and_text 'oc policy can-i create pods --token=${accesstoken} -n cmd-authentication' 'no'
50 50
 os::cmd::expect_success_and_text "oc policy can-i create pods --token=${accesstoken} -n cmd-authentication --scopes='role:admin:*'" 'yes'
... ...
@@ -80,7 +80,7 @@ os::test::junit::declare_suite_end
80 80
 
81 81
 os::test::junit::declare_suite_start "cmd/basicresources/resource-builder"
82 82
 # Test resource builder filtering of files with expected extensions inside directories, and individual files without expected extensions
83
-os::cmd::expect_success 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension'
83
+os::cmd::expect_success 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension'
84 84
 # Explicitly specified extensionless files
85 85
 os::cmd::expect_success 'oc get secret json-no-extension yml-no-extension'
86 86
 # Scanned files with extensions inside directories
... ...
@@ -111,20 +111,20 @@ os::test::junit::declare_suite_end
111 111
 
112 112
 os::test::junit::declare_suite_start "cmd/basicresources/services"
113 113
 os::cmd::expect_success 'oc get services'
114
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-service.json'
114
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-service.json'
115 115
 os::cmd::expect_success 'oc delete services frontend'
116 116
 echo "services: ok"
117 117
 os::test::junit::declare_suite_end
118 118
 
119 119
 os::test::junit::declare_suite_start "cmd/basicresources/list-version-conversion"
120
-os::cmd::expect_success 'oc create   -f test/fixtures/mixed-api-versions.yaml'
121
-os::cmd::expect_success 'oc get      -f test/fixtures/mixed-api-versions.yaml -o yaml'
122
-os::cmd::expect_success 'oc label    -f test/fixtures/mixed-api-versions.yaml mylabel=a'
123
-os::cmd::expect_success 'oc annotate -f test/fixtures/mixed-api-versions.yaml myannotation=b'
120
+os::cmd::expect_success 'oc create   -f test/testdata/mixed-api-versions.yaml'
121
+os::cmd::expect_success 'oc get      -f test/testdata/mixed-api-versions.yaml -o yaml'
122
+os::cmd::expect_success 'oc label    -f test/testdata/mixed-api-versions.yaml mylabel=a'
123
+os::cmd::expect_success 'oc annotate -f test/testdata/mixed-api-versions.yaml myannotation=b'
124 124
 # Make sure all six resources, with different API versions, got labeled and annotated
125
-os::cmd::expect_success_and_text 'oc get -f test/fixtures/mixed-api-versions.yaml --output-version=v1 --output=jsonpath="{..metadata.labels.mylabel}"'           '^a a a a a a$'
126
-os::cmd::expect_success_and_text 'oc get -f test/fixtures/mixed-api-versions.yaml --output-version=v1 --output=jsonpath="{..metadata.annotations.myannotation}"' '^b b b b b b$'
127
-os::cmd::expect_success 'oc delete   -f test/fixtures/mixed-api-versions.yaml'
125
+os::cmd::expect_success_and_text 'oc get -f test/testdata/mixed-api-versions.yaml --output-version=v1 --output=jsonpath="{..metadata.labels.mylabel}"'           '^a a a a a a$'
126
+os::cmd::expect_success_and_text 'oc get -f test/testdata/mixed-api-versions.yaml --output-version=v1 --output=jsonpath="{..metadata.annotations.myannotation}"' '^b b b b b b$'
127
+os::cmd::expect_success 'oc delete   -f test/testdata/mixed-api-versions.yaml'
128 128
 echo "list version conversion: ok"
129 129
 os::test::junit::declare_suite_end
130 130
 
... ...
@@ -149,9 +149,9 @@ os::test::junit::declare_suite_end
149 149
 
150 150
 os::test::junit::declare_suite_start "cmd/basicresources/routes"
151 151
 os::cmd::expect_success 'oc get routes'
152
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-route.json'
152
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-route.json'
153 153
 os::cmd::expect_success 'oc delete routes testroute'
154
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-service.json'
154
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-service.json'
155 155
 os::cmd::expect_success 'oc create route passthrough --service=svc/frontend'
156 156
 os::cmd::expect_success 'oc delete routes frontend'
157 157
 os::cmd::expect_success 'oc create route edge --path /test --service=services/non-existent --port=80'
... ...
@@ -187,7 +187,7 @@ os::cmd::expect_success_and_text "oc set probe ${arg} -o yaml --liveness --get-u
187 187
 os::cmd::expect_success_and_text "oc set probe ${arg} -o yaml --liveness --get-url=http://127.0.0.1:port/path" "scheme: HTTP"
188 188
 os::cmd::expect_success_and_text "oc set probe ${arg} -o yaml --liveness --get-url=https://127.0.0.1:port/path" "host: 127.0.0.1"
189 189
 os::cmd::expect_success_and_text "oc set probe ${arg} -o yaml --liveness --get-url=https://127.0.0.1:port/path" "port: port"
190
-os::cmd::expect_success "oc create -f test/integration/fixtures/test-deployment-config.yaml"
190
+os::cmd::expect_success "oc create -f test/integration/testdata/test-deployment-config.yaml"
191 191
 os::cmd::expect_failure_and_text "oc set probe dc/test-deployment-config --liveness" "Required value: must specify a handler type"
192 192
 os::cmd::expect_success_and_text "oc set probe dc test-deployment-config --liveness --open-tcp=8080" "updated"
193 193
 os::cmd::expect_success_and_text "oc set probe dc/test-deployment-config --liveness --open-tcp=8080" "was not changed"
... ...
@@ -215,8 +215,8 @@ echo "set probe: ok"
215 215
 os::test::junit::declare_suite_end
216 216
 
217 217
 os::test::junit::declare_suite_start "cmd/basicresources/setenv"
218
-os::cmd::expect_success "oc create -f test/integration/fixtures/test-deployment-config.yaml"
219
-os::cmd::expect_success "oc create -f test/integration/fixtures/test-buildcli.json"
218
+os::cmd::expect_success "oc create -f test/integration/testdata/test-deployment-config.yaml"
219
+os::cmd::expect_success "oc create -f test/integration/testdata/test-buildcli.json"
220 220
 os::cmd::expect_success_and_text "oc set env dc/test-deployment-config FOO=bar" "updated"
221 221
 os::cmd::expect_success_and_text "oc set env dc/test-deployment-config --list" "FOO=bar"
222 222
 os::cmd::expect_success_and_text "oc set env bc --all FOO=bar" "updated"
... ...
@@ -229,7 +229,7 @@ os::test::junit::declare_suite_end
229 229
 
230 230
 os::test::junit::declare_suite_start "cmd/basicresources/expose"
231 231
 # Expose service as a route
232
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-service.json'
232
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-service.json'
233 233
 os::cmd::expect_failure 'oc expose service frontend --create-external-load-balancer'
234 234
 os::cmd::expect_failure 'oc expose service frontend --port=40 --type=NodePort'
235 235
 os::cmd::expect_success 'oc expose service frontend --path=/test'
... ...
@@ -238,20 +238,20 @@ os::cmd::expect_success_and_text "oc get route frontend --output-version=v1 --te
238 238
 os::cmd::expect_success_and_text "oc get route frontend --output-version=v1 --template='{{.spec.port.targetPort}}'" "<no value>" # no target port for services with unnamed ports
239 239
 os::cmd::expect_success 'oc delete svc,route -l name=frontend'
240 240
 # Test that external services are exposable
241
-os::cmd::expect_success 'oc create -f test/fixtures/external-service.yaml'
241
+os::cmd::expect_success 'oc create -f test/testdata/external-service.yaml'
242 242
 os::cmd::expect_success 'oc expose svc/external'
243 243
 os::cmd::expect_success_and_text 'oc get route external' 'external=service'
244 244
 os::cmd::expect_success 'oc delete route external'
245 245
 os::cmd::expect_success 'oc delete svc external'
246 246
 # Expose multiport service and verify we set a port in the route
247
-os::cmd::expect_success 'oc create -f test/fixtures/multiport-service.yaml'
247
+os::cmd::expect_success 'oc create -f test/testdata/multiport-service.yaml'
248 248
 os::cmd::expect_success 'oc expose svc/frontend --name route-with-set-port'
249 249
 os::cmd::expect_success_and_text "oc get route route-with-set-port --template='{{.spec.port.targetPort}}' --output-version=v1" "web"
250 250
 echo "expose: ok"
251 251
 os::test::junit::declare_suite_end
252 252
 
253 253
 # Test OAuth access token describer
254
-os::cmd::expect_success 'oc create -f test/fixtures/oauthaccesstoken.yaml'
254
+os::cmd::expect_success 'oc create -f test/testdata/oauthaccesstoken.yaml'
255 255
 os::cmd::expect_success_and_text "oc describe oauthaccesstoken DYGZDLucARCPIfUeKPhsgPfn0WBLR_9KdeREH0c9iod" "DYGZDLucARCPIfUeKPhsgPfn0WBLR_9KdeREH0c9iod"
256 256
 echo "OAuth descriptor: ok"
257 257
 
... ...
@@ -130,7 +130,7 @@ os::test::junit::declare_suite_end
130 130
 
131 131
 os::test::junit::declare_suite_start "cmd/builds/setbuildhook"
132 132
 # Validate the set build-hook command
133
-arg="-f test/fixtures/test-bc.yaml"
133
+arg="-f test/testdata/test-bc.yaml"
134 134
 os::cmd::expect_failure_and_text "oc set build-hook" "error: one or more build configs"
135 135
 os::cmd::expect_failure_and_text "oc set build-hook ${arg}" "error: you must specify a type of hook"
136 136
 os::cmd::expect_success_and_text "oc set build-hook ${arg} --post-commit -o yaml -- echo 'hello world'" 'postCommit:'
... ...
@@ -141,7 +141,7 @@ os::cmd::expect_success_and_not_text "oc set build-hook ${arg} --post-commit -o
141 141
 os::cmd::expect_success_and_text "oc set build-hook ${arg} --post-commit --command -o yaml -- echo 'hello world'" 'command:'
142 142
 os::cmd::expect_success_and_text "oc set build-hook ${arg} --post-commit -o yaml --script='echo \"hello world\"'" 'script: echo \"hello world\"'
143 143
 # Server object tests
144
-os::cmd::expect_success "oc create -f test/fixtures/test-bc.yaml"
144
+os::cmd::expect_success "oc create -f test/testdata/test-bc.yaml"
145 145
 os::cmd::expect_failure_and_text "oc set build-hook bc/test-buildconfig --post-commit" "you must specify either a script or command"
146 146
 os::cmd::expect_success_and_text "oc set build-hook test-buildconfig --post-commit -- echo 'hello world'" "updated"
147 147
 os::cmd::expect_success_and_text "oc set build-hook bc/test-buildconfig --post-commit -- echo 'hello world'" "was not changed"
... ...
@@ -157,7 +157,7 @@ echo "set build-hook: ok"
157 157
 os::test::junit::declare_suite_end
158 158
 
159 159
 os::test::junit::declare_suite_start "cmd/builds/start-build"
160
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-buildcli.json'
160
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-buildcli.json'
161 161
 # a build for which there is not an upstream tag in the corresponding imagerepo, so
162 162
 # the build should use the image field as defined in the buildconfig
163 163
 started=$(oc start-build ruby-sample-build-invalidtag)
... ...
@@ -20,7 +20,7 @@ trap os::test::junit::reconcile_output EXIT
20 20
 
21 21
 os::test::junit::declare_suite_start "cmd/debug"
22 22
 # This test validates the debug command
23
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml'
23
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml'
24 24
 os::cmd::expect_success_and_text "oc debug dc/test-deployment-config -o yaml" '\- /bin/sh'
25 25
 os::cmd::expect_success_and_text "oc debug dc/test-deployment-config --keep-annotations -o yaml" 'annotations:'
26 26
 os::cmd::expect_success_and_text "oc debug dc/test-deployment-config --as-root -o yaml" 'runAsUser: 0'
... ...
@@ -24,7 +24,7 @@ os::test::junit::declare_suite_start "cmd/deployments"
24 24
 
25 25
 os::cmd::expect_success 'oc get deploymentConfigs'
26 26
 os::cmd::expect_success 'oc get dc'
27
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml'
27
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml'
28 28
 os::cmd::expect_success 'oc describe deploymentConfigs test-deployment-config'
29 29
 os::cmd::expect_success_and_text 'oc get dc -o name' 'deploymentconfig/test-deployment-config'
30 30
 os::cmd::try_until_success 'oc get rc/test-deployment-config-1'
... ...
@@ -54,7 +54,7 @@ os::cmd::expect_success_and_text 'oc env dc/test-deployment-config OTHER=foo -o
54 54
 os::cmd::expect_success_and_text 'echo OTHER=foo | oc env dc/test-deployment-config -e - --list' 'OTHER=foo'
55 55
 os::cmd::expect_success_and_not_text 'echo #OTHER=foo | oc env dc/test-deployment-config -e - --list' 'OTHER=foo'
56 56
 os::cmd::expect_success 'oc env dc/test-deployment-config TEST=bar OTHER=baz BAR-'
57
-os::cmd::expect_success_and_not_text 'oc env -f test/integration/fixtures/test-deployment-config.yaml TEST=VERSION -o yaml' 'v1beta3'
57
+os::cmd::expect_success_and_not_text 'oc env -f test/integration/testdata/test-deployment-config.yaml TEST=VERSION -o yaml' 'v1beta3'
58 58
 os::cmd::expect_success 'oc env dc/test-deployment-config A=a B=b C=c D=d E=e F=f G=g'
59 59
 os::cmd::expect_success_and_text 'oc env dc/test-deployment-config --list' 'A=a'
60 60
 os::cmd::expect_success_and_text 'oc env dc/test-deployment-config --list' 'B=b'
... ...
@@ -123,7 +123,7 @@ echo "stop: ok"
123 123
 os::test::junit::declare_suite_end
124 124
 
125 125
 os::test::junit::declare_suite_start "cmd/deployments/autoscale"
126
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml'
126
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml'
127 127
 os::cmd::expect_success 'oc autoscale dc/test-deployment-config --max 5'
128 128
 os::cmd::expect_success_and_text "oc get hpa/test-deployment-config --template='{{.spec.maxReplicas}}'" "5"
129 129
 os::cmd::expect_success 'oc delete dc/test-deployment-config'
... ...
@@ -133,7 +133,7 @@ os::test::junit::declare_suite_end
133 133
 
134 134
 os::test::junit::declare_suite_start "cmd/deployments/setdeploymenthook"
135 135
 # Validate the set deployment-hook command
136
-arg="-f test/integration/fixtures/test-deployment-config.yaml"
136
+arg="-f test/integration/testdata/test-deployment-config.yaml"
137 137
 os::cmd::expect_failure_and_text "oc set deployment-hook" "error: one or more deployment configs"
138 138
 os::cmd::expect_failure_and_text "oc set deployment-hook ${arg}" "error: you must specify one of --pre, --mid, or --post"
139 139
 os::cmd::expect_success_and_text "oc set deployment-hook ${arg} --pre  -o yaml -- echo 'hello world'" 'pre:'
... ...
@@ -156,7 +156,7 @@ os::cmd::expect_success_and_text "oc set deployment-hook ${arg} --pre --containe
156 156
 os::cmd::expect_success_and_not_text "oc set deployment-hook ${arg} --pre --volumes=vol1 -o yaml -- echo 'hello world'" 'does not have a volume named'
157 157
 os::cmd::expect_success_and_text "oc set deployment-hook ${arg} --pre --volumes=vol1 -o yaml -- echo 'hello world'" '\- vol1'
158 158
 # Server object tests
159
-os::cmd::expect_success "oc create -f test/integration/fixtures/test-deployment-config.yaml"
159
+os::cmd::expect_success "oc create -f test/integration/testdata/test-deployment-config.yaml"
160 160
 os::cmd::expect_failure_and_text "oc set deployment-hook dc/test-deployment-config --pre" "you must specify a command"
161 161
 os::cmd::expect_success_and_text "oc set deployment-hook test-deployment-config --pre -- echo 'hello world'" "updated"
162 162
 os::cmd::expect_success_and_text "oc set deployment-hook dc/test-deployment-config --pre -- echo 'hello world'" "was not changed"
... ...
@@ -27,14 +27,14 @@ os::test::junit::declare_suite_start "cmd/images"
27 27
 
28 28
 os::test::junit::declare_suite_start "cmd/images/images"
29 29
 os::cmd::expect_success 'oc get images'
30
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-image.json'
30
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-image.json'
31 31
 os::cmd::expect_success 'oc delete images test'
32 32
 echo "images: ok"
33 33
 os::test::junit::declare_suite_end
34 34
 
35 35
 os::test::junit::declare_suite_start "cmd/images/imagestreams"
36 36
 os::cmd::expect_success 'oc get imageStreams'
37
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-image-stream.json'
37
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-image-stream.json'
38 38
 # verify that creating a registry fills out .status.dockerImageRepository
39 39
 if os::cmd::expect_success_and_not_text "oc get imageStreams test --template='{{.status.dockerImageRepository}}'" '.'; then
40 40
   # create the registry
... ...
@@ -191,7 +191,7 @@ os::cmd::expect_success_and_text 'oc tag mysql:latest tagtest:new1 --alias' 'Tag
191 191
 os::cmd::expect_success_and_text 'oc tag mysql:latest tagtest:new1' 'Tag tagtest:new1 set to mysql@sha256:'
192 192
 
193 193
 # test deleting a spec tag using oc tag
194
-os::cmd::expect_success 'oc create -f test/fixtures/test-stream.yaml'
194
+os::cmd::expect_success 'oc create -f test/testdata/test-stream.yaml'
195 195
 os::cmd::expect_success_and_text 'oc tag test-stream:latest -d' 'Deleted'
196 196
 os::cmd::expect_success 'oc delete is/test-stream'
197 197
 echo "tag: ok"
... ...
@@ -68,8 +68,8 @@ os::cmd::expect_success_and_text 'oc new-app ruby-helloworld-sample --param MYSQ
68 68
 
69 69
 # verify we can create from a template when some objects in the template declare an app label
70 70
 # the app label should still be applied to the other objects in the template.
71
-os::cmd::expect_success_and_text 'oc new-app -f test/fixtures/template-with-app-label.json -o yaml' 'app: ruby-sample-build'
72
-os::cmd::expect_success_and_text 'oc new-app -f test/fixtures/template-with-app-label.json -o yaml' 'app: myapp'
71
+os::cmd::expect_success_and_text 'oc new-app -f test/testdata/template-with-app-label.json -o yaml' 'app: ruby-sample-build'
72
+os::cmd::expect_success_and_text 'oc new-app -f test/testdata/template-with-app-label.json -o yaml' 'app: myapp'
73 73
 
74 74
 # check search
75 75
 os::cmd::expect_success_and_text 'oc new-app --search mysql' "Tags:\s+5.5, 5.6, latest"
... ...
@@ -196,19 +196,19 @@ os::cmd::expect_success_and_text 'oc new-app mysql --name=db' 'db'
196 196
 os::cmd::expect_success 'oc new-app https://github.com/openshift/ruby-hello-world -l app=ruby'
197 197
 os::cmd::expect_success 'oc delete all -l app=ruby'
198 198
 # check for error when template JSON file has errors
199
-jsonfile="${OS_ROOT}/test/fixtures/invalid.json"
199
+jsonfile="${OS_ROOT}/test/testdata/invalid.json"
200 200
 os::cmd::expect_failure_and_text "oc new-app '${jsonfile}'" "error: unable to load template file \"${jsonfile}\": at offset 8: invalid character '}' after object key"
201 201
 
202 202
 # a docker compose file should be transformed into an application by the import command
203
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'warning: not all docker-compose fields were honored'
204
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'db: cpuset is not supported'
205
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'no-ports: no ports defined to send traffic to - no OpenShift service was created'
206
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml -o name --dry-run' 'service/redis'
207
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml -o name --as-template=other --dry-run' 'template/other'
208
-os::cmd::expect_success '[[ $(diff --suppress-common-lines -y <(oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml -o yaml) test/fixtures/app-scenarios/docker-compose/complex/docker-compose.imported.yaml | grep -vE "ref\:|secret|uri\:" | wc -l) -eq 0 ]]'
203
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'warning: not all docker-compose fields were honored'
204
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'db: cpuset is not supported'
205
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'no-ports: no ports defined to send traffic to - no OpenShift service was created'
206
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml -o name --dry-run' 'service/redis'
207
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml -o name --as-template=other --dry-run' 'template/other'
208
+os::cmd::expect_success '[[ $(diff --suppress-common-lines -y <(oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml -o yaml) test/testdata/app-scenarios/docker-compose/complex/docker-compose.imported.yaml | grep -vE "ref\:|secret|uri\:" | wc -l) -eq 0 ]]'
209 209
 
210 210
 # verify a docker-compose.yml schema 2 resource can be transformed, and that it sets env vars correctly.
211
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/wordpress/docker-compose.yml -o yaml --as-template=other --dry-run' 'value: wordpress'
211
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/wordpress/docker-compose.yml -o yaml --as-template=other --dry-run' 'value: wordpress'
212 212
 
213 213
 # check new-build
214 214
 os::cmd::expect_failure_and_text 'oc new-build mysql -o yaml' 'you must specify at least one source repository URL'
... ...
@@ -224,7 +224,7 @@ os::cmd::expect_failure_and_text 'oc new-app  openshift/bogusImage https://githu
224 224
 # allow use of non-existent image (should succeed)
225 225
 os::cmd::expect_success 'oc new-app openshift/bogusImage https://github.com/openshift/ruby-hello-world.git -o yaml --allow-missing-images'
226 226
 
227
-os::cmd::expect_success 'oc create -f test/fixtures/installable-stream.yaml'
227
+os::cmd::expect_success 'oc create -f test/testdata/installable-stream.yaml'
228 228
 
229 229
 project=$(oc project -q)
230 230
 os::cmd::expect_success 'oc policy add-role-to-user edit test-user'
... ...
@@ -92,7 +92,7 @@ os::cmd::expect_failure 'oc policy can-i create pods --as harold -q'
92 92
 # adjust the cluster-admin role to check defaulting and coverage checks
93 93
 # this is done here instead of an integration test because we need to make sure the actual yaml serializations work
94 94
 workingdir=$(mktemp -d)
95
-cp ${OS_ROOT}/test/fixtures/bootstrappolicy/cluster_admin_1.0.yaml ${workingdir}
95
+cp ${OS_ROOT}/test/testdata/bootstrappolicy/cluster_admin_1.0.yaml ${workingdir}
96 96
 os::util::sed "s/RESOURCE_VERSION//g" ${workingdir}/cluster_admin_1.0.yaml
97 97
 os::cmd::expect_success "oc create -f ${workingdir}/cluster_admin_1.0.yaml"
98 98
 os::cmd::expect_success 'oadm policy add-cluster-role-to-user alternate-cluster-admin alternate-cluster-admin-user'
... ...
@@ -105,21 +105,21 @@ os::cmd::expect_success "oc login -u alternate-cluster-admin-user -p anything --
105 105
 # alternate-cluster-admin should default to having star rights, so he should be able to update his role to that
106 106
 os::cmd::try_until_text "oc policy who-can update clusterrroles" "alternate-cluster-admin-user"
107 107
 resourceversion=$(oc get clusterrole/alternate-cluster-admin -o=jsonpath="{.metadata.resourceVersion}")
108
-cp ${OS_ROOT}/test/fixtures/bootstrappolicy/alternate_cluster_admin.yaml ${workingdir}
108
+cp ${OS_ROOT}/test/testdata/bootstrappolicy/alternate_cluster_admin.yaml ${workingdir}
109 109
 os::util::sed "s/RESOURCE_VERSION/${resourceversion}/g" ${workingdir}/alternate_cluster_admin.yaml
110 110
 os::cmd::expect_success "oc replace --config=${new_kubeconfig} clusterrole/alternate-cluster-admin -f ${workingdir}/alternate_cluster_admin.yaml"
111 111
 
112 112
 # alternate-cluster-admin can restrict himself to no groups
113 113
 os::cmd::try_until_text "oc policy who-can update clusterrroles" "alternate-cluster-admin-user"
114 114
 resourceversion=$(oc get clusterrole/alternate-cluster-admin -o=jsonpath="{.metadata.resourceVersion}")
115
-cp ${OS_ROOT}/test/fixtures/bootstrappolicy/cluster_admin_without_apigroups.yaml ${workingdir}
115
+cp ${OS_ROOT}/test/testdata/bootstrappolicy/cluster_admin_without_apigroups.yaml ${workingdir}
116 116
 os::util::sed "s/RESOURCE_VERSION/${resourceversion}/g" ${workingdir}/cluster_admin_without_apigroups.yaml
117 117
 os::cmd::expect_success "oc replace --config=${new_kubeconfig} clusterrole/alternate-cluster-admin -f ${workingdir}/cluster_admin_without_apigroups.yaml"
118 118
 
119 119
 # alternate-cluster-admin should NOT have the power add back star now
120 120
 os::cmd::try_until_failure "oc policy who-can update hpa.extensions | grep -q alternate-cluster-admin-user"
121 121
 resourceversion=$(oc get clusterrole/alternate-cluster-admin -o=jsonpath="{.metadata.resourceVersion}")
122
-cp ${OS_ROOT}/test/fixtures/bootstrappolicy/alternate_cluster_admin.yaml ${workingdir}
122
+cp ${OS_ROOT}/test/testdata/bootstrappolicy/alternate_cluster_admin.yaml ${workingdir}
123 123
 os::util::sed "s/RESOURCE_VERSION/${resourceversion}/g" ${workingdir}/alternate_cluster_admin.yaml
124 124
 os::cmd::expect_failure_and_text "oc replace --config=${new_kubeconfig} clusterrole/alternate-cluster-admin -f ${workingdir}/alternate_cluster_admin.yaml" "cannot grant extra privileges"
125 125
 
... ...
@@ -43,10 +43,10 @@ os::cmd::expect_failure_and_text 'oc process template-name --value=key=value --v
43 43
 os::cmd::expect_failure_and_text 'oc process template-name key=value --value=key=value' 'provided more than once: key'
44 44
 os::cmd::expect_failure_and_text 'oc process template-name key=value other=foo --value=key=value --value=other=baz' 'provided more than once: key, other'
45 45
 
46
-required_params="${OS_ROOT}/test/fixtures/template_required_params.yaml"
46
+required_params="${OS_ROOT}/test/testdata/template_required_params.yaml"
47 47
 
48 48
 # providing something other than a template is not OK
49
-os::cmd::expect_failure_and_text "oc process -f '${OS_ROOT}/test/fixtures/basic-users-binding.json'" 'not a valid Template but'
49
+os::cmd::expect_failure_and_text "oc process -f '${OS_ROOT}/test/testdata/basic-users-binding.json'" 'not a valid Template but'
50 50
 
51 51
 # not providing required parameter should fail
52 52
 os::cmd::expect_failure_and_text "oc process -f '${required_params}'" 'parameter required_param is required and must be specified'
... ...
@@ -40,21 +40,21 @@ echo "templates: ok"
40 40
 os::test::junit::declare_suite_end
41 41
 
42 42
 os::test::junit::declare_suite_start "cmd/templates/config"
43
-os::cmd::expect_success 'oc process -f test/templates/fixtures/guestbook.json -l app=guestbook | oc create -f -'
43
+os::cmd::expect_success 'oc process -f test/templates/testdata/guestbook.json -l app=guestbook | oc create -f -'
44 44
 os::cmd::expect_success_and_text 'oc status' 'frontend-service'
45 45
 echo "template+config: ok"
46 46
 os::test::junit::declare_suite_end
47 47
 
48 48
 os::test::junit::declare_suite_start "cmd/templates/parameters"
49 49
 # Joined parameter values are honored
50
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json -v ADMIN_USERNAME=myuser,ADMIN_PASSWORD=mypassword'    '"myuser"'
51
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json -v ADMIN_USERNAME=myuser,ADMIN_PASSWORD=mypassword'    '"mypassword"'
50
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json -v ADMIN_USERNAME=myuser,ADMIN_PASSWORD=mypassword'    '"myuser"'
51
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json -v ADMIN_USERNAME=myuser,ADMIN_PASSWORD=mypassword'    '"mypassword"'
52 52
 # Individually specified parameter values are honored
53
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json -v ADMIN_USERNAME=myuser -v ADMIN_PASSWORD=mypassword' '"myuser"'
54
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json -v ADMIN_USERNAME=myuser -v ADMIN_PASSWORD=mypassword' '"mypassword"'
53
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json -v ADMIN_USERNAME=myuser -v ADMIN_PASSWORD=mypassword' '"myuser"'
54
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json -v ADMIN_USERNAME=myuser -v ADMIN_PASSWORD=mypassword' '"mypassword"'
55 55
 # Argument values are honored
56
-os::cmd::expect_success_and_text 'oc process ADMIN_USERNAME=myuser ADMIN_PASSWORD=mypassword -f test/templates/fixtures/guestbook.json'       '"myuser"'
57
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json ADMIN_USERNAME=myuser ADMIN_PASSWORD=mypassword'       '"mypassword"'
56
+os::cmd::expect_success_and_text 'oc process ADMIN_USERNAME=myuser ADMIN_PASSWORD=mypassword -f test/templates/testdata/guestbook.json'       '"myuser"'
57
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json ADMIN_USERNAME=myuser ADMIN_PASSWORD=mypassword'       '"mypassword"'
58 58
 # Argument values with commas are honored
59 59
 os::cmd::expect_success 'oc create -f examples/sample-app/application-template-stibuild.json'
60 60
 os::cmd::expect_success_and_text 'oc process ruby-helloworld-sample MYSQL_USER=myself MYSQL_PASSWORD=my,1%pass'  '"myself"'
... ...
@@ -66,7 +66,7 @@ os::test::junit::declare_suite_end
66 66
 os::test::junit::declare_suite_start "cmd/templates/data-precision"
67 67
 # Run as cluster-admin to allow choosing any supplemental groups we want
68 68
 # Ensure large integers survive unstructured JSON creation
69
-os::cmd::expect_success 'oc create -f test/fixtures/template-type-precision.json'
69
+os::cmd::expect_success 'oc create -f test/testdata/template-type-precision.json'
70 70
 # ... and processing
71 71
 os::cmd::expect_success_and_text 'oc process template-type-precision' '1000030003'
72 72
 os::cmd::expect_success_and_text 'oc process template-type-precision' '2147483647'
... ...
@@ -22,7 +22,7 @@ trap os::test::junit::reconcile_output EXIT
22 22
 os::test::junit::declare_suite_start "cmd/volumes"
23 23
 # This test validates the 'volume' command
24 24
 
25
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml'
25
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml'
26 26
 
27 27
 os::cmd::expect_success_and_text 'oc volume dc/test-deployment-config --list' 'vol1'
28 28
 os::cmd::expect_success 'oc volume dc/test-deployment-config --add --name=vol0 -m /opt5'
... ...
@@ -192,12 +192,12 @@ os::cmd::expect_success_and_text "cat '${LOG_DIR}/kubectl-with-token.log'" 'kube
192 192
 
193 193
 echo "[INFO] Testing deployment logs and failing pre and mid hooks ..."
194 194
 # test hook selectors
195
-os::cmd::expect_success "oc create -f ${OS_ROOT}/test/fixtures/complete-dc-hooks.yaml"
195
+os::cmd::expect_success "oc create -f ${OS_ROOT}/test/testdata/complete-dc-hooks.yaml"
196 196
 os::cmd::try_until_text 'oc get pods -l openshift.io/deployer-pod.type=hook-pre  -o jsonpath={.items[*].status.phase}' '^Succeeded$'
197 197
 os::cmd::try_until_text 'oc get pods -l openshift.io/deployer-pod.type=hook-mid  -o jsonpath={.items[*].status.phase}' '^Succeeded$'
198 198
 os::cmd::try_until_text 'oc get pods -l openshift.io/deployer-pod.type=hook-post -o jsonpath={.items[*].status.phase}' '^Succeeded$'
199 199
 # test the pre hook on a rolling deployment
200
-oc create -f test/fixtures/failing-dc.yaml
200
+oc create -f test/testdata/failing-dc.yaml
201 201
 tryuntil oc get rc/failing-dc-1
202 202
 oc logs -f dc/failing-dc
203 203
 wait_for_command "oc get rc/failing-dc-1 --template={{.metadata.annotations}} | grep openshift.io/deployment.phase:Failed" $((60*TIME_SEC))
... ...
@@ -210,7 +210,7 @@ os::cmd::expect_success_and_text 'oc logs --previous --since-time=2000-01-01T12:
210 210
 os::cmd::expect_success_and_text 'oc logs --previous --since-time=2000-01-01T12:34:56Z --loglevel=6 dc/failing-dc 2>&1' 'test pre hook executed'
211 211
 oc delete dc/failing-dc
212 212
 # test the mid hook on a recreate deployment and the health check
213
-oc create -f test/fixtures/failing-dc-mid.yaml
213
+oc create -f test/testdata/failing-dc-mid.yaml
214 214
 tryuntil oc get rc/failing-dc-mid-1
215 215
 oc logs -f dc/failing-dc-mid
216 216
 wait_for_command "oc get rc/failing-dc-mid-1 --template={{.metadata.annotations}} | grep openshift.io/deployment.phase:Failed" $((60*TIME_SEC))
... ...
@@ -252,7 +252,7 @@ os::cmd::expect_success 'oc logs buildconfig/ruby-sample-build --loglevel=6'
252 252
 echo "logs: ok"
253 253
 
254 254
 echo "[INFO] Starting a deployment to test scaling and image tag..."
255
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml'
255
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml'
256 256
 # scaling which might conflict with the deployment should work
257 257
 os::cmd::expect_success 'oc scale dc/test-deployment-config --replicas=2'
258 258
 os::cmd::try_until_text 'oc get rc/test-deployment-config-1 -o yaml' 'Complete'
... ...
@@ -341,7 +341,7 @@ echo "[INFO] Validating pod.spec.nodeSelector rejections"
341 341
 # Create a project that enforces an impossible to satisfy nodeSelector, and two pods, one of which has an explicit node name
342 342
 os::cmd::expect_success "openshift admin new-project node-selector --description='This is an example project to test node selection prevents deployment' --admin='e2e-user' --node-selector='impossible-label=true'"
343 343
 NODE_NAME=`oc get node --no-headers | awk '{print $1}'`
344
-os::cmd::expect_success "oc process -n node-selector -v NODE_NAME='${NODE_NAME}' -f test/fixtures/node-selector/pods.json | oc create -n node-selector -f -"
344
+os::cmd::expect_success "oc process -n node-selector -v NODE_NAME='${NODE_NAME}' -f test/testdata/node-selector/pods.json | oc create -n node-selector -f -"
345 345
 # The pod without a node name should fail to schedule
346 346
 os::cmd::try_until_text 'oc get events -n node-selector' 'pod-without-node-name.+FailedScheduling' $((20*TIME_SEC))
347 347
 # The pod with a node name should be rejected by the kubelet
... ...
@@ -120,7 +120,7 @@ var _ = g.Describe("[<test bucket>] <Testing scenario>", func() {
120 120
 	defer g.GinkgoRecover()
121 121
 	var (
122 122
 		oc = exutil.NewCLI("test-name", exutil.KubeConfigPath())
123
-		testFixture = filepath.Join("fixtures", "test.json")
123
+		testFixture = filepath.Join("testdata", "test.json")
124 124
 	)
125 125
 })
126 126
 ```
... ...
@@ -131,7 +131,7 @@ The test suite should be organized into lower-level Ginkgo describe(s) container
131 131
 var _ = g.Describe("[default] STI build", func() {
132 132
 	defer GinkgoRecover()
133 133
 	var (
134
-		stiBuildFixture = filepath.Join("fixtures", "test-build.json")
134
+		stiBuildFixture = filepath.Join("testdata", "test-build.json")
135 135
 		oc              = exutil.NewCLI("build-sti", kubeConfigPath())
136 136
 	)
137 137
 
... ...
@@ -13,8 +13,8 @@ import (
13 13
 var _ = g.Describe("[builds][Slow] builds should have deadlines", func() {
14 14
 	defer g.GinkgoRecover()
15 15
 	var (
16
-		sourceFixture = exutil.FixturePath("..", "extended", "fixtures", "test-cds-sourcebuild.json")
17
-		dockerFixture = exutil.FixturePath("..", "extended", "fixtures", "test-cds-dockerbuild.json")
16
+		sourceFixture = exutil.FixturePath("..", "extended", "testdata", "test-cds-sourcebuild.json")
17
+		dockerFixture = exutil.FixturePath("..", "extended", "testdata", "test-cds-dockerbuild.json")
18 18
 		oc            = exutil.NewCLI("cli-start-build", exutil.KubeConfigPath())
19 19
 	)
20 20
 
... ...
@@ -17,7 +17,7 @@ var _ = g.Describe("[builds][pullsecret][Conformance] docker build using a pull
17 17
 	)
18 18
 
19 19
 	var (
20
-		buildFixture = exutil.FixturePath("fixtures", "test-docker-build-pullsecret.json")
20
+		buildFixture = exutil.FixturePath("testdata", "test-docker-build-pullsecret.json")
21 21
 		oc           = exutil.NewCLI("docker-build-pullsecret", exutil.KubeConfigPath())
22 22
 	)
23 23
 
... ...
@@ -17,7 +17,7 @@ var _ = g.Describe("[builds][quota][Slow] docker build with a quota", func() {
17 17
 	)
18 18
 
19 19
 	var (
20
-		buildFixture = exutil.FixturePath("fixtures", "test-docker-build-quota.json")
20
+		buildFixture = exutil.FixturePath("testdata", "test-docker-build-quota.json")
21 21
 		oc           = exutil.NewCLI("docker-build-quota", exutil.KubeConfigPath())
22 22
 	)
23 23
 
... ...
@@ -36,7 +36,7 @@ var _ = g.Describe("[builds][quota][Slow] docker build with a quota", func() {
36 36
 			o.Expect(err).NotTo(o.HaveOccurred())
37 37
 
38 38
 			g.By("starting a test build")
39
-			_, err = oc.Run("start-build").Args("docker-build-quota", "--from-dir", exutil.FixturePath("fixtures", "build-quota")).Output()
39
+			_, err = oc.Run("start-build").Args("docker-build-quota", "--from-dir", exutil.FixturePath("testdata", "build-quota")).Output()
40 40
 			o.Expect(err).NotTo(o.HaveOccurred())
41 41
 
42 42
 			g.By("expecting the build is in Failed phase")
... ...
@@ -87,7 +87,7 @@ var _ = g.Describe("[LocalNode][builds] forcePull should affect pulling builder
87 87
 		exutil.DumpImage(corruptor)
88 88
 
89 89
 		// create the image streams and build configs for a test case specific builders
90
-		setupPath := exutil.FixturePath("fixtures", "forcepull-setup.json")
90
+		setupPath := exutil.FixturePath("testdata", "forcepull-setup.json")
91 91
 		err := exutil.CreateResource(setupPath, oc)
92 92
 
93 93
 		// kick off the build for the new builder image just for force pull so we can corrupt them without conflicting with
... ...
@@ -114,7 +114,7 @@ var _ = g.Describe("[LocalNode][builds] forcePull should affect pulling builder
114 114
 
115 115
 		//update the build configs in the json for the app/lang builds to point to the builder images in the internal docker registry
116 116
 		// and then create the build config resources
117
-		pre := exutil.FixturePath("fixtures", "forcepull-test.json")
117
+		pre := exutil.FixturePath("testdata", "forcepull-test.json")
118 118
 		post := exutil.ArtifactPath("forcepull-test.json")
119 119
 		varSubDest = authCfg.ServerAddress + "/" + oc.Namespace()
120 120
 		err = exutil.VarSubOnFile(pre, post, varSubSrc, varSubDest)
... ...
@@ -39,9 +39,9 @@ var _ = g.Describe("[builds][Slow] can use private repositories as build input",
39 39
 	)
40 40
 
41 41
 	var (
42
-		gitServerFixture          = exutil.FixturePath("fixtures", "test-gitserver.yaml")
43
-		gitServerTokenAuthFixture = exutil.FixturePath("fixtures", "test-gitserver-tokenauth.yaml")
44
-		testBuildFixture          = exutil.FixturePath("fixtures", "test-auth-build.yaml")
42
+		gitServerFixture          = exutil.FixturePath("testdata", "test-gitserver.yaml")
43
+		gitServerTokenAuthFixture = exutil.FixturePath("testdata", "test-gitserver-tokenauth.yaml")
44
+		testBuildFixture          = exutil.FixturePath("testdata", "test-auth-build.yaml")
45 45
 		oc                        = exutil.NewCLI("build-sti-private-repo", exutil.KubeConfigPath())
46 46
 		caCertPath                = filepath.Join(filepath.Dir(exutil.KubeConfigPath()), "ca.crt")
47 47
 	)
... ...
@@ -12,7 +12,7 @@ import (
12 12
 var _ = g.Describe("[builds][Slow] build can have Docker image source", func() {
13 13
 	defer g.GinkgoRecover()
14 14
 	var (
15
-		buildFixture     = exutil.FixturePath("fixtures", "test-imagesource-build.yaml")
15
+		buildFixture     = exutil.FixturePath("testdata", "test-imagesource-build.yaml")
16 16
 		oc               = exutil.NewCLI("build-image-source", exutil.KubeConfigPath())
17 17
 		imageSourceLabel = exutil.ParseLabelsOrDie("app=imagesourceapp")
18 18
 		imageDockerLabel = exutil.ParseLabelsOrDie("app=imagedockerapp")
... ...
@@ -13,9 +13,9 @@ import (
13 13
 var _ = g.Describe("[builds][Slow] result image should have proper labels set", func() {
14 14
 	defer g.GinkgoRecover()
15 15
 	var (
16
-		imageStreamFixture = exutil.FixturePath("..", "integration", "fixtures", "test-image-stream.json")
17
-		stiBuildFixture    = exutil.FixturePath("fixtures", "test-s2i-build.json")
18
-		dockerBuildFixture = exutil.FixturePath("fixtures", "test-docker-build.json")
16
+		imageStreamFixture = exutil.FixturePath("..", "integration", "testdata", "test-image-stream.json")
17
+		stiBuildFixture    = exutil.FixturePath("testdata", "test-s2i-build.json")
18
+		dockerBuildFixture = exutil.FixturePath("testdata", "test-docker-build.json")
19 19
 		oc                 = exutil.NewCLI("build-sti-labels", exutil.KubeConfigPath())
20 20
 	)
21 21
 
... ...
@@ -12,8 +12,8 @@ import (
12 12
 var _ = g.Describe("[builds][Conformance] build without output image", func() {
13 13
 	defer g.GinkgoRecover()
14 14
 	var (
15
-		dockerImageFixture = exutil.FixturePath("fixtures", "test-docker-no-outputname.json")
16
-		s2iImageFixture    = exutil.FixturePath("fixtures", "test-s2i-no-outputname.json")
15
+		dockerImageFixture = exutil.FixturePath("testdata", "test-docker-no-outputname.json")
16
+		s2iImageFixture    = exutil.FixturePath("testdata", "test-s2i-no-outputname.json")
17 17
 		oc                 = exutil.NewCLI("build-no-outputname", exutil.KubeConfigPath())
18 18
 	)
19 19
 
... ...
@@ -12,9 +12,9 @@ import (
12 12
 var _ = g.Describe("[builds] build with empty source", func() {
13 13
 	defer g.GinkgoRecover()
14 14
 	var (
15
-		buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-nosrc-build.json")
15
+		buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-nosrc-build.json")
16 16
 		oc           = exutil.NewCLI("cli-build-nosrc", exutil.KubeConfigPath())
17
-		exampleBuild = exutil.FixturePath("..", "extended", "fixtures", "test-build-app")
17
+		exampleBuild = exutil.FixturePath("..", "extended", "testdata", "test-build-app")
18 18
 	)
19 19
 
20 20
 	g.JustBeforeEach(func() {
... ...
@@ -14,7 +14,7 @@ import (
14 14
 var _ = g.Describe("[builds][Slow] the s2i build should support proxies", func() {
15 15
 	defer g.GinkgoRecover()
16 16
 	var (
17
-		buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-build-proxy.json")
17
+		buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-build-proxy.json")
18 18
 		oc           = exutil.NewCLI("build-proxy", exutil.KubeConfigPath())
19 19
 	)
20 20
 
... ...
@@ -14,7 +14,7 @@ import (
14 14
 var _ = g.Describe("[builds][Conformance] remove all builds when build configuration is removed", func() {
15 15
 	defer g.GinkgoRecover()
16 16
 	var (
17
-		buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-build.json")
17
+		buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-build.json")
18 18
 		oc           = exutil.NewCLI("cli-remove-build", exutil.KubeConfigPath())
19 19
 	)
20 20
 
... ...
@@ -12,7 +12,7 @@ import (
12 12
 var _ = g.Describe("[builds] build have source revision metadata", func() {
13 13
 	defer g.GinkgoRecover()
14 14
 	var (
15
-		buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-build-revision.json")
15
+		buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-build-revision.json")
16 16
 		oc           = exutil.NewCLI("cli-build-revision", exutil.KubeConfigPath())
17 17
 	)
18 18
 
... ...
@@ -26,7 +26,7 @@ var _ = g.Describe("[builds][Slow] using build configuration runPolicy", func()
26 26
 		err := exutil.WaitForBuilderAccount(oc.KubeREST().ServiceAccounts(oc.Namespace()))
27 27
 		o.Expect(err).NotTo(o.HaveOccurred())
28 28
 		// Create all fixtures
29
-		oc.Run("create").Args("-f", exutil.FixturePath("..", "extended", "fixtures", "run_policy")).Execute()
29
+		oc.Run("create").Args("-f", exutil.FixturePath("..", "extended", "testdata", "run_policy")).Execute()
30 30
 	})
31 31
 
32 32
 	g.Describe("build configuration with Parallel build run policy", func() {
... ...
@@ -15,8 +15,8 @@ import (
15 15
 var _ = g.Describe("[builds][Slow] Capabilities should be dropped for s2i builders", func() {
16 16
 	defer g.GinkgoRecover()
17 17
 	var (
18
-		s2ibuilderFixture      = exutil.FixturePath("..", "extended", "fixtures", "s2i-dropcaps", "rootable-ruby")
19
-		rootAccessBuildFixture = exutil.FixturePath("..", "extended", "fixtures", "s2i-dropcaps", "root-access-build.yaml")
18
+		s2ibuilderFixture      = exutil.FixturePath("..", "extended", "testdata", "s2i-dropcaps", "rootable-ruby")
19
+		rootAccessBuildFixture = exutil.FixturePath("..", "extended", "testdata", "s2i-dropcaps", "root-access-build.yaml")
20 20
 		oc                     = exutil.NewCLI("build-s2i-dropcaps", exutil.KubeConfigPath())
21 21
 	)
22 22
 
... ...
@@ -20,9 +20,9 @@ var _ = g.Describe("[builds][Slow] s2i build with environment file in sources",
20 20
 	)
21 21
 
22 22
 	var (
23
-		imageStreamFixture   = exutil.FixturePath("..", "integration", "fixtures", "test-image-stream.json")
24
-		stiEnvBuildFixture   = exutil.FixturePath("fixtures", "test-env-build.json")
25
-		podAndServiceFixture = exutil.FixturePath("fixtures", "test-build-podsvc.json")
23
+		imageStreamFixture   = exutil.FixturePath("..", "integration", "testdata", "test-image-stream.json")
24
+		stiEnvBuildFixture   = exutil.FixturePath("testdata", "test-env-build.json")
25
+		podAndServiceFixture = exutil.FixturePath("testdata", "test-build-podsvc.json")
26 26
 		oc                   = exutil.NewCLI("build-sti-env", exutil.KubeConfigPath())
27 27
 	)
28 28
 
... ...
@@ -20,8 +20,8 @@ var _ = g.Describe("[builds][Slow] incremental s2i build", func() {
20 20
 	)
21 21
 
22 22
 	var (
23
-		templateFixture      = exutil.FixturePath("fixtures", "incremental-auth-build.json")
24
-		podAndServiceFixture = exutil.FixturePath("fixtures", "test-build-podsvc.json")
23
+		templateFixture      = exutil.FixturePath("testdata", "incremental-auth-build.json")
24
+		podAndServiceFixture = exutil.FixturePath("testdata", "test-build-podsvc.json")
25 25
 		oc                   = exutil.NewCLI("build-sti-inc", exutil.KubeConfigPath())
26 26
 	)
27 27
 
... ...
@@ -17,7 +17,7 @@ var _ = g.Describe("[builds][Conformance] s2i build with a quota", func() {
17 17
 	)
18 18
 
19 19
 	var (
20
-		buildFixture = exutil.FixturePath("fixtures", "test-s2i-build-quota.json")
20
+		buildFixture = exutil.FixturePath("testdata", "test-s2i-build-quota.json")
21 21
 		oc           = exutil.NewCLI("s2i-build-quota", exutil.KubeConfigPath())
22 22
 	)
23 23
 
... ...
@@ -36,7 +36,7 @@ var _ = g.Describe("[builds][Conformance] s2i build with a quota", func() {
36 36
 			o.Expect(err).NotTo(o.HaveOccurred())
37 37
 
38 38
 			g.By("starting a test build")
39
-			_, err = oc.Run("start-build").Args("s2i-build-quota", "--from-dir", exutil.FixturePath("fixtures", "build-quota")).Output()
39
+			_, err = oc.Run("start-build").Args("s2i-build-quota", "--from-dir", exutil.FixturePath("testdata", "build-quota")).Output()
40 40
 			o.Expect(err).NotTo(o.HaveOccurred())
41 41
 
42 42
 			g.By("expecting the build is in Complete phase")
... ...
@@ -13,7 +13,7 @@ import (
13 13
 var _ = g.Describe("[builds][Slow] can use build secrets", func() {
14 14
 	defer g.GinkgoRecover()
15 15
 	var (
16
-		buildSecretBaseDir   = exutil.FixturePath("fixtures", "build-secrets")
16
+		buildSecretBaseDir   = exutil.FixturePath("testdata", "build-secrets")
17 17
 		secretsFixture       = filepath.Join(buildSecretBaseDir, "test-secret.json")
18 18
 		secondSecretsFixture = filepath.Join(buildSecretBaseDir, "test-secret-2.json")
19 19
 		isFixture            = filepath.Join(buildSecretBaseDir, "test-is.json")
... ...
@@ -16,9 +16,9 @@ import (
16 16
 var _ = g.Describe("[builds][Slow] starting a build using CLI", func() {
17 17
 	defer g.GinkgoRecover()
18 18
 	var (
19
-		buildFixture   = exutil.FixturePath("..", "extended", "fixtures", "test-build.json")
20
-		exampleGemfile = exutil.FixturePath("..", "extended", "fixtures", "test-build-app", "Gemfile")
21
-		exampleBuild   = exutil.FixturePath("..", "extended", "fixtures", "test-build-app")
19
+		buildFixture   = exutil.FixturePath("..", "extended", "testdata", "test-build.json")
20
+		exampleGemfile = exutil.FixturePath("..", "extended", "testdata", "test-build-app", "Gemfile")
21
+		exampleBuild   = exutil.FixturePath("..", "extended", "testdata", "test-build-app")
22 22
 		oc             = exutil.NewCLI("cli-start-build", exutil.KubeConfigPath())
23 23
 	)
24 24
 
... ...
@@ -95,7 +95,7 @@ os::test::junit::declare_suite_end
95 95
 os::test::junit::declare_suite_start "extended/cmd/variable-expansion"
96 96
 echo "[INFO] Running env variable expansion tests"
97 97
 VERBOSE=true os::cmd::expect_success "oc new-project envtest"
98
-os::cmd::expect_success "oc create -f test/extended/fixtures/test-env-pod.json"
98
+os::cmd::expect_success "oc create -f test/extended/testdata/test-env-pod.json"
99 99
 os::cmd::try_until_text "oc get pods" "Running"
100 100
 os::cmd::expect_success_and_text "oc exec test-pod env" "podname=test-pod"
101 101
 os::cmd::expect_success_and_text "oc exec test-pod env" "podname_composed=test-pod_composed"
... ...
@@ -128,26 +128,26 @@ os::cmd::expect_success "oc delete secrets --all"
128 128
 os::cmd::expect_success "oc secrets new image-ns-pull .dockerconfigjson=${DOCKER_CONFIG_JSON}"
129 129
 os::cmd::expect_success "oc secrets new-dockercfg image-ns-pull-old --docker-email=fake@example.org --docker-username=imagensbuilder --docker-server=${docker_registry} --docker-password=${token}"
130 130
 
131
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/pod-with-no-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
131
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/pod-with-no-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
132 132
 os::cmd::try_until_text "oc describe pod/no-pull-pod" "Back-off pulling image"
133 133
 os::cmd::expect_success "oc delete pods --all"
134 134
 
135
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/pod-with-new-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
135
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/pod-with-new-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
136 136
 os::cmd::try_until_text "oc get pods/new-pull-pod -o jsonpath='{.status.containerStatuses[0].imageID}'" "docker"
137 137
 os::cmd::expect_success "oc delete pods --all"
138 138
 os::cmd::expect_success "docker rmi -f ${docker_registry}/image-ns/busybox:latest"
139 139
 
140
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/pod-with-old-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
140
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/pod-with-old-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
141 141
 os::cmd::try_until_text "oc get pods/old-pull-pod -o jsonpath='{.status.containerStatuses[0].imageID}'" "docker"
142 142
 os::cmd::expect_success "oc delete pods --all"
143 143
 os::cmd::expect_success "docker rmi -f ${docker_registry}/image-ns/busybox:latest"
144 144
 
145
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/dc-with-old-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
145
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/dc-with-old-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
146 146
 os::cmd::try_until_text "oc get pods/my-dc-old-1-hook-pre -o jsonpath='{.status.containerStatuses[0].imageID}'" "docker"
147 147
 os::cmd::expect_success "oc delete all --all"
148 148
 os::cmd::expect_success "docker rmi -f ${docker_registry}/image-ns/busybox:latest"
149 149
 
150
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/dc-with-new-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
150
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/dc-with-new-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
151 151
 os::cmd::try_until_text "oc get pods/my-dc-1-hook-pre -o jsonpath='{.status.containerStatuses[0].imageID}'" "docker"
152 152
 os::cmd::expect_success "oc delete all --all"
153 153
 os::cmd::expect_success "docker rmi -f ${docker_registry}/image-ns/busybox:latest"
... ...
@@ -166,12 +166,12 @@ os::cmd::expect_success 'oc create dc nginx --image=nginx -- sh -c "nginx -c /et
166 166
 os::cmd::expect_success "oc expose dc/nginx --port=443"
167 167
 os::cmd::expect_success "oc annotate svc/nginx service.alpha.openshift.io/serving-cert-secret-name=nginx-ssl-key"
168 168
 os::cmd::expect_success "oc volumes dc/nginx --add --secret-name=nginx-ssl-key  --mount-path=/etc/serving-cert"
169
-os::cmd::expect_success "oc create configmap default-conf --from-file=test/extended/fixtures/service-serving-cert/nginx-serving-cert.conf"
169
+os::cmd::expect_success "oc create configmap default-conf --from-file=test/extended/testdata/service-serving-cert/nginx-serving-cert.conf"
170 170
 os::cmd::expect_success "oc set volumes dc/nginx --add --configmap-name=default-conf --mount-path=/etc/nginx/conf.d"
171 171
 os::cmd::try_until_text "oc get pods -l deployment-config.name=nginx" 'Running'
172 172
 
173 173
 # only show single pods in status if they are really single
174
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml'
174
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml'
175 175
 os::cmd::try_until_text 'oc status' 'dc\/test-deployment-config deploys docker\.io\/openshift\/origin-pod:latest' "$(( 2 * TIME_MIN ))"
176 176
 os::cmd::try_until_text 'oc status' 'deployment #1 deployed.*- 1 pod' "$(( 2 * TIME_MIN ))"
177 177
 os::cmd::expect_success_and_not_text 'oc status' 'pod\/test-deployment-config-1-[0-9a-z]{5} runs openshift\/origin-pod'
... ...
@@ -23,11 +23,11 @@ var _ = g.Describe("deploymentconfigs", func() {
23 23
 	defer g.GinkgoRecover()
24 24
 	var (
25 25
 		oc                      = exutil.NewCLI("cli-deployment", exutil.KubeConfigPath())
26
-		deploymentFixture       = exutil.FixturePath("..", "extended", "fixtures", "test-deployment-test.yaml")
27
-		simpleDeploymentFixture = exutil.FixturePath("..", "extended", "fixtures", "deployment-simple.yaml")
28
-		customDeploymentFixture = exutil.FixturePath("..", "extended", "fixtures", "custom-deployment.yaml")
29
-		generationFixture       = exutil.FixturePath("..", "extended", "fixtures", "test-deployment.yaml")
30
-		pausedDeploymentFixture = exutil.FixturePath("..", "extended", "fixtures", "paused-deployment.yaml")
26
+		deploymentFixture       = exutil.FixturePath("..", "extended", "testdata", "test-deployment-test.yaml")
27
+		simpleDeploymentFixture = exutil.FixturePath("..", "extended", "testdata", "deployment-simple.yaml")
28
+		customDeploymentFixture = exutil.FixturePath("..", "extended", "testdata", "custom-deployment.yaml")
29
+		generationFixture       = exutil.FixturePath("..", "extended", "testdata", "test-deployment.yaml")
30
+		pausedDeploymentFixture = exutil.FixturePath("..", "extended", "testdata", "paused-deployment.yaml")
31 31
 	)
32 32
 
33 33
 	g.Describe("when run iteratively", func() {
... ...
@@ -83,7 +83,7 @@ func waitForJenkinsActivity(uri, verificationString string, status int) error {
83 83
 }
84 84
 
85 85
 func jenkinsJobBytes(filename, namespace string) []byte {
86
-	pre := exutil.FixturePath("fixtures", filename)
86
+	pre := exutil.FixturePath("testdata", filename)
87 87
 	post := exutil.ArtifactPath(filename)
88 88
 	err := exutil.VarSubOnFile(pre, post, "PROJECT_NAME", namespace)
89 89
 	o.Expect(err).NotTo(o.HaveOccurred())
... ...
@@ -110,7 +110,7 @@ var _ = g.Describe("[jenkins][Slow] openshift pipeline plugin", func() {
110 110
 		var testingSnapshot bool
111 111
 		if len(hexIDs) > 0 && err == nil {
112 112
 			// found an openshift pipeline plugin test image, must be testing a proposed change to the plugin
113
-			jenkinsEphemeralPath = exutil.FixturePath("fixtures", "jenkins-ephemeral-template-test-new-plugin.json")
113
+			jenkinsEphemeralPath = exutil.FixturePath("testdata", "jenkins-ephemeral-template-test-new-plugin.json")
114 114
 			testingSnapshot = true
115 115
 		} else {
116 116
 			// no test image, testing the base jenkins image with the current, supported version of the plugin
... ...
@@ -20,7 +20,7 @@ var _ = g.Describe("[job] openshift can execute jobs", func() {
20 20
 		g.It("should create and run a job in user project", func() {
21 21
 			for _, ver := range []string{"v1beta1", "v1"} {
22 22
 				oc.SetOutputDir(exeutil.TestContext.OutputDir)
23
-				configPath := exeutil.FixturePath("fixtures", "jobs", fmt.Sprintf("%s.yaml", ver))
23
+				configPath := exeutil.FixturePath("testdata", "jobs", fmt.Sprintf("%s.yaml", ver))
24 24
 				name := fmt.Sprintf("simple%s", ver)
25 25
 				labels := fmt.Sprintf("app=%s", name)
26 26
 
... ...
@@ -53,7 +53,7 @@ oc login ${MASTER_ADDR} -u ldap -p password --certificate-authority=${MASTER_CON
53 53
 oc new-project openldap
54 54
 
55 55
 # create all the resources we need
56
-oc create -f test/extended/fixtures/ldap
56
+oc create -f test/extended/testdata/ldap
57 57
 
58 58
 is_event_template=(               \
59 59
 "{{with \$tags := .status.tags}}" \
... ...
@@ -17,7 +17,7 @@ import (
17 17
 var _ = g.Describe("[networking][router] openshift routers", func() {
18 18
 	defer g.GinkgoRecover()
19 19
 	var (
20
-		configPath = exutil.FixturePath("fixtures", "scoped-router.yaml")
20
+		configPath = exutil.FixturePath("testdata", "scoped-router.yaml")
21 21
 		oc         = exutil.NewCLI("scoped-router", exutil.KubeConfigPath())
22 22
 	)
23 23
 
... ...
@@ -12,10 +12,10 @@
12 12
     "source":{
13 13
       "type":"Git",
14 14
       "git":{
15
-        "uri":"https://github.com/mfojtik/origin",
15
+        "uri":"https://github.com/openshift/origin",
16 16
         "ref": "secrets"
17 17
       },
18
-      "contextDir":"test/extended/fixtures/build-secrets",
18
+      "contextDir":"test/extended/testdata/build-secrets",
19 19
       "secrets": [
20 20
         {
21 21
           "secret": { "name": "testsecret" },
... ...
@@ -12,10 +12,10 @@
12 12
     "source":{
13 13
       "type":"Git",
14 14
       "git":{
15
-        "uri":"https://github.com/mfojtik/origin",
15
+        "uri":"https://github.com/openshift/origin",
16 16
         "ref": "secrets"
17 17
       },
18
-      "contextDir":"test/extended/fixtures/test-build-app",
18
+      "contextDir":"test/extended/testdata/test-build-app",
19 19
       "secrets": [
20 20
         {
21 21
           "secret": { "name": "testsecret" },
... ...
@@ -39,7 +39,7 @@
39 39
           "kind":"DockerImage",
40 40
           "name":"centos/ruby-22-centos7"
41 41
         },
42
-        "scripts":"https://raw.githubusercontent.com/mfojtik/origin/secrets/test/extended/fixtures/build-secrets/s2i"
42
+        "scripts":"https://raw.githubusercontent.com/openshift/origin/secrets/test/extended/testdata/build-secrets/s2i"
43 43
       }
44 44
     },
45 45
     "output":{
... ...
@@ -12,7 +12,7 @@
12 12
       "git":{
13 13
         "uri":"https://github.com/openshift/origin"
14 14
       },
15
-      "contextDir":"test/extended/fixtures/test-build-app"
15
+      "contextDir":"test/extended/testdata/test-build-app"
16 16
     },
17 17
     "strategy":{
18 18
       "type":"Docker",
... ...
@@ -14,7 +14,7 @@
14 14
       "git":{
15 15
         "uri":"https://github.com/openshift/origin"
16 16
       },
17
-      "contextDir":"test/extended/fixtures/test-build-app"
17
+      "contextDir":"test/extended/testdata/test-build-app"
18 18
     },
19 19
     "strategy":{
20 20
       "type":"Docker",
... ...
@@ -14,7 +14,7 @@
14 14
       "git":{
15 15
         "uri":"https://github.com/openshift/origin"
16 16
       },
17
-      "contextDir":"test/extended/fixtures/sti-environment-build-app"
17
+      "contextDir":"test/extended/testdata/sti-environment-build-app"
18 18
     },
19 19
     "strategy":{
20 20
       "type":"Source",
... ...
@@ -14,7 +14,7 @@
14 14
       "git":{
15 15
         "uri":"https://github.com/openshift/origin"
16 16
       },
17
-      "contextDir":"test/extended/fixtures/test-build-app"
17
+      "contextDir":"test/extended/testdata/test-build-app"
18 18
     },
19 19
     "strategy":{
20 20
       "type":"Source",
... ...
@@ -12,10 +12,10 @@
12 12
     "source": {
13 13
       "type": "Git",
14 14
       "git": {
15
-        "uri": "https://github.com/mfojtik/origin",
15
+        "uri": "https://github.com/openshift/origin",
16 16
         "ref": "build_secret_extended"
17 17
       },
18
-      "contextDir": "test/extended/fixtures/custom-secret-builder"
18
+      "contextDir": "test/extended/testdata/custom-secret-builder"
19 19
     },
20 20
     "strategy": {
21 21
       "type": "Docker"
... ...
@@ -139,7 +139,7 @@ func TestUnprivilegedNewProjectFromTemplate(t *testing.T) {
139 139
 		t.Fatalf("unexpected error: %v", err)
140 140
 	}
141 141
 
142
-	template, err := testutil.GetTemplateFixture("fixtures/project-request-template-with-quota.yaml")
142
+	template, err := testutil.GetTemplateFixture("testdata/project-request-template-with-quota.yaml")
143 143
 	if err != nil {
144 144
 		t.Fatalf("unexpected error: %v", err)
145 145
 	}
... ...
@@ -275,7 +275,7 @@ func TestWebhookGitHubPing(t *testing.T) {
275 275
 }
276 276
 
277 277
 func postFile(client restclient.HTTPClient, event, filename, url string, expStatusCode int, t *testing.T) {
278
-	data, err := ioutil.ReadFile("../../pkg/build/webhook/github/fixtures/" + filename)
278
+	data, err := ioutil.ReadFile("../../pkg/build/webhook/github/testdata/" + filename)
279 279
 	if err != nil {
280 280
 		t.Fatalf("Failed to open %s: %v", filename, err)
281 281
 	}
... ...
@@ -38,7 +38,7 @@ items:
38 38
     postCommit: {}
39 39
     resources: {}
40 40
     source:
41
-      contextDir: test/fixtures/app-scenarios/docker-compose/complex/nginx
41
+      contextDir: test/testdata/app-scenarios/docker-compose/complex/nginx
42 42
       git:
43 43
         ref: libcompose
44 44
         uri: git@github.com:openshift/origin.git
... ...
@@ -100,7 +100,7 @@ items:
100 100
     postCommit: {}
101 101
     resources: {}
102 102
     source:
103
-      contextDir: test/fixtures/app-scenarios/docker-compose/complex/app
103
+      contextDir: test/testdata/app-scenarios/docker-compose/complex/app
104 104
       git:
105 105
         ref: libcompose
106 106
         uri: git@github.com:openshift/origin.git
... ...
@@ -30,7 +30,7 @@ items:
30 30
     postCommit: {}
31 31
     resources: {}
32 32
     source:
33
-      contextDir: test/fixtures/app-scenarios/docker-compose/complex/nginx
33
+      contextDir: test/testdata/app-scenarios/docker-compose/complex/nginx
34 34
       git:
35 35
         ref: master
36 36
         uri: git@github.com:openshift/origin.git
... ...
@@ -84,7 +84,7 @@ items:
84 84
     postCommit: {}
85 85
     resources: {}
86 86
     source:
87
-      contextDir: test/fixtures/app-scenarios/docker-compose/complex/app
87
+      contextDir: test/testdata/app-scenarios/docker-compose/complex/app
88 88
       git:
89 89
         ref: master
90 90
         uri: git@github.com:openshift/origin.git
... ...
@@ -46,8 +46,8 @@ func TestExtractTestName(t *testing.T) {
46 46
 		},
47 47
 		{
48 48
 			name:         "test conclusion success",
49
-			testLine:     `SUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`,
50
-			expectedName: `hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`,
49
+			testLine:     `SUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`,
50
+			expectedName: `hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`,
51 51
 		},
52 52
 		{
53 53
 			name:         "test conclusion failure",
... ...
@@ -56,8 +56,8 @@ func TestExtractTestName(t *testing.T) {
56 56
 		},
57 57
 		{
58 58
 			name:         "failed print: test conclusion success",
59
-			testLine:     `some other textSUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`,
60
-			expectedName: `hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`,
59
+			testLine:     `some other textSUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`,
60
+			expectedName: `hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`,
61 61
 		},
62 62
 	}
63 63
 
... ...
@@ -116,7 +116,7 @@ func TestExtractDuration(t *testing.T) {
116 116
 	}{
117 117
 		{
118 118
 			name:             "test conclusion success",
119
-			testLine:         `SUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`,
119
+			testLine:         `SUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`,
120 120
 			expectedDuration: "0.041s",
121 121
 		},
122 122
 		{