| ... | ... |
@@ -104,14 +104,14 @@ func TestExampleObjectSchemas(t *testing.T) {
|
| 104 | 104 |
"postgresql-ephemeral-template": &templateapi.Template{},
|
| 105 | 105 |
"mongodb-ephemeral-template": &templateapi.Template{},
|
| 106 | 106 |
}, |
| 107 |
- "../test/extended/fixtures/ldap": {
|
|
| 107 |
+ "../test/extended/testdata/ldap": {
|
|
| 108 | 108 |
"ldapserver-buildconfig": &buildapi.BuildConfig{},
|
| 109 | 109 |
"ldapserver-deploymentconfig": &deployapi.DeploymentConfig{},
|
| 110 | 110 |
"ldapserver-imagestream": &imageapi.ImageStream{},
|
| 111 | 111 |
"ldapserver-imagestream-testenv": &imageapi.ImageStream{},
|
| 112 | 112 |
"ldapserver-service": &kapi.Service{},
|
| 113 | 113 |
}, |
| 114 |
- "../test/integration/fixtures": {
|
|
| 114 |
+ "../test/integration/testdata": {
|
|
| 115 | 115 |
// TODO fix this test to handle json and yaml |
| 116 | 116 |
"project-request-template-with-quota": nil, // skip a yaml file |
| 117 | 117 |
"test-deployment-config": &deployapi.DeploymentConfig{},
|
| ... | ... |
@@ -123,7 +123,7 @@ func TestExampleObjectSchemas(t *testing.T) {
|
| 123 | 123 |
"test-buildcli": &kapi.List{},
|
| 124 | 124 |
"test-buildcli-beta2": &kapi.List{},
|
| 125 | 125 |
}, |
| 126 |
- "../test/templates/fixtures": {
|
|
| 126 |
+ "../test/templates/testdata": {
|
|
| 127 | 127 |
"crunchydata-pod": nil, // Explicitly fails validation, but should pass transformation |
| 128 | 128 |
"guestbook_list": &templateapi.Template{},
|
| 129 | 129 |
"guestbook": &templateapi.Template{},
|
| ... | ... |
@@ -31,7 +31,7 @@ func GivenRequestWithPayload(t *testing.T, filename string) *http.Request {
|
| 31 | 31 |
} |
| 32 | 32 |
|
| 33 | 33 |
func GivenRequestWithPayloadAndContentType(t *testing.T, filename, contentType string) *http.Request {
|
| 34 |
- data, err := ioutil.ReadFile("fixtures/" + filename)
|
|
| 34 |
+ data, err := ioutil.ReadFile("testdata/" + filename)
|
|
| 35 | 35 |
if err != nil {
|
| 36 | 36 |
t.Errorf("Error reading setup data: %v", err)
|
| 37 | 37 |
return nil |
| ... | ... |
@@ -42,7 +42,7 @@ func GivenRequestWithPayloadAndContentType(t *testing.T, filename, contentType s |
| 42 | 42 |
} |
| 43 | 43 |
|
| 44 | 44 |
func GivenRequestWithRefsPayload(t *testing.T) *http.Request {
|
| 45 |
- data, err := ioutil.ReadFile("fixtures/post-receive-git.json")
|
|
| 45 |
+ data, err := ioutil.ReadFile("testdata/post-receive-git.json")
|
|
| 46 | 46 |
if err != nil {
|
| 47 | 47 |
t.Errorf("Error reading setup data: %v", err)
|
| 48 | 48 |
return nil |
| ... | ... |
@@ -249,7 +249,7 @@ func postFile(eventHeader, eventName, filename, url string, expStatusCode int, t |
| 249 | 249 |
} |
| 250 | 250 |
|
| 251 | 251 |
func postFileWithCharset(eventHeader, eventName, filename, url, charset string, expStatusCode int, t *testing.T) *http.Request {
|
| 252 |
- data, err := ioutil.ReadFile("fixtures/" + filename)
|
|
| 252 |
+ data, err := ioutil.ReadFile("testdata/" + filename)
|
|
| 253 | 253 |
if err != nil {
|
| 254 | 254 |
t.Errorf("Failed to open %s: %v", filename, err)
|
| 255 | 255 |
} |
| ... | ... |
@@ -318,7 +318,7 @@ func setup(t *testing.T, filename, eventType, ref string) *testContext {
|
| 318 | 318 |
}, |
| 319 | 319 |
path: "/foobar", |
| 320 | 320 |
} |
| 321 |
- event, err := ioutil.ReadFile("fixtures/" + filename)
|
|
| 321 |
+ event, err := ioutil.ReadFile("testdata/" + filename)
|
|
| 322 | 322 |
if err != nil {
|
| 323 | 323 |
t.Errorf("Failed to open %s: %v", filename, err)
|
| 324 | 324 |
} |
| ... | ... |
@@ -14,7 +14,7 @@ import ( |
| 14 | 14 |
|
| 15 | 15 |
func TestNewClient(t *testing.T) {
|
| 16 | 16 |
o := testclient.NewObjects(kapi.Scheme, kapi.Codecs.UniversalDecoder()) |
| 17 |
- if err := testclient.AddObjectsFromPath("../../../test/integration/fixtures/test-deployment-config.yaml", o, kapi.Codecs.UniversalDecoder()); err != nil {
|
|
| 17 |
+ if err := testclient.AddObjectsFromPath("../../../test/integration/testdata/test-deployment-config.yaml", o, kapi.Codecs.UniversalDecoder()); err != nil {
|
|
| 18 | 18 |
t.Fatal(err) |
| 19 | 19 |
} |
| 20 | 20 |
oc, _ := NewFixtureClients(o) |
| ... | ... |
@@ -52,7 +52,7 @@ func TestProjectStatus(t *testing.T) {
|
| 52 | 52 |
}, |
| 53 | 53 |
}, |
| 54 | 54 |
"empty service": {
|
| 55 |
- Path: "../../../../test/fixtures/app-scenarios/k8s-service-with-nothing.json", |
|
| 55 |
+ Path: "../../../../test/testdata/app-scenarios/k8s-service-with-nothing.json", |
|
| 56 | 56 |
Extra: []runtime.Object{
|
| 57 | 57 |
&projectapi.Project{
|
| 58 | 58 |
ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
|
| ... | ... |
@@ -67,7 +67,7 @@ func TestProjectStatus(t *testing.T) {
|
| 67 | 67 |
}, |
| 68 | 68 |
}, |
| 69 | 69 |
"service with RC": {
|
| 70 |
- Path: "../../../../test/fixtures/app-scenarios/k8s-unserviced-rc.json", |
|
| 70 |
+ Path: "../../../../test/testdata/app-scenarios/k8s-unserviced-rc.json", |
|
| 71 | 71 |
Extra: []runtime.Object{
|
| 72 | 72 |
&projectapi.Project{
|
| 73 | 73 |
ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
|
| ... | ... |
@@ -140,7 +140,7 @@ func TestProjectStatus(t *testing.T) {
|
| 140 | 140 |
}, |
| 141 | 141 |
}, |
| 142 | 142 |
"unstarted build": {
|
| 143 |
- Path: "../../../../test/fixtures/app-scenarios/new-project-no-build.yaml", |
|
| 143 |
+ Path: "../../../../test/testdata/app-scenarios/new-project-no-build.yaml", |
|
| 144 | 144 |
Extra: []runtime.Object{
|
| 145 | 145 |
&projectapi.Project{
|
| 146 | 146 |
ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
|
| ... | ... |
@@ -196,7 +196,7 @@ func TestProjectStatus(t *testing.T) {
|
| 196 | 196 |
}, |
| 197 | 197 |
}, |
| 198 | 198 |
"running build": {
|
| 199 |
- Path: "../../../../test/fixtures/app-scenarios/new-project-one-build.yaml", |
|
| 199 |
+ Path: "../../../../test/testdata/app-scenarios/new-project-one-build.yaml", |
|
| 200 | 200 |
Extra: []runtime.Object{
|
| 201 | 201 |
&projectapi.Project{
|
| 202 | 202 |
ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
|
| ... | ... |
@@ -215,7 +215,7 @@ func TestProjectStatus(t *testing.T) {
|
| 215 | 215 |
Time: mustParseTime("2015-04-06T21:20:03Z"),
|
| 216 | 216 |
}, |
| 217 | 217 |
"a/b test DeploymentConfig": {
|
| 218 |
- Path: "../../../../test/fixtures/app-scenarios/new-project-two-deployment-configs.yaml", |
|
| 218 |
+ Path: "../../../../test/testdata/app-scenarios/new-project-two-deployment-configs.yaml", |
|
| 219 | 219 |
Extra: []runtime.Object{
|
| 220 | 220 |
&projectapi.Project{
|
| 221 | 221 |
ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
|
| ... | ... |
@@ -235,7 +235,7 @@ func TestProjectStatus(t *testing.T) {
|
| 235 | 235 |
Time: mustParseTime("2015-04-06T21:20:03Z"),
|
| 236 | 236 |
}, |
| 237 | 237 |
"with real deployments": {
|
| 238 |
- Path: "../../../../test/fixtures/app-scenarios/new-project-deployed-app.yaml", |
|
| 238 |
+ Path: "../../../../test/testdata/app-scenarios/new-project-deployed-app.yaml", |
|
| 239 | 239 |
Extra: []runtime.Object{
|
| 240 | 240 |
&projectapi.Project{
|
| 241 | 241 |
ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
|
| ... | ... |
@@ -294,7 +294,7 @@ func TestProjectStatus(t *testing.T) {
|
| 294 | 294 |
}, |
| 295 | 295 |
}, |
| 296 | 296 |
"monopod": {
|
| 297 |
- Path: "../../../../test/fixtures/app-scenarios/k8s-lonely-pod.json", |
|
| 297 |
+ Path: "../../../../test/testdata/app-scenarios/k8s-lonely-pod.json", |
|
| 298 | 298 |
Extra: []runtime.Object{
|
| 299 | 299 |
&projectapi.Project{
|
| 300 | 300 |
ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
|
| ... | ... |
@@ -308,7 +308,7 @@ func TestProjectStatus(t *testing.T) {
|
| 308 | 308 |
}, |
| 309 | 309 |
}, |
| 310 | 310 |
"deploys single pod": {
|
| 311 |
- Path: "../../../../test/fixtures/simple-deployment.yaml", |
|
| 311 |
+ Path: "../../../../test/testdata/simple-deployment.yaml", |
|
| 312 | 312 |
Extra: []runtime.Object{
|
| 313 | 313 |
&projectapi.Project{
|
| 314 | 314 |
ObjectMeta: kapi.ObjectMeta{Name: "example", Namespace: ""},
|
| ... | ... |
@@ -58,7 +58,7 @@ func TestBootstrapClusterRoles(t *testing.T) {
|
| 58 | 58 |
} |
| 59 | 59 |
|
| 60 | 60 |
func testObjects(t *testing.T, list *api.List, fixtureFilename string) {
|
| 61 |
- filename := filepath.Join("../../../../test/fixtures/bootstrappolicy", fixtureFilename)
|
|
| 61 |
+ filename := filepath.Join("../../../../test/testdata/bootstrappolicy", fixtureFilename)
|
|
| 62 | 62 |
expectedYAML, err := ioutil.ReadFile(filename) |
| 63 | 63 |
if err != nil {
|
| 64 | 64 |
t.Fatal(err) |
| ... | ... |
@@ -15,7 +15,7 @@ import ( |
| 15 | 15 |
) |
| 16 | 16 |
|
| 17 | 17 |
func TestCredentialsForSecrets(t *testing.T) {
|
| 18 |
- data, err := ioutil.ReadFile("../../../test/fixtures/image-secrets.json")
|
|
| 18 |
+ data, err := ioutil.ReadFile("../../../test/testdata/image-secrets.json")
|
|
| 19 | 19 |
if err != nil {
|
| 20 | 20 |
t.Fatal(err) |
| 21 | 21 |
} |
| ... | ... |
@@ -33,7 +33,7 @@ func makeParameter(name, value, generate string, required bool) api.Parameter {
|
| 33 | 33 |
func TestAddParameter(t *testing.T) {
|
| 34 | 34 |
var template api.Template |
| 35 | 35 |
|
| 36 |
- jsonData, _ := ioutil.ReadFile("../../test/templates/fixtures/guestbook.json")
|
|
| 36 |
+ jsonData, _ := ioutil.ReadFile("../../test/templates/testdata/guestbook.json")
|
|
| 37 | 37 |
json.Unmarshal(jsonData, &template) |
| 38 | 38 |
|
| 39 | 39 |
AddParameter(&template, makeParameter("CUSTOM_PARAM", "1", "", false))
|
| ... | ... |
@@ -383,12 +383,12 @@ func TestEvaluateLabels(t *testing.T) {
|
| 383 | 383 |
|
| 384 | 384 |
func TestProcessTemplateParameters(t *testing.T) {
|
| 385 | 385 |
var template, expectedTemplate api.Template |
| 386 |
- jsonData, _ := ioutil.ReadFile("../../test/templates/fixtures/guestbook.json")
|
|
| 386 |
+ jsonData, _ := ioutil.ReadFile("../../test/templates/testdata/guestbook.json")
|
|
| 387 | 387 |
if err := runtime.DecodeInto(kapi.Codecs.UniversalDecoder(), jsonData, &template); err != nil {
|
| 388 | 388 |
t.Fatalf("unexpected error: %v", err)
|
| 389 | 389 |
} |
| 390 | 390 |
|
| 391 |
- expectedData, _ := ioutil.ReadFile("../../test/templates/fixtures/guestbook_list.json")
|
|
| 391 |
+ expectedData, _ := ioutil.ReadFile("../../test/templates/testdata/guestbook_list.json")
|
|
| 392 | 392 |
if err := runtime.DecodeInto(kapi.Codecs.UniversalDecoder(), expectedData, &expectedTemplate); err != nil {
|
| 393 | 393 |
t.Fatalf("unexpected error: %v", err)
|
| 394 | 394 |
} |
| ... | ... |
@@ -69,7 +69,7 @@ func TestBuilder(t *testing.T) {
|
| 69 | 69 |
ErrFn func(err error) bool |
| 70 | 70 |
}{
|
| 71 | 71 |
{
|
| 72 |
- Dockerfile: "fixtures/dir/Dockerfile", |
|
| 72 |
+ Dockerfile: "testdata/dir/Dockerfile", |
|
| 73 | 73 |
From: "busybox", |
| 74 | 74 |
Copies: []Copy{
|
| 75 | 75 |
{Src: ".", Dest: []string{"/"}, Download: false},
|
| ... | ... |
@@ -81,7 +81,7 @@ func TestBuilder(t *testing.T) {
|
| 81 | 81 |
}, |
| 82 | 82 |
}, |
| 83 | 83 |
{
|
| 84 |
- Dockerfile: "fixtures/ignore/Dockerfile", |
|
| 84 |
+ Dockerfile: "testdata/ignore/Dockerfile", |
|
| 85 | 85 |
From: "busybox", |
| 86 | 86 |
Copies: []Copy{
|
| 87 | 87 |
{Src: ".", Dest: []string{"/"}},
|
| ... | ... |
@@ -91,7 +91,7 @@ func TestBuilder(t *testing.T) {
|
| 91 | 91 |
}, |
| 92 | 92 |
}, |
| 93 | 93 |
{
|
| 94 |
- Dockerfile: "fixtures/Dockerfile.env", |
|
| 94 |
+ Dockerfile: "testdata/Dockerfile.env", |
|
| 95 | 95 |
From: "busybox", |
| 96 | 96 |
Config: docker.Config{
|
| 97 | 97 |
Env: []string{"name=value", "name2=value2a value2b", "name1=value1", "name3=value3a\\n\"value3b\"", "name4=value4a\\\\nvalue4b"},
|
| ... | ... |
@@ -99,7 +99,7 @@ func TestBuilder(t *testing.T) {
|
| 99 | 99 |
}, |
| 100 | 100 |
}, |
| 101 | 101 |
{
|
| 102 |
- Dockerfile: "fixtures/Dockerfile.edgecases", |
|
| 102 |
+ Dockerfile: "testdata/Dockerfile.edgecases", |
|
| 103 | 103 |
From: "busybox", |
| 104 | 104 |
Copies: []Copy{
|
| 105 | 105 |
{Src: ".", Dest: []string{"/"}, Download: true},
|
| ... | ... |
@@ -126,7 +126,7 @@ func TestBuilder(t *testing.T) {
|
| 126 | 126 |
}, |
| 127 | 127 |
}, |
| 128 | 128 |
{
|
| 129 |
- Dockerfile: "fixtures/Dockerfile.exposedefault", |
|
| 129 |
+ Dockerfile: "testdata/Dockerfile.exposedefault", |
|
| 130 | 130 |
From: "busybox", |
| 131 | 131 |
Config: docker.Config{
|
| 132 | 132 |
ExposedPorts: map[docker.Port]struct{}{"3469/tcp": {}},
|
| ... | ... |
@@ -134,7 +134,7 @@ func TestBuilder(t *testing.T) {
|
| 134 | 134 |
}, |
| 135 | 135 |
}, |
| 136 | 136 |
{
|
| 137 |
- Dockerfile: "fixtures/Dockerfile.add", |
|
| 137 |
+ Dockerfile: "testdata/Dockerfile.add", |
|
| 138 | 138 |
From: "busybox", |
| 139 | 139 |
Copies: []Copy{
|
| 140 | 140 |
{Src: "https://github.com/openshift/origin/raw/master/README.md", Dest: []string{"/README.md"}, Download: true},
|
| ... | ... |
@@ -220,14 +220,14 @@ func TestCalcCopyInfo(t *testing.T) {
|
| 220 | 220 |
}{
|
| 221 | 221 |
{
|
| 222 | 222 |
origPath: "subdir/*", |
| 223 |
- rootPath: "fixtures/dir", |
|
| 223 |
+ rootPath: "testdata/dir", |
|
| 224 | 224 |
allowWildcards: true, |
| 225 | 225 |
errFn: nilErr, |
| 226 | 226 |
paths: map[string]struct{}{"subdir/file2": {}},
|
| 227 | 227 |
}, |
| 228 | 228 |
{
|
| 229 | 229 |
origPath: "*", |
| 230 |
- rootPath: "fixtures/dir", |
|
| 230 |
+ rootPath: "testdata/dir", |
|
| 231 | 231 |
allowWildcards: true, |
| 232 | 232 |
errFn: nilErr, |
| 233 | 233 |
paths: map[string]struct{}{
|
| ... | ... |
@@ -238,7 +238,7 @@ func TestCalcCopyInfo(t *testing.T) {
|
| 238 | 238 |
}, |
| 239 | 239 |
{
|
| 240 | 240 |
origPath: ".", |
| 241 |
- rootPath: "fixtures/dir", |
|
| 241 |
+ rootPath: "testdata/dir", |
|
| 242 | 242 |
allowWildcards: true, |
| 243 | 243 |
errFn: nilErr, |
| 244 | 244 |
paths: map[string]struct{}{
|
| ... | ... |
@@ -249,7 +249,7 @@ func TestCalcCopyInfo(t *testing.T) {
|
| 249 | 249 |
}, |
| 250 | 250 |
{
|
| 251 | 251 |
origPath: "/.", |
| 252 |
- rootPath: "fixtures/dir", |
|
| 252 |
+ rootPath: "testdata/dir", |
|
| 253 | 253 |
allowWildcards: true, |
| 254 | 254 |
errFn: nilErr, |
| 255 | 255 |
paths: map[string]struct{}{
|
| ... | ... |
@@ -260,7 +260,7 @@ func TestCalcCopyInfo(t *testing.T) {
|
| 260 | 260 |
}, |
| 261 | 261 |
{
|
| 262 | 262 |
origPath: "subdir/", |
| 263 |
- rootPath: "fixtures/dir", |
|
| 263 |
+ rootPath: "testdata/dir", |
|
| 264 | 264 |
allowWildcards: true, |
| 265 | 265 |
errFn: nilErr, |
| 266 | 266 |
paths: map[string]struct{}{
|
| ... | ... |
@@ -269,7 +269,7 @@ func TestCalcCopyInfo(t *testing.T) {
|
| 269 | 269 |
}, |
| 270 | 270 |
{
|
| 271 | 271 |
origPath: "subdir", |
| 272 |
- rootPath: "fixtures/dir", |
|
| 272 |
+ rootPath: "testdata/dir", |
|
| 273 | 273 |
allowWildcards: true, |
| 274 | 274 |
errFn: nilErr, |
| 275 | 275 |
paths: map[string]struct{}{
|
| ... | ... |
@@ -278,7 +278,7 @@ func TestCalcCopyInfo(t *testing.T) {
|
| 278 | 278 |
}, |
| 279 | 279 |
{
|
| 280 | 280 |
origPath: "subdir/.", |
| 281 |
- rootPath: "fixtures/dir", |
|
| 281 |
+ rootPath: "testdata/dir", |
|
| 282 | 282 |
allowWildcards: true, |
| 283 | 283 |
errFn: nilErr, |
| 284 | 284 |
paths: map[string]struct{}{
|
| ... | ... |
@@ -286,17 +286,17 @@ func TestCalcCopyInfo(t *testing.T) {
|
| 286 | 286 |
}, |
| 287 | 287 |
}, |
| 288 | 288 |
{
|
| 289 |
- origPath: "fixtures/dir/subdir/.", |
|
| 289 |
+ origPath: "testdata/dir/subdir/.", |
|
| 290 | 290 |
rootPath: "", |
| 291 | 291 |
allowWildcards: true, |
| 292 | 292 |
errFn: nilErr, |
| 293 | 293 |
paths: map[string]struct{}{
|
| 294 |
- "fixtures/dir/subdir/": {},
|
|
| 294 |
+ "testdata/dir/subdir/": {},
|
|
| 295 | 295 |
}, |
| 296 | 296 |
}, |
| 297 | 297 |
{
|
| 298 | 298 |
origPath: "subdir/", |
| 299 |
- rootPath: "fixtures/dir", |
|
| 299 |
+ rootPath: "testdata/dir", |
|
| 300 | 300 |
allowWildcards: true, |
| 301 | 301 |
errFn: nilErr, |
| 302 | 302 |
paths: map[string]struct{}{
|
| ... | ... |
@@ -305,7 +305,7 @@ func TestCalcCopyInfo(t *testing.T) {
|
| 305 | 305 |
}, |
| 306 | 306 |
{
|
| 307 | 307 |
origPath: "subdir/", |
| 308 |
- rootPath: "fixtures/dir", |
|
| 308 |
+ rootPath: "testdata/dir", |
|
| 309 | 309 |
allowWildcards: true, |
| 310 | 310 |
errFn: nilErr, |
| 311 | 311 |
paths: map[string]struct{}{
|
| ... | ... |
@@ -65,23 +65,23 @@ type conformanceTest struct {
|
| 65 | 65 |
func TestConformanceInternal(t *testing.T) {
|
| 66 | 66 |
testCases := []conformanceTest{
|
| 67 | 67 |
{
|
| 68 |
- ContextDir: "fixtures/dir", |
|
| 68 |
+ ContextDir: "testdata/dir", |
|
| 69 | 69 |
}, |
| 70 | 70 |
// TODO: Fix this test |
| 71 | 71 |
// {
|
| 72 |
- // ContextDir: "fixtures/ignore", |
|
| 72 |
+ // ContextDir: "testdata/ignore", |
|
| 73 | 73 |
// }, |
| 74 | 74 |
{
|
| 75 |
- Dockerfile: "fixtures/Dockerfile.env", |
|
| 75 |
+ Dockerfile: "testdata/Dockerfile.env", |
|
| 76 | 76 |
}, |
| 77 | 77 |
{
|
| 78 |
- Dockerfile: "fixtures/Dockerfile.edgecases", |
|
| 78 |
+ Dockerfile: "testdata/Dockerfile.edgecases", |
|
| 79 | 79 |
}, |
| 80 | 80 |
{
|
| 81 |
- Dockerfile: "fixtures/Dockerfile.exposedefault", |
|
| 81 |
+ Dockerfile: "testdata/Dockerfile.exposedefault", |
|
| 82 | 82 |
}, |
| 83 | 83 |
{
|
| 84 |
- Dockerfile: "fixtures/Dockerfile.add", |
|
| 84 |
+ Dockerfile: "testdata/Dockerfile.add", |
|
| 85 | 85 |
}, |
| 86 | 86 |
} |
| 87 | 87 |
|
| ... | ... |
@@ -178,7 +178,7 @@ os::cmd::expect_success 'oadm policy reconcile-cluster-roles clusterrole/cluster |
| 178 | 178 |
os::cmd::expect_success 'oc get clusterrole/cluster-status' |
| 179 | 179 |
|
| 180 | 180 |
# test reconciliation protection by replacing the basic-user role with one that has missing default permissions, and extra non-default permissions |
| 181 |
-os::cmd::expect_success 'oc replace --force -f ./test/fixtures/basic-user-with-groups-without-projectrequests.yaml' |
|
| 181 |
+os::cmd::expect_success 'oc replace --force -f ./test/testdata/basic-user-with-groups-without-projectrequests.yaml' |
|
| 182 | 182 |
# 1. mark the role as protected, and ensure the role is skipped by reconciliation |
| 183 | 183 |
os::cmd::expect_success 'oc annotate clusterrole/basic-user openshift.io/reconcile-protect=true' |
| 184 | 184 |
os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-roles basic-user --additive-only=false --confirm' 'skipped: clusterrole/basic-user' |
| ... | ... |
@@ -194,7 +194,7 @@ os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-roles basic- |
| 194 | 194 |
os::cmd::expect_success_and_not_text 'oadm policy reconcile-cluster-roles basic-user --additive-only=false --confirm' 'clusterrole/basic-user' |
| 195 | 195 |
|
| 196 | 196 |
# test label/annotation reconciliation by replacing the basic-user role with one that has custom labels, annotations, and permissions |
| 197 |
-os::cmd::expect_success 'oc replace --force -f ./test/fixtures/basic-user-with-annotations-labels-groups-without-projectrequests.yaml' |
|
| 197 |
+os::cmd::expect_success 'oc replace --force -f ./test/testdata/basic-user-with-annotations-labels-groups-without-projectrequests.yaml' |
|
| 198 | 198 |
# display shows customized labels/annotations |
| 199 | 199 |
os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-roles' 'custom-label' |
| 200 | 200 |
os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-roles' 'custom-annotation' |
| ... | ... |
@@ -217,7 +217,7 @@ os::cmd::expect_failure 'oc get clusterrolebinding/cluster-status-binding' |
| 217 | 217 |
os::cmd::expect_success 'oadm policy reconcile-cluster-role-bindings --confirm' |
| 218 | 218 |
os::cmd::expect_success 'oc get clusterrolebinding/cluster-status-binding' |
| 219 | 219 |
# Customize a binding |
| 220 |
-os::cmd::expect_success 'oc replace --force -f ./test/fixtures/basic-users-binding.json' |
|
| 220 |
+os::cmd::expect_success 'oc replace --force -f ./test/testdata/basic-users-binding.json' |
|
| 221 | 221 |
# display shows customized labels/annotations |
| 222 | 222 |
os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-role-bindings' 'custom-label' |
| 223 | 223 |
os::cmd::expect_success_and_text 'oadm policy reconcile-cluster-role-bindings' 'custom-annotation' |
| ... | ... |
@@ -242,11 +242,11 @@ echo "admin-reconcile-cluster-role-bindings: ok" |
| 242 | 242 |
os::test::junit::declare_suite_end |
| 243 | 243 |
|
| 244 | 244 |
os::test::junit::declare_suite_start "cmd/admin/role-reapers" |
| 245 |
-os::cmd::expect_success "oc create -f test/extended/fixtures/roles/policy-roles.yaml" |
|
| 245 |
+os::cmd::expect_success "oc create -f test/extended/testdata/roles/policy-roles.yaml" |
|
| 246 | 246 |
os::cmd::expect_success "oc get rolebinding/basic-users" |
| 247 | 247 |
os::cmd::expect_success "oc delete role/basic-user" |
| 248 | 248 |
os::cmd::expect_failure "oc get rolebinding/basic-users" |
| 249 |
-os::cmd::expect_success "oc create -f test/extended/fixtures/roles/policy-clusterroles.yaml" |
|
| 249 |
+os::cmd::expect_success "oc create -f test/extended/testdata/roles/policy-clusterroles.yaml" |
|
| 250 | 250 |
os::cmd::expect_success "oc get clusterrolebinding/basic-users2" |
| 251 | 251 |
os::cmd::expect_success "oc delete clusterrole/basic-user2" |
| 252 | 252 |
os::cmd::expect_failure "oc get clusterrolebinding/basic-users2" |
| ... | ... |
@@ -340,7 +340,7 @@ os::test::junit::declare_suite_start "cmd/admin/complex-scenarios" |
| 340 | 340 |
os::cmd::expect_success 'oadm new-project example --admin="createuser"' |
| 341 | 341 |
os::cmd::expect_success 'oc project example' |
| 342 | 342 |
os::cmd::try_until_success 'oc get serviceaccount default' |
| 343 |
-os::cmd::expect_success 'oc create -f test/fixtures/app-scenarios' |
|
| 343 |
+os::cmd::expect_success 'oc create -f test/testdata/app-scenarios' |
|
| 344 | 344 |
os::cmd::expect_success 'oc status' |
| 345 | 345 |
os::cmd::expect_success 'oc status -o dot' |
| 346 | 346 |
echo "complex-scenarios: ok" |
| ... | ... |
@@ -384,7 +384,7 @@ os::test::junit::declare_suite_end |
| 384 | 384 |
|
| 385 | 385 |
os::test::junit::declare_suite_start "cmd/admin/policybinding-required" |
| 386 | 386 |
# Admin can't bind local roles without cluster-admin permissions |
| 387 |
-os::cmd::expect_success "oc create -f test/extended/fixtures/roles/empty-role.yaml -n cmd-admin" |
|
| 387 |
+os::cmd::expect_success "oc create -f test/extended/testdata/roles/empty-role.yaml -n cmd-admin" |
|
| 388 | 388 |
os::cmd::expect_success "oc delete policybinding/cmd-admin:default -n cmd-admin" |
| 389 | 389 |
os::cmd::expect_success 'oadm policy add-role-to-user admin local-admin -n cmd-admin' |
| 390 | 390 |
os::cmd::try_until_text "oc policy who-can get policybindings -n cmd-admin" "local-admin" |
| ... | ... |
@@ -22,29 +22,29 @@ os::cmd::expect_success 'oc login -u system:admin' |
| 22 | 22 |
username=$(oc get user/scoped-user -o jsonpath={.metadata.name})
|
| 23 | 23 |
useruid=$(oc get user/scoped-user -o jsonpath={.metadata.uid})
|
| 24 | 24 |
|
| 25 |
-whoamitoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=whoami SCOPE=user:info USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 25 |
+whoamitoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=whoami SCOPE=user:info USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 26 | 26 |
os::cmd::expect_success_and_text 'oc get user/~ --token="${whoamitoken}"' "${username}"
|
| 27 | 27 |
os::cmd::expect_failure_and_text 'oc get pods --token="${whoamitoken}" -n cmd-authentication' 'prevent this action; User "scoped-user" cannot list pods in project "cmd-authentication"'
|
| 28 | 28 |
|
| 29 |
-listprojecttoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=listproject SCOPE=user:list-projects USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 29 |
+listprojecttoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=listproject SCOPE=user:list-projects USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 30 | 30 |
os::cmd::expect_success_and_text 'oc get projects --token="${listprojecttoken}"' 'cmd-authentication'
|
| 31 | 31 |
os::cmd::expect_failure_and_text 'oc get user/~ --token="${listprojecttoken}"' 'prevent this action; User "scoped-user" cannot get users at the cluster scope'
|
| 32 | 32 |
os::cmd::expect_failure_and_text 'oc get pods --token="${listprojecttoken}" -n cmd-authentication' 'prevent this action; User "scoped-user" cannot list pods in project "cmd-authentication"'
|
| 33 | 33 |
|
| 34 |
-adminnonescalatingpowerstoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=admin SCOPE=role:admin:* USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 34 |
+adminnonescalatingpowerstoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=admin SCOPE=role:admin:* USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 35 | 35 |
os::cmd::expect_failure_and_text 'oc get user/~ --token="${adminnonescalatingpowerstoken}"' 'prevent this action; User "scoped-user" cannot get users at the cluster scope'
|
| 36 | 36 |
os::cmd::expect_failure_and_text 'oc get secrets --token="${adminnonescalatingpowerstoken}" -n cmd-authentication' 'prevent this action; User "scoped-user" cannot list secrets in project "cmd-authentication"'
|
| 37 | 37 |
os::cmd::expect_success_and_text 'oc get projects/cmd-authentication --token="${adminnonescalatingpowerstoken}" -n cmd-authentication' 'cmd-authentication'
|
| 38 | 38 |
|
| 39 |
-allescalatingpowerstoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=clusteradmin SCOPE='role:cluster-admin:*:!' USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 39 |
+allescalatingpowerstoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=clusteradmin SCOPE='role:cluster-admin:*:!' USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 40 | 40 |
os::cmd::expect_success_and_text 'oc get user/~ --token="${allescalatingpowerstoken}"' "${username}"
|
| 41 | 41 |
os::cmd::expect_success 'oc get secrets --token="${allescalatingpowerstoken}" -n cmd-authentication'
|
| 42 | 42 |
# scopes allow it, but authorization doesn't |
| 43 | 43 |
os::cmd::expect_failure_and_text 'oc get secrets --token="${allescalatingpowerstoken}" -n default' 'cannot list secrets in project'
|
| 44 | 44 |
os::cmd::expect_success_and_text 'oc get projects --token="${allescalatingpowerstoken}"' 'cmd-authentication'
|
| 45 | 45 |
|
| 46 |
-accesstoken=$(oc process -f ${OS_ROOT}/test/fixtures/authentication/scoped-token-template.yaml TOKEN_PREFIX=access SCOPE=user:check-access USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 47 |
-os::cmd::expect_success_and_text 'curl -k -XPOST -H "Content-Type: application/json" -H "Authorization: Bearer ${accesstoken}" ${API_SCHEME}://${API_HOST}:${API_PORT}/oapi/v1/namespaces/cmd-authentication/localsubjectaccessreviews -d @${OS_ROOT}/test/fixtures/authentication/localsubjectaccessreview.json' '"kind": "SubjectAccessReviewResponse"'
|
|
| 46 |
+accesstoken=$(oc process -f ${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml TOKEN_PREFIX=access SCOPE=user:check-access USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')
|
|
| 47 |
+os::cmd::expect_success_and_text 'curl -k -XPOST -H "Content-Type: application/json" -H "Authorization: Bearer ${accesstoken}" ${API_SCHEME}://${API_HOST}:${API_PORT}/oapi/v1/namespaces/cmd-authentication/localsubjectaccessreviews -d @${OS_ROOT}/test/testdata/authentication/localsubjectaccessreview.json' '"kind": "SubjectAccessReviewResponse"'
|
|
| 48 | 48 |
os::cmd::expect_success_and_text 'oc policy can-i create pods --token=${accesstoken} -n cmd-authentication --ignore-scopes' 'yes'
|
| 49 | 49 |
os::cmd::expect_success_and_text 'oc policy can-i create pods --token=${accesstoken} -n cmd-authentication' 'no'
|
| 50 | 50 |
os::cmd::expect_success_and_text "oc policy can-i create pods --token=${accesstoken} -n cmd-authentication --scopes='role:admin:*'" 'yes'
|
| ... | ... |
@@ -80,7 +80,7 @@ os::test::junit::declare_suite_end |
| 80 | 80 |
|
| 81 | 81 |
os::test::junit::declare_suite_start "cmd/basicresources/resource-builder" |
| 82 | 82 |
# Test resource builder filtering of files with expected extensions inside directories, and individual files without expected extensions |
| 83 |
-os::cmd::expect_success 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' |
|
| 83 |
+os::cmd::expect_success 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' |
|
| 84 | 84 |
# Explicitly specified extensionless files |
| 85 | 85 |
os::cmd::expect_success 'oc get secret json-no-extension yml-no-extension' |
| 86 | 86 |
# Scanned files with extensions inside directories |
| ... | ... |
@@ -111,20 +111,20 @@ os::test::junit::declare_suite_end |
| 111 | 111 |
|
| 112 | 112 |
os::test::junit::declare_suite_start "cmd/basicresources/services" |
| 113 | 113 |
os::cmd::expect_success 'oc get services' |
| 114 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-service.json' |
|
| 114 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-service.json' |
|
| 115 | 115 |
os::cmd::expect_success 'oc delete services frontend' |
| 116 | 116 |
echo "services: ok" |
| 117 | 117 |
os::test::junit::declare_suite_end |
| 118 | 118 |
|
| 119 | 119 |
os::test::junit::declare_suite_start "cmd/basicresources/list-version-conversion" |
| 120 |
-os::cmd::expect_success 'oc create -f test/fixtures/mixed-api-versions.yaml' |
|
| 121 |
-os::cmd::expect_success 'oc get -f test/fixtures/mixed-api-versions.yaml -o yaml' |
|
| 122 |
-os::cmd::expect_success 'oc label -f test/fixtures/mixed-api-versions.yaml mylabel=a' |
|
| 123 |
-os::cmd::expect_success 'oc annotate -f test/fixtures/mixed-api-versions.yaml myannotation=b' |
|
| 120 |
+os::cmd::expect_success 'oc create -f test/testdata/mixed-api-versions.yaml' |
|
| 121 |
+os::cmd::expect_success 'oc get -f test/testdata/mixed-api-versions.yaml -o yaml' |
|
| 122 |
+os::cmd::expect_success 'oc label -f test/testdata/mixed-api-versions.yaml mylabel=a' |
|
| 123 |
+os::cmd::expect_success 'oc annotate -f test/testdata/mixed-api-versions.yaml myannotation=b' |
|
| 124 | 124 |
# Make sure all six resources, with different API versions, got labeled and annotated |
| 125 |
-os::cmd::expect_success_and_text 'oc get -f test/fixtures/mixed-api-versions.yaml --output-version=v1 --output=jsonpath="{..metadata.labels.mylabel}"' '^a a a a a a$'
|
|
| 126 |
-os::cmd::expect_success_and_text 'oc get -f test/fixtures/mixed-api-versions.yaml --output-version=v1 --output=jsonpath="{..metadata.annotations.myannotation}"' '^b b b b b b$'
|
|
| 127 |
-os::cmd::expect_success 'oc delete -f test/fixtures/mixed-api-versions.yaml' |
|
| 125 |
+os::cmd::expect_success_and_text 'oc get -f test/testdata/mixed-api-versions.yaml --output-version=v1 --output=jsonpath="{..metadata.labels.mylabel}"' '^a a a a a a$'
|
|
| 126 |
+os::cmd::expect_success_and_text 'oc get -f test/testdata/mixed-api-versions.yaml --output-version=v1 --output=jsonpath="{..metadata.annotations.myannotation}"' '^b b b b b b$'
|
|
| 127 |
+os::cmd::expect_success 'oc delete -f test/testdata/mixed-api-versions.yaml' |
|
| 128 | 128 |
echo "list version conversion: ok" |
| 129 | 129 |
os::test::junit::declare_suite_end |
| 130 | 130 |
|
| ... | ... |
@@ -149,9 +149,9 @@ os::test::junit::declare_suite_end |
| 149 | 149 |
|
| 150 | 150 |
os::test::junit::declare_suite_start "cmd/basicresources/routes" |
| 151 | 151 |
os::cmd::expect_success 'oc get routes' |
| 152 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-route.json' |
|
| 152 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-route.json' |
|
| 153 | 153 |
os::cmd::expect_success 'oc delete routes testroute' |
| 154 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-service.json' |
|
| 154 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-service.json' |
|
| 155 | 155 |
os::cmd::expect_success 'oc create route passthrough --service=svc/frontend' |
| 156 | 156 |
os::cmd::expect_success 'oc delete routes frontend' |
| 157 | 157 |
os::cmd::expect_success 'oc create route edge --path /test --service=services/non-existent --port=80' |
| ... | ... |
@@ -187,7 +187,7 @@ os::cmd::expect_success_and_text "oc set probe ${arg} -o yaml --liveness --get-u
|
| 187 | 187 |
os::cmd::expect_success_and_text "oc set probe ${arg} -o yaml --liveness --get-url=http://127.0.0.1:port/path" "scheme: HTTP"
|
| 188 | 188 |
os::cmd::expect_success_and_text "oc set probe ${arg} -o yaml --liveness --get-url=https://127.0.0.1:port/path" "host: 127.0.0.1"
|
| 189 | 189 |
os::cmd::expect_success_and_text "oc set probe ${arg} -o yaml --liveness --get-url=https://127.0.0.1:port/path" "port: port"
|
| 190 |
-os::cmd::expect_success "oc create -f test/integration/fixtures/test-deployment-config.yaml" |
|
| 190 |
+os::cmd::expect_success "oc create -f test/integration/testdata/test-deployment-config.yaml" |
|
| 191 | 191 |
os::cmd::expect_failure_and_text "oc set probe dc/test-deployment-config --liveness" "Required value: must specify a handler type" |
| 192 | 192 |
os::cmd::expect_success_and_text "oc set probe dc test-deployment-config --liveness --open-tcp=8080" "updated" |
| 193 | 193 |
os::cmd::expect_success_and_text "oc set probe dc/test-deployment-config --liveness --open-tcp=8080" "was not changed" |
| ... | ... |
@@ -215,8 +215,8 @@ echo "set probe: ok" |
| 215 | 215 |
os::test::junit::declare_suite_end |
| 216 | 216 |
|
| 217 | 217 |
os::test::junit::declare_suite_start "cmd/basicresources/setenv" |
| 218 |
-os::cmd::expect_success "oc create -f test/integration/fixtures/test-deployment-config.yaml" |
|
| 219 |
-os::cmd::expect_success "oc create -f test/integration/fixtures/test-buildcli.json" |
|
| 218 |
+os::cmd::expect_success "oc create -f test/integration/testdata/test-deployment-config.yaml" |
|
| 219 |
+os::cmd::expect_success "oc create -f test/integration/testdata/test-buildcli.json" |
|
| 220 | 220 |
os::cmd::expect_success_and_text "oc set env dc/test-deployment-config FOO=bar" "updated" |
| 221 | 221 |
os::cmd::expect_success_and_text "oc set env dc/test-deployment-config --list" "FOO=bar" |
| 222 | 222 |
os::cmd::expect_success_and_text "oc set env bc --all FOO=bar" "updated" |
| ... | ... |
@@ -229,7 +229,7 @@ os::test::junit::declare_suite_end |
| 229 | 229 |
|
| 230 | 230 |
os::test::junit::declare_suite_start "cmd/basicresources/expose" |
| 231 | 231 |
# Expose service as a route |
| 232 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-service.json' |
|
| 232 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-service.json' |
|
| 233 | 233 |
os::cmd::expect_failure 'oc expose service frontend --create-external-load-balancer' |
| 234 | 234 |
os::cmd::expect_failure 'oc expose service frontend --port=40 --type=NodePort' |
| 235 | 235 |
os::cmd::expect_success 'oc expose service frontend --path=/test' |
| ... | ... |
@@ -238,20 +238,20 @@ os::cmd::expect_success_and_text "oc get route frontend --output-version=v1 --te |
| 238 | 238 |
os::cmd::expect_success_and_text "oc get route frontend --output-version=v1 --template='{{.spec.port.targetPort}}'" "<no value>" # no target port for services with unnamed ports
|
| 239 | 239 |
os::cmd::expect_success 'oc delete svc,route -l name=frontend' |
| 240 | 240 |
# Test that external services are exposable |
| 241 |
-os::cmd::expect_success 'oc create -f test/fixtures/external-service.yaml' |
|
| 241 |
+os::cmd::expect_success 'oc create -f test/testdata/external-service.yaml' |
|
| 242 | 242 |
os::cmd::expect_success 'oc expose svc/external' |
| 243 | 243 |
os::cmd::expect_success_and_text 'oc get route external' 'external=service' |
| 244 | 244 |
os::cmd::expect_success 'oc delete route external' |
| 245 | 245 |
os::cmd::expect_success 'oc delete svc external' |
| 246 | 246 |
# Expose multiport service and verify we set a port in the route |
| 247 |
-os::cmd::expect_success 'oc create -f test/fixtures/multiport-service.yaml' |
|
| 247 |
+os::cmd::expect_success 'oc create -f test/testdata/multiport-service.yaml' |
|
| 248 | 248 |
os::cmd::expect_success 'oc expose svc/frontend --name route-with-set-port' |
| 249 | 249 |
os::cmd::expect_success_and_text "oc get route route-with-set-port --template='{{.spec.port.targetPort}}' --output-version=v1" "web"
|
| 250 | 250 |
echo "expose: ok" |
| 251 | 251 |
os::test::junit::declare_suite_end |
| 252 | 252 |
|
| 253 | 253 |
# Test OAuth access token describer |
| 254 |
-os::cmd::expect_success 'oc create -f test/fixtures/oauthaccesstoken.yaml' |
|
| 254 |
+os::cmd::expect_success 'oc create -f test/testdata/oauthaccesstoken.yaml' |
|
| 255 | 255 |
os::cmd::expect_success_and_text "oc describe oauthaccesstoken DYGZDLucARCPIfUeKPhsgPfn0WBLR_9KdeREH0c9iod" "DYGZDLucARCPIfUeKPhsgPfn0WBLR_9KdeREH0c9iod" |
| 256 | 256 |
echo "OAuth descriptor: ok" |
| 257 | 257 |
|
| ... | ... |
@@ -130,7 +130,7 @@ os::test::junit::declare_suite_end |
| 130 | 130 |
|
| 131 | 131 |
os::test::junit::declare_suite_start "cmd/builds/setbuildhook" |
| 132 | 132 |
# Validate the set build-hook command |
| 133 |
-arg="-f test/fixtures/test-bc.yaml" |
|
| 133 |
+arg="-f test/testdata/test-bc.yaml" |
|
| 134 | 134 |
os::cmd::expect_failure_and_text "oc set build-hook" "error: one or more build configs" |
| 135 | 135 |
os::cmd::expect_failure_and_text "oc set build-hook ${arg}" "error: you must specify a type of hook"
|
| 136 | 136 |
os::cmd::expect_success_and_text "oc set build-hook ${arg} --post-commit -o yaml -- echo 'hello world'" 'postCommit:'
|
| ... | ... |
@@ -141,7 +141,7 @@ os::cmd::expect_success_and_not_text "oc set build-hook ${arg} --post-commit -o
|
| 141 | 141 |
os::cmd::expect_success_and_text "oc set build-hook ${arg} --post-commit --command -o yaml -- echo 'hello world'" 'command:'
|
| 142 | 142 |
os::cmd::expect_success_and_text "oc set build-hook ${arg} --post-commit -o yaml --script='echo \"hello world\"'" 'script: echo \"hello world\"'
|
| 143 | 143 |
# Server object tests |
| 144 |
-os::cmd::expect_success "oc create -f test/fixtures/test-bc.yaml" |
|
| 144 |
+os::cmd::expect_success "oc create -f test/testdata/test-bc.yaml" |
|
| 145 | 145 |
os::cmd::expect_failure_and_text "oc set build-hook bc/test-buildconfig --post-commit" "you must specify either a script or command" |
| 146 | 146 |
os::cmd::expect_success_and_text "oc set build-hook test-buildconfig --post-commit -- echo 'hello world'" "updated" |
| 147 | 147 |
os::cmd::expect_success_and_text "oc set build-hook bc/test-buildconfig --post-commit -- echo 'hello world'" "was not changed" |
| ... | ... |
@@ -157,7 +157,7 @@ echo "set build-hook: ok" |
| 157 | 157 |
os::test::junit::declare_suite_end |
| 158 | 158 |
|
| 159 | 159 |
os::test::junit::declare_suite_start "cmd/builds/start-build" |
| 160 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-buildcli.json' |
|
| 160 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-buildcli.json' |
|
| 161 | 161 |
# a build for which there is not an upstream tag in the corresponding imagerepo, so |
| 162 | 162 |
# the build should use the image field as defined in the buildconfig |
| 163 | 163 |
started=$(oc start-build ruby-sample-build-invalidtag) |
| ... | ... |
@@ -20,7 +20,7 @@ trap os::test::junit::reconcile_output EXIT |
| 20 | 20 |
|
| 21 | 21 |
os::test::junit::declare_suite_start "cmd/debug" |
| 22 | 22 |
# This test validates the debug command |
| 23 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml' |
|
| 23 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml' |
|
| 24 | 24 |
os::cmd::expect_success_and_text "oc debug dc/test-deployment-config -o yaml" '\- /bin/sh' |
| 25 | 25 |
os::cmd::expect_success_and_text "oc debug dc/test-deployment-config --keep-annotations -o yaml" 'annotations:' |
| 26 | 26 |
os::cmd::expect_success_and_text "oc debug dc/test-deployment-config --as-root -o yaml" 'runAsUser: 0' |
| ... | ... |
@@ -24,7 +24,7 @@ os::test::junit::declare_suite_start "cmd/deployments" |
| 24 | 24 |
|
| 25 | 25 |
os::cmd::expect_success 'oc get deploymentConfigs' |
| 26 | 26 |
os::cmd::expect_success 'oc get dc' |
| 27 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml' |
|
| 27 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml' |
|
| 28 | 28 |
os::cmd::expect_success 'oc describe deploymentConfigs test-deployment-config' |
| 29 | 29 |
os::cmd::expect_success_and_text 'oc get dc -o name' 'deploymentconfig/test-deployment-config' |
| 30 | 30 |
os::cmd::try_until_success 'oc get rc/test-deployment-config-1' |
| ... | ... |
@@ -54,7 +54,7 @@ os::cmd::expect_success_and_text 'oc env dc/test-deployment-config OTHER=foo -o |
| 54 | 54 |
os::cmd::expect_success_and_text 'echo OTHER=foo | oc env dc/test-deployment-config -e - --list' 'OTHER=foo' |
| 55 | 55 |
os::cmd::expect_success_and_not_text 'echo #OTHER=foo | oc env dc/test-deployment-config -e - --list' 'OTHER=foo' |
| 56 | 56 |
os::cmd::expect_success 'oc env dc/test-deployment-config TEST=bar OTHER=baz BAR-' |
| 57 |
-os::cmd::expect_success_and_not_text 'oc env -f test/integration/fixtures/test-deployment-config.yaml TEST=VERSION -o yaml' 'v1beta3' |
|
| 57 |
+os::cmd::expect_success_and_not_text 'oc env -f test/integration/testdata/test-deployment-config.yaml TEST=VERSION -o yaml' 'v1beta3' |
|
| 58 | 58 |
os::cmd::expect_success 'oc env dc/test-deployment-config A=a B=b C=c D=d E=e F=f G=g' |
| 59 | 59 |
os::cmd::expect_success_and_text 'oc env dc/test-deployment-config --list' 'A=a' |
| 60 | 60 |
os::cmd::expect_success_and_text 'oc env dc/test-deployment-config --list' 'B=b' |
| ... | ... |
@@ -123,7 +123,7 @@ echo "stop: ok" |
| 123 | 123 |
os::test::junit::declare_suite_end |
| 124 | 124 |
|
| 125 | 125 |
os::test::junit::declare_suite_start "cmd/deployments/autoscale" |
| 126 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml' |
|
| 126 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml' |
|
| 127 | 127 |
os::cmd::expect_success 'oc autoscale dc/test-deployment-config --max 5' |
| 128 | 128 |
os::cmd::expect_success_and_text "oc get hpa/test-deployment-config --template='{{.spec.maxReplicas}}'" "5"
|
| 129 | 129 |
os::cmd::expect_success 'oc delete dc/test-deployment-config' |
| ... | ... |
@@ -133,7 +133,7 @@ os::test::junit::declare_suite_end |
| 133 | 133 |
|
| 134 | 134 |
os::test::junit::declare_suite_start "cmd/deployments/setdeploymenthook" |
| 135 | 135 |
# Validate the set deployment-hook command |
| 136 |
-arg="-f test/integration/fixtures/test-deployment-config.yaml" |
|
| 136 |
+arg="-f test/integration/testdata/test-deployment-config.yaml" |
|
| 137 | 137 |
os::cmd::expect_failure_and_text "oc set deployment-hook" "error: one or more deployment configs" |
| 138 | 138 |
os::cmd::expect_failure_and_text "oc set deployment-hook ${arg}" "error: you must specify one of --pre, --mid, or --post"
|
| 139 | 139 |
os::cmd::expect_success_and_text "oc set deployment-hook ${arg} --pre -o yaml -- echo 'hello world'" 'pre:'
|
| ... | ... |
@@ -156,7 +156,7 @@ os::cmd::expect_success_and_text "oc set deployment-hook ${arg} --pre --containe
|
| 156 | 156 |
os::cmd::expect_success_and_not_text "oc set deployment-hook ${arg} --pre --volumes=vol1 -o yaml -- echo 'hello world'" 'does not have a volume named'
|
| 157 | 157 |
os::cmd::expect_success_and_text "oc set deployment-hook ${arg} --pre --volumes=vol1 -o yaml -- echo 'hello world'" '\- vol1'
|
| 158 | 158 |
# Server object tests |
| 159 |
-os::cmd::expect_success "oc create -f test/integration/fixtures/test-deployment-config.yaml" |
|
| 159 |
+os::cmd::expect_success "oc create -f test/integration/testdata/test-deployment-config.yaml" |
|
| 160 | 160 |
os::cmd::expect_failure_and_text "oc set deployment-hook dc/test-deployment-config --pre" "you must specify a command" |
| 161 | 161 |
os::cmd::expect_success_and_text "oc set deployment-hook test-deployment-config --pre -- echo 'hello world'" "updated" |
| 162 | 162 |
os::cmd::expect_success_and_text "oc set deployment-hook dc/test-deployment-config --pre -- echo 'hello world'" "was not changed" |
| ... | ... |
@@ -27,14 +27,14 @@ os::test::junit::declare_suite_start "cmd/images" |
| 27 | 27 |
|
| 28 | 28 |
os::test::junit::declare_suite_start "cmd/images/images" |
| 29 | 29 |
os::cmd::expect_success 'oc get images' |
| 30 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-image.json' |
|
| 30 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-image.json' |
|
| 31 | 31 |
os::cmd::expect_success 'oc delete images test' |
| 32 | 32 |
echo "images: ok" |
| 33 | 33 |
os::test::junit::declare_suite_end |
| 34 | 34 |
|
| 35 | 35 |
os::test::junit::declare_suite_start "cmd/images/imagestreams" |
| 36 | 36 |
os::cmd::expect_success 'oc get imageStreams' |
| 37 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-image-stream.json' |
|
| 37 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-image-stream.json' |
|
| 38 | 38 |
# verify that creating a registry fills out .status.dockerImageRepository |
| 39 | 39 |
if os::cmd::expect_success_and_not_text "oc get imageStreams test --template='{{.status.dockerImageRepository}}'" '.'; then
|
| 40 | 40 |
# create the registry |
| ... | ... |
@@ -191,7 +191,7 @@ os::cmd::expect_success_and_text 'oc tag mysql:latest tagtest:new1 --alias' 'Tag |
| 191 | 191 |
os::cmd::expect_success_and_text 'oc tag mysql:latest tagtest:new1' 'Tag tagtest:new1 set to mysql@sha256:' |
| 192 | 192 |
|
| 193 | 193 |
# test deleting a spec tag using oc tag |
| 194 |
-os::cmd::expect_success 'oc create -f test/fixtures/test-stream.yaml' |
|
| 194 |
+os::cmd::expect_success 'oc create -f test/testdata/test-stream.yaml' |
|
| 195 | 195 |
os::cmd::expect_success_and_text 'oc tag test-stream:latest -d' 'Deleted' |
| 196 | 196 |
os::cmd::expect_success 'oc delete is/test-stream' |
| 197 | 197 |
echo "tag: ok" |
| ... | ... |
@@ -68,8 +68,8 @@ os::cmd::expect_success_and_text 'oc new-app ruby-helloworld-sample --param MYSQ |
| 68 | 68 |
|
| 69 | 69 |
# verify we can create from a template when some objects in the template declare an app label |
| 70 | 70 |
# the app label should still be applied to the other objects in the template. |
| 71 |
-os::cmd::expect_success_and_text 'oc new-app -f test/fixtures/template-with-app-label.json -o yaml' 'app: ruby-sample-build' |
|
| 72 |
-os::cmd::expect_success_and_text 'oc new-app -f test/fixtures/template-with-app-label.json -o yaml' 'app: myapp' |
|
| 71 |
+os::cmd::expect_success_and_text 'oc new-app -f test/testdata/template-with-app-label.json -o yaml' 'app: ruby-sample-build' |
|
| 72 |
+os::cmd::expect_success_and_text 'oc new-app -f test/testdata/template-with-app-label.json -o yaml' 'app: myapp' |
|
| 73 | 73 |
|
| 74 | 74 |
# check search |
| 75 | 75 |
os::cmd::expect_success_and_text 'oc new-app --search mysql' "Tags:\s+5.5, 5.6, latest" |
| ... | ... |
@@ -196,19 +196,19 @@ os::cmd::expect_success_and_text 'oc new-app mysql --name=db' 'db' |
| 196 | 196 |
os::cmd::expect_success 'oc new-app https://github.com/openshift/ruby-hello-world -l app=ruby' |
| 197 | 197 |
os::cmd::expect_success 'oc delete all -l app=ruby' |
| 198 | 198 |
# check for error when template JSON file has errors |
| 199 |
-jsonfile="${OS_ROOT}/test/fixtures/invalid.json"
|
|
| 199 |
+jsonfile="${OS_ROOT}/test/testdata/invalid.json"
|
|
| 200 | 200 |
os::cmd::expect_failure_and_text "oc new-app '${jsonfile}'" "error: unable to load template file \"${jsonfile}\": at offset 8: invalid character '}' after object key"
|
| 201 | 201 |
|
| 202 | 202 |
# a docker compose file should be transformed into an application by the import command |
| 203 |
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'warning: not all docker-compose fields were honored' |
|
| 204 |
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'db: cpuset is not supported' |
|
| 205 |
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'no-ports: no ports defined to send traffic to - no OpenShift service was created' |
|
| 206 |
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml -o name --dry-run' 'service/redis' |
|
| 207 |
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml -o name --as-template=other --dry-run' 'template/other' |
|
| 208 |
-os::cmd::expect_success '[[ $(diff --suppress-common-lines -y <(oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/complex/docker-compose.yml -o yaml) test/fixtures/app-scenarios/docker-compose/complex/docker-compose.imported.yaml | grep -vE "ref\:|secret|uri\:" | wc -l) -eq 0 ]]' |
|
| 203 |
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'warning: not all docker-compose fields were honored' |
|
| 204 |
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'db: cpuset is not supported' |
|
| 205 |
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml --dry-run' 'no-ports: no ports defined to send traffic to - no OpenShift service was created' |
|
| 206 |
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml -o name --dry-run' 'service/redis' |
|
| 207 |
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml -o name --as-template=other --dry-run' 'template/other' |
|
| 208 |
+os::cmd::expect_success '[[ $(diff --suppress-common-lines -y <(oc import docker-compose -f test/testdata/app-scenarios/docker-compose/complex/docker-compose.yml -o yaml) test/testdata/app-scenarios/docker-compose/complex/docker-compose.imported.yaml | grep -vE "ref\:|secret|uri\:" | wc -l) -eq 0 ]]' |
|
| 209 | 209 |
|
| 210 | 210 |
# verify a docker-compose.yml schema 2 resource can be transformed, and that it sets env vars correctly. |
| 211 |
-os::cmd::expect_success_and_text 'oc import docker-compose -f test/fixtures/app-scenarios/docker-compose/wordpress/docker-compose.yml -o yaml --as-template=other --dry-run' 'value: wordpress' |
|
| 211 |
+os::cmd::expect_success_and_text 'oc import docker-compose -f test/testdata/app-scenarios/docker-compose/wordpress/docker-compose.yml -o yaml --as-template=other --dry-run' 'value: wordpress' |
|
| 212 | 212 |
|
| 213 | 213 |
# check new-build |
| 214 | 214 |
os::cmd::expect_failure_and_text 'oc new-build mysql -o yaml' 'you must specify at least one source repository URL' |
| ... | ... |
@@ -224,7 +224,7 @@ os::cmd::expect_failure_and_text 'oc new-app openshift/bogusImage https://githu |
| 224 | 224 |
# allow use of non-existent image (should succeed) |
| 225 | 225 |
os::cmd::expect_success 'oc new-app openshift/bogusImage https://github.com/openshift/ruby-hello-world.git -o yaml --allow-missing-images' |
| 226 | 226 |
|
| 227 |
-os::cmd::expect_success 'oc create -f test/fixtures/installable-stream.yaml' |
|
| 227 |
+os::cmd::expect_success 'oc create -f test/testdata/installable-stream.yaml' |
|
| 228 | 228 |
|
| 229 | 229 |
project=$(oc project -q) |
| 230 | 230 |
os::cmd::expect_success 'oc policy add-role-to-user edit test-user' |
| ... | ... |
@@ -92,7 +92,7 @@ os::cmd::expect_failure 'oc policy can-i create pods --as harold -q' |
| 92 | 92 |
# adjust the cluster-admin role to check defaulting and coverage checks |
| 93 | 93 |
# this is done here instead of an integration test because we need to make sure the actual yaml serializations work |
| 94 | 94 |
workingdir=$(mktemp -d) |
| 95 |
-cp ${OS_ROOT}/test/fixtures/bootstrappolicy/cluster_admin_1.0.yaml ${workingdir}
|
|
| 95 |
+cp ${OS_ROOT}/test/testdata/bootstrappolicy/cluster_admin_1.0.yaml ${workingdir}
|
|
| 96 | 96 |
os::util::sed "s/RESOURCE_VERSION//g" ${workingdir}/cluster_admin_1.0.yaml
|
| 97 | 97 |
os::cmd::expect_success "oc create -f ${workingdir}/cluster_admin_1.0.yaml"
|
| 98 | 98 |
os::cmd::expect_success 'oadm policy add-cluster-role-to-user alternate-cluster-admin alternate-cluster-admin-user' |
| ... | ... |
@@ -105,21 +105,21 @@ os::cmd::expect_success "oc login -u alternate-cluster-admin-user -p anything -- |
| 105 | 105 |
# alternate-cluster-admin should default to having star rights, so he should be able to update his role to that |
| 106 | 106 |
os::cmd::try_until_text "oc policy who-can update clusterrroles" "alternate-cluster-admin-user" |
| 107 | 107 |
resourceversion=$(oc get clusterrole/alternate-cluster-admin -o=jsonpath="{.metadata.resourceVersion}")
|
| 108 |
-cp ${OS_ROOT}/test/fixtures/bootstrappolicy/alternate_cluster_admin.yaml ${workingdir}
|
|
| 108 |
+cp ${OS_ROOT}/test/testdata/bootstrappolicy/alternate_cluster_admin.yaml ${workingdir}
|
|
| 109 | 109 |
os::util::sed "s/RESOURCE_VERSION/${resourceversion}/g" ${workingdir}/alternate_cluster_admin.yaml
|
| 110 | 110 |
os::cmd::expect_success "oc replace --config=${new_kubeconfig} clusterrole/alternate-cluster-admin -f ${workingdir}/alternate_cluster_admin.yaml"
|
| 111 | 111 |
|
| 112 | 112 |
# alternate-cluster-admin can restrict himself to no groups |
| 113 | 113 |
os::cmd::try_until_text "oc policy who-can update clusterrroles" "alternate-cluster-admin-user" |
| 114 | 114 |
resourceversion=$(oc get clusterrole/alternate-cluster-admin -o=jsonpath="{.metadata.resourceVersion}")
|
| 115 |
-cp ${OS_ROOT}/test/fixtures/bootstrappolicy/cluster_admin_without_apigroups.yaml ${workingdir}
|
|
| 115 |
+cp ${OS_ROOT}/test/testdata/bootstrappolicy/cluster_admin_without_apigroups.yaml ${workingdir}
|
|
| 116 | 116 |
os::util::sed "s/RESOURCE_VERSION/${resourceversion}/g" ${workingdir}/cluster_admin_without_apigroups.yaml
|
| 117 | 117 |
os::cmd::expect_success "oc replace --config=${new_kubeconfig} clusterrole/alternate-cluster-admin -f ${workingdir}/cluster_admin_without_apigroups.yaml"
|
| 118 | 118 |
|
| 119 | 119 |
# alternate-cluster-admin should NOT have the power add back star now |
| 120 | 120 |
os::cmd::try_until_failure "oc policy who-can update hpa.extensions | grep -q alternate-cluster-admin-user" |
| 121 | 121 |
resourceversion=$(oc get clusterrole/alternate-cluster-admin -o=jsonpath="{.metadata.resourceVersion}")
|
| 122 |
-cp ${OS_ROOT}/test/fixtures/bootstrappolicy/alternate_cluster_admin.yaml ${workingdir}
|
|
| 122 |
+cp ${OS_ROOT}/test/testdata/bootstrappolicy/alternate_cluster_admin.yaml ${workingdir}
|
|
| 123 | 123 |
os::util::sed "s/RESOURCE_VERSION/${resourceversion}/g" ${workingdir}/alternate_cluster_admin.yaml
|
| 124 | 124 |
os::cmd::expect_failure_and_text "oc replace --config=${new_kubeconfig} clusterrole/alternate-cluster-admin -f ${workingdir}/alternate_cluster_admin.yaml" "cannot grant extra privileges"
|
| 125 | 125 |
|
| ... | ... |
@@ -43,10 +43,10 @@ os::cmd::expect_failure_and_text 'oc process template-name --value=key=value --v |
| 43 | 43 |
os::cmd::expect_failure_and_text 'oc process template-name key=value --value=key=value' 'provided more than once: key' |
| 44 | 44 |
os::cmd::expect_failure_and_text 'oc process template-name key=value other=foo --value=key=value --value=other=baz' 'provided more than once: key, other' |
| 45 | 45 |
|
| 46 |
-required_params="${OS_ROOT}/test/fixtures/template_required_params.yaml"
|
|
| 46 |
+required_params="${OS_ROOT}/test/testdata/template_required_params.yaml"
|
|
| 47 | 47 |
|
| 48 | 48 |
# providing something other than a template is not OK |
| 49 |
-os::cmd::expect_failure_and_text "oc process -f '${OS_ROOT}/test/fixtures/basic-users-binding.json'" 'not a valid Template but'
|
|
| 49 |
+os::cmd::expect_failure_and_text "oc process -f '${OS_ROOT}/test/testdata/basic-users-binding.json'" 'not a valid Template but'
|
|
| 50 | 50 |
|
| 51 | 51 |
# not providing required parameter should fail |
| 52 | 52 |
os::cmd::expect_failure_and_text "oc process -f '${required_params}'" 'parameter required_param is required and must be specified'
|
| ... | ... |
@@ -40,21 +40,21 @@ echo "templates: ok" |
| 40 | 40 |
os::test::junit::declare_suite_end |
| 41 | 41 |
|
| 42 | 42 |
os::test::junit::declare_suite_start "cmd/templates/config" |
| 43 |
-os::cmd::expect_success 'oc process -f test/templates/fixtures/guestbook.json -l app=guestbook | oc create -f -' |
|
| 43 |
+os::cmd::expect_success 'oc process -f test/templates/testdata/guestbook.json -l app=guestbook | oc create -f -' |
|
| 44 | 44 |
os::cmd::expect_success_and_text 'oc status' 'frontend-service' |
| 45 | 45 |
echo "template+config: ok" |
| 46 | 46 |
os::test::junit::declare_suite_end |
| 47 | 47 |
|
| 48 | 48 |
os::test::junit::declare_suite_start "cmd/templates/parameters" |
| 49 | 49 |
# Joined parameter values are honored |
| 50 |
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json -v ADMIN_USERNAME=myuser,ADMIN_PASSWORD=mypassword' '"myuser"' |
|
| 51 |
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json -v ADMIN_USERNAME=myuser,ADMIN_PASSWORD=mypassword' '"mypassword"' |
|
| 50 |
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json -v ADMIN_USERNAME=myuser,ADMIN_PASSWORD=mypassword' '"myuser"' |
|
| 51 |
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json -v ADMIN_USERNAME=myuser,ADMIN_PASSWORD=mypassword' '"mypassword"' |
|
| 52 | 52 |
# Individually specified parameter values are honored |
| 53 |
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json -v ADMIN_USERNAME=myuser -v ADMIN_PASSWORD=mypassword' '"myuser"' |
|
| 54 |
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json -v ADMIN_USERNAME=myuser -v ADMIN_PASSWORD=mypassword' '"mypassword"' |
|
| 53 |
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json -v ADMIN_USERNAME=myuser -v ADMIN_PASSWORD=mypassword' '"myuser"' |
|
| 54 |
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json -v ADMIN_USERNAME=myuser -v ADMIN_PASSWORD=mypassword' '"mypassword"' |
|
| 55 | 55 |
# Argument values are honored |
| 56 |
-os::cmd::expect_success_and_text 'oc process ADMIN_USERNAME=myuser ADMIN_PASSWORD=mypassword -f test/templates/fixtures/guestbook.json' '"myuser"' |
|
| 57 |
-os::cmd::expect_success_and_text 'oc process -f test/templates/fixtures/guestbook.json ADMIN_USERNAME=myuser ADMIN_PASSWORD=mypassword' '"mypassword"' |
|
| 56 |
+os::cmd::expect_success_and_text 'oc process ADMIN_USERNAME=myuser ADMIN_PASSWORD=mypassword -f test/templates/testdata/guestbook.json' '"myuser"' |
|
| 57 |
+os::cmd::expect_success_and_text 'oc process -f test/templates/testdata/guestbook.json ADMIN_USERNAME=myuser ADMIN_PASSWORD=mypassword' '"mypassword"' |
|
| 58 | 58 |
# Argument values with commas are honored |
| 59 | 59 |
os::cmd::expect_success 'oc create -f examples/sample-app/application-template-stibuild.json' |
| 60 | 60 |
os::cmd::expect_success_and_text 'oc process ruby-helloworld-sample MYSQL_USER=myself MYSQL_PASSWORD=my,1%pass' '"myself"' |
| ... | ... |
@@ -66,7 +66,7 @@ os::test::junit::declare_suite_end |
| 66 | 66 |
os::test::junit::declare_suite_start "cmd/templates/data-precision" |
| 67 | 67 |
# Run as cluster-admin to allow choosing any supplemental groups we want |
| 68 | 68 |
# Ensure large integers survive unstructured JSON creation |
| 69 |
-os::cmd::expect_success 'oc create -f test/fixtures/template-type-precision.json' |
|
| 69 |
+os::cmd::expect_success 'oc create -f test/testdata/template-type-precision.json' |
|
| 70 | 70 |
# ... and processing |
| 71 | 71 |
os::cmd::expect_success_and_text 'oc process template-type-precision' '1000030003' |
| 72 | 72 |
os::cmd::expect_success_and_text 'oc process template-type-precision' '2147483647' |
| ... | ... |
@@ -22,7 +22,7 @@ trap os::test::junit::reconcile_output EXIT |
| 22 | 22 |
os::test::junit::declare_suite_start "cmd/volumes" |
| 23 | 23 |
# This test validates the 'volume' command |
| 24 | 24 |
|
| 25 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml' |
|
| 25 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml' |
|
| 26 | 26 |
|
| 27 | 27 |
os::cmd::expect_success_and_text 'oc volume dc/test-deployment-config --list' 'vol1' |
| 28 | 28 |
os::cmd::expect_success 'oc volume dc/test-deployment-config --add --name=vol0 -m /opt5' |
| ... | ... |
@@ -192,12 +192,12 @@ os::cmd::expect_success_and_text "cat '${LOG_DIR}/kubectl-with-token.log'" 'kube
|
| 192 | 192 |
|
| 193 | 193 |
echo "[INFO] Testing deployment logs and failing pre and mid hooks ..." |
| 194 | 194 |
# test hook selectors |
| 195 |
-os::cmd::expect_success "oc create -f ${OS_ROOT}/test/fixtures/complete-dc-hooks.yaml"
|
|
| 195 |
+os::cmd::expect_success "oc create -f ${OS_ROOT}/test/testdata/complete-dc-hooks.yaml"
|
|
| 196 | 196 |
os::cmd::try_until_text 'oc get pods -l openshift.io/deployer-pod.type=hook-pre -o jsonpath={.items[*].status.phase}' '^Succeeded$'
|
| 197 | 197 |
os::cmd::try_until_text 'oc get pods -l openshift.io/deployer-pod.type=hook-mid -o jsonpath={.items[*].status.phase}' '^Succeeded$'
|
| 198 | 198 |
os::cmd::try_until_text 'oc get pods -l openshift.io/deployer-pod.type=hook-post -o jsonpath={.items[*].status.phase}' '^Succeeded$'
|
| 199 | 199 |
# test the pre hook on a rolling deployment |
| 200 |
-oc create -f test/fixtures/failing-dc.yaml |
|
| 200 |
+oc create -f test/testdata/failing-dc.yaml |
|
| 201 | 201 |
tryuntil oc get rc/failing-dc-1 |
| 202 | 202 |
oc logs -f dc/failing-dc |
| 203 | 203 |
wait_for_command "oc get rc/failing-dc-1 --template={{.metadata.annotations}} | grep openshift.io/deployment.phase:Failed" $((60*TIME_SEC))
|
| ... | ... |
@@ -210,7 +210,7 @@ os::cmd::expect_success_and_text 'oc logs --previous --since-time=2000-01-01T12: |
| 210 | 210 |
os::cmd::expect_success_and_text 'oc logs --previous --since-time=2000-01-01T12:34:56Z --loglevel=6 dc/failing-dc 2>&1' 'test pre hook executed' |
| 211 | 211 |
oc delete dc/failing-dc |
| 212 | 212 |
# test the mid hook on a recreate deployment and the health check |
| 213 |
-oc create -f test/fixtures/failing-dc-mid.yaml |
|
| 213 |
+oc create -f test/testdata/failing-dc-mid.yaml |
|
| 214 | 214 |
tryuntil oc get rc/failing-dc-mid-1 |
| 215 | 215 |
oc logs -f dc/failing-dc-mid |
| 216 | 216 |
wait_for_command "oc get rc/failing-dc-mid-1 --template={{.metadata.annotations}} | grep openshift.io/deployment.phase:Failed" $((60*TIME_SEC))
|
| ... | ... |
@@ -252,7 +252,7 @@ os::cmd::expect_success 'oc logs buildconfig/ruby-sample-build --loglevel=6' |
| 252 | 252 |
echo "logs: ok" |
| 253 | 253 |
|
| 254 | 254 |
echo "[INFO] Starting a deployment to test scaling and image tag..." |
| 255 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml' |
|
| 255 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml' |
|
| 256 | 256 |
# scaling which might conflict with the deployment should work |
| 257 | 257 |
os::cmd::expect_success 'oc scale dc/test-deployment-config --replicas=2' |
| 258 | 258 |
os::cmd::try_until_text 'oc get rc/test-deployment-config-1 -o yaml' 'Complete' |
| ... | ... |
@@ -341,7 +341,7 @@ echo "[INFO] Validating pod.spec.nodeSelector rejections" |
| 341 | 341 |
# Create a project that enforces an impossible to satisfy nodeSelector, and two pods, one of which has an explicit node name |
| 342 | 342 |
os::cmd::expect_success "openshift admin new-project node-selector --description='This is an example project to test node selection prevents deployment' --admin='e2e-user' --node-selector='impossible-label=true'" |
| 343 | 343 |
NODE_NAME=`oc get node --no-headers | awk '{print $1}'`
|
| 344 |
-os::cmd::expect_success "oc process -n node-selector -v NODE_NAME='${NODE_NAME}' -f test/fixtures/node-selector/pods.json | oc create -n node-selector -f -"
|
|
| 344 |
+os::cmd::expect_success "oc process -n node-selector -v NODE_NAME='${NODE_NAME}' -f test/testdata/node-selector/pods.json | oc create -n node-selector -f -"
|
|
| 345 | 345 |
# The pod without a node name should fail to schedule |
| 346 | 346 |
os::cmd::try_until_text 'oc get events -n node-selector' 'pod-without-node-name.+FailedScheduling' $((20*TIME_SEC)) |
| 347 | 347 |
# The pod with a node name should be rejected by the kubelet |
| ... | ... |
@@ -120,7 +120,7 @@ var _ = g.Describe("[<test bucket>] <Testing scenario>", func() {
|
| 120 | 120 |
defer g.GinkgoRecover() |
| 121 | 121 |
var ( |
| 122 | 122 |
oc = exutil.NewCLI("test-name", exutil.KubeConfigPath())
|
| 123 |
- testFixture = filepath.Join("fixtures", "test.json")
|
|
| 123 |
+ testFixture = filepath.Join("testdata", "test.json")
|
|
| 124 | 124 |
) |
| 125 | 125 |
}) |
| 126 | 126 |
``` |
| ... | ... |
@@ -131,7 +131,7 @@ The test suite should be organized into lower-level Ginkgo describe(s) container |
| 131 | 131 |
var _ = g.Describe("[default] STI build", func() {
|
| 132 | 132 |
defer GinkgoRecover() |
| 133 | 133 |
var ( |
| 134 |
- stiBuildFixture = filepath.Join("fixtures", "test-build.json")
|
|
| 134 |
+ stiBuildFixture = filepath.Join("testdata", "test-build.json")
|
|
| 135 | 135 |
oc = exutil.NewCLI("build-sti", kubeConfigPath())
|
| 136 | 136 |
) |
| 137 | 137 |
|
| ... | ... |
@@ -13,8 +13,8 @@ import ( |
| 13 | 13 |
var _ = g.Describe("[builds][Slow] builds should have deadlines", func() {
|
| 14 | 14 |
defer g.GinkgoRecover() |
| 15 | 15 |
var ( |
| 16 |
- sourceFixture = exutil.FixturePath("..", "extended", "fixtures", "test-cds-sourcebuild.json")
|
|
| 17 |
- dockerFixture = exutil.FixturePath("..", "extended", "fixtures", "test-cds-dockerbuild.json")
|
|
| 16 |
+ sourceFixture = exutil.FixturePath("..", "extended", "testdata", "test-cds-sourcebuild.json")
|
|
| 17 |
+ dockerFixture = exutil.FixturePath("..", "extended", "testdata", "test-cds-dockerbuild.json")
|
|
| 18 | 18 |
oc = exutil.NewCLI("cli-start-build", exutil.KubeConfigPath())
|
| 19 | 19 |
) |
| 20 | 20 |
|
| ... | ... |
@@ -17,7 +17,7 @@ var _ = g.Describe("[builds][pullsecret][Conformance] docker build using a pull
|
| 17 | 17 |
) |
| 18 | 18 |
|
| 19 | 19 |
var ( |
| 20 |
- buildFixture = exutil.FixturePath("fixtures", "test-docker-build-pullsecret.json")
|
|
| 20 |
+ buildFixture = exutil.FixturePath("testdata", "test-docker-build-pullsecret.json")
|
|
| 21 | 21 |
oc = exutil.NewCLI("docker-build-pullsecret", exutil.KubeConfigPath())
|
| 22 | 22 |
) |
| 23 | 23 |
|
| ... | ... |
@@ -17,7 +17,7 @@ var _ = g.Describe("[builds][quota][Slow] docker build with a quota", func() {
|
| 17 | 17 |
) |
| 18 | 18 |
|
| 19 | 19 |
var ( |
| 20 |
- buildFixture = exutil.FixturePath("fixtures", "test-docker-build-quota.json")
|
|
| 20 |
+ buildFixture = exutil.FixturePath("testdata", "test-docker-build-quota.json")
|
|
| 21 | 21 |
oc = exutil.NewCLI("docker-build-quota", exutil.KubeConfigPath())
|
| 22 | 22 |
) |
| 23 | 23 |
|
| ... | ... |
@@ -36,7 +36,7 @@ var _ = g.Describe("[builds][quota][Slow] docker build with a quota", func() {
|
| 36 | 36 |
o.Expect(err).NotTo(o.HaveOccurred()) |
| 37 | 37 |
|
| 38 | 38 |
g.By("starting a test build")
|
| 39 |
- _, err = oc.Run("start-build").Args("docker-build-quota", "--from-dir", exutil.FixturePath("fixtures", "build-quota")).Output()
|
|
| 39 |
+ _, err = oc.Run("start-build").Args("docker-build-quota", "--from-dir", exutil.FixturePath("testdata", "build-quota")).Output()
|
|
| 40 | 40 |
o.Expect(err).NotTo(o.HaveOccurred()) |
| 41 | 41 |
|
| 42 | 42 |
g.By("expecting the build is in Failed phase")
|
| ... | ... |
@@ -87,7 +87,7 @@ var _ = g.Describe("[LocalNode][builds] forcePull should affect pulling builder
|
| 87 | 87 |
exutil.DumpImage(corruptor) |
| 88 | 88 |
|
| 89 | 89 |
// create the image streams and build configs for a test case specific builders |
| 90 |
- setupPath := exutil.FixturePath("fixtures", "forcepull-setup.json")
|
|
| 90 |
+ setupPath := exutil.FixturePath("testdata", "forcepull-setup.json")
|
|
| 91 | 91 |
err := exutil.CreateResource(setupPath, oc) |
| 92 | 92 |
|
| 93 | 93 |
// kick off the build for the new builder image just for force pull so we can corrupt them without conflicting with |
| ... | ... |
@@ -114,7 +114,7 @@ var _ = g.Describe("[LocalNode][builds] forcePull should affect pulling builder
|
| 114 | 114 |
|
| 115 | 115 |
//update the build configs in the json for the app/lang builds to point to the builder images in the internal docker registry |
| 116 | 116 |
// and then create the build config resources |
| 117 |
- pre := exutil.FixturePath("fixtures", "forcepull-test.json")
|
|
| 117 |
+ pre := exutil.FixturePath("testdata", "forcepull-test.json")
|
|
| 118 | 118 |
post := exutil.ArtifactPath("forcepull-test.json")
|
| 119 | 119 |
varSubDest = authCfg.ServerAddress + "/" + oc.Namespace() |
| 120 | 120 |
err = exutil.VarSubOnFile(pre, post, varSubSrc, varSubDest) |
| ... | ... |
@@ -39,9 +39,9 @@ var _ = g.Describe("[builds][Slow] can use private repositories as build input",
|
| 39 | 39 |
) |
| 40 | 40 |
|
| 41 | 41 |
var ( |
| 42 |
- gitServerFixture = exutil.FixturePath("fixtures", "test-gitserver.yaml")
|
|
| 43 |
- gitServerTokenAuthFixture = exutil.FixturePath("fixtures", "test-gitserver-tokenauth.yaml")
|
|
| 44 |
- testBuildFixture = exutil.FixturePath("fixtures", "test-auth-build.yaml")
|
|
| 42 |
+ gitServerFixture = exutil.FixturePath("testdata", "test-gitserver.yaml")
|
|
| 43 |
+ gitServerTokenAuthFixture = exutil.FixturePath("testdata", "test-gitserver-tokenauth.yaml")
|
|
| 44 |
+ testBuildFixture = exutil.FixturePath("testdata", "test-auth-build.yaml")
|
|
| 45 | 45 |
oc = exutil.NewCLI("build-sti-private-repo", exutil.KubeConfigPath())
|
| 46 | 46 |
caCertPath = filepath.Join(filepath.Dir(exutil.KubeConfigPath()), "ca.crt") |
| 47 | 47 |
) |
| ... | ... |
@@ -12,7 +12,7 @@ import ( |
| 12 | 12 |
var _ = g.Describe("[builds][Slow] build can have Docker image source", func() {
|
| 13 | 13 |
defer g.GinkgoRecover() |
| 14 | 14 |
var ( |
| 15 |
- buildFixture = exutil.FixturePath("fixtures", "test-imagesource-build.yaml")
|
|
| 15 |
+ buildFixture = exutil.FixturePath("testdata", "test-imagesource-build.yaml")
|
|
| 16 | 16 |
oc = exutil.NewCLI("build-image-source", exutil.KubeConfigPath())
|
| 17 | 17 |
imageSourceLabel = exutil.ParseLabelsOrDie("app=imagesourceapp")
|
| 18 | 18 |
imageDockerLabel = exutil.ParseLabelsOrDie("app=imagedockerapp")
|
| ... | ... |
@@ -13,9 +13,9 @@ import ( |
| 13 | 13 |
var _ = g.Describe("[builds][Slow] result image should have proper labels set", func() {
|
| 14 | 14 |
defer g.GinkgoRecover() |
| 15 | 15 |
var ( |
| 16 |
- imageStreamFixture = exutil.FixturePath("..", "integration", "fixtures", "test-image-stream.json")
|
|
| 17 |
- stiBuildFixture = exutil.FixturePath("fixtures", "test-s2i-build.json")
|
|
| 18 |
- dockerBuildFixture = exutil.FixturePath("fixtures", "test-docker-build.json")
|
|
| 16 |
+ imageStreamFixture = exutil.FixturePath("..", "integration", "testdata", "test-image-stream.json")
|
|
| 17 |
+ stiBuildFixture = exutil.FixturePath("testdata", "test-s2i-build.json")
|
|
| 18 |
+ dockerBuildFixture = exutil.FixturePath("testdata", "test-docker-build.json")
|
|
| 19 | 19 |
oc = exutil.NewCLI("build-sti-labels", exutil.KubeConfigPath())
|
| 20 | 20 |
) |
| 21 | 21 |
|
| ... | ... |
@@ -12,8 +12,8 @@ import ( |
| 12 | 12 |
var _ = g.Describe("[builds][Conformance] build without output image", func() {
|
| 13 | 13 |
defer g.GinkgoRecover() |
| 14 | 14 |
var ( |
| 15 |
- dockerImageFixture = exutil.FixturePath("fixtures", "test-docker-no-outputname.json")
|
|
| 16 |
- s2iImageFixture = exutil.FixturePath("fixtures", "test-s2i-no-outputname.json")
|
|
| 15 |
+ dockerImageFixture = exutil.FixturePath("testdata", "test-docker-no-outputname.json")
|
|
| 16 |
+ s2iImageFixture = exutil.FixturePath("testdata", "test-s2i-no-outputname.json")
|
|
| 17 | 17 |
oc = exutil.NewCLI("build-no-outputname", exutil.KubeConfigPath())
|
| 18 | 18 |
) |
| 19 | 19 |
|
| ... | ... |
@@ -12,9 +12,9 @@ import ( |
| 12 | 12 |
var _ = g.Describe("[builds] build with empty source", func() {
|
| 13 | 13 |
defer g.GinkgoRecover() |
| 14 | 14 |
var ( |
| 15 |
- buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-nosrc-build.json")
|
|
| 15 |
+ buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-nosrc-build.json")
|
|
| 16 | 16 |
oc = exutil.NewCLI("cli-build-nosrc", exutil.KubeConfigPath())
|
| 17 |
- exampleBuild = exutil.FixturePath("..", "extended", "fixtures", "test-build-app")
|
|
| 17 |
+ exampleBuild = exutil.FixturePath("..", "extended", "testdata", "test-build-app")
|
|
| 18 | 18 |
) |
| 19 | 19 |
|
| 20 | 20 |
g.JustBeforeEach(func() {
|
| ... | ... |
@@ -14,7 +14,7 @@ import ( |
| 14 | 14 |
var _ = g.Describe("[builds][Slow] the s2i build should support proxies", func() {
|
| 15 | 15 |
defer g.GinkgoRecover() |
| 16 | 16 |
var ( |
| 17 |
- buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-build-proxy.json")
|
|
| 17 |
+ buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-build-proxy.json")
|
|
| 18 | 18 |
oc = exutil.NewCLI("build-proxy", exutil.KubeConfigPath())
|
| 19 | 19 |
) |
| 20 | 20 |
|
| ... | ... |
@@ -14,7 +14,7 @@ import ( |
| 14 | 14 |
var _ = g.Describe("[builds][Conformance] remove all builds when build configuration is removed", func() {
|
| 15 | 15 |
defer g.GinkgoRecover() |
| 16 | 16 |
var ( |
| 17 |
- buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-build.json")
|
|
| 17 |
+ buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-build.json")
|
|
| 18 | 18 |
oc = exutil.NewCLI("cli-remove-build", exutil.KubeConfigPath())
|
| 19 | 19 |
) |
| 20 | 20 |
|
| ... | ... |
@@ -12,7 +12,7 @@ import ( |
| 12 | 12 |
var _ = g.Describe("[builds] build have source revision metadata", func() {
|
| 13 | 13 |
defer g.GinkgoRecover() |
| 14 | 14 |
var ( |
| 15 |
- buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-build-revision.json")
|
|
| 15 |
+ buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-build-revision.json")
|
|
| 16 | 16 |
oc = exutil.NewCLI("cli-build-revision", exutil.KubeConfigPath())
|
| 17 | 17 |
) |
| 18 | 18 |
|
| ... | ... |
@@ -26,7 +26,7 @@ var _ = g.Describe("[builds][Slow] using build configuration runPolicy", func()
|
| 26 | 26 |
err := exutil.WaitForBuilderAccount(oc.KubeREST().ServiceAccounts(oc.Namespace())) |
| 27 | 27 |
o.Expect(err).NotTo(o.HaveOccurred()) |
| 28 | 28 |
// Create all fixtures |
| 29 |
- oc.Run("create").Args("-f", exutil.FixturePath("..", "extended", "fixtures", "run_policy")).Execute()
|
|
| 29 |
+ oc.Run("create").Args("-f", exutil.FixturePath("..", "extended", "testdata", "run_policy")).Execute()
|
|
| 30 | 30 |
}) |
| 31 | 31 |
|
| 32 | 32 |
g.Describe("build configuration with Parallel build run policy", func() {
|
| ... | ... |
@@ -15,8 +15,8 @@ import ( |
| 15 | 15 |
var _ = g.Describe("[builds][Slow] Capabilities should be dropped for s2i builders", func() {
|
| 16 | 16 |
defer g.GinkgoRecover() |
| 17 | 17 |
var ( |
| 18 |
- s2ibuilderFixture = exutil.FixturePath("..", "extended", "fixtures", "s2i-dropcaps", "rootable-ruby")
|
|
| 19 |
- rootAccessBuildFixture = exutil.FixturePath("..", "extended", "fixtures", "s2i-dropcaps", "root-access-build.yaml")
|
|
| 18 |
+ s2ibuilderFixture = exutil.FixturePath("..", "extended", "testdata", "s2i-dropcaps", "rootable-ruby")
|
|
| 19 |
+ rootAccessBuildFixture = exutil.FixturePath("..", "extended", "testdata", "s2i-dropcaps", "root-access-build.yaml")
|
|
| 20 | 20 |
oc = exutil.NewCLI("build-s2i-dropcaps", exutil.KubeConfigPath())
|
| 21 | 21 |
) |
| 22 | 22 |
|
| ... | ... |
@@ -20,9 +20,9 @@ var _ = g.Describe("[builds][Slow] s2i build with environment file in sources",
|
| 20 | 20 |
) |
| 21 | 21 |
|
| 22 | 22 |
var ( |
| 23 |
- imageStreamFixture = exutil.FixturePath("..", "integration", "fixtures", "test-image-stream.json")
|
|
| 24 |
- stiEnvBuildFixture = exutil.FixturePath("fixtures", "test-env-build.json")
|
|
| 25 |
- podAndServiceFixture = exutil.FixturePath("fixtures", "test-build-podsvc.json")
|
|
| 23 |
+ imageStreamFixture = exutil.FixturePath("..", "integration", "testdata", "test-image-stream.json")
|
|
| 24 |
+ stiEnvBuildFixture = exutil.FixturePath("testdata", "test-env-build.json")
|
|
| 25 |
+ podAndServiceFixture = exutil.FixturePath("testdata", "test-build-podsvc.json")
|
|
| 26 | 26 |
oc = exutil.NewCLI("build-sti-env", exutil.KubeConfigPath())
|
| 27 | 27 |
) |
| 28 | 28 |
|
| ... | ... |
@@ -20,8 +20,8 @@ var _ = g.Describe("[builds][Slow] incremental s2i build", func() {
|
| 20 | 20 |
) |
| 21 | 21 |
|
| 22 | 22 |
var ( |
| 23 |
- templateFixture = exutil.FixturePath("fixtures", "incremental-auth-build.json")
|
|
| 24 |
- podAndServiceFixture = exutil.FixturePath("fixtures", "test-build-podsvc.json")
|
|
| 23 |
+ templateFixture = exutil.FixturePath("testdata", "incremental-auth-build.json")
|
|
| 24 |
+ podAndServiceFixture = exutil.FixturePath("testdata", "test-build-podsvc.json")
|
|
| 25 | 25 |
oc = exutil.NewCLI("build-sti-inc", exutil.KubeConfigPath())
|
| 26 | 26 |
) |
| 27 | 27 |
|
| ... | ... |
@@ -17,7 +17,7 @@ var _ = g.Describe("[builds][Conformance] s2i build with a quota", func() {
|
| 17 | 17 |
) |
| 18 | 18 |
|
| 19 | 19 |
var ( |
| 20 |
- buildFixture = exutil.FixturePath("fixtures", "test-s2i-build-quota.json")
|
|
| 20 |
+ buildFixture = exutil.FixturePath("testdata", "test-s2i-build-quota.json")
|
|
| 21 | 21 |
oc = exutil.NewCLI("s2i-build-quota", exutil.KubeConfigPath())
|
| 22 | 22 |
) |
| 23 | 23 |
|
| ... | ... |
@@ -36,7 +36,7 @@ var _ = g.Describe("[builds][Conformance] s2i build with a quota", func() {
|
| 36 | 36 |
o.Expect(err).NotTo(o.HaveOccurred()) |
| 37 | 37 |
|
| 38 | 38 |
g.By("starting a test build")
|
| 39 |
- _, err = oc.Run("start-build").Args("s2i-build-quota", "--from-dir", exutil.FixturePath("fixtures", "build-quota")).Output()
|
|
| 39 |
+ _, err = oc.Run("start-build").Args("s2i-build-quota", "--from-dir", exutil.FixturePath("testdata", "build-quota")).Output()
|
|
| 40 | 40 |
o.Expect(err).NotTo(o.HaveOccurred()) |
| 41 | 41 |
|
| 42 | 42 |
g.By("expecting the build is in Complete phase")
|
| ... | ... |
@@ -13,7 +13,7 @@ import ( |
| 13 | 13 |
var _ = g.Describe("[builds][Slow] can use build secrets", func() {
|
| 14 | 14 |
defer g.GinkgoRecover() |
| 15 | 15 |
var ( |
| 16 |
- buildSecretBaseDir = exutil.FixturePath("fixtures", "build-secrets")
|
|
| 16 |
+ buildSecretBaseDir = exutil.FixturePath("testdata", "build-secrets")
|
|
| 17 | 17 |
secretsFixture = filepath.Join(buildSecretBaseDir, "test-secret.json") |
| 18 | 18 |
secondSecretsFixture = filepath.Join(buildSecretBaseDir, "test-secret-2.json") |
| 19 | 19 |
isFixture = filepath.Join(buildSecretBaseDir, "test-is.json") |
| ... | ... |
@@ -16,9 +16,9 @@ import ( |
| 16 | 16 |
var _ = g.Describe("[builds][Slow] starting a build using CLI", func() {
|
| 17 | 17 |
defer g.GinkgoRecover() |
| 18 | 18 |
var ( |
| 19 |
- buildFixture = exutil.FixturePath("..", "extended", "fixtures", "test-build.json")
|
|
| 20 |
- exampleGemfile = exutil.FixturePath("..", "extended", "fixtures", "test-build-app", "Gemfile")
|
|
| 21 |
- exampleBuild = exutil.FixturePath("..", "extended", "fixtures", "test-build-app")
|
|
| 19 |
+ buildFixture = exutil.FixturePath("..", "extended", "testdata", "test-build.json")
|
|
| 20 |
+ exampleGemfile = exutil.FixturePath("..", "extended", "testdata", "test-build-app", "Gemfile")
|
|
| 21 |
+ exampleBuild = exutil.FixturePath("..", "extended", "testdata", "test-build-app")
|
|
| 22 | 22 |
oc = exutil.NewCLI("cli-start-build", exutil.KubeConfigPath())
|
| 23 | 23 |
) |
| 24 | 24 |
|
| ... | ... |
@@ -95,7 +95,7 @@ os::test::junit::declare_suite_end |
| 95 | 95 |
os::test::junit::declare_suite_start "extended/cmd/variable-expansion" |
| 96 | 96 |
echo "[INFO] Running env variable expansion tests" |
| 97 | 97 |
VERBOSE=true os::cmd::expect_success "oc new-project envtest" |
| 98 |
-os::cmd::expect_success "oc create -f test/extended/fixtures/test-env-pod.json" |
|
| 98 |
+os::cmd::expect_success "oc create -f test/extended/testdata/test-env-pod.json" |
|
| 99 | 99 |
os::cmd::try_until_text "oc get pods" "Running" |
| 100 | 100 |
os::cmd::expect_success_and_text "oc exec test-pod env" "podname=test-pod" |
| 101 | 101 |
os::cmd::expect_success_and_text "oc exec test-pod env" "podname_composed=test-pod_composed" |
| ... | ... |
@@ -128,26 +128,26 @@ os::cmd::expect_success "oc delete secrets --all" |
| 128 | 128 |
os::cmd::expect_success "oc secrets new image-ns-pull .dockerconfigjson=${DOCKER_CONFIG_JSON}"
|
| 129 | 129 |
os::cmd::expect_success "oc secrets new-dockercfg image-ns-pull-old --docker-email=fake@example.org --docker-username=imagensbuilder --docker-server=${docker_registry} --docker-password=${token}"
|
| 130 | 130 |
|
| 131 |
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/pod-with-no-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 131 |
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/pod-with-no-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 132 | 132 |
os::cmd::try_until_text "oc describe pod/no-pull-pod" "Back-off pulling image" |
| 133 | 133 |
os::cmd::expect_success "oc delete pods --all" |
| 134 | 134 |
|
| 135 |
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/pod-with-new-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 135 |
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/pod-with-new-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 136 | 136 |
os::cmd::try_until_text "oc get pods/new-pull-pod -o jsonpath='{.status.containerStatuses[0].imageID}'" "docker"
|
| 137 | 137 |
os::cmd::expect_success "oc delete pods --all" |
| 138 | 138 |
os::cmd::expect_success "docker rmi -f ${docker_registry}/image-ns/busybox:latest"
|
| 139 | 139 |
|
| 140 |
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/pod-with-old-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 140 |
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/pod-with-old-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 141 | 141 |
os::cmd::try_until_text "oc get pods/old-pull-pod -o jsonpath='{.status.containerStatuses[0].imageID}'" "docker"
|
| 142 | 142 |
os::cmd::expect_success "oc delete pods --all" |
| 143 | 143 |
os::cmd::expect_success "docker rmi -f ${docker_registry}/image-ns/busybox:latest"
|
| 144 | 144 |
|
| 145 |
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/dc-with-old-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 145 |
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/dc-with-old-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 146 | 146 |
os::cmd::try_until_text "oc get pods/my-dc-old-1-hook-pre -o jsonpath='{.status.containerStatuses[0].imageID}'" "docker"
|
| 147 | 147 |
os::cmd::expect_success "oc delete all --all" |
| 148 | 148 |
os::cmd::expect_success "docker rmi -f ${docker_registry}/image-ns/busybox:latest"
|
| 149 | 149 |
|
| 150 |
-os::cmd::expect_success "oc process -f test/extended/fixtures/image-pull-secrets/dc-with-new-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 150 |
+os::cmd::expect_success "oc process -f test/extended/testdata/image-pull-secrets/dc-with-new-pull-secret.yaml --value=DOCKER_REGISTRY=${docker_registry} | oc create -f - "
|
|
| 151 | 151 |
os::cmd::try_until_text "oc get pods/my-dc-1-hook-pre -o jsonpath='{.status.containerStatuses[0].imageID}'" "docker"
|
| 152 | 152 |
os::cmd::expect_success "oc delete all --all" |
| 153 | 153 |
os::cmd::expect_success "docker rmi -f ${docker_registry}/image-ns/busybox:latest"
|
| ... | ... |
@@ -166,12 +166,12 @@ os::cmd::expect_success 'oc create dc nginx --image=nginx -- sh -c "nginx -c /et |
| 166 | 166 |
os::cmd::expect_success "oc expose dc/nginx --port=443" |
| 167 | 167 |
os::cmd::expect_success "oc annotate svc/nginx service.alpha.openshift.io/serving-cert-secret-name=nginx-ssl-key" |
| 168 | 168 |
os::cmd::expect_success "oc volumes dc/nginx --add --secret-name=nginx-ssl-key --mount-path=/etc/serving-cert" |
| 169 |
-os::cmd::expect_success "oc create configmap default-conf --from-file=test/extended/fixtures/service-serving-cert/nginx-serving-cert.conf" |
|
| 169 |
+os::cmd::expect_success "oc create configmap default-conf --from-file=test/extended/testdata/service-serving-cert/nginx-serving-cert.conf" |
|
| 170 | 170 |
os::cmd::expect_success "oc set volumes dc/nginx --add --configmap-name=default-conf --mount-path=/etc/nginx/conf.d" |
| 171 | 171 |
os::cmd::try_until_text "oc get pods -l deployment-config.name=nginx" 'Running' |
| 172 | 172 |
|
| 173 | 173 |
# only show single pods in status if they are really single |
| 174 |
-os::cmd::expect_success 'oc create -f test/integration/fixtures/test-deployment-config.yaml' |
|
| 174 |
+os::cmd::expect_success 'oc create -f test/integration/testdata/test-deployment-config.yaml' |
|
| 175 | 175 |
os::cmd::try_until_text 'oc status' 'dc\/test-deployment-config deploys docker\.io\/openshift\/origin-pod:latest' "$(( 2 * TIME_MIN ))" |
| 176 | 176 |
os::cmd::try_until_text 'oc status' 'deployment #1 deployed.*- 1 pod' "$(( 2 * TIME_MIN ))" |
| 177 | 177 |
os::cmd::expect_success_and_not_text 'oc status' 'pod\/test-deployment-config-1-[0-9a-z]{5} runs openshift\/origin-pod'
|
| ... | ... |
@@ -23,11 +23,11 @@ var _ = g.Describe("deploymentconfigs", func() {
|
| 23 | 23 |
defer g.GinkgoRecover() |
| 24 | 24 |
var ( |
| 25 | 25 |
oc = exutil.NewCLI("cli-deployment", exutil.KubeConfigPath())
|
| 26 |
- deploymentFixture = exutil.FixturePath("..", "extended", "fixtures", "test-deployment-test.yaml")
|
|
| 27 |
- simpleDeploymentFixture = exutil.FixturePath("..", "extended", "fixtures", "deployment-simple.yaml")
|
|
| 28 |
- customDeploymentFixture = exutil.FixturePath("..", "extended", "fixtures", "custom-deployment.yaml")
|
|
| 29 |
- generationFixture = exutil.FixturePath("..", "extended", "fixtures", "test-deployment.yaml")
|
|
| 30 |
- pausedDeploymentFixture = exutil.FixturePath("..", "extended", "fixtures", "paused-deployment.yaml")
|
|
| 26 |
+ deploymentFixture = exutil.FixturePath("..", "extended", "testdata", "test-deployment-test.yaml")
|
|
| 27 |
+ simpleDeploymentFixture = exutil.FixturePath("..", "extended", "testdata", "deployment-simple.yaml")
|
|
| 28 |
+ customDeploymentFixture = exutil.FixturePath("..", "extended", "testdata", "custom-deployment.yaml")
|
|
| 29 |
+ generationFixture = exutil.FixturePath("..", "extended", "testdata", "test-deployment.yaml")
|
|
| 30 |
+ pausedDeploymentFixture = exutil.FixturePath("..", "extended", "testdata", "paused-deployment.yaml")
|
|
| 31 | 31 |
) |
| 32 | 32 |
|
| 33 | 33 |
g.Describe("when run iteratively", func() {
|
| ... | ... |
@@ -83,7 +83,7 @@ func waitForJenkinsActivity(uri, verificationString string, status int) error {
|
| 83 | 83 |
} |
| 84 | 84 |
|
| 85 | 85 |
func jenkinsJobBytes(filename, namespace string) []byte {
|
| 86 |
- pre := exutil.FixturePath("fixtures", filename)
|
|
| 86 |
+ pre := exutil.FixturePath("testdata", filename)
|
|
| 87 | 87 |
post := exutil.ArtifactPath(filename) |
| 88 | 88 |
err := exutil.VarSubOnFile(pre, post, "PROJECT_NAME", namespace) |
| 89 | 89 |
o.Expect(err).NotTo(o.HaveOccurred()) |
| ... | ... |
@@ -110,7 +110,7 @@ var _ = g.Describe("[jenkins][Slow] openshift pipeline plugin", func() {
|
| 110 | 110 |
var testingSnapshot bool |
| 111 | 111 |
if len(hexIDs) > 0 && err == nil {
|
| 112 | 112 |
// found an openshift pipeline plugin test image, must be testing a proposed change to the plugin |
| 113 |
- jenkinsEphemeralPath = exutil.FixturePath("fixtures", "jenkins-ephemeral-template-test-new-plugin.json")
|
|
| 113 |
+ jenkinsEphemeralPath = exutil.FixturePath("testdata", "jenkins-ephemeral-template-test-new-plugin.json")
|
|
| 114 | 114 |
testingSnapshot = true |
| 115 | 115 |
} else {
|
| 116 | 116 |
// no test image, testing the base jenkins image with the current, supported version of the plugin |
| ... | ... |
@@ -20,7 +20,7 @@ var _ = g.Describe("[job] openshift can execute jobs", func() {
|
| 20 | 20 |
g.It("should create and run a job in user project", func() {
|
| 21 | 21 |
for _, ver := range []string{"v1beta1", "v1"} {
|
| 22 | 22 |
oc.SetOutputDir(exeutil.TestContext.OutputDir) |
| 23 |
- configPath := exeutil.FixturePath("fixtures", "jobs", fmt.Sprintf("%s.yaml", ver))
|
|
| 23 |
+ configPath := exeutil.FixturePath("testdata", "jobs", fmt.Sprintf("%s.yaml", ver))
|
|
| 24 | 24 |
name := fmt.Sprintf("simple%s", ver)
|
| 25 | 25 |
labels := fmt.Sprintf("app=%s", name)
|
| 26 | 26 |
|
| ... | ... |
@@ -53,7 +53,7 @@ oc login ${MASTER_ADDR} -u ldap -p password --certificate-authority=${MASTER_CON
|
| 53 | 53 |
oc new-project openldap |
| 54 | 54 |
|
| 55 | 55 |
# create all the resources we need |
| 56 |
-oc create -f test/extended/fixtures/ldap |
|
| 56 |
+oc create -f test/extended/testdata/ldap |
|
| 57 | 57 |
|
| 58 | 58 |
is_event_template=( \ |
| 59 | 59 |
"{{with \$tags := .status.tags}}" \
|
| ... | ... |
@@ -17,7 +17,7 @@ import ( |
| 17 | 17 |
var _ = g.Describe("[networking][router] openshift routers", func() {
|
| 18 | 18 |
defer g.GinkgoRecover() |
| 19 | 19 |
var ( |
| 20 |
- configPath = exutil.FixturePath("fixtures", "scoped-router.yaml")
|
|
| 20 |
+ configPath = exutil.FixturePath("testdata", "scoped-router.yaml")
|
|
| 21 | 21 |
oc = exutil.NewCLI("scoped-router", exutil.KubeConfigPath())
|
| 22 | 22 |
) |
| 23 | 23 |
|
| ... | ... |
@@ -12,10 +12,10 @@ |
| 12 | 12 |
"source":{
|
| 13 | 13 |
"type":"Git", |
| 14 | 14 |
"git":{
|
| 15 |
- "uri":"https://github.com/mfojtik/origin", |
|
| 15 |
+ "uri":"https://github.com/openshift/origin", |
|
| 16 | 16 |
"ref": "secrets" |
| 17 | 17 |
}, |
| 18 |
- "contextDir":"test/extended/fixtures/build-secrets", |
|
| 18 |
+ "contextDir":"test/extended/testdata/build-secrets", |
|
| 19 | 19 |
"secrets": [ |
| 20 | 20 |
{
|
| 21 | 21 |
"secret": { "name": "testsecret" },
|
| ... | ... |
@@ -12,10 +12,10 @@ |
| 12 | 12 |
"source":{
|
| 13 | 13 |
"type":"Git", |
| 14 | 14 |
"git":{
|
| 15 |
- "uri":"https://github.com/mfojtik/origin", |
|
| 15 |
+ "uri":"https://github.com/openshift/origin", |
|
| 16 | 16 |
"ref": "secrets" |
| 17 | 17 |
}, |
| 18 |
- "contextDir":"test/extended/fixtures/test-build-app", |
|
| 18 |
+ "contextDir":"test/extended/testdata/test-build-app", |
|
| 19 | 19 |
"secrets": [ |
| 20 | 20 |
{
|
| 21 | 21 |
"secret": { "name": "testsecret" },
|
| ... | ... |
@@ -39,7 +39,7 @@ |
| 39 | 39 |
"kind":"DockerImage", |
| 40 | 40 |
"name":"centos/ruby-22-centos7" |
| 41 | 41 |
}, |
| 42 |
- "scripts":"https://raw.githubusercontent.com/mfojtik/origin/secrets/test/extended/fixtures/build-secrets/s2i" |
|
| 42 |
+ "scripts":"https://raw.githubusercontent.com/openshift/origin/secrets/test/extended/testdata/build-secrets/s2i" |
|
| 43 | 43 |
} |
| 44 | 44 |
}, |
| 45 | 45 |
"output":{
|
| ... | ... |
@@ -12,10 +12,10 @@ |
| 12 | 12 |
"source": {
|
| 13 | 13 |
"type": "Git", |
| 14 | 14 |
"git": {
|
| 15 |
- "uri": "https://github.com/mfojtik/origin", |
|
| 15 |
+ "uri": "https://github.com/openshift/origin", |
|
| 16 | 16 |
"ref": "build_secret_extended" |
| 17 | 17 |
}, |
| 18 |
- "contextDir": "test/extended/fixtures/custom-secret-builder" |
|
| 18 |
+ "contextDir": "test/extended/testdata/custom-secret-builder" |
|
| 19 | 19 |
}, |
| 20 | 20 |
"strategy": {
|
| 21 | 21 |
"type": "Docker" |
| ... | ... |
@@ -139,7 +139,7 @@ func TestUnprivilegedNewProjectFromTemplate(t *testing.T) {
|
| 139 | 139 |
t.Fatalf("unexpected error: %v", err)
|
| 140 | 140 |
} |
| 141 | 141 |
|
| 142 |
- template, err := testutil.GetTemplateFixture("fixtures/project-request-template-with-quota.yaml")
|
|
| 142 |
+ template, err := testutil.GetTemplateFixture("testdata/project-request-template-with-quota.yaml")
|
|
| 143 | 143 |
if err != nil {
|
| 144 | 144 |
t.Fatalf("unexpected error: %v", err)
|
| 145 | 145 |
} |
| ... | ... |
@@ -275,7 +275,7 @@ func TestWebhookGitHubPing(t *testing.T) {
|
| 275 | 275 |
} |
| 276 | 276 |
|
| 277 | 277 |
func postFile(client restclient.HTTPClient, event, filename, url string, expStatusCode int, t *testing.T) {
|
| 278 |
- data, err := ioutil.ReadFile("../../pkg/build/webhook/github/fixtures/" + filename)
|
|
| 278 |
+ data, err := ioutil.ReadFile("../../pkg/build/webhook/github/testdata/" + filename)
|
|
| 279 | 279 |
if err != nil {
|
| 280 | 280 |
t.Fatalf("Failed to open %s: %v", filename, err)
|
| 281 | 281 |
} |
| ... | ... |
@@ -38,7 +38,7 @@ items: |
| 38 | 38 |
postCommit: {}
|
| 39 | 39 |
resources: {}
|
| 40 | 40 |
source: |
| 41 |
- contextDir: test/fixtures/app-scenarios/docker-compose/complex/nginx |
|
| 41 |
+ contextDir: test/testdata/app-scenarios/docker-compose/complex/nginx |
|
| 42 | 42 |
git: |
| 43 | 43 |
ref: libcompose |
| 44 | 44 |
uri: git@github.com:openshift/origin.git |
| ... | ... |
@@ -100,7 +100,7 @@ items: |
| 100 | 100 |
postCommit: {}
|
| 101 | 101 |
resources: {}
|
| 102 | 102 |
source: |
| 103 |
- contextDir: test/fixtures/app-scenarios/docker-compose/complex/app |
|
| 103 |
+ contextDir: test/testdata/app-scenarios/docker-compose/complex/app |
|
| 104 | 104 |
git: |
| 105 | 105 |
ref: libcompose |
| 106 | 106 |
uri: git@github.com:openshift/origin.git |
| ... | ... |
@@ -30,7 +30,7 @@ items: |
| 30 | 30 |
postCommit: {}
|
| 31 | 31 |
resources: {}
|
| 32 | 32 |
source: |
| 33 |
- contextDir: test/fixtures/app-scenarios/docker-compose/complex/nginx |
|
| 33 |
+ contextDir: test/testdata/app-scenarios/docker-compose/complex/nginx |
|
| 34 | 34 |
git: |
| 35 | 35 |
ref: master |
| 36 | 36 |
uri: git@github.com:openshift/origin.git |
| ... | ... |
@@ -84,7 +84,7 @@ items: |
| 84 | 84 |
postCommit: {}
|
| 85 | 85 |
resources: {}
|
| 86 | 86 |
source: |
| 87 |
- contextDir: test/fixtures/app-scenarios/docker-compose/complex/app |
|
| 87 |
+ contextDir: test/testdata/app-scenarios/docker-compose/complex/app |
|
| 88 | 88 |
git: |
| 89 | 89 |
ref: master |
| 90 | 90 |
uri: git@github.com:openshift/origin.git |
| ... | ... |
@@ -46,8 +46,8 @@ func TestExtractTestName(t *testing.T) {
|
| 46 | 46 |
}, |
| 47 | 47 |
{
|
| 48 | 48 |
name: "test conclusion success", |
| 49 |
- testLine: `SUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`, |
|
| 50 |
- expectedName: `hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`, |
|
| 49 |
+ testLine: `SUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`, |
|
| 50 |
+ expectedName: `hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`, |
|
| 51 | 51 |
}, |
| 52 | 52 |
{
|
| 53 | 53 |
name: "test conclusion failure", |
| ... | ... |
@@ -56,8 +56,8 @@ func TestExtractTestName(t *testing.T) {
|
| 56 | 56 |
}, |
| 57 | 57 |
{
|
| 58 | 58 |
name: "failed print: test conclusion success", |
| 59 |
- testLine: `some other textSUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`, |
|
| 60 |
- expectedName: `hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`, |
|
| 59 |
+ testLine: `some other textSUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`, |
|
| 60 |
+ expectedName: `hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`, |
|
| 61 | 61 |
}, |
| 62 | 62 |
} |
| 63 | 63 |
|
| ... | ... |
@@ -116,7 +116,7 @@ func TestExtractDuration(t *testing.T) {
|
| 116 | 116 |
}{
|
| 117 | 117 |
{
|
| 118 | 118 |
name: "test conclusion success", |
| 119 |
- testLine: `SUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/fixtures/resource-builder/directory -f test/fixtures/resource-builder/json-no-extension -f test/fixtures/resource-builder/yml-no-extension' expecting success`, |
|
| 119 |
+ testLine: `SUCCESS after 0.041s: hack/../test/cmd/basicresources.sh:21: executing 'oc create -f test/testdata/resource-builder/directory -f test/testdata/resource-builder/json-no-extension -f test/testdata/resource-builder/yml-no-extension' expecting success`, |
|
| 120 | 120 |
expectedDuration: "0.041s", |
| 121 | 121 |
}, |
| 122 | 122 |
{
|