Skip to content

Commit 9cee39f

Browse files
author
Ayush Rangwala
committed
Cleanup Webhook server setup
- Called the webhook server cleanup function - Only ignore controlplane cleanup when using existing cluster
1 parent a17ac06 commit 9cee39f

File tree

5 files changed

+17
-15
lines changed

5 files changed

+17
-15
lines changed

pkg/envtest/envtest_test.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -65,15 +65,15 @@ var _ = Describe("Test", func() {
6565
Name: crd.GetName(),
6666
}
6767
var placeholder v1beta1.CustomResourceDefinition
68-
err := c.Get(context.TODO(), crdObjectKey, &placeholder)
68+
err = c.Get(context.TODO(), crdObjectKey, &placeholder)
6969
if err != nil && apierrors.IsNotFound(err) {
7070
// CRD doesn't need to be deleted.
7171
continue
7272
}
7373
Expect(err).NotTo(HaveOccurred())
7474
Expect(c.Delete(context.TODO(), crd)).To(Succeed())
7575
Eventually(func() bool {
76-
err := c.Get(context.TODO(), crdObjectKey, &placeholder)
76+
err = c.Get(context.TODO(), crdObjectKey, &placeholder)
7777
return apierrors.IsNotFound(err)
7878
}, 5*time.Second).Should(BeTrue())
7979
}
@@ -830,16 +830,16 @@ var _ = Describe("Test", func() {
830830

831831
Describe("Start", func() {
832832
It("should raise an error on invalid dir when flag is enabled", func(done Done) {
833-
env := &Environment{ErrorIfCRDPathMissing: true, CRDDirectoryPaths: []string{invalidDirectory}}
834-
_, err := env.Start()
833+
env = &Environment{ErrorIfCRDPathMissing: true, CRDDirectoryPaths: []string{invalidDirectory}}
834+
_, err = env.Start()
835835
Expect(err).To(HaveOccurred())
836836
Expect(env.Stop()).To(Succeed())
837837
close(done)
838838
}, 30)
839839

840840
It("should not raise an error on invalid dir when flag is disabled", func(done Done) {
841-
env := &Environment{ErrorIfCRDPathMissing: false, CRDDirectoryPaths: []string{invalidDirectory}}
842-
_, err := env.Start()
841+
env = &Environment{ErrorIfCRDPathMissing: false, CRDDirectoryPaths: []string{invalidDirectory}}
842+
_, err = env.Start()
843843
Expect(err).NotTo(HaveOccurred())
844844
Expect(env.Stop()).To(Succeed())
845845
close(done)

pkg/envtest/server.go

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -158,13 +158,15 @@ func (te *Environment) Stop() error {
158158
return err
159159
}
160160
}
161+
162+
if err := te.WebhookInstallOptions.Cleanup(); err != nil {
163+
return err
164+
}
165+
161166
if te.useExistingCluster() {
162167
return nil
163168
}
164-
err := te.WebhookInstallOptions.Cleanup()
165-
if err != nil {
166-
return err
167-
}
169+
168170
return te.ControlPlane.Stop()
169171
}
170172

pkg/envtest/webhook.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ func (o *WebhookInstallOptions) PrepWithoutInstalling() error {
165165
if err != nil {
166166
return err
167167
}
168-
if err := parseWebhook(o); err != nil {
168+
if err = parseWebhook(o); err != nil {
169169
return err
170170
}
171171

@@ -292,10 +292,10 @@ func (o *WebhookInstallOptions) setupCA() ([]byte, error) {
292292
return nil, fmt.Errorf("unable to marshal webhook serving certs: %v", err)
293293
}
294294

295-
if err := ioutil.WriteFile(filepath.Join(localServingCertsDir, "tls.crt"), certData, 0640); err != nil {
295+
if err = ioutil.WriteFile(filepath.Join(localServingCertsDir, "tls.crt"), certData, 0640); err != nil {
296296
return nil, fmt.Errorf("unable to write webhook serving cert to disk: %v", err)
297297
}
298-
if err := ioutil.WriteFile(filepath.Join(localServingCertsDir, "tls.key"), keyData, 0640); err != nil {
298+
if err = ioutil.WriteFile(filepath.Join(localServingCertsDir, "tls.key"), keyData, 0640); err != nil {
299299
return nil, fmt.Errorf("unable to write webhook serving key to disk: %v", err)
300300
}
301301

pkg/envtest/webhook_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,6 @@ var _ = Describe("Test", func() {
100100
type rejectingValidator struct {
101101
}
102102

103-
func (v *rejectingValidator) Handle(ctx context.Context, req admission.Request) admission.Response {
103+
func (v *rejectingValidator) Handle(_ context.Context, _ admission.Request) admission.Response {
104104
return admission.Denied(fmt.Sprint("Always denied"))
105105
}

pkg/webhook/server_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ var _ = Describe("Webhook Server", func() {
4343

4444
BeforeEach(func() {
4545
ctx, ctxCancel = context.WithCancel(context.Background())
46-
// closed in indivual tests differently
46+
// closed in individual tests differently
4747

4848
servingOpts = envtest.WebhookInstallOptions{}
4949
Expect(servingOpts.PrepWithoutInstalling()).To(Succeed())

0 commit comments

Comments
 (0)