-
Notifications
You must be signed in to change notification settings - Fork 679
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
test/e2e: add HTTPProxy 007,018 and Ingress 001 tests #3665
Conversation
Codecov Report
@@ Coverage Diff @@
## main #3665 +/- ##
=======================================
Coverage 75.98% 75.98%
=======================================
Files 103 103
Lines 7130 7130
=======================================
Hits 5418 5418
Misses 1592 1592
Partials 120 120 |
922f477
to
c482277
Compare
validClientCert := fx.Certs.GetTLSCertificate(namespace, "echo-client") | ||
invalidClientCert := fx.Certs.GetTLSCertificate(namespace, "echo-client-invalid") | ||
|
||
cases := map[string]struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
all of the cert/fixture setup should match 1:1 with the original _integration
test but I switched to using a matrix of test cases here to cover all the positive and negative cases. This should be a superset of what was being validated in the _integration
version.
"echo-with-auth-skip-verify without a client cert should succeed": { | ||
host: authSkipVerifyProxy.Spec.VirtualHost.Fqdn, | ||
clientCert: nil, | ||
wantErr: "", | ||
}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@sunjayBhatia this is the case we were discussing.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍🏽 will update the other PR to cover this case
@sunjayBhatia ping for a review when you get a chance, thanks! |
Signed-off-by: Steve Kriss <krisss@vmware.com>
Updates projectcontour#3621. Signed-off-by: Steve Kriss <krisss@vmware.com>
Updates #3621.
Signed-off-by: Steve Kriss krisss@vmware.com