Remvoes the creation of an unused HTTPRoute in tests

Signed-off-by: irbekrm <irbekrm@gmail.com>
This commit is contained in:
irbekrm 2022-03-12 16:15:52 +00:00
parent cdaeb0599a
commit e1e416aa6f
3 changed files with 33 additions and 86 deletions

View File

@ -795,7 +795,7 @@ func (s *Suite) Define() {
renewBefore := time.Hour * 111
By("Creating a Gateway with annotations for issuerRef and other Certificate fields")
gw, route := e2eutil.NewGateway(name, f.Namespace.Name, secretName, map[string]string{
gw := e2eutil.NewGateway(name, f.Namespace.Name, secretName, map[string]string{
"cert-manager.io/issuer": issuerRef.Name,
"cert-manager.io/issuer-kind": issuerRef.Kind,
"cert-manager.io/issuer-group": issuerRef.Group,
@ -806,8 +806,6 @@ func (s *Suite) Define() {
gw, err := f.GWClientSet.GatewayV1alpha2().Gateways(f.Namespace.Name).Create(context.TODO(), gw, metav1.CreateOptions{})
Expect(err).NotTo(HaveOccurred())
_, err = f.GWClientSet.GatewayV1alpha2().HTTPRoutes(f.Namespace.Name).Create(context.TODO(), route, metav1.CreateOptions{})
Expect(err).NotTo(HaveOccurred())
// XXX(Mael): the CertificateRef seems to contain the Gateway name
// "testcert-gateway" instead of the secretName
@ -822,7 +820,7 @@ func (s *Suite) Define() {
cert, err = f.Helper().WaitForCertificateReadyAndDoneIssuing(cert, time.Minute*5)
Expect(err).NotTo(HaveOccurred())
// Verify that the ingres-shim has translated all the supplied
// Verify that the gateway-shim has translated all the supplied
// annotations into equivalent Certificate field values
By("Validating the created Certificate")
Expect(cert.Spec.DNSNames).To(ConsistOf(domain))

View File

@ -26,7 +26,6 @@ go_library(
"@io_k8s_apimachinery//pkg/util/wait:go_default_library",
"@io_k8s_client_go//discovery:go_default_library",
"@io_k8s_sigs_gateway_api//apis/v1alpha2:go_default_library",
"@io_k8s_utils//pointer:go_default_library",
],
)

View File

@ -38,7 +38,6 @@ import (
"k8s.io/apimachinery/pkg/util/intstr"
"k8s.io/apimachinery/pkg/util/wait"
"k8s.io/client-go/discovery"
"k8s.io/utils/pointer"
gwapiv1alpha2 "sigs.k8s.io/gateway-api/apis/v1alpha2"
apiutil "github.com/cert-manager/cert-manager/pkg/api/util"
@ -371,95 +370,46 @@ func pathTypePrefix() *networkingv1.PathType {
return &p
}
func NewGateway(gatewayName, ns, secretName string, annotations map[string]string, dnsNames ...string) (*gwapiv1alpha2.Gateway, *gwapiv1alpha2.HTTPRoute) {
var hostnames []gwapiv1alpha2.Hostname
for _, dnsName := range dnsNames {
hostnames = append(hostnames, gwapiv1alpha2.Hostname(dnsName))
}
// NewGateway creates a new test Gateway. There is no Gateway controller
// watching the 'foo' gateway class, so this Gateway will not be used to
// actually route traffic, but can be used to test cert-manager controllers that
// sync Gateways, such as gateway-shim.
func NewGateway(gatewayName, ns, secretName string, annotations map[string]string, dnsNames ...string) *gwapiv1alpha2.Gateway {
return &gwapiv1alpha2.Gateway{
ObjectMeta: metav1.ObjectMeta{
Name: gatewayName,
Annotations: annotations,
},
Spec: gwapiv1alpha2.GatewaySpec{
GatewayClassName: "istio",
Listeners: []gwapiv1alpha2.Listener{{
AllowedRoutes: &gwapiv1alpha2.AllowedRoutes{
Namespaces: &gwapiv1alpha2.RouteNamespaces{
From: func() *gwapiv1alpha2.FromNamespaces { f := gwapiv1alpha2.NamespacesFromSame; return &f }(),
Selector: &metav1.LabelSelector{MatchLabels: map[string]string{
"gw": gatewayName,
}},
},
Kinds: nil,
},
Name: "acme-solver",
Protocol: gwapiv1alpha2.TCPProtocolType,
Port: gwapiv1alpha2.PortNumber(80),
Hostname: (*gwapiv1alpha2.Hostname)(&dnsNames[0]),
TLS: &gwapiv1alpha2.GatewayTLSConfig{
CertificateRefs: []*gwapiv1alpha2.SecretObjectReference{
{
Kind: func() *gwapiv1alpha2.Kind { k := gwapiv1alpha2.Kind("Secret"); return &k }(),
Name: gwapiv1alpha2.ObjectName(secretName),
Group: func() *gwapiv1alpha2.Group { g := gwapiv1alpha2.Group(corev1.GroupName); return &g }(),
Namespace: (*gwapiv1alpha2.Namespace)(&ns),
},
},
},
}},
},
ObjectMeta: metav1.ObjectMeta{
Name: gatewayName,
Annotations: annotations,
},
&gwapiv1alpha2.HTTPRoute{
ObjectMeta: metav1.ObjectMeta{
Name: gatewayName,
Annotations: annotations,
Labels: map[string]string{
"gw": gatewayName,
Spec: gwapiv1alpha2.GatewaySpec{
GatewayClassName: "foo",
Listeners: []gwapiv1alpha2.Listener{{
AllowedRoutes: &gwapiv1alpha2.AllowedRoutes{
Namespaces: &gwapiv1alpha2.RouteNamespaces{
From: func() *gwapiv1alpha2.FromNamespaces { f := gwapiv1alpha2.NamespacesFromSame; return &f }(),
Selector: &metav1.LabelSelector{MatchLabels: map[string]string{
"gw": gatewayName,
}},
},
Kinds: nil,
},
},
Spec: gwapiv1alpha2.HTTPRouteSpec{
CommonRouteSpec: gwapiv1alpha2.CommonRouteSpec{
ParentRefs: []gwapiv1alpha2.ParentRef{
Name: "acme-solver",
Protocol: gwapiv1alpha2.TCPProtocolType,
Port: gwapiv1alpha2.PortNumber(80),
Hostname: (*gwapiv1alpha2.Hostname)(&dnsNames[0]),
TLS: &gwapiv1alpha2.GatewayTLSConfig{
CertificateRefs: []*gwapiv1alpha2.SecretObjectReference{
{
Kind: func() *gwapiv1alpha2.Kind { k := gwapiv1alpha2.Kind("Secret"); return &k }(),
Name: gwapiv1alpha2.ObjectName(secretName),
Group: func() *gwapiv1alpha2.Group { g := gwapiv1alpha2.Group(corev1.GroupName); return &g }(),
Namespace: (*gwapiv1alpha2.Namespace)(&ns),
Name: gwapiv1alpha2.ObjectName(gatewayName),
},
},
},
Hostnames: hostnames,
Rules: []gwapiv1alpha2.HTTPRouteRule{{
Matches: []gwapiv1alpha2.HTTPRouteMatch{{
Path: &gwapiv1alpha2.HTTPPathMatch{
Type: ptrPathMatch(gwapiv1alpha2.PathMatchExact),
Value: ptrStr("/"),
},
}},
BackendRefs: []gwapiv1alpha2.HTTPBackendRef{{
BackendRef: gwapiv1alpha2.BackendRef{
BackendObjectReference: gwapiv1alpha2.BackendObjectReference{
Name: "dummy-service",
Port: ptrPort(80),
},
Weight: pointer.Int32(1),
},
}},
}},
},
}
}
func ptrPathMatch(p gwapiv1alpha2.PathMatchType) *gwapiv1alpha2.PathMatchType {
return &p
}
func ptrStr(s string) *string {
return &s
}
func ptrPort(port int32) *gwapiv1alpha2.PortNumber {
p := gwapiv1alpha2.PortNumber(port)
return &p
}},
},
}
}
// HasIngresses lets you know if an API exists in the discovery API