generated from kyma-project/template-repository
-
Notifications
You must be signed in to change notification settings - Fork 23
/
metrics_endpoint_invalid_test.go
97 lines (81 loc) · 3.12 KB
/
metrics_endpoint_invalid_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
//go:build e2e
package e2e
import (
. "github.com/onsi/ginkgo/v2"
. "github.com/onsi/gomega"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"sigs.k8s.io/controller-runtime/pkg/client"
"github.com/kyma-project/telemetry-manager/internal/conditions"
"github.com/kyma-project/telemetry-manager/internal/testutils"
"github.com/kyma-project/telemetry-manager/test/testkit/assert"
kitk8s "github.com/kyma-project/telemetry-manager/test/testkit/k8s"
kitkyma "github.com/kyma-project/telemetry-manager/test/testkit/kyma"
"github.com/kyma-project/telemetry-manager/test/testkit/suite"
)
var _ = Describe(suite.ID(), Label(suite.LabelMetrics), func() {
const (
invalidEndpoint = "'http://example.com'"
)
var (
mockNs = suite.ID()
pipelineNameValue = suite.IDWithSuffix("value")
pipelineNameValueFrom = suite.IDWithSuffix("value-from")
pipelineNameHTTP = suite.IDWithSuffix("invalid-http")
)
makeResources := func() []client.Object {
var objs []client.Object
objs = append(objs, kitk8s.NewNamespace(mockNs).K8sObject())
metricPipelineInvalidEndpointValue := testutils.NewMetricPipelineBuilder().
WithName(pipelineNameValue).
WithOTLPOutput(
testutils.OTLPEndpoint(invalidEndpoint),
).
Build()
endpointKey := "endpoint"
secret := kitk8s.NewOpaqueSecret("test", kitkyma.DefaultNamespaceName, kitk8s.WithStringData(endpointKey, invalidEndpoint))
metricPipelineInvalidEndpointValueFrom := testutils.NewMetricPipelineBuilder().
WithName(pipelineNameValueFrom).
WithOTLPOutput(testutils.OTLPEndpointFromSecret(secret.Name(), secret.Namespace(), endpointKey)).
Build()
metricPipelineInvalidEndpointHTTP := testutils.NewMetricPipelineBuilder().
WithName(pipelineNameHTTP).
WithOTLPOutput(
testutils.OTLPEndpoint(invalidEndpoint),
testutils.OTLPProtocol("http"),
).
Build()
objs = append(objs,
secret.K8sObject(),
&metricPipelineInvalidEndpointValue,
&metricPipelineInvalidEndpointValueFrom,
&metricPipelineInvalidEndpointHTTP,
)
return objs
}
Context("When metric pipelines with an invalid Endpoint are created", Ordered, func() {
BeforeAll(func() {
k8sObjects := makeResources()
DeferCleanup(func() {
Expect(kitk8s.DeleteObjects(ctx, k8sClient, k8sObjects...)).Should(Succeed())
})
Expect(kitk8s.CreateObjects(ctx, k8sClient, k8sObjects...)).Should(Succeed())
})
It("Should set ConfigurationGenerated condition to False in pipelines", func() {
assert.MetricPipelineHasCondition(ctx, k8sClient, pipelineNameValue, metav1.Condition{
Type: conditions.TypeConfigurationGenerated,
Status: metav1.ConditionFalse,
Reason: conditions.ReasonEndpointInvalid,
})
assert.MetricPipelineHasCondition(ctx, k8sClient, pipelineNameValueFrom, metav1.Condition{
Type: conditions.TypeConfigurationGenerated,
Status: metav1.ConditionFalse,
Reason: conditions.ReasonEndpointInvalid,
})
assert.MetricPipelineHasCondition(ctx, k8sClient, pipelineNameHTTP, metav1.Condition{
Type: conditions.TypeConfigurationGenerated,
Status: metav1.ConditionFalse,
Reason: conditions.ReasonEndpointInvalid,
})
})
})
})