unnecessary use of fmt.Sprint (S1039) (#10049)
This commit is contained in:
parent
114ae77fb7
commit
7043f6ae29
11 changed files with 58 additions and 62 deletions
|
@ -109,7 +109,7 @@ func TestNginxCheck(t *testing.T) {
|
||||||
})
|
})
|
||||||
|
|
||||||
// pollute pid file
|
// pollute pid file
|
||||||
pidFile.Write([]byte(fmt.Sprint("999999")))
|
pidFile.Write([]byte("999999"))
|
||||||
pidFile.Close()
|
pidFile.Close()
|
||||||
|
|
||||||
t.Run("bad pid", func(t *testing.T) {
|
t.Run("bad pid", func(t *testing.T) {
|
||||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
||||||
package annotations
|
package annotations
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
@ -52,6 +51,6 @@ var _ = framework.DescribeAnnotation("connection-proxy-header", func() {
|
||||||
WithHeader("Host", host).
|
WithHeader("Host", host).
|
||||||
Expect().
|
Expect().
|
||||||
Status(http.StatusOK).
|
Status(http.StatusOK).
|
||||||
Body().Contains(fmt.Sprintf("connection=keep-alive"))
|
Body().Contains("connection=keep-alive")
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -160,7 +160,7 @@ func (f *Framework) AfterEach() {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
cmd := fmt.Sprintf("cat /etc/nginx/nginx.conf")
|
cmd := "cat /etc/nginx/nginx.conf"
|
||||||
o, err := f.ExecCommand(f.pod, cmd)
|
o, err := f.ExecCommand(f.pod, cmd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
Logf("Unexpected error obtaining nginx.conf file: %v", err)
|
Logf("Unexpected error obtaining nginx.conf file: %v", err)
|
||||||
|
@ -277,7 +277,7 @@ func (f *Framework) matchNginxConditions(name string, matcher func(cfg string) b
|
||||||
return func() (bool, error) {
|
return func() (bool, error) {
|
||||||
var cmd string
|
var cmd string
|
||||||
if name == "" {
|
if name == "" {
|
||||||
cmd = fmt.Sprintf("cat /etc/nginx/nginx.conf")
|
cmd = "cat /etc/nginx/nginx.conf"
|
||||||
} else {
|
} else {
|
||||||
cmd = fmt.Sprintf("cat /etc/nginx/nginx.conf | awk '/## start server %v/,/## end server %v/'", name, name)
|
cmd = fmt.Sprintf("cat /etc/nginx/nginx.conf | awk '/## start server %v/,/## end server %v/'", name, name)
|
||||||
}
|
}
|
||||||
|
|
|
@ -64,15 +64,15 @@ var _ = framework.DescribeSetting("enable-real-ip", func() {
|
||||||
Body().
|
Body().
|
||||||
Raw()
|
Raw()
|
||||||
|
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host))
|
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host))
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=%s", host))
|
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=%s", host))
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
|
||||||
})
|
})
|
||||||
|
|
||||||
ginkgo.It("should not trust X-Forwarded-For header when setting is false", func() {
|
ginkgo.It("should not trust X-Forwarded-For header when setting is false", func() {
|
||||||
|
@ -101,13 +101,13 @@ var _ = framework.DescribeSetting("enable-real-ip", func() {
|
||||||
Raw()
|
Raw()
|
||||||
|
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host))
|
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host))
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-original-forwarded-for=1.2.3.4"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-for=1.2.3.4")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
||||||
package settings
|
package settings
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
@ -65,12 +64,12 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
|
||||||
Body().
|
Body().
|
||||||
Raw()
|
Raw()
|
||||||
|
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost"))
|
assert.Contains(ginkgo.GinkgoT(), body, "host=myhost")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=myproto"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=myproto")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
|
||||||
|
|
||||||
ginkgo.By("ensuring that first entry in X-Forwarded-Host is used as the best host")
|
ginkgo.By("ensuring that first entry in X-Forwarded-Host is used as the best host")
|
||||||
body = f.HTTPTestClient().
|
body = f.HTTPTestClient().
|
||||||
|
@ -85,8 +84,8 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
|
||||||
Body().
|
Body().
|
||||||
Raw()
|
Raw()
|
||||||
|
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost.com"))
|
assert.Contains(ginkgo.GinkgoT(), body, "host=myhost.com")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost.com"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost.com")
|
||||||
})
|
})
|
||||||
|
|
||||||
ginkgo.It("should not trust X-Forwarded headers when setting is false", func() {
|
ginkgo.It("should not trust X-Forwarded headers when setting is false", func() {
|
||||||
|
@ -115,16 +114,16 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
|
||||||
Body().
|
Body().
|
||||||
Raw()
|
Raw()
|
||||||
|
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=forwarded-headers"))
|
assert.Contains(ginkgo.GinkgoT(), body, "host=forwarded-headers")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=http"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=http")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-original-forwarded-for=1.2.3.4"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-for=1.2.3.4")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=myproto"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=myproto")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4"))
|
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
||||||
package settings
|
package settings
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"regexp"
|
"regexp"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
@ -41,7 +40,7 @@ var _ = framework.DescribeSetting("keep-alive keep-alive-requests", func() {
|
||||||
f.UpdateNginxConfigMapData("keep-alive", "140")
|
f.UpdateNginxConfigMapData("keep-alive", "140")
|
||||||
|
|
||||||
f.WaitForNginxConfiguration(func(server string) bool {
|
f.WaitForNginxConfiguration(func(server string) bool {
|
||||||
return strings.Contains(server, fmt.Sprintf(`keepalive_timeout 140s;`))
|
return strings.Contains(server, `keepalive_timeout 140s;`)
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -49,7 +48,7 @@ var _ = framework.DescribeSetting("keep-alive keep-alive-requests", func() {
|
||||||
f.UpdateNginxConfigMapData("keep-alive-requests", "200")
|
f.UpdateNginxConfigMapData("keep-alive-requests", "200")
|
||||||
|
|
||||||
f.WaitForNginxConfiguration(func(server string) bool {
|
f.WaitForNginxConfiguration(func(server string) bool {
|
||||||
return strings.Contains(server, fmt.Sprintf(`keepalive_requests 200;`))
|
return strings.Contains(server, `keepalive_requests 200;`)
|
||||||
})
|
})
|
||||||
|
|
||||||
})
|
})
|
||||||
|
|
|
@ -92,7 +92,7 @@ var _ = framework.IngressNginxDescribe("[Flag] custom HTTP and HTTPS ports", fun
|
||||||
Expect().
|
Expect().
|
||||||
Status(http.StatusOK).
|
Status(http.StatusOK).
|
||||||
Body().
|
Body().
|
||||||
Contains(fmt.Sprintf("x-forwarded-port=443"))
|
Contains("x-forwarded-port=443")
|
||||||
})
|
})
|
||||||
|
|
||||||
ginkgo.Context("when external authentication is configured", func() {
|
ginkgo.Context("when external authentication is configured", func() {
|
||||||
|
@ -141,7 +141,7 @@ var _ = framework.IngressNginxDescribe("[Flag] custom HTTP and HTTPS ports", fun
|
||||||
Expect().
|
Expect().
|
||||||
Status(http.StatusOK).
|
Status(http.StatusOK).
|
||||||
Body().
|
Body().
|
||||||
Contains(fmt.Sprintf("x-forwarded-port=443"))
|
Contains("x-forwarded-port=443")
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
||||||
package settings
|
package settings
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/onsi/ginkgo/v2"
|
"github.com/onsi/ginkgo/v2"
|
||||||
|
@ -34,7 +33,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
|
||||||
f.EnsureIngress(ing)
|
f.EnsureIngress(ing)
|
||||||
|
|
||||||
f.WaitForNginxConfiguration(func(server string) bool {
|
f.WaitForNginxConfiguration(func(server string) bool {
|
||||||
return !strings.Contains(server, fmt.Sprintf("force_no_ssl_redirect = true,"))
|
return !strings.Contains(server, "force_no_ssl_redirect = true,")
|
||||||
})
|
})
|
||||||
|
|
||||||
wlKey := "no-tls-redirect-locations"
|
wlKey := "no-tls-redirect-locations"
|
||||||
|
@ -43,7 +42,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
|
||||||
f.UpdateNginxConfigMapData(wlKey, wlValue)
|
f.UpdateNginxConfigMapData(wlKey, wlValue)
|
||||||
|
|
||||||
f.WaitForNginxConfiguration(func(server string) bool {
|
f.WaitForNginxConfiguration(func(server string) bool {
|
||||||
return strings.Contains(server, fmt.Sprintf("force_no_ssl_redirect = true,"))
|
return strings.Contains(server, "force_no_ssl_redirect = true,")
|
||||||
})
|
})
|
||||||
|
|
||||||
})
|
})
|
||||||
|
|
|
@ -66,7 +66,7 @@ var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
|
||||||
f.WaitForNginxConfiguration(
|
f.WaitForNginxConfiguration(
|
||||||
func(server string) bool {
|
func(server string) bool {
|
||||||
return strings.Contains(server, fmt.Sprintf("server_name %v", test)) &&
|
return strings.Contains(server, fmt.Sprintf("server_name %v", test)) &&
|
||||||
strings.Contains(server, fmt.Sprintf("set $proxy_host $proxy_upstream_name"))
|
strings.Contains(server, "set $proxy_host $proxy_upstream_name")
|
||||||
})
|
})
|
||||||
|
|
||||||
f.HTTPTestClient().
|
f.HTTPTestClient().
|
||||||
|
|
|
@ -71,9 +71,9 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
|
||||||
|
|
||||||
body := string(data)
|
body := string(data)
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
|
||||||
})
|
})
|
||||||
|
|
||||||
ginkgo.It("should respect proto passed by the PROXY Protocol server port", func() {
|
ginkgo.It("should respect proto passed by the PROXY Protocol server port", func() {
|
||||||
|
@ -104,9 +104,9 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
|
||||||
|
|
||||||
body := string(data)
|
body := string(data)
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=443"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=443")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=https"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=https")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
|
||||||
})
|
})
|
||||||
|
|
||||||
ginkgo.It("should enable PROXY Protocol for HTTPS", func() {
|
ginkgo.It("should enable PROXY Protocol for HTTPS", func() {
|
||||||
|
@ -146,10 +146,10 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
|
||||||
|
|
||||||
body := string(data)
|
body := string(data)
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=https"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=https")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-scheme=https"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-scheme=https")
|
||||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1"))
|
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
|
||||||
})
|
})
|
||||||
|
|
||||||
ginkgo.It("should enable PROXY Protocol for TCP", func() {
|
ginkgo.It("should enable PROXY Protocol for TCP", func() {
|
||||||
|
|
|
@ -112,7 +112,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
|
||||||
f.UpdateNginxConfigMapData(hstsMaxAge, "86400")
|
f.UpdateNginxConfigMapData(hstsMaxAge, "86400")
|
||||||
|
|
||||||
f.WaitForNginxConfiguration(func(server string) bool {
|
f.WaitForNginxConfiguration(func(server string) bool {
|
||||||
return strings.Contains(server, fmt.Sprintf(`hsts_max_age = 86400,`))
|
return strings.Contains(server, `hsts_max_age = 86400,`)
|
||||||
})
|
})
|
||||||
|
|
||||||
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
||||||
|
@ -131,7 +131,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
|
||||||
})
|
})
|
||||||
|
|
||||||
f.WaitForNginxConfiguration(func(server string) bool {
|
f.WaitForNginxConfiguration(func(server string) bool {
|
||||||
return strings.Contains(server, fmt.Sprintf(`hsts_include_subdomains = false,`))
|
return strings.Contains(server, `hsts_include_subdomains = false,`)
|
||||||
})
|
})
|
||||||
|
|
||||||
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
||||||
|
@ -151,7 +151,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
|
||||||
})
|
})
|
||||||
|
|
||||||
f.WaitForNginxConfiguration(func(server string) bool {
|
f.WaitForNginxConfiguration(func(server string) bool {
|
||||||
return strings.Contains(server, fmt.Sprintf(`hsts_preload = true,`))
|
return strings.Contains(server, `hsts_preload = true,`)
|
||||||
})
|
})
|
||||||
|
|
||||||
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
||||||
|
|
Loading…
Reference in a new issue