Tests: Use framework.AllowSnippetConfiguration
.
This commit is contained in:
parent
323098dc20
commit
dd44c5dccf
1 changed files with 5 additions and 16 deletions
|
@ -31,14 +31,8 @@ var _ = framework.IngressNginxDescribeSerial("annotation validations", func() {
|
||||||
f := framework.NewDefaultFramework("validations")
|
f := framework.NewDefaultFramework("validations")
|
||||||
//nolint:dupl // Ignore dupl errors for similar test case
|
//nolint:dupl // Ignore dupl errors for similar test case
|
||||||
ginkgo.It("should allow ingress based on their risk on webhooks", func() {
|
ginkgo.It("should allow ingress based on their risk on webhooks", func() {
|
||||||
f.SetNginxConfigMapData(map[string]string{
|
disableSnippet := f.AllowSnippetConfiguration()
|
||||||
"allow-snippet-annotations": "true",
|
defer disableSnippet()
|
||||||
})
|
|
||||||
defer func() {
|
|
||||||
f.SetNginxConfigMapData(map[string]string{
|
|
||||||
"allow-snippet-annotations": "false",
|
|
||||||
})
|
|
||||||
}()
|
|
||||||
|
|
||||||
host := "annotation-validations"
|
host := "annotation-validations"
|
||||||
|
|
||||||
|
@ -66,14 +60,9 @@ var _ = framework.IngressNginxDescribeSerial("annotation validations", func() {
|
||||||
})
|
})
|
||||||
//nolint:dupl // Ignore dupl errors for similar test case
|
//nolint:dupl // Ignore dupl errors for similar test case
|
||||||
ginkgo.It("should allow ingress based on their risk on webhooks", func() {
|
ginkgo.It("should allow ingress based on their risk on webhooks", func() {
|
||||||
f.SetNginxConfigMapData(map[string]string{
|
disableSnippet := f.AllowSnippetConfiguration()
|
||||||
"allow-snippet-annotations": "true",
|
defer disableSnippet()
|
||||||
})
|
|
||||||
defer func() {
|
|
||||||
f.SetNginxConfigMapData(map[string]string{
|
|
||||||
"allow-snippet-annotations": "false",
|
|
||||||
})
|
|
||||||
}()
|
|
||||||
host := "annotation-validations"
|
host := "annotation-validations"
|
||||||
|
|
||||||
// Low and Medium Risk annotations should be allowed, the rest should be denied
|
// Low and Medium Risk annotations should be allowed, the rest should be denied
|
||||||
|
|
Loading…
Reference in a new issue