@@ -2,6 +2,7 @@ package e2e
2
2
3
3
import (
4
4
"bytes"
5
+ "context"
5
6
"crypto/tls"
6
7
"crypto/x509"
7
8
"fmt"
@@ -21,6 +22,8 @@ import (
21
22
)
22
23
23
24
func TestOAuthProxyE2E (t * testing.T ) {
25
+ testCtx := context .Background ()
26
+
24
27
ns := os .Getenv ("TEST_NAMESPACE" )
25
28
oauthProxyTests := map [string ]struct {
26
29
oauthProxyArgs []string
@@ -305,7 +308,7 @@ func TestOAuthProxyE2E(t *testing.T) {
305
308
continue
306
309
}
307
310
t .Run (fmt .Sprintf ("setting up e2e tests %s" , tcName ), func (t * testing.T ) {
308
- _ , err := kubeClientSet .CoreV1 ().ServiceAccounts (ns ).Create (newOAuthProxySA ())
311
+ _ , err := kubeClientSet .CoreV1 ().ServiceAccounts (ns ).Create (testCtx , newOAuthProxySA (), metav1. CreateOptions {} )
309
312
if err != nil {
310
313
t .Fatalf ("setup: error creating SA: %s" , err )
311
314
}
@@ -333,18 +336,18 @@ func TestOAuthProxyE2E(t *testing.T) {
333
336
t .Fatalf ("setup: error creating upstream TLS certs: %s" , err )
334
337
}
335
338
336
- _ , err = kubeClientSet .CoreV1 ().Services (ns ).Create (newOAuthProxyService ())
339
+ _ , err = kubeClientSet .CoreV1 ().Services (ns ).Create (testCtx , newOAuthProxyService (), metav1. CreateOptions {} )
337
340
if err != nil {
338
341
t .Fatalf ("setup: error creating service: %s" , err )
339
342
}
340
343
341
344
// configMap provides oauth-proxy with the certificates we created above
342
- _ , err = kubeClientSet .CoreV1 ().ConfigMaps (ns ).Create (newOAuthProxyConfigMap (ns , caPem , serviceCert , serviceKey , upstreamCA , upstreamCert , upstreamKey ))
345
+ _ , err = kubeClientSet .CoreV1 ().ConfigMaps (ns ).Create (testCtx , newOAuthProxyConfigMap (ns , caPem , serviceCert , serviceKey , upstreamCA , upstreamCert , upstreamKey ), metav1. CreateOptions {} )
343
346
if err != nil {
344
347
t .Fatalf ("setup: error creating certificate configMap: %s" , err )
345
348
}
346
349
347
- oauthProxyPod , err := kubeClientSet .CoreV1 ().Pods (ns ).Create (newOAuthProxyPod (image , backendImage , tc .oauthProxyArgs , tc .backendEnvs ))
350
+ oauthProxyPod , err := kubeClientSet .CoreV1 ().Pods (ns ).Create (testCtx , newOAuthProxyPod (image , backendImage , tc .oauthProxyArgs , tc .backendEnvs ), metav1. CreateOptions {} )
348
351
if err != nil {
349
352
t .Fatalf ("setup: error creating oauth-proxy pod with image '%s' and args '%v': %s" , image , tc .oauthProxyArgs , err )
350
353
}
@@ -355,7 +358,7 @@ func TestOAuthProxyE2E(t *testing.T) {
355
358
}
356
359
357
360
// Find the service CA for the client trust store
358
- secrets , err := kubeClientSet .CoreV1 ().Secrets (ns ).List (metav1.ListOptions {})
361
+ secrets , err := kubeClientSet .CoreV1 ().Secrets (ns ).List (testCtx , metav1.ListOptions {})
359
362
if err != nil {
360
363
t .Fatalf ("setup: error listing secrets: %s" , err )
361
364
}
@@ -393,11 +396,11 @@ func TestOAuthProxyE2E(t *testing.T) {
393
396
t .Fatalf ("skipping cleanup step for test '%s' and stopping on command" , tcName )
394
397
}
395
398
t .Logf ("cleaning up test %s" , tcName )
396
- kubeClientSet .CoreV1 ().Pods (ns ).Delete ("proxy" , nil )
397
- kubeClientSet .CoreV1 ().Services (ns ).Delete ("proxy" , nil )
399
+ kubeClientSet .CoreV1 ().Pods (ns ).Delete (testCtx , "proxy" , metav1. DeleteOptions {} )
400
+ kubeClientSet .CoreV1 ().Services (ns ).Delete (testCtx , "proxy" , metav1. DeleteOptions {} )
398
401
deleteTestRoute ("proxy-route" , ns )
399
- kubeClientSet .CoreV1 ().ConfigMaps (ns ).Delete ("proxy-certs" , nil )
400
- kubeClientSet .CoreV1 ().ServiceAccounts (ns ).Delete ("proxy" , nil )
402
+ kubeClientSet .CoreV1 ().ConfigMaps (ns ).Delete (testCtx , "proxy-certs" , metav1. DeleteOptions {} )
403
+ kubeClientSet .CoreV1 ().ServiceAccounts (ns ).Delete (testCtx , "proxy" , metav1. DeleteOptions {} )
401
404
waitForPodDeletion (kubeClientSet , oauthProxyPod .Name , ns )
402
405
execCmd ("oc" , []string {"adm" , "policy" , "remove-role-from-user" , "admin" , user , "-n" , ns }, "" )
403
406
}()
0 commit comments