Skip to content

Commit 0c81d04

Browse files
authored
Merge pull request #1420 from fluxcd/fix-tests-race-condition
Fix the race condition happening in main
2 parents 74c5f99 + 97bc896 commit 0c81d04

File tree

3 files changed

+24
-55
lines changed

3 files changed

+24
-55
lines changed

internal/controller/helmchart_controller_test.go

Lines changed: 2 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@ import (
2525
"errors"
2626
"fmt"
2727
"io"
28-
"net"
2928
"net/http"
3029
"os"
3130
"path"
@@ -35,7 +34,6 @@ import (
3534
"testing"
3635
"time"
3736

38-
"github.com/foxcpp/go-mockdns"
3937
"github.com/notaryproject/notation-core-go/signature/cose"
4038
"github.com/notaryproject/notation-core-go/testhelper"
4139
"github.com/notaryproject/notation-go"
@@ -1348,14 +1346,6 @@ func TestHelmChartReconciler_buildFromTarballArtifact(t *testing.T) {
13481346

13491347
tmpDir := t.TempDir()
13501348

1351-
// Unpatch the changes we make to the default DNS resolver in `setupRegistryServer()`.
1352-
// This is required because the changes somehow also cause remote lookups to fail and
1353-
// this test tests functionality related to remote dependencies.
1354-
mockdns.UnpatchNet(net.DefaultResolver)
1355-
defer func() {
1356-
testRegistryServer.dnsServer.PatchNet(net.DefaultResolver)
1357-
}()
1358-
13591349
storage, err := NewStorage(tmpDir, "example.com", retentionTTL, retentionRecords)
13601350
g.Expect(err).ToNot(HaveOccurred())
13611351

@@ -2765,7 +2755,7 @@ func TestHelmChartReconciler_reconcileSourceFromOCI_verifySignatureNotation(t *t
27652755
metadata, err := loadTestChartToOCI(chartData, server, "", "", "")
27662756
g.Expect(err).NotTo(HaveOccurred())
27672757

2768-
storage, err := NewStorage(tmpDir, "example.com", retentionTTL, retentionRecords)
2758+
storage, err := NewStorage(tmpDir, server.registryHost, retentionTTL, retentionRecords)
27692759
g.Expect(err).ToNot(HaveOccurred())
27702760

27712761
cachedArtifact := &sourcev1.Artifact{
@@ -3089,7 +3079,7 @@ func TestHelmChartReconciler_reconcileSourceFromOCI_verifySignatureCosign(t *tes
30893079
metadata, err := loadTestChartToOCI(chartData, server, "", "", "")
30903080
g.Expect(err).NotTo(HaveOccurred())
30913081

3092-
storage, err := NewStorage(tmpDir, "example.com", retentionTTL, retentionRecords)
3082+
storage, err := NewStorage(tmpDir, server.registryHost, retentionTTL, retentionRecords)
30933083
g.Expect(err).ToNot(HaveOccurred())
30943084

30953085
cachedArtifact := &sourcev1.Artifact{

internal/controller/ocirepository_controller_test.go

Lines changed: 6 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1378,10 +1378,9 @@ func TestOCIRepository_reconcileSource_verifyOCISourceSignatureNotation(t *testi
13781378
g := NewWithT(t)
13791379

13801380
workspaceDir := t.TempDir()
1381-
regOpts := registryOptions{
1381+
server, err := setupRegistryServer(ctx, workspaceDir, registryOptions{
13821382
withTLS: !tt.insecure,
1383-
}
1384-
server, err := setupRegistryServer(ctx, workspaceDir, regOpts)
1383+
})
13851384
g.Expect(err).NotTo(HaveOccurred())
13861385
t.Cleanup(func() {
13871386
server.Close()
@@ -1524,7 +1523,6 @@ func TestOCIRepository_reconcileSource_verifyOCISourceTrustPolicyNotation(t *tes
15241523
tests := []struct {
15251524
name string
15261525
reference *ociv1.OCIRepositoryRef
1527-
insecure bool
15281526
signatureVerification trustpolicy.SignatureVerification
15291527
trustedIdentities []string
15301528
trustStores []string
@@ -1697,27 +1695,12 @@ func TestOCIRepository_reconcileSource_verifyOCISourceTrustPolicyNotation(t *tes
16971695

16981696
tmpDir := t.TempDir()
16991697

1700-
caSecret := &corev1.Secret{
1701-
ObjectMeta: metav1.ObjectMeta{
1702-
Name: "valid-trust-store",
1703-
Generation: 1,
1704-
},
1705-
Data: map[string][]byte{
1706-
"ca.crt": tlsCA,
1707-
},
1708-
}
1709-
1710-
g.Expect(r.Create(ctx, caSecret)).ToNot(HaveOccurred())
1711-
17121698
for _, tt := range tests {
17131699
t.Run(tt.name, func(t *testing.T) {
17141700
g := NewWithT(t)
17151701

17161702
workspaceDir := t.TempDir()
1717-
regOpts := registryOptions{
1718-
withTLS: !tt.insecure,
1719-
}
1720-
server, err := setupRegistryServer(ctx, workspaceDir, regOpts)
1703+
server, err := setupRegistryServer(ctx, workspaceDir, registryOptions{})
17211704
g.Expect(err).NotTo(HaveOccurred())
17221705
t.Cleanup(func() {
17231706
server.Close()
@@ -1777,21 +1760,15 @@ func TestOCIRepository_reconcileSource_verifyOCISourceTrustPolicyNotation(t *tes
17771760

17781761
g.Expect(r.Create(ctx, secret)).NotTo(HaveOccurred())
17791762

1780-
if tt.insecure {
1781-
obj.Spec.Insecure = true
1782-
} else {
1783-
obj.Spec.CertSecretRef = &meta.LocalObjectReference{
1784-
Name: "valid-trust-store",
1785-
}
1786-
}
1763+
obj.Spec.Insecure = true
17871764

17881765
obj.Spec.Verify.SecretRef = &meta.LocalObjectReference{Name: "notation"}
17891766

17901767
if tt.reference != nil {
17911768
obj.Spec.Reference = tt.reference
17921769
}
17931770

1794-
podinfoVersions, err := pushMultiplePodinfoImages(server.registryHost, tt.insecure, tt.reference.Tag)
1771+
podinfoVersions, err := pushMultiplePodinfoImages(server.registryHost, true, tt.reference.Tag)
17951772
g.Expect(err).ToNot(HaveOccurred())
17961773

17971774
if tt.useDigest {
@@ -1811,9 +1788,7 @@ func TestOCIRepository_reconcileSource_verifyOCISourceTrustPolicyNotation(t *tes
18111788
remoteRepo, err := oras.NewRepository(artifactRef.String())
18121789
g.Expect(err).ToNot(HaveOccurred())
18131790

1814-
if tt.insecure {
1815-
remoteRepo.PlainHTTP = true
1816-
}
1791+
remoteRepo.PlainHTTP = true
18171792

18181793
repo := registry.NewRepository(remoteRepo)
18191794

internal/controller/suite_test.go

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -156,19 +156,23 @@ func setupRegistryServer(ctx context.Context, workspaceDir string, opts registry
156156
// mock DNS to map example.com to 127.0.0.1.
157157
// This is required because Docker enforces HTTP if the registry
158158
// is hosted on localhost/127.0.0.1.
159-
server.registryHost = fmt.Sprintf("example.com:%d", port)
160-
// Disable DNS server logging as it is extremely chatty.
161-
dnsLog := log.Default()
162-
dnsLog.SetOutput(io.Discard)
163-
server.dnsServer, err = mockdns.NewServerWithLogger(map[string]mockdns.Zone{
164-
"example.com.": {
165-
A: []string{"127.0.0.1"},
166-
},
167-
}, dnsLog, false)
168-
if err != nil {
169-
return nil, err
159+
if opts.withTLS {
160+
server.registryHost = fmt.Sprintf("example.com:%d", port)
161+
// Disable DNS server logging as it is extremely chatty.
162+
dnsLog := log.Default()
163+
dnsLog.SetOutput(io.Discard)
164+
server.dnsServer, err = mockdns.NewServerWithLogger(map[string]mockdns.Zone{
165+
"example.com.": {
166+
A: []string{"127.0.0.1"},
167+
},
168+
}, dnsLog, false)
169+
if err != nil {
170+
return nil, err
171+
}
172+
server.dnsServer.PatchNet(net.DefaultResolver)
173+
} else {
174+
server.registryHost = fmt.Sprintf("localhost:%d", port)
170175
}
171-
server.dnsServer.PatchNet(net.DefaultResolver)
172176

173177
config.HTTP.Addr = fmt.Sprintf(":%d", port)
174178
config.HTTP.DrainTimeout = time.Duration(10) * time.Second

0 commit comments

Comments
 (0)