@@ -29,7 +29,7 @@ var _ = Describe("Service", func() {
29
29
labels map [string ]string
30
30
)
31
31
32
- BeforeSuite (func () {
32
+ BeforeEach (func () {
33
33
ctx = context .Background ()
34
34
name = utils .RandomDNS1123Label (20 )
35
35
numReplicas = 3
@@ -75,7 +75,7 @@ var _ = Describe("Service", func() {
75
75
tf .DPManager .WaitUntilDeploymentReady (ctx , deployment )
76
76
})
77
77
78
- AfterSuite (func () {
78
+ AfterEach (func () {
79
79
tf .K8sClient .Delete (ctx , deployment )
80
80
tf .DPManager .WaitUntilDeploymentDeleted (ctx , deployment )
81
81
tf .K8sClient .Delete (ctx , ns )
@@ -196,7 +196,6 @@ var _ = Describe("Service", func() {
196
196
var (
197
197
svcTest service.ServiceTest
198
198
svc * corev1.Service
199
- certArn string
200
199
)
201
200
BeforeEach (func () {
202
201
svc = & corev1.Service {
@@ -220,19 +219,13 @@ var _ = Describe("Service", func() {
220
219
},
221
220
},
222
221
}
223
- certArn = svcTest .GenerateAndImportCertToACM (ctx , tf , "*.elb.us-west-2.amazonaws.com" )
224
- Expect (certArn ).ToNot (BeNil ())
225
222
})
226
-
227
- AfterEach (func () {
228
- Eventually (func () bool {
229
- return svcTest .DeleteCertFromACM (ctx , tf , certArn ) != nil
230
- }, utils .PollTimeoutMedium , utils .PollIntervalLong ).Should (BeTrue ())
231
- })
232
-
233
223
It ("Should create TLS listeners" , func () {
224
+ if len (tf .Options .CertificateARNs ) == 0 {
225
+ Skip ("Skipping tests, certificates not specified" )
226
+ }
234
227
By ("Creating service" , func () {
235
- svc .Annotations ["service.beta.kubernetes.io/aws-load-balancer-ssl-cert" ] = certArn
228
+ svc .Annotations ["service.beta.kubernetes.io/aws-load-balancer-ssl-cert" ] = tf . Options . CertificateARNs
236
229
err := svcTest .Create (ctx , tf , svc )
237
230
Expect (err ).ToNot (HaveOccurred ())
238
231
})
@@ -289,17 +282,20 @@ var _ = Describe("Service", func() {
289
282
}, utils .PollTimeoutShort , utils .PollIntervalMedium ).Should (BeTrue ())
290
283
})
291
284
By ("Specifying logging annotations" , func () {
285
+ if len (tf .Options .S3BucketName ) == 0 {
286
+ return
287
+ }
292
288
oldSvc := svc .DeepCopy ()
293
289
svc .Annotations ["service.beta.kubernetes.io/aws-load-balancer-ssl-ports" ] = "443, 333"
294
290
svc .Annotations ["service.beta.kubernetes.io/aws-load-balancer-access-log-enabled" ] = "true"
295
- svc .Annotations ["service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-name" ] = "nlb-ip-svc-tls313"
291
+ svc .Annotations ["service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-name" ] = tf . Options . S3BucketName
296
292
svc .Annotations ["service.beta.kubernetes.io/aws-load-balancer-access-log-s3-bucket-prefix" ] = "nlb-pfx"
297
293
err := svcTest .Update (ctx , tf , svc , oldSvc )
298
294
Expect (err ).ToNot (HaveOccurred ())
299
295
Eventually (func () bool {
300
296
return svcTest .VerifyLoadBalancerAttributes (ctx , tf , map [string ]string {
301
297
"access_logs.s3.enabled" : "true" ,
302
- "access_logs.s3.bucket" : "nlb-ip-svc-tls313" ,
298
+ "access_logs.s3.bucket" : tf . Options . S3BucketName ,
303
299
"access_logs.s3.prefix" : "nlb-pfx" ,
304
300
}) == nil
305
301
}, utils .PollTimeoutShort , utils .PollIntervalMedium ).Should (BeTrue ())
0 commit comments