Skip to content

Commit

Permalink
Address review comments: move base yamls
Browse files Browse the repository at this point in the history
This commit simply moves the base yamls from
the test folder into the base folder under
sub directories that can be easily maintained.

Signed-off-by: Surya Seetharaman <suryaseetharaman.9@gmail.com>
  • Loading branch information
tssurya committed Jun 11, 2023
1 parent 013a17f commit 8c46a56
Show file tree
Hide file tree
Showing 24 changed files with 12 additions and 12 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var AdminNetworkPolicyEgressSCTP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportAdminNetworkPolicy,
},
Manifests: []string{"tests/admin-network-policy-core-egress-sctp-rules_base.yaml"},
Manifests: []string{"base/admin_network_policy/core-egress-sctp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-egress' policy for SCTP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var AdminNetworkPolicyEgressTCP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportAdminNetworkPolicy,
},
Manifests: []string{"tests/admin-network-policy-core-egress-tcp-rules_base.yaml"},
Manifests: []string{"base/admin_network_policy/core-egress-tcp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-egress' policy for TCP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var AdminNetworkPolicyEgressUDP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportAdminNetworkPolicy,
},
Manifests: []string{"tests/admin-network-policy-core-egress-udp-rules_base.yaml"},
Manifests: []string{"base/admin_network_policy/core-egress-udp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-egress' policy for UDP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var AdminNetworkPolicyIngressSCTP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportAdminNetworkPolicy,
},
Manifests: []string{"tests/admin-network-policy-core-ingress-sctp-rules_base.yaml"},
Manifests: []string{"base/admin_network_policy/core-ingress-sctp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-ingress' policy for SCTP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var AdminNetworkPolicyIngressTCP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportAdminNetworkPolicy,
},
Manifests: []string{"tests/admin-network-policy-core-ingress-tcp-rules_base.yaml"},
Manifests: []string{"base/admin_network_policy/core-ingress-tcp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-ingress' policy for TCP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var AdminNetworkPolicyIngressUDP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportAdminNetworkPolicy,
},
Manifests: []string{"tests/admin-network-policy-core-ingress-udp-rules_base.yaml"},
Manifests: []string{"base/admin_network_policy/core-ingress-udp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-ingress' policy for UDP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var BaselineAdminNetworkPolicyEgressSCTP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportBaselineAdminNetworkPolicy,
},
Manifests: []string{"tests/baseline-admin-network-policy-core-egress-sctp-rules_base.yaml"},
Manifests: []string{"base/baseline_admin_network_policy/core-egress-sctp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-egress' policy for SCTP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var BaselineAdminNetworkPolicyEgressTCP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportBaselineAdminNetworkPolicy,
},
Manifests: []string{"tests/baseline-admin-network-policy-core-egress-tcp-rules_base.yaml"},
Manifests: []string{"base/baseline_admin_network_policy/core-egress-tcp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-egress' policy for TCP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var BaselineAdminNetworkPolicyEgressUDP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportBaselineAdminNetworkPolicy,
},
Manifests: []string{"tests/baseline-admin-network-policy-core-egress-udp-rules_base.yaml"},
Manifests: []string{"base/baseline_admin_network_policy/core-egress-udp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-egress' policy for UDP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var BaselineAdminNetworkPolicyIngressSCTP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportBaselineAdminNetworkPolicy,
},
Manifests: []string{"tests/baseline-admin-network-policy-core-ingress-sctp-rules_base.yaml"},
Manifests: []string{"base/baseline_admin_network_policy/core-ingress-sctp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-ingress' policy for SCTP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var BaselineAdminNetworkPolicyIngressTCP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportBaselineAdminNetworkPolicy,
},
Manifests: []string{"tests/baseline-admin-network-policy-core-ingress-tcp-rules_base.yaml"},
Manifests: []string{"base/baseline_admin_network_policy/core-ingress-tcp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-ingress' policy for TCP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var BaselineAdminNetworkPolicyIngressUDP = suite.ConformanceTest{
Features: []suite.SupportedFeature{
suite.SupportBaselineAdminNetworkPolicy,
},
Manifests: []string{"tests/baseline-admin-network-policy-core-ingress-udp-rules_base.yaml"},
Manifests: []string{"base/baseline_admin_network_policy/core-ingress-udp-rules.yaml"},
Test: func(t *testing.T, s *suite.ConformanceTestSuite) {

t.Run("Should support an 'allow-ingress' policy for UDP protocol; ensure rule ordering is respected", func(t *testing.T) {
Expand Down

0 comments on commit 8c46a56

Please sign in to comment.