-
Notifications
You must be signed in to change notification settings - Fork 106
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor E2E tests #1577
base: main
Are you sure you want to change the base?
Refactor E2E tests #1577
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #1577 +/- ##
=======================================
Coverage 48.94% 48.94%
=======================================
Files 227 227
Lines 20636 20636
=======================================
Hits 10101 10101
Misses 10010 10010
Partials 525 525
Flags with carried forward coverage won't be shown. Click here to find out more. Continue to review full report in Codecov by Sentry.
|
golang.org/x/tools v0.25.0 // indirect | ||
golang.org/x/crypto v0.31.0 // indirect | ||
golang.org/x/mod v0.22.0 // indirect | ||
golang.org/x/net v0.31.0 // indirect |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🔴 Library Vulnerability
golang.org/x/net → 0.31.0
golang.org/x/net v0.31.0 // indirect | |
golang.org/x/net vv0.33.0// indirect |
Non-linear parsing of case-insensitive content in golang.org/x/net/html (...read more)
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
golang.org/x/crypto v0.31.0 // indirect | ||
golang.org/x/exp v0.0.0-20241108190413-2d47ceb2692f // indirect | ||
golang.org/x/mod v0.22.0 // indirect | ||
golang.org/x/net v0.31.0 // indirect |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🔴 Library Vulnerability
golang.org/x/net → 0.31.0
golang.org/x/net v0.31.0 // indirect | |
golang.org/x/net vv0.33.0// indirect |
Non-linear parsing of case-insensitive content in golang.org/x/net/html (...read more)
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
What does this PR do?
NewOperator
andNewDDAWithOperator
methods from `test-infra-definitionsfakeintake
in the new local kind E2E provisionerMotivation
Improve E2E usability and reliability
Additional Notes
Anything else we should know when reviewing?
Minimum Agent Versions
Are there minimum versions of the Datadog Agent and/or Cluster Agent required?
Describe your test plan
Write there any instructions and details you may have to test your PR.
Checklist
bug
,enhancement
,refactoring
,documentation
,tooling
, and/ordependencies
qa/skip-qa
label