Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Refactor E2E tests #1577

Open
wants to merge 13 commits into
base: main
Choose a base branch
from
Open

Refactor E2E tests #1577

wants to merge 13 commits into from

Conversation

fanny-jiang
Copy link
Contributor

What does this PR do?

  • Add new local kind E2E provisioner that leverages the NewOperator and NewDDAWithOperator methods from `test-infra-definitions
  • Refactor generic k8s E2E tests into its own test suite
  • Enable fakeintake in the new local kind E2E provisioner

Motivation

Improve E2E usability and reliability

Additional Notes

Anything else we should know when reviewing?

Minimum Agent Versions

Are there minimum versions of the Datadog Agent and/or Cluster Agent required?

  • Agent: vX.Y.Z
  • Cluster Agent: vX.Y.Z

Describe your test plan

Write there any instructions and details you may have to test your PR.

Checklist

  • PR has at least one valid label: bug, enhancement, refactoring, documentation, tooling, and/or dependencies
  • PR has a milestone or the qa/skip-qa label

test/e2e/tests/k8sSuite/k8sSuite_test.go Outdated Show resolved Hide resolved
test/e2e/go.mod Outdated Show resolved Hide resolved
@fanny-jiang fanny-jiang requested a review from a team as a code owner December 17, 2024 23:56
@codecov-commenter
Copy link

codecov-commenter commented Dec 18, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 48.94%. Comparing base (0ca2c91) to head (d3fcaff).

Additional details and impacted files

Impacted file tree graph

@@           Coverage Diff           @@
##             main    #1577   +/-   ##
=======================================
  Coverage   48.94%   48.94%           
=======================================
  Files         227      227           
  Lines       20636    20636           
=======================================
  Hits        10101    10101           
  Misses      10010    10010           
  Partials      525      525           
Flag Coverage Δ
unittests 48.94% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.


Continue to review full report in Codecov by Sentry.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 0ca2c91...d3fcaff. Read the comment docs.

golang.org/x/tools v0.25.0 // indirect
golang.org/x/crypto v0.31.0 // indirect
golang.org/x/mod v0.22.0 // indirect
golang.org/x/net v0.31.0 // indirect

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔴 Library Vulnerability

golang.org/x/net → 0.31.0

Suggested change
golang.org/x/net v0.31.0 // indirect
golang.org/x/net vv0.33.0// indirect
Non-linear parsing of case-insensitive content in golang.org/x/net/html (...read more)

An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

View in Datadog  Leave us feedback  Documentation

golang.org/x/crypto v0.31.0 // indirect
golang.org/x/exp v0.0.0-20241108190413-2d47ceb2692f // indirect
golang.org/x/mod v0.22.0 // indirect
golang.org/x/net v0.31.0 // indirect

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🔴 Library Vulnerability

golang.org/x/net → 0.31.0

Suggested change
golang.org/x/net v0.31.0 // indirect
golang.org/x/net vv0.33.0// indirect
Non-linear parsing of case-insensitive content in golang.org/x/net/html (...read more)

An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

View in Datadog  Leave us feedback  Documentation

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants