@@ -44,7 +44,7 @@ func (suite *AccessControlSuite) Test_Whitelist() {
44
44
{"allow-list" , " 192.168.2.0/24" },
45
45
}
46
46
47
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
47
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
48
48
49
49
suite .eventuallyReturns ("192.168.2.3" , http .StatusOK )
50
50
suite .eventuallyReturns ("192.168.5.3" , http .StatusForbidden )
@@ -57,7 +57,7 @@ func (suite *AccessControlSuite) Test_Whitelist() {
57
57
{"whitelist" , "192.168.4.0/24" },
58
58
}
59
59
60
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
60
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
61
61
62
62
suite .eventuallyReturns ("192.168.4.3" , http .StatusOK )
63
63
suite .eventuallyReturns ("192.168.5.3" , http .StatusForbidden )
@@ -71,7 +71,7 @@ func (suite *AccessControlSuite) Test_Whitelist() {
71
71
{"allow-list" , "192.168.5.0/24" },
72
72
}
73
73
74
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
74
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
75
75
76
76
suite .eventuallyReturns ("192.168.5.3" , http .StatusOK )
77
77
suite .eventuallyReturns ("192.168.4.3" , http .StatusForbidden )
@@ -84,8 +84,8 @@ func (suite *AccessControlSuite) Test_Whitelist() {
84
84
{"allow-list" , " patterns/ips" },
85
85
}
86
86
87
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
88
- suite .NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
87
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
88
+ suite .Require (). NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
89
89
90
90
suite .eventuallyReturns ("192.168.0.3" , http .StatusOK )
91
91
suite .eventuallyReturns ("192.168.2.3" , http .StatusForbidden )
@@ -98,8 +98,8 @@ func (suite *AccessControlSuite) Test_Whitelist() {
98
98
{"whitelist" , " patterns/ips2" },
99
99
}
100
100
101
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
102
- suite .NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
101
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
102
+ suite .Require (). NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
103
103
104
104
suite .eventuallyReturns ("192.169.0.3" , http .StatusOK )
105
105
suite .eventuallyReturns ("192.168.2.3" , http .StatusForbidden )
@@ -113,8 +113,8 @@ func (suite *AccessControlSuite) Test_Whitelist() {
113
113
{"allow-list" , " patterns/ips" },
114
114
}
115
115
116
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
117
- suite .NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
116
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
117
+ suite .Require (). NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
118
118
119
119
suite .eventuallyReturns ("192.168.0.3" , http .StatusOK )
120
120
suite .eventuallyReturns ("192.168.2.3" , http .StatusForbidden )
@@ -129,7 +129,7 @@ func (suite *AccessControlSuite) Test_Blacklist() {
129
129
{"deny-list" , " 192.168.2.0/24" },
130
130
}
131
131
132
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
132
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
133
133
134
134
suite .eventuallyReturns ("192.168.2.3" , http .StatusForbidden )
135
135
suite .eventuallyReturns ("192.168.5.3" , http .StatusOK )
@@ -142,7 +142,7 @@ func (suite *AccessControlSuite) Test_Blacklist() {
142
142
{"blacklist" , "192.168.4.0/24" },
143
143
}
144
144
145
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
145
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
146
146
147
147
suite .eventuallyReturns ("192.168.4.3" , http .StatusForbidden )
148
148
suite .eventuallyReturns ("192.168.5.3" , http .StatusOK )
@@ -156,7 +156,7 @@ func (suite *AccessControlSuite) Test_Blacklist() {
156
156
{"deny-list" , "192.168.5.0/24" },
157
157
}
158
158
159
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
159
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
160
160
161
161
suite .eventuallyReturns ("192.168.5.3" , http .StatusForbidden )
162
162
suite .eventuallyReturns ("192.168.4.3" , http .StatusOK )
@@ -169,8 +169,8 @@ func (suite *AccessControlSuite) Test_Blacklist() {
169
169
{"deny-list" , "patterns/ips" },
170
170
}
171
171
172
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
173
- suite .NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
172
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
173
+ suite .Require (). NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
174
174
175
175
suite .eventuallyReturns ("192.168.0.3" , http .StatusForbidden )
176
176
suite .eventuallyReturns ("192.168.2.3" , http .StatusOK )
@@ -183,8 +183,8 @@ func (suite *AccessControlSuite) Test_Blacklist() {
183
183
{"blacklist" , " patterns/ips2" },
184
184
}
185
185
186
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
187
- suite .NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
186
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
187
+ suite .Require (). NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
188
188
189
189
suite .eventuallyReturns ("192.169.0.3" , http .StatusForbidden )
190
190
suite .eventuallyReturns ("192.168.2.3" , http .StatusOK )
@@ -197,8 +197,8 @@ func (suite *AccessControlSuite) Test_Blacklist() {
197
197
{"deny-list" , "patterns/ips" },
198
198
}
199
199
200
- suite .NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
201
- suite .NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
200
+ suite .Require (). NoError (suite .test .Apply ("config/deploy.yaml.tmpl" , suite .test .GetNS (), suite .tmplData ))
201
+ suite .Require (). NoError (suite .test .Apply ("config/patternfile-a.yml" , "" , nil ))
202
202
203
203
suite .eventuallyReturns ("192.168.0.3" , http .StatusForbidden )
204
204
suite .eventuallyReturns ("192.169.2.3" , http .StatusOK )
0 commit comments