From 09f36a295d75621ed04756325249b47aa3de4c88 Mon Sep 17 00:00:00 2001 From: Matthieu MOREL Date: Mon, 13 Mar 2023 22:00:31 +0100 Subject: [PATCH] enable ginkgolinter linter Signed-off-by: Matthieu MOREL --- .golangci.yml | 1 + pkg/ip/ip_test.go | 2 +- pkg/ipam/ipam_linux_test.go | 16 +-- pkg/utils/utils_test.go | 26 ++--- plugins/ipam/dhcp/dhcp2_test.go | 4 +- plugins/ipam/dhcp/dhcp_test.go | 6 +- .../backend/allocator/allocator_test.go | 4 +- plugins/ipam/host-local/host_local_test.go | 6 +- plugins/ipam/static/static_test.go | 12 +-- plugins/main/bridge/bridge_test.go | 100 +++++++++--------- plugins/main/dummy/dummy_test.go | 10 +- plugins/main/host-device/host-device_test.go | 12 +-- plugins/main/ipvlan/ipvlan_test.go | 10 +- plugins/main/macvlan/macvlan_test.go | 20 ++-- plugins/main/ptp/ptp_test.go | 2 +- plugins/main/tap/tap_test.go | 10 +- plugins/main/vlan/vlan_test.go | 10 +- .../meta/firewall/firewall_firewalld_test.go | 4 +- .../meta/firewall/firewall_iptables_test.go | 32 +++--- plugins/meta/portmap/chain_test.go | 2 +- plugins/meta/sbr/sbr_linux_test.go | 8 +- plugins/meta/tuning/tuning_test.go | 54 +++++----- plugins/meta/vrf/vrf_test.go | 14 +-- 23 files changed, 183 insertions(+), 182 deletions(-) diff --git a/.golangci.yml b/.golangci.yml index 5ba27b11..dcfd966b 100644 --- a/.golangci.yml +++ b/.golangci.yml @@ -11,6 +11,7 @@ linters: enable: - contextcheck - gci + - ginkgolinter - gocritic - gofumpt - gosimple diff --git a/pkg/ip/ip_test.go b/pkg/ip/ip_test.go index 0ec74ff9..3276b44f 100644 --- a/pkg/ip/ip_test.go +++ b/pkg/ip/ip_test.go @@ -124,7 +124,7 @@ var _ = Describe("IP Operations", func() { } for _, test := range testCases { - Expect(len(test.ip.ToIP())).To(Equal(test.expectedLen)) + Expect(test.ip.ToIP()).To(HaveLen(test.expectedLen)) Expect(test.ip.ToIP()).To(Equal(test.expectedIP)) } }) diff --git a/pkg/ipam/ipam_linux_test.go b/pkg/ipam/ipam_linux_test.go index 2ead7d9a..6d4ec4a4 100644 --- a/pkg/ipam/ipam_linux_test.go +++ b/pkg/ipam/ipam_linux_test.go @@ -142,12 +142,12 @@ var _ = Describe("ConfigureIface", func() { v4addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(v4addrs)).To(Equal(1)) - Expect(ipNetEqual(v4addrs[0].IPNet, ipv4)).To(Equal(true)) + Expect(v4addrs).To(HaveLen(1)) + Expect(ipNetEqual(v4addrs[0].IPNet, ipv4)).To(BeTrue()) v6addrs, err := netlink.AddrList(link, syscall.AF_INET6) Expect(err).NotTo(HaveOccurred()) - Expect(len(v6addrs)).To(Equal(2)) + Expect(v6addrs).To(HaveLen(2)) var found bool for _, a := range v6addrs { @@ -156,7 +156,7 @@ var _ = Describe("ConfigureIface", func() { break } } - Expect(found).To(Equal(true)) + Expect(found).To(BeTrue()) // Ensure the v4 route, v6 route, and subnet route routes, err := netlink.RouteList(link, 0) @@ -176,8 +176,8 @@ var _ = Describe("ConfigureIface", func() { break } } - Expect(v4found).To(Equal(true)) - Expect(v6found).To(Equal(true)) + Expect(v4found).To(BeTrue()) + Expect(v6found).To(BeTrue()) return nil }) @@ -215,8 +215,8 @@ var _ = Describe("ConfigureIface", func() { break } } - Expect(v4found).To(Equal(true)) - Expect(v6found).To(Equal(true)) + Expect(v4found).To(BeTrue()) + Expect(v6found).To(BeTrue()) return nil }) diff --git a/pkg/utils/utils_test.go b/pkg/utils/utils_test.go index 7868d927..524575f4 100644 --- a/pkg/utils/utils_test.go +++ b/pkg/utils/utils_test.go @@ -26,29 +26,29 @@ var _ = Describe("Utils", func() { Describe("FormatChainName", func() { It("must format a short name", func() { chain := FormatChainName("test", "1234") - Expect(len(chain)).To(Equal(maxChainLength)) + Expect(chain).To(HaveLen(maxChainLength)) Expect(chain).To(Equal("CNI-2bbe0c48b91a7d1b8a6753a8")) }) It("must truncate a long name", func() { chain := FormatChainName("testalongnamethatdoesnotmakesense", "1234") - Expect(len(chain)).To(Equal(maxChainLength)) + Expect(chain).To(HaveLen(maxChainLength)) Expect(chain).To(Equal("CNI-374f33fe84ab0ed84dcdebe3")) }) It("must be predictable", func() { chain1 := FormatChainName("testalongnamethatdoesnotmakesense", "1234") chain2 := FormatChainName("testalongnamethatdoesnotmakesense", "1234") - Expect(len(chain1)).To(Equal(maxChainLength)) - Expect(len(chain2)).To(Equal(maxChainLength)) + Expect(chain1).To(HaveLen(maxChainLength)) + Expect(chain2).To(HaveLen(maxChainLength)) Expect(chain1).To(Equal(chain2)) }) It("must change when a character changes", func() { chain1 := FormatChainName("testalongnamethatdoesnotmakesense", "1234") chain2 := FormatChainName("testalongnamethatdoesnotmakesense", "1235") - Expect(len(chain1)).To(Equal(maxChainLength)) - Expect(len(chain2)).To(Equal(maxChainLength)) + Expect(chain1).To(HaveLen(maxChainLength)) + Expect(chain2).To(HaveLen(maxChainLength)) Expect(chain1).To(Equal("CNI-374f33fe84ab0ed84dcdebe3")) Expect(chain1).NotTo(Equal(chain2)) }) @@ -57,35 +57,35 @@ var _ = Describe("Utils", func() { Describe("MustFormatChainNameWithPrefix", func() { It("generates a chain name with a prefix", func() { chain := MustFormatChainNameWithPrefix("test", "1234", "PREFIX-") - Expect(len(chain)).To(Equal(maxChainLength)) + Expect(chain).To(HaveLen(maxChainLength)) Expect(chain).To(Equal("CNI-PREFIX-2bbe0c48b91a7d1b8")) }) It("must format a short name", func() { chain := MustFormatChainNameWithPrefix("test", "1234", "PREFIX-") - Expect(len(chain)).To(Equal(maxChainLength)) + Expect(chain).To(HaveLen(maxChainLength)) Expect(chain).To(Equal("CNI-PREFIX-2bbe0c48b91a7d1b8")) }) It("must truncate a long name", func() { chain := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-") - Expect(len(chain)).To(Equal(maxChainLength)) + Expect(chain).To(HaveLen(maxChainLength)) Expect(chain).To(Equal("CNI-PREFIX-374f33fe84ab0ed84")) }) It("must be predictable", func() { chain1 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-") chain2 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-") - Expect(len(chain1)).To(Equal(maxChainLength)) - Expect(len(chain2)).To(Equal(maxChainLength)) + Expect(chain1).To(HaveLen(maxChainLength)) + Expect(chain2).To(HaveLen(maxChainLength)) Expect(chain1).To(Equal(chain2)) }) It("must change when a character changes", func() { chain1 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1234", "PREFIX-") chain2 := MustFormatChainNameWithPrefix("testalongnamethatdoesnotmakesense", "1235", "PREFIX-") - Expect(len(chain1)).To(Equal(maxChainLength)) - Expect(len(chain2)).To(Equal(maxChainLength)) + Expect(chain1).To(HaveLen(maxChainLength)) + Expect(chain2).To(HaveLen(maxChainLength)) Expect(chain1).To(Equal("CNI-PREFIX-374f33fe84ab0ed84")) Expect(chain1).NotTo(Equal(chain2)) }) diff --git a/plugins/ipam/dhcp/dhcp2_test.go b/plugins/ipam/dhcp/dhcp2_test.go index d14ac789..331bc8d9 100644 --- a/plugins/ipam/dhcp/dhcp2_test.go +++ b/plugins/ipam/dhcp/dhcp2_test.go @@ -122,7 +122,7 @@ var _ = Describe("DHCP Multiple Lease Operations", func() { addResult, err = current.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(addResult.IPs)).To(Equal(1)) + Expect(addResult.IPs).To(HaveLen(1)) Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24")) return nil }) @@ -145,7 +145,7 @@ var _ = Describe("DHCP Multiple Lease Operations", func() { addResult, err = current.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(addResult.IPs)).To(Equal(1)) + Expect(addResult.IPs).To(HaveLen(1)) Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.6/24")) return nil }) diff --git a/plugins/ipam/dhcp/dhcp_test.go b/plugins/ipam/dhcp/dhcp_test.go index 5fa43ed0..fefe3c9b 100644 --- a/plugins/ipam/dhcp/dhcp_test.go +++ b/plugins/ipam/dhcp/dhcp_test.go @@ -271,7 +271,7 @@ var _ = Describe("DHCP Operations", func() { addResult, err = types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(addResult.IPs)).To(Equal(1)) + Expect(addResult.IPs).To(HaveLen(1)) Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24")) return nil }) @@ -314,7 +314,7 @@ var _ = Describe("DHCP Operations", func() { addResult, err = types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(addResult.IPs)).To(Equal(1)) + Expect(addResult.IPs).To(HaveLen(1)) Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24")) return nil }) @@ -594,7 +594,7 @@ var _ = Describe("DHCP Lease Unavailable Operations", func() { addResult, err = types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(addResult.IPs)).To(Equal(1)) + Expect(addResult.IPs).To(HaveLen(1)) Expect(addResult.IPs[0].Address.String()).To(Equal("192.168.1.5/24")) return nil }) diff --git a/plugins/ipam/host-local/backend/allocator/allocator_test.go b/plugins/ipam/host-local/backend/allocator/allocator_test.go index 7e62b3e8..13617a52 100644 --- a/plugins/ipam/host-local/backend/allocator/allocator_test.go +++ b/plugins/ipam/host-local/backend/allocator/allocator_test.go @@ -77,7 +77,7 @@ func (t AllocatorTestCase) run(idx int) (*current.IPConfig, error) { p = append(p, Range{Subnet: types.IPNet(*subnet)}) } - Expect(p.Canonicalize()).To(BeNil()) + Expect(p.Canonicalize()).To(Succeed()) store := fakestore.NewFakeStore(t.ipmap, map[string]net.IP{"rangeid": net.ParseIP(t.lastIP)}) @@ -330,7 +330,7 @@ var _ = Describe("host-local ip allocator", func() { } for idx, tc := range testCases { _, err := tc.run(idx) - Expect(err).NotTo(BeNil()) + Expect(err).To(HaveOccurred()) Expect(err.Error()).To(HavePrefix("no IP addresses available in range set")) } }) diff --git a/plugins/ipam/host-local/host_local_test.go b/plugins/ipam/host-local/host_local_test.go index 7ae11b73..1ab15cba 100644 --- a/plugins/ipam/host-local/host_local_test.go +++ b/plugins/ipam/host-local/host_local_test.go @@ -114,7 +114,7 @@ var _ = Describe("host-local Operations", func() { Gateway: net.ParseIP("2001:db8:1::1"), }, )) - Expect(len(result.IPs)).To(Equal(2)) + Expect(result.IPs).To(HaveLen(2)) for _, expectedRoute := range []*types.Route{ {Dst: mustCIDR("0.0.0.0/0"), GW: nil}, @@ -310,7 +310,7 @@ var _ = Describe("host-local Operations", func() { result0, err := types100.GetResult(r0) Expect(err).NotTo(HaveOccurred()) - Expect(len(result0.IPs)).Should(Equal(1)) + Expect(result0.IPs).Should(HaveLen(1)) Expect(result0.IPs[0].Address.String()).Should(Equal("10.1.2.2/24")) // Allocate the IP with the same container ID @@ -330,7 +330,7 @@ var _ = Describe("host-local Operations", func() { result1, err := types100.GetResult(r1) Expect(err).NotTo(HaveOccurred()) - Expect(len(result1.IPs)).Should(Equal(1)) + Expect(result1.IPs).Should(HaveLen(1)) Expect(result1.IPs[0].Address.String()).Should(Equal("10.1.2.3/24")) // Allocate the IP with the same container ID again diff --git a/plugins/ipam/static/static_test.go b/plugins/ipam/static/static_test.go index ac2a6719..8ed9bd0e 100644 --- a/plugins/ipam/static/static_test.go +++ b/plugins/ipam/static/static_test.go @@ -97,7 +97,7 @@ var _ = Describe("static Operations", func() { Gateway: net.ParseIP("3ffe:ffff:0::1"), }, )) - Expect(len(result.IPs)).To(Equal(2)) + Expect(result.IPs).To(HaveLen(2)) Expect(result.Routes).To(Equal([]*types.Route{ {Dst: mustCIDR("0.0.0.0/0")}, @@ -206,7 +206,7 @@ var _ = Describe("static Operations", func() { Gateway: net.ParseIP("10.10.0.254"), })) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.Routes).To(Equal([]*types.Route{ {Dst: mustCIDR("0.0.0.0/0")}, @@ -272,7 +272,7 @@ var _ = Describe("static Operations", func() { Gateway: nil, })) - Expect(len(result.IPs)).To(Equal(2)) + Expect(result.IPs).To(HaveLen(2)) // Release the IP err = testutils.CmdDelWithArgs(args, func() error { @@ -337,7 +337,7 @@ var _ = Describe("static Operations", func() { Address: mustCIDR("3ffe:ffff:0:01ff::1/64"), }, )) - Expect(len(result.IPs)).To(Equal(2)) + Expect(result.IPs).To(HaveLen(2)) Expect(result.Routes).To(Equal([]*types.Route{ {Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")}, {Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")}, @@ -407,7 +407,7 @@ var _ = Describe("static Operations", func() { Address: mustCIDR("3ffe:ffff:0:01ff::1/64"), }, )) - Expect(len(result.IPs)).To(Equal(2)) + Expect(result.IPs).To(HaveLen(2)) Expect(result.Routes).To(Equal([]*types.Route{ {Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")}, {Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")}, @@ -482,7 +482,7 @@ var _ = Describe("static Operations", func() { Address: mustCIDR("3ffe:ffff:0:01ff::1/64"), }, )) - Expect(len(result.IPs)).To(Equal(2)) + Expect(result.IPs).To(HaveLen(2)) Expect(result.Routes).To(Equal([]*types.Route{ {Dst: mustCIDR("0.0.0.0/0"), GW: net.ParseIP("10.10.0.254")}, {Dst: mustCIDR("3ffe:ffff:0:01ff::1/64"), GW: net.ParseIP("3ffe:ffff:0::1")}, diff --git a/plugins/main/bridge/bridge_test.go b/plugins/main/bridge/bridge_test.go index d39557e2..fb131719 100644 --- a/plugins/main/bridge/bridge_test.go +++ b/plugins/main/bridge/bridge_test.go @@ -485,9 +485,9 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result, result = resultType.(*types100.Result) if !tc.isLayer2 && tc.vlan != 0 { - Expect(len(result.Interfaces)).To(Equal(4)) + Expect(result.Interfaces).To(HaveLen(4)) } else { - Expect(len(result.Interfaces)).To(Equal(3)) + Expect(result.Interfaces).To(HaveLen(3)) } Expect(result.Interfaces[0].Name).To(Equal(BRNAME)) @@ -531,9 +531,9 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result, // Check the bridge vlan filtering equals true if tc.vlan != 0 { - Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(true)) + Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeTrue()) } else { - Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(false)) + Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeFalse()) } // Ensure bridge has expected gateway address(es) @@ -544,7 +544,7 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result, addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL) } Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(BeNumerically(">", 0)) + Expect(addrs).ToNot(BeEmpty()) for _, cidr := range tc.expGWCIDRs { ip, subnet, err := net.ParseCIDR(cidr) Expect(err).NotTo(HaveOccurred()) @@ -558,16 +558,16 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result, break } } - Expect(found).To(Equal(true), fmt.Sprintf("failed to find %s", cidr)) + Expect(found).To(BeTrue(), fmt.Sprintf("failed to find %s", cidr)) } // Check for the veth link in the main namespace links, err := netlink.LinkList() Expect(err).NotTo(HaveOccurred()) if !tc.isLayer2 && tc.vlan != 0 { - Expect(len(links)).To(Equal(5)) // Bridge, Bridge vlan veth, veth, and loopback + Expect(links).To(HaveLen(5)) // Bridge, Bridge vlan veth, veth, and loopback } else { - Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback + Expect(links).To(HaveLen(3)) // Bridge, veth, and loopback } link, err = netlink.LinkByName(result.Interfaces[1].Name) @@ -613,9 +613,9 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result, expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs() addrs, err := netlink.AddrList(link, netlink.FAMILY_V4) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(len(expCIDRsV4))) + Expect(addrs).To(HaveLen(len(expCIDRsV4))) addrs, err = netlink.AddrList(link, netlink.FAMILY_V6) - Expect(len(addrs)).To(Equal(len(expCIDRsV6) + 1)) // add one for the link-local + Expect(addrs).To(HaveLen(len(expCIDRsV6) + 1)) // add one for the link-local Expect(err).NotTo(HaveOccurred()) // Ignore link local address which may or may not be // ready when we read addresses. @@ -650,7 +650,7 @@ func (tester *testerV10x) cmdAddTest(tc testCase, dataDir string) (types.Result, break } } - Expect(*found).To(Equal(true)) + Expect(*found).To(BeTrue()) } return nil @@ -689,9 +689,9 @@ func (tester *testerV10x) cmdCheckTest(tc testCase, conf *Net, dataDir string) { expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs() addrs, err := netlink.AddrList(link, netlink.FAMILY_V4) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(len(expCIDRsV4))) + Expect(addrs).To(HaveLen(len(expCIDRsV4))) addrs, err = netlink.AddrList(link, netlink.FAMILY_V6) - Expect(len(addrs)).To(Equal(len(expCIDRsV6) + 1)) // add one for the link-local + Expect(addrs).To(HaveLen(len(expCIDRsV6) + 1)) // add one for the link-local Expect(err).NotTo(HaveOccurred()) // Ignore link local address which may or may not be // ready when we read addresses. @@ -726,7 +726,7 @@ func (tester *testerV10x) cmdCheckTest(tc testCase, conf *Net, dataDir string) { break } } - Expect(*found).To(Equal(true)) + Expect(*found).To(BeTrue()) } return nil @@ -790,9 +790,9 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result, result = resultType.(*types040.Result) if !tc.isLayer2 && tc.vlan != 0 { - Expect(len(result.Interfaces)).To(Equal(4)) + Expect(result.Interfaces).To(HaveLen(4)) } else { - Expect(len(result.Interfaces)).To(Equal(3)) + Expect(result.Interfaces).To(HaveLen(3)) } Expect(result.Interfaces[0].Name).To(Equal(BRNAME)) @@ -836,9 +836,9 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result, // Check the bridge vlan filtering equals true if tc.vlan != 0 { - Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(true)) + Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeTrue()) } else { - Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(false)) + Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeFalse()) } // Ensure bridge has expected gateway address(es) @@ -849,7 +849,7 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result, addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL) } Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(BeNumerically(">", 0)) + Expect(addrs).ToNot(BeEmpty()) for _, cidr := range tc.expGWCIDRs { ip, subnet, err := net.ParseCIDR(cidr) Expect(err).NotTo(HaveOccurred()) @@ -863,16 +863,16 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result, break } } - Expect(found).To(Equal(true)) + Expect(found).To(BeTrue()) } // Check for the veth link in the main namespace links, err := netlink.LinkList() Expect(err).NotTo(HaveOccurred()) if !tc.isLayer2 && tc.vlan != 0 { - Expect(len(links)).To(Equal(5)) // Bridge, Bridge vlan veth, veth, and loopback + Expect(links).To(HaveLen(5)) // Bridge, Bridge vlan veth, veth, and loopback } else { - Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback + Expect(links).To(HaveLen(3)) // Bridge, veth, and loopback } link, err = netlink.LinkByName(result.Interfaces[1].Name) @@ -913,9 +913,9 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result, expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs() addrs, err := netlink.AddrList(link, netlink.FAMILY_V4) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(len(expCIDRsV4))) + Expect(addrs).To(HaveLen(len(expCIDRsV4))) addrs, err = netlink.AddrList(link, netlink.FAMILY_V6) - Expect(len(addrs)).To(Equal(len(expCIDRsV6) + 1)) // add one for the link-local + Expect(addrs).To(HaveLen(len(expCIDRsV6) + 1)) // add one for the link-local Expect(err).NotTo(HaveOccurred()) // Ignore link local address which may or may not be // ready when we read addresses. @@ -950,7 +950,7 @@ func (tester *testerV04x) cmdAddTest(tc testCase, dataDir string) (types.Result, break } } - Expect(*found).To(Equal(true)) + Expect(*found).To(BeTrue()) } return nil @@ -989,9 +989,9 @@ func (tester *testerV04x) cmdCheckTest(tc testCase, conf *Net, dataDir string) { expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs() addrs, err := netlink.AddrList(link, netlink.FAMILY_V4) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(len(expCIDRsV4))) + Expect(addrs).To(HaveLen(len(expCIDRsV4))) addrs, err = netlink.AddrList(link, netlink.FAMILY_V6) - Expect(len(addrs)).To(Equal(len(expCIDRsV6) + 1)) // add one for the link-local + Expect(addrs).To(HaveLen(len(expCIDRsV6) + 1)) // add one for the link-local Expect(err).NotTo(HaveOccurred()) // Ignore link local address which may or may not be // ready when we read addresses. @@ -1026,7 +1026,7 @@ func (tester *testerV04x) cmdCheckTest(tc testCase, conf *Net, dataDir string) { break } } - Expect(*found).To(Equal(true)) + Expect(*found).To(BeTrue()) } return nil @@ -1090,9 +1090,9 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result, result = resultType.(*types040.Result) if !tc.isLayer2 && tc.vlan != 0 { - Expect(len(result.Interfaces)).To(Equal(4)) + Expect(result.Interfaces).To(HaveLen(4)) } else { - Expect(len(result.Interfaces)).To(Equal(3)) + Expect(result.Interfaces).To(HaveLen(3)) } Expect(result.Interfaces[0].Name).To(Equal(BRNAME)) @@ -1136,9 +1136,9 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result, // Check the bridge vlan filtering equals true if tc.vlan != 0 { - Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(true)) + Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeTrue()) } else { - Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(false)) + Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeFalse()) } // Ensure bridge has expected gateway address(es) @@ -1149,7 +1149,7 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result, addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL) } Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(BeNumerically(">", 0)) + Expect(addrs).ToNot(BeEmpty()) for _, cidr := range tc.expGWCIDRs { ip, subnet, err := net.ParseCIDR(cidr) Expect(err).NotTo(HaveOccurred()) @@ -1163,16 +1163,16 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result, break } } - Expect(found).To(Equal(true)) + Expect(found).To(BeTrue()) } // Check for the veth link in the main namespace links, err := netlink.LinkList() Expect(err).NotTo(HaveOccurred()) if !tc.isLayer2 && tc.vlan != 0 { - Expect(len(links)).To(Equal(5)) // Bridge, Bridge vlan veth, veth, and loopback + Expect(links).To(HaveLen(5)) // Bridge, Bridge vlan veth, veth, and loopback } else { - Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback + Expect(links).To(HaveLen(3)) // Bridge, veth, and loopback } link, err = netlink.LinkByName(result.Interfaces[1].Name) @@ -1213,7 +1213,7 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result, expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs() addrs, err := netlink.AddrList(link, netlink.FAMILY_V4) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(len(expCIDRsV4))) + Expect(addrs).To(HaveLen(len(expCIDRsV4))) addrs, err = netlink.AddrList(link, netlink.FAMILY_V6) Expect(err).NotTo(HaveOccurred()) // Ignore link local address which may or may not be @@ -1249,7 +1249,7 @@ func (tester *testerV03x) cmdAddTest(tc testCase, dataDir string) (types.Result, break } } - Expect(*found).To(Equal(true)) + Expect(*found).To(BeTrue()) } return nil @@ -1362,9 +1362,9 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re // Check the bridge vlan filtering equals true if tc.vlan != 0 { - Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(true)) + Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeTrue()) } else { - Expect(*link.(*netlink.Bridge).VlanFiltering).To(Equal(false)) + Expect(*link.(*netlink.Bridge).VlanFiltering).To(BeFalse()) } // Ensure bridge has expected gateway address(es) @@ -1375,7 +1375,7 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re addrs, err = netlink.AddrList(vlanLink, netlink.FAMILY_ALL) } Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(BeNumerically(">", 0)) + Expect(addrs).ToNot(BeEmpty()) for _, cidr := range tc.expGWCIDRs { ip, subnet, err := net.ParseCIDR(cidr) Expect(err).NotTo(HaveOccurred()) @@ -1389,7 +1389,7 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re break } } - Expect(found).To(Equal(true)) + Expect(found).To(BeTrue()) } // Check for the veth link in the main namespace; can't @@ -1398,9 +1398,9 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re links, err := netlink.LinkList() Expect(err).NotTo(HaveOccurred()) if !tc.isLayer2 && tc.vlan != 0 { - Expect(len(links)).To(Equal(5)) // Bridge, Bridge vlan veth, veth, and loopback + Expect(links).To(HaveLen(5)) // Bridge, Bridge vlan veth, veth, and loopback } else { - Expect(len(links)).To(Equal(3)) // Bridge, veth, and loopback + Expect(links).To(HaveLen(3)) // Bridge, veth, and loopback } // Grab the vlan map in the host NS for checking later @@ -1431,7 +1431,7 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re expCIDRsV4, expCIDRsV6 := tc.expectedCIDRs() addrs, err := netlink.AddrList(link, netlink.FAMILY_V4) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(len(expCIDRsV4))) + Expect(addrs).To(HaveLen(len(expCIDRsV4))) addrs, err = netlink.AddrList(link, netlink.FAMILY_V6) Expect(err).NotTo(HaveOccurred()) // Ignore link local address which may or may not be @@ -1467,7 +1467,7 @@ func (tester *testerV01xOr02x) cmdAddTest(tc testCase, dataDir string) (types.Re break } } - Expect(*found).To(Equal(true)) + Expect(*found).To(BeTrue()) } // Validate VLAN in the host NS. Since 0.1.0/0.2.0 don't return @@ -1929,7 +1929,7 @@ var _ = Describe("bridge Operations", func() { checkBridgeIPs := func(cidr0, cidr1 string) { addrs, err := netlink.AddrList(bridge, family) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(expNumAddrs)) + Expect(addrs).To(HaveLen(expNumAddrs)) addr := addrs[0].IPNet.String() Expect(addr).To(Equal(cidr0)) if cidr1 != "" { @@ -1939,7 +1939,7 @@ var _ = Describe("bridge Operations", func() { } // Check if ForceAddress has default value - Expect(conf.ForceAddress).To(Equal(false)) + Expect(conf.ForceAddress).To(BeFalse()) // Set first address on bridge err = ensureAddr(bridge, family, &gwnFirst, conf.ForceAddress) @@ -2008,7 +2008,7 @@ var _ = Describe("bridge Operations", func() { _, _, err := setupBridge(conf) Expect(err).NotTo(HaveOccurred()) // Check if ForceAddress has default value - Expect(conf.ForceAddress).To(Equal(false)) + Expect(conf.ForceAddress).To(BeFalse()) // Check if promiscuous mode is set correctly link, err := netlink.LinkByName("bridge0") @@ -2275,7 +2275,7 @@ var _ = Describe("bridge Operations", func() { for _, test := range tests { _, _, err := loadNetConf([]byte(test.netConfJSON("")), "") if test.err == nil { - Expect(err).To(BeNil()) + Expect(err).ToNot(HaveOccurred()) } else { Expect(err).To(Equal(test.err)) } diff --git a/plugins/main/dummy/dummy_test.go b/plugins/main/dummy/dummy_test.go index 3b5f00d6..10cfa1f9 100644 --- a/plugins/main/dummy/dummy_test.go +++ b/plugins/main/dummy/dummy_test.go @@ -122,9 +122,9 @@ func (t *testerV10x) verifyResult(result types.Result, name string) string { r, err := types100.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(1)) + Expect(r.IPs).To(HaveLen(1)) return r.Interfaces[0].Mac } @@ -133,9 +133,9 @@ func verify0403(result types.Result, name string) string { r, err := types040.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(1)) + Expect(r.IPs).To(HaveLen(1)) return r.Interfaces[0].Mac } @@ -292,7 +292,7 @@ var _ = Describe("dummy Operations", func() { addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(1)) + Expect(addrs).To(HaveLen(1)) return nil }) Expect(err).NotTo(HaveOccurred()) diff --git a/plugins/main/host-device/host-device_test.go b/plugins/main/host-device/host-device_test.go index bc5a6f43..21848929 100644 --- a/plugins/main/host-device/host-device_test.go +++ b/plugins/main/host-device/host-device_test.go @@ -260,8 +260,8 @@ func (t *testerV10x) expectDpdkInterfaceIP(result types.Result, ipAddress string // check that the result was sane res, err := types100.NewResultFromResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(res.Interfaces)).To(Equal(0)) - Expect(len(res.IPs)).To(Equal(1)) + Expect(res.Interfaces).To(BeEmpty()) + Expect(res.IPs).To(HaveLen(1)) Expect(res.IPs[0].Address.String()).To(Equal(ipAddress)) } @@ -282,8 +282,8 @@ func (t *testerV04x) expectDpdkInterfaceIP(result types.Result, ipAddress string // check that the result was sane res, err := types040.NewResultFromResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(res.Interfaces)).To(Equal(0)) - Expect(len(res.IPs)).To(Equal(1)) + Expect(res.Interfaces).To(BeEmpty()) + Expect(res.IPs).To(HaveLen(1)) Expect(res.IPs[0].Address.String()).To(Equal(ipAddress)) } @@ -304,8 +304,8 @@ func (t *testerV03x) expectDpdkInterfaceIP(result types.Result, ipAddress string // check that the result was sane res, err := types040.NewResultFromResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(res.Interfaces)).To(Equal(0)) - Expect(len(res.IPs)).To(Equal(1)) + Expect(res.Interfaces).To(BeEmpty()) + Expect(res.IPs).To(HaveLen(1)) Expect(res.IPs[0].Address.String()).To(Equal(ipAddress)) } diff --git a/plugins/main/ipvlan/ipvlan_test.go b/plugins/main/ipvlan/ipvlan_test.go index 9ba4db8a..3ab76ab4 100644 --- a/plugins/main/ipvlan/ipvlan_test.go +++ b/plugins/main/ipvlan/ipvlan_test.go @@ -141,7 +141,7 @@ func ipvlanAddCheckDelTest(conf, masterName string, originalNS, targetNS ns.NetN addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(1)) + Expect(addrs).To(HaveLen(1)) return nil }) Expect(err).NotTo(HaveOccurred()) @@ -230,9 +230,9 @@ func (t *testerV10x) verifyResult(result types.Result, name string) string { r, err := types100.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(1)) + Expect(r.IPs).To(HaveLen(1)) return r.Interfaces[0].Mac } @@ -242,9 +242,9 @@ func (t *testerV04x) verifyResult(result types.Result, name string) string { r, err := types040.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(1)) + Expect(r.IPs).To(HaveLen(1)) return r.Interfaces[0].Mac } diff --git a/plugins/main/macvlan/macvlan_test.go b/plugins/main/macvlan/macvlan_test.go index 968bd8e1..64579dfd 100644 --- a/plugins/main/macvlan/macvlan_test.go +++ b/plugins/main/macvlan/macvlan_test.go @@ -136,9 +136,9 @@ func (t *testerV10x) verifyResult(result types.Result, err error, name string, n r, err := types100.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(numAddrs)) + Expect(r.IPs).To(HaveLen(numAddrs)) return r.Interfaces[0].Mac } @@ -150,9 +150,9 @@ func verify0403(result types.Result, err error, name string, numAddrs int) strin r, err := types040.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(numAddrs)) + Expect(r.IPs).To(HaveLen(numAddrs)) return r.Interfaces[0].Mac } @@ -348,7 +348,7 @@ var _ = Describe("macvlan Operations", func() { addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(1)) + Expect(addrs).To(HaveLen(1)) return nil }) Expect(err).NotTo(HaveOccurred()) @@ -460,7 +460,7 @@ var _ = Describe("macvlan Operations", func() { addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(0)) + Expect(addrs).To(BeEmpty()) return nil }) Expect(err).NotTo(HaveOccurred()) @@ -546,7 +546,7 @@ var _ = Describe("macvlan Operations", func() { addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(1)) + Expect(addrs).To(HaveLen(1)) return nil }) Expect(err).NotTo(HaveOccurred()) @@ -686,7 +686,7 @@ var _ = Describe("macvlan Operations", func() { addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(1)) + Expect(addrs).To(HaveLen(1)) return nil }) Expect(err).NotTo(HaveOccurred()) @@ -768,7 +768,7 @@ var _ = Describe("macvlan Operations", func() { addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(0)) + Expect(addrs).To(BeEmpty()) return nil }) Expect(err).NotTo(HaveOccurred()) @@ -853,7 +853,7 @@ var _ = Describe("macvlan Operations", func() { addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(0)) + Expect(addrs).To(BeEmpty()) return nil }) Expect(err).NotTo(HaveOccurred()) diff --git a/plugins/main/ptp/ptp_test.go b/plugins/main/ptp/ptp_test.go index 869a02f2..a01698b5 100644 --- a/plugins/main/ptp/ptp_test.go +++ b/plugins/main/ptp/ptp_test.go @@ -259,7 +259,7 @@ var _ = Describe("ptp Operations", func() { t := newTesterByVersion(cniVersion) ips, mac := t.verifyResult(result, IFNAME, targetNS.Path(), expectedDNSConf) - Expect(len(ips)).To(Equal(numIPs)) + Expect(ips).To(HaveLen(numIPs)) // Make sure ptp link exists in the target namespace // Then, ping the gateway diff --git a/plugins/main/tap/tap_test.go b/plugins/main/tap/tap_test.go index 08615139..45168fd0 100644 --- a/plugins/main/tap/tap_test.go +++ b/plugins/main/tap/tap_test.go @@ -125,9 +125,9 @@ func (t *testerV10x) verifyResult(result types.Result, name string) string { r, err := types100.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(1)) + Expect(r.IPs).To(HaveLen(1)) return r.Interfaces[0].Mac } @@ -136,9 +136,9 @@ func verify0403(result types.Result, name string) string { r, err := types040.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(1)) + Expect(r.IPs).To(HaveLen(1)) return r.Interfaces[0].Mac } @@ -249,7 +249,7 @@ var _ = Describe("Add, check, remove tap plugin", func() { } addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(1)) + Expect(addrs).To(HaveLen(1)) return nil }) Expect(err).NotTo(HaveOccurred()) diff --git a/plugins/main/vlan/vlan_test.go b/plugins/main/vlan/vlan_test.go index d3b9bfde..cf8b9296 100644 --- a/plugins/main/vlan/vlan_test.go +++ b/plugins/main/vlan/vlan_test.go @@ -129,9 +129,9 @@ func (t *testerV10x) verifyResult(result types.Result, name string) string { r, err := types100.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(1)) + Expect(r.IPs).To(HaveLen(1)) return r.Interfaces[0].Mac } @@ -140,9 +140,9 @@ func verify0403(result types.Result, name string) string { r, err := types040.GetResult(result) Expect(err).NotTo(HaveOccurred()) - Expect(len(r.Interfaces)).To(Equal(1)) + Expect(r.Interfaces).To(HaveLen(1)) Expect(r.Interfaces[0].Name).To(Equal(name)) - Expect(len(r.IPs)).To(Equal(1)) + Expect(r.IPs).To(HaveLen(1)) return r.Interfaces[0].Mac } @@ -380,7 +380,7 @@ var _ = Describe("vlan Operations", func() { addrs, err := netlink.AddrList(link, syscall.AF_INET) Expect(err).NotTo(HaveOccurred()) - Expect(len(addrs)).To(Equal(1)) + Expect(addrs).To(HaveLen(1)) return nil }) Expect(err).NotTo(HaveOccurred()) diff --git a/plugins/meta/firewall/firewall_firewalld_test.go b/plugins/meta/firewall/firewall_firewalld_test.go index 5083d572..15036fed 100644 --- a/plugins/meta/firewall/firewall_firewalld_test.go +++ b/plugins/meta/firewall/firewall_firewalld_test.go @@ -251,9 +251,9 @@ var _ = Describe("firewalld test", func() { result, err := current.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal("eth0")) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) }) diff --git a/plugins/meta/firewall/firewall_iptables_test.go b/plugins/meta/firewall/firewall_iptables_test.go index 9407e2f0..0ac168ab 100644 --- a/plugins/meta/firewall/firewall_iptables_test.go +++ b/plugins/meta/firewall/firewall_iptables_test.go @@ -26,7 +26,7 @@ import ( "github.com/containernetworking/cni/pkg/skel" "github.com/containernetworking/cni/pkg/types" - "github.com/containernetworking/cni/pkg/types/040" + types040 "github.com/containernetworking/cni/pkg/types/040" current "github.com/containernetworking/cni/pkg/types/100" "github.com/containernetworking/cni/pkg/version" "github.com/containernetworking/plugins/pkg/ns" @@ -107,27 +107,27 @@ func validateFullRuleset(bytes []byte) { chains, err := ipt.ListChains("filter") Expect(err).NotTo(HaveOccurred()) foundAdmin, foundPriv := findChains(chains) - Expect(foundAdmin).To(Equal(true)) - Expect(foundPriv).To(Equal(true)) + Expect(foundAdmin).To(BeTrue()) + Expect(foundPriv).To(BeTrue()) // Look for the FORWARD chain jump rules to our custom chains rules, err := ipt.List("filter", "FORWARD") Expect(err).NotTo(HaveOccurred()) Expect(len(rules)).Should(BeNumerically(">", 1)) _, foundPriv = findForwardJumpRules(rules) - Expect(foundPriv).To(Equal(true)) + Expect(foundPriv).To(BeTrue()) // Look for the allow rules in our custom FORWARD chain rules, err = ipt.List("filter", "CNI-FORWARD") Expect(err).NotTo(HaveOccurred()) Expect(len(rules)).Should(BeNumerically(">", 1)) foundAdmin, _ = findForwardJumpRules(rules) - Expect(foundAdmin).To(Equal(true)) + Expect(foundAdmin).To(BeTrue()) // Look for the IP allow rules foundOne, foundTwo := findForwardAllowRules(rules, ipString(ip.Address)) - Expect(foundOne).To(Equal(true)) - Expect(foundTwo).To(Equal(true)) + Expect(foundOne).To(BeTrue()) + Expect(foundTwo).To(BeTrue()) } } @@ -142,25 +142,25 @@ func validateCleanedUp(bytes []byte) { chains, err := ipt.ListChains("filter") Expect(err).NotTo(HaveOccurred()) foundAdmin, foundPriv := findChains(chains) - Expect(foundAdmin).To(Equal(true)) - Expect(foundPriv).To(Equal(true)) + Expect(foundAdmin).To(BeTrue()) + Expect(foundPriv).To(BeTrue()) // Look for the FORWARD chain jump rules to our custom chains rules, err := ipt.List("filter", "FORWARD") Expect(err).NotTo(HaveOccurred()) _, foundPriv = findForwardJumpRules(rules) - Expect(foundPriv).To(Equal(true)) + Expect(foundPriv).To(BeTrue()) // Look for the allow rules in our custom FORWARD chain rules, err = ipt.List("filter", "CNI-FORWARD") Expect(err).NotTo(HaveOccurred()) foundAdmin, _ = findForwardJumpRules(rules) - Expect(foundAdmin).To(Equal(true)) + Expect(foundAdmin).To(BeTrue()) // Expect no IP address rules for this IP foundOne, foundTwo := findForwardAllowRules(rules, ipString(ip.Address)) - Expect(foundOne).To(Equal(false)) - Expect(foundTwo).To(Equal(false)) + Expect(foundOne).To(BeFalse()) + Expect(foundTwo).To(BeFalse()) } } @@ -253,9 +253,9 @@ var _ = Describe("firewall plugin iptables backend", func() { result, err := current.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(2)) + Expect(result.IPs).To(HaveLen(2)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) Expect(result.IPs[1].Address.String()).To(Equal("2001:db8:1:2::1/64")) return nil @@ -350,7 +350,7 @@ var _ = Describe("firewall plugin iptables backend", func() { foundAdmin = true } } - Expect(foundAdmin).To(Equal(true)) + Expect(foundAdmin).To(BeTrue()) } return nil diff --git a/plugins/meta/portmap/chain_test.go b/plugins/meta/portmap/chain_test.go index c693f3ff..24ddceff 100644 --- a/plugins/meta/portmap/chain_test.go +++ b/plugins/meta/portmap/chain_test.go @@ -167,7 +167,7 @@ var _ = Describe("chain tests", func() { rules, err := ipt.List(TABLE, testChain.name) Expect(err).NotTo(HaveOccurred()) - Expect(len(rules)).To(Equal(3)) + Expect(rules).To(HaveLen(3)) }) It("deletes chains idempotently", func() { diff --git a/plugins/meta/sbr/sbr_linux_test.go b/plugins/meta/sbr/sbr_linux_test.go index ea428320..d1a0f364 100644 --- a/plugins/meta/sbr/sbr_linux_test.go +++ b/plugins/meta/sbr/sbr_linux_test.go @@ -295,7 +295,7 @@ var _ = Describe("sbr test", func() { LinkIndex: expNet1.Routes[0].LinkIndex, }) - Expect(len(newStatus.Rules)).To(Equal(1)) + Expect(newStatus.Rules).To(HaveLen(1)) Expect(newStatus.Rules[0].Table).To(Equal(100)) Expect(newStatus.Rules[0].Src.String()).To(Equal("192.168.1.209/32")) devNet1 := newStatus.Devices[0] @@ -323,7 +323,7 @@ var _ = Describe("sbr test", func() { Expect(err).NotTo(HaveOccurred()) // Check results. We expect the rule to have been removed. - Expect(len(retVal.Rules)).To(Equal(0)) + Expect(retVal.Rules).To(BeEmpty()) }) It("Works with a default route already set", func() { @@ -393,7 +393,7 @@ var _ = Describe("sbr test", func() { } } - Expect(len(newStatus.Rules)).To(Equal(1)) + Expect(newStatus.Rules).To(HaveLen(1)) Expect(newStatus.Rules[0].Table).To(Equal(100)) Expect(newStatus.Rules[0].Src.String()).To(Equal("192.168.1.209/32")) devNet1 := newStatus.Devices[0] @@ -504,7 +504,7 @@ var _ = Describe("sbr test", func() { }) // 2 Rules will be created for each IP address. (100, 101) - Expect(len(newStatus.Rules)).To(Equal(2)) + Expect(newStatus.Rules).To(HaveLen(2)) // First entry corresponds to last table Expect(newStatus.Rules[0].Table).To(Equal(101)) diff --git a/plugins/meta/tuning/tuning_test.go b/plugins/meta/tuning/tuning_test.go index ec81ee55..517f4977 100644 --- a/plugins/meta/tuning/tuning_test.go +++ b/plugins/meta/tuning/tuning_test.go @@ -28,7 +28,7 @@ import ( "github.com/containernetworking/cni/pkg/skel" "github.com/containernetworking/cni/pkg/types" - "github.com/containernetworking/cni/pkg/types/100" + types100 "github.com/containernetworking/cni/pkg/types/100" "github.com/containernetworking/plugins/pkg/ns" "github.com/containernetworking/plugins/pkg/testutils" ) @@ -187,9 +187,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) Expect("/tmp/tuning-test/dummy_dummy0.json").ShouldNot(BeAnExistingFile()) @@ -242,9 +242,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -323,9 +323,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -384,9 +384,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -465,9 +465,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -527,9 +527,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) Expect(result.Interfaces[0].Mac).To(Equal(mac)) @@ -611,9 +611,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -674,9 +674,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -756,9 +756,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -822,9 +822,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -907,9 +907,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -988,9 +988,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) link, err := netlink.LinkByName(IFNAME) @@ -1108,9 +1108,9 @@ var _ = Describe("tuning plugin", func() { result, err := types100.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IFNAME)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) err = testutils.CmdDel(originalNS.Path(), diff --git a/plugins/meta/vrf/vrf_test.go b/plugins/meta/vrf/vrf_test.go index 55e94b04..468655a4 100644 --- a/plugins/meta/vrf/vrf_test.go +++ b/plugins/meta/vrf/vrf_test.go @@ -140,9 +140,9 @@ var _ = Describe("vrf plugin", func() { result, err := current.GetResult(r) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IF0Name)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) return nil }) @@ -298,7 +298,7 @@ var _ = Describe("vrf plugin", func() { Expect(err).NotTo(HaveOccurred()) addresses, err := netlink.AddrList(link, netlink.FAMILY_ALL) Expect(err).NotTo(HaveOccurred()) - Expect(len(addresses)).To(Equal(1)) + Expect(addresses).To(HaveLen(1)) Expect(addresses[0].IP.Equal(addr0.IP)).To(BeTrue()) Expect(addresses[0].Mask).To(Equal(addr0.Mask)) return nil @@ -316,7 +316,7 @@ var _ = Describe("vrf plugin", func() { addresses, err := netlink.AddrList(link, netlink.FAMILY_ALL) Expect(err).NotTo(HaveOccurred()) - Expect(len(addresses)).To(Equal(1)) + Expect(addresses).To(HaveLen(1)) Expect(addresses[0].IP.Equal(addr1.IP)).To(BeTrue()) Expect(addresses[0].Mask).To(Equal(addr1.Mask)) return nil @@ -524,7 +524,7 @@ var _ = Describe("vrf plugin", func() { targetNS.Do(func(ns.NetNS) error { defer GinkgoRecover() _, err := netlink.LinkByName(VRF0Name) - Expect(err).NotTo(BeNil()) + Expect(err).To(HaveOccurred()) return nil }) }) @@ -569,9 +569,9 @@ var _ = Describe("vrf plugin", func() { result, err := current.GetResult(prevRes) Expect(err).NotTo(HaveOccurred()) - Expect(len(result.Interfaces)).To(Equal(1)) + Expect(result.Interfaces).To(HaveLen(1)) Expect(result.Interfaces[0].Name).To(Equal(IF0Name)) - Expect(len(result.IPs)).To(Equal(1)) + Expect(result.IPs).To(HaveLen(1)) Expect(result.IPs[0].Address.String()).To(Equal("10.0.0.2/24")) return nil })