2016-06-02 17:49:40 +00:00
|
|
|
// +build integration
|
|
|
|
|
|
|
|
/*
|
|
|
|
Copyright 2016 The Kubernetes Authors All rights reserved.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package integration
|
|
|
|
|
|
|
|
import (
|
2018-11-08 00:40:45 +00:00
|
|
|
"bufio"
|
2016-06-02 17:49:40 +00:00
|
|
|
"fmt"
|
2018-10-03 22:06:30 +00:00
|
|
|
"io/ioutil"
|
2016-10-29 08:30:20 +00:00
|
|
|
"net"
|
2018-10-03 22:06:30 +00:00
|
|
|
"net/http"
|
2016-10-29 08:30:20 +00:00
|
|
|
"net/url"
|
2019-06-06 00:15:35 +00:00
|
|
|
"path"
|
2017-12-01 10:40:30 +00:00
|
|
|
"path/filepath"
|
2016-07-07 21:32:26 +00:00
|
|
|
"strings"
|
2016-06-02 17:49:40 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2018-12-12 02:39:57 +00:00
|
|
|
"github.com/docker/machine/libmachine/state"
|
2019-06-14 05:50:26 +00:00
|
|
|
retryablehttp "github.com/hashicorp/go-retryablehttp"
|
2017-08-23 18:33:00 +00:00
|
|
|
"k8s.io/apimachinery/pkg/labels"
|
2017-09-08 02:49:42 +00:00
|
|
|
pkgutil "k8s.io/minikube/pkg/util"
|
2016-06-02 17:49:40 +00:00
|
|
|
"k8s.io/minikube/test/integration/util"
|
|
|
|
)
|
|
|
|
|
2016-12-05 22:49:52 +00:00
|
|
|
func testAddons(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-09-08 02:49:42 +00:00
|
|
|
client, err := pkgutil.GetClient()
|
2017-08-23 18:33:00 +00:00
|
|
|
if err != nil {
|
2018-09-28 23:18:22 +00:00
|
|
|
t.Fatalf("Could not get kubernetes client: %v", err)
|
2016-06-02 17:49:40 +00:00
|
|
|
}
|
2017-08-23 18:33:00 +00:00
|
|
|
selector := labels.SelectorFromSet(labels.Set(map[string]string{"component": "kube-addon-manager"}))
|
2017-09-08 02:49:42 +00:00
|
|
|
if err := pkgutil.WaitForPodsWithLabelRunning(client, "kube-system", selector); err != nil {
|
2017-08-23 18:33:00 +00:00
|
|
|
t.Errorf("Error waiting for addon manager to be up")
|
2016-06-02 17:49:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-08 00:40:45 +00:00
|
|
|
func readLineWithTimeout(b *bufio.Reader, timeout time.Duration) (string, error) {
|
|
|
|
s := make(chan string)
|
|
|
|
e := make(chan error)
|
|
|
|
go func() {
|
|
|
|
read, err := b.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
e <- err
|
|
|
|
} else {
|
|
|
|
s <- read
|
|
|
|
}
|
|
|
|
close(s)
|
|
|
|
close(e)
|
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case line := <-s:
|
|
|
|
return line, nil
|
|
|
|
case err := <-e:
|
|
|
|
return "", err
|
|
|
|
case <-time.After(timeout):
|
|
|
|
return "", fmt.Errorf("timeout after %s", timeout)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-05 22:49:52 +00:00
|
|
|
func testDashboard(t *testing.T) {
|
|
|
|
t.Parallel()
|
2019-07-12 18:50:57 +00:00
|
|
|
mk := NewMinikubeRunner(t, "--wait=false")
|
|
|
|
cmd, out := mk.RunDaemon("dashboard --url")
|
2018-10-03 22:06:30 +00:00
|
|
|
defer func() {
|
|
|
|
err := cmd.Process.Kill()
|
2018-06-12 19:29:43 +00:00
|
|
|
if err != nil {
|
2018-11-08 00:40:45 +00:00
|
|
|
t.Logf("Failed to kill dashboard command: %v", err)
|
2018-06-12 19:29:43 +00:00
|
|
|
}
|
2018-10-03 22:06:30 +00:00
|
|
|
}()
|
|
|
|
|
2018-11-08 00:40:45 +00:00
|
|
|
s, err := readLineWithTimeout(out, 180*time.Second)
|
2018-10-03 22:06:30 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to read url: %v", err)
|
2016-06-02 17:49:40 +00:00
|
|
|
}
|
2016-10-29 08:30:20 +00:00
|
|
|
|
2018-10-03 22:06:30 +00:00
|
|
|
u, err := url.Parse(strings.TrimSpace(s))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to parse %q: %v", s, err)
|
2016-10-29 08:30:20 +00:00
|
|
|
}
|
2018-06-12 19:29:43 +00:00
|
|
|
|
2016-10-29 08:30:20 +00:00
|
|
|
if u.Scheme != "http" {
|
2018-10-03 22:06:30 +00:00
|
|
|
t.Errorf("got Scheme %s, expected http", u.Scheme)
|
2016-10-29 08:30:20 +00:00
|
|
|
}
|
2018-10-03 22:06:30 +00:00
|
|
|
host, _, err := net.SplitHostPort(u.Host)
|
2016-10-29 08:30:20 +00:00
|
|
|
if err != nil {
|
2018-10-03 22:06:30 +00:00
|
|
|
t.Fatalf("failed SplitHostPort: %v", err)
|
2018-10-03 05:25:45 +00:00
|
|
|
}
|
|
|
|
if host != "127.0.0.1" {
|
2018-10-03 22:06:30 +00:00
|
|
|
t.Errorf("got host %s, expected 127.0.0.1", host)
|
|
|
|
}
|
|
|
|
|
2019-06-14 05:50:26 +00:00
|
|
|
resp, err := retryablehttp.Get(u.String())
|
2018-10-03 22:06:30 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed get: %v", err)
|
|
|
|
}
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
body, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to read http response body: %v", err)
|
|
|
|
}
|
|
|
|
t.Errorf("%s returned status code %d, expected %d.\nbody:\n%s", u, resp.StatusCode, http.StatusOK, body)
|
2016-10-29 08:30:20 +00:00
|
|
|
}
|
2016-06-02 17:49:40 +00:00
|
|
|
}
|
2016-12-03 21:02:06 +00:00
|
|
|
|
2017-12-01 10:40:30 +00:00
|
|
|
func testIngressController(t *testing.T) {
|
|
|
|
t.Parallel()
|
2019-07-13 00:03:41 +00:00
|
|
|
mk := NewMinikubeRunner(t, "--wait=false")
|
2019-07-19 17:35:41 +00:00
|
|
|
kr := util.NewKubectlRunner(t)
|
2017-12-01 10:40:30 +00:00
|
|
|
|
2019-07-12 18:50:57 +00:00
|
|
|
mk.RunCommand("addons enable ingress", true)
|
2017-12-01 10:40:30 +00:00
|
|
|
if err := util.WaitForIngressControllerRunning(t); err != nil {
|
2018-09-28 23:18:22 +00:00
|
|
|
t.Fatalf("waiting for ingress-controller to be up: %v", err)
|
2017-12-01 10:40:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := util.WaitForIngressDefaultBackendRunning(t); err != nil {
|
2018-09-28 23:18:22 +00:00
|
|
|
t.Fatalf("waiting for default-http-backend to be up: %v", err)
|
2017-12-01 10:40:30 +00:00
|
|
|
}
|
|
|
|
|
2019-06-06 00:15:35 +00:00
|
|
|
curdir, err := filepath.Abs("")
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Error getting the file path for current directory: %s", curdir)
|
|
|
|
}
|
|
|
|
ingressPath := path.Join(curdir, "testdata", "nginx-ing.yaml")
|
2019-07-19 17:35:41 +00:00
|
|
|
if _, err := kr.RunCommand([]string{"create", "-f", ingressPath}); err != nil {
|
2018-09-28 23:18:22 +00:00
|
|
|
t.Fatalf("creating nginx ingress resource: %v", err)
|
2017-12-01 10:40:30 +00:00
|
|
|
}
|
|
|
|
|
2019-06-06 00:15:35 +00:00
|
|
|
podPath := path.Join(curdir, "testdata", "nginx-pod-svc.yaml")
|
2019-07-19 17:35:41 +00:00
|
|
|
if _, err := kr.RunCommand([]string{"create", "-f", podPath}); err != nil {
|
2018-09-28 23:18:22 +00:00
|
|
|
t.Fatalf("creating nginx ingress resource: %v", err)
|
2017-12-01 10:40:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := util.WaitForNginxRunning(t); err != nil {
|
2018-09-28 23:18:22 +00:00
|
|
|
t.Fatalf("waiting for nginx to be up: %v", err)
|
2017-12-01 10:40:30 +00:00
|
|
|
}
|
|
|
|
|
2017-12-09 18:19:50 +00:00
|
|
|
checkIngress := func() error {
|
|
|
|
expectedStr := "Welcome to nginx!"
|
|
|
|
runCmd := fmt.Sprintf("curl http://127.0.0.1:80 -H 'Host: nginx.example.com'")
|
2019-07-12 18:50:57 +00:00
|
|
|
sshCmdOutput, _ := mk.SSH(runCmd)
|
2017-12-09 18:19:50 +00:00
|
|
|
if !strings.Contains(sshCmdOutput, expectedStr) {
|
|
|
|
return fmt.Errorf("ExpectedStr sshCmdOutput to be: %s. Output was: %s", expectedStr, sshCmdOutput)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := util.Retry(t, checkIngress, 3*time.Second, 5); err != nil {
|
|
|
|
t.Fatalf(err.Error())
|
2017-12-01 10:40:30 +00:00
|
|
|
}
|
|
|
|
|
2018-09-28 18:57:48 +00:00
|
|
|
defer func() {
|
|
|
|
for _, p := range []string{podPath, ingressPath} {
|
2019-07-19 17:35:41 +00:00
|
|
|
if out, err := kr.RunCommand([]string{"delete", "-f", p}); err != nil {
|
2018-09-28 18:57:48 +00:00
|
|
|
t.Logf("delete -f %s failed: %v\noutput: %s\n", p, err, out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
2019-07-12 18:50:57 +00:00
|
|
|
mk.RunCommand("addons disable ingress", true)
|
2017-12-01 10:40:30 +00:00
|
|
|
}
|
|
|
|
|
2016-12-05 22:49:52 +00:00
|
|
|
func testServicesList(t *testing.T) {
|
|
|
|
t.Parallel()
|
2019-07-12 18:50:57 +00:00
|
|
|
mk := NewMinikubeRunner(t)
|
2016-12-03 21:02:06 +00:00
|
|
|
|
2016-12-05 22:49:52 +00:00
|
|
|
checkServices := func() error {
|
2019-07-12 18:50:57 +00:00
|
|
|
output := mk.RunCommand("service list", false)
|
2016-12-05 22:49:52 +00:00
|
|
|
if !strings.Contains(output, "kubernetes") {
|
2017-08-23 15:51:14 +00:00
|
|
|
return fmt.Errorf("Error, kubernetes service missing from output %s", output)
|
2016-12-03 21:02:06 +00:00
|
|
|
}
|
2016-12-05 22:49:52 +00:00
|
|
|
return nil
|
|
|
|
}
|
2017-08-23 15:51:14 +00:00
|
|
|
if err := util.Retry(t, checkServices, 2*time.Second, 5); err != nil {
|
2016-12-05 22:49:52 +00:00
|
|
|
t.Fatalf(err.Error())
|
2016-12-03 21:02:06 +00:00
|
|
|
}
|
|
|
|
}
|
2019-06-28 19:15:05 +00:00
|
|
|
func testRegistry(t *testing.T) {
|
|
|
|
t.Parallel()
|
2019-07-19 17:35:41 +00:00
|
|
|
mk := NewMinikubeRunner(t)
|
|
|
|
mk.RunCommand("addons enable registry", true)
|
|
|
|
client, err := pkgutil.GetClient()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("getting kubernetes client: %v", err)
|
|
|
|
}
|
|
|
|
if err := pkgutil.WaitForRCToStabilize(client, "kube-system", "registry", time.Minute*5); err != nil {
|
|
|
|
t.Fatalf("waiting for registry replicacontroller to stabilize: %v", err)
|
|
|
|
}
|
|
|
|
rs := labels.SelectorFromSet(labels.Set(map[string]string{"actual-registry": "true"}))
|
|
|
|
if err := pkgutil.WaitForPodsWithLabelRunning(client, "kube-system", rs); err != nil {
|
|
|
|
t.Fatalf("waiting for registry pods: %v", err)
|
|
|
|
}
|
|
|
|
ps, err := labels.Parse("kubernetes.io/minikube-addons=registry,actual-registry!=true")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to parse selector: %v", err)
|
|
|
|
}
|
|
|
|
if err := pkgutil.WaitForPodsWithLabelRunning(client, "kube-system", ps); err != nil {
|
|
|
|
t.Fatalf("waiting for registry-proxy pods: %v", err)
|
|
|
|
}
|
2019-06-28 19:15:05 +00:00
|
|
|
|
2019-07-19 17:35:41 +00:00
|
|
|
ip := strings.TrimSpace(mk.RunCommand("ip", true))
|
|
|
|
endpoint := fmt.Sprintf("http://%s:%d", ip, 5000)
|
|
|
|
u, err := url.Parse(endpoint)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to parse %q: %v", endpoint, err)
|
2019-06-28 19:15:05 +00:00
|
|
|
}
|
2019-07-19 17:35:41 +00:00
|
|
|
t.Log("checking registry access from outside cluster")
|
2019-06-29 11:33:19 +00:00
|
|
|
|
2019-06-28 19:15:05 +00:00
|
|
|
// Check access from outside the cluster on port 5000, validing connectivity via registry-proxy
|
|
|
|
checkExternalAccess := func() error {
|
2019-06-30 20:31:52 +00:00
|
|
|
resp, err := retryablehttp.Get(u.String())
|
|
|
|
if err != nil {
|
2019-07-06 08:42:40 +00:00
|
|
|
t.Errorf("failed get: %v", err)
|
2019-06-30 20:31:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
2019-07-19 17:35:41 +00:00
|
|
|
t.Errorf("%s returned status code %d, expected %d.\n", u, resp.StatusCode, http.StatusOK)
|
2019-06-30 20:31:52 +00:00
|
|
|
}
|
2019-06-28 19:15:05 +00:00
|
|
|
return nil
|
|
|
|
}
|
2018-12-07 23:27:22 +00:00
|
|
|
|
2019-06-28 19:15:05 +00:00
|
|
|
if err := util.Retry(t, checkExternalAccess, 2*time.Second, 5); err != nil {
|
|
|
|
t.Fatalf(err.Error())
|
|
|
|
}
|
2019-07-19 17:35:41 +00:00
|
|
|
|
2019-06-28 19:15:05 +00:00
|
|
|
t.Log("checking registry access from inside cluster")
|
2019-07-19 17:35:41 +00:00
|
|
|
kr := util.NewKubectlRunner(t)
|
|
|
|
out, _ := kr.RunCommand([]string{
|
2019-06-28 19:15:05 +00:00
|
|
|
"run",
|
|
|
|
"registry-test",
|
|
|
|
"--restart=Never",
|
|
|
|
"--image=busybox",
|
|
|
|
"-it",
|
|
|
|
"--",
|
|
|
|
"sh",
|
|
|
|
"-c",
|
|
|
|
"wget --spider -S 'http://registry.kube-system.svc.cluster.local' 2>&1 | grep 'HTTP/' | awk '{print $2}'"})
|
|
|
|
internalCheckOutput := string(out)
|
2019-07-19 17:35:41 +00:00
|
|
|
expectedStr := "200"
|
2019-06-28 19:15:05 +00:00
|
|
|
if !strings.Contains(internalCheckOutput, expectedStr) {
|
|
|
|
t.Fatalf("ExpectedStr internalCheckOutput to be: %s. Output was: %s", expectedStr, internalCheckOutput)
|
|
|
|
}
|
2018-12-07 23:27:22 +00:00
|
|
|
|
2019-06-28 19:15:05 +00:00
|
|
|
defer func() {
|
2019-07-19 17:35:41 +00:00
|
|
|
if _, err := kr.RunCommand([]string{"delete", "pod", "registry-test"}); err != nil {
|
2019-06-28 19:15:05 +00:00
|
|
|
t.Fatalf("failed to delete pod registry-test")
|
2019-06-29 11:33:19 +00:00
|
|
|
}
|
2019-06-28 19:15:05 +00:00
|
|
|
}()
|
2019-07-19 17:35:41 +00:00
|
|
|
mk.RunCommand("addons disable registry", true)
|
2019-06-28 19:15:05 +00:00
|
|
|
}
|
2018-12-07 23:27:22 +00:00
|
|
|
func testGvisor(t *testing.T) {
|
2019-07-13 00:03:41 +00:00
|
|
|
mk := NewMinikubeRunner(t, "--wait=false")
|
2019-07-12 18:50:57 +00:00
|
|
|
mk.RunCommand("addons enable gvisor", true)
|
2018-12-07 23:27:22 +00:00
|
|
|
|
|
|
|
t.Log("waiting for gvisor controller to come up")
|
|
|
|
if err := util.WaitForGvisorControllerRunning(t); err != nil {
|
|
|
|
t.Fatalf("waiting for gvisor controller to be up: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-12-12 02:39:57 +00:00
|
|
|
createUntrustedWorkload(t)
|
2018-12-07 23:27:22 +00:00
|
|
|
|
|
|
|
t.Log("making sure untrusted workload is Running")
|
|
|
|
if err := util.WaitForUntrustedNginxRunning(); err != nil {
|
|
|
|
t.Fatalf("waiting for nginx to be up: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Log("disabling gvisor addon")
|
2019-07-12 18:50:57 +00:00
|
|
|
mk.RunCommand("addons disable gvisor", true)
|
2018-12-07 23:27:22 +00:00
|
|
|
t.Log("waiting for gvisor controller pod to be deleted")
|
|
|
|
if err := util.WaitForGvisorControllerDeleted(); err != nil {
|
|
|
|
t.Fatalf("waiting for gvisor controller to be deleted: %v", err)
|
|
|
|
}
|
|
|
|
|
2018-12-12 02:39:57 +00:00
|
|
|
createUntrustedWorkload(t)
|
2018-12-07 23:27:22 +00:00
|
|
|
|
|
|
|
t.Log("waiting for FailedCreatePodSandBox event")
|
|
|
|
if err := util.WaitForFailedCreatePodSandBoxEvent(); err != nil {
|
|
|
|
t.Fatalf("waiting for FailedCreatePodSandBox event: %v", err)
|
|
|
|
}
|
2018-12-12 02:39:57 +00:00
|
|
|
deleteUntrustedWorkload(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testGvisorRestart(t *testing.T) {
|
2019-07-13 00:03:41 +00:00
|
|
|
mk := NewMinikubeRunner(t, "--wait=false")
|
2019-07-12 18:50:57 +00:00
|
|
|
mk.EnsureRunning()
|
|
|
|
mk.RunCommand("addons enable gvisor", true)
|
2018-12-12 02:39:57 +00:00
|
|
|
|
|
|
|
t.Log("waiting for gvisor controller to come up")
|
|
|
|
if err := util.WaitForGvisorControllerRunning(t); err != nil {
|
|
|
|
t.Fatalf("waiting for gvisor controller to be up: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: @priyawadhwa to add test for stop as well
|
2019-07-12 18:50:57 +00:00
|
|
|
mk.RunCommand("delete", false)
|
|
|
|
mk.CheckStatus(state.None.String())
|
|
|
|
mk.Start()
|
|
|
|
mk.CheckStatus(state.Running.String())
|
2018-12-12 02:39:57 +00:00
|
|
|
|
|
|
|
t.Log("waiting for gvisor controller to come up")
|
|
|
|
if err := util.WaitForGvisorControllerRunning(t); err != nil {
|
|
|
|
t.Fatalf("waiting for gvisor controller to be up: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
createUntrustedWorkload(t)
|
|
|
|
t.Log("making sure untrusted workload is Running")
|
|
|
|
if err := util.WaitForUntrustedNginxRunning(); err != nil {
|
|
|
|
t.Fatalf("waiting for nginx to be up: %v", err)
|
|
|
|
}
|
|
|
|
deleteUntrustedWorkload(t)
|
|
|
|
}
|
2018-12-07 23:27:22 +00:00
|
|
|
|
2018-12-12 02:39:57 +00:00
|
|
|
func createUntrustedWorkload(t *testing.T) {
|
2019-07-19 17:35:41 +00:00
|
|
|
kr := util.NewKubectlRunner(t)
|
2019-06-06 00:15:35 +00:00
|
|
|
curdir, err := filepath.Abs("")
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Error getting the file path for current directory: %s", curdir)
|
|
|
|
}
|
|
|
|
untrustedPath := path.Join(curdir, "testdata", "nginx-untrusted.yaml")
|
2018-12-12 02:39:57 +00:00
|
|
|
t.Log("creating pod with untrusted workload annotation")
|
2019-07-19 17:35:41 +00:00
|
|
|
if _, err := kr.RunCommand([]string{"replace", "-f", untrustedPath, "--force"}); err != nil {
|
2018-12-12 02:39:57 +00:00
|
|
|
t.Fatalf("creating untrusted nginx resource: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func deleteUntrustedWorkload(t *testing.T) {
|
2019-07-19 17:35:41 +00:00
|
|
|
kr := util.NewKubectlRunner(t)
|
2019-06-06 00:15:35 +00:00
|
|
|
curdir, err := filepath.Abs("")
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Error getting the file path for current directory: %s", curdir)
|
|
|
|
}
|
|
|
|
untrustedPath := path.Join(curdir, "testdata", "nginx-untrusted.yaml")
|
2019-07-19 17:35:41 +00:00
|
|
|
if _, err := kr.RunCommand([]string{"delete", "-f", untrustedPath}); err != nil {
|
2018-12-07 23:27:22 +00:00
|
|
|
t.Logf("error deleting untrusted nginx resource: %v", err)
|
|
|
|
}
|
|
|
|
}
|