Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add missing variables and format scripts #2330

Merged
merged 3 commits into from
Aug 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions .github/workflows/nfr.yml
Original file line number Diff line number Diff line change
Expand Up @@ -123,9 +123,9 @@ jobs:
working-directory: ./tests
run: |
if ${{ needs.vars.outputs.test_label != 'all' }}; then
sed -i '/^GINKGO_LABEL=/s/=.*/="${{ needs.vars.outputs.test_label }}"/' "scripts/vars.env" && make nfr-test;
sed -i '/^GINKGO_LABEL=/s/=.*/="${{ needs.vars.outputs.test_label }}"/' "scripts/vars.env" && make nfr-test CI=true;
else
make nfr-test;
make nfr-test CI=true;
fi

- name: Upload Artifacts
Expand Down
6 changes: 6 additions & 0 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -81,6 +81,12 @@ repos:
- --template-files=_templates.gotmpl
- --template-files=README.md.gotmpl

- repo: https://github.com/scop/pre-commit-shfmt
rev: v3.8.0-1
hooks:
- id: shfmt-src
args: [-w, -s, -i, "4"]

ci:
skip: [golangci-lint-full, prettier, markdownlint-cli2, yamllint]
autofix_prs: false
40 changes: 20 additions & 20 deletions scripts/generate-manifests.sh
Original file line number Diff line number Diff line change
Expand Up @@ -5,35 +5,35 @@
charts=$(find examples/helm -maxdepth 1 -mindepth 1 -type d -exec basename {} \;)

generate_manifests() {
chart=$1
manifest=deploy/$chart/deploy.yaml
mkdir -p deploy/$chart

helm_parameters="--namespace nginx-gateway --set nameOverride=nginx-gateway --skip-crds"
if [ "$chart" == "openshift" ]; then
chart="default"
helm_parameters="$helm_parameters --api-versions security.openshift.io/v1/SecurityContextConstraints"
fi

helm template nginx-gateway $helm_parameters --values examples/helm/$chart/values.yaml charts/nginx-gateway-fabric >$manifest 2>/dev/null
sed -i.bak '/app.kubernetes.io\/managed-by: Helm/d' $manifest
sed -i.bak '/helm.sh/d' $manifest
cp $manifest config/base
kubectl kustomize config/base >$manifest
rm -f config/base/deploy.yaml
rm -f $manifest.bak
chart=$1
manifest=deploy/${chart}/deploy.yaml
mkdir -p deploy/${chart}

helm_parameters="--namespace nginx-gateway --set nameOverride=nginx-gateway --skip-crds"
if [ "${chart}" == "openshift" ]; then
chart="default"
helm_parameters="${helm_parameters} --api-versions security.openshift.io/v1/SecurityContextConstraints"
fi

helm template nginx-gateway ${helm_parameters} --values examples/helm/${chart}/values.yaml charts/nginx-gateway-fabric >${manifest} 2>/dev/null
sed -i.bak '/app.kubernetes.io\/managed-by: Helm/d' ${manifest}
sed -i.bak '/helm.sh/d' ${manifest}
cp ${manifest} config/base
kubectl kustomize config/base >${manifest}
rm -f config/base/deploy.yaml
rm -f ${manifest}.bak
}

for chart in $charts; do
generate_manifests $chart
for chart in ${charts}; do
generate_manifests ${chart}
done

# For OpenShift, we don't need a Helm example so we generate the manifests from the default values.yaml
generate_manifests openshift

# FIXME(lucacome): Implement a better way to generate the static deployment file
# https://github.com/nginxinc/nginx-gateway-fabric/issues/2326
helm template nginx-gateway charts/nginx-gateway-fabric --set nameOverride=nginx-gateway --set metrics.enable=false --set nginxGateway.productTelemetry.enable=false -n nginx-gateway -s templates/deployment.yaml > config/tests/static-deployment.yaml
helm template nginx-gateway charts/nginx-gateway-fabric --set nameOverride=nginx-gateway --set metrics.enable=false --set nginxGateway.productTelemetry.enable=false -n nginx-gateway -s templates/deployment.yaml >config/tests/static-deployment.yaml
sed -i.bak '/app.kubernetes.io\/managed-by: Helm/d' config/tests/static-deployment.yaml
sed -i.bak '/helm.sh/d' config/tests/static-deployment.yaml
rm -f config/tests/static-deployment.yaml.bak
6 changes: 3 additions & 3 deletions tests/reconfig/scripts/create-resources-gw-last.sh
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
num_namespaces=$1

# Create namespaces
for ((i=1; i<=$num_namespaces; i++)); do
for ((i = 1; i <= num_namespaces; i++)); do
namespace_name="namespace$i"
kubectl create namespace "$namespace_name"
done
Expand All @@ -13,13 +13,13 @@ kubectl create -f certificate-ns-and-cafe-secret.yaml
kubectl create -f reference-grant.yaml

# Create backend service and apps
for ((i=1; i<=$num_namespaces; i++)); do
for ((i = 1; i <= num_namespaces; i++)); do
namespace_name="namespace$i"
sed -e "s/coffee/coffee${namespace_name}/g" -e "s/tea/tea${namespace_name}/g" cafe.yaml | kubectl apply -n "$namespace_name" -f -
done

# Create routes
for ((i=1; i<=$num_namespaces; i++)); do
for ((i = 1; i <= num_namespaces; i++)); do
namespace_name="namespace$i"
sed -e "s/coffee/coffee${namespace_name}/g" -e "s/tea/tea${namespace_name}/g" cafe-routes.yaml | kubectl apply -n "$namespace_name" -f -
done
Expand Down
6 changes: 3 additions & 3 deletions tests/reconfig/scripts/create-resources-routes-last.sh
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,13 @@
num_namespaces=$1

# Create namespaces
for ((i=1; i<=$num_namespaces; i++)); do
for ((i = 1; i <= num_namespaces; i++)); do
namespace_name="namespace$i"
kubectl create namespace "$namespace_name"
done

# Create backend service and apps
for ((i=1; i<=$num_namespaces; i++)); do
for ((i = 1; i <= num_namespaces; i++)); do
namespace_name="namespace$i"
sed -e "s/coffee/coffee${namespace_name}/g" -e "s/tea/tea${namespace_name}/g" cafe.yaml | kubectl apply -n "$namespace_name" -f -
done
Expand All @@ -23,7 +23,7 @@ kubectl create -f reference-grant.yaml
kubectl create -f gateway.yaml

# Create routes
for ((i=1; i<=$num_namespaces; i++)); do
for ((i = 1; i <= num_namespaces; i++)); do
namespace_name="namespace$i"
sed -e "s/coffee/coffee${namespace_name}/g" -e "s/tea/tea${namespace_name}/g" cafe-routes.yaml | kubectl apply -n "$namespace_name" -f -
done
6 changes: 3 additions & 3 deletions tests/reconfig/scripts/delete-multiple.sh
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,11 @@ num_namespaces=$1

# Delete namespaces
namespaces=""
for ((i=1; i<=$num_namespaces; i++)); do
namespaces+="namespace$i "
for ((i = 1; i <= num_namespaces; i++)); do
namespaces+="namespace${i} "
done

kubectl delete namespace $namespaces
kubectl delete namespace "${namespaces}"

# Delete single instance resources
kubectl delete -f gateway.yaml
Expand Down
8 changes: 5 additions & 3 deletions tests/scripts/add-local-ip-auth-networks.sh
Original file line number Diff line number Diff line change
@@ -1,8 +1,10 @@
#!/usr/bin/env bash

set -eo pipefail

source scripts/vars.env

CURRENT_AUTH_NETWORK=$(gcloud container clusters describe ${GKE_CLUSTER_NAME} --zone=${GKE_CLUSTER_ZONE} \
--format="value(masterAuthorizedNetworksConfig.cidrBlocks[0])" | sed 's/cidrBlock=//')
CURRENT_AUTH_NETWORK=$(gcloud container clusters describe "${GKE_CLUSTER_NAME}" --zone="${GKE_CLUSTER_ZONE}" \
--format="value(masterAuthorizedNetworksConfig.cidrBlocks[0])" | sed 's/cidrBlock=//')

gcloud container clusters update ${GKE_CLUSTER_NAME} --zone=${GKE_CLUSTER_ZONE} --enable-master-authorized-networks --master-authorized-networks=${SOURCE_IP_RANGE},${CURRENT_AUTH_NETWORK}
gcloud container clusters update "${GKE_CLUSTER_NAME}" --zone="${GKE_CLUSTER_ZONE}" --enable-master-authorized-networks --master-authorized-networks="${SOURCE_IP_RANGE}","${CURRENT_AUTH_NETWORK}"
4 changes: 3 additions & 1 deletion tests/scripts/check-pod-exit-code.sh
Original file line number Diff line number Diff line change
@@ -1,6 +1,8 @@
#!/usr/bin/env bash

set -eo pipefail

CODE=$(kubectl get pod conformance -o jsonpath='{.status.containerStatuses[].state.terminated.exitCode}')
if [ $CODE -ne 0 ]; then
if [ "${CODE}" -ne 0 ]; then
exit 2
fi
6 changes: 4 additions & 2 deletions tests/scripts/cleanup-router.sh
Original file line number Diff line number Diff line change
@@ -1,6 +1,8 @@
#!/usr/bin/env bash

set -eo pipefail

source scripts/vars.env

gcloud compute routers nats delete ${RESOURCE_NAME} --quiet --router ${RESOURCE_NAME} --router-region ${GKE_CLUSTER_REGION}
gcloud compute routers delete ${RESOURCE_NAME} --quiet --region ${GKE_CLUSTER_REGION}
gcloud compute routers nats delete "${RESOURCE_NAME}" --quiet --router "${RESOURCE_NAME}" --router-region "${GKE_CLUSTER_REGION}"
gcloud compute routers delete "${RESOURCE_NAME}" --quiet --region "${GKE_CLUSTER_REGION}"
16 changes: 8 additions & 8 deletions tests/scripts/cleanup-vm.sh
Original file line number Diff line number Diff line change
@@ -1,17 +1,17 @@
#!/usr/bin/env bash

set -eo pipefail

source scripts/vars.env

skip_gke_master_control_node_access="${1:-false}"

# Remove VM IP from GKE master control node access, if required
if [ ${ADD_VM_IP_AUTH_NETWORKS} = "true" ] && [ ${skip_gke_master_control_node_access} != "true" ]; then
EXTERNAL_IP=$(gcloud compute instances describe ${RESOURCE_NAME} --zone ${GKE_CLUSTER_ZONE} --project=${GKE_PROJECT} --zone=${GKE_CLUSTER_ZONE} \
--format='value(networkInterfaces[0].accessConfigs[0].natIP)')
CURRENT_AUTH_NETWORK=$(gcloud container clusters describe ${GKE_CLUSTER_NAME} --zone ${GKE_CLUSTER_ZONE} \
--format="value(masterAuthorizedNetworksConfig.cidrBlocks[0])" | sed 's/cidrBlock=//')
gcloud container clusters update ${GKE_CLUSTER_NAME} --zone ${GKE_CLUSTER_ZONE} --enable-master-authorized-networks --master-authorized-networks=${CURRENT_AUTH_NETWORK}
if [ "${ADD_VM_IP_AUTH_NETWORKS}" = "true" ] && [ "${skip_gke_master_control_node_access}" != "true" ]; then
CURRENT_AUTH_NETWORK=$(gcloud container clusters describe "${GKE_CLUSTER_NAME}" --zone "${GKE_CLUSTER_ZONE}" \
--format="value(masterAuthorizedNetworksConfig.cidrBlocks[0])" | sed 's/cidrBlock=//')
gcloud container clusters update "${GKE_CLUSTER_NAME}" --zone "${GKE_CLUSTER_ZONE}" --enable-master-authorized-networks --master-authorized-networks="${CURRENT_AUTH_NETWORK}"
fi

gcloud compute instances delete ${RESOURCE_NAME} --quiet --project=${GKE_PROJECT} --zone=${GKE_CLUSTER_ZONE}
gcloud compute firewall-rules delete ${RESOURCE_NAME} --quiet --project=${GKE_PROJECT}
gcloud compute instances delete "${RESOURCE_NAME}" --quiet --project="${GKE_PROJECT}" --zone="${GKE_CLUSTER_ZONE}"
gcloud compute firewall-rules delete "${RESOURCE_NAME}" --quiet --project="${GKE_PROJECT}"
42 changes: 22 additions & 20 deletions tests/scripts/create-and-setup-gcp-vm.sh
Original file line number Diff line number Diff line change
@@ -1,40 +1,42 @@
#!/usr/bin/env bash

SCRIPT_DIR=$( cd -- "$( dirname -- "${BASH_SOURCE[0]}" )" &> /dev/null && pwd )
set -o pipefail

SCRIPT_DIR=$(cd -- "$(dirname -- "${BASH_SOURCE[0]}")" &>/dev/null && pwd)

source scripts/vars.env

gcloud compute firewall-rules create ${RESOURCE_NAME} \
--project=${GKE_PROJECT} \
gcloud compute firewall-rules create "${RESOURCE_NAME}" \
--project="${GKE_PROJECT}" \
--direction=INGRESS \
--priority=1000 \
--network=default \
--action=ALLOW \
--rules=tcp:22 \
--source-ranges=${SOURCE_IP_RANGE} \
--target-tags=${NETWORK_TAGS}
--source-ranges="${SOURCE_IP_RANGE}" \
--target-tags="${NETWORK_TAGS}"

gcloud compute instances create ${RESOURCE_NAME} --project=${GKE_PROJECT} --zone=${GKE_CLUSTER_ZONE} --machine-type=n2-standard-2 \
gcloud compute instances create "${RESOURCE_NAME}" --project="${GKE_PROJECT}" --zone="${GKE_CLUSTER_ZONE}" --machine-type=n2-standard-2 \
--network-interface=network-tier=PREMIUM,stack-type=IPV4_ONLY,subnet=default --maintenance-policy=MIGRATE \
--provisioning-model=STANDARD --service-account=${GKE_SVC_ACCOUNT} \
--provisioning-model=STANDARD --service-account="${GKE_SVC_ACCOUNT}" \
--scopes=https://www.googleapis.com/auth/devstorage.read_only,https://www.googleapis.com/auth/logging.write,https://www.googleapis.com/auth/monitoring.write,https://www.googleapis.com/auth/servicecontrol,https://www.googleapis.com/auth/service.management.readonly,https://www.googleapis.com/auth/trace.append,https://www.googleapis.com/auth/cloud-platform \
--tags=${NETWORK_TAGS} --create-disk=auto-delete=yes,boot=yes,device-name=${RESOURCE_NAME},image-family=projects/${GKE_PROJECT}/global/images/ngf-debian,mode=rw,size=20 --no-shielded-secure-boot --shielded-vtpm --shielded-integrity-monitoring --labels=goog-ec-src=vm_add-gcloud --reservation-affinity=any
--tags="${NETWORK_TAGS}" --create-disk=auto-delete=yes,boot=yes,device-name="${RESOURCE_NAME}",image-family=projects/"${GKE_PROJECT}"/global/images/ngf-debian,mode=rw,size=20 --no-shielded-secure-boot --shielded-vtpm --shielded-integrity-monitoring --labels=goog-ec-src=vm_add-gcloud --reservation-affinity=any

# Add VM IP to GKE master control node access, if required
if [ "${ADD_VM_IP_AUTH_NETWORKS}" = "true" ]; then
EXTERNAL_IP=$(gcloud compute instances describe ${RESOURCE_NAME} --project=${GKE_PROJECT} --zone=${GKE_CLUSTER_ZONE} \
--format='value(networkInterfaces[0].accessConfigs[0].natIP)')
CURRENT_AUTH_NETWORK=$(gcloud container clusters describe ${GKE_CLUSTER_NAME} --zone=${GKE_CLUSTER_ZONE} \
--format="value(masterAuthorizedNetworksConfig.cidrBlocks[0])" | sed 's/cidrBlock=//')
gcloud container clusters update ${GKE_CLUSTER_NAME} --zone=${GKE_CLUSTER_ZONE} --enable-master-authorized-networks --master-authorized-networks=${EXTERNAL_IP}/32,${CURRENT_AUTH_NETWORK}
EXTERNAL_IP=$(gcloud compute instances describe "${RESOURCE_NAME}" --project="${GKE_PROJECT}" --zone="${GKE_CLUSTER_ZONE}" \
--format='value(networkInterfaces[0].accessConfigs[0].natIP)')
CURRENT_AUTH_NETWORK=$(gcloud container clusters describe "${GKE_CLUSTER_NAME}" --zone="${GKE_CLUSTER_ZONE}" \
--format="value(masterAuthorizedNetworksConfig.cidrBlocks[0])" | sed 's/cidrBlock=//')
gcloud container clusters update "${GKE_CLUSTER_NAME}" --zone="${GKE_CLUSTER_ZONE}" --enable-master-authorized-networks --master-authorized-networks="${EXTERNAL_IP}"/32,"${CURRENT_AUTH_NETWORK}"
fi

# Poll for SSH connectivity
MAX_RETRIES=10
RETRY_INTERVAL=5
for ((i=1; i<=MAX_RETRIES; i++)); do
for ((i = 1; i <= MAX_RETRIES; i++)); do
echo "Attempt $i to connect to the VM..."
gcloud compute ssh username@${RESOURCE_NAME} --zone=${GKE_CLUSTER_ZONE} --project=${GKE_PROJECT} --quiet --command="echo 'VM is ready'"
gcloud compute ssh username@"${RESOURCE_NAME}" --zone="${GKE_CLUSTER_ZONE}" --project="${GKE_PROJECT}" --quiet --command="echo 'VM is ready'"
if [ $? -eq 0 ]; then
echo "SSH connection successful. VM is ready."
break
Expand All @@ -43,18 +45,18 @@ for ((i=1; i<=MAX_RETRIES; i++)); do
sleep ${RETRY_INTERVAL}
done

gcloud compute scp --zone ${GKE_CLUSTER_ZONE} --project=${GKE_PROJECT} ${SCRIPT_DIR}/vars.env username@${RESOURCE_NAME}:~
gcloud compute scp --zone "${GKE_CLUSTER_ZONE}" --project="${GKE_PROJECT}" "${SCRIPT_DIR}"/vars.env username@"${RESOURCE_NAME}":~

if [ -n "${NGF_REPO}" ] && [ "${NGF_REPO}" != "nginxinc" ]; then
gcloud compute ssh --zone ${GKE_CLUSTER_ZONE} --project=${GKE_PROJECT} username@${RESOURCE_NAME} \
--command="bash -i <<EOF
gcloud compute ssh --zone "${GKE_CLUSTER_ZONE}" --project="${GKE_PROJECT}" username@"${RESOURCE_NAME}" \
--command="bash -i <<EOF
rm -rf nginx-gateway-fabric
git clone https://github.com/${NGF_REPO}/nginx-gateway-fabric.git
EOF" -- -t
fi

gcloud compute ssh --zone ${GKE_CLUSTER_ZONE} --project=${GKE_PROJECT} username@${RESOURCE_NAME} \
--command="bash -i <<EOF
gcloud compute ssh --zone "${GKE_CLUSTER_ZONE}" --project="${GKE_PROJECT}" username@"${RESOURCE_NAME}" \
--command="bash -i <<EOF
cd nginx-gateway-fabric/tests
git fetch -pP --all
git checkout ${NGF_BRANCH}
Expand Down
20 changes: 11 additions & 9 deletions tests/scripts/create-gke-cluster.sh
Original file line number Diff line number Diff line change
@@ -1,8 +1,10 @@
#!/usr/bin/env bash

set -eo pipefail

source scripts/vars.env

ip_random_digit=$((1 + $RANDOM % 250))
ip_random_digit=$((1 + RANDOM % 250))

IS_CI=${1:-false}

Expand All @@ -16,23 +18,23 @@ if [ -z "$GKE_NUM_NODES" ]; then
GKE_NUM_NODES="3"
fi

gcloud container clusters create ${GKE_CLUSTER_NAME} \
--project ${GKE_PROJECT} \
--zone ${GKE_CLUSTER_ZONE} \
gcloud container clusters create "${GKE_CLUSTER_NAME}" \
--project "${GKE_PROJECT}" \
--zone "${GKE_CLUSTER_ZONE}" \
--enable-master-authorized-networks \
--enable-ip-alias \
--service-account ${GKE_NODES_SERVICE_ACCOUNT} \
--service-account "${GKE_NODES_SERVICE_ACCOUNT}" \
--enable-private-nodes \
--master-ipv4-cidr 172.16.${ip_random_digit}.32/28 \
--metadata=block-project-ssh-keys=TRUE \
--monitoring=SYSTEM,POD,DEPLOYMENT \
--logging=SYSTEM,WORKLOAD \
--machine-type ${GKE_MACHINE_TYPE} \
--num-nodes ${GKE_NUM_NODES} \
--machine-type "${GKE_MACHINE_TYPE}" \
--num-nodes "${GKE_NUM_NODES}" \
--no-enable-insecure-kubelet-readonly-port

# Add current IP to GKE master control node access, if this script is not invoked during a CI run.
if [ "${IS_CI}" = "false" ]; then
SCRIPT_DIR=$( cd -- "$( dirname -- "${BASH_SOURCE[0]}" )" &> /dev/null && pwd )
${SCRIPT_DIR}/add-local-ip-auth-networks.sh
SCRIPT_DIR=$(cd -- "$(dirname -- "${BASH_SOURCE[0]}")" &>/dev/null && pwd)
"${SCRIPT_DIR}"/add-local-ip-auth-networks.sh
fi
12 changes: 7 additions & 5 deletions tests/scripts/create-gke-router.sh
Original file line number Diff line number Diff line change
@@ -1,13 +1,15 @@
#!/usr/bin/env bash

set -eo pipefail

source scripts/vars.env

gcloud compute routers create ${RESOURCE_NAME} \
--region ${GKE_CLUSTER_REGION} \
gcloud compute routers create "${RESOURCE_NAME}" \
--region "${GKE_CLUSTER_REGION}" \
--network default

gcloud compute routers nats create ${RESOURCE_NAME} \
--router-region ${GKE_CLUSTER_REGION} \
--router ${RESOURCE_NAME} \
gcloud compute routers nats create "${RESOURCE_NAME}" \
--router-region "${GKE_CLUSTER_REGION}" \
--router "${RESOURCE_NAME}" \
--nat-all-subnet-ip-ranges \
--auto-allocate-nat-external-ips
4 changes: 3 additions & 1 deletion tests/scripts/delete-gke-cluster.sh
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
#!/usr/bin/env bash

set -eo pipefail

source scripts/vars.env

gcloud container clusters delete ${GKE_CLUSTER_NAME} --zone ${GKE_CLUSTER_ZONE} --project ${GKE_PROJECT} --quiet
gcloud container clusters delete "${GKE_CLUSTER_NAME}" --zone "${GKE_CLUSTER_ZONE}" --project "${GKE_PROJECT}" --quiet
10 changes: 5 additions & 5 deletions tests/scripts/remote-scripts/run-nfr-tests.sh
Original file line number Diff line number Diff line change
Expand Up @@ -2,16 +2,16 @@

set -e

source ~/vars.env
source "${HOME}"/vars.env

if [ "$START_LONGEVITY" == "true" ]; then
if [ "${START_LONGEVITY}" == "true" ]; then
GINKGO_LABEL="longevity-setup"
elif [ "$STOP_LONGEVITY" == "true" ]; then
elif [ "${STOP_LONGEVITY}" == "true" ]; then
GINKGO_LABEL="longevity-teardown"
fi

cd nginx-gateway-fabric/tests && make .vm-nfr-test TAG=${TAG} PREFIX=${PREFIX} NGINX_PREFIX=${NGINX_PREFIX} NGINX_PLUS_PREFIX=${NGINX_PLUS_PREFIX} PLUS_ENABLED=${PLUS_ENABLED} GINKGO_LABEL=${GINKGO_LABEL} GINKGO_FLAGS=${GINKGO_FLAGS} PULL_POLICY=Always GW_SERVICE_TYPE=LoadBalancer GW_SVC_GKE_INTERNAL=true NGF_VERSION=${NGF_VERSION}
cd nginx-gateway-fabric/tests && make .vm-nfr-test TAG="${TAG}" PREFIX="${PREFIX}" NGINX_PREFIX="${NGINX_PREFIX}" NGINX_PLUS_PREFIX="${NGINX_PLUS_PREFIX}" PLUS_ENABLED="${PLUS_ENABLED}" GINKGO_LABEL=${GINKGO_LABEL} GINKGO_FLAGS="${GINKGO_FLAGS}" PULL_POLICY=Always GW_SERVICE_TYPE=LoadBalancer GW_SVC_GKE_INTERNAL=true NGF_VERSION="${NGF_VERSION}"

if [ "$START_LONGEVITY" == "true" ]; then
if [ "${START_LONGEVITY}" == "true" ]; then
suite/scripts/longevity-wrk.sh
fi
4 changes: 2 additions & 2 deletions tests/scripts/remote-scripts/run-tests.sh
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,6 @@

set -e

source ~/vars.env
source "${HOME}"/vars.env

cd nginx-gateway-fabric/tests && make test TAG=${TAG} PREFIX=${PREFIX} NGINX_PREFIX=${NGINX_PREFIX} NGINX_PLUS_PREFIX=${NGINX_PLUS_PREFIX} PLUS_ENABLED=${PLUS_ENABLED} GINKGO_LABEL=${GINKGO_LABEL} GINKGO_FLAGS=${GINKGO_FLAGS} PULL_POLICY=Always GW_SERVICE_TYPE=LoadBalancer GW_SVC_GKE_INTERNAL=true NGF_VERSION=${NGF_VERSION}
cd nginx-gateway-fabric/tests && make test TAG="${TAG}" PREFIX="${PREFIX}" NGINX_PREFIX="${NGINX_PREFIX}" NGINX_PLUS_PREFIX="${NGINX_PLUS_PREFIX}" PLUS_ENABLED="${PLUS_ENABLED}" GINKGO_LABEL="${GINKGO_LABEL}" GINKGO_FLAGS="${GINKGO_FLAGS}" PULL_POLICY=Always GW_SERVICE_TYPE=LoadBalancer GW_SVC_GKE_INTERNAL=true NGF_VERSION="${NGF_VERSION}"
Loading
Loading