Skip to content

Commit 67e3c78

Browse files
committed
tests: Remove MetricsURLScheme field
Signed-off-by: Marek Siarkowicz <[email protected]>
1 parent cff96fe commit 67e3c78

File tree

3 files changed

+17
-26
lines changed

3 files changed

+17
-26
lines changed

tests/e2e/metrics_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ func metricsTest(cx ctlCtx) {
6363
if err := ctlV3Watch(cx, []string{"k", "--rev", "1"}, []kvExec{{key: "k", val: "v"}}...); err != nil {
6464
cx.t.Fatal(err)
6565
}
66-
if err := e2e.CURLGet(cx.epc, e2e.CURLReq{Endpoint: test.endpoint, Expected: test.expected, MetricsURLScheme: cx.cfg.MetricsURLScheme}); err != nil {
66+
if err := e2e.CURLGet(cx.epc, e2e.CURLReq{Endpoint: test.endpoint, Expected: test.expected}); err != nil {
6767
cx.t.Fatalf("failed get with curl (%v)", err)
6868
}
6969
}

tests/e2e/v3_cipher_suite_test.go

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -48,21 +48,19 @@ func testV3CurlCipherSuites(t *testing.T, valid bool) {
4848

4949
func cipherSuiteTestValid(cx ctlCtx) {
5050
if err := e2e.CURLGet(cx.epc, e2e.CURLReq{
51-
Endpoint: "/metrics",
52-
Expected: fmt.Sprintf(`etcd_server_version{server_version="%s"} 1`, version.Version),
53-
MetricsURLScheme: cx.cfg.MetricsURLScheme,
54-
Ciphers: "ECDHE-RSA-AES128-GCM-SHA256", // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
51+
Endpoint: "/metrics",
52+
Expected: fmt.Sprintf(`etcd_server_version{server_version="%s"} 1`, version.Version),
53+
Ciphers: "ECDHE-RSA-AES128-GCM-SHA256", // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
5554
}); err != nil {
5655
require.ErrorContains(cx.t, err, fmt.Sprintf(`etcd_server_version{server_version="%s"} 1`, version.Version))
5756
}
5857
}
5958

6059
func cipherSuiteTestMismatch(cx ctlCtx) {
6160
err := e2e.CURLGet(cx.epc, e2e.CURLReq{
62-
Endpoint: "/metrics",
63-
Expected: "failed setting cipher list",
64-
MetricsURLScheme: cx.cfg.MetricsURLScheme,
65-
Ciphers: "ECDHE-RSA-DES-CBC3-SHA", // TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
61+
Endpoint: "/metrics",
62+
Expected: "failed setting cipher list",
63+
Ciphers: "ECDHE-RSA-DES-CBC3-SHA", // TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
6664
})
6765
require.ErrorContains(cx.t, err, "curl: (59) failed setting cipher list")
6866
}

tests/framework/e2e/curl.go

Lines changed: 10 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,6 @@ type CURLReq struct {
3535
Expected string
3636
Header string
3737

38-
MetricsURLScheme string
39-
4038
Ciphers string
4139
}
4240

@@ -56,24 +54,19 @@ func CURLPrefixArgs(cfg *EtcdProcessClusterConfig, member EtcdProcess, method st
5654
cmdArgs = []string{"curl"}
5755
acurl = member.Config().ClientURL
5856
)
59-
if req.MetricsURLScheme != "https" {
60-
if req.IsTLS {
61-
if cfg.Client.ConnectionType != ClientTLSAndNonTLS {
62-
panic("should not use cURLPrefixArgsUseTLS when serving only TLS or non-TLS")
63-
}
57+
if req.IsTLS {
58+
if cfg.Client.ConnectionType != ClientTLSAndNonTLS {
59+
panic("should not use cURLPrefixArgsUseTLS when serving only TLS or non-TLS")
60+
}
61+
cmdArgs = append(cmdArgs, "--cacert", CaPath, "--cert", CertPath, "--key", PrivateKeyPath)
62+
acurl = ToTLS(member.Config().ClientURL)
63+
} else if cfg.Client.ConnectionType == ClientTLS {
64+
if cfg.CN {
6465
cmdArgs = append(cmdArgs, "--cacert", CaPath, "--cert", CertPath, "--key", PrivateKeyPath)
65-
acurl = ToTLS(member.Config().ClientURL)
66-
} else if cfg.Client.ConnectionType == ClientTLS {
67-
if cfg.CN {
68-
cmdArgs = append(cmdArgs, "--cacert", CaPath, "--cert", CertPath, "--key", PrivateKeyPath)
69-
} else {
70-
cmdArgs = append(cmdArgs, "--cacert", CaPath, "--cert", CertPath3, "--key", PrivateKeyPath3)
71-
}
66+
} else {
67+
cmdArgs = append(cmdArgs, "--cacert", CaPath, "--cert", CertPath3, "--key", PrivateKeyPath3)
7268
}
7369
}
74-
if req.MetricsURLScheme != "" {
75-
acurl = member.EndpointsMetrics()[0]
76-
}
7770
ep := acurl + req.Endpoint
7871

7972
if req.Username != "" || req.Password != "" {

0 commit comments

Comments
 (0)