Skip to content

Commit f2011e4

Browse files
authored
Rename define.NewFixture to define.NewFixtureFromLocalBuild (#4562)
* rename define.NewFixture to define.NewFixtureFromLocalBuild * fix leftover test file
1 parent e7c4ac8 commit f2011e4

26 files changed

+54
-54
lines changed

pkg/testing/define/define.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -66,9 +66,9 @@ func Version() string {
6666
return ver
6767
}
6868

69-
// NewFixture returns a new Elastic Agent testing fixture with a LocalFetcher and
69+
// NewFixtureFromLocalBuild returns a new Elastic Agent testing fixture with a LocalFetcher and
7070
// the agent logging to the test logger.
71-
func NewFixture(t *testing.T, version string, opts ...atesting.FixtureOpt) (*atesting.Fixture, error) {
71+
func NewFixtureFromLocalBuild(t *testing.T, version string, opts ...atesting.FixtureOpt) (*atesting.Fixture, error) {
7272
buildsDir := os.Getenv("AGENT_BUILD_DIR")
7373
if buildsDir == "" {
7474
projectDir, err := findProjectRoot()
@@ -82,7 +82,7 @@ func NewFixture(t *testing.T, version string, opts ...atesting.FixtureOpt) (*ate
8282

8383
}
8484

85-
// NewFixture returns a new Elastic Agent testing fixture with a LocalFetcher and
85+
// NewFixtureWithBinary returns a new Elastic Agent testing fixture with a LocalFetcher and
8686
// the agent logging to the test logger.
8787
func NewFixtureWithBinary(t *testing.T, version string, binary string, buildsDir string, opts ...atesting.FixtureOpt) (*atesting.Fixture, error) {
8888
ver, err := semver.ParseVersion(version)

testing/integration/agent_long_running_leak_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ func (runner *ExtendedRunner) SetupSuite() {
103103
Privileged: true,
104104
}
105105

106-
fixture, err := define.NewFixture(runner.T(), define.Version())
106+
fixture, err := define.NewFixtureFromLocalBuild(runner.T(), define.Version())
107107
require.NoError(runner.T(), err)
108108
runner.agentFixture = fixture
109109

@@ -173,7 +173,7 @@ func (runner *ExtendedRunner) TestHandleLeak() {
173173
// if the slope is increasing above a certain rate, fail the test
174174
// A number of factors can change the slope during a test; shortened runtime (lots of handles allocated in the first few seconds, producing an upward slope),
175175
// filebeat trying to open a large number of log files, etc
176-
//handleSlopeFailure := 0.1
176+
// handleSlopeFailure := 0.1
177177
for _, mon := range runner.resourceWatchers {
178178
handleSlopeFailure := 0.1
179179

@@ -320,7 +320,7 @@ func (gm *goroutinesMonitor) Update(t *testing.T, fixture *atesting.Fixture) {
320320
}
321321

322322
func (gm *goroutinesMonitor) GetSlopeHandlers() []tools.Slope {
323-
//handleSlopeFailure := 0.1
323+
// handleSlopeFailure := 0.1
324324
slopes := []tools.Slope{}
325325
for _, handle := range gm.handles {
326326
slopes = append(slopes, handle.regGoroutines)

testing/integration/apm_propagation_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ func TestAPMConfig(t *testing.T) {
5656
Group: Default,
5757
Stack: &define.Stack{},
5858
})
59-
f, err := define.NewFixture(t, define.Version())
59+
f, err := define.NewFixtureFromLocalBuild(t, define.Version())
6060
require.NoError(t, err)
6161

6262
deadline := time.Now().Add(10 * time.Minute)
@@ -88,7 +88,7 @@ func TestAPMConfig(t *testing.T) {
8888
return count > 0
8989
}, 1*time.Minute, time.Second)
9090

91-
//change the configuration with a new environment and check that the update has been processed
91+
// change the configuration with a new environment and check that the update has been processed
9292
environment = environment + "-changed"
9393
modifiedAgentConfig := generateAgentConfigForAPM(t, agentConfigTemplateString, info, environment)
9494
t.Logf("Rendered agent modified config:\n%s", modifiedAgentConfig)
@@ -178,8 +178,8 @@ func countAPMTraces(ctx context.Context, t *testing.T, esClient *elasticsearch.C
178178
Count int
179179
}
180180

181-
//decoder := json.NewDecoder(response.Body)
182-
//err = decoder.Decode(&body)
181+
// decoder := json.NewDecoder(response.Body)
182+
// err = decoder.Decode(&body)
183183
bodyBytes, _ := io.ReadAll(response.Body)
184184

185185
t.Logf("received ES response: %s", bodyBytes)

testing/integration/container_cmd_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func TestContainerCMD(t *testing.T) {
3838
})
3939
ctx := context.Background()
4040

41-
agentFixture, err := define.NewFixture(t, define.Version())
41+
agentFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
4242
require.NoError(t, err)
4343

4444
createPolicyReq := kibana.AgentPolicy{

testing/integration/delay_enroll_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ func TestDelayEnroll(t *testing.T) {
3636
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
3737
defer cancel()
3838

39-
agentFixture, err := define.NewFixture(t, define.Version())
39+
agentFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
4040
require.NoError(t, err)
4141

4242
// 1. Create a policy in Fleet with monitoring enabled.

testing/integration/diagnostics_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ func TestDiagnosticsOptionalValues(t *testing.T) {
132132
Local: false,
133133
})
134134

135-
fixture, err := define.NewFixture(t, define.Version())
135+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
136136
require.NoError(t, err)
137137

138138
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
@@ -184,7 +184,7 @@ func TestDiagnosticsCommand(t *testing.T) {
184184
Local: false,
185185
})
186186

187-
f, err := define.NewFixture(t, define.Version())
187+
f, err := define.NewFixtureFromLocalBuild(t, define.Version())
188188
require.NoError(t, err)
189189

190190
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))

testing/integration/endpoint_security_test.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ func testInstallAndCLIUninstallWithEndpointSecurity(t *testing.T, info *define.I
166166
defer cancel()
167167

168168
// Get path to agent executable.
169-
fixture, err := define.NewFixture(t, define.Version())
169+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
170170
require.NoError(t, err, "could not create agent fixture")
171171

172172
t.Log("Enrolling the agent in Fleet")
@@ -226,7 +226,7 @@ func testInstallAndCLIUninstallWithEndpointSecurity(t *testing.T, info *define.I
226226

227227
func testInstallAndUnenrollWithEndpointSecurity(t *testing.T, info *define.Info, protected bool) {
228228
// Get path to agent executable.
229-
fixture, err := define.NewFixture(t, define.Version())
229+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
230230
require.NoError(t, err)
231231

232232
t.Log("Enrolling the agent in Fleet")
@@ -339,7 +339,7 @@ func testInstallAndUnenrollWithEndpointSecurity(t *testing.T, info *define.Info,
339339

340340
func testInstallWithEndpointSecurityAndRemoveEndpointIntegration(t *testing.T, info *define.Info, protected bool) {
341341
// Get path to agent executable.
342-
fixture, err := define.NewFixture(t, define.Version())
342+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
343343
require.NoError(t, err)
344344

345345
t.Log("Enrolling the agent in Fleet")
@@ -511,7 +511,7 @@ func TestEndpointSecurityNonDefaultBasePath(t *testing.T) {
511511
defer cn()
512512

513513
// Get path to agent executable.
514-
fixture, err := define.NewFixture(t, define.Version())
514+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
515515
require.NoError(t, err)
516516

517517
t.Log("Enrolling the agent in Fleet")
@@ -589,7 +589,7 @@ func TestEndpointSecurityUnprivileged(t *testing.T) {
589589
defer cn()
590590

591591
// Get path to agent executable.
592-
fixture, err := define.NewFixture(t, define.Version())
592+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
593593
require.NoError(t, err)
594594

595595
t.Log("Enrolling the agent in Fleet")
@@ -665,7 +665,7 @@ func TestEndpointLogsAreCollectedInDiagnostics(t *testing.T) {
665665
defer cn()
666666

667667
// Get path to agent executable.
668-
fixture, err := define.NewFixture(t, define.Version())
668+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
669669
require.NoError(t, err)
670670

671671
t.Log("Enrolling the agent in Fleet")

testing/integration/fake_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ func TestFakeComponent(t *testing.T) {
7777
Local: true,
7878
})
7979

80-
f, err := define.NewFixture(t, define.Version())
80+
f, err := define.NewFixtureFromLocalBuild(t, define.Version())
8181
require.NoError(t, err)
8282

8383
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))

testing/integration/fqdn_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ func TestFQDN(t *testing.T) {
4242
Sudo: true,
4343
})
4444

45-
agentFixture, err := define.NewFixture(t, define.Version())
45+
agentFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
4646
require.NoError(t, err)
4747

4848
externalIP, err := getExternalIP()

testing/integration/install_privileged_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ func TestInstallPrivilegedWithoutBasePath(t *testing.T) {
3535
})
3636

3737
// Get path to Elastic Agent executable
38-
fixture, err := define.NewFixture(t, define.Version())
38+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
3939
require.NoError(t, err)
4040

4141
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
@@ -87,7 +87,7 @@ func TestInstallPrivilegedWithBasePath(t *testing.T) {
8787
})
8888

8989
// Get path to Elastic Agent executable
90-
fixture, err := define.NewFixture(t, define.Version())
90+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
9191
require.NoError(t, err)
9292

9393
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))

testing/integration/install_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func TestInstallWithoutBasePath(t *testing.T) {
3838
})
3939

4040
// Get path to Elastic Agent executable
41-
fixture, err := define.NewFixture(t, define.Version())
41+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
4242
require.NoError(t, err)
4343

4444
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
@@ -105,7 +105,7 @@ func TestInstallWithBasePath(t *testing.T) {
105105
})
106106

107107
// Get path to Elastic Agent executable
108-
fixture, err := define.NewFixture(t, define.Version())
108+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
109109
require.NoError(t, err)
110110

111111
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
@@ -200,7 +200,7 @@ func TestRepeatedInstallUninstall(t *testing.T) {
200200

201201
topPath := filepath.Join(defaultBasePath, "Elastic", "Agent")
202202
// Get path to Elastic Agent executable
203-
fixture, err := define.NewFixture(t, define.Version())
203+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
204204
require.NoError(t, err)
205205

206206
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(maxRunTime))

testing/integration/logs_ingestion_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ func TestLogIngestionFleetManaged(t *testing.T) {
4949
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
5050
defer cancel()
5151

52-
agentFixture, err := define.NewFixture(t, define.Version())
52+
agentFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
5353
require.NoError(t, err)
5454

5555
// 1. Create a policy in Fleet with monitoring enabled.
@@ -117,7 +117,7 @@ func TestDebLogIngestFleetManaged(t *testing.T) {
117117
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
118118
defer cancel()
119119

120-
agentFixture, err := define.NewFixture(t, define.Version(), atesting.WithPackageFormat("deb"))
120+
agentFixture, err := define.NewFixtureFromLocalBuild(t, define.Version(), atesting.WithPackageFormat("deb"))
121121
require.NoError(t, err)
122122

123123
// 1. Create a policy in Fleet with monitoring enabled.
@@ -185,7 +185,7 @@ func TestRpmLogIngestFleetManaged(t *testing.T) {
185185
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
186186
defer cancel()
187187

188-
agentFixture, err := define.NewFixture(t, define.Version(), atesting.WithPackageFormat("rpm"))
188+
agentFixture, err := define.NewFixtureFromLocalBuild(t, define.Version(), atesting.WithPackageFormat("rpm"))
189189
require.NoError(t, err)
190190

191191
// 1. Create a policy in Fleet with monitoring enabled.
@@ -281,7 +281,7 @@ func testMonitoringLogsAreShipped(
281281
"add_cloud_metadata: received error failed with http status code 404", // okay for the cloud metadata to not work
282282
"add_cloud_metadata: received error failed fetching EC2 Identity Document: not found, Signing", // okay for the cloud metadata to not work
283283
"add_cloud_metadata: received error failed fetching EC2 Identity Document: operation error ec2imds: GetInstanceIdentityDocument, http response error StatusCode: 404, request to EC2 IMDS failed", // okay for the cloud metadata to not work
284-
"failed to invoke rollback watcher: failed to start Upgrade Watcher: fork/exec /var/lib/elastic-agent/elastic-agent: no such file or directory", //on debian this happens probably need to fix.
284+
"failed to invoke rollback watcher: failed to start Upgrade Watcher: fork/exec /var/lib/elastic-agent/elastic-agent: no such file or directory", // on debian this happens probably need to fix.
285285
})
286286
})
287287
t.Logf("error logs: Got %d documents", len(docs.Hits.Hits))

testing/integration/metrics_monitoring_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func TestMetricsMonitoringCorrectBinaries(t *testing.T) {
4747
}
4848

4949
func (runner *MetricsRunner) SetupSuite() {
50-
fixture, err := define.NewFixture(runner.T(), define.Version())
50+
fixture, err := define.NewFixtureFromLocalBuild(runner.T(), define.Version())
5151
require.NoError(runner.T(), err)
5252
runner.agentFixture = fixture
5353

testing/integration/otel_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ func TestOtelFileProcessing(t *testing.T) {
128128
cfgFilePath := filepath.Join(tempDir, "otel.yml")
129129
require.NoError(t, os.WriteFile(cfgFilePath, []byte(fileProcessingConfig), 0600))
130130

131-
fixture, err := define.NewFixture(t, define.Version(), aTesting.WithAdditionalArgs([]string{"--config", cfgFilePath}))
131+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version(), aTesting.WithAdditionalArgs([]string{"--config", cfgFilePath}))
132132
require.NoError(t, err)
133133

134134
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
@@ -250,7 +250,7 @@ func TestOtelAPMIngestion(t *testing.T) {
250250
require.NoError(t, os.WriteFile(cfgFilePath, []byte(apmConfig), 0600))
251251
require.NoError(t, os.WriteFile(filepath.Join(tempDir, fileName), []byte{}, 0600))
252252

253-
fixture, err := define.NewFixture(t, define.Version(), aTesting.WithAdditionalArgs([]string{"--config", cfgFilePath}))
253+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version(), aTesting.WithAdditionalArgs([]string{"--config", cfgFilePath}))
254254
require.NoError(t, err)
255255

256256
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))

testing/integration/package_version_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ func TestPackageVersion(t *testing.T) {
3737
Local: true,
3838
})
3939

40-
f, err := define.NewFixture(t, define.Version())
40+
f, err := define.NewFixtureFromLocalBuild(t, define.Version())
4141
require.NoError(t, err)
4242

4343
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
@@ -68,7 +68,7 @@ func TestComponentBuildHashInDiagnostics(t *testing.T) {
6868
})
6969
ctx := context.Background()
7070

71-
f, err := define.NewFixture(t, define.Version())
71+
f, err := define.NewFixtureFromLocalBuild(t, define.Version())
7272
require.NoError(t, err, "could not create new fixture")
7373

7474
err = f.Prepare(ctx)

testing/integration/proxy_url_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -58,11 +58,11 @@ func SetupTest(t *testing.T) *ProxyURL {
5858
proxytest.WithRequestLog("proxy-2", t.Logf),
5959
proxytest.WithVerboseLog())
6060

61-
f, err := define.NewFixture(t,
61+
f, err := define.NewFixtureFromLocalBuild(t,
6262
p.agentVersion,
6363
integrationtest.WithAllowErrors(),
6464
integrationtest.WithLogOutput())
65-
require.NoError(t, err, "SetupTest: NewFixture failed")
65+
require.NoError(t, err, "SetupTest: NewFixtureFromLocalBuild failed")
6666

6767
ctx, cancel := testcontext.WithDeadline(t, context.Background(), time.Now().Add(10*time.Minute))
6868
defer cancel()

testing/integration/upgrade_broken_package_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ func TestUpgradeBrokenPackageVersion(t *testing.T) {
3939

4040
// Start at the build version as we want to test the retry
4141
// logic that is in the build.
42-
startFixture, err := define.NewFixture(t, define.Version())
42+
startFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
4343
require.NoError(t, err)
4444

4545
// Upgrade to an old build.

testing/integration/upgrade_downgrade_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func TestStandaloneDowngradeToSpecificSnapshotBuild(t *testing.T) {
4747

4848
// start at the build version as we want to test the retry
4949
// logic that is in the build.
50-
startFixture, err := define.NewFixture(t, define.Version())
50+
startFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
5151
require.NoError(t, err)
5252
startVersion, err := startFixture.ExecVersion(ctx)
5353
require.NoError(t, err)

testing/integration/upgrade_fleet_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ func testFleetManagedUpgrade(t *testing.T, info *define.Info, unprivileged bool)
6969

7070
// Start at the build version as we want to test the retry
7171
// logic that is in the build.
72-
startFixture, err := define.NewFixture(t, define.Version())
72+
startFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
7373
require.NoError(t, err)
7474
err = startFixture.Prepare(ctx)
7575
require.NoError(t, err)
@@ -171,7 +171,7 @@ func testFleetAirGappedUpgrade(t *testing.T, stack *define.Info, unprivileged bo
171171
"It should not affect the connection to the stack. Host: %s, response body: %s",
172172
stack.KibanaClient.URL, host, body)
173173

174-
fixture, err := define.NewFixture(t, define.Version())
174+
fixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
175175
require.NoError(t, err)
176176
err = fixture.Prepare(ctx)
177177
require.NoError(t, err)

testing/integration/upgrade_gpg_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ func TestStandaloneUpgradeWithGPGFallback(t *testing.T) {
4242

4343
// Start at the build version as we want to test the retry
4444
// logic that is in the build.
45-
startFixture, err := define.NewFixture(t, define.Version())
45+
startFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
4646
require.NoError(t, err)
4747
startVersionInfo, err := startFixture.ExecVersion(ctx)
4848
require.NoError(t, err)
@@ -111,7 +111,7 @@ func TestStandaloneUpgradeWithGPGFallbackOneRemoteFailing(t *testing.T) {
111111

112112
// Start at the build version as we want to test the retry
113113
// logic that is in the build.
114-
startFixture, err := define.NewFixture(t, define.Version())
114+
startFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
115115
require.NoError(t, err)
116116

117117
// Upgrade to an old build.

testing/integration/upgrade_rollback_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ func TestStandaloneUpgradeRollback(t *testing.T) {
6363
require.NoError(t, err, "failed to get start agent build version info")
6464

6565
// Upgrade to the build under test.
66-
endFixture, err := define.NewFixture(t, define.Version())
66+
endFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
6767
require.NoError(t, err)
6868

6969
t.Logf("Testing Elastic Agent upgrade from %s to %s...", upgradeFromVersion, define.Version())
@@ -178,7 +178,7 @@ func TestStandaloneUpgradeRollbackOnRestarts(t *testing.T) {
178178
require.NoError(t, err, "failed to get start agent build version info")
179179

180180
// Upgrade to the build under test.
181-
endFixture, err := define.NewFixture(t, define.Version())
181+
endFixture, err := define.NewFixtureFromLocalBuild(t, define.Version())
182182
require.NoError(t, err)
183183

184184
t.Logf("Testing Elastic Agent upgrade from %s to %s...", upgradeFromVersion, define.Version())

0 commit comments

Comments
 (0)