Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/changes.yml
Original file line number Diff line number Diff line change
Expand Up @@ -324,7 +324,7 @@ jobs:

# creates a yaml file that contains the filters for each integration,
# extracted from the output of the `vdev int ci-paths` command, which
# sources the paths from the scripts/integration/.../test.yaml files
# sources the paths from the tests/integration/.../config/test.yaml files
- name: Create filter rules for integrations
run: vdev int ci-paths > int_test_filters.yaml

Expand Down
2 changes: 1 addition & 1 deletion src/nats.rs
Original file line number Diff line number Diff line change
Expand Up @@ -266,7 +266,7 @@ mod tests {
parse_auth(
r#"
strategy = "credentials_file"
credentials_file.path = "tests/data/nats/nats.creds"
credentials_file.path = "tests/integration/nats/data/nats.creds"
"#,
)
.unwrap();
Expand Down
20 changes: 7 additions & 13 deletions src/sinks/gcp_chronicle/chronicle_unstructured.rs
Original file line number Diff line number Diff line change
Expand Up @@ -718,10 +718,9 @@ mod integration_tests {
trace_init();

let log_type = random_string(10);
let (sink, healthcheck) =
config_build(&log_type, "/home/vector/scripts/integration/gcp/auth.json")
.await
.expect("Building sink failed");
let (sink, healthcheck) = config_build(&log_type, "tests/integration/gcp/config/auth.json")
.await
.expect("Building sink failed");

healthcheck.await.expect("Health check failed");

Expand Down Expand Up @@ -749,11 +748,7 @@ mod integration_tests {

let log_type = random_string(10);
// Test with an auth file that doesnt match the public key sent to the dummy chronicle server.
let sink = config_build(
&log_type,
"/home/vector/scripts/integration/gcp/invalidauth.json",
)
.await;
let sink = config_build(&log_type, "tests/integration/gcp/config/invalidauth.json").await;

assert!(sink.is_err())
}
Expand All @@ -765,10 +760,9 @@ mod integration_tests {
// The chronicle-emulator we are testing against is setup so a `log_type` of "INVALID"
// will return a `400 BAD_REQUEST`.
let log_type = "INVALID";
let (sink, healthcheck) =
config_build(log_type, "/home/vector/scripts/integration/gcp/auth.json")
.await
.expect("Building sink failed");
let (sink, healthcheck) = config_build(log_type, "tests/integration/gcp/config/auth.json")
.await
.expect("Building sink failed");

healthcheck.await.expect("Health check failed");

Expand Down
18 changes: 9 additions & 9 deletions src/sinks/nats/integration_tests.rs
Original file line number Diff line number Diff line change
Expand Up @@ -252,7 +252,7 @@ async fn nats_tls_valid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
..Default::default()
},
});
Expand Down Expand Up @@ -293,9 +293,9 @@ async fn nats_tls_client_cert_valid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
crt_file: Some("tests/data/nats/nats-client.pem".into()),
key_file: Some("tests/data/nats/nats-client.key".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
crt_file: Some("tests/integration/nats/data/nats-client.pem".into()),
key_file: Some("tests/integration/nats/data/nats-client.key".into()),
..Default::default()
},
});
Expand All @@ -319,7 +319,7 @@ async fn nats_tls_client_cert_invalid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
..Default::default()
},
});
Expand All @@ -343,13 +343,13 @@ async fn nats_tls_jwt_auth_valid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
..Default::default()
},
});
conf.auth = Some(NatsAuthConfig::CredentialsFile {
credentials_file: NatsAuthCredentialsFile {
path: "tests/data/nats/nats.creds".into(),
path: "tests/integration/nats/data/nats.creds".into(),
},
});

Expand All @@ -372,13 +372,13 @@ async fn nats_tls_jwt_auth_invalid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
..Default::default()
},
});
conf.auth = Some(NatsAuthConfig::CredentialsFile {
credentials_file: NatsAuthCredentialsFile {
path: "tests/data/nats/nats-bad.creds".into(),
path: "tests/integration/nats/data/nats-bad.creds".into(),
},
});

Expand Down
2 changes: 1 addition & 1 deletion src/sources/amqp.rs
Original file line number Diff line number Diff line change
Expand Up @@ -599,7 +599,7 @@ pub mod test {
}
}

/// Integration tests use the docker compose files in `scripts/integration/docker-compose.amqp.yml`.
/// Integration tests use the docker compose files in `tests/integration/docker-compose.amqp.yml`.
#[cfg(feature = "amqp-integration-tests")]
#[cfg(test)]
mod integration_test {
Expand Down
2 changes: 1 addition & 1 deletion src/sources/http_client/integration_tests.rs
Original file line number Diff line number Diff line change
Expand Up @@ -244,7 +244,7 @@ async fn tls_invalid_ca() {
headers: HashMap::new(),
method: HttpMethod::Get,
tls: Some(TlsConfig {
ca_file: Some("tests/data/http-client/certs/invalid-ca-cert.pem".into()),
ca_file: Some("tests/integration/http-client/data/certs/invalid-ca-cert.pem".into()),
..Default::default()
}),
auth: None,
Expand Down
8 changes: 6 additions & 2 deletions src/sources/logstash.rs
Original file line number Diff line number Diff line change
Expand Up @@ -966,8 +966,12 @@ mod integration_tests {
Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
crt_file: Some("tests/data/host.docker.internal.crt".into()),
key_file: Some("tests/data/host.docker.internal.key".into()),
crt_file: Some(
"tests/integration/shared/data/host.docker.internal.crt".into(),
),
key_file: Some(
"tests/integration/shared/data/host.docker.internal.key".into(),
),
..Default::default()
},
}),
Expand Down
18 changes: 9 additions & 9 deletions src/sources/nats/integration_tests.rs
Original file line number Diff line number Diff line change
Expand Up @@ -280,7 +280,7 @@ async fn nats_tls_valid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
..Default::default()
},
});
Expand Down Expand Up @@ -317,9 +317,9 @@ async fn nats_tls_client_cert_valid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
crt_file: Some("tests/data/nats/nats-client.pem".into()),
key_file: Some("tests/data/nats/nats-client.key".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
crt_file: Some("tests/integration/nats/data/nats-client.pem".into()),
key_file: Some("tests/integration/nats/data/nats-client.key".into()),
..Default::default()
},
});
Expand All @@ -341,7 +341,7 @@ async fn nats_tls_client_cert_invalid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
..Default::default()
},
});
Expand All @@ -363,13 +363,13 @@ async fn nats_tls_jwt_auth_valid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
..Default::default()
},
});
conf.auth = Some(NatsAuthConfig::CredentialsFile {
credentials_file: NatsAuthCredentialsFile {
path: "tests/data/nats/nats.creds".into(),
path: "tests/integration/nats/data/nats.creds".into(),
},
});

Expand All @@ -390,13 +390,13 @@ async fn nats_tls_jwt_auth_invalid() {
conf.tls = Some(TlsEnableableConfig {
enabled: Some(true),
options: TlsConfig {
ca_file: Some("tests/data/nats/rootCA.pem".into()),
ca_file: Some("tests/integration/nats/data/rootCA.pem".into()),
..Default::default()
},
});
conf.auth = Some(NatsAuthConfig::CredentialsFile {
credentials_file: NatsAuthCredentialsFile {
path: "tests/data/nats/nats-bad.creds".into(),
path: "tests/integration/nats/data/nats-bad.creds".into(),
},
});

Expand Down
File renamed without changes.
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ services:
- RABBITMQ_SSL_CACERTFILE=/code/tests/data/ca/intermediate_server/certs/ca-chain.cert.pem
- RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=false
volumes:
- ../../..:/code
- ../../../..:/code

networks:
default:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,4 +29,4 @@ paths:
- "src/sinks/aws_*/**"
- "src/sinks/util/**"
- "src/transforms/aws_*"
- "scripts/integration/aws/**"
- "tests/integration/aws/**"
Original file line number Diff line number Diff line change
Expand Up @@ -18,4 +18,4 @@ matrix:
paths:
- "src/sinks/axiom.rs"
- "src/sinks/util/**"
- "scripts/integration/axiom/**"
- "tests/integration/axiom/**"
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,4 @@ matrix:
paths:
- "src/sinks/azure_**"
- "src/sinks/util/**"
- "scripts/integration/azure/**"
- "tests/integration/azure/**"
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,4 @@ matrix:
paths:
- "src/sinks/clickhouse/**"
- "src/sinks/util/**"
- "scripts/integration/clickhouse/**"
- "tests/integration/clickhouse/**"
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ services:
image: docker.io/minio/minio
command: server /data
volumes:
- ../../../tests/data/databend/miniodat/:/data
- ../data/miniodat/:/data
databend:
image: docker.io/datafuselabs/databend:${CONFIG_VERSION}
environment:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,4 +15,4 @@ matrix:
paths:
- "src/sinks/databend/**"
- "src/sinks/util/**"
- "scripts/integration/databend/**"
- "tests/integration/databend/**"
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ services:
- DD_HOSTNAME=datadog-agent
- DD_SERIALIZER_COMPRESSOR_KIND=zstd
volumes:
- ../../../tests/data/datadog-agent/conf.yaml:/etc/datadog-agent/conf.d/test.d/conf.yaml
- ../data/conf.yaml:/etc/datadog-agent/conf.d/test.d/conf.yaml
datadog-trace-agent:
image: docker.io/datadog/agent:7.31.0
environment:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,4 +19,4 @@ paths:
- "src/common/datadog.rs"
- "src/internal_events/datadog_*"
- "src/sources/datadog_agent/**"
- "scripts/integration/datadog-agent/**"
- "tests/integration/datadog-agent/**"
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ paths:
- "src/internal_events/datadog_*"
- "src/sinks/datadog/logs/**"
- "src/sinks/util/**"
- "scripts/integration/datadog-logs/**"
- "tests/integration/datadog-logs/**"
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ paths:
- "src/internal_events/datadog_*"
- "src/sinks/datadog/metrics/**"
- "src/sinks/util/**"
- "scripts/integration/datadog-metrics/**"
- "tests/integration/datadog-metrics/**"
Original file line number Diff line number Diff line change
Expand Up @@ -21,4 +21,4 @@ paths:
- "src/internal_events/datadog_*"
- "src/sinks/datadog/traces/**"
- "src/sinks/util/**"
- "scripts/integration/datadog-traces/**"
- "tests/integration/datadog-traces/**"
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ version: "3"
services:
dnstap:
build:
context: ../../../tests/data/dnstap
context: ../data
container_name: vector_dnstap
hostname: ns.example.com
volumes:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,4 +19,4 @@ paths:
- "src/internal_events/dnstap.rs"
- "src/sources/dnstap/**"
- "src/sources/util/**"
- "scripts/integration/dnstap/**"
- "tests/integration/dnstap/**"
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,4 @@ paths:
- "src/internal_events/docker_logs.rs"
- "src/sources/docker_logs/**"
- "src/sources/util/**"
- "scripts/integration/docker-logs/**"
- "tests/integration/docker-logs/**"
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ services:
- ELASTIC_PASSWORD=vector
- ES_JAVA_OPTS=-Xms400m -Xmx400m
volumes:
- ../../../tests/data/ca:/usr/share/elasticsearch/config/certs:ro
- ../../../data/ca:/usr/share/elasticsearch/config/certs:ro

networks:
default:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,4 +18,4 @@ matrix:
paths:
- "src/sinks/elasticsearch/**"
- "src/sinks/util/**"
- "scripts/integration/elasticsearch/**"
- "tests/integration/elasticsearch/**"
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ services:
image: docker.io/eventstore/eventstore:${CONFIG_VERSION}
command: --insecure --stats-period-sec=1
volumes:
- ../../../tests/data:/etc/vector:ro
- ../../../data:/etc/vector:ro

networks:
default:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,4 +12,4 @@ paths:
- "src/internal_events/eventstoredb_metrics.rs"
- "src/sources/eventstoredb_metrics/**"
- "src/sources/util/**"
- "scripts/integration/eventstoredb/**"
- "tests/integration/eventstoredb/**"
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ paths:
- "src/internal_events/fluent.rs"
- "src/sources/fluent/**"
- "src/sources/util/**"
- "scripts/integration/fluent/**"
- "tests/integration/fluent/**"
Original file line number Diff line number Diff line change
Expand Up @@ -20,4 +20,4 @@ paths:
- "src/sinks/gcp/**"
- "src/sinks/util/**"
- "src/gcp.rs"
- "scripts/integration/gcp/**"
- "tests/integration/gcp/**"
Original file line number Diff line number Diff line change
Expand Up @@ -18,4 +18,4 @@ matrix:
# expressions are evaluated using https://github.com/micromatch/picomatch
paths:
- "src/sinks/greptimedb/**"
- "scripts/integration/greptimedb/**"
- "tests/integration/greptimedb/**"
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ services:
command:
- /data
volumes:
- ../../../tests/data/http-client/serve:/data
- ../data/serve:/data
dufs-auth:
image: docker.io/sigoden/dufs:${CONFIG_VERSION}
command:
Expand All @@ -16,7 +16,7 @@ services:
- basic
- /data
volumes:
- ../../../tests/data/http-client/serve:/data
- ../data/serve:/data
dufs-https:
image: docker.io/sigoden/dufs:${CONFIG_VERSION}
command:
Expand All @@ -26,9 +26,9 @@ services:
- /certs/ca.key.pem
- /data
volumes:
- ../../../tests/data/http-client/serve:/data
- ../../../tests/data/ca/intermediate_server/certs/dufs-https-chain.cert.pem:/certs/ca.cert.pem
- ../../../tests/data/ca/intermediate_server/private/dufs-https.key.pem:/certs/ca.key.pem
- ../data/serve:/data
- ../../../data/ca/intermediate_server/certs/dufs-https-chain.cert.pem:/certs/ca.cert.pem
- ../../../data/ca/intermediate_server/private/dufs-https.key.pem:/certs/ca.key.pem

networks:
default:
Expand Down
Loading
Loading