diff --git a/internal/configs/configurator.go b/internal/configs/configurator.go index 93514286f6..237f199004 100644 --- a/internal/configs/configurator.go +++ b/internal/configs/configurator.go @@ -255,11 +255,11 @@ func (cnf *Configurator) deleteIngressMetricsLabels(key string) { func (cnf *Configurator) AddOrUpdateIngress(ingEx *IngressEx) (Warnings, error) { warnings, err := cnf.addOrUpdateIngress(ingEx) if err != nil { - return warnings, fmt.Errorf("Error adding or updating ingress %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) + return warnings, fmt.Errorf("error adding or updating ingress %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return warnings, fmt.Errorf("Error reloading NGINX for %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) + return warnings, fmt.Errorf("error reloading NGINX for %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) } return warnings, nil @@ -287,7 +287,7 @@ func (cnf *Configurator) addOrUpdateIngress(ingEx *IngressEx) (Warnings, error) name := objectMetaToFileName(&ingEx.Ingress.ObjectMeta) content, err := cnf.templateExecutor.ExecuteIngressConfigTemplate(&nginxCfg) if err != nil { - return warnings, fmt.Errorf("Error generating Ingress Config %v: %w", name, err) + return warnings, fmt.Errorf("error generating Ingress Config %v: %w", name, err) } cnf.nginxManager.CreateConfig(name, content) @@ -302,11 +302,11 @@ func (cnf *Configurator) addOrUpdateIngress(ingEx *IngressEx) (Warnings, error) func (cnf *Configurator) AddOrUpdateMergeableIngress(mergeableIngs *MergeableIngresses) (Warnings, error) { warnings, err := cnf.addOrUpdateMergeableIngress(mergeableIngs) if err != nil { - return warnings, fmt.Errorf("Error when adding or updating ingress %v/%v: %w", mergeableIngs.Master.Ingress.Namespace, mergeableIngs.Master.Ingress.Name, err) + return warnings, fmt.Errorf("error when adding or updating ingress %v/%v: %w", mergeableIngs.Master.Ingress.Namespace, mergeableIngs.Master.Ingress.Name, err) } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return warnings, fmt.Errorf("Error reloading NGINX for %v/%v: %w", mergeableIngs.Master.Ingress.Namespace, mergeableIngs.Master.Ingress.Name, err) + return warnings, fmt.Errorf("error reloading NGINX for %v/%v: %w", mergeableIngs.Master.Ingress.Namespace, mergeableIngs.Master.Ingress.Name, err) } return warnings, nil @@ -341,7 +341,7 @@ func (cnf *Configurator) addOrUpdateMergeableIngress(mergeableIngs *MergeableIng name := objectMetaToFileName(&mergeableIngs.Master.Ingress.ObjectMeta) content, err := cnf.templateExecutor.ExecuteIngressConfigTemplate(&nginxCfg) if err != nil { - return warnings, fmt.Errorf("Error generating Ingress Config %v: %w", name, err) + return warnings, fmt.Errorf("error generating Ingress Config %v: %w", name, err) } cnf.nginxManager.CreateConfig(name, content) @@ -441,11 +441,11 @@ func (cnf *Configurator) deleteVirtualServerMetricsLabels(key string) { func (cnf *Configurator) AddOrUpdateVirtualServer(virtualServerEx *VirtualServerEx) (Warnings, error) { warnings, err := cnf.addOrUpdateVirtualServer(virtualServerEx) if err != nil { - return warnings, fmt.Errorf("Error adding or updating VirtualServer %v/%v: %w", virtualServerEx.VirtualServer.Namespace, virtualServerEx.VirtualServer.Name, err) + return warnings, fmt.Errorf("error adding or updating VirtualServer %v/%v: %w", virtualServerEx.VirtualServer.Namespace, virtualServerEx.VirtualServer.Name, err) } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return warnings, fmt.Errorf("Error reloading NGINX for VirtualServer %v/%v: %w", virtualServerEx.VirtualServer.Namespace, virtualServerEx.VirtualServer.Name, err) + return warnings, fmt.Errorf("error reloading NGINX for VirtualServer %v/%v: %w", virtualServerEx.VirtualServer.Namespace, virtualServerEx.VirtualServer.Name, err) } return warnings, nil @@ -473,7 +473,7 @@ func (cnf *Configurator) addOrUpdateVirtualServer(virtualServerEx *VirtualServer vsCfg, warnings := vsc.GenerateVirtualServerConfig(virtualServerEx, apResources, dosResources) content, err := cnf.templateExecutorV2.ExecuteVirtualServerTemplate(&vsCfg) if err != nil { - return warnings, fmt.Errorf("Error generating VirtualServer config: %v: %w", name, err) + return warnings, fmt.Errorf("error generating VirtualServer config: %v: %w", name, err) } cnf.nginxManager.CreateConfig(name, content) @@ -498,7 +498,7 @@ func (cnf *Configurator) AddOrUpdateVirtualServers(virtualServerExes []*VirtualS } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return allWarnings, fmt.Errorf("Error when reloading NGINX when updating Policy: %w", err) + return allWarnings, fmt.Errorf("error when reloading NGINX when updating Policy: %w", err) } return allWarnings, nil @@ -630,7 +630,7 @@ func (cnf *Configurator) updateTLSPassthroughHostsConfig() error { content, err := cnf.templateExecutorV2.ExecuteTLSPassthroughHostsTemplate(cfg) if err != nil { - return fmt.Errorf("Error generating config for TLS Passthrough Unix Sockets map: %w", err) + return fmt.Errorf("error generating config for TLS Passthrough Unix Sockets map: %w", err) } cnf.nginxManager.CreateTLSPassthroughHostsConfig(content) @@ -673,7 +673,7 @@ func (cnf *Configurator) AddOrUpdateResources(resources ExtendedResources) (Warn for _, ingEx := range resources.IngressExes { warnings, err := cnf.addOrUpdateIngress(ingEx) if err != nil { - return nil, fmt.Errorf("Error adding or updating ingress %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) + return nil, fmt.Errorf("error adding or updating ingress %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) } allWarnings.Add(warnings) } @@ -681,7 +681,7 @@ func (cnf *Configurator) AddOrUpdateResources(resources ExtendedResources) (Warn for _, m := range resources.MergeableIngresses { warnings, err := cnf.addOrUpdateMergeableIngress(m) if err != nil { - return nil, fmt.Errorf("Error adding or updating mergeableIngress %v/%v: %w", m.Master.Ingress.Namespace, m.Master.Ingress.Name, err) + return nil, fmt.Errorf("error adding or updating mergeableIngress %v/%v: %w", m.Master.Ingress.Namespace, m.Master.Ingress.Name, err) } allWarnings.Add(warnings) } @@ -689,7 +689,7 @@ func (cnf *Configurator) AddOrUpdateResources(resources ExtendedResources) (Warn for _, vsEx := range resources.VirtualServerExes { warnings, err := cnf.addOrUpdateVirtualServer(vsEx) if err != nil { - return nil, fmt.Errorf("Error adding or updating VirtualServer %v/%v: %w", vsEx.VirtualServer.Namespace, vsEx.VirtualServer.Name, err) + return nil, fmt.Errorf("error adding or updating VirtualServer %v/%v: %w", vsEx.VirtualServer.Namespace, vsEx.VirtualServer.Name, err) } allWarnings.Add(warnings) } @@ -703,7 +703,7 @@ func (cnf *Configurator) AddOrUpdateResources(resources ExtendedResources) (Warn } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return nil, fmt.Errorf("Error when reloading NGINX when updating resources: %w", err) + return nil, fmt.Errorf("error when reloading NGINX when updating resources: %w", err) } return allWarnings, nil } @@ -723,7 +723,7 @@ func (cnf *Configurator) AddOrUpdateSpecialTLSSecrets(secret *api_v1.Secret, sec } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return fmt.Errorf("Error when reloading NGINX when updating the special Secrets: %w", err) + return fmt.Errorf("error when reloading NGINX when updating the special Secrets: %w", err) } return nil @@ -762,7 +762,7 @@ func (cnf *Configurator) DeleteIngress(key string) error { } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return fmt.Errorf("Error when removing ingress %v: %w", key, err) + return fmt.Errorf("error when removing ingress %v: %w", key, err) } return nil @@ -779,7 +779,7 @@ func (cnf *Configurator) DeleteVirtualServer(key string) error { } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return fmt.Errorf("Error when removing VirtualServer %v: %w", key, err) + return fmt.Errorf("error when removing VirtualServer %v: %w", key, err) } return nil @@ -793,12 +793,12 @@ func (cnf *Configurator) DeleteTransportServer(key string) error { err := cnf.deleteTransportServer(key) if err != nil { - return fmt.Errorf("Error when removing TransportServer %v: %w", key, err) + return fmt.Errorf("error when removing TransportServer %v: %w", key, err) } err = cnf.reload(nginx.ReloadForOtherUpdate) if err != nil { - return fmt.Errorf("Error when removing TransportServer %v: %w", key, err) + return fmt.Errorf("error when removing TransportServer %v: %w", key, err) } return nil @@ -826,7 +826,7 @@ func (cnf *Configurator) UpdateEndpoints(ingExes []*IngressEx) error { // It is safe to ignore warnings here as no new warnings should appear when updating Endpoints for Ingresses _, err := cnf.addOrUpdateIngress(ingEx) if err != nil { - return fmt.Errorf("Error adding or updating ingress %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) + return fmt.Errorf("error adding or updating ingress %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) } if cnf.isPlus { @@ -844,7 +844,7 @@ func (cnf *Configurator) UpdateEndpoints(ingExes []*IngressEx) error { } if err := cnf.reload(nginx.ReloadForEndpointsUpdate); err != nil { - return fmt.Errorf("Error reloading NGINX when updating endpoints: %w", err) + return fmt.Errorf("error reloading NGINX when updating endpoints: %w", err) } return nil @@ -858,7 +858,7 @@ func (cnf *Configurator) UpdateEndpointsMergeableIngress(mergeableIngresses []*M // It is safe to ignore warnings here as no new warnings should appear when updating Endpoints for Ingresses _, err := cnf.addOrUpdateMergeableIngress(mergeableIngresses[i]) if err != nil { - return fmt.Errorf("Error adding or updating mergeableIngress %v/%v: %w", mergeableIngresses[i].Master.Ingress.Namespace, mergeableIngresses[i].Master.Ingress.Name, err) + return fmt.Errorf("error adding or updating mergeableIngress %v/%v: %w", mergeableIngresses[i].Master.Ingress.Namespace, mergeableIngresses[i].Master.Ingress.Name, err) } if cnf.isPlus { @@ -878,7 +878,7 @@ func (cnf *Configurator) UpdateEndpointsMergeableIngress(mergeableIngresses []*M } if err := cnf.reload(nginx.ReloadForEndpointsUpdate); err != nil { - return fmt.Errorf("Error reloading NGINX when updating endpoints for %v: %w", mergeableIngresses, err) + return fmt.Errorf("error reloading NGINX when updating endpoints for %v: %w", mergeableIngresses, err) } return nil @@ -892,7 +892,7 @@ func (cnf *Configurator) UpdateEndpointsForVirtualServers(virtualServerExes []*V // It is safe to ignore warnings here as no new warnings should appear when updating Endpoints for VirtualServers _, err := cnf.addOrUpdateVirtualServer(vs) if err != nil { - return fmt.Errorf("Error adding or updating VirtualServer %v/%v: %w", vs.VirtualServer.Namespace, vs.VirtualServer.Name, err) + return fmt.Errorf("error adding or updating VirtualServer %v/%v: %w", vs.VirtualServer.Namespace, vs.VirtualServer.Name, err) } if cnf.isPlus { @@ -910,7 +910,7 @@ func (cnf *Configurator) UpdateEndpointsForVirtualServers(virtualServerExes []*V } if err := cnf.reload(nginx.ReloadForEndpointsUpdate); err != nil { - return fmt.Errorf("Error reloading NGINX when updating endpoints: %w", err) + return fmt.Errorf("error reloading NGINX when updating endpoints: %w", err) } return nil @@ -925,7 +925,7 @@ func (cnf *Configurator) updatePlusEndpointsForVirtualServer(virtualServerEx *Vi err := cnf.updateServersInPlus(upstream.Name, endpoints, serverCfg) if err != nil { - return fmt.Errorf("Couldn't update the endpoints for %v: %w", upstream.Name, err) + return fmt.Errorf("couldn't update the endpoints for %v: %w", upstream.Name, err) } } @@ -973,7 +973,7 @@ func (cnf *Configurator) updatePlusEndpointsForTransportServer(transportServerEx err := cnf.updateStreamServersInPlus(name, endpoints) if err != nil { - return fmt.Errorf("Couldn't update the endpoints for %v: %w", u.Name, err) + return fmt.Errorf("couldn't update the endpoints for %v: %w", u.Name, err) } } @@ -999,7 +999,7 @@ func (cnf *Configurator) updatePlusEndpoints(ingEx *IngressEx) error { name := getNameForUpstream(ingEx.Ingress, emptyHost, ingEx.Ingress.Spec.DefaultBackend) err := cnf.updateServersInPlus(name, endps, cfg) if err != nil { - return fmt.Errorf("Couldn't update the endpoints for %v: %w", name, err) + return fmt.Errorf("couldn't update the endpoints for %v: %w", name, err) } } } @@ -1021,7 +1021,7 @@ func (cnf *Configurator) updatePlusEndpoints(ingEx *IngressEx) error { name := getNameForUpstream(ingEx.Ingress, rule.Host, &path.Backend) err := cnf.updateServersInPlus(name, endps, cfg) if err != nil { - return fmt.Errorf("Couldn't update the endpoints for %v: %w", name, err) + return fmt.Errorf("couldn't update the endpoints for %v: %w", name, err) } } } @@ -1156,19 +1156,19 @@ func (cnf *Configurator) UpdateTransportServers(updatedTSExes []*TransportServer for _, tsEx := range updatedTSExes { _, err := cnf.addOrUpdateTransportServer(tsEx) if err != nil { - return fmt.Errorf("Error adding or updating TransportServer %v/%v: %w", tsEx.TransportServer.Namespace, tsEx.TransportServer.Name, err) + return fmt.Errorf("error adding or updating TransportServer %v/%v: %w", tsEx.TransportServer.Namespace, tsEx.TransportServer.Name, err) } } for _, key := range deletedKeys { err := cnf.deleteTransportServer(key) if err != nil { - return fmt.Errorf("Error when removing TransportServer %v: %w", key, err) + return fmt.Errorf("error when removing TransportServer %v: %w", key, err) } } if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return fmt.Errorf("Error when updating TransportServers: %w", err) + return fmt.Errorf("error when updating TransportServers: %w", err) } return nil @@ -1379,12 +1379,12 @@ type ResourceOperation func(resource *v1beta1.DosProtectedResource, ingExes []*I func (cnf *Configurator) AddOrUpdateAppProtectResource(resource *unstructured.Unstructured, ingExes []*IngressEx, mergeableIngresses []*MergeableIngresses, vsExes []*VirtualServerEx) (Warnings, error) { warnings, err := cnf.addOrUpdateIngressesAndVirtualServers(ingExes, mergeableIngresses, vsExes) if err != nil { - return warnings, fmt.Errorf("Error when updating %v %v/%v: %w", resource.GetKind(), resource.GetNamespace(), resource.GetName(), err) + return warnings, fmt.Errorf("error when updating %v %v/%v: %w", resource.GetKind(), resource.GetNamespace(), resource.GetName(), err) } err = cnf.reload(nginx.ReloadForOtherUpdate) if err != nil { - return warnings, fmt.Errorf("Error when reloading NGINX when updating %v %v/%v: %w", resource.GetKind(), resource.GetNamespace(), resource.GetName(), err) + return warnings, fmt.Errorf("error when reloading NGINX when updating %v %v/%v: %w", resource.GetKind(), resource.GetNamespace(), resource.GetName(), err) } return warnings, nil @@ -1411,7 +1411,7 @@ func (cnf *Configurator) addOrUpdateIngressesAndVirtualServers(ingExes []*Ingres for _, ingEx := range ingExes { warnings, err := cnf.addOrUpdateIngress(ingEx) if err != nil { - return allWarnings, fmt.Errorf("Error adding or updating ingress %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) + return allWarnings, fmt.Errorf("error adding or updating ingress %v/%v: %w", ingEx.Ingress.Namespace, ingEx.Ingress.Name, err) } allWarnings.Add(warnings) } @@ -1419,7 +1419,7 @@ func (cnf *Configurator) addOrUpdateIngressesAndVirtualServers(ingExes []*Ingres for _, m := range mergeableIngresses { warnings, err := cnf.addOrUpdateMergeableIngress(m) if err != nil { - return allWarnings, fmt.Errorf("Error adding or updating mergeableIngress %v/%v: %w", m.Master.Ingress.Namespace, m.Master.Ingress.Name, err) + return allWarnings, fmt.Errorf("error adding or updating mergeableIngress %v/%v: %w", m.Master.Ingress.Namespace, m.Master.Ingress.Name, err) } allWarnings.Add(warnings) } @@ -1427,7 +1427,7 @@ func (cnf *Configurator) addOrUpdateIngressesAndVirtualServers(ingExes []*Ingres for _, vs := range vsExes { warnings, err := cnf.addOrUpdateVirtualServer(vs) if err != nil { - return allWarnings, fmt.Errorf("Error adding or updating VirtualServer %v/%v: %w", vs.VirtualServer.Namespace, vs.VirtualServer.Name, err) + return allWarnings, fmt.Errorf("error adding or updating VirtualServer %v/%v: %w", vs.VirtualServer.Namespace, vs.VirtualServer.Name, err) } allWarnings.Add(warnings) } @@ -1503,11 +1503,11 @@ func (cnf *Configurator) AddInternalRouteConfig() error { mainCfg := GenerateNginxMainConfig(cnf.staticCfgParams, cnf.cfgParams) mainCfgContent, err := cnf.templateExecutor.ExecuteMainConfigTemplate(mainCfg) if err != nil { - return fmt.Errorf("Error when writing main Config: %w", err) + return fmt.Errorf("error when writing main Config: %w", err) } cnf.nginxManager.CreateMainConfig(mainCfgContent) if err := cnf.reload(nginx.ReloadForOtherUpdate); err != nil { - return fmt.Errorf("Error when reloading nginx: %w", err) + return fmt.Errorf("error when reloading nginx: %w", err) } return nil } diff --git a/internal/configs/parsing_helpers.go b/internal/configs/parsing_helpers.go index 6ce4f44aae..3883056099 100644 --- a/internal/configs/parsing_helpers.go +++ b/internal/configs/parsing_helpers.go @@ -105,7 +105,7 @@ func ParseLBMethod(method string) (string, error) { return method, nil } - return "", fmt.Errorf("Invalid load balancing method: %q", method) + return "", fmt.Errorf("invalid load balancing method: %q", method) } var nginxLBValidInput = map[string]bool{ @@ -147,7 +147,7 @@ func ParseLBMethodForPlus(method string) (string, error) { return method, nil } - return "", fmt.Errorf("Invalid load balancing method: %q", method) + return "", fmt.Errorf("invalid load balancing method: %q", method) } func validateHashLBMethod(method string) (string, error) { @@ -222,7 +222,7 @@ func ParseOffset(s string) (string, error) { if offsetRegexp.MatchString(s) { return s, nil } - return "", errors.New("Invalid offset string") + return "", errors.New("invalid offset string") } // SizeFmt http://nginx.org/en/docs/syntax.html @@ -237,7 +237,7 @@ func ParseSize(s string) (string, error) { if sizeRegexp.MatchString(s) { return s, nil } - return "", errors.New("Invalid size string") + return "", errors.New("invalid size string") } // https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_buffers @@ -250,7 +250,7 @@ func ParseProxyBuffersSpec(s string) (string, error) { if proxyBuffersRegexp.MatchString(s) { return s, nil } - return "", errors.New("Invalid proxy buffers string") + return "", errors.New("invalid proxy buffers string") } // ParsePortList ensures that the string is a comma-separated list of port numbers @@ -269,11 +269,11 @@ func ParsePortList(s string) ([]int, error) { func parsePort(value string) (int, error) { port, err := strconv.ParseInt(value, 10, 16) if err != nil { - return 0, fmt.Errorf("Unable to parse port as integer: %w", err) + return 0, fmt.Errorf("unable to parse port as integer: %w", err) } if port <= 0 { - return 0, fmt.Errorf("Port number should be greater than zero: %q", port) + return 0, fmt.Errorf("port number should be greater than zero: %q", port) } return int(port), nil diff --git a/internal/k8s/validation_test.go b/internal/k8s/validation_test.go index 68d83d65ef..301c9e1e71 100644 --- a/internal/k8s/validation_test.go +++ b/internal/k8s/validation_test.go @@ -167,7 +167,7 @@ func TestValidateNginxIngressAnnotations(t *testing.T) { appProtectDosEnabled: false, internalRoutesEnabled: false, expectedErrors: []string{ - `annotations.nginx.org/lb-method: Invalid value: "invalid_method": Invalid load balancing method: "invalid_method"`, + `annotations.nginx.org/lb-method: Invalid value: "invalid_method": invalid load balancing method: "invalid_method"`, `annotations.nginx.org/mergeable-ingress-type: Invalid value: "invalid": must be one of: 'master' or 'minion'`, }, msg: "invalid multiple annotations messages in alphabetical order", @@ -248,7 +248,7 @@ func TestValidateNginxIngressAnnotations(t *testing.T) { appProtectDosEnabled: false, internalRoutesEnabled: false, expectedErrors: []string{ - `annotations.nginx.org/lb-method: Invalid value: "least_time header": Invalid load balancing method: "least_time header"`, + `annotations.nginx.org/lb-method: Invalid value: "least_time header": invalid load balancing method: "least_time header"`, }, msg: "invalid nginx.org/lb-method annotation, nginx plus only", }, @@ -262,7 +262,7 @@ func TestValidateNginxIngressAnnotations(t *testing.T) { appProtectDosEnabled: false, internalRoutesEnabled: false, expectedErrors: []string{ - `annotations.nginx.org/lb-method: Invalid value: "least_time header;": Invalid load balancing method: "least_time header;"`, + `annotations.nginx.org/lb-method: Invalid value: "least_time header;": invalid load balancing method: "least_time header;"`, }, msg: "invalid nginx.org/lb-method annotation", }, @@ -276,7 +276,7 @@ func TestValidateNginxIngressAnnotations(t *testing.T) { appProtectDosEnabled: false, internalRoutesEnabled: false, expectedErrors: []string{ - `annotations.nginx.org/lb-method: Invalid value: "{least_time header}": Invalid load balancing method: "{least_time header}"`, + `annotations.nginx.org/lb-method: Invalid value: "{least_time header}": invalid load balancing method: "{least_time header}"`, }, msg: "invalid nginx.org/lb-method annotation", }, @@ -290,7 +290,7 @@ func TestValidateNginxIngressAnnotations(t *testing.T) { appProtectDosEnabled: false, internalRoutesEnabled: false, expectedErrors: []string{ - `annotations.nginx.org/lb-method: Invalid value: "$least_time header": Invalid load balancing method: "$least_time header"`, + `annotations.nginx.org/lb-method: Invalid value: "$least_time header": invalid load balancing method: "$least_time header"`, }, msg: "invalid nginx.org/lb-method annotation", }, @@ -304,7 +304,7 @@ func TestValidateNginxIngressAnnotations(t *testing.T) { appProtectDosEnabled: false, internalRoutesEnabled: false, expectedErrors: []string{ - `annotations.nginx.org/lb-method: Invalid value: "invalid_method": Invalid load balancing method: "invalid_method"`, + `annotations.nginx.org/lb-method: Invalid value: "invalid_method": invalid load balancing method: "invalid_method"`, }, msg: "invalid nginx.org/lb-method annotation", },