integration: Reset OTEL_EXPORTER_OTLP_ENDPOINT
for sub-daemons
When creating a new daemon in the `TestDaemonProxy`, reset the `OTEL_EXPORTER_OTLP_ENDPOINT` to an empty value to disable OTEL collection to avoid it hitting the proxy. Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
This commit is contained in:
parent
84eecc4a30
commit
5fe96e234d
1 changed files with 6 additions and 1 deletions
|
@ -208,6 +208,7 @@ func TestDaemonProxy(t *testing.T) {
|
||||||
"HTTP_PROXY="+proxyServer.URL,
|
"HTTP_PROXY="+proxyServer.URL,
|
||||||
"HTTPS_PROXY="+proxyServer.URL,
|
"HTTPS_PROXY="+proxyServer.URL,
|
||||||
"NO_PROXY=example.com",
|
"NO_PROXY=example.com",
|
||||||
|
"OTEL_EXPORTER_OTLP_ENDPOINT=", // To avoid OTEL hitting the proxy.
|
||||||
))
|
))
|
||||||
c := d.NewClientT(t)
|
c := d.NewClientT(t)
|
||||||
|
|
||||||
|
@ -245,6 +246,7 @@ func TestDaemonProxy(t *testing.T) {
|
||||||
"https_proxy="+"https://"+userPass+"myuser:mypassword@from-env-https-invalid",
|
"https_proxy="+"https://"+userPass+"myuser:mypassword@from-env-https-invalid",
|
||||||
"NO_PROXY=ignore.invalid",
|
"NO_PROXY=ignore.invalid",
|
||||||
"no_proxy=ignore.invalid",
|
"no_proxy=ignore.invalid",
|
||||||
|
"OTEL_EXPORTER_OTLP_ENDPOINT=", // To avoid OTEL hitting the proxy.
|
||||||
))
|
))
|
||||||
d.Start(t, "--iptables=false", "--http-proxy", proxyServer.URL, "--https-proxy", proxyServer.URL, "--no-proxy", "example.com")
|
d.Start(t, "--iptables=false", "--http-proxy", proxyServer.URL, "--https-proxy", proxyServer.URL, "--no-proxy", "example.com")
|
||||||
defer d.Stop(t)
|
defer d.Stop(t)
|
||||||
|
@ -295,6 +297,7 @@ func TestDaemonProxy(t *testing.T) {
|
||||||
"https_proxy="+"https://"+userPass+"myuser:mypassword@from-env-https-invalid",
|
"https_proxy="+"https://"+userPass+"myuser:mypassword@from-env-https-invalid",
|
||||||
"NO_PROXY=ignore.invalid",
|
"NO_PROXY=ignore.invalid",
|
||||||
"no_proxy=ignore.invalid",
|
"no_proxy=ignore.invalid",
|
||||||
|
"OTEL_EXPORTER_OTLP_ENDPOINT=", // To avoid OTEL hitting the proxy.
|
||||||
))
|
))
|
||||||
c := d.NewClientT(t)
|
c := d.NewClientT(t)
|
||||||
|
|
||||||
|
@ -364,7 +367,9 @@ func TestDaemonProxy(t *testing.T) {
|
||||||
proxyURL = "https://xxxxx:xxxxx@example.org"
|
proxyURL = "https://xxxxx:xxxxx@example.org"
|
||||||
)
|
)
|
||||||
|
|
||||||
d := daemon.New(t)
|
d := daemon.New(t, daemon.WithEnvVars(
|
||||||
|
"OTEL_EXPORTER_OTLP_ENDPOINT=", // To avoid OTEL hitting the proxy.
|
||||||
|
))
|
||||||
d.Start(t, "--iptables=false", "--http-proxy", proxyRawURL, "--https-proxy", proxyRawURL, "--no-proxy", "example.com")
|
d.Start(t, "--iptables=false", "--http-proxy", proxyRawURL, "--https-proxy", proxyRawURL, "--no-proxy", "example.com")
|
||||||
defer d.Stop(t)
|
defer d.Stop(t)
|
||||||
err := d.Signal(syscall.SIGHUP)
|
err := d.Signal(syscall.SIGHUP)
|
||||||
|
|
Loading…
Reference in a new issue