This is an automated email from the ASF dual-hosted git repository.

alinsran pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix-ingress-controller.git


The following commit(s) were added to refs/heads/master by this push:
     new 7fee6bd3 chore: use constant variable instead of hard code (#2560)
7fee6bd3 is described below

commit 7fee6bd3315db3c790880080cd59cba015f3e950
Author: ArthurMorgan <[email protected]>
AuthorDate: Thu Sep 18 11:30:23 2025 +0800

    chore: use constant variable instead of hard code (#2560)
---
 api/adc/types.go                              | 54 +--------------------------
 internal/adc/cache/memdb.go                   | 40 ++++++++++----------
 internal/adc/client/client.go                 |  4 +-
 internal/adc/translator/apisixroute.go        |  3 +-
 internal/adc/translator/gateway.go            |  3 +-
 internal/adc/translator/httproute.go          |  9 +++--
 internal/adc/translator/ingress.go            |  3 +-
 internal/controller/apisixroute_controller.go |  2 +-
 internal/controller/consumer_controller.go    |  3 +-
 internal/controller/gateway_controller.go     |  3 +-
 internal/controller/httproute_controller.go   |  8 ++--
 internal/controller/httproutepolicy.go        | 11 +++---
 internal/controller/indexer/indexer.go        | 11 +++---
 internal/controller/ingress_controller.go     |  3 +-
 internal/controller/policies.go               |  3 +-
 internal/manager/controllers.go               | 26 ++++++-------
 internal/provider/apisix/provider.go          | 30 +++++++--------
 test/conformance/suite_test.go                |  3 +-
 test/e2e/crds/v1alpha1/gatewayproxy.go        |  3 +-
 test/e2e/gatewayapi/controller.go             |  9 +++--
 test/e2e/gatewayapi/gatewayproxy.go           | 13 ++++---
 test/e2e/scaffold/scaffold.go                 | 17 +++++----
 22 files changed, 112 insertions(+), 149 deletions(-)

diff --git a/api/adc/types.go b/api/adc/types.go
index 70fc4ce4..2133d731 100644
--- a/api/adc/types.go
+++ b/api/adc/types.go
@@ -30,54 +30,6 @@ import (
        "k8s.io/apimachinery/pkg/util/intstr"
 )
 
-const (
-       // HashOnVars means the hash scope is variable.
-       HashOnVars = "vars"
-       // HashOnVarsCombination means the hash scope is the
-       // variable combination.
-       HashOnVarsCombination = "vars_combinations"
-       // HashOnHeader means the hash scope is HTTP request
-       // headers.
-       HashOnHeader = "header"
-       // HashOnCookie means the hash scope is HTTP Cookie.
-       HashOnCookie = "cookie"
-       // HashOnConsumer means the hash scope is APISIX consumer.
-       HashOnConsumer = "consumer"
-
-       // LbRoundRobin is the round robin load balancer.
-       LBRoundRobin = "roundrobin"
-       // LbConsistentHash is the consistent hash load balancer.
-       LbConsistentHash = "chash"
-       // LbEwma is the ewma load balancer.
-       LbEwma = "ewma"
-       // LbLeaseConn is the least connection load balancer.
-       LbLeastConn = "least_conn"
-
-       // SchemeHTTP represents the HTTP protocol.
-       SchemeHTTP = "http"
-       // SchemeGRPC represents the GRPC protocol.
-       SchemeGRPC = "grpc"
-       // SchemeHTTPS represents the HTTPS protocol.
-       SchemeHTTPS = "https"
-       // SchemeGRPCS represents the GRPCS protocol.
-       SchemeGRPCS = "grpcs"
-       // SchemeTCP represents the TCP protocol.
-       SchemeTCP = "tcp"
-       // SchemeUDP represents the UDP protocol.
-       SchemeUDP = "udp"
-
-       // DefaultUpstreamTimeout represents the default connect,
-       // read and send timeout (in seconds) with upstreams.
-       DefaultUpstreamTimeout = 60
-
-       // PassHostPass represents pass option for pass_host Upstream settings.
-       PassHostPass = "pass"
-       // PassHostPass represents node option for pass_host Upstream settings.
-       PassHostNode = "node"
-       // PassHostPass represents rewrite option for pass_host Upstream 
settings.
-       PassHostRewrite = "rewrite"
-)
-
 const (
        TypeRoute          = "route"
        TypeService        = "service"
@@ -393,11 +345,7 @@ const (
 type Scheme string
 
 const (
-       Grpc  Scheme = "grpc"
-       Grpcs Scheme = "grpcs"
-       Kafka Scheme = "kafka"
-       TLS   Scheme = "tls"
-       UDP   Scheme = "udp"
+       SchemeHTTP = "http"
 )
 
 type UpstreamType string
diff --git a/internal/adc/cache/memdb.go b/internal/adc/cache/memdb.go
index 966899d9..50f2a9f2 100644
--- a/internal/adc/cache/memdb.go
+++ b/internal/adc/cache/memdb.go
@@ -81,23 +81,23 @@ func (c *dbCache) Delete(obj any) error {
 
 func (c *dbCache) InsertRoute(r *types.Route) error {
        route := r.DeepCopy()
-       return c.insert("route", route)
+       return c.insert(types.TypeRoute, route)
 }
 
 func (c *dbCache) InsertSSL(ssl *types.SSL) error {
-       return c.insert("ssl", ssl.DeepCopy())
+       return c.insert(types.TypeSSL, ssl.DeepCopy())
 }
 
 func (c *dbCache) InsertService(u *types.Service) error {
-       return c.insert("service", u.DeepCopy())
+       return c.insert(types.TypeService, u.DeepCopy())
 }
 
 func (c *dbCache) InsertConsumer(consumer *types.Consumer) error {
-       return c.insert("consumer", consumer.DeepCopy())
+       return c.insert(types.TypeConsumer, consumer.DeepCopy())
 }
 
 func (c *dbCache) InsertGlobalRule(globalRule *types.GlobalRuleItem) error {
-       return c.insert("global_rule", globalRule.DeepCopy())
+       return c.insert(types.TypeGlobalRule, globalRule.DeepCopy())
 }
 
 func (c *dbCache) insert(table string, obj any) error {
@@ -111,7 +111,7 @@ func (c *dbCache) insert(table string, obj any) error {
 }
 
 func (c *dbCache) GetRoute(id string) (*types.Route, error) {
-       obj, err := c.get("route", id)
+       obj, err := c.get(types.TypeRoute, id)
        if err != nil {
                return nil, err
        }
@@ -119,7 +119,7 @@ func (c *dbCache) GetRoute(id string) (*types.Route, error) 
{
 }
 
 func (c *dbCache) GetSSL(id string) (*types.SSL, error) {
-       obj, err := c.get("ssl", id)
+       obj, err := c.get(types.TypeSSL, id)
        if err != nil {
                return nil, err
        }
@@ -127,7 +127,7 @@ func (c *dbCache) GetSSL(id string) (*types.SSL, error) {
 }
 
 func (c *dbCache) GetService(id string) (*types.Service, error) {
-       obj, err := c.get("service", id)
+       obj, err := c.get(types.TypeService, id)
        if err != nil {
                return nil, err
        }
@@ -135,7 +135,7 @@ func (c *dbCache) GetService(id string) (*types.Service, 
error) {
 }
 
 func (c *dbCache) GetConsumer(username string) (*types.Consumer, error) {
-       obj, err := c.get("consumer", username)
+       obj, err := c.get(types.TypeConsumer, username)
        if err != nil {
                return nil, err
        }
@@ -143,7 +143,7 @@ func (c *dbCache) GetConsumer(username string) 
(*types.Consumer, error) {
 }
 
 func (c *dbCache) GetGlobalRule(id string) (*types.GlobalRuleItem, error) {
-       obj, err := c.get("global_rule", id)
+       obj, err := c.get(types.TypeGlobalRule, id)
        if err != nil {
                return nil, err
        }
@@ -175,7 +175,7 @@ func (c *dbCache) get(table, id string) (any, error) {
 }
 
 func (c *dbCache) ListRoutes(opts ...ListOption) ([]*types.Route, error) {
-       raws, err := c.list("route", opts...)
+       raws, err := c.list(types.TypeRoute, opts...)
        if err != nil {
                return nil, err
        }
@@ -187,7 +187,7 @@ func (c *dbCache) ListRoutes(opts ...ListOption) 
([]*types.Route, error) {
 }
 
 func (c *dbCache) ListSSL(opts ...ListOption) ([]*types.SSL, error) {
-       raws, err := c.list("ssl", opts...)
+       raws, err := c.list(types.TypeSSL, opts...)
        if err != nil {
                return nil, err
        }
@@ -199,7 +199,7 @@ func (c *dbCache) ListSSL(opts ...ListOption) 
([]*types.SSL, error) {
 }
 
 func (c *dbCache) ListServices(opts ...ListOption) ([]*types.Service, error) {
-       raws, err := c.list("service", opts...)
+       raws, err := c.list(types.TypeService, opts...)
        if err != nil {
                return nil, err
        }
@@ -211,7 +211,7 @@ func (c *dbCache) ListServices(opts ...ListOption) 
([]*types.Service, error) {
 }
 
 func (c *dbCache) ListConsumers(opts ...ListOption) ([]*types.Consumer, error) 
{
-       raws, err := c.list("consumer", opts...)
+       raws, err := c.list(types.TypeConsumer, opts...)
        if err != nil {
                return nil, err
        }
@@ -223,7 +223,7 @@ func (c *dbCache) ListConsumers(opts ...ListOption) 
([]*types.Consumer, error) {
 }
 
 func (c *dbCache) ListGlobalRules(opts ...ListOption) 
([]*types.GlobalRuleItem, error) {
-       raws, err := c.list("global_rule", opts...)
+       raws, err := c.list(types.TypeGlobalRule, opts...)
        if err != nil {
                return nil, err
        }
@@ -257,23 +257,23 @@ func (c *dbCache) list(table string, opts ...ListOption) 
([]any, error) {
 }
 
 func (c *dbCache) DeleteRoute(r *types.Route) error {
-       return c.delete("route", r)
+       return c.delete(types.TypeRoute, r)
 }
 
 func (c *dbCache) DeleteSSL(ssl *types.SSL) error {
-       return c.delete("ssl", ssl)
+       return c.delete(types.TypeSSL, ssl)
 }
 
 func (c *dbCache) DeleteService(u *types.Service) error {
-       return c.delete("service", u)
+       return c.delete(types.TypeService, u)
 }
 
 func (c *dbCache) DeleteConsumer(consumer *types.Consumer) error {
-       return c.delete("consumer", consumer)
+       return c.delete(types.TypeConsumer, consumer)
 }
 
 func (c *dbCache) DeleteGlobalRule(globalRule *types.GlobalRuleItem) error {
-       return c.delete("global_rule", globalRule)
+       return c.delete(types.TypeGlobalRule, globalRule)
 }
 
 func (c *dbCache) delete(table string, obj any) error {
diff --git a/internal/adc/client/client.go b/internal/adc/client/client.go
index 3b99bd34..d918f8ba 100644
--- a/internal/adc/client/client.go
+++ b/internal/adc/client/client.go
@@ -233,7 +233,7 @@ func (c *Client) sync(ctx context.Context, task Task) error 
{
                pkgmetrics.RecordFileIODuration("prepare_sync_file", "failure", 
time.Since(fileIOStart).Seconds())
                return err
        }
-       pkgmetrics.RecordFileIODuration("prepare_sync_file", "success", 
time.Since(fileIOStart).Seconds())
+       pkgmetrics.RecordFileIODuration("prepare_sync_file", 
adctypes.StatusSuccess, time.Since(fileIOStart).Seconds())
        defer cleanup()
 
        args := BuildADCExecuteArgs(syncFilePath, task.Labels, 
task.ResourceTypes)
@@ -249,7 +249,7 @@ func (c *Client) sync(ctx context.Context, task Task) error 
{
                err := c.executor.Execute(ctx, c.BackendMode, config, args)
                duration := time.Since(startTime).Seconds()
 
-               status := "success"
+               status := adctypes.StatusSuccess
                if err != nil {
                        status = "failure"
                        log.Errorw("failed to execute adc command", 
zap.Error(err), zap.Any("config", config))
diff --git a/internal/adc/translator/apisixroute.go 
b/internal/adc/translator/apisixroute.go
index e5aa70c9..76888dd4 100644
--- a/internal/adc/translator/apisixroute.go
+++ b/internal/adc/translator/apisixroute.go
@@ -37,6 +37,7 @@ import (
        apiv2 "github.com/apache/apisix-ingress-controller/api/v2"
        "github.com/apache/apisix-ingress-controller/internal/controller/label"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/internal/utils"
        "github.com/apache/apisix-ingress-controller/pkg/id"
        pkgutils "github.com/apache/apisix-ingress-controller/pkg/utils"
@@ -405,7 +406,7 @@ func (t *Translator) 
translateApisixRouteBackendResolveGranularityEndpoint(tctx
        backendRef := gatewayv1.BackendRef{
                BackendObjectReference: gatewayv1.BackendObjectReference{
                        Group:     
(*gatewayv1.Group)(&apiv2.GroupVersion.Group),
-                       Kind:      (*gatewayv1.Kind)(ptr.To("Service")),
+                       Kind:      
(*gatewayv1.Kind)(ptr.To(internaltypes.KindService)),
                        Name:      gatewayv1.ObjectName(backend.ServiceName),
                        Namespace: (*gatewayv1.Namespace)(&arNN.Namespace),
                        Port:      (*gatewayv1.PortNumber)(&port),
diff --git a/internal/adc/translator/gateway.go 
b/internal/adc/translator/gateway.go
index acfdf80b..43fc765f 100644
--- a/internal/adc/translator/gateway.go
+++ b/internal/adc/translator/gateway.go
@@ -36,6 +36,7 @@ import (
        "github.com/apache/apisix-ingress-controller/internal/controller/label"
        "github.com/apache/apisix-ingress-controller/internal/id"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/internal/utils"
 )
 
@@ -86,7 +87,7 @@ func (t *Translator) translateSecret(tctx 
*provider.TranslateContext, listener g
                        if ref.Namespace != nil {
                                ns = string(*ref.Namespace)
                        }
-                       if listener.TLS.CertificateRefs[0].Kind != nil && 
*listener.TLS.CertificateRefs[0].Kind == "Secret" {
+                       if listener.TLS.CertificateRefs[0].Kind != nil && 
*listener.TLS.CertificateRefs[0].Kind == internaltypes.KindSecret {
                                sslObj := &adctypes.SSL{
                                        Snis: []string{},
                                }
diff --git a/internal/adc/translator/httproute.go 
b/internal/adc/translator/httproute.go
index a3e2ad95..b33de0e4 100644
--- a/internal/adc/translator/httproute.go
+++ b/internal/adc/translator/httproute.go
@@ -37,6 +37,7 @@ import (
        "github.com/apache/apisix-ingress-controller/internal/controller/label"
        "github.com/apache/apisix-ingress-controller/internal/id"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
 )
 
 func (t *Translator) fillPluginsFromHTTPRouteFilters(
@@ -70,7 +71,7 @@ func (t *Translator) fillPluginFromExtensionRef(plugins 
adctypes.Plugins, namesp
        if extensionRef == nil {
                return
        }
-       if extensionRef.Kind == "PluginConfig" {
+       if extensionRef.Kind == internaltypes.KindPluginConfig {
                pluginconfig := tctx.PluginConfigs[types.NamespacedName{
                        Namespace: namespace,
                        Name:      string(extensionRef.Name),
@@ -300,7 +301,7 @@ func (t *Translator) fillHTTPRoutePoliciesForHTTPRoute(tctx 
*provider.TranslateC
        var policies []v1alpha1.HTTPRoutePolicy
        for _, policy := range tctx.HTTPRoutePolicies {
                for _, ref := range policy.Spec.TargetRefs {
-                       if string(ref.Kind) == "HTTPRoute" && (ref.SectionName 
== nil || *ref.SectionName == "" || ptr.Equal(ref.SectionName, rule.Name)) {
+                       if string(ref.Kind) == internaltypes.KindHTTPRoute && 
(ref.SectionName == nil || *ref.SectionName == "" || ptr.Equal(ref.SectionName, 
rule.Name)) {
                                policies = append(policies, policy)
                                break
                        }
@@ -376,7 +377,7 @@ func (t *Translator) TranslateBackendRefWithFilter(tctx 
*provider.TranslateConte
 }
 
 func (t *Translator) translateBackendRef(tctx *provider.TranslateContext, ref 
gatewayv1.BackendRef, endpointFilter func(*discoveryv1.Endpoint) bool) 
(adctypes.UpstreamNodes, error) {
-       if ref.Kind != nil && *ref.Kind != "Service" {
+       if ref.Kind != nil && *ref.Kind != internaltypes.KindService {
                return adctypes.UpstreamNodes{}, fmt.Errorf("kind %s is not 
supported", *ref.Kind)
        }
 
@@ -549,7 +550,7 @@ func (t *Translator) TranslateHTTPRoute(tctx 
*provider.TranslateContext, httpRou
                                port int32
                        )
                        if backend.Kind == nil {
-                               kind = "Service"
+                               kind = internaltypes.KindService
                        } else {
                                kind = string(*backend.Kind)
                        }
diff --git a/internal/adc/translator/ingress.go 
b/internal/adc/translator/ingress.go
index 04aa7538..f17b159f 100644
--- a/internal/adc/translator/ingress.go
+++ b/internal/adc/translator/ingress.go
@@ -30,6 +30,7 @@ import (
        "github.com/apache/apisix-ingress-controller/internal/controller/label"
        "github.com/apache/apisix-ingress-controller/internal/id"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
 )
 
 func (t *Translator) translateIngressTLS(ingressTLS *networkingv1.IngressTLS, 
secret *corev1.Secret, labels map[string]string) (*adctypes.SSL, error) {
@@ -123,7 +124,7 @@ func (t *Translator) TranslateIngress(tctx 
*provider.TranslateContext, obj *netw
                        // get the EndpointSlice of the backend service
                        backendService := path.Backend.Service
                        if backendService != nil {
-                               backendRef := convertBackendRef(obj.Namespace, 
backendService.Name, "Service")
+                               backendRef := convertBackendRef(obj.Namespace, 
backendService.Name, internaltypes.KindService)
                                
t.AttachBackendTrafficPolicyToUpstream(backendRef, tctx.BackendTrafficPolicies, 
upstream)
                        }
 
diff --git a/internal/controller/apisixroute_controller.go 
b/internal/controller/apisixroute_controller.go
index 8fed3181..dd57202b 100644
--- a/internal/controller/apisixroute_controller.go
+++ b/internal/controller/apisixroute_controller.go
@@ -427,7 +427,7 @@ func (r *ApisixRouteReconciler) validateHTTPBackend(tctx 
*provider.TranslateCont
                return nil
        }
 
-       if backend.ResolveGranularity == "service" && service.Spec.ClusterIP == 
"" {
+       if backend.ResolveGranularity == apiv2.ResolveGranularityService && 
service.Spec.ClusterIP == "" {
                r.Log.Error(errors.New("service has no ClusterIP"), "Service", 
serviceNN, "ResolveGranularity", backend.ResolveGranularity)
                return nil
        }
diff --git a/internal/controller/consumer_controller.go 
b/internal/controller/consumer_controller.go
index 20907a75..6ebe8c96 100644
--- a/internal/controller/consumer_controller.go
+++ b/internal/controller/consumer_controller.go
@@ -42,6 +42,7 @@ import (
        "github.com/apache/apisix-ingress-controller/internal/controller/status"
        "github.com/apache/apisix-ingress-controller/internal/manager/readiness"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/internal/utils"
 )
 
@@ -193,7 +194,7 @@ func (r *ConsumerReconciler) Reconcile(ctx context.Context, 
req ctrl.Request) (c
                        consumer.Name = req.Name
 
                        consumer.TypeMeta = metav1.TypeMeta{
-                               Kind:       "Consumer",
+                               Kind:       internaltypes.KindConsumer,
                                APIVersion: v1alpha1.GroupVersion.String(),
                        }
 
diff --git a/internal/controller/gateway_controller.go 
b/internal/controller/gateway_controller.go
index 2ed7bf46..76648a4a 100644
--- a/internal/controller/gateway_controller.go
+++ b/internal/controller/gateway_controller.go
@@ -41,6 +41,7 @@ import (
        
"github.com/apache/apisix-ingress-controller/internal/controller/indexer"
        "github.com/apache/apisix-ingress-controller/internal/controller/status"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/internal/utils"
 )
 
@@ -316,7 +317,7 @@ func (r *GatewayReconciler) listGatewaysForHTTPRoute(ctx 
context.Context, obj cl
                if parentRef.Group != nil && *parentRef.Group != 
gatewayv1.GroupName {
                        continue
                }
-               if parentRef.Kind != nil && *parentRef.Kind != "Gateway" {
+               if parentRef.Kind != nil && *parentRef.Kind != 
internaltypes.KindGateway {
                        continue
                }
                if parentRef.Namespace != nil {
diff --git a/internal/controller/httproute_controller.go 
b/internal/controller/httproute_controller.go
index b6f39287..6fe87881 100644
--- a/internal/controller/httproute_controller.go
+++ b/internal/controller/httproute_controller.go
@@ -397,7 +397,7 @@ func (r *HTTPRouteReconciler) 
listHTTPRouteByHTTPRoutePolicy(ctx context.Context
 
        var keys = make(map[k8stypes.NamespacedName]struct{})
        for _, ref := range httpRoutePolicy.Spec.TargetRefs {
-               if ref.Kind != "HTTPRoute" {
+               if ref.Kind != types.KindHTTPRoute {
                        continue
                }
                key := k8stypes.NamespacedName{
@@ -456,7 +456,7 @@ func (r *HTTPRouteReconciler) 
processHTTPRouteBackendRefs(tctx *provider.Transla
                        targetNN.Namespace = string(*backend.Namespace)
                }
 
-               if backend.Kind != nil && *backend.Kind != "Service" {
+               if backend.Kind != nil && *backend.Kind != types.KindService {
                        terr = types.NewInvalidKindError(*backend.Kind)
                        continue
                }
@@ -544,7 +544,7 @@ func (r *HTTPRouteReconciler) processHTTPRoute(tctx 
*provider.TranslateContext,
                        if filter.Type != gatewayv1.HTTPRouteFilterExtensionRef 
|| filter.ExtensionRef == nil {
                                continue
                        }
-                       if filter.ExtensionRef.Kind == "PluginConfig" {
+                       if filter.ExtensionRef.Kind == types.KindPluginConfig {
                                pluginconfig := new(v1alpha1.PluginConfig)
                                if err := r.Get(context.Background(), 
client.ObjectKey{
                                        Namespace: httpRoute.GetNamespace(),
@@ -560,7 +560,7 @@ func (r *HTTPRouteReconciler) processHTTPRoute(tctx 
*provider.TranslateContext,
                        }
                }
                for _, backend := range rule.BackendRefs {
-                       if backend.Kind != nil && *backend.Kind != "Service" {
+                       if backend.Kind != nil && *backend.Kind != 
types.KindService {
                                terror = 
types.NewInvalidKindError(*backend.Kind)
                                continue
                        }
diff --git a/internal/controller/httproutepolicy.go 
b/internal/controller/httproutepolicy.go
index 260b09e5..11484dbd 100644
--- a/internal/controller/httproutepolicy.go
+++ b/internal/controller/httproutepolicy.go
@@ -34,6 +34,7 @@ import (
        
"github.com/apache/apisix-ingress-controller/internal/controller/indexer"
        "github.com/apache/apisix-ingress-controller/internal/controller/status"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/internal/utils"
 )
 
@@ -41,7 +42,7 @@ func (r *HTTPRouteReconciler) processHTTPRoutePolicies(tctx 
*provider.TranslateC
        // list HTTPRoutePolicies, which sectionName is not specified
        var (
                list v1alpha1.HTTPRoutePolicyList
-               key  = indexer.GenIndexKeyWithGK(gatewayv1.GroupName, 
"HTTPRoute", httpRoute.GetNamespace(), httpRoute.GetName())
+               key  = indexer.GenIndexKeyWithGK(gatewayv1.GroupName, 
internaltypes.KindHTTPRoute, httpRoute.GetNamespace(), httpRoute.GetName())
        )
        if err := r.List(context.Background(), &list, 
client.MatchingFields{indexer.PolicyTargetRefs: key}); err != nil {
                return err
@@ -63,7 +64,7 @@ func (r *HTTPRouteReconciler) processHTTPRoutePolicies(tctx 
*provider.TranslateC
 
        var conflicts = make(map[types.NamespacedName]v1alpha1.HTTPRoutePolicy)
        for _, rule := range httpRoute.Spec.Rules {
-               var policies = findPoliciesWhichTargetRefTheRule(rule.Name, 
"HTTPRoute", list)
+               var policies = findPoliciesWhichTargetRefTheRule(rule.Name, 
internaltypes.KindHTTPRoute, list)
                if conflict := checkPoliciesConflict(policies); conflict {
                        for _, policy := range policies {
                                namespacedName := 
types.NamespacedName{Namespace: policy.GetNamespace(), Name: policy.GetName()}
@@ -105,7 +106,7 @@ func (r *HTTPRouteReconciler) processHTTPRoutePolicies(tctx 
*provider.TranslateC
 func (r *HTTPRouteReconciler) updateHTTPRoutePolicyStatusOnDeleting(ctx 
context.Context, nn types.NamespacedName) error {
        var (
                list v1alpha1.HTTPRoutePolicyList
-               key  = indexer.GenIndexKeyWithGK(gatewayv1.GroupName, 
"HTTPRoute", nn.Namespace, nn.Name)
+               key  = indexer.GenIndexKeyWithGK(gatewayv1.GroupName, 
internaltypes.KindHTTPRoute, nn.Namespace, nn.Name)
        )
        if err := r.List(ctx, &list, 
client.MatchingFields{indexer.PolicyTargetRefs: key}); err != nil {
                return err
@@ -137,7 +138,7 @@ func (r *HTTPRouteReconciler) 
updateHTTPRoutePolicyStatusOnDeleting(ctx context.
 func (r *IngressReconciler) processHTTPRoutePolicies(tctx 
*provider.TranslateContext, ingress *networkingv1.Ingress) error {
        var (
                list v1alpha1.HTTPRoutePolicyList
-               key  = indexer.GenIndexKeyWithGK(networkingv1.GroupName, 
"Ingress", ingress.GetNamespace(), ingress.GetName())
+               key  = indexer.GenIndexKeyWithGK(networkingv1.GroupName, 
internaltypes.KindIngress, ingress.GetNamespace(), ingress.GetName())
        )
        if err := r.List(context.Background(), &list, 
client.MatchingFields{indexer.PolicyTargetRefs: key}); err != nil {
                return err
@@ -179,7 +180,7 @@ func (r *IngressReconciler) processHTTPRoutePolicies(tctx 
*provider.TranslateCon
 func (r *IngressReconciler) updateHTTPRoutePolicyStatusOnDeleting(ctx 
context.Context, nn types.NamespacedName) error {
        var (
                list v1alpha1.HTTPRoutePolicyList
-               key  = indexer.GenIndexKeyWithGK(networkingv1.GroupName, 
"Ingress", nn.Namespace, nn.Name)
+               key  = indexer.GenIndexKeyWithGK(networkingv1.GroupName, 
internaltypes.KindIngress, nn.Namespace, nn.Name)
        )
        if err := r.List(ctx, &list, 
client.MatchingFields{indexer.PolicyTargetRefs: key}); err != nil {
                return err
diff --git a/internal/controller/indexer/indexer.go 
b/internal/controller/indexer/indexer.go
index e621ac10..e89a3934 100644
--- a/internal/controller/indexer/indexer.go
+++ b/internal/controller/indexer/indexer.go
@@ -31,6 +31,7 @@ import (
 
        "github.com/apache/apisix-ingress-controller/api/v1alpha1"
        apiv2 "github.com/apache/apisix-ingress-controller/api/v2"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
 )
 
 const (
@@ -431,7 +432,7 @@ func GatewaySecretIndexFunc(rawObj client.Object) (keys 
[]string) {
                        continue
                }
                for _, ref := range listener.TLS.CertificateRefs {
-                       if ref.Kind == nil || *ref.Kind != "Secret" {
+                       if ref.Kind == nil || *ref.Kind != 
internaltypes.KindSecret {
                                continue
                        }
                        namespace := gateway.GetNamespace()
@@ -486,7 +487,7 @@ func HTTPRouteServiceIndexFunc(rawObj client.Object) 
[]string {
        for _, rule := range hr.Spec.Rules {
                for _, backend := range rule.BackendRefs {
                        namespace := hr.GetNamespace()
-                       if backend.Kind != nil && *backend.Kind != "Service" {
+                       if backend.Kind != nil && *backend.Kind != 
internaltypes.KindService {
                                continue
                        }
                        if backend.Namespace != nil {
@@ -620,7 +621,7 @@ func HTTPRouteExtensionIndexFunc(rawObj client.Object) 
[]string {
                        if filter.Type != gatewayv1.HTTPRouteFilterExtensionRef 
|| filter.ExtensionRef == nil {
                                continue
                        }
-                       if filter.ExtensionRef.Kind == "PluginConfig" {
+                       if filter.ExtensionRef.Kind == 
internaltypes.KindPluginConfig {
                                keys = append(keys, 
GenIndexKey(hr.GetNamespace(), string(filter.ExtensionRef.Name)))
                        }
                }
@@ -646,7 +647,7 @@ func GatewayParametersRefIndexFunc(rawObj client.Object) 
[]string {
        gw := rawObj.(*gatewayv1.Gateway)
        if gw.Spec.Infrastructure != nil && 
gw.Spec.Infrastructure.ParametersRef != nil {
                // now we only care about kind: GatewayProxy
-               if gw.Spec.Infrastructure.ParametersRef.Kind == "GatewayProxy" {
+               if gw.Spec.Infrastructure.ParametersRef.Kind == 
internaltypes.KindGatewayProxy {
                        name := gw.Spec.Infrastructure.ParametersRef.Name
                        return []string{GenIndexKey(gw.GetNamespace(), name)}
                }
@@ -676,7 +677,7 @@ func IngressClassParametersRefIndexFunc(rawObj 
client.Object) []string {
        if ingressClass.Spec.Parameters != nil &&
                ingressClass.Spec.Parameters.APIGroup != nil &&
                *ingressClass.Spec.Parameters.APIGroup == 
v1alpha1.GroupVersion.Group &&
-               ingressClass.Spec.Parameters.Kind == "GatewayProxy" {
+               ingressClass.Spec.Parameters.Kind == 
internaltypes.KindGatewayProxy {
                ns := ingressClass.GetNamespace()
                if ingressClass.Spec.Parameters.Namespace != nil {
                        ns = *ingressClass.Spec.Parameters.Namespace
diff --git a/internal/controller/ingress_controller.go 
b/internal/controller/ingress_controller.go
index c86b40c2..8ef3d735 100644
--- a/internal/controller/ingress_controller.go
+++ b/internal/controller/ingress_controller.go
@@ -47,6 +47,7 @@ import (
        "github.com/apache/apisix-ingress-controller/internal/controller/status"
        "github.com/apache/apisix-ingress-controller/internal/manager/readiness"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/internal/utils"
 )
 
@@ -427,7 +428,7 @@ func (r *IngressReconciler) 
listIngressesByHTTPRoutePolicy(ctx context.Context,
 
        var keys = make(map[types.NamespacedName]struct{})
        for _, ref := range httpRoutePolicy.Spec.TargetRefs {
-               if ref.Kind != "Ingress" {
+               if ref.Kind != internaltypes.KindIngress {
                        continue
                }
                key := types.NamespacedName{
diff --git a/internal/controller/policies.go b/internal/controller/policies.go
index c272c71e..f117cdea 100644
--- a/internal/controller/policies.go
+++ b/internal/controller/policies.go
@@ -37,6 +37,7 @@ import (
        
"github.com/apache/apisix-ingress-controller/internal/controller/indexer"
        "github.com/apache/apisix-ingress-controller/internal/controller/status"
        "github.com/apache/apisix-ingress-controller/internal/provider"
+       internaltypes 
"github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/internal/utils"
 )
 
@@ -137,7 +138,7 @@ func ProcessBackendTrafficPolicy(
                        sectionName := targetRef.SectionName
                        key := PolicyTargetKey{
                                NsName:    types.NamespacedName{Namespace: 
p.GetNamespace(), Name: string(targetRef.Name)},
-                               GroupKind: schema.GroupKind{Group: "", Kind: 
"Service"},
+                               GroupKind: schema.GroupKind{Group: "", Kind: 
internaltypes.KindService},
                        }
                        condition := NewPolicyCondition(policy.Generation, 
true, "Policy has been accepted")
                        if sectionName != nil && 
!servicePortNameMap[fmt.Sprintf("%s/%s/%s", policy.Namespace, 
string(targetRef.Name), *sectionName)] {
diff --git a/internal/manager/controllers.go b/internal/manager/controllers.go
index 6c878b21..79886225 100644
--- a/internal/manager/controllers.go
+++ b/internal/manager/controllers.go
@@ -101,20 +101,20 @@ func setupControllers(ctx context.Context, mgr 
manager.Manager, pro provider.Pro
                &controller.GatewayClassReconciler{
                        Client:  mgr.GetClient(),
                        Scheme:  mgr.GetScheme(),
-                       Log:     
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("GatewayClass"),
+                       Log:     
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindGatewayClass),
                        Updater: updater,
                },
                &controller.GatewayReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("Gateway"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindGateway),
                        Provider: pro,
                        Updater:  updater,
                },
                &controller.HTTPRouteReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("HTTPRoute"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindHTTPRoute),
                        Provider: pro,
                        Updater:  updater,
                        Readier:  readier,
@@ -122,7 +122,7 @@ func setupControllers(ctx context.Context, mgr 
manager.Manager, pro provider.Pro
                &controller.IngressReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("Ingress"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindIngress),
                        Provider: pro,
                        Updater:  updater,
                        Readier:  readier,
@@ -130,7 +130,7 @@ func setupControllers(ctx context.Context, mgr 
manager.Manager, pro provider.Pro
                &controller.ConsumerReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("Consumer"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindConsumer),
                        Provider: pro,
                        Updater:  updater,
                        Readier:  readier,
@@ -138,13 +138,13 @@ func setupControllers(ctx context.Context, mgr 
manager.Manager, pro provider.Pro
                &controller.IngressClassReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("IngressClass"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindIngressClass),
                        Provider: pro,
                },
                &controller.ApisixGlobalRuleReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("ApisixGlobalRule"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixGlobalRule),
                        Provider: pro,
                        Updater:  updater,
                        Readier:  readier,
@@ -152,7 +152,7 @@ func setupControllers(ctx context.Context, mgr 
manager.Manager, pro provider.Pro
                &controller.ApisixRouteReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("ApisixRoute"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixRoute),
                        Provider: pro,
                        Updater:  updater,
                        Readier:  readier,
@@ -160,7 +160,7 @@ func setupControllers(ctx context.Context, mgr 
manager.Manager, pro provider.Pro
                &controller.ApisixConsumerReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("ApisixConsumer"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixConsumer),
                        Provider: pro,
                        Updater:  updater,
                        Readier:  readier,
@@ -168,13 +168,13 @@ func setupControllers(ctx context.Context, mgr 
manager.Manager, pro provider.Pro
                &controller.ApisixPluginConfigReconciler{
                        Client:  mgr.GetClient(),
                        Scheme:  mgr.GetScheme(),
-                       Log:     
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("ApisixPluginConfig"),
+                       Log:     
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixPluginConfig),
                        Updater: updater,
                },
                &controller.ApisixTlsReconciler{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("ApisixTls"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixTls),
                        Provider: pro,
                        Updater:  updater,
                        Readier:  readier,
@@ -182,13 +182,13 @@ func setupControllers(ctx context.Context, mgr 
manager.Manager, pro provider.Pro
                &controller.ApisixUpstreamReconciler{
                        Client:  mgr.GetClient(),
                        Scheme:  mgr.GetScheme(),
-                       Log:     
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("ApisixUpstream"),
+                       Log:     
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindApisixUpstream),
                        Updater: updater,
                },
                &controller.GatewayProxyController{
                        Client:   mgr.GetClient(),
                        Scheme:   mgr.GetScheme(),
-                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName("GatewayProxy"),
+                       Log:      
ctrl.LoggerFrom(ctx).WithName("controllers").WithName(types.KindGatewayProxy),
                        Provider: pro,
                },
        }, nil
diff --git a/internal/provider/apisix/provider.go 
b/internal/provider/apisix/provider.go
index ab29dbdf..571c5bcc 100644
--- a/internal/provider/apisix/provider.go
+++ b/internal/provider/apisix/provider.go
@@ -102,31 +102,31 @@ func (d *apisixProvider) Update(ctx context.Context, tctx 
*provider.TranslateCon
        switch t := obj.(type) {
        case *gatewayv1.HTTPRoute:
                result, err = d.translator.TranslateHTTPRoute(tctx, 
t.DeepCopy())
-               resourceTypes = append(resourceTypes, "service")
+               resourceTypes = append(resourceTypes, adctypes.TypeService)
        case *gatewayv1.Gateway:
                result, err = d.translator.TranslateGateway(tctx, t.DeepCopy())
-               resourceTypes = append(resourceTypes, "global_rule", "ssl", 
"plugin_metadata")
+               resourceTypes = append(resourceTypes, adctypes.TypeGlobalRule, 
adctypes.TypeSSL, adctypes.TypePluginMetadata)
        case *networkingv1.Ingress:
                result, err = d.translator.TranslateIngress(tctx, t.DeepCopy())
-               resourceTypes = append(resourceTypes, "service", "ssl")
+               resourceTypes = append(resourceTypes, adctypes.TypeService, 
adctypes.TypeSSL)
        case *v1alpha1.Consumer:
                result, err = d.translator.TranslateConsumerV1alpha1(tctx, 
t.DeepCopy())
-               resourceTypes = append(resourceTypes, "consumer")
+               resourceTypes = append(resourceTypes, adctypes.TypeConsumer)
        case *networkingv1.IngressClass:
                result, err = d.translator.TranslateIngressClass(tctx, 
t.DeepCopy())
-               resourceTypes = append(resourceTypes, "global_rule", 
"plugin_metadata")
+               resourceTypes = append(resourceTypes, adctypes.TypeGlobalRule, 
adctypes.TypePluginMetadata)
        case *apiv2.ApisixRoute:
                result, err = d.translator.TranslateApisixRoute(tctx, 
t.DeepCopy())
-               resourceTypes = append(resourceTypes, "service")
+               resourceTypes = append(resourceTypes, adctypes.TypeService)
        case *apiv2.ApisixGlobalRule:
                result, err = d.translator.TranslateApisixGlobalRule(tctx, 
t.DeepCopy())
-               resourceTypes = append(resourceTypes, "global_rule")
+               resourceTypes = append(resourceTypes, adctypes.TypeGlobalRule)
        case *apiv2.ApisixTls:
                result, err = d.translator.TranslateApisixTls(tctx, 
t.DeepCopy())
-               resourceTypes = append(resourceTypes, "ssl")
+               resourceTypes = append(resourceTypes, adctypes.TypeSSL)
        case *apiv2.ApisixConsumer:
                result, err = d.translator.TranslateApisixConsumer(tctx, 
t.DeepCopy())
-               resourceTypes = append(resourceTypes, "consumer")
+               resourceTypes = append(resourceTypes, adctypes.TypeConsumer)
        case *v1alpha1.GatewayProxy:
                return d.updateConfigForGatewayProxy(tctx, t)
        }
@@ -174,26 +174,26 @@ func (d *apisixProvider) Delete(ctx context.Context, obj 
client.Object) error {
        var labels map[string]string
        switch obj.(type) {
        case *gatewayv1.HTTPRoute, *apiv2.ApisixRoute:
-               resourceTypes = append(resourceTypes, "service")
+               resourceTypes = append(resourceTypes, adctypes.TypeService)
                labels = label.GenLabel(obj)
        case *gatewayv1.Gateway:
                // delete all resources
        case *networkingv1.Ingress:
-               resourceTypes = append(resourceTypes, "service", "ssl")
+               resourceTypes = append(resourceTypes, adctypes.TypeService, 
adctypes.TypeSSL)
                labels = label.GenLabel(obj)
        case *v1alpha1.Consumer:
-               resourceTypes = append(resourceTypes, "consumer")
+               resourceTypes = append(resourceTypes, adctypes.TypeConsumer)
                labels = label.GenLabel(obj)
        case *networkingv1.IngressClass:
                // delete all resources
        case *apiv2.ApisixGlobalRule:
-               resourceTypes = append(resourceTypes, "global_rule")
+               resourceTypes = append(resourceTypes, adctypes.TypeGlobalRule)
                labels = label.GenLabel(obj)
        case *apiv2.ApisixTls:
-               resourceTypes = append(resourceTypes, "ssl")
+               resourceTypes = append(resourceTypes, adctypes.TypeSSL)
                labels = label.GenLabel(obj)
        case *apiv2.ApisixConsumer:
-               resourceTypes = append(resourceTypes, "consumer")
+               resourceTypes = append(resourceTypes, adctypes.TypeConsumer)
                labels = label.GenLabel(obj)
        }
        nnk := utils.NamespacedNameKind(obj)
diff --git a/test/conformance/suite_test.go b/test/conformance/suite_test.go
index 75b45cad..e7ab91b1 100644
--- a/test/conformance/suite_test.go
+++ b/test/conformance/suite_test.go
@@ -31,6 +31,7 @@ import (
        "sigs.k8s.io/controller-runtime/pkg/client"
        gatewayv1 "sigs.k8s.io/gateway-api/apis/v1"
 
+       "github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/test/e2e/framework"
        "github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
 )
@@ -225,7 +226,7 @@ func patchGatewaysForConformanceTest(ctx context.Context, 
k8sClient client.Clien
                        gateway.Spec.Infrastructure = 
&gatewayv1.GatewayInfrastructure{
                                ParametersRef: 
&gatewayv1.LocalParametersReference{
                                        Group: "apisix.apache.org",
-                                       Kind:  "GatewayProxy",
+                                       Kind:  types.KindGatewayProxy,
                                        Name:  "conformance-gateway-proxy",
                                },
                        }
diff --git a/test/e2e/crds/v1alpha1/gatewayproxy.go 
b/test/e2e/crds/v1alpha1/gatewayproxy.go
index 90275f2c..a2d5c233 100644
--- a/test/e2e/crds/v1alpha1/gatewayproxy.go
+++ b/test/e2e/crds/v1alpha1/gatewayproxy.go
@@ -30,6 +30,7 @@ import (
        "k8s.io/apimachinery/pkg/util/wait"
        "k8s.io/utils/ptr"
 
+       apiv2 "github.com/apache/apisix-ingress-controller/api/v2"
        "github.com/apache/apisix-ingress-controller/test/e2e/framework"
        "github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
 )
@@ -167,7 +168,7 @@ spec:
                                Expect(err).NotTo(HaveOccurred(), "forward pod: 
%s", pod.Name)
 
                                err = 
wait.PollUntilContextTimeout(context.Background(), time.Second, 30*time.Second, 
true, func(ctx context.Context) (done bool, err error) {
-                                       resp := scaffold.NewClient("http", 
tunnel.Endpoint()).
+                                       resp := 
scaffold.NewClient(apiv2.SchemeHTTP, tunnel.Endpoint()).
                                                
GET("/get").WithHost("httpbin.org").Expect().Raw()
                                        return resp.StatusCode == http.StatusOK 
&& resp.Header.Get("X-Pod-Hostname") == pod.GetName(), nil
                                })
diff --git a/test/e2e/gatewayapi/controller.go 
b/test/e2e/gatewayapi/controller.go
index 578e8598..817e9e17 100644
--- a/test/e2e/gatewayapi/controller.go
+++ b/test/e2e/gatewayapi/controller.go
@@ -25,6 +25,7 @@ import (
        . "github.com/onsi/gomega"
        "github.com/stretchr/testify/assert"
 
+       "github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
 )
 
@@ -111,7 +112,7 @@ spec:
                time.Sleep(10 * time.Second)
 
                By("check GatewayClass condition")
-               gcyaml, err := s.GetResourceYamlFromNamespace("GatewayClass", 
gatewayClassName, s.Namespace())
+               gcyaml, err := 
s.GetResourceYamlFromNamespace(types.KindGatewayClass, gatewayClassName, 
s.Namespace())
                Expect(err).NotTo(HaveOccurred(), "getting GatewayClass yaml")
                Expect(gcyaml).To(ContainSubstring(`status: "True"`), "checking 
GatewayClass condition status")
                Expect(gcyaml).To(ContainSubstring("message: the gatewayclass 
has been accepted by the apisix-ingress-controller"), "checking GatewayClass 
condition message")
@@ -122,7 +123,7 @@ spec:
                time.Sleep(10 * time.Second)
 
                By("check Gateway condition")
-               gwyaml, err := s.GetResourceYamlFromNamespace("Gateway", 
gatewayName, gatewayName)
+               gwyaml, err := 
s.GetResourceYamlFromNamespace(types.KindGateway, gatewayName, gatewayName)
                Expect(err).NotTo(HaveOccurred(), "getting Gateway yaml")
                Expect(gwyaml).To(ContainSubstring(`status: "True"`), "checking 
Gateway condition status")
                Expect(gwyaml).To(ContainSubstring("message: the gateway has 
been accepted by the apisix-ingress-controller"), "checking Gateway condition 
message")
@@ -163,7 +164,7 @@ spec:
                        beforeEach(s1)
                })
                It("Apply resource ", func() {
-                       ResourceApplied(s1, "HTTPRoute", "httpbin", 
s1.Namespace(), fmt.Sprintf(route1, s1.Namespace()), 1)
+                       ResourceApplied(s1, types.KindHTTPRoute, "httpbin", 
s1.Namespace(), fmt.Sprintf(route1, s1.Namespace()), 1)
 
                        s1.RetryAssertion(func() int {
                                routes, _ := 
s1.DefaultDataplaneResource().Route().List(s1.Context)
@@ -210,7 +211,7 @@ spec:
                        beforeEach(s2)
                })
                It("Apply resource ", func() {
-                       ResourceApplied(s2, "HTTPRoute", "httpbin2", 
s2.Namespace(), fmt.Sprintf(route2, s2.Namespace(), s2.Namespace()), 1)
+                       ResourceApplied(s2, types.KindHTTPRoute, "httpbin2", 
s2.Namespace(), fmt.Sprintf(route2, s2.Namespace(), s2.Namespace()), 1)
                        time.Sleep(5 * time.Second)
                        routes, err := 
s2.DefaultDataplaneResource().Route().List(s2.Context)
                        Expect(err).NotTo(HaveOccurred())
diff --git a/test/e2e/gatewayapi/gatewayproxy.go 
b/test/e2e/gatewayapi/gatewayproxy.go
index 1cad06ea..99283cac 100644
--- a/test/e2e/gatewayapi/gatewayproxy.go
+++ b/test/e2e/gatewayapi/gatewayproxy.go
@@ -24,6 +24,7 @@ import (
        . "github.com/onsi/ginkgo/v2"
        . "github.com/onsi/gomega"
 
+       "github.com/apache/apisix-ingress-controller/internal/types"
        "github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
 )
 
@@ -135,7 +136,7 @@ spec:
                time.Sleep(5 * time.Second)
 
                By("Check GatewayClass condition")
-               gcYaml, err := s.GetResourceYaml("GatewayClass", 
gatewayClassName)
+               gcYaml, err := s.GetResourceYaml(types.KindGatewayClass, 
gatewayClassName)
                Expect(err).NotTo(HaveOccurred(), "getting GatewayClass yaml")
                Expect(gcYaml).To(ContainSubstring(`status: "True"`), "checking 
GatewayClass condition status")
                Expect(gcYaml).To(ContainSubstring("message: the gatewayclass 
has been accepted by the apisix-ingress-controller"), "checking GatewayClass 
condition message")
@@ -151,7 +152,7 @@ spec:
                time.Sleep(5 * time.Second)
 
                By("check Gateway condition")
-               gwyaml, err := s.GetResourceYaml("Gateway", s.Namespace())
+               gwyaml, err := s.GetResourceYaml(types.KindGateway, 
s.Namespace())
                Expect(err).NotTo(HaveOccurred(), "getting Gateway yaml")
                Expect(gwyaml).To(ContainSubstring(`status: "True"`), "checking 
Gateway condition status")
                Expect(gwyaml).To(ContainSubstring("message: the gateway has 
been accepted by the apisix-ingress-controller"), "checking Gateway condition 
message")
@@ -160,7 +161,7 @@ spec:
        Context("Test Gateway with enabled GatewayProxy plugin", func() {
                It("Should apply plugin configuration when enabled", func() {
                        By("Create HTTPRoute for Gateway with GatewayProxy")
-                       s.ResourceApplied("HTTPRoute", "test-route", 
fmt.Sprintf(httpRouteForTest, s.Namespace()), 1)
+                       s.ResourceApplied(types.KindHTTPRoute, "test-route", 
fmt.Sprintf(httpRouteForTest, s.Namespace()), 1)
 
                        By("Check if the plugin is applied")
                        s.RequestAssert(&scaffold.RequestAssert{
@@ -178,7 +179,7 @@ spec:
                        Expect(err).NotTo(HaveOccurred(), "updating 
GatewayProxy with disabled plugin")
 
                        By("Create HTTPRoute for Gateway with GatewayProxy")
-                       s.ResourceApplied("HTTPRoute", "test-route", 
fmt.Sprintf(httpRouteForTest, s.Namespace()), 1)
+                       s.ResourceApplied(types.KindHTTPRoute, "test-route", 
fmt.Sprintf(httpRouteForTest, s.Namespace()), 1)
 
                        By("Check if the plugin is not applied")
                        s.RequestAssert(&scaffold.RequestAssert{
@@ -215,7 +216,7 @@ spec:
                        Expect(err).NotTo(HaveOccurred(), "creating 
GatewayProxy with enabled plugin")
 
                        By("Create HTTPRoute")
-                       s.ResourceApplied("HTTPRoute", "test-route", 
fmt.Sprintf(httpRouteForTest, s.Namespace()), 1)
+                       s.ResourceApplied(types.KindHTTPRoute, "test-route", 
fmt.Sprintf(httpRouteForTest, s.Namespace()), 1)
 
                        s.RequestAssert(&scaffold.RequestAssert{
                                Method: "GET",
@@ -286,7 +287,7 @@ spec:
                        Expect(err).NotTo(HaveOccurred(), "creating 
GatewayProxy with valid provider")
 
                        s.RetryAssertion(func() string {
-                               gpYaml, _ := s.GetResourceYaml("GatewayProxy", 
s.Namespace())
+                               gpYaml, _ := 
s.GetResourceYaml(types.KindGatewayProxy, s.Namespace())
                                return gpYaml
                        }).Should(ContainSubstring(`"type":"ControlPlane"`), 
"checking GatewayProxy is applied")
                })
diff --git a/test/e2e/scaffold/scaffold.go b/test/e2e/scaffold/scaffold.go
index e41aacbb..d96f306b 100644
--- a/test/e2e/scaffold/scaffold.go
+++ b/test/e2e/scaffold/scaffold.go
@@ -35,6 +35,7 @@ import (
        corev1 "k8s.io/api/core/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 
+       apiv2 "github.com/apache/apisix-ingress-controller/api/v2"
        "github.com/apache/apisix-ingress-controller/test/e2e/framework"
 )
 
@@ -175,7 +176,7 @@ func (s *Scaffold) DefaultHTTPBackend() (string, []int32) {
 // NewAPISIXClient creates the default HTTP client.
 func (s *Scaffold) NewAPISIXClient() *httpexpect.Expect {
        u := url.URL{
-               Scheme: "http",
+               Scheme: apiv2.SchemeHTTP,
                Host:   s.apisixTunnels.HTTP.Endpoint(),
        }
        return httpexpect.WithConfig(httpexpect.Config{
@@ -212,7 +213,7 @@ func (s *Scaffold) UpdateNamespace(ns string) {
 // NewAPISIXHttpsClient creates the default HTTPS client.
 func (s *Scaffold) NewAPISIXHttpsClient(host string) *httpexpect.Expect {
        u := url.URL{
-               Scheme: "https",
+               Scheme: apiv2.SchemeHTTPS,
                Host:   s.apisixTunnels.HTTPS.Endpoint(),
        }
        return httpexpect.WithConfig(httpexpect.Config{
@@ -235,7 +236,7 @@ func (s *Scaffold) NewAPISIXHttpsClient(host string) 
*httpexpect.Expect {
 // NewAPISIXClientWithTCPProxy creates the HTTP client but with the TCP proxy 
of APISIX.
 func (s *Scaffold) NewAPISIXClientWithTCPProxy() *httpexpect.Expect {
        u := url.URL{
-               Scheme: "http",
+               Scheme: apiv2.SchemeHTTP,
                Host:   s.apisixTunnels.TCP.Endpoint(),
        }
        return httpexpect.WithConfig(httpexpect.Config{
@@ -341,11 +342,11 @@ func (s *Scaffold) createDataplaneTunnels(
 
        for _, port := range svc.Spec.Ports {
                switch port.Name {
-               case "http":
+               case apiv2.SchemeHTTP:
                        httpPort = int(port.Port)
-               case "https":
+               case apiv2.SchemeHTTPS:
                        httpsPort = int(port.Port)
-               case "tcp":
+               case apiv2.SchemeTCP:
                        tcpPort = int(port.Port)
                }
        }
@@ -392,7 +393,7 @@ func (s *Scaffold) NewAPISIXClientForGateway(identifier 
string) (*httpexpect.Exp
        }
 
        u := url.URL{
-               Scheme: "http",
+               Scheme: apiv2.SchemeHTTP,
                Host:   resources.Tunnels.HTTP.Endpoint(),
        }
        return httpexpect.WithConfig(httpexpect.Config{
@@ -417,7 +418,7 @@ func (s *Scaffold) 
NewAPISIXHttpsClientForGateway(identifier string, host string
        }
 
        u := url.URL{
-               Scheme: "https",
+               Scheme: apiv2.SchemeHTTPS,
                Host:   resources.Tunnels.HTTPS.Endpoint(),
        }
        return httpexpect.WithConfig(httpexpect.Config{


Reply via email to