Deflake TestImpersonationProxy (especially on EKS).
This test could flake if the load balancer hostname was provisioned but is not yet resolving in DNS from the test process. The fix is to retry this step for up to 5 minutes. Signed-off-by: Matt Moyer <moyerm@vmware.com>
This commit is contained in:
parent
608be8332e
commit
4ebd0f5f12
@ -133,8 +133,14 @@ func TestImpersonationProxy(t *testing.T) { //nolint:gocyclo // yeah, it's compl
|
|||||||
// so it more closely simulates the normal use case, and also because we want this to work on AKS clusters
|
// so it more closely simulates the normal use case, and also because we want this to work on AKS clusters
|
||||||
// which do not allow anonymous requests.
|
// which do not allow anonymous requests.
|
||||||
client := newAnonymousImpersonationProxyClient(impersonationProxyURL, impersonationProxyCACertPEM, "").PinnipedConcierge
|
client := newAnonymousImpersonationProxyClient(impersonationProxyURL, impersonationProxyCACertPEM, "").PinnipedConcierge
|
||||||
|
require.Eventually(t, func() bool {
|
||||||
mostRecentTokenCredentialRequestResponse, err = createTokenCredentialRequest(credentialRequestSpecWithWorkingCredentials, client)
|
mostRecentTokenCredentialRequestResponse, err = createTokenCredentialRequest(credentialRequestSpecWithWorkingCredentials, client)
|
||||||
require.NoError(t, err, library.Sdump(err))
|
if err != nil {
|
||||||
|
t.Logf("failed to make TokenCredentialRequest: %s", library.Sdump(err))
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}, 5*time.Minute, 5*time.Second)
|
||||||
|
|
||||||
require.Nil(t, mostRecentTokenCredentialRequestResponse.Status.Message,
|
require.Nil(t, mostRecentTokenCredentialRequestResponse.Status.Message,
|
||||||
"expected no error message but got: %s", library.Sdump(mostRecentTokenCredentialRequestResponse.Status.Message))
|
"expected no error message but got: %s", library.Sdump(mostRecentTokenCredentialRequestResponse.Status.Message))
|
||||||
|
Loading…
Reference in New Issue
Block a user