Fix a data race in TestImpersonationProxy.
The `require.Eventually()` function runs the body of the check in a separate goroutine, so it's not safe to use other `require` assertions as we did here. Our `library.RequireEventuallyWithoutError()` function does not spawn a goroutine, so it's safer to use here. Signed-off-by: Matt Moyer <moyerm@vmware.com>
This commit is contained in:
parent
af4cd1b515
commit
6903196c18
@ -1267,9 +1267,9 @@ func TestImpersonationProxy(t *testing.T) { //nolint:gocyclo // yeah, it's compl
|
|||||||
})
|
})
|
||||||
|
|
||||||
// wait until the credential issuer is updated with the new url
|
// wait until the credential issuer is updated with the new url
|
||||||
require.Eventually(t, func() bool {
|
library.RequireEventuallyWithoutError(t, func() (bool, error) {
|
||||||
newImpersonationProxyURL, _ := performImpersonatorDiscovery(ctx, t, env, adminConciergeClient)
|
newImpersonationProxyURL, _ := performImpersonatorDiscovery(ctx, t, env, adminConciergeClient)
|
||||||
return newImpersonationProxyURL == "https://"+clusterIPServiceURL
|
return newImpersonationProxyURL == "https://"+clusterIPServiceURL, nil
|
||||||
}, 30*time.Second, 500*time.Millisecond)
|
}, 30*time.Second, 500*time.Millisecond)
|
||||||
newImpersonationProxyURL, newImpersonationProxyCACertPEM := performImpersonatorDiscovery(ctx, t, env, adminConciergeClient)
|
newImpersonationProxyURL, newImpersonationProxyCACertPEM := performImpersonatorDiscovery(ctx, t, env, adminConciergeClient)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user