mirror of
https://github.com/kemko/nomad.git
synced 2026-01-06 18:35:44 +03:00
e2e: do not assume clean cluster when checking return objects. (#14557)
This commit is contained in:
@@ -100,7 +100,6 @@ func testACLTokenExpiration(t *testing.T) {
|
||||
|
||||
jobListResp, _, err := nomadClient.Jobs().List(&defaultNSQueryMeta)
|
||||
require.NoError(t, err)
|
||||
require.Empty(t, jobListResp)
|
||||
|
||||
// Create an ACL token with the lowest expiry TTL possible, so it will
|
||||
// expire almost immediately.
|
||||
@@ -236,7 +235,6 @@ func testACLTokenRolePolicyAssignment(t *testing.T) {
|
||||
defaultNSQueryMeta := api.QueryOptions{Namespace: "default", AuthToken: aclTokenCreateResp.SecretID}
|
||||
jobListResp, _, err := nomadClient.Jobs().List(&defaultNSQueryMeta)
|
||||
require.NoError(t, err)
|
||||
require.Empty(t, jobListResp)
|
||||
|
||||
nodeStubList, _, err := nomadClient.Nodes().List(&defaultNSQueryMeta)
|
||||
require.ErrorContains(t, err, "Permission denied")
|
||||
@@ -253,7 +251,6 @@ func testACLTokenRolePolicyAssignment(t *testing.T) {
|
||||
// Test that the token can now read the default namespace and node objects.
|
||||
jobListResp, _, err = nomadClient.Jobs().List(&defaultNSQueryMeta)
|
||||
require.NoError(t, err)
|
||||
require.Empty(t, jobListResp)
|
||||
|
||||
nodeStubList, _, err = nomadClient.Nodes().List(&defaultNSQueryMeta)
|
||||
require.NoError(t, err)
|
||||
@@ -301,7 +298,6 @@ func testACLTokenRolePolicyAssignment(t *testing.T) {
|
||||
|
||||
jobListResp, _, err = nomadClient.Jobs().List(&defaultNSQueryMeta)
|
||||
require.NoError(t, err)
|
||||
require.Empty(t, jobListResp)
|
||||
|
||||
nodeStubList, _, err = nomadClient.Nodes().List(&defaultNSQueryMeta)
|
||||
require.NoError(t, err)
|
||||
|
||||
Reference in New Issue
Block a user