From c7fcecb362b6138dbb9ab2bbf4fe1a11f0a86ad5 Mon Sep 17 00:00:00 2001 From: Calvin Leung Huang Date: Fri, 6 Apr 2018 12:24:01 -0400 Subject: [PATCH] Extend the TTL on the token for renewer auth test (#4297) --- api/renewer_integration_test.go | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/api/renewer_integration_test.go b/api/renewer_integration_test.go index e464af49bd..5e2b98996d 100644 --- a/api/renewer_integration_test.go +++ b/api/renewer_integration_test.go @@ -169,7 +169,7 @@ func TestRenewer_Renew(t *testing.T) { secret, err := client.Auth().Token().Create(&api.TokenCreateRequest{ Policies: []string{"default"}, - TTL: "2s", + TTL: "3s", ExplicitMaxTTL: "10s", }) if err != nil { @@ -198,8 +198,8 @@ func TestRenewer_Renew(t *testing.T) { if !renew.Secret.Auth.Renewable { t.Errorf("expected lease to be renewable: %#v", renew) } - if renew.Secret.Auth.LeaseDuration > 2 { - t.Errorf("expected lease to < 2s: %#v", renew) + if renew.Secret.Auth.LeaseDuration > 3 { + t.Errorf("expected lease to < 3s: %#v", renew) } if renew.Secret.Auth.ClientToken == "" { t.Error("expected a client token") @@ -207,7 +207,7 @@ func TestRenewer_Renew(t *testing.T) { if renew.Secret.Auth.Accessor == "" { t.Error("expected an accessor") } - case <-time.After(3 * time.Second): + case <-time.After(5 * time.Second): t.Errorf("no renewal") } @@ -221,7 +221,7 @@ func TestRenewer_Renew(t *testing.T) { break outer case <-v.RenewCh(): continue outer - case <-time.After(3 * time.Second): + case <-time.After(5 * time.Second): t.Errorf("no data") break outer }