Skip to content

Commit

Permalink
Add focus
Browse files Browse the repository at this point in the history
Signed-off-by: Parthvi Vala <[email protected]>
  • Loading branch information
valaparthvi committed Jan 27, 2025
1 parent af54ebc commit 257fee0
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion hosted/eks/p1/p1_import_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -183,7 +183,7 @@ var _ = Describe("P1Import", func() {
Expect(cluster.EKSStatus.UpstreamSpec.NodeGroups).To(HaveLen(nodepoolcount + 1))
})

It("Update the cloud creds", func() {
FIt("Update the cloud creds", func() {
testCaseID = 155
updateCloudCredentialsCheck(cluster, ctx.RancherAdminClient)
})
Expand Down
2 changes: 1 addition & 1 deletion hosted/eks/p1/p1_provisioning_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -311,7 +311,7 @@ var _ = Describe("P1Provisioning", func() {
updateTagsAndLabels(cluster, ctx.RancherAdminClient)
})

It("Update the cloud creds", func() {
FIt("Update the cloud creds", func() {
testCaseID = 109
updateCloudCredentialsCheck(cluster, ctx.RancherAdminClient)
})
Expand Down
2 changes: 1 addition & 1 deletion hosted/gke/p1/p1_import_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ var _ = Describe("P1Import", func() {
Expect(err).To(BeNil())
})

It("User should not be able to import cluster with invalid GKE creds in Rancher", func() {
FIt("User should not be able to import cluster with invalid GKE creds in Rancher", func() {
testCaseID = 305

By("creating invalid creds")
Expand Down
4 changes: 2 additions & 2 deletions hosted/gke/p1/p1_provisioning_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ var _ = Describe("P1Provisioning", func() {
Expect(err.Error()).To(ContainSubstring("InvalidFormat"))
})

It("User should not be able to add cluster with invalid GKE creds in Rancher", func() {
FIt("User should not be able to add cluster with invalid GKE creds in Rancher", func() {
testCaseID = 2
By("creating invalid creds")
cloudCredentialConfig := cloudcredentials.CloudCredential{GoogleCredentialConfig: &cloudcredentials.GoogleCredentialConfig{AuthEncodedJSON: "{\"invalid-key\":\"invalid-value\"}"}}
Expand All @@ -67,7 +67,7 @@ var _ = Describe("P1Provisioning", func() {
}, "2m", "3s").Should(BeTrue())
})

It("User should not be able to add a cluster using an expired GKE creds", func() {
FIt("User should not be able to add a cluster using an expired GKE creds", func() {
testCaseID = 6
By("adding the creds")
cloudCredentialConfig := cloudcredentials.CloudCredential{GoogleCredentialConfig: &cloudcredentials.GoogleCredentialConfig{AuthEncodedJSON: os.Getenv("GOOGLE_APPLICATIONS_CREDENTIALS_TEST_CREDS")}}
Expand Down

0 comments on commit 257fee0

Please sign in to comment.