From 5a100087900aad02a6a939b36eac59071befc948 Mon Sep 17 00:00:00 2001 From: James Munnelly Date: Mon, 25 Feb 2019 17:49:54 +0000 Subject: [PATCH] Only assert that the not ready condition is set in acme failure case test Signed-off-by: James Munnelly --- test/e2e/suite/issuers/acme/certificate/http01.go | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/test/e2e/suite/issuers/acme/certificate/http01.go b/test/e2e/suite/issuers/acme/certificate/http01.go index e447b6c7a..8b9c7df1a 100644 --- a/test/e2e/suite/issuers/acme/certificate/http01.go +++ b/test/e2e/suite/issuers/acme/certificate/http01.go @@ -197,16 +197,6 @@ var _ = framework.CertManagerDescribe("ACME Certificate (HTTP01)", func() { } Eventually(cert, "30s", "1s").Should(HaveCondition(f, notReadyCondition)) Consistently(cert, "1m", "10s").Should(HaveCondition(f, notReadyCondition)) - - By("Verifying TLS certificate secret does not exist") - d, err := f.KubeClientSet.CoreV1().Secrets(f.Namespace.Name).Get(certificateSecretName, metav1.GetOptions{}) - Expect(err).NotTo(HaveOccurred()) - if len(d.Data["tls.key"]) == 0 { - Fail("expected private key to be generated") - } - if len(d.Data["tls.crt"]) > 0 { - Fail("expected certificate to be empty") - } }) It("should obtain a signed certificate with a single CN from the ACME server when putting an annotation on an ingress resource", func() {