fix some testing.T retry.R mixups (#17600)

Fix some linter warnings before updating the lint-consul-retry code in hashicorp/lint-consul-retry#4
pull/17605/head
R.B. Boyer 2023-06-07 13:53:27 -05:00 committed by GitHub
parent 39d4aaf224
commit 820cdf53da
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
8 changed files with 60 additions and 63 deletions

View File

@ -1822,7 +1822,7 @@ func TestAgent_ReloadDoesNotTriggerWatch(t *testing.T) {
for i := 1; i < 7; i++ { for i := 1; i < 7; i++ {
contents, err := os.ReadFile(tmpFile) contents, err := os.ReadFile(tmpFile)
if err != nil { if err != nil {
t.Fatalf("should be able to read file, but had: %#v", err) r.Fatalf("should be able to read file, but had: %#v", err)
} }
contentsStr = string(contents) contentsStr = string(contents)
if contentsStr != "" { if contentsStr != "" {
@ -1909,14 +1909,14 @@ func TestAgent_ReloadDoesNotTriggerWatch(t *testing.T) {
ensureNothingCritical(r, "red-is-dead") ensureNothingCritical(r, "red-is-dead")
if err := a.reloadConfigInternal(cfg2); err != nil { if err := a.reloadConfigInternal(cfg2); err != nil {
t.Fatalf("got error %v want nil", err) r.Fatalf("got error %v want nil", err)
} }
// We check that reload does not go to critical // We check that reload does not go to critical
ensureNothingCritical(r, "red-is-dead") ensureNothingCritical(r, "red-is-dead")
ensureNothingCritical(r, "testing-agent-reload-001") ensureNothingCritical(r, "testing-agent-reload-001")
require.NoError(t, a.updateTTLCheck(checkID, api.HealthPassing, "testing-agent-reload-002")) require.NoError(r, a.updateTTLCheck(checkID, api.HealthPassing, "testing-agent-reload-002"))
ensureNothingCritical(r, "red-is-dead") ensureNothingCritical(r, "red-is-dead")
}) })
@ -2926,7 +2926,7 @@ func TestAgent_RegisterCheck_ACLDeny(t *testing.T) {
req, _ := http.NewRequest("PUT", "/v1/agent/check/register", jsonReader(nodeCheck)) req, _ := http.NewRequest("PUT", "/v1/agent/check/register", jsonReader(nodeCheck))
resp := httptest.NewRecorder() resp := httptest.NewRecorder()
a.srv.h.ServeHTTP(resp, req) a.srv.h.ServeHTTP(resp, req)
require.Equal(t, http.StatusForbidden, resp.Code) require.Equal(r, http.StatusForbidden, resp.Code)
}) })
}) })
@ -2936,7 +2936,7 @@ func TestAgent_RegisterCheck_ACLDeny(t *testing.T) {
req.Header.Add("X-Consul-Token", svcToken.SecretID) req.Header.Add("X-Consul-Token", svcToken.SecretID)
resp := httptest.NewRecorder() resp := httptest.NewRecorder()
a.srv.h.ServeHTTP(resp, req) a.srv.h.ServeHTTP(resp, req)
require.Equal(t, http.StatusForbidden, resp.Code) require.Equal(r, http.StatusForbidden, resp.Code)
}) })
}) })
@ -2946,7 +2946,7 @@ func TestAgent_RegisterCheck_ACLDeny(t *testing.T) {
req.Header.Add("X-Consul-Token", nodeToken.SecretID) req.Header.Add("X-Consul-Token", nodeToken.SecretID)
resp := httptest.NewRecorder() resp := httptest.NewRecorder()
a.srv.h.ServeHTTP(resp, req) a.srv.h.ServeHTTP(resp, req)
require.Equal(t, http.StatusOK, resp.Code) require.Equal(r, http.StatusOK, resp.Code)
}) })
}) })
@ -2955,7 +2955,7 @@ func TestAgent_RegisterCheck_ACLDeny(t *testing.T) {
req, _ := http.NewRequest("PUT", "/v1/agent/check/register", jsonReader(svcCheck)) req, _ := http.NewRequest("PUT", "/v1/agent/check/register", jsonReader(svcCheck))
resp := httptest.NewRecorder() resp := httptest.NewRecorder()
a.srv.h.ServeHTTP(resp, req) a.srv.h.ServeHTTP(resp, req)
require.Equal(t, http.StatusForbidden, resp.Code) require.Equal(r, http.StatusForbidden, resp.Code)
}) })
}) })
@ -2965,7 +2965,7 @@ func TestAgent_RegisterCheck_ACLDeny(t *testing.T) {
req.Header.Add("X-Consul-Token", nodeToken.SecretID) req.Header.Add("X-Consul-Token", nodeToken.SecretID)
resp := httptest.NewRecorder() resp := httptest.NewRecorder()
a.srv.h.ServeHTTP(resp, req) a.srv.h.ServeHTTP(resp, req)
require.Equal(t, http.StatusForbidden, resp.Code) require.Equal(r, http.StatusForbidden, resp.Code)
}) })
}) })
@ -2975,7 +2975,7 @@ func TestAgent_RegisterCheck_ACLDeny(t *testing.T) {
req.Header.Add("X-Consul-Token", svcToken.SecretID) req.Header.Add("X-Consul-Token", svcToken.SecretID)
resp := httptest.NewRecorder() resp := httptest.NewRecorder()
a.srv.h.ServeHTTP(resp, req) a.srv.h.ServeHTTP(resp, req)
require.Equal(t, http.StatusOK, resp.Code) require.Equal(r, http.StatusOK, resp.Code)
}) })
}) })
} }
@ -5976,17 +5976,17 @@ func TestAgent_Monitor(t *testing.T) {
res := httptest.NewRecorder() res := httptest.NewRecorder()
a.srv.h.ServeHTTP(res, registerReq) a.srv.h.ServeHTTP(res, registerReq)
if http.StatusOK != res.Code { if http.StatusOK != res.Code {
t.Fatalf("expected 200 but got %v", res.Code) r.Fatalf("expected 200 but got %v", res.Code)
} }
// Wait until we have received some type of logging output // Wait until we have received some type of logging output
require.Eventually(t, func() bool { require.Eventually(r, func() bool {
return len(resp.Body.Bytes()) > 0 return len(resp.Body.Bytes()) > 0
}, 3*time.Second, 100*time.Millisecond) }, 3*time.Second, 100*time.Millisecond)
cancelFunc() cancelFunc()
code := <-codeCh code := <-codeCh
require.Equal(t, http.StatusOK, code) require.Equal(r, http.StatusOK, code)
got := resp.Body.String() got := resp.Body.String()
// Only check a substring that we are highly confident in finding // Only check a substring that we are highly confident in finding
@ -6026,11 +6026,11 @@ func TestAgent_Monitor(t *testing.T) {
res := httptest.NewRecorder() res := httptest.NewRecorder()
a.srv.h.ServeHTTP(res, registerReq) a.srv.h.ServeHTTP(res, registerReq)
if http.StatusOK != res.Code { if http.StatusOK != res.Code {
t.Fatalf("expected 200 but got %v", res.Code) r.Fatalf("expected 200 but got %v", res.Code)
} }
// Wait until we have received some type of logging output // Wait until we have received some type of logging output
require.Eventually(t, func() bool { require.Eventually(r, func() bool {
return len(resp.Body.Bytes()) > 0 return len(resp.Body.Bytes()) > 0
}, 3*time.Second, 100*time.Millisecond) }, 3*time.Second, 100*time.Millisecond)
cancelFunc() cancelFunc()
@ -6063,24 +6063,24 @@ func TestAgent_Monitor(t *testing.T) {
res := httptest.NewRecorder() res := httptest.NewRecorder()
a.srv.h.ServeHTTP(res, registerReq) a.srv.h.ServeHTTP(res, registerReq)
if http.StatusOK != res.Code { if http.StatusOK != res.Code {
t.Fatalf("expected 200 but got %v", res.Code) r.Fatalf("expected 200 but got %v", res.Code)
} }
// Wait until we have received some type of logging output // Wait until we have received some type of logging output
require.Eventually(t, func() bool { require.Eventually(r, func() bool {
return len(resp.Body.Bytes()) > 0 return len(resp.Body.Bytes()) > 0
}, 3*time.Second, 100*time.Millisecond) }, 3*time.Second, 100*time.Millisecond)
cancelFunc() cancelFunc()
code := <-codeCh code := <-codeCh
require.Equal(t, http.StatusOK, code) require.Equal(r, http.StatusOK, code)
// Each line is output as a separate JSON object, we grab the first and // Each line is output as a separate JSON object, we grab the first and
// make sure it can be unmarshalled. // make sure it can be unmarshalled.
firstLine := bytes.Split(resp.Body.Bytes(), []byte("\n"))[0] firstLine := bytes.Split(resp.Body.Bytes(), []byte("\n"))[0]
var output map[string]interface{} var output map[string]interface{}
if err := json.Unmarshal(firstLine, &output); err != nil { if err := json.Unmarshal(firstLine, &output); err != nil {
t.Fatalf("err: %v", err) r.Fatalf("err: %v", err)
} }
}) })
}) })
@ -6672,7 +6672,7 @@ func TestAgentConnectCARoots_list(t *testing.T) {
dec := json.NewDecoder(resp.Body) dec := json.NewDecoder(resp.Body)
value := &structs.IndexedCARoots{} value := &structs.IndexedCARoots{}
require.NoError(t, dec.Decode(value)) require.NoError(r, dec.Decode(value))
if ca.ID != value.ActiveRootID { if ca.ID != value.ActiveRootID {
r.Fatalf("%s != %s", ca.ID, value.ActiveRootID) r.Fatalf("%s != %s", ca.ID, value.ActiveRootID)
} }
@ -7080,7 +7080,7 @@ func TestAgentConnectCALeafCert_goodNotLocal(t *testing.T) {
dec := json.NewDecoder(resp.Body) dec := json.NewDecoder(resp.Body)
issued2 := &structs.IssuedCert{} issued2 := &structs.IssuedCert{}
require.NoError(t, dec.Decode(issued2)) require.NoError(r, dec.Decode(issued2))
if issued.CertPEM == issued2.CertPEM { if issued.CertPEM == issued2.CertPEM {
r.Fatalf("leaf has not updated") r.Fatalf("leaf has not updated")
} }
@ -7092,9 +7092,9 @@ func TestAgentConnectCALeafCert_goodNotLocal(t *testing.T) {
} }
// Verify that the cert is signed by the new CA // Verify that the cert is signed by the new CA
requireLeafValidUnderCA(t, issued2, ca) requireLeafValidUnderCA(r, issued2, ca)
require.NotEqual(t, issued, issued2) require.NotEqual(r, issued, issued2)
}) })
} }
} }
@ -7471,11 +7471,11 @@ func TestAgentConnectCALeafCert_secondaryDC_good(t *testing.T) {
// Try and sign again (note no index/wait arg since cache should update in // Try and sign again (note no index/wait arg since cache should update in
// background even if we aren't actively blocking) // background even if we aren't actively blocking)
a2.srv.h.ServeHTTP(resp, req) a2.srv.h.ServeHTTP(resp, req)
require.Equal(t, http.StatusOK, resp.Code) require.Equal(r, http.StatusOK, resp.Code)
dec := json.NewDecoder(resp.Body) dec := json.NewDecoder(resp.Body)
issued2 := &structs.IssuedCert{} issued2 := &structs.IssuedCert{}
require.NoError(t, dec.Decode(issued2)) require.NoError(r, dec.Decode(issued2))
if issued.CertPEM == issued2.CertPEM { if issued.CertPEM == issued2.CertPEM {
r.Fatalf("leaf has not updated") r.Fatalf("leaf has not updated")
} }
@ -7487,9 +7487,9 @@ func TestAgentConnectCALeafCert_secondaryDC_good(t *testing.T) {
} }
// Verify that the cert is signed by the new CA // Verify that the cert is signed by the new CA
requireLeafValidUnderCA(t, issued2, dc1_ca2) requireLeafValidUnderCA(r, issued2, dc1_ca2)
require.NotEqual(t, issued, issued2) require.NotEqual(r, issued, issued2)
}) })
} }
@ -7499,12 +7499,12 @@ func waitForActiveCARoot(t *testing.T, srv *HTTPHandlers, expect *structs.CARoot
resp := httptest.NewRecorder() resp := httptest.NewRecorder()
srv.h.ServeHTTP(resp, req) srv.h.ServeHTTP(resp, req)
if http.StatusOK != resp.Code { if http.StatusOK != resp.Code {
t.Fatalf("expected 200 but got %v", resp.Code) r.Fatalf("expected 200 but got %v", resp.Code)
} }
dec := json.NewDecoder(resp.Body) dec := json.NewDecoder(resp.Body)
roots := &structs.IndexedCARoots{} roots := &structs.IndexedCARoots{}
require.NoError(t, dec.Decode(roots)) require.NoError(r, dec.Decode(roots))
var root *structs.CARoot var root *structs.CARoot
for _, r := range roots.Roots { for _, r := range roots.Roots {

View File

@ -143,7 +143,7 @@ func TestACLEndpoint_ReplicationStatus(t *testing.T) {
retry.Run(t, func(r *retry.R) { retry.Run(t, func(r *retry.R) {
var status structs.ACLReplicationStatus var status structs.ACLReplicationStatus
err := msgpackrpc.CallWithCodec(codec, "ACL.ReplicationStatus", &getR, &status) err := msgpackrpc.CallWithCodec(codec, "ACL.ReplicationStatus", &getR, &status)
require.NoError(t, err) require.NoError(r, err)
require.True(r, status.Enabled) require.True(r, status.Enabled)
require.True(r, status.Running) require.True(r, status.Running)
@ -220,7 +220,7 @@ func TestACLEndpoint_TokenRead(t *testing.T) {
time.Sleep(200 * time.Millisecond) time.Sleep(200 * time.Millisecond)
err := aclEp.TokenRead(&req, &resp) err := aclEp.TokenRead(&req, &resp)
require.Error(r, err) require.Error(r, err)
require.ErrorContains(t, err, "ACL not found") require.ErrorContains(r, err, "ACL not found")
require.Nil(r, resp.Token) require.Nil(r, resp.Token)
}) })
}) })

View File

@ -179,7 +179,7 @@ func TestClient_LANReap(t *testing.T) {
retry.Run(t, func(r *retry.R) { retry.Run(t, func(r *retry.R) {
require.Len(r, c1.LANMembersInAgentPartition(), 1) require.Len(r, c1.LANMembersInAgentPartition(), 1)
server := c1.router.FindLANServer() server := c1.router.FindLANServer()
require.Nil(t, server) require.Nil(r, server)
}) })
} }

View File

@ -95,7 +95,7 @@ func TestRateLimiterCleanup(t *testing.T) {
retry.RunWith(&retry.Timer{Wait: 100 * time.Millisecond, Timeout: 10 * time.Second}, t, func(r *retry.R) { retry.RunWith(&retry.Timer{Wait: 100 * time.Millisecond, Timeout: 10 * time.Second}, t, func(r *retry.R) {
v, ok := limiters.Get(key) v, ok := limiters.Get(key)
require.True(r, ok) require.True(r, ok)
require.NotNil(t, v) require.NotNil(r, v)
}) })
time.Sleep(c.ReconcileCheckInterval) time.Sleep(c.ReconcileCheckInterval)

View File

@ -1539,8 +1539,7 @@ func TestPreparedQuery_Execute(t *testing.T) {
assert.Len(t, reply.Nodes, 0) assert.Len(t, reply.Nodes, 0)
}) })
expectNodes := func(t *testing.T, query *structs.PreparedQueryRequest, reply *structs.PreparedQueryExecuteResponse, n int) { expectNodes := func(t require.TestingT, query *structs.PreparedQueryRequest, reply *structs.PreparedQueryExecuteResponse, n int) {
t.Helper()
assert.Len(t, reply.Nodes, n) assert.Len(t, reply.Nodes, n)
assert.Equal(t, "dc1", reply.Datacenter) assert.Equal(t, "dc1", reply.Datacenter)
assert.Equal(t, 0, reply.Failovers) assert.Equal(t, 0, reply.Failovers)
@ -1548,8 +1547,7 @@ func TestPreparedQuery_Execute(t *testing.T) {
assert.Equal(t, query.Query.DNS, reply.DNS) assert.Equal(t, query.Query.DNS, reply.DNS)
assert.True(t, reply.QueryMeta.KnownLeader) assert.True(t, reply.QueryMeta.KnownLeader)
} }
expectFailoverNodes := func(t *testing.T, query *structs.PreparedQueryRequest, reply *structs.PreparedQueryExecuteResponse, n int) { expectFailoverNodes := func(t require.TestingT, query *structs.PreparedQueryRequest, reply *structs.PreparedQueryExecuteResponse, n int) {
t.Helper()
assert.Len(t, reply.Nodes, n) assert.Len(t, reply.Nodes, n)
assert.Equal(t, "dc2", reply.Datacenter) assert.Equal(t, "dc2", reply.Datacenter)
assert.Equal(t, 1, reply.Failovers) assert.Equal(t, 1, reply.Failovers)
@ -1558,8 +1556,7 @@ func TestPreparedQuery_Execute(t *testing.T) {
assert.True(t, reply.QueryMeta.KnownLeader) assert.True(t, reply.QueryMeta.KnownLeader)
} }
expectFailoverPeerNodes := func(t *testing.T, query *structs.PreparedQueryRequest, reply *structs.PreparedQueryExecuteResponse, n int) { expectFailoverPeerNodes := func(t require.TestingT, query *structs.PreparedQueryRequest, reply *structs.PreparedQueryExecuteResponse, n int) {
t.Helper()
assert.Len(t, reply.Nodes, n) assert.Len(t, reply.Nodes, n)
assert.Equal(t, "", reply.Datacenter) assert.Equal(t, "", reply.Datacenter)
assert.Equal(t, es.peeringServer.acceptingPeerName, reply.PeerName) assert.Equal(t, es.peeringServer.acceptingPeerName, reply.PeerName)
@ -2372,13 +2369,13 @@ func TestPreparedQuery_Execute(t *testing.T) {
} }
var reply structs.PreparedQueryExecuteResponse var reply structs.PreparedQueryExecuteResponse
require.NoError(t, msgpackrpc.CallWithCodec(es.server.codec, "PreparedQuery.Execute", &req, &reply)) require.NoError(r, msgpackrpc.CallWithCodec(es.server.codec, "PreparedQuery.Execute", &req, &reply))
for _, node := range reply.Nodes { for _, node := range reply.Nodes {
assert.NotEqual(t, "node3", node.Node.Node) assert.NotEqual(r, "node3", node.Node.Node)
} }
expectNodes(t, &query, &reply, 9) expectNodes(r, &query, &reply, 9)
}) })
}) })
} }

View File

@ -3189,7 +3189,7 @@ func TestDNS_ServiceLookup_WanTranslation(t *testing.T) {
} }
var out struct{} var out struct{}
require.NoError(t, a2.RPC(context.Background(), "Catalog.Register", args, &out)) require.NoError(r, a2.RPC(context.Background(), "Catalog.Register", args, &out))
}) })
// Look up the SRV record via service and prepared query. // Look up the SRV record via service and prepared query.
@ -3517,11 +3517,11 @@ func TestDNS_CaseInsensitiveServiceLookup(t *testing.T) {
retry.Run(t, func(r *retry.R) { retry.Run(t, func(r *retry.R) {
in, _, err := c.Exchange(m, a.DNSAddr()) in, _, err := c.Exchange(m, a.DNSAddr())
if err != nil { if err != nil {
t.Fatalf("err: %v", err) r.Fatalf("err: %v", err)
} }
if len(in.Answer) != 1 { if len(in.Answer) != 1 {
t.Fatalf("question %v, empty lookup: %#v", question, in) r.Fatalf("question %v, empty lookup: %#v", question, in)
} }
}) })
} }

View File

@ -1048,7 +1048,7 @@ func TestStreamResources_Server_ServiceUpdates(t *testing.T) {
require.Equal(r, mongo.Service.CompoundServiceName().String(), msg.GetResponse().ResourceID) require.Equal(r, mongo.Service.CompoundServiceName().String(), msg.GetResponse().ResourceID)
var nodes pbpeerstream.ExportedService var nodes pbpeerstream.ExportedService
require.NoError(t, msg.GetResponse().Resource.UnmarshalTo(&nodes)) require.NoError(r, msg.GetResponse().Resource.UnmarshalTo(&nodes))
require.Len(r, nodes.Nodes, 1) require.Len(r, nodes.Nodes, 1)
}) })
}) })
@ -1077,12 +1077,12 @@ func TestStreamResources_Server_ServiceUpdates(t *testing.T) {
msg, err := client.RecvWithTimeout(100 * time.Millisecond) msg, err := client.RecvWithTimeout(100 * time.Millisecond)
require.NoError(r, err) require.NoError(r, err)
require.Equal(r, pbpeerstream.TypeURLExportedServiceList, msg.GetResponse().ResourceURL) require.Equal(r, pbpeerstream.TypeURLExportedServiceList, msg.GetResponse().ResourceURL)
require.Equal(t, subExportedServiceList, msg.GetResponse().ResourceID) require.Equal(r, subExportedServiceList, msg.GetResponse().ResourceID)
require.Equal(t, pbpeerstream.Operation_OPERATION_UPSERT, msg.GetResponse().Operation) require.Equal(r, pbpeerstream.Operation_OPERATION_UPSERT, msg.GetResponse().Operation)
var exportedServices pbpeerstream.ExportedServiceList var exportedServices pbpeerstream.ExportedServiceList
require.NoError(t, msg.GetResponse().Resource.UnmarshalTo(&exportedServices)) require.NoError(r, msg.GetResponse().Resource.UnmarshalTo(&exportedServices))
require.Equal(t, []string{structs.ServiceName{Name: "mongo"}.String()}, exportedServices.Services) require.Equal(r, []string{structs.ServiceName{Name: "mongo"}.String()}, exportedServices.Services)
}) })
}) })
@ -1094,12 +1094,12 @@ func TestStreamResources_Server_ServiceUpdates(t *testing.T) {
msg, err := client.RecvWithTimeout(100 * time.Millisecond) msg, err := client.RecvWithTimeout(100 * time.Millisecond)
require.NoError(r, err) require.NoError(r, err)
require.Equal(r, pbpeerstream.TypeURLExportedServiceList, msg.GetResponse().ResourceURL) require.Equal(r, pbpeerstream.TypeURLExportedServiceList, msg.GetResponse().ResourceURL)
require.Equal(t, subExportedServiceList, msg.GetResponse().ResourceID) require.Equal(r, subExportedServiceList, msg.GetResponse().ResourceID)
require.Equal(t, pbpeerstream.Operation_OPERATION_UPSERT, msg.GetResponse().Operation) require.Equal(r, pbpeerstream.Operation_OPERATION_UPSERT, msg.GetResponse().Operation)
var exportedServices pbpeerstream.ExportedServiceList var exportedServices pbpeerstream.ExportedServiceList
require.NoError(t, msg.GetResponse().Resource.UnmarshalTo(&exportedServices)) require.NoError(r, msg.GetResponse().Resource.UnmarshalTo(&exportedServices))
require.Len(t, exportedServices.Services, 0) require.Len(r, exportedServices.Services, 0)
}) })
}) })
} }

View File

@ -1320,13 +1320,13 @@ func TestAgentAntiEntropy_Checks(t *testing.T) {
chk.CreateIndex, chk.ModifyIndex = 0, 0 chk.CreateIndex, chk.ModifyIndex = 0, 0
switch chk.CheckID { switch chk.CheckID {
case "mysql": case "mysql":
require.Equal(t, chk, chk1) require.Equal(r, chk, chk1)
case "redis": case "redis":
require.Equal(t, chk, chk2) require.Equal(r, chk, chk2)
case "web": case "web":
require.Equal(t, chk, chk3) require.Equal(r, chk, chk3)
case "cache": case "cache":
require.Equal(t, chk, chk5) require.Equal(r, chk, chk5)
case "serfHealth": case "serfHealth":
// ignore // ignore
default: default:
@ -1356,9 +1356,9 @@ func TestAgentAntiEntropy_Checks(t *testing.T) {
addrs := services.NodeServices.Node.TaggedAddresses addrs := services.NodeServices.Node.TaggedAddresses
meta := services.NodeServices.Node.Meta meta := services.NodeServices.Node.Meta
delete(meta, structs.MetaSegmentKey) // Added later, not in config. delete(meta, structs.MetaSegmentKey) // Added later, not in config.
assert.Equal(t, a.Config.NodeID, id) assert.Equal(r, a.Config.NodeID, id)
assert.Equal(t, a.Config.TaggedAddresses, addrs) assert.Equal(r, a.Config.TaggedAddresses, addrs)
assert.Equal(t, unNilMap(a.Config.NodeMeta), meta) assert.Equal(r, unNilMap(a.Config.NodeMeta), meta)
} }
}) })
retry.Run(t, func(r *retry.R) { retry.Run(t, func(r *retry.R) {
@ -1385,11 +1385,11 @@ func TestAgentAntiEntropy_Checks(t *testing.T) {
chk.CreateIndex, chk.ModifyIndex = 0, 0 chk.CreateIndex, chk.ModifyIndex = 0, 0
switch chk.CheckID { switch chk.CheckID {
case "mysql": case "mysql":
require.Equal(t, chk1, chk) require.Equal(r, chk1, chk)
case "web": case "web":
require.Equal(t, chk3, chk) require.Equal(r, chk3, chk)
case "cache": case "cache":
require.Equal(t, chk5, chk) require.Equal(r, chk5, chk)
case "serfHealth": case "serfHealth":
// ignore // ignore
default: default: