@@ -338,7 +338,7 @@ func TestKubeadmConfigReconciler_ReturnEarlyIfClusterInfraNotReady(t *testing.T)
338
338
339
339
expectedResult := reconcile.Result {}
340
340
actualResult , actualError := k .Reconcile (ctx , request )
341
- g .Expect (actualResult ).To (Equal (expectedResult ))
341
+ g .Expect (actualResult ).To (BeComparableTo (expectedResult ))
342
342
g .Expect (actualError ).ToNot (HaveOccurred ())
343
343
assertHasFalseCondition (g , myclient , request , bootstrapv1 .DataSecretAvailableCondition , clusterv1 .ConditionSeverityInfo , bootstrapv1 .WaitingForClusterInfrastructureReason )
344
344
}
@@ -1566,7 +1566,7 @@ func TestKubeadmConfigReconciler_Reconcile_DiscoveryReconcileFailureBehaviors(t
1566
1566
g := NewWithT (t )
1567
1567
1568
1568
res , err := k .reconcileDiscovery (ctx , tc .cluster , tc .config , secret.Certificates {})
1569
- g .Expect (res ).To (Equal (tc .result ))
1569
+ g .Expect (res ).To (BeComparableTo (tc .result ))
1570
1570
if tc .err == nil {
1571
1571
g .Expect (err ).ToNot (HaveOccurred ())
1572
1572
} else {
@@ -2084,7 +2084,7 @@ func TestKubeadmConfigReconciler_ResolveFiles(t *testing.T) {
2084
2084
2085
2085
files , err := k .resolveFiles (ctx , tc .cfg )
2086
2086
g .Expect (err ).ToNot (HaveOccurred ())
2087
- g .Expect (files ).To (Equal (tc .expect ))
2087
+ g .Expect (files ).To (BeComparableTo (tc .expect ))
2088
2088
for _ , file := range tc .cfg .Spec .Files {
2089
2089
if contentFrom [file .Path ] {
2090
2090
g .Expect (file .ContentFrom ).NotTo (BeNil ())
@@ -2211,7 +2211,7 @@ func TestKubeadmConfigReconciler_ResolveUsers(t *testing.T) {
2211
2211
2212
2212
users , err := k .resolveUsers (ctx , tc .cfg )
2213
2213
g .Expect (err ).ToNot (HaveOccurred ())
2214
- g .Expect (users ).To (Equal (tc .expect ))
2214
+ g .Expect (users ).To (BeComparableTo (tc .expect ))
2215
2215
for _ , user := range tc .cfg .Spec .Users {
2216
2216
if passwdFrom [user .Name ] {
2217
2217
g .Expect (user .PasswdFrom ).NotTo (BeNil ())
0 commit comments