Skip to content

Commit 80c4f81

Browse files
authored
Merge pull request #6723 from medyagh/gh_timeout
add new flag for e2e tests to increase timeout
2 parents 8bf95f9 + f9f5c44 commit 80c4f81

15 files changed

+69
-65
lines changed

.github/workflows/main.yml

+5-5
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ jobs:
9494
chmod a+x e2e-*
9595
chmod a+x minikube-*
9696
START_TIME=$(date -u +%s)
97-
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -expected-default-driver= -test.timeout=70m -test.v -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
97+
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
9898
END_TIME=$(date -u +%s)
9999
TIME_ELAPSED=$(($END_TIME-$START_TIME))
100100
min=$((${TIME_ELAPSED}/60))
@@ -156,7 +156,7 @@ jobs:
156156
chmod a+x e2e-*
157157
chmod a+x minikube-*
158158
START_TIME=$(date -u +%s)
159-
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -expected-default-driver= -test.timeout=70m -test.v -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
159+
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
160160
END_TIME=$(date -u +%s)
161161
TIME_ELAPSED=$(($END_TIME-$START_TIME))
162162
min=$((${TIME_ELAPSED}/60))
@@ -218,7 +218,7 @@ jobs:
218218
chmod a+x e2e-*
219219
chmod a+x minikube-*
220220
START_TIME=$(date -u +%s)
221-
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -expected-default-driver= -test.timeout=70m -test.v -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
221+
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--vm-driver=none -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
222222
END_TIME=$(date -u +%s)
223223
TIME_ELAPSED=$(($END_TIME-$START_TIME))
224224
min=$((${TIME_ELAPSED}/60))
@@ -280,7 +280,7 @@ jobs:
280280
chmod a+x e2e-*
281281
chmod a+x minikube-*
282282
START_TIME=$(date -u +%s)
283-
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -expected-default-driver= -test.timeout=70m -test.v -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
283+
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--vm-driver=none -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
284284
END_TIME=$(date -u +%s)
285285
TIME_ELAPSED=$(($END_TIME-$START_TIME))
286286
min=$((${TIME_ELAPSED}/60))
@@ -353,7 +353,7 @@ jobs:
353353
chmod a+x e2e-*
354354
chmod a+x minikube-*
355355
START_TIME=$(date -u +%s)
356-
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome ./e2e-linux-amd64 -minikube-start-args=--vm-driver=docker -expected-default-driver= -test.timeout=70m -test.v -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
356+
KUBECONFIG=$(pwd)/testhome/kubeconfig MINIKUBE_HOME=$(pwd)/testhome sudo -E ./e2e-linux-amd64 -minikube-start-args=--vm-driver=podman -test.timeout=70m -test.v -timeout-multiplier=3 -binary=./minikube-linux-amd64 2>&1 | tee ./report/testout.txt
357357
END_TIME=$(date -u +%s)
358358
TIME_ELAPSED=$(($END_TIME-$START_TIME))
359359
min=$((${TIME_ELAPSED}/60))

test/integration/aaa_download_only_test.go

+1-2
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,6 @@ import (
2828
"runtime"
2929
"strings"
3030
"testing"
31-
"time"
3231

3332
"k8s.io/minikube/pkg/minikube/bootstrapper/images"
3433
"k8s.io/minikube/pkg/minikube/config"
@@ -38,7 +37,7 @@ import (
3837

3938
func TestDownloadOnly(t *testing.T) {
4039
profile := UniqueProfileName("download")
41-
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Minute)
40+
ctx, cancel := context.WithTimeout(context.Background(), Minutes(15))
4241
defer Cleanup(t, profile, cancel)
4342

4443
// Stores the startup run result for later error messages

test/integration/aab_offline_test.go

+1-2
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ import (
2424
"os"
2525
"os/exec"
2626
"testing"
27-
"time"
2827
)
2928

3029
func TestOffline(t *testing.T) {
@@ -39,7 +38,7 @@ func TestOffline(t *testing.T) {
3938
}
4039

4140
profile := UniqueProfileName(fmt.Sprintf("offline-%s", runtime))
42-
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Minute)
41+
ctx, cancel := context.WithTimeout(context.Background(), Minutes(15))
4342
defer CleanupWithLogs(t, profile, cancel)
4443

4544
startArgs := []string{"start", "-p", profile, "--alsologtostderr", "-v=1", "--wait=true", "--container-runtime", runtime}

test/integration/addons_test.go

+13-13
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ import (
3737
// TestAddons tests addons that require no special environment -- in parallel
3838
func TestAddons(t *testing.T) {
3939
profile := UniqueProfileName("addons")
40-
ctx, cancel := context.WithTimeout(context.Background(), 40*time.Minute)
40+
ctx, cancel := context.WithTimeout(context.Background(), Minutes(40))
4141
defer CleanupWithLogs(t, profile, cancel)
4242

4343
args := append([]string{"start", "-p", profile, "--wait=false", "--memory=2600", "--alsologtostderr", "-v=1", "--addons=ingress", "--addons=registry", "--addons=metrics-server"}, StartArgs()...)
@@ -90,10 +90,10 @@ func validateIngressAddon(ctx context.Context, t *testing.T, profile string) {
9090
t.Fatalf("kubernetes client: %v", client)
9191
}
9292

93-
if err := kapi.WaitForDeploymentToStabilize(client, "kube-system", "nginx-ingress-controller", 6*time.Minute); err != nil {
93+
if err := kapi.WaitForDeploymentToStabilize(client, "kube-system", "nginx-ingress-controller", Minutes(6)); err != nil {
9494
t.Errorf("waiting for ingress-controller deployment to stabilize: %v", err)
9595
}
96-
if _, err := PodWait(ctx, t, profile, "kube-system", "app.kubernetes.io/name=nginx-ingress-controller", 12*time.Minute); err != nil {
96+
if _, err := PodWait(ctx, t, profile, "kube-system", "app.kubernetes.io/name=nginx-ingress-controller", Minutes(12)); err != nil {
9797
t.Fatalf("wait: %v", err)
9898
}
9999

@@ -106,10 +106,10 @@ func validateIngressAddon(ctx context.Context, t *testing.T, profile string) {
106106
t.Errorf("%s failed: %v", rr.Args, err)
107107
}
108108

109-
if _, err := PodWait(ctx, t, profile, "default", "run=nginx", 4*time.Minute); err != nil {
109+
if _, err := PodWait(ctx, t, profile, "default", "run=nginx", Minutes(4)); err != nil {
110110
t.Fatalf("wait: %v", err)
111111
}
112-
if err := kapi.WaitForService(client, "default", "nginx", true, time.Millisecond*500, time.Minute*10); err != nil {
112+
if err := kapi.WaitForService(client, "default", "nginx", true, time.Millisecond*500, Minutes(10)); err != nil {
113113
t.Errorf("Error waiting for nginx service to be up")
114114
}
115115

@@ -128,7 +128,7 @@ func validateIngressAddon(ctx context.Context, t *testing.T, profile string) {
128128
return nil
129129
}
130130

131-
if err := retry.Expo(checkIngress, 500*time.Millisecond, time.Minute); err != nil {
131+
if err := retry.Expo(checkIngress, 500*time.Millisecond, Minutes(1)); err != nil {
132132
t.Errorf("ingress never responded as expected on 127.0.0.1:80: %v", err)
133133
}
134134

@@ -145,15 +145,15 @@ func validateRegistryAddon(ctx context.Context, t *testing.T, profile string) {
145145
}
146146

147147
start := time.Now()
148-
if err := kapi.WaitForRCToStabilize(client, "kube-system", "registry", 6*time.Minute); err != nil {
148+
if err := kapi.WaitForRCToStabilize(client, "kube-system", "registry", Minutes(6)); err != nil {
149149
t.Errorf("waiting for registry replicacontroller to stabilize: %v", err)
150150
}
151151
t.Logf("registry stabilized in %s", time.Since(start))
152152

153-
if _, err := PodWait(ctx, t, profile, "kube-system", "actual-registry=true", 6*time.Minute); err != nil {
153+
if _, err := PodWait(ctx, t, profile, "kube-system", "actual-registry=true", Minutes(6)); err != nil {
154154
t.Fatalf("wait: %v", err)
155155
}
156-
if _, err := PodWait(ctx, t, profile, "kube-system", "registry-proxy=true", 10*time.Minute); err != nil {
156+
if _, err := PodWait(ctx, t, profile, "kube-system", "registry-proxy=true", Minutes(10)); err != nil {
157157
t.Fatalf("wait: %v", err)
158158
}
159159

@@ -198,7 +198,7 @@ func validateRegistryAddon(ctx context.Context, t *testing.T, profile string) {
198198
return nil
199199
}
200200

201-
if err := retry.Expo(checkExternalAccess, 500*time.Millisecond, 2*time.Minute); err != nil {
201+
if err := retry.Expo(checkExternalAccess, 500*time.Millisecond, Minutes(2)); err != nil {
202202
t.Errorf(err.Error())
203203
}
204204

@@ -215,12 +215,12 @@ func validateMetricsServerAddon(ctx context.Context, t *testing.T, profile strin
215215
}
216216

217217
start := time.Now()
218-
if err := kapi.WaitForDeploymentToStabilize(client, "kube-system", "metrics-server", 6*time.Minute); err != nil {
218+
if err := kapi.WaitForDeploymentToStabilize(client, "kube-system", "metrics-server", Minutes(6)); err != nil {
219219
t.Errorf("waiting for metrics-server deployment to stabilize: %v", err)
220220
}
221221
t.Logf("metrics-server stabilized in %s", time.Since(start))
222222

223-
if _, err := PodWait(ctx, t, profile, "kube-system", "k8s-app=metrics-server", 6*time.Minute); err != nil {
223+
if _, err := PodWait(ctx, t, profile, "kube-system", "k8s-app=metrics-server", Minutes(6)); err != nil {
224224
t.Fatalf("wait: %v", err)
225225
}
226226

@@ -240,7 +240,7 @@ func validateMetricsServerAddon(ctx context.Context, t *testing.T, profile strin
240240
}
241241

242242
// metrics-server takes some time to be able to collect metrics
243-
if err := retry.Expo(checkMetricsServer, time.Minute, 5*time.Minute); err != nil {
243+
if err := retry.Expo(checkMetricsServer, Seconds(13), Minutes(6)); err != nil {
244244
t.Errorf(err.Error())
245245
}
246246

test/integration/docker_test.go

+1-2
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ import (
2323
"os/exec"
2424
"strings"
2525
"testing"
26-
"time"
2726
)
2827

2928
func TestDockerFlags(t *testing.T) {
@@ -33,7 +32,7 @@ func TestDockerFlags(t *testing.T) {
3332
MaybeParallel(t)
3433

3534
profile := UniqueProfileName("docker-flags")
36-
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Minute)
35+
ctx, cancel := context.WithTimeout(context.Background(), Minutes(30))
3736
defer CleanupWithLogs(t, profile, cancel)
3837

3938
// Use the most verbose logging for the simplest test. If it fails, something is very wrong.

test/integration/fn_mount_cmd.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ func validateMountCmd(ctx context.Context, t *testing.T, profile string) {
5656
t.Fatalf("Unexpected error while creating tempDir: %v", err)
5757
}
5858

59-
ctx, cancel := context.WithTimeout(ctx, 10*time.Minute)
59+
ctx, cancel := context.WithTimeout(ctx, Minutes(10))
6060

6161
args := []string{"mount", "-p", profile, fmt.Sprintf("%s:%s", tempDir, guestMount), "--alsologtostderr", "-v=1"}
6262
ss, err := Start(t, exec.CommandContext(ctx, Target(), args...))
@@ -139,7 +139,7 @@ func validateMountCmd(ctx context.Context, t *testing.T, profile string) {
139139
t.Fatalf("%s failed: %v", rr.Args, err)
140140
}
141141

142-
if _, err := PodWait(ctx, t, profile, "default", "integration-test=busybox-mount", 4*time.Minute); err != nil {
142+
if _, err := PodWait(ctx, t, profile, "default", "integration-test=busybox-mount", Minutes(4)); err != nil {
143143
t.Fatalf("wait: %v", err)
144144
}
145145

test/integration/fn_pvc.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -34,10 +34,10 @@ import (
3434
)
3535

3636
func validatePersistentVolumeClaim(ctx context.Context, t *testing.T, profile string) {
37-
ctx, cancel := context.WithTimeout(ctx, 10*time.Minute)
37+
ctx, cancel := context.WithTimeout(ctx, Minutes(10))
3838
defer cancel()
3939

40-
if _, err := PodWait(ctx, t, profile, "kube-system", "integration-test=storage-provisioner", 4*time.Minute); err != nil {
40+
if _, err := PodWait(ctx, t, profile, "kube-system", "integration-test=storage-provisioner", Minutes(4)); err != nil {
4141
t.Fatalf("wait: %v", err)
4242
}
4343

@@ -83,7 +83,7 @@ func validatePersistentVolumeClaim(ctx context.Context, t *testing.T, profile st
8383
return fmt.Errorf("testpvc phase = %q, want %q (msg=%+v)", pvc.Status.Phase, "Bound", pvc)
8484
}
8585

86-
if err := retry.Expo(checkStoragePhase, 2*time.Second, 4*time.Minute); err != nil {
86+
if err := retry.Expo(checkStoragePhase, 2*time.Second, Minutes(4)); err != nil {
8787
t.Fatalf("PV Creation failed with error: %v", err)
8888
}
8989
}

test/integration/fn_tunnel_cmd.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ import (
3838
)
3939

4040
func validateTunnelCmd(ctx context.Context, t *testing.T, profile string) {
41-
ctx, cancel := context.WithTimeout(ctx, 20*time.Minute)
41+
ctx, cancel := context.WithTimeout(ctx, Minutes(20))
4242
defer cancel()
4343

4444
if runtime.GOOS != "windows" {
@@ -71,17 +71,17 @@ func validateTunnelCmd(ctx context.Context, t *testing.T, profile string) {
7171
if err != nil {
7272
t.Fatalf("%s failed: %v", rr.Args, err)
7373
}
74-
if _, err := PodWait(ctx, t, profile, "default", "run=nginx-svc", 4*time.Minute); err != nil {
74+
if _, err := PodWait(ctx, t, profile, "default", "run=nginx-svc", Minutes(4)); err != nil {
7575
t.Fatalf("wait: %v", err)
7676
}
7777

78-
if err := kapi.WaitForService(client, "default", "nginx-svc", true, 1*time.Second, 2*time.Minute); err != nil {
78+
if err := kapi.WaitForService(client, "default", "nginx-svc", true, 1*time.Second, Minutes(2)); err != nil {
7979
t.Fatal(errors.Wrap(err, "Error waiting for nginx service to be up"))
8080
}
8181

8282
// Wait until the nginx-svc has a loadbalancer ingress IP
8383
nginxIP := ""
84-
err = wait.PollImmediate(1*time.Second, 3*time.Minute, func() (bool, error) {
84+
err = wait.PollImmediate(1*time.Second, Minutes(3), func() (bool, error) {
8585
rr, err := Run(t, exec.CommandContext(ctx, "kubectl", "--context", profile, "get", "svc", "nginx-svc", "-o", "jsonpath={.status.loadBalancer.ingress[0].ip}"))
8686
if err != nil {
8787
return false, err
@@ -119,7 +119,7 @@ func validateTunnelCmd(ctx context.Context, t *testing.T, profile string) {
119119
}
120120
return nil
121121
}
122-
if err = retry.Expo(fetch, time.Millisecond*500, 2*time.Minute, 6); err != nil {
122+
if err = retry.Expo(fetch, time.Millisecond*500, Minutes(2), 6); err != nil {
123123
t.Errorf("failed to contact nginx at %s: %v", nginxIP, err)
124124
}
125125

test/integration/functional_test.go

+10-10
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ type validateFunc func(context.Context, *testing.T, string)
5555
func TestFunctional(t *testing.T) {
5656

5757
profile := UniqueProfileName("functional")
58-
ctx, cancel := context.WithTimeout(context.Background(), 40*time.Minute)
58+
ctx, cancel := context.WithTimeout(context.Background(), Minutes(40))
5959
defer func() {
6060
p := localSyncTestPath()
6161
if err := os.Remove(p); err != nil {
@@ -125,7 +125,7 @@ func TestFunctional(t *testing.T) {
125125

126126
// check functionality of minikube after evaling docker-env
127127
func validateDockerEnv(ctx context.Context, t *testing.T, profile string) {
128-
mctx, cancel := context.WithTimeout(ctx, 13*time.Second)
128+
mctx, cancel := context.WithTimeout(ctx, Seconds(13))
129129
defer cancel()
130130
// we should be able to get minikube status with a bash which evaled docker-env
131131
c := exec.CommandContext(mctx, "/bin/bash", "-c", "eval $("+Target()+" -p "+profile+" docker-env) && "+Target()+" status -p "+profile)
@@ -137,7 +137,7 @@ func validateDockerEnv(ctx context.Context, t *testing.T, profile string) {
137137
t.Fatalf("Expected status output to include 'Running' after eval docker-env but got \n%s", rr.Output())
138138
}
139139

140-
mctx, cancel = context.WithTimeout(ctx, 13*time.Second)
140+
mctx, cancel = context.WithTimeout(ctx, Seconds(13))
141141
defer cancel()
142142
// do a eval $(minikube -p profile docker-env) and check if we are point to docker inside minikube
143143
c = exec.CommandContext(mctx, "/bin/bash", "-c", "eval $("+Target()+" -p "+profile+" docker-env) && docker images")
@@ -294,7 +294,7 @@ func validateDashboardCmd(ctx context.Context, t *testing.T, profile string) {
294294
}()
295295

296296
start := time.Now()
297-
s, err := ReadLineWithTimeout(ss.Stdout, 300*time.Second)
297+
s, err := ReadLineWithTimeout(ss.Stdout, Seconds(300))
298298
if err != nil {
299299
if runtime.GOOS == "windows" {
300300
t.Skipf("failed to read url within %s: %v\noutput: %q\n", time.Since(start), err, s)
@@ -327,7 +327,7 @@ func validateDNS(ctx context.Context, t *testing.T, profile string) {
327327
t.Fatalf("%s failed: %v", rr.Args, err)
328328
}
329329

330-
names, err := PodWait(ctx, t, profile, "default", "integration-test=busybox", 5*time.Minute)
330+
names, err := PodWait(ctx, t, profile, "default", "integration-test=busybox", Minutes(4))
331331
if err != nil {
332332
t.Fatalf("wait: %v", err)
333333
}
@@ -338,7 +338,7 @@ func validateDNS(ctx context.Context, t *testing.T, profile string) {
338338
}
339339

340340
// If the coredns process was stable, this retry wouldn't be necessary.
341-
if err = retry.Expo(nslookup, 1*time.Second, 1*time.Minute); err != nil {
341+
if err = retry.Expo(nslookup, 1*time.Second, Minutes(1)); err != nil {
342342
t.Errorf("nslookup failing: %v", err)
343343
}
344344

@@ -351,7 +351,7 @@ func validateDNS(ctx context.Context, t *testing.T, profile string) {
351351
// validateDryRun asserts that the dry-run mode quickly exits with the right code
352352
func validateDryRun(ctx context.Context, t *testing.T, profile string) {
353353
// dry-run mode should always be able to finish quickly (<5s)
354-
mctx, cancel := context.WithTimeout(ctx, 5*time.Second)
354+
mctx, cancel := context.WithTimeout(ctx, Seconds(5))
355355
defer cancel()
356356

357357
// Too little memory!
@@ -364,7 +364,7 @@ func validateDryRun(ctx context.Context, t *testing.T, profile string) {
364364
t.Errorf("dry-run(250MB) exit code = %d, wanted = %d: %v", rr.ExitCode, wantCode, err)
365365
}
366366

367-
dctx, cancel := context.WithTimeout(ctx, 5*time.Second)
367+
dctx, cancel := context.WithTimeout(ctx, Seconds(5))
368368
defer cancel()
369369
startArgs = append([]string{"start", "-p", profile, "--dry-run", "--alsologtostderr", "-v=1"}, StartArgs()...)
370370
c = exec.CommandContext(dctx, Target(), startArgs...)
@@ -580,7 +580,7 @@ func validateServiceCmd(ctx context.Context, t *testing.T, profile string) {
580580
t.Logf("%s failed: %v (may not be an error)", rr.Args, err)
581581
}
582582

583-
if _, err := PodWait(ctx, t, profile, "default", "app=hello-node", 10*time.Minute); err != nil {
583+
if _, err := PodWait(ctx, t, profile, "default", "app=hello-node", Minutes(10)); err != nil {
584584
t.Fatalf("wait: %v", err)
585585
}
586586

@@ -691,7 +691,7 @@ func validateMySQL(ctx context.Context, t *testing.T, profile string) {
691691
t.Fatalf("%s failed: %v", rr.Args, err)
692692
}
693693

694-
names, err := PodWait(ctx, t, profile, "default", "app=mysql", 10*time.Minute)
694+
names, err := PodWait(ctx, t, profile, "default", "app=mysql", Minutes(10))
695695
if err != nil {
696696
t.Fatalf("podwait: %v", err)
697697
}

test/integration/guest_env_test.go

+1-2
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ import (
2323
"fmt"
2424
"os/exec"
2525
"testing"
26-
"time"
2726

2827
"k8s.io/minikube/pkg/minikube/vmpath"
2928
)
@@ -32,7 +31,7 @@ func TestGuestEnvironment(t *testing.T) {
3231
MaybeParallel(t)
3332

3433
profile := UniqueProfileName("guest")
35-
ctx, cancel := context.WithTimeout(context.Background(), 15*time.Minute)
34+
ctx, cancel := context.WithTimeout(context.Background(), Minutes(15))
3635
defer CleanupWithLogs(t, profile, cancel)
3736

3837
args := append([]string{"start", "-p", profile, "--install-addons=false", "--wait=false"}, StartArgs()...)

0 commit comments

Comments
 (0)