diff --git a/test/integration/controlplane/transformation/kms_transformation_test.go b/test/integration/controlplane/transformation/kms_transformation_test.go index 1170909491a..373137887dd 100644 --- a/test/integration/controlplane/transformation/kms_transformation_test.go +++ b/test/integration/controlplane/transformation/kms_transformation_test.go @@ -890,7 +890,10 @@ func TestEncryptionConfigHotReloadFilePolling(t *testing.T) { } for _, tc := range testCases { + tc := tc t.Run(tc.name, func(t *testing.T) { + t.Parallel() + socketPath := getSocketPath() encryptionConfig := fmt.Sprintf(` kind: EncryptionConfiguration diff --git a/test/integration/controlplane/transformation/kmsv2_transformation_test.go b/test/integration/controlplane/transformation/kmsv2_transformation_test.go index 863c02631ba..313420255d3 100644 --- a/test/integration/controlplane/transformation/kmsv2_transformation_test.go +++ b/test/integration/controlplane/transformation/kmsv2_transformation_test.go @@ -412,6 +412,7 @@ func TestKMSv2ProviderKeyIDStaleness(t *testing.T) { } func testKMSv2ProviderKeyIDStaleness(t *testing.T) { + t.Parallel() socketPath := getSocketPath() encryptionConfig := fmt.Sprintf(` kind: EncryptionConfiguration @@ -1347,6 +1348,7 @@ func TestKMSv2ProviderLegacyData(t *testing.T) { } func testKMSv2ProviderLegacyData(t *testing.T) { + t.Parallel() socketPath := getSocketPath() encryptionConfig := fmt.Sprintf(` kind: EncryptionConfiguration diff --git a/test/integration/controlplane/transformation/secrets_transformation_test.go b/test/integration/controlplane/transformation/secrets_transformation_test.go index 53a62739ae3..a1776a785b8 100644 --- a/test/integration/controlplane/transformation/secrets_transformation_test.go +++ b/test/integration/controlplane/transformation/secrets_transformation_test.go @@ -85,17 +85,20 @@ func TestSecretsShouldBeTransformed(t *testing.T) { // TODO: add secretbox } for _, tt := range testCases { - test, err := newTransformTest(t, tt.transformerConfigContent, false, "", nil) - if err != nil { - t.Fatalf("failed to setup test for envelop %s, error was %v", tt.transformerPrefix, err) - continue - } - test.secret, err = test.createSecret(testSecret, testNamespace) - if err != nil { - t.Fatalf("Failed to create test secret, error: %v", err) - } - test.runResource(test.logger, tt.unSealFunc, tt.transformerPrefix, "", "v1", "secrets", test.secret.Name, test.secret.Namespace) - test.cleanUp() + tt := tt + t.Run(tt.transformerPrefix, func(t *testing.T) { + t.Parallel() + test, err := newTransformTest(t, tt.transformerConfigContent, false, "", nil) + if err != nil { + t.Fatalf("failed to setup test for envelop %s, error was %v", tt.transformerPrefix, err) + } + test.secret, err = test.createSecret(testSecret, testNamespace) + if err != nil { + t.Fatalf("Failed to create test secret, error: %v", err) + } + test.runResource(test.logger, tt.unSealFunc, tt.transformerPrefix, "", "v1", "secrets", test.secret.Name, test.secret.Namespace) + test.cleanUp() + }) } }