diff --git a/pkg/cmd/attestation/verify/verify_integration_test.go b/pkg/cmd/attestation/verify/verify_integration_test.go index f1437e2a111..70fbff370d9 100644 --- a/pkg/cmd/attestation/verify/verify_integration_test.go +++ b/pkg/cmd/attestation/verify/verify_integration_test.go @@ -71,15 +71,6 @@ func TestVerifyIntegration(t *testing.T) { require.ErrorContains(t, err, "expected SourceRepositoryOwnerURI to be https://github.com/fakeowner, got https://github.com/sigstore") }) - t.Run("with invalid owner and invalid repo", func(t *testing.T) { - opts := publicGoodOpts - opts.Repo = "fakeowner/fakerepo" - - err := runVerify(&opts, logger, apiClient, ociClient, sigstoreVerifier) - require.Error(t, err) - require.ErrorContains(t, err, "expected SourceRepositoryURI to be https://github.com/fakeowner/fakerepo, got https://github.com/sigstore/sigstore-js") - }) - t.Run("with no matching OIDC issuer", func(t *testing.T) { opts := publicGoodOpts opts.OIDCIssuer = "some-other-issuer" diff --git a/pkg/cmd/attestation/verify/verify_test.go b/pkg/cmd/attestation/verify/verify_test.go index 3c94b6bda07..9043298bcbe 100644 --- a/pkg/cmd/attestation/verify/verify_test.go +++ b/pkg/cmd/attestation/verify/verify_test.go @@ -460,7 +460,6 @@ func TestRunVerify(t *testing.T) { }) t.Run("with missing API client", func(t *testing.T) { - //customOpts.BundlePath = "" require.Error(t, runVerify(&publicGoodOpts, logger, nil, ociClient, sigstoreVerifier)) }) @@ -469,7 +468,7 @@ func TestRunVerify(t *testing.T) { customOpts.ArtifactPath = "oci://ghcr.io/github/test" customOpts.BundlePath = "" - require.Nil(t, runVerify(&customOpts, logger, apiClient, ociClient, sigstoreVerifier)) + require.NoError(t, runVerify(&customOpts, logger, apiClient, ociClient, sigstoreVerifier)) }) t.Run("with valid OCI artifact with UseBundleFromRegistry flag", func(t *testing.T) {