pull/37510/head
Mark D. Roth 6 months ago
parent 9dcdcbecbe
commit a90942c0e4
  1. 8
      test/core/security/credentials_test.cc

@ -275,7 +275,7 @@ const char
invalid_aws_external_account_creds_options_credential_source_invalid_regional_cred_verification_url
[] = "{\"environment_id\":\"aws1\","
"\"region_url\":\"https://169.254.169.254:5555/region_url\","
"\"url\":\"https://169.254.169.254:5555/url_no_role_name\","
"\"url\":\"https://169.254.169.254:5555/url\","
"\"regional_cred_verification_url\":\"invalid_regional_cred_"
"verification_url\"}";
@ -3832,11 +3832,7 @@ TEST_F(ExternalAccountCredentialsTest,
ASSERT_NE(*creds, nullptr);
EXPECT_EQ((*creds)->min_security_level(), GRPC_PRIVACY_AND_INTEGRITY);
grpc_error_handle expected_error = GRPC_ERROR_CREATE(
"error fetching oauth2 token: "
"Missing role name when retrieving signing keys.");
// FIXME: this was the original expected value, but I think the test
// wasn't actually checking it, so I'm not sure it's right:
// "Creating aws request signer failed.");
"error fetching oauth2 token: Creating aws request signer failed.");
auto state = RequestMetadataState::NewInstance(expected_error, {});
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
aws_external_account_creds_httpcli_post_success,

Loading…
Cancel
Save