diff --git a/test/core/security/credentials_test.cc b/test/core/security/credentials_test.cc index a99cf1d92fb..e7c1cc003db 100644 --- a/test/core/security/credentials_test.cc +++ b/test/core/security/credentials_test.cc @@ -275,7 +275,7 @@ const char invalid_aws_external_account_creds_options_credential_source_invalid_regional_cred_verification_url [] = "{\"environment_id\":\"aws1\"," "\"region_url\":\"https://169.254.169.254:5555/region_url\"," - "\"url\":\"https://169.254.169.254:5555/url_no_role_name\"," + "\"url\":\"https://169.254.169.254:5555/url\"," "\"regional_cred_verification_url\":\"invalid_regional_cred_" "verification_url\"}"; @@ -3832,11 +3832,7 @@ TEST_F(ExternalAccountCredentialsTest, ASSERT_NE(*creds, nullptr); EXPECT_EQ((*creds)->min_security_level(), GRPC_PRIVACY_AND_INTEGRITY); grpc_error_handle expected_error = GRPC_ERROR_CREATE( - "error fetching oauth2 token: " - "Missing role name when retrieving signing keys."); -// FIXME: this was the original expected value, but I think the test -// wasn't actually checking it, so I'm not sure it's right: -// "Creating aws request signer failed."); + "error fetching oauth2 token: Creating aws request signer failed."); auto state = RequestMetadataState::NewInstance(expected_error, {}); HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success, aws_external_account_creds_httpcli_post_success,