From 05b5f44ff65985ae1856e274e27936a39619d970 Mon Sep 17 00:00:00 2001 From: JoshVanL Date: Mon, 9 Sep 2019 08:59:34 +0100 Subject: [PATCH] Updates vault certificaterequest controller test Signed-off-by: JoshVanL --- pkg/controller/certificaterequests/vault/vault_test.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkg/controller/certificaterequests/vault/vault_test.go b/pkg/controller/certificaterequests/vault/vault_test.go index a420ff939..1a0827859 100644 --- a/pkg/controller/certificaterequests/vault/vault_test.go +++ b/pkg/controller/certificaterequests/vault/vault_test.go @@ -147,13 +147,13 @@ func TestSign(t *testing.T) { } tests := map[string]testT{ - "no token or app role secret reference should report pending": { + "no token, app role secret or kubernetes auth reference should report pending": { certificateRequest: baseCR.DeepCopy(), builder: &testpkg.Builder{ KubeObjects: []runtime.Object{}, CertManagerObjects: []runtime.Object{baseCR.DeepCopy(), baseIssuer.DeepCopy()}, ExpectedEvents: []string{ - "Normal VaultInitError Failed to initialise vault client for signing: error initializing Vault client tokenSecretRef or appRoleSecretRef not set", + "Normal VaultInitError Failed to initialise vault client for signing: error initializing Vault client: tokenSecretRef, appRoleSecretRef, or Kubernetes auth role not set", }, ExpectedActions: []testpkg.Action{ testpkg.NewAction(coretesting.NewUpdateAction( @@ -164,7 +164,7 @@ func TestSign(t *testing.T) { Type: cmapi.CertificateRequestConditionReady, Status: cmmeta.ConditionFalse, Reason: cmapi.CertificateRequestReasonPending, - Message: "Failed to initialise vault client for signing: error initializing Vault client tokenSecretRef or appRoleSecretRef not set", + Message: "Failed to initialise vault client for signing: error initializing Vault client: tokenSecretRef, appRoleSecretRef, or Kubernetes auth role not set", LastTransitionTime: &metaFixedClockStart, }), ),