From 1d4012cabf717b258daf7b58e4b07e29d5110b4d Mon Sep 17 00:00:00 2001 From: Margo Crawford Date: Wed, 16 Dec 2020 10:17:17 -0800 Subject: [PATCH] jwtcachefiller_test.go: don't assert about time zones in errors Because the library that we are using which returns that error formats the timestamp in localtime, which is LMT when running on a laptop, but is UTC when running in CI. Signed-off-by: Ryan Richard --- .../authenticator/jwtcachefiller/jwtcachefiller_test.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/internal/controller/authenticator/jwtcachefiller/jwtcachefiller_test.go b/internal/controller/authenticator/jwtcachefiller/jwtcachefiller_test.go index 1f2d350f..9cec76e6 100644 --- a/internal/controller/authenticator/jwtcachefiller/jwtcachefiller_test.go +++ b/internal/controller/authenticator/jwtcachefiller/jwtcachefiller_test.go @@ -583,14 +583,14 @@ func testTableForAuthenticateTokenTests( jwtClaims: func(claims *jwt.Claims, _ *interface{}, username *string) { claims.Expiry = jwt.NewNumericDate(time.Date(1, 2, 3, 4, 5, 6, 7, time.UTC)) }, - wantErrorRegexp: `oidc: verify token: oidc: token is expired \(Token Expiry: 0001-02-02 20:12:08 -0752 LMT\)`, + wantErrorRegexp: `oidc: verify token: oidc: token is expired \(Token Expiry: .+`, }, { name: "bad token without exp", jwtClaims: func(claims *jwt.Claims, _ *interface{}, username *string) { claims.Expiry = nil }, - wantErrorRegexp: `oidc: verify token: oidc: token is expired \(Token Expiry: 0001-01-01 00:00:00 \+0000 UTC\)`, + wantErrorRegexp: `oidc: verify token: oidc: token is expired \(Token Expiry: .+`, }, { name: "token does not have username claim",