From 93729a3ee09b8011989b7679b4820d042f79964b Mon Sep 17 00:00:00 2001 From: Phil Adams Date: Thu, 5 Jan 2023 14:08:07 -0600 Subject: [PATCH] fix(VPCInstanceAuthenticator): use correct version string Signed-off-by: Phil Adams --- .../token_managers/vpc_instance_token_manager.py | 4 ++-- test/test_vpc_instance_token_manager.py | 8 ++++---- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/ibm_cloud_sdk_core/token_managers/vpc_instance_token_manager.py b/ibm_cloud_sdk_core/token_managers/vpc_instance_token_manager.py index 44cdd51..50eeb00 100644 --- a/ibm_cloud_sdk_core/token_managers/vpc_instance_token_manager.py +++ b/ibm_cloud_sdk_core/token_managers/vpc_instance_token_manager.py @@ -1,6 +1,6 @@ # coding: utf-8 -# Copyright 2021 IBM All Rights Reserved. +# Copyright 2021, 2023 IBM All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -52,7 +52,7 @@ class VPCInstanceTokenManager(JWTTokenManager): url (str, optional): The VPC Instance Metadata Service's base endpoint URL. """ - METADATA_SERVICE_VERSION = '2021-09-20' + METADATA_SERVICE_VERSION = '2022-03-01' DEFAULT_IMS_ENDPOINT = 'http://169.254.169.254' TOKEN_NAME = 'access_token' diff --git a/test/test_vpc_instance_token_manager.py b/test/test_vpc_instance_token_manager.py index 9549d77..5a7adbb 100644 --- a/test/test_vpc_instance_token_manager.py +++ b/test/test_vpc_instance_token_manager.py @@ -78,7 +78,7 @@ def test_retrieve_instance_identity_token(caplog): assert responses.calls[0].request.headers['Content-Type'] == 'application/json' assert responses.calls[0].request.headers['Accept'] == 'application/json' assert responses.calls[0].request.headers['Metadata-Flavor'] == 'ibm' - assert responses.calls[0].request.params['version'] == '2021-09-20' + assert responses.calls[0].request.params['version'] == '2022-03-01' assert responses.calls[0].request.body == '{"expires_in": 300}' assert ii_token == TEST_TOKEN # Check the logs. @@ -145,7 +145,7 @@ def mock_retrieve_instance_identity_token(): assert responses.calls[0].request.headers['Accept'] == 'application/json' assert responses.calls[0].request.headers['Authorization'] == 'Bearer ' + TEST_TOKEN assert responses.calls[0].request.body == '{"trusted_profile": {"crn": "crn:iam-profile:123"}}' - assert responses.calls[0].request.params['version'] == '2021-09-20' + assert responses.calls[0].request.params['version'] == '2022-03-01' # Check the logs. # pylint: disable=line-too-long assert ( @@ -183,7 +183,7 @@ def mock_retrieve_instance_identity_token(): assert responses.calls[0].request.headers['Accept'] == 'application/json' assert responses.calls[0].request.headers['Authorization'] == 'Bearer ' + TEST_TOKEN assert responses.calls[0].request.body == '{"trusted_profile": {"id": "iam-id-123"}}' - assert responses.calls[0].request.params['version'] == '2021-09-20' + assert responses.calls[0].request.params['version'] == '2022-03-01' # Check the logs. # pylint: disable=line-too-long assert ( @@ -219,7 +219,7 @@ def mock_retrieve_instance_identity_token(): assert responses.calls[0].request.headers['Accept'] == 'application/json' assert responses.calls[0].request.headers['Authorization'] == 'Bearer ' + TEST_TOKEN assert responses.calls[0].request.body is None - assert responses.calls[0].request.params['version'] == '2021-09-20' + assert responses.calls[0].request.params['version'] == '2022-03-01' # Check the logs. # pylint: disable=line-too-long assert (