You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@atlas.apache.org by sa...@apache.org on 2021/01/28 23:24:19 UTC

[atlas] branch branch-2.0 updated: ATLAS-4107: Atlas not picking the ldap bind password from the correct jceks file #2 Unit test fix

This is an automated email from the ASF dual-hosted git repository.

sarath pushed a commit to branch branch-2.0
in repository https://gitbox.apache.org/repos/asf/atlas.git


The following commit(s) were added to refs/heads/branch-2.0 by this push:
     new 8dd04d2  ATLAS-4107: Atlas not picking the ldap bind password from the correct jceks file #2 Unit test fix
8dd04d2 is described below

commit 8dd04d27e332b882868e3d5b281ff771f4795862
Author: Sarath Subramanian <sa...@apache.org>
AuthorDate: Thu Jan 28 15:23:36 2021 -0800

    ATLAS-4107: Atlas not picking the ldap bind password from the correct jceks file #2 Unit test fix
    
    (cherry picked from commit 39a067a215dc247ff787567e8f25ae52b83e010d)
---
 .../java/org/apache/atlas/web/service/SecureEmbeddedServerTestBase.java | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/webapp/src/test/java/org/apache/atlas/web/service/SecureEmbeddedServerTestBase.java b/webapp/src/test/java/org/apache/atlas/web/service/SecureEmbeddedServerTestBase.java
index 9eff636..57807f3 100755
--- a/webapp/src/test/java/org/apache/atlas/web/service/SecureEmbeddedServerTestBase.java
+++ b/webapp/src/test/java/org/apache/atlas/web/service/SecureEmbeddedServerTestBase.java
@@ -111,7 +111,7 @@ public class SecureEmbeddedServerTestBase {
             Assert.fail("Should have thrown an exception");
         } catch (IOException e) {
             Assert.assertEquals(e.getMessage(),
-                    "No credential provider path configured for storage of certificate store passwords");
+                    "No credential provider path cert.stores.credential.provider.path configured for storage of certificate store passwords");
         } finally {
             if (secureEmbeddedServer != null) {
                 secureEmbeddedServer.server.stop();