Skip to content

Commit 9f4d273

Browse files
committed
Fix typo
1 parent 05ed0ce commit 9f4d273

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

sdk/azidentity/workload_identity_test.go

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -423,11 +423,11 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithOptions(t *testing.T
423423
}
424424
policyFlowCheck := newCustomTokenRequestPolicyFlowCheck()
425425

426-
customTokenEndointServerCalledTimes := new(atomic.Int32)
427-
customTokenEndointServer, caData := startTestTokenEndpointWithCAData(
426+
customTokenEndpointServerCalledTimes := new(atomic.Int32)
427+
customTokenEndpointServer, caData := startTestTokenEndpointWithCAData(
428428
t,
429429
http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
430-
customTokenEndointServerCalledTimes.Add(1)
430+
customTokenEndpointServerCalledTimes.Add(1)
431431

432432
policyFlowCheck.Validate(t, req)
433433

@@ -456,7 +456,7 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithOptions(t *testing.T
456456
TenantID: fakeTenantID,
457457
TokenFilePath: tempFile,
458458
AzureProxy: WorkloadIdentityAzureProxyOptions{
459-
AzureKubernetesTokenProxy: customTokenEndointServer.URL,
459+
AzureKubernetesTokenProxy: customTokenEndpointServer.URL,
460460
AzureKubernetesCAData: caData,
461461
},
462462
})
@@ -465,7 +465,7 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithOptions(t *testing.T
465465

466466
testGetTokenSuccess(t, cred)
467467

468-
require.Equal(t, int32(1), customTokenEndointServerCalledTimes.Load())
468+
require.Equal(t, int32(1), customTokenEndpointServerCalledTimes.Load())
469469
}
470470

471471
func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithCAData(t *testing.T) {
@@ -475,11 +475,11 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithCAData(t *testing.T)
475475
}
476476
policyFlowCheck := newCustomTokenRequestPolicyFlowCheck()
477477

478-
customTokenEndointServerCalledTimes := new(atomic.Int32)
479-
customTokenEndointServer, caData := startTestTokenEndpointWithCAData(
478+
customTokenEndpointServerCalledTimes := new(atomic.Int32)
479+
customTokenEndpointServer, caData := startTestTokenEndpointWithCAData(
480480
t,
481481
http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
482-
customTokenEndointServerCalledTimes.Add(1)
482+
customTokenEndpointServerCalledTimes.Add(1)
483483

484484
policyFlowCheck.Validate(t, req)
485485

@@ -496,7 +496,7 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithCAData(t *testing.T)
496496
}),
497497
)
498498

499-
t.Setenv(customtokenproxy.AzureKubernetesTokenProxy, customTokenEndointServer.URL)
499+
t.Setenv(customtokenproxy.AzureKubernetesTokenProxy, customTokenEndpointServer.URL)
500500
t.Setenv(customtokenproxy.AzureKubernetesCAData, caData)
501501

502502
clientOptions := policy.ClientOptions{
@@ -516,7 +516,7 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithCAData(t *testing.T)
516516

517517
testGetTokenSuccess(t, cred)
518518

519-
require.Equal(t, int32(1), customTokenEndointServerCalledTimes.Load())
519+
require.Equal(t, int32(1), customTokenEndpointServerCalledTimes.Load())
520520
}
521521

522522
func TestWorkloadIdentityCredential_CustomTokenEndpoint_InvalidSettings(t *testing.T) {

0 commit comments

Comments
 (0)