@@ -45,6 +45,7 @@ use mz_frontegg_auth::{
4545use mz_frontegg_mock:: {
4646 FronteggMockServer , models:: ApiToken , models:: TenantApiTokenConfig , models:: UserConfig ,
4747} ;
48+ use mz_ore:: error:: ErrorExt ;
4849use mz_ore:: metrics:: MetricsRegistry ;
4950use mz_ore:: now:: { NowFn , SYSTEM_TIME } ;
5051use mz_ore:: retry:: Retry ;
@@ -1159,7 +1160,10 @@ async fn test_auth_base_require_tls_frontegg() {
11591160 ssl_mode : SslMode :: Require ,
11601161 configure : Box :: new ( |b| Ok ( b. set_verify ( SslVerifyMode :: NONE ) ) ) ,
11611162 assert : Assert :: Err ( Box :: new ( |err| {
1162- assert_contains ! ( err. to_string( ) , "unauthorized login to user 'mz_system'" ) ;
1163+ assert_contains ! (
1164+ err. to_string_with_causes( ) ,
1165+ "unauthorized login to user 'mz_system'"
1166+ ) ;
11631167 } ) ) ,
11641168 } ,
11651169 TestCase :: Http {
@@ -1192,7 +1196,10 @@ async fn test_auth_base_require_tls_frontegg() {
11921196 ssl_mode : SslMode :: Require ,
11931197 configure : Box :: new ( |b| Ok ( b. set_verify ( SslVerifyMode :: NONE ) ) ) ,
11941198 assert : Assert :: Err ( Box :: new ( |err| {
1195- assert_contains ! ( err. to_string( ) , "unauthorized login to user 'mz_system'" ) ;
1199+ assert_contains ! (
1200+ err. to_string_with_causes( ) ,
1201+ "unauthorized login to user 'mz_system'"
1202+ ) ;
11961203 } ) ) ,
11971204 } ,
11981205 TestCase :: Http {
@@ -1226,7 +1233,10 @@ async fn test_auth_base_require_tls_frontegg() {
12261233 ssl_mode : SslMode :: Require ,
12271234 configure : Box :: new ( |b| Ok ( b. set_verify ( SslVerifyMode :: NONE ) ) ) ,
12281235 assert : Assert :: Err ( Box :: new ( |err| {
1229- assert_contains ! ( err. to_string( ) , "unauthorized login to user 'PUBLIC'" ) ;
1236+ assert_contains ! (
1237+ err. to_string_with_causes( ) ,
1238+ "unauthorized login to user 'PUBLIC'"
1239+ ) ;
12301240 } ) ) ,
12311241 } ,
12321242 TestCase :: Http {
@@ -1304,7 +1314,7 @@ async fn test_auth_base_disable_tls() {
13041314 configure : Box :: new ( |_| Ok ( ( ) ) ) ,
13051315 assert : Assert :: Err ( Box :: new ( |err| {
13061316 assert_eq ! (
1307- err. to_string ( ) ,
1317+ err. to_string_with_causes ( ) ,
13081318 "error performing TLS handshake: server does not support TLS" ,
13091319 )
13101320 } ) ) ,
@@ -1331,7 +1341,10 @@ async fn test_auth_base_disable_tls() {
13311341 ssl_mode : SslMode :: Disable ,
13321342 configure : Box :: new ( |_| Ok ( ( ) ) ) ,
13331343 assert : Assert :: DbErr ( Box :: new ( |err| {
1334- assert_contains ! ( err. to_string( ) , "unauthorized login to user 'mz_system'" ) ;
1344+ assert_contains ! (
1345+ err. to_string_with_causes( ) ,
1346+ "unauthorized login to user 'mz_system'"
1347+ ) ;
13351348 } ) ) ,
13361349 } ,
13371350 ] ,
@@ -1451,7 +1464,10 @@ async fn test_auth_base_require_tls() {
14511464 ssl_mode : SslMode :: Prefer ,
14521465 configure : Box :: new ( |b| Ok ( b. set_verify ( SslVerifyMode :: NONE ) ) ) ,
14531466 assert : Assert :: DbErr ( Box :: new ( |err| {
1454- assert_contains ! ( err. to_string( ) , "unauthorized login to user 'mz_system'" ) ;
1467+ assert_contains ! (
1468+ err. to_string_with_causes( ) ,
1469+ "unauthorized login to user 'mz_system'"
1470+ ) ;
14551471 } ) ) ,
14561472 } ,
14571473 ] ,
@@ -1488,7 +1504,10 @@ async fn test_auth_intermediate_ca_no_intermediary() {
14881504 ssl_mode : SslMode :: Require ,
14891505 configure : Box :: new ( |b| b. set_ca_file ( ca. ca_cert_path ( ) ) ) ,
14901506 assert : Assert :: Err ( Box :: new ( |err| {
1491- assert_contains ! ( err. to_string( ) , "unable to get local issuer certificate" ) ;
1507+ assert_contains ! (
1508+ err. to_string_with_causes( ) ,
1509+ "unable to get local issuer certificate"
1510+ ) ;
14921511 } ) ) ,
14931512 } ,
14941513 TestCase :: Http {
0 commit comments