@@ -154,9 +154,9 @@ def test_sigv4_exporter_export_does_not_add_sigv4_if_not_valid_cw_endpoint(
154154 cert = ANY ,
155155 )
156156
157- # Tests that if the OTLP endpoint is a valid
158- # CW endpoint but no credentials are returned,
159- # SigV4 authentication method is NOT called and is NOT injected into the existing Session headers.
157+ # Tests that if the OTLP endpoint is a valid CW endpoint but no credentials are returned,
158+ # SigV4 authentication method is NOT called and is NOT
159+ # injected into the existing Session headers.
160160 @patch ("botocore.session.Session" )
161161 @patch ("requests.Session" )
162162 @patch ("botocore.auth.SigV4Auth.add_auth" )
@@ -200,9 +200,9 @@ def test_sigv4_exporter_export_does_not_add_sigv4_if_not_valid_credentials(
200200 self .assertNotIn (X_AMZ_DATE_HEADER , actual_headers )
201201 self .assertNotIn (X_AMZ_SECURITY_TOKEN_HEADER , actual_headers )
202202
203- # Tests that if the OTLP endpoint is valid
204- # and credentials are valid, SigV4 authentication method is called and
205- # is injected into the existing Session headers.
203+ # Tests that if the OTLP endpoint is valid and credentials are valid,
204+ # SigV4 authentication method is called and is
205+ # injected into the existing Session headers.
206206 @patch ("botocore.session.Session" )
207207 @patch ("requests.Session" )
208208 @patch ("botocore.auth.SigV4Auth.add_auth" )
0 commit comments