// ackMessageId sends an IAMRoleCredentialsAckRequest to the backend func (refreshHandler *refreshCredentialsHandler) ackMessage(ack *ecsacs.IAMRoleCredentialsAckRequest) { err := refreshHandler.acsClient.MakeRequest(ack) if err != nil { seelog.Warnf("Error 'ack'ing request with messageID: %s, error: %v", aws.StringValue(ack.MessageId), err) } seelog.Debugf("Acking credentials message: %s", ack.String()) }
// validateTaskAndCredentials compares a task and a credentials ack object // against expected values. It returns an error if either of the the // comparisons fail func validateTaskAndCredentials(taskCredentialsAck, expectedCredentialsAckForTask *ecsacs.IAMRoleCredentialsAckRequest, addedTask *api.Task, expectedTaskArn string, expectedTaskCredentials credentials.IAMRoleCredentials) error { if !reflect.DeepEqual(taskCredentialsAck, expectedCredentialsAckForTask) { return fmt.Errorf("Mismatch between expected and received credentials ack requests, expected: %s, got: %s", expectedCredentialsAckForTask.String(), taskCredentialsAck.String()) } expectedTask := &api.Task{ Arn: expectedTaskArn, } expectedTask.SetCredentialsId(expectedTaskCredentials.CredentialsId) if !reflect.DeepEqual(addedTask, expectedTask) { return fmt.Errorf("Mismatch between expected and added tasks, expected: %v, added: %v", expectedTask, addedTask) } return nil }