|
42 | 42 | ".*Error 403.*Permission.*denied on resource.*": "Permission denied on resource.", |
43 | 43 |
|
44 | 44 | // Editing VPC Service Controls is eventually consistent. |
45 | | - ".*Error 403.*Request is prohibited by organization's policy.*vpcServiceControlsUniqueIdentifier.*": "Request is prohibited by organization's policy.", |
| 45 | + ".*Error 403.*Request is prohibited by organization's policy.*vpcServiceControlsUniqueIdentifier.*": "Request is prohibited by organization's policy.", |
| 46 | + ".*Error code 7.*Request is prohibited by organization's policy.*vpcServiceControlsUniqueIdentifier.*": "Request is prohibited by organization's policy.", |
| 47 | + |
| 48 | + // Google Storage Service Agent propagation issue. |
| 49 | + ".*Error 400.*Service account service-.*@gs-project-accounts.iam.gserviceaccount.com does not exist.*": "Google Storage Service Agent propagation issue", |
46 | 50 | } |
47 | 51 | ) |
48 | 52 |
|
@@ -96,7 +100,6 @@ func TestGCF2BigqueryTrigger(t *testing.T) { |
96 | 100 | "adsdatahub.googleapis.com", |
97 | 101 | "aiplatform.googleapis.com", |
98 | 102 | "alloydb.googleapis.com", |
99 | | - "alpha-documentai.googleapis.com", |
100 | 103 | "analyticshub.googleapis.com", |
101 | 104 | "apigee.googleapis.com", |
102 | 105 | "apigeeconnect.googleapis.com", |
@@ -248,7 +251,7 @@ func TestGCF2BigqueryTrigger(t *testing.T) { |
248 | 251 |
|
249 | 252 | // Network test |
250 | 253 | opNet := gcloud.Runf(t, "compute networks describe %s --project=%s", networkName, networkProjectID) |
251 | | - assert.Equal("GLOBAL", opNet.Get("routingConfig.routingMode").String(), fmt.Sprint("Routing Mode should be GLOBAL.")) |
| 254 | + assert.Equal("GLOBAL", opNet.Get("routingConfig.routingMode").String(), "Routing Mode should be GLOBAL.") |
252 | 255 |
|
253 | 256 | // Sub-network test |
254 | 257 | subnetName := bqt.GetStringOutput("service_vpc_subnet_name") |
|
0 commit comments