@@ -21,15 +21,21 @@ SecretAccessKey=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
2121Token=AQoDYXdzEJr...<remainder of security token>
2222```
2323
24- If the driver supports user provided custom AWS credential providers, then the driver MUST also test the above scenarios
25- 2-6 with a user provided ` AWS_CREDENTIAL_PROVIDER ` auth mechanism property. This value MUST be the default credential
26- provider from the AWS SDK. If the default provider does not cover all scenarios above, those not covered MAY be skipped.
27- In these tests the driver MUST also assert that the user provided credential provider was called at least once in each
28- test.
29-
30- If the driver supports a custom AWS credential provider, it MUST verify the custom provider was used when testing. This
31- may be via a custom function or object that wraps the calls to the custom provider and asserts that it was called at
32- least once.
24+ ## Testing custom credential providers
25+
26+ If the driver supports custom AWS credential providers, the driver MUST test the following:
27+
28+ Scenario 1 from the previous section where the ` ACCESS_KEY_ID ` and ` SECRET_ACCESS_KEY ` pair are provided as client
29+ options, but are incorrect, and a custom ` AWS_CREDENTIAL_PROVIDER ` that returns the correct values for these two
30+ properties.
31+
32+ Scenarios 2-6 from the previous section with a user provided ` AWS_CREDENTIAL_PROVIDER ` auth mechanism property. This
33+ value MUST be the default credential provider from the AWS SDK. If the default provider does not cover all scenarios
34+ above, those not covered MAY be skipped. In these tests the driver MUST also assert that the user provided credential
35+ provider was called at least once in each test.
36+
37+ The driver MUST verify the custom provider was used when testing. This may be via a custom function or object that wraps
38+ the calls to the custom provider and asserts that it was called at least once.
3339
3440## Regular credentials
3541
0 commit comments