projects
/
arvados.git
/ blobdiff
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
6203: add trailing newline character in munge_manifest_locators method only when...
[arvados.git]
/
services
/
keepstore
/
perms_test.go
diff --git
a/services/keepstore/perms_test.go
b/services/keepstore/perms_test.go
index d0081cd01014b69abf9910ffad059077d19549ee..7367dbf0adc33d47b74e34fda37d898c4e34242d 100644
(file)
--- a/
services/keepstore/perms_test.go
+++ b/
services/keepstore/perms_test.go
@@
-48,15
+48,15
@@
func TestVerifySignatureExtraHints(t *testing.T) {
PermissionSecret = []byte(known_key)
defer func() { PermissionSecret = nil }()
PermissionSecret = []byte(known_key)
defer func() { PermissionSecret = nil }()
- if !VerifySignature(known_locator
+ "+K@xyzzy" +
known_sig_hint, known_token) {
+ if !VerifySignature(known_locator
+"+K@xyzzy"+
known_sig_hint, known_token) {
t.Fatal("Verify cannot handle hint before permission signature")
}
t.Fatal("Verify cannot handle hint before permission signature")
}
- if !VerifySignature(known_locator
+ known_sig_hint +
"+Zfoo", known_token) {
+ if !VerifySignature(known_locator
+known_sig_hint+
"+Zfoo", known_token) {
t.Fatal("Verify cannot handle hint after permission signature")
}
t.Fatal("Verify cannot handle hint after permission signature")
}
- if !VerifySignature(known_locator
+ "+K@xyzzy" + known_sig_hint +
"+Zfoo", known_token) {
+ if !VerifySignature(known_locator
+"+K@xyzzy"+known_sig_hint+
"+Zfoo", known_token) {
t.Fatal("Verify cannot handle hints around permission signature")
}
}
t.Fatal("Verify cannot handle hints around permission signature")
}
}
@@
-66,11
+66,11
@@
func TestVerifySignatureWrongSize(t *testing.T) {
PermissionSecret = []byte(known_key)
defer func() { PermissionSecret = nil }()
PermissionSecret = []byte(known_key)
defer func() { PermissionSecret = nil }()
- if !VerifySignature(known_hash
+ "+999999" +
known_sig_hint, known_token) {
+ if !VerifySignature(known_hash
+"+999999"+
known_sig_hint, known_token) {
t.Fatal("Verify cannot handle incorrect size hint")
}
t.Fatal("Verify cannot handle incorrect size hint")
}
- if !VerifySignature(known_hash
+
known_sig_hint, known_token) {
+ if !VerifySignature(known_hash
+
known_sig_hint, known_token) {
t.Fatal("Verify cannot handle missing size hint")
}
}
t.Fatal("Verify cannot handle missing size hint")
}
}