)
// The local z3333 anonymous token must be allowed to be forwarded to the login cluster
c.Check(err, check.IsNil)
+
+ userac1.AuthToken = "v2/z1111-gj3su-asdfasdfasdfasd/this-token-does-not-validate-so-anonymous-token-will-be-used-instead"
+ err = userac1.RequestAndDecode(&userList, "GET", "/arvados/v1/users", nil,
+ map[string]interface{}{
+ "reader_tokens": []string{anon3Auth.TokenV2()},
+ "where": where,
+ },
+ )
+ c.Check(err, check.IsNil)
}
// Get a token from the login cluster (z1111), use it to submit a
end
# Usually, the secret is salted
- salted_secret = OpenSSL::HMAC.hexdigest('sha1', secret, remote)
+ salted_secret = OpenSSL::HMAC.hexdigest('sha1', Rails.configuration.Users.AnonymousUserToken, remote)
# The anonymous token could be specified as a full v2 token in the config,
# but the config loader strips it down to the secret part.