IssueRequest(
&RequestTester{
method: "PUT",
- uri: "/"+TEST_HASH,
+ uri: "/" + TEST_HASH,
request_body: TEST_BLOCK,
})
IssueRequest(
&RequestTester{
method: "DELETE",
- uri: "/"+TEST_HASH,
+ uri: "/" + TEST_HASH,
request_body: TEST_BLOCK,
api_token: data_manager_token,
})
t.Errorf("Discover returned %s, expected %s\n",
resultVols[i].(*UnixVolume).root, tmpdir)
}
- if expectReadonly := i % 2 == 1; expectReadonly != resultVols[i].(*UnixVolume).readonly {
+ if expectReadonly := i%2 == 1; expectReadonly != resultVols[i].(*UnixVolume).readonly {
t.Errorf("Discover added %s with readonly=%v, should be %v",
tmpdir, !expectReadonly, expectReadonly)
}
PermissionSecret = []byte(known_key)
defer func() { PermissionSecret = nil }()
- if !VerifySignature(known_locator + "+K@xyzzy" + known_sig_hint, known_token) {
+ if !VerifySignature(known_locator+"+K@xyzzy"+known_sig_hint, known_token) {
t.Fatal("Verify cannot handle hint before permission signature")
}
- if !VerifySignature(known_locator + known_sig_hint + "+Zfoo", known_token) {
+ if !VerifySignature(known_locator+known_sig_hint+"+Zfoo", known_token) {
t.Fatal("Verify cannot handle hint after permission signature")
}
- if !VerifySignature(known_locator + "+K@xyzzy" + known_sig_hint + "+Zfoo", known_token) {
+ if !VerifySignature(known_locator+"+K@xyzzy"+known_sig_hint+"+Zfoo", known_token) {
t.Fatal("Verify cannot handle hints around permission signature")
}
}
PermissionSecret = []byte(known_key)
defer func() { PermissionSecret = nil }()
- if !VerifySignature(known_hash + "+999999" + known_sig_hint, known_token) {
+ if !VerifySignature(known_hash+"+999999"+known_sig_hint, known_token) {
t.Fatal("Verify cannot handle incorrect size hint")
}
- if !VerifySignature(known_hash + known_sig_hint, known_token) {
+ if !VerifySignature(known_hash+known_sig_hint, known_token) {
t.Fatal("Verify cannot handle missing size hint")
}
}
Block2 []byte
BlockMtime2 int64
- CreateData bool
- CreateInVolume1 bool
+ CreateData bool
+ CreateInVolume1 bool
UseTrashLifeTime bool
DifferentMtimes bool
}
}
- oldBlockTime := time.Now().Add(-blob_signature_ttl-time.Minute)
+ oldBlockTime := time.Now().Add(-blob_signature_ttl - time.Minute)
// Create TrashRequest for the test
trashRequest := TrashRequest{
return nil
}
i := atomic.AddUint32(&vm.counter, 1)
- return vm.writables[i % uint32(len(vm.writables))]
+ return vm.writables[i%uint32(len(vm.writables))]
}
func (vm *RRVolumeManager) Close() {
Store map[string][]byte
Timestamps map[string]time.Time
// Bad volumes return an error for every operation.
- Bad bool
+ Bad bool
// Touchable volumes' Touch() method succeeds for a locator
// that has been Put().
- Touchable bool
+ Touchable bool
// Readonly volumes return an error for Put, Delete, and
// Touch.
- Readonly bool
- called map[string]int
- mutex sync.Mutex
+ Readonly bool
+ called map[string]int
+ mutex sync.Mutex
}
// CreateMockVolume returns a non-Bad, non-Readonly, Touchable mock
func MakeUnixVolume(root string, serialize bool, readonly bool) *UnixVolume {
v := &UnixVolume{
- root: root,
- queue: nil,
+ root: root,
+ queue: nil,
readonly: readonly,
}
if serialize {
- v.queue =make(chan *IORequest)
+ v.queue = make(chan *IORequest)
go v.IOHandler()
}
return v