feature/increase_test_coverage #112
Labels
No labels
P0
P1
P2
P3
good first issue
Infrastructure
blocked
bug
config
discussion
documentation
duplicate
enhancement
go
help wanted
internal
invalid
kludge
observability
perfomance
question
refactoring
wontfix
No project
No assignees
3 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: TrueCloudLab/frostfs-http-gw#112
Loading…
Reference in a new issue
No description provided.
Delete branch "r.loginov/frostfs-http-gw:feature/increase_test_coverage"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Increasing the test coverage of the token package
Adding integration tests using bearer token
Coverage:
bc558e1d4e
to2cbd9f47f6
I also wanted to keep the aio version 1.2.7, however, in this case, when the impersonate flag is set, the bearer token frostfs-node will give an error
code = 1024 message = invalid signature
(I understand that at that time there was not yet this flag). If I don't use this flag, I get an error from frostfs-node of the following type:code = 2048 message = access to object operation denied: access to operation OBJECT_PUT is denied by extended ACL check: bearer token owner differs from the request sender
.I form the token as follows:
You've got
because of server starts with random key rather than that key for which you create bearer token.
Log says this:
You should start server (
runServer
function) with this key (you can create tmp wallet file and remove it after test passed, see example creation of tmp file here )Can you also bump
golang.org/x/net
tov0.23.0
?2cbd9f47f6
to5b7b872dcd
There is another problem with vulncheck
Yes, the problem there is that there is a vulnerability in the net package when using version 1.21.9. At the moment, the current version 1.21.9, not 1.21.10, is downloaded during the vulncheck workflow. Perhaps this is due to the fact that version 1.21.10 was released only 6 hours ago (May 8 at 6:32 AM). Do I understand correctly that at the moment we cannot influence the download of a more up-to-date version?
ps. I checked locally with the go version 1.21.10 - everything is OK, there are no vulnerabilities.
I restarted the vulncheck workflow again, this time the correct version was used, and there are no more vulnerabilities.