forked from TrueCloudLab/s3-tests
test_object_create_bad_authorization_incorrect: fixes
The test should expect BadSignature. Also, provide a key that does not already exist on aws. Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
This commit is contained in:
parent
d50dfe8fa3
commit
8f6c109882
1 changed files with 2 additions and 2 deletions
|
@ -503,12 +503,12 @@ def test_object_create_bad_authorization_none():
|
||||||
@attr(assertion='fails 403')
|
@attr(assertion='fails 403')
|
||||||
@nose.with_setup(teardown=_clear_custom_headers)
|
@nose.with_setup(teardown=_clear_custom_headers)
|
||||||
def test_object_create_bad_authorization_incorrect():
|
def test_object_create_bad_authorization_incorrect():
|
||||||
key = _setup_bad_object({'Authorization': 'AWS AKIAIGR7ZNNBHC5BKSUA:FWeDfwojDSdS2Ztmpfeubhd9isU='})
|
key = _setup_bad_object({'Authorization': 'AWS AKIAIGR7ZNNBHC5BKSUB:FWeDfwojDSdS2Ztmpfeubhd9isU='})
|
||||||
|
|
||||||
e = assert_raises(boto.exception.S3ResponseError, key.set_contents_from_string, 'bar')
|
e = assert_raises(boto.exception.S3ResponseError, key.set_contents_from_string, 'bar')
|
||||||
eq(e.status, 403)
|
eq(e.status, 403)
|
||||||
eq(e.reason, 'Forbidden')
|
eq(e.reason, 'Forbidden')
|
||||||
assert e.error_code in ('AccessDenied', 'SignatureDoesNotMatch')
|
assert e.error_code in ('AccessDenied', 'SignatureDoesNotMatch', 'InvalidAccessKeyId')
|
||||||
|
|
||||||
|
|
||||||
@attr(resource='object')
|
@attr(resource='object')
|
||||||
|
|
Loading…
Reference in a new issue