@@ -39,10 +39,10 @@ func TestPrepareCredentialFiles(t *testing.T) {
3939 {
4040 name : "TokenSecretsExists" ,
4141 secrets : map [string ]string {
42- filepath . Join ( OssfsPasswdFile , oss .KeyAccessKeyId ) : "testAKID" ,
43- filepath . Join ( OssfsPasswdFile , oss .KeyAccessKeySecret ) : "testAKSecret" ,
44- filepath . Join ( OssfsPasswdFile , oss .KeyExpiration ) : "testExpiration" ,
45- filepath . Join ( OssfsPasswdFile , oss .KeySecurityToken ) : "testSecurityToken" ,
42+ oss .KeyAccessKeyId : "testAKID" ,
43+ oss .KeyAccessKeySecret : "testAKSecret" ,
44+ oss .KeyExpiration : "testExpiration" ,
45+ oss .KeySecurityToken : "testSecurityToken" ,
4646 },
4747 wantFile : false ,
4848 wantDir : true ,
@@ -73,10 +73,10 @@ func TestRotateTokenFiles(t *testing.T) {
7373 assert .NoError (t , err )
7474 // case 2: initialize token
7575 secrets = map [string ]string {
76- filepath . Join ( OssfsPasswdFile , oss .KeyAccessKeyId ) : "testAKID" ,
77- filepath . Join ( OssfsPasswdFile , oss .KeyAccessKeySecret ) : "testAKSecret" ,
78- filepath . Join ( OssfsPasswdFile , oss .KeyExpiration ) : "testExpiration" ,
79- filepath . Join ( OssfsPasswdFile , oss .KeySecurityToken ) : "testSecurityToken" ,
76+ oss .KeyAccessKeyId : "testAKID" ,
77+ oss .KeyAccessKeySecret : "testAKSecret" ,
78+ oss .KeyExpiration : "testExpiration" ,
79+ oss .KeySecurityToken : "testSecurityToken" ,
8080 }
8181 rotated , err = rotateTokenFiles ("/tmp/token-files" , secrets )
8282 assert .Equal (t , true , rotated )
@@ -91,10 +91,10 @@ func TestRotateTokenFiles(t *testing.T) {
9191 assert .Equal (t , "testSecurityToken" , string (st ))
9292 // case 3: rotate token
9393 secrets = map [string ]string {
94- filepath . Join ( OssfsPasswdFile , oss .KeyAccessKeyId ) : "newAKID" ,
95- filepath . Join ( OssfsPasswdFile , oss .KeyAccessKeySecret ) : "newAKSecret" ,
96- filepath . Join ( OssfsPasswdFile , oss .KeyExpiration ) : "newExpiration" ,
97- filepath . Join ( OssfsPasswdFile , oss .KeySecurityToken ) : "newSecurityToken" ,
94+ oss .KeyAccessKeyId : "newAKID" ,
95+ oss .KeyAccessKeySecret : "newAKSecret" ,
96+ oss .KeyExpiration : "newExpiration" ,
97+ oss .KeySecurityToken : "newSecurityToken" ,
9898 }
9999 rotated , err = rotateTokenFiles ("/tmp/token-files" , secrets )
100100 assert .Equal (t , true , rotated )
0 commit comments