|
@@ -88,9 +88,9 @@ func authDisableTest(cx ctlCtx) {
|
|
|
cx.t.Fatalf("authDisableTest ctlV3AuthDisable error (%v)", err)
|
|
cx.t.Fatalf("authDisableTest ctlV3AuthDisable error (%v)", err)
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
- // now auth fails unconditionally, note that failed RPC is Authenticate(), not Put()
|
|
|
|
|
|
|
+ // now ErrAuthNotEnabled of Authenticate() is simply ignored
|
|
|
cx.user, cx.pass = "test-user", "pass"
|
|
cx.user, cx.pass = "test-user", "pass"
|
|
|
- if err := ctlV3PutFailAuthDisabled(cx, "hoo", "bar"); err != nil {
|
|
|
|
|
|
|
+ if err := ctlV3Put(cx, "hoo", "bar", ""); err != nil {
|
|
|
cx.t.Fatal(err)
|
|
cx.t.Fatal(err)
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -330,10 +330,6 @@ func ctlV3PutFailPerm(cx ctlCtx, key, val string) error {
|
|
|
return spawnWithExpect(append(cx.PrefixArgs(), "put", key, val), "permission denied")
|
|
return spawnWithExpect(append(cx.PrefixArgs(), "put", key, val), "permission denied")
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-func ctlV3PutFailAuthDisabled(cx ctlCtx, key, val string) error {
|
|
|
|
|
- return spawnWithExpect(append(cx.PrefixArgs(), "put", key, val), "authentication is not enabled")
|
|
|
|
|
-}
|
|
|
|
|
-
|
|
|
|
|
func authSetupTestUser(cx ctlCtx) {
|
|
func authSetupTestUser(cx ctlCtx) {
|
|
|
if err := ctlV3User(cx, []string{"add", "test-user", "--interactive=false"}, "User test-user created", []string{"pass"}); err != nil {
|
|
if err := ctlV3User(cx, []string{"add", "test-user", "--interactive=false"}, "User test-user created", []string{"pass"}); err != nil {
|
|
|
cx.t.Fatal(err)
|
|
cx.t.Fatal(err)
|