diff --git a/wfe/wfe_test.go b/wfe/wfe_test.go index 9e6f82b6e..e2e6166a8 100644 --- a/wfe/wfe_test.go +++ b/wfe/wfe_test.go @@ -1168,11 +1168,11 @@ func TestChallenge(t *testing.T) { } // MockRAUpdateAuthorizationError is a mock RA that just returns an error on UpdateAuthorization -type MockRAStrictUpdateAuthz struct { +type MockRAUpdateAuthorizationError struct { MockRegistrationAuthority } -func (ra *MockRAStrictUpdateAuthz) UpdateAuthorization(_ context.Context, authz core.Authorization, _ int, _ core.Challenge) (core.Authorization, error) { +func (ra *MockRAUpdateAuthorizationError) UpdateAuthorization(_ context.Context, authz core.Authorization, _ int, _ core.Challenge) (core.Authorization, error) { return core.Authorization{}, errors.New("broken on purpose") } @@ -1181,7 +1181,7 @@ func (ra *MockRAStrictUpdateAuthz) UpdateAuthorization(_ context.Context, authz // the RA. func TestUpdateChallengeFinalizedAuthz(t *testing.T) { wfe, _ := setupWFE(t) - wfe.RA = &MockRAStrictUpdateAuthz{} + wfe.RA = &MockRAUpdateAuthorizationError{} responseWriter := httptest.NewRecorder() path := "valid/23" @@ -1190,7 +1190,6 @@ func TestUpdateChallengeFinalizedAuthz(t *testing.T) { signRequest(t, `{"resource":"challenge"}`, wfe.nonceService))) body := responseWriter.Body.String() - fmt.Println(body) test.AssertUnmarshaledEquals(t, body, `{ "type": "dns", "uri": "http://localhost/acme/challenge/valid/23" diff --git a/wfe2/wfe_test.go b/wfe2/wfe_test.go index 4a8fd67f8..6af89b69e 100644 --- a/wfe2/wfe_test.go +++ b/wfe2/wfe_test.go @@ -1099,11 +1099,11 @@ func TestChallenge(t *testing.T) { } // MockRAUpdateAuthorizationError is a mock RA that just returns an error on UpdateAuthorization -type MockRAStrictUpdateAuthz struct { +type MockRAUpdateAuthorizationError struct { MockRegistrationAuthority } -func (ra *MockRAStrictUpdateAuthz) UpdateAuthorization(_ context.Context, authz core.Authorization, _ int, _ core.Challenge) (core.Authorization, error) { +func (ra *MockRAUpdateAuthorizationError) UpdateAuthorization(_ context.Context, authz core.Authorization, _ int, _ core.Challenge) (core.Authorization, error) { return core.Authorization{}, errors.New("broken on purpose") } @@ -1112,7 +1112,7 @@ func (ra *MockRAStrictUpdateAuthz) UpdateAuthorization(_ context.Context, authz // the RA. func TestUpdateChallengeFinalizedAuthz(t *testing.T) { wfe, _ := setupWFE(t) - wfe.RA = &MockRAStrictUpdateAuthz{} + wfe.RA = &MockRAUpdateAuthorizationError{} responseWriter := httptest.NewRecorder() signedURL := "http://localhost/valid/23" @@ -1121,7 +1121,6 @@ func TestUpdateChallengeFinalizedAuthz(t *testing.T) { wfe.Challenge(ctx, newRequestEvent(), responseWriter, request) body := responseWriter.Body.String() - fmt.Println(body) test.AssertUnmarshaledEquals(t, body, `{ "type": "dns", "url": "http://localhost/acme/challenge/valid/23"