challenger

OAuth 2.0-based authentication service that validates user can receive messages at a certain address
Log | Files | Refs | Submodules | README | LICENSE

commit 709c014e2223a3e5137d6891966c821331f97939
parent 66c37e3005caf4ce4048a84aafc6c7319fdd2f92
Author: Christian Grothoff <christian@grothoff.org>
Date:   Sun,  7 May 2023 01:35:07 +0200

-fix DB test

Diffstat:
Msrc/challengerdb/plugin_challengerdb_postgres.c | 2+-
Msrc/challengerdb/test_challenger_db.c | 14+++++++-------
2 files changed, 8 insertions(+), 8 deletions(-)

diff --git a/src/challengerdb/plugin_challengerdb_postgres.c b/src/challengerdb/plugin_challengerdb_postgres.c @@ -294,7 +294,7 @@ postgres_gc (void *cls, PREPARE (pg, "gc_grants", "DELETE FROM grants" - " WHERE expiration_time < $1;"); + " WHERE grant_expiration_time < $1;"); postgres_preflight (pg); qs = GNUNET_PQ_eval_prepared_non_select (pg->conn, "gc_validations", diff --git a/src/challengerdb/test_challenger_db.c b/src/challengerdb/test_challenger_db.c @@ -57,8 +57,6 @@ static void run (void *cls) { struct GNUNET_CONFIGURATION_Handle *cfg = cls; - size_t bs; - void *b = NULL; if (NULL == (plugin = CHALLENGER_DB_plugin_load (cfg))) { @@ -79,13 +77,15 @@ run (void *cls) } GNUNET_assert (GNUNET_OK == plugin->preflight (plugin->cls)); - FAILIF (0 > - plugin->gc (plugin->cls, - ts, - ts)); + { + struct GNUNET_TIME_Absolute ts = GNUNET_TIME_absolute_get (); + + FAILIF (0 > + plugin->gc (plugin->cls, + ts)); + } result = 0; drop: - GNUNET_free (b); GNUNET_break (GNUNET_OK == plugin->drop_tables (plugin->cls)); CHALLENGER_DB_plugin_unload (plugin);