From ab0e85c5fa069f0cd6fa64ea94f841e3cd9af1e9 Mon Sep 17 00:00:00 2001 From: dakkar Date: Sat, 17 Jan 2015 13:02:12 +0000 Subject: add subtest names --- t/tests/Net/Hawk/Client.t | 4 ++-- t/tests/Net/Hawk/Crypto.t | 4 ++-- t/tests/Net/Hawk/Uri.t | 2 +- t/tests/Net/Hawk/Utils.t | 4 ++-- 4 files changed, 7 insertions(+), 7 deletions(-) diff --git a/t/tests/Net/Hawk/Client.t b/t/tests/Net/Hawk/Client.t index ca8476d..397af50 100644 --- a/t/tests/Net/Hawk/Client.t +++ b/t/tests/Net/Hawk/Client.t @@ -115,7 +115,7 @@ subtest { 'Hawk id="123456", ts="1353809207", nonce="Ygvqdz", hash="2QfCt3GuY9HQnHWyWD3wX68ZOKbynqlfYmuO2ZBRqtY=", mac="HTgtd0jPI6E4izx8e4OHdO36q00xFCU0FolNq3RiCYs="', 'valid authorization header (pre hashed payload)', ); -}; +},'header'; subtest { ok( @@ -181,6 +181,6 @@ subtest { ],{}), 'skips tsm validation when missing ts', ); -}; +},'authenticate'; done; diff --git a/t/tests/Net/Hawk/Crypto.t b/t/tests/Net/Hawk/Crypto.t index 3ce0e5e..559a73b 100644 --- a/t/tests/Net/Hawk/Crypto.t +++ b/t/tests/Net/Hawk/Crypto.t @@ -66,7 +66,7 @@ subtest { 'normalized string generated ok', ); }; -}; +},'readme'; subtest { my %args = ( @@ -112,6 +112,6 @@ subtest { "hawk.1.header\n1357747017\nk3k4j5\nGET\n/resource/something\nexample.com\n8080\nU4MKKSmiVxk37JCCrAVIjV/OhB3y+NdwoCr6RShbVkE=\nthis is some app data\n", 'valid normalized string (payload + ext)', ); -}; +},'normalized string'; done; diff --git a/t/tests/Net/Hawk/Uri.t b/t/tests/Net/Hawk/Uri.t index 769eb98..d63954c 100644 --- a/t/tests/Net/Hawk/Uri.t +++ b/t/tests/Net/Hawk/Uri.t @@ -40,6 +40,6 @@ subtest { }, ); }); -}; +}, 'generate a bewit then successfully authenticate it'; done; diff --git a/t/tests/Net/Hawk/Utils.t b/t/tests/Net/Hawk/Utils.t index 7449cb3..b5d9bdb 100644 --- a/t/tests/Net/Hawk/Utils.t +++ b/t/tests/Net/Hawk/Utils.t @@ -7,7 +7,7 @@ subtest { is(parse_content_type(Str),'','undef -> empty string'); is(parse_content_type('text/plain'),'text/plain','simple'); is(parse_content_type('text/plain; charset=utf-8'),'text/plain','ignore options'); -}; +},'parse content type'; subtest { throws_like { parse_authorization_header(Str) }, @@ -33,6 +33,6 @@ subtest { is_deeply( parse_authorization_header('hawk id="1"'), { id => '1' }, 'ok parse'); -}; +},'parse header'; done; -- cgit v1.2.3