@@ -52,14 +52,14 @@ public void testGetFix() {
5252 @ DisplayName ("After fix the content dir including dirId file exists " )
5353 @ Test
5454 public void testFix () throws IOException {
55- var dirIdHash = "ridiculous-30 -char-pseudo-hash " ;
55+ var dirIdHash = "ridiculous-32 -char-pseudo-hashhh " ;
5656 Mockito .doReturn (dirIdHash ).when (fileNameCryptor ).hashDirectoryId (dirId );
5757 try (var dirIdBackupMock = Mockito .mockStatic (DirectoryIdBackup .class )) {
5858 dirIdBackupMock .when (() -> DirectoryIdBackup .backupManually (Mockito .any (), Mockito .any ())).thenAnswer (Answers .RETURNS_SMART_NULLS );
5959
6060 result .fix (pathToVault , cryptor );
6161
62- var expectedPath = pathToVault .resolve ("d/ri/diculous-30 -char-pseudo-hash " );
62+ var expectedPath = pathToVault .resolve ("d/ri/diculous-32 -char-pseudo-hashhh " );
6363 ArgumentMatcher <CryptoPathMapper .CiphertextDirectory > cipherDirMatcher = obj -> obj .dirId .equals (dirId ) && obj .path .endsWith (expectedPath );
6464 dirIdBackupMock .verify (() -> DirectoryIdBackup .backupManually (Mockito .eq (cryptor ), Mockito .argThat (cipherDirMatcher )), Mockito .times (1 ));
6565 var attr = Assertions .assertDoesNotThrow (() -> Files .readAttributes (expectedPath , BasicFileAttributes .class , LinkOption .NOFOLLOW_LINKS ));
@@ -70,7 +70,7 @@ public void testFix() throws IOException {
7070 @ DisplayName ("If dirid.c9r creation fails, fix fails " )
7171 @ Test
7272 public void testFixFailsOnFailingDirIdFile () throws IOException {
73- var dirIdHash = "ridiculous-30 -char-pseudo-hash " ;
73+ var dirIdHash = "ridiculous-32 -char-pseudo-hashhh " ;
7474 try (var dirIdBackupMock = Mockito .mockStatic (DirectoryIdBackup .class )) {
7575 Mockito .doReturn (dirIdHash ).when (fileNameCryptor ).hashDirectoryId (dirId );
7676 dirIdBackupMock .when (() -> DirectoryIdBackup .backupManually (Mockito .any (), Mockito .any ())).thenThrow (new IOException ("Access denied" ));
0 commit comments