diff --git a/libs/utils/src/auth.rs b/libs/utils/src/auth.rs index 9f9beb4892..35d9549323 100644 --- a/libs/utils/src/auth.rs +++ b/libs/utils/src/auth.rs @@ -466,11 +466,11 @@ MC4CAQAwBQYDK2VwBCIEID/Drmc1AA6U/znNRWpF3zEGegOATQxfkdWxitcOMsIH encode_hadron_token(&claims, key_pair_2.serialize_pem().as_bytes()).unwrap(); // Verify that we can decode the token with matching decoding keys (decoding also verifies the signature). - assert_eq!(auth.decode(&encoded_1).unwrap().claims, claims); - assert_eq!(auth.decode(&encoded_2).unwrap().claims, claims); - assert_eq!(auth_cert_1.decode(&encoded_1).unwrap().claims, claims); + assert_eq!(auth.decode::(&encoded_1).unwrap().claims, claims); + assert_eq!(auth.decode::(&encoded_2).unwrap().claims, claims); + assert_eq!(auth_cert_1.decode::(&encoded_1).unwrap().claims, claims); // Verify that the token cannot be decoded with a mismatched decode key. - assert!(auth_cert_1.decode(&encoded_2).is_err()); + assert!(auth_cert_1.decode::(&encoded_2).is_err()); } } diff --git a/safekeeper/tests/walproposer_sim/safekeeper.rs b/safekeeper/tests/walproposer_sim/safekeeper.rs index f310bbf071..38943fd2b1 100644 --- a/safekeeper/tests/walproposer_sim/safekeeper.rs +++ b/safekeeper/tests/walproposer_sim/safekeeper.rs @@ -167,7 +167,6 @@ pub fn run_server(os: NodeOs, disk: Arc) -> Result<()> { wal_backup_enabled: false, listen_pg_addr_tenant_only: None, advertise_pg_addr: None, - advertise_pg_addr_tenant_only: None, availability_zone: None, peer_recovery_enabled: false, backup_parallel_jobs: 0,