+873
tests/integration/community_provisioning_test.go
···
···+t.Errorf("Password roundtrip failed: expected %q, got %q", testPassword, retrieved.PDSPassword)+if err != nil && strings.Contains(strings.ToLower(err.Error()), "name") && strings.Contains(err.Error(), "alphanumeric") {+t.Logf("✅ Database correctly prevents duplicate handles: %d duplicate errors", duplicateErrorCount)+accessToken := "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJkaWQ6cGxjOnRlc3QiLCJpYXQiOjE1MTYyMzkwMjJ9.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c"+refreshToken := "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJkaWQ6cGxjOnRlc3QiLCJ0eXBlIjoicmVmcmVzaCIsImlhdCI6MTUxNjIzOTAyMn0.different_signature_here"+t.Errorf("Refresh token mismatch: expected %q, got %q", refreshToken, retrieved.PDSRefreshToken)+t.Errorf("Access token decryption failed: expected %q, got %q", accessToken, retrieved.PDSAccessToken)+t.Errorf("Refresh token decryption failed: expected %q, got %q", refreshToken, retrieved.PDSRefreshToken)
+603
tests/integration/community_service_integration_test.go
···
···+// Use coves.social domain (configured in PDS_SERVICE_HANDLE_DOMAINS as .communities.coves.social)+t.Errorf("Password too short: expected >= 32 chars from provisioner, got %d", len(community.PDSPassword))+expectedURIPrefix := fmt.Sprintf("at://%s/social.coves.community.profile/self", community.DID)+t.Errorf("V2: community should own itself. Expected OwnerDID=%s, got %s", community.DID, community.OwnerDID)+if err := db.QueryRowContext(ctx, query, community.DID).Scan(&encryptedPassword); err != nil {+expectedURIPrefix := fmt.Sprintf("at://%s/social.coves.community.profile/self", community.DID)