sensorlog_lite: Replace blessing slashes with colons.

Change-Id: I3cac42e08f15a02c9994763b635bb0b6bd9856cb
diff --git a/go/src/v.io/x/sensorlog/README.md b/go/src/v.io/x/sensorlog/README.md
index 82059e7..734d822 100644
--- a/go/src/v.io/x/sensorlog/README.md
+++ b/go/src/v.io/x/sensorlog/README.md
@@ -85,4 +85,4 @@
 
 The internal state of the master Syncbase can be examined using `sb`:
 
-    $ V23_CREDENTIALS=<creds> ${JIRI_ROOT}/release/go/bin/vbecome -name sl/client/main ${JIRI_ROOT}/release/go/bin/sb -service /$(dig $(hostname) +short):8202/sl/client/main/syncbased sh sensorlog_lite sldb
+    $ V23_CREDENTIALS=<creds> ${JIRI_ROOT}/release/go/bin/vbecome -name sl:client:main ${JIRI_ROOT}/release/go/bin/sb -service /$(dig $(hostname) +short):8202/sl/client/main/syncbased sh sensorlog_lite sldb
diff --git a/go/src/v.io/x/sensorlog/internal/measure/syncgroup_test.go b/go/src/v.io/x/sensorlog/internal/measure/syncgroup_test.go
index f38ef39..d447fa6 100644
--- a/go/src/v.io/x/sensorlog/internal/measure/syncgroup_test.go
+++ b/go/src/v.io/x/sensorlog/internal/measure/syncgroup_test.go
@@ -19,7 +19,7 @@
 )
 
 func TestCreateSyncgroup(t *testing.T) {
-	_, ctxMeasured, sbName, _, cleanup := sbtu.SetupOrDieCustom("one", "one/sb", nil)
+	_, ctxMeasured, sbName, _, cleanup := sbtu.SetupOrDieCustom("one", "one:sb", nil)
 	defer cleanup()
 
 	// Open app/db (create both) as measured.
@@ -29,7 +29,7 @@
 	}
 
 	devId := "measured1"
-	admin := "root/two"
+	admin := "root:two"
 	syncMts := []string{}
 
 	// Creating the syncgroup should succeed.
@@ -51,11 +51,11 @@
 
 	// measured should have dropped privileges on <StreamDefTable>/<devId>.
 	expectPerms, err := access.ReadPermissions(bytes.NewBufferString(`{
-		"Admin":{"In":["root/two"]},
-		"Read":{"In":["root/two", "root/one"]},
-		"Write":{"In":["root/two"]},
-		"Debug":{"In":["root/two"]},
-		"Resolve":{"In":["root/two", "root/one"]}
+		"Admin":{"In":["root:two"]},
+		"Read":{"In":["root:two", "root:one"]},
+		"Write":{"In":["root:two"]},
+		"Debug":{"In":["root:two"]},
+		"Resolve":{"In":["root:two", "root:one"]}
 	}`))
 	if err != nil {
 		t.Fatalf("ReadPermissions should have succeeded, got error: %v", err)
diff --git a/go/src/v.io/x/sensorlog/internal/sbutil/syncbase_test.go b/go/src/v.io/x/sensorlog/internal/sbutil/syncbase_test.go
index 543daa5..8b4155a 100644
--- a/go/src/v.io/x/sensorlog/internal/sbutil/syncbase_test.go
+++ b/go/src/v.io/x/sensorlog/internal/sbutil/syncbase_test.go
@@ -18,7 +18,7 @@
 )
 
 func TestCreateOrOpenDB(t *testing.T) {
-	_, ctxOwner, sbName, rootPrincipal, cleanup := sbtu.SetupOrDieCustom("one", "one/sb", nil)
+	_, ctxOwner, sbName, rootPrincipal, cleanup := sbtu.SetupOrDieCustom("one", "one:sb", nil)
 	defer cleanup()
 	ctxGuest := sbtu.NewCtx(ctxOwner, rootPrincipal, "two")
 
@@ -55,10 +55,10 @@
 	}
 	// Expect db permissions with full access for owner, resolve only for others.
 	expectPerms, err := access.ReadPermissions(bytes.NewBufferString(`{
-		"Admin":{"In":["root/one"]},
-		"Read":{"In":["root/one"]},
-		"Write":{"In":["root/one"]},
-		"Debug":{"In":["root/one"]},
+		"Admin":{"In":["root:one"]},
+		"Read":{"In":["root:one"]},
+		"Write":{"In":["root:one"]},
+		"Debug":{"In":["root:one"]},
 		"Resolve":{"In":["..."]}
 	}`))
 	if err != nil {
@@ -66,7 +66,7 @@
 	}
 	if perms, _, err := dbOwner.GetPermissions(ctxOwner); err != nil {
 		t.Errorf("GetPermissions should have succeeded, got error: %v", err)
-	} else if got, want := perms, expectPerms; !reflect.DeepEqual(got, want) {
+	} else if got, want := perms.Normalize(), expectPerms.Normalize(); !reflect.DeepEqual(got, want) {
 		t.Errorf("Unexpected database permissions: got %v, want %v", got, want)
 	}
 	// Check that all tables exist.
@@ -79,7 +79,7 @@
 }
 
 func TestTablePermissions(t *testing.T) {
-	_, ctxOwner, sbName, _, cleanup := sbtu.SetupOrDieCustom("one", "one/sb", nil)
+	_, ctxOwner, sbName, _, cleanup := sbtu.SetupOrDieCustom("one", "one:sb", nil)
 	defer cleanup()
 
 	// Open app/db (create both) as owner.
@@ -89,19 +89,19 @@
 	}
 
 	expectPermsFull, err := access.ReadPermissions(bytes.NewBufferString(`{
-		"Admin":{"In":["root/one"]},
-		"Read":{"In":["root/one"]},
-		"Write":{"In":["root/one"]},
-		"Debug":{"In":["root/one"]},
+		"Admin":{"In":["root:one"]},
+		"Read":{"In":["root:one"]},
+		"Write":{"In":["root:one"]},
+		"Debug":{"In":["root:one"]},
 		"Resolve":{"In":["..."]}
 	}`))
 	if err != nil {
 		t.Fatalf("ReadPermissions should have succeeded, got error: %v", err)
 	}
 	expectPermsReadOnly, err := access.ReadPermissions(bytes.NewBufferString(`{
-		"Admin":{"In":["root/one"]},
-		"Read":{"In":["root/one"]},
-		"Debug":{"In":["root/one"]},
+		"Admin":{"In":["root:one"]},
+		"Read":{"In":["root:one"]},
+		"Debug":{"In":["root:one"]},
 		"Resolve":{"In":["..."]}
 	}`))
 	if err != nil {
diff --git a/go/src/v.io/x/sensorlog/scripts/runner_lib.sh b/go/src/v.io/x/sensorlog/scripts/runner_lib.sh
index 6c551cd..c503c91 100644
--- a/go/src/v.io/x/sensorlog/scripts/runner_lib.sh
+++ b/go/src/v.io/x/sensorlog/scripts/runner_lib.sh
@@ -27,7 +27,7 @@
 }
 export -f gen_uuid
 
-readonly BLESSING_CHAIN_SEPARATOR='/'
+readonly BLESSING_CHAIN_SEPARATOR=':'
 
 # Converts name to blessing extension.
 # name_to_blessing NAME