Skip to content
This repository was archived by the owner on Jan 22, 2025. It is now read-only.

Commit d3adaae

Browse files
committed
Fix bad merge
1 parent 927e768 commit d3adaae

2 files changed

Lines changed: 8 additions & 8 deletions

File tree

tests/bot-entrypoint.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ def load_env():
2525
"bin/keybaseca --wipe-logs || true\n"
2626
"bin/keybaseca generate --overwrite-existing-key\n"
2727
# The output from this backup is tested in test_env_1.py
28-
"echo yes | bin/keybaseca backup > /mnt/cakey.backup\n"
28+
"echo yes | bin/keybaseca backup > /shared/cakey.backup\n"
2929
# The output from this sign operation is tested in test_env_1.py
30-
"ssh-keygen -t ed25519 -f /mnt/userkey -N '' && bin/keybaseca sign --public-key /mnt/userkey.pub > /mnt/keybaseca-sign.out\n"
30+
"ssh-keygen -t ed25519 -f /shared/userkey -N '' && bin/keybaseca sign --public-key /shared/userkey.pub > /shared/keybaseca-sign.out\n"
3131
"bin/keybaseca service &"
3232
) % (shlex.quote(path)))
3333
# Sleep so keybaseca has time to start

tests/tests/test_env_1.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -135,14 +135,14 @@ def test_keybaseca_backup(self):
135135

136136
def test_keybaseca_sign(self, test_config):
137137
# Stdout contains a useful message
138-
with open('/mnt/keybaseca-sign.out') as f:
138+
with open('/shared/keybaseca-sign.out') as f:
139139
assert "Provisioned new certificate" in f.read()
140140

141141
# SSH with that certificate should just work for every team
142-
assert_contains_hash(test_config.expected_hash, run_command(f"ssh -q -o StrictHostKeyChecking=no -i /mnt/userkey user@sshd-prod 'sha1sum /etc/unique'"))
143-
assert_contains_hash(test_config.expected_hash, run_command(f"ssh -q -o StrictHostKeyChecking=no -i /mnt/userkey root@sshd-prod 'sha1sum /etc/unique'"))
144-
assert_contains_hash(test_config.expected_hash, run_command(f"ssh -q -o StrictHostKeyChecking=no -i /mnt/userkey user@sshd-staging 'sha1sum /etc/unique'"))
145-
assert_contains_hash(test_config.expected_hash, run_command(f"ssh -q -o StrictHostKeyChecking=no -i /mnt/userkey root@sshd-prod 'sha1sum /etc/unique'"))
142+
assert_contains_hash(test_config.expected_hash, run_command(f"ssh -q -o StrictHostKeyChecking=no -i /shared/userkey user@sshd-prod 'sha1sum /etc/unique'"))
143+
assert_contains_hash(test_config.expected_hash, run_command(f"ssh -q -o StrictHostKeyChecking=no -i /shared/userkey root@sshd-prod 'sha1sum /etc/unique'"))
144+
assert_contains_hash(test_config.expected_hash, run_command(f"ssh -q -o StrictHostKeyChecking=no -i /shared/userkey user@sshd-staging 'sha1sum /etc/unique'"))
145+
assert_contains_hash(test_config.expected_hash, run_command(f"ssh -q -o StrictHostKeyChecking=no -i /shared/userkey root@sshd-prod 'sha1sum /etc/unique'"))
146146

147147
# Checking that it actually contains the correct principals
148-
assert get_principals("/mnt/userkey-cert.pub") == set(test_config.subteams)
148+
assert get_principals("/shared/userkey-cert.pub") == set(test_config.subteams)

0 commit comments

Comments
 (0)