This is an automated email from the git hooks/post-receive script.
bernie.ogden pushed a commit to branch inserted_src in repository toolchain/semiautobench.
The following commit(s) were added to refs/heads/inserted_src by this push: new 6f5d88c Override SSH_AUTH_SOCK only for subprocess 6f5d88c is described below
commit 6f5d88c92774cf83e79bcf8ec14fd0898ccd96c6 Author: Bernard Ogden bernie.ogden@linaro.org Date: Thu Jul 23 16:21:34 2015 +0200
Override SSH_AUTH_SOCK only for subprocess
This allows our 'own' agent to continue to provide authentication for communication with target, so we are only dependent on the forwarded key(s) for initial target setup.
Change-Id: I23762a03f0a369c341e730a2d884ef95f3906675 --- invoke_session_debian | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/invoke_session_debian b/invoke_session_debian index 7040dcd..24dc9d0 100755 --- a/invoke_session_debian +++ b/invoke_session_debian @@ -84,7 +84,6 @@ echo "*** WAITING FOR AGENT: ${ip_addr}" while ! test -e ~/data/socket; do inotifywait -e create ~/data done -export SSH_AUTH_SOCK=~/data/socket echo "" mkdir -p /run mkdir -p /run/hacking @@ -105,7 +104,7 @@ for lava_name in `lava-group | grep -v '[[:blank:]]*host$' | aw [...]
#Check that target is accessible, add it to our known_hosts, #add our one-time key to it's authorized_keys - if ! cat ~/data/onetime.pub | ssh -o StrictHostKeyChecking=no "${target_ip}" "ca [...] + if ! cat ~/data/onetime.pub | SSH_AUTH_SOCK=~/data/socket ssh -o StrictHostKeyCh [...] echo "Could not access target ${target_ip} (${lava_name})" >&2 exit 1 fi @@ -123,12 +122,13 @@ for lava_name in `lava-group | grep -v '[[:blank:]]*host$' | [...] target_names=("${target_names[@]}" "${lava_name}") fi done +rm ~/data/socket + export targets="${target_names[@]}" export maindir="/${HOME}/bench" mkdir "${maindir}" chmod 700 "${maindir}"
-echo "*** DONE WITH AUTH SOCKET, YOU MAY CLOSE THE CONNECTION" echo "Running benchmark... I may be some time" export LAVA_IN_LAB=1 "${ABE_DIR}"/scripts/Benchmark.job