@@ -207,7 +207,7 @@ def test_proxycommand_tilde_expansion(self):
207
207
assert got == expected
208
208
209
209
@patch ("paramiko.config.getpass" )
210
- def test_controlpath_token_expansion (self , getpass ):
210
+ def test_controlpath_token_expansion (self , getpass , socket ):
211
211
getpass .getuser .return_value = "gandalf"
212
212
config = SSHConfig .from_text (
213
213
"""
@@ -231,7 +231,7 @@ def test_controlpath_token_expansion(self, getpass):
231
231
assert result == "remoteuser gandalf host ohai orighost explicit_host"
232
232
# Supports %C
233
233
result = config .lookup ("hashbrowns" )["controlpath" ]
234
- assert result == "fc995d9f41ca1bcec7bc1d7f1ca87b9ff568a6d4 "
234
+ assert result == "a438e7dbf5308b923aba9db8fe2ca63447ac8688 "
235
235
236
236
def test_negation (self ):
237
237
config = SSHConfig .from_text (
@@ -283,7 +283,9 @@ def test_proxycommand(self):
283
283
284
284
assert config .lookup (host ) == values
285
285
286
- def test_identityfile (self ):
286
+ @patch ("paramiko.config.getpass" )
287
+ def test_identityfile (self , getpass , socket ):
288
+ getpass .getuser .return_value = "gandalf"
287
289
config = SSHConfig .from_text (
288
290
"""
289
291
IdentityFile id_dsa0
@@ -316,7 +318,7 @@ def test_identityfile(self):
316
318
"identityfile" : [
317
319
"id_dsa0" ,
318
320
"id_dsa1" ,
319
- "d5c0115d09912e39ff27844ea9d6052fc6048f99 " ,
321
+ "a438e7dbf5308b923aba9db8fe2ca63447ac8688 " ,
320
322
],
321
323
},
322
324
}.items ():
0 commit comments