Skip to content

Commit

Permalink
issue #114 - when I setenv the AWS_* vars to single characters in tox…
Browse files Browse the repository at this point in the history
….ini, conftest.py's sanitize_line() was running the replacement on those characters
  • Loading branch information
jantman committed Feb 12, 2016
1 parent 49e3b54 commit 5fae4a3
Showing 1 changed file with 52 additions and 52 deletions.
104 changes: 52 additions & 52 deletions tox.ini
Original file line number Diff line number Diff line change
Expand Up @@ -28,20 +28,20 @@ setenv =
# botocore.session.Session will attempt HTTP requests to 169.254.169.254 to
# retrieve Instance Metadata and IAM roles. In order to prevent this,
# we simply export bogus AWS keys.
AWS_ACCESS_KEY_ID=a
AWS_SECRET_ACCESS_KEY=b
AWS_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_SECRET_ACCESS_KEY=MightAsWellNotHaveThisVarSetHere
AWS_DEFAULT_REGION=us-east-1
AWS_MAIN_ACCESS_KEY_ID=c
AWS_MAIN_SECRET_ACCESS_KEY=d
AWS_MASTER_ACCOUNT_ID=1
AWS_EXTERNAL_ID=e
AWS_INTEGRATION_ACCESS_KEY_ID=f
AWS_INTEGRATION_SECRET_KEY=g
AWS_MFA_EXTERNAL_ID=h
AWS_MFA_INTEGRATION_ACCESS_KEY_ID=i
AWS_MFA_INTEGRATION_SECRET_KEY=j
AWS_MFA_SERIAL=k
AWS_MFA_SECRET=l
AWS_MAIN_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_MAIN_SECRET_ACCESS_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MASTER_ACCOUNT_ID=MightAsWellNotHaveThisVarSetHere
AWS_EXTERNAL_ID=MightAsWellNotHaveThisVarSetHere
AWS_INTEGRATION_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_INTEGRATION_SECRET_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MFA_EXTERNAL_ID=MightAsWellNotHaveThisVarSetHere
AWS_MFA_INTEGRATION_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_MFA_INTEGRATION_SECRET_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MFA_SERIAL=MightAsWellNotHaveThisVarSetHere
AWS_MFA_SECRET=MightAsWellNotHaveThisVarSetHere

sitepackages = False
whitelist_externals = env test
Expand Down Expand Up @@ -86,20 +86,20 @@ setenv =
# botocore.session.Session will attempt HTTP requests to 169.254.169.254 to
# retrieve Instance Metadata and IAM roles. In order to prevent this,
# we simply export bogus AWS keys.
AWS_ACCESS_KEY_ID=a
AWS_SECRET_ACCESS_KEY=b
AWS_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_SECRET_ACCESS_KEY=MightAsWellNotHaveThisVarSetHere
AWS_DEFAULT_REGION=us-east-1
AWS_MAIN_ACCESS_KEY_ID=c
AWS_MAIN_SECRET_ACCESS_KEY=d
AWS_MASTER_ACCOUNT_ID=1
AWS_EXTERNAL_ID=e
AWS_INTEGRATION_ACCESS_KEY_ID=f
AWS_INTEGRATION_SECRET_KEY=g
AWS_MFA_EXTERNAL_ID=h
AWS_MFA_INTEGRATION_ACCESS_KEY_ID=i
AWS_MFA_INTEGRATION_SECRET_KEY=j
AWS_MFA_SERIAL=k
AWS_MFA_SECRET=l
AWS_MAIN_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_MAIN_SECRET_ACCESS_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MASTER_ACCOUNT_ID=MightAsWellNotHaveThisVarSetHere
AWS_EXTERNAL_ID=MightAsWellNotHaveThisVarSetHere
AWS_INTEGRATION_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_INTEGRATION_SECRET_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MFA_EXTERNAL_ID=MightAsWellNotHaveThisVarSetHere
AWS_MFA_INTEGRATION_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_MFA_INTEGRATION_SECRET_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MFA_SERIAL=MightAsWellNotHaveThisVarSetHere
AWS_MFA_SECRET=MightAsWellNotHaveThisVarSetHere

sitepackages = False
whitelist_externals = env test
Expand Down Expand Up @@ -141,20 +141,20 @@ setenv =
# botocore.session.Session will attempt HTTP requests to 169.254.169.254 to
# retrieve Instance Metadata and IAM roles. In order to prevent this,
# we simply export bogus AWS keys.
AWS_ACCESS_KEY_ID=a
AWS_SECRET_ACCESS_KEY=b
AWS_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_SECRET_ACCESS_KEY=MightAsWellNotHaveThisVarSetHere
AWS_DEFAULT_REGION=us-east-1
AWS_MAIN_ACCESS_KEY_ID=c
AWS_MAIN_SECRET_ACCESS_KEY=d
AWS_MASTER_ACCOUNT_ID=1
AWS_EXTERNAL_ID=e
AWS_INTEGRATION_ACCESS_KEY_ID=f
AWS_INTEGRATION_SECRET_KEY=g
AWS_MFA_EXTERNAL_ID=h
AWS_MFA_INTEGRATION_ACCESS_KEY_ID=i
AWS_MFA_INTEGRATION_SECRET_KEY=j
AWS_MFA_SERIAL=k
AWS_MFA_SECRET=l
AWS_MAIN_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_MAIN_SECRET_ACCESS_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MASTER_ACCOUNT_ID=MightAsWellNotHaveThisVarSetHere
AWS_EXTERNAL_ID=MightAsWellNotHaveThisVarSetHere
AWS_INTEGRATION_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_INTEGRATION_SECRET_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MFA_EXTERNAL_ID=MightAsWellNotHaveThisVarSetHere
AWS_MFA_INTEGRATION_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_MFA_INTEGRATION_SECRET_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MFA_SERIAL=MightAsWellNotHaveThisVarSetHere
AWS_MFA_SECRET=MightAsWellNotHaveThisVarSetHere

sitepackages = False
whitelist_externals = env test
Expand All @@ -179,20 +179,20 @@ setenv =
# botocore.session.Session will attempt HTTP requests to 169.254.169.254 to
# retrieve Instance Metadata and IAM roles. In order to prevent this,
# we simply export bogus AWS keys.
AWS_ACCESS_KEY_ID=a
AWS_SECRET_ACCESS_KEY=b
AWS_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_SECRET_ACCESS_KEY=MightAsWellNotHaveThisVarSetHere
AWS_DEFAULT_REGION=us-east-1
AWS_MAIN_ACCESS_KEY_ID=c
AWS_MAIN_SECRET_ACCESS_KEY=d
AWS_MASTER_ACCOUNT_ID=1
AWS_EXTERNAL_ID=e
AWS_INTEGRATION_ACCESS_KEY_ID=f
AWS_INTEGRATION_SECRET_KEY=g
AWS_MFA_EXTERNAL_ID=h
AWS_MFA_INTEGRATION_ACCESS_KEY_ID=i
AWS_MFA_INTEGRATION_SECRET_KEY=j
AWS_MFA_SERIAL=k
AWS_MFA_SECRET=l
AWS_MAIN_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_MAIN_SECRET_ACCESS_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MASTER_ACCOUNT_ID=MightAsWellNotHaveThisVarSetHere
AWS_EXTERNAL_ID=MightAsWellNotHaveThisVarSetHere
AWS_INTEGRATION_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_INTEGRATION_SECRET_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MFA_EXTERNAL_ID=MightAsWellNotHaveThisVarSetHere
AWS_MFA_INTEGRATION_ACCESS_KEY_ID=MightAsWellNotHaveThisVarSetHere
AWS_MFA_INTEGRATION_SECRET_KEY=MightAsWellNotHaveThisVarSetHere
AWS_MFA_SERIAL=MightAsWellNotHaveThisVarSetHere
AWS_MFA_SECRET=MightAsWellNotHaveThisVarSetHere

deps =
docutils
Expand Down

0 comments on commit 5fae4a3

Please sign in to comment.