# Try to mount the client, see that it fails
with self.assert_cluster_log("client session with non-allowable root '/baz' denied"):
with self.assertRaises(CommandFailedError):
- self.mount_b.mount(mount_path="/foo/bar")
+ self.mount_b.mount_wait(mount_path="/foo/bar")
def test_session_evict_blacklisted(self):
"""
# the volume.
self._configure_guest_auth(self.mount_b, self.mounts[2], guest_entity,
mount_path, namespace_prefix)
- self.mounts[2].mount(mount_path=mount_path)
+ self.mounts[2].mount_wait(mount_path=mount_path)
# The kernel client doesn't have the quota-based df behaviour,
# or quotas at all, so only exercise the client behaviour when
# Mount the volume.
guest_mounts[i].mountpoint_dir_name = 'mnt.{id}.{suffix}'.format(
id=guest_entity, suffix=str(i))
- guest_mounts[i].mount(mount_path=mount_paths[i])
+ guest_mounts[i].mount_wait(mount_path=mount_paths[i])
guest_mounts[i].write_n_mb("data.bin", 1)
mount_path, readonly=False)
# Mount the volume, and write to it.
- guest_mount.mount(mount_path=mount_path)
+ guest_mount.mount_wait(mount_path=mount_path)
guest_mount.write_n_mb("data.bin", 1)
# Change the guest auth ID's authorization to read-only mount access.
# immediate. The guest sees the change only after a remount of
# the volume.
guest_mount.umount_wait()
- guest_mount.mount(mount_path=mount_path)
+ guest_mount.mount_wait(mount_path=mount_path)
# Read existing content of the volume.
self.assertListEqual(guest_mount.ls(guest_mount.mountpoint), ["data.bin"])
# Mount the volume in the guest using the auth ID to assert that the
# auth caps are valid
- guest_mount.mount(mount_path=mount_path)
+ guest_mount.mount_wait(mount_path=mount_path)
def test_volume_without_namespace_isolation(self):
"""