diff --git a/internals/daemon/api_exec_test.go b/internals/daemon/api_exec_test.go index 23ede9ae..37694882 100644 --- a/internals/daemon/api_exec_test.go +++ b/internals/daemon/api_exec_test.go @@ -258,7 +258,6 @@ func (s *execSuite) TestCurrentUserGroup(c *C) { c.Check(stderr, Equals, "") } -// See .github/workflows/tests.yml for how to run this test as root. func (s *execSuite) TestUserGroup(c *C) { if os.Getuid() != 0 { c.Skip("requires running as root") @@ -286,7 +285,6 @@ func (s *execSuite) TestUserGroup(c *C) { c.Assert(err, ErrorMatches, `.*home directory.*does not exist`) } -// See .github/workflows/tests.yml for how to run this test as root. func (s *execSuite) TestUserIDGroupID(c *C) { if os.Getuid() != 0 { c.Skip("requires running as root") diff --git a/internals/daemon/api_files_test.go b/internals/daemon/api_files_test.go index 79c0f97e..e3bc792e 100644 --- a/internals/daemon/api_files_test.go +++ b/internals/daemon/api_files_test.go @@ -531,7 +531,6 @@ func (s *filesSuite) testMakeDirsUserGroup(c *C, uid, gid int, user, group strin return tmpDir } -// See .github/workflows/tests.yml for how to run this test as root. func (s *filesSuite) TestMakeDirsUserGroupReal(c *C) { if os.Getuid() != 0 { c.Skip("requires running as root") @@ -988,7 +987,6 @@ func (s *filesSuite) TestWriteUserGroupMocked(c *C) { c.Check(mkdirCalls[1], Equals, mkdirArgs{tmpDir + "/nested2", 0o755, osutil.MkdirOptions{MakeParents: true, ExistOK: true, Chmod: true, Chown: true, UserID: 56, GroupID: 78}}) } -// See .github/workflows/tests.yml for how to run this test as root. func (s *filesSuite) TestWriteUserGroupReal(c *C) { if os.Getuid() != 0 { c.Skip("requires running as root") diff --git a/internals/osutil/mkdir_test.go b/internals/osutil/mkdir_test.go index 6983e26d..21668e3f 100644 --- a/internals/osutil/mkdir_test.go +++ b/internals/osutil/mkdir_test.go @@ -208,7 +208,6 @@ func (mkdirSuite) TestMakeParentsAndNoChmod(c *check.C) { c.Assert(info.Mode().Perm(), check.Equals, os.FileMode(0o755)) } -// See .github/workflows/tests.yml for how to run this test as root. func (mkdirSuite) TestMakeParentsChmodAndChown(c *check.C) { if os.Getuid() != 0 { c.Skip("requires running as root") diff --git a/internals/overlord/servstate/manager_test.go b/internals/overlord/servstate/manager_test.go index 391e4162..c097336c 100644 --- a/internals/overlord/servstate/manager_test.go +++ b/internals/overlord/servstate/manager_test.go @@ -532,7 +532,6 @@ func (s *S) TestUserGroupFails(c *C) { c.Check(gotGid, Equals, uint32(gid)) } -// See .github/workflows/tests.yml for how to run this test as root. func (s *S) TestUserGroup(c *C) { s.newServiceManager(c) s.planAddLayer(c, testPlanLayer)