Skip to content

Commit

Permalink
SSH host key checking shouldn't break backups/restores
Browse files Browse the repository at this point in the history
  • Loading branch information
rubiojr committed Sep 20, 2016
1 parent cb271d7 commit 6b4790e
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion bin/ghe-backup
Original file line number Diff line number Diff line change
Expand Up @@ -249,7 +249,7 @@ fi

# Detect if the created backup contains any leaked ssh keys
echo "Checking for leaked ssh keys ..."
ghe-detect-leaked-ssh-keys -s "$GHE_SNAPSHOT_DIR"
ghe-detect-leaked-ssh-keys -s "$GHE_SNAPSHOT_DIR" || true

# Make sure we exit zero after the conditional
true
2 changes: 1 addition & 1 deletion bin/ghe-restore
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ export GHE_RESTORE_SNAPSHOT

# Detect if the backup we are restoring has a leaked ssh key
echo "Checking for leaked keys in the backup snapshot that is being restored ..."
ghe-detect-leaked-ssh-keys -s "$GHE_RESTORE_SNAPSHOT_PATH"
ghe-detect-leaked-ssh-keys -s "$GHE_RESTORE_SNAPSHOT_PATH" || true

# Figure out whether to use the tarball or rsync restore strategy based on the
# strategy file written in the snapshot directory.
Expand Down

0 comments on commit 6b4790e

Please sign in to comment.