Fix breakage of bazel_sandboxing_test:test_sandbox_block_filesystem.
This failed, because if the Bazel workspace is in your home directory, obviously
/home gets created in the sandbox.
--
MOS_MIGRATED_REVID=101921457
diff --git a/src/test/shell/bazel/bazel_sandboxing_test.sh b/src/test/shell/bazel/bazel_sandboxing_test.sh
index 14f110a..4403b07 100755
--- a/src/test/shell/bazel/bazel_sandboxing_test.sh
+++ b/src/test/shell/bazel/bazel_sandboxing_test.sh
@@ -126,14 +126,14 @@
name = "breaks2",
srcs = [ "a.txt" ],
outs = [ "breaks2.txt" ],
- # the point of this test is to attempt to read something from filesystem
- # that resides outside sandbox by using an absolute path to that file
+ # The point of this test is to attempt to read something from the filesystem
+ # that resides outside the sandbox by using an absolute path to that file.
#
- # /home is an arbitrary choice of directory (we doesn't mount it in sandbox
- # and it should exist on every linux) which could be changed in case it turns
- # out it's necessary to put it in sandbox
+ # /var/log is an arbitrary choice of directory (we don't mount it in the
+ # sandbox and it should exist on every linux) which could be changed in
+ # case it turns out it's necessary to put it in sandbox.
#
- cmd = "ls /home > $@",
+ cmd = "ls /var/log > $@",
)
genrule(