summaryrefslogtreecommitdiff
diff options
-rw-r--r--secboot/secboot_tpm.go1
-rw-r--r--secboot/secboot_tpm_test.go7
2 files changed, 2 insertions, 6 deletions
diff --git a/secboot/secboot_tpm.go b/secboot/secboot_tpm.go
index 330f1f757f..2b4206da2f 100644
--- a/secboot/secboot_tpm.go
+++ b/secboot/secboot_tpm.go
@@ -860,7 +860,6 @@ func efiImageFromBootFile(b *bootloader.BootFile) (sb.EFIImage, error) {
}
return sb.SnapFileEFIImage{
Container: snapf,
- Path: b.Snap,
FileName: b.Path,
}, nil
}
diff --git a/secboot/secboot_tpm_test.go b/secboot/secboot_tpm_test.go
index 9684e0c634..9db5c2de5b 100644
--- a/secboot/secboot_tpm_test.go
+++ b/secboot/secboot_tpm_test.go
@@ -585,7 +585,7 @@ func (s *secbootSuite) TestEFIImageFromBootFile(c *C) {
{
// happy case for snap file
bootFile: bootloader.NewBootFile(snapFile, "rel", bootloader.RoleRecovery),
- efiImage: sb.SnapFileEFIImage{Container: snapf, Path: snapFile, FileName: "rel"},
+ efiImage: sb.SnapFileEFIImage{Container: snapf, FileName: "rel"},
},
{
// invalid snap file
@@ -731,7 +731,6 @@ func (s *secbootSuite) TestSealKey(c *C) {
Source: sb.Shim,
Image: sb.SnapFileEFIImage{
Container: kernelSnap,
- Path: mockBF[4].Snap,
FileName: "kernel.efi",
},
},
@@ -751,7 +750,6 @@ func (s *secbootSuite) TestSealKey(c *C) {
Source: sb.Shim,
Image: sb.SnapFileEFIImage{
Container: kernelSnap,
- Path: mockBF[4].Snap,
FileName: "kernel.efi",
},
},
@@ -765,7 +763,6 @@ func (s *secbootSuite) TestSealKey(c *C) {
Source: sb.Shim,
Image: sb.SnapFileEFIImage{
Container: kernelSnap,
- Path: mockBF[4].Snap,
FileName: "kernel.efi",
},
},
@@ -1082,7 +1079,7 @@ func createMockSnapFile(snapDir, snapPath, snapType string) (snap.Container, err
}
func mockSbTPMConnection(c *C, tpmErr error) (*sb.TPMConnection, func()) {
- tcti, err := os.Open("/dev/null")
+ tcti, err := tpm2.OpenTPMDevice("/dev/null")
c.Assert(err, IsNil)
tpmctx, err := tpm2.NewTPMContext(tcti)
c.Assert(err, IsNil)