Compare commits
2 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
477ec86467 | ||
|
|
f83fdb7d55 |
96
docs/BEZALEL_TAILSCALE_BOOTSTRAP.md
Normal file
96
docs/BEZALEL_TAILSCALE_BOOTSTRAP.md
Normal file
@@ -0,0 +1,96 @@
|
||||
# Bezalel Tailscale Bootstrap
|
||||
|
||||
Refs #535
|
||||
|
||||
This is the repo-side operator packet for installing Tailscale on the Bezalel VPS and verifying the internal network path for federation work.
|
||||
|
||||
Important truth:
|
||||
- issue #535 names `104.131.15.18`
|
||||
- older Bezalel control-plane docs also mention `159.203.146.185`
|
||||
- the current source of truth in this repo is `ansible/inventory/hosts.ini`, which currently resolves `bezalel` to `67.205.155.108`
|
||||
|
||||
Because of that drift, `scripts/bezalel_tailscale_bootstrap.py` now resolves the target host from `ansible/inventory/hosts.ini` by default instead of trusting a stale hardcoded IP.
|
||||
|
||||
## What the script does
|
||||
|
||||
`python3 scripts/bezalel_tailscale_bootstrap.py`
|
||||
|
||||
Safe by default:
|
||||
- builds the remote bootstrap script
|
||||
- writes it locally to `/tmp/bezalel_tailscale_bootstrap.sh`
|
||||
- prints the SSH command needed to run it
|
||||
- does **not** touch the VPS unless `--apply` is passed
|
||||
|
||||
When applied, the remote script does all of the issue’s repo-side bootstrap steps:
|
||||
- installs Tailscale
|
||||
- runs `tailscale up --ssh --hostname bezalel`
|
||||
- appends the provided Mac SSH public key to `~/.ssh/authorized_keys`
|
||||
- prints `tailscale status --json`
|
||||
- pings the expected peer targets:
|
||||
- Mac: `100.124.176.28`
|
||||
- Ezra: `100.126.61.75`
|
||||
|
||||
## Required secrets / inputs
|
||||
|
||||
- Tailscale auth key
|
||||
- Mac SSH public key
|
||||
|
||||
Provide them either directly or through files:
|
||||
- `--auth-key` or `--auth-key-file`
|
||||
- `--ssh-public-key` or `--ssh-public-key-file`
|
||||
|
||||
## Dry-run example
|
||||
|
||||
```bash
|
||||
python3 scripts/bezalel_tailscale_bootstrap.py \
|
||||
--auth-key-file ~/.config/tailscale/auth_key \
|
||||
--ssh-public-key-file ~/.ssh/id_ed25519.pub \
|
||||
--json
|
||||
```
|
||||
|
||||
This prints:
|
||||
- resolved host
|
||||
- host source (`inventory:<path>` when pulled from `ansible/inventory/hosts.ini`)
|
||||
- local script path
|
||||
- SSH command to execute
|
||||
- peer targets
|
||||
|
||||
## Apply example
|
||||
|
||||
```bash
|
||||
python3 scripts/bezalel_tailscale_bootstrap.py \
|
||||
--auth-key-file ~/.config/tailscale/auth_key \
|
||||
--ssh-public-key-file ~/.ssh/id_ed25519.pub \
|
||||
--apply \
|
||||
--json
|
||||
```
|
||||
|
||||
## Verifying success after apply
|
||||
|
||||
The script now parses the remote stdout into structured verification data:
|
||||
- `verification.tailscale.self.tailscale_ips`
|
||||
- `verification.tailscale.self.dns_name`
|
||||
- `verification.peers`
|
||||
- `verification.ping_ok`
|
||||
|
||||
A successful run should show:
|
||||
- at least one Bezalel Tailscale IP under `tailscale_ips`
|
||||
- `ping_ok.mac = 100.124.176.28`
|
||||
- `ping_ok.ezra = 100.126.61.75`
|
||||
|
||||
## Expected remote install commands
|
||||
|
||||
```bash
|
||||
curl -fsSL https://tailscale.com/install.sh | sh
|
||||
tailscale up --ssh --hostname bezalel
|
||||
install -d -m 700 ~/.ssh
|
||||
touch ~/.ssh/authorized_keys && chmod 600 ~/.ssh/authorized_keys
|
||||
tailscale status --json
|
||||
```
|
||||
|
||||
## Why this PR does not claim live completion
|
||||
|
||||
This repo can safely ship the bootstrap script, host resolution logic, structured proof parsing, and operator packet.
|
||||
It cannot honestly claim that Bezalel was actually joined to the tailnet unless a human/operator runs the script with a real auth key and real SSH access to the VPS.
|
||||
|
||||
That means the correct PR language for #535 is advancement, not pretend closure.
|
||||
@@ -14,6 +14,7 @@ Quick-reference index for common operational tasks across the Timmy Foundation i
|
||||
| Agent scorecard | fleet-ops | `python3 scripts/agent_scorecard.py` |
|
||||
| View fleet manifest | fleet-ops | `cat manifest.yaml` |
|
||||
| Run nightly codebase genome pass | timmy-home | `python3 scripts/codebase_genome_nightly.py --dry-run` |
|
||||
| Prepare Bezalel Tailscale bootstrap | timmy-home | `python3 scripts/bezalel_tailscale_bootstrap.py --auth-key-file <path> --ssh-public-key-file <path> --json` |
|
||||
|
||||
## the-nexus (Frontend + Brain)
|
||||
|
||||
|
||||
@@ -12,27 +12,6 @@ WORLD_DIR = Path('/Users/apayne/.timmy/evennia/timmy_world')
|
||||
STATE_FILE = WORLD_DIR / 'game_state.json'
|
||||
TIMMY_LOG = WORLD_DIR / 'timmy_log.md'
|
||||
|
||||
FRIENDSHIP_THRESHOLD = 0.5
|
||||
TENSION_THRESHOLD = -0.5
|
||||
NPC_RELATIONSHIP_SEEDS = {
|
||||
("Kimi", "Marcus"): {
|
||||
"values": {"Kimi": 0.45, "Marcus": 0.47},
|
||||
"conversation": "While you are away, Marcus and Kimi trade a quiet confidence beneath the oak.",
|
||||
"milestone": "A friendship starts to take root between Marcus and Kimi.",
|
||||
"hint": "Marcus and Kimi move with the easy familiarity of old friends.",
|
||||
"delta": 0.08,
|
||||
"kind": "friendship",
|
||||
},
|
||||
("Bezalel", "ClawCode"): {
|
||||
"values": {"Bezalel": -0.46, "ClawCode": -0.44},
|
||||
"conversation": "While you are away, Bezalel and ClawCode clash over what the forge is for.",
|
||||
"milestone": "Tension hardens between Bezalel and ClawCode at the anvil.",
|
||||
"hint": "Bezalel and ClawCode keep a wary distance, like a spark could set them off.",
|
||||
"delta": -0.08,
|
||||
"kind": "tension",
|
||||
},
|
||||
}
|
||||
|
||||
# ============================================================
|
||||
# NARRATIVE ARC — 4 phases that transform the world
|
||||
# ============================================================
|
||||
@@ -279,35 +258,7 @@ class World:
|
||||
"items_crafted": 0,
|
||||
"conflicts_resolved": 0,
|
||||
"nights_survived": 0,
|
||||
"npc_friendships": [],
|
||||
"npc_tensions": [],
|
||||
}
|
||||
self._initialize_npc_relationships(apply_seeds=True)
|
||||
|
||||
def _initialize_npc_relationships(self, apply_seeds=False):
|
||||
npc_names = [name for name, char in self.characters.items() if not char.get("is_player", False)]
|
||||
for npc_name in npc_names:
|
||||
trust_map = self.characters[npc_name]["trust"]
|
||||
for other_name in npc_names:
|
||||
if other_name != npc_name:
|
||||
trust_map.setdefault(other_name, 0.0)
|
||||
if apply_seeds:
|
||||
for pair, seed in NPC_RELATIONSHIP_SEEDS.items():
|
||||
left, right = pair
|
||||
self.characters[left]["trust"][right] = seed["values"][left]
|
||||
self.characters[right]["trust"][left] = seed["values"][right]
|
||||
self.state.setdefault("npc_friendships", [])
|
||||
self.state.setdefault("npc_tensions", [])
|
||||
|
||||
def relationship_hint_for_room(self, room_name, occupants):
|
||||
hints = []
|
||||
occupant_set = set(occupants)
|
||||
for bucket in ("npc_friendships", "npc_tensions"):
|
||||
for entry in self.state.get(bucket, []):
|
||||
pair = set(entry.get("pair", []))
|
||||
if entry.get("room") == room_name and pair.issubset(occupant_set):
|
||||
hints.append(entry.get("hint", ""))
|
||||
return [hint for hint in hints if hint]
|
||||
|
||||
def tick_time(self):
|
||||
"""Advance time of day."""
|
||||
@@ -438,8 +389,6 @@ class World:
|
||||
here = [n for n, c in self.characters.items() if c["room"] == room_name and n != char_name]
|
||||
if here:
|
||||
desc += f"\n Here: {', '.join(here)}"
|
||||
for hint in self.relationship_hint_for_room(room_name, here):
|
||||
desc += f" {hint}"
|
||||
|
||||
return desc
|
||||
|
||||
@@ -465,12 +414,6 @@ class World:
|
||||
self.rooms = data.get("rooms", self.rooms)
|
||||
self.characters = data.get("characters", self.characters)
|
||||
self.state = data.get("state", self.state)
|
||||
needs_seed = not any(
|
||||
any(other != "Timmy" for other in char.get("trust", {}))
|
||||
for name, char in self.characters.items()
|
||||
if not char.get("is_player", False)
|
||||
)
|
||||
self._initialize_npc_relationships(apply_seeds=needs_seed)
|
||||
return True
|
||||
return False
|
||||
|
||||
@@ -1129,69 +1072,6 @@ class GameEngine:
|
||||
f.write(f"\n*Began: {datetime.now().strftime('%Y-%m-%d %H:%M')}*\n\n")
|
||||
f.write("---\n\n")
|
||||
f.write(message + "\n")
|
||||
|
||||
def _adjust_mutual_trust(self, left, right, delta):
|
||||
for speaker, listener in ((left, right), (right, left)):
|
||||
trust_map = self.world.characters[speaker]["trust"]
|
||||
trust_map[listener] = max(-1.0, min(1.0, trust_map.get(listener, 0.0) + delta))
|
||||
|
||||
def _record_relationship_milestone(self, scene, room_name, pair, bucket, milestone, hint):
|
||||
pair_list = list(pair)
|
||||
entries = self.world.state.setdefault(bucket, [])
|
||||
if any(entry.get("pair") == pair_list for entry in entries):
|
||||
return
|
||||
entries.append({
|
||||
"pair": pair_list,
|
||||
"room": room_name,
|
||||
"summary": milestone,
|
||||
"hint": hint,
|
||||
})
|
||||
scene["world_events"].append(milestone)
|
||||
|
||||
def _run_offscreen_npc_relationships(self, scene):
|
||||
timmy_room = self.world.characters["Timmy"]["room"]
|
||||
rooms = {}
|
||||
for char_name, char in self.world.characters.items():
|
||||
if char.get("is_player", False):
|
||||
continue
|
||||
rooms.setdefault(char["room"], []).append(char_name)
|
||||
|
||||
for room_name, occupants in rooms.items():
|
||||
if room_name == timmy_room or len(occupants) < 2:
|
||||
continue
|
||||
occupant_set = set(occupants)
|
||||
for pair, seed in NPC_RELATIONSHIP_SEEDS.items():
|
||||
if not set(pair).issubset(occupant_set):
|
||||
continue
|
||||
left, right = pair
|
||||
self._adjust_mutual_trust(left, right, seed["delta"])
|
||||
scene["npc_actions"].append(f"{left} and {right} speak in The {room_name} while you are away.")
|
||||
scene["world_events"].append(seed["conversation"])
|
||||
self.world.characters[left]["spoken"].append(seed["conversation"])
|
||||
self.world.characters[right]["spoken"].append(seed["conversation"])
|
||||
self.world.characters[left]["memories"].append(seed["conversation"])
|
||||
self.world.characters[right]["memories"].append(seed["conversation"])
|
||||
|
||||
left_trust = self.world.characters[left]["trust"][right]
|
||||
right_trust = self.world.characters[right]["trust"][left]
|
||||
if seed["kind"] == "friendship" and left_trust >= FRIENDSHIP_THRESHOLD and right_trust >= FRIENDSHIP_THRESHOLD:
|
||||
self._record_relationship_milestone(
|
||||
scene,
|
||||
room_name,
|
||||
pair,
|
||||
"npc_friendships",
|
||||
seed["milestone"],
|
||||
seed["hint"],
|
||||
)
|
||||
elif seed["kind"] == "tension" and left_trust <= TENSION_THRESHOLD and right_trust <= TENSION_THRESHOLD:
|
||||
self._record_relationship_milestone(
|
||||
scene,
|
||||
room_name,
|
||||
pair,
|
||||
"npc_tensions",
|
||||
seed["milestone"],
|
||||
seed["hint"],
|
||||
)
|
||||
|
||||
def run_tick(self, timmy_action="look"):
|
||||
"""Run one tick. Return the scene and available choices."""
|
||||
@@ -1517,8 +1397,6 @@ class GameEngine:
|
||||
self.world.characters[char_name]["room"] = dest
|
||||
self.world.characters[char_name]["energy"] -= 1
|
||||
scene["npc_actions"].append(f"{char_name} moves from The {old_room} to The {dest}")
|
||||
|
||||
self._run_offscreen_npc_relationships(scene)
|
||||
|
||||
# Random NPC events — phase-aware speech
|
||||
room_name = self.world.characters["Timmy"]["room"]
|
||||
|
||||
@@ -16,11 +16,14 @@ import argparse
|
||||
import json
|
||||
import shlex
|
||||
import subprocess
|
||||
import re
|
||||
from json import JSONDecoder
|
||||
from pathlib import Path
|
||||
from typing import Any
|
||||
|
||||
DEFAULT_HOST = "159.203.146.185"
|
||||
DEFAULT_HOST = "67.205.155.108"
|
||||
DEFAULT_HOSTNAME = "bezalel"
|
||||
DEFAULT_INVENTORY_PATH = Path(__file__).resolve().parents[1] / "ansible" / "inventory" / "hosts.ini"
|
||||
DEFAULT_PEERS = {
|
||||
"mac": "100.124.176.28",
|
||||
"ezra": "100.126.61.75",
|
||||
@@ -66,6 +69,37 @@ def parse_tailscale_status(payload: dict[str, Any]) -> dict[str, Any]:
|
||||
}
|
||||
|
||||
|
||||
def resolve_host(host: str | None, inventory_path: Path = DEFAULT_INVENTORY_PATH, hostname: str = DEFAULT_HOSTNAME) -> tuple[str, str]:
|
||||
if host:
|
||||
return host, "explicit"
|
||||
if inventory_path.exists():
|
||||
pattern = re.compile(rf"^{re.escape(hostname)}\s+.*ansible_host=([^\s]+)")
|
||||
for line in inventory_path.read_text().splitlines():
|
||||
match = pattern.search(line.strip())
|
||||
if match:
|
||||
return match.group(1), f"inventory:{inventory_path}"
|
||||
return DEFAULT_HOST, "default"
|
||||
|
||||
|
||||
def parse_apply_output(stdout: str) -> dict[str, Any]:
|
||||
result: dict[str, Any] = {"tailscale": None, "ping_ok": {}}
|
||||
text = stdout or ""
|
||||
start = text.find("{")
|
||||
if start != -1:
|
||||
try:
|
||||
payload, _ = JSONDecoder().raw_decode(text[start:])
|
||||
if isinstance(payload, dict):
|
||||
result["tailscale"] = parse_tailscale_status(payload)
|
||||
except Exception:
|
||||
pass
|
||||
|
||||
for line in text.splitlines():
|
||||
if line.startswith("PING_OK:"):
|
||||
_, name, ip = line.split(":", 2)
|
||||
result["ping_ok"][name] = ip
|
||||
return result
|
||||
|
||||
|
||||
def build_ssh_command(host: str, remote_script_path: str = "/tmp/bezalel_tailscale_bootstrap.sh") -> list[str]:
|
||||
return ["ssh", host, f"bash {shlex.quote(remote_script_path)}"]
|
||||
|
||||
@@ -89,8 +123,9 @@ def parse_peer_args(items: list[str]) -> dict[str, str]:
|
||||
|
||||
def parse_args() -> argparse.Namespace:
|
||||
parser = argparse.ArgumentParser(description="Prepare or execute Tailscale bootstrap for the Bezalel VPS.")
|
||||
parser.add_argument("--host", default=DEFAULT_HOST)
|
||||
parser.add_argument("--host")
|
||||
parser.add_argument("--hostname", default=DEFAULT_HOSTNAME)
|
||||
parser.add_argument("--inventory-path", type=Path, default=DEFAULT_INVENTORY_PATH)
|
||||
parser.add_argument("--auth-key", help="Tailscale auth key")
|
||||
parser.add_argument("--auth-key-file", type=Path, help="Path to file containing the Tailscale auth key")
|
||||
parser.add_argument("--ssh-public-key", help="SSH public key to append to authorized_keys")
|
||||
@@ -116,6 +151,7 @@ def main() -> None:
|
||||
auth_key = _read_secret(args.auth_key, args.auth_key_file)
|
||||
ssh_public_key = _read_secret(args.ssh_public_key, args.ssh_public_key_file)
|
||||
peers = parse_peer_args(args.peer)
|
||||
resolved_host, host_source = resolve_host(args.host, args.inventory_path, args.hostname)
|
||||
|
||||
if not auth_key:
|
||||
raise SystemExit("Missing Tailscale auth key. Use --auth-key or --auth-key-file.")
|
||||
@@ -126,28 +162,31 @@ def main() -> None:
|
||||
write_script(args.script_out, script)
|
||||
|
||||
payload: dict[str, Any] = {
|
||||
"host": args.host,
|
||||
"host": resolved_host,
|
||||
"host_source": host_source,
|
||||
"hostname": args.hostname,
|
||||
"inventory_path": str(args.inventory_path),
|
||||
"script_out": str(args.script_out),
|
||||
"remote_script_path": args.remote_script_path,
|
||||
"ssh_command": build_ssh_command(args.host, args.remote_script_path),
|
||||
"ssh_command": build_ssh_command(resolved_host, args.remote_script_path),
|
||||
"peer_targets": peers,
|
||||
"applied": False,
|
||||
}
|
||||
|
||||
if args.apply:
|
||||
result = run_remote(args.host, args.remote_script_path)
|
||||
result = run_remote(resolved_host, args.remote_script_path)
|
||||
payload["applied"] = True
|
||||
payload["exit_code"] = result.returncode
|
||||
payload["stdout"] = result.stdout
|
||||
payload["stderr"] = result.stderr
|
||||
payload["verification"] = parse_apply_output(result.stdout)
|
||||
|
||||
if args.json:
|
||||
print(json.dumps(payload, indent=2))
|
||||
return
|
||||
|
||||
print("--- Bezalel Tailscale Bootstrap ---")
|
||||
print(f"Host: {args.host}")
|
||||
print(f"Host: {resolved_host} ({host_source})")
|
||||
print(f"Local script: {args.script_out}")
|
||||
print("SSH command: " + " ".join(payload["ssh_command"]))
|
||||
if args.apply:
|
||||
|
||||
@@ -2,9 +2,12 @@ from scripts.bezalel_tailscale_bootstrap import (
|
||||
DEFAULT_PEERS,
|
||||
build_remote_script,
|
||||
build_ssh_command,
|
||||
parse_apply_output,
|
||||
parse_peer_args,
|
||||
parse_tailscale_status,
|
||||
resolve_host,
|
||||
)
|
||||
from pathlib import Path
|
||||
|
||||
|
||||
def test_build_remote_script_contains_install_up_and_key_append():
|
||||
@@ -78,3 +81,46 @@ def test_parse_peer_args_merges_overrides_into_defaults():
|
||||
"ezra": "100.126.61.76",
|
||||
"forge": "100.70.0.9",
|
||||
}
|
||||
|
||||
|
||||
def test_resolve_host_prefers_inventory_over_stale_default(tmp_path: Path):
|
||||
inventory = tmp_path / "hosts.ini"
|
||||
inventory.write_text(
|
||||
"[fleet]\n"
|
||||
"ezra ansible_host=143.198.27.163 ansible_user=root\n"
|
||||
"bezalel ansible_host=67.205.155.108 ansible_user=root\n"
|
||||
)
|
||||
|
||||
host, source = resolve_host(None, inventory)
|
||||
|
||||
assert host == "67.205.155.108"
|
||||
assert source == f"inventory:{inventory}"
|
||||
|
||||
|
||||
def test_parse_apply_output_extracts_status_and_ping_markers():
|
||||
stdout = (
|
||||
'{"Self": {"HostName": "bezalel", "DNSName": "bezalel.tailnet.ts.net", "TailscaleIPs": ["100.90.0.10"]}, '
|
||||
'"Peer": {"node-1": {"HostName": "ezra", "TailscaleIPs": ["100.126.61.75"]}}}'
|
||||
"\nPING_OK:mac:100.124.176.28\n"
|
||||
"PING_OK:ezra:100.126.61.75\n"
|
||||
)
|
||||
|
||||
result = parse_apply_output(stdout)
|
||||
|
||||
assert result["tailscale"]["self"]["tailscale_ips"] == ["100.90.0.10"]
|
||||
assert result["ping_ok"] == {"mac": "100.124.176.28", "ezra": "100.126.61.75"}
|
||||
|
||||
|
||||
def test_runbook_doc_exists_and_mentions_inventory_auth_and_peer_checks():
|
||||
doc = Path("docs/BEZALEL_TAILSCALE_BOOTSTRAP.md")
|
||||
assert doc.exists(), "missing docs/BEZALEL_TAILSCALE_BOOTSTRAP.md"
|
||||
text = doc.read_text()
|
||||
assert "ansible/inventory/hosts.ini" in text
|
||||
assert "tailscale up" in text
|
||||
assert "authorized_keys" in text
|
||||
assert "100.124.176.28" in text
|
||||
assert "100.126.61.75" in text
|
||||
|
||||
runbook = Path("docs/RUNBOOK_INDEX.md").read_text()
|
||||
assert "Prepare Bezalel Tailscale bootstrap" in runbook
|
||||
assert "scripts/bezalel_tailscale_bootstrap.py" in runbook
|
||||
|
||||
@@ -1,52 +0,0 @@
|
||||
from importlib.util import module_from_spec, spec_from_file_location
|
||||
from pathlib import Path
|
||||
import unittest
|
||||
|
||||
|
||||
ROOT = Path(__file__).resolve().parent.parent
|
||||
GAME_PATH = ROOT / "evennia" / "timmy_world" / "game.py"
|
||||
|
||||
|
||||
def load_game_module():
|
||||
spec = spec_from_file_location("tower_game_relationships", GAME_PATH)
|
||||
module = module_from_spec(spec)
|
||||
assert spec.loader is not None
|
||||
spec.loader.exec_module(module)
|
||||
module.random.seed(0)
|
||||
return module
|
||||
|
||||
|
||||
class TestTowerGameNpcRelationships(unittest.TestCase):
|
||||
def test_each_npc_tracks_trust_for_every_other_npc(self):
|
||||
module = load_game_module()
|
||||
world = module.World()
|
||||
npc_names = [name for name, char in world.characters.items() if not char.get("is_player", False)]
|
||||
|
||||
for npc_name in npc_names:
|
||||
with self.subTest(npc=npc_name):
|
||||
trust_map = world.characters[npc_name]["trust"]
|
||||
expected = set(npc_names) - {npc_name}
|
||||
self.assertTrue(expected.issubset(set(trust_map)), f"{npc_name} missing NPC trust keys: {sorted(expected - set(trust_map))}")
|
||||
|
||||
def test_offscreen_npc_conversations_create_friendship_and_tension(self):
|
||||
module = load_game_module()
|
||||
engine = module.GameEngine()
|
||||
engine.start_new_game()
|
||||
|
||||
result = engine.run_tick("look")
|
||||
|
||||
friendships = {tuple(rel["pair"]) for rel in engine.world.state["npc_friendships"]}
|
||||
tensions = {tuple(rel["pair"]) for rel in engine.world.state["npc_tensions"]}
|
||||
|
||||
self.assertIn(("Kimi", "Marcus"), friendships)
|
||||
self.assertIn(("Bezalel", "ClawCode"), tensions)
|
||||
self.assertTrue(any("while you are away" in line.lower() for line in result["world_events"]))
|
||||
|
||||
garden_desc = engine.world.get_room_desc("Garden", "Timmy")
|
||||
forge_desc = engine.world.get_room_desc("Forge", "Timmy")
|
||||
self.assertIn("Marcus and Kimi", garden_desc)
|
||||
self.assertIn("Bezalel and ClawCode", forge_desc)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
unittest.main()
|
||||
Reference in New Issue
Block a user