fortify: update show output
All checks were successful
Test / Create distribution (push) Successful in 25s
Test / Sandbox (push) Successful in 1m48s
Test / Fortify (push) Successful in 2m31s
Test / Sandbox (race detector) (push) Successful in 2m49s
Test / Fpkg (push) Successful in 3m27s
Test / Fortify (race detector) (push) Successful in 4m8s
Test / Flake checks (push) Successful in 1m0s
All checks were successful
Test / Create distribution (push) Successful in 25s
Test / Sandbox (push) Successful in 1m48s
Test / Fortify (push) Successful in 2m31s
Test / Sandbox (race detector) (push) Successful in 2m49s
Test / Fpkg (push) Successful in 3m27s
Test / Fortify (race detector) (push) Successful in 4m8s
Test / Flake checks (push) Successful in 1m0s
Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
parent
ecdd4d8202
commit
986105958c
11
print.go
11
print.go
@ -77,7 +77,9 @@ func printShowInstance(
|
|||||||
if len(config.Confinement.Groups) > 0 {
|
if len(config.Confinement.Groups) > 0 {
|
||||||
t.Printf(" Groups:\t%q\n", config.Confinement.Groups)
|
t.Printf(" Groups:\t%q\n", config.Confinement.Groups)
|
||||||
}
|
}
|
||||||
t.Printf(" Directory:\t%s\n", config.Confinement.Outer)
|
if config.Confinement.Outer != "" {
|
||||||
|
t.Printf(" Directory:\t%s\n", config.Confinement.Outer)
|
||||||
|
}
|
||||||
if config.Confinement.Sandbox != nil {
|
if config.Confinement.Sandbox != nil {
|
||||||
sandbox := config.Confinement.Sandbox
|
sandbox := config.Confinement.Sandbox
|
||||||
if sandbox.Hostname != "" {
|
if sandbox.Hostname != "" {
|
||||||
@ -114,7 +116,12 @@ func printShowInstance(
|
|||||||
// Env map[string]string `json:"env"`
|
// Env map[string]string `json:"env"`
|
||||||
// Link [][2]string `json:"symlink"`
|
// Link [][2]string `json:"symlink"`
|
||||||
}
|
}
|
||||||
t.Printf(" Command:\t%s\n", strings.Join(config.Args, " "))
|
if config.Confinement.Sandbox != nil {
|
||||||
|
t.Printf(" Path:\t%s\n", config.Path)
|
||||||
|
}
|
||||||
|
if len(config.Args) > 0 {
|
||||||
|
t.Printf(" Arguments:\t%s\n", strings.Join(config.Args, " "))
|
||||||
|
}
|
||||||
t.Printf("\n")
|
t.Printf("\n")
|
||||||
|
|
||||||
if !short {
|
if !short {
|
||||||
|
@ -44,7 +44,8 @@ func Test_printShowInstance(t *testing.T) {
|
|||||||
Flags: userns net dev tty mapuid autoetc
|
Flags: userns net dev tty mapuid autoetc
|
||||||
Etc: /etc
|
Etc: /etc
|
||||||
Cover: /var/run/nscd
|
Cover: /var/run/nscd
|
||||||
Command: chromium --ignore-gpu-blocklist --disable-smooth-scrolling --enable-features=UseOzonePlatform --ozone-platform=wayland
|
Path: /run/current-system/sw/bin/chromium
|
||||||
|
Arguments: chromium --ignore-gpu-blocklist --disable-smooth-scrolling --enable-features=UseOzonePlatform --ozone-platform=wayland
|
||||||
|
|
||||||
Filesystem
|
Filesystem
|
||||||
+/nix/store
|
+/nix/store
|
||||||
@ -75,26 +76,22 @@ System bus
|
|||||||
App
|
App
|
||||||
ID: 0
|
ID: 0
|
||||||
Enablements: (no enablements)
|
Enablements: (no enablements)
|
||||||
Directory:
|
|
||||||
Command:
|
|
||||||
|
|
||||||
`},
|
`},
|
||||||
{"config flag none", nil, &fst.Config{Confinement: fst.ConfinementConfig{Sandbox: new(fst.SandboxConfig)}}, false, false, `App
|
{"config flag none", nil, &fst.Config{Confinement: fst.ConfinementConfig{Sandbox: new(fst.SandboxConfig)}}, false, false, `App
|
||||||
ID: 0
|
ID: 0
|
||||||
Enablements: (no enablements)
|
Enablements: (no enablements)
|
||||||
Directory:
|
|
||||||
Flags: none
|
Flags: none
|
||||||
Etc: /etc
|
Etc: /etc
|
||||||
Command:
|
Path:
|
||||||
|
|
||||||
`},
|
`},
|
||||||
{"config nil entries", nil, &fst.Config{Confinement: fst.ConfinementConfig{Sandbox: &fst.SandboxConfig{Filesystem: make([]*fst.FilesystemConfig, 1)}, ExtraPerms: make([]*fst.ExtraPermConfig, 1)}}, false, false, `App
|
{"config nil entries", nil, &fst.Config{Confinement: fst.ConfinementConfig{Sandbox: &fst.SandboxConfig{Filesystem: make([]*fst.FilesystemConfig, 1)}, ExtraPerms: make([]*fst.ExtraPermConfig, 1)}}, false, false, `App
|
||||||
ID: 0
|
ID: 0
|
||||||
Enablements: (no enablements)
|
Enablements: (no enablements)
|
||||||
Directory:
|
|
||||||
Flags: none
|
Flags: none
|
||||||
Etc: /etc
|
Etc: /etc
|
||||||
Command:
|
Path:
|
||||||
|
|
||||||
Filesystem
|
Filesystem
|
||||||
|
|
||||||
@ -106,8 +103,6 @@ Extra ACL
|
|||||||
App
|
App
|
||||||
ID: 0
|
ID: 0
|
||||||
Enablements: (no enablements)
|
Enablements: (no enablements)
|
||||||
Directory:
|
|
||||||
Command:
|
|
||||||
|
|
||||||
Session bus
|
Session bus
|
||||||
Filter: false
|
Filter: false
|
||||||
@ -128,7 +123,8 @@ App
|
|||||||
Flags: userns net dev tty mapuid autoetc
|
Flags: userns net dev tty mapuid autoetc
|
||||||
Etc: /etc
|
Etc: /etc
|
||||||
Cover: /var/run/nscd
|
Cover: /var/run/nscd
|
||||||
Command: chromium --ignore-gpu-blocklist --disable-smooth-scrolling --enable-features=UseOzonePlatform --ozone-platform=wayland
|
Path: /run/current-system/sw/bin/chromium
|
||||||
|
Arguments: chromium --ignore-gpu-blocklist --disable-smooth-scrolling --enable-features=UseOzonePlatform --ozone-platform=wayland
|
||||||
|
|
||||||
Filesystem
|
Filesystem
|
||||||
+/nix/store
|
+/nix/store
|
||||||
@ -163,8 +159,6 @@ State
|
|||||||
App
|
App
|
||||||
ID: 0
|
ID: 0
|
||||||
Enablements: (no enablements)
|
Enablements: (no enablements)
|
||||||
Directory:
|
|
||||||
Command:
|
|
||||||
|
|
||||||
`},
|
`},
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user