internal/env: cleaner runtime dir fallback
All checks were successful
Test / Create distribution (push) Successful in 34s
Test / Sandbox (push) Successful in 2m16s
Test / Hakurei (push) Successful in 3m10s
Test / Hpkg (push) Successful in 4m1s
Test / Sandbox (race detector) (push) Successful in 4m14s
Test / Hakurei (race detector) (push) Successful in 4m57s
Test / Flake checks (push) Successful in 1m28s
All checks were successful
Test / Create distribution (push) Successful in 34s
Test / Sandbox (push) Successful in 2m16s
Test / Hakurei (push) Successful in 3m10s
Test / Hpkg (push) Successful in 4m1s
Test / Sandbox (race detector) (push) Successful in 4m14s
Test / Hakurei (race detector) (push) Successful in 4m57s
Test / Flake checks (push) Successful in 1m28s
This now places rundir inside the fallback runtime dir, so special case in internal/outcome is avoided. Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
@@ -64,10 +64,10 @@ func TestSpWaylandOp(t *testing.T) {
|
||||
call("verbose", stub.ExpectArgs{[]any{"direct wayland access, PROCEED WITH CAUTION"}}, nil, nil),
|
||||
}, newI().
|
||||
// state.ensureRuntimeDir
|
||||
Ensure(m(wantRunDirPath), 0700).
|
||||
UpdatePermType(system.User, m(wantRunDirPath), acl.Execute).
|
||||
Ensure(m(wantRuntimePath), 0700).
|
||||
UpdatePermType(system.User, m(wantRuntimePath), acl.Execute).
|
||||
Ensure(m(wantRunDirPath), 0700).
|
||||
UpdatePermType(system.User, m(wantRunDirPath), acl.Execute).
|
||||
// toSystem
|
||||
UpdatePermType(hst.EWayland, m("/proc/nonexistent/wayland"), acl.Read, acl.Write, acl.Execute), nil, nil, insertsOps(afterSpRuntimeOp(nil)), []stub.Call{
|
||||
// this op configures the container state and does not make calls during toContainer
|
||||
|
||||
Reference in New Issue
Block a user