mirror of
https://github.com/systemd/systemd.git
synced 2025-09-09 17:44:49 +03:00
test: make sure that {readonly|inaccessible|readwrite}paths disconnect mount propagation
Better safe.
This commit is contained in:
@@ -1644,6 +1644,9 @@ EXTRA_DIST += \
|
|||||||
test/test-execute/exec-privatetmp-no.service \
|
test/test-execute/exec-privatetmp-no.service \
|
||||||
test/test-execute/exec-privatetmp-yes.service \
|
test/test-execute/exec-privatetmp-yes.service \
|
||||||
test/test-execute/exec-readonlypaths.service \
|
test/test-execute/exec-readonlypaths.service \
|
||||||
|
test/test-execute/exec-readonlypaths-mount-propagation.service \
|
||||||
|
test/test-execute/exec-readwritepaths-mount-propagation.service \
|
||||||
|
test/test-execute/exec-inaccessiblepaths-mount-propagation.service \
|
||||||
test/test-execute/exec-spec-interpolation.service \
|
test/test-execute/exec-spec-interpolation.service \
|
||||||
test/test-execute/exec-systemcallerrornumber.service \
|
test/test-execute/exec-systemcallerrornumber.service \
|
||||||
test/test-execute/exec-systemcallfilter-failing2.service \
|
test/test-execute/exec-systemcallfilter-failing2.service \
|
||||||
|
@@ -144,6 +144,15 @@ static void test_exec_privatedevices_capabilities(Manager *m) {
|
|||||||
|
|
||||||
static void test_exec_readonlypaths(Manager *m) {
|
static void test_exec_readonlypaths(Manager *m) {
|
||||||
test(m, "exec-readonlypaths.service", 0, CLD_EXITED);
|
test(m, "exec-readonlypaths.service", 0, CLD_EXITED);
|
||||||
|
test(m, "exec-readonlypaths-mount-propagation.service", 0, CLD_EXITED);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void test_exec_readwritepaths(Manager *m) {
|
||||||
|
test(m, "exec-readwritepaths-mount-propagation.service", 0, CLD_EXITED);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void test_exec_inaccessiblepaths(Manager *m) {
|
||||||
|
test(m, "exec-inaccessiblepaths-mount-propagation.service", 0, CLD_EXITED);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_exec_systemcallfilter(Manager *m) {
|
static void test_exec_systemcallfilter(Manager *m) {
|
||||||
@@ -360,6 +369,8 @@ int main(int argc, char *argv[]) {
|
|||||||
test_exec_privatedevices,
|
test_exec_privatedevices,
|
||||||
test_exec_privatedevices_capabilities,
|
test_exec_privatedevices_capabilities,
|
||||||
test_exec_readonlypaths,
|
test_exec_readonlypaths,
|
||||||
|
test_exec_readwritepaths,
|
||||||
|
test_exec_inaccessiblepaths,
|
||||||
test_exec_privatenetwork,
|
test_exec_privatenetwork,
|
||||||
test_exec_systemcallfilter,
|
test_exec_systemcallfilter,
|
||||||
test_exec_systemcallerrornumber,
|
test_exec_systemcallerrornumber,
|
||||||
|
@@ -0,0 +1,7 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Test to make sure that InaccessiblePaths= disconnect mount propagation
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
InaccessiblePaths=-/i-dont-exist
|
||||||
|
ExecStart=/bin/sh -x -c 'mkdir -p /TEST; mount -t tmpfs tmpfs /TEST; grep TEST /proc/self/mountinfo && ! grep TEST /proc/$${PPID}/mountinfo && ! grep TEST /proc/1/mountinfo'
|
||||||
|
Type=oneshot
|
@@ -0,0 +1,7 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Test to make sure that passing ReadOnlyPaths= disconnect mount propagation
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ReadOnlyPaths=-/i-dont-exist
|
||||||
|
ExecStart=/bin/sh -x -c 'mkdir -p /TEST; mount -t tmpfs tmpfs /TEST; grep TEST /proc/self/mountinfo && ! grep TEST /proc/$${PPID}/mountinfo && ! grep TEST /proc/1/mountinfo'
|
||||||
|
Type=oneshot
|
@@ -0,0 +1,7 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Test to make sure that passing ReadWritePaths= disconnect mount propagation
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ReadWritePaths=-/i-dont-exist
|
||||||
|
ExecStart=/bin/sh -x -c 'mkdir -p /TEST; mount -t tmpfs tmpfs /TEST; grep TEST /proc/self/mountinfo && ! grep TEST /proc/$${PPID}/mountinfo && ! grep TEST /proc/1/mountinfo'
|
||||||
|
Type=oneshot
|
Reference in New Issue
Block a user