1
0
mirror of https://github.com/systemd/systemd.git synced 2024-11-01 09:21:26 +03:00
systemd/test/test-execute
Lennart Poettering 8adb3d63e6 test: add test for DynamicUser= + StateDirectory=
Also, tests for DynamicUser= should really run for system mode, as we
allocate from a system resource.

(This also increases the test timeout to 2min. If one of our tests
really hangs then waiting for 2min longer doesn't hurt either. The old
2s is really short, given that we run in potentially slow VM
environments for this test. This becomes noticable when the slow "find"
command this adds is triggered)
2017-10-02 17:41:44 +02:00
..
exec-capabilityambientset-merge-nfsnobody.service
exec-capabilityambientset-merge.service
exec-capabilityambientset-nfsnobody.service
exec-capabilityambientset.service
exec-capabilityboundingset-invert.service
exec-capabilityboundingset-merge.service
exec-capabilityboundingset-reset.service
exec-capabilityboundingset-simple.service
exec-dynamicuser-fixeduser-one-supplementarygroup.service
exec-dynamicuser-fixeduser.service
exec-dynamicuser-state-dir.service
exec-dynamicuser-supplementarygroups.service
exec-environment-empty.service
exec-environment-multiple.service
exec-environment.service
exec-environmentfile.service
exec-group-nfsnobody.service
exec-group.service
exec-ignoresigpipe-no.service
exec-ignoresigpipe-yes.service
exec-inaccessiblepaths-mount-propagation.service
exec-inaccessiblepaths-proc.service
exec-ioschedulingclass-best-effort.service
exec-ioschedulingclass-idle.service
exec-ioschedulingclass-none.service
exec-ioschedulingclass-realtime.service
exec-oomscoreadjust-negative.service
exec-oomscoreadjust-positive.service
exec-passenvironment-absent.service
exec-passenvironment-empty.service
exec-passenvironment-repeated.service
exec-passenvironment.service
exec-personality-aarch64.service
exec-personality-ppc64.service
exec-personality-ppc64le.service
exec-personality-s390.service
exec-personality-x86-64.service
exec-personality-x86.service
exec-privatedevices-no-capability-mknod.service
exec-privatedevices-no-capability-sys-rawio.service
exec-privatedevices-no.service
exec-privatedevices-yes-capability-mknod.service
exec-privatedevices-yes-capability-sys-rawio.service
exec-privatedevices-yes.service
exec-privatenetwork-yes.service
exec-privatetmp-no.service
exec-privatetmp-yes.service
exec-protectkernelmodules-no-capabilities.service
exec-protectkernelmodules-yes-capabilities.service
exec-protectkernelmodules-yes-mount-propagation.service
exec-read-only-path-succeed.service
exec-readonlypaths-mount-propagation.service
exec-readonlypaths.service
exec-readwritepaths-mount-propagation.service
exec-restrict-namespaces-mnt-blacklist.service
exec-restrict-namespaces-mnt.service
exec-restrict-namespaces-no.service
exec-restrict-namespaces-yes.service
exec-runtimedirectory-mode.service
exec-runtimedirectory-owner-nfsnobody.service
exec-runtimedirectory-owner.service
exec-runtimedirectory.service
exec-spec-interpolation.service
exec-supplementarygroups-multiple-groups-default-group-user.service
exec-supplementarygroups-multiple-groups-withgid.service
exec-supplementarygroups-multiple-groups-withuid.service
exec-supplementarygroups-single-group-user.service
exec-supplementarygroups-single-group.service
exec-supplementarygroups.service
exec-systemcallerrornumber.service
exec-systemcallfilter-failing2.service
exec-systemcallfilter-failing.service
exec-systemcallfilter-not-failing2.service
exec-systemcallfilter-not-failing.service
exec-systemcallfilter-system-user-nfsnobody.service
exec-systemcallfilter-system-user.service
exec-umask-0177.service
exec-umask-default.service
exec-unset-environment.service
exec-user-nfsnobody.service
exec-user.service
exec-workingdirectory.service