@@ -76,8 +76,6 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
76
76
// Handy defaults
77
77
78
78
let target_args = & [ "-v" , "/:/target" ] ;
79
- // We always need this as we assume we're operating on a local image
80
- let generic_inst_args = [ "--skip-fetch-check" ] ;
81
79
82
80
let tests = [
83
81
Trial :: test ( "loopback install" , move || {
@@ -88,7 +86,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
88
86
tmpdisk. as_file_mut ( ) . set_len ( size) ?;
89
87
let tmpdisk = tmpdisk. into_temp_path ( ) ;
90
88
let tmpdisk = tmpdisk. to_str ( ) . unwrap ( ) ;
91
- cmd ! ( sh, "sudo {BASE_ARGS...} -v {tmpdisk}:/disk {image} bootc install to-disk --via-loopback {generic_inst_args...} /disk" ) . run ( ) ?;
89
+ cmd ! ( sh, "sudo {BASE_ARGS...} -v {tmpdisk}:/disk {image} bootc install to-disk --via-loopback /disk" ) . run ( ) ?;
92
90
Ok ( ( ) )
93
91
} ) ,
94
92
Trial :: test (
@@ -100,7 +98,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
100
98
let tmp_keys = tmpd. path ( ) . join ( "test_authorized_keys" ) ;
101
99
let tmp_keys = tmp_keys. to_str ( ) . unwrap ( ) ;
102
100
std
:: fs
:: write ( & tmp_keys
, b"ssh-ed25519 ABC0123 [email protected] " ) ?
;
103
- cmd ! ( sh, "sudo {BASE_ARGS...} {target_args...} -v {tmp_keys}:/test_authorized_keys {image} bootc install to-filesystem {generic_inst_args...} --acknowledge-destructive --karg=foo=bar --replace=alongside --root-ssh-authorized-keys=/test_authorized_keys /target" ) . run ( ) ?;
101
+ cmd ! ( sh, "sudo {BASE_ARGS...} {target_args...} -v {tmp_keys}:/test_authorized_keys {image} bootc install to-filesystem --acknowledge-destructive --karg=foo=bar --replace=alongside --root-ssh-authorized-keys=/test_authorized_keys /target" ) . run ( ) ?;
104
102
105
103
// Also test install finalize here
106
104
cmd ! (
@@ -142,7 +140,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
142
140
Trial :: test ( "Install and verify selinux state" , move || {
143
141
let sh = & xshell:: Shell :: new ( ) ?;
144
142
reset_root ( sh, image) ?;
145
- cmd ! ( sh, "sudo {BASE_ARGS...} {image} bootc install to-existing-root --acknowledge-destructive {generic_inst_args...} " ) . run ( ) ?;
143
+ cmd ! ( sh, "sudo {BASE_ARGS...} {image} bootc install to-existing-root --acknowledge-destructive" ) . run ( ) ?;
146
144
generic_post_install_verification ( ) ?;
147
145
let root = & Dir :: open_ambient_dir ( "/ostree" , cap_std:: ambient_authority ( ) ) . unwrap ( ) ;
148
146
crate :: selinux:: verify_selinux_recurse ( root, false ) ?;
@@ -151,7 +149,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
151
149
Trial :: test ( "Install to non-default stateroot" , move || {
152
150
let sh = & xshell:: Shell :: new ( ) ?;
153
151
reset_root ( sh, image) ?;
154
- cmd ! ( sh, "sudo {BASE_ARGS...} {image} bootc install to-existing-root --stateroot {NON_DEFAULT_STATEROOT} --acknowledge-destructive {generic_inst_args...} " ) . run ( ) ?;
152
+ cmd ! ( sh, "sudo {BASE_ARGS...} {image} bootc install to-existing-root --stateroot {NON_DEFAULT_STATEROOT} --acknowledge-destructive" ) . run ( ) ?;
155
153
generic_post_install_verification ( ) ?;
156
154
assert ! (
157
155
Utf8Path :: new( & format!( "/ostree/deploy/{NON_DEFAULT_STATEROOT}" ) ) . try_exists( ) ?
@@ -163,7 +161,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
163
161
reset_root ( sh, image) ?;
164
162
let empty = sh. create_temp_dir ( ) ?;
165
163
let empty = empty. path ( ) . to_str ( ) . unwrap ( ) ;
166
- cmd ! ( sh, "sudo {BASE_ARGS...} -v {empty}:/usr/lib/bootc/install {image} bootc install to-existing-root {generic_inst_args...} " ) . run ( ) ?;
164
+ cmd ! ( sh, "sudo {BASE_ARGS...} -v {empty}:/usr/lib/bootc/install {image} bootc install to-existing-root" ) . run ( ) ?;
167
165
generic_post_install_verification ( ) ?;
168
166
Ok ( ( ) )
169
167
} ) ,
0 commit comments