@@ -76,8 +76,6 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
7676 // Handy defaults
7777
7878 let target_args = & [ "-v" , "/:/target" ] ;
79- // We always need this as we assume we're operating on a local image
80- let generic_inst_args = [ "--skip-fetch-check" ] ;
8179
8280 let tests = [
8381 Trial :: test ( "loopback install" , move || {
@@ -88,7 +86,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
8886 tmpdisk. as_file_mut ( ) . set_len ( size) ?;
8987 let tmpdisk = tmpdisk. into_temp_path ( ) ;
9088 let tmpdisk = tmpdisk. to_str ( ) . unwrap ( ) ;
91- cmd ! ( sh, "sudo {BASE_ARGS...} -v {tmpdisk}:/disk {image} bootc install to-disk --via-loopback {generic_inst_args...} /disk" ) . run ( ) ?;
89+ cmd ! ( sh, "sudo {BASE_ARGS...} -v {tmpdisk}:/disk {image} bootc install to-disk --via-loopback /disk" ) . run ( ) ?;
9290 Ok ( ( ) )
9391 } ) ,
9492 Trial :: test (
@@ -100,7 +98,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
10098 let tmp_keys = tmpd. path ( ) . join ( "test_authorized_keys" ) ;
10199 let tmp_keys = tmp_keys. to_str ( ) . unwrap ( ) ;
102100 std
:: fs
:: write ( & tmp_keys
, b"ssh-ed25519 ABC0123 [email protected] " ) ?
; 103- cmd ! ( sh, "sudo {BASE_ARGS...} {target_args...} -v {tmp_keys}:/test_authorized_keys {image} bootc install to-filesystem {generic_inst_args...} --acknowledge-destructive --karg=foo=bar --replace=alongside --root-ssh-authorized-keys=/test_authorized_keys /target" ) . run ( ) ?;
101+ cmd ! ( sh, "sudo {BASE_ARGS...} {target_args...} -v {tmp_keys}:/test_authorized_keys {image} bootc install to-filesystem --acknowledge-destructive --karg=foo=bar --replace=alongside --root-ssh-authorized-keys=/test_authorized_keys /target" ) . run ( ) ?;
104102
105103 // Also test install finalize here
106104 cmd ! (
@@ -142,7 +140,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
142140 Trial :: test ( "Install and verify selinux state" , move || {
143141 let sh = & xshell:: Shell :: new ( ) ?;
144142 reset_root ( sh, image) ?;
145- cmd ! ( sh, "sudo {BASE_ARGS...} {image} bootc install to-existing-root --acknowledge-destructive {generic_inst_args...} " ) . run ( ) ?;
143+ cmd ! ( sh, "sudo {BASE_ARGS...} {image} bootc install to-existing-root --acknowledge-destructive" ) . run ( ) ?;
146144 generic_post_install_verification ( ) ?;
147145 let root = & Dir :: open_ambient_dir ( "/ostree" , cap_std:: ambient_authority ( ) ) . unwrap ( ) ;
148146 crate :: selinux:: verify_selinux_recurse ( root, false ) ?;
@@ -151,7 +149,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
151149 Trial :: test ( "Install to non-default stateroot" , move || {
152150 let sh = & xshell:: Shell :: new ( ) ?;
153151 reset_root ( sh, image) ?;
154- cmd ! ( sh, "sudo {BASE_ARGS...} {image} bootc install to-existing-root --stateroot {NON_DEFAULT_STATEROOT} --acknowledge-destructive {generic_inst_args...} " ) . run ( ) ?;
152+ cmd ! ( sh, "sudo {BASE_ARGS...} {image} bootc install to-existing-root --stateroot {NON_DEFAULT_STATEROOT} --acknowledge-destructive" ) . run ( ) ?;
155153 generic_post_install_verification ( ) ?;
156154 assert ! (
157155 Utf8Path :: new( & format!( "/ostree/deploy/{NON_DEFAULT_STATEROOT}" ) ) . try_exists( ) ?
@@ -163,7 +161,7 @@ pub(crate) fn run_alongside(image: &str, mut testargs: libtest_mimic::Arguments)
163161 reset_root ( sh, image) ?;
164162 let empty = sh. create_temp_dir ( ) ?;
165163 let empty = empty. path ( ) . to_str ( ) . unwrap ( ) ;
166- cmd ! ( sh, "sudo {BASE_ARGS...} -v {empty}:/usr/lib/bootc/install {image} bootc install to-existing-root {generic_inst_args...} " ) . run ( ) ?;
164+ cmd ! ( sh, "sudo {BASE_ARGS...} -v {empty}:/usr/lib/bootc/install {image} bootc install to-existing-root" ) . run ( ) ?;
167165 generic_post_install_verification ( ) ?;
168166 Ok ( ( ) )
169167 } ) ,
0 commit comments