-
-
Notifications
You must be signed in to change notification settings - Fork 390
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: Tests fail when using malcontent and system bus not available #5607
Comments
I think these are the potential options.
|
I think you can already bypass parental controls by setting |
The whole parental-controls thing is more speed-bump than anything else. The original PR said:
See also #5076. |
#5076 (comment) has another option for dealing with this: basically hard-code the well-known location of the system bus, and refuse to run without successfully accessing the system bus if it appears that we ought to be able to access it. |
It definitely is hard to integrate with testing. I'm hitting exactly #5076. Sorry I didn't notice it before. I did start working on something like checking for the existence of the socket, but I was only scoping it to tests. However, given that you can already fake this out by setting To wit:
|
Closing this as a duplicate of #5076. |
Checklist
Flatpak version
1.14.4
What Linux distribution are you using?
Endless OS
Linux distribution version
5.2
What architecture are you using?
x86_64
How to reproduce
DBUS_SYSTEM_BUS_ADDRESS
to a bogus value.Expected Behavior
Tests pass or skip if the system bus isn't available.
Actual Behavior
The tests that try to launch flatpaks fail because the parental controls check fails if the system bus can't be connected to. If flatpak isn't built with libmalcontent, that's all skipped.
Additional Information
There's already a
FLATPAK_SYSTEM_HELPER_ON_SESSION
check that was added for the same purpose to skip install tests. It seems a bit out of place for skipping run tests, but maybe that's fine. It's also generally ugly to allow bypassing your access control system by simply setting an environment variable. #2993 exists for a more thorough handling.The text was updated successfully, but these errors were encountered: