summaryrefslogtreecommitdiff
path: root/test/meson.build
blob: 79446d0dad2f67a135184ab13c88b3d200670511 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
test_data_files = '''
  a.service
  basic.target
  b.service
  c.service
  daughter.service
  d.service
  end.service
  e.service
  f.service
  grandchild.service
  g.service
  hello-after-sleep.target
  hello.service
  h.service
  parent-deep.slice
  parent.slice
  sched_idle_bad.service
  sched_idle_ok.service
  sched_rr_bad.service
  sched_rr_change.service
  sched_rr_ok.service
  shutdown.target
  sleep.service
  sockets.target
  son.service
  sysinit.target
  testsuite.target
  timers.target
  unstoppable.service
  test-path/paths.target
  test-path/basic.target
  test-path/sysinit.target
  test-path/path-changed.service
  test-path/path-directorynotempty.service
  test-path/path-existsglob.service
  test-path/path-exists.service
  test-path/path-makedirectory.service
  test-path/path-modified.service
  test-path/path-mycustomunit.service
  test-path/path-service.service
  test-path/path-changed.path
  test-path/path-directorynotempty.path
  test-path/path-existsglob.path
  test-path/path-exists.path
  test-path/path-makedirectory.path
  test-path/path-modified.path
  test-path/path-unit.path
  test-execute/exec-environment-empty.service
  test-execute/exec-environment-multiple.service
  test-execute/exec-environment.service
  test-execute/exec-passenvironment-absent.service
  test-execute/exec-passenvironment-empty.service
  test-execute/exec-passenvironment-repeated.service
  test-execute/exec-passenvironment.service
  test-execute/exec-group.service
  test-execute/exec-group-nfsnobody.service
  test-execute/exec-supplementarygroups.service
  test-execute/exec-supplementarygroups-single-group.service
  test-execute/exec-supplementarygroups-single-group-user.service
  test-execute/exec-supplementarygroups-multiple-groups-default-group-user.service
  test-execute/exec-supplementarygroups-multiple-groups-withgid.service
  test-execute/exec-supplementarygroups-multiple-groups-withuid.service
  test-execute/exec-dynamicuser-fixeduser.service
  test-execute/exec-dynamicuser-fixeduser-one-supplementarygroup.service
  test-execute/exec-dynamicuser-supplementarygroups.service
  test-execute/exec-ignoresigpipe-no.service
  test-execute/exec-ignoresigpipe-yes.service
  test-execute/exec-personality-x86-64.service
  test-execute/exec-personality-x86.service
  test-execute/exec-personality-s390.service
  test-execute/exec-personality-ppc64.service
  test-execute/exec-personality-ppc64le.service
  test-execute/exec-personality-aarch64.service
  test-execute/exec-privatedevices-no.service
  test-execute/exec-privatedevices-yes.service
  test-execute/exec-privatedevices-no-capability-mknod.service
  test-execute/exec-privatedevices-yes-capability-mknod.service
  test-execute/exec-protectkernelmodules-no-capabilities.service
  test-execute/exec-protectkernelmodules-yes-capabilities.service
  test-execute/exec-protectkernelmodules-yes-mount-propagation.service
  test-execute/exec-privatetmp-no.service
  test-execute/exec-privatetmp-yes.service
  test-execute/exec-readonlypaths.service
  test-execute/exec-readonlypaths-mount-propagation.service
  test-execute/exec-readwritepaths-mount-propagation.service
  test-execute/exec-inaccessiblepaths-mount-propagation.service
  test-execute/exec-spec-interpolation.service
  test-execute/exec-systemcallerrornumber.service
  test-execute/exec-systemcallfilter-failing2.service
  test-execute/exec-systemcallfilter-failing.service
  test-execute/exec-systemcallfilter-not-failing2.service
  test-execute/exec-systemcallfilter-not-failing.service
  test-execute/exec-systemcallfilter-system-user.service
  test-execute/exec-systemcallfilter-system-user-nfsnobody.service
  test-execute/exec-user.service
  test-execute/exec-user-nfsnobody.service
  test-execute/exec-workingdirectory.service
  test-execute/exec-umask-0177.service
  test-execute/exec-umask-default.service
  test-execute/exec-privatenetwork-yes.service
  test-execute/exec-environmentfile.service
  test-execute/exec-oomscoreadjust-positive.service
  test-execute/exec-oomscoreadjust-negative.service
  test-execute/exec-ioschedulingclass-best-effort.service
  test-execute/exec-ioschedulingclass-idle.service
  test-execute/exec-ioschedulingclass-none.service
  test-execute/exec-ioschedulingclass-realtime.service
  test-execute/exec-capabilityboundingset-invert.service
  test-execute/exec-capabilityboundingset-merge.service
  test-execute/exec-capabilityboundingset-reset.service
  test-execute/exec-capabilityboundingset-simple.service
  test-execute/exec-capabilityambientset.service
  test-execute/exec-capabilityambientset-nfsnobody.service
  test-execute/exec-capabilityambientset-merge.service
  test-execute/exec-capabilityambientset-merge-nfsnobody.service
  test-execute/exec-runtimedirectory.service
  test-execute/exec-runtimedirectory-mode.service
  test-execute/exec-runtimedirectory-owner.service
  test-execute/exec-runtimedirectory-owner-nfsnobody.service
  test-execute/exec-restrict-namespaces-no.service
  test-execute/exec-restrict-namespaces-yes.service
  test-execute/exec-restrict-namespaces-mnt.service
  test-execute/exec-restrict-namespaces-mnt-blacklist.service
  test-execute/exec-read-only-path-succeed.service
  test-execute/exec-privatedevices-yes-capability-sys-rawio.service
  test-execute/exec-privatedevices-no-capability-sys-rawio.service
  bus-policy/hello.conf
  bus-policy/methods.conf
  bus-policy/ownerships.conf
  bus-policy/signals.conf
  bus-policy/check-own-rules.conf
  bus-policy/many-rules.conf
  bus-policy/test.conf
  hwdb/10-bad.hwdb
  journal-data/journal-1.txt
  journal-data/journal-2.txt
'''.split()

if conf.get('ENABLE_RESOLVED', 0) == 1
  test_data_files += '''
    test-resolve/_openpgpkey.fedoraproject.org.pkts
    test-resolve/fedoraproject.org.pkts
    test-resolve/gandi.net.pkts
    test-resolve/google.com.pkts
    test-resolve/root.pkts
    test-resolve/sw1a1aa-sw1a2aa-sw1a2ab-sw1a2ac.find.me.uk.pkts
    test-resolve/teamits.com.pkts
    test-resolve/zbyszek@fedoraproject.org.pkts
    test-resolve/_443._tcp.fedoraproject.org.pkts
    test-resolve/kyhwana.org.pkts
    test-resolve/fake-caa.pkts
  '''.split()
endif

if install_tests
  foreach file : test_data_files
    subdir = file.split('/')[0]
    if subdir == file
      subdir = ''
    endif

    install_data(file,
                 install_dir : testsdir + '/testdata/' + subdir)
  endforeach
endif