Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 9660896ecd93
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 13cd588afabd
Choose a head ref
  • 1 commit
  • 1 file changed
  • 1 contributor

Commits on Nov 2, 2018

  1. nixos/tests/chromium: Fix sandbox info matching

    As reported by @andir, the regular expressions that match the sandbox
    output are no longer matching in the recent Chromium bump as of
    bb03fbc.
    
    Instead of a boolean field that determines whether namespace sandboxes
    are on, the namespace sandbox is now an enum within "Layer 1 Sandbox".
    
    I've modified the regular expressions accordingly and also ran the test
    for the stable branch, which now succeeds.
    
    Signed-off-by: aszlig <aszlig@nix.build>
    Issue: #49442
    Cc: @bendlas, @andir
    (cherry picked from commit 73cdd5a)
    aszlig committed Nov 2, 2018
    Copy the full SHA
    13cd588 View commit details
Showing with 2 additions and 2 deletions.
  1. +2 −2 nixos/tests/chromium.nix
4 changes: 2 additions & 2 deletions nixos/tests/chromium.nix
Original file line number Diff line number Diff line change
@@ -166,7 +166,7 @@ mapAttrs (channel: chromiumPkg: makeTest rec {
my $clipboard = $machine->succeed(ru "${pkgs.xclip}/bin/xclip -o");
die "sandbox not working properly: $clipboard"
unless $clipboard =~ /namespace sandbox.*yes/mi
unless $clipboard =~ /layer 1 sandbox.*namespace/mi
&& $clipboard =~ /pid namespaces.*yes/mi
&& $clipboard =~ /network namespaces.*yes/mi
&& $clipboard =~ /seccomp.*sandbox.*yes/mi
@@ -184,7 +184,7 @@ mapAttrs (channel: chromiumPkg: makeTest rec {
my $clipboard = $machine->succeed(ru "${pkgs.xclip}/bin/xclip -o");
die "copying twice in a row does not work properly: $clipboard"
unless $clipboard =~ /namespace sandbox.*yes/mi
unless $clipboard =~ /layer 1 sandbox.*namespace/mi
&& $clipboard =~ /pid namespaces.*yes/mi
&& $clipboard =~ /network namespaces.*yes/mi
&& $clipboard =~ /seccomp.*sandbox.*yes/mi