diff --git a/test/units/testsuite-43.sh b/test/units/testsuite-43.sh index ff94ad4d81..ec84868a21 100755 --- a/test/units/testsuite-43.sh +++ b/test/units/testsuite-43.sh @@ -10,10 +10,10 @@ runas() { su "$userid" -s /bin/sh -c 'XDG_RUNTIME_DIR=/run/user/$UID exec "$@"' -- sh "$@" } -runas testuser systemd-run --user --unit=test-private-users \ +runas testuser systemd-run --wait --user --unit=test-private-users \ -p PrivateUsers=yes -P echo hello -runas testuser systemd-run --user --unit=test-private-tmp-innerfile \ +runas testuser systemd-run --wait --user --unit=test-private-tmp-innerfile \ -p PrivateUsers=yes -p PrivateTmp=yes \ -P touch /tmp/innerfile.txt # File should not exist outside the job's tmp directory. @@ -21,17 +21,17 @@ test ! -e /tmp/innerfile.txt touch /tmp/outerfile.txt # File should not appear in unit's private tmp. -runas testuser systemd-run --user --unit=test-private-tmp-outerfile \ +runas testuser systemd-run --wait --user --unit=test-private-tmp-outerfile \ -p PrivateUsers=yes -p PrivateTmp=yes \ -P test ! -e /tmp/outerfile.txt # Confirm that creating a file in home works -runas testuser systemd-run --user --unit=test-unprotected-home \ +runas testuser systemd-run --wait --user --unit=test-unprotected-home \ -P touch /home/testuser/works.txt test -e /home/testuser/works.txt # Confirm that creating a file in home is blocked under read-only -runas testuser systemd-run --user --unit=test-protect-home-read-only \ +runas testuser systemd-run --wait --user --unit=test-protect-home-read-only \ -p PrivateUsers=yes -p ProtectHome=read-only \ -P bash -c ' test -e /home/testuser/works.txt @@ -40,12 +40,12 @@ runas testuser systemd-run --user --unit=test-protect-home-read-only \ test ! -e /home/testuser/blocked.txt # Check that tmpfs hides the whole directory -runas testuser systemd-run --user --unit=test-protect-home-tmpfs \ +runas testuser systemd-run --wait --user --unit=test-protect-home-tmpfs \ -p PrivateUsers=yes -p ProtectHome=tmpfs \ -P test ! -e /home/testuser # Confirm that home, /root, and /run/user are inaccessible under "yes" -runas testuser systemd-run --user --unit=test-protect-home-yes \ +runas testuser systemd-run --wait --user --unit=test-protect-home-yes \ -p PrivateUsers=yes -p ProtectHome=yes \ -P bash -c ' test "$(stat -c %a /home)" = "0" @@ -57,7 +57,7 @@ runas testuser systemd-run --user --unit=test-protect-home-yes \ # namespace (no CAP_SETGID in the parent namespace to write the additional # mapping of the user supplied group and thus cannot change groups to an # unmapped group ID) -! runas testuser systemd-run --user --unit=test-group-fail \ +! runas testuser systemd-run --wait --user --unit=test-group-fail \ -p PrivateUsers=yes -p Group=daemon \ -P true