run-test
author Paul Crowley <paul@lshift.net>
Tue, 01 Dec 2009 12:37:20 +0000
changeset 265 6629144cf111
parent 264 cd7f901d3902
child 266 7cc208cbf2be
permissions -rwxr-xr-x
More complete test - inhibit daemons, mount proc, add safety guard

#!/bin/sh

# Must be root to run this

set -e

PRISTINE=/var/local/cache/pristine/sid

TOPDIR=`pwd`
BACKING=$TOPDIR/build/env/backing
MOUNT=$TOPDIR/build/env/mount
mkdir -p $BACKING $MOUNT

touch $BACKING/please-trash-this-system
cp -av action $BACKING
mkdir -p $BACKING/etc
cp -v policy-rc.d $BACKING/etc/policy-rc.d

unionfs-fuse -o cow -o allow_root,suid,dev $BACKING=RW:$PRISTINE=RO $MOUNT

#mount --bind /dev "$MOUNT/dev"
#mount --bind /dev/pts "$MOUNT/dev/pts"
mount -t proc proc $MOUNT/proc

chroot $MOUNT ./action/go
cd $TOPDIR

umount $MOUNT/proc
umount $MOUNT

cat $BACKING/action/results

rm -rf build/env