-
Notifications
You must be signed in to change notification settings - Fork 5.3k
make TestUserCredentialsPropertiesOnWindows stable on Windows Server Core #47031
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
this is to try to make TestUserCredentialsPropertiesOnWindows stable on Windows Server Core
|
Tagging subscribers to this area: @eiriktsarpalis Issue Details
|
|
/azp run runtime-libraries-coreclr outerloop-windows |
|
Azure Pipelines successfully started running 1 pipeline(s). |
…rent exception (throw in the catch block)?
|
/azp run runtime-libraries-coreclr outerloop-windows |
|
Azure Pipelines successfully started running 1 pipeline(s). |
What if we don't give the user rigts to execute it at all?
|
/azp run runtime-libraries-coreclr outerloop-windows |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
@eiriktsarpalis it's now properly passing |
|
|
||
| // ensure the new user can access the .exe (otherwise you get Access is denied exception) | ||
| SetAccessControl(username, p.StartInfo.FileName, add: true); | ||
| if (PlatformDetection.IsNotWindowsServerCore) // for this particular Windows version it fails with Attempted to perform an unauthorized operation (#46619) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The test is still valid without this? If the test succeeds without this on Windows Server Core, why is it needed on other Windows?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've added this recently when I was working on re-enabling this test and it was mandatory on my machine to make it work (#46083)
I have no idea why it does not work on machines from this certain pool. Is it a thing related to Windows Server? Some custom helix machine setup?
The test is restricted to admin accounts only:
| [ConditionalFact(nameof(IsAdmin_IsNotNano_RemoteExecutorIsSupported))] // Nano has no "netapi32.dll", Admin rights are required |
runtime/src/libraries/System.Diagnostics.Process/tests/ProcessStartInfoTests.cs
Lines 28 to 29 in f6e73ad
| private static bool IsAdmin_IsNotNano_RemoteExecutorIsSupported | |
| => PlatformDetection.IsWindowsAndElevated && PlatformDetection.IsNotWindowsNanoServer && RemoteExecutor.IsSupported; |
Which makes it even more confusing (I would assume that Admin accounts which can create other user accounts can also add permissions to files?)
danmoseley
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would like to know the answer too, but merging this gets us into a better state.
|
Hit this again -- so I'm merging! |
|
unrelated failures. |
Fixes #46619