Add the feature to prohibit starting of a qube#658
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #658 +/- ##
==========================================
+ Coverage 69.74% 69.79% +0.04%
==========================================
Files 58 58
Lines 12542 12546 +4
==========================================
+ Hits 8748 8756 +8
+ Misses 3794 3790 -4
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
marmarek
left a comment
There was a problem hiding this comment.
And please also add a tests. Since unit test may require mocking most of the start method, it can be in integration tests (for example qubes/tests/integ/basic.py)
8468465 to
1331956
Compare
1331956 to
871be0d
Compare
871be0d to
5de215d
Compare
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025022106-4.3&flavor=pull-requests Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025020404-4.3&flavor=update
Failed tests26 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/127852#dependencies 28 fixed
Unstable testsDetailsPerformance TestsPerformance degradation:No issues Remaining performance tests:72 tests
|
fixes: QubesOS/qubes-issues#9622