9
9
@fasteners .interprocess_locked (os .path .join (os .path .dirname (__file__ ), ".build_lock" ))
10
10
def test_start_with_passed_object (load_strategy ):
11
11
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
12
- subprocess .call (["ant" ])
12
+ subprocess .check_call (["ant" ])
13
13
with run_security_analyser_pipeline (
14
14
"build" ,
15
15
"rules.json" ,
@@ -24,7 +24,7 @@ def test_start_with_passed_object(load_strategy):
24
24
@fasteners .interprocess_locked (os .path .join (os .path .dirname (__file__ ), ".build_lock" ))
25
25
def test_start_with_passed_array_of_objects (load_strategy ):
26
26
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
27
- subprocess .call (["ant" ])
27
+ subprocess .check_call (["ant" ])
28
28
with run_security_analyser_pipeline (
29
29
"build" ,
30
30
"rules.json" ,
@@ -39,7 +39,7 @@ def test_start_with_passed_array_of_objects(load_strategy):
39
39
@fasteners .interprocess_locked (os .path .join (os .path .dirname (__file__ ), ".build_lock" ))
40
40
def test_start_with_passed_self (load_strategy ):
41
41
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
42
- subprocess .call (["ant" ])
42
+ subprocess .check_call (["ant" ])
43
43
with run_security_analyser_pipeline (
44
44
"build" ,
45
45
"rules.json" ,
@@ -54,7 +54,7 @@ def test_start_with_passed_self(load_strategy):
54
54
@fasteners .interprocess_locked (os .path .join (os .path .dirname (__file__ ), ".build_lock" ))
55
55
def test_start_with_passed_self_simple (load_strategy ):
56
56
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
57
- subprocess .call (["ant" ])
57
+ subprocess .check_call (["ant" ])
58
58
with run_security_analyser_pipeline (
59
59
"build" ,
60
60
"rules.json" ,
@@ -69,7 +69,7 @@ def test_start_with_passed_self_simple(load_strategy):
69
69
@fasteners .interprocess_locked (os .path .join (os .path .dirname (__file__ ), ".build_lock" ))
70
70
def test_start_with_passed_self_array_simple (load_strategy ):
71
71
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
72
- subprocess .call (["ant" ])
72
+ subprocess .check_call (["ant" ])
73
73
with run_security_analyser_pipeline (
74
74
"build" ,
75
75
"rules.json" ,
@@ -84,7 +84,7 @@ def test_start_with_passed_self_array_simple(load_strategy):
84
84
@fasteners .interprocess_locked (os .path .join (os .path .dirname (__file__ ), ".build_lock" ))
85
85
def test_start_with_passed_self_array_field (load_strategy ):
86
86
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
87
- subprocess .call (["ant" ])
87
+ subprocess .check_call (["ant" ])
88
88
with run_security_analyser_pipeline (
89
89
"build" ,
90
90
"rules.json" ,
@@ -100,7 +100,7 @@ def test_start_with_passed_self_array_field(load_strategy):
100
100
def ZZZtest_start_with_passed_self_array_array (load_strategy ):
101
101
# Disabled (by ZZZ prefix), because JBMC does not terminate.
102
102
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
103
- subprocess .call (["ant" ])
103
+ subprocess .check_call (["ant" ])
104
104
with run_security_analyser_pipeline (
105
105
"build" ,
106
106
"rules.json" ,
@@ -115,7 +115,7 @@ def ZZZtest_start_with_passed_self_array_array(load_strategy):
115
115
@fasteners .interprocess_locked (os .path .join (os .path .dirname (__file__ ), ".build_lock" ))
116
116
def test_call_nondetWithNull (load_strategy ):
117
117
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
118
- subprocess .call (["ant" ])
118
+ subprocess .check_call (["ant" ])
119
119
with run_security_analyser_pipeline (
120
120
"build" ,
121
121
"rules.json" ,
@@ -130,7 +130,7 @@ def test_call_nondetWithNull(load_strategy):
130
130
@fasteners .interprocess_locked (os .path .join (os .path .dirname (__file__ ), ".build_lock" ))
131
131
def test_call_nondetWithNull_twice (load_strategy ):
132
132
with utils .working_dir (os .path .abspath (os .path .dirname (__file__ ))):
133
- subprocess .call (["ant" ])
133
+ subprocess .check_call (["ant" ])
134
134
with run_security_analyser_pipeline (
135
135
"build" ,
136
136
"rules.json" ,
0 commit comments