diff --git a/lib/spack/spack/test/cmd/buildcache.py b/lib/spack/spack/test/cmd/buildcache.py index 27ef4fca8fb..5c056fb33b3 100644 --- a/lib/spack/spack/test/cmd/buildcache.py +++ b/lib/spack/spack/test/cmd/buildcache.py @@ -125,10 +125,6 @@ def test_buildcache_create_fails_on_noargs(tmpdir): buildcache('create', '-d', str(tmpdir), '--unsigned') -@pytest.mark.skipif( - os.environ.get('SPACK_TEST_SOLVER') == 'clingo', - reason='Test for Clingo are run in a container with root permissions' -) def test_buildcache_create_fail_on_perm_denied( install_mockery, mock_fetch, monkeypatch, tmpdir): """Ensure that buildcache create fails on permission denied error.""" diff --git a/lib/spack/spack/test/database.py b/lib/spack/spack/test/database.py index 8d1a204ba93..cb9fbada2ab 100644 --- a/lib/spack/spack/test/database.py +++ b/lib/spack/spack/test/database.py @@ -638,10 +638,6 @@ def test_090_non_root_ref_counts(mutable_database): assert mpich_rec.ref_count == 0 -@pytest.mark.skipif( - os.environ.get('SPACK_TEST_SOLVER') == 'clingo', - reason='Test for Clingo are run in a container with root permissions' -) def test_100_no_write_with_exception_on_remove(database): def fail_while_writing(): with database.write_transaction(): @@ -659,10 +655,6 @@ def fail_while_writing(): assert len(database.query('mpileaks ^zmpi', installed=any)) == 1 -@pytest.mark.skipif( - os.environ.get('SPACK_TEST_SOLVER') == 'clingo', - reason='Test for Clingo are run in a container with root permissions' -) def test_110_no_write_with_exception_on_install(database): def fail_while_writing(): with database.write_transaction(): diff --git a/lib/spack/spack/test/llnl/util/lock.py b/lib/spack/spack/test/llnl/util/lock.py index 4911ac9ae3b..928bded6ca9 100644 --- a/lib/spack/spack/test/llnl/util/lock.py +++ b/lib/spack/spack/test/llnl/util/lock.py @@ -661,10 +661,6 @@ def test_upgrade_read_to_write(private_lock_path): assert lock._file is None -@pytest.mark.skipif( - os.environ.get('SPACK_TEST_SOLVER') == 'clingo', - reason='Test for Clingo are run in a container with root permissions' -) def test_upgrade_read_to_write_fails_with_readonly_file(private_lock_path): """Test that read-only file can be read-locked but not write-locked.""" # ensure lock file exists the first time