WARNING! Access to this system is limited to authorised users only.
Unauthorised users may be subject to prosecution.
Unauthorised access to this system is a criminal offence under Australian law (Federal Crimes Act 1914 Part VIA)
It is a criminal offence to:
(1) Obtain access to data without authority. -Penalty 2 years imprisonment.
(2) Damage, delete, alter or insert data without authority. -Penalty 10 years imprisonment.
User activity is monitored and recorded. Anyone using this system expressly consents to such monitoring and recording.

To protect your data, the CISO officer has suggested users to enable 2FA as soon as possible.
Currently 2.2% of users enabled 2FA.

Commit decc7e42 authored by Javad Ebrahimian Amiri's avatar Javad Ebrahimian Amiri
Browse files

inspecting muc ci error outputs in detail

parent 170eb688
......@@ -55,7 +55,11 @@ def execute_muc(bundle, name, primordial=None): # type: (str, str, Optional[str]
+ (["-f", primordial] if primordial is not None else [])
+ ["/dev/stdin", get_output_file(name)],
stdin = subprocess.PIPE); #type: subprocess.Popen
muc_proc.communicate(bundle); # Send the bundle to muc
stdoutdata, stderrdata = muc_proc.communicate(bundle); # Send the bundle to muc
print("errors:\n\n")
print(stderrdata);
print("outputs:\n\n")
print(stdoutdata);
assert (muc_proc.returncode == 0); # Check that muc worked
def compile_bundle(bundle, name, main = None): # type: (str, str, Optional[str]) -> None
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment