[med-svn] [Git][med-team/libsecrecy][master] 7 commits: extend test coverage to clang
Étienne Mollier (@emollier)
gitlab at salsa.debian.org
Sat Jul 10 17:12:03 BST 2021
Étienne Mollier pushed to branch master at Debian Med / libsecrecy
Commits:
65657e23 by Étienne Mollier at 2020-11-20T21:32:30+01:00
extend test coverage to clang
- - - - -
8ad22e60 by Étienne Mollier at 2020-11-20T21:43:21+01:00
add explicative header in stable test
- - - - -
1a4e0a99 by Étienne Mollier at 2021-07-10T17:54:41+02:00
d/secrecy.1: minor fixes
- - - - -
f1c8122c by Étienne Mollier at 2021-07-10T17:55:31+02:00
d/secrecy.1: update manpage author address
- - - - -
55f1d9e4 by Étienne Mollier at 2021-07-10T17:56:35+02:00
d/copyright: update packager address
- - - - -
4e132342 by Étienne Mollier at 2021-07-10T17:57:31+02:00
d/control: update uploader address
- - - - -
d1f91dc6 by Étienne Mollier at 2021-07-10T18:11:24+02:00
update changelog
- - - - -
7 changed files:
- debian/changelog
- debian/control
- debian/copyright
- debian/secrecy.1
- debian/tests/control
- debian/tests/run-stable-test
- debian/tests/run-unit-test
Changes:
=====================================
debian/changelog
=====================================
@@ -1,3 +1,11 @@
+libsecrecy (0.0.2+dfsg-3) UNRELEASED; urgency=medium
+
+ * extend test coverage by testing clang++
+ * d/secrecy.1: minor corrections to the manual page
+ * d/{control,copyright,secrecy.1}: update packager address
+
+ -- Étienne Mollier <emollier at debian.org> Sat, 10 Jul 2021 18:07:00 +0200
+
libsecrecy (0.0.2+dfsg-2) unstable; urgency=medium
* Mark package Multi-Arch: same.
=====================================
debian/control
=====================================
@@ -2,7 +2,7 @@ Source: libsecrecy
Section: science
Priority: optional
Maintainer: Debian Med Packaging Team <debian-med-packaging at lists.alioth.debian.org>
-Uploaders: Étienne Mollier <etienne.mollier at mailoo.org>
+Uploaders: Étienne Mollier <emollier at debian.org>
Build-Depends: debhelper-compat (= 13),
pkg-config,
libgpgme-dev,
=====================================
debian/copyright
=====================================
@@ -25,7 +25,7 @@ Copyright: 2020, German Tischler-Höhle <germant at miltenyibiotec.de>
License: BSD-2-clause
Files: debian/*
-Copyright: 2020 Étienne Mollier <etienne.mollier at mailoo.org>
+Copyright: 2020 Étienne Mollier <emollier at debian.org>
License: BSD-2-clause
License: BSD-2-clause
=====================================
debian/secrecy.1
=====================================
@@ -41,7 +41,8 @@ and
The program
.B secrecy
accepts several subcommands.
-It is to be noted that, currently,
+It is to be noted that,
+currently,
.B secrecy
has no arguments for reading and writing any file.
One has to rely on the shell capabilities to read and write plain files,
@@ -61,7 +62,9 @@ can currently take the values
or
.BR AES256 ,
.I gpgid
-needs to be a valid id (normally an email address) present as a secret key in
+needs to be a valid id
+(normally an email address)
+present as a secret key in
.BR gpg (1)'s
keyring,
which can be used for securely storing the AES key for use by
@@ -71,7 +74,9 @@ and
can be chosen as a human readable name for the key created,
for instance "mykey".
The program outputs a key hash in the form of a hexadecimal encoded string.
-Either this key hash or the key name given can to be provided to the encrypt command of
+Either this key hash,
+or the key name given,
+can be provided to the encrypt command of
.B secrecy
for encrypting files using the newly created key.
.TP
@@ -138,10 +143,14 @@ key which will be used to locally encrypt the key for storing it in
database.
.TP
.B secrecy listKeys
-List installed keys. It prints a tabulation separated table such that the first column contains the key names and the second the respective key hash values.
+List installed keys.
+It prints a tabulation separated table,
+such that the first column contains the key names,
+and the second the respective key hash values.
.TP
\fBsecrecy setDefaultKey \fIkeyname\fR
-Change the default key. The default key is used when an empty
+Change the default key.
+The default key is used when an empty
.I keyname
is used for running any command accepting a key name,
with the obvious exceptions of
@@ -250,7 +259,7 @@ is a program part of the
.BR libsecrecy ,
written by German Tischler-Höhle <germant at miltenyibiotec.de>.
.PP
-The present manual page is written by Étienne Mollier <etienne.mollier at mailoo.org> for the Debian project.
+The present manual page is written by Étienne Mollier <emollier at debian.org> for the Debian project.
.SH SEE ALSO
.PP
See the
=====================================
debian/tests/control
=====================================
@@ -1,7 +1,7 @@
Tests: run-unit-test
-Depends: @, g++
+Depends: @, g++, clang
Restrictions: allow-stderr, flaky
Tests: run-stable-test
-Depends: @, g++
+Depends: @, g++, clang
Restrictions: allow-stderr, superficial
=====================================
debian/tests/run-stable-test
=====================================
@@ -13,6 +13,10 @@ cd "${AUTOPKGTEST_TMP}"
set -v
################################################################################
+# Second run
+# This is done because the main run is flaky. It allows one to identify
+# crashes unrelated to the flaky property of the main test, hopefully.
+################################################################################
# I. Test secrecy
# 0. Preparation
HOME="${AUTOPKGTEST_TMP}"
@@ -35,7 +39,6 @@ set -v
################################################################################
# II. Test libsecrecy-dev
# 0. Preparation
- CXX="c++"
CXXFLAGS="$( pkg-config libsecrecy --cflags )"
LDFLAGS="$( pkg-config libsecrecy --libs )"
export CXXFLAGS LDFLAGS
@@ -61,6 +64,10 @@ set -v
}
}
END
+ CXX=g++
+ "$CXX" $CXXFLAGS -c encrypt.cpp -o encrypt.o
+ "$CXX" $CXXFLAGS encrypt.o -o encrypt $LDFLAGS
+ CXX=clang++
"$CXX" $CXXFLAGS -c encrypt.cpp -o encrypt.o
"$CXX" $CXXFLAGS encrypt.o -o encrypt $LDFLAGS
# NOTE: program execution flaky, so not tested in this stable pass.
@@ -83,6 +90,10 @@ set -v
}
}
END
+ CXX=g++
+ "$CXX" $CXXFLAGS -c decrypt.cpp -o decrypt.o
+ "$CXX" $CXXFLAGS decrypt.o -o decrypt $LDFLAGS
+ CXX=clang++
"$CXX" $CXXFLAGS -c decrypt.cpp -o decrypt.o
"$CXX" $CXXFLAGS decrypt.o -o decrypt $LDFLAGS
# NOTE: program execution flaky, so not tested in this stable pass.
=====================================
debian/tests/run-unit-test
=====================================
@@ -56,7 +56,6 @@ set -v
################################################################################
# II. Test libsecrecy-dev
# 0. Preparation
- CXX="g++"
CXXFLAGS="$( pkg-config libsecrecy --cflags )"
LDFLAGS="$( pkg-config libsecrecy --libs )"
export CXXFLAGS LDFLAGS
@@ -82,6 +81,12 @@ set -v
}
}
END
+ CXX="g++"
+ "$CXX" $CXXFLAGS -c encrypt.cpp -o encrypt.o
+ "$CXX" $CXXFLAGS encrypt.o -o encrypt $LDFLAGS
+ ./encrypt < changelog > changelog.ciphered
+ ./encrypt < copyright > copyright.ciphered
+ CXX="clang++"
"$CXX" $CXXFLAGS -c encrypt.cpp -o encrypt.o
"$CXX" $CXXFLAGS encrypt.o -o encrypt $LDFLAGS
./encrypt < changelog > changelog.ciphered
@@ -105,6 +110,15 @@ set -v
}
}
END
+ CXX="g++"
+ "$CXX" $CXXFLAGS -c decrypt.cpp -o decrypt.o
+ "$CXX" $CXXFLAGS decrypt.o -o decrypt $LDFLAGS
+ ./decrypt < changelog.ciphered > changelog.deciphered
+ ./decrypt < copyright.ciphered > copyright.deciphered
+ # Make sure the cipher/decipher cycle did not affect the payload.
+ diff changelog changelog.deciphered
+ diff copyright copyright.deciphered
+ CXX="clang++"
"$CXX" $CXXFLAGS -c decrypt.cpp -o decrypt.o
"$CXX" $CXXFLAGS decrypt.o -o decrypt $LDFLAGS
./decrypt < changelog.ciphered > changelog.deciphered
View it on GitLab: https://salsa.debian.org/med-team/libsecrecy/-/compare/e7ac3cb8d24a622229bac772865754578d4b34e1...d1f91dc6b5e8bdd5a2d87f560c7484e74ab9ed3f
--
View it on GitLab: https://salsa.debian.org/med-team/libsecrecy/-/compare/e7ac3cb8d24a622229bac772865754578d4b34e1...d1f91dc6b5e8bdd5a2d87f560c7484e74ab9ed3f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-med-commit/attachments/20210710/d38c9810/attachment-0001.htm>
More information about the debian-med-commit
mailing list