[opensaml2] 03/05: New patch Delete-unit-tests-that-use-the-network-wheezy-only.patch

Etienne Dysli Metref edm-guest at moszumanska.debian.org
Mon Oct 24 07:32:34 UTC 2016


This is an automated email from the git hooks/post-receive script.

edm-guest pushed a commit to branch debian/wheezy-backports-sloppy
in repository opensaml2.

commit b30ce9ded06c6d800518c504bee7613a7feb2641
Author: Etienne Dysli Metref <etienne.dysli-metref at switch.ch>
Date:   Thu Oct 20 12:13:55 2016 +0200

    New patch Delete-unit-tests-that-use-the-network-wheezy-only.patch
    
    Since the version of cxxtest in wheezy (4.0) does not support skipping
    tests, delete networked tests because they cannot pass in Debian's
    build environment where networking is disabled.
---
 ...it-tests-that-use-the-network-wheezy-only.patch | 188 +++++++++++++++++++++
 debian/patches/series                              |   1 +
 2 files changed, 189 insertions(+)

diff --git a/debian/patches/Delete-unit-tests-that-use-the-network-wheezy-only.patch b/debian/patches/Delete-unit-tests-that-use-the-network-wheezy-only.patch
new file mode 100644
index 0000000..f70de11
--- /dev/null
+++ b/debian/patches/Delete-unit-tests-that-use-the-network-wheezy-only.patch
@@ -0,0 +1,188 @@
+From: Etienne Dysli Metref <etienne.dysli-metref at switch.ch>
+Date: Thu, 20 Oct 2016 12:01:37 +0200
+Subject: Delete unit tests that use the network (wheezy only)
+
+These cannot pass in Debian's build environment where networking is
+disabled. Moreover, the version of cxxtest in wheezy does not support
+skipping tests.
+---
+ samltest/internal.h                               |   6 -
+ samltest/saml2/metadata/XMLMetadataProviderTest.h | 149 +---------------------
+ 2 files changed, 2 insertions(+), 153 deletions(-)
+
+diff --git a/samltest/internal.h b/samltest/internal.h
+index d72b81e..2389848 100644
+--- a/samltest/internal.h
++++ b/samltest/internal.h
+@@ -124,12 +124,6 @@ protected:
+         }
+     }
+ 
+-    void skipNetworked() {
+-        if (getenv("SAMLTEST_SKIP_NETWORKED")) {
+-            TS_SKIP("requires network access");
+-        }
+-    }
+-
+ public:
+     void setUp() {
+         ParserPool& p=XMLToolingConfig::getConfig().getParser();
+diff --git a/samltest/saml2/metadata/XMLMetadataProviderTest.h b/samltest/saml2/metadata/XMLMetadataProviderTest.h
+index df4888c..5330d22 100644
+--- a/samltest/saml2/metadata/XMLMetadataProviderTest.h
++++ b/samltest/saml2/metadata/XMLMetadataProviderTest.h
+@@ -52,152 +52,7 @@ public:
+         SAMLObjectBaseTestCase::tearDown();
+     }
+ 
+-    void testXMLProvider() {
+-        skipNetworked();
+-        string config = data_path + "saml2/metadata/XMLMetadataProvider.xml";
+-        ifstream in(config.c_str());
+-        DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
+-        XercesJanitor<DOMDocument> janitor(doc);
+-
+-        auto_ptr_XMLCh path("path");
+-        string s = data_path + "saml2/metadata/InCommon-metadata.xml";
+-        auto_ptr_XMLCh file(s.c_str());
+-        doc->getDocumentElement()->setAttributeNS(nullptr,path.get(),file.get());
+-
+-        auto_ptr<MetadataProvider> metadataProvider(
+-            SAMLConfig::getConfig().MetadataProviderManager.newPlugin(XML_METADATA_PROVIDER,doc->getDocumentElement())
+-            );
+-        try {
+-            metadataProvider->init();
+-        }
+-        catch (XMLToolingException& ex) {
+-            TS_TRACE(ex.what());
+-            throw;
+-        }
+-        
+-        Locker locker(metadataProvider.get());
+-        const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria(entityID,nullptr,nullptr,false)).first;
+-        TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=nullptr);
+-        assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());
+-        TSM_ASSERT_EQUALS("Unexpected number of roles", 1, descriptor->getIDPSSODescriptors().size());
+-        TSM_ASSERT("Role lookup failed", find_if(descriptor->getIDPSSODescriptors(), isValidForProtocol(supportedProtocol))!=nullptr);
+-        TSM_ASSERT("Role lookup failed", find_if(descriptor->getIDPSSODescriptors(), isValidForProtocol(supportedProtocol2))!=nullptr);
+-
+-        static const char* providerIdStr = "urn:mace:incommon:washington.edu";
+-        auto_ptr<SAML2ArtifactType0004> artifact(
+-            new SAML2ArtifactType0004(
+-                SecurityHelper::doHash("SHA1", providerIdStr, strlen(providerIdStr), false), 1
+-                )
+-            );
+-        descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria(artifact.get(),nullptr,nullptr,false)).first;
+-        TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=nullptr);
+-        assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());
+-    }
+-
+-    void testHTTPProvider()
+-    {
+-        skipNetworked();
+-        string config = data_path + "saml2/metadata/HTTPMetadataProvider.xml";
+-        ifstream in(config.c_str());
+-        DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
+-        XercesJanitor<DOMDocument> janitor(doc);
+-
+-#if 0
+-        auto_ptr_XMLCh path("path");
+-        string s = data_path + "saml2/metadata/InCommon-metadata.xml";
+-        auto_ptr_XMLCh file(s.c_str());
+-        doc->getDocumentElement()->setAttributeNS(nullptr, path.get(), file.get());
+-#endif
+-        auto_ptr<MetadataProvider> metadataProvider(\
+-            SAMLConfig::getConfig().MetadataProviderManager.newPlugin(XML_METADATA_PROVIDER, doc->getDocumentElement())
+-            );
+-        try {
+-            metadataProvider->init();
+-        } catch (XMLToolingException& ex) {
+-            TS_TRACE(ex.what());
+-            throw;
+-        }
+-
+-        Locker locker(metadataProvider.get());
+-        const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria(entityID, nullptr, nullptr, false)).first;
+-        TSM_ASSERT("Retrieved entity descriptor was null", descriptor != nullptr);
+-        assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());
+-        TSM_ASSERT_EQUALS("Unexpected number of roles", 1, descriptor->getIDPSSODescriptors().size());
+-        TSM_ASSERT("Role lookup failed", find_if(descriptor->getIDPSSODescriptors(), isValidForProtocol(supportedProtocol)) != nullptr);
+-        TSM_ASSERT("Role lookup failed", find_if(descriptor->getIDPSSODescriptors(), isValidForProtocol(supportedProtocol2)) != nullptr);
+-
+-        static const char* providerIdStr = "urn:mace:incommon:washington.edu";
+-        auto_ptr<SAML2ArtifactType0004> artifact(
+-            new SAML2ArtifactType0004(
+-                SecurityHelper::doHash("SHA1", providerIdStr, strlen(providerIdStr), false), 1
+-                )
+-            );
+-        descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria(artifact.get(), nullptr, nullptr, false)).first;
+-        TSM_ASSERT("Retrieved entity descriptor was null", descriptor != nullptr);
+-        assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());
+-    }
+-
+-
+-
+-    void testXMLWithBlacklists() {
+-        skipNetworked();
+-        string config = data_path + "saml2/metadata/XMLWithBlacklists.xml";
+-        ifstream in(config.c_str());
+-        DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
+-        XercesJanitor<DOMDocument> janitor(doc);
+-
+-        auto_ptr_XMLCh path("path");
+-        string s = data_path + "saml2/metadata/InCommon-metadata.xml";
+-        auto_ptr_XMLCh file(s.c_str());
+-        doc->getDocumentElement()->setAttributeNS(nullptr,path.get(),file.get());
+-
+-        auto_ptr<MetadataProvider> metadataProvider(
+-            SAMLConfig::getConfig().MetadataProviderManager.newPlugin(XML_METADATA_PROVIDER,doc->getDocumentElement())
+-            );
+-        try {
+-            metadataProvider->init();
+-        }
+-        catch (XMLToolingException& ex) {
+-            TS_TRACE(ex.what());
+-            throw;
+-        }
+-
+-        Locker locker(metadataProvider.get());
+-        const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria(entityID,nullptr,nullptr,false)).first;
+-        TSM_ASSERT("Retrieved entity descriptor was not null", descriptor==nullptr);
+-        descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria(entityID2,nullptr,nullptr,false)).first;
+-        TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=nullptr);
+-        assertEquals("Entity's ID does not match requested ID", entityID2, descriptor->getEntityID());
+-    }
+-
+-    void testXMLWithWhitelists() {
+-        skipNetworked();
+-        string config = data_path + "saml2/metadata/XMLWithWhitelists.xml";
+-        ifstream in(config.c_str());
+-        DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
+-        XercesJanitor<DOMDocument> janitor(doc);
+-
+-        auto_ptr_XMLCh path("path");
+-        string s = data_path + "saml2/metadata/InCommon-metadata.xml";
+-        auto_ptr_XMLCh file(s.c_str());
+-        doc->getDocumentElement()->setAttributeNS(nullptr,path.get(),file.get());
+-
+-        auto_ptr<MetadataProvider> metadataProvider(
+-            SAMLConfig::getConfig().MetadataProviderManager.newPlugin(XML_METADATA_PROVIDER,doc->getDocumentElement())
+-            );
+-        try {
+-            metadataProvider->init();
+-        }
+-        catch (XMLToolingException& ex) {
+-            TS_TRACE(ex.what());
+-            throw;
+-        }
+-
+-        Locker locker(metadataProvider.get());
+-        const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria(entityID2,nullptr,nullptr,false)).first;
+-        TSM_ASSERT("Retrieved entity descriptor was not null", descriptor==nullptr);
+-        descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria(entityID,nullptr,nullptr,false)).first;
+-        TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=nullptr);
+-        assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());
++    void testDummyToReplaceDeletedNetworkedTests() {
++        TS_ASSERT(1);
+     }
+ };
diff --git a/debian/patches/series b/debian/patches/series
index 7596772..5e3b291 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -20,3 +20,4 @@ Derive-correct-test-data-paths-from-srcdir.patch
 Enable-skipping-tests-which-require-network-access.patch
 Enable-the-dot-feature-of-Doxygen.patch
 Provide-PKG_INSTALLDIR-and-PKG_CHECK_VAR-macros-to-build-.patch
+Delete-unit-tests-that-use-the-network-wheezy-only.patch

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-shibboleth/opensaml2.git



More information about the Pkg-shibboleth-devel mailing list