Revision bd588eb9
Added by koszko over 1 year ago
conftest.py | ||
---|---|---|
8 | 8 |
from pathlib import Path |
9 | 9 |
|
10 | 10 |
import pytest |
11 |
import pkgutil |
|
11 | 12 |
|
12 | 13 |
here = Path(__file__).resolve().parent |
13 | 14 |
sys.path.insert(0, str(here / 'src')) |
... | ... | |
34 | 35 |
run = mocked_run |
35 | 36 |
|
36 | 37 |
monkeypatch.setattr(where, 'subprocess', MockedSubprocess) |
38 |
|
|
39 |
@pytest.fixture(autouse=True) |
|
40 |
def no_gettext(monkeypatch, request): |
|
41 |
""" |
|
42 |
Make gettext return all strings untranslated unless we request otherwise. |
|
43 |
""" |
|
44 |
if request.node.get_closest_marker('enable_gettext'): |
|
45 |
return |
|
46 |
|
|
47 |
import hydrilla |
|
48 |
modules_to_process = [hydrilla] |
|
49 |
|
|
50 |
def add_child_modules(parent): |
|
51 |
""" |
|
52 |
Recursuvely collect all modules descending from 'parent' into an array. |
|
53 |
""" |
|
54 |
try: |
|
55 |
load_paths = parent.__path__ |
|
56 |
except AttributeError: |
|
57 |
return |
|
58 |
|
|
59 |
for module_info in pkgutil.iter_modules(load_paths): |
|
60 |
if module_info.name != '__main__': |
|
61 |
__import__(f'{parent.__name__}.{module_info.name}') |
|
62 |
modules_to_process.append(getattr(parent, module_info.name)) |
|
63 |
add_child_modules(getattr(parent, module_info.name)) |
|
64 |
|
|
65 |
add_child_modules(hydrilla) |
|
66 |
|
|
67 |
for module in modules_to_process: |
|
68 |
if hasattr(module, '_'): |
|
69 |
monkeypatch.setattr(module, '_', lambda message: message) |
src/hydrilla/builder/build.py | ||
---|---|---|
83 | 83 |
try: |
84 | 84 |
cp = subprocess.run(command, capture_output=True, text=True) |
85 | 85 |
except FileNotFoundError: |
86 |
raise ReuseError(_('couldnt_execute_reuse_is_it_installed')) |
|
86 |
msg = _('couldnt_execute_{}_is_it_installed').format('reuse') |
|
87 |
raise ReuseError(msg) |
|
87 | 88 |
|
88 | 89 |
if cp.returncode != 0: |
89 |
msg = _('reuse_command_{}_failed').format(' '.join(command))
|
|
90 |
msg = _('command_{}_failed').format(' '.join(command)) |
|
90 | 91 |
raise ReuseError(msg, cp) |
91 | 92 |
|
92 | 93 |
return cp.stdout.encode() |
src/hydrilla/builder/local_apt.py | ||
---|---|---|
114 | 114 |
try: |
115 | 115 |
cp = run(command, **kwargs) |
116 | 116 |
except FileNotFoundError: |
117 |
raise AptError(_('couldnt_execute_apt_get_is_it_installed')) |
|
117 |
msg = _('couldnt_execute_{}_is_it_installed').format('apt-get') |
|
118 |
raise AptError(msg) |
|
118 | 119 |
|
119 | 120 |
if cp.returncode != 0: |
120 |
msg = _('apt_get_command_{}_failed').format(' '.join(command))
|
|
121 |
msg = _('command_{}_failed').format(' '.join(command)) |
|
121 | 122 |
raise AptError(msg, cp) |
122 | 123 |
|
123 | 124 |
return cp |
... | ... | |
185 | 186 |
try: |
186 | 187 |
from gnupg import GPG |
187 | 188 |
except ModuleNotFoundError: |
188 |
raise GpgError(_('couldnt_import_gnupg_is_it_installed'))
|
|
189 |
raise GpgError(_('couldnt_import_{}_is_it_installed').format('gnupg'))
|
|
189 | 190 |
|
190 | 191 |
gpg = GPG(keyring=str(cache_dir() / 'master_keyring.gpg')) |
191 | 192 |
for key in keys: |
... | ... | |
193 | 194 |
continue |
194 | 195 |
|
195 | 196 |
if gpg.recv_keys(default_keyserver, key).imported == 0: |
196 |
raise GpgError(_('gpg_couldnt_recv_key'))
|
|
197 |
raise GpgError(_('gpg_couldnt_recv_key_{}').format(key))
|
|
197 | 198 |
|
198 | 199 |
return gpg.export_keys(keys, armor=False, minimal=True) |
199 | 200 |
|
... | ... | |
404 | 405 |
try: |
405 | 406 |
cp = run(command) |
406 | 407 |
except FileNotFoundError: |
407 |
raise AptError(_('couldnt_execute_dpkg_deb_is_it_installed')) |
|
408 |
msg = _('couldnt_execute_{}_is_it_installed'.format('dpkg-deb')) |
|
409 |
raise AptError(msg) |
|
408 | 410 |
|
409 | 411 |
if cp.returncode != 0: |
410 |
msg = _('dpkg_deb_command_{}_failed').format(' '.join(command))
|
|
412 |
msg = _('command_{}_failed').format(' '.join(command)) |
|
411 | 413 |
raise AptError(msg, cp) |
412 | 414 |
|
413 | 415 |
docs_dir = root / 'usr' / 'share' / 'doc' |
src/hydrilla/builder/locales/en_US/LC_MESSAGES/hydrilla-messages.po | ||
---|---|---|
7 | 7 |
msgstr "" |
8 | 8 |
"Project-Id-Version: hydrilla.builder 0.1.dev16+g4e46d7f.d20220211\n" |
9 | 9 |
"Report-Msgid-Bugs-To: koszko@koszko.org\n" |
10 |
"POT-Creation-Date: 2022-04-19 13:51+0200\n"
|
|
10 |
"POT-Creation-Date: 2022-05-10 16:47+0200\n"
|
|
11 | 11 |
"PO-Revision-Date: 2022-02-12 00:00+0000\n" |
12 | 12 |
"Last-Translator: Wojtek Kosior <koszko@koszko.org>\n" |
13 | 13 |
"Language: en_US\n" |
... | ... | |
18 | 18 |
"Content-Transfer-Encoding: 8bit\n" |
19 | 19 |
"Generated-By: Babel 2.8.0\n" |
20 | 20 |
|
21 |
#: src/hydrilla/builder/build.py:118 |
|
22 |
msgid "couldnt_import_reuse_is_it_installed" |
|
23 |
msgstr "" |
|
24 |
"Could not import 'reuse'. Is the tool installed and visible to this " |
|
25 |
"Python instance?" |
|
21 |
#: src/hydrilla/builder/build.py:86 src/hydrilla/builder/local_apt.py:117 |
|
22 |
#: src/hydrilla/builder/local_apt.py:408 |
|
23 |
msgid "couldnt_execute_{}_is_it_installed" |
|
24 |
msgstr "Could not execute '{}'. Is the tool installed and reachable via PATH?" |
|
25 |
|
|
26 |
#: src/hydrilla/builder/build.py:90 src/hydrilla/builder/local_apt.py:121 |
|
27 |
#: src/hydrilla/builder/local_apt.py:412 |
|
28 |
msgid "command_{}_failed" |
|
29 |
msgstr "The following command finished execution with a non-zero exit status: {}" |
|
26 | 30 |
|
27 |
#: src/hydrilla/builder/build.py:123 |
|
28 |
msgid "spdx_report_from_reuse_incompliant" |
|
29 |
msgstr "Attempt to generate an SPDX report for a REUSE-incompliant package." |
|
31 |
#: src/hydrilla/builder/build.py:198 |
|
32 |
msgid "path_contains_double_dot_{}" |
|
33 |
msgstr "" |
|
34 |
"Attempt to load '{}' which includes a forbidden parent reference ('..') " |
|
35 |
"in the path." |
|
30 | 36 |
|
31 |
#: src/hydrilla/builder/build.py:207
|
|
37 |
#: src/hydrilla/builder/build.py:205
|
|
32 | 38 |
msgid "loading_{}_outside_package_dir" |
33 | 39 |
msgstr "Attempt to load '{}' which lies outside package source directory." |
34 | 40 |
|
35 |
#: src/hydrilla/builder/build.py:211
|
|
41 |
#: src/hydrilla/builder/build.py:209
|
|
36 | 42 |
msgid "loading_reserved_index_json" |
37 | 43 |
msgstr "Attempt to load 'index.json' which is a reserved filename." |
38 | 44 |
|
39 |
#: src/hydrilla/builder/build.py:329
|
|
45 |
#: src/hydrilla/builder/build.py:350
|
|
40 | 46 |
msgid "report_spdx_not_in_copyright_list" |
41 | 47 |
msgstr "" |
42 | 48 |
"Told to generate 'report.spdx' but 'report.spdx' is not listed among " |
43 | 49 |
"copyright files. Refusing to proceed." |
44 | 50 |
|
45 |
#: src/hydrilla/builder/build.py:402 |
|
51 |
#: src/hydrilla/builder/build.py:421 |
|
52 |
msgid "build_package_from_srcdir_to_dstdir" |
|
53 |
msgstr "" |
|
54 |
"Build Hydrilla package from `scrdir` and write the resulting files under " |
|
55 |
"`dstdir`." |
|
56 |
|
|
57 |
#: src/hydrilla/builder/build.py:423 |
|
46 | 58 |
msgid "source_directory_to_build_from" |
47 | 59 |
msgstr "Source directory to build from." |
48 | 60 |
|
49 |
#: src/hydrilla/builder/build.py:404
|
|
61 |
#: src/hydrilla/builder/build.py:425
|
|
50 | 62 |
msgid "path_instead_of_index_json" |
51 | 63 |
msgstr "" |
52 | 64 |
"Path to file to be processed instead of index.json (if not absolute, " |
53 | 65 |
"resolved relative to srcdir)." |
54 | 66 |
|
55 |
#: src/hydrilla/builder/build.py:406 |
|
67 |
#: src/hydrilla/builder/build.py:427 |
|
68 |
msgid "path_instead_for_piggyback_files" |
|
69 |
msgstr "" |
|
70 |
"Path to a non-standard directory with foreign packages' archive files to " |
|
71 |
"use." |
|
72 |
|
|
73 |
#: src/hydrilla/builder/build.py:429 |
|
56 | 74 |
msgid "built_package_files_destination" |
57 | 75 |
msgstr "Destination directory to write built package files to." |
58 | 76 |
|
59 |
#: src/hydrilla/builder/build.py:408
|
|
77 |
#: src/hydrilla/builder/build.py:431
|
|
60 | 78 |
#, python-format |
61 | 79 |
msgid "%(prog)s_%(version)s_license" |
62 | 80 |
msgstr "" |
... | ... | |
67 | 85 |
"This is free software: you are free to change and redistribute it.\n" |
68 | 86 |
"There is NO WARRANTY, to the extent permitted by law." |
69 | 87 |
|
70 |
#: src/hydrilla/builder/build.py:409
|
|
88 |
#: src/hydrilla/builder/build.py:432
|
|
71 | 89 |
msgid "version_printing" |
72 | 90 |
msgstr "Print version information and exit." |
73 | 91 |
|
74 |
#: src/hydrilla/builder/build.py:415 |
|
75 |
msgid "build_package_from_srcdir_to_dstdir" |
|
92 |
#: src/hydrilla/builder/common_errors.py:62 |
|
93 |
msgid "STDOUT_OUTPUT_heading" |
|
94 |
msgstr "## Command's standard output ##" |
|
95 |
|
|
96 |
#: src/hydrilla/builder/common_errors.py:65 |
|
97 |
msgid "STDERR_OUTPUT_heading" |
|
98 |
msgstr "## Command's standard error output ##" |
|
99 |
|
|
100 |
#: src/hydrilla/builder/local_apt.py:146 |
|
101 |
msgid "distro_{}_unknown" |
|
102 |
msgstr "Attempt to use an unknown software distribution '{}'." |
|
103 |
|
|
104 |
#: src/hydrilla/builder/local_apt.py:189 |
|
105 |
msgid "couldnt_import_{}_is_it_installed" |
|
76 | 106 |
msgstr "" |
77 |
"Build Hydrilla package from `scrdir` and write the resulting files under " |
|
78 |
"`dstdir`." |
|
107 |
"Could not import '{}'. Is the module installed and visible to this Python" |
|
108 |
" instance?" |
|
109 |
|
|
110 |
#: src/hydrilla/builder/local_apt.py:197 |
|
111 |
msgid "gpg_couldnt_recv_key_{}" |
|
112 |
msgstr "Could not import PGP key '{}'." |
|
113 |
|
|
114 |
#: src/hydrilla/builder/local_apt.py:314 |
|
115 |
msgid "apt_install_output_not_understood" |
|
116 |
msgstr "The output of an 'apt-get install' command was not understood." |
|
117 |
|
|
118 |
#: src/hydrilla/builder/local_apt.py:342 |
|
119 |
msgid "apt_download_gave_bad_filename_{}" |
|
120 |
msgstr "The 'apt-get download' command produced a file with unexpected name '{}'." |
|
121 |
|
|
122 |
#: src/hydrilla/builder/piggybacking.py:102 |
|
123 |
msgid "loading_{}_outside_piggybacked_dir" |
|
124 |
msgstr "" |
|
125 |
"Attempt to load '{}' which lies outside piggybacked packages files root " |
|
126 |
"directory." |
|
79 | 127 |
|
80 | 128 |
#: src/hydrilla/util/_util.py:79 |
81 | 129 |
msgid "bad_comment" |
tests/test_build.py | ||
---|---|---|
582 | 582 |
Modify index.json to expect missing report.spdx file and cause an error. |
583 | 583 |
""" |
584 | 584 |
monkeypatch.delitem(index_obj, 'reuse_generate_spdx_report') |
585 |
return FileNotFoundError |
|
585 |
return FileNotFoundError,
|
|
586 | 586 |
|
587 | 587 |
@error_maker |
588 | 588 |
def sample_source_error_index_schema(monkeypatch, sample_source): |
589 | 589 |
"""Modify index.json to be incompliant with the schema.""" |
590 | 590 |
monkeypatch.delitem(index_obj, 'definitions') |
591 |
return ValidationError |
|
591 |
return ValidationError,
|
|
592 | 592 |
|
593 | 593 |
@error_maker |
594 | 594 |
def sample_source_error_bad_comment(monkeypatch, sample_source): |
595 | 595 |
"""Modify index.json to have an invalid '/' in it.""" |
596 |
return json.JSONDecodeError, json.dumps(index_obj) + '/something\n' |
|
596 |
return json.JSONDecodeError, '^bad_comment: .*', \ |
|
597 |
json.dumps(index_obj) + '/something\n' |
|
597 | 598 |
|
598 | 599 |
@error_maker |
599 | 600 |
def sample_source_error_bad_json(monkeypatch, sample_source): |
600 | 601 |
"""Modify index.json to not be valid json even after comment stripping.""" |
601 |
return json.JSONDecodeError, json.dumps(index_obj) + '???/\n'
|
|
602 |
return json.JSONDecodeError, '', json.dumps(index_obj) + '???\n'
|
|
602 | 603 |
|
603 | 604 |
@error_maker |
604 | 605 |
def sample_source_error_missing_reuse(monkeypatch, sample_source): |
605 | 606 |
"""Cause mocked reuse process invocation to fail with FileNotFoundError.""" |
606 | 607 |
(sample_source / 'mock_reuse_missing').touch() |
607 |
return build.ReuseError |
|
608 |
return build.ReuseError, '^couldnt_execute_reuse_is_it_installed$'
|
|
608 | 609 |
|
609 | 610 |
@error_maker |
610 | 611 |
def sample_source_error_missing_license(monkeypatch, sample_source): |
611 | 612 |
"""Remove a file to make package REUSE-incompliant.""" |
612 | 613 |
(sample_source / 'README.txt.license').unlink() |
613 |
return build.ReuseError |
|
614 |
|
|
615 |
error_regex = """^\ |
|
616 |
command_reuse --root \\S+ lint_failed |
|
617 |
|
|
618 |
STDOUT_OUTPUT_heading |
|
619 |
|
|
620 |
dummy lint output |
|
621 |
|
|
622 |
STDERR_OUTPUT_heading |
|
623 |
|
|
624 |
some error output\ |
|
625 |
$\ |
|
626 |
""" |
|
627 |
|
|
628 |
return build.ReuseError, error_regex |
|
614 | 629 |
|
615 | 630 |
@error_maker |
616 | 631 |
def sample_source_error_file_outside(monkeypatch, sample_source): |
617 | 632 |
"""Make index.json illegally reference a file outside srcdir.""" |
618 | 633 |
new_list = [*index_obj['copyright'], {'file': '../abc'}] |
619 | 634 |
monkeypatch.setitem(index_obj, 'copyright', new_list) |
620 |
return FileReferenceError |
|
635 |
return FileReferenceError, '^path_contains_double_dot_\\.\\./abc$'
|
|
621 | 636 |
|
622 | 637 |
@error_maker |
623 | 638 |
def sample_source_error_reference_itself(monkeypatch, sample_source): |
624 | 639 |
"""Make index.json illegally reference index.json.""" |
625 | 640 |
new_list = [*index_obj['copyright'], {'file': 'index.json'}] |
626 | 641 |
monkeypatch.setitem(index_obj, 'copyright', new_list) |
627 |
return FileReferenceError |
|
642 |
return FileReferenceError, '^loading_reserved_index_json$'
|
|
628 | 643 |
|
629 | 644 |
@error_maker |
630 | 645 |
def sample_source_error_report_excluded(monkeypatch, sample_source): |
... | ... | |
635 | 650 |
new_list = [file_ref for file_ref in index_obj['copyright'] |
636 | 651 |
if file_ref['file'] != 'report.spdx'] |
637 | 652 |
monkeypatch.setitem(index_obj, 'copyright', new_list) |
638 |
return FileReferenceError |
|
653 |
return FileReferenceError, '^report_spdx_not_in_copyright_list$'
|
|
639 | 654 |
|
640 | 655 |
@pytest.fixture(params=error_makers) |
641 | 656 |
def sample_source_make_errors(request, monkeypatch, sample_source): |
... | ... | |
644 | 659 |
broken versions. Return an error type that should be raised when running |
645 | 660 |
test build. |
646 | 661 |
""" |
647 |
index_text = None |
|
648 |
error_type = request.param(monkeypatch, sample_source) |
|
649 |
if type(error_type) is tuple: |
|
650 |
error_type, index_text = error_type |
|
662 |
error_type, error_regex, index_text = \ |
|
663 |
[*request.param(monkeypatch, sample_source), '', ''][0:3] |
|
651 | 664 |
|
652 | 665 |
index_text = index_text or json.dumps(index_obj) |
653 | 666 |
|
... | ... | |
655 | 668 |
|
656 | 669 |
monkeypatch.setitem(src_files, 'index.json', index_text.encode()) |
657 | 670 |
|
658 |
return error_type |
|
671 |
return error_type, error_regex
|
|
659 | 672 |
|
660 | 673 |
@pytest.mark.subprocess_run(build, run_reuse) |
661 | 674 |
@pytest.mark.usefixtures('mock_subprocess_run') |
662 | 675 |
def test_build_error(tmpdir, sample_source, sample_source_make_errors): |
663 | 676 |
"""Try building the sample source package and verify generated errors.""" |
664 |
error_type = sample_source_make_errors |
|
677 |
error_type, error_regex = sample_source_make_errors
|
|
665 | 678 |
|
666 | 679 |
dstdir = Path(tmpdir) / 'dstdir' |
667 | 680 |
tmpdir = Path(tmpdir) / 'example' |
... | ... | |
669 | 682 |
dstdir.mkdir(exist_ok=True) |
670 | 683 |
tmpdir.mkdir(exist_ok=True) |
671 | 684 |
|
672 |
with pytest.raises(error_type): |
|
685 |
with pytest.raises(error_type, match=error_regex):
|
|
673 | 686 |
build.Build(sample_source, Path('index.json'))\ |
674 | 687 |
.write_package_files(dstdir) |
tests/test_local_apt.py | ||
---|---|---|
290 | 290 |
""" |
291 | 291 |
sources_list = local_apt.SourcesList(['deb-src sth', 'deb sth']) |
292 | 292 |
|
293 |
with pytest.raises(local_apt.AptError) as excinfo: |
|
293 |
with pytest.raises(local_apt.AptError, |
|
294 |
match='^couldnt_execute_apt-get_is_it_installed$'): |
|
294 | 295 |
with local_apt.local_apt(sources_list, local_apt.default_keys) as apt: |
295 | 296 |
pass |
296 | 297 |
|
297 |
assert len(excinfo.value.args) == 1 |
|
298 |
assert isinstance(excinfo.value.args[0], str) |
|
299 |
assert '\n' not in excinfo.value.args[0] |
|
300 |
|
|
301 | 298 |
@pytest.mark.subprocess_run(local_apt, make_run_apt_get(update_code=1)) |
302 | 299 |
@pytest.mark.usefixtures('mock_subprocess_run', 'mock_gnupg_import') |
303 | 300 |
def test_local_apt_update_fail(mock_cache_dir): |
... | ... | |
307 | 304 |
""" |
308 | 305 |
sources_list = local_apt.SourcesList(['deb-src sth', 'deb sth']) |
309 | 306 |
|
310 |
with pytest.raises(local_apt.AptError) as excinfo: |
|
311 |
with local_apt.local_apt(sources_list, local_apt.default_keys) as apt: |
|
312 |
pass |
|
307 |
error_regex = """^\ |
|
308 |
command_apt-get -c \\S+ update_failed |
|
309 |
|
|
310 |
STDOUT_OUTPUT_heading |
|
311 |
|
|
312 |
some output |
|
313 | 313 |
|
314 |
assert len(excinfo.value.args) == 1
|
|
314 |
STDERR_OUTPUT_heading
|
|
315 | 315 |
|
316 |
assert re.match(r'.*\n\n.*\n\nsome output\n\n.*\n\nsome error output', |
|
317 |
excinfo.value.args[0]) |
|
316 |
some error output\ |
|
317 |
$\ |
|
318 |
""" |
|
319 |
|
|
320 |
with pytest.raises(local_apt.AptError, match=error_regex): |
|
321 |
with local_apt.local_apt(sources_list, local_apt.default_keys) as apt: |
|
322 |
pass |
|
318 | 323 |
|
319 | 324 |
@pytest.mark.subprocess_run(local_apt, make_run_apt_get()) |
320 | 325 |
@pytest.mark.usefixtures('mock_subprocess_run', 'mock_gnupg_import') |
... | ... | |
359 | 364 |
destination = mock_cache_dir / 'destination' |
360 | 365 |
destination.mkdir() |
361 | 366 |
|
362 |
with pytest.raises(local_apt.AptError) as excinfo: |
|
367 |
error_regex = f"""^\ |
|
368 |
command_apt-get -c \\S+ install --yes --just-print libjs-mathjax_failed |
|
369 |
|
|
370 |
STDOUT_OUTPUT_heading |
|
371 |
|
|
372 |
{re.escape(sample_install_stdout)} |
|
373 |
|
|
374 |
STDERR_OUTPUT_heading |
|
375 |
|
|
376 |
some error output\ |
|
377 |
$\ |
|
378 |
""" |
|
379 |
|
|
380 |
with pytest.raises(local_apt.AptError, match=error_regex): |
|
363 | 381 |
local_apt.download_apt_packages(sources_list, local_apt.default_keys, |
364 | 382 |
['libjs-mathjax'], destination, |
365 | 383 |
with_deps=True) |
366 | 384 |
|
367 |
assert len(excinfo.value.args) == 1 |
|
368 |
|
|
369 |
assert re.match(r'^.*\n\n.*\n\n', excinfo.value.args[0]) |
|
370 |
assert re.search(r'\n\nsome error output$', excinfo.value.args[0]) |
|
371 |
assert sample_install_stdout in excinfo.value.args[0] |
|
372 |
|
|
373 | 385 |
assert [*destination.iterdir()] == [] |
374 | 386 |
|
375 | 387 |
@pytest.mark.subprocess_run(local_apt, make_run_apt_get(download_code=1)) |
... | ... | |
383 | 395 |
destination = mock_cache_dir / 'destination' |
384 | 396 |
destination.mkdir() |
385 | 397 |
|
386 |
with pytest.raises(local_apt.AptError) as excinfo: |
|
398 |
error_regex = """^\ |
|
399 |
command_apt-get -c \\S+ download libjs-mathjax_failed |
|
400 |
|
|
401 |
STDOUT_OUTPUT_heading |
|
402 |
|
|
403 |
some output |
|
404 |
|
|
405 |
STDERR_OUTPUT_heading |
|
406 |
|
|
407 |
some error output\ |
|
408 |
$\ |
|
409 |
""" |
|
410 |
|
|
411 |
with pytest.raises(local_apt.AptError, match=error_regex): |
|
387 | 412 |
local_apt.download_apt_packages(sources_list, local_apt.default_keys, |
388 | 413 |
['libjs-mathjax'], destination) |
389 | 414 |
|
390 |
assert len(excinfo.value.args) == 1
|
|
415 |
assert [*destination.iterdir()] == []
|
|
391 | 416 |
|
392 |
assert re.match(r'.*\n\n.*\n\nsome output\n\n.*\n\nsome error output', |
|
393 |
excinfo.value.args[0]) |
|
417 |
@pytest.fixture |
|
418 |
def mock_bad_deb_file(monkeypatch, mock_subprocess_run): |
|
419 |
""" |
|
420 |
Make mocked 'apt-get download' command produce an incorrectly-named file. |
|
421 |
""" |
|
422 |
old_run = local_apt.subprocess.run |
|
423 |
|
|
424 |
def twice_mocked_run(command, **kwargs): |
|
425 |
""" |
|
426 |
Create an evil file if needed; then act just like the run() function |
|
427 |
that got replaced by this one. |
|
428 |
""" |
|
429 |
if 'download' in command: |
|
430 |
destination = Path(kwargs.get('cwd') or Path.cwd()) |
|
431 |
(destination / 'arbitrary-name').write_text('anything') |
|
432 |
|
|
433 |
return old_run(command, **kwargs) |
|
434 |
|
|
435 |
monkeypatch.setattr(local_apt.subprocess, 'run', twice_mocked_run) |
|
436 |
|
|
437 |
@pytest.mark.subprocess_run(local_apt, make_run_apt_get()) |
|
438 |
@pytest.mark.usefixtures('mock_subprocess_run', 'mock_gnupg_import', |
|
439 |
'mock_bad_deb_file') |
|
440 |
def test_local_apt_download_bad_filename(mock_cache_dir): |
|
441 |
""" |
|
442 |
Verify that the download_apt_packages() function raises a proper error when |
|
443 |
'apt-get download' command produces an incorrectly-named file. |
|
444 |
""" |
|
445 |
sources_list = local_apt.SourcesList([], 'nabia') |
|
446 |
destination = mock_cache_dir / 'destination' |
|
447 |
destination.mkdir() |
|
448 |
|
|
449 |
error_regex = """^\ |
|
450 |
apt_download_gave_bad_filename_arbitrary-name |
|
451 |
|
|
452 |
STDOUT_OUTPUT_heading |
|
453 |
|
|
454 |
some output |
|
455 |
|
|
456 |
STDERR_OUTPUT_heading |
|
457 |
|
|
458 |
some error output\ |
|
459 |
$\ |
|
460 |
""" |
|
461 |
|
|
462 |
with pytest.raises(local_apt.AptError, match=error_regex): |
|
463 |
local_apt.download_apt_packages(sources_list, local_apt.default_keys, |
|
464 |
['libjs-mathjax'], destination) |
|
394 | 465 |
|
395 | 466 |
assert [*destination.iterdir()] == [] |
396 | 467 |
|
... | ... | |
405 | 476 |
destination = mock_cache_dir / 'destination' |
406 | 477 |
destination.mkdir() |
407 | 478 |
|
408 |
with pytest.raises(local_apt.AptError) as excinfo: |
|
409 |
local_apt.download_apt_packages(sources_list, local_apt.default_keys, |
|
410 |
['libjs-mathjax'], destination) |
|
479 |
error_regex = """^\ |
|
480 |
command_apt-get -c \\S* source --download-only \\S+_failed |
|
481 |
|
|
482 |
STDOUT_OUTPUT_heading |
|
411 | 483 |
|
412 |
assert len(excinfo.value.args) == 1
|
|
484 |
some output
|
|
413 | 485 |
|
414 |
assert re.match(r'.*\n\n.*\n\nsome output\n\n.*\n\nsome error output', |
|
415 |
excinfo.value.args[0]) |
|
486 |
STDERR_OUTPUT_heading |
|
487 |
|
|
488 |
some error output\ |
|
489 |
$\ |
|
490 |
""" |
|
491 |
|
|
492 |
with pytest.raises(local_apt.AptError, match=error_regex): |
|
493 |
local_apt.download_apt_packages(sources_list, local_apt.default_keys, |
|
494 |
['libjs-mathjax'], destination) |
|
416 | 495 |
|
417 | 496 |
assert [*destination.iterdir()] == [] |
418 | 497 |
|
... | ... | |
421 | 500 |
list = local_apt.SourcesList([], 'nabia') |
422 | 501 |
assert list.identity() == 'nabia' |
423 | 502 |
|
424 |
with pytest.raises(local_apt.DistroError): |
|
503 |
with pytest.raises(local_apt.DistroError, match='^distro_nabiał_unknown$'):
|
|
425 | 504 |
local_apt.SourcesList([], 'nabiał') |
426 | 505 |
|
427 | 506 |
list = local_apt.SourcesList(['deb sth', 'deb-src sth'], 'nabia') |
... | ... | |
557 | 636 |
assert piggybacked.resolve_file(PurePosixPath('a/b/c')) == None |
558 | 637 |
assert piggybacked.resolve_file(PurePosixPath('')) == None |
559 | 638 |
|
560 |
with pytest.raises(FileReferenceError): |
|
639 |
output_text = 'loading_.apt-root/a/../../../b_outside_piggybacked_dir' |
|
640 |
with pytest.raises(FileReferenceError, |
|
641 |
match=f'^{re.escape(output_text)}$'): |
|
561 | 642 |
piggybacked.resolve_file(PurePosixPath('.apt-root/a/../../../b')) |
562 | 643 |
|
563 | 644 |
root = piggybacked.resolve_file(PurePosixPath('.apt-root/dummy')).parent |
... | ... | |
615 | 696 |
Verify that the piggybacked_system() function raises a proper error when |
616 | 697 |
'dpkg-deb' is missing. |
617 | 698 |
""" |
618 |
with pytest.raises(local_apt.AptError) as excinfo: |
|
699 |
with pytest.raises(local_apt.AptError, |
|
700 |
match='^couldnt_execute_dpkg-deb_is_it_installed$'): |
|
619 | 701 |
with local_apt.piggybacked_system({ |
620 | 702 |
'system': 'apt', |
621 | 703 |
'distribution': 'nabia', |
... | ... | |
624 | 706 |
}, None) as piggybacked: |
625 | 707 |
pass |
626 | 708 |
|
627 |
assert len(excinfo.value.args) == 1 |
|
628 |
|
|
629 |
assert '\n' not in excinfo.value.args[0] |
|
630 |
|
|
631 |
|
|
632 | 709 |
@pytest.mark.subprocess_run(local_apt, lambda c, **kw: run_dpkg_deb(c, 1, **kw)) |
633 | 710 |
@pytest.mark.usefixtures('mock_download_packages', 'mock_subprocess_run') |
634 | 711 |
def test_piggybacked_system_fail(): |
... | ... | |
636 | 713 |
Verify that the piggybacked_system() function raises a proper error when |
637 | 714 |
'dpkg-deb -x' command returns non-0. |
638 | 715 |
""" |
639 |
with pytest.raises(local_apt.AptError) as excinfo: |
|
716 |
error_regex = """^\ |
|
717 |
command_dpkg-deb -x \\S+\\.deb \\S+_failed |
|
718 |
|
|
719 |
STDOUT_OUTPUT_heading |
|
720 |
|
|
721 |
some output |
|
722 |
|
|
723 |
STDERR_OUTPUT_heading |
|
724 |
|
|
725 |
some error output\ |
|
726 |
$\ |
|
727 |
""" |
|
728 |
|
|
729 |
with pytest.raises(local_apt.AptError, match=error_regex): |
|
640 | 730 |
with local_apt.piggybacked_system({ |
641 | 731 |
'system': 'apt', |
642 | 732 |
'distribution': 'nabia', |
... | ... | |
644 | 734 |
'dependencies': False |
645 | 735 |
}, None) as piggybacked: |
646 | 736 |
pass |
647 |
|
|
648 |
assert len(excinfo.value.args) == 1 |
|
649 |
|
|
650 |
assert re.match(r'.*\n\n.*\n\nsome output\n\n.*\n\nsome error output', |
|
651 |
excinfo.value.args[0]) |
Also available in: Unified diff
add missing english translations and verify message texts of raised exceptions in tests