Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Fedora 24 and 25 acceptance test nodesets #162

Closed
wants to merge 1 commit into from
Closed

Add Fedora 24 and 25 acceptance test nodesets #162

wants to merge 1 commit into from

Conversation

vinzent
Copy link
Contributor

@vinzent vinzent commented Dec 30, 2016

Succsessfully run the acceptance test class_spec on both platforms.

F24:

PUPPET_INSTALL_TYPE=agent BEAKER_destroy=no  BEAKER_set=fedora-24-x64 bundle exec rspec spec/acceptance/class_spec.rb
...
selinux class
  behaves like a idempotent resource
localhost $ scp /tmp/beaker20161230-16728-ucn6v5 fedora-24-x64:/tmp/apply_manifest.pp.H50Be2 {:ignore => }
    applies with no errors
localhost $ scp /tmp/beaker20161230-16728-1jfmp5c fedora-24-x64:/tmp/apply_manifest.pp.VL9jL1 {:ignore => }
    applies a second time without changes
  Package "selinux-policy-targeted"
    should be installed
  File "/etc/selinux/config"
    content
      should match /^SELINUX=enforcing$/
  Command "getenforce"
    stdout
      should match /^Enforcing$/
  the test module source should exist and the module should be loaded
    File "/usr/share/selinux/puppet_selinux_test_policy.te"
      should be file
    Command "semodule -l | grep puppet_selinux_test_policy"
      stdout
        should match /puppet_selinux_test_policy/
  the test file should have the specified file context
    File "/tmp/test_selinux_fcontext"
      selinux_label
        should match /^.*:puppet_selinux_test_policy_exec_t:s0$/
  test boolean is available and activated
    Command "getsebool puppet_selinux_test_policy_bool"
      stdout
        should match /puppet_selinux_test_policy_bool --> on/
  test domain is permissive
    Command "semanage permissive -l"
      stdout
        should match /^puppet_selinux_test_policy_t$/
  port 55555 should have type puppet_selinux_test_policy_port_t
    Command "semanage port -l | grep puppet_selinux_test_policy_port_t"
      stdout
        should match /puppet_selinux_test_policy_port_t.*55555$/

Finished in 1 minute 56.19 seconds (files took 2 minutes 41.9 seconds to load)
11 examples, 0 failures

and F25:

PUPPET_INSTALL_TYPE=agent BEAKER_destroy=no  BEAKER_set=fedora-25-x64 bundle exec rspec spec/acceptance/class_spec.rb
...
selinux class
  behaves like a idempotent resource
localhost $ scp /tmp/beaker20161230-16973-1mcym6w fedora-25-x64:/tmp/apply_manifest.pp.UuwsSS {:ignore => }
    applies with no errors
localhost $ scp /tmp/beaker20161230-16973-1a2k26u fedora-25-x64:/tmp/apply_manifest.pp.YwRqA7 {:ignore => }
    applies a second time without changes
  Package "selinux-policy-targeted"
    should be installed
  File "/etc/selinux/config"
    content
      should match /^SELINUX=enforcing$/
  Command "getenforce"
    stdout
      should match /^Enforcing$/
  the test module source should exist and the module should be loaded
    File "/usr/share/selinux/puppet_selinux_test_policy.te"
      should be file
    Command "semodule -l | grep puppet_selinux_test_policy"
      stdout
        should match /puppet_selinux_test_policy/
  the test file should have the specified file context
    File "/tmp/test_selinux_fcontext"
      selinux_label
        should match /^.*:puppet_selinux_test_policy_exec_t:s0$/
  test boolean is available and activated
    Command "getsebool puppet_selinux_test_policy_bool"
      stdout
        should match /puppet_selinux_test_policy_bool --> on/
  test domain is permissive
    Command "semanage permissive -l"
      stdout
        should match /^puppet_selinux_test_policy_t$/
  port 55555 should have type puppet_selinux_test_policy_port_t
    Command "semanage port -l | grep puppet_selinux_test_policy_port_t"
      stdout
        should match /puppet_selinux_test_policy_port_t.*55555$/

Finished in 2 minutes 8.6 seconds (files took 2 minutes 37.4 seconds to load)
11 examples, 0 failures

Succsessfully run the acceptance test class_spec on both platforms.
@vinzent
Copy link
Contributor Author

vinzent commented Dec 31, 2016

@bastelfreak requested to this to modulesync_config : voxpupuli/modulesync_config#292

@vinzent vinzent closed this Dec 31, 2016
@vinzent vinzent deleted the add_fedora_nodesets branch January 17, 2017 19:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant