blob: 1fbfb5ca4a86a9c077543d537282208a35b6339a (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
|
#!/bin/sh
set -e
ensure_n_canary_strings_in_dir() {
DIR=$1
CANARY_STRING=$2
EXPECTED_N=$3
msgtest "Testing for $EXPECTED_N canary strings '$CANARY_STRING' in in $DIR"
N=$(grep "$CANARY_STRING" $DIR/* 2>/dev/null |wc -l )
if [ "$N" = "$EXPECTED_N" ]; then
msgpass
return 0
else
msgfail "Expected $EXPECTED_N canaries, got $N"
return 1
fi
}
TESTDIR=$(readlink -f $(dirname $0))
. $TESTDIR/framework
setupenvironment
configarchitecture 'amd64'
buildsimplenativepackage 'apt' 'all' '1.0' 'stable'
setupaptarchive
changetowebserver --simulate-paywall
rm -rf rootdir/var/lib/apt/lists
if aptget update -qq 2>/dev/null; then
msgfail "excpected apt-get update failure"
fi
ensure_n_canary_strings_in_dir rootdir/var/lib/apt/lists/ "ni ni ni" 0
testequal 'partial' ls rootdir/var/lib/apt/lists/
# again, this time with pre-existing files valid data
for f in Release Release.gpg main_binary-amd64_Packages stable_main_source_Sources; do
echo "canary" > rootdir/var/lib/apt/lists/localhost:8080_dists_stable_${f}
done
# this will fail, the important part is that the canaries remain
aptget update -qq 2>/dev/null || true
ensure_n_canary_strings_in_dir rootdir/var/lib/apt/lists/ "canary" 4
|