From owner-freebsd-testing@FreeBSD.ORG Sun Oct 19 12:24:36 2014 Return-Path: Delivered-To: freebsd-testing@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9EE12F9B for ; Sun, 19 Oct 2014 12:24:36 +0000 (UTC) Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.29.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5D84FFD9 for ; Sun, 19 Oct 2014 12:24:35 +0000 (UTC) Received: from [78.35.153.72] (helo=fabiankeil.de) by smtprelay03.ispgateway.de with esmtpsa (SSLv3:AES128-SHA:128) (Exim 4.84) (envelope-from ) id 1XfpVS-00086F-Aq for freebsd-testing@freebsd.org; Sun, 19 Oct 2014 14:22:42 +0200 Date: Sun, 19 Oct 2014 14:22:44 +0200 From: Fabian Keil To: freebsd-testing@freebsd.org Subject: Re: atf_check() equivalent to test individual shell functions? Message-ID: <1dfb5b7d.6133bc91@fabiankeil.de> In-Reply-To: <1552a16f.63e4cafe@fabiankeil.de> References: <41d8a2fb.75b47028@fabiankeil.de> <1552a16f.63e4cafe@fabiankeil.de> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; boundary="Sig_/Bb/IFLwJuM1q=7yysZJ_xuE"; protocol="application/pgp-signature" X-Df-Sender: Nzc1MDY3 X-BeenThere: freebsd-testing@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Testing on FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 19 Oct 2014 12:24:36 -0000 --Sig_/Bb/IFLwJuM1q=7yysZJ_xuE Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Fabian Keil wrote: > Julio Merino wrote: >=20 > > On Sat, Jul 26, 2014 at 4:30 AM, Fabian Keil > > wrote: > > > Here's another zogftw-related problem. > >=20 > > What's zogftw? >=20 > The program I'm writing tests for: > http://www.fabiankeil.de/gehacktes/zogftw/ FYI, sysutils/zogftw 2014-09-19 comes with a bunch of ATF test cases, the port optionally executes them before packaging: http://www.fabiankeil.de/gehacktes/zogftw/#tests With the help of Redports this has prevented a bug that affected 8.4 and 9.2 (which I don't use myself) from making it into the final release: https://www.redports.org/~fk/20140919190307-42924-246115/zogftw-0.0.2014.09= .19.log Debugging this was a bit painful due to lack of shell access and DTrace, but obviously having a user debug this after the release would have been painful, too. Currently most of the system binaries zogftw relies are only mocked, but I intend to look into optionally using the real ones in the future. Fabian --Sig_/Bb/IFLwJuM1q=7yysZJ_xuE Content-Type: application/pgp-signature; name=signature.asc Content-Disposition: attachment; filename=signature.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlRDrRQACgkQBYqIVf93VJ0i/wCffH4hlefPeQBKZbxKGF9bktLk b0wAoI3sulvXGAzjQpxmExNRYnmbZnVp =qqck -----END PGP SIGNATURE----- --Sig_/Bb/IFLwJuM1q=7yysZJ_xuE--