Tristan Van Berkom pushed to branch chandan/element-filename-requirements at BuildStream / buildstream
Commits:
-
a080b6c7
by Tristan Van Berkom at 2018-12-31T19:03:25Z
-
d7c8b54d
by Tristan Van Berkom at 2018-12-31T19:14:16Z
-
560a6342
by Tristan Van Berkom at 2018-12-31T19:49:24Z
-
8a020a5a
by Chandan Singh at 2018-12-31T19:54:25Z
-
87568074
by Chandan Singh at 2018-12-31T19:54:25Z
-
4b2992c1
by Chandan Singh at 2018-12-31T19:54:25Z
-
ce9e9c2d
by Chandan Singh at 2018-12-31T19:54:25Z
9 changed files:
- buildstream/_loader/loader.py
- buildstream/types.py
- doc/source/format_declaring.rst
- tests/frontend/buildcheckout.py
- + tests/frontend/project/elements/invalid-chars-in-dep.bst
- + tests/frontend/project/elements/invalid-chars|<>-in-name.bst
- tests/frontend/project/project.conf
- tests/loader/junctions.py
- + tests/loader/junctions/invalid/missing-element.bst
Changes:
| ... | ... | @@ -99,7 +99,6 @@ class Loader(): |
| 99 | 99 |
# Returns: The toplevel LoadElement
|
| 100 | 100 |
def load(self, targets, rewritable=False, ticker=None, fetch_subprojects=False):
|
| 101 | 101 |
|
| 102 |
- invalid_elements = []
|
|
| 103 | 102 |
for filename in targets:
|
| 104 | 103 |
if os.path.isabs(filename):
|
| 105 | 104 |
# XXX Should this just be an assertion ?
|
| ... | ... | @@ -109,14 +108,8 @@ class Loader(): |
| 109 | 108 |
"path to the base project directory: {}"
|
| 110 | 109 |
.format(filename, self._basedir))
|
| 111 | 110 |
|
| 112 |
- if not filename.endswith(".bst"):
|
|
| 113 |
- invalid_elements.append(filename)
|
|
| 111 |
+ self._warn_invalid_elements(targets)
|
|
| 114 | 112 |
|
| 115 |
- if invalid_elements:
|
|
| 116 |
- self._warn("Target elements '{}' do not have expected file extension `.bst` "
|
|
| 117 |
- "Improperly named elements will not be discoverable by commands"
|
|
| 118 |
- .format(invalid_elements),
|
|
| 119 |
- warning_token=CoreWarnings.BAD_ELEMENT_SUFFIX)
|
|
| 120 | 113 |
# First pass, recursively load files and populate our table of LoadElements
|
| 121 | 114 |
#
|
| 122 | 115 |
deps = []
|
| ... | ... | @@ -280,12 +273,7 @@ class Loader(): |
| 280 | 273 |
self._elements[filename] = element
|
| 281 | 274 |
|
| 282 | 275 |
# Load all dependency files for the new LoadElement
|
| 283 |
- invalid_elements = []
|
|
| 284 | 276 |
for dep in element.deps:
|
| 285 |
- if not dep.name.endswith(".bst"):
|
|
| 286 |
- invalid_elements.append(dep.name)
|
|
| 287 |
- continue
|
|
| 288 |
- |
|
| 289 | 277 |
if dep.junction:
|
| 290 | 278 |
self._load_file(dep.junction, rewritable, ticker, fetch_subprojects, yaml_cache)
|
| 291 | 279 |
loader = self._get_loader(dep.junction, rewritable=rewritable, ticker=ticker,
|
| ... | ... | @@ -300,11 +288,9 @@ class Loader(): |
| 300 | 288 |
"{}: Cannot depend on junction"
|
| 301 | 289 |
.format(dep.provenance))
|
| 302 | 290 |
|
| 303 |
- if invalid_elements:
|
|
| 304 |
- self._warn("The following dependencies do not have expected file extension `.bst`: {} "
|
|
| 305 |
- "Improperly named elements will not be discoverable by commands"
|
|
| 306 |
- .format(invalid_elements),
|
|
| 307 |
- warning_token=CoreWarnings.BAD_ELEMENT_SUFFIX)
|
|
| 291 |
+ deps_names = [dep.name for dep in element.deps]
|
|
| 292 |
+ self._warn_invalid_elements(deps_names)
|
|
| 293 |
+ |
|
| 308 | 294 |
return element
|
| 309 | 295 |
|
| 310 | 296 |
# _check_circular_deps():
|
| ... | ... | @@ -679,3 +665,69 @@ class Loader(): |
| 679 | 665 |
|
| 680 | 666 |
message = Message(None, MessageType.WARN, brief)
|
| 681 | 667 |
self._context.message(message)
|
| 668 |
+ |
|
| 669 |
+ # Print warning messages if any of the specified elements have invalid names.
|
|
| 670 |
+ #
|
|
| 671 |
+ # Valid filenames should end with ".bst" extension.
|
|
| 672 |
+ #
|
|
| 673 |
+ # Args:
|
|
| 674 |
+ # elements (list): List of element names
|
|
| 675 |
+ #
|
|
| 676 |
+ # Raises:
|
|
| 677 |
+ # (:class:`.LoadError`): When warning_token is considered fatal by the project configuration
|
|
| 678 |
+ #
|
|
| 679 |
+ def _warn_invalid_elements(self, elements):
|
|
| 680 |
+ |
|
| 681 |
+ # invalid_elements
|
|
| 682 |
+ #
|
|
| 683 |
+ # A dict that maps warning types to the matching elements.
|
|
| 684 |
+ invalid_elements = {
|
|
| 685 |
+ CoreWarnings.BAD_ELEMENT_SUFFIX: [],
|
|
| 686 |
+ CoreWarnings.BAD_CHARACTERS_IN_NAME: [],
|
|
| 687 |
+ }
|
|
| 688 |
+ |
|
| 689 |
+ for filename in elements:
|
|
| 690 |
+ if not filename.endswith(".bst"):
|
|
| 691 |
+ invalid_elements[CoreWarnings.BAD_ELEMENT_SUFFIX].append(filename)
|
|
| 692 |
+ if not self._valid_chars_name(filename):
|
|
| 693 |
+ invalid_elements[CoreWarnings.BAD_CHARACTERS_IN_NAME].append(filename)
|
|
| 694 |
+ |
|
| 695 |
+ if invalid_elements[CoreWarnings.BAD_ELEMENT_SUFFIX]:
|
|
| 696 |
+ self._warn("Target elements '{}' do not have expected file extension `.bst` "
|
|
| 697 |
+ "Improperly named elements will not be discoverable by commands"
|
|
| 698 |
+ .format(invalid_elements[CoreWarnings.BAD_ELEMENT_SUFFIX]),
|
|
| 699 |
+ warning_token=CoreWarnings.BAD_ELEMENT_SUFFIX)
|
|
| 700 |
+ if invalid_elements[CoreWarnings.BAD_CHARACTERS_IN_NAME]:
|
|
| 701 |
+ self._warn("Target elements '{}' have invalid characerts in their name."
|
|
| 702 |
+ .format(invalid_elements[CoreWarnings.BAD_CHARACTERS_IN_NAME]),
|
|
| 703 |
+ warning_token=CoreWarnings.BAD_CHARACTERS_IN_NAME)
|
|
| 704 |
+ |
|
| 705 |
+ # Check if given filename containers valid characters.
|
|
| 706 |
+ #
|
|
| 707 |
+ # Args:
|
|
| 708 |
+ # name (str): Name of the file
|
|
| 709 |
+ #
|
|
| 710 |
+ # Returns:
|
|
| 711 |
+ # (bool): True if all characters are valid, False otherwise.
|
|
| 712 |
+ #
|
|
| 713 |
+ def _valid_chars_name(self, name):
|
|
| 714 |
+ for char in name:
|
|
| 715 |
+ char_val = ord(char)
|
|
| 716 |
+ |
|
| 717 |
+ # 0-31 are control chars, 127 is DEL, and >127 means non-ASCII
|
|
| 718 |
+ if char_val <= 31 or char_val >= 127:
|
|
| 719 |
+ return False
|
|
| 720 |
+ |
|
| 721 |
+ # Disallow characters that are invalid on Windows. The list can be
|
|
| 722 |
+ # found at https://docs.microsoft.com/en-us/windows/desktop/FileIO/naming-a-file
|
|
| 723 |
+ #
|
|
| 724 |
+ # Note that although : (colon) is not allowed, we do not raise
|
|
| 725 |
+ # warnings because of that, since we use it as a separator for
|
|
| 726 |
+ # junctioned elements.
|
|
| 727 |
+ #
|
|
| 728 |
+ # We also do not raise warnings on slashes since they are used as
|
|
| 729 |
+ # path separators.
|
|
| 730 |
+ if char in r'<>"|?*':
|
|
| 731 |
+ return False
|
|
| 732 |
+ |
|
| 733 |
+ return True
|
| ... | ... | @@ -105,6 +105,12 @@ class CoreWarnings(): |
| 105 | 105 |
is referenced either on the command line or by another element
|
| 106 | 106 |
"""
|
| 107 | 107 |
|
| 108 |
+ BAD_CHARACTERS_IN_NAME = "bad-characters-in-name"
|
|
| 109 |
+ """
|
|
| 110 |
+ This warning will be produces when filename for a target contains invalid
|
|
| 111 |
+ characters in its name.
|
|
| 112 |
+ """
|
|
| 113 |
+ |
|
| 108 | 114 |
|
| 109 | 115 |
# _KeyStrength():
|
| 110 | 116 |
#
|
| ... | ... | @@ -526,3 +526,27 @@ read-only variables are also dynamically declared by BuildStream: |
| 526 | 526 |
build, support for this is conditional on the element type
|
| 527 | 527 |
and the build system used (any element using 'make' can
|
| 528 | 528 |
implement this).
|
| 529 |
+ |
|
| 530 |
+ |
|
| 531 |
+Naming elements
|
|
| 532 |
+---------------
|
|
| 533 |
+When naming the element files, use the following rules:
|
|
| 534 |
+ |
|
| 535 |
+* The name of the file must have ``.bst`` extension.
|
|
| 536 |
+ |
|
| 537 |
+* All characters in the name must be printable 7-bit ASCII characters.
|
|
| 538 |
+ |
|
| 539 |
+* Following characters are reserved and must not be part of the name:
|
|
| 540 |
+ |
|
| 541 |
+ - ``<`` (less than)
|
|
| 542 |
+ - ``>`` (greater than)
|
|
| 543 |
+ - ``:`` (colon)
|
|
| 544 |
+ - ``"`` (double quote)
|
|
| 545 |
+ - ``/`` (forward slash)
|
|
| 546 |
+ - ``\`` (backslash)
|
|
| 547 |
+ - ``|`` (vertical bar)
|
|
| 548 |
+ - ``?`` (question mark)
|
|
| 549 |
+ - ``*`` (asterisk)
|
|
| 550 |
+ |
|
| 551 |
+BuildStream will attempt to raise warnings when any of these rules are violated
|
|
| 552 |
+but that may not always be possible.
|
| ... | ... | @@ -85,6 +85,20 @@ def test_build_invalid_suffix_dep(datafiles, cli, strict, hardlinks): |
| 85 | 85 |
result.assert_main_error(ErrorDomain.LOAD, "bad-element-suffix")
|
| 86 | 86 |
|
| 87 | 87 |
|
| 88 |
+@pytest.mark.datafiles(DATA_DIR)
|
|
| 89 |
+def test_build_invalid_filename_chars(datafiles, cli):
|
|
| 90 |
+ project = os.path.join(datafiles.dirname, datafiles.basename)
|
|
| 91 |
+ result = cli.run(project=project, args=strict_args(['build', 'invalid-chars|<>-in-name.bst'], 'non-strict'))
|
|
| 92 |
+ result.assert_main_error(ErrorDomain.LOAD, "bad-characters-in-name")
|
|
| 93 |
+ |
|
| 94 |
+ |
|
| 95 |
+@pytest.mark.datafiles(DATA_DIR)
|
|
| 96 |
+def test_build_invalid_filename_chars_dep(datafiles, cli):
|
|
| 97 |
+ project = os.path.join(datafiles.dirname, datafiles.basename)
|
|
| 98 |
+ result = cli.run(project=project, args=strict_args(['build', 'invalid-chars-in-dep.bst'], 'non-strict'))
|
|
| 99 |
+ result.assert_main_error(ErrorDomain.LOAD, "bad-characters-in-name")
|
|
| 100 |
+ |
|
| 101 |
+ |
|
| 88 | 102 |
@pytest.mark.datafiles(DATA_DIR)
|
| 89 | 103 |
@pytest.mark.parametrize("deps", [("run"), ("none"), ("build")])
|
| 90 | 104 |
def test_build_checkout_deps(datafiles, cli, deps):
|
| 1 |
+kind: stack
|
|
| 2 |
+description: |
|
|
| 3 |
+ |
|
| 4 |
+ This element itself has a valid name, but depends on elements that have
|
|
| 5 |
+ invalid names. This should also result in a warning.
|
|
| 6 |
+ |
|
| 7 |
+depends:
|
|
| 8 |
+- invalid-chars|<>-in-name.bst
|
| 1 |
+kind: stack
|
|
| 2 |
+description: |
|
|
| 3 |
+ The name of this files contains characters that are not allowed by
|
|
| 4 |
+ BuildStream, using it should raise a warning.
|
| ... | ... | @@ -5,3 +5,4 @@ element-path: elements |
| 5 | 5 |
|
| 6 | 6 |
fatal-warnings:
|
| 7 | 7 |
- bad-element-suffix
|
| 8 |
+- bad-characters-in-name
|
| ... | ... | @@ -3,7 +3,7 @@ import pytest |
| 3 | 3 |
import shutil
|
| 4 | 4 |
|
| 5 | 5 |
from buildstream import _yaml, ElementError
|
| 6 |
-from buildstream._exceptions import LoadError, LoadErrorReason
|
|
| 6 |
+from buildstream._exceptions import ErrorDomain, LoadErrorReason
|
|
| 7 | 7 |
from tests.testutils import cli, create_repo
|
| 8 | 8 |
from tests.testutils.site import HAVE_GIT
|
| 9 | 9 |
|
| ... | ... | @@ -38,9 +38,9 @@ def test_simple_build(cli, tmpdir, datafiles): |
| 38 | 38 |
|
| 39 | 39 |
# Build, checkout
|
| 40 | 40 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 41 |
- assert result.exit_code == 0
|
|
| 41 |
+ result.assert_success()
|
|
| 42 | 42 |
result = cli.run(project=project, args=['checkout', 'target.bst', checkoutdir])
|
| 43 |
- assert result.exit_code == 0
|
|
| 43 |
+ result.assert_success()
|
|
| 44 | 44 |
|
| 45 | 45 |
# Check that the checkout contains the expected files from both projects
|
| 46 | 46 |
assert(os.path.exists(os.path.join(checkoutdir, 'base.txt')))
|
| ... | ... | @@ -54,7 +54,7 @@ def test_build_of_same_junction_used_twice(cli, tmpdir, datafiles): |
| 54 | 54 |
# Check we can build a project that contains the same junction
|
| 55 | 55 |
# that is used twice, but named differently
|
| 56 | 56 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 57 |
- assert result.exit_code == 0
|
|
| 57 |
+ result.assert_success()
|
|
| 58 | 58 |
|
| 59 | 59 |
|
| 60 | 60 |
@pytest.mark.datafiles(DATA_DIR)
|
| ... | ... | @@ -69,9 +69,9 @@ def test_nested_simple(cli, tmpdir, datafiles): |
| 69 | 69 |
|
| 70 | 70 |
# Build, checkout
|
| 71 | 71 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 72 |
- assert result.exit_code == 0
|
|
| 72 |
+ result.assert_success()
|
|
| 73 | 73 |
result = cli.run(project=project, args=['checkout', 'target.bst', checkoutdir])
|
| 74 |
- assert result.exit_code == 0
|
|
| 74 |
+ result.assert_success()
|
|
| 75 | 75 |
|
| 76 | 76 |
# Check that the checkout contains the expected files from all subprojects
|
| 77 | 77 |
assert(os.path.exists(os.path.join(checkoutdir, 'base.txt')))
|
| ... | ... | @@ -93,9 +93,9 @@ def test_nested_double(cli, tmpdir, datafiles): |
| 93 | 93 |
|
| 94 | 94 |
# Build, checkout
|
| 95 | 95 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 96 |
- assert result.exit_code == 0
|
|
| 96 |
+ result.assert_success()
|
|
| 97 | 97 |
result = cli.run(project=project, args=['checkout', 'target.bst', checkoutdir])
|
| 98 |
- assert result.exit_code == 0
|
|
| 98 |
+ result.assert_success()
|
|
| 99 | 99 |
|
| 100 | 100 |
# Check that the checkout contains the expected files from all subprojects
|
| 101 | 101 |
assert(os.path.exists(os.path.join(checkoutdir, 'base.txt')))
|
| ... | ... | @@ -115,45 +115,46 @@ def test_nested_conflict(cli, datafiles): |
| 115 | 115 |
copy_subprojects(project, datafiles, ['foo', 'bar'])
|
| 116 | 116 |
|
| 117 | 117 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 118 |
- assert result.exit_code != 0
|
|
| 119 |
- assert result.exception
|
|
| 120 |
- assert isinstance(result.exception, LoadError)
|
|
| 121 |
- assert result.exception.reason == LoadErrorReason.CONFLICTING_JUNCTION
|
|
| 118 |
+ result.assert_main_error(ErrorDomain.LOAD, LoadErrorReason.CONFLICTING_JUNCTION)
|
|
| 122 | 119 |
|
| 123 | 120 |
|
| 121 |
+# Test that we error correctly when the junction element itself is missing
|
|
| 124 | 122 |
@pytest.mark.datafiles(DATA_DIR)
|
| 125 |
-def test_invalid_missing(cli, datafiles):
|
|
| 123 |
+def test_missing_junction(cli, datafiles):
|
|
| 126 | 124 |
project = os.path.join(str(datafiles), 'invalid')
|
| 127 | 125 |
|
| 128 | 126 |
result = cli.run(project=project, args=['build', 'missing.bst'])
|
| 129 |
- assert result.exit_code != 0
|
|
| 130 |
- assert result.exception
|
|
| 131 |
- assert isinstance(result.exception, LoadError)
|
|
| 132 |
- assert result.exception.reason == LoadErrorReason.MISSING_FILE
|
|
| 127 |
+ result.assert_main_error(ErrorDomain.LOAD, LoadErrorReason.MISSING_FILE)
|
|
| 133 | 128 |
|
| 134 | 129 |
|
| 130 |
+# Test that we error correctly when an element is not found in the subproject
|
|
| 131 |
+@pytest.mark.datafiles(DATA_DIR)
|
|
| 132 |
+def test_missing_subproject_element(cli, datafiles):
|
|
| 133 |
+ project = os.path.join(str(datafiles), 'invalid')
|
|
| 134 |
+ copy_subprojects(project, datafiles, ['base'])
|
|
| 135 |
+ |
|
| 136 |
+ result = cli.run(project=project, args=['build', 'missing-element.bst'])
|
|
| 137 |
+ result.assert_main_error(ErrorDomain.LOAD, LoadErrorReason.MISSING_FILE)
|
|
| 138 |
+ |
|
| 139 |
+ |
|
| 140 |
+# Test that we error correctly when a junction itself has dependencies
|
|
| 135 | 141 |
@pytest.mark.datafiles(DATA_DIR)
|
| 136 | 142 |
def test_invalid_with_deps(cli, datafiles):
|
| 137 | 143 |
project = os.path.join(str(datafiles), 'invalid')
|
| 138 | 144 |
copy_subprojects(project, datafiles, ['base'])
|
| 139 | 145 |
|
| 140 | 146 |
result = cli.run(project=project, args=['build', 'junction-with-deps.bst'])
|
| 141 |
- assert result.exit_code != 0
|
|
| 142 |
- assert result.exception
|
|
| 143 |
- assert isinstance(result.exception, ElementError)
|
|
| 144 |
- assert result.exception.reason == 'element-forbidden-depends'
|
|
| 147 |
+ result.assert_main_error(ErrorDomain.ELEMENT, 'element-forbidden-depends')
|
|
| 145 | 148 |
|
| 146 | 149 |
|
| 150 |
+# Test that we error correctly when a junction is directly depended on
|
|
| 147 | 151 |
@pytest.mark.datafiles(DATA_DIR)
|
| 148 | 152 |
def test_invalid_junction_dep(cli, datafiles):
|
| 149 | 153 |
project = os.path.join(str(datafiles), 'invalid')
|
| 150 | 154 |
copy_subprojects(project, datafiles, ['base'])
|
| 151 | 155 |
|
| 152 | 156 |
result = cli.run(project=project, args=['build', 'junction-dep.bst'])
|
| 153 |
- assert result.exit_code != 0
|
|
| 154 |
- assert result.exception
|
|
| 155 |
- assert isinstance(result.exception, LoadError)
|
|
| 156 |
- assert result.exception.reason == LoadErrorReason.INVALID_DATA
|
|
| 157 |
+ result.assert_main_error(ErrorDomain.LOAD, LoadErrorReason.INVALID_DATA)
|
|
| 157 | 158 |
|
| 158 | 159 |
|
| 159 | 160 |
@pytest.mark.datafiles(DATA_DIR)
|
| ... | ... | @@ -165,9 +166,9 @@ def test_options_default(cli, tmpdir, datafiles): |
| 165 | 166 |
|
| 166 | 167 |
# Build, checkout
|
| 167 | 168 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 168 |
- assert result.exit_code == 0
|
|
| 169 |
+ result.assert_success()
|
|
| 169 | 170 |
result = cli.run(project=project, args=['checkout', 'target.bst', checkoutdir])
|
| 170 |
- assert result.exit_code == 0
|
|
| 171 |
+ result.assert_success()
|
|
| 171 | 172 |
|
| 172 | 173 |
assert(os.path.exists(os.path.join(checkoutdir, 'pony.txt')))
|
| 173 | 174 |
assert(not os.path.exists(os.path.join(checkoutdir, 'horsy.txt')))
|
| ... | ... | @@ -182,9 +183,9 @@ def test_options(cli, tmpdir, datafiles): |
| 182 | 183 |
|
| 183 | 184 |
# Build, checkout
|
| 184 | 185 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 185 |
- assert result.exit_code == 0
|
|
| 186 |
+ result.assert_success()
|
|
| 186 | 187 |
result = cli.run(project=project, args=['checkout', 'target.bst', checkoutdir])
|
| 187 |
- assert result.exit_code == 0
|
|
| 188 |
+ result.assert_success()
|
|
| 188 | 189 |
|
| 189 | 190 |
assert(not os.path.exists(os.path.join(checkoutdir, 'pony.txt')))
|
| 190 | 191 |
assert(os.path.exists(os.path.join(checkoutdir, 'horsy.txt')))
|
| ... | ... | @@ -199,9 +200,9 @@ def test_options_inherit(cli, tmpdir, datafiles): |
| 199 | 200 |
|
| 200 | 201 |
# Build, checkout
|
| 201 | 202 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 202 |
- assert result.exit_code == 0
|
|
| 203 |
+ result.assert_success()
|
|
| 203 | 204 |
result = cli.run(project=project, args=['checkout', 'target.bst', checkoutdir])
|
| 204 |
- assert result.exit_code == 0
|
|
| 205 |
+ result.assert_success()
|
|
| 205 | 206 |
|
| 206 | 207 |
assert(not os.path.exists(os.path.join(checkoutdir, 'pony.txt')))
|
| 207 | 208 |
assert(os.path.exists(os.path.join(checkoutdir, 'horsy.txt')))
|
| ... | ... | @@ -228,14 +229,11 @@ def test_git_show(cli, tmpdir, datafiles): |
| 228 | 229 |
|
| 229 | 230 |
# Verify that bst show does not implicitly fetch subproject
|
| 230 | 231 |
result = cli.run(project=project, args=['show', 'target.bst'])
|
| 231 |
- assert result.exit_code != 0
|
|
| 232 |
- assert result.exception
|
|
| 233 |
- assert isinstance(result.exception, LoadError)
|
|
| 234 |
- assert result.exception.reason == LoadErrorReason.SUBPROJECT_FETCH_NEEDED
|
|
| 232 |
+ result.assert_main_error(ErrorDomain.LOAD, LoadErrorReason.SUBPROJECT_FETCH_NEEDED)
|
|
| 235 | 233 |
|
| 236 | 234 |
# Explicitly fetch subproject
|
| 237 | 235 |
result = cli.run(project=project, args=['source', 'fetch', 'base.bst'])
|
| 238 |
- assert result.exit_code == 0
|
|
| 236 |
+ result.assert_success()
|
|
| 239 | 237 |
|
| 240 | 238 |
# Check that bst show succeeds now and the pipeline includes the subproject element
|
| 241 | 239 |
element_list = cli.get_pipeline(project, ['target.bst'])
|
| ... | ... | @@ -263,9 +261,9 @@ def test_git_build(cli, tmpdir, datafiles): |
| 263 | 261 |
|
| 264 | 262 |
# Build (with implicit fetch of subproject), checkout
|
| 265 | 263 |
result = cli.run(project=project, args=['build', 'target.bst'])
|
| 266 |
- assert result.exit_code == 0
|
|
| 264 |
+ result.assert_success()
|
|
| 267 | 265 |
result = cli.run(project=project, args=['checkout', 'target.bst', checkoutdir])
|
| 268 |
- assert result.exit_code == 0
|
|
| 266 |
+ result.assert_success()
|
|
| 269 | 267 |
|
| 270 | 268 |
# Check that the checkout contains the expected files from both projects
|
| 271 | 269 |
assert(os.path.exists(os.path.join(checkoutdir, 'base.txt')))
|
| ... | ... | @@ -304,9 +302,9 @@ def test_build_git_cross_junction_names(cli, tmpdir, datafiles): |
| 304 | 302 |
|
| 305 | 303 |
# Build (with implicit fetch of subproject), checkout
|
| 306 | 304 |
result = cli.run(project=project, args=['build', 'base.bst:target.bst'])
|
| 307 |
- assert result.exit_code == 0
|
|
| 305 |
+ result.assert_success()
|
|
| 308 | 306 |
result = cli.run(project=project, args=['checkout', 'base.bst:target.bst', checkoutdir])
|
| 309 |
- assert result.exit_code == 0
|
|
| 307 |
+ result.assert_success()
|
|
| 310 | 308 |
|
| 311 | 309 |
# Check that the checkout contains the expected files from both projects
|
| 312 | 310 |
assert(os.path.exists(os.path.join(checkoutdir, 'base.txt')))
|
| 1 |
+# This refers to the `foo.bst` element through
|
|
| 2 |
+# the `base.bst` junction. The `base.bst` junction
|
|
| 3 |
+# exists but the `foo.bst` element does not exist
|
|
| 4 |
+# in the subproject.
|
|
| 5 |
+#
|
|
| 6 |
+kind: stack
|
|
| 7 |
+depends:
|
|
| 8 |
+- junction: base.bst
|
|
| 9 |
+ filename: foo.bst
|
