Bug 737704
Summary: | Fix spec file test script typo and enable running the test suites | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Steve Snyder <swsnyder> | ||||
Component: | nss | Assignee: | Elio Maldonado Batiz <emaldona> | ||||
Status: | CLOSED ERRATA | QA Contact: | Hubert Kario <hkario> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 5.7 | CC: | hkario, rrelyea | ||||
Target Milestone: | rc | ||||||
Target Release: | --- | ||||||
Hardware: | i686 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | nss-3.14.3-4.el5 nspr-4.9.5-2.el5 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2013-09-30 22:40:11 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Attachments: |
|
Description
Steve Snyder
2011-09-12 22:43:04 UTC
(In reply to comment #0) > if [ SPACEISBAD -ne 0 ]; then > is missing the dollar sign that should prepend the variable name, i.e.: > if [ $SPACEISBAD -ne 0 ]; then You are right, it's on 5 and 4, fixed on 6. [....]$ grep -r "SPACEISBAD -ne" . ./RHEL-4/nss.spec:if [ SPACEISBAD -ne 0 ]; then ./RHEL-5/nss.spec:if [ $SPACEISBAD -ne 0 ]; then ./RHEL-6/nss.spec:if [ $SPACEISBAD -ne 0 ]; then ./RHEL-6/nss.spec~:if [ $SPACEISBAD -ne 0 ]; then ./RHEL-6_1-Z/nss.spec:if [ $SPACEISBAD -ne 0 ]; then ./RHEL-6_0-Z/nss.spec:if [ SPACEISBAD -ne 0 ]; then ./RHEL-5_7-Z/nss.spec:if [ SPACEISBAD -ne 0 ]; then ./RHEL-5_6-Z/nss.spec:if [ SPACEISBAD -ne 0 ]; then ./RHEL-5_5-Z/nss.spec:if [ SPACEISBAD -ne 0 ]; then ./RHEL-5_4-Z/nss.spec:if [ SPACEISBAD -ne 0 ]; then This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. Fixing this bug should not affect validation as we aren't touching the cryptographic module in a any neither the code nor the way it is built. Fix this is also needed to enable running the upstream test suite which have been disabled for some other reasons. Because we are using the nss internal cryptomusle in softoken/freebl from nss-3.15, the FIPS-140 validated one, which lacks support for the sqlite-based shared db and using some test tools from that release we won't be able to run some of the test but we can run must of them and we should. We should expand the scope of this bug to enable running as much of the upstream test suite as possible. I I'll attach the proposed modifications to the nss.spec file next. Created attachment 698646 [details]
Fix typo and add check section to run the test suites
dev_ack+ for 5.10... I'd also removed the commented lines about turning off optimizations that have nothing to do with this bug (but they are commented out, so they don't hurt). bob Comment on attachment 698646 [details] Fix typo and add check section to run the test suites r+ but see comment 5 This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux release for currently deployed products. This request is not yet committed for inclusion in a release. This has been fixed as part of the rebase to nss-3.14.3 requested on Bug 918948. Marking ii on nss-3.14.3-2.el5 as this was the first build with the test suites enabled on the check section. Running of the nspr test suite added to the %check section of nspr.spec as well. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-1318.html |