1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-11-25 15:29:32 -05:00

test: reenable cafile tests (#11615)

This commit is contained in:
Bartek Iwańczuk 2021-08-11 11:52:52 +02:00 committed by GitHub
parent 8b97b39d8e
commit 3a69941151
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 23 additions and 28 deletions

View file

@ -1,6 +1,6 @@
local: [WILDCARD]https[WILDCARD]localhost_PORT5545[WILDCARD] local: [WILDCARD]https[WILDCARD]localhost_PORT5545[WILDCARD]
type: TypeScript type: TypeScript
deps: 8 unique (total [WILDCARD]) dependencies: 8 unique (total [WILDCARD])
https://localhost:5545/cli/tests/cafile_info.ts ([WILDCARD]) https://localhost:5545/cli/tests/cafile_info.ts ([WILDCARD])
├── https://localhost:5545/cli/tests/subdir/mt_application_ecmascript.j2.js ([WILDCARD]) ├── https://localhost:5545/cli/tests/subdir/mt_application_ecmascript.j2.js ([WILDCARD])

View file

@ -447,32 +447,31 @@ fn broken_stdout() {
assert!(!stderr.contains("panic")); assert!(!stderr.contains("panic"));
} }
// TODO(lucacasonato): reenable these tests once we figure out what is wrong with cafile tests itest!(cafile_url_imports {
// itest!(cafile_url_imports { args: "run --quiet --reload --cert tls/RootCA.pem cafile_url_imports.ts",
// args: "run --quiet --reload --cert tls/RootCA.pem cafile_url_imports.ts", output: "cafile_url_imports.ts.out",
// output: "cafile_url_imports.ts.out", http_server: true,
// http_server: true, });
// });
// itest!(cafile_ts_fetch { itest!(cafile_ts_fetch {
// args: args:
// "run --quiet --reload --allow-net --cert tls/RootCA.pem cafile_ts_fetch.ts", "run --quiet --reload --allow-net --cert tls/RootCA.pem cafile_ts_fetch.ts",
// output: "cafile_ts_fetch.ts.out", output: "cafile_ts_fetch.ts.out",
// http_server: true, http_server: true,
// }); });
// itest!(cafile_eval { itest!(cafile_eval {
// args: "eval --cert tls/RootCA.pem fetch('https://localhost:5545/cli/tests/cafile_ts_fetch.ts.out').then(r=>r.text()).then(t=>console.log(t.trimEnd()))", args: "eval --cert tls/RootCA.pem fetch('https://localhost:5545/cli/tests/cafile_ts_fetch.ts.out').then(r=>r.text()).then(t=>console.log(t.trimEnd()))",
// output: "cafile_ts_fetch.ts.out", output: "cafile_ts_fetch.ts.out",
// http_server: true, http_server: true,
// }); });
// itest!(cafile_info { itest!(cafile_info {
// args: args:
// "info --quiet --cert tls/RootCA.pem https://localhost:5545/cli/tests/cafile_info.ts", "info --quiet --cert tls/RootCA.pem https://localhost:5545/cli/tests/cafile_info.ts",
// output: "cafile_info.ts.out", output: "cafile_info.ts.out",
// http_server: true, http_server: true,
// }); });
itest!(cafile_url_imports_unsafe_ssl { itest!(cafile_url_imports_unsafe_ssl {
args: "run --quiet --reload --unsafely-ignore-certificate-errors=localhost cafile_url_imports.ts", args: "run --quiet --reload --unsafely-ignore-certificate-errors=localhost cafile_url_imports.ts",
@ -502,7 +501,6 @@ itest!(localhost_unsafe_ssl {
}); });
#[test] #[test]
#[ignore]
fn cafile_env_fetch() { fn cafile_env_fetch() {
use deno_core::url::Url; use deno_core::url::Url;
let _g = util::http_server(); let _g = util::http_server();
@ -523,7 +521,6 @@ fn cafile_env_fetch() {
} }
#[test] #[test]
#[ignore]
fn cafile_fetch() { fn cafile_fetch() {
use deno_core::url::Url; use deno_core::url::Url;
let _g = util::http_server(); let _g = util::http_server();
@ -547,7 +544,6 @@ fn cafile_fetch() {
} }
#[test] #[test]
#[ignore]
fn cafile_install_remote_module() { fn cafile_install_remote_module() {
let _g = util::http_server(); let _g = util::http_server();
let temp_dir = TempDir::new().expect("tempdir fail"); let temp_dir = TempDir::new().expect("tempdir fail");
@ -590,7 +586,6 @@ fn cafile_install_remote_module() {
} }
#[test] #[test]
#[ignore]
fn cafile_bundle_remote_exports() { fn cafile_bundle_remote_exports() {
let _g = util::http_server(); let _g = util::http_server();