Commit 62c44c49 by Edward Thomson Committed by GitHub

Merge pull request #4211 from pks-t/pks/trusty

travis: upgrade container to Ubuntu 14.04
parents 77850789 7c8d460f
...@@ -29,6 +29,7 @@ addons: ...@@ -29,6 +29,7 @@ addons:
- openssh-server - openssh-server
- valgrind - valgrind
dist: trusty
sudo: false sudo: false
matrix: matrix:
...@@ -38,13 +39,19 @@ matrix: ...@@ -38,13 +39,19 @@ matrix:
compiler: gcc compiler: gcc
include: include:
- compiler: gcc - compiler: gcc
env: PRECISE=1
os: linux
dist: precise
- compiler: gcc
env: COVERITY=1 env: COVERITY=1
os: linux os: linux
dist: trusty
- compiler: gcc - compiler: gcc
env: env:
- VALGRIND=1 - VALGRIND=1
OPTIONS="-DBUILD_CLAR=ON -DBUILD_EXAMPLES=OFF -DDEBUG_POOL=ON -DCMAKE_BUILD_TYPE=Debug" OPTIONS="-DBUILD_CLAR=ON -DBUILD_EXAMPLES=OFF -DDEBUG_POOL=ON -DCMAKE_BUILD_TYPE=Debug"
os: linux os: linux
dist: trusty
allow_failures: allow_failures:
- env: COVERITY=1 - env: COVERITY=1
......
...@@ -43,23 +43,39 @@ ctest -V -R libgit2_clar || exit $? ...@@ -43,23 +43,39 @@ ctest -V -R libgit2_clar || exit $?
killall git-daemon killall git-daemon
if [ "$TRAVIS_OS_NAME" = "osx" ]; then # Set up sshd
echo 'PasswordAuthentication yes' | sudo tee -a /etc/sshd_config mkdir ~/sshd/
fi cat >~/sshd/sshd_config<<-EOF
Port 2222
ListenAddress 0.0.0.0
Protocol 2
HostKey ${HOME}/sshd/id_rsa
RSAAuthentication yes
PasswordAuthentication yes
PubkeyAuthentication yes
ChallengeResponseAuthentication no
# Required here as sshd will simply close connection otherwise
UsePAM no
EOF
ssh-keygen -t rsa -f ~/sshd/id_rsa -N "" -q
/usr/sbin/sshd -f ~/sshd/sshd_config
# Set up keys
ssh-keygen -t rsa -f ~/.ssh/id_rsa -N "" -q ssh-keygen -t rsa -f ~/.ssh/id_rsa -N "" -q
cat ~/.ssh/id_rsa.pub >>~/.ssh/authorized_keys cat ~/.ssh/id_rsa.pub >>~/.ssh/authorized_keys
ssh-keyscan -t rsa localhost >>~/.ssh/known_hosts while read algorithm key comment; do
echo "[localhost]:2222 $algorithm $key" >>~/.ssh/known_hosts
done <~/sshd/id_rsa.pub
# Get the fingerprint for localhost and remove the colons so we can parse it as # Get the fingerprint for localhost and remove the colons so we can parse it as
# a hex number. The Mac version is newer so it has a different output format. # a hex number. The Mac version is newer so it has a different output format.
if [ "$TRAVIS_OS_NAME" = "osx" ]; then if [ "$TRAVIS_OS_NAME" = "osx" ]; then
export GITTEST_REMOTE_SSH_FINGERPRINT=$(ssh-keygen -E md5 -F localhost -l | tail -n 1 | cut -d ' ' -f 3 | cut -d : -f2- | tr -d :) export GITTEST_REMOTE_SSH_FINGERPRINT=$(ssh-keygen -E md5 -F '[localhost]:2222' -l | tail -n 1 | cut -d ' ' -f 3 | cut -d : -f2- | tr -d :)
else else
export GITTEST_REMOTE_SSH_FINGERPRINT=$(ssh-keygen -F localhost -l | tail -n 1 | cut -d ' ' -f 2 | tr -d ':') export GITTEST_REMOTE_SSH_FINGERPRINT=$(ssh-keygen -F '[localhost]:2222' -l | tail -n 1 | cut -d ' ' -f 2 | tr -d ':')
fi fi
export GITTEST_REMOTE_URL="ssh://localhost/$HOME/_temp/test.git" export GITTEST_REMOTE_URL="ssh://localhost:2222/$HOME/_temp/test.git"
export GITTEST_REMOTE_USER=$USER export GITTEST_REMOTE_USER=$USER
export GITTEST_REMOTE_SSH_KEY="$HOME/.ssh/id_rsa" export GITTEST_REMOTE_SSH_KEY="$HOME/.ssh/id_rsa"
export GITTEST_REMOTE_SSH_PUBKEY="$HOME/.ssh/id_rsa.pub" export GITTEST_REMOTE_SSH_PUBKEY="$HOME/.ssh/id_rsa.pub"
...@@ -83,6 +99,8 @@ if [ -e ./libgit2_clar ]; then ...@@ -83,6 +99,8 @@ if [ -e ./libgit2_clar ]; then
fi fi
killall sshd
export GITTEST_REMOTE_URL="https://github.com/libgit2/non-existent" export GITTEST_REMOTE_URL="https://github.com/libgit2/non-existent"
export GITTEST_REMOTE_USER="libgit2test" export GITTEST_REMOTE_USER="libgit2test"
ctest -V -R libgit2_clar-cred_callback ctest -V -R libgit2_clar-cred_callback
...@@ -547,7 +547,7 @@ void test_online_clone__ssh_cert(void) ...@@ -547,7 +547,7 @@ void test_online_clone__ssh_cert(void)
if (!_remote_ssh_fingerprint) if (!_remote_ssh_fingerprint)
cl_skip(); cl_skip();
cl_git_fail_with(GIT_EUSER, git_clone(&g_repo, "ssh://localhost/foo", "./foo", &g_options)); cl_git_fail_with(GIT_EUSER, git_clone(&g_repo, _remote_url, "./foo", &g_options));
} }
static char *read_key_file(const char *path) static char *read_key_file(const char *path)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment