Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add downstream tests for awslabs/aws-dynamodb-encryption-python #4280

Merged
merged 2 commits into from Jun 13, 2018

Conversation

mattsb42-aws
Copy link
Contributor

cd aws-dynamodb-encryption-python
pip install -r test/requirements.txt
pip install -e .
pytest -m "local and not slow and not veryslow and not nope" -l
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I lol'd

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Haha, yup. Of the many levels of hypothesis-powered combinatorically exploding test scenarios, I figure we want the smallest set here.

@alex
Copy link
Member

alex commented Jun 13, 2018

The tests seem to be failing 👀

@mattsb42-aws
Copy link
Contributor Author

mattsb42-aws commented Jun 13, 2018

Yeah, was just digging through the logs (side note, might be worth revisiting the whitelisted Travis branches? makes it harder to run the CI on forks prior to a PR). Looks like it's choking on RSA-OAEP-SHA256, which requires OpenSSL >= 1.0.2.

@alex
Copy link
Member

alex commented Jun 13, 2018

Oh gosh, it makes me so happy that our new downstream test harness makes it easy to swap OpenSSLs

@alex alex merged commit 2e57a72 into pyca:master Jun 13, 2018
@mattsb42-aws mattsb42-aws deleted the ddb-encryption branch June 13, 2018 00:38
@reaperhulk
Copy link
Member

@mattsb42-aws for future reference we're totally okay with iterating a bit in a PR. A few build failures is fine. 😄 We have more parallel builders than your fork too so the jobs will run faster anyway.

@mattsb42-aws
Copy link
Contributor Author

@reaperhulk Fair enough. I was under the impression that Travis ran fork CI in the context of the fork owner, so the builds for a fork wouldn't affect the main repo CI.

@alex
Copy link
Member

alex commented Jun 13, 2018

@mattsb42-aws I cannot begin to tell you how much that wouldn't bother us :-) FWIW, we're not going to remove the branch restriction because otherwise every time I send a PR via the github edit-in-the-web UI, the tests get run twice and it makes @reaperhulk sad.

@mattsb42-aws
Copy link
Contributor Author

@alex Haha, fair enough. I guess I could always just make an ephemeral branch on my fork that adds itself to the whitelist and gets constantly rebased on top of any branch I'm actually working on. Would be nice if the whitelist controls could be set per fork as well as per branch.

amauryfa pushed a commit to amauryfa/cryptography that referenced this pull request Jul 22, 2018
…#4280)

* add downstream tests for awslabs/aws-dynamodb-encryption-python

* require recent OpenSSL for awslabs/dynamodb-encryption-python downstream tests
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Aug 9, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants