summaryrefslogtreecommitdiff
path: root/gnu/packages/patches/pygpgme-disable-problematic-tests.patch
blob: 2129d2f973c01e35e777c81df33d4b0fdd311f74 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
These tests require a gpg agent to run, and are difficult to get to work right
in Guix's environment.  For more details, see:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713074
  https://bugs.launchpad.net/pygpgme/+bug/999949

--- pygpgme-0.3/tests/test_encrypt_decrypt.py	2012-02-28 19:10:28.000000000 -0800
+++ pygpgme-0.3/tests/test_encrypt_decrypt.py	2016-02-05 10:21:58.966685384 -0800
@@ -125,7 +125,7 @@
         ctx.decrypt(ciphertext, plaintext)
         self.assertEqual(plaintext.getvalue(), b'Hello World\n')
 
-    def test_encrypt_symmetric(self):
+    def skip_test_encrypt_symmetric(self):
         plaintext = BytesIO(b'Hello World\n')
         ciphertext = BytesIO()
         def passphrase(uid_hint, passphrase_info, prev_was_bad, fd):

--- pygpgme-0.3/tests/test_passphrase.py	2012-02-28 19:04:17.000000000 -0800
+++ pygpgme-0.3/tests/test_passphrase.py	2016-02-05 10:21:47.990630956 -0800
@@ -30,7 +30,7 @@
 
     import_keys = ['passphrase.pub', 'passphrase.sec']
 
-    def test_sign_without_passphrase_cb(self):
+    def skip_test_sign_without_passphrase_cb(self):
         ctx = gpgme.Context()
         key = ctx.get_key('EFB052B4230BBBC51914BCBB54DCBBC8DBFB9EB3')
         ctx.signers = [key]
@@ -51,7 +51,7 @@
         self.prev_was_bad = prev_was_bad
         os.write(fd, b'test\n')
 
-    def test_sign_with_passphrase_cb(self):
+    def skip_test_sign_with_passphrase_cb(self):
         ctx = gpgme.Context()
         key = ctx.get_key('EFB052B4230BBBC51914BCBB54DCBBC8DBFB9EB3')
         ctx.signers = [key]