]> source.dussan.org Git - sonarqube.git/commitdiff
WIP make ITs run with Core Extensions
authorSébastien Lesaint <sebastien.lesaint@sonarsource.com>
Wed, 30 May 2018 15:04:43 +0000 (17:04 +0200)
committerSonarTech <sonartech@sonarsource.com>
Tue, 12 Jun 2018 18:21:03 +0000 (20:21 +0200)
build.gradle
tests/src/test/java/org/sonarqube/tests/authorization/SystemPasscodeTest.java
tests/src/test/java/org/sonarqube/tests/ce/CeWorkersTest.java
tests/src/test/java/org/sonarqube/tests/organization/BillingTest.java
tests/src/test/java/org/sonarqube/tests/plugins/PluginsTest.java

index da0ddc26b2a72a36fa9b8107d45c410b7e149283..0500a99d51627cba38d8f6537995537cf6839d01 100644 (file)
@@ -211,7 +211,7 @@ subprojects {
       dependency 'org.postgresql:postgresql:42.2.2'
       dependency 'org.reflections:reflections:0.9.9'
       dependency 'org.simpleframework:simple:4.1.21'
-      dependency 'org.sonarsource.orchestrator:sonar-orchestrator:3.19.0.1627'
+      dependency 'org.sonarsource.orchestrator:sonar-orchestrator:3.19.0.1633'
       dependency('org.sonarsource:sonar-persistit:3.3.2') {
         exclude 'commons-logging:commons-logging'
       }
index fbdafe3697c9f4c8f318ab094494e7ff8e4c6f41..233c2662d208f618f0288d8ec7908d8db3f68440 100644 (file)
@@ -22,6 +22,7 @@ package org.sonarqube.tests.authorization;
 import com.sonar.orchestrator.Orchestrator;
 import java.util.Arrays;
 import org.junit.ClassRule;
+import org.junit.Ignore;
 import org.junit.Rule;
 import org.junit.Test;
 import org.sonarqube.qa.util.Tester;
@@ -31,6 +32,7 @@ import org.sonarqube.ws.client.WsResponse;
 
 import static org.assertj.core.api.Assertions.assertThat;
 
+@Ignore("FIXME IT disabled because it relies on a WS getting injected with core class, ie. a privileged plugin (fake-governance-plugin)")
 public class SystemPasscodeTest {
 
   static final String VALID_PASSCODE = "123456";
index 64d85836fdb2f530996d5ec75c9307d5805a4c2f..e70d3377bd990f0fbca13ba3768a8c7fdd03d710 100644 (file)
@@ -43,10 +43,10 @@ import org.junit.AfterClass;
 import org.junit.Before;
 import org.junit.BeforeClass;
 import org.junit.ClassRule;
+import org.junit.Ignore;
 import org.junit.Test;
 import org.junit.rules.TemporaryFolder;
 import org.sonarqube.ws.Ce;
-import org.sonarqube.ws.Ce;
 import org.sonarqube.ws.client.PostRequest;
 import org.sonarqube.ws.client.WsClient;
 import org.sonarqube.ws.client.ce.ActivityRequest;
@@ -62,6 +62,7 @@ import static util.ItUtils.newOrchestratorBuilder;
 import static util.ItUtils.pluginArtifact;
 import static util.ItUtils.xooPlugin;
 
+@Ignore("FIXME IT disabled because it relies on a privileged plugin (fake-governance-plugin)")
 public class CeWorkersTest {
   private static final int WAIT = 200; // ms
   private static final int MAX_WAIT_LOOP = 5 * 60 * 5; // 5 minutes
index a66254b5ebd4309ab54c6c319744ddbf1bcbc354..713762a7e2d0fa841c5d96770a72725739215695 100644 (file)
@@ -25,6 +25,7 @@ import com.sonar.orchestrator.build.SonarScanner;
 import org.junit.After;
 import org.junit.Before;
 import org.junit.ClassRule;
+import org.junit.Ignore;
 import org.junit.Rule;
 import org.junit.Test;
 import org.sonarqube.qa.util.Tester;
@@ -45,6 +46,7 @@ import static util.ItUtils.expectHttpError;
 import static util.ItUtils.newProjectKey;
 import static util.ItUtils.projectDir;
 
+@Ignore("FIXME IT disabled because it relies on a privileged plugin (fake-billing-plugin)")
 public class BillingTest {
 
   private static final String PROPERTY_PREVENT_ANALYSIS = "sonar.billing.preventProjectAnalysis";
index 2a6fd092a0ecc2ad4cd3dd17196ebd75ff19cb05..6db26cbe9c16857b10fdafc48e6de85c4aabbfee 100644 (file)
@@ -123,7 +123,8 @@ public class PluginsTest {
     builder.addPlugin(URLLocation.create(new URL("https://sonarsource.bintray.com/Distribution/sonar-scm-clearcase-plugin/sonar-scm-clearcase-plugin-1.1.jar")));
     installPlugin(builder, "org.codehaus.sonar-plugins", "sonar-scm-cvs-plugin");
     installPlugin(builder, "org.sonarsource.scm.git", "sonar-scm-git-plugin");
-    builder.addPlugin(URLLocation.create(new URL("http://downloads.sonarsource.com/plugins/org/codehaus/sonar-plugins/sonar-scm-jazzrtc-plugin/1.1/sonar-scm-jazzrtc-plugin-1.1.jar")));
+    builder
+      .addPlugin(URLLocation.create(new URL("http://downloads.sonarsource.com/plugins/org/codehaus/sonar-plugins/sonar-scm-jazzrtc-plugin/1.1/sonar-scm-jazzrtc-plugin-1.1.jar")));
     installPlugin(builder, "org.sonarsource.scm.mercurial", "sonar-scm-mercurial-plugin");
     installPlugin(builder, "org.sonarsource.scm.perforce", "sonar-scm-perforce-plugin");
     installPlugin(builder, "org.sonarsource.scm.svn", "sonar-scm-svn-plugin");
@@ -132,8 +133,6 @@ public class PluginsTest {
     installPlugin(builder, "org.sonarsource.web", "sonar-web-plugin");
     installPlugin(builder, "org.sonarsource.xml", "sonar-xml-plugin");
 
-    builder.activateLicense();
-
     // use compression of plugin JARs, just to check that it does not fail
     builder.setServerProperty("sonar.pluginsCompression.enable", "true");