Add positive and negative test case for CertStoreType class
[platform/core/security/cert-svc.git] / packaging / cert-svc.spec
index 41af415..49d0617 100644 (file)
@@ -1,8 +1,8 @@
-%define certsvc_test_build 0
+%{!?build_type:%global build_type RELEASE}
 
 Name:    cert-svc
 Summary: Certification service
-Version: 2.2.1
+Version: 2.2.2
 Release: 0
 Group:   Security/Certificate Management
 License: Apache-2.0
@@ -10,33 +10,43 @@ Source0: %{name}-%{version}.tar.gz
 BuildRequires: cmake
 BuildRequires: coreutils
 BuildRequires: findutils
-BuildRequires: openssl
 BuildRequires: pkgconfig(dlog)
 BuildRequires: pkgconfig(klay)
-BuildRequires: pkgconfig(openssl)
+BuildRequires: openssl3
+BuildRequires: pkgconfig(openssl3)
 BuildRequires: pkgconfig(libpcrecpp)
 BuildRequires: pkgconfig(xmlsec1)
 BuildRequires: pkgconfig(libxml-2.0)
 BuildRequires: pkgconfig(libxslt)
-BuildRequires: pkgconfig(libsystemd-daemon)
+BuildRequires: pkgconfig(libsystemd)
 BuildRequires: pkgconfig(key-manager)
 BuildRequires: pkgconfig(libtzplatform-config)
-BuildRequires: pkgconfig(libsystemd-journal)
 BuildRequires: pkgconfig(sqlite3)
 BuildRequires: ca-certificates
 BuildRequires: ca-certificates-devel
 BuildRequires: ca-certificates-tizen-devel
+BuildRequires: boost-devel
+
+%if "%{build_type}" == "COVERAGE"
+BuildRequires: lcov
+%endif
+
 Requires: ca-certificates
 Requires: ca-certificates-tizen
 Requires: security-config
-Requires: openssl
+# to prevent auto require lower version of libc including examples/resource/player/bin/player
+# https://fedoraproject.org/wiki/Packaging:AutoProvidesAndRequiresFiltering?rd=PackagingDrafts/AutoProvidesAndRequiresFiltering
+%global __requires_exclude_from examples/
+
 
 %global user_name security_fw
 %global group_name security_fw
 %global server_stream /tmp/.cert-server.socket
 %global smack_domain_name System
+%global coverage_dir    %{_datadir}/cert-svc-coverage
 
 %global bin_dir                 %{?TZ_SYS_BIN:%TZ_SYS_BIN}%{!?TZ_SYS_BIN:%_bindir}
+%global lib_dir                 %{?TZ_SYS_LIB:%TZ_SYS_LIB}%{!?TZ_SYS_LIB:%_libdir}
 %global etc_dir                 %{?TZ_SYS_ETC:%TZ_SYS_ETC}%{!?TZ_SYS_ETC:/opt/etc}
 %global rw_data_dir             %{?TZ_SYS_SHARE:%TZ_SYS_SHARE}%{!?TZ_SYS_SHARE:/opt/share}
 %global ro_data_dir             %{?TZ_SYS_RO_SHARE:%TZ_SYS_RO_SHARE}%{!?TZ_SYS_RO_SHARE:%_datadir}
@@ -61,27 +71,42 @@ Requires:   %{name} = %{version}-%{release}
 %description devel
 Certification service (development files)
 
-%if 0%{?certsvc_test_build}
 %package test
 Summary:  Certification service (tests)
 Group:    Security/Testing
 Requires: ca-certificates-tizen
 Requires: %{name} = %{version}-%{release}
+Requires: %{name}-test-binaries = %{version}-%{release}
 
 %description test
 Certification service (tests)
+
+%package test-binaries
+Summary:  Certification service (test binaries)
+Group:    Security/Testing
+AutoReq:  no
+Requires: %{name}-test = %{version}-%{release}
+
+%description test-binaries
+Certification service (test binaries)
+
+%if "%{build_type}" == "COVERAGE"
+%package coverage
+Summary:    Certification service code coverage data
+Group:      Security/Testing
+Requires:   cert-svc-test = %{version}-%{release}
+Requires:   cert-svc-debugsource = %{version}-%{release}
+Requires:   lcov
+Requires:   gcc
+
+%description coverage
+Certification service code coverage data
 %endif
 
 %prep
 %setup -q
 
 %build
-%if 0%{?sec_build_binary_debug_enable}
-export CFLAGS="$CFLAGS -DTIZEN_DEBUG_ENABLE"
-export CXXFLAGS="$CXXFLAGS -DTIZEN_DEBUG_ENABLE"
-export FFLAGS="$FFLAGS -DTIZEN_DEBUG_ENABLE"
-%endif
-
 %if 0%{?tizen_build_devel_mode}
 export CFLAGS="$CFLAGS -DTIZEN_ENGINEER_MODE"
 export CXXFLAGS="$CXXFLAGS -DTIZEN_ENGINEER_MODE"
@@ -94,7 +119,10 @@ export CXXFLAGS="$CXXFLAGS -DTIZEN_EMULATOR_MODE"
 export FFLAGS="$FFLAGS -DTIZEN_EMULATOR_MODE"
 %endif
 
-%{!?build_type:%define build_type "Release"}
+# gcc v9 and new Tizen toolchain adds Wall and this code pretty much always checks string & buffer lenghts
+export CFLAGS="$CFLAGS -Wno-stringop-truncation -Wno-stringop-overflow"
+export CXXFLAGS="$CXXFLAGS -Wno-stringop-truncation -Wno-stringop-overflow"
+
 %cmake . -DVERSION=%version \
          -DINCLUDEDIR=%_includedir \
          -DUSER_NAME=%user_name \
@@ -103,22 +131,20 @@ export FFLAGS="$FFLAGS -DTIZEN_EMULATOR_MODE"
          -DSMACK_DOMAIN_NAME=%smack_domain_name \
          -DRO_DATA_DIR=%ro_data_dir \
          -DBIN_DIR=%bin_dir \
+         -DLIB_DIR=%lib_dir \
          -DTZ_SYS_CA_CERTS=%TZ_SYS_CA_CERTS \
          -DTZ_SYS_CA_CERTS_ORIG=%TZ_SYS_CA_CERTS_ORIG \
          -DTZ_SYS_CA_BUNDLE=%TZ_SYS_CA_BUNDLE \
          -DTZ_SYS_RO_CA_CERTS=%TZ_SYS_RO_CA_CERTS \
          -DTZ_SYS_RO_CA_BUNDLE=%TZ_SYS_RO_CA_BUNDLE \
          -DCERT_SVC_CA_BUNDLE=%cert_svc_ca_bundle \
-         -DFINGERPRINT_LIST_RW_PATH=%TZ_SYS_REVOKED_CERTS_FINGERPRINTS_RUNTIME \
          -DCERT_SVC_PATH=%cert_svc_path \
          -DCERT_SVC_RO_PATH=%cert_svc_ro_path \
          -DCERT_SVC_PKCS12=%cert_svc_pkcs12 \
          -DCERT_SVC_DB_PATH=%cert_svc_db_path \
-%if 0%{?certsvc_test_build}
-         -DCERTSVC_TEST_BUILD=1 \
          -DCERT_SVC_TESTS=%cert_svc_tests \
          -DCERT_SVC_EXAMPLES=%cert_svc_examples \
-%endif
+         -DCOVERAGE_DIR=%{coverage_dir} \
          -DCMAKE_BUILD_TYPE=%build_type \
          -DSYSTEMD_UNIT_DIR=%_unitdir
 
@@ -171,17 +197,32 @@ fi
 %attr(-, %{user_name}, %{group_name}) %cert_svc_ro_path
 
 %files devel
+%manifest %name.manifest
 %_includedir/*
 %_libdir/pkgconfig/*
 %_libdir/libcert-svc-vcore.so
 
-%if 0%{?certsvc_test_build}
 %files test
+%manifest %name.manifest
 %bin_dir/cert-svc-test*
-%cert_svc_tests
+%dir %cert_svc_tests
+%cert_svc_tests/p12
+%cert_svc_tests/certs
 %_libdir/libcert-svc-validator-plugin.so
 
 %bin_dir/cert-svc-example*
 %cert_svc_examples
 
+%bin_dir/cert-svc-unit-tests
+
+%files test-binaries
+%manifest %name.manifest
+%cert_svc_tests/apps
+
+%if "%{build_type}" == "COVERAGE"
+%files coverage
+%manifest %{name}.manifest
+%license LICENSE
+%{bin_dir}/cert-svc-coverage.sh
+%coverage_dir
 %endif