Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CERTZ2.1 server_certificates #3313

Open
wants to merge 62 commits into
base: main
Choose a base branch
from
Open

Conversation

priyacj
Copy link

@priyacj priyacj commented Jul 19, 2024

CERTZ2.1 server_certificates testcase
CERTZ2.2 server_certificates testcase

@priyacj priyacj requested review from a team as code owners July 19, 2024 19:23
@OpenConfigBot
Copy link

OpenConfigBot commented Jul 19, 2024

Pull Request Functional Test Report for #3313 / 442561c

Virtual Devices

Device Test Test Documentation Job Raw Log
Arista cEOS status
CERTZ-2: Server Certificate
Cisco 8000E status
CERTZ-2: Server Certificate
Cisco XRd status
CERTZ-2: Server Certificate
Juniper ncPTX status
CERTZ-2: Server Certificate
Nokia SR Linux status
CERTZ-2: Server Certificate
Openconfig Lemming status
CERTZ-2: Server Certificate

Hardware Devices

Device Test Test Documentation Raw Log
Arista 7808 status
CERTZ-2: Server Certificate
Cisco 8808 status
CERTZ-2: Server Certificate
Juniper PTX10008 status
CERTZ-2: Server Certificate
Nokia 7250 IXR-10e status
CERTZ-2: Server Certificate

Help

@coveralls
Copy link

coveralls commented Jul 19, 2024

Pull Request Test Coverage Report for Build 12836154369

Details

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage remained the same at 55.268%

Totals Coverage Status
Change from base Build 12822851206: 0.0%
Covered Lines: 1983
Relevant Lines: 3588

💛 - Coveralls

@robshakir
Copy link
Contributor

Thanks for this test case -- it looks to cover the Certz tests explained. I have a few questions and Go implementation comments.

@robshakir
Copy link
Contributor

/gcbrun

Copy link
Contributor

@morrowc morrowc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please address static-analysis issues.

@priyacj priyacj requested a review from a team as a code owner January 2, 2025 23:13
Copy link
Contributor

@morrowc morrowc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll probably have more comments, i got bogged down a touch :(

*creds.UserPass
}

func (r *rpcCredentials) GetRequestMetadata(_ context.Context, _ ...string) (map[string]string, error) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it's been a while and I may have asked this previously, but why does this function need to accept a context.Context which it never uses?

Is this mocking some production version of this function?
This looks like a whole new package, and the tests that appear to use this just use this directly by name, why add to the function signature something that just isn't used?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants