@@ -212,6 +212,9 @@ def test_corrupt_control_file(self):
212
212
# @unittest.expectedFailure
213
213
def test_corrupt_correctness (self ):
214
214
"""backup.control contains invalid option"""
215
+ if not self .remote :
216
+ self .skipTest ("You must enable PGPROBACKUP_SSH_REMOTE"
217
+ " for run this test" )
215
218
fname = self .id ().split ('.' )[3 ]
216
219
backup_dir = os .path .join (self .tmp_path , module_name , fname , 'backup' )
217
220
node = self .make_simple_node (
@@ -232,12 +235,7 @@ def test_corrupt_correctness(self):
232
235
output_local = self .show_pb (
233
236
backup_dir , 'node' , as_json = False , backup_id = backup_local_id )
234
237
235
- if self .remote :
236
- backup_remote_id = self .backup_node (backup_dir , 'node' , node )
237
- else :
238
- backup_remote_id = self .backup_node (
239
- backup_dir , 'node' , node ,
240
- options = ['--remote-proto=ssh' , '--remote-host=localhost' ])
238
+ backup_remote_id = self .backup_node (backup_dir , 'node' , node )
241
239
242
240
output_remote = self .show_pb (
243
241
backup_dir , 'node' , as_json = False , backup_id = backup_remote_id )
@@ -260,13 +258,8 @@ def test_corrupt_correctness(self):
260
258
backup_dir , 'node' , as_json = False , backup_id = backup_local_id )
261
259
self .delete_pb (backup_dir , 'node' , backup_local_id )
262
260
263
- if self .remote :
264
- backup_remote_id = self .backup_node (
265
- backup_dir , 'node' , node , backup_type = 'delta' )
266
- else :
267
- backup_remote_id = self .backup_node (
268
- backup_dir , 'node' , node , backup_type = 'delta' ,
269
- options = ['--remote-proto=ssh' , '--remote-host=localhost' ])
261
+ backup_remote_id = self .backup_node (
262
+ backup_dir , 'node' , node , backup_type = 'delta' )
270
263
271
264
output_remote = self .show_pb (
272
265
backup_dir , 'node' , as_json = False , backup_id = backup_remote_id )
@@ -290,13 +283,8 @@ def test_corrupt_correctness(self):
290
283
backup_dir , 'node' , as_json = False , backup_id = backup_local_id )
291
284
self .delete_pb (backup_dir , 'node' , backup_local_id )
292
285
293
- if self .remote :
294
- backup_remote_id = self .backup_node (
295
- backup_dir , 'node' , node , backup_type = 'page' )
296
- else :
297
- backup_remote_id = self .backup_node (
298
- backup_dir , 'node' , node , backup_type = 'page' ,
299
- options = ['--remote-proto=ssh' , '--remote-host=localhost' ])
286
+ backup_remote_id = self .backup_node (
287
+ backup_dir , 'node' , node , backup_type = 'page' )
300
288
301
289
output_remote = self .show_pb (
302
290
backup_dir , 'node' , as_json = False , backup_id = backup_remote_id )
@@ -318,6 +306,9 @@ def test_corrupt_correctness(self):
318
306
# @unittest.expectedFailure
319
307
def test_corrupt_correctness_1 (self ):
320
308
"""backup.control contains invalid option"""
309
+ if not self .remote :
310
+ self .skipTest ("You must enable PGPROBACKUP_SSH_REMOTE"
311
+ " for run this test" )
321
312
fname = self .id ().split ('.' )[3 ]
322
313
backup_dir = os .path .join (self .tmp_path , module_name , fname , 'backup' )
323
314
node = self .make_simple_node (
@@ -338,12 +329,7 @@ def test_corrupt_correctness_1(self):
338
329
output_local = self .show_pb (
339
330
backup_dir , 'node' , as_json = False , backup_id = backup_local_id )
340
331
341
- if self .remote :
342
- backup_remote_id = self .backup_node (backup_dir , 'node' , node )
343
- else :
344
- backup_remote_id = self .backup_node (
345
- backup_dir , 'node' , node ,
346
- options = ['--remote-proto=ssh' , '--remote-host=localhost' ])
332
+ backup_remote_id = self .backup_node (backup_dir , 'node' , node )
347
333
348
334
output_remote = self .show_pb (
349
335
backup_dir , 'node' , as_json = False , backup_id = backup_remote_id )
@@ -370,13 +356,8 @@ def test_corrupt_correctness_1(self):
370
356
backup_dir , 'node' , as_json = False , backup_id = backup_local_id )
371
357
self .delete_pb (backup_dir , 'node' , backup_local_id )
372
358
373
- if self .remote :
374
- backup_remote_id = self .backup_node (
375
- backup_dir , 'node' , node , backup_type = 'delta' )
376
- else :
377
- backup_remote_id = self .backup_node (
378
- backup_dir , 'node' , node , backup_type = 'delta' ,
379
- options = ['--remote-proto=ssh' , '--remote-host=localhost' ])
359
+ backup_remote_id = self .backup_node (
360
+ backup_dir , 'node' , node , backup_type = 'delta' )
380
361
381
362
output_remote = self .show_pb (
382
363
backup_dir , 'node' , as_json = False , backup_id = backup_remote_id )
@@ -400,13 +381,8 @@ def test_corrupt_correctness_1(self):
400
381
backup_dir , 'node' , as_json = False , backup_id = backup_local_id )
401
382
self .delete_pb (backup_dir , 'node' , backup_local_id )
402
383
403
- if self .remote :
404
- backup_remote_id = self .backup_node (
405
- backup_dir , 'node' , node , backup_type = 'page' )
406
- else :
407
- backup_remote_id = self .backup_node (
408
- backup_dir , 'node' , node , backup_type = 'page' ,
409
- options = ['--remote-proto=ssh' , '--remote-host=localhost' ])
384
+ backup_remote_id = self .backup_node (
385
+ backup_dir , 'node' , node , backup_type = 'page' )
410
386
411
387
output_remote = self .show_pb (
412
388
backup_dir , 'node' , as_json = False , backup_id = backup_remote_id )
@@ -428,6 +404,9 @@ def test_corrupt_correctness_1(self):
428
404
# @unittest.expectedFailure
429
405
def test_corrupt_correctness_2 (self ):
430
406
"""backup.control contains invalid option"""
407
+ if not self .remote :
408
+ self .skipTest ("You must enable PGPROBACKUP_SSH_REMOTE"
409
+ " for run this test" )
431
410
fname = self .id ().split ('.' )[3 ]
432
411
backup_dir = os .path .join (self .tmp_path , module_name , fname , 'backup' )
433
412
node = self .make_simple_node (
0 commit comments