From the cvmfs source directory run python3 test to run all the tests.
A few of the tests fail on a default-configured EL9 because the libraries think they are verifying a sha1-based certificate. I think the thing to do about that is to convert from M2Crypto to cryptography and use the RSAPublicKey recover_data_from_signature() function so we can compare that to the sha1 checksum in the .cvmfswhitelist.
From the cvmfs source directory run
python3 test
to run all the tests.A few of the tests fail on a default-configured EL9 because the libraries think they are verifying a sha1-based certificate. I think the thing to do about that is to convert from M2Crypto to cryptography and use the RSAPublicKey recover_data_from_signature() function so we can compare that to the sha1 checksum in the .cvmfswhitelist.