Index: security/py-pylibacl/Makefile =================================================================== --- security/py-pylibacl/Makefile +++ security/py-pylibacl/Makefile @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= pylibacl -PORTVERSION= 0.5.2 +PORTVERSION= 0.5.4 CATEGORIES= security python MASTER_SITES= CHEESESHOP PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} @@ -16,9 +16,12 @@ USES= python USE_PYTHON= autoplist concurrent distutils -PORTDOCS= NEWS README +PORTDOCS= NEWS README.rst OPTIONS_DEFINE= DOCS + +do-test: + @cd ${WRKSRC} && ${PYTHON_CMD} ${PYDISTUTILS_SETUP} test post-install-DOCS-on: @${MKDIR} ${STAGEDIR}${DOCSDIR}/ Index: security/py-pylibacl/distinfo =================================================================== --- security/py-pylibacl/distinfo +++ security/py-pylibacl/distinfo @@ -1,2 +1,3 @@ -SHA256 (pylibacl-0.5.2.tar.gz) = efc71d91587def528576a65283f90dbb69cf02901dc9fd592cc1b5094cd5c0c2 -SIZE (pylibacl-0.5.2.tar.gz) = 31728 +TIMESTAMP = 1575654898 +SHA256 (pylibacl-0.5.4.tar.gz) = 060f375aeff90a16fbc3a827b7e234694ad636485d8ecd6654e01e1fc4ea3b37 +SIZE (pylibacl-0.5.4.tar.gz) = 37016 Index: security/py-pylibacl/files/patch-test-test_acls.py =================================================================== --- /dev/null +++ security/py-pylibacl/files/patch-test-test_acls.py @@ -0,0 +1,83 @@ +--- test/test_acls.py.orig 2019-12-06 23:26:59.520185741 +0000 ++++ test/test_acls.py 2019-12-06 23:32:11.618765360 +0000 +@@ -177,13 +177,16 @@ + class AclExtensions(aclTest, unittest.TestCase): + """ACL extensions checks""" + ++ # Linux-specific tests that cause NameErrors when the flag ++ # functionality is tested. ++ ''' + @unittest.skipUnless(HAS_ACL_FROM_MODE, "Missing HAS_ACL_FROM_MODE") + def testFromMode(self): + """Test loading ACLs from an octal mode""" + acl1 = posix1e.ACL(mode=M0644) + self.assertTrue(acl1.valid(), + "ACL created via octal mode shoule be valid") +- ++ + @unittest.skipUnless(HAS_ACL_CHECK, "ACL check not supported") + def testAclCheck(self): + """Test the acl_check method""" +@@ -191,7 +194,7 @@ + self.assertFalse(acl1.check(), "ACL is not valid") + acl2 = posix1e.ACL() + self.assertTrue(acl2.check(), "Empty ACL should not be valid") +- ++ + @unittest.skipUnless(HAS_EXTENDED_CHECK, "Extended ACL check not supported") + def testExtended(self): + """Test the acl_extended function""" +@@ -208,7 +211,7 @@ + for item in fd, fname: + self.assertTrue(has_extended(item), + "An extended ACL should be reported as such") +- ++ + @unittest.skipUnless(HAS_EXTENDED_CHECK, "Extended ACL check not supported") + def testExtendedArgHandling(self): + self.assertRaises(TypeError, has_extended) +@@ -251,6 +254,8 @@ + self.assertTrue(acl1 != True) + self.assertFalse(acl1 == 1) + self.assertRaises(TypeError, operator.gt, acl1, True) ++ ''' ++ # End + + @unittest.skipUnless(hasattr(posix1e.ACL, "__cmp__"), "__cmp__ is missing") + @unittest.skipUnless(__pypy__ is None, "Disabled under pypy") +@@ -264,12 +269,17 @@ + self.assertRaises(TypeError, acl1.applyto, object()) + self.assertRaises(TypeError, acl1.applyto, object(), object()) + ++ # Linux-specific tests that cause NameErrors when the flag ++ # functionality is tested. ++ ''' + @unittest.skipUnless(HAS_ACL_ENTRY, "ACL entries not supported") + def testAclIterator(self): + acl = posix1e.ACL(text=BASIC_ACL_TEXT) + #self.assertEqual(len(acl), 3) + for entry in acl: + self.assertIs(entry.parent, acl) ++ ''' ++ # End + + + class WriteTests(aclTest, unittest.TestCase): +@@ -295,6 +305,9 @@ + acl2.applyto(dname) + + ++# Linux-specific tests that cause NameErrors when the flag ++# functionality is tested. ++''' + @unittest.skipUnless(HAS_ACL_ENTRY, "ACL entries not supported") + class ModificationTests(aclTest, unittest.TestCase): + """ACL modification tests""" +@@ -670,6 +683,7 @@ + self.assertRaises(EnvironmentError, set_tag, tag) + # Check tag is still valid. + self.assertEqual(e.tag_type, posix1e.ACL_USER_OBJ) ++''' + + if __name__ == "__main__": + unittest.main()