git: a073dee3484f - main - security/py-zope.password: remove leaf zope port

From: Ruslan Makhmatkhanov <rm_at_FreeBSD.org>
Date: Tue, 08 Oct 2024 12:33:36 UTC
The branch main has been updated by rm:

URL: https://cgit.FreeBSD.org/ports/commit/?id=a073dee3484f77e0d4cfc8e2e90c19e77441ae4e

commit a073dee3484f77e0d4cfc8e2e90c19e77441ae4e
Author:     Ruslan Makhmatkhanov <rm@FreeBSD.org>
AuthorDate: 2024-10-08 12:32:46 +0000
Commit:     Ruslan Makhmatkhanov <rm@FreeBSD.org>
CommitDate: 2024-10-08 12:32:46 +0000

    security/py-zope.password: remove leaf zope port
    
    This port has no consumers and has no use/value as a standalone package
---
 MOVED                                      |   1 +
 security/Makefile                          |   1 -
 security/py-zope.password/Makefile         |  22 ----
 security/py-zope.password/distinfo         |   2 -
 security/py-zope.password/files/patch-2to3 | 205 -----------------------------
 security/py-zope.password/pkg-descr        |   2 -
 6 files changed, 1 insertion(+), 232 deletions(-)

diff --git a/MOVED b/MOVED
index 0842b6c4469c..3eb2a124ed74 100644
--- a/MOVED
+++ b/MOVED
@@ -3520,3 +3520,4 @@ audio/libechonest||2024-10-05|Removed, Abandonware and service no longer availab
 net/fbzmq||2024-10-05|Repository was archived by facebook and the last version doesn't build
 x11-toolkits/wlroots016||2024-10-07|No consumers in ports
 japanese/prn|japanese/prn-ps|2024-10-07|Allow cloning the repository on Windows
+security/py-zope.password||2024-10-08|Has no value as standalone package
diff --git a/security/Makefile b/security/Makefile
index ff4e3f5ea089..8c5f31be836d 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -1091,7 +1091,6 @@
     SUBDIR += py-yara-python-dex
     SUBDIR += py-yubikey-manager
     SUBDIR += py-zkg
-    SUBDIR += py-zope.password
     SUBDIR += py-zxcvbn
     SUBDIR += pygost
     SUBDIR += qt-sudo
diff --git a/security/py-zope.password/Makefile b/security/py-zope.password/Makefile
deleted file mode 100644
index 5517ef771351..000000000000
--- a/security/py-zope.password/Makefile
+++ /dev/null
@@ -1,22 +0,0 @@
-PORTNAME=	zope.password
-PORTVERSION=	3.6.1
-PORTREVISION=	1
-CATEGORIES=	security python zope
-MASTER_SITES=	PYPI
-PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
-DIST_SUBDIR=	zope
-
-MAINTAINER=	zope@FreeBSD.org
-COMMENT=	Password encoding and checking utilities
-WWW=		https://pypi.org/project/zope.password/
-
-LICENSE=	ZPL21
-
-RUN_DEPENDS=	${PYTHON_PKGNAMEPREFIX}zope.component>=0:devel/py-zope.component@${PY_FLAVOR} \
-		${PYTHON_PKGNAMEPREFIX}zope.configuration>=0:devel/py-zope.configuration@${PY_FLAVOR} \
-		${PYTHON_PKGNAMEPREFIX}zope.interface>=0:devel/py-zope.interface@${PY_FLAVOR}
-
-USES=		python
-USE_PYTHON=	distutils autoplist
-
-.include <bsd.port.mk>
diff --git a/security/py-zope.password/distinfo b/security/py-zope.password/distinfo
deleted file mode 100644
index 2dcd7098e6f9..000000000000
--- a/security/py-zope.password/distinfo
+++ /dev/null
@@ -1,2 +0,0 @@
-SHA256 (zope/zope.password-3.6.1.tar.gz) = 27e3cbb4ec8450eb35fcc27d8913b527d61118ffaa0e3e1bfc7f265e05e6ee23
-SIZE (zope/zope.password-3.6.1.tar.gz) = 14633
diff --git a/security/py-zope.password/files/patch-2to3 b/security/py-zope.password/files/patch-2to3
deleted file mode 100644
index d71c52e1ba57..000000000000
--- a/security/py-zope.password/files/patch-2to3
+++ /dev/null
@@ -1,205 +0,0 @@
---- src/zope/password/tests/test_zpasswd.py.orig	2010-05-27 08:08:11 UTC
-+++ src/zope/password/tests/test_zpasswd.py
-@@ -19,7 +19,7 @@ $Id: test_zpasswd.py 112138 2010-05-07 15:23:02Z ulif 
- import os
- import sys
- import unittest, doctest
--from StringIO import StringIO
-+from io import StringIO
- 
- from zope.password import password, zpasswd
- 
-@@ -51,23 +51,23 @@ class ArgumentParsingTestCase(TestBase):
-         argv = ["foo/bar.py"] + args
-         options = zpasswd.parse_args(argv)
-         self.assertEqual(options.program, "bar.py")
--        self.assert_(options.version)
-+        self.assertTrue(options.version)
-         return options
- 
-     def check_stdout_content(self, args):
-         try:
-             options = self.parse_args(args)
--        except SystemExit, e:
-+        except SystemExit as e:
-             self.assertEqual(e.code, 0)
--            self.assert_(self.stdout.getvalue())
--            self.failIf(self.stderr.getvalue())
-+            self.assertTrue(self.stdout.getvalue())
-+            self.assertFalse(self.stderr.getvalue())
-         else:
-             self.fail("expected SystemExit")
- 
-     def test_no_arguments(self):
-         options = self.parse_args([])
--        self.assert_(options.managers)
--        self.assert_(not options.destination)
-+        self.assertTrue(options.managers)
-+        self.assertTrue(not options.destination)
- 
-     def test_version_long(self):
-         self.check_stdout_content(["--version"])
-@@ -88,11 +88,11 @@ class ArgumentParsingTestCase(TestBase):
- 
-     def test_config_short(self):
-         options = self.parse_args(["-c", self.config])
--        self.assert_(options.managers)
-+        self.assertTrue(options.managers)
- 
-     def test_config_long(self):
-         options = self.parse_args(["--config", self.config])
--        self.assert_(options.managers)
-+        self.assertTrue(options.managers)
- 
- class ControlledInputApplication(zpasswd.Application):
- 
-@@ -123,19 +123,19 @@ class InputCollectionTestCase(TestBase):
- 
-     def check_principal(self, expected):
-         output = self.stdout.getvalue()
--        self.failUnless(output)
-+        self.assertTrue(output)
- 
-         principal_lines = output.splitlines()[-(len(expected) + 1):-1]
-         for line, expline in zip(principal_lines, expected):
--            self.failUnlessEqual(line.strip(), expline)
-+            self.assertEqual(line.strip(), expline)
- 
-     def test_principal_information(self):
-         options = self.createOptions()
-         app = ControlledInputApplication(options,
-             ["id", "title", "login", "1", "passwd", "passwd", "description"])
-         app.process()
--        self.failUnless(not self.stderr.getvalue())
--        self.failUnless(app.all_input_consumed())
-+        self.assertTrue(not self.stderr.getvalue())
-+        self.assertTrue(app.all_input_consumed())
-         self.check_principal([
-             '<principal',
-             'id="id"',
---- src/zope/password/zpasswd.py.orig	2010-05-27 08:08:11 UTC
-+++ src/zope/password/zpasswd.py
-@@ -29,7 +29,7 @@ def main(argv=None):
-         argv = sys.argv
-     try:
-         options = parse_args(argv)
--    except SystemExit, e:
-+    except SystemExit as e:
-         if e.code:
-             return 2
-         else:
-@@ -39,7 +39,7 @@ def main(argv=None):
-         return app.process()
-     except KeyboardInterrupt:
-         return 1
--    except SystemExit, e:
-+    except SystemExit as e:
-         return e.code
- 
- class Principal(object):
-@@ -135,7 +135,7 @@ class Application(object):
- 
-     def read_input_line(self, prompt):
-         # The tests replace this to make sure the right things happen.
--        return raw_input(prompt)
-+        return input(prompt)
- 
-     def read_password(self, prompt):
-         # The tests replace this to make sure the right things happen.
-@@ -145,7 +145,7 @@ class Application(object):
-         except KeyboardInterrupt:
-             # The cursor was left on the same line as the prompt,
-             # which we don't like.  Print a blank line.
--            print
-+            print()
-             raise
- 
-     def process(self):
-@@ -159,9 +159,9 @@ class Application(object):
-         principal = self.get_principal()
- 
-         if destination is sys.stdout:
--            print self.title
--        print >>destination, principal
--        print
-+            print(self.title)
-+        print(principal, file=destination)
-+        print()
- 
-         return 0
- 
-@@ -185,21 +185,21 @@ class Application(object):
-         while True:
-             value = self.read_input_line(prompt).strip()
-             if not value and error:
--                print >>sys.stderr, error
-+                print(error, file=sys.stderr)
-                 continue
-             return value
- 
-     def get_password_manager(self):
-         default = 0
-         self.print_message("Password manager:")
--        print
-+        print()
-         managers = self.options.managers
- 
-         for i, (name, manager) in enumerate(managers):
--            print "% i. %s" % (i + 1, name)
-+            print("% i. %s" % (i + 1, name))
-             if name == 'SSHA':
-                 default = i
--        print
-+        print()
-         self.need_blank_line = True
-         while True:
-             password_manager = self.read_input_line(
-@@ -212,8 +212,8 @@ class Application(object):
-                 if index > 0 and index <= len(managers):
-                     index -= 1
-                     break
--            print >>sys.stderr, "You must select a password manager"
--        print "%s password manager selected" % managers[index][0]
-+            print("You must select a password manager", file=sys.stderr)
-+        print("%s password manager selected" % managers[index][0])
-         return managers[index]
- 
-     def get_password(self):
-@@ -221,23 +221,23 @@ class Application(object):
-         while True:
-             password = self.read_password("Password: ")
-             if not password:
--                print >>sys.stderr, "Password may not be empty"
-+                print("Password may not be empty", file=sys.stderr)
-                 continue
-             if password != password.strip() or password.split() != [password]:
--                print >>sys.stderr, "Password may not contain spaces"
-+                print("Password may not contain spaces", file=sys.stderr)
-                 continue
-             break
-         again = self.read_password("Verify password: ")
-         if again != password:
--            print >>sys.stderr, "Password not verified!"
-+            print("Password not verified!", file=sys.stderr)
-             sys.exit(1)
-         return password
- 
-     def print_message(self, message):
-         if self.need_blank_line:
--            print
-+            print()
-             self.need_blank_line = False
--        print message
-+        print(message)
- 
- def get_password_managers(config_path=None):
-     if not config_path:
-@@ -247,7 +247,7 @@ def get_password_managers(config_path=None):
-         from zope.component import getUtilitiesFor
-         from zope.password.interfaces import IPasswordManager
- 
--        print "Loading configuration..."
-+        print("Loading configuration...")
-         config = xmlconfig.file(config_path)
-         managers = []
-         for name, manager in getUtilitiesFor(IPasswordManager):
diff --git a/security/py-zope.password/pkg-descr b/security/py-zope.password/pkg-descr
deleted file mode 100644
index 7b5c437ef555..000000000000
--- a/security/py-zope.password/pkg-descr
+++ /dev/null
@@ -1,2 +0,0 @@
-This package provides a password manager mechanism. Password manager is
-an utility object that can encode and check encoded passwords.