From nobody Tue Oct 08 12:33:36 2024 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XNFmw60pHz5ZNNK; Tue, 08 Oct 2024 12:33:36 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XNFmw5V9vz4Zc2; Tue, 8 Oct 2024 12:33:36 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1728390816; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=BnVkMRKMsIl/jt0J7vBj+Vkf3h5KBpVmtM2I1uDGWTM=; b=MEYLbGyaEOXHfbge0wVesWCHXHhzzpu6cheIbZYvOveGvSIoSsYrIQVH1Nm+Z+cs8Fd9Vq D3UYxRXnG9h/q2Dcwk0iu+JoE+Nj6nE8poLF6byMMdLTDedRBCgV+xBYo1AGRie1D4H+8V M0CALBP/g1QZ826LFVK9Nv4WTU+tbIdu4gFAy62L+r9rTLOkBm3pwcAZ/JCpxdmPkPA1CN kt1qEt2p9v0zrvkWX4OMd8DzmS10nnVn6BLD78s6Qdti0mUGIf/akAanAkfQfHxpUrBWkk EtqPDiMyK/us1jzEyMmoecyAjsmE7CY+73xSbSdUqoHNxB6LovdhMm6jcPeYag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1728390816; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=BnVkMRKMsIl/jt0J7vBj+Vkf3h5KBpVmtM2I1uDGWTM=; b=mJqHj+e2JxKCwnecCd/UPEIWn59b6v0VbWbbDBpgeRD1dpRUj/quC2k2u0FN+ERG6f3607 0vfmqJ1Tx0YPpedM/0u5/O6AMAWpaJwPaD8ThtU7IR/mCghBhYqfCLLtOiyZe6XJltvljd 2uecP0ip6aaQvT7i+qviLsmsyuBfscK0+8j4gKG3sBRD2gbUizeUeM5fiW+H9Yel25YO2+ 7bDGyvkNp2gQ0YnISm6147Dxg7qGfbMTZNJy9y09tw1rodKlD4K5Wo/4mCNZBD9/cS6GhH 0zGWQO3hMl5uLw5MsTwotojj67+SUWKXV7b4ytTP1W1boeU4mry9u8mQtod/Tw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1728390816; a=rsa-sha256; cv=none; b=M2y8rlK/On1AGCfcSIDHtrIew06TkEOAmXuDiO05zRqxzd/2r7LRxhVxSCySa85FhPULBJ zJlFvSJkY8yJtvGXjQuuJTggTY/hsS3dVwP2JHXny9pPEmQ2PFCXfkDVXGtOCs8wgNsQPk nLwwLoxwpZIwYWkoV3Q+0v123DRX6JdWnc832YN1nM1pTE/qDm66al1VNyACT5NZa3rbt5 czc+g2XE73cdL5Ykg5xYfiRjvZTiEojiriWbWHkhyP6XQcXibqmZXAAWdZnlsY9miLmUmN zZn2HQ99N15E4cWjkwWbj4knqpVfBrlTNvO8ZZ5TuGladkGSdnHbCvXA0y39bw== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4XNFmw55H2zW20; Tue, 8 Oct 2024 12:33:36 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 498CXafp011950; Tue, 8 Oct 2024 12:33:36 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 498CXaOp011947; Tue, 8 Oct 2024 12:33:36 GMT (envelope-from git) Date: Tue, 8 Oct 2024 12:33:36 GMT Message-Id: <202410081233.498CXaOp011947@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Ruslan Makhmatkhanov Subject: git: a073dee3484f - main - security/py-zope.password: remove leaf zope port List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rm X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: a073dee3484f77e0d4cfc8e2e90c19e77441ae4e Auto-Submitted: auto-generated The branch main has been updated by rm: URL: https://cgit.FreeBSD.org/ports/commit/?id=a073dee3484f77e0d4cfc8e2e90c19e77441ae4e commit a073dee3484f77e0d4cfc8e2e90c19e77441ae4e Author: Ruslan Makhmatkhanov AuthorDate: 2024-10-08 12:32:46 +0000 Commit: Ruslan Makhmatkhanov CommitDate: 2024-10-08 12:32:46 +0000 security/py-zope.password: remove leaf zope port This port has no consumers and has no use/value as a standalone package --- MOVED | 1 + security/Makefile | 1 - security/py-zope.password/Makefile | 22 ---- security/py-zope.password/distinfo | 2 - security/py-zope.password/files/patch-2to3 | 205 ----------------------------- security/py-zope.password/pkg-descr | 2 - 6 files changed, 1 insertion(+), 232 deletions(-) diff --git a/MOVED b/MOVED index 0842b6c4469c..3eb2a124ed74 100644 --- a/MOVED +++ b/MOVED @@ -3520,3 +3520,4 @@ audio/libechonest||2024-10-05|Removed, Abandonware and service no longer availab net/fbzmq||2024-10-05|Repository was archived by facebook and the last version doesn't build x11-toolkits/wlroots016||2024-10-07|No consumers in ports japanese/prn|japanese/prn-ps|2024-10-07|Allow cloning the repository on Windows +security/py-zope.password||2024-10-08|Has no value as standalone package diff --git a/security/Makefile b/security/Makefile index ff4e3f5ea089..8c5f31be836d 100644 --- a/security/Makefile +++ b/security/Makefile @@ -1091,7 +1091,6 @@ SUBDIR += py-yara-python-dex SUBDIR += py-yubikey-manager SUBDIR += py-zkg - SUBDIR += py-zope.password SUBDIR += py-zxcvbn SUBDIR += pygost SUBDIR += qt-sudo diff --git a/security/py-zope.password/Makefile b/security/py-zope.password/Makefile deleted file mode 100644 index 5517ef771351..000000000000 --- a/security/py-zope.password/Makefile +++ /dev/null @@ -1,22 +0,0 @@ -PORTNAME= zope.password -PORTVERSION= 3.6.1 -PORTREVISION= 1 -CATEGORIES= security python zope -MASTER_SITES= PYPI -PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} -DIST_SUBDIR= zope - -MAINTAINER= zope@FreeBSD.org -COMMENT= Password encoding and checking utilities -WWW= https://pypi.org/project/zope.password/ - -LICENSE= ZPL21 - -RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}zope.component>=0:devel/py-zope.component@${PY_FLAVOR} \ - ${PYTHON_PKGNAMEPREFIX}zope.configuration>=0:devel/py-zope.configuration@${PY_FLAVOR} \ - ${PYTHON_PKGNAMEPREFIX}zope.interface>=0:devel/py-zope.interface@${PY_FLAVOR} - -USES= python -USE_PYTHON= distutils autoplist - -.include diff --git a/security/py-zope.password/distinfo b/security/py-zope.password/distinfo deleted file mode 100644 index 2dcd7098e6f9..000000000000 --- a/security/py-zope.password/distinfo +++ /dev/null @@ -1,2 +0,0 @@ -SHA256 (zope/zope.password-3.6.1.tar.gz) = 27e3cbb4ec8450eb35fcc27d8913b527d61118ffaa0e3e1bfc7f265e05e6ee23 -SIZE (zope/zope.password-3.6.1.tar.gz) = 14633 diff --git a/security/py-zope.password/files/patch-2to3 b/security/py-zope.password/files/patch-2to3 deleted file mode 100644 index d71c52e1ba57..000000000000 --- a/security/py-zope.password/files/patch-2to3 +++ /dev/null @@ -1,205 +0,0 @@ ---- src/zope/password/tests/test_zpasswd.py.orig 2010-05-27 08:08:11 UTC -+++ src/zope/password/tests/test_zpasswd.py -@@ -19,7 +19,7 @@ $Id: test_zpasswd.py 112138 2010-05-07 15:23:02Z ulif - import os - import sys - import unittest, doctest --from StringIO import StringIO -+from io import StringIO - - from zope.password import password, zpasswd - -@@ -51,23 +51,23 @@ class ArgumentParsingTestCase(TestBase): - argv = ["foo/bar.py"] + args - options = zpasswd.parse_args(argv) - self.assertEqual(options.program, "bar.py") -- self.assert_(options.version) -+ self.assertTrue(options.version) - return options - - def check_stdout_content(self, args): - try: - options = self.parse_args(args) -- except SystemExit, e: -+ except SystemExit as e: - self.assertEqual(e.code, 0) -- self.assert_(self.stdout.getvalue()) -- self.failIf(self.stderr.getvalue()) -+ self.assertTrue(self.stdout.getvalue()) -+ self.assertFalse(self.stderr.getvalue()) - else: - self.fail("expected SystemExit") - - def test_no_arguments(self): - options = self.parse_args([]) -- self.assert_(options.managers) -- self.assert_(not options.destination) -+ self.assertTrue(options.managers) -+ self.assertTrue(not options.destination) - - def test_version_long(self): - self.check_stdout_content(["--version"]) -@@ -88,11 +88,11 @@ class ArgumentParsingTestCase(TestBase): - - def test_config_short(self): - options = self.parse_args(["-c", self.config]) -- self.assert_(options.managers) -+ self.assertTrue(options.managers) - - def test_config_long(self): - options = self.parse_args(["--config", self.config]) -- self.assert_(options.managers) -+ self.assertTrue(options.managers) - - class ControlledInputApplication(zpasswd.Application): - -@@ -123,19 +123,19 @@ class InputCollectionTestCase(TestBase): - - def check_principal(self, expected): - output = self.stdout.getvalue() -- self.failUnless(output) -+ self.assertTrue(output) - - principal_lines = output.splitlines()[-(len(expected) + 1):-1] - for line, expline in zip(principal_lines, expected): -- self.failUnlessEqual(line.strip(), expline) -+ self.assertEqual(line.strip(), expline) - - def test_principal_information(self): - options = self.createOptions() - app = ControlledInputApplication(options, - ["id", "title", "login", "1", "passwd", "passwd", "description"]) - app.process() -- self.failUnless(not self.stderr.getvalue()) -- self.failUnless(app.all_input_consumed()) -+ self.assertTrue(not self.stderr.getvalue()) -+ self.assertTrue(app.all_input_consumed()) - self.check_principal([ - '>destination, principal -- print -+ print(self.title) -+ print(principal, file=destination) -+ print() - - return 0 - -@@ -185,21 +185,21 @@ class Application(object): - while True: - value = self.read_input_line(prompt).strip() - if not value and error: -- print >>sys.stderr, error -+ print(error, file=sys.stderr) - continue - return value - - def get_password_manager(self): - default = 0 - self.print_message("Password manager:") -- print -+ print() - managers = self.options.managers - - for i, (name, manager) in enumerate(managers): -- print "% i. %s" % (i + 1, name) -+ print("% i. %s" % (i + 1, name)) - if name == 'SSHA': - default = i -- print -+ print() - self.need_blank_line = True - while True: - password_manager = self.read_input_line( -@@ -212,8 +212,8 @@ class Application(object): - if index > 0 and index <= len(managers): - index -= 1 - break -- print >>sys.stderr, "You must select a password manager" -- print "%s password manager selected" % managers[index][0] -+ print("You must select a password manager", file=sys.stderr) -+ print("%s password manager selected" % managers[index][0]) - return managers[index] - - def get_password(self): -@@ -221,23 +221,23 @@ class Application(object): - while True: - password = self.read_password("Password: ") - if not password: -- print >>sys.stderr, "Password may not be empty" -+ print("Password may not be empty", file=sys.stderr) - continue - if password != password.strip() or password.split() != [password]: -- print >>sys.stderr, "Password may not contain spaces" -+ print("Password may not contain spaces", file=sys.stderr) - continue - break - again = self.read_password("Verify password: ") - if again != password: -- print >>sys.stderr, "Password not verified!" -+ print("Password not verified!", file=sys.stderr) - sys.exit(1) - return password - - def print_message(self, message): - if self.need_blank_line: -- print -+ print() - self.need_blank_line = False -- print message -+ print(message) - - def get_password_managers(config_path=None): - if not config_path: -@@ -247,7 +247,7 @@ def get_password_managers(config_path=None): - from zope.component import getUtilitiesFor - from zope.password.interfaces import IPasswordManager - -- print "Loading configuration..." -+ print("Loading configuration...") - config = xmlconfig.file(config_path) - managers = [] - for name, manager in getUtilitiesFor(IPasswordManager): diff --git a/security/py-zope.password/pkg-descr b/security/py-zope.password/pkg-descr deleted file mode 100644 index 7b5c437ef555..000000000000 --- a/security/py-zope.password/pkg-descr +++ /dev/null @@ -1,2 +0,0 @@ -This package provides a password manager mechanism. Password manager is -an utility object that can encode and check encoded passwords.