hello,
minor update of py-oauthlib from 2.0.2 to 2.0.3, built,
packaged, and tested with py-discogs-client on
amd64. The two patches we had are no longer needed, so
they have been removed.
thanks,
.jh
Index: py-oauthlib/Makefile
===================================================================
RCS file: /cvs/ports/security/py-oauthlib/Makefile,v
retrieving revision 1.9
diff -u -p -u -p -r1.9 Makefile
--- py-oauthlib/Makefile 24 Apr 2017 09:32:14 -0000 1.9
+++ py-oauthlib/Makefile 15 Sep 2017 18:25:34 -0000
@@ -2,7 +2,7 @@
COMMENT = Python library for OAuth
-MODPY_EGG_VERSION = 2.0.2
+MODPY_EGG_VERSION = 2.0.3
GH_ACCOUNT = idan
GH_PROJECT = oauthlib
Index: py-oauthlib/distinfo
===================================================================
RCS file: /cvs/ports/security/py-oauthlib/distinfo,v
retrieving revision 1.7
diff -u -p -u -p -r1.7 distinfo
--- py-oauthlib/distinfo 24 Apr 2017 09:32:14 -0000 1.7
+++ py-oauthlib/distinfo 15 Sep 2017 18:25:34 -0000
@@ -1,2 +1,2 @@
-SHA256 (oauthlib-2.0.2.tar.gz) = s3hsXybkUefMIwXZ+x1dkLnUarcuaP5TNppxbyH84pw=
-SIZE (oauthlib-2.0.2.tar.gz) = 161329
+SHA256 (oauthlib-2.0.3.tar.gz) = xMyuVU4bf0Dx9gNxq/dWjxMKGtnfEnYtJxU8VLDAgzY=
+SIZE (oauthlib-2.0.3.tar.gz) = 162720
Index: py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_client_py
===================================================================
RCS file: py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_client_py
diff -N py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_client_py
--- py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_client_py 22 Apr 2016 22:25:53 -0000 1.1
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,12 +0,0 @@
-$OpenBSD: patch-tests_oauth1_rfc5849_test_client_py,v 1.1 2016/04/22 22:25:53 sthen Exp $
---- tests/oauth1/rfc5849/test_client.py.orig Wed Dec 23 16:15:03 2015
-+++ tests/oauth1/rfc5849/test_client.py Wed Dec 23 16:15:18 2015
-@@ -133,7 +133,7 @@ class SignatureMethodTest(TestCase):
-
- u, h, b = client.sign('http://example.com')
-
-- self.assertEquals(h['Authorization'], (
-+ self.assertEqual(h['Authorization'], (
- 'OAuth oauth_nonce="abc", oauth_timestamp="1234567890", '
- 'oauth_version="1.0", oauth_signature_method="PIZZA", '
- 'oauth_consumer_key="client_key", '
Index: py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_signatures_py
===================================================================
RCS file: py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_signatures_py
diff -N py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_signatures_py
--- py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_signatures_py 22 Apr 2016 22:25:53 -0000 1.1
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,101 +0,0 @@
-$OpenBSD: patch-tests_oauth1_rfc5849_test_signatures_py,v 1.1 2016/04/22 22:25:53 sthen Exp $
---- tests/oauth1/rfc5849/test_signatures.py.orig Wed Dec 23 16:14:30 2015
-+++ tests/oauth1/rfc5849/test_signatures.py Wed Dec 23 16:14:51 2015
-@@ -142,12 +142,12 @@ class SignatureTests(TestCase):
-
- # test a URI with the default port
- uri = "http://www.example.com:80/"
-- self.assertEquals(normalize_base_string_uri(uri),
-+ self.assertEqual(normalize_base_string_uri(uri),
- "http://www.example.com/")
-
- # test a URI missing a path
- uri = "http://www.example.com"
-- self.assertEquals(normalize_base_string_uri(uri),
-+ self.assertEqual(normalize_base_string_uri(uri),
- "http://www.example.com/")
-
- # test a relative URI
-@@ -158,14 +158,14 @@ class SignatureTests(TestCase):
- # test overriding the URI's netloc with a host argument
- uri = "http://www.example.com/a-path"
- host = "alternatehost.example.com"
-- self.assertEquals(normalize_base_string_uri(uri, host),
-+ self.assertEqual(normalize_base_string_uri(uri, host),
- "http://alternatehost.example.com/a-path")
-
- def test_collect_parameters(self):
- """We check against parameters multiple times in case things change
- after more parameters are added.
- """
-- self.assertEquals(collect_parameters(), [])
-+ self.assertEqual(collect_parameters(), [])
-
- # Check against uri_query
- parameters = collect_parameters(uri_query=self.uri_query)
-@@ -241,8 +241,8 @@ class SignatureTests(TestCase):
- sign = sign_hmac_sha1(self.control_base_string,
- self.client_secret.decode('utf-8'),
- self.resource_owner_secret.decode('utf-8'))
-- self.assertEquals(len(sign), 28)
-- self.assertEquals(sign, self.control_signature)
-+ self.assertEqual(len(sign), 28)
-+ self.assertEqual(sign, self.control_signature)
-
- def test_sign_hmac_sha1_with_client(self):
- self.assertRaises(ValueError,
-@@ -254,8 +254,8 @@ class SignatureTests(TestCase):
- sign = sign_hmac_sha1_with_client(
- self.control_base_string, self.client)
-
-- self.assertEquals(len(sign), 28)
-- self.assertEquals(sign, self.control_signature)
-+ self.assertEqual(len(sign), 28)
-+ self.assertEqual(sign, self.control_signature)
-
-
- control_base_string_rsa_sha1 = (
-@@ -309,9 +309,9 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
- control_signature = self.control_signature_rsa_sha1
-
- sign = sign_rsa_sha1(base_string, private_key)
-- self.assertEquals(sign, control_signature)
-+ self.assertEqual(sign, control_signature)
- sign = sign_rsa_sha1(base_string.decode('utf-8'), private_key)
-- self.assertEquals(sign, control_signature)
-+ self.assertEqual(sign, control_signature)
-
-
- def test_sign_rsa_sha1_with_client(self):
-@@ -323,13 +323,13 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
-
- sign = sign_rsa_sha1_with_client(base_string, self.client)
-
-- self.assertEquals(sign, control_signature)
-+ self.assertEqual(sign, control_signature)
-
- self.client.decode() ## Decode `rsa_private_key` from UTF-8
-
- sign = sign_rsa_sha1_with_client(base_string, self.client)
-
-- self.assertEquals(sign, control_signature)
-+ self.assertEqual(sign, control_signature)
-
-
- control_signature_plaintext = (
-@@ -343,7 +343,7 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
- self.resource_owner_secret)
- sign = sign_plaintext(self.client_secret.decode('utf-8'),
- self.resource_owner_secret.decode('utf-8'))
-- self.assertEquals(sign, self.control_signature_plaintext)
-+ self.assertEqual(sign, self.control_signature_plaintext)
-
-
- def test_sign_plaintext_with_client(self):
-@@ -354,5 +354,5 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
-
- sign = sign_plaintext_with_client(None, self.client)
-
-- self.assertEquals(sign, self.control_signature_plaintext)
-+ self.assertEqual(sign, self.control_signature_plaintext)
-