hello,

minor update of py-oauthlib from 2.0.2 to 2.0.3, built,
packaged, and tested with py-discogs-client on
amd64. The two patches we had are no longer needed, so
they have been removed.

thanks,

.jh
Index: py-oauthlib/Makefile
===================================================================
RCS file: /cvs/ports/security/py-oauthlib/Makefile,v
retrieving revision 1.9
diff -u -p -u -p -r1.9 Makefile
--- py-oauthlib/Makefile	24 Apr 2017 09:32:14 -0000	1.9
+++ py-oauthlib/Makefile	15 Sep 2017 18:25:34 -0000
@@ -2,7 +2,7 @@
 
 COMMENT =	Python library for OAuth
 
-MODPY_EGG_VERSION = 2.0.2
+MODPY_EGG_VERSION = 2.0.3
 
 GH_ACCOUNT =	idan
 GH_PROJECT =	oauthlib
Index: py-oauthlib/distinfo
===================================================================
RCS file: /cvs/ports/security/py-oauthlib/distinfo,v
retrieving revision 1.7
diff -u -p -u -p -r1.7 distinfo
--- py-oauthlib/distinfo	24 Apr 2017 09:32:14 -0000	1.7
+++ py-oauthlib/distinfo	15 Sep 2017 18:25:34 -0000
@@ -1,2 +1,2 @@
-SHA256 (oauthlib-2.0.2.tar.gz) = s3hsXybkUefMIwXZ+x1dkLnUarcuaP5TNppxbyH84pw=
-SIZE (oauthlib-2.0.2.tar.gz) = 161329
+SHA256 (oauthlib-2.0.3.tar.gz) = xMyuVU4bf0Dx9gNxq/dWjxMKGtnfEnYtJxU8VLDAgzY=
+SIZE (oauthlib-2.0.3.tar.gz) = 162720
Index: py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_client_py
===================================================================
RCS file: py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_client_py
diff -N py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_client_py
--- py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_client_py	22 Apr 2016 22:25:53 -0000	1.1
+++ /dev/null	1 Jan 1970 00:00:00 -0000
@@ -1,12 +0,0 @@
-$OpenBSD: patch-tests_oauth1_rfc5849_test_client_py,v 1.1 2016/04/22 22:25:53 sthen Exp $
---- tests/oauth1/rfc5849/test_client.py.orig	Wed Dec 23 16:15:03 2015
-+++ tests/oauth1/rfc5849/test_client.py	Wed Dec 23 16:15:18 2015
-@@ -133,7 +133,7 @@ class SignatureMethodTest(TestCase):
- 
-         u, h, b = client.sign('http://example.com')
- 
--        self.assertEquals(h['Authorization'], (
-+        self.assertEqual(h['Authorization'], (
-             'OAuth oauth_nonce="abc", oauth_timestamp="1234567890", '
-             'oauth_version="1.0", oauth_signature_method="PIZZA", '
-             'oauth_consumer_key="client_key", '
Index: py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_signatures_py
===================================================================
RCS file: py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_signatures_py
diff -N py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_signatures_py
--- py-oauthlib/patches/patch-tests_oauth1_rfc5849_test_signatures_py	22 Apr 2016 22:25:53 -0000	1.1
+++ /dev/null	1 Jan 1970 00:00:00 -0000
@@ -1,101 +0,0 @@
-$OpenBSD: patch-tests_oauth1_rfc5849_test_signatures_py,v 1.1 2016/04/22 22:25:53 sthen Exp $
---- tests/oauth1/rfc5849/test_signatures.py.orig	Wed Dec 23 16:14:30 2015
-+++ tests/oauth1/rfc5849/test_signatures.py	Wed Dec 23 16:14:51 2015
-@@ -142,12 +142,12 @@ class SignatureTests(TestCase):
- 
-         # test a URI with the default port
-         uri = "http://www.example.com:80/";
--        self.assertEquals(normalize_base_string_uri(uri),
-+        self.assertEqual(normalize_base_string_uri(uri),
-                           "http://www.example.com/";)
- 
-         # test a URI missing a path
-         uri = "http://www.example.com";
--        self.assertEquals(normalize_base_string_uri(uri),
-+        self.assertEqual(normalize_base_string_uri(uri),
-                           "http://www.example.com/";)
- 
-         # test a relative URI
-@@ -158,14 +158,14 @@ class SignatureTests(TestCase):
-         # test overriding the URI's netloc with a host argument
-         uri = "http://www.example.com/a-path";
-         host = "alternatehost.example.com"
--        self.assertEquals(normalize_base_string_uri(uri, host),
-+        self.assertEqual(normalize_base_string_uri(uri, host),
-                           "http://alternatehost.example.com/a-path";)
- 
-     def test_collect_parameters(self):
-         """We check against parameters multiple times in case things change
-         after more parameters are added.
-         """
--        self.assertEquals(collect_parameters(), [])
-+        self.assertEqual(collect_parameters(), [])
- 
-         # Check against uri_query
-         parameters = collect_parameters(uri_query=self.uri_query)
-@@ -241,8 +241,8 @@ class SignatureTests(TestCase):
-         sign = sign_hmac_sha1(self.control_base_string,
-                               self.client_secret.decode('utf-8'),
-                               self.resource_owner_secret.decode('utf-8'))
--        self.assertEquals(len(sign), 28)
--        self.assertEquals(sign, self.control_signature)
-+        self.assertEqual(len(sign), 28)
-+        self.assertEqual(sign, self.control_signature)
- 
-     def test_sign_hmac_sha1_with_client(self):
-         self.assertRaises(ValueError,
-@@ -254,8 +254,8 @@ class SignatureTests(TestCase):
-         sign = sign_hmac_sha1_with_client(
-             self.control_base_string, self.client)
- 
--        self.assertEquals(len(sign), 28)
--        self.assertEquals(sign, self.control_signature)
-+        self.assertEqual(len(sign), 28)
-+        self.assertEqual(sign, self.control_signature)
- 
- 
-     control_base_string_rsa_sha1 = (
-@@ -309,9 +309,9 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
-         control_signature = self.control_signature_rsa_sha1
- 
-         sign = sign_rsa_sha1(base_string, private_key)
--        self.assertEquals(sign, control_signature)
-+        self.assertEqual(sign, control_signature)
-         sign = sign_rsa_sha1(base_string.decode('utf-8'), private_key)
--        self.assertEquals(sign, control_signature)
-+        self.assertEqual(sign, control_signature)
- 
- 
-     def test_sign_rsa_sha1_with_client(self):
-@@ -323,13 +323,13 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
- 
-         sign = sign_rsa_sha1_with_client(base_string, self.client)
- 
--        self.assertEquals(sign, control_signature)
-+        self.assertEqual(sign, control_signature)
- 
-         self.client.decode() ## Decode `rsa_private_key` from UTF-8
- 
-         sign = sign_rsa_sha1_with_client(base_string, self.client)
- 
--        self.assertEquals(sign, control_signature)
-+        self.assertEqual(sign, control_signature)
- 
- 
-     control_signature_plaintext = (
-@@ -343,7 +343,7 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
-                           self.resource_owner_secret)
-         sign = sign_plaintext(self.client_secret.decode('utf-8'),
-                               self.resource_owner_secret.decode('utf-8'))
--        self.assertEquals(sign, self.control_signature_plaintext)
-+        self.assertEqual(sign, self.control_signature_plaintext)
- 
- 
-     def test_sign_plaintext_with_client(self):
-@@ -354,5 +354,5 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
- 
-         sign = sign_plaintext_with_client(None, self.client)
- 
--        self.assertEquals(sign, self.control_signature_plaintext)
-+        self.assertEqual(sign, self.control_signature_plaintext)
- 

Reply via email to