<86>Aug 2 10:19:48 userdel[60543]: delete user 'rooter' <86>Aug 2 10:19:48 userdel[60543]: removed group 'rooter' owned by 'rooter' <86>Aug 2 10:19:48 groupadd[60555]: group added to /etc/group: name=rooter, GID=615 <86>Aug 2 10:19:48 groupadd[60555]: group added to /etc/gshadow: name=rooter <86>Aug 2 10:19:48 groupadd[60555]: new group: name=rooter, GID=615 <86>Aug 2 10:19:48 useradd[60565]: new user: name=rooter, UID=615, GID=615, home=/root, shell=/bin/bash <86>Aug 2 10:19:48 userdel[60582]: delete user 'builder' <86>Aug 2 10:19:48 userdel[60582]: removed group 'builder' owned by 'builder' <86>Aug 2 10:19:48 groupadd[60591]: group added to /etc/group: name=builder, GID=616 <86>Aug 2 10:19:48 groupadd[60591]: group added to /etc/gshadow: name=builder <86>Aug 2 10:19:48 groupadd[60591]: new group: name=builder, GID=616 <86>Aug 2 10:19:48 useradd[60597]: new user: name=builder, UID=616, GID=616, home=/usr/src, shell=/bin/bash <13>Aug 2 10:19:51 rpmi: libgdbm-1.8.3-alt10 1454943334 installed <13>Aug 2 10:19:51 rpmi: libexpat-2.2.4-alt1 1503305345 installed <13>Aug 2 10:19:51 rpmi: libp11-kit-0.23.15-alt1 sisyphus+226408.100.2.1 1554288204 installed <13>Aug 2 10:19:51 rpmi: libtasn1-4.13-alt2 1521133850 installed <13>Aug 2 10:19:51 rpmi: rpm-macros-alternatives-0.5.1-alt1 sisyphus+226946.100.1.1 1554830426 installed <13>Aug 2 10:19:51 rpmi: alternatives-0.5.1-alt1 sisyphus+226946.100.1.1 1554830426 installed <13>Aug 2 10:19:51 rpmi: ca-certificates-2019.07.11-alt1 sisyphus+234280.200.1.1 1562839906 installed <13>Aug 2 10:19:51 rpmi: ca-trust-0.1.2-alt1 sisyphus+233348.100.1.1 1561653823 installed <13>Aug 2 10:19:51 rpmi: p11-kit-trust-0.23.15-alt1 sisyphus+226408.100.2.1 1554288204 installed <13>Aug 2 10:19:51 rpmi: libcrypto1.1-1.1.1b-alt2 sisyphus+227249.100.2.1 1555667822 installed <13>Aug 2 10:19:51 rpmi: libssl1.1-1.1.1b-alt2 sisyphus+227249.100.2.1 1555667822 installed <13>Aug 2 10:19:51 rpmi: python3-3.7.3-alt1 sisyphus+225625.574.90.1 1555274251 installed <13>Aug 2 10:19:51 rpmi: libpython3-3.7.3-alt1 sisyphus+225625.574.90.1 1555274251 installed <13>Aug 2 10:19:52 rpmi: python3-base-3.7.3-alt1 sisyphus+225625.574.90.1 1555274251 installed <13>Aug 2 10:19:52 rpmi: tests-for-installed-python3-pkgs-0.1.13.1-alt2 1535450458 installed <13>Aug 2 10:19:52 rpmi: rpm-build-python3-0.1.13.1-alt2 1535450458 installed <13>Aug 2 10:19:56 rpmi: python3-module-pkg_resources-1:41.0.1-alt2 sisyphus+231415.100.1.1 1559574158 installed <13>Aug 2 10:19:56 rpmi: python-modules-curses-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:56 rpmi: libtinfo-devel-6.1.20180407-alt2 sisyphus+222164.200.1.1 1550686226 installed <13>Aug 2 10:19:56 rpmi: libncurses-devel-6.1.20180407-alt2 sisyphus+222164.200.1.1 1550686226 installed <13>Aug 2 10:19:56 rpmi: python3-dev-3.7.3-alt1 sisyphus+225625.574.90.1 1555274251 installed <13>Aug 2 10:19:56 rpmi: libverto-0.3.0-alt1_7 sisyphus+225932.100.1.1 1553994919 installed <13>Aug 2 10:19:56 rpmi: libkeyutils-1.6-alt2 sisyphus+226520.100.2.1 1554512089 installed <13>Aug 2 10:19:56 rpmi: libcom_err-1.44.6-alt1 sisyphus+224154.100.1.1 1552091678 installed <86>Aug 2 10:19:57 groupadd[84338]: group added to /etc/group: name=_keytab, GID=499 <86>Aug 2 10:19:57 groupadd[84338]: group added to /etc/gshadow: name=_keytab <86>Aug 2 10:19:57 groupadd[84338]: new group: name=_keytab, GID=499 <13>Aug 2 10:19:57 rpmi: libkrb5-1.16.3-alt1 sisyphus+223678.100.1.1 1551746516 installed <13>Aug 2 10:19:57 rpmi: libtirpc-1.0.3-alt1 1532008017 installed <13>Aug 2 10:19:57 rpmi: libnsl2-1.1.0-alt1_1 1511548749 installed <13>Aug 2 10:19:57 rpmi: python-modules-compiler-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-email-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-unittest-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-encodings-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-nis-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-ctypes-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-multiprocessing-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-logging-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-tools-2to3-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-xml-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-hotshot-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-bsddb-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-modules-distutils-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-module-pkg_resources-1:41.0.1-alt2 sisyphus+231415.100.1.1 1559574158 installed <13>Aug 2 10:19:57 rpmi: libnsl2-devel-1.1.0-alt1_1 1511548749 installed <13>Aug 2 10:19:57 rpmi: python-dev-2.7.16-alt1 sisyphus+226365.200.2.1 1554143304 installed <13>Aug 2 10:19:57 rpmi: python-module-setuptools-1:41.0.1-alt2 sisyphus+231415.100.1.1 1559574158 installed <13>Aug 2 10:19:57 rpmi: python3-module-setuptools-1:41.0.1-alt2 sisyphus+231415.100.1.1 1559574158 installed Building target platforms: i586 Building for target i586 Wrote: /usr/src/in/nosrpm/python-module-django-piston-0.2.3-alt1.hg20120330.2.nosrc.rpm Installing python-module-django-piston-0.2.3-alt1.hg20120330.2.src.rpm Building target platforms: i586 Building for target i586 Executing(%prep): /bin/sh -e /usr/src/tmp/rpm-tmp.55468 + umask 022 + /bin/mkdir -p /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + rm -rf django-piston-0.2.3 + echo 'Source #0 (django-piston-0.2.3.tar):' Source #0 (django-piston-0.2.3.tar): + /bin/tar -xf /usr/src/RPM/SOURCES/django-piston-0.2.3.tar + cd django-piston-0.2.3 + /bin/chmod -c -Rf u+rwX,go-w . + cp -fR . ../python3 + find ../python3 -type f -name '*.py' -exec 2to3 -w -n '{}' + RefactoringTool: Skipping optional fixer: buffer RefactoringTool: Skipping optional fixer: idioms RefactoringTool: Skipping optional fixer: set_literal RefactoringTool: Skipping optional fixer: ws_comma RefactoringTool: No changes to ../python3/tests/test_project/urls.py RefactoringTool: No changes to ../python3/tests/test_project/settings.py RefactoringTool: No changes to ../python3/tests/test_project/apps/testapp/urls.py RefactoringTool: Refactored ../python3/tests/test_project/apps/testapp/tests.py --- ../python3/tests/test_project/apps/testapp/tests.py (original) +++ ../python3/tests/test_project/apps/testapp/tests.py (refactored) @@ -11,10 +11,10 @@ try: import yaml except ImportError: - print "Can't run YAML testsuite" + print("Can't run YAML testsuite") yaml = None -import urllib, base64, tempfile +import urllib.request, urllib.parse, urllib.error, base64, tempfile from test_project.apps.testapp.models import TestModel, ExpressiveTestModel, Comment, InheritedModel, Issue58Model, ListFieldsModel, CircularA, CircularB, CircularC from test_project.apps.testapp import signals @@ -67,7 +67,7 @@ self.assertEqual(token.secret, oatoken.secret) # Simulate user authentication... - self.failUnless(self.client.login(username='admin', password='admin')) + self.assertTrue(self.client.login(username='admin', password='admin')) request = oauth.OAuthRequest.from_token_and_callback(token=oatoken, callback='http://printer.example.com/request_token_ready', http_url='http://testserver/api/oauth/authorize') @@ -89,8 +89,8 @@ # Response should be a redirect... self.assertEqual(302, response.status_code) - self.failUnless(response['Location'].startswith("http://printer.example.com/request_token_ready?")) - self.failUnless(('oauth_token='+oatoken.key in response['Location'])) + self.assertTrue(response['Location'].startswith("http://printer.example.com/request_token_ready?")) + self.assertTrue(('oauth_token='+oatoken.key in response['Location'])) # Actually we can't test this last part, since it's 1.0a. # Obtain access token... @@ -107,25 +107,25 @@ def test_invalid_auth_header(self): response = self.client.get('/api/entries/') - self.assertEquals(response.status_code, 401) + self.assertEqual(response.status_code, 401) # no space bad_auth_string = 'Basic%s' % base64.encodestring('admin:admin').rstrip() response = self.client.get('/api/entries/', HTTP_AUTHORIZATION=bad_auth_string) - self.assertEquals(response.status_code, 401) + self.assertEqual(response.status_code, 401) # no colon bad_auth_string = 'Basic %s' % base64.encodestring('adminadmin').rstrip() response = self.client.get('/api/entries/', HTTP_AUTHORIZATION=bad_auth_string) - self.assertEquals(response.status_code, 401) + self.assertEqual(response.status_code, 401) # non base64 data bad_auth_string = 'Basic FOOBARQ!' response = self.client.get('/api/entries/', HTTP_AUTHORIZATION=bad_auth_string) - self.assertEquals(response.status_code, 401) + self.assertEqual(response.status_code, 401) class TestMultipleAuthenticators(MainTests): def test_both_authenticators(self): @@ -139,7 +139,7 @@ response = self.client.get('/api/multiauth/', HTTP_AUTHORIZATION=auth_string) - self.assertEquals(response.status_code, 200, 'Failed with combo of %s:%s' % (username, password)) + self.assertEqual(response.status_code, 200, 'Failed with combo of %s:%s' % (username, password)) class MultiXMLTests(MainTests): def init_delegate(self): @@ -152,14 +152,14 @@ expected = '\nNoneNoneNoneNone' result = self.client.get('/api/entries.xml', HTTP_AUTHORIZATION=self.auth_string).content - self.assertEquals(expected, result) + self.assertEqual(expected, result) def test_singlexml(self): obj = TestModel.objects.all()[0] expected = '\nNoneNone' result = self.client.get('/api/entry-%d.xml' % (obj.pk,), HTTP_AUTHORIZATION=self.auth_string).content - self.assertEquals(expected, result) + self.assertEqual(expected, result) class AbstractBaseClassTests(MainTests): def init_delegate(self): @@ -185,7 +185,7 @@ } ]""" - self.assertEquals(result, expected) + self.assertEqual(result, expected) def test_specific_id(self): ids = (1, 2) @@ -201,7 +201,7 @@ expected = be % id_ - self.assertEquals(result, expected) + self.assertEqual(result, expected) class IncomingExpressiveTests(MainTests): def init_delegate(self): @@ -231,12 +231,12 @@ result = self.client.get('/api/expressive.json', HTTP_AUTHORIZATION=self.auth_string).content - self.assertEquals(result, expected) + self.assertEqual(result, expected) resp = self.client.post('/api/expressive.json', outgoing, content_type='application/json', HTTP_AUTHORIZATION=self.auth_string) - self.assertEquals(resp.status_code, 201) + self.assertEqual(resp.status_code, 201) expected = """[ { @@ -266,14 +266,14 @@ result = self.client.get('/api/expressive.json', HTTP_AUTHORIZATION=self.auth_string).content - self.assertEquals(result, expected) + self.assertEqual(result, expected) def test_incoming_invalid_json(self): resp = self.client.post('/api/expressive.json', 'foo', HTTP_AUTHORIZATION=self.auth_string, content_type='application/json') - self.assertEquals(resp.status_code, 400) + self.assertEqual(resp.status_code, 400) def test_incoming_yaml(self): if not yaml: @@ -287,7 +287,7 @@ title: foo2 """ - self.assertEquals(self.client.get('/api/expressive.yaml', + self.assertEqual(self.client.get('/api/expressive.yaml', HTTP_AUTHORIZATION=self.auth_string).content, expected) outgoing = yaml.dump({ 'title': 'test', 'content': 'test', @@ -297,7 +297,7 @@ resp = self.client.post('/api/expressive.json', outgoing, content_type='application/x-yaml', HTTP_AUTHORIZATION=self.auth_string) - self.assertEquals(resp.status_code, 201) + self.assertEqual(resp.status_code, 201) expected = """- comments: [] content: bar @@ -311,7 +311,7 @@ content: test title: test """ - self.assertEquals(self.client.get('/api/expressive.yaml', + self.assertEqual(self.client.get('/api/expressive.yaml', HTTP_AUTHORIZATION=self.auth_string).content, expected) def test_incoming_invalid_yaml(self): @@ -319,7 +319,7 @@ ' 8**sad asj lja foo', HTTP_AUTHORIZATION=self.auth_string, content_type='application/x-yaml') - self.assertEquals(resp.status_code, 400) + self.assertEqual(resp.status_code, 400) class Issue36RegressionTests(MainTests): """ @@ -349,7 +349,7 @@ try: response = self.client.post('/api/entries.xml', {'file':fp}, HTTP_AUTHORIZATION=self.auth_string) - self.assertEquals(1, len(self.request.FILES), 'request.FILES on POST is empty when it should contain 1 file') + self.assertEqual(1, len(self.request.FILES), 'request.FILES on POST is empty when it should contain 1 file') finally: fp.close() @@ -363,29 +363,29 @@ try: response = self.client.put('/api/entry-%d.xml' % self.data.pk, {'file': fp}, HTTP_AUTHORIZATION=self.auth_string) - self.assertEquals(1, len(self.request.FILES), 'request.FILES on PUT is empty when it should contain 1 file') + self.assertEqual(1, len(self.request.FILES), 'request.FILES on PUT is empty when it should contain 1 file') finally: fp.close() class ValidationTest(MainTests): def test_basic_validation_fails(self): resp = self.client.get('/api/echo') - self.assertEquals(resp.status_code, 400) - self.assertEquals(resp.content, 'Bad Request