<86>Jan 5 03:53:24 userdel[55061]: delete user 'rooter' <86>Jan 5 03:53:24 userdel[55061]: removed shadow group 'rooter' owned by 'rooter' <86>Jan 5 03:53:24 groupadd[55067]: group added to /etc/group: name=rooter, GID=603 <86>Jan 5 03:53:24 groupadd[55067]: group added to /etc/gshadow: name=rooter <86>Jan 5 03:53:24 groupadd[55067]: new group: name=rooter, GID=603 <86>Jan 5 03:53:24 useradd[55080]: new user: name=rooter, UID=603, GID=603, home=/root, shell=/bin/bash <86>Jan 5 03:53:24 userdel[55095]: delete user 'builder' <86>Jan 5 03:53:24 userdel[55095]: removed group 'builder' owned by 'builder' <86>Jan 5 03:53:24 userdel[55095]: removed shadow group 'builder' owned by 'builder' <86>Jan 5 03:53:24 groupadd[55107]: group added to /etc/group: name=builder, GID=604 <86>Jan 5 03:53:24 groupadd[55107]: group added to /etc/gshadow: name=builder <86>Jan 5 03:53:24 groupadd[55107]: new group: name=builder, GID=604 <86>Jan 5 03:53:24 useradd[55116]: new user: name=builder, UID=604, GID=604, home=/usr/src, shell=/bin/bash <13>Jan 5 03:53:27 rpmi: libgdbm-1.8.3-alt10 1454943313 installed <13>Jan 5 03:53:27 rpmi: libexpat-2.2.4-alt1 1503305341 installed <13>Jan 5 03:53:27 rpmi: libp11-kit-0.23.15-alt1 sisyphus+226408.100.2.1 1554288187 installed <13>Jan 5 03:53:27 rpmi: libtasn1-4.14-alt1 p9+235792.100.2.1 1565425233 installed <13>Jan 5 03:53:27 rpmi: rpm-macros-alternatives-0.5.1-alt1 sisyphus+226946.100.1.1 1554830426 installed <13>Jan 5 03:53:27 rpmi: alternatives-0.5.1-alt1 sisyphus+226946.100.1.1 1554830426 installed <13>Jan 5 03:53:27 rpmi: ca-certificates-2019.10.28-alt1 p9+240634.100.1.1 1573575926 installed <13>Jan 5 03:53:27 rpmi: ca-trust-0.1.2-alt1 p9+233349.100.1.1 1561655062 installed <13>Jan 5 03:53:27 rpmi: p11-kit-trust-0.23.15-alt1 sisyphus+226408.100.2.1 1554288187 installed <13>Jan 5 03:53:27 rpmi: libcrypto1.1-1.1.1d-alt1.1 p9+237853.200.3.1 1569251778 installed <13>Jan 5 03:53:27 rpmi: libssl1.1-1.1.1d-alt1.1 p9+237853.200.3.1 1569251778 installed <13>Jan 5 03:53:27 rpmi: python3-3.7.4-alt2 p9+239459.100.1.1 1571444591 installed <13>Jan 5 03:53:28 rpmi: libpython3-3.7.4-alt2 p9+239459.100.1.1 1571444591 installed <13>Jan 5 03:53:28 rpmi: python3-base-3.7.4-alt2 p9+239459.100.1.1 1571444591 installed <13>Jan 5 03:53:28 rpmi: tests-for-installed-python3-pkgs-0.1.13.1-alt2 1535450458 installed <13>Jan 5 03:53:28 rpmi: rpm-build-python3-0.1.13.1-alt2 1535450458 installed <13>Jan 5 03:53:35 rpmi: python3-module-pkg_resources-1:40.8.0-alt2 sisyphus+229158.200.2.1 1557735221 installed <13>Jan 5 03:53:35 rpmi: python-modules-curses-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:35 rpmi: libtinfo-devel-6.1.20180407-alt2 sisyphus+222164.200.1.1 1550686221 installed <13>Jan 5 03:53:35 rpmi: libncurses-devel-6.1.20180407-alt2 sisyphus+222164.200.1.1 1550686221 installed <13>Jan 5 03:53:35 rpmi: python3-dev-3.7.4-alt2 p9+239459.100.1.1 1571444591 installed <13>Jan 5 03:53:35 rpmi: libverto-0.3.0-alt1_7 sisyphus+225932.100.1.1 1553994917 installed <13>Jan 5 03:53:35 rpmi: libkeyutils-1.6-alt2 sisyphus+226520.100.2.1 1554512088 installed <13>Jan 5 03:53:35 rpmi: libcom_err-1.44.6-alt1 sisyphus+224154.100.1.1 1552091653 installed <86>Jan 5 03:53:35 groupadd[83304]: group added to /etc/group: name=_keytab, GID=499 <86>Jan 5 03:53:35 groupadd[83304]: group added to /etc/gshadow: name=_keytab <86>Jan 5 03:53:35 groupadd[83304]: new group: name=_keytab, GID=499 <13>Jan 5 03:53:35 rpmi: libkrb5-1.17.1-alt1 p9+242852.100.2.1 1576572448 installed <13>Jan 5 03:53:35 rpmi: libtirpc-1.0.3-alt1 1532008015 installed <13>Jan 5 03:53:35 rpmi: libnsl2-1.1.0-alt1_1 1511548748 installed <13>Jan 5 03:53:35 rpmi: python-modules-compiler-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:35 rpmi: python-modules-email-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:35 rpmi: python-modules-unittest-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:35 rpmi: python-modules-encodings-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-nis-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-ctypes-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-multiprocessing-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-logging-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-tools-2to3-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-xml-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-hotshot-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-bsddb-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-modules-distutils-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-module-pkg_resources-1:40.8.0-alt2 sisyphus+229158.200.2.1 1557735221 installed <13>Jan 5 03:53:36 rpmi: libnsl2-devel-1.1.0-alt1_1 1511548748 installed <13>Jan 5 03:53:36 rpmi: python-dev-2.7.16-alt1 sisyphus+226365.200.2.1 1554143277 installed <13>Jan 5 03:53:36 rpmi: python-module-setuptools-1:40.8.0-alt2 sisyphus+229158.200.2.1 1557735221 installed <13>Jan 5 03:53:36 rpmi: python3-module-setuptools-1:40.8.0-alt2 sisyphus+229158.200.2.1 1557735221 installed Building target platforms: x86_64 Building for target x86_64 Wrote: /usr/src/in/nosrpm/python-module-django-piston-0.2.3-alt1.hg20120330.2.nosrc.rpm Installing python-module-django-piston-0.2.3-alt1.hg20120330.2.src.rpm Building target platforms: x86_64 Building for target x86_64 Executing(%prep): /bin/sh -e /usr/src/tmp/rpm-tmp.16735 + umask 022 + /bin/mkdir -p /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + rm -rf django-piston-0.2.3 + echo 'Source #0 (django-piston-0.2.3.tar):' Source #0 (django-piston-0.2.3.tar): + /bin/tar -xf /usr/src/RPM/SOURCES/django-piston-0.2.3.tar + cd django-piston-0.2.3 + /bin/chmod -c -Rf u+rwX,go-w . + cp -fR . ../python3 + find ../python3 -type f -name '*.py' -exec 2to3 -w -n '{}' + RefactoringTool: Skipping optional fixer: buffer RefactoringTool: Skipping optional fixer: idioms RefactoringTool: Skipping optional fixer: set_literal RefactoringTool: Skipping optional fixer: ws_comma RefactoringTool: No changes to ../python3/tests/test_project/urls.py RefactoringTool: No changes to ../python3/tests/test_project/settings.py RefactoringTool: No changes to ../python3/tests/test_project/apps/testapp/urls.py RefactoringTool: Refactored ../python3/tests/test_project/apps/testapp/tests.py --- ../python3/tests/test_project/apps/testapp/tests.py (original) +++ ../python3/tests/test_project/apps/testapp/tests.py (refactored) @@ -11,10 +11,10 @@ try: import yaml except ImportError: - print "Can't run YAML testsuite" + print("Can't run YAML testsuite") yaml = None -import urllib, base64, tempfile +import urllib.request, urllib.parse, urllib.error, base64, tempfile from test_project.apps.testapp.models import TestModel, ExpressiveTestModel, Comment, InheritedModel, Issue58Model, ListFieldsModel, CircularA, CircularB, CircularC from test_project.apps.testapp import signals @@ -67,7 +67,7 @@ self.assertEqual(token.secret, oatoken.secret) # Simulate user authentication... - self.failUnless(self.client.login(username='admin', password='admin')) + self.assertTrue(self.client.login(username='admin', password='admin')) request = oauth.OAuthRequest.from_token_and_callback(token=oatoken, callback='http://printer.example.com/request_token_ready', http_url='http://testserver/api/oauth/authorize') @@ -89,8 +89,8 @@ # Response should be a redirect... self.assertEqual(302, response.status_code) - self.failUnless(response['Location'].startswith("http://printer.example.com/request_token_ready?")) - self.failUnless(('oauth_token='+oatoken.key in response['Location'])) + self.assertTrue(response['Location'].startswith("http://printer.example.com/request_token_ready?")) + self.assertTrue(('oauth_token='+oatoken.key in response['Location'])) # Actually we can't test this last part, since it's 1.0a. # Obtain access token... @@ -107,25 +107,25 @@ def test_invalid_auth_header(self): response = self.client.get('/api/entries/') - self.assertEquals(response.status_code, 401) + self.assertEqual(response.status_code, 401) # no space bad_auth_string = 'Basic%s' % base64.encodestring('admin:admin').rstrip() response = self.client.get('/api/entries/', HTTP_AUTHORIZATION=bad_auth_string) - self.assertEquals(response.status_code, 401) + self.assertEqual(response.status_code, 401) # no colon bad_auth_string = 'Basic %s' % base64.encodestring('adminadmin').rstrip() response = self.client.get('/api/entries/', HTTP_AUTHORIZATION=bad_auth_string) - self.assertEquals(response.status_code, 401) + self.assertEqual(response.status_code, 401) # non base64 data bad_auth_string = 'Basic FOOBARQ!' response = self.client.get('/api/entries/', HTTP_AUTHORIZATION=bad_auth_string) - self.assertEquals(response.status_code, 401) + self.assertEqual(response.status_code, 401) class TestMultipleAuthenticators(MainTests): def test_both_authenticators(self): @@ -139,7 +139,7 @@ response = self.client.get('/api/multiauth/', HTTP_AUTHORIZATION=auth_string) - self.assertEquals(response.status_code, 200, 'Failed with combo of %s:%s' % (username, password)) + self.assertEqual(response.status_code, 200, 'Failed with combo of %s:%s' % (username, password)) class MultiXMLTests(MainTests): def init_delegate(self): @@ -152,14 +152,14 @@ expected = '\nNoneNoneNoneNone' result = self.client.get('/api/entries.xml', HTTP_AUTHORIZATION=self.auth_string).content - self.assertEquals(expected, result) + self.assertEqual(expected, result) def test_singlexml(self): obj = TestModel.objects.all()[0] expected = '\nNoneNone' result = self.client.get('/api/entry-%d.xml' % (obj.pk,), HTTP_AUTHORIZATION=self.auth_string).content - self.assertEquals(expected, result) + self.assertEqual(expected, result) class AbstractBaseClassTests(MainTests): def init_delegate(self): @@ -185,7 +185,7 @@ } ]""" - self.assertEquals(result, expected) + self.assertEqual(result, expected) def test_specific_id(self): ids = (1, 2) @@ -201,7 +201,7 @@ expected = be % id_ - self.assertEquals(result, expected) + self.assertEqual(result, expected) class IncomingExpressiveTests(MainTests): def init_delegate(self): @@ -231,12 +231,12 @@ result = self.client.get('/api/expressive.json', HTTP_AUTHORIZATION=self.auth_string).content - self.assertEquals(result, expected) + self.assertEqual(result, expected) resp = self.client.post('/api/expressive.json', outgoing, content_type='application/json', HTTP_AUTHORIZATION=self.auth_string) - self.assertEquals(resp.status_code, 201) + self.assertEqual(resp.status_code, 201) expected = """[ { @@ -266,14 +266,14 @@ result = self.client.get('/api/expressive.json', HTTP_AUTHORIZATION=self.auth_string).content - self.assertEquals(result, expected) + self.assertEqual(result, expected) def test_incoming_invalid_json(self): resp = self.client.post('/api/expressive.json', 'foo', HTTP_AUTHORIZATION=self.auth_string, content_type='application/json') - self.assertEquals(resp.status_code, 400) + self.assertEqual(resp.status_code, 400) def test_incoming_yaml(self): if not yaml: @@ -287,7 +287,7 @@ title: foo2 """ - self.assertEquals(self.client.get('/api/expressive.yaml', + self.assertEqual(self.client.get('/api/expressive.yaml', HTTP_AUTHORIZATION=self.auth_string).content, expected) outgoing = yaml.dump({ 'title': 'test', 'content': 'test', @@ -297,7 +297,7 @@ resp = self.client.post('/api/expressive.json', outgoing, content_type='application/x-yaml', HTTP_AUTHORIZATION=self.auth_string) - self.assertEquals(resp.status_code, 201) + self.assertEqual(resp.status_code, 201) expected = """- comments: [] content: bar @@ -311,7 +311,7 @@ content: test title: test """ - self.assertEquals(self.client.get('/api/expressive.yaml', + self.assertEqual(self.client.get('/api/expressive.yaml', HTTP_AUTHORIZATION=self.auth_string).content, expected) def test_incoming_invalid_yaml(self): @@ -319,7 +319,7 @@ ' 8**sad asj lja foo', HTTP_AUTHORIZATION=self.auth_string, content_type='application/x-yaml') - self.assertEquals(resp.status_code, 400) + self.assertEqual(resp.status_code, 400) class Issue36RegressionTests(MainTests): """ @@ -349,7 +349,7 @@ try: response = self.client.post('/api/entries.xml', {'file':fp}, HTTP_AUTHORIZATION=self.auth_string) - self.assertEquals(1, len(self.request.FILES), 'request.FILES on POST is empty when it should contain 1 file') + self.assertEqual(1, len(self.request.FILES), 'request.FILES on POST is empty when it should contain 1 file') finally: fp.close() @@ -363,29 +363,29 @@ try: response = self.client.put('/api/entry-%d.xml' % self.data.pk, {'file': fp}, HTTP_AUTHORIZATION=self.auth_string) - self.assertEquals(1, len(self.request.FILES), 'request.FILES on PUT is empty when it should contain 1 file') + self.assertEqual(1, len(self.request.FILES), 'request.FILES on PUT is empty when it should contain 1 file') finally: fp.close() class ValidationTest(MainTests): def test_basic_validation_fails(self): resp = self.client.get('/api/echo') - self.assertEquals(resp.status_code, 400) - self.assertEquals(resp.content, 'Bad Request