summaryrefslogtreecommitdiff
path: root/dev-go
diff options
context:
space:
mode:
authorZac Medico <zmedico@gentoo.org>2015-05-21 08:23:09 +0000
committerZac Medico <zmedico@gentoo.org>2015-05-21 08:23:09 +0000
commit344e1929d9319fd6157985803132e7ba99c8cb28 (patch)
tree06c224c8312dfe9ff4a28ca0709b761d44fde089 /dev-go
parentbup (diff)
downloadgentoo-2-344e1929d9319fd6157985803132e7ba99c8cb28.tar.gz
gentoo-2-344e1929d9319fd6157985803132e7ba99c8cb28.tar.bz2
gentoo-2-344e1929d9319fd6157985803132e7ba99c8cb28.zip
Add 1.4.2_p20150514 snapshot.
(Portage version: 2.2.20/cvs/Linux x86_64, signed Manifest commit with key FDE8EF85AE5719A3)
Diffstat (limited to 'dev-go')
-rw-r--r--dev-go/go-crypto/ChangeLog8
-rw-r--r--dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild131
2 files changed, 138 insertions, 1 deletions
diff --git a/dev-go/go-crypto/ChangeLog b/dev-go/go-crypto/ChangeLog
index 47ed0d107583..5b8a59536232 100644
--- a/dev-go/go-crypto/ChangeLog
+++ b/dev-go/go-crypto/ChangeLog
@@ -1,6 +1,12 @@
# ChangeLog for dev-go/go-crypto
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/dev-go/go-crypto/ChangeLog,v 1.2 2015/05/21 07:42:57 zmedico Exp $
+# $Header: /var/cvsroot/gentoo-x86/dev-go/go-crypto/ChangeLog,v 1.3 2015/05/21 08:23:09 zmedico Exp $
+
+*go-crypto-1.4.2_p20150514 (21 May 2015)
+
+ 21 May 2015; Zac Medico <zmedico@gentoo.org>
+ +go-crypto-1.4.2_p20150514.ebuild:
+ Add 1.4.2_p20150514 snapshot.
21 May 2015; Zac Medico <zmedico@gentoo.org> go-crypto-9999.ebuild:
Add src_test.
diff --git a/dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild b/dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild
new file mode 100644
index 000000000000..71e79251a0ea
--- /dev/null
+++ b/dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild
@@ -0,0 +1,131 @@
+# Copyright 1999-2015 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild,v 1.1 2015/05/21 08:23:09 zmedico Exp $
+
+EAPI=5
+
+KEYWORDS="~amd64"
+DESCRIPTION="Go supplementary cryptography libraries"
+MY_PN=${PN##*-}
+GO_PN=golang.org/x/${MY_PN}
+HOMEPAGE="https://godoc.org/${GO_PN}"
+EGIT_COMMIT="4d48e5fa3d62b5e6e71260571bf76c767198ca02"
+SRC_URI="https://github.com/golang/${MY_PN}/archive/${EGIT_COMMIT}.tar.gz -> ${P}.tar.gz"
+LICENSE="BSD"
+SLOT="0"
+IUSE=""
+DEPEND=">=dev-lang/go-1.4"
+RDEPEND=""
+S="${WORKDIR}/src/${GO_PN}"
+EGIT_CHECKOUT_DIR="${S}"
+STRIP_MASK="*.a"
+
+src_unpack() {
+ default
+ mkdir -p src/${GO_PN%/*} || die
+ mv ${MY_PN}-${EGIT_COMMIT} src/${GO_PN} || die
+}
+
+src_compile() {
+ # Create a writable GOROOT in order to avoid sandbox violations.
+ GOROOT="${WORKDIR}/goroot"
+ cp -sR "${EPREFIX}"/usr/lib/go "${GOROOT}" || die
+ rm -rf "${GOROOT}/src/${GO_PN%/*}" \
+ "${GOROOT}/pkg/linux_${ARCH}/${GO_PN%/*}" || die
+ GOROOT="${GOROOT}" GOPATH=${WORKDIR} go install -v -x -work ${GO_PN}/... || die
+}
+
+src_test() {
+ GOROOT="${GOROOT}" GOPATH=${WORKDIR} \
+ go test -run "^"$(
+ echo -n 'Example_usage|Test(AcceptClose|AgainstLibOTR|Agent|'
+ echo -n 'Append|Append|AppendNoRealloc|Auth|Auth|'
+ echo -n 'AuthMethodFallback|AuthMethodInvalidPublicKey|'
+ echo -n 'AuthMethodKeyboardInteractive|AuthMethodPassword|'
+ echo -n 'AuthMethodRSAandDSA|AuthMethodWrongKeyboardInteractive|'
+ echo -n 'AuthMethodWrongPassword|AuthorizedKeyBasic|'
+ echo -n 'AuthWithInvalidSpace|AuthWithMissingQuote|'
+ echo -n 'AuthWithQuotedCommaInEnv|AuthWithQuotedQuoteInEnv|'
+ echo -n 'AuthWithQuotedSpaceInEnv|AutoPortListenBroken|BadSMP|'
+ echo -n 'BareMarshal|BareMarshalUnmarshal|BaseScalarMult|'
+ echo -n 'Basic|BcryptingIsCorrect|BcryptingIsEasy|Bilinearity|'
+ echo -n 'Blocksize|Box|BufferClose|BufferReadwrite|CampbellQuine|'
+ echo -n 'CanonicalText|Cert|CertLogin|Cipher|CipherDecrypt|'
+ echo -n 'CipherDecrypt|CipherEncrypt|CipherEncrypt|CipherInit|'
+ echo -n 'Ciphers|ClientAuthPublicKey|ClientHandlesKeepalives|'
+ echo -n 'ClientHMAC|ClientLoginCert|ClientUnsupportedCipher|'
+ echo -n 'ClientUnsupportedKex|ClientWriteEOF|Close|Compressed|'
+ echo -n 'Conversation|Core208|Cost|CostReturnsWithLeadingZeroes|'
+ echo -n 'CostValidationInHash|CurveImpl|CustomClientVersion|'
+ echo -n 'Debug|DecodeEncode|DecryptingEncryptedKey|'
+ echo -n 'DefaultCiphersExist|DefaultClientVersion|'
+ echo -n 'DetachedSignature|DetachedSignatureDSA|Dial|'
+ echo -n 'DoubleClose|DSAHashTruncatation|Ecc384Serialize|'
+ echo -n 'EncodeDecode|EncryptDecrypt|EncryptingEncryptedKey|'
+ echo -n 'Encryption|ExchangeVersions|ExchangeVersionsBasic|'
+ echo -n 'ExitSignalAndStatus|ExitStatusNonZero|ExitStatusZero|'
+ echo -n 'ExitWithoutStatusOrSignal|ExternallyRevocableKey|Full|'
+ echo -n 'G1Identity|G1Marshal|G2Identity|G2Marshal|GetKeyById|'
+ echo -n 'GFp12Invert|GFp2Invert|GFp6Invert|Golden|GoodSMP|'
+ echo -n 'HandshakeAutoRekeyRead|HandshakeAutoRekeyWrite|'
+ echo -n 'HandshakeBasic|HandshakeError|HandshakeTwice|HKDF|'
+ echo -n 'HKDFLimit|HKDFMultiRead|HostKeyCert|HostKeyCheck|'
+ echo -n 'IdVerification|IntLength|InvalidEntry|'
+ echo -n 'InvalidHashErrors|InvalidKeySize|'
+ echo -n 'InvalidServerConfiguration|InvalidTerminalMode|'
+ echo -n 'IsQuery|Iterated|KeccakKats|Kexes|Key|KeyExpiry|'
+ echo -n 'KeyMarshalParse|KeyPresses|KeyRevocation|'
+ echo -n 'KeySerialization|KeySignVerify|KeyUsage|'
+ echo -n 'KnownExitSignalOnly|Limited|LockClient|LockServer|'
+ echo -n 'LongHeader|MACs|MarshalParsePublicKey|MarshalPtr|'
+ echo -n 'MarshalUnmarshal|MillionA|MinorNotRequired|'
+ echo -n 'MissingHashFunction|MuxChannelCloseWriteUnblock|'
+ echo -n 'MuxChannelExtendedThreadSafety|MuxChannelOverflow|'
+ echo -n 'MuxChannelRequest|MuxChannelRequestUnblock|'
+ echo -n 'MuxCloseChannel|MuxCloseWriteChannel|'
+ echo -n 'MuxConnectionCloseWriteUnblock|MuxDisconnect|'
+ echo -n 'MuxGlobalRequest|MuxGlobalRequestUnblock|'
+ echo -n 'MuxInvalidRecord|MuxMaxPacketSize|MuxReadWrite|'
+ echo -n 'MuxReject|NewEntity|NewPublicKey|NewUserId|'
+ echo -n 'NewUserIdWithInvalidInput|NoArmoredData|'
+ echo -n 'NoPermissionsPassing|OCFB|OCSPDecode|'
+ echo -n 'OCSPDecodeWithoutCert|OCSPRequest|'
+ echo -n 'OCSPResponse|OCSPSignature|OpaqueParseReason|OrderG1|'
+ echo -n 'OrderG2|OrderGT|PacketCiphers|Parse|Parse|ParseCert|'
+ echo -n 'ParseCertWithOptions|ParseDSA|ParseECPrivateKey|'
+ echo -n 'ParseLibOTRPrivateKey|ParseRSAPrivateKey|'
+ echo -n 'ParseUserAttribute|ParseUserId|ParseWithNoNewlineAtEnd|'
+ echo -n 'PartialLengthReader|PartialLengths|PasswordNotSaved|'
+ echo -n 'PermissionsPassing|PortForward|'
+ echo -n 'PortForwardConnectionClose|PrivateKeyRead|'
+ echo -n 'PublicKeyRead|PublicKeySerialize|PublicKeyV3Read|'
+ echo -n 'PublicKeyV3Serialize|ReadDSAKey|ReadFull|ReadHeader|'
+ echo -n 'ReadingArmoredPrivateKey|ReadingArmoredPublicKey|'
+ echo -n 'ReadKeyRing|ReadLength|ReadPrivateKeyRing|ReadVersion|'
+ echo -n 'ReadVersionError|RereadKeyRing|RunCommandFailed|Salsa20|'
+ echo -n 'Salted|SaltedCipher|SaltedCipherKeyLength|Sbox|SealOpen|'
+ echo -n 'SealOpen|SecretBox|Serialize|Serialize|SerializeHeader|'
+ echo -n 'SerializeSymmetricKeyEncrypted|Server|ServerWindow|'
+ echo -n 'SessionCombinedOutput|SessionID|SessionOutput|'
+ echo -n 'SessionShell|SessionStdoutPipe|SetupForwardAgent|'
+ echo -n 'SignatureRead|SignatureReserialize|SignatureV3Read|'
+ echo -n 'SignatureV3Reserialize|SignDetached|SignDetachedDSA|'
+ echo -n 'SignedEncryptedMessage|SignedMessage|Signing|'
+ echo -n 'SignTextDetached|SignVerify|Squeezing|SubkeyRevocation|'
+ echo -n 'Sum|SymmetricallyEncrypted|SymmetricEncryption|'
+ echo -n 'SymmetricKeyEncrypted|TerminalSetSize|TextSignedMessage|'
+ echo -n 'TooLongPasswordsWork|TransportMaxPacketReader|'
+ echo -n 'TransportMaxPacketWrite|TripartiteDiffieHellman|'
+ echo -n 'UnknownExitSignal|UnknownHashFunction|UnmarshalEmptyPacket|'
+ echo -n 'UnmarshalUnexpectedPacket|UnpaddedBase64Encoding|'
+ echo -n 'UnspecifiedRecipient|UnsupportedCurves|ValidateCert|'
+ echo -n 'ValidateCertTime|Vectors|VeryShortPasswords|WithHMACSHA1|'
+ echo -n 'WithHMACSHA256|XSalsa20|XTS|ZeroWindowAdjust)$') \
+ -x -v ${GO_PN}/... || die $?
+}
+
+src_install() {
+ insinto /usr/lib/go
+ find "${WORKDIR}"/{pkg,src} -name '.git*' -exec rm -rf {} \; 2>/dev/null
+ doins -r "${WORKDIR}"/{pkg,src}
+}