diff options
author | Zac Medico <zmedico@gentoo.org> | 2015-05-21 08:23:09 +0000 |
---|---|---|
committer | Zac Medico <zmedico@gentoo.org> | 2015-05-21 08:23:09 +0000 |
commit | 344e1929d9319fd6157985803132e7ba99c8cb28 (patch) | |
tree | 06c224c8312dfe9ff4a28ca0709b761d44fde089 /dev-go | |
parent | bup (diff) | |
download | gentoo-2-344e1929d9319fd6157985803132e7ba99c8cb28.tar.gz gentoo-2-344e1929d9319fd6157985803132e7ba99c8cb28.tar.bz2 gentoo-2-344e1929d9319fd6157985803132e7ba99c8cb28.zip |
Add 1.4.2_p20150514 snapshot.
(Portage version: 2.2.20/cvs/Linux x86_64, signed Manifest commit with key FDE8EF85AE5719A3)
Diffstat (limited to 'dev-go')
-rw-r--r-- | dev-go/go-crypto/ChangeLog | 8 | ||||
-rw-r--r-- | dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild | 131 |
2 files changed, 138 insertions, 1 deletions
diff --git a/dev-go/go-crypto/ChangeLog b/dev-go/go-crypto/ChangeLog index 47ed0d107583..5b8a59536232 100644 --- a/dev-go/go-crypto/ChangeLog +++ b/dev-go/go-crypto/ChangeLog @@ -1,6 +1,12 @@ # ChangeLog for dev-go/go-crypto # Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/dev-go/go-crypto/ChangeLog,v 1.2 2015/05/21 07:42:57 zmedico Exp $ +# $Header: /var/cvsroot/gentoo-x86/dev-go/go-crypto/ChangeLog,v 1.3 2015/05/21 08:23:09 zmedico Exp $ + +*go-crypto-1.4.2_p20150514 (21 May 2015) + + 21 May 2015; Zac Medico <zmedico@gentoo.org> + +go-crypto-1.4.2_p20150514.ebuild: + Add 1.4.2_p20150514 snapshot. 21 May 2015; Zac Medico <zmedico@gentoo.org> go-crypto-9999.ebuild: Add src_test. diff --git a/dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild b/dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild new file mode 100644 index 000000000000..71e79251a0ea --- /dev/null +++ b/dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild @@ -0,0 +1,131 @@ +# Copyright 1999-2015 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-go/go-crypto/go-crypto-1.4.2_p20150514.ebuild,v 1.1 2015/05/21 08:23:09 zmedico Exp $ + +EAPI=5 + +KEYWORDS="~amd64" +DESCRIPTION="Go supplementary cryptography libraries" +MY_PN=${PN##*-} +GO_PN=golang.org/x/${MY_PN} +HOMEPAGE="https://godoc.org/${GO_PN}" +EGIT_COMMIT="4d48e5fa3d62b5e6e71260571bf76c767198ca02" +SRC_URI="https://github.com/golang/${MY_PN}/archive/${EGIT_COMMIT}.tar.gz -> ${P}.tar.gz" +LICENSE="BSD" +SLOT="0" +IUSE="" +DEPEND=">=dev-lang/go-1.4" +RDEPEND="" +S="${WORKDIR}/src/${GO_PN}" +EGIT_CHECKOUT_DIR="${S}" +STRIP_MASK="*.a" + +src_unpack() { + default + mkdir -p src/${GO_PN%/*} || die + mv ${MY_PN}-${EGIT_COMMIT} src/${GO_PN} || die +} + +src_compile() { + # Create a writable GOROOT in order to avoid sandbox violations. + GOROOT="${WORKDIR}/goroot" + cp -sR "${EPREFIX}"/usr/lib/go "${GOROOT}" || die + rm -rf "${GOROOT}/src/${GO_PN%/*}" \ + "${GOROOT}/pkg/linux_${ARCH}/${GO_PN%/*}" || die + GOROOT="${GOROOT}" GOPATH=${WORKDIR} go install -v -x -work ${GO_PN}/... || die +} + +src_test() { + GOROOT="${GOROOT}" GOPATH=${WORKDIR} \ + go test -run "^"$( + echo -n 'Example_usage|Test(AcceptClose|AgainstLibOTR|Agent|' + echo -n 'Append|Append|AppendNoRealloc|Auth|Auth|' + echo -n 'AuthMethodFallback|AuthMethodInvalidPublicKey|' + echo -n 'AuthMethodKeyboardInteractive|AuthMethodPassword|' + echo -n 'AuthMethodRSAandDSA|AuthMethodWrongKeyboardInteractive|' + echo -n 'AuthMethodWrongPassword|AuthorizedKeyBasic|' + echo -n 'AuthWithInvalidSpace|AuthWithMissingQuote|' + echo -n 'AuthWithQuotedCommaInEnv|AuthWithQuotedQuoteInEnv|' + echo -n 'AuthWithQuotedSpaceInEnv|AutoPortListenBroken|BadSMP|' + echo -n 'BareMarshal|BareMarshalUnmarshal|BaseScalarMult|' + echo -n 'Basic|BcryptingIsCorrect|BcryptingIsEasy|Bilinearity|' + echo -n 'Blocksize|Box|BufferClose|BufferReadwrite|CampbellQuine|' + echo -n 'CanonicalText|Cert|CertLogin|Cipher|CipherDecrypt|' + echo -n 'CipherDecrypt|CipherEncrypt|CipherEncrypt|CipherInit|' + echo -n 'Ciphers|ClientAuthPublicKey|ClientHandlesKeepalives|' + echo -n 'ClientHMAC|ClientLoginCert|ClientUnsupportedCipher|' + echo -n 'ClientUnsupportedKex|ClientWriteEOF|Close|Compressed|' + echo -n 'Conversation|Core208|Cost|CostReturnsWithLeadingZeroes|' + echo -n 'CostValidationInHash|CurveImpl|CustomClientVersion|' + echo -n 'Debug|DecodeEncode|DecryptingEncryptedKey|' + echo -n 'DefaultCiphersExist|DefaultClientVersion|' + echo -n 'DetachedSignature|DetachedSignatureDSA|Dial|' + echo -n 'DoubleClose|DSAHashTruncatation|Ecc384Serialize|' + echo -n 'EncodeDecode|EncryptDecrypt|EncryptingEncryptedKey|' + echo -n 'Encryption|ExchangeVersions|ExchangeVersionsBasic|' + echo -n 'ExitSignalAndStatus|ExitStatusNonZero|ExitStatusZero|' + echo -n 'ExitWithoutStatusOrSignal|ExternallyRevocableKey|Full|' + echo -n 'G1Identity|G1Marshal|G2Identity|G2Marshal|GetKeyById|' + echo -n 'GFp12Invert|GFp2Invert|GFp6Invert|Golden|GoodSMP|' + echo -n 'HandshakeAutoRekeyRead|HandshakeAutoRekeyWrite|' + echo -n 'HandshakeBasic|HandshakeError|HandshakeTwice|HKDF|' + echo -n 'HKDFLimit|HKDFMultiRead|HostKeyCert|HostKeyCheck|' + echo -n 'IdVerification|IntLength|InvalidEntry|' + echo -n 'InvalidHashErrors|InvalidKeySize|' + echo -n 'InvalidServerConfiguration|InvalidTerminalMode|' + echo -n 'IsQuery|Iterated|KeccakKats|Kexes|Key|KeyExpiry|' + echo -n 'KeyMarshalParse|KeyPresses|KeyRevocation|' + echo -n 'KeySerialization|KeySignVerify|KeyUsage|' + echo -n 'KnownExitSignalOnly|Limited|LockClient|LockServer|' + echo -n 'LongHeader|MACs|MarshalParsePublicKey|MarshalPtr|' + echo -n 'MarshalUnmarshal|MillionA|MinorNotRequired|' + echo -n 'MissingHashFunction|MuxChannelCloseWriteUnblock|' + echo -n 'MuxChannelExtendedThreadSafety|MuxChannelOverflow|' + echo -n 'MuxChannelRequest|MuxChannelRequestUnblock|' + echo -n 'MuxCloseChannel|MuxCloseWriteChannel|' + echo -n 'MuxConnectionCloseWriteUnblock|MuxDisconnect|' + echo -n 'MuxGlobalRequest|MuxGlobalRequestUnblock|' + echo -n 'MuxInvalidRecord|MuxMaxPacketSize|MuxReadWrite|' + echo -n 'MuxReject|NewEntity|NewPublicKey|NewUserId|' + echo -n 'NewUserIdWithInvalidInput|NoArmoredData|' + echo -n 'NoPermissionsPassing|OCFB|OCSPDecode|' + echo -n 'OCSPDecodeWithoutCert|OCSPRequest|' + echo -n 'OCSPResponse|OCSPSignature|OpaqueParseReason|OrderG1|' + echo -n 'OrderG2|OrderGT|PacketCiphers|Parse|Parse|ParseCert|' + echo -n 'ParseCertWithOptions|ParseDSA|ParseECPrivateKey|' + echo -n 'ParseLibOTRPrivateKey|ParseRSAPrivateKey|' + echo -n 'ParseUserAttribute|ParseUserId|ParseWithNoNewlineAtEnd|' + echo -n 'PartialLengthReader|PartialLengths|PasswordNotSaved|' + echo -n 'PermissionsPassing|PortForward|' + echo -n 'PortForwardConnectionClose|PrivateKeyRead|' + echo -n 'PublicKeyRead|PublicKeySerialize|PublicKeyV3Read|' + echo -n 'PublicKeyV3Serialize|ReadDSAKey|ReadFull|ReadHeader|' + echo -n 'ReadingArmoredPrivateKey|ReadingArmoredPublicKey|' + echo -n 'ReadKeyRing|ReadLength|ReadPrivateKeyRing|ReadVersion|' + echo -n 'ReadVersionError|RereadKeyRing|RunCommandFailed|Salsa20|' + echo -n 'Salted|SaltedCipher|SaltedCipherKeyLength|Sbox|SealOpen|' + echo -n 'SealOpen|SecretBox|Serialize|Serialize|SerializeHeader|' + echo -n 'SerializeSymmetricKeyEncrypted|Server|ServerWindow|' + echo -n 'SessionCombinedOutput|SessionID|SessionOutput|' + echo -n 'SessionShell|SessionStdoutPipe|SetupForwardAgent|' + echo -n 'SignatureRead|SignatureReserialize|SignatureV3Read|' + echo -n 'SignatureV3Reserialize|SignDetached|SignDetachedDSA|' + echo -n 'SignedEncryptedMessage|SignedMessage|Signing|' + echo -n 'SignTextDetached|SignVerify|Squeezing|SubkeyRevocation|' + echo -n 'Sum|SymmetricallyEncrypted|SymmetricEncryption|' + echo -n 'SymmetricKeyEncrypted|TerminalSetSize|TextSignedMessage|' + echo -n 'TooLongPasswordsWork|TransportMaxPacketReader|' + echo -n 'TransportMaxPacketWrite|TripartiteDiffieHellman|' + echo -n 'UnknownExitSignal|UnknownHashFunction|UnmarshalEmptyPacket|' + echo -n 'UnmarshalUnexpectedPacket|UnpaddedBase64Encoding|' + echo -n 'UnspecifiedRecipient|UnsupportedCurves|ValidateCert|' + echo -n 'ValidateCertTime|Vectors|VeryShortPasswords|WithHMACSHA1|' + echo -n 'WithHMACSHA256|XSalsa20|XTS|ZeroWindowAdjust)$') \ + -x -v ${GO_PN}/... || die $? +} + +src_install() { + insinto /usr/lib/go + find "${WORKDIR}"/{pkg,src} -name '.git*' -exec rm -rf {} \; 2>/dev/null + doins -r "${WORKDIR}"/{pkg,src} +} |