~ruther/guix-local

ref: aa21c764d65068783ae31febee2a92eb3d138a24 guix-local/gnu/packages/patches/duplicity-piped-password.patch -rw-r--r-- 883 bytes
aa21c764 — Leo Famulari gnu: python-pycrypto: Fix CVE-2013-7459. 9 years ago
                                                                                
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
This test, on three occasions, is failing with the error:

  EOF: End Of File (EOF) in read_nonblocking(). Braindead platform.

--- duplicity-0.6.24/testing/functional/test_final.py	2014-09-28 13:14:52.146001614 -0500
+++ duplicity-0.6.24/testing/functional/test_final.py	2014-09-28 13:13:20.333546342 -0500
@@ -156,13 +156,6 @@
         self.run_duplicity(options=["remove-older-than", "50000", "--force", self.backend_url])
         self.assertEqual(self.get_backend_files(), second_chain)
 
-    def test_piped_password(self):
-        """Make sure that prompting for a password works"""
-        self.set_environ("PASSPHRASE", None)
-        self.backup("full", "testfiles/empty_dir",
-                    passphrase_input=[self.sign_passphrase, self.sign_passphrase])
-        self.restore(passphrase_input=[self.sign_passphrase])
-
 
 class OldFilenamesFinalTest(FinalTest):