mirror of
git://slackware.nl/current.git
synced 2025-01-12 08:03:03 +01:00
85535b49c4
a/kernel-generic-5.4.55-x86_64-1.txz: Upgraded. a/kernel-huge-5.4.55-x86_64-1.txz: Upgraded. a/kernel-modules-5.4.55-x86_64-1.txz: Upgraded. ap/sysstat-12.4.0-x86_64-1.txz: Upgraded. d/cmake-3.18.1-x86_64-1.txz: Upgraded. d/kernel-headers-5.4.55-x86-1.txz: Upgraded. d/python-pip-20.2-x86_64-1.txz: Upgraded. d/re2c-2.0.1-x86_64-1.txz: Upgraded. d/rust-1.45.1-x86_64-1.txz: Upgraded. k/kernel-source-5.4.55-noarch-1.txz: Upgraded. l/libvpx-1.9.0-x86_64-1.txz: Upgraded. l/mozjs60-60.9.0esr-x86_64-1.txz: Removed. l/mozjs68-68.11.0esr-x86_64-1.txz: Added. IMPORTANT: This is needed for polkit-0.117. l/polkit-0.117-x86_64-1.txz: Upgraded. x/libX11-1.6.10-x86_64-1.txz: Upgraded. xap/mozilla-thunderbird-68.11.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/68.11.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2020-35/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
27 lines
1.1 KiB
Diff
27 lines
1.1 KiB
Diff
--- a/python/mozbuild/mozbuild/test/frontend/test_emitter.py
|
|
+++ b/python/mozbuild/mozbuild/test/frontend/test_emitter.py
|
|
@@ -1051,24 +1051,6 @@
|
|
|
|
self.assertEqual(local_includes, expected)
|
|
|
|
- def test_local_includes_invalid(self):
|
|
- """Test that invalid LOCAL_INCLUDES are properly detected."""
|
|
- reader = self.reader('local_includes-invalid/srcdir')
|
|
-
|
|
- with self.assertRaisesRegexp(
|
|
- SandboxValidationError,
|
|
- 'Path specified in LOCAL_INCLUDES.*resolves to the '
|
|
- 'topsrcdir or topobjdir'):
|
|
- objs = self.read_topsrcdir(reader)
|
|
-
|
|
- reader = self.reader('local_includes-invalid/objdir')
|
|
-
|
|
- with self.assertRaisesRegexp(
|
|
- SandboxValidationError,
|
|
- 'Path specified in LOCAL_INCLUDES.*resolves to the '
|
|
- 'topsrcdir or topobjdir'):
|
|
- objs = self.read_topsrcdir(reader)
|
|
-
|
|
def test_local_includes_file(self):
|
|
"""Test that a filename can't be used in LOCAL_INCLUDES."""
|
|
reader = self.reader('local_includes-filename')
|