Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 582768 Details for
Bug 689776
dev-util/vint-0.3.19 fails tests: E ValueError: No JSON object could be decoded
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
dev-util:vint-0.3.19:20190713-135512.log
dev-util:vint-0.3.19:20190713-135512.log (text/plain), 180.18 KB, created by
Toralf Förster
on 2019-07-13 14:28:42 UTC
(
hide
)
Description:
dev-util:vint-0.3.19:20190713-135512.log
Filename:
MIME Type:
Creator:
Toralf Förster
Created:
2019-07-13 14:28:42 UTC
Size:
180.18 KB
patch
obsolete
> * Package: dev-util/vint-0.3.19 > * Repository: gentoo > * Maintainer: itumaykin+gentoo@gmail.com proxy-maint@gentoo.org > * USE: abi_x86_64 amd64 elibc_glibc kernel_linux python_targets_python2_7 python_targets_python3_6 test userland_GNU > * FEATURES: network-sandbox preserve-libs sandbox test userpriv usersandbox >>>> Unpacking source... >>>> Unpacking vint-0.3.19.tar.gz to /var/tmp/portage/dev-util/vint-0.3.19/work >>>> Source unpacked in /var/tmp/portage/dev-util/vint-0.3.19/work >>>> Preparing source in /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19 ... >>>> Source prepared. >>>> Configuring source in /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19 ... >>>> Source configured. >>>> Compiling source in /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19 ... > * python2_7: running distutils-r1_run_phase distutils-r1_python_compile >python2.7 setup.py build >running build >running build_py >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint >copying vint/bootstrap.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint >copying vint/asset.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint >copying vint/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/utils >copying vint/utils/array.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/utils >copying vint/utils/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/utils >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >copying vint/linting/policy_set.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >copying vint/linting/policy_registry.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >copying vint/linting/linter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >copying vint/linting/level.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >copying vint/linting/file_filter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >copying vint/linting/env.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >copying vint/linting/cli.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >copying vint/linting/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/encodings >copying vint/encodings/decoding_strategy.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/encodings >copying vint/encodings/decoder.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/encodings >copying vint/encodings/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/encodings >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/compat >copying vint/compat/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/compat >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast >copying vint/ast/traversing.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast >copying vint/ast/parsing.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast >copying vint/ast/node_type.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast >copying vint/ast/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/_bundles >copying vint/_bundles/vimlparser.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/_bundles >copying vint/_bundles/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/_bundles >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_using_undeclared_variable.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_unused_variable.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_unnecessary_double_quote.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_set_nocompatible.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_no_abort_function.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_missing_scriptencoding.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_invalid_map_call.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_implicit_scope_variable.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_implicit_scope_builtin_variable.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_equal_tilde_operator.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_encoding_opt_after_scriptencoding.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_command_with_unintended_side_effect.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_command_rely_on_user.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_autocmd_with_no_group.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/prohibit_abbreviation_option.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/abstract_policy.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >copying vint/linting/policy/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/formatter >copying vint/linting/formatter/statistic_formatter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/formatter >copying vint/linting/formatter/json_formatter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/formatter >copying vint/linting/formatter/formatter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/formatter >copying vint/linting/formatter/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/formatter >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_util.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_project_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_global_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_filenames.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_file_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_dict_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_default_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_container.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_comment_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/config_cmdargs_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >copying vint/linting/config/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy/reference >copying vint/linting/policy/reference/googlevimscriptstyleguide.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy/reference >copying vint/linting/policy/reference/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/policy/reference >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/compat/unittest >copying vint/compat/unittest/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/compat/unittest >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/compat/itertools >copying vint/compat/itertools/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/compat/itertools >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin >copying vint/ast/plugin/builtin_identifiers.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin >copying vint/ast/plugin/abstract_ast_plugin.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin >copying vint/ast/plugin/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/dictionary >copying vint/ast/dictionary/builtins.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/dictionary >copying vint/ast/dictionary/autocmd_events.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/dictionary >copying vint/ast/dictionary/abbreviations.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/dictionary >copying vint/ast/dictionary/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/dictionary >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/two_way_scope_reference_attacher.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/scope_linker.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/scope_detector.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/reference_reachability_tester.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/redir_assignment_parser.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/map_and_filter_parser.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/identifier_classifier.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/ast/plugin/scope_plugin >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/asset >copying vint/asset/default_config.yaml -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/asset >copying vint/asset/void_config.yaml -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/asset >warning: build_py: byte-compiling is disabled, skipping. > > * python3_6: running distutils-r1_run_phase distutils-r1_python_compile >python3.6 setup.py build >running build >running build_py >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint >copying vint/bootstrap.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint >copying vint/asset.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint >copying vint/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/utils >copying vint/utils/array.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/utils >copying vint/utils/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/utils >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >copying vint/linting/policy_set.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >copying vint/linting/policy_registry.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >copying vint/linting/linter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >copying vint/linting/level.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >copying vint/linting/file_filter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >copying vint/linting/env.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >copying vint/linting/cli.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >copying vint/linting/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/encodings >copying vint/encodings/decoding_strategy.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/encodings >copying vint/encodings/decoder.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/encodings >copying vint/encodings/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/encodings >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/compat >copying vint/compat/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/compat >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast >copying vint/ast/traversing.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast >copying vint/ast/parsing.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast >copying vint/ast/node_type.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast >copying vint/ast/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/_bundles >copying vint/_bundles/vimlparser.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/_bundles >copying vint/_bundles/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/_bundles >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_using_undeclared_variable.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_unused_variable.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_unnecessary_double_quote.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_set_nocompatible.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_no_abort_function.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_missing_scriptencoding.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_invalid_map_call.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_implicit_scope_variable.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_implicit_scope_builtin_variable.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_equal_tilde_operator.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_encoding_opt_after_scriptencoding.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_command_with_unintended_side_effect.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_command_rely_on_user.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_autocmd_with_no_group.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/prohibit_abbreviation_option.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/abstract_policy.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >copying vint/linting/policy/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/formatter >copying vint/linting/formatter/statistic_formatter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/formatter >copying vint/linting/formatter/json_formatter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/formatter >copying vint/linting/formatter/formatter.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/formatter >copying vint/linting/formatter/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/formatter >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_util.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_project_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_global_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_filenames.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_file_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_dict_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_default_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_container.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_comment_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/config_cmdargs_source.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >copying vint/linting/config/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/config >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy/reference >copying vint/linting/policy/reference/googlevimscriptstyleguide.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy/reference >copying vint/linting/policy/reference/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/linting/policy/reference >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/compat/unittest >copying vint/compat/unittest/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/compat/unittest >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/compat/itertools >copying vint/compat/itertools/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/compat/itertools >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin >copying vint/ast/plugin/builtin_identifiers.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin >copying vint/ast/plugin/abstract_ast_plugin.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin >copying vint/ast/plugin/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/dictionary >copying vint/ast/dictionary/builtins.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/dictionary >copying vint/ast/dictionary/autocmd_events.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/dictionary >copying vint/ast/dictionary/abbreviations.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/dictionary >copying vint/ast/dictionary/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/dictionary >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/two_way_scope_reference_attacher.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/scope_linker.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/scope_detector.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/reference_reachability_tester.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/redir_assignment_parser.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/map_and_filter_parser.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/identifier_classifier.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >copying vint/ast/plugin/scope_plugin/__init__.py -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/ast/plugin/scope_plugin >creating /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/asset >copying vint/asset/default_config.yaml -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/asset >copying vint/asset/void_config.yaml -> /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python3_6/lib/vint/asset >warning: build_py: byte-compiling is disabled, skipping. > >>>> Source compiled. >>>> Test phase: dev-util/vint-0.3.19 > * python2_7: running distutils-r1_run_phase python_test >============================= test session starts ============================== >platform linux2 -- Python 2.7.16, pytest-4.5.0, py-1.5.4, pluggy-0.11.0 -- /usr/bin/python2.7 >cachedir: .pytest_cache >hypothesis profile 'default' -> database=DirectoryBasedExampleDatabase('/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/.hypothesis/examples') >rootdir: /var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19 >plugins: xprocess-0.12.1, xdist-1.28.0, forked-0.2, flakes-4.0.0, hypothesis-4.15.0, flaky-3.5.3, backports.unittest-mock-1.4 >collecting ... collected 272 items > >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_color_flag <- ../../../../../../../usr/lib64/python2.7/unittest/case.py SKIPPED [ 0%] >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_invalid_file_on_project_root FAILED [ 0%] >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_json_flag FAILED [ 1%] >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_no_args PASSED [ 1%] >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_stat_flag FAILED [ 1%] >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_unexistent_file PASSED [ 2%] >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_valid_file_encoded_cp932_on_project_root FAILED [ 2%] >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_valid_file_on_project_root FAILED [ 2%] >test/acceptance/test_cli.py::TestCLI::test_exec_vint_with_verbose_flag FAILED [ 3%] >test/acceptance/test_cli_vital.py::TestVintDoNotDiedWhenLintingVital::test_survive_after_linting PASSED [ 3%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_declarative_identifiers_referenced_with_referenced_all PASSED [ 4%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_declarative_identifiers_referenced_with_referenced_all_func PASSED [ 4%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_declarative_identifiers_referenced_with_referenced_all_funcs_in_func PASSED [ 4%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_declarative_identifiers_referenced_with_unreferenced_func_in_func PASSED [ 5%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_referenced_all PASSED [ 5%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_referenced_all_func PASSED [ 5%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_referenced_all_funcs_in_func PASSED [ 6%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_referenced_all_params PASSED [ 6%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_referenced_loop_var PASSED [ 6%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_unanalyzable PASSED [ 7%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_unreferenced_func PASSED [ 7%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_unreferenced_params PASSED [ 8%] >test/integration/vint/ast/plugin/test_scope_plugin.py::TestScopePlugin::test_reference_reachability_with_unreferenced_var PASSED [ 8%] >test/integration/vint/linting/test_linter.py::TestLinterIntegral::test_lint PASSED [ 8%] >test/integration/vint/linting/test_linter.py::TestLinterIntegral::test_lint_with_broken_file PASSED [ 9%] >test/integration/vint/linting/policy/test_prohibit_abbreviation_option.py::TestProhibitAbbreviationOption::test_get_violation_if_found_when_file_is_invalid_with_set FAILED [ 9%] >test/integration/vint/linting/policy/test_prohibit_abbreviation_option.py::TestProhibitAbbreviationOption::test_get_violation_if_found_when_file_is_invalid_with_var FAILED [ 9%] >test/integration/vint/linting/policy/test_prohibit_abbreviation_option.py::TestProhibitAbbreviationOption::test_get_violation_if_found_when_file_is_valid FAILED [ 10%] >test/integration/vint/linting/policy/test_prohibit_autocmd_with_no_group.py::TestProhibitAutocmdWithNoGroup::test_get_violation_if_found_with_invalid_file FAILED [ 10%] >test/integration/vint/linting/policy/test_prohibit_autocmd_with_no_group.py::TestProhibitAutocmdWithNoGroup::test_get_violation_if_found_with_valid_file_with_augroup FAILED [ 11%] >test/integration/vint/linting/policy/test_prohibit_autocmd_with_no_group.py::TestProhibitAutocmdWithNoGroup::test_get_violation_if_found_with_valid_file_with_group_param FAILED [ 11%] >test/integration/vint/linting/policy/test_prohibit_command_rely_on_user.py::TestProhibitCommandRelyOnUser::test_get_violation_if_found_when_file_is_invalid FAILED [ 11%] >test/integration/vint/linting/policy/test_prohibit_command_rely_on_user.py::TestProhibitCommandRelyOnUser::test_get_violation_if_found_when_file_is_valid FAILED [ 12%] >test/integration/vint/linting/policy/test_prohibit_command_with_unintented_side_effect.py::TestProhibitCommandWithUnintendedSideEffect::test_get_violation_if_found_with_invalid_file FAILED [ 12%] >test/integration/vint/linting/policy/test_prohibit_command_with_unintented_side_effect.py::TestProhibitCommandWithUnintendedSideEffect::test_get_violation_if_found_with_valid_file FAILED [ 12%] >test/integration/vint/linting/policy/test_prohibit_encoding_opt_after_scriptencoding.py::TestProhibitEncodingOptionAfterScriptEncoding::test_get_violation_if_found_with_invalid_file FAILED [ 13%] >test/integration/vint/linting/policy/test_prohibit_encoding_opt_after_scriptencoding.py::TestProhibitEncodingOptionAfterScriptEncoding::test_get_violation_if_found_with_valid_file FAILED [ 13%] >test/integration/vint/linting/policy/test_prohibit_encoding_opt_after_scriptencoding.py::TestProhibitEncodingOptionAfterScriptEncoding::test_get_violation_if_found_with_valid_file_no_encoding_option FAILED [ 13%] >test/integration/vint/linting/policy/test_prohibit_encoding_opt_after_scriptencoding.py::TestProhibitEncodingOptionAfterScriptEncoding::test_get_violation_if_found_with_valid_file_no_scriptencoding FAILED [ 14%] >test/integration/vint/linting/policy/test_prohibit_equal_tilde_operator.py::TestProhibitEqualTildeOperator::test_get_violation_if_found_when_file_is_invalid FAILED [ 14%] >test/integration/vint/linting/policy/test_prohibit_equal_tilde_operator.py::TestProhibitEqualTildeOperator::test_get_violation_if_found_when_file_is_valid FAILED [ 15%] >test/integration/vint/linting/policy/test_prohibit_implicit_scope_builtin_variable.py::TestProhibitImplicitScopeBuiltinVariable::test_get_violation_if_found_when_file_is_invalid FAILED [ 15%] >test/integration/vint/linting/policy/test_prohibit_implicit_scope_builtin_variable.py::TestProhibitImplicitScopeBuiltinVariable::test_get_violation_if_found_when_file_is_valid FAILED [ 15%] >test/integration/vint/linting/policy/test_prohibit_implicit_scope_variable.py::TestProhibitImplicitScopeVariable::test_get_violation_if_found_when_file_is_invalid FAILED [ 16%] >test/integration/vint/linting/policy/test_prohibit_implicit_scope_variable.py::TestProhibitImplicitScopeVariable::test_get_violation_if_found_when_file_is_valid FAILED [ 16%] >test/integration/vint/linting/policy/test_prohibit_invalid_map_call.py::TestProhibitInvalidMapCall::test_get_violation_if_found_with_invalid FAILED [ 16%] >test/integration/vint/linting/policy/test_prohibit_invalid_map_call.py::TestProhibitInvalidMapCall::test_get_violation_if_found_with_valid FAILED [ 17%] >test/integration/vint/linting/policy/test_prohibit_missing_scriptencoding.py::TestProhibitMissingScriptEncoding::test_get_violation_if_found_with_invalid_file FAILED [ 17%] >test/integration/vint/linting/policy/test_prohibit_missing_scriptencoding.py::TestProhibitMissingScriptEncoding::test_get_violation_if_found_with_valid_file_no_multibyte_char FAILED [ 18%] >test/integration/vint/linting/policy/test_prohibit_missing_scriptencoding.py::TestProhibitMissingScriptEncoding::test_get_violation_if_found_with_valid_file_scriptencoding FAILED [ 18%] >test/integration/vint/linting/policy/test_prohibit_no_abort_function.py::TestProhibitNoAbortFunction::test_get_violation_if_found_when_file_is_invalid FAILED [ 18%] >test/integration/vint/linting/policy/test_prohibit_no_abort_function.py::TestProhibitNoAbortFunction::test_get_violation_if_found_when_file_is_valid FAILED [ 19%] >test/integration/vint/linting/policy/test_prohibit_no_abort_function.py::TestProhibitNoAbortFunction::test_get_violation_if_found_when_file_is_valid_out_of_autoload FAILED [ 19%] >test/integration/vint/linting/policy/test_prohibit_set_nocompatible.py::TestProhibitSetNoCompatible::test_get_violation_if_found_with_invalid_file FAILED [ 19%] >test/integration/vint/linting/policy/test_prohibit_set_nocompatible.py::TestProhibitSetNoCompatible::test_get_violation_if_found_with_invalid_file_with_abbreviation FAILED [ 20%] >test/integration/vint/linting/policy/test_prohibit_set_nocompatible.py::TestProhibitSetNoCompatible::test_get_violation_if_found_with_valid FAILED [ 20%] >test/integration/vint/linting/policy/test_prohibit_unnecessary_double_quote.py::TestProhibitUnnecessaryDoubleQuote::test_get_violation_if_found_when_file_is_invalid FAILED [ 20%] >test/integration/vint/linting/policy/test_prohibit_unnecessary_double_quote.py::TestProhibitUnnecessaryDoubleQuote::test_get_violation_if_found_when_file_is_valid FAILED [ 21%] >test/integration/vint/linting/policy/test_prohibit_unused_variable.py::TestProhibitUnusedVariable::test_get_violation_if_found_when_file_is_invalid FAILED [ 21%] >test/integration/vint/linting/policy/test_prohibit_unused_variable.py::TestProhibitUnusedVariable::test_get_violation_if_found_when_file_is_valid FAILED [ 22%] >test/integration/vint/linting/policy/test_prohibit_using_undeclared_variable.py::TestProhibitUsingUndeclaredVariable::test_get_violation_if_found_when_file_is_invalid FAILED [ 22%] >test/integration/vint/linting/policy/test_prohibit_using_undeclared_variable.py::TestProhibitUsingUndeclaredVariable::test_get_violation_if_found_when_file_is_valid FAILED [ 22%] >test/unit/vint/ast/test_node_type.py::TestNodeType::test_get_node_type_name PASSED [ 23%] >test/unit/vint/ast/test_parsing.py::TestParser::test_parse_empty_file PASSED [ 23%] >test/unit/vint/ast/test_parsing.py::TestParser::test_parse_file PASSED [ 23%] >test/unit/vint/ast/test_parsing.py::TestParser::test_parse_file_on_ff_dos_and_fenc_cp932 PASSED [ 24%] >test/unit/vint/ast/test_parsing.py::TestParser::test_parse_file_when_neovim_enabled PASSED [ 24%] >test/unit/vint/ast/test_parsing.py::TestParser::test_parse_redir_with_dot PASSED [ 25%] >test/unit/vint/ast/test_parsing.py::TestParser::test_parse_redir_with_identifier PASSED [ 25%] >test/unit/vint/ast/test_parsing.py::TestParser::test_parse_string_expr PASSED [ 25%] >test/unit/vint/ast/test_traversing.py::TestTraverse::test_traverse PASSED [ 26%] >test/unit/vint/ast/test_traversing.py::TestTraverse::test_traverse_ignoring_while_children PASSED [ 26%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_arithmetic_assignment PASSED [ 26%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_calling_func PASSED [ 27%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_declaring_func PASSED [ 27%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_declaring_func_in_func PASSED [ 27%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_declaring_var PASSED [ 28%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_declaring_var_in_func PASSED [ 28%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_declaring_with_dict_key PASSED [ 29%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_destructuring_assignment PASSED [ 29%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_func_param PASSED [ 29%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_loop_var PASSED [ 30%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_map_func PASSED [ 30%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_classifier.py::TestIdentifierClassifier::test_attach_identifier_attributes_with_redir PASSED [ 30%] >test/unit/vint/ast/plugin/scope_plugin/test_identifier_collector.py::TestIdentifierCollector::test_bucket PASSED [ 31%] >test/unit/vint/ast/plugin/scope_plugin/test_map_and_filter_parser.py::TestMapAndFilterParser::test_issue_256 PASSED [ 31%] >test/unit/vint/ast/plugin/scope_plugin/test_map_and_filter_parser.py::TestMapAndFilterParser::test_nested_filter PASSED [ 31%] >test/unit/vint/ast/plugin/scope_plugin/test_map_and_filter_parser.py::TestMapAndFilterParser::test_nested_map PASSED [ 32%] >test/unit/vint/ast/plugin/scope_plugin/test_map_and_filter_parser.py::TestMapAndFilterParser::test_process_with_filter_function PASSED [ 32%] >test/unit/vint/ast/plugin/scope_plugin/test_map_and_filter_parser.py::TestMapAndFilterParser::test_process_with_map_function PASSED [ 33%] >test/unit/vint/ast/plugin/scope_plugin/test_map_and_filter_parser.py::TestMapAndFilterParser::test_traverse PASSED [ 33%] >test/unit/vint/ast/plugin/scope_plugin/test_redir_assignment_parser.py::TestRedirAssignmentParser::test_process PASSED [ 33%] >test/unit/vint/ast/plugin/scope_plugin/test_redir_assignment_parser.py::TestRedirAssignmentParser::test_traverse PASSED [ 34%] >test/unit/vint/ast/plugin/scope_plugin/test_reference_reachability_tester.py::TestReferenceReachabilityTester::test_builtin_reference_by_process PASSED [ 34%] >test/unit/vint/ast/plugin/scope_plugin/test_reference_reachability_tester.py::TestReferenceReachabilityTester::test_reachable_reference_by_process PASSED [ 34%] >test/unit/vint/ast/plugin/scope_plugin/test_reference_reachability_tester.py::TestReferenceReachabilityTester::test_referenced_function_reference_by_process PASSED [ 35%] >test/unit/vint/ast/plugin/scope_plugin/test_reference_reachability_tester.py::TestReferenceReachabilityTester::test_referenced_variable_by_process PASSED [ 35%] >test/unit/vint/ast/plugin/scope_plugin/test_reference_reachability_tester.py::TestReferenceReachabilityTester::test_referenced_variable_reference_by_process PASSED [ 36%] >test/unit/vint/ast/plugin/scope_plugin/test_reference_reachability_tester.py::TestReferenceReachabilityTester::test_unreachable_reference_by_process PASSED [ 36%] >test/unit/vint/ast/plugin/scope_plugin/test_reference_reachability_tester.py::TestReferenceReachabilityTester::test_unreferenced_reference_by_process PASSED [ 36%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node0-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 37%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node1-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 37%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node2-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 37%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node3-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 38%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node4-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 38%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node5-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 38%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node6-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 39%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node7-ScopeVisibility.SCRIPT_LOCAL-False] PASSED [ 39%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node8-ScopeVisibility.SCRIPT_LOCAL-False] PASSED [ 40%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node9-ScopeVisibility.FUNCTION_LOCAL-False] PASSED [ 40%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node10-ScopeVisibility.FUNCTION_LOCAL-True] PASSED [ 40%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node11-ScopeVisibility.FUNCTION_LOCAL-False] PASSED [ 41%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node12-ScopeVisibility.BUILTIN-False] PASSED [ 41%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node13-ScopeVisibility.BUILTIN-False] PASSED [ 41%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node14-ScopeVisibility.BUILTIN-True] PASSED [ 42%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node15-ScopeVisibility.UNANALYZABLE-False] PASSED [ 42%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node16-ScopeVisibility.UNANALYZABLE-False] PASSED [ 43%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node17-ScopeVisibility.UNANALYZABLE-False] PASSED [ 43%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node18-ScopeVisibility.UNANALYZABLE-False] PASSED [ 43%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node19-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 44%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node20-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 44%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node21-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 44%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node22-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 45%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node23-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 45%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node24-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 45%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node25-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 46%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node26-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 46%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node27-ScopeVisibility.SCRIPT_LOCAL-False] PASSED [ 47%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node28-ScopeVisibility.SCRIPT_LOCAL-False] PASSED [ 47%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node29-ScopeVisibility.INVALID-False] PASSED [ 47%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node30-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 48%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node31-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 48%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node32-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 48%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node33-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 49%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node34-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 49%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node35-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 50%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node36-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 50%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node37-ScopeVisibility.SCRIPT_LOCAL-False] PASSED [ 50%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node38-ScopeVisibility.SCRIPT_LOCAL-False] PASSED [ 51%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node39-ScopeVisibility.FUNCTION_LOCAL-False] PASSED [ 51%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node40-ScopeVisibility.FUNCTION_LOCAL-True] PASSED [ 51%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node41-ScopeVisibility.FUNCTION_LOCAL-False] PASSED [ 52%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node42-ScopeVisibility.FUNCTION_LOCAL-False] PASSED [ 52%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node43-ScopeVisibility.FUNCTION_LOCAL-False] PASSED [ 52%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node44-ScopeVisibility.BUILTIN-False] PASSED [ 53%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node45-ScopeVisibility.BUILTIN-False] PASSED [ 53%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node46-ScopeVisibility.BUILTIN-True] PASSED [ 54%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node47-ScopeVisibility.BUILTIN-False] PASSED [ 54%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node48-ScopeVisibility.UNANALYZABLE-False] PASSED [ 54%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node49-ScopeVisibility.UNANALYZABLE-False] PASSED [ 55%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node50-ScopeVisibility.UNANALYZABLE-False] PASSED [ 55%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node51-ScopeVisibility.UNANALYZABLE-False] PASSED [ 55%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node52-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 56%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node53-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 56%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node54-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 56%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node55-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 57%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node56-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 57%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node57-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 58%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node58-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 58%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node59-ScopeVisibility.GLOBAL_LIKE-True] PASSED [ 58%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node60-ScopeVisibility.SCRIPT_LOCAL-False] PASSED [ 59%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.FUNCTION_LOCAL-id_node61-ScopeVisibility.SCRIPT_LOCAL-False] PASSED [ 59%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_detect_scope_visibility[ScopeVisibility.SCRIPT_LOCAL-id_node62-ScopeVisibility.GLOBAL_LIKE-False] PASSED [ 59%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node0-g:explicit_global] PASSED [ 60%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node1-g:implicit_global] PASSED [ 60%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node2-g:implicit_global] PASSED [ 61%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node3-l:explicit_function_local] PASSED [ 61%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node4-l:implicit_function_local] PASSED [ 61%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node5-l:implicit_function_local] PASSED [ 62%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node6-g:ExplicitGlobalFunc] PASSED [ 62%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node7-s:ExplicitScriptLocalFunc] PASSED [ 62%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node8-g:ImplicitGlobalFunc] PASSED [ 63%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node9-g:ImplicitGlobalFunc] PASSED [ 63%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node10-s:ExplicitScriptLocalFunc] PASSED [ 63%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node11-g:ImplicitGlobalFunc] PASSED [ 64%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node12-l:explicit_function_local] PASSED [ 64%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node13-l:implicit_function_local] PASSED [ 65%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node14-l:implicit_function_local] PASSED [ 65%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node15-param] PASSED [ 65%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node16-v:count] PASSED [ 66%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node17-v:count] PASSED [ 66%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.FUNCTION_LOCAL-node18-v:count] PASSED [ 66%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node19-localtime] PASSED [ 67%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node20-$ENV] PASSED [ 67%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node21-&OPT] PASSED [ 68%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_normalize_variable_name[ScopeVisibility.SCRIPT_LOCAL-node22-@"] PASSED [ 68%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_is_builtin_variable[my_var-False-False] PASSED [ 68%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_is_builtin_variable[count-False-True] PASSED [ 69%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_is_builtin_variable[v:count-False-True] PASSED [ 69%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_is_builtin_variable[key-False-False] PASSED [ 69%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_is_builtin_variable[val-False-False] PASSED [ 70%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_is_builtin_variable[MyFunc-True-False] PASSED [ 70%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_is_builtin_variable[localtime-True-True] PASSED [ 70%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_get_explicity_of_scope_visibility[node0-ExplicityOfScopeVisibility.IMPLICIT] PASSED [ 71%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_get_explicity_of_scope_visibility[node1-ExplicityOfScopeVisibility.EXPLICIT] PASSED [ 71%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_get_explicity_of_scope_visibility[node2-ExplicityOfScopeVisibility.EXPLICIT] PASSED [ 72%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_get_explicity_of_scope_visibility[node3-ExplicityOfScopeVisibility.EXPLICIT] PASSED [ 72%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_detector.py::test_get_explicity_of_scope_visibility[node4-ExplicityOfScopeVisibility.UNANALYZABLE] PASSED [ 72%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_declarative_identifier_links_by_process PASSED [ 73%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_identifier_links_by_process PASSED [ 73%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_reference_variable_links_by_process PASSED [ 73%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_declaring_func PASSED [ 74%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_declaring_func_in_func PASSED [ 74%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_declaring_var PASSED [ 75%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_declaring_var_in_func PASSED [ 75%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_declaring_with_dict_key PASSED [ 75%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_destructuring_assignment PASSED [ 76%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_func_call PASSED [ 76%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_func_param PASSED [ 76%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_loop_var PASSED [ 77%] >test/unit/vint/ast/plugin/scope_plugin/test_scope_linker.py::TestScopeLinker::test_built_scope_tree_by_process_with_redir PASSED [ 77%] >test/unit/vint/ast/plugin/scope_plugin/test_two_way_scope_reference_attacher.py::TestTwoWayScopeReferenceAttacher::test_attach PASSED [ 77%] >test/unit/vint/linting/test_cli.py::TestCLI::test_passing_code_to_stdin_lints_the_code_from_stdin FAILED [ 78%] >test/unit/vint/linting/test_cli.py::TestCLI::test_start_with_both_calid_invalid_file_paths FAILED [ 78%] >test/unit/vint/linting/test_cli.py::TestCLI::test_start_with_invalid_file_path FAILED [ 79%] >test/unit/vint/linting/test_cli.py::TestCLI::test_start_with_no_arg PASSED [ 79%] >test/unit/vint/linting/test_cli.py::TestCLI::test_start_with_unexistent_file_path PASSED [ 79%] >test/unit/vint/linting/test_cli.py::TestCLI::test_start_with_valid_file_path FAILED [ 80%] >test/unit/vint/linting/test_env.py::TestEnv::test_build_environment PASSED [ 80%] >test/unit/vint/linting/test_file_filter.py::TestFileFilter::test_find_vim_script_by_given_a_file_path PASSED [ 80%] >test/unit/vint/linting/test_file_filter.py::TestFileFilter::test_find_vim_script_by_given_a_vim_script_unlinke_file_path PASSED [ 81%] >test/unit/vint/linting/test_file_filter.py::TestFileFilter::test_find_vim_script_by_given_nested_dir PASSED [ 81%] >test/unit/vint/linting/test_file_filter.py::TestFileFilter::test_find_vim_script_by_given_no_file_paths PASSED [ 81%] >test/unit/vint/linting/test_file_filter.py::TestFileFilter::test_find_vim_script_by_given_several_vim_script PASSED [ 82%] >test/unit/vint/linting/test_level.py::TestLevel::test_is_level_enabled_with_higher_level PASSED [ 82%] >test/unit/vint/linting/test_level.py::TestLevel::test_is_level_enabled_with_lower_level PASSED [ 83%] >test/unit/vint/linting/test_level.py::TestLevel::test_is_level_enabled_with_same_level PASSED [ 83%] >test/unit/vint/linting/test_policy_set.py::TestPolicySet::test_get_enabled_policies_when_no_updated PASSED [ 83%] >test/unit/vint/linting/test_policy_set.py::TestPolicySet::test_get_enabled_policies_with_a_disabled_option PASSED [ 84%] >test/unit/vint/linting/test_policy_set.py::TestPolicySet::test_get_enabled_policies_with_severity_style_problem PASSED [ 84%] >test/unit/vint/linting/test_policy_set.py::TestPolicySet::test_get_enabled_policies_with_severity_warning PASSED [ 84%] >test/unit/vint/linting/config/test_config_cmdargs_source.py::TestConfigFileSource::test_get_config_dict PASSED [ 85%] >test/unit/vint/linting/config/test_config_cmdargs_source.py::TestConfigFileSource::test_get_config_dict_with_no_severity PASSED [ 85%] >test/unit/vint/linting/config/test_config_cmdargs_source.py::TestConfigFileSource::test_get_config_dict_with_severity_error PASSED [ 86%] >test/unit/vint/linting/config/test_config_cmdargs_source.py::TestConfigFileSource::test_get_config_dict_with_severity_style_problem PASSED [ 86%] >test/unit/vint/linting/config/test_config_cmdargs_source.py::TestConfigFileSource::test_get_config_dict_with_severity_warning PASSED [ 86%] >test/unit/vint/linting/config/test_config_comment_source.py::TestConfigCommentSource::test_get_config_dict PASSED [ 87%] >test/unit/vint/linting/config/test_config_comment_source.py::TestConfigCommentSource::test_is_requesting_update_when_config_comment_arrived PASSED [ 87%] >test/unit/vint/linting/config/test_config_comment_source.py::TestConfigCommentSource::test_is_requesting_update_when_just_comment_arrived PASSED [ 87%] >test/unit/vint/linting/config/test_config_comment_source.py::TestConfigCommentSource::test_is_requesting_update_when_other_node_arrived PASSED [ 88%] >test/unit/vint/linting/config/test_config_comment_source.py::TestConfigCommentSource::test_update_by_node_by_multiple_switches PASSED [ 88%] >test/unit/vint/linting/config/test_config_comment_source.py::TestConfigCommentSource::test_update_by_node_by_no_switches PASSED [ 88%] >test/unit/vint/linting/config/test_config_comment_source.py::TestConfigCommentSource::test_update_by_node_by_single_switch PASSED [ 89%] >test/unit/vint/linting/config/test_config_container.py::TestConfigContainer::test_get_config_dict PASSED [ 89%] >test/unit/vint/linting/config/test_config_default_source.py::TestConfigDefaultSource::test_get_config_dict FAILED [ 90%] >test/unit/vint/linting/config/test_config_dict_source.py::TestConfigDictSource::test_get_config_dict PASSED [ 90%] >test/unit/vint/linting/config/test_config_file_source.py::TestConfigFileSource::test_get_config_dict FAILED [ 90%] >test/unit/vint/linting/config/test_config_global_source.py::TestConfigGlobalSource::test_get_config_dict FAILED [ 91%] >test/unit/vint/linting/config/test_config_global_source.py::TestConfigGlobalSource::test_get_config_dict_with_default_xdg_config_home FAILED [ 91%] >test/unit/vint/linting/config/test_config_global_source.py::TestConfigGlobalSource::test_get_config_dict_with_no_global_config FAILED [ 91%] >test/unit/vint/linting/config/test_config_project_source.py::TestConfigProjectSource::test_get_config_dict FAILED [ 92%] >test/unit/vint/linting/config/test_config_project_source.py::TestConfigProjectSource::test_get_config_dict_for_no_extname FAILED [ 92%] >test/unit/vint/linting/config/test_config_project_source.py::TestConfigProjectSource::test_get_config_dict_for_short_extname FAILED [ 93%] >test/unit/vint/linting/config/test_config_project_source.py::TestConfigProjectSource::test_get_config_dict_on_sub_directory FAILED [ 93%] >test/unit/vint/linting/config/test_config_project_source.py::TestConfigProjectSource::test_get_config_dict_with_no_global_config FAILED [ 93%] >test/unit/vint/linting/config/test_config_util.py::TestConfigUtil::test_get_config_value_when_empty PASSED [ 94%] >test/unit/vint/linting/config/test_config_util.py::TestConfigUtil::test_get_config_value_when_given_default PASSED [ 94%] >test/unit/vint/linting/config/test_config_util.py::TestConfigUtil::test_get_config_value_when_given_default_but_not_used PASSED [ 94%] >test/unit/vint/linting/config/test_config_util.py::TestConfigUtil::test_get_config_value_when_nested_1_depth PASSED [ 95%] >test/unit/vint/linting/config/test_config_util.py::TestConfigUtil::test_get_config_value_when_nested_2_depth PASSED [ 95%] >test/unit/vint/linting/config/test_config_util.py::TestConfigUtil::test_get_config_value_when_target_is_depth_2_unexistent_dict PASSED [ 95%] >test/unit/vint/linting/config/test_config_util.py::TestConfigUtil::test_get_config_value_when_target_is_dict PASSED [ 96%] >test/unit/vint/linting/formatter/test_formatter.py::TestFormatter::test_format_violations PASSED [ 96%] >test/unit/vint/linting/formatter/test_formatter.py::TestFormatter::test_format_violations_with_format_option PASSED [ 97%] >test/unit/vint/linting/formatter/test_json_formatter.py::TestJSONFormatter::test_format_violations PASSED [ 97%] >test/unit/vint/linting/policy/test_abstract_policy.py::TestAbstractPolicy::test_create_violation_report PASSED [ 97%] >test/unit/vint/linting/policy/test_abstract_policy.py::TestAbstractPolicy::test_get_policy_options PASSED [ 98%] >test/unit/vint/linting/policy/test_abstract_policy.py::TestAbstractPolicy::test_listen_node_types PASSED [ 98%] >test/unit/vint/linting/policy/reference/test_googlevimscriptstyleguide.py::TestGoogleVimScriptStyleGuide::test_get_reference_source PASSED [ 98%] >test/unit/vint/utils/test_array.py::TestUtilsArray::test_flat_map PASSED [ 99%] >test/unit/vint/utils/test_array.py::TestUtilsArray::test_flatten_empty PASSED [ 99%] >test/unit/vint/utils/test_array.py::TestUtilsArray::test_flatten_not_empty PASSED [100%] > >=================================== FAILURES =================================== >___________ TestCLI.test_exec_vint_with_invalid_file_on_project_root ___________ > >self = <test.acceptance.test_cli.TestCLI testMethod=test_exec_vint_with_invalid_file_on_project_root> > > def test_exec_vint_with_invalid_file_on_project_root(self): > invalid_file = str(Path('test', 'fixture', 'cli', 'invalid1.vim')) > cmd = ['bin/vint', invalid_file] > > with self.assertRaises(subprocess.CalledProcessError) as context_manager: > subprocess.check_output(cmd, universal_newlines=True) > > got_output = context_manager.exception.output > > expected_output_pattern = '{file_path}:1:13:'.format(file_path=invalid_file) >> self.assertRegex(got_output, expected_output_pattern) > >test/acceptance/test_cli.py:58: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/acceptance/test_cli.py:11: in assertRegex > assertRegexpMatches(string, pattern) >E AssertionError: Regexp didn't match: 'test/fixture/cli/invalid1.vim:1:13:' not found in '' >----------------------------- Captured stderr call ----------------------------- >Traceback (most recent call last): > File "bin/vint", line 25, in <module> > sys.exit(vint.main()) > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/__init__.py", line 11, in main > init_cli() > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/bootstrap.py", line 22, in init_cli > cli.start() > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 26, in start > config_dict = self._build_config_dict(env) > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 57, in _build_config_dict > ConfigDefaultSource(env), > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config/config_file_source.py", line 13, in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) > File "/usr/lib64/python2.7/site-packages/yaml/__init__.py", line 109, in load > raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 >____________________ TestCLI.test_exec_vint_with_json_flag _____________________ > >self = <test.acceptance.test_cli.TestCLI testMethod=test_exec_vint_with_json_flag> > > def test_exec_vint_with_json_flag(self): > invalid_file = str(Path('test', 'fixture', 'cli', 'invalid1.vim')) > cmd = ['bin/vint', '--json', invalid_file] > > with self.assertRaises(subprocess.CalledProcessError) as context_manager: > # We should not capture STRERR because coverage plugin use it. > subprocess.check_output(cmd, > universal_newlines=True) > > got_output = context_manager.exception.output > > print(got_output) >> self.assertIsInstance(json.loads(got_output), list) > >test/acceptance/test_cli.py:118: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >/usr/lib64/python2.7/json/__init__.py:339: in loads > return _default_decoder.decode(s) >/usr/lib64/python2.7/json/decoder.py:364: in decode > obj, end = self.raw_decode(s, idx=_w(s, 0).end()) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >self = <json.decoder.JSONDecoder object at 0x7efe394cb3d0>, s = '', idx = 0 > > def raw_decode(self, s, idx=0): > """Decode a JSON document from ``s`` (a ``str`` or ``unicode`` > beginning with a JSON document) and return a 2-tuple of the Python > representation and the index in ``s`` where the document ended. > > This can be used to decode a JSON document from a string that may > have extraneous data at the end. > > """ > try: > obj, end = self.scan_once(s, idx) > except StopIteration: >> raise ValueError("No JSON object could be decoded") >E ValueError: No JSON object could be decoded > >/usr/lib64/python2.7/json/decoder.py:382: ValueError >----------------------------- Captured stdout call ----------------------------- > >----------------------------- Captured stderr call ----------------------------- >Traceback (most recent call last): > File "bin/vint", line 25, in <module> > sys.exit(vint.main()) > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/__init__.py", line 11, in main > init_cli() > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/bootstrap.py", line 22, in init_cli > cli.start() > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 26, in start > config_dict = self._build_config_dict(env) > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 57, in _build_config_dict > ConfigDefaultSource(env), > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config/config_file_source.py", line 13, in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) > File "/usr/lib64/python2.7/site-packages/yaml/__init__.py", line 109, in load > raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 >____________________ TestCLI.test_exec_vint_with_stat_flag _____________________ > >self = <test.acceptance.test_cli.TestCLI testMethod=test_exec_vint_with_stat_flag> > > def test_exec_vint_with_stat_flag(self): > invalid_file = str(Path('test', 'fixture', 'cli', 'invalid1.vim')) > cmd = ['bin/vint', '--stat', invalid_file] > > with self.assertRaises(subprocess.CalledProcessError) as context_manager: > subprocess.check_output(cmd, > stderr=subprocess.STDOUT, > universal_newlines=True) > > got_output = context_manager.exception.output > > expected_output_pattern = '{file_path}:1:13:'.format(file_path=invalid_file) > expected_stat_pattern = 'Total' >> self.assertRegex(got_output, expected_output_pattern) > >test/acceptance/test_cli.py:102: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/acceptance/test_cli.py:11: in assertRegex > assertRegexpMatches(string, pattern) >E AssertionError: Regexp didn't match: 'test/fixture/cli/invalid1.vim:1:13:' not found in 'Traceback (most recent call last):\n File "bin/vint", line 25, in <module>\n sys.exit(vint.main())\n File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/__init__.py", line 11, in main\n init_cli()\n File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/bootstrap.py", line 22, in init_cli\n cli.start()\n File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 26, in start\n config_dict = self._build_config_dict(env)\n File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 57, in _build_config_dict\n ConfigDefaultSource(env),\n File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config/config_file_source.py", line 13, in __init__\n self._config_dict = self.convert_config_dict(yaml.load(file_obj))\n File "/usr/lib64/python2.7/site-packages/yaml/__init__.py", line 109, in load\n raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348")\nRuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348\n' >_____ TestCLI.test_exec_vint_with_valid_file_encoded_cp932_on_project_root _____ > >self = <test.acceptance.test_cli.TestCLI testMethod=test_exec_vint_with_valid_file_encoded_cp932_on_project_root> > > def test_exec_vint_with_valid_file_encoded_cp932_on_project_root(self): > valid_file = str(Path('test', 'fixture', 'cli', 'valid-cp932.vim')) > cmd = ['bin/vint', valid_file] > > expected_output = '' > >> self.assertReturnedStdoutEqual(expected_output, cmd) > >test/acceptance/test_cli.py:45: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/acceptance/test_cli.py:27: in assertReturnedStdoutEqual > self.assertEqual(expected_stdout, got_stdout) >E AssertionError: '' != '(no stdout)' >----------------------------- Captured stdout call ----------------------------- >Got stderr: ` >Got stdout: `(no stdout)` >----------------------------- Captured stderr call ----------------------------- >Traceback (most recent call last): > File "bin/vint", line 25, in <module> > sys.exit(vint.main()) > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/__init__.py", line 11, in main > init_cli() > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/bootstrap.py", line 22, in init_cli > cli.start() > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 26, in start > config_dict = self._build_config_dict(env) > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 57, in _build_config_dict > ConfigDefaultSource(env), > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config/config_file_source.py", line 13, in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) > File "/usr/lib64/python2.7/site-packages/yaml/__init__.py", line 109, in load > raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 >____________ TestCLI.test_exec_vint_with_valid_file_on_project_root ____________ > >self = <test.acceptance.test_cli.TestCLI testMethod=test_exec_vint_with_valid_file_on_project_root> > > def test_exec_vint_with_valid_file_on_project_root(self): > valid_file = str(Path('test', 'fixture', 'cli', 'valid1.vim')) > cmd = ['bin/vint', valid_file] > > expected_output = '' > >> self.assertReturnedStdoutEqual(expected_output, cmd) > >test/acceptance/test_cli.py:36: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/acceptance/test_cli.py:27: in assertReturnedStdoutEqual > self.assertEqual(expected_stdout, got_stdout) >E AssertionError: '' != '(no stdout)' >----------------------------- Captured stdout call ----------------------------- >Got stderr: ` >Got stdout: `(no stdout)` >----------------------------- Captured stderr call ----------------------------- >Traceback (most recent call last): > File "bin/vint", line 25, in <module> > sys.exit(vint.main()) > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/__init__.py", line 11, in main > init_cli() > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/bootstrap.py", line 22, in init_cli > cli.start() > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 26, in start > config_dict = self._build_config_dict(env) > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/cli.py", line 57, in _build_config_dict > ConfigDefaultSource(env), > File "/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19-python2_7/lib/vint/linting/config/config_file_source.py", line 13, in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) > File "/usr/lib64/python2.7/site-packages/yaml/__init__.py", line 109, in load > raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 >___________________ TestCLI.test_exec_vint_with_verbose_flag ___________________ > >self = <test.acceptance.test_cli.TestCLI testMethod=test_exec_vint_with_verbose_flag> > > def test_exec_vint_with_verbose_flag(self): > valid_file = str(Path('test', 'fixture', 'cli', 'valid1.vim')) > cmd = ['bin/vint', '--verbose', valid_file] > > got_output = subprocess.check_output(cmd, > universal_newlines=True, >> stderr=subprocess.STDOUT) > >test/acceptance/test_cli.py:127: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >popenargs = (['bin/vint', '--verbose', 'test/fixture/cli/valid1.vim'],) >kwargs = {'stderr': -2, 'universal_newlines': True} >process = <subprocess.Popen object at 0x7efe37f86690> >output = 'Traceback (most recent call last):\n File "bin/vint", line 25, in <module>\n sys.exit(vint.main())\n File "/var/...d() call disabled by Gentoo. See bug #659348")\nRuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348\n' >unused_err = None, retcode = 1 >cmd = ['bin/vint', '--verbose', 'test/fixture/cli/valid1.vim'] > > def check_output(*popenargs, **kwargs): > r"""Run command with arguments and return its output as a byte string. > > If the exit code was non-zero it raises a CalledProcessError. The > CalledProcessError object will have the return code in the returncode > attribute and output in the output attribute. > > The arguments are the same as for the Popen constructor. Example: > > >>> check_output(["ls", "-l", "/dev/null"]) > 'crw-rw-rw- 1 root root 1, 3 Oct 18 2007 /dev/null\n' > > The stdout argument is not allowed as it is used internally. > To capture standard error in the result, use stderr=STDOUT. > > >>> check_output(["/bin/sh", "-c", > ... "ls -l non_existent_file ; exit 0"], > ... stderr=STDOUT) > 'ls: non_existent_file: No such file or directory\n' > """ > if 'stdout' in kwargs: > raise ValueError('stdout argument not allowed, it will be overridden.') > process = Popen(stdout=PIPE, *popenargs, **kwargs) > output, unused_err = process.communicate() > retcode = process.poll() > if retcode: > cmd = kwargs.get("args") > if cmd is None: > cmd = popenargs[0] >> raise CalledProcessError(retcode, cmd, output=output) >E CalledProcessError: Command '['bin/vint', '--verbose', 'test/fixture/cli/valid1.vim']' returned non-zero exit status 1 > >/usr/lib64/python2.7/subprocess.py:223: CalledProcessError > TestProhibitAbbreviationOption.test_get_violation_if_found_when_file_is_invalid_with_set > >self = <test.integration.vint.linting.policy.test_prohibit_abbreviation_option.TestPr...ionOption testMethod=test_get_violation_if_found_when_file_is_invalid_with_set> > > def test_get_violation_if_found_when_file_is_invalid_with_set(self): > expected_violations = [ > self.create_violation(1, 1, INVALID_SET_VIM_SCRIPT), > self.create_violation(2, 1, INVALID_SET_VIM_SCRIPT), > self.create_violation(3, 1, INVALID_SET_VIM_SCRIPT), > self.create_violation(4, 1, INVALID_SET_VIM_SCRIPT), > self.create_violation(5, 1, INVALID_SET_VIM_SCRIPT), > ] > > self.assertFoundViolationsEqual(INVALID_SET_VIM_SCRIPT, > ProhibitAbbreviationOption, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_abbreviation_option.py:41: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitAbbreviationOption.test_get_violation_if_found_when_file_is_invalid_with_var > >self = <test.integration.vint.linting.policy.test_prohibit_abbreviation_option.TestPr...ionOption testMethod=test_get_violation_if_found_when_file_is_invalid_with_var> > > def test_get_violation_if_found_when_file_is_invalid_with_var(self): > expected_violations = [ > self.create_violation(1, 18, INVALID_VAR_VIM_SCRIPT), > self.create_violation(2, 5, INVALID_VAR_VIM_SCRIPT), > ] > > self.assertFoundViolationsEqual(INVALID_VAR_VIM_SCRIPT, > ProhibitAbbreviationOption, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_abbreviation_option.py:52: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitAbbreviationOption.test_get_violation_if_found_when_file_is_valid _ > >self = <test.integration.vint.linting.policy.test_prohibit_abbreviation_option.TestPr...itAbbreviationOption testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(VALID_VIM_SCRIPT, >> ProhibitAbbreviationOption) > >test/integration/vint/linting/policy/test_prohibit_abbreviation_option.py:27: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_ TestProhibitAutocmdWithNoGroup.test_get_violation_if_found_with_invalid_file _ > >self = <test.integration.vint.linting.policy.test_prohibit_autocmd_with_no_group.Test...bitAutocmdWithNoGroup testMethod=test_get_violation_if_found_with_invalid_file> > > def test_get_violation_if_found_with_invalid_file(self): > expected_violations = [ > self.create_violation(1, INVALID_VIM_SCRIPT), > self.create_violation(6, INVALID_VIM_SCRIPT), > self.create_violation(7, INVALID_VIM_SCRIPT), > ] > self.assertFoundViolationsEqual(INVALID_VIM_SCRIPT, > ProhibitAutocmdWithNoGroup, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_autocmd_with_no_group.py:50: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitAutocmdWithNoGroup.test_get_violation_if_found_with_valid_file_with_augroup > >self = <test.integration.vint.linting.policy.test_prohibit_autocmd_with_no_group.Test...ithNoGroup testMethod=test_get_violation_if_found_with_valid_file_with_augroup> > > def test_get_violation_if_found_with_valid_file_with_augroup(self): > self.assertFoundNoViolations(VALID_VIM_SCRIPT_WITH_AUGROUP, >> ProhibitAutocmdWithNoGroup) > >test/integration/vint/linting/policy/test_prohibit_autocmd_with_no_group.py:34: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitAutocmdWithNoGroup.test_get_violation_if_found_with_valid_file_with_group_param > >self = <test.integration.vint.linting.policy.test_prohibit_autocmd_with_no_group.Test...oGroup testMethod=test_get_violation_if_found_with_valid_file_with_group_param> > > def test_get_violation_if_found_with_valid_file_with_group_param(self): > self.assertFoundNoViolations(VALID_VIM_SCRIPT_WITH_GROUP_PARAM, >> ProhibitAutocmdWithNoGroup) > >test/integration/vint/linting/policy/test_prohibit_autocmd_with_no_group.py:39: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitCommandRelyOnUser.test_get_violation_if_found_when_file_is_invalid > >self = <test.integration.vint.linting.policy.test_prohibit_command_rely_on_user.TestP...tCommandRelyOnUser testMethod=test_get_violation_if_found_when_file_is_invalid> > > def test_get_violation_if_found_when_file_is_invalid(self): > expected_violations = [ > { > 'name': 'ProhibitCommandRelyOnUser', > 'level': Level.WARNING, > 'position': { > 'line': 1, > 'column': 1, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitCommandRelyOnUser', > 'level': Level.WARNING, > 'position': { > 'line': 2, > 'column': 1, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitCommandRelyOnUser', > 'level': Level.WARNING, > 'position': { > 'line': 3, > 'column': 1, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitCommandRelyOnUser', > 'level': Level.WARNING, > 'position': { > 'line': 4, > 'column': 1, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitCommandRelyOnUser', > 'level': Level.WARNING, > 'position': { > 'line': 5, > 'column': 1, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > ] > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitCommandRelyOnUser, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_command_rely_on_user.py:68: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_ TestProhibitCommandRelyOnUser.test_get_violation_if_found_when_file_is_valid _ > >self = <test.integration.vint.linting.policy.test_prohibit_command_rely_on_user.TestP...bitCommandRelyOnUser testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, >> ProhibitCommandRelyOnUser) > >test/integration/vint/linting/policy/test_prohibit_command_rely_on_user.py:14: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitCommandWithUnintendedSideEffect.test_get_violation_if_found_with_invalid_file > >self = <test.integration.vint.linting.policy.test_prohibit_command_with_unintented_si...hUnintendedSideEffect testMethod=test_get_violation_if_found_with_invalid_file> > > def test_get_violation_if_found_with_invalid_file(self): > expected_violations = [self._create_violation_by_line_number(line_number) > for line_number in range(1, 14)] > > # Offset range token length > expected_violations[3]['position']['column'] = 2 > expected_violations[4]['position']['column'] = 6 > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitCommandWithUnintendedSideEffect, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_command_with_unintented_side_effect.py:39: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitCommandWithUnintendedSideEffect.test_get_violation_if_found_with_valid_file > >self = <test.integration.vint.linting.policy.test_prohibit_command_with_unintented_si...ithUnintendedSideEffect testMethod=test_get_violation_if_found_with_valid_file> > > def test_get_violation_if_found_with_valid_file(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, >> ProhibitCommandWithUnintendedSideEffect) > >test/integration/vint/linting/policy/test_prohibit_command_with_unintented_side_effect.py:26: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitEncodingOptionAfterScriptEncoding.test_get_violation_if_found_with_invalid_file > >self = <test.integration.vint.linting.policy.test_prohibit_encoding_opt_after_scripte...onAfterScriptEncoding testMethod=test_get_violation_if_found_with_invalid_file> > > def test_get_violation_if_found_with_invalid_file(self): > expected_violations = [self._create_violation_by_line_number(2)] > > self.assertFoundViolationsEqual(INVALID_ORDER_VIM_SCRIPT, > ProhibitEncodingOptionAfterScriptEncoding, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_encoding_opt_after_scriptencoding.py:57: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitEncodingOptionAfterScriptEncoding.test_get_violation_if_found_with_valid_file > >self = <test.integration.vint.linting.policy.test_prohibit_encoding_opt_after_scripte...tionAfterScriptEncoding testMethod=test_get_violation_if_found_with_valid_file> > > def test_get_violation_if_found_with_valid_file(self): > self.assertFoundNoViolations(VALID_ORDER_VIM_SCRIPT, >> ProhibitEncodingOptionAfterScriptEncoding) > >test/integration/vint/linting/policy/test_prohibit_encoding_opt_after_scriptencoding.py:39: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitEncodingOptionAfterScriptEncoding.test_get_violation_if_found_with_valid_file_no_encoding_option > >self = <test.integration.vint.linting.policy.test_prohibit_encoding_opt_after_scripte...ding testMethod=test_get_violation_if_found_with_valid_file_no_encoding_option> > > def test_get_violation_if_found_with_valid_file_no_encoding_option(self): > self.assertFoundNoViolations(NO_ENCODING_OPT_VIM_SCRIPT, >> ProhibitEncodingOptionAfterScriptEncoding) > >test/integration/vint/linting/policy/test_prohibit_encoding_opt_after_scriptencoding.py:44: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitEncodingOptionAfterScriptEncoding.test_get_violation_if_found_with_valid_file_no_scriptencoding > >self = <test.integration.vint.linting.policy.test_prohibit_encoding_opt_after_scripte...oding testMethod=test_get_violation_if_found_with_valid_file_no_scriptencoding> > > def test_get_violation_if_found_with_valid_file_no_scriptencoding(self): > self.assertFoundNoViolations(NO_SCRIPT_ENCODING_VIM_SCRIPT, >> ProhibitEncodingOptionAfterScriptEncoding) > >test/integration/vint/linting/policy/test_prohibit_encoding_opt_after_scriptencoding.py:49: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitEqualTildeOperator.test_get_violation_if_found_when_file_is_invalid > >self = <test.integration.vint.linting.policy.test_prohibit_equal_tilde_operator.TestP...EqualTildeOperator testMethod=test_get_violation_if_found_when_file_is_invalid> > > def test_get_violation_if_found_when_file_is_invalid(self): > expected_violations = [ > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 2, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 3, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 4, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 5, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 6, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 7, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 8, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 9, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 10, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 11, > 'column': 12, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 15, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 16, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 17, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 18, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 19, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 20, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 21, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 22, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 23, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitEqualTildeOperator', > 'level': Level.WARNING, > 'position': { > 'line': 24, > 'column': 8, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > ] > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitEqualTildeOperator, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_equal_tilde_operator.py:203: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitEqualTildeOperator.test_get_violation_if_found_when_file_is_valid _ > >self = <test.integration.vint.linting.policy.test_prohibit_equal_tilde_operator.TestP...itEqualTildeOperator testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, >> ProhibitEqualTildeOperator) > >test/integration/vint/linting/policy/test_prohibit_equal_tilde_operator.py:14: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitImplicitScopeBuiltinVariable.test_get_violation_if_found_when_file_is_invalid > >self = <test.integration.vint.linting.policy.test_prohibit_implicit_scope_builtin_var...opeBuiltinVariable testMethod=test_get_violation_if_found_when_file_is_invalid> > > def test_get_violation_if_found_when_file_is_invalid(self): > expected_violations = [ > self.create_violation(4, 9), > self.create_violation(5, 10), > ] > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitImplicitScopeBuiltinVariable, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_implicit_scope_builtin_variable.py:41: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitImplicitScopeBuiltinVariable.test_get_violation_if_found_when_file_is_valid > >self = <test.integration.vint.linting.policy.test_prohibit_implicit_scope_builtin_var...ScopeBuiltinVariable testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, >> ProhibitImplicitScopeBuiltinVariable) > >test/integration/vint/linting/policy/test_prohibit_implicit_scope_builtin_variable.py:18: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitImplicitScopeVariable.test_get_violation_if_found_when_file_is_invalid > >self = <test.integration.vint.linting.policy.test_prohibit_implicit_scope_variable.Te...licitScopeVariable testMethod=test_get_violation_if_found_when_file_is_invalid> > > def test_get_violation_if_found_when_file_is_invalid(self): > expected_violations = [ > self.create_violation(2, 5), > self.create_violation(4, 10), > self.create_violation(8, 5), > self.create_violation(12, 10), > self.create_violation(16, 5), > ] > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitImplicitScopeVariable, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_implicit_scope_variable.py:40: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitImplicitScopeVariable.test_get_violation_if_found_when_file_is_valid > >self = <test.integration.vint.linting.policy.test_prohibit_implicit_scope_variable.Te...mplicitScopeVariable testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, >> ProhibitImplicitScopeVariable) > >test/integration/vint/linting/policy/test_prohibit_implicit_scope_variable.py:14: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_____ TestProhibitInvalidMapCall.test_get_violation_if_found_with_invalid ______ > >self = <test.integration.vint.linting.policy.test_prohibit_invalid_map_call.TestProhibitInvalidMapCall testMethod=test_get_violation_if_found_with_invalid> > > def test_get_violation_if_found_with_invalid(self): > expected_violations = [ > { > 'name': 'ProhibitInvalidMapCall', > 'level': Level.ERROR, > 'position': { > 'line': 1, > 'column': 16, > 'path': PATH_INVALID_VIM_SCRIPT > } > } > ] > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitInvalidMapCall, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_invalid_map_call.py:30: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >______ TestProhibitInvalidMapCall.test_get_violation_if_found_with_valid _______ > >self = <test.integration.vint.linting.policy.test_prohibit_invalid_map_call.TestProhibitInvalidMapCall testMethod=test_get_violation_if_found_with_valid> > > def test_get_violation_if_found_with_valid(self): >> self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, ProhibitInvalidMapCall) > >test/integration/vint/linting/policy/test_prohibit_invalid_map_call.py:13: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitMissingScriptEncoding.test_get_violation_if_found_with_invalid_file > >self = <test.integration.vint.linting.policy.test_prohibit_missing_scriptencoding.Tes...MissingScriptEncoding testMethod=test_get_violation_if_found_with_invalid_file> > > def test_get_violation_if_found_with_invalid_file(self): > expected_violations = [ > { > 'name': 'ProhibitMissingScriptEncoding', > 'level': Level.WARNING, > 'position': { > 'line': 1, > 'column': 1, > 'path': INVALID_VIM_SCRIPT > }, > }, > ] > self.assertFoundViolationsEqual(INVALID_VIM_SCRIPT, > ProhibitMissingScriptEncoding, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_missing_scriptencoding.py:50: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitMissingScriptEncoding.test_get_violation_if_found_with_valid_file_no_multibyte_char > >self = <test.integration.vint.linting.policy.test_prohibit_missing_scriptencoding.Tes...oding testMethod=test_get_violation_if_found_with_valid_file_no_multibyte_char> > > def test_get_violation_if_found_with_valid_file_no_multibyte_char(self): > self.assertFoundNoViolations(NO_MULTI_BYTE_CHAR_VIM_SCRIPT, >> ProhibitMissingScriptEncoding) > >test/integration/vint/linting/policy/test_prohibit_missing_scriptencoding.py:28: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitMissingScriptEncoding.test_get_violation_if_found_with_valid_file_scriptencoding > >self = <test.integration.vint.linting.policy.test_prohibit_missing_scriptencoding.Tes...Encoding testMethod=test_get_violation_if_found_with_valid_file_scriptencoding> > > def test_get_violation_if_found_with_valid_file_scriptencoding(self): > self.assertFoundNoViolations(SCRIPT_ENCODING_VIM_SCRIPT, >> ProhibitMissingScriptEncoding) > >test/integration/vint/linting/policy/test_prohibit_missing_scriptencoding.py:33: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_ TestProhibitNoAbortFunction.test_get_violation_if_found_when_file_is_invalid _ > >self = <test.integration.vint.linting.policy.test_prohibit_no_abort_function.TestProhibitNoAbortFunction testMethod=test_get_violation_if_found_when_file_is_invalid> > > def test_get_violation_if_found_when_file_is_invalid(self): > expected_violations = [ > { > 'name': 'ProhibitNoAbortFunction', > 'level': Level.WARNING, > 'position': { > 'line': 1, > 'column': 1, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitNoAbortFunction', > 'level': Level.WARNING, > 'position': { > 'line': 4, > 'column': 1, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitNoAbortFunction', > 'level': Level.WARNING, > 'position': { > 'line': 7, > 'column': 1, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > ] > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitNoAbortFunction, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_no_abort_function.py:56: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >__ TestProhibitNoAbortFunction.test_get_violation_if_found_when_file_is_valid __ > >self = <test.integration.vint.linting.policy.test_prohibit_no_abort_function.TestProhibitNoAbortFunction testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT_1, >> ProhibitNoAbortFunction) > >test/integration/vint/linting/policy/test_prohibit_no_abort_function.py:15: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitNoAbortFunction.test_get_violation_if_found_when_file_is_valid_out_of_autoload > >self = <test.integration.vint.linting.policy.test_prohibit_no_abort_function.TestProh...tion testMethod=test_get_violation_if_found_when_file_is_valid_out_of_autoload> > > def test_get_violation_if_found_when_file_is_valid_out_of_autoload(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT_2, >> ProhibitNoAbortFunction) > >test/integration/vint/linting/policy/test_prohibit_no_abort_function.py:20: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >__ TestProhibitSetNoCompatible.test_get_violation_if_found_with_invalid_file ___ > >self = <test.integration.vint.linting.policy.test_prohibit_set_nocompatible.TestProhibitSetNoCompatible testMethod=test_get_violation_if_found_with_invalid_file> > > def test_get_violation_if_found_with_invalid_file(self): > expected_violations = [ > self.create_violation(1, INVALID_VIM_SCRIPT), > ] > self.assertFoundViolationsEqual(INVALID_VIM_SCRIPT, > ProhibitSetNoCompatible, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_set_nocompatible.py:43: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitSetNoCompatible.test_get_violation_if_found_with_invalid_file_with_abbreviation > >self = <test.integration.vint.linting.policy.test_prohibit_set_nocompatible.TestProhi...ble testMethod=test_get_violation_if_found_with_invalid_file_with_abbreviation> > > def test_get_violation_if_found_with_invalid_file_with_abbreviation(self): > expected_violations = [ > self.create_violation(1, INVALID_VIM_SCRIPT_WITH_ABBREVIATION), > ] > self.assertFoundViolationsEqual(INVALID_VIM_SCRIPT_WITH_ABBREVIATION, > ProhibitSetNoCompatible, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_set_nocompatible.py:52: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >______ TestProhibitSetNoCompatible.test_get_violation_if_found_with_valid ______ > >self = <test.integration.vint.linting.policy.test_prohibit_set_nocompatible.TestProhibitSetNoCompatible testMethod=test_get_violation_if_found_with_valid> > > def test_get_violation_if_found_with_valid(self): > self.assertFoundNoViolations(VALID_VIM_SCRIPT, >> ProhibitSetNoCompatible) > >test/integration/vint/linting/policy/test_prohibit_set_nocompatible.py:34: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitUnnecessaryDoubleQuote.test_get_violation_if_found_when_file_is_invalid > >self = <test.integration.vint.linting.policy.test_prohibit_unnecessary_double_quote.T...cessaryDoubleQuote testMethod=test_get_violation_if_found_when_file_is_invalid> > > def test_get_violation_if_found_when_file_is_invalid(self): > expected_violations = [ > { > 'name': 'ProhibitUnnecessaryDoubleQuote', > 'level': Level.WARNING, > 'position': { > 'line': 2, > 'column': 6, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitUnnecessaryDoubleQuote', > 'level': Level.WARNING, > 'position': { > 'line': 3, > 'column': 6, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > ] > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitUnnecessaryDoubleQuote, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_unnecessary_double_quote.py:41: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitUnnecessaryDoubleQuote.test_get_violation_if_found_when_file_is_valid > >self = <test.integration.vint.linting.policy.test_prohibit_unnecessary_double_quote.T...necessaryDoubleQuote testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, >> ProhibitUnnecessaryDoubleQuote) > >test/integration/vint/linting/policy/test_prohibit_unnecessary_double_quote.py:14: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_ TestProhibitUnusedVariable.test_get_violation_if_found_when_file_is_invalid __ > >self = <test.integration.vint.linting.policy.test_prohibit_unused_variable.TestProhibitUnusedVariable testMethod=test_get_violation_if_found_when_file_is_invalid> > > def test_get_violation_if_found_when_file_is_invalid(self): > expected_violations = [ > self.create_violation(2, 5), > self.create_violation(4, 11), > self.create_violation(7, 25), > self.create_violation(7, 36), > self.create_violation(11, 9), > self.create_violation(12, 9), > ] > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitUnusedVariable, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_unused_variable.py:41: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >__ TestProhibitUnusedVariable.test_get_violation_if_found_when_file_is_valid ___ > >self = <test.integration.vint.linting.policy.test_prohibit_unused_variable.TestProhibitUnusedVariable testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, >> ProhibitUnusedVariable) > >test/integration/vint/linting/policy/test_prohibit_unused_variable.py:14: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitUsingUndeclaredVariable.test_get_violation_if_found_when_file_is_invalid > >self = <test.integration.vint.linting.policy.test_prohibit_using_undeclared_variable....UndeclaredVariable testMethod=test_get_violation_if_found_when_file_is_invalid> > > def test_get_violation_if_found_when_file_is_invalid(self): > expected_violations = [ > { > 'name': 'ProhibitUsingUndeclaredVariable', > 'level': Level.WARNING, > 'position': { > 'line': 1, > 'column': 6, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitUsingUndeclaredVariable', > 'level': Level.WARNING, > 'position': { > 'line': 5, > 'column': 10, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitUsingUndeclaredVariable', > 'level': Level.WARNING, > 'position': { > 'line': 6, > 'column': 10, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitUsingUndeclaredVariable', > 'level': Level.WARNING, > 'position': { > 'line': 10, > 'column': 10, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitUsingUndeclaredVariable', > 'level': Level.WARNING, > 'position': { > 'line': 11, > 'column': 10, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitUsingUndeclaredVariable', > 'level': Level.WARNING, > 'position': { > 'line': 12, > 'column': 10, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitUsingUndeclaredVariable', > 'level': Level.WARNING, > 'position': { > 'line': 13, > 'column': 10, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > { > 'name': 'ProhibitUsingUndeclaredVariable', > 'level': Level.WARNING, > 'position': { > 'line': 16, > 'column': 6, > 'path': PATH_INVALID_VIM_SCRIPT > }, > }, > ] > > self.assertFoundViolationsEqual(PATH_INVALID_VIM_SCRIPT, > ProhibitUsingUndeclaredVariable, >> expected_violations) > >test/integration/vint/linting/policy/test_prohibit_using_undeclared_variable.py:95: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError > TestProhibitUsingUndeclaredVariable.test_get_violation_if_found_when_file_is_valid > >self = <test.integration.vint.linting.policy.test_prohibit_using_undeclared_variable....ngUndeclaredVariable testMethod=test_get_violation_if_found_when_file_is_valid> > > def test_get_violation_if_found_when_file_is_valid(self): > self.assertFoundNoViolations(PATH_VALID_VIM_SCRIPT, >> ProhibitUsingUndeclaredVariable) > >test/integration/vint/linting/policy/test_prohibit_using_undeclared_variable.py:14: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/policy.py:51: in assertFoundNoViolations > self.assertFoundViolationsEqual(path, Policy, [], policy_options) >test/asserting/policy.py:59: in assertFoundViolationsEqual > config = PolicyAssertion.StubConfigContainer(policy_name) >test/asserting/policy.py:26: in __init__ > default_config_dict = ConfigDefaultSource(None).get_config_dict() >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_________ TestCLI.test_passing_code_to_stdin_lints_the_code_from_stdin _________ > >self = <test.unit.vint.linting.test_cli.TestCLI testMethod=test_passing_code_to_stdin_lints_the_code_from_stdin> > > @mock.patch('sys.stdin', open('test/fixture/cli/valid1.vim')) > def test_passing_code_to_stdin_lints_the_code_from_stdin(self): > argv = ['bin/vint', '-'] >> self.assertExitWithSuccess(argv) > >test/unit/vint/linting/test_cli.py:62: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/unit/vint/linting/test_cli.py:20: in assertExitWithSuccess > cli.start() >vint/linting/cli.py:26: in start > config_dict = self._build_config_dict(env) >vint/linting/cli.py:57: in _build_config_dict > ConfigDefaultSource(env), >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >____________ TestCLI.test_start_with_both_calid_invalid_file_paths _____________ > >self = <test.unit.vint.linting.test_cli.TestCLI testMethod=test_start_with_both_calid_invalid_file_paths> > > def test_start_with_both_calid_invalid_file_paths(self): > argv = ['bin/vint', 'test/fixture/cli/valid1.vim', 'test/fixture/cli/invalid1.vim'] >> self.assertExitWithFailure(argv) > >test/unit/vint/linting/test_cli.py:56: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/unit/vint/linting/test_cli.py:29: in assertExitWithFailure > cli.start() >vint/linting/cli.py:26: in start > config_dict = self._build_config_dict(env) >vint/linting/cli.py:57: in _build_config_dict > ConfigDefaultSource(env), >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >__________________ TestCLI.test_start_with_invalid_file_path ___________________ > >self = <test.unit.vint.linting.test_cli.TestCLI testMethod=test_start_with_invalid_file_path> > > def test_start_with_invalid_file_path(self): > argv = ['bin/vint', 'test/fixture/cli/invalid1.vim'] >> self.assertExitWithFailure(argv) > >test/unit/vint/linting/test_cli.py:51: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/unit/vint/linting/test_cli.py:29: in assertExitWithFailure > cli.start() >vint/linting/cli.py:26: in start > config_dict = self._build_config_dict(env) >vint/linting/cli.py:57: in _build_config_dict > ConfigDefaultSource(env), >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >___________________ TestCLI.test_start_with_valid_file_path ____________________ > >self = <test.unit.vint.linting.test_cli.TestCLI testMethod=test_start_with_valid_file_path> > > def test_start_with_valid_file_path(self): > argv = ['bin/vint', 'test/fixture/cli/valid1.vim'] >> self.assertExitWithSuccess(argv) > >test/unit/vint/linting/test_cli.py:46: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/unit/vint/linting/test_cli.py:20: in assertExitWithSuccess > cli.start() >vint/linting/cli.py:26: in start > config_dict = self._build_config_dict(env) >vint/linting/cli.py:57: in _build_config_dict > ConfigDefaultSource(env), >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_________________ TestConfigDefaultSource.test_get_config_dict _________________ > >self = <test.unit.vint.linting.config.test_config_default_source.TestConfigDefaultSource testMethod=test_get_config_dict> > > def test_get_config_dict(self): > expected_type = { > 'cmdargs': { > 'verbose': bool, > 'error-limit': int, > 'severity': Enum, > } > } > >> config_source = self.initialize_config_source_with_env(ConfigDefaultSource) > >test/unit/vint/linting/config/test_config_default_source.py:17: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/default_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >__________________ TestConfigFileSource.test_get_config_dict ___________________ > >self = <test.unit.vint.linting.config.test_config_file_source.TestConfigFileSource testMethod=test_get_config_dict> > > def test_get_config_dict(self): > expected_config_dict = { > 'cmdargs': { > 'verbose': True, > 'severity': Level.WARNING, > 'error-limit': 10, > }, > 'policies': { > 'ProhibitSomethingEvil': { > 'enabled': False, > }, > 'ProhibitSomethingDengerous': { > 'enabled': True, > }, > } > } > > config_source = self.initialize_config_source_with_env( >> TestConfigFileSource.ConcreteConfigFileSource) > >test/unit/vint/linting/config/test_config_file_source.py:35: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='test/fixture/config/fixture_config_file' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_________________ TestConfigGlobalSource.test_get_config_dict __________________ > >self = <test.unit.vint.linting.config.test_config_global_source.TestConfigGlobalSource testMethod=test_get_config_dict> > > def test_get_config_dict(self): > env = { > 'home_path': get_fixture_path('dummy_home'), > 'xdg_config_home': get_fixture_path('unexistent_xdg_config_home'), > } > expected_config_dict = { > 'cmdargs': { > 'verbose': bool, > 'error-limit': int, > 'severity': Enum, > } > } >> config_source = self.initialize_config_source_with_env(ConfigGlobalSource, env) > >test/unit/vint/linting/config/test_config_global_source.py:20: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='test/fixture/config/dummy_home/.vintrc.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >___ TestConfigGlobalSource.test_get_config_dict_with_default_xdg_config_home ___ > >self = <test.unit.vint.linting.config.test_config_global_source.TestConfigGlobalSource testMethod=test_get_config_dict_with_default_xdg_config_home> > > def test_get_config_dict_with_default_xdg_config_home(self): > env = { > 'home_path': get_fixture_path('unexistent_home'), > 'xdg_config_home': get_fixture_path('xdg_config_home'), > } > expected_config_dict = { > 'cmdargs': { > 'verbose': bool, > 'error-limit': int, > 'severity': Enum, > } > } >> config_source = self.initialize_config_source_with_env(ConfigGlobalSource, env) > >test/unit/vint/linting/config/test_config_global_source.py:46: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='test/fixture/config/xdg_config_home/.vintrc.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >______ TestConfigGlobalSource.test_get_config_dict_with_no_global_config _______ > >self = <test.unit.vint.linting.config.test_config_global_source.TestConfigGlobalSource testMethod=test_get_config_dict_with_no_global_config> > > def test_get_config_dict_with_no_global_config(self): > env = { > 'home_path': get_fixture_path('unexistent_home'), > 'xdg_config_home': get_fixture_path('unexistent_xdg_config_home'), > } > expected_config_dict = {} >> config_source = self.initialize_config_source_with_env(ConfigGlobalSource, env) > >test/unit/vint/linting/config/test_config_global_source.py:30: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/void_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_________________ TestConfigProjectSource.test_get_config_dict _________________ > >self = <test.unit.vint.linting.config.test_config_project_source.TestConfigProjectSource testMethod=test_get_config_dict> > > def test_get_config_dict(self): > env = { > 'cwd': get_fixture_path('project_with_long_extname') > } > > expected_type = { > 'cmdargs': { > 'verbose': bool, > 'error-limit': int, > 'severity': Enum, > } > } > >> config_source = self.initialize_config_source_with_env(ConfigProjectSource, env) > >test/unit/vint/linting/config/test_config_project_source.py:22: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='test/fixture/config/project_with_long_extname/.vintrc.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >_________ TestConfigProjectSource.test_get_config_dict_for_no_extname __________ > >self = <test.unit.vint.linting.config.test_config_project_source.TestConfigProjectSource testMethod=test_get_config_dict_for_no_extname> > > def test_get_config_dict_for_no_extname(self): > env = { > 'cwd': get_fixture_path('project_with_no_extname') > } > > expected_type = { > 'cmdargs': { > 'verbose': bool, > 'error-limit': int, > 'severity': Enum, > } > } > >> config_source = self.initialize_config_source_with_env(ConfigProjectSource, env) > >test/unit/vint/linting/config/test_config_project_source.py:73: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='test/fixture/config/project_with_no_extname/.vintrc' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >________ TestConfigProjectSource.test_get_config_dict_for_short_extname ________ > >self = <test.unit.vint.linting.config.test_config_project_source.TestConfigProjectSource testMethod=test_get_config_dict_for_short_extname> > > def test_get_config_dict_for_short_extname(self): > env = { > 'cwd': get_fixture_path('project_with_short_extname') > } > > expected_type = { > 'cmdargs': { > 'verbose': bool, > 'error-limit': int, > 'severity': Enum, > } > } > >> config_source = self.initialize_config_source_with_env(ConfigProjectSource, env) > >test/unit/vint/linting/config/test_config_project_source.py:56: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='test/fixture/config/project_with_short_extname/.vintrc.yml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >________ TestConfigProjectSource.test_get_config_dict_on_sub_directory _________ > >self = <test.unit.vint.linting.config.test_config_project_source.TestConfigProjectSource testMethod=test_get_config_dict_on_sub_directory> > > def test_get_config_dict_on_sub_directory(self): > env = { > 'cwd': get_fixture_path(Path('project_with_long_extname') / 'sub' / 'subsub') > } > > expected_type = { > 'cmdargs': { > 'verbose': bool, > 'error-limit': int, > 'severity': Enum, > } > } > >> config_source = self.initialize_config_source_with_env(ConfigProjectSource, env) > >test/unit/vint/linting/config/test_config_project_source.py:39: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='test/fixture/config/project_with_long_extname/.vintrc.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >______ TestConfigProjectSource.test_get_config_dict_with_no_global_config ______ > >self = <test.unit.vint.linting.config.test_config_project_source.TestConfigProjectSource testMethod=test_get_config_dict_with_no_global_config> > > def test_get_config_dict_with_no_global_config(self): > env = { > 'cwd': get_fixture_path('unexistent_project') > } > > expected_config_dict = {} > >> config_source = self.initialize_config_source_with_env(ConfigProjectSource, env) > >test/unit/vint/linting/config/test_config_project_source.py:84: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >test/asserting/config_source.py:16: in initialize_config_source_with_env > return ConfigSourceToTest(env_factory(env)) >vint/linting/config/config_file_source.py:13: in __init__ > self._config_dict = self.convert_config_dict(yaml.load(file_obj)) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >stream = <_io.TextIOWrapper name='/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19/vint/asset/void_config.yaml' encoding='UTF-8'> >Loader = None > > def load(stream, Loader=None): > """ > Parse the first YAML document in a stream > and produce the corresponding Python object. > """ > if Loader is None: >> raise RuntimeError("Unsafe load() call disabled by Gentoo. See bug #659348") >E RuntimeError: Unsafe load() call disabled by Gentoo. See bug #659348 > >/usr/lib64/python2.7/site-packages/yaml/__init__.py:109: RuntimeError >===Flaky Test Report=== > > >===End Flaky Test Report=== >============== 57 failed, 214 passed, 1 skipped in 19.58 seconds =============== > * ERROR: dev-util/vint-0.3.19::gentoo failed (test phase): > * Test suite failed with python2.7 > * > * Call stack: > * ebuild.sh, line 125: Called src_test > * environment, line 2676: Called distutils-r1_src_test > * environment, line 915: Called _distutils-r1_run_foreach_impl 'python_test' > * environment, line 361: Called python_foreach_impl 'distutils-r1_run_phase' 'python_test' > * environment, line 2209: Called multibuild_foreach_variant '_python_multibuild_wrapper' 'distutils-r1_run_phase' 'python_test' > * environment, line 1569: Called _multibuild_run '_python_multibuild_wrapper' 'distutils-r1_run_phase' 'python_test' > * environment, line 1567: Called _python_multibuild_wrapper 'distutils-r1_run_phase' 'python_test' > * environment, line 573: Called distutils-r1_run_phase 'python_test' > * environment, line 846: Called python_test > * environment, line 2578: Called die > * The specific snippet of code: > * pytest -vv || die "Test suite failed with ${EPYTHON}" > * > * If you need support, post the output of `emerge --info '=dev-util/vint-0.3.19::gentoo'`, > * the complete build log and the output of `emerge -pqv '=dev-util/vint-0.3.19::gentoo'`. > * The complete build log is located at '/var/log/portage/dev-util:vint-0.3.19:20190713-135512.log'. > * For convenience, a symlink to the build log is located at '/var/tmp/portage/dev-util/vint-0.3.19/temp/build.log'. > * The ebuild environment file is located at '/var/tmp/portage/dev-util/vint-0.3.19/temp/environment'. > * Working directory: '/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19' > * S: '/var/tmp/portage/dev-util/vint-0.3.19/work/vint-0.3.19'
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 689776
:
582766
| 582768 |
582770
|
582772
|
582774
|
582776