diff --git a/bt5/erp5_core_test/TestTemplateItem/portal_components/test.erp5.testRestrictedPythonSecurity.py b/bt5/erp5_core_test/TestTemplateItem/portal_components/test.erp5.testRestrictedPythonSecurity.py index ed6f4197a30ccdedc280de1b1f439c4cd9cb0ab4..a277bfa5cf3898c20fa752777cd76cd361666b15 100644 --- a/bt5/erp5_core_test/TestTemplateItem/portal_components/test.erp5.testRestrictedPythonSecurity.py +++ b/bt5/erp5_core_test/TestTemplateItem/portal_components/test.erp5.testRestrictedPythonSecurity.py @@ -676,6 +676,17 @@ def test_suite(): import AccessControl.tests.testOwned suite.addTest(AccessControl.tests.testOwned.test_suite()) import AccessControl.tests.testPasswordDigest + # Disable crypt scheme, we don't want to use CRYPT and it fails on debian 11. + # This is also disabled in github.com/zopefoundation/AuthEncoding commit + # fbbdcf3 (Allow the CRYPT test to fail as it is the case on GHA., 2021-04-08) + import AccessControl.AuthEncoding + def setUp(self): + self._original_AuthEncoding_schemes = AccessControl.AuthEncoding._schemes[::] + AccessControl.AuthEncoding._schemes = [s for s in AccessControl.AuthEncoding._schemes if s[0] != 'CRYPT'] + AccessControl.tests.testPasswordDigest.setUp = setUp + def tearDown(self): + AccessControl.AuthEncoding._schemes = self._original_AuthEncoding_schemes + AccessControl.tests.testPasswordDigest.tearDown = tearDown suite.addTest(AccessControl.tests.testPasswordDigest.test_suite()) import AccessControl.tests.testPermissionMapping suite.addTest(AccessControl.tests.testPermissionMapping.test_suite())