summaryrefslogtreecommitdiff
path: root/tests/oauth1/rfc5849
diff options
context:
space:
mode:
authorJon Dufresne <jon.dufresne@gmail.com>2017-04-16 13:57:30 -0700
committerJon Dufresne <jon.dufresne@gmail.com>2017-04-16 13:57:30 -0700
commite3626c4f0e09728f336acc32c5a1f61c4fed9418 (patch)
tree8f1294dee349340c427813906e1a2f64eddfc421 /tests/oauth1/rfc5849
parentb6f65f9a06e9981c3306b8a085cd789ed2b56697 (diff)
downloadoauthlib-e3626c4f0e09728f336acc32c5a1f61c4fed9418.tar.gz
Replace all uses of assertEquals with assertEqual
assertEquals is deprecated in favor of assertEqual. When running tests, fixes warnings of the form: DeprecationWarning: Please use assertEqual instead. For more information, see: https://docs.python.org/3/library/unittest.html#deprecated-aliases
Diffstat (limited to 'tests/oauth1/rfc5849')
-rw-r--r--tests/oauth1/rfc5849/test_client.py2
-rw-r--r--tests/oauth1/rfc5849/test_signatures.py35
2 files changed, 18 insertions, 19 deletions
diff --git a/tests/oauth1/rfc5849/test_client.py b/tests/oauth1/rfc5849/test_client.py
index cad0623..f20bfa7 100644
--- a/tests/oauth1/rfc5849/test_client.py
+++ b/tests/oauth1/rfc5849/test_client.py
@@ -133,7 +133,7 @@ class SignatureMethodTest(TestCase):
u, h, b = client.sign('http://example.com')
- self.assertEquals(h['Authorization'], (
+ self.assertEqual(h['Authorization'], (
'OAuth oauth_nonce="abc", oauth_timestamp="1234567890", '
'oauth_version="1.0", oauth_signature_method="PIZZA", '
'oauth_consumer_key="client_key", '
diff --git a/tests/oauth1/rfc5849/test_signatures.py b/tests/oauth1/rfc5849/test_signatures.py
index 51e01ef..6508267 100644
--- a/tests/oauth1/rfc5849/test_signatures.py
+++ b/tests/oauth1/rfc5849/test_signatures.py
@@ -142,13 +142,13 @@ class SignatureTests(TestCase):
# test a URI with the default port
uri = "http://www.example.com:80/"
- self.assertEquals(normalize_base_string_uri(uri),
- "http://www.example.com/")
+ self.assertEqual(normalize_base_string_uri(uri),
+ "http://www.example.com/")
# test a URI missing a path
uri = "http://www.example.com"
- self.assertEquals(normalize_base_string_uri(uri),
- "http://www.example.com/")
+ self.assertEqual(normalize_base_string_uri(uri),
+ "http://www.example.com/")
# test a relative URI
uri = "/a-host-relative-uri"
@@ -158,14 +158,14 @@ class SignatureTests(TestCase):
# test overriding the URI's netloc with a host argument
uri = "http://www.example.com/a-path"
host = "alternatehost.example.com"
- self.assertEquals(normalize_base_string_uri(uri, host),
- "http://alternatehost.example.com/a-path")
+ self.assertEqual(normalize_base_string_uri(uri, host),
+ "http://alternatehost.example.com/a-path")
def test_collect_parameters(self):
"""We check against parameters multiple times in case things change
after more parameters are added.
"""
- self.assertEquals(collect_parameters(), [])
+ self.assertEqual(collect_parameters(), [])
# Check against uri_query
parameters = collect_parameters(uri_query=self.uri_query)
@@ -241,8 +241,8 @@ class SignatureTests(TestCase):
sign = sign_hmac_sha1(self.control_base_string,
self.client_secret.decode('utf-8'),
self.resource_owner_secret.decode('utf-8'))
- self.assertEquals(len(sign), 28)
- self.assertEquals(sign, self.control_signature)
+ self.assertEqual(len(sign), 28)
+ self.assertEqual(sign, self.control_signature)
def test_sign_hmac_sha1_with_client(self):
self.assertRaises(ValueError,
@@ -254,8 +254,8 @@ class SignatureTests(TestCase):
sign = sign_hmac_sha1_with_client(
self.control_base_string, self.client)
- self.assertEquals(len(sign), 28)
- self.assertEquals(sign, self.control_signature)
+ self.assertEqual(len(sign), 28)
+ self.assertEqual(sign, self.control_signature)
control_base_string_rsa_sha1 = (
@@ -309,9 +309,9 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
control_signature = self.control_signature_rsa_sha1
sign = sign_rsa_sha1(base_string, private_key)
- self.assertEquals(sign, control_signature)
+ self.assertEqual(sign, control_signature)
sign = sign_rsa_sha1(base_string.decode('utf-8'), private_key)
- self.assertEquals(sign, control_signature)
+ self.assertEqual(sign, control_signature)
def test_sign_rsa_sha1_with_client(self):
@@ -323,13 +323,13 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
sign = sign_rsa_sha1_with_client(base_string, self.client)
- self.assertEquals(sign, control_signature)
+ self.assertEqual(sign, control_signature)
self.client.decode() ## Decode `rsa_private_key` from UTF-8
sign = sign_rsa_sha1_with_client(base_string, self.client)
- self.assertEquals(sign, control_signature)
+ self.assertEqual(sign, control_signature)
control_signature_plaintext = (
@@ -343,7 +343,7 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
self.resource_owner_secret)
sign = sign_plaintext(self.client_secret.decode('utf-8'),
self.resource_owner_secret.decode('utf-8'))
- self.assertEquals(sign, self.control_signature_plaintext)
+ self.assertEqual(sign, self.control_signature_plaintext)
def test_sign_plaintext_with_client(self):
@@ -354,5 +354,4 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA==
sign = sign_plaintext_with_client(None, self.client)
- self.assertEquals(sign, self.control_signature_plaintext)
-
+ self.assertEqual(sign, self.control_signature_plaintext)