diff options
author | Jon Dufresne <jon.dufresne@gmail.com> | 2017-04-16 13:57:30 -0700 |
---|---|---|
committer | Jon Dufresne <jon.dufresne@gmail.com> | 2017-04-16 13:57:30 -0700 |
commit | e3626c4f0e09728f336acc32c5a1f61c4fed9418 (patch) | |
tree | 8f1294dee349340c427813906e1a2f64eddfc421 /tests/oauth1/rfc5849 | |
parent | b6f65f9a06e9981c3306b8a085cd789ed2b56697 (diff) | |
download | oauthlib-e3626c4f0e09728f336acc32c5a1f61c4fed9418.tar.gz |
Replace all uses of assertEquals with assertEqual
assertEquals is deprecated in favor of assertEqual.
When running tests, fixes warnings of the form:
DeprecationWarning: Please use assertEqual instead.
For more information, see:
https://docs.python.org/3/library/unittest.html#deprecated-aliases
Diffstat (limited to 'tests/oauth1/rfc5849')
-rw-r--r-- | tests/oauth1/rfc5849/test_client.py | 2 | ||||
-rw-r--r-- | tests/oauth1/rfc5849/test_signatures.py | 35 |
2 files changed, 18 insertions, 19 deletions
diff --git a/tests/oauth1/rfc5849/test_client.py b/tests/oauth1/rfc5849/test_client.py index cad0623..f20bfa7 100644 --- a/tests/oauth1/rfc5849/test_client.py +++ b/tests/oauth1/rfc5849/test_client.py @@ -133,7 +133,7 @@ class SignatureMethodTest(TestCase): u, h, b = client.sign('http://example.com') - self.assertEquals(h['Authorization'], ( + self.assertEqual(h['Authorization'], ( 'OAuth oauth_nonce="abc", oauth_timestamp="1234567890", ' 'oauth_version="1.0", oauth_signature_method="PIZZA", ' 'oauth_consumer_key="client_key", ' diff --git a/tests/oauth1/rfc5849/test_signatures.py b/tests/oauth1/rfc5849/test_signatures.py index 51e01ef..6508267 100644 --- a/tests/oauth1/rfc5849/test_signatures.py +++ b/tests/oauth1/rfc5849/test_signatures.py @@ -142,13 +142,13 @@ class SignatureTests(TestCase): # test a URI with the default port uri = "http://www.example.com:80/" - self.assertEquals(normalize_base_string_uri(uri), - "http://www.example.com/") + self.assertEqual(normalize_base_string_uri(uri), + "http://www.example.com/") # test a URI missing a path uri = "http://www.example.com" - self.assertEquals(normalize_base_string_uri(uri), - "http://www.example.com/") + self.assertEqual(normalize_base_string_uri(uri), + "http://www.example.com/") # test a relative URI uri = "/a-host-relative-uri" @@ -158,14 +158,14 @@ class SignatureTests(TestCase): # test overriding the URI's netloc with a host argument uri = "http://www.example.com/a-path" host = "alternatehost.example.com" - self.assertEquals(normalize_base_string_uri(uri, host), - "http://alternatehost.example.com/a-path") + self.assertEqual(normalize_base_string_uri(uri, host), + "http://alternatehost.example.com/a-path") def test_collect_parameters(self): """We check against parameters multiple times in case things change after more parameters are added. """ - self.assertEquals(collect_parameters(), []) + self.assertEqual(collect_parameters(), []) # Check against uri_query parameters = collect_parameters(uri_query=self.uri_query) @@ -241,8 +241,8 @@ class SignatureTests(TestCase): sign = sign_hmac_sha1(self.control_base_string, self.client_secret.decode('utf-8'), self.resource_owner_secret.decode('utf-8')) - self.assertEquals(len(sign), 28) - self.assertEquals(sign, self.control_signature) + self.assertEqual(len(sign), 28) + self.assertEqual(sign, self.control_signature) def test_sign_hmac_sha1_with_client(self): self.assertRaises(ValueError, @@ -254,8 +254,8 @@ class SignatureTests(TestCase): sign = sign_hmac_sha1_with_client( self.control_base_string, self.client) - self.assertEquals(len(sign), 28) - self.assertEquals(sign, self.control_signature) + self.assertEqual(len(sign), 28) + self.assertEqual(sign, self.control_signature) control_base_string_rsa_sha1 = ( @@ -309,9 +309,9 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA== control_signature = self.control_signature_rsa_sha1 sign = sign_rsa_sha1(base_string, private_key) - self.assertEquals(sign, control_signature) + self.assertEqual(sign, control_signature) sign = sign_rsa_sha1(base_string.decode('utf-8'), private_key) - self.assertEquals(sign, control_signature) + self.assertEqual(sign, control_signature) def test_sign_rsa_sha1_with_client(self): @@ -323,13 +323,13 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA== sign = sign_rsa_sha1_with_client(base_string, self.client) - self.assertEquals(sign, control_signature) + self.assertEqual(sign, control_signature) self.client.decode() ## Decode `rsa_private_key` from UTF-8 sign = sign_rsa_sha1_with_client(base_string, self.client) - self.assertEquals(sign, control_signature) + self.assertEqual(sign, control_signature) control_signature_plaintext = ( @@ -343,7 +343,7 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA== self.resource_owner_secret) sign = sign_plaintext(self.client_secret.decode('utf-8'), self.resource_owner_secret.decode('utf-8')) - self.assertEquals(sign, self.control_signature_plaintext) + self.assertEqual(sign, self.control_signature_plaintext) def test_sign_plaintext_with_client(self): @@ -354,5 +354,4 @@ Ga6FHdjGPcfajt+nrpB1n8UQBEH9ZxniokR/IPvdMlxqXA== sign = sign_plaintext_with_client(None, self.client) - self.assertEquals(sign, self.control_signature_plaintext) - + self.assertEqual(sign, self.control_signature_plaintext) |