Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/certbot/certbot.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/acme
diff options
context:
space:
mode:
authorMads Jensen <mads.jensen@eficode.com>2021-04-29 03:45:08 +0300
committerGitHub <noreply@github.com>2021-04-29 03:45:08 +0300
commit2cf177586497724f0eebbbe85cfcb9432f6963cf (patch)
tree728eddb39a764a9447c767b463360968b9cdf4fc /acme
parentf339d23e54e88e7568251e9436281506b19ac86f (diff)
Update assertTrue/False to Python 3 precise asserts (#8792)
* Update assertTrue/False to Python 3 precise asserts * Fix test failures * Fix test failures * More replacements * Update to Python 3 asserts in acme-module * Fix Windows test failure * Fix failures * Fix test failure * More replacements * Don't include the semgrep rules * Fix test failure
Diffstat (limited to 'acme')
-rw-r--r--acme/tests/challenges_test.py4
-rw-r--r--acme/tests/client_test.py18
-rw-r--r--acme/tests/crypto_util_test.py6
-rw-r--r--acme/tests/errors_test.py4
-rw-r--r--acme/tests/jws_test.py4
-rw-r--r--acme/tests/messages_test.py20
6 files changed, 28 insertions, 28 deletions
diff --git a/acme/tests/challenges_test.py b/acme/tests/challenges_test.py
index cc604b0de..71bf61976 100644
--- a/acme/tests/challenges_test.py
+++ b/acme/tests/challenges_test.py
@@ -292,7 +292,7 @@ class TLSALPN01ResponseTest(unittest.TestCase):
def test_gen_verify_cert_gen_key(self):
cert, key = self.response.gen_cert(self.domain)
- self.assertTrue(isinstance(key, OpenSSL.crypto.PKey))
+ self.assertIsInstance(key, OpenSSL.crypto.PKey)
self.assertTrue(self.response.verify_cert(self.domain, cert))
def test_verify_bad_cert(self):
@@ -431,7 +431,7 @@ class DNSTest(unittest.TestCase):
mock_gen.return_value = mock.sentinel.validation
response = self.msg.gen_response(KEY)
from acme.challenges import DNSResponse
- self.assertTrue(isinstance(response, DNSResponse))
+ self.assertIsInstance(response, DNSResponse)
self.assertEqual(response.validation, mock.sentinel.validation)
def test_validation_domain_name(self):
diff --git a/acme/tests/client_test.py b/acme/tests/client_test.py
index 89e66c6d6..35cc0ba25 100644
--- a/acme/tests/client_test.py
+++ b/acme/tests/client_test.py
@@ -604,8 +604,8 @@ class ClientTest(ClientTestBase):
# make sure that max_attempts is per-authorization, rather
# than global
max_attempts=max(len(authzrs[0].retries), len(authzrs[1].retries)))
- self.assertTrue(cert[0] is csr)
- self.assertTrue(cert[1] is updated_authzrs)
+ self.assertIs(cert[0], csr)
+ self.assertIs(cert[1], updated_authzrs)
self.assertEqual(updated_authzrs[0].uri, 'a...')
self.assertEqual(updated_authzrs[1].uri, 'b.')
self.assertEqual(updated_authzrs[0].times, [
@@ -641,7 +641,7 @@ class ClientTest(ClientTestBase):
authzr = self.client.deactivate_authorization(self.authzr)
self.assertEqual(authzb, authzr.body)
self.assertEqual(self.client.net.post.call_count, 1)
- self.assertTrue(self.authzr.uri in self.net.post.call_args_list[0][0])
+ self.assertIn(self.authzr.uri, self.net.post.call_args_list[0][0])
def test_check_cert(self):
self.response.headers['Location'] = self.certr.uri
@@ -700,7 +700,7 @@ class ClientTest(ClientTestBase):
def test_revocation_payload(self):
obj = messages.Revocation(certificate=self.certr.body, reason=self.rsn)
- self.assertTrue('reason' in obj.to_partial_json().keys())
+ self.assertIn('reason', obj.to_partial_json().keys())
self.assertEqual(self.rsn, obj.to_partial_json()['reason'])
def test_revoke_bad_status_raises_error(self):
@@ -877,9 +877,9 @@ class ClientV2Test(ClientTestBase):
self.response.headers['Location'] = self.regr.uri
self.response.json.return_value = self.regr.body.to_json()
self.assertEqual(self.regr, self.client.update_registration(self.regr))
- self.assertNotEqual(self.client.net.account, None)
+ self.assertIsNotNone(self.client.net.account)
self.assertEqual(self.client.net.post.call_count, 2)
- self.assertTrue(DIRECTORY_V2.newAccount in self.net.post.call_args_list[0][0])
+ self.assertIn(DIRECTORY_V2.newAccount, self.net.post.call_args_list[0][0])
self.response.json.return_value = self.regr.body.update(
contact=()).to_json()
@@ -943,7 +943,7 @@ class ClientNetworkTest(unittest.TestCase):
self.response.links = {}
def test_init(self):
- self.assertTrue(self.net.verify_ssl is self.verify_ssl)
+ self.assertIs(self.net.verify_ssl, self.verify_ssl)
def test_wrap_in_jws(self):
# pylint: disable=protected-access
@@ -1185,7 +1185,7 @@ class ClientNetworkWithMockedResponseTest(unittest.TestCase):
def send_request(*args, **kwargs):
# pylint: disable=unused-argument,missing-docstring
- self.assertFalse("new_nonce_url" in kwargs)
+ self.assertNotIn("new_nonce_url", kwargs)
method = args[0]
uri = args[1]
if method == 'HEAD' and uri != "new_nonce_uri":
@@ -1330,7 +1330,7 @@ class ClientNetworkSourceAddressBindingTest(unittest.TestCase):
from acme.client import ClientNetwork
net = ClientNetwork(key=None, alg=None, source_address=self.source_address)
for adapter in net.session.adapters.values():
- self.assertTrue(self.source_address in adapter.source_address)
+ self.assertIn(self.source_address, adapter.source_address)
def test_behavior_assumption(self):
"""This is a test that guardrails the HTTPAdapter behavior so that if the default for
diff --git a/acme/tests/crypto_util_test.py b/acme/tests/crypto_util_test.py
index 8c1f905d2..cc81a2f1f 100644
--- a/acme/tests/crypto_util_test.py
+++ b/acme/tests/crypto_util_test.py
@@ -191,7 +191,7 @@ class RandomSnTest(unittest.TestCase):
for _ in range(self.cert_count):
cert = gen_ss_cert(self.key, ['dummy'], force_san=True)
self.serial_num.append(cert.get_serial_number())
- self.assertTrue(len(set(self.serial_num)) > 1)
+ self.assertGreater(len(set(self.serial_num)), 1)
class MakeCSRTest(unittest.TestCase):
"""Test for standalone functions."""
@@ -206,8 +206,8 @@ class MakeCSRTest(unittest.TestCase):
def test_make_csr(self):
csr_pem = self._call_with_key(["a.example", "b.example"])
- self.assertTrue(b'--BEGIN CERTIFICATE REQUEST--' in csr_pem)
- self.assertTrue(b'--END CERTIFICATE REQUEST--' in csr_pem)
+ self.assertIn(b'--BEGIN CERTIFICATE REQUEST--', csr_pem)
+ self.assertIn(b'--END CERTIFICATE REQUEST--', csr_pem)
csr = OpenSSL.crypto.load_certificate_request(
OpenSSL.crypto.FILETYPE_PEM, csr_pem)
# In pyopenssl 0.13 (used with TOXENV=py27-oldest), csr objects don't
diff --git a/acme/tests/errors_test.py b/acme/tests/errors_test.py
index 11c57059c..f325b284e 100644
--- a/acme/tests/errors_test.py
+++ b/acme/tests/errors_test.py
@@ -24,8 +24,8 @@ class MissingNonceTest(unittest.TestCase):
self.error = MissingNonce(self.response)
def test_str(self):
- self.assertTrue("FOO" in str(self.error))
- self.assertTrue("{}" in str(self.error))
+ self.assertIn("FOO", str(self.error))
+ self.assertIn("{}", str(self.error))
class PollErrorTest(unittest.TestCase):
diff --git a/acme/tests/jws_test.py b/acme/tests/jws_test.py
index 2e6ad72dd..0787fb340 100644
--- a/acme/tests/jws_test.py
+++ b/acme/tests/jws_test.py
@@ -48,7 +48,7 @@ class JWSTest(unittest.TestCase):
self.assertEqual(jws.signature.combined.nonce, self.nonce)
self.assertEqual(jws.signature.combined.url, self.url)
self.assertEqual(jws.signature.combined.kid, self.kid)
- self.assertEqual(jws.signature.combined.jwk, None)
+ self.assertIsNone(jws.signature.combined.jwk)
# TODO: check that nonce is in protected header
self.assertEqual(jws, JWS.from_json(jws.to_json()))
@@ -58,7 +58,7 @@ class JWSTest(unittest.TestCase):
jws = JWS.sign(payload=b'foo', key=self.privkey,
alg=jose.RS256, nonce=self.nonce,
url=self.url)
- self.assertEqual(jws.signature.combined.kid, None)
+ self.assertIsNone(jws.signature.combined.kid)
self.assertEqual(jws.signature.combined.jwk, self.pubkey)
diff --git a/acme/tests/messages_test.py b/acme/tests/messages_test.py
index 99a3a9ce4..3f0f29215 100644
--- a/acme/tests/messages_test.py
+++ b/acme/tests/messages_test.py
@@ -41,13 +41,13 @@ class ErrorTest(unittest.TestCase):
def test_description(self):
self.assertEqual('The request message was malformed', self.error.description)
- self.assertTrue(self.error_custom.description is None)
+ self.assertIsNone(self.error_custom.description)
def test_code(self):
from acme.messages import Error
self.assertEqual('malformed', self.error.code)
- self.assertEqual(None, self.error_custom.code)
- self.assertEqual(None, Error().code)
+ self.assertIsNone(self.error_custom.code)
+ self.assertIsNone(Error().code)
def test_is_acme_error(self):
from acme.messages import is_acme_error, Error
@@ -260,10 +260,10 @@ class RegistrationTest(unittest.TestCase):
self.assertEqual(empty_new_reg.contact, ())
self.assertEqual(new_reg_with_contact.contact, ())
- self.assertTrue('contact' not in empty_new_reg.to_partial_json())
- self.assertTrue('contact' not in empty_new_reg.fields_to_partial_json())
- self.assertTrue('contact' in new_reg_with_contact.to_partial_json())
- self.assertTrue('contact' in new_reg_with_contact.fields_to_partial_json())
+ self.assertNotIn('contact', empty_new_reg.to_partial_json())
+ self.assertNotIn('contact', empty_new_reg.fields_to_partial_json())
+ self.assertIn('contact', new_reg_with_contact.to_partial_json())
+ self.assertIn('contact', new_reg_with_contact.fields_to_partial_json())
class UpdateRegistrationTest(unittest.TestCase):
@@ -406,7 +406,7 @@ class AuthorizationResourceTest(unittest.TestCase):
authzr = AuthorizationResource(
uri=mock.sentinel.uri,
body=mock.sentinel.body)
- self.assertTrue(isinstance(authzr, jose.JSONDeSerializable))
+ self.assertIsInstance(authzr, jose.JSONDeSerializable)
class CertificateRequestTest(unittest.TestCase):
@@ -417,7 +417,7 @@ class CertificateRequestTest(unittest.TestCase):
self.req = CertificateRequest(csr=CSR)
def test_json_de_serializable(self):
- self.assertTrue(isinstance(self.req, jose.JSONDeSerializable))
+ self.assertIsInstance(self.req, jose.JSONDeSerializable)
from acme.messages import CertificateRequest
self.assertEqual(
self.req, CertificateRequest.from_json(self.req.to_json()))
@@ -433,7 +433,7 @@ class CertificateResourceTest(unittest.TestCase):
cert_chain_uri=mock.sentinel.cert_chain_uri)
def test_json_de_serializable(self):
- self.assertTrue(isinstance(self.certr, jose.JSONDeSerializable))
+ self.assertIsInstance(self.certr, jose.JSONDeSerializable)
from acme.messages import CertificateResource
self.assertEqual(
self.certr, CertificateResource.from_json(self.certr.to_json()))