mirror of
https://github.com/samba-team/samba.git
synced 2025-12-20 16:23:51 +03:00
python:tests: Use assertEqual() instead of assertEquals()
assertEquals() was removed in Python 3.12. Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
committed by
Andrew Bartlett
parent
08dbb35e7e
commit
2fa838d439
@@ -1805,8 +1805,8 @@ class GpoCmdTestCase(SambaToolCmdTest):
|
|||||||
self.assertIn('UserPolicy : False', out,
|
self.assertIn('UserPolicy : False', out,
|
||||||
'The test cse should not have User policy enabled')
|
'The test cse should not have User policy enabled')
|
||||||
cse_ext = re.findall(r'^UniqueGUID\s+:\s+(.*)', out)
|
cse_ext = re.findall(r'^UniqueGUID\s+:\s+(.*)', out)
|
||||||
self.assertEquals(len(cse_ext), 1,
|
self.assertEqual(len(cse_ext), 1,
|
||||||
'The test cse GUID was not found')
|
'The test cse GUID was not found')
|
||||||
cse_ext = cse_ext[0]
|
cse_ext = cse_ext[0]
|
||||||
self.assertTrue(check_guid(cse_ext),
|
self.assertTrue(check_guid(cse_ext),
|
||||||
'The test cse GUID was not formatted correctly')
|
'The test cse GUID was not formatted correctly')
|
||||||
|
|||||||
@@ -219,8 +219,8 @@ class UserCmdCryptShaTestCaseGPG(UserCmdCryptShaTestCase):
|
|||||||
out = self._get_password("virtualCryptSHA256;rounds=2561," +
|
out = self._get_password("virtualCryptSHA256;rounds=2561," +
|
||||||
"virtualCryptSHA512;rounds=5129",
|
"virtualCryptSHA512;rounds=5129",
|
||||||
True)
|
True)
|
||||||
self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
||||||
self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
||||||
|
|
||||||
# The returned hashes should specify the correct number of rounds
|
# The returned hashes should specify the correct number of rounds
|
||||||
self.assertTrue(sha256.startswith("{CRYPT}$5$rounds=2561"))
|
self.assertTrue(sha256.startswith("{CRYPT}$5$rounds=2561"))
|
||||||
|
|||||||
@@ -92,8 +92,8 @@ class UserCmdCryptShaTestCaseUserPassword(UserCmdCryptShaTestCase):
|
|||||||
sha512 = _get_attribute(out, "virtualCryptSHA512")
|
sha512 = _get_attribute(out, "virtualCryptSHA512")
|
||||||
|
|
||||||
out = self._get_password("virtualCryptSHA256,virtualCryptSHA512")
|
out = self._get_password("virtualCryptSHA256,virtualCryptSHA512")
|
||||||
self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
||||||
self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
||||||
|
|
||||||
# gpg decryption not enabled.
|
# gpg decryption not enabled.
|
||||||
# both virtual attributes specified, rounds specified
|
# both virtual attributes specified, rounds specified
|
||||||
@@ -115,8 +115,8 @@ class UserCmdCryptShaTestCaseUserPassword(UserCmdCryptShaTestCase):
|
|||||||
sha512 = _get_attribute(out, "virtualCryptSHA512")
|
sha512 = _get_attribute(out, "virtualCryptSHA512")
|
||||||
|
|
||||||
out = self._get_password("virtualCryptSHA256,virtualCryptSHA512")
|
out = self._get_password("virtualCryptSHA256,virtualCryptSHA512")
|
||||||
self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
||||||
self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
||||||
|
|
||||||
# gpg decryption not enabled.
|
# gpg decryption not enabled.
|
||||||
# both virtual attributes specified, rounds specified
|
# both virtual attributes specified, rounds specified
|
||||||
@@ -142,8 +142,8 @@ class UserCmdCryptShaTestCaseUserPassword(UserCmdCryptShaTestCase):
|
|||||||
|
|
||||||
out = self._get_password("virtualCryptSHA256;rounds=2561," +
|
out = self._get_password("virtualCryptSHA256;rounds=2561," +
|
||||||
"virtualCryptSHA512;rounds=5129")
|
"virtualCryptSHA512;rounds=5129")
|
||||||
self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
||||||
self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
||||||
|
|
||||||
# Number of rounds should match that specified
|
# Number of rounds should match that specified
|
||||||
self.assertTrue(sha256.startswith("{CRYPT}$5$rounds=2561"))
|
self.assertTrue(sha256.startswith("{CRYPT}$5$rounds=2561"))
|
||||||
@@ -174,12 +174,12 @@ class UserCmdCryptShaTestCaseUserPassword(UserCmdCryptShaTestCase):
|
|||||||
|
|
||||||
out = self._get_password("virtualCryptSHA256;rounds=4000," +
|
out = self._get_password("virtualCryptSHA256;rounds=4000," +
|
||||||
"virtualCryptSHA512;rounds=5000")
|
"virtualCryptSHA512;rounds=5000")
|
||||||
self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
||||||
self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
||||||
|
|
||||||
# As the number of rounds did not match, should have returned the
|
# As the number of rounds did not match, should have returned the
|
||||||
# first hash of the corresponding scheme
|
# first hash of the corresponding scheme
|
||||||
out = self._get_password("virtualCryptSHA256," +
|
out = self._get_password("virtualCryptSHA256," +
|
||||||
"virtualCryptSHA512")
|
"virtualCryptSHA512")
|
||||||
self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
|
||||||
self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
|
||||||
|
|||||||
Reference in New Issue
Block a user