File python-pymacaroons-remove-nose.patch of Package python-pymacaroons
Index: pymacaroons-0.13.0/.coveragerc
===================================================================
--- pymacaroons-0.13.0.orig/.coveragerc
+++ pymacaroons-0.13.0/.coveragerc
@@ -1,4 +1,3 @@
[report]
omit =
*/python?.?/*
- */site-packages/nose/*
Index: pymacaroons-0.13.0/.gitignore
===================================================================
--- pymacaroons-0.13.0.orig/.gitignore
+++ pymacaroons-0.13.0/.gitignore
@@ -36,7 +36,6 @@ htmlcov/
.tox/
.coverage
.cache
-nosetests.xml
coverage.xml
# Translations
Index: pymacaroons-0.13.0/requirements.txt
===================================================================
--- pymacaroons-0.13.0.orig/requirements.txt
+++ pymacaroons-0.13.0/requirements.txt
@@ -2,12 +2,11 @@
-e .
# Test Dependencies
-nose==1.3.7
coverage>=4.5,<4.99
mock>=2.0.0,<2.99
sphinx>=1.2.3
+pytest
python-coveralls>=2.4.2
hypothesis==1.0.0
bumpversion
tox
-yanc
Index: pymacaroons-0.13.0/tests/functional_tests/encrypted_field_tests.py
===================================================================
--- pymacaroons-0.13.0.orig/tests/functional_tests/encrypted_field_tests.py
+++ pymacaroons-0.13.0/tests/functional_tests/encrypted_field_tests.py
@@ -1,7 +1,5 @@
from __future__ import unicode_literals
-from nose.tools import *
-
from nacl.bindings import crypto_box_NONCEBYTES
from pymacaroons import Macaroon, Verifier
from pymacaroons.caveat_delegates import EncryptedFirstPartyCaveatDelegate, EncryptedFirstPartyCaveatVerifierDelegate
@@ -26,10 +24,9 @@ class TestEncryptedFieldsMacaroon(object
))
m.first_party_caveat_delegate = EncryptedFirstPartyCaveatDelegate(field_encryptor=encryptor)
m.add_first_party_caveat('test = caveat', encrypted=True)
- assert_equal(
- m.signature,
+ assert\
+ m.signature ==\
'a443bc61e8f45dca4f0c441d6cfde90b804cebb0b267aab60de1ec2ab8cc8522'
- )
def test_verify_encrypted_first_party_exact_caveats(self):
m = Macaroon(
@@ -47,4 +44,4 @@ class TestEncryptedFieldsMacaroon(object
m,
'this is our super secret key; only we should know it'
)
- assert_true(verified)
+ assert verified
Index: pymacaroons-0.13.0/tests/functional_tests/functional_tests.py
===================================================================
--- pymacaroons-0.13.0.orig/tests/functional_tests/functional_tests.py
+++ pymacaroons-0.13.0/tests/functional_tests/functional_tests.py
@@ -1,8 +1,7 @@
from __future__ import unicode_literals
import json
-from mock import *
-from nose.tools import *
+from unittest.mock import *
from nacl.bindings import crypto_box_NONCEBYTES
from pymacaroons import Macaroon, MACAROON_V1, MACAROON_V2, Verifier
@@ -10,6 +9,7 @@ from pymacaroons.serializers import *
from pymacaroons.exceptions import *
from pymacaroons.utils import *
+import pytest
class TestMacaroon(object):
@@ -22,10 +22,7 @@ class TestMacaroon(object):
identifier='we used our secret key',
key='this is our super secret key; only we should know it'
)
- assert_equal(
- m.signature,
- 'e3d9e02908526c4c0039ae15114115d97fdd68bf2ba379b342aaf0f617d0552f'
- )
+ assert m.signature == 'e3d9e02908526c4c0039ae15114115d97fdd68bf2ba379b342aaf0f617d0552f'
def test_first_party_caveat(self):
m = Macaroon(
@@ -34,10 +31,7 @@ class TestMacaroon(object):
key='this is our super secret key; only we should know it'
)
m.add_first_party_caveat('test = caveat')
- assert_equal(
- m.signature,
- '197bac7a044af33332865b9266e26d493bdd668a660e44d88ce1a998c23dbd67'
- )
+ assert m.signature == '197bac7a044af33332865b9266e26d493bdd668a660e44d88ce1a998c23dbd67'
def test_serializing(self):
m = Macaroon(
@@ -47,12 +41,9 @@ class TestMacaroon(object):
version=MACAROON_V1
)
m.add_first_party_caveat('test = caveat')
- assert_equal(
- m.serialize(),
- 'MDAxY2xvY2F0aW9uIGh0dHA6Ly9teWJhbmsvCjAwMjZpZGVudGlmaWVyIHdlIHVzZ\
+ assert m.serialize() == 'MDAxY2xvY2F0aW9uIGh0dHA6Ly9teWJhbmsvCjAwMjZpZGVudGlmaWVyIHdlIHVzZ\
WQgb3VyIHNlY3JldCBrZXkKMDAxNmNpZCB0ZXN0ID0gY2F2ZWF0CjAwMmZzaWduYXR1cmUgGXusegR\
K8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'
- )
def test_serializing_with_binary_v1(self):
m = Macaroon(
@@ -63,8 +54,8 @@ K8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'
)
m.add_first_party_caveat('test = caveat')
n = Macaroon.deserialize(m.serialize())
- assert_equal(m.identifier, n.identifier)
- assert_equal(m.version, n.version)
+ assert m.identifier == n.identifier
+ assert m.version == n.version
def test_serializing_with_binary_v2(self):
identifier = base64.b64decode('AK2o+q0Aq9+bONkXw7ky7HAuhCLO9hhaMMc==')
@@ -76,8 +67,8 @@ K8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'
)
m.add_first_party_caveat('test = caveat')
n = Macaroon.deserialize(m.serialize())
- assert_equal(m.identifier_bytes, n.identifier_bytes)
- assert_equal(m.version, n.version)
+ assert m.identifier_bytes == n.identifier_bytes
+ assert m.version == n.version
def test_serializing_v1(self):
m = Macaroon(
@@ -88,8 +79,8 @@ K8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'
)
m.add_first_party_caveat('test = caveat')
n = Macaroon.deserialize(m.serialize())
- assert_equal(m.identifier, n.identifier)
- assert_equal(m.version, n.version)
+ assert m.identifier == n.identifier
+ assert m.version == n.version
def test_serializing_v2(self):
m = Macaroon(
@@ -100,11 +91,11 @@ K8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'
)
m.add_first_party_caveat('test = caveat')
n = Macaroon.deserialize(m.serialize())
- assert_equal(m.identifier_bytes, n.identifier_bytes)
- assert_equal(m.version, n.version)
+ assert m.identifier_bytes == n.identifier_bytes
+ assert m.version == n.version
def test_deserializing_invalid(self):
- with assert_raises(MacaroonDeserializationException) as cm:
+ with pytest.raises(MacaroonDeserializationException) as cm:
Macaroon.deserialize("QA")
def test_serializing_strips_padding(self):
@@ -115,31 +106,22 @@ K8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'
version=MACAROON_V1
)
m.add_first_party_caveat('test = acaveat')
- assert_equal(
- m.serialize(),
- # In padded base64, this would end with '=='
- ('MDAxY2xvY2F0aW9uIGh0dHA6Ly9teWJhbmsvCjAwMjZpZGVudGlmaWVyIHdlIHVz'
- 'ZWQgb3VyIHNlY3JldCBrZXkKMDAxN2NpZCB0ZXN0ID0gYWNhdmVhdAowMDJmc2ln'
+ # In padded base64, this would end with '=='
+ assert m.serialize() == ('MDAxY2xvY2F0aW9uIGh0dHA6Ly9teWJhbmsvCjAwMjZpZGVudGlmaWVyIHdlIHVz'\
+ 'ZWQgb3VyIHNlY3JldCBrZXkKMDAxN2NpZCB0ZXN0ID0gYWNhdmVhdAowMDJmc2ln'\
'bmF0dXJlIJRJ_V3WNJQnqlVq5eez7spnltwU_AXs8NIRY739sHooCg')
- )
def test_serializing_max_length_packet(self):
m = Macaroon(location='test', identifier='blah', key='secret',
version=MACAROON_V1)
m.add_first_party_caveat('x' * 65526) # exactly 0xFFFF
- assert_not_equal(
- m.serialize(),
- None
- )
+ assert m.serialize() != None
def test_serializing_too_long_packet(self):
m = Macaroon(location='test', identifier='blah', key='secret',
version=MACAROON_V1)
m.add_first_party_caveat('x' * 65527) # one byte too long
- assert_raises(
- MacaroonSerializationException,
- m.serialize
- )
+ pytest.raises(MacaroonSerializationException, m.serialize)
def test_deserializing(self):
m = Macaroon.deserialize(
@@ -147,10 +129,7 @@ K8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'
VyIHdlIHVzZWQgb3VyIHNlY3JldCBrZXkKMDAxNmNpZCB0ZXN0ID0gY2F2ZWF0CjAwMmZzaWduYXR1\
cmUgGXusegRK8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'
)
- assert_equal(
- m.signature,
- '197bac7a044af33332865b9266e26d493bdd668a660e44d88ce1a998c23dbd67'
- )
+ assert m.signature == '197bac7a044af33332865b9266e26d493bdd668a660e44d88ce1a998c23dbd67'
def test_deserializing_with_binary(self):
m = Macaroon.deserialize(
@@ -158,10 +137,7 @@ cmUgGXusegRK8zMyhluSZuJtSTvdZopmDkTYjOGp
VyIHdlIHVzZWQgb3VyIHNlY3JldCBrZXkKMDAxNmNpZCB0ZXN0ID0gY2F2ZWF0CjAwMmZzaWduYXR1\
cmUgGXusegRK8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWcK'.encode('ascii')
)
- assert_equal(
- m.signature,
- '197bac7a044af33332865b9266e26d493bdd668a660e44d88ce1a998c23dbd67'
- )
+ assert m.signature == '197bac7a044af33332865b9266e26d493bdd668a660e44d88ce1a998c23dbd67'
def test_deserializing_accepts_padding(self):
m = Macaroon.deserialize(
@@ -169,10 +145,7 @@ cmUgGXusegRK8zMyhluSZuJtSTvdZopmDkTYjOGp
'ZWQgb3VyIHNlY3JldCBrZXkKMDAxN2NpZCB0ZXN0ID0gYWNhdmVhdAowMDJmc2ln'
'bmF0dXJlIJRJ_V3WNJQnqlVq5eez7spnltwU_AXs8NIRY739sHooCg==')
)
- assert_equal(
- m.signature,
- '9449fd5dd6349427aa556ae5e7b3eeca6796dc14fc05ecf0d21163bdfdb07a28'
- )
+ assert m.signature == '9449fd5dd6349427aa556ae5e7b3eeca6796dc14fc05ecf0d21163bdfdb07a28'
def test_serializing_json_v1(self):
m = Macaroon(
@@ -182,10 +155,8 @@ cmUgGXusegRK8zMyhluSZuJtSTvdZopmDkTYjOGp
version=MACAROON_V1
)
m.add_first_party_caveat('test = caveat')
- assert_equal(
- json.loads(m.serialize(serializer=JsonSerializer()))['signature'],
+ assert json.loads(m.serialize(serializer=JsonSerializer()))['signature'] ==\
"197bac7a044af33332865b9266e26d493bdd668a660e44d88ce1a998c23dbd67"
- )
def test_serializing_json_v2_with_binary(self):
id = base64.b64decode('AK2o+q0Aq9+bONkXw7ky7HAuhCLO9hhaMMc==')
@@ -195,15 +166,14 @@ cmUgGXusegRK8zMyhluSZuJtSTvdZopmDkTYjOGp
key='this is our super secret key; only we should know it',
version=MACAROON_V2
)
- assert_equal(
- json.loads(m.serialize(serializer=JsonSerializer()))['i64'],
+ assert json.loads(m.serialize(serializer=JsonSerializer()))['i64'] ==\
"AK2o-q0Aq9-bONkXw7ky7HAuhCLO9hhaMMc"
- )
+
n = Macaroon.deserialize(
m.serialize(serializer=JsonSerializer()),
serializer=JsonSerializer()
)
- assert_equal(m.identifier_bytes, n.identifier_bytes)
+ assert m.identifier_bytes == n.identifier_bytes
def test_serializing_json_v2(self):
m = Macaroon(
@@ -213,10 +183,9 @@ cmUgGXusegRK8zMyhluSZuJtSTvdZopmDkTYjOGp
version=MACAROON_V2
)
m.add_first_party_caveat('test = caveat')
- assert_equal(
- json.loads(m.serialize(serializer=JsonSerializer()))['s64'],
+ assert\
+ json.loads(m.serialize(serializer=JsonSerializer()))['s64'] ==\
"GXusegRK8zMyhluSZuJtSTvdZopmDkTYjOGpmMI9vWc"
- )
def test_deserializing_json_v1(self):
m = Macaroon.deserialize(
@@ -225,10 +194,9 @@ key", "signature": "197bac7a044af3333286
3dbd67", "caveats": [{"cl": null, "cid": "test = caveat", "vid": null}]}',
serializer=JsonSerializer()
)
- assert_equal(
- m.signature,
+ assert\
+ m.signature ==\
'197bac7a044af33332865b9266e26d493bdd668a660e44d88ce1a998c23dbd67'
- )
def test_deserializing_json_v2(self):
m = Macaroon.deserialize(
@@ -237,10 +205,9 @@ key", "signature": "197bac7a044af3333286
', "c": [{"l": null, "i": "test = caveat", "v": null}]}',
serializer=JsonSerializer()
)
- assert_equal(
- m.signature_bytes,
+ assert \
+ m.signature_bytes ==\
binascii.hexlify(b'197bac7a044af33332')
- )
def test_serializing_deserializing_json_v1(self):
self._serializing_deserializing_json_with_version(MACAROON_V1)
@@ -260,7 +227,7 @@ key", "signature": "197bac7a044af3333286
m.serialize(serializer=JsonSerializer()),
serializer=JsonSerializer()
)
- assert_equal(m.signature, n.signature)
+ assert m.signature == n.signature
def test_verify_first_party_exact_caveats(self):
m = Macaroon(
@@ -275,7 +242,7 @@ key", "signature": "197bac7a044af3333286
m,
'this is our super secret key; only we should know it'
)
- assert_true(verified)
+ assert verified
def test_verify_first_party_general_caveats(self):
m = Macaroon(
@@ -294,7 +261,7 @@ key", "signature": "197bac7a044af3333286
m,
'this is our super secret key; only we should know it'
)
- assert_true(verified)
+ assert verified
@patch('nacl.secret.random')
def test_third_party_caveat(self, rand_nonce):
@@ -313,10 +280,9 @@ never use the same secret twice'
caveat_key = '4; guaranteed random by a fair toss of the dice'
identifier = 'this was how we remind auth of key/pred'
m.add_third_party_caveat('http://auth.mybank/', caveat_key, identifier)
- assert_equal(
- m.signature,
+ assert\
+ m.signature ==\
'd27db2fd1f22760e4c3dae8137e2d8fc1df6c0741c18aed4b97256bf78d1f55c'
- )
def test_serializing_macaroon_with_first_and_third_caveats_v1(self):
self._serializing_macaroon_with_first_and_third_caveats(MACAROON_V1)
@@ -339,10 +305,7 @@ never use the same secret twice',
n = Macaroon.deserialize(m.serialize())
- assert_equal(
- m.signature,
- n.signature
- )
+ assert m.signature == n.signature
@patch('nacl.secret.random')
def test_prepare_for_request(self, rand_nonce):
@@ -373,10 +336,9 @@ never use the same secret twice'
)
discharge.add_first_party_caveat('time < 2015-01-01T00:00')
protected = m.prepare_for_request(discharge)
- assert_equal(
- protected.signature,
+ assert\
+ protected.signature ==\
'2eb01d0dd2b4475330739140188648cf25dda0425ea9f661f1574ca0a9eac54e'
- )
def test_verify_third_party_caveats(self):
m = Macaroon(
@@ -407,7 +369,7 @@ never use the same secret twice'
never use the same secret twice',
discharge_macaroons=[protected]
)
- assert_true(verified)
+ assert verified
def test_verify_third_party_caveats_multi_level(self):
# See https://github.com/ecordell/pymacaroons/issues/37
@@ -426,7 +388,7 @@ never use the same secret twice',
discharge2 = root.prepare_for_request(discharge2)
verified = Verifier().verify(root, "root-key", [discharge1, discharge2])
- assert_true(verified)
+ assert verified
@patch('nacl.secret.random')
def test_inspect(self, rand_nonce):
@@ -444,11 +406,11 @@ never use the same secret twice',
caveat_key = '4; guaranteed random by a fair toss of the dice'
identifier = 'this was how we remind auth of key/pred'
m.add_third_party_caveat('http://auth.mybank/', caveat_key, identifier)
- assert_equal(m.inspect(), (
+ assert m.inspect() == (
'location http://mybank/\n'
'identifier we used our secret key\n'
'cid test = caveat\n'
'cid this was how we remind auth of key/pred\n'
'vid AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA68NYajhiFuHnKGSNcVhkAwgbs0VZ0yK2o+q0Aq9+bONkXw7ky7HAuhCLO9hhaMMc\n'
'cl http://auth.mybank/\n'
- 'signature 7a9289bfbb92d725f748bbcb4f3e04e56b7021513ebeed8411bfba10a16a662e'))
+ 'signature 7a9289bfbb92d725f748bbcb4f3e04e56b7021513ebeed8411bfba10a16a662e')
Index: pymacaroons-0.13.0/tests/functional_tests/serialization_tests.py
===================================================================
--- pymacaroons-0.13.0.orig/tests/functional_tests/serialization_tests.py
+++ pymacaroons-0.13.0/tests/functional_tests/serialization_tests.py
@@ -1,4 +1,4 @@
-from nose.tools import *
+import pytest
from pymacaroons import Macaroon, Verifier, MACAROON_V1, MACAROON_V2
from pymacaroons.serializers import JsonSerializer
@@ -66,9 +66,9 @@ class TestSerializationCompatibility(obj
def assert_macaroon(m, discharge, version):
- assert_equal(m.location, 'my location')
- assert_equal(m.version, version)
- assert_equal(m.identifier_bytes, b'my identifier')
+ assert m.location == 'my location'
+ assert m.version == version
+ assert m.identifier_bytes == b'my identifier'
v = Verifier()
v.satisfy_exact('fp caveat')
verified = v.verify(
@@ -76,4 +76,4 @@ def assert_macaroon(m, discharge, versio
"my secret key",
discharge_macaroons=[discharge],
)
- assert_true(verified)
+ assert verified
Index: pymacaroons-0.13.0/tests/property_tests/macaroon_property_tests.py
===================================================================
--- pymacaroons-0.13.0.orig/tests/property_tests/macaroon_property_tests.py
+++ pymacaroons-0.13.0/tests/property_tests/macaroon_property_tests.py
@@ -1,6 +1,5 @@
from __future__ import unicode_literals
-from nose.tools import *
from hypothesis import *
from hypothesis.specifiers import *
@@ -36,9 +35,9 @@ class TestMacaroon(object):
version=MACAROON_V1
)
deserialized = Macaroon.deserialize(macaroon.serialize())
- assert_equal(macaroon.identifier, deserialized.identifier)
- assert_equal(macaroon.location, deserialized.location)
- assert_equal(macaroon.signature, deserialized.signature)
+ assert macaroon.identifier == deserialized.identifier
+ assert macaroon.location == deserialized.location
+ assert macaroon.signature == deserialized.signature
macaroon = Macaroon(
location=loc,
identifier=key_id,
@@ -46,6 +45,6 @@ class TestMacaroon(object):
version=MACAROON_V2
)
deserialized = Macaroon.deserialize(macaroon.serialize())
- assert_equal(macaroon.identifier_bytes, deserialized.identifier_bytes)
- assert_equal(macaroon.location, deserialized.location)
- assert_equal(macaroon.signature, deserialized.signature)
+ assert macaroon.identifier_bytes == deserialized.identifier_bytes
+ assert macaroon.location == deserialized.location
+ assert macaroon.signature == deserialized.signature
Index: pymacaroons-0.13.0/tox.ini
===================================================================
--- pymacaroons-0.13.0.orig/tox.ini
+++ pymacaroons-0.13.0/tox.ini
@@ -5,12 +5,12 @@ skip_missing_interpreters=True
[testenv]
deps=-rrequirements.txt
commands=
- nosetests --with-yanc
+ pytest --color=yes
[testenv:py26]
deps=-rrequirements.txt
commands=
- nosetests tests/functional_tests --with-yanc
+ pytest --color=yes tests/functional_tests
[testenv:docs]
basepython=python
@@ -28,4 +28,4 @@ commands=
[testenv:coverage]
deps=-rrequirements.txt
commands=
- nosetests --with-coverage --cover-erase --cover-package=pymacaroons
+ pytest --cov=pymacaroons tests/
Index: pymacaroons-0.13.0/pytest.ini
===================================================================
--- /dev/null
+++ pymacaroons-0.13.0/pytest.ini
@@ -0,0 +1,5 @@
+[pytest]
+python_files = *test*.py
+testpaths = tests/
+addopts = -v
+