@@ -71,7 +71,7 @@ def test_get_user_by_req_user_valid_token(self):
71
71
request .args [b"access_token" ] = [self .test_token ]
72
72
request .requestHeaders .getRawHeaders = mock_getRawHeaders ()
73
73
requester = self .get_success (self .auth .get_user_by_req (request ))
74
- self .assertEquals (requester .user .to_string (), self .test_user )
74
+ self .assertEqual (requester .user .to_string (), self .test_user )
75
75
76
76
def test_get_user_by_req_user_bad_token (self ):
77
77
self .store .get_user_by_access_token = simple_async_mock (None )
@@ -109,7 +109,7 @@ def test_get_user_by_req_appservice_valid_token(self):
109
109
request .args [b"access_token" ] = [self .test_token ]
110
110
request .requestHeaders .getRawHeaders = mock_getRawHeaders ()
111
111
requester = self .get_success (self .auth .get_user_by_req (request ))
112
- self .assertEquals (requester .user .to_string (), self .test_user )
112
+ self .assertEqual (requester .user .to_string (), self .test_user )
113
113
114
114
def test_get_user_by_req_appservice_valid_token_good_ip (self ):
115
115
from netaddr import IPSet
@@ -128,7 +128,7 @@ def test_get_user_by_req_appservice_valid_token_good_ip(self):
128
128
request .args [b"access_token" ] = [self .test_token ]
129
129
request .requestHeaders .getRawHeaders = mock_getRawHeaders ()
130
130
requester = self .get_success (self .auth .get_user_by_req (request ))
131
- self .assertEquals (requester .user .to_string (), self .test_user )
131
+ self .assertEqual (requester .user .to_string (), self .test_user )
132
132
133
133
def test_get_user_by_req_appservice_valid_token_bad_ip (self ):
134
134
from netaddr import IPSet
@@ -195,7 +195,7 @@ def test_get_user_by_req_appservice_valid_token_valid_user_id(self):
195
195
request .args [b"user_id" ] = [masquerading_user_id ]
196
196
request .requestHeaders .getRawHeaders = mock_getRawHeaders ()
197
197
requester = self .get_success (self .auth .get_user_by_req (request ))
198
- self .assertEquals (
198
+ self .assertEqual (
199
199
requester .user .to_string (), masquerading_user_id .decode ("utf8" )
200
200
)
201
201
@@ -242,10 +242,10 @@ def test_get_user_by_req_appservice_valid_token_valid_device_id(self):
242
242
request .args [b"org.matrix.msc3202.device_id" ] = [masquerading_device_id ]
243
243
request .requestHeaders .getRawHeaders = mock_getRawHeaders ()
244
244
requester = self .get_success (self .auth .get_user_by_req (request ))
245
- self .assertEquals (
245
+ self .assertEqual (
246
246
requester .user .to_string (), masquerading_user_id .decode ("utf8" )
247
247
)
248
- self .assertEquals (requester .device_id , masquerading_device_id .decode ("utf8" ))
248
+ self .assertEqual (requester .device_id , masquerading_device_id .decode ("utf8" ))
249
249
250
250
@override_config ({"experimental_features" : {"msc3202_device_masquerading" : True }})
251
251
def test_get_user_by_req_appservice_valid_token_invalid_device_id (self ):
@@ -275,8 +275,8 @@ def test_get_user_by_req_appservice_valid_token_invalid_device_id(self):
275
275
request .requestHeaders .getRawHeaders = mock_getRawHeaders ()
276
276
277
277
failure = self .get_failure (self .auth .get_user_by_req (request ), AuthError )
278
- self .assertEquals (failure .value .code , 400 )
279
- self .assertEquals (failure .value .errcode , Codes .EXCLUSIVE )
278
+ self .assertEqual (failure .value .code , 400 )
279
+ self .assertEqual (failure .value .errcode , Codes .EXCLUSIVE )
280
280
281
281
def test_get_user_by_req__puppeted_token__not_tracking_puppeted_mau (self ):
282
282
self .store .get_user_by_access_token = simple_async_mock (
@@ -309,7 +309,7 @@ def test_get_user_by_req__puppeted_token__tracking_puppeted_mau(self):
309
309
request .args [b"access_token" ] = [self .test_token ]
310
310
request .requestHeaders .getRawHeaders = mock_getRawHeaders ()
311
311
self .get_success (self .auth .get_user_by_req (request ))
312
- self .assertEquals (self .store .insert_client_ip .call_count , 2 )
312
+ self .assertEqual (self .store .insert_client_ip .call_count , 2 )
313
313
314
314
def test_get_user_from_macaroon (self ):
315
315
self .store .get_user_by_access_token = simple_async_mock (
@@ -369,9 +369,9 @@ def test_blocking_mau(self):
369
369
self .store .get_monthly_active_count = simple_async_mock (lots_of_users )
370
370
371
371
e = self .get_failure (self .auth .check_auth_blocking (), ResourceLimitError )
372
- self .assertEquals (e .value .admin_contact , self .hs .config .server .admin_contact )
373
- self .assertEquals (e .value .errcode , Codes .RESOURCE_LIMIT_EXCEEDED )
374
- self .assertEquals (e .value .code , 403 )
372
+ self .assertEqual (e .value .admin_contact , self .hs .config .server .admin_contact )
373
+ self .assertEqual (e .value .errcode , Codes .RESOURCE_LIMIT_EXCEEDED )
374
+ self .assertEqual (e .value .code , 403 )
375
375
376
376
# Ensure does not throw an error
377
377
self .store .get_monthly_active_count = simple_async_mock (small_number_of_users )
@@ -473,9 +473,9 @@ def test_hs_disabled(self):
473
473
self .auth_blocking ._hs_disabled = True
474
474
self .auth_blocking ._hs_disabled_message = "Reason for being disabled"
475
475
e = self .get_failure (self .auth .check_auth_blocking (), ResourceLimitError )
476
- self .assertEquals (e .value .admin_contact , self .hs .config .server .admin_contact )
477
- self .assertEquals (e .value .errcode , Codes .RESOURCE_LIMIT_EXCEEDED )
478
- self .assertEquals (e .value .code , 403 )
476
+ self .assertEqual (e .value .admin_contact , self .hs .config .server .admin_contact )
477
+ self .assertEqual (e .value .errcode , Codes .RESOURCE_LIMIT_EXCEEDED )
478
+ self .assertEqual (e .value .code , 403 )
479
479
480
480
def test_hs_disabled_no_server_notices_user (self ):
481
481
"""Check that 'hs_disabled_message' works correctly when there is no
@@ -488,9 +488,9 @@ def test_hs_disabled_no_server_notices_user(self):
488
488
self .auth_blocking ._hs_disabled = True
489
489
self .auth_blocking ._hs_disabled_message = "Reason for being disabled"
490
490
e = self .get_failure (self .auth .check_auth_blocking (), ResourceLimitError )
491
- self .assertEquals (e .value .admin_contact , self .hs .config .server .admin_contact )
492
- self .assertEquals (e .value .errcode , Codes .RESOURCE_LIMIT_EXCEEDED )
493
- self .assertEquals (e .value .code , 403 )
491
+ self .assertEqual (e .value .admin_contact , self .hs .config .server .admin_contact )
492
+ self .assertEqual (e .value .errcode , Codes .RESOURCE_LIMIT_EXCEEDED )
493
+ self .assertEqual (e .value .code , 403 )
494
494
495
495
def test_server_notices_mxid_special_cased (self ):
496
496
self .auth_blocking ._hs_disabled = True
0 commit comments