File: replace_deprecated_assertEquals.patch

package info (click to toggle)
python-netfilter 0.6.4-4
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 208 kB
  • sloc: python: 801; makefile: 3
file content (65 lines) | stat: -rw-r--r-- 3,014 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
From: Evangelos Ribeiro Tzaras <devrtz-debian@fortysixandtwo.eu>
Date: Wed, 20 Mar 2024 15:05:48 +0100
Subject: tests: Replace deprecated assertEquals with assertEqual
Forwarded: https://github.com/jlaine/python-netfilter/pull/4

They have been deprecated since python 3.1:
https://docs.python.org/3.1/library/unittest.html#deprecated-aliases

Closes: #1058211

---
 tests/test_netfilter.py | 30 +++++++++++++++---------------
 1 file changed, 15 insertions(+), 15 deletions(-)

diff --git a/tests/test_netfilter.py b/tests/test_netfilter.py
index c5a3609..9378607 100644
--- a/tests/test_netfilter.py
+++ b/tests/test_netfilter.py
@@ -65,31 +65,31 @@ class ParserTestCase(unittest.TestCase):
     def testParseChains(self):
         chains = netfilter.parser.parse_chains(iptables_data)
 
-        self.assertEquals(chains.keys(), ['INPUT', 'FORWARD', 'OUTPUT', 'firewall_forward_filter', 'firewall_input_filter'])
+        self.assertEqual(chains.keys(), ['INPUT', 'FORWARD', 'OUTPUT', 'firewall_forward_filter', 'firewall_input_filter'])
 
-        self.assertEquals(chains['INPUT']['policy'], 'DROP')
-        self.assertEquals(chains['INPUT']['bytes'], 75796)
-        self.assertEquals(chains['INPUT']['packets'], 556)
+        self.assertEqual(chains['INPUT']['policy'], 'DROP')
+        self.assertEqual(chains['INPUT']['bytes'], 75796)
+        self.assertEqual(chains['INPUT']['packets'], 556)
 
-        self.assertEquals(chains['FORWARD']['policy'], 'DROP')
-        self.assertEquals(chains['FORWARD']['bytes'], 11510)
-        self.assertEquals(chains['FORWARD']['packets'], 204)
+        self.assertEqual(chains['FORWARD']['policy'], 'DROP')
+        self.assertEqual(chains['FORWARD']['bytes'], 11510)
+        self.assertEqual(chains['FORWARD']['packets'], 204)
 
-        self.assertEquals(chains['OUTPUT']['policy'], 'ACCEPT')
-        self.assertEquals(chains['OUTPUT']['bytes'], 214582)
-        self.assertEquals(chains['OUTPUT']['packets'], 1884)
+        self.assertEqual(chains['OUTPUT']['policy'], 'ACCEPT')
+        self.assertEqual(chains['OUTPUT']['bytes'], 214582)
+        self.assertEqual(chains['OUTPUT']['packets'], 1884)
 
     def testParseRules(self):
         rules = netfilter.parser.parse_rules(iptables_data, 'INPUT')
-        self.assertEquals(len(rules), 1)
-        self.assertEquals(rules[0].jump.name(), 'firewall_input_filter')
+        self.assertEqual(len(rules), 1)
+        self.assertEqual(rules[0].jump.name(), 'firewall_input_filter')
 
         rules = netfilter.parser.parse_rules(iptables_data, 'FORWARD')
-        self.assertEquals(len(rules), 1)
-        self.assertEquals(rules[0].jump.name(), 'firewall_forward_filter')
+        self.assertEqual(len(rules), 1)
+        self.assertEqual(rules[0].jump.name(), 'firewall_forward_filter')
 
         rules = netfilter.parser.parse_rules(iptables_data, 'OUTPUT')
-        self.assertEquals(rules, [])
+        self.assertEqual(rules, [])
 
 class TargetTestCase(unittest.TestCase):
     def testInit(self):