Skip to content

Commit 23226de

Browse files
committed
tests: Check for None with assertIsNone
Comporisons with None should always use the identity operator, not the equality operator
1 parent 2bd65e2 commit 23226de

File tree

4 files changed

+12
-12
lines changed

4 files changed

+12
-12
lines changed

tests/test_auth.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ def setUp(self):
5454

5555
def test_missing_request_arg(self):
5656
"""Test authentication returns `None` when `request` is not provided."""
57-
self.assertEqual(self.backend.authenticate(request=None), None)
57+
self.assertIsNone(self.backend.authenticate(request=None))
5858

5959
@patch('mozilla_django_oidc.auth.OIDCAuthenticationBackend.verify_token')
6060
@patch('mozilla_django_oidc.auth.requests')
@@ -77,7 +77,7 @@ def test_invalid_token(self, request_mock, token_mock):
7777
'accesss_token': 'access_token'
7878
}
7979
request_mock.post.return_value = post_json_mock
80-
self.assertEqual(self.backend.authenticate(request=auth_request), None)
80+
self.assertIsNone(self.backend.authenticate(request=auth_request))
8181

8282
@override_settings(OIDC_ALLOW_UNSECURED_JWT=True)
8383
def test_allowed_unsecured_token(self):
@@ -216,7 +216,7 @@ def test_get_user(self):
216216
def test_get_invalid_user(self):
217217
"""Test get_user method with non existing user."""
218218

219-
self.assertEqual(self.backend.get_user(user_id=1), None)
219+
self.assertIsNone(self.backend.get_user(user_id=1))
220220

221221
@override_settings(ROOT_URLCONF='tests.namespaced_urls')
222222
@override_settings(OIDC_AUTHENTICATION_CALLBACK_URL='namespace:oidc_authentication_callback')
@@ -644,7 +644,7 @@ def test_create_user_disabled(self, request_mock, jws_mock):
644644
'access_token': 'access_granted'
645645
}
646646
request_mock.post.return_value = post_json_mock
647-
self.assertEqual(self.backend.authenticate(request=auth_request), None)
647+
self.assertIsNone(self.backend.authenticate(request=auth_request))
648648

649649
@patch('mozilla_django_oidc.auth.OIDCAuthenticationBackend._verify_jws')
650650
@patch('mozilla_django_oidc.auth.requests')
@@ -759,7 +759,7 @@ def test_duplicate_emails_exact(self, request_mock, jws_mock):
759759
'access_token': 'access_granted'
760760
}
761761
request_mock.post.return_value = post_json_mock
762-
self.assertEqual(self.backend.authenticate(request=auth_request), None)
762+
self.assertIsNone(self.backend.authenticate(request=auth_request))
763763

764764
@override_settings(OIDC_USE_NONCE=False)
765765
@patch('mozilla_django_oidc.auth.OIDCAuthenticationBackend._verify_jws')
@@ -787,7 +787,7 @@ def test_duplicate_emails_case_mismatch(self, request_mock, jws_mock):
787787
'access_token': 'access_granted'
788788
}
789789
request_mock.post.return_value = post_json_mock
790-
self.assertEqual(self.backend.authenticate(request=auth_request), None)
790+
self.assertIsNone(self.backend.authenticate(request=auth_request))
791791

792792
@override_settings(OIDC_USE_NONCE=False)
793793
@patch('mozilla_django_oidc.auth.OIDCAuthenticationBackend.update_user')
@@ -822,7 +822,7 @@ def update_user(user, claims):
822822
'access_token': 'access_granted'
823823
}
824824
request_mock.post.return_value = post_json_mock
825-
self.assertEqual(self.backend.authenticate(request=auth_request), None)
825+
self.assertIsNone(self.backend.authenticate(request=auth_request))
826826

827827
self.assertEqual(User.objects.get().first_name, 'a_username')
828828

tests/test_contrib_drf.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def setUp(self):
1919
def test_authenticate_returns_none_if_no_access_token(self):
2020
with mock.patch.object(self.auth, 'get_access_token', return_value=None):
2121
ret = self.auth.authenticate(self.request)
22-
self.assertEqual(ret, None)
22+
self.assertIsNone(ret)
2323

2424
def test_authenticate_raises_authenticationfailed_if_backend_returns_no_user(self):
2525
self.auth.backend.get_or_create_user.return_value = None

tests/test_utils.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ def test_state_dictionary_without_nonce_format(self):
122122
self.assertTrue(isinstance(self.request.session['oidc_states'][state], dict))
123123

124124
# Test nonce
125-
self.assertEqual(self.request.session['oidc_states'][state]['nonce'], None)
125+
self.assertIsNone(self.request.session['oidc_states'][state]['nonce'])
126126

127127
# Test added_on timestamp
128128
self.assertTrue(isinstance(self.request.session['oidc_states'][state]['added_on'], float))

tests/test_views.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -274,7 +274,7 @@ def build_request(self, next_url):
274274
def test_no_param(self):
275275
req = self.factory.get('/')
276276
next_url = views.get_next_url(req, 'next')
277-
self.assertEqual(next_url, None)
277+
self.assertIsNone(next_url)
278278

279279
def test_non_next_param(self):
280280
req = self.factory.get('/', data={'redirectto': '/foo'})
@@ -331,7 +331,7 @@ def test_bad_urls(self):
331331
req = self.build_request(next_url=url)
332332
next_url = views.get_next_url(req, 'next')
333333

334-
self.assertEqual(next_url, None)
334+
self.assertIsNone(next_url)
335335

336336
def test_https(self):
337337
# If the request is for HTTPS and the next url is HTTPS, then that
@@ -353,7 +353,7 @@ def test_https(self):
353353
)
354354
self.assertEqual(req.is_secure(), True)
355355
next_url = views.get_next_url(req, 'next')
356-
self.assertEqual(next_url, None)
356+
self.assertIsNone(next_url)
357357

358358
@override_settings(OIDC_REDIRECT_REQUIRE_HTTPS=False)
359359
def test_redirect_https_not_required(self):

0 commit comments

Comments
 (0)