Skip to content

Commit dfa8dc1

Browse files
authored
Merge pull request #1666 from minrk/bare-asserts
FMT: use bare asserts to let pytest handle reporting
2 parents b941773 + c064c83 commit dfa8dc1

23 files changed

+426
-428
lines changed

zmq/tests/test_asyncio.py

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ async def test():
9090
assert not f.done()
9191
await a.send(b"hi")
9292
recvd = await f
93-
self.assertEqual(recvd, [b"hi"])
93+
assert recvd == [b"hi"]
9494

9595
self.loop.run_until_complete(test())
9696

@@ -104,8 +104,8 @@ async def test():
104104
await a.send_multipart([b"hi", b"there"])
105105
recvd = await f2
106106
assert f1.done()
107-
self.assertEqual(f1.result(), b"hi")
108-
self.assertEqual(recvd, b"there")
107+
assert f1.result() == b"hi"
108+
assert recvd == b"there"
109109

110110
self.loop.run_until_complete(test())
111111

@@ -122,7 +122,7 @@ async def test():
122122
await a.send_multipart([b"hi", b"there"])
123123
recvd = await f2
124124
assert f2.done()
125-
self.assertEqual(recvd, [b"hi", b"there"])
125+
assert recvd == [b"hi", b"there"]
126126

127127
self.loop.run_until_complete(test())
128128

@@ -145,8 +145,8 @@ async def test():
145145
await a.send_string(msg)
146146
recvd = await f
147147
assert f.done()
148-
self.assertEqual(f.result(), msg)
149-
self.assertEqual(recvd, msg)
148+
assert f.result() == msg
149+
assert recvd == msg
150150

151151
self.loop.run_until_complete(test())
152152

@@ -159,8 +159,8 @@ async def test():
159159
await a.send_json(obj)
160160
recvd = await f
161161
assert f.done()
162-
self.assertEqual(f.result(), obj)
163-
self.assertEqual(recvd, obj)
162+
assert f.result() == obj
163+
assert recvd == obj
164164

165165
self.loop.run_until_complete(test())
166166

@@ -202,8 +202,8 @@ async def test():
202202
await a.send_pyobj(obj)
203203
recvd = await f
204204
assert f.done()
205-
self.assertEqual(f.result(), obj)
206-
self.assertEqual(recvd, obj)
205+
assert f.result() == obj
206+
assert recvd == obj
207207

208208
self.loop.run_until_complete(test())
209209

@@ -274,7 +274,7 @@ async def test():
274274
f = pull.recv(zmq.DONTWAIT)
275275
assert f.done()
276276
msg = await f
277-
self.assertEqual(msg, b"ping")
277+
assert msg == b"ping"
278278

279279
self.loop.run_until_complete(test())
280280

@@ -290,7 +290,7 @@ async def test():
290290
recvd = await f2
291291
assert f1.cancelled()
292292
assert f2.done()
293-
self.assertEqual(recvd, [b"hi", b"there"])
293+
assert recvd == [b"hi", b"there"]
294294

295295
self.loop.run_until_complete(test())
296296

@@ -299,21 +299,21 @@ async def test():
299299
a, b = self.create_bound_pair(zmq.PUSH, zmq.PULL)
300300
f = b.poll(timeout=0)
301301
await asyncio.sleep(0)
302-
self.assertEqual(f.result(), 0)
302+
assert f.result() == 0
303303

304304
f = b.poll(timeout=1)
305305
assert not f.done()
306306
evt = await f
307307

308-
self.assertEqual(evt, 0)
308+
assert evt == 0
309309

310310
f = b.poll(timeout=1000)
311311
assert not f.done()
312312
await a.send_multipart([b"hi", b"there"])
313313
evt = await f
314-
self.assertEqual(evt, zmq.POLLIN)
314+
assert evt == zmq.POLLIN
315315
recvd = await b.recv_multipart()
316-
self.assertEqual(recvd, [b"hi", b"there"])
316+
assert recvd == [b"hi", b"there"]
317317

318318
self.loop.run_until_complete(test())
319319

@@ -334,9 +334,9 @@ async def test():
334334
assert not f.done()
335335
a.send_multipart([b"hi", b"there"])
336336
evt = await f
337-
self.assertEqual(evt, [(b, zmq.POLLIN)])
337+
assert evt == [(b, zmq.POLLIN)]
338338
recvd = b.recv_multipart()
339-
self.assertEqual(recvd, [b"hi", b"there"])
339+
assert recvd == [b"hi", b"there"]
340340

341341
self.loop.run_until_complete(test())
342342

zmq/tests/test_auth.py

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ def can_connect(self, server, client):
124124
except zmq.Again:
125125
warnings.warn("client set POLLIN, but cannot recv", RuntimeWarning)
126126
else:
127-
self.assertEqual(rcvd_msg, msg)
127+
assert rcvd_msg == msg
128128
result = True
129129
return result
130130

@@ -139,15 +139,15 @@ def test_null(self):
139139

140140
server = self.socket(zmq.PUSH)
141141
client = self.socket(zmq.PULL)
142-
self.assertTrue(self.can_connect(server, client))
142+
assert self.can_connect(server, client)
143143

144144
# By setting a domain we switch on authentication for NULL sockets,
145145
# though no policies are configured yet. The client connection
146146
# should still be allowed.
147147
server = self.socket(zmq.PUSH)
148148
server.zap_domain = b'global'
149149
client = self.socket(zmq.PULL)
150-
self.assertTrue(self.can_connect(server, client))
150+
assert self.can_connect(server, client)
151151

152152
def test_blacklist(self):
153153
"""threaded auth - Blacklist"""
@@ -158,7 +158,7 @@ def test_blacklist(self):
158158
# though no policies are configured yet.
159159
server.zap_domain = b'global'
160160
client = self.socket(zmq.PULL)
161-
self.assertFalse(self.can_connect(server, client))
161+
assert not self.can_connect(server, client)
162162

163163
def test_whitelist(self):
164164
"""threaded auth - Whitelist"""
@@ -169,7 +169,7 @@ def test_whitelist(self):
169169
# though no policies are configured yet.
170170
server.zap_domain = b'global'
171171
client = self.socket(zmq.PULL)
172-
self.assertTrue(self.can_connect(server, client))
172+
assert self.can_connect(server, client)
173173

174174
def test_plain(self):
175175
"""threaded auth - PLAIN"""
@@ -180,7 +180,7 @@ def test_plain(self):
180180
client = self.socket(zmq.PULL)
181181
client.plain_username = b'admin'
182182
client.plain_password = b'Password'
183-
self.assertFalse(self.can_connect(server, client))
183+
assert not self.can_connect(server, client)
184184

185185
# Try PLAIN authentication - with server configured, connection should pass
186186
server = self.socket(zmq.PUSH)
@@ -189,23 +189,23 @@ def test_plain(self):
189189
client.plain_username = b'admin'
190190
client.plain_password = b'Password'
191191
self.auth.configure_plain(domain='*', passwords={'admin': 'Password'})
192-
self.assertTrue(self.can_connect(server, client))
192+
assert self.can_connect(server, client)
193193

194194
# Try PLAIN authentication - with bogus credentials, connection should fail
195195
server = self.socket(zmq.PUSH)
196196
server.plain_server = True
197197
client = self.socket(zmq.PULL)
198198
client.plain_username = b'admin'
199199
client.plain_password = b'Bogus'
200-
self.assertFalse(self.can_connect(server, client))
200+
assert not self.can_connect(server, client)
201201

202202
# Remove authenticator and check that a normal connection works
203203
self.auth.stop()
204204
self.auth = None
205205

206206
server = self.socket(zmq.PUSH)
207207
client = self.socket(zmq.PULL)
208-
self.assertTrue(self.can_connect(server, client))
208+
assert self.can_connect(server, client)
209209
client.close()
210210
server.close()
211211

@@ -224,7 +224,7 @@ def test_curve(self):
224224
client.curve_publickey = client_public
225225
client.curve_secretkey = client_secret
226226
client.curve_serverkey = server_public
227-
self.assertFalse(self.can_connect(server, client))
227+
assert not self.can_connect(server, client)
228228

229229
# Try CURVE authentication - with server configured to CURVE_ALLOW_ANY, connection should pass
230230
self.auth.configure_curve(domain='*', location=zmq.auth.CURVE_ALLOW_ANY)
@@ -236,7 +236,7 @@ def test_curve(self):
236236
client.curve_publickey = client_public
237237
client.curve_secretkey = client_secret
238238
client.curve_serverkey = server_public
239-
self.assertTrue(self.can_connect(server, client))
239+
assert self.can_connect(server, client)
240240

241241
# Try CURVE authentication - with server configured, connection should pass
242242
self.auth.configure_curve(domain='*', location=self.public_keys_dir)
@@ -257,7 +257,7 @@ def test_curve(self):
257257
# Try connecting using NULL and no authentication enabled, connection should pass
258258
server = self.socket(zmq.PUSH)
259259
client = self.socket(zmq.PULL)
260-
self.assertTrue(self.can_connect(server, client))
260+
assert self.can_connect(server, client)
261261

262262
def test_curve_callback(self):
263263
"""threaded auth - CURVE with callback authentication"""
@@ -274,7 +274,7 @@ def test_curve_callback(self):
274274
client.curve_publickey = client_public
275275
client.curve_secretkey = client_secret
276276
client.curve_serverkey = server_public
277-
self.assertFalse(self.can_connect(server, client))
277+
assert not self.can_connect(server, client)
278278

279279
# Try CURVE authentication - with callback authentication configured, connection should pass
280280

@@ -298,7 +298,7 @@ def callback(self, domain, key):
298298
client.curve_publickey = client_public
299299
client.curve_secretkey = client_secret
300300
client.curve_serverkey = server_public
301-
self.assertTrue(self.can_connect(server, client))
301+
assert self.can_connect(server, client)
302302

303303
# Try CURVE authentication - with callback authentication configured with wrong key, connection should not pass
304304

@@ -322,7 +322,7 @@ def callback(self, domain, key):
322322
client.curve_publickey = client_public
323323
client.curve_secretkey = client_secret
324324
client.curve_serverkey = server_public
325-
self.assertFalse(self.can_connect(server, client))
325+
assert not self.can_connect(server, client)
326326

327327
@skip_pypy
328328
def test_curve_user_id(self):

0 commit comments

Comments
 (0)