Update hacking for Python3
The repo is Python 3 now, so update hacking to version 3.0 which
supports Python 3.
Fix problems found by updated hacking version.
Change-Id: I4f24c0fa5178f15912db899fcf26ca11480eab21
Andreas Jaeger authored 4 years ago
Andreas Jaeger committed 4 years ago
116 | 116 |
self.ks_password_credential)
|
117 | 117 |
|
118 | 118 |
self.assertFalse(self.ks_password_credential is None)
|
119 | |
self.assertFalse(None == self.ks_password_credential)
|
|
119 |
self.assertFalse(None == self.ks_password_credential) # noqa: E711
|
120 | 120 |
|
121 | 121 |
other_ks_password_credential = keystone_password.KeystonePassword(
|
122 | 122 |
self.password,
|
|
139 | 139 |
|
140 | 140 |
def test___ne___none(self):
|
141 | 141 |
self.assertTrue(self.ks_password_credential is not None)
|
142 | |
self.assertTrue(None != self.ks_password_credential)
|
|
142 |
self.assertTrue(None != self.ks_password_credential) # noqa: E711
|
143 | 143 |
|
144 | 144 |
def test___ne___password(self):
|
145 | 145 |
other_password = "wheresmyCat??"
|
92 | 92 |
self.ks_token_credential)
|
93 | 93 |
|
94 | 94 |
self.assertFalse(self.ks_token_credential is None)
|
95 | |
self.assertFalse(None == self.ks_token_credential)
|
|
95 |
self.assertFalse(None == self.ks_token_credential) # noqa: E711
|
96 | 96 |
|
97 | 97 |
other_ks_token_credential = keystone_token.KeystoneToken(
|
98 | 98 |
self.token,
|
|
111 | 111 |
|
112 | 112 |
def test___ne___none(self):
|
113 | 113 |
self.assertTrue(self.ks_token_credential is not None)
|
114 | |
self.assertTrue(None != self.ks_token_credential)
|
|
114 |
self.assertTrue(None != self.ks_token_credential) # noqa: E711
|
115 | 115 |
|
116 | 116 |
def test___ne___token(self):
|
117 | 117 |
other_token = "5c59e3217d3d4dd297589b297aee2a6f"
|
45 | 45 |
self.assertTrue(self.password_credential is self.password_credential)
|
46 | 46 |
|
47 | 47 |
self.assertFalse(self.password_credential is None)
|
48 | |
self.assertFalse(None == self.password_credential)
|
|
48 |
self.assertFalse(None == self.password_credential) # noqa: E711
|
49 | 49 |
|
50 | 50 |
other_password_credential = password.Password(self.username,
|
51 | 51 |
self.password)
|
|
54 | 54 |
|
55 | 55 |
def test___ne___none(self):
|
56 | 56 |
self.assertTrue(self.password_credential is not None)
|
57 | |
self.assertTrue(None != self.password_credential)
|
|
57 |
self.assertTrue(None != self.password_credential) # noqa: E711
|
58 | 58 |
|
59 | 59 |
def test___ne___username(self):
|
60 | 60 |
other_username = "service"
|
38 | 38 |
self.assertTrue(self.token_credential is self.token_credential)
|
39 | 39 |
|
40 | 40 |
self.assertFalse(self.token_credential is None)
|
41 | |
self.assertFalse(None == self.token_credential)
|
|
41 |
self.assertFalse(None == self.token_credential) # noqa: E711
|
42 | 42 |
|
43 | 43 |
other_token_credential = token.Token(self.token)
|
44 | 44 |
self.assertTrue(self.token_credential == other_token_credential)
|
|
46 | 46 |
|
47 | 47 |
def test___ne___none(self):
|
48 | 48 |
self.assertTrue(self.token_credential is not None)
|
49 | |
self.assertTrue(None != self.token_credential)
|
|
49 |
self.assertTrue(None != self.token_credential) # noqa: E711
|
50 | 50 |
|
51 | 51 |
def test___ne___token(self):
|
52 | 52 |
other_token = "fe32af1fe47e4744a48254e60ae80012"
|
66 | 66 |
self.assertTrue(self.opaque_data is self.opaque_data)
|
67 | 67 |
|
68 | 68 |
self.assertFalse(self.opaque_data is None)
|
69 | |
self.assertFalse(None == self.opaque_data)
|
|
69 |
self.assertFalse(None == self.opaque_data) # noqa: E711
|
70 | 70 |
|
71 | 71 |
other_opaque_data = opaque_data.OpaqueData(self.data)
|
72 | 72 |
self.assertTrue(self.opaque_data == other_opaque_data)
|
|
74 | 74 |
|
75 | 75 |
def test___ne___none(self):
|
76 | 76 |
self.assertTrue(self.opaque_data is not None)
|
77 | |
self.assertTrue(None != self.opaque_data)
|
|
77 |
self.assertTrue(None != self.opaque_data) # noqa: E711
|
78 | 78 |
|
79 | 79 |
def test___ne___data(self):
|
80 | 80 |
other_opaque = opaque_data.OpaqueData(b'other data', self.name)
|
66 | 66 |
self.assertTrue(self.passphrase is self.passphrase)
|
67 | 67 |
|
68 | 68 |
self.assertFalse(self.passphrase is None)
|
69 | |
self.assertFalse(None == self.passphrase)
|
|
69 |
self.assertFalse(None == self.passphrase) # noqa: E711
|
70 | 70 |
|
71 | 71 |
other_passphrase = passphrase.Passphrase(self.passphrase_data)
|
72 | 72 |
self.assertTrue(self.passphrase == other_passphrase)
|
|
74 | 74 |
|
75 | 75 |
def test___ne___none(self):
|
76 | 76 |
self.assertTrue(self.passphrase is not None)
|
77 | |
self.assertTrue(None != self.passphrase)
|
|
77 |
self.assertTrue(None != self.passphrase) # noqa: E711
|
78 | 78 |
|
79 | 79 |
def test___ne___data(self):
|
80 | 80 |
other_phrase = passphrase.Passphrase(b"other passphrase", self.name)
|
82 | 82 |
self.assertTrue(self.key is self.key)
|
83 | 83 |
|
84 | 84 |
self.assertFalse(self.key is None)
|
85 | |
self.assertFalse(None == self.key)
|
|
85 |
self.assertFalse(None == self.key) # noqa: E711
|
86 | 86 |
|
87 | 87 |
other_key = private_key.PrivateKey(self.algorithm,
|
88 | 88 |
self.bit_length,
|
|
92 | 92 |
|
93 | 93 |
def test___ne___none(self):
|
94 | 94 |
self.assertTrue(self.key is not None)
|
95 | |
self.assertTrue(None != self.key)
|
|
95 |
self.assertTrue(None != self.key) # noqa: E711
|
96 | 96 |
|
97 | 97 |
def test___ne___algorithm(self):
|
98 | 98 |
other_key = private_key.PrivateKey('DSA',
|
82 | 82 |
self.assertTrue(self.key is self.key)
|
83 | 83 |
|
84 | 84 |
self.assertFalse(self.key is None)
|
85 | |
self.assertFalse(None == self.key)
|
|
85 |
self.assertFalse(None == self.key) # noqa: E711
|
86 | 86 |
|
87 | 87 |
other_key = public_key.PublicKey(self.algorithm,
|
88 | 88 |
self.bit_length,
|
|
92 | 92 |
|
93 | 93 |
def test___ne___none(self):
|
94 | 94 |
self.assertTrue(self.key is not None)
|
95 | |
self.assertTrue(None != self.key)
|
|
95 |
self.assertTrue(None != self.key) # noqa: E711
|
96 | 96 |
|
97 | 97 |
def test___ne___algorithm(self):
|
98 | 98 |
other_key = public_key.PublicKey('DSA',
|
81 | 81 |
self.assertTrue(self.key is self.key)
|
82 | 82 |
|
83 | 83 |
self.assertFalse(self.key is None)
|
84 | |
self.assertFalse(None == self.key)
|
|
84 |
self.assertFalse(None == self.key) # noqa: E711
|
85 | 85 |
|
86 | 86 |
other_key = sym_key.SymmetricKey(self.algorithm,
|
87 | 87 |
self.bit_length,
|
|
91 | 91 |
|
92 | 92 |
def test___ne___none(self):
|
93 | 93 |
self.assertTrue(self.key is not None)
|
94 | |
self.assertTrue(None != self.key)
|
|
94 |
self.assertTrue(None != self.key) # noqa: E711
|
95 | 95 |
|
96 | 96 |
def test___ne___algorithm(self):
|
97 | 97 |
other_key = sym_key.SymmetricKey('DES',
|
66 | 66 |
self.assertTrue(self.cert is self.cert)
|
67 | 67 |
|
68 | 68 |
self.assertFalse(self.cert is None)
|
69 | |
self.assertFalse(None == self.cert)
|
|
69 |
self.assertFalse(None == self.cert) # noqa: E711
|
70 | 70 |
|
71 | 71 |
other_x_509 = x_509.X509(self.data)
|
72 | 72 |
self.assertTrue(self.cert == other_x_509)
|
|
74 | 74 |
|
75 | 75 |
def test___ne___none(self):
|
76 | 76 |
self.assertTrue(self.cert is not None)
|
77 | |
self.assertTrue(None != self.cert)
|
|
77 |
self.assertTrue(None != self.cert) # noqa: E711
|
78 | 78 |
|
79 | 79 |
def test___ne___data(self):
|
80 | 80 |
other_x509 = x_509.X509(b'\x00\x00\x00', self.name)
|
0 | 0 |
# The order of packages is significant, because pip processes them in the order
|
1 | 1 |
# of appearance. Changing the order has an impact on the overall integration
|
2 | 2 |
# process, which may cause wedges in the gate later.
|
3 | |
hacking!=0.13.0,<0.14,>=0.12.0 # Apache-2.0
|
|
3 |
hacking>=3.0,<3.1.0 # Apache-2.0
|
4 | 4 |
|
5 | 5 |
coverage!=4.4,>=4.0 # Apache-2.0
|
6 | 6 |
python-barbicanclient>=4.5.2 # Apache-2.0
|