summaryrefslogtreecommitdiffhomepage
path: root/tests
diff options
context:
space:
mode:
authorJeff Forcier <jeff@bitprophet.org>2017-11-29 12:02:59 -0800
committerJeff Forcier <jeff@bitprophet.org>2017-11-29 12:02:59 -0800
commitbd69ccc1c786e02ad494ba2fa483e16ef085e283 (patch)
tree266df8e73e85f92d2e6f112c56071feed0e54b21 /tests
parent79deb709c81eb014dc91ac12beb4e3a02788e33d (diff)
parent5d5e0a7713f03e7924d52dc16c02782bdc353bf6 (diff)
Merge branch 'master' into 1130-int
Diffstat (limited to 'tests')
-rw-r--r--tests/test_auth.py18
1 files changed, 9 insertions, 9 deletions
diff --git a/tests/test_auth.py b/tests/test_auth.py
index 4eade610..dacdd654 100644
--- a/tests/test_auth.py
+++ b/tests/test_auth.py
@@ -133,7 +133,7 @@ class AuthTest (unittest.TestCase):
self.assertTrue(self.event.is_set())
self.assertTrue(self.ts.is_active())
- def test_1_bad_auth_type(self):
+ def test_bad_auth_type(self):
"""
verify that we get the right exception when an unsupported auth
type is requested.
@@ -148,7 +148,7 @@ class AuthTest (unittest.TestCase):
self.assertEqual(BadAuthenticationType, etype)
self.assertEqual(['publickey'], evalue.allowed_types)
- def test_2_bad_password(self):
+ def test_bad_password(self):
"""
verify that a bad password gets the right exception, and that a retry
with the right password works.
@@ -164,7 +164,7 @@ class AuthTest (unittest.TestCase):
self.tc.auth_password(username='slowdive', password='pygmalion')
self.verify_finished()
- def test_3_multipart_auth(self):
+ def test_multipart_auth(self):
"""
verify that multipart auth works.
"""
@@ -177,7 +177,7 @@ class AuthTest (unittest.TestCase):
self.assertEqual([], remain)
self.verify_finished()
- def test_4_interactive_auth(self):
+ def test_interactive_auth(self):
"""
verify keyboard-interactive auth works.
"""
@@ -195,7 +195,7 @@ class AuthTest (unittest.TestCase):
self.assertEqual([], remain)
self.verify_finished()
- def test_5_interactive_auth_fallback(self):
+ def test_interactive_auth_fallback(self):
"""
verify that a password auth attempt will fallback to "interactive"
if password auth isn't supported but interactive is.
@@ -206,7 +206,7 @@ class AuthTest (unittest.TestCase):
self.assertEqual([], remain)
self.verify_finished()
- def test_6_auth_utf8(self):
+ def test_auth_utf8(self):
"""
verify that utf-8 encoding happens in authentication.
"""
@@ -216,7 +216,7 @@ class AuthTest (unittest.TestCase):
self.assertEqual([], remain)
self.verify_finished()
- def test_7_auth_non_utf8(self):
+ def test_auth_non_utf8(self):
"""
verify that non-utf-8 encoded passwords can be used for broken
servers.
@@ -227,7 +227,7 @@ class AuthTest (unittest.TestCase):
self.assertEqual([], remain)
self.verify_finished()
- def test_8_auth_gets_disconnected(self):
+ def test_auth_gets_disconnected(self):
"""
verify that we catch a server disconnecting during auth, and report
it as an auth failure.
@@ -241,7 +241,7 @@ class AuthTest (unittest.TestCase):
self.assertTrue(issubclass(etype, AuthenticationException))
@slow
- def test_9_auth_non_responsive(self):
+ def test_auth_non_responsive(self):
"""
verify that authentication times out if server takes to long to
respond (or never responds).