forked from pool/python-aioquic
* free AEADObject's and HeaderProtectionObject's memory * free BufferObject’s memory * Enable IPv4/IPv6 dual stack support on Windows * [docs] add a logo, stop mocking libraries * [docs] test that documentation can be built without warnings * [tests] clarify the various handshake loss test cases * [connection] retransmit CRYPTO to speedup handshake completion * [examples] update DoQ examples for more recent drafts (fixes: #224) * [lint] run mypy on each CI run - 0.9.19 * [tls] use PyOpenSSL to validate certificate * [qa] set better names for our C modules * [package] drop dependency on "dataclasses" package * [package] update cryptography requirement to >= 3.1 * [qa] fix some type annotations * [http3] advertise support for extended CONNECT * [examples] make HTTP/3 client set content-length (fixes: #241) * [package] fix macosx arm64 wheels - 0.9.18 * [examples] add sec-webtransport-http3-draft to server response * [package] update OpenSSL to 1.1.1m * [tests] rewrite asyncio tests as coroutines * [qa] reformat code using updated `black` * [qa] tell git to ignore virtual environments * http3_client.py: correct error code for connection close * [webtransport] make H3_DATAGRAM value uppercase * [webtransport] update H3_DATAGRAM value * [readme] update minimal Python version * [examples] don't sent HTTP/3 DATA if there is no request body OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-aioquic?expand=0&rev=4
36 lines
1.6 KiB
Diff
36 lines
1.6 KiB
Diff
Index: aioquic-0.9.20/tests/test_tls.py
|
|
===================================================================
|
|
--- aioquic-0.9.20.orig/tests/test_tls.py
|
|
+++ aioquic-0.9.20/tests/test_tls.py
|
|
@@ -430,7 +430,7 @@ class ContextTest(TestCase):
|
|
|
|
with self.assertRaises(tls.AlertBadCertificate) as cm:
|
|
self._handshake(client, server)
|
|
- self.assertEqual(str(cm.exception), "unable to get local issuer certificate")
|
|
+ self.assertEqual(str(cm.exception), "unable to get local issuer certificate")
|
|
|
|
def test_handshake_with_certificate_no_verify(self):
|
|
client = self.create_client(cafile=None, verify_mode=ssl.CERT_NONE)
|
|
@@ -1265,9 +1265,9 @@ class VerifyCertificateTest(TestCase):
|
|
# fail
|
|
with self.assertRaises(tls.AlertBadCertificate) as cm:
|
|
verify_certificate(certificate=certificate, server_name="localhost")
|
|
- self.assertEqual(
|
|
- str(cm.exception), "unable to get local issuer certificate"
|
|
- )
|
|
+ self.assertEqual(
|
|
+ str(cm.exception), "unable to get local issuer certificate"
|
|
+ )
|
|
|
|
# ok
|
|
verify_certificate(
|
|
@@ -1287,7 +1287,7 @@ class VerifyCertificateTest(TestCase):
|
|
# fail
|
|
with self.assertRaises(tls.AlertBadCertificate) as cm:
|
|
verify_certificate(certificate=certificate, server_name="localhost")
|
|
- self.assertEqual(str(cm.exception), "self signed certificate")
|
|
+ self.assertEqual(str(cm.exception), "self signed certificate")
|
|
|
|
# ok
|
|
verify_certificate(
|