]> git.ipfire.org Git - thirdparty/dnspython.git/commitdiff
disable test failing due to expired certificate
authorBob Halley <halley@dnspython.org>
Sat, 15 Jul 2023 16:14:20 +0000 (09:14 -0700)
committerBob Halley <halley@dnspython.org>
Sat, 15 Jul 2023 16:14:20 +0000 (09:14 -0700)
tests/test_doh.py

index f43b1c759d1404c63a491282a26083bab7fe0bce..a2d9bad53bfe7f623ad2c84bcf584a9fdd13653f 100644 (file)
@@ -14,9 +14,9 @@
 # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
 # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
-import unittest
 import random
 import socket
+import unittest
 
 try:
     import ssl
@@ -147,26 +147,29 @@ class DNSOverHTTPSTestCaseHttpx(unittest.TestCase):
             )
             self.assertTrue(q.is_response(r))
 
-    def test_bootstrap_address_fails(self):
-        # We test this to see if v4 is available
-        if resolver_v4_addresses:
-            ip = "185.228.168.168"
-            invalid_tls_url = "https://{}/doh/family-filter/".format(ip)
-            valid_tls_url = "https://doh.cleanbrowsing.org/doh/family-filter/"
-            q = dns.message.make_query("example.com.", dns.rdatatype.A)
-            # make sure CleanBrowsing's IP address will fail TLS certificate
-            # check.
-            with self.assertRaises(httpx.ConnectError):
-                dns.query.https(q, invalid_tls_url, session=self.session, timeout=4)
-            # And if we don't mangle the URL, it should work.
-            r = dns.query.https(
-                q,
-                valid_tls_url,
-                session=self.session,
-                bootstrap_address=ip,
-                timeout=4,
-            )
-            self.assertTrue(q.is_response(r))
+    # This test is temporarily disabled as there's an expired certificate issue on one
+    # of the servers, so it fails on the part that is supposed to succeed (2023-07-15).
+
+    # def test_bootstrap_address_fails(self):
+    #     # We test this to see if v4 is available
+    #     if resolver_v4_addresses:
+    #         ip = "185.228.168.168"
+    #         invalid_tls_url = "https://{}/doh/family-filter/".format(ip)
+    #         valid_tls_url = "https://doh.cleanbrowsing.org/doh/family-filter/"
+    #         q = dns.message.make_query("example.com.", dns.rdatatype.A)
+    #         # make sure CleanBrowsing's IP address will fail TLS certificate
+    #         # check.
+    #         with self.assertRaises(httpx.ConnectError):
+    #             dns.query.https(q, invalid_tls_url, session=self.session, timeout=4)
+    #         # And if we don't mangle the URL, it should work.
+    #         r = dns.query.https(
+    #             q,
+    #             valid_tls_url,
+    #             session=self.session,
+    #             bootstrap_address=ip,
+    #             timeout=4,
+    #         )
+    #         self.assertTrue(q.is_response(r))
 
     def test_new_session(self):
         nameserver_url = random.choice(KNOWN_ANYCAST_DOH_RESOLVER_URLS)