diff options
Diffstat (limited to 'common/src/leap/soledad/common/tests/u1db_tests/test_https.py')
-rw-r--r-- | common/src/leap/soledad/common/tests/u1db_tests/test_https.py | 114 |
1 files changed, 0 insertions, 114 deletions
diff --git a/common/src/leap/soledad/common/tests/u1db_tests/test_https.py b/common/src/leap/soledad/common/tests/u1db_tests/test_https.py deleted file mode 100644 index 8a5743e7..00000000 --- a/common/src/leap/soledad/common/tests/u1db_tests/test_https.py +++ /dev/null @@ -1,114 +0,0 @@ -"""Test support for client-side https support.""" - -import os -import ssl -import sys - -#from paste import httpserver -from unittest import skip - -from leap.soledad.common.l2db.remote import http_client -#from leap.soledad.common.l2db.remote import http_target - -from leap import soledad -from leap.soledad.common.tests import u1db_tests as tests -from leap.soledad.common.tests.u1db_tests import make_oauth_http_app - - -#def https_server_def(): - #def make_server(host_port, application): - #from OpenSSL import SSL - #cert_file = os.path.join(os.path.dirname(__file__), 'testing-certs', - #'testing.cert') - #key_file = os.path.join(os.path.dirname(__file__), 'testing-certs', - #'testing.key') - #ssl_context = SSL.Context(SSL.SSLv23_METHOD) - #ssl_context.use_privatekey_file(key_file) - #ssl_context.use_certificate_chain_file(cert_file) - #srv = httpserver.WSGIServerBase(application, host_port, - #httpserver.WSGIHandler, - #ssl_context=ssl_context - #) -# - #def shutdown_request(req): - #req.shutdown() - #srv.close_request(req) -# - #srv.shutdown_request = shutdown_request - #application.base_url = "https://localhost:%s" % srv.server_address[1] - #return srv - #return make_server, "shutdown", "https" - - -#@skip("Skiping tests imported from U1DB.") -#class TestHttpSyncTargetHttpsSupport(tests.TestCaseWithServer): -# - #scenarios = [ - #('oauth_https', {'server_def': https_server_def, - #'make_app_with_state': make_oauth_http_app, - #'make_document_for_test': - #tests.make_document_for_test, - #'sync_target': oauth_https_sync_target - #}), - #] -# - #def setUp(self): - #try: - #import OpenSSL # noqa - #except ImportError: - #self.skipTest("Requires pyOpenSSL") - #self.cacert_pem = os.path.join(os.path.dirname(__file__), - #'testing-certs', 'cacert.pem') - # The default u1db http_client class for doing HTTPS only does HTTPS - # if the platform is linux. Because of this, soledad replaces that - # class with one that will do HTTPS independent of the platform. In - # order to maintain the compatibility with u1db default tests, we undo - # that replacement here. - #http_client._VerifiedHTTPSConnection = \ - #soledad.client.api.old__VerifiedHTTPSConnection - #super(TestHttpSyncTargetHttpsSupport, self).setUp() -# - #def getSyncTarget(self, host, path=None, cert_file=None): - #if self.server is None: - #self.startServer() - #return self.sync_target(self, host, path, cert_file=cert_file) -# - #def test_working(self): - #self.startServer() - #db = self.request_state._create_database('test') - #self.patch(http_client, 'CA_CERTS', self.cacert_pem) - #remote_target = self.getSyncTarget('localhost', 'test') - #remote_target.record_sync_info('other-id', 2, 'T-id') - #self.assertEqual( - #(2, 'T-id'), db._get_replica_gen_and_trans_id('other-id')) -# - #def test_cannot_verify_cert(self): - #if not sys.platform.startswith('linux'): - #self.skipTest( - #"XXX certificate verification happens on linux only for now") - #self.startServer() - # don't print expected traceback server-side - #self.server.handle_error = lambda req, cli_addr: None - #self.request_state._create_database('test') - #remote_target = self.getSyncTarget('localhost', 'test') - #try: - #remote_target.record_sync_info('other-id', 2, 'T-id') - #except ssl.SSLError, e: - #self.assertIn("certificate verify failed", str(e)) - #else: - #self.fail("certificate verification should have failed.") -# - #def test_host_mismatch(self): - #if not sys.platform.startswith('linux'): - #self.skipTest( - #"XXX certificate verification happens on linux only for now") - #self.startServer() - #self.request_state._create_database('test') - #self.patch(http_client, 'CA_CERTS', self.cacert_pem) - #remote_target = self.getSyncTarget('127.0.0.1', 'test') - #self.assertRaises( - #http_client.CertificateError, remote_target.record_sync_info, - #'other-id', 2, 'T-id') -# -# -#load_tests = tests.load_with_scenarios |