Skip to content

Commit bccadf8

Browse files
committed
unmark fixed tests
1 parent 48cf12f commit bccadf8

2 files changed

Lines changed: 0 additions & 12 deletions

File tree

Lib/test/test_httplib.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1733,8 +1733,6 @@ def test_networked_trusted_by_default_cert(self):
17331733
h.close()
17341734
self.assertIn('text/html', content_type)
17351735

1736-
# TODO: RUSTPYTHON
1737-
@unittest.expectedFailure
17381736
def test_networked_good_cert(self):
17391737
# We feed the server's cert as a validating cert
17401738
import ssl

Lib/test/test_ssl.py

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -477,7 +477,6 @@ def test_parse_cert_CVE_2019_5010(self):
477477
}
478478
)
479479

480-
@unittest.expectedFailure # TODO: RUSTPYTHON
481480
def test_parse_cert_CVE_2013_4238(self):
482481
p = ssl._ssl._test_decode_cert(NULLBYTECERT)
483482
if support.verbose:
@@ -1167,7 +1166,6 @@ def test_security_level(self):
11671166
}
11681167
self.assertIn(ctx.security_level, security_level_range)
11691168

1170-
@unittest.expectedFailure # TODO: RUSTPYTHON
11711169
def test_verify_flags(self):
11721170
ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
11731171
# default value
@@ -1427,7 +1425,6 @@ def test_set_default_verify_paths(self):
14271425
ctx.set_default_verify_paths()
14281426

14291427
@unittest.skipUnless(ssl.HAS_ECDH, "ECDH disabled on this OpenSSL build")
1430-
@unittest.expectedFailure # TODO: RUSTPYTHON
14311428
def test_set_ecdh_curve(self):
14321429
ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
14331430
ctx.set_ecdh_curve("prime256v1")
@@ -1714,7 +1711,6 @@ def test_num_tickest(self):
17141711

17151712
class SSLErrorTests(unittest.TestCase):
17161713

1717-
@unittest.expectedFailure # TODO: RUSTPYTHON
17181714
def test_str(self):
17191715
# The str() of a SSLError doesn't include the errno
17201716
e = ssl.SSLError(1, "foo")
@@ -2010,7 +2006,6 @@ def test_connect_with_context_fail(self):
20102006
self.assertRaisesRegex(ssl.SSLError, regex,
20112007
s.connect, self.server_addr)
20122008

2013-
@unittest.expectedFailure # TODO: RUSTPYTHON
20142009
def test_connect_capath(self):
20152010
# Verify server certificates using the `capath` argument
20162011
# NOTE: the subject hashing algorithm has been changed between
@@ -3268,7 +3263,6 @@ def test_check_hostname_idn(self, warnings_filters=True):
32683263
server_hostname=b'k\xf6nig.idn.pythontest.net',
32693264
)
32703265

3271-
@unittest.expectedFailure # TODO: RUSTPYTHON
32723266
def test_wrong_cert_tls12(self):
32733267
"""Connecting when the server rejects the client's certificate
32743268
@@ -4047,7 +4041,6 @@ def test_min_max_version_sslv3(self):
40474041
s.connect((HOST, server.port))
40484042
self.assertEqual(s.version(), 'SSLv3')
40494043

4050-
@unittest.expectedFailure # TODO: RUSTPYTHON
40514044
def test_default_ecdh_curve(self):
40524045
# Issue #21015: elliptic curve-based Diffie Hellman key exchange
40534046
# should be enabled by default on SSL contexts.
@@ -4911,7 +4904,6 @@ def test_internal_chain_client(self):
49114904
ssl.PEM_cert_to_DER_cert(pem), der
49124905
)
49134906

4914-
@unittest.expectedFailure # TODO: RUSTPYTHON
49154907
def test_certificate_chain(self):
49164908
client_context, server_context, hostname = testing_context(
49174909
server_chain=False
@@ -5232,7 +5224,6 @@ def non_linux_skip_if_other_okay_error(self, err):
52325224
# just turn this into an unconditional skip anything but Linux.
52335225
# The important thing is that our CI has the logic covered.
52345226

5235-
@unittest.expectedFailure # TODO: RUSTPYTHON
52365227
def test_preauth_data_to_tls_server(self):
52375228
server_accept_called = threading.Event()
52385229
ready_for_server_wrap_socket = threading.Event()
@@ -5277,7 +5268,6 @@ def call_after_accept(unused):
52775268
wrap_error = None
52785269
server = None
52795270

5280-
@unittest.expectedFailure # TODO: RUSTPYTHON
52815271
def test_preauth_data_to_tls_client(self):
52825272
server_can_continue_with_wrap_socket = threading.Event()
52835273
client_can_continue_with_wrap_socket = threading.Event()

0 commit comments

Comments
 (0)