Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Step:15-SP4
python3.32815
skip_SSL_tests.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File skip_SSL_tests.patch of Package python3.32815
--- Lib/test/test_asyncio/test_events.py | 6 +++++ Lib/test/test_ssl.py | 12 ++++++---- Misc/NEWS.d/next/Tests/2019-04-05-10-34-29.bpo-36576.7Cp2kK.rst | 1 3 files changed, 15 insertions(+), 4 deletions(-) Index: Python-3.6.15/Lib/test/test_asyncio/test_events.py =================================================================== --- Python-3.6.15.orig/Lib/test/test_asyncio/test_events.py +++ Python-3.6.15/Lib/test/test_asyncio/test_events.py @@ -38,6 +38,11 @@ try: except ImportError: from asyncio import test_support as support +if ssl is not None: + from test.test_ssl import IS_OPENSSL_1_1_1 +else: + IS_OPENSSL_1_1_1 = False + def osx_tiger(): """Return True if the platform is Mac OS 10.4 or older.""" @@ -1159,6 +1164,7 @@ class EventLoopTestsMixin: self.test_create_unix_server_ssl_verify_failed() @unittest.skipIf(ssl is None, 'No ssl module') + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") def test_create_server_ssl_match_failed(self): proto = MyProto(loop=self.loop) server, host, port = self._make_ssl_server( Index: Python-3.6.15/Lib/test/test_ssl.py =================================================================== --- Python-3.6.15.orig/Lib/test/test_ssl.py +++ Python-3.6.15/Lib/test/test_ssl.py @@ -36,7 +36,8 @@ else: PROTOCOLS = sorted(ssl._PROTOCOL_NAMES) HOST = support.HOST IS_LIBRESSL = ssl.OPENSSL_VERSION.startswith('LibreSSL') -IS_OPENSSL_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 0) +IS_OPENSSL_1_1 = not IS_LIBRESSL and (ssl.OPENSSL_VERSION_INFO >= (1, 1, 0) and ssl.OPENSSL_VERSION_INFO < (2, 0)) +IS_OPENSSL_1_1_1 = not IS_LIBRESSL and (ssl.OPENSSL_VERSION_INFO >= (1, 1, 1) and ssl.OPENSSL_VERSION_INFO < (2, 0)) def data_file(*name): @@ -138,9 +139,8 @@ def skip_if_broken_ubuntu_ssl(func): try: ssl.SSLContext(ssl.PROTOCOL_SSLv2) except ssl.SSLError: - if (ssl.OPENSSL_VERSION_INFO == (0, 9, 8, 15, 15) and - platform.linux_distribution() == ('debian', 'squeeze/sid', '')): - raise unittest.SkipTest("Patched Ubuntu OpenSSL breaks behaviour") + if ssl.OPENSSL_VERSION_INFO < (1, 1, 1): + raise unittest.SkipTest("Old OpenSSL breaks behaviour") return func(*args, **kwargs) return f else: @@ -961,6 +961,7 @@ class ContextTests(unittest.TestCase): self.assertIn('AES128-GCM-SHA256', names) @skip_if_broken_ubuntu_ssl + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") def test_options(self): ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT) # OP_ALL | OP_NO_SSLv2 | OP_NO_SSLv3 is the default value @@ -3240,6 +3241,7 @@ if _have_threads: ]) @unittest.skipUnless(ssl.HAS_ECDH, "test requires ECDH-enabled OpenSSL") + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") def test_default_ecdh_curve(self): # Issue #21015: elliptic curve-based Diffie Hellman key exchange # should be enabled by default on SSL contexts. @@ -3372,6 +3374,7 @@ if _have_threads: self.assertIs(stats['client_alpn_protocol'], None) @unittest.skipUnless(ssl.HAS_ALPN, "ALPN support needed for this test") + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") def test_alpn_protocols(self): server_protocols = ['foo', 'bar', 'milkshake'] protocol_tests = [ @@ -3553,6 +3556,7 @@ if _have_threads: self.assertEqual(cm.exception.reason, 'TLSV1_ALERT_INTERNAL_ERROR') self.assertIn("TypeError", stderr.getvalue()) + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") def test_shared_ciphers(self): server_context = ssl.SSLContext(ssl.PROTOCOL_TLSv1) server_context.load_cert_chain(SIGNED_CERTFILE) Index: Python-3.6.15/Misc/NEWS.d/next/Tests/2019-04-05-10-34-29.bpo-36576.7Cp2kK.rst =================================================================== --- /dev/null +++ Python-3.6.15/Misc/NEWS.d/next/Tests/2019-04-05-10-34-29.bpo-36576.7Cp2kK.rst @@ -0,0 +1 @@ +Skip test_ssl and test_asyncio tests failing with OpenSSL 1.1.1.
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor