@@ -20,6 +20,7 @@ class TestSSL:
20
20
21
21
SERVER_CERT = get_ssl_filename ("server-cert.pem" )
22
22
SERVER_KEY = get_ssl_filename ("server-key.pem" )
23
+ CA_CERT = get_ssl_filename ("ca-cert.pem" )
23
24
24
25
def test_ssl_with_invalid_cert (self , request ):
25
26
ssl_url = request .config .option .redis_ssl_url
@@ -56,13 +57,13 @@ def test_validating_self_signed_certificate(self, request):
56
57
ssl_certfile = self .SERVER_CERT ,
57
58
ssl_keyfile = self .SERVER_KEY ,
58
59
ssl_cert_reqs = "required" ,
59
- ssl_ca_certs = self .SERVER_CERT ,
60
+ ssl_ca_certs = self .CA_CERT ,
60
61
)
61
62
assert r .ping ()
62
63
r .close ()
63
64
64
65
def test_validating_self_signed_string_certificate (self , request ):
65
- with open (self .SERVER_CERT ) as f :
66
+ with open (self .CA_CERT ) as f :
66
67
cert_data = f .read ()
67
68
ssl_url = request .config .option .redis_ssl_url
68
69
p = urlparse (ssl_url )[1 ].split (":" )
@@ -150,7 +151,7 @@ def _create_oscp_conn(self, request):
150
151
ssl_certfile = self .SERVER_CERT ,
151
152
ssl_keyfile = self .SERVER_KEY ,
152
153
ssl_cert_reqs = "required" ,
153
- ssl_ca_certs = self .SERVER_CERT ,
154
+ ssl_ca_certs = self .CA_CERT ,
154
155
ssl_validate_ocsp = True ,
155
156
)
156
157
return r
@@ -171,14 +172,6 @@ def test_ssl_ocsp_called_withcrypto(self, request):
171
172
assert "No AIA information present in ssl certificate" in str (e )
172
173
r .close ()
173
174
174
- # rediss://, url based
175
- ssl_url = request .config .option .redis_ssl_url
176
- sslclient = redis .from_url (ssl_url )
177
- with pytest .raises (ConnectionError ) as e :
178
- sslclient .ping ()
179
- assert "No AIA information present in ssl certificate" in str (e )
180
- sslclient .close ()
181
-
182
175
@skip_if_nocryptography ()
183
176
def test_valid_ocsp_cert_http (self ):
184
177
from redis .ocsp import OCSPVerifier
@@ -256,7 +249,7 @@ def test_mock_ocsp_staple(self, request):
256
249
ssl_certfile = self .SERVER_CERT ,
257
250
ssl_keyfile = self .SERVER_KEY ,
258
251
ssl_cert_reqs = "required" ,
259
- ssl_ca_certs = self .SERVER_CERT ,
252
+ ssl_ca_certs = self .CA_CERT ,
260
253
ssl_validate_ocsp = True ,
261
254
ssl_ocsp_context = p , # just needs to not be none
262
255
)
@@ -276,7 +269,7 @@ def test_mock_ocsp_staple(self, request):
276
269
ssl_certfile = self .SERVER_CERT ,
277
270
ssl_keyfile = self .SERVER_KEY ,
278
271
ssl_cert_reqs = "required" ,
279
- ssl_ca_certs = self .SERVER_CERT ,
272
+ ssl_ca_certs = self .CA_CERT ,
280
273
ssl_ocsp_context = ctx ,
281
274
ssl_ocsp_expected_cert = open (self .SERVER_KEY , "rb" ).read (),
282
275
ssl_validate_ocsp_stapled = True ,
@@ -294,7 +287,7 @@ def test_mock_ocsp_staple(self, request):
294
287
ssl_certfile = self .SERVER_CERT ,
295
288
ssl_keyfile = self .SERVER_KEY ,
296
289
ssl_cert_reqs = "required" ,
297
- ssl_ca_certs = self .SERVER_CERT ,
290
+ ssl_ca_certs = self .CA_CERT ,
298
291
ssl_validate_ocsp_stapled = True ,
299
292
)
300
293
0 commit comments