mirror of
https://github.com/nim-lang/Nim.git
synced 2025-12-31 02:12:11 +00:00
Flaky not just due to recent ubuntu 24/GCC 14 upgrades, windows fails as
well, assuming the issue is with badssl or it's just not worth testing
here.
(cherry picked from commit 5f056f87b2)
38 lines
1.3 KiB
Nim
38 lines
1.3 KiB
Nim
#
|
|
# Nim - SSL integration tests
|
|
# (c) Copyright 2017 Nim contributors
|
|
#
|
|
# See the file "copying.txt", included in this
|
|
# distribution, for details about the copyright.
|
|
#
|
|
## Compile and run with:
|
|
## nim r --putenv:NIM_TESTAMENT_REMOTE_NETWORKING:1 -d:nimDisableCertificateValidation -d:ssl -p:. tests/untestable/thttpclient_ssl_disabled.nim
|
|
|
|
from stdtest/testutils import enableRemoteNetworking
|
|
# badssl tests disabled indefinitely
|
|
when false and enableRemoteNetworking and (defined(nimTestsEnableFlaky) or not defined(openbsd)):
|
|
import httpclient, net, unittest
|
|
|
|
const expired = "https://expired.badssl.com/"
|
|
|
|
doAssert defined(nimDisableCertificateValidation)
|
|
|
|
suite "SSL certificate check - disabled":
|
|
|
|
test "httpclient in insecure mode":
|
|
var ctx = newContext(verifyMode = CVerifyPeer)
|
|
var client = newHttpClient(sslContext = ctx)
|
|
let a = $client.getContent(expired)
|
|
|
|
test "httpclient in insecure mode":
|
|
var ctx = newContext(verifyMode = CVerifyPeerUseEnvVars)
|
|
var client = newHttpClient(sslContext = ctx)
|
|
let a = $client.getContent(expired)
|
|
|
|
test "net socket in insecure mode":
|
|
var sock = newSocket()
|
|
var ctx = newContext(verifyMode = CVerifyPeerUseEnvVars)
|
|
ctx.wrapSocket(sock)
|
|
sock.connect("expired.badssl.com", 443.Port)
|
|
sock.close
|