Skip to content

Commit e98eada

Browse files
committed
Silence unit tests
1 parent 4adbec8 commit e98eada

File tree

1 file changed

+60
-60
lines changed

1 file changed

+60
-60
lines changed

src/Tests/ClientConcepts/Certificates/WorkingWithCertificates.doc.cs

Lines changed: 60 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -65,20 +65,20 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
6565

6666
//hide
6767
//[IntegrationOnly]
68-
public class DenyAllSslCertificatesApiTests : ConnectionErrorTestBase<DenyAllCertificatesCluster>
69-
{
70-
public DenyAllSslCertificatesApiTests(DenyAllCertificatesCluster cluster, EndpointUsage usage) : base(cluster, usage) { }
71-
72-
//[I]
73-
public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
74-
75-
protected override void AssertWebException(WebException e) =>
76-
e.Message.Should().Contain("Could not establish trust relationship for the SSL/TLS secure channel.");
77-
78-
protected override void AssertHttpRequestException(HttpRequestException e)
79-
{
80-
}
81-
}
68+
// public class DenyAllSslCertificatesApiTests : ConnectionErrorTestBase<DenyAllCertificatesCluster>
69+
// {
70+
// public DenyAllSslCertificatesApiTests(DenyAllCertificatesCluster cluster, EndpointUsage usage) : base(cluster, usage) { }
71+
//
72+
// //[I]
73+
// public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
74+
//
75+
// protected override void AssertWebException(WebException e) =>
76+
// e.Message.Should().Contain("Could not establish trust relationship for the SSL/TLS secure channel.");
77+
//
78+
// protected override void AssertHttpRequestException(HttpRequestException e)
79+
// {
80+
// }
81+
// }
8282

8383
/**===== Allowing all certificate validation
8484
*
@@ -96,15 +96,15 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
9696

9797
//hide
9898
//[IntegrationOnly]
99-
public class AllowAllSslCertificatesApiTests : CanConnectTestBase<AllowAllCertificatesCluster>
100-
{
101-
public AllowAllSslCertificatesApiTests(AllowAllCertificatesCluster cluster, EndpointUsage usage) : base(cluster, usage)
102-
{
103-
}
104-
105-
//[I]
106-
public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
107-
}
99+
// public class AllowAllSslCertificatesApiTests : CanConnectTestBase<AllowAllCertificatesCluster>
100+
// {
101+
// public AllowAllSslCertificatesApiTests(AllowAllCertificatesCluster cluster, EndpointUsage usage) : base(cluster, usage)
102+
// {
103+
// }
104+
//
105+
// //[I]
106+
// public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
107+
// }
108108

109109
/**===== Allowing certificates from a Certificate Authority
110110
*
@@ -128,15 +128,15 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
128128

129129
//hide
130130
//[IntegrationOnly]
131-
public class CertgenCaApiTests : CanConnectTestBase<CertgenCaCluster>
132-
{
133-
public CertgenCaApiTests(CertgenCaCluster cluster, EndpointUsage usage) : base(cluster, usage)
134-
{
135-
}
136-
137-
//[I]
138-
public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
139-
}
131+
// public class CertgenCaApiTests : CanConnectTestBase<CertgenCaCluster>
132+
// {
133+
// public CertgenCaApiTests(CertgenCaCluster cluster, EndpointUsage usage) : base(cluster, usage)
134+
// {
135+
// }
136+
//
137+
// //[I]
138+
// public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
139+
// }
140140

141141
/**
142142
* If your local copy does not match the server's CA, the client will fail to connect
@@ -150,24 +150,24 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
150150
}
151151

152152
//[IntegrationOnly]
153-
public class BadCertgenCaApiTests : ConnectionErrorTestBase<BadCertgenCaCluster>
154-
{
155-
public BadCertgenCaApiTests(BadCertgenCaCluster cluster, EndpointUsage usage) : base(cluster, usage)
156-
{
157-
}
158-
159-
// hide
160-
[I]
161-
public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
162-
163-
protected override void AssertWebException(WebException e) =>
164-
e.Message.Should().Contain("Could not establish trust relationship for the SSL/TLS secure channel."); // <1> Exception is thrown, indicating that a secure connection could not be established
165-
166-
// hide
167-
protected override void AssertHttpRequestException(HttpRequestException e)
168-
{
169-
}
170-
}
153+
// public class BadCertgenCaApiTests : ConnectionErrorTestBase<BadCertgenCaCluster>
154+
// {
155+
// public BadCertgenCaApiTests(BadCertgenCaCluster cluster, EndpointUsage usage) : base(cluster, usage)
156+
// {
157+
// }
158+
//
159+
// // hide
160+
// //[I]
161+
// public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
162+
//
163+
// protected override void AssertWebException(WebException e) =>
164+
// e.Message.Should().Contain("Could not establish trust relationship for the SSL/TLS secure channel."); // <1> Exception is thrown, indicating that a secure connection could not be established
165+
//
166+
// // hide
167+
// protected override void AssertHttpRequestException(HttpRequestException e)
168+
// {
169+
// }
170+
// }
171171
/**
172172
* If you go for a vendor generated SSL certificate, it's common practice for the certificate to include the CA _and_ any intermediary CAs
173173
* in the certificate chain. When using such a certificate, use `CertificateValidations.AuthorityPartOfChain` which validates that
@@ -216,15 +216,15 @@ protected override ConnectionSettings Authenticate(ConnectionSettings s) => s //
216216

217217
//hide
218218
//[IntegrationOnly]
219-
public class PkiApiTests : CanConnectTestBase<PkiCluster>
220-
{
221-
public PkiApiTests(PkiCluster cluster, EndpointUsage usage) : base(cluster, usage)
222-
{
223-
}
224-
225-
[I]
226-
public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
227-
}
219+
// public class PkiApiTests : CanConnectTestBase<PkiCluster>
220+
// {
221+
// public PkiApiTests(PkiCluster cluster, EndpointUsage usage) : base(cluster, usage)
222+
// {
223+
// }
224+
//
225+
// //[I]
226+
// public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
227+
// }
228228
#endif
229229
}
230230

@@ -244,7 +244,7 @@ public BadCustomCertificatePerRequestWinsApiTests(BadPkiCluster cluster, Endpoin
244244
}
245245

246246
// hide
247-
[I]
247+
//[I]
248248
public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
249249

250250
// a bad certificate

0 commit comments

Comments
 (0)