@@ -65,20 +65,20 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
65
65
66
66
//hide
67
67
//[IntegrationOnly]
68
- public class DenyAllSslCertificatesApiTests : ConnectionErrorTestBase < DenyAllCertificatesCluster >
69
- {
70
- public DenyAllSslCertificatesApiTests ( DenyAllCertificatesCluster cluster , EndpointUsage usage ) : base ( cluster , usage ) { }
71
-
72
- //[I]
73
- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
74
-
75
- protected override void AssertWebException ( WebException e ) =>
76
- e . Message . Should ( ) . Contain ( "Could not establish trust relationship for the SSL/TLS secure channel." ) ;
77
-
78
- protected override void AssertHttpRequestException ( HttpRequestException e )
79
- {
80
- }
81
- }
68
+ // public class DenyAllSslCertificatesApiTests : ConnectionErrorTestBase<DenyAllCertificatesCluster>
69
+ // {
70
+ // public DenyAllSslCertificatesApiTests(DenyAllCertificatesCluster cluster, EndpointUsage usage) : base(cluster, usage) { }
71
+ //
72
+ // //[I]
73
+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
74
+ //
75
+ // protected override void AssertWebException(WebException e) =>
76
+ // e.Message.Should().Contain("Could not establish trust relationship for the SSL/TLS secure channel.");
77
+ //
78
+ // protected override void AssertHttpRequestException(HttpRequestException e)
79
+ // {
80
+ // }
81
+ // }
82
82
83
83
/**===== Allowing all certificate validation
84
84
*
@@ -96,15 +96,15 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
96
96
97
97
//hide
98
98
//[IntegrationOnly]
99
- public class AllowAllSslCertificatesApiTests : CanConnectTestBase < AllowAllCertificatesCluster >
100
- {
101
- public AllowAllSslCertificatesApiTests ( AllowAllCertificatesCluster cluster , EndpointUsage usage ) : base ( cluster , usage )
102
- {
103
- }
104
-
105
- //[I]
106
- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
107
- }
99
+ // public class AllowAllSslCertificatesApiTests : CanConnectTestBase<AllowAllCertificatesCluster>
100
+ // {
101
+ // public AllowAllSslCertificatesApiTests(AllowAllCertificatesCluster cluster, EndpointUsage usage) : base(cluster, usage)
102
+ // {
103
+ // }
104
+ //
105
+ // //[I]
106
+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
107
+ // }
108
108
109
109
/**===== Allowing certificates from a Certificate Authority
110
110
*
@@ -128,15 +128,15 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
128
128
129
129
//hide
130
130
//[IntegrationOnly]
131
- public class CertgenCaApiTests : CanConnectTestBase < CertgenCaCluster >
132
- {
133
- public CertgenCaApiTests ( CertgenCaCluster cluster , EndpointUsage usage ) : base ( cluster , usage )
134
- {
135
- }
136
-
137
- //[I]
138
- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
139
- }
131
+ // public class CertgenCaApiTests : CanConnectTestBase<CertgenCaCluster>
132
+ // {
133
+ // public CertgenCaApiTests(CertgenCaCluster cluster, EndpointUsage usage) : base(cluster, usage)
134
+ // {
135
+ // }
136
+ //
137
+ // //[I]
138
+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
139
+ // }
140
140
141
141
/**
142
142
* If your local copy does not match the server's CA, the client will fail to connect
@@ -150,24 +150,24 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
150
150
}
151
151
152
152
//[IntegrationOnly]
153
- public class BadCertgenCaApiTests : ConnectionErrorTestBase < BadCertgenCaCluster >
154
- {
155
- public BadCertgenCaApiTests ( BadCertgenCaCluster cluster , EndpointUsage usage ) : base ( cluster , usage )
156
- {
157
- }
158
-
159
- // hide
160
- [ I ]
161
- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
162
-
163
- protected override void AssertWebException ( WebException e ) =>
164
- e . Message . Should ( ) . Contain ( "Could not establish trust relationship for the SSL/TLS secure channel." ) ; // <1> Exception is thrown, indicating that a secure connection could not be established
165
-
166
- // hide
167
- protected override void AssertHttpRequestException ( HttpRequestException e )
168
- {
169
- }
170
- }
153
+ // public class BadCertgenCaApiTests : ConnectionErrorTestBase<BadCertgenCaCluster>
154
+ // {
155
+ // public BadCertgenCaApiTests(BadCertgenCaCluster cluster, EndpointUsage usage) : base(cluster, usage)
156
+ // {
157
+ // }
158
+ //
159
+ // // hide
160
+ // // [I]
161
+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
162
+ //
163
+ // protected override void AssertWebException(WebException e) =>
164
+ // e.Message.Should().Contain("Could not establish trust relationship for the SSL/TLS secure channel."); // <1> Exception is thrown, indicating that a secure connection could not be established
165
+ //
166
+ // // hide
167
+ // protected override void AssertHttpRequestException(HttpRequestException e)
168
+ // {
169
+ // }
170
+ // }
171
171
/**
172
172
* If you go for a vendor generated SSL certificate, it's common practice for the certificate to include the CA _and_ any intermediary CAs
173
173
* in the certificate chain. When using such a certificate, use `CertificateValidations.AuthorityPartOfChain` which validates that
@@ -216,15 +216,15 @@ protected override ConnectionSettings Authenticate(ConnectionSettings s) => s //
216
216
217
217
//hide
218
218
//[IntegrationOnly]
219
- public class PkiApiTests : CanConnectTestBase < PkiCluster >
220
- {
221
- public PkiApiTests ( PkiCluster cluster , EndpointUsage usage ) : base ( cluster , usage )
222
- {
223
- }
224
-
225
- [ I ]
226
- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
227
- }
219
+ // public class PkiApiTests : CanConnectTestBase<PkiCluster>
220
+ // {
221
+ // public PkiApiTests(PkiCluster cluster, EndpointUsage usage) : base(cluster, usage)
222
+ // {
223
+ // }
224
+ //
225
+ // // [I]
226
+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
227
+ // }
228
228
#endif
229
229
}
230
230
@@ -244,7 +244,7 @@ public BadCustomCertificatePerRequestWinsApiTests(BadPkiCluster cluster, Endpoin
244
244
}
245
245
246
246
// hide
247
- [ I ]
247
+ // [I]
248
248
public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
249
249
250
250
// a bad certificate
0 commit comments