agate

Simple gemini server for static files
git clone https://github.com/mbrubeck/agate.git
Log | Files | Refs | README

commit d1d3f0cbb540b74bd45024edd7790fda7350e9c3
parent 3ffe89b7759f7755046c6fd908c596a2ed1a6d47
Author: Johann150 <johann.galle@protonmail.com>
Date:   Sat, 13 Mar 2021 23:19:20 +0100

transform panicking test into non-panicking test

Diffstat:
Mtests/tests.rs | 13++++++++++---
1 file changed, 10 insertions(+), 3 deletions(-)

diff --git a/tests/tests.rs b/tests/tests.rs @@ -274,12 +274,11 @@ fn serve_secret() { } #[test] -#[should_panic(expected = "AlertReceived(ProtocolVersion)")] /// - if TLSv1.3 is selected, does not accept TLSv1.2 connections /// (lower versions do not have to be tested because rustls does not even /// support them, making agate incapable of accepting them) fn explicit_tls_version() { - use rustls::{ClientSession, ProtocolVersion}; + use rustls::{ClientSession, ProtocolVersion, TLSError}; use std::io::Read; use std::net::TcpStream; @@ -295,7 +294,15 @@ fn explicit_tls_version() { let mut tls = rustls::Stream::new(&mut session, &mut tcp); let mut buf = [0; 10]; - tls.read(&mut buf).unwrap(); + assert_eq!( + *tls.read(&mut buf) + .unwrap_err() + .into_inner() + .unwrap() + .downcast::<TLSError>() + .unwrap(), + TLSError::AlertReceived(rustls::internal::msgs::enums::AlertDescription::ProtocolVersion) + ) } #[test]