summaryrefslogtreecommitdiff
path: root/tests/test_resolution.py
diff options
context:
space:
mode:
authorBrian Wellington <bwelling@xbill.org>2020-07-01 14:58:14 -0700
committerBrian Wellington <bwelling@xbill.org>2020-07-01 15:01:04 -0700
commit77e747da6bd5b9b7732d1a28ee0572bf9bcd827b (patch)
treedbb702bd8f07a2583c473d7e073b8a4eae9b2feb /tests/test_resolution.py
parent0703a8e6d132d4c988d5886233e49d3740c0e6a8 (diff)
downloaddnspython-77e747da6bd5b9b7732d1a28ee0572bf9bcd827b.tar.gz
Better deal with backwards compatibility.
If dns.tsigkeyring.from_text() creates dns.tsig.Key objects with the default algorithm, that causes problems for code that specifies a different algorithm. There's no good way to handle this, so change dns.tsigkeyring.from_text() to not create dns.tsig.Key objects unless it knows the algorithm.
Diffstat (limited to 'tests/test_resolution.py')
-rw-r--r--tests/test_resolution.py5
1 files changed, 3 insertions, 2 deletions
diff --git a/tests/test_resolution.py b/tests/test_resolution.py
index aa1cd0c..9145f16 100644
--- a/tests/test_resolution.py
+++ b/tests/test_resolution.py
@@ -197,11 +197,12 @@ class ResolutionTestCase(unittest.TestCase):
self.resolver.keyring = dns.tsigkeyring.from_text({
'keyname.' : 'NjHwPsMKjdN++dOfE5iAiQ=='
})
- key = next(iter(self.resolver.keyring.values()))
+ (keyname, secret) = next(iter(self.resolver.keyring.items()))
self.resolver.keyname = dns.name.from_text('keyname.')
(request, answer) = self.resn.next_request()
self.assertFalse(request is None)
- self.assertEqual(request.keyring, key)
+ self.assertEqual(request.keyring.name, keyname)
+ self.assertEqual(request.keyring.secret, secret)
def test_next_request_flags(self):
self.resolver.flags = dns.flags.RD | dns.flags.CD