diff options
| author | Brian Wellington <bwelling@xbill.org> | 2020-07-01 14:58:14 -0700 |
|---|---|---|
| committer | Brian Wellington <bwelling@xbill.org> | 2020-07-01 15:01:04 -0700 |
| commit | 77e747da6bd5b9b7732d1a28ee0572bf9bcd827b (patch) | |
| tree | dbb702bd8f07a2583c473d7e073b8a4eae9b2feb /tests/test_resolution.py | |
| parent | 0703a8e6d132d4c988d5886233e49d3740c0e6a8 (diff) | |
| download | dnspython-77e747da6bd5b9b7732d1a28ee0572bf9bcd827b.tar.gz | |
Better deal with backwards compatibility.
If dns.tsigkeyring.from_text() creates dns.tsig.Key objects with the
default algorithm, that causes problems for code that specifies a
different algorithm. There's no good way to handle this, so change
dns.tsigkeyring.from_text() to not create dns.tsig.Key objects unless it
knows the algorithm.
Diffstat (limited to 'tests/test_resolution.py')
| -rw-r--r-- | tests/test_resolution.py | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/tests/test_resolution.py b/tests/test_resolution.py index aa1cd0c..9145f16 100644 --- a/tests/test_resolution.py +++ b/tests/test_resolution.py @@ -197,11 +197,12 @@ class ResolutionTestCase(unittest.TestCase): self.resolver.keyring = dns.tsigkeyring.from_text({ 'keyname.' : 'NjHwPsMKjdN++dOfE5iAiQ==' }) - key = next(iter(self.resolver.keyring.values())) + (keyname, secret) = next(iter(self.resolver.keyring.items())) self.resolver.keyname = dns.name.from_text('keyname.') (request, answer) = self.resn.next_request() self.assertFalse(request is None) - self.assertEqual(request.keyring, key) + self.assertEqual(request.keyring.name, keyname) + self.assertEqual(request.keyring.secret, secret) def test_next_request_flags(self): self.resolver.flags = dns.flags.RD | dns.flags.CD |
