diff options
author | Tim Burke <tim.burke@gmail.com> | 2021-06-11 13:33:00 -0700 |
---|---|---|
committer | Sergey Shepelev <temotor@gmail.com> | 2021-10-07 14:58:48 +0300 |
commit | 6b4cdf4ae14b51994dd516887e2c2dde537b4476 (patch) | |
tree | c367435b6abf396cd557aaab215f23d107e6f35f | |
parent | 690464aee772b62a54eedf5275843dce30318597 (diff) | |
download | eventlet-tipabu-tls-cap.tar.gz |
wsgi_test: Cap TLS version at 1.2tipabu-tls-cap
On py310, tests may attempt to use TLS 1.3 which apparently doesn't like
the abrupt disconnect. Instead, it would complain:
ssl.SSLEOFError: EOF occurred in violation of protocol
-rw-r--r-- | tests/wsgi_test.py | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/tests/wsgi_test.py b/tests/wsgi_test.py index 999d6f0..00d1076 100644 --- a/tests/wsgi_test.py +++ b/tests/wsgi_test.py @@ -579,7 +579,8 @@ class TestHttpd(_TestBase): sock = eventlet.wrap_ssl( eventlet.listen(('localhost', 0)), certfile=certificate_file, keyfile=private_key_file, - server_side=True) + server_side=True, + ssl_version=ssl.PROTOCOL_TLSv1_2) server_coro = eventlet.spawn(server, sock, wsgi_app, self.logfile) client = eventlet.connect(('localhost', sock.getsockname()[1])) |