Bump certifi from 2022.9.24 to 2022.12.7 in /pykanidm (#1247)

* Bump certifi from 2022.9.24 to 2022.12.7 in /pykanidm
* fixes some broken tests due to a changed error message 

Bumps [certifi](https://github.com/certifi/python-certifi) from 2022.9.24 to 2022.12.7.
- [Release notes](https://github.com/certifi/python-certifi/releases)
- [Commits](https://github.com/certifi/python-certifi/compare/2022.09.24...2022.12.07)

---
updated-dependencies:
- dependency-name: certifi
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>

* Bump black from 22.10.0 to 22.12.0 in /pykanidm (#1256)

Bumps [black](https://github.com/psf/black) from 22.10.0 to 22.12.0.
- [Release notes](https://github.com/psf/black/releases)
- [Changelog](https://github.com/psf/black/blob/main/CHANGES.md)
- [Commits](https://github.com/psf/black/compare/22.10.0...22.12.0)

---
updated-dependencies:
- dependency-name: black
  dependency-type: direct:development
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* trying to fix tests

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
This commit is contained in:
dependabot[bot] 2022-12-12 13:44:46 +10:00 committed by GitHub
parent d0ff03b323
commit ae62f65dab
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 9 additions and 8 deletions

8
pykanidm/poetry.lock generated
View file

@ -102,7 +102,7 @@ uvloop = ["uvloop (>=0.15.2)"]
[[package]] [[package]]
name = "certifi" name = "certifi"
version = "2022.9.24" version = "2022.12.7"
description = "Python package for providing Mozilla's CA Bundle." description = "Python package for providing Mozilla's CA Bundle."
category = "dev" category = "dev"
optional = false optional = false
@ -906,7 +906,7 @@ testing = ["func-timeout", "jaraco.itertools", "pytest (>=6)", "pytest-black (>=
[metadata] [metadata]
lock-version = "1.1" lock-version = "1.1"
python-versions = "^3.9" python-versions = "^3.9"
content-hash = "92dc6f5210e4e97996a9749b49eca3bd250ed6f5f048cf528b486b8fdedc6d01" content-hash = "ad23d4fefdad495faa51844d505bac3eed5d9b180b120749a3a49a28c92863bf"
[metadata.files] [metadata.files]
aiohttp = [ aiohttp = [
@ -1033,8 +1033,8 @@ black = [
{file = "black-22.12.0.tar.gz", hash = "sha256:229351e5a18ca30f447bf724d007f890f97e13af070bb6ad4c0a441cd7596a2f"}, {file = "black-22.12.0.tar.gz", hash = "sha256:229351e5a18ca30f447bf724d007f890f97e13af070bb6ad4c0a441cd7596a2f"},
] ]
certifi = [ certifi = [
{file = "certifi-2022.9.24-py3-none-any.whl", hash = "sha256:90c1a32f1d68f940488354e36370f6cca89f0f106db09518524c88d6ed83f382"}, {file = "certifi-2022.12.7-py3-none-any.whl", hash = "sha256:4ad3232f5e926d6718ec31cfc1fcadfde020920e278684144551c91769c7bc18"},
{file = "certifi-2022.9.24.tar.gz", hash = "sha256:0d9c601124e5a6ba9712dbc60d9c53c21e34f5f641fe83002317394311bdce14"}, {file = "certifi-2022.12.7.tar.gz", hash = "sha256:35824b4c3a97115964b408844d64aa14db1cc518f6562e8d7261699d1350a9e3"},
] ]
cffi = [ cffi = [
{file = "cffi-1.15.1-cp27-cp27m-macosx_10_9_x86_64.whl", hash = "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2"}, {file = "cffi-1.15.1-cp27-cp27m-macosx_10_9_x86_64.whl", hash = "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2"},

View file

@ -1,6 +1,7 @@
""" tests ssl validation and CA setting etc """ """ tests ssl validation and CA setting etc """
from pathlib import Path from pathlib import Path
from ssl import SSLCertVerificationError
import aiohttp import aiohttp
import aiohttp.client_exceptions import aiohttp.client_exceptions
@ -34,7 +35,7 @@ async def test_ssl_self_signed() -> None:
url = "https://self-signed.badssl.com" url = "https://self-signed.badssl.com"
print("testing self signed cert with defaults and expecting an error") print("testing self.?signed cert with defaults and expecting an error")
client = KanidmClient( client = KanidmClient(
uri=url, uri=url,
) )
@ -168,8 +169,8 @@ async def test_ssl_untrusted_root_throws() -> None:
uri="https://untrusted-root.badssl.com/", uri="https://untrusted-root.badssl.com/",
) )
with pytest.raises( with pytest.raises(
aiohttp.client_exceptions.ClientConnectorCertificateError, SSLCertVerificationError,
match="certificate verify failed: self signed certificate in certificate chain", match="certificate verify failed: self.?signed certificate in certificate chain",
): ):
result = await client.call_get("/") result = await client.call_get("/")
assert result.content assert result.content
@ -191,7 +192,7 @@ async def test_ssl_untrusted_root_configured() -> None:
) )
with pytest.raises( with pytest.raises(
aiohttp.client_exceptions.ClientConnectorCertificateError, aiohttp.client_exceptions.ClientConnectorCertificateError,
match="certificate verify failed: self signed certificate in certificate chain", match="certificate verify failed: self.?signed certificate in certificate chain",
): ):
result = await client.call_get("/") result = await client.call_get("/")
assert result.content assert result.content