|
4 | 4 | def test_record_parse_simple_mailto(): |
5 | 5 | TXT_RECORD = "v=TLSRPTv1; rua=mailto:reports@example.com" |
6 | 6 | parsed = tlsrpt_parsing.record.parseString(TXT_RECORD) |
7 | | - assert parsed.tlsrpt_version == 'v=TLSRPTv1' |
8 | | - assert parsed.tlsrpt_uri[0] == 'mailto:reports@example.com' |
| 7 | + assert parsed.tlsrpt_version == "v=TLSRPTv1" |
| 8 | + assert parsed.tlsrpt_uri[0] == "mailto:reports@example.com" |
9 | 9 |
|
10 | 10 |
|
11 | 11 | def test_record_parse_multiple_mailto(): |
12 | 12 | TXT_RECORD = "v=TLSRPTv1;rua=mailto:reports@example.com,mailto:postmaster@example.com" |
13 | 13 | parsed = tlsrpt_parsing.record.parseString(TXT_RECORD) |
14 | | - assert parsed.tlsrpt_version == 'v=TLSRPTv1' |
15 | | - assert parsed.tlsrpt_uri[0] == 'mailto:reports@example.com' |
16 | | - assert parsed.tlsrpt_uri[1] == 'mailto:postmaster@example.com' |
| 14 | + assert parsed.tlsrpt_version == "v=TLSRPTv1" |
| 15 | + assert parsed.tlsrpt_uri[0] == "mailto:reports@example.com" |
| 16 | + assert parsed.tlsrpt_uri[1] == "mailto:postmaster@example.com" |
17 | 17 |
|
18 | 18 |
|
19 | 19 | def test_record_parse_simple_https(): |
20 | 20 | TXT_RECORD = "v=TLSRPTv1; rua=https://reporting.example.com/v1/tlsrpt" |
21 | 21 | parsed = tlsrpt_parsing.record.parseString(TXT_RECORD) |
22 | | - assert parsed.tlsrpt_version == 'v=TLSRPTv1' |
23 | | - assert parsed.tlsrpt_uri[0] == 'https://reporting.example.com/v1/tlsrpt' |
| 22 | + assert parsed.tlsrpt_version == "v=TLSRPTv1" |
| 23 | + assert parsed.tlsrpt_uri[0] == "https://reporting.example.com/v1/tlsrpt" |
24 | 24 |
|
25 | 25 |
|
26 | 26 | def test_record_parse_with_extension(): |
27 | 27 | TXT_RECORD = "v=TLSRPTv1; rua=https://reporting.example.com/v1/tlsrpt; ext=extvalue" |
28 | 28 | parsed = tlsrpt_parsing.record.parseString(TXT_RECORD) |
29 | | - assert parsed.tlsrpt_version == 'v=TLSRPTv1' |
| 29 | + assert parsed.tlsrpt_version == "v=TLSRPTv1" |
30 | 30 |
|
31 | 31 |
|
32 | 32 | def test_parse_silent(): |
33 | 33 | """ |
34 | 34 | Check that parse_silent does not throw a ParseException but instead returns |
35 | 35 | None if the TLSRPT policy record is malformed. |
36 | 36 | """ |
37 | | - TXT_RECORD = "v=TLSRPTv1; rua=!!" # broken TLSRPT |
| 37 | + TXT_RECORD = "v=TLSRPTv1; rua=!!" # broken TLSRPT |
38 | 38 | parsed = tlsrpt_parsing.parse_silent(TXT_RECORD) |
39 | 39 | assert parsed is None |
0 commit comments