|
4 | 4 | def test_record_parse_simple_mailto():
|
5 | 5 | TXT_RECORD = "v=TLSRPTv1; rua=mailto:reports@example.com"
|
6 | 6 | parsed = tlsrpt_parsing.record.parseString(TXT_RECORD)
|
7 |
| - assert parsed.tlsrpt_version == 'v=TLSRPTv1' |
8 |
| - assert parsed.tlsrpt_uri[0] == 'mailto:reports@example.com' |
| 7 | + assert parsed.tlsrpt_version == "v=TLSRPTv1" |
| 8 | + assert parsed.tlsrpt_uri[0] == "mailto:reports@example.com" |
9 | 9 |
|
10 | 10 |
|
11 | 11 | def test_record_parse_multiple_mailto():
|
12 | 12 | TXT_RECORD = "v=TLSRPTv1;rua=mailto:reports@example.com,mailto:postmaster@example.com"
|
13 | 13 | parsed = tlsrpt_parsing.record.parseString(TXT_RECORD)
|
14 |
| - assert parsed.tlsrpt_version == 'v=TLSRPTv1' |
15 |
| - assert parsed.tlsrpt_uri[0] == 'mailto:reports@example.com' |
16 |
| - assert parsed.tlsrpt_uri[1] == 'mailto:postmaster@example.com' |
| 14 | + assert parsed.tlsrpt_version == "v=TLSRPTv1" |
| 15 | + assert parsed.tlsrpt_uri[0] == "mailto:reports@example.com" |
| 16 | + assert parsed.tlsrpt_uri[1] == "mailto:postmaster@example.com" |
17 | 17 |
|
18 | 18 |
|
19 | 19 | def test_record_parse_simple_https():
|
20 | 20 | TXT_RECORD = "v=TLSRPTv1; rua=https://reporting.example.com/v1/tlsrpt"
|
21 | 21 | parsed = tlsrpt_parsing.record.parseString(TXT_RECORD)
|
22 |
| - assert parsed.tlsrpt_version == 'v=TLSRPTv1' |
23 |
| - assert parsed.tlsrpt_uri[0] == 'https://reporting.example.com/v1/tlsrpt' |
| 22 | + assert parsed.tlsrpt_version == "v=TLSRPTv1" |
| 23 | + assert parsed.tlsrpt_uri[0] == "https://reporting.example.com/v1/tlsrpt" |
24 | 24 |
|
25 | 25 |
|
26 | 26 | def test_record_parse_with_extension():
|
27 | 27 | TXT_RECORD = "v=TLSRPTv1; rua=https://reporting.example.com/v1/tlsrpt; ext=extvalue"
|
28 | 28 | parsed = tlsrpt_parsing.record.parseString(TXT_RECORD)
|
29 |
| - assert parsed.tlsrpt_version == 'v=TLSRPTv1' |
| 29 | + assert parsed.tlsrpt_version == "v=TLSRPTv1" |
30 | 30 |
|
31 | 31 |
|
32 | 32 | def test_parse_silent():
|
33 | 33 | """
|
34 | 34 | Check that parse_silent does not throw a ParseException but instead returns
|
35 | 35 | None if the TLSRPT policy record is malformed.
|
36 | 36 | """
|
37 |
| - TXT_RECORD = "v=TLSRPTv1; rua=!!" # broken TLSRPT |
| 37 | + TXT_RECORD = "v=TLSRPTv1; rua=!!" # broken TLSRPT |
38 | 38 | parsed = tlsrpt_parsing.parse_silent(TXT_RECORD)
|
39 | 39 | assert parsed is None
|
0 commit comments