Skip to content

Bump transitive deps in pip-tools-managed lockfiles #707

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 25 commits into
base: main
Choose a base branch
from

Conversation

github-actions[bot]
Copy link
Contributor

@github-actions github-actions bot commented May 5, 2024

Automated pip-tools-managed pip constraint lockfiles update.


This change is Reviewable

@webknjaz webknjaz force-pushed the maintenance/pip-tools-constraint-lockfiles branch 8 times, most recently from 7d55f55 to 9e40eb6 Compare May 12, 2024 01:04
@webknjaz webknjaz force-pushed the maintenance/pip-tools-constraint-lockfiles branch 7 times, most recently from e33772d to 0d3879b Compare May 19, 2024 01:00
@webknjaz webknjaz force-pushed the maintenance/pip-tools-constraint-lockfiles branch 8 times, most recently from ac2fa09 to 36a2026 Compare May 27, 2024 00:59
@webknjaz webknjaz force-pushed the maintenance/pip-tools-constraint-lockfiles branch 3 times, most recently from 4749adb to 2579582 Compare May 30, 2024 00:59
Copy link

codecov bot commented May 30, 2024

❌ 22 Tests Failed:

Tests completed Failed Passed Skipped
1452 22 1430 36
View the top 3 failed test(s) by shortest run time
cheroot.test.test_server::test_peercreds_unix_sock_with_lookup[abstract]
Stack Traces | 0.002s run time
self = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b7093df70>
request = <PreparedRequest [GET]>, stream = False, timeout = 0.1, verify = True
cert = None, proxies = OrderedDict()

    #x1B[0m#x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92msend#x1B[39;49;00m(#x1B[90m#x1B[39;49;00m
        #x1B[96mself#x1B[39;49;00m, request, stream=#x1B[94mFalse#x1B[39;49;00m, timeout=#x1B[94mNone#x1B[39;49;00m, verify=#x1B[94mTrue#x1B[39;49;00m, cert=#x1B[94mNone#x1B[39;49;00m, proxies=#x1B[94mNone#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    ):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""Sends PreparedRequest object. Returns Response object.#x1B[39;49;00m
    #x1B[33m#x1B[39;49;00m
    #x1B[33m    :param request: The :class:`PreparedRequest <PreparedRequest>` being sent.#x1B[39;49;00m
    #x1B[33m    :param stream: (optional) Whether to stream the request content.#x1B[39;49;00m
    #x1B[33m    :param timeout: (optional) How long to wait for the server to send#x1B[39;49;00m
    #x1B[33m        data before giving up, as a float, or a :ref:`(connect timeout,#x1B[39;49;00m
    #x1B[33m        read timeout) <timeouts>` tuple.#x1B[39;49;00m
    #x1B[33m    :type timeout: float or tuple or urllib3 Timeout object#x1B[39;49;00m
    #x1B[33m    :param verify: (optional) Either a boolean, in which case it controls whether#x1B[39;49;00m
    #x1B[33m        we verify the server's TLS certificate, or a string, in which case it#x1B[39;49;00m
    #x1B[33m        must be a path to a CA bundle to use#x1B[39;49;00m
    #x1B[33m    :param cert: (optional) Any user-provided SSL certificate to be trusted.#x1B[39;49;00m
    #x1B[33m    :param proxies: (optional) The proxies dictionary to apply to the request.#x1B[39;49;00m
    #x1B[33m    :rtype: requests.Response#x1B[39;49;00m
    #x1B[33m    """#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mtry#x1B[39;49;00m:#x1B[90m#x1B[39;49;00m
>           conn = #x1B[96mself#x1B[39;49;00m.get_connection_with_tls_context(#x1B[90m#x1B[39;49;00m
                request, verify, proxies=proxies, cert=cert#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m

cert       = None
proxies    = OrderedDict()
request    = <PreparedRequest [GET]>
self       = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b7093df70>
stream     = False
timeout    = 0.1
verify     = True

#x1B[1m#x1B[31m..../py/lib/python3.8........./site-packages/requests/adapters.py#x1B[0m:633: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
#x1B[1m#x1B[31m..../py/lib/python3.8........./site-packages/requests/adapters.py#x1B[0m:489: in get_connection_with_tls_context
    #x1B[0mconn = #x1B[96mself#x1B[39;49;00m.poolmanager.connection_from_host(#x1B[90m#x1B[39;49;00m
        cert       = None
        host_params = {'host': '%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974', 'port': None, 'scheme': 'http+unix'}
        pool_kwargs = {'cert_reqs': 'CERT_REQUIRED', 'ssl_context': <ssl.SSLContext object at 0x7f6b71e2e840>}
        proxies    = OrderedDict()
        proxy      = None
        request    = <PreparedRequest [GET]>
        self       = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b7093df70>
        verify     = True
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/urllib3/poolmanager.py#x1B[0m:246: in connection_from_host
    #x1B[0m#x1B[94mreturn#x1B[39;49;00m #x1B[96mself#x1B[39;49;00m.connection_from_context(request_context)#x1B[90m#x1B[39;49;00m
        host       = '%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974'
        pool_kwargs = {'cert_reqs': 'CERT_REQUIRED', 'ssl_context': <ssl.SSLContext object at 0x7f6b71e2e840>}
        port       = 80
        request_context = {'block': False, 'cert_reqs': 'CERT_REQUIRED', 'host': '%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974', 'maxsize': 10, ...}
        scheme     = 'http+unix'
        self       = <urllib3.poolmanager.PoolManager object at 0x7f6b7093d250>
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <urllib3.poolmanager.PoolManager object at 0x7f6b7093d250>
request_context = {'block': False, 'cert_reqs': 'CERT_REQUIRED', 'host': '%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974', 'maxsize': 10, ...}

    #x1B[0m#x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92mconnection_from_context#x1B[39;49;00m(#x1B[96mself#x1B[39;49;00m, request_context):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""#x1B[39;49;00m
    #x1B[33m    Get a :class:`urllib3.connectionpool.ConnectionPool` based on the request context.#x1B[39;49;00m
    #x1B[33m#x1B[39;49;00m
    #x1B[33m    ``request_context`` must at least contain the ``scheme`` key and its#x1B[39;49;00m
    #x1B[33m    value must be a key in ``key_fn_by_scheme`` instance variable.#x1B[39;49;00m
    #x1B[33m    """#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        scheme = request_context[#x1B[33m"#x1B[39;49;00m#x1B[33mscheme#x1B[39;49;00m#x1B[33m"#x1B[39;49;00m].lower()#x1B[90m#x1B[39;49;00m
        pool_key_constructor = #x1B[96mself#x1B[39;49;00m.key_fn_by_scheme.get(scheme)#x1B[90m#x1B[39;49;00m
        #x1B[94mif#x1B[39;49;00m #x1B[95mnot#x1B[39;49;00m pool_key_constructor:#x1B[90m#x1B[39;49;00m
>           #x1B[94mraise#x1B[39;49;00m URLSchemeUnknown(scheme)#x1B[90m#x1B[39;49;00m
#x1B[1m#x1B[31mE           urllib3.exceptions.URLSchemeUnknown: Not supported URL scheme http+unix#x1B[0m

pool_key_constructor = None
request_context = {'block': False, 'cert_reqs': 'CERT_REQUIRED', 'host': '%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974', 'maxsize': 10, ...}
scheme     = 'http+unix'
self       = <urllib3.poolmanager.PoolManager object at 0x7f6b7093d250>

#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/urllib3/poolmanager.py#x1B[0m:258: URLSchemeUnknown

#x1B[33mDuring handling of the above exception, another exception occurred:#x1B[0m

http_request_timeout = 0.1
peercreds_enabled_server = <cheroot.server.HTTPServer object at 0x7f6b70819070>

    #x1B[0m#x1B[37m@pytest#x1B[39;49;00m.mark.skipif(#x1B[90m#x1B[39;49;00m
        #x1B[95mnot#x1B[39;49;00m IS_UID_GID_RESOLVABLE,#x1B[90m#x1B[39;49;00m
        reason=#x1B[33m'#x1B[39;49;00m#x1B[33mModules `grp` and `pwd` are not available #x1B[39;49;00m#x1B[33m'#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        #x1B[33m'#x1B[39;49;00m#x1B[33munder the current platform#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
    )#x1B[90m#x1B[39;49;00m
    #x1B[37m@unix_only_sock_test#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[37m@non_macos_sock_test#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92mtest_peercreds_unix_sock_with_lookup#x1B[39;49;00m(#x1B[90m#x1B[39;49;00m
        http_request_timeout,#x1B[90m#x1B[39;49;00m
        peercreds_enabled_server,#x1B[90m#x1B[39;49;00m
    ):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""Check that ``PEERCRED`` resolution works when enabled."""#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        httpserver = peercreds_enabled_server#x1B[90m#x1B[39;49;00m
        httpserver.peercreds_resolve_enabled = #x1B[94mTrue#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        bind_addr = httpserver.bind_addr#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mif#x1B[39;49;00m #x1B[96misinstance#x1B[39;49;00m(bind_addr, #x1B[96mbytes#x1B[39;49;00m):#x1B[90m#x1B[39;49;00m
            bind_addr = bind_addr.decode()#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[90m# pylint: disable=possibly-unused-variable#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        quoted = urllib.parse.quote(bind_addr, safe=#x1B[33m'#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m)#x1B[90m#x1B[39;49;00m
        unix_base_uri = #x1B[33m'#x1B[39;49;00m#x1B[33mhttp+unix://#x1B[39;49;00m#x1B[33m{quoted}#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m.format(**#x1B[96mlocals#x1B[39;49;00m())#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mimport#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[04m#x1B[96mgrp#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        #x1B[94mimport#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[04m#x1B[96mpwd#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        expected_textcreds = (#x1B[90m#x1B[39;49;00m
            pwd.getpwuid(os.getuid()).pw_name,#x1B[90m#x1B[39;49;00m
            grp.getgrgid(os.getgid()).gr_name,#x1B[90m#x1B[39;49;00m
        )#x1B[90m#x1B[39;49;00m
        expected_textcreds = #x1B[33m'#x1B[39;49;00m#x1B[33m!#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m.join(#x1B[96mmap#x1B[39;49;00m(#x1B[96mstr#x1B[39;49;00m, expected_textcreds))#x1B[90m#x1B[39;49;00m
        #x1B[94mwith#x1B[39;49;00m requests_unixsocket.monkeypatch():#x1B[90m#x1B[39;49;00m
>           peercreds_text_resp = requests.get(#x1B[90m#x1B[39;49;00m
                unix_base_uri + PEERCRED_TEXTS_URI,#x1B[90m#x1B[39;49;00m
                timeout=http_request_timeout,#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m

bind_addr  = '\x00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974'
expected_textcreds = 'runner!docker'
grp        = <module 'grp' from '.../hostedtoolcache/Python/3.8.18.../x64/lib/python3.8/lib-dynload/grp.cpython-38-x86_64-linux-gnu.so'>
http_request_timeout = 0.1
httpserver = <cheroot.server.HTTPServer object at 0x7f6b70819070>
peercreds_enabled_server = <cheroot.server.HTTPServer object at 0x7f6b70819070>
pwd        = <module 'pwd' (built-in)>
quoted     = '%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974'
unix_base_uri = 'http+unix://%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974'

#x1B[1m#x1B[31mcheroot/test/test_server.py#x1B[0m:323: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/requests_unixsocket/__init__.py#x1B[0m:51: in get
    #x1B[0m#x1B[94mreturn#x1B[39;49;00m request(#x1B[33m'#x1B[39;49;00m#x1B[33mget#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m, url, **kwargs)#x1B[90m#x1B[39;49;00m
        kwargs     = {'allow_redirects': True, 'timeout': 0.1}
        url        = 'http+unix://%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974/peer_creds/texts'
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/requests_unixsocket/__init__.py#x1B[0m:46: in request
    #x1B[0m#x1B[94mreturn#x1B[39;49;00m session.request(method=method, url=url, **kwargs)#x1B[90m#x1B[39;49;00m
        kwargs     = {'allow_redirects': True, 'timeout': 0.1}
        method     = 'get'
        session    = <requests_unixsocket.Session object at 0x7f6b7080a640>
        url        = 'http+unix://%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974/peer_creds/texts'
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/requests/sessions.py#x1B[0m:589: in request
    #x1B[0mresp = #x1B[96mself#x1B[39;49;00m.send(prep, **send_kwargs)#x1B[90m#x1B[39;49;00m
        allow_redirects = True
        auth       = None
        cert       = None
        cookies    = None
        data       = None
        files      = None
        headers    = None
        hooks      = None
        json       = None
        method     = 'get'
        params     = None
        prep       = <PreparedRequest [GET]>
        proxies    = {}
        req        = <Request [GET]>
        self       = <requests_unixsocket.Session object at 0x7f6b7080a640>
        send_kwargs = {'allow_redirects': True, 'cert': None, 'proxies': OrderedDict(), 'stream': False, ...}
        settings   = {'cert': None, 'proxies': OrderedDict(), 'stream': False, 'verify': True}
        stream     = None
        timeout    = 0.1
        url        = 'http+unix://%00cheroot-test-socket201b2789-c528-40ac-9ec3-d72731c62974/peer_creds/texts'
        verify     = None
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/requests/sessions.py#x1B[0m:703: in send
    #x1B[0mr = adapter.send(request, **kwargs)#x1B[90m#x1B[39;49;00m
        adapter    = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b7093df70>
        allow_redirects = True
        hooks      = {'response': []}
        kwargs     = {'cert': None, 'proxies': OrderedDict(), 'stream': False, 'timeout': 0.1, ...}
        request    = <PreparedRequest [GET]>
        self       = <requests_unixsocket.Session object at 0x7f6b7080a640>
        start      = 1751247019.7925448
        stream     = False
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b7093df70>
request = <PreparedRequest [GET]>, stream = False, timeout = 0.1, verify = True
cert = None, proxies = OrderedDict()

    #x1B[0m#x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92msend#x1B[39;49;00m(#x1B[90m#x1B[39;49;00m
        #x1B[96mself#x1B[39;49;00m, request, stream=#x1B[94mFalse#x1B[39;49;00m, timeout=#x1B[94mNone#x1B[39;49;00m, verify=#x1B[94mTrue#x1B[39;49;00m, cert=#x1B[94mNone#x1B[39;49;00m, proxies=#x1B[94mNone#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    ):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""Sends PreparedRequest object. Returns Response object.#x1B[39;49;00m
    #x1B[33m#x1B[39;49;00m
    #x1B[33m    :param request: The :class:`PreparedRequest <PreparedRequest>` being sent.#x1B[39;49;00m
    #x1B[33m    :param stream: (optional) Whether to stream the request content.#x1B[39;49;00m
    #x1B[33m    :param timeout: (optional) How long to wait for the server to send#x1B[39;49;00m
    #x1B[33m        data before giving up, as a float, or a :ref:`(connect timeout,#x1B[39;49;00m
    #x1B[33m        read timeout) <timeouts>` tuple.#x1B[39;49;00m
    #x1B[33m    :type timeout: float or tuple or urllib3 Timeout object#x1B[39;49;00m
    #x1B[33m    :param verify: (optional) Either a boolean, in which case it controls whether#x1B[39;49;00m
    #x1B[33m        we verify the server's TLS certificate, or a string, in which case it#x1B[39;49;00m
    #x1B[33m        must be a path to a CA bundle to use#x1B[39;49;00m
    #x1B[33m    :param cert: (optional) Any user-provided SSL certificate to be trusted.#x1B[39;49;00m
    #x1B[33m    :param proxies: (optional) The proxies dictionary to apply to the request.#x1B[39;49;00m
    #x1B[33m    :rtype: requests.Response#x1B[39;49;00m
    #x1B[33m    """#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mtry#x1B[39;49;00m:#x1B[90m#x1B[39;49;00m
            conn = #x1B[96mself#x1B[39;49;00m.get_connection_with_tls_context(#x1B[90m#x1B[39;49;00m
                request, verify, proxies=proxies, cert=cert#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m
        #x1B[94mexcept#x1B[39;49;00m LocationValueError #x1B[94mas#x1B[39;49;00m e:#x1B[90m#x1B[39;49;00m
>           #x1B[94mraise#x1B[39;49;00m InvalidURL(e, request=request)#x1B[90m#x1B[39;49;00m
#x1B[1m#x1B[31mE           requests.exceptions.InvalidURL: Not supported URL scheme http+unix#x1B[0m

cert       = None
proxies    = OrderedDict()
request    = <PreparedRequest [GET]>
self       = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b7093df70>
stream     = False
timeout    = 0.1
verify     = True

#x1B[1m#x1B[31m..../py/lib/python3.8........./site-packages/requests/adapters.py#x1B[0m:637: InvalidURL
cheroot.test.test_server::test_peercreds_unix_sock_with_lookup[file]
Stack Traces | 0.002s run time
self = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b707b2be0>
request = <PreparedRequest [GET]>, stream = False, timeout = 0.1, verify = True
cert = None, proxies = OrderedDict()

    #x1B[0m#x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92msend#x1B[39;49;00m(#x1B[90m#x1B[39;49;00m
        #x1B[96mself#x1B[39;49;00m, request, stream=#x1B[94mFalse#x1B[39;49;00m, timeout=#x1B[94mNone#x1B[39;49;00m, verify=#x1B[94mTrue#x1B[39;49;00m, cert=#x1B[94mNone#x1B[39;49;00m, proxies=#x1B[94mNone#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    ):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""Sends PreparedRequest object. Returns Response object.#x1B[39;49;00m
    #x1B[33m#x1B[39;49;00m
    #x1B[33m    :param request: The :class:`PreparedRequest <PreparedRequest>` being sent.#x1B[39;49;00m
    #x1B[33m    :param stream: (optional) Whether to stream the request content.#x1B[39;49;00m
    #x1B[33m    :param timeout: (optional) How long to wait for the server to send#x1B[39;49;00m
    #x1B[33m        data before giving up, as a float, or a :ref:`(connect timeout,#x1B[39;49;00m
    #x1B[33m        read timeout) <timeouts>` tuple.#x1B[39;49;00m
    #x1B[33m    :type timeout: float or tuple or urllib3 Timeout object#x1B[39;49;00m
    #x1B[33m    :param verify: (optional) Either a boolean, in which case it controls whether#x1B[39;49;00m
    #x1B[33m        we verify the server's TLS certificate, or a string, in which case it#x1B[39;49;00m
    #x1B[33m        must be a path to a CA bundle to use#x1B[39;49;00m
    #x1B[33m    :param cert: (optional) Any user-provided SSL certificate to be trusted.#x1B[39;49;00m
    #x1B[33m    :param proxies: (optional) The proxies dictionary to apply to the request.#x1B[39;49;00m
    #x1B[33m    :rtype: requests.Response#x1B[39;49;00m
    #x1B[33m    """#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mtry#x1B[39;49;00m:#x1B[90m#x1B[39;49;00m
>           conn = #x1B[96mself#x1B[39;49;00m.get_connection_with_tls_context(#x1B[90m#x1B[39;49;00m
                request, verify, proxies=proxies, cert=cert#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m

cert       = None
proxies    = OrderedDict()
request    = <PreparedRequest [GET]>
self       = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b707b2be0>
stream     = False
timeout    = 0.1
verify     = True

#x1B[1m#x1B[31m..../py/lib/python3.8........./site-packages/requests/adapters.py#x1B[0m:633: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
#x1B[1m#x1B[31m..../py/lib/python3.8........./site-packages/requests/adapters.py#x1B[0m:489: in get_connection_with_tls_context
    #x1B[0mconn = #x1B[96mself#x1B[39;49;00m.poolmanager.connection_from_host(#x1B[90m#x1B[39;49;00m
        cert       = None
        host_params = {'host': '%2Ftmp%2Ftmptygqsv90', 'port': None, 'scheme': 'http+unix'}
        pool_kwargs = {'cert_reqs': 'CERT_REQUIRED', 'ssl_context': <ssl.SSLContext object at 0x7f6b71e2e840>}
        proxies    = OrderedDict()
        proxy      = None
        request    = <PreparedRequest [GET]>
        self       = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b707b2be0>
        verify     = True
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/urllib3/poolmanager.py#x1B[0m:246: in connection_from_host
    #x1B[0m#x1B[94mreturn#x1B[39;49;00m #x1B[96mself#x1B[39;49;00m.connection_from_context(request_context)#x1B[90m#x1B[39;49;00m
        host       = '%2Ftmp%2Ftmptygqsv90'
        pool_kwargs = {'cert_reqs': 'CERT_REQUIRED', 'ssl_context': <ssl.SSLContext object at 0x7f6b71e2e840>}
        port       = 80
        request_context = {'block': False, 'cert_reqs': 'CERT_REQUIRED', 'host': '%2Ftmp%2Ftmptygqsv90', 'maxsize': 10, ...}
        scheme     = 'http+unix'
        self       = <urllib3.poolmanager.PoolManager object at 0x7f6b707b2520>
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <urllib3.poolmanager.PoolManager object at 0x7f6b707b2520>
request_context = {'block': False, 'cert_reqs': 'CERT_REQUIRED', 'host': '%2Ftmp%2Ftmptygqsv90', 'maxsize': 10, ...}

    #x1B[0m#x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92mconnection_from_context#x1B[39;49;00m(#x1B[96mself#x1B[39;49;00m, request_context):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""#x1B[39;49;00m
    #x1B[33m    Get a :class:`urllib3.connectionpool.ConnectionPool` based on the request context.#x1B[39;49;00m
    #x1B[33m#x1B[39;49;00m
    #x1B[33m    ``request_context`` must at least contain the ``scheme`` key and its#x1B[39;49;00m
    #x1B[33m    value must be a key in ``key_fn_by_scheme`` instance variable.#x1B[39;49;00m
    #x1B[33m    """#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        scheme = request_context[#x1B[33m"#x1B[39;49;00m#x1B[33mscheme#x1B[39;49;00m#x1B[33m"#x1B[39;49;00m].lower()#x1B[90m#x1B[39;49;00m
        pool_key_constructor = #x1B[96mself#x1B[39;49;00m.key_fn_by_scheme.get(scheme)#x1B[90m#x1B[39;49;00m
        #x1B[94mif#x1B[39;49;00m #x1B[95mnot#x1B[39;49;00m pool_key_constructor:#x1B[90m#x1B[39;49;00m
>           #x1B[94mraise#x1B[39;49;00m URLSchemeUnknown(scheme)#x1B[90m#x1B[39;49;00m
#x1B[1m#x1B[31mE           urllib3.exceptions.URLSchemeUnknown: Not supported URL scheme http+unix#x1B[0m

pool_key_constructor = None
request_context = {'block': False, 'cert_reqs': 'CERT_REQUIRED', 'host': '%2Ftmp%2Ftmptygqsv90', 'maxsize': 10, ...}
scheme     = 'http+unix'
self       = <urllib3.poolmanager.PoolManager object at 0x7f6b707b2520>

#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/urllib3/poolmanager.py#x1B[0m:258: URLSchemeUnknown

#x1B[33mDuring handling of the above exception, another exception occurred:#x1B[0m

http_request_timeout = 0.1
peercreds_enabled_server = <cheroot.server.HTTPServer object at 0x7f6b70794ca0>

    #x1B[0m#x1B[37m@pytest#x1B[39;49;00m.mark.skipif(#x1B[90m#x1B[39;49;00m
        #x1B[95mnot#x1B[39;49;00m IS_UID_GID_RESOLVABLE,#x1B[90m#x1B[39;49;00m
        reason=#x1B[33m'#x1B[39;49;00m#x1B[33mModules `grp` and `pwd` are not available #x1B[39;49;00m#x1B[33m'#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        #x1B[33m'#x1B[39;49;00m#x1B[33munder the current platform#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
    )#x1B[90m#x1B[39;49;00m
    #x1B[37m@unix_only_sock_test#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[37m@non_macos_sock_test#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92mtest_peercreds_unix_sock_with_lookup#x1B[39;49;00m(#x1B[90m#x1B[39;49;00m
        http_request_timeout,#x1B[90m#x1B[39;49;00m
        peercreds_enabled_server,#x1B[90m#x1B[39;49;00m
    ):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""Check that ``PEERCRED`` resolution works when enabled."""#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        httpserver = peercreds_enabled_server#x1B[90m#x1B[39;49;00m
        httpserver.peercreds_resolve_enabled = #x1B[94mTrue#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        bind_addr = httpserver.bind_addr#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mif#x1B[39;49;00m #x1B[96misinstance#x1B[39;49;00m(bind_addr, #x1B[96mbytes#x1B[39;49;00m):#x1B[90m#x1B[39;49;00m
            bind_addr = bind_addr.decode()#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[90m# pylint: disable=possibly-unused-variable#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        quoted = urllib.parse.quote(bind_addr, safe=#x1B[33m'#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m)#x1B[90m#x1B[39;49;00m
        unix_base_uri = #x1B[33m'#x1B[39;49;00m#x1B[33mhttp+unix://#x1B[39;49;00m#x1B[33m{quoted}#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m.format(**#x1B[96mlocals#x1B[39;49;00m())#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mimport#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[04m#x1B[96mgrp#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        #x1B[94mimport#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[04m#x1B[96mpwd#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        expected_textcreds = (#x1B[90m#x1B[39;49;00m
            pwd.getpwuid(os.getuid()).pw_name,#x1B[90m#x1B[39;49;00m
            grp.getgrgid(os.getgid()).gr_name,#x1B[90m#x1B[39;49;00m
        )#x1B[90m#x1B[39;49;00m
        expected_textcreds = #x1B[33m'#x1B[39;49;00m#x1B[33m!#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m.join(#x1B[96mmap#x1B[39;49;00m(#x1B[96mstr#x1B[39;49;00m, expected_textcreds))#x1B[90m#x1B[39;49;00m
        #x1B[94mwith#x1B[39;49;00m requests_unixsocket.monkeypatch():#x1B[90m#x1B[39;49;00m
>           peercreds_text_resp = requests.get(#x1B[90m#x1B[39;49;00m
                unix_base_uri + PEERCRED_TEXTS_URI,#x1B[90m#x1B[39;49;00m
                timeout=http_request_timeout,#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m

bind_addr  = '/tmp/tmptygqsv90'
expected_textcreds = 'runner!docker'
grp        = <module 'grp' from '.../hostedtoolcache/Python/3.8.18.../x64/lib/python3.8/lib-dynload/grp.cpython-38-x86_64-linux-gnu.so'>
http_request_timeout = 0.1
httpserver = <cheroot.server.HTTPServer object at 0x7f6b70794ca0>
peercreds_enabled_server = <cheroot.server.HTTPServer object at 0x7f6b70794ca0>
pwd        = <module 'pwd' (built-in)>
quoted     = '%2Ftmp%2Ftmptygqsv90'
unix_base_uri = 'http+unix://%2Ftmp%2Ftmptygqsv90'

#x1B[1m#x1B[31mcheroot/test/test_server.py#x1B[0m:323: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/requests_unixsocket/__init__.py#x1B[0m:51: in get
    #x1B[0m#x1B[94mreturn#x1B[39;49;00m request(#x1B[33m'#x1B[39;49;00m#x1B[33mget#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m, url, **kwargs)#x1B[90m#x1B[39;49;00m
        kwargs     = {'allow_redirects': True, 'timeout': 0.1}
        url        = 'http+unix://%2Ftmp%2Ftmptygqsv90/peer_creds/texts'
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/requests_unixsocket/__init__.py#x1B[0m:46: in request
    #x1B[0m#x1B[94mreturn#x1B[39;49;00m session.request(method=method, url=url, **kwargs)#x1B[90m#x1B[39;49;00m
        kwargs     = {'allow_redirects': True, 'timeout': 0.1}
        method     = 'get'
        session    = <requests_unixsocket.Session object at 0x7f6b707b2130>
        url        = 'http+unix://%2Ftmp%2Ftmptygqsv90/peer_creds/texts'
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/requests/sessions.py#x1B[0m:589: in request
    #x1B[0mresp = #x1B[96mself#x1B[39;49;00m.send(prep, **send_kwargs)#x1B[90m#x1B[39;49;00m
        allow_redirects = True
        auth       = None
        cert       = None
        cookies    = None
        data       = None
        files      = None
        headers    = None
        hooks      = None
        json       = None
        method     = 'get'
        params     = None
        prep       = <PreparedRequest [GET]>
        proxies    = {}
        req        = <Request [GET]>
        self       = <requests_unixsocket.Session object at 0x7f6b707b2130>
        send_kwargs = {'allow_redirects': True, 'cert': None, 'proxies': OrderedDict(), 'stream': False, ...}
        settings   = {'cert': None, 'proxies': OrderedDict(), 'stream': False, 'verify': True}
        stream     = None
        timeout    = 0.1
        url        = 'http+unix://%2Ftmp%2Ftmptygqsv90/peer_creds/texts'
        verify     = None
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/requests/sessions.py#x1B[0m:703: in send
    #x1B[0mr = adapter.send(request, **kwargs)#x1B[90m#x1B[39;49;00m
        adapter    = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b707b2be0>
        allow_redirects = True
        hooks      = {'response': []}
        kwargs     = {'cert': None, 'proxies': OrderedDict(), 'stream': False, 'timeout': 0.1, ...}
        request    = <PreparedRequest [GET]>
        self       = <requests_unixsocket.Session object at 0x7f6b707b2130>
        start      = 1751247020.3029838
        stream     = False
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b707b2be0>
request = <PreparedRequest [GET]>, stream = False, timeout = 0.1, verify = True
cert = None, proxies = OrderedDict()

    #x1B[0m#x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92msend#x1B[39;49;00m(#x1B[90m#x1B[39;49;00m
        #x1B[96mself#x1B[39;49;00m, request, stream=#x1B[94mFalse#x1B[39;49;00m, timeout=#x1B[94mNone#x1B[39;49;00m, verify=#x1B[94mTrue#x1B[39;49;00m, cert=#x1B[94mNone#x1B[39;49;00m, proxies=#x1B[94mNone#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    ):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""Sends PreparedRequest object. Returns Response object.#x1B[39;49;00m
    #x1B[33m#x1B[39;49;00m
    #x1B[33m    :param request: The :class:`PreparedRequest <PreparedRequest>` being sent.#x1B[39;49;00m
    #x1B[33m    :param stream: (optional) Whether to stream the request content.#x1B[39;49;00m
    #x1B[33m    :param timeout: (optional) How long to wait for the server to send#x1B[39;49;00m
    #x1B[33m        data before giving up, as a float, or a :ref:`(connect timeout,#x1B[39;49;00m
    #x1B[33m        read timeout) <timeouts>` tuple.#x1B[39;49;00m
    #x1B[33m    :type timeout: float or tuple or urllib3 Timeout object#x1B[39;49;00m
    #x1B[33m    :param verify: (optional) Either a boolean, in which case it controls whether#x1B[39;49;00m
    #x1B[33m        we verify the server's TLS certificate, or a string, in which case it#x1B[39;49;00m
    #x1B[33m        must be a path to a CA bundle to use#x1B[39;49;00m
    #x1B[33m    :param cert: (optional) Any user-provided SSL certificate to be trusted.#x1B[39;49;00m
    #x1B[33m    :param proxies: (optional) The proxies dictionary to apply to the request.#x1B[39;49;00m
    #x1B[33m    :rtype: requests.Response#x1B[39;49;00m
    #x1B[33m    """#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mtry#x1B[39;49;00m:#x1B[90m#x1B[39;49;00m
            conn = #x1B[96mself#x1B[39;49;00m.get_connection_with_tls_context(#x1B[90m#x1B[39;49;00m
                request, verify, proxies=proxies, cert=cert#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m
        #x1B[94mexcept#x1B[39;49;00m LocationValueError #x1B[94mas#x1B[39;49;00m e:#x1B[90m#x1B[39;49;00m
>           #x1B[94mraise#x1B[39;49;00m InvalidURL(e, request=request)#x1B[90m#x1B[39;49;00m
#x1B[1m#x1B[31mE           requests.exceptions.InvalidURL: Not supported URL scheme http+unix#x1B[0m

cert       = None
proxies    = OrderedDict()
request    = <PreparedRequest [GET]>
self       = <requests_unixsocket.adapters.UnixAdapter object at 0x7f6b707b2be0>
stream     = False
timeout    = 0.1
verify     = True

#x1B[1m#x1B[31m..../py/lib/python3.8........./site-packages/requests/adapters.py#x1B[0m:637: InvalidURL
cheroot.test.test_ssl::test_tls_client_auth[VerifyMode.CERT_NONE-True-localhost-pyopenssl]
Stack Traces | 0.002s run time
http_request_timeout = 0.1
mocker = <pytest_mock.plugin.MockerFixture object at 0x7f4b9ef902b0>
tls_http_server = functools.partial(<function make_tls_http_server at 0x7f4b9ef91790>, request=<SubRequest 'tls_http_server' for <Function test_tls_client_auth[VerifyMode.CERT_NONE-True-localhost-pyopenssl]>>)
adapter_type = 'pyopenssl', ca = <trustme.CA object at 0x7f4b9e18c910>
tls_certificate = <trustme.LeafCert object at 0x7f4ba60b8880>
tls_certificate_chain_pem_path = '/tmp/tmp_qxc1mwa.pem'
tls_certificate_private_key_pem_path = '/tmp/tmp7jq27pt6.pem'
tls_ca_certificate_pem_path = '/tmp/tmpw5xm83g7.pem', is_trusted_cert = True
tls_client_identity = 'localhost', tls_verify_mode = <VerifyMode.CERT_NONE: 0>

    #x1B[0m#x1B[37m@pytest#x1B[39;49;00m.mark.parametrize(  #x1B[90m# noqa: C901  # FIXME#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        #x1B[33m'#x1B[39;49;00m#x1B[33madapter_type#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
        (#x1B[90m#x1B[39;49;00m
            #x1B[33m'#x1B[39;49;00m#x1B[33mbuiltin#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
            #x1B[33m'#x1B[39;49;00m#x1B[33mpyopenssl#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
        ),#x1B[90m#x1B[39;49;00m
    )#x1B[90m#x1B[39;49;00m
    #x1B[37m@pytest#x1B[39;49;00m.mark.parametrize(#x1B[90m#x1B[39;49;00m
        (#x1B[33m'#x1B[39;49;00m#x1B[33mis_trusted_cert#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m, #x1B[33m'#x1B[39;49;00m#x1B[33mtls_client_identity#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m),#x1B[90m#x1B[39;49;00m
        (#x1B[90m#x1B[39;49;00m
            (#x1B[94mTrue#x1B[39;49;00m, #x1B[33m'#x1B[39;49;00m#x1B[33mlocalhost#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m),#x1B[90m#x1B[39;49;00m
            (#x1B[94mTrue#x1B[39;49;00m, #x1B[33m'#x1B[39;49;00m#x1B[33m127.0.0.1#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m),#x1B[90m#x1B[39;49;00m
            (#x1B[94mTrue#x1B[39;49;00m, #x1B[33m'#x1B[39;49;00m#x1B[33m*.localhost#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m),#x1B[90m#x1B[39;49;00m
            (#x1B[94mTrue#x1B[39;49;00m, #x1B[33m'#x1B[39;49;00m#x1B[33mnot_localhost#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m),#x1B[90m#x1B[39;49;00m
            (#x1B[94mFalse#x1B[39;49;00m, #x1B[33m'#x1B[39;49;00m#x1B[33mlocalhost#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m),#x1B[90m#x1B[39;49;00m
        ),#x1B[90m#x1B[39;49;00m
    )#x1B[90m#x1B[39;49;00m
    #x1B[37m@pytest#x1B[39;49;00m.mark.parametrize(#x1B[90m#x1B[39;49;00m
        #x1B[33m'#x1B[39;49;00m#x1B[33mtls_verify_mode#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
        (#x1B[90m#x1B[39;49;00m
            ssl.CERT_NONE,  #x1B[90m# server shouldn't validate client cert#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
            ssl.CERT_OPTIONAL,  #x1B[90m# same as CERT_REQUIRED in client mode, don't use#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
            ssl.CERT_REQUIRED,  #x1B[90m# server should validate if client cert CA is OK#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        ),#x1B[90m#x1B[39;49;00m
    )#x1B[90m#x1B[39;49;00m
    #x1B[37m@pytest#x1B[39;49;00m.mark.xfail(#x1B[90m#x1B[39;49;00m
        IS_PYPY #x1B[95mand#x1B[39;49;00m IS_CI,#x1B[90m#x1B[39;49;00m
        reason=#x1B[33m'#x1B[39;49;00m#x1B[33mFails under PyPy in CI for unknown reason#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
        strict=#x1B[94mFalse#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
    )#x1B[90m#x1B[39;49;00m
    #x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92mtest_tls_client_auth#x1B[39;49;00m(  #x1B[90m# noqa: C901, WPS213  # FIXME#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        #x1B[90m# FIXME: remove twisted logic, separate tests#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        http_request_timeout,#x1B[90m#x1B[39;49;00m
        mocker,#x1B[90m#x1B[39;49;00m
        tls_http_server,#x1B[90m#x1B[39;49;00m
        adapter_type,#x1B[90m#x1B[39;49;00m
        ca,#x1B[90m#x1B[39;49;00m
        tls_certificate,#x1B[90m#x1B[39;49;00m
        tls_certificate_chain_pem_path,#x1B[90m#x1B[39;49;00m
        tls_certificate_private_key_pem_path,#x1B[90m#x1B[39;49;00m
        tls_ca_certificate_pem_path,#x1B[90m#x1B[39;49;00m
        is_trusted_cert,#x1B[90m#x1B[39;49;00m
        tls_client_identity,#x1B[90m#x1B[39;49;00m
        tls_verify_mode,#x1B[90m#x1B[39;49;00m
    ):#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""Verify that client TLS certificate auth works correctly."""#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        test_cert_rejection = (#x1B[90m#x1B[39;49;00m
            tls_verify_mode != ssl.CERT_NONE #x1B[95mand#x1B[39;49;00m #x1B[95mnot#x1B[39;49;00m is_trusted_cert#x1B[90m#x1B[39;49;00m
        )#x1B[90m#x1B[39;49;00m
        interface, _host, port = _get_conn_data(ANY_INTERFACE_IPV4)#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        client_cert_root_ca = ca #x1B[94mif#x1B[39;49;00m is_trusted_cert #x1B[94melse#x1B[39;49;00m trustme.CA()#x1B[90m#x1B[39;49;00m
        #x1B[94mwith#x1B[39;49;00m mocker.mock_module.patch(#x1B[90m#x1B[39;49;00m
            #x1B[33m'#x1B[39;49;00m#x1B[33midna.core.ulabel#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
            return_value=ntob(tls_client_identity),#x1B[90m#x1B[39;49;00m
        ):#x1B[90m#x1B[39;49;00m
            client_cert = client_cert_root_ca.issue_cert(#x1B[90m#x1B[39;49;00m
                ntou(tls_client_identity),#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m
            #x1B[94mdel#x1B[39;49;00m client_cert_root_ca#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
        #x1B[94mwith#x1B[39;49;00m client_cert.private_key_and_cert_chain_pem.tempfile() #x1B[94mas#x1B[39;49;00m cl_pem:#x1B[90m#x1B[39;49;00m
            tls_adapter_cls = get_ssl_adapter_class(name=adapter_type)#x1B[90m#x1B[39;49;00m
            tls_adapter = tls_adapter_cls(#x1B[90m#x1B[39;49;00m
                tls_certificate_chain_pem_path,#x1B[90m#x1B[39;49;00m
                tls_certificate_private_key_pem_path,#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m
            #x1B[94mif#x1B[39;49;00m adapter_type == #x1B[33m'#x1B[39;49;00m#x1B[33mpyopenssl#x1B[39;49;00m#x1B[33m'#x1B[39;49;00m:#x1B[90m#x1B[39;49;00m
                tls_adapter.context = tls_adapter.get_context()#x1B[90m#x1B[39;49;00m
                tls_adapter.context.set_verify(#x1B[90m#x1B[39;49;00m
                    _stdlib_to_openssl_verify[tls_verify_mode],#x1B[90m#x1B[39;49;00m
                    #x1B[94mlambda#x1B[39;49;00m conn, cert, errno, depth, preverify_ok: preverify_ok,#x1B[90m#x1B[39;49;00m
                )#x1B[90m#x1B[39;49;00m
            #x1B[94melse#x1B[39;49;00m:#x1B[90m#x1B[39;49;00m
                tls_adapter.context.verify_mode = tls_verify_mode#x1B[90m#x1B[39;49;00m
    #x1B[90m#x1B[39;49;00m
            ca.configure_trust(tls_adapter.context)#x1B[90m#x1B[39;49;00m
>           tls_certificate.configure_cert(tls_adapter.context)#x1B[90m#x1B[39;49;00m

_host      = '0.0.0.0'
adapter_type = 'pyopenssl'
ca         = <trustme.CA object at 0x7f4b9e18c910>
cl_pem     = '/tmp/tmp735l30hc.pem'
client_cert = <trustme.LeafCert object at 0x7f4b9cc30e80>
http_request_timeout = 0.1
interface  = '127.0.0.1'
is_trusted_cert = True
mocker     = <pytest_mock.plugin.MockerFixture object at 0x7f4b9ef902b0>
port       = 0
test_cert_rejection = False
tls_adapter = <cheroot.ssl.pyopenssl.pyOpenSSLAdapter object at 0x7f4b9cc30ee0>
tls_adapter_cls = <class 'cheroot.ssl.pyopenssl.pyOpenSSLAdapter'>
tls_ca_certificate_pem_path = '/tmp/tmpw5xm83g7.pem'
tls_certificate = <trustme.LeafCert object at 0x7f4ba60b8880>
tls_certificate_chain_pem_path = '/tmp/tmp_qxc1mwa.pem'
tls_certificate_private_key_pem_path = '/tmp/tmp7jq27pt6.pem'
tls_client_identity = 'localhost'
tls_http_server = functools.partial(<function make_tls_http_server at 0x7f4b9ef91790>, request=<SubRequest 'tls_http_server' for <Function test_tls_client_auth[VerifyMode.CERT_NONE-True-localhost-pyopenssl]>>)
tls_verify_mode = <VerifyMode.CERT_NONE: 0>

#x1B[1m#x1B[31mcheroot/test/test_ssl.py#x1B[0m:327: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
#x1B[1m#x1B[31m..../py/lib/python3.8.../site-packages/trustme/__init__.py#x1B[0m:529: in configure_cert
    #x1B[0mctx.use_privatekey(key)#x1B[90m#x1B[39;49;00m
        FILETYPE_PEM = 1
        ctx        = <OpenSSL.SSL.Context object at 0x7f4b9cc30d90>
        key        = <OpenSSL.crypto.PKey object at 0x7f4b9cc30ac0>
        load_certificate = <function load_certificate at 0x7f4b9e3259d0>
        load_privatekey = <function load_privatekey at 0x7f4b9e32d9d0>
        self       = <trustme.LeafCert object at 0x7f4ba60b8880>
#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/OpenSSL/SSL.py#x1B[0m:845: in inner
    #x1B[0m#x1B[94mreturn#x1B[39;49;00m f(#x1B[96mself#x1B[39;49;00m, *args, **kwargs)#x1B[90m#x1B[39;49;00m
        args       = (<OpenSSL.crypto.PKey object at 0x7f4b9cc30ac0>,)
        f          = <function Context.use_privatekey at 0x7f4b9e3381f0>
        kwargs     = {}
        self       = <OpenSSL.SSL.Context object at 0x7f4b9cc30d90>
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <OpenSSL.SSL.Context object at 0x7f4b9cc30d90>
pkey = <OpenSSL.crypto.PKey object at 0x7f4b9cc30ac0>

    #x1B[0m#x1B[37m@_require_not_used#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
    #x1B[94mdef#x1B[39;49;00m#x1B[90m #x1B[39;49;00m#x1B[92muse_privatekey#x1B[39;49;00m(#x1B[96mself#x1B[39;49;00m, pkey: _PrivateKey | PKey) -> #x1B[94mNone#x1B[39;49;00m:#x1B[90m#x1B[39;49;00m
    #x1B[90m    #x1B[39;49;00m#x1B[33m"""#x1B[39;49;00m
    #x1B[33m    Load a private key from a PKey object#x1B[39;49;00m
    #x1B[33m#x1B[39;49;00m
    #x1B[33m    :param pkey: The PKey object#x1B[39;49;00m
    #x1B[33m    :return: None#x1B[39;49;00m
    #x1B[33m    """#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        #x1B[90m# Mirrored at Connection.use_privatekey#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
        #x1B[94mif#x1B[39;49;00m #x1B[95mnot#x1B[39;49;00m #x1B[96misinstance#x1B[39;49;00m(pkey, PKey):#x1B[90m#x1B[39;49;00m
            pkey = PKey.from_cryptography_key(pkey)#x1B[90m#x1B[39;49;00m
        #x1B[94melse#x1B[39;49;00m:#x1B[90m#x1B[39;49;00m
>           warnings.warn(#x1B[90m#x1B[39;49;00m
                (#x1B[90m#x1B[39;49;00m
                    #x1B[33m"#x1B[39;49;00m#x1B[33mPassing pyOpenSSL PKey objects is deprecated. You #x1B[39;49;00m#x1B[33m"#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
                    #x1B[33m"#x1B[39;49;00m#x1B[33mshould use a cryptography private key instead.#x1B[39;49;00m#x1B[33m"#x1B[39;49;00m#x1B[90m#x1B[39;49;00m
                ),#x1B[90m#x1B[39;49;00m
                #x1B[96mDeprecationWarning#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
                stacklevel=#x1B[94m2#x1B[39;49;00m,#x1B[90m#x1B[39;49;00m
            )#x1B[90m#x1B[39;49;00m
#x1B[1m#x1B[31mE           DeprecationWarning: Passing pyOpenSSL PKey objects is deprecated. You should use a cryptography private key instead.#x1B[0m

pkey       = <OpenSSL.crypto.PKey object at 0x7f4b9cc30ac0>
self       = <OpenSSL.SSL.Context object at 0x7f4b9cc30d90>

#x1B[1m#x1B[31m..../py/lib/python3.8....../site-packages/OpenSSL/SSL.py#x1B[0m:1246: DeprecationWarning

To view more test analytics, go to the Test Analytics Dashboard
📋 Got 3 mins? Take this short survey to help us improve Test Analytics.

@webknjaz webknjaz force-pushed the maintenance/pip-tools-constraint-lockfiles branch 3 times, most recently from d2c9db9 to a81051d Compare June 2, 2024 01:16
@webknjaz webknjaz force-pushed the maintenance/pip-tools-constraint-lockfiles branch 4 times, most recently from 00acef9 to ff09620 Compare June 29, 2025 01:39
@webknjaz webknjaz force-pushed the maintenance/pip-tools-constraint-lockfiles branch from ff09620 to 96bd5aa Compare June 30, 2025 01:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant