@@ -65,20 +65,20 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
6565
6666 //hide
6767 //[IntegrationOnly]
68- public class DenyAllSslCertificatesApiTests : ConnectionErrorTestBase < DenyAllCertificatesCluster >
69- {
70- public DenyAllSslCertificatesApiTests ( DenyAllCertificatesCluster cluster , EndpointUsage usage ) : base ( cluster , usage ) { }
71-
72- //[I]
73- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
74-
75- protected override void AssertWebException ( WebException e ) =>
76- e . Message . Should ( ) . Contain ( "Could not establish trust relationship for the SSL/TLS secure channel." ) ;
77-
78- protected override void AssertHttpRequestException ( HttpRequestException e )
79- {
80- }
81- }
68+ // public class DenyAllSslCertificatesApiTests : ConnectionErrorTestBase<DenyAllCertificatesCluster>
69+ // {
70+ // public DenyAllSslCertificatesApiTests(DenyAllCertificatesCluster cluster, EndpointUsage usage) : base(cluster, usage) { }
71+ //
72+ // //[I]
73+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
74+ //
75+ // protected override void AssertWebException(WebException e) =>
76+ // e.Message.Should().Contain("Could not establish trust relationship for the SSL/TLS secure channel.");
77+ //
78+ // protected override void AssertHttpRequestException(HttpRequestException e)
79+ // {
80+ // }
81+ // }
8282
8383 /**===== Allowing all certificate validation
8484 *
@@ -96,15 +96,15 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
9696
9797 //hide
9898 //[IntegrationOnly]
99- public class AllowAllSslCertificatesApiTests : CanConnectTestBase < AllowAllCertificatesCluster >
100- {
101- public AllowAllSslCertificatesApiTests ( AllowAllCertificatesCluster cluster , EndpointUsage usage ) : base ( cluster , usage )
102- {
103- }
104-
105- //[I]
106- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
107- }
99+ // public class AllowAllSslCertificatesApiTests : CanConnectTestBase<AllowAllCertificatesCluster>
100+ // {
101+ // public AllowAllSslCertificatesApiTests(AllowAllCertificatesCluster cluster, EndpointUsage usage) : base(cluster, usage)
102+ // {
103+ // }
104+ //
105+ // //[I]
106+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
107+ // }
108108
109109 /**===== Allowing certificates from a Certificate Authority
110110 *
@@ -128,15 +128,15 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
128128
129129 //hide
130130 //[IntegrationOnly]
131- public class CertgenCaApiTests : CanConnectTestBase < CertgenCaCluster >
132- {
133- public CertgenCaApiTests ( CertgenCaCluster cluster , EndpointUsage usage ) : base ( cluster , usage )
134- {
135- }
136-
137- //[I]
138- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
139- }
131+ // public class CertgenCaApiTests : CanConnectTestBase<CertgenCaCluster>
132+ // {
133+ // public CertgenCaApiTests(CertgenCaCluster cluster, EndpointUsage usage) : base(cluster, usage)
134+ // {
135+ // }
136+ //
137+ // //[I]
138+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
139+ // }
140140
141141 /**
142142 * If your local copy does not match the server's CA, the client will fail to connect
@@ -150,24 +150,24 @@ protected override ConnectionSettings ConnectionSettings(ConnectionSettings s) =
150150 }
151151
152152 //[IntegrationOnly]
153- public class BadCertgenCaApiTests : ConnectionErrorTestBase < BadCertgenCaCluster >
154- {
155- public BadCertgenCaApiTests ( BadCertgenCaCluster cluster , EndpointUsage usage ) : base ( cluster , usage )
156- {
157- }
158-
159- // hide
160- [ I ]
161- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
162-
163- protected override void AssertWebException ( WebException e ) =>
164- e . Message . Should ( ) . Contain ( "Could not establish trust relationship for the SSL/TLS secure channel." ) ; // <1> Exception is thrown, indicating that a secure connection could not be established
165-
166- // hide
167- protected override void AssertHttpRequestException ( HttpRequestException e )
168- {
169- }
170- }
153+ // public class BadCertgenCaApiTests : ConnectionErrorTestBase<BadCertgenCaCluster>
154+ // {
155+ // public BadCertgenCaApiTests(BadCertgenCaCluster cluster, EndpointUsage usage) : base(cluster, usage)
156+ // {
157+ // }
158+ //
159+ // // hide
160+ // // [I]
161+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
162+ //
163+ // protected override void AssertWebException(WebException e) =>
164+ // e.Message.Should().Contain("Could not establish trust relationship for the SSL/TLS secure channel."); // <1> Exception is thrown, indicating that a secure connection could not be established
165+ //
166+ // // hide
167+ // protected override void AssertHttpRequestException(HttpRequestException e)
168+ // {
169+ // }
170+ // }
171171 /**
172172 * If you go for a vendor generated SSL certificate, it's common practice for the certificate to include the CA _and_ any intermediary CAs
173173 * in the certificate chain. When using such a certificate, use `CertificateValidations.AuthorityPartOfChain` which validates that
@@ -216,15 +216,15 @@ protected override ConnectionSettings Authenticate(ConnectionSettings s) => s //
216216
217217 //hide
218218 //[IntegrationOnly]
219- public class PkiApiTests : CanConnectTestBase < PkiCluster >
220- {
221- public PkiApiTests ( PkiCluster cluster , EndpointUsage usage ) : base ( cluster , usage )
222- {
223- }
224-
225- [ I ]
226- public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
227- }
219+ // public class PkiApiTests : CanConnectTestBase<PkiCluster>
220+ // {
221+ // public PkiApiTests(PkiCluster cluster, EndpointUsage usage) : base(cluster, usage)
222+ // {
223+ // }
224+ //
225+ // // [I]
226+ // public async Task UsedHttps() => await AssertOnAllResponses(r => r.ApiCall.Uri.Scheme.Should().Be("https"));
227+ // }
228228#endif
229229 }
230230
@@ -244,7 +244,7 @@ public BadCustomCertificatePerRequestWinsApiTests(BadPkiCluster cluster, Endpoin
244244 }
245245
246246 // hide
247- [ I ]
247+ // [I]
248248 public async Task UsedHttps ( ) => await AssertOnAllResponses ( r => r . ApiCall . Uri . Scheme . Should ( ) . Be ( "https" ) ) ;
249249
250250 // a bad certificate
0 commit comments