about summary refs log tree commit homepage
diff options
context:
space:
mode:
authorEric Wong <e@80x24.org>2019-07-01 08:56:51 +0000
committerEric Wong <e@80x24.org>2019-07-05 04:03:28 +0000
commitf97f84ecbe02223af61fc5ea5074a90b1194cdd2 (patch)
treec225418293fc04e53e9e1fc766430e3fac18238a
parent620b5e23dded54e0abf954752767bc9683a882e3 (diff)
downloadpublic-inbox-f97f84ecbe02223af61fc5ea5074a90b1194cdd2.tar.gz
Net::NNTP won't attempt to use older versions of IO::Socket::SSL
because 2.007 is the "first version with default CA on most platforms"
according to comments in Net::NNTP.  But then again we don't make
remote requests when testing...
-rw-r--r--t/nntpd-tls.t2
-rw-r--r--t/nntpd.t4
2 files changed, 6 insertions, 0 deletions
diff --git a/t/nntpd-tls.t b/t/nntpd-tls.t
index 4cf53daa..49b31221 100644
--- a/t/nntpd-tls.t
+++ b/t/nntpd-tls.t
@@ -13,6 +13,8 @@ foreach my $mod (qw(DBD::SQLite IO::Socket::SSL Net::NNTP IO::Poll)) {
 }
 Net::NNTP->can('starttls') or
         plan skip_all => 'Net::NNTP does not support TLS';
+IO::Socket::SSL->VERSION(2.007) or
+        plan skip_all => 'IO::Socket::SSL <2.007 not supported by Net::NNTP';
 
 my $cert = 'certs/server-cert.pem';
 my $key = 'certs/server-key.pem';
diff --git a/t/nntpd.t b/t/nntpd.t
index 1c5ae8d7..fdb4bee4 100644
--- a/t/nntpd.t
+++ b/t/nntpd.t
@@ -104,6 +104,10 @@ EOF
         SKIP: {
                 $n->can('starttls') or
                         skip('Net::NNTP too old to support STARTTLS', 2);
+                eval {
+                        require IO::Socket::SSL;
+                        IO::Socket::SSL->VERSION(2.007);
+                } or skip('IO::Socket::SSL <2.007 not supported by Net::NNTP');
                 ok(!$n->starttls, 'STARTTLS fails when unconfigured');
                 is($n->code, 580, 'got 580 code on server w/o TLS');
         };