@@ -148,21 +148,21 @@ def test_integration_with_interception_flags(proxy_py_subprocess: int) -> None:
148148 check_output ([str (shell_script_test ), str (proxy_py_subprocess )])
149149
150150
151- @pytest .mark .smoke # type: ignore[misc]
152- @pytest .mark .parametrize (
153- 'proxy_py_subprocess' ,
154- PROXY_PY_FLAGS_MODIFY_CHUNK_RESPONSE_PLUGIN ,
155- indirect = True ,
156- ) # type: ignore[misc]
157- @pytest .mark .skipif (
158- IS_WINDOWS ,
159- reason = 'OSError: [WinError 193] %1 is not a valid Win32 application' ,
160- ) # type: ignore[misc]
161- def test_modify_chunk_response_integration (proxy_py_subprocess : int ) -> None :
162- """An acceptance test for :py:class:`~proxy.plugin.ModifyChunkResponsePlugin`
163- interception using ``curl`` through proxy.py."""
164- shell_script_test = Path (__file__ ).parent / 'test_modify_chunk_response.sh'
165- check_output ([str (shell_script_test ), str (proxy_py_subprocess )])
151+ # @pytest.mark.smoke # type: ignore[misc]
152+ # @pytest.mark.parametrize(
153+ # 'proxy_py_subprocess',
154+ # PROXY_PY_FLAGS_MODIFY_CHUNK_RESPONSE_PLUGIN,
155+ # indirect=True,
156+ # ) # type: ignore[misc]
157+ # @pytest.mark.skipif(
158+ # IS_WINDOWS,
159+ # reason='OSError: [WinError 193] %1 is not a valid Win32 application',
160+ # ) # type: ignore[misc]
161+ # def test_modify_chunk_response_integration(proxy_py_subprocess: int) -> None:
162+ # """An acceptance test for :py:class:`~proxy.plugin.ModifyChunkResponsePlugin`
163+ # interception using ``curl`` through proxy.py."""
164+ # shell_script_test = Path(__file__).parent / 'test_modify_chunk_response.sh'
165+ # check_output([str(shell_script_test), str(proxy_py_subprocess)])
166166
167167
168168@pytest .mark .smoke # type: ignore[misc]
0 commit comments