mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
transport: use actual certs for listener tests
This commit is contained in:
parent
cad1215b18
commit
70a9929b5d
@ -18,7 +18,6 @@ import (
|
|||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
|
||||||
"testing"
|
"testing"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -50,12 +49,12 @@ func TestNewKeepAliveListener(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// tls
|
// tls
|
||||||
tmp, err := createTempFile([]byte("XXX"))
|
tlsinfo, del, err := createSelfCert()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unable to create tmpfile: %v", err)
|
t.Fatalf("unable to create tmpfile: %v", err)
|
||||||
}
|
}
|
||||||
defer os.Remove(tmp)
|
defer del()
|
||||||
tlsInfo := TLSInfo{CertFile: tmp, KeyFile: tmp}
|
tlsInfo := TLSInfo{CertFile: tlsinfo.CertFile, KeyFile: tlsinfo.KeyFile}
|
||||||
tlsInfo.parseFunc = fakeCertificateParserFunc(tls.Certificate{}, nil)
|
tlsInfo.parseFunc = fakeCertificateParserFunc(tls.Certificate{}, nil)
|
||||||
tlscfg, err := tlsInfo.ServerConfig()
|
tlscfg, err := tlsInfo.ServerConfig()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -24,18 +24,16 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
func createTempFile(b []byte) (string, error) {
|
func createSelfCert() (*TLSInfo, func(), error) {
|
||||||
f, err := ioutil.TempFile("", "etcd-test-tls-")
|
d, terr := ioutil.TempDir("", "etcd-test-tls-")
|
||||||
|
if terr != nil {
|
||||||
|
return nil, nil, terr
|
||||||
|
}
|
||||||
|
info, err := SelfCert(d, []string{"127.0.0.1"})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
defer f.Close()
|
return &info, func() { os.RemoveAll(d) }, nil
|
||||||
|
|
||||||
if _, err = f.Write(b); err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
return f.Name(), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func fakeCertificateParserFunc(cert tls.Certificate, err error) func(certPEMBlock, keyPEMBlock []byte) (tls.Certificate, error) {
|
func fakeCertificateParserFunc(cert tls.Certificate, err error) func(certPEMBlock, keyPEMBlock []byte) (tls.Certificate, error) {
|
||||||
@ -47,28 +45,25 @@ func fakeCertificateParserFunc(cert tls.Certificate, err error) func(certPEMBloc
|
|||||||
// TestNewListenerTLSInfo tests that NewListener with valid TLSInfo returns
|
// TestNewListenerTLSInfo tests that NewListener with valid TLSInfo returns
|
||||||
// a TLS listener that accepts TLS connections.
|
// a TLS listener that accepts TLS connections.
|
||||||
func TestNewListenerTLSInfo(t *testing.T) {
|
func TestNewListenerTLSInfo(t *testing.T) {
|
||||||
tmp, err := createTempFile([]byte("XXX"))
|
tlsInfo, del, err := createSelfCert()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unable to create tmpfile: %v", err)
|
t.Fatalf("unable to create cert: %v", err)
|
||||||
}
|
}
|
||||||
defer os.Remove(tmp)
|
defer del()
|
||||||
tlsInfo := TLSInfo{CertFile: tmp, KeyFile: tmp}
|
testNewListenerTLSInfoAccept(t, *tlsInfo)
|
||||||
tlsInfo.parseFunc = fakeCertificateParserFunc(tls.Certificate{}, nil)
|
|
||||||
testNewListenerTLSInfoAccept(t, tlsInfo)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func testNewListenerTLSInfoAccept(t *testing.T, tlsInfo TLSInfo) {
|
func testNewListenerTLSInfoAccept(t *testing.T, tlsInfo TLSInfo) {
|
||||||
tlscfg, err := tlsInfo.ServerConfig()
|
ln, err := NewListener("127.0.0.1:0", "https", &tlsInfo)
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("unexpected serverConfig error: %v", err)
|
|
||||||
}
|
|
||||||
ln, err := NewListener("127.0.0.1:0", "https", tlscfg)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected NewListener error: %v", err)
|
t.Fatalf("unexpected NewListener error: %v", err)
|
||||||
}
|
}
|
||||||
defer ln.Close()
|
defer ln.Close()
|
||||||
|
|
||||||
go http.Get("https://" + ln.Addr().String())
|
tr := &http.Transport{TLSClientConfig: &tls.Config{InsecureSkipVerify: true}}
|
||||||
|
cli := &http.Client{Transport: tr}
|
||||||
|
go cli.Get("https://" + ln.Addr().String())
|
||||||
|
|
||||||
conn, err := ln.Accept()
|
conn, err := ln.Accept()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected Accept error: %v", err)
|
t.Fatalf("unexpected Accept error: %v", err)
|
||||||
@ -87,25 +82,25 @@ func TestNewListenerTLSEmptyInfo(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestNewTransportTLSInfo(t *testing.T) {
|
func TestNewTransportTLSInfo(t *testing.T) {
|
||||||
tmp, err := createTempFile([]byte("XXX"))
|
tlsinfo, del, err := createSelfCert()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Unable to prepare tmpfile: %v", err)
|
t.Fatalf("unable to create cert: %v", err)
|
||||||
}
|
}
|
||||||
defer os.Remove(tmp)
|
defer del()
|
||||||
|
|
||||||
tests := []TLSInfo{
|
tests := []TLSInfo{
|
||||||
{},
|
{},
|
||||||
{
|
{
|
||||||
CertFile: tmp,
|
CertFile: tlsinfo.CertFile,
|
||||||
KeyFile: tmp,
|
KeyFile: tlsinfo.KeyFile,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
CertFile: tmp,
|
CertFile: tlsinfo.CertFile,
|
||||||
KeyFile: tmp,
|
KeyFile: tlsinfo.KeyFile,
|
||||||
CAFile: tmp,
|
CAFile: tlsinfo.CAFile,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
CAFile: tmp,
|
CAFile: tlsinfo.CAFile,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -159,17 +154,17 @@ func TestTLSInfoEmpty(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestTLSInfoMissingFields(t *testing.T) {
|
func TestTLSInfoMissingFields(t *testing.T) {
|
||||||
tmp, err := createTempFile([]byte("XXX"))
|
tlsinfo, del, err := createSelfCert()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Unable to prepare tmpfile: %v", err)
|
t.Fatalf("unable to create cert: %v", err)
|
||||||
}
|
}
|
||||||
defer os.Remove(tmp)
|
defer del()
|
||||||
|
|
||||||
tests := []TLSInfo{
|
tests := []TLSInfo{
|
||||||
{CertFile: tmp},
|
{CertFile: tlsinfo.CertFile},
|
||||||
{KeyFile: tmp},
|
{KeyFile: tlsinfo.KeyFile},
|
||||||
{CertFile: tmp, CAFile: tmp},
|
{CertFile: tlsinfo.CertFile, CAFile: tlsinfo.CAFile},
|
||||||
{KeyFile: tmp, CAFile: tmp},
|
{KeyFile: tlsinfo.KeyFile, CAFile: tlsinfo.CAFile},
|
||||||
}
|
}
|
||||||
|
|
||||||
for i, info := range tests {
|
for i, info := range tests {
|
||||||
@ -184,30 +179,29 @@ func TestTLSInfoMissingFields(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestTLSInfoParseFuncError(t *testing.T) {
|
func TestTLSInfoParseFuncError(t *testing.T) {
|
||||||
tmp, err := createTempFile([]byte("XXX"))
|
tlsinfo, del, err := createSelfCert()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Unable to prepare tmpfile: %v", err)
|
t.Fatalf("unable to create cert: %v", err)
|
||||||
}
|
}
|
||||||
defer os.Remove(tmp)
|
defer del()
|
||||||
|
|
||||||
info := TLSInfo{CertFile: tmp, KeyFile: tmp, CAFile: tmp}
|
tlsinfo.parseFunc = fakeCertificateParserFunc(tls.Certificate{}, errors.New("fake"))
|
||||||
info.parseFunc = fakeCertificateParserFunc(tls.Certificate{}, errors.New("fake"))
|
|
||||||
|
|
||||||
if _, err = info.ServerConfig(); err == nil {
|
if _, err = tlsinfo.ServerConfig(); err == nil {
|
||||||
t.Errorf("expected non-nil error from ServerConfig()")
|
t.Errorf("expected non-nil error from ServerConfig()")
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, err = info.ClientConfig(); err == nil {
|
if _, err = tlsinfo.ClientConfig(); err == nil {
|
||||||
t.Errorf("expected non-nil error from ClientConfig()")
|
t.Errorf("expected non-nil error from ClientConfig()")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestTLSInfoConfigFuncs(t *testing.T) {
|
func TestTLSInfoConfigFuncs(t *testing.T) {
|
||||||
tmp, err := createTempFile([]byte("XXX"))
|
tlsinfo, del, err := createSelfCert()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("Unable to prepare tmpfile: %v", err)
|
t.Fatalf("unable to create cert: %v", err)
|
||||||
}
|
}
|
||||||
defer os.Remove(tmp)
|
defer del()
|
||||||
|
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
info TLSInfo
|
info TLSInfo
|
||||||
@ -215,13 +209,13 @@ func TestTLSInfoConfigFuncs(t *testing.T) {
|
|||||||
wantCAs bool
|
wantCAs bool
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
info: TLSInfo{CertFile: tmp, KeyFile: tmp},
|
info: TLSInfo{CertFile: tlsinfo.CertFile, KeyFile: tlsinfo.KeyFile},
|
||||||
clientAuth: tls.NoClientCert,
|
clientAuth: tls.NoClientCert,
|
||||||
wantCAs: false,
|
wantCAs: false,
|
||||||
},
|
},
|
||||||
|
|
||||||
{
|
{
|
||||||
info: TLSInfo{CertFile: tmp, KeyFile: tmp, CAFile: tmp},
|
info: TLSInfo{CertFile: tlsinfo.CertFile, KeyFile: tlsinfo.KeyFile, CAFile: tlsinfo.CertFile},
|
||||||
clientAuth: tls.RequireAndVerifyClientCert,
|
clientAuth: tls.RequireAndVerifyClientCert,
|
||||||
wantCAs: true,
|
wantCAs: true,
|
||||||
},
|
},
|
||||||
|
@ -121,7 +121,6 @@ func (l *tlsListener) acceptLoop() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
select {
|
select {
|
||||||
case l.connc <- tlsConn:
|
case l.connc <- tlsConn:
|
||||||
conn = nil
|
conn = nil
|
||||||
|
Loading…
x
Reference in New Issue
Block a user