mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
Merge pull request #13824 from eval-exec/patch-1
Fix panic in etcd validate secure endpoints #13810
This commit is contained in:
commit
cc33b7cee1
@ -15,6 +15,7 @@
|
|||||||
package transport
|
package transport
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
@ -27,6 +28,8 @@ func ValidateSecureEndpoints(tlsInfo TLSInfo, eps []string) ([]string, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
defer t.CloseIdleConnections()
|
||||||
|
|
||||||
var errs []string
|
var errs []string
|
||||||
var endpoints []string
|
var endpoints []string
|
||||||
for _, ep := range eps {
|
for _, ep := range eps {
|
||||||
@ -34,7 +37,7 @@ func ValidateSecureEndpoints(tlsInfo TLSInfo, eps []string) ([]string, error) {
|
|||||||
errs = append(errs, fmt.Sprintf("%q is insecure", ep))
|
errs = append(errs, fmt.Sprintf("%q is insecure", ep))
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
conn, cerr := t.Dial("tcp", ep[len("https://"):])
|
conn, cerr := t.DialContext(context.Background(), "tcp", ep[len("https://"):])
|
||||||
if cerr != nil {
|
if cerr != nil {
|
||||||
errs = append(errs, fmt.Sprintf("%q failed to dial (%v)", ep, cerr))
|
errs = append(errs, fmt.Sprintf("%q failed to dial (%v)", ep, cerr))
|
||||||
continue
|
continue
|
||||||
|
89
client/pkg/transport/tls_test.go
Normal file
89
client/pkg/transport/tls_test.go
Normal file
@ -0,0 +1,89 @@
|
|||||||
|
// Copyright 2022 The etcd Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package transport
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestValidateSecureEndpoints(t *testing.T) {
|
||||||
|
tlsInfo, err := createSelfCert(t)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unable to create cert: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
remoteAddr := func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
w.Write([]byte(r.RemoteAddr))
|
||||||
|
}
|
||||||
|
srv := httptest.NewServer(http.HandlerFunc(remoteAddr))
|
||||||
|
defer srv.Close()
|
||||||
|
|
||||||
|
tests := map[string]struct {
|
||||||
|
endPoints []string
|
||||||
|
expectedEndpoints []string
|
||||||
|
expectedErr bool
|
||||||
|
}{
|
||||||
|
"invalidEndPoints": {
|
||||||
|
endPoints: []string{
|
||||||
|
"invalid endpoint",
|
||||||
|
},
|
||||||
|
expectedEndpoints: nil,
|
||||||
|
expectedErr: true,
|
||||||
|
},
|
||||||
|
"insecureEndpoints": {
|
||||||
|
endPoints: []string{
|
||||||
|
"http://127.0.0.1:8000",
|
||||||
|
"http://" + srv.Listener.Addr().String(),
|
||||||
|
},
|
||||||
|
expectedEndpoints: nil,
|
||||||
|
expectedErr: true,
|
||||||
|
},
|
||||||
|
"secureEndPoints": {
|
||||||
|
endPoints: []string{
|
||||||
|
"https://" + srv.Listener.Addr().String(),
|
||||||
|
},
|
||||||
|
expectedEndpoints: []string{
|
||||||
|
"https://" + srv.Listener.Addr().String(),
|
||||||
|
},
|
||||||
|
expectedErr: false,
|
||||||
|
},
|
||||||
|
"mixEndPoints": {
|
||||||
|
endPoints: []string{
|
||||||
|
"https://" + srv.Listener.Addr().String(),
|
||||||
|
"http://" + srv.Listener.Addr().String(),
|
||||||
|
"invalid end points",
|
||||||
|
},
|
||||||
|
expectedEndpoints: []string{
|
||||||
|
"https://" + srv.Listener.Addr().String(),
|
||||||
|
},
|
||||||
|
expectedErr: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for name, test := range tests {
|
||||||
|
t.Run(name, func(t *testing.T) {
|
||||||
|
secureEps, err := ValidateSecureEndpoints(*tlsInfo, test.endPoints)
|
||||||
|
if test.expectedErr != (err != nil) {
|
||||||
|
t.Errorf("Unexpected error, got: %v, want: %v", err, test.expectedErr)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !reflect.DeepEqual(test.expectedEndpoints, secureEps) {
|
||||||
|
t.Errorf("expected endpoints %v, got %v", test.expectedEndpoints, secureEps)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user