forked from letsencrypt/boulder
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathconfig_test.go
100 lines (93 loc) · 2.85 KB
/
config_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
package cmd
import (
"regexp"
"strings"
"testing"
"github.com/letsencrypt/boulder/test"
)
func TestDBConfigURL(t *testing.T) {
tests := []struct {
conf DBConfig
expected string
}{
{
// Test with one config file that has no trailing newline
conf: DBConfig{DBConnectFile: "testdata/test_dburl"},
expected: "test@tcp(testhost:3306)/testDB?readTimeout=800ms&writeTimeout=800ms",
},
{
// Test with a config file that *has* a trailing newline
conf: DBConfig{DBConnectFile: "testdata/test_dburl_newline"},
expected: "test@tcp(testhost:3306)/testDB?readTimeout=800ms&writeTimeout=800ms",
},
}
for _, tc := range tests {
url, err := tc.conf.URL()
test.AssertNotError(t, err, "Failed calling URL() on DBConfig")
test.AssertEquals(t, url, tc.expected)
}
}
func TestPasswordConfig(t *testing.T) {
tests := []struct {
pc PasswordConfig
expected string
}{
{pc: PasswordConfig{}, expected: ""},
{pc: PasswordConfig{Password: "config"}, expected: "config"},
{pc: PasswordConfig{Password: "config", PasswordFile: "testdata/test_secret"}, expected: "secret"},
{pc: PasswordConfig{PasswordFile: "testdata/test_secret"}, expected: "secret"},
}
for _, tc := range tests {
password, err := tc.pc.Pass()
test.AssertNotError(t, err, "Failed to retrieve password")
test.AssertEquals(t, password, tc.expected)
}
}
func TestTLSConfigLoad(t *testing.T) {
null := "/dev/null"
nonExistent := "[nonexistent]"
cert := "testdata/cert.pem"
key := "testdata/key.pem"
caCert := "testdata/minica.pem"
testCases := []struct {
TLSConfig
want string
}{
{TLSConfig{nil, &null, &null}, "nil CertFile in TLSConfig"},
{TLSConfig{&null, nil, &null}, "nil KeyFile in TLSConfig"},
{TLSConfig{&null, &null, nil}, "nil CACertFile in TLSConfig"},
{TLSConfig{&nonExistent, &key, &caCert}, "loading key pair.*no such file or directory"},
{TLSConfig{&cert, &nonExistent, &caCert}, "loading key pair.*no such file or directory"},
{TLSConfig{&cert, &key, &nonExistent}, "reading CA cert from.*no such file or directory"},
{TLSConfig{&null, &key, &caCert}, "loading key pair.*failed to find any PEM data"},
{TLSConfig{&cert, &null, &caCert}, "loading key pair.*failed to find any PEM data"},
{TLSConfig{&cert, &key, &null}, "parsing CA certs"},
}
for _, tc := range testCases {
var title [3]string
if tc.CertFile == nil {
title[0] = "nil"
} else {
title[0] = *tc.CertFile
}
if tc.KeyFile == nil {
title[1] = "nil"
} else {
title[1] = *tc.KeyFile
}
if tc.CACertFile == nil {
title[2] = "nil"
} else {
title[2] = *tc.CACertFile
}
t.Run(strings.Join(title[:], "_"), func(t *testing.T) {
_, err := tc.TLSConfig.Load()
if err == nil {
t.Errorf("got no error")
}
if matched, _ := regexp.MatchString(tc.want, err.Error()); !matched {
t.Errorf("got error %q, wanted %q", err, tc.want)
}
})
}
}