Files
tidb/pkg/lightning/common/security_test.go

147 lines
4.1 KiB
Go

// Copyright 2020 PingCAP, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package common_test
import (
"context"
"fmt"
"io"
"net/http"
"net/http/httptest"
"net/url"
"os"
"path/filepath"
"testing"
"github.com/pingcap/tidb/pkg/lightning/common"
"github.com/stretchr/testify/require"
pd "github.com/tikv/pd/client/http"
)
func respondPathHandler(w http.ResponseWriter, req *http.Request) {
_, _ = io.WriteString(w, `{"path":"`)
_, _ = io.WriteString(w, req.URL.Path)
_, _ = io.WriteString(w, `"}`)
}
func TestGetJSONInsecure(t *testing.T) {
mockServer := httptest.NewServer(http.HandlerFunc(respondPathHandler))
defer mockServer.Close()
ctx := context.Background()
u, err := url.Parse(mockServer.URL)
require.NoError(t, err)
tls, err := common.NewTLS("", "", "", u.Host, nil, nil, nil)
require.NoError(t, err)
var result struct{ Path string }
err = tls.GetJSON(ctx, "/aaa", &result)
require.NoError(t, err)
require.Equal(t, "/aaa", result.Path)
err = tls.GetJSON(ctx, "/bbbb", &result)
require.NoError(t, err)
require.Equal(t, "/bbbb", result.Path)
}
func TestGetJSONSecure(t *testing.T) {
mockServer := httptest.NewTLSServer(http.HandlerFunc(respondPathHandler))
defer mockServer.Close()
ctx := context.Background()
tls := common.NewTLSFromMockServer(mockServer)
var result struct{ Path string }
err := tls.GetJSON(ctx, "/ccc", &result)
require.NoError(t, err)
require.Equal(t, "/ccc", result.Path)
err = tls.GetJSON(ctx, "/dddd", &result)
require.NoError(t, err)
require.Equal(t, "/dddd", result.Path)
}
func TestWithHost(t *testing.T) {
mockTLSServer := httptest.NewTLSServer(http.HandlerFunc(respondPathHandler))
defer mockTLSServer.Close()
mockServer := httptest.NewServer(http.HandlerFunc(respondPathHandler))
defer mockServer.Close()
testCases := []struct {
expected string
host string
secure bool
}{
{
"https://127.0.0.1:2379",
"http://127.0.0.1:2379",
true,
},
{
"http://127.0.0.1:2379",
"https://127.0.0.1:2379",
false,
},
{
fmt.Sprintf("http://127.0.0.1:2379%s", pd.Stores),
fmt.Sprintf("127.0.0.1:2379%s", pd.Stores),
false,
},
{
"https://127.0.0.1:2379",
"127.0.0.1:2379",
true,
},
}
for _, testCase := range testCases {
server := mockServer
if testCase.secure {
server = mockTLSServer
}
tls := common.NewTLSFromMockServer(server)
require.Equal(t, testCase.expected, common.GetMockTLSUrl(tls.WithHost(testCase.host)))
}
}
func TestInvalidTLS(t *testing.T) {
tempDir := t.TempDir()
caPath := filepath.Join(tempDir, "ca.pem")
caContent := []byte(`-----BEGIN CERTIFICATE-----
MIIBITCBxwIUf04/Hucshr7AynmgF8JeuFUEf9EwCgYIKoZIzj0EAwIwEzERMA8G
A1UEAwwIYnJfdGVzdHMwHhcNMjIwNDEzMDcyNDQxWhcNMjIwNDE1MDcyNDQxWjAT
MREwDwYDVQQDDAhicl90ZXN0czBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABL+X
wczUg0AbaFFaCI+FAk3K9vbB9JeIORgGKS+F1TKip5tvm96g7S5lq8SgY38SXVc3
0yS3YqWZqnRjWi+sLwIwCgYIKoZIzj0EAwIDSQAwRgIhAJcpSwsUhqkM08LK1gYC
ze4ZnCkwJdP2VdpI3WZsoI7zAiEAjP8X1c0iFwYxdAbQAveX+9msVrzyUpZOohi4
RtgQTNI=
-----END CERTIFICATE-----
`)
err := os.WriteFile(caPath, caContent, 0o644)
require.NoError(t, err)
certPath := filepath.Join(tempDir, "test.pem")
keyPath := filepath.Join(tempDir, "test.key")
certContent := []byte("invalid cert content")
err = os.WriteFile(certPath, certContent, 0o644)
require.NoError(t, err)
keyContent := []byte("invalid key content")
err = os.WriteFile(keyPath, keyContent, 0o600)
require.NoError(t, err)
_, err = common.NewTLS(caPath, "", "", "localhost", caContent, certContent, keyContent)
require.ErrorContains(t, err, "tls: failed to find any PEM data in certificate input")
}