mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-30 17:53:21 -04:00 
			
		
		
		
	
		
			
	
	
		
			55 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
		
		
			
		
	
	
			55 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
|  | package https
 | ||
|  | 
 | ||
|  | import (
 | ||
|  | 	"crypto/tls"
 | ||
|  | 	"crypto/x509"
 | ||
|  | 	"testing"
 | ||
|  | )
 | ||
|  | 
 | ||
|  | func TestGetCertificate(t *testing.T) {
 | ||
|  | 	defer func() { certCache = make(map[string]Certificate) }()
 | ||
|  | 
 | ||
|  | 	hello := &tls.ClientHelloInfo{ServerName: "example.com"}
 | ||
|  | 	helloSub := &tls.ClientHelloInfo{ServerName: "sub.example.com"}
 | ||
|  | 	helloNoSNI := &tls.ClientHelloInfo{}
 | ||
|  | 	helloNoMatch := &tls.ClientHelloInfo{ServerName: "nomatch"}
 | ||
|  | 
 | ||
|  | 	// When cache is empty
 | ||
|  | 	if cert, err := GetCertificate(hello); err == nil {
 | ||
|  | 		t.Errorf("GetCertificate should return error when cache is empty, got: %v", cert)
 | ||
|  | 	}
 | ||
|  | 	if cert, err := GetCertificate(helloNoSNI); err == nil {
 | ||
|  | 		t.Errorf("GetCertificate should return error when cache is empty even if server name is blank, got: %v", cert)
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// When cache has one certificate in it (also is default)
 | ||
|  | 	defaultCert := Certificate{Names: []string{"example.com", ""}, Certificate: tls.Certificate{Leaf: &x509.Certificate{DNSNames: []string{"example.com"}}}}
 | ||
|  | 	certCache[""] = defaultCert
 | ||
|  | 	certCache["example.com"] = defaultCert
 | ||
|  | 	if cert, err := GetCertificate(hello); err != nil {
 | ||
|  | 		t.Errorf("Got an error but shouldn't have, when cert exists in cache: %v", err)
 | ||
|  | 	} else if cert.Leaf.DNSNames[0] != "example.com" {
 | ||
|  | 		t.Errorf("Got wrong certificate with exact match; expected 'example.com', got: %v", cert)
 | ||
|  | 	}
 | ||
|  | 	if cert, err := GetCertificate(helloNoSNI); err != nil {
 | ||
|  | 		t.Errorf("Got an error with no SNI but shouldn't have, when cert exists in cache: %v", err)
 | ||
|  | 	} else if cert.Leaf.DNSNames[0] != "example.com" {
 | ||
|  | 		t.Errorf("Got wrong certificate for no SNI; expected 'example.com' as default, got: %v", cert)
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// When retrieving wildcard certificate
 | ||
|  | 	certCache["*.example.com"] = Certificate{Names: []string{"*.example.com"}, Certificate: tls.Certificate{Leaf: &x509.Certificate{DNSNames: []string{"*.example.com"}}}}
 | ||
|  | 	if cert, err := GetCertificate(helloSub); err != nil {
 | ||
|  | 		t.Errorf("Didn't get wildcard cert, got: cert=%v, err=%v ", cert, err)
 | ||
|  | 	} else if cert.Leaf.DNSNames[0] != "*.example.com" {
 | ||
|  | 		t.Errorf("Got wrong certificate, expected wildcard: %v", cert)
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// When no certificate matches, the default is returned
 | ||
|  | 	if cert, err := GetCertificate(helloNoMatch); err != nil {
 | ||
|  | 		t.Errorf("Expected default certificate with no error when no matches, got err: %v", err)
 | ||
|  | 	} else if cert.Leaf.DNSNames[0] != "example.com" {
 | ||
|  | 		t.Errorf("Expected default cert with no matches, got: %v", cert)
 | ||
|  | 	}
 | ||
|  | }
 |