agent: add rpc tests for listing lan/wan gossip keys
This commit is contained in:
parent
b1b722dbff
commit
0ad0805234
|
@ -30,6 +30,10 @@ func (r *rpcParts) Close() {
|
|||
// testRPCClient returns an RPCClient connected to an RPC server that
|
||||
// serves only this connection.
|
||||
func testRPCClient(t *testing.T) *rpcParts {
|
||||
return testRPCClientWithConfig(t, nil)
|
||||
}
|
||||
|
||||
func testRPCClientWithConfig(t *testing.T, c *Config) *rpcParts {
|
||||
l, err := net.Listen("tcp", "127.0.0.1:0")
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
|
@ -39,6 +43,10 @@ func testRPCClient(t *testing.T) *rpcParts {
|
|||
mult := io.MultiWriter(os.Stderr, lw)
|
||||
|
||||
conf := nextConfig()
|
||||
if c != nil {
|
||||
conf = MergeConfig(conf, c)
|
||||
}
|
||||
|
||||
dir, agent := makeAgentLog(t, conf, mult)
|
||||
rpc := NewAgentRPC(agent, l, mult, lw)
|
||||
|
||||
|
@ -273,3 +281,79 @@ OUTER2:
|
|||
t.Fatalf("should log joining")
|
||||
}
|
||||
}
|
||||
|
||||
func TestRPCClientListKeysLAN(t *testing.T) {
|
||||
key1 := "tbLJg26ZJyJ9pK3qhc9jig=="
|
||||
conf := Config{EncryptKey: key1}
|
||||
p1 := testRPCClientWithConfig(t, &conf)
|
||||
defer p1.Close()
|
||||
|
||||
keys, numNodes, messages, err := p1.client.ListKeysLAN()
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
}
|
||||
|
||||
if _, ok := keys[key1]; !ok {
|
||||
t.Fatalf("bad: %#v", keys)
|
||||
}
|
||||
|
||||
if keys[key1] != 1 {
|
||||
t.Fatalf("bad: %#v", keys)
|
||||
}
|
||||
|
||||
if numNodes != 1 {
|
||||
t.Fatalf("bad: %d", numNodes)
|
||||
}
|
||||
|
||||
if len(messages) != 0 {
|
||||
t.Fatalf("bad: %#v", messages)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRPCClientListKeysWAN(t *testing.T) {
|
||||
key1 := "tbLJg26ZJyJ9pK3qhc9jig=="
|
||||
conf := Config{EncryptKey: key1}
|
||||
p1 := testRPCClientWithConfig(t, &conf)
|
||||
defer p1.Close()
|
||||
|
||||
keys, numNodes, messages, err := p1.client.ListKeysWAN()
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
}
|
||||
|
||||
if _, ok := keys[key1]; !ok {
|
||||
t.Fatalf("bad: %#v", keys)
|
||||
}
|
||||
|
||||
if keys[key1] != 1 {
|
||||
t.Fatalf("bad: %#v", keys)
|
||||
}
|
||||
|
||||
if numNodes != 1 {
|
||||
t.Fatalf("bad: %d", numNodes)
|
||||
}
|
||||
|
||||
if len(messages) != 0 {
|
||||
t.Fatalf("bad: %#v", messages)
|
||||
}
|
||||
}
|
||||
|
||||
func TestRPCClientListKeysLAN_encryptionDisabled(t *testing.T) {
|
||||
p1 := testRPCClient(t)
|
||||
defer p1.Close()
|
||||
|
||||
_, _, _, err := p1.client.ListKeysLAN()
|
||||
if err == nil {
|
||||
t.Fatalf("no error listing keys with encryption disabled")
|
||||
}
|
||||
}
|
||||
|
||||
func TestRPCClientListKeysWAN_encryptionDisabled(t *testing.T) {
|
||||
p1 := testRPCClient(t)
|
||||
defer p1.Close()
|
||||
|
||||
_, _, _, err := p1.client.ListKeysWAN()
|
||||
if err == nil {
|
||||
t.Fatalf("no error listing keys with encryption disabled")
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue