aboutsummaryrefslogtreecommitdiff
path: root/client_test.go
diff options
context:
space:
mode:
authorGravatar Erik Dubbelboer <erik@dubbelboer.com> 2021-02-06 10:51:25 +0100
committerGravatar Erik Dubbelboer <erik@dubbelboer.com> 2021-02-06 11:47:11 +0100
commitfbe6a2d470ee7e1215c5efbeb1f65a5723a6e234 (patch)
tree3b3ec518a2dd2f973da4f5116e7f8b5e7e9d3e6c /client_test.go
parentAllow concurrent ServeTLS (diff)
downloadfasthttp-fbe6a2d470ee7e1215c5efbeb1f65a5723a6e234.tar.gz
fasthttp-fbe6a2d470ee7e1215c5efbeb1f65a5723a6e234.tar.bz2
fasthttp-fbe6a2d470ee7e1215c5efbeb1f65a5723a6e234.zip
Add fasthttp.GenerateTestCertificate and use in tests
Remove ssl-cert-snakeoil so our tests don't fail in 2025.
Diffstat (limited to 'client_test.go')
-rw-r--r--client_test.go28
1 files changed, 18 insertions, 10 deletions
diff --git a/client_test.go b/client_test.go
index d29eb6e..e269553 100644
--- a/client_test.go
+++ b/client_test.go
@@ -449,12 +449,16 @@ func testClientRedirectListener(t *testing.T, isTLS bool) net.Listener {
var tlsConfig *tls.Config
if isTLS {
- certFile := "./ssl-cert-snakeoil.pem"
- keyFile := "./ssl-cert-snakeoil.key"
- cert, err1 := tls.LoadX509KeyPair(certFile, keyFile)
- if err1 != nil {
- t.Fatalf("Cannot load TLS certificate: %s", err1)
+ certData, keyData, kerr := GenerateTestCertificate("localhost")
+ if kerr != nil {
+ t.Fatal(kerr)
}
+
+ cert, kerr := tls.X509KeyPair(certData, keyData)
+ if kerr != nil {
+ t.Fatal(kerr)
+ }
+
tlsConfig = &tls.Config{
Certificates: []tls.Certificate{cert},
}
@@ -2251,12 +2255,16 @@ func startEchoServerExt(t *testing.T, network, addr string, isTLS bool) *testEch
var ln net.Listener
var err error
if isTLS {
- certFile := "./ssl-cert-snakeoil.pem"
- keyFile := "./ssl-cert-snakeoil.key"
- cert, err1 := tls.LoadX509KeyPair(certFile, keyFile)
- if err1 != nil {
- t.Fatalf("Cannot load TLS certificate: %s", err1)
+ certData, keyData, kerr := GenerateTestCertificate("localhost")
+ if kerr != nil {
+ t.Fatal(kerr)
}
+
+ cert, kerr := tls.X509KeyPair(certData, keyData)
+ if kerr != nil {
+ t.Fatal(kerr)
+ }
+
tlsConfig := &tls.Config{
Certificates: []tls.Certificate{cert},
}