Skip to content

Commit b24896c

Browse files
ZetaoZhuangpaulyufan2
authored andcommitted
address comment
1 parent 76c874d commit b24896c

File tree

2 files changed

+25
-16
lines changed

2 files changed

+25
-16
lines changed

cns/service.go

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ const (
2828
genericData = "com.microsoft.azure.network.generic"
2929
)
3030

31-
var errBootConfig = errors.New("configuration error")
31+
var errTLSConfig = errors.New("unsupported TLS version name from config")
3232

3333
// Service defines Container Networking Service.
3434
type Service struct {
@@ -181,9 +181,9 @@ func getTLSConfigFromFile(tlsSettings localtls.TlsSettings) (*tls.Config, error)
181181
PrivateKey: privateKey,
182182
Leaf: leafCertificate,
183183
}
184-
minTLSVersionNumber, err := TLSVersionNumber(tlsSettings.MinTLSVersion)
184+
minTLSVersionNumber, err := parseTLSVersionName(tlsSettings.MinTLSVersion)
185185
if err != nil {
186-
return nil, errors.Wrap(err, "MinTLSVersion is not valid")
186+
return nil, errors.Wrap(err, "parsing MinTLSVersion from config")
187187
}
188188

189189
tlsConfig := &tls.Config{
@@ -232,9 +232,9 @@ func getTLSConfigFromKeyVault(tlsSettings localtls.TlsSettings, errChan chan<- e
232232
errChan <- cr.Refresh(ctx, tlsSettings.KeyVaultCertificateRefreshInterval)
233233
}()
234234

235-
minTLSVersionNumber, err := TLSVersionNumber(tlsSettings.MinTLSVersion)
235+
minTLSVersionNumber, err := parseTLSVersionName(tlsSettings.MinTLSVersion)
236236
if err != nil {
237-
return nil, errors.Wrap(err, "MinTLSVersion is not valid")
237+
return nil, errors.Wrap(err, "parsing MinTLSVersion from config")
238238
}
239239

240240
tlsConfig := tls.Config{
@@ -328,19 +328,15 @@ func (service *Service) SendErrorResponse(w http.ResponseWriter, errMsg error) {
328328
logger.Errorf("[%s] %+v %s.", service.Name, &resp, err.Error())
329329
}
330330

331-
// TLSVersionNumber returns the version number for the provided TLS version name
331+
// parseTLSVersionName returns the version number for the provided TLS version name
332332
// (e.g. 0x0301)
333-
func TLSVersionNumber(versionName string) (uint16, error) {
333+
func parseTLSVersionName(versionName string) (uint16, error) {
334334
switch versionName {
335-
case "TLS 1.0":
336-
return tls.VersionTLS10, nil
337-
case "TLS 1.1":
338-
return tls.VersionTLS11, nil
339335
case "TLS 1.2":
340336
return tls.VersionTLS12, nil
341337
case "TLS 1.3":
342338
return tls.VersionTLS13, nil
343339
default:
344-
return 0, errors.Wrap(errBootConfig, "unsupported TLS version name")
340+
return 0, errors.Wrapf(errTLSConfig, "version name %s", versionName)
345341
}
346342
}

cns/service_test.go

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ func TestNewService(t *testing.T) {
9595
err = svc.StartListener(config)
9696
require.NoError(t, err)
9797

98-
minTLSVersionNumber, err := TLSVersionNumber(config.TLSSettings.MinTLSVersion)
98+
minTLSVersionNumber, err := parseTLSVersionName(config.TLSSettings.MinTLSVersion)
9999
require.NoError(t, err)
100100

101101
tlsClient := &http.Client{
@@ -329,15 +329,28 @@ func createTestCertificate(t *testing.T) string {
329329
}
330330

331331
func TestTLSVersionNumber(t *testing.T) {
332-
t.Run("unsupported ServerSettings.MinTLSVersion", func(t *testing.T) {
333-
versionNumber, err := TLSVersionNumber("TLS 1.4")
332+
t.Run("unsupported ServerSettings.MinTLSVersion TLS 1.0", func(t *testing.T) {
333+
versionNumber, err := parseTLSVersionName("TLS 1.0")
334+
require.Equal(t, uint16(0), versionNumber)
335+
require.Error(t, err)
336+
require.ErrorContains(t, err, "unsupported TLS version name")
337+
})
338+
339+
t.Run("unsupported ServerSettings.MinTLSVersion TLS 1.1", func(t *testing.T) {
340+
versionNumber, err := parseTLSVersionName("TLS 1.1")
341+
require.Equal(t, uint16(0), versionNumber)
342+
require.Error(t, err)
343+
require.ErrorContains(t, err, "unsupported TLS version name")
344+
})
345+
t.Run("unsupported ServerSettings.MinTLSVersion TLS 1.4", func(t *testing.T) {
346+
versionNumber, err := parseTLSVersionName("TLS 1.4")
334347
require.Equal(t, uint16(0), versionNumber)
335348
require.Error(t, err)
336349
require.ErrorContains(t, err, "unsupported TLS version name")
337350
})
338351

339352
t.Run("valid ServerSettings.MinTLSVersion", func(t *testing.T) {
340-
versionNumber, err := TLSVersionNumber("TLS 1.2")
353+
versionNumber, err := parseTLSVersionName("TLS 1.2")
341354
require.Equal(t, uint16(tls.VersionTLS12), versionNumber)
342355
require.NoError(t, err)
343356
})

0 commit comments

Comments
 (0)