|
45 | 45 | expect(subject.running_version).to eq('1.2.3')
|
46 | 46 | end
|
47 | 47 | end
|
| 48 | + |
| 49 | + context 'with both TLS and unencrypted ports disabled' do |
| 50 | + let(:gitlab_rb) do |
| 51 | + { |
| 52 | + sentinel: { |
| 53 | + port: 0, |
| 54 | + tls_port: 0 |
| 55 | + } |
| 56 | + } |
| 57 | + end |
| 58 | + |
| 59 | + it 'raises an error' do |
| 60 | + expect { subject.running_version }.to raise_error("No Sentinel port available: sentinel['port'] or sentinel['tls_port'] must be non-zero") |
| 61 | + end |
| 62 | + end |
| 63 | + |
| 64 | + context 'with TLS enabled' do |
| 65 | + let(:cmd) { "/opt/gitlab/embedded/bin/redis-cli -h 0.0.0.0 --tls -p 6380 --cacert '#{tls_ca_cert_file}' --cacertdir '#{tls_ca_cert_dir}' INFO" } |
| 66 | + let(:tls_auth_clients) { 'no' } |
| 67 | + let(:tls_cert_file) { '/etc/gitlab/ssl/redis.crt' } |
| 68 | + let(:tls_key_file) { '/etc/gitlab/ssl/redis.key' } |
| 69 | + let(:tls_ca_cert_file) { '/etc/gitlab/ssl/redis-ca.crt' } |
| 70 | + let(:tls_ca_cert_dir) { '/opt/gitlab/embedded/ssl/certs' } |
| 71 | + let(:gitlab_rb) do |
| 72 | + { |
| 73 | + sentinel: { |
| 74 | + port: 0, |
| 75 | + tls_port: 6380, |
| 76 | + tls_cert_file: tls_cert_file, |
| 77 | + tls_key_file: tls_key_file, |
| 78 | + tls_dh_params_file: '/etc/gitlab/ssl/redis-dhparams', |
| 79 | + tls_ca_cert_file: tls_ca_cert_file, |
| 80 | + tls_ca_cert_dir: tls_ca_cert_dir, |
| 81 | + tls_auth_clients: tls_auth_clients |
| 82 | + } |
| 83 | + } |
| 84 | + end |
| 85 | + |
| 86 | + it 'connects with TLS server certificates' do |
| 87 | + expect(VersionHelper).to receive(:do_shell_out).with(cmd, env: {}).and_return(status_success) |
| 88 | + |
| 89 | + expect(subject.running_version).to eq('1.2.3') |
| 90 | + end |
| 91 | + |
| 92 | + context 'with TLS client certs required' do |
| 93 | + let(:tls_auth_clients) { 'yes' } |
| 94 | + let(:cmd) { "/opt/gitlab/embedded/bin/redis-cli -h 0.0.0.0 --tls -p 6380 --cacert '#{tls_ca_cert_file}' --cacertdir '#{tls_ca_cert_dir}' --cert '#{tls_cert_file}' --key '#{tls_key_file}' INFO" } |
| 95 | + |
| 96 | + it 'connects with TLS server and client certificates' do |
| 97 | + expect(VersionHelper).to receive(:do_shell_out).with(cmd, env: {}).and_return(status_success) |
| 98 | + |
| 99 | + expect(subject.running_version).to eq('1.2.3') |
| 100 | + end |
| 101 | + |
| 102 | + context 'with missing TLS client cert' do |
| 103 | + let(:tls_key_file) { nil } |
| 104 | + |
| 105 | + it 'raises an error' do |
| 106 | + expect { subject.running_version }.to raise_error("Sentinel TLS client authentication requires sentinel['tls_cert_file'] and sentinel['tls_key_file'] options") |
| 107 | + end |
| 108 | + end |
| 109 | + end |
| 110 | + end |
48 | 111 | end
|
49 | 112 |
|
50 | 113 | context '#myid' do
|
|
0 commit comments