@@ -46,11 +46,11 @@ func TestStubStatusScraperTLS(t *testing.T) {
46
46
IsCA : true ,
47
47
}
48
48
49
- caPrivKey , err := rsa .GenerateKey (rand .Reader , 2048 )
50
- require .NoError (t , err )
49
+ caPrivKey , caPrivKeyErr := rsa .GenerateKey (rand .Reader , 2048 )
50
+ require .NoError (t , caPrivKeyErr )
51
51
52
- caBytes , err := x509 .CreateCertificate (rand .Reader , ca , ca , & caPrivKey .PublicKey , caPrivKey )
53
- require .NoError (t , err )
52
+ caBytes , caBytesErr := x509 .CreateCertificate (rand .Reader , ca , ca , & caPrivKey .PublicKey , caPrivKey )
53
+ require .NoError (t , caBytesErr )
54
54
55
55
// Create a test server certificate signed by the CA
56
56
cert := & x509.Certificate {
@@ -67,23 +67,24 @@ func TestStubStatusScraperTLS(t *testing.T) {
67
67
DNSNames : []string {"localhost" },
68
68
}
69
69
70
- certPrivKey , err := rsa .GenerateKey (rand .Reader , 2048 )
71
- require .NoError (t , err )
70
+ certPrivKey , certPrivKeyErr := rsa .GenerateKey (rand .Reader , 2048 )
71
+ require .NoError (t , certPrivKeyErr )
72
72
73
- certBytes , err := x509 .CreateCertificate (rand .Reader , cert , ca , & certPrivKey .PublicKey , caPrivKey )
74
- require .NoError (t , err )
73
+ certBytes , certBytesErr := x509 .CreateCertificate (rand .Reader , cert , ca , & certPrivKey .PublicKey , caPrivKey )
74
+ require .NoError (t , certBytesErr )
75
75
76
76
// Create a temporary directory for test files
77
77
tempDir := t .TempDir ()
78
78
79
79
// Save CA certificate to a file
80
80
caFile := filepath .Join (tempDir , "ca.crt" )
81
81
caPEM := pem .EncodeToMemory (& pem.Block {Type : "CERTIFICATE" , Bytes : caBytes })
82
- err = os .WriteFile (caFile , caPEM , 0o600 )
83
- require .NoError (t , err )
82
+ writeErr : = os .WriteFile (caFile , caPEM , 0o600 )
83
+ require .NoError (t , writeErr )
84
84
85
85
// Create a TLS config for the server
86
86
serverTLSConfig := & tls.Config {
87
+ MinVersion : tls .VersionTLS13 ,
87
88
Certificates : []tls.Certificate {
88
89
{
89
90
Certificate : [][]byte {certBytes },
@@ -101,6 +102,7 @@ server accepts handled requests
101
102
16630948 16630946 31070465
102
103
Reading: 6 Writing: 179 Waiting: 106
103
104
` ))
105
+
104
106
return
105
107
}
106
108
rw .WriteHeader (http .StatusNotFound )
@@ -129,14 +131,14 @@ Reading: 6 Writing: 179 Waiting: 106
129
131
}
130
132
131
133
func TestStubStatusScraperUnixSocket (t * testing.T ) {
132
- tempDir , err := os . MkdirTemp ( "" , "TestStubStatusScraperUnixSocket" )
133
- require . NoError ( t , err )
134
- t . Cleanup ( func () { os . RemoveAll ( tempDir ) })
135
- socketPath := filepath . Join ( tempDir , "nginx.sock" )
134
+ // Use a shorter path for the socket to avoid path length issues
135
+ socketPath := filepath . Join ( os . TempDir (), "test-nginx.sock" )
136
+ // Clean up the socket file after the test
137
+ t . Cleanup ( func () { os . Remove ( socketPath ) } )
136
138
137
139
// Create a Unix domain socket listener
138
- listener , err := net .Listen ("unix" , socketPath )
139
- require .NoError (t , err )
140
+ listener , listenErr := net .Listen ("unix" , socketPath )
141
+ require .NoError (t , listenErr )
140
142
defer listener .Close ()
141
143
142
144
// Start a simple HTTP server on the Unix socket
@@ -149,6 +151,7 @@ server accepts handled requests
149
151
16630948 16630946 31070465
150
152
Reading: 6 Writing: 179 Waiting: 106
151
153
` ))
154
+
152
155
return
153
156
}
154
157
rw .WriteHeader (http .StatusNotFound )
0 commit comments