-
Notifications
You must be signed in to change notification settings - Fork 293
/
acceptor_test.go
128 lines (107 loc) · 3.76 KB
/
acceptor_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
// Copyright (c) quickfixengine.org All rights reserved.
//
// This file may be distributed under the terms of the quickfixengine.org
// license as defined by quickfixengine.org and appearing in the file
// LICENSE included in the packaging of this file.
//
// This file is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING
// THE WARRANTY OF DESIGN, MERCHANTABILITY AND FITNESS FOR A
// PARTICULAR PURPOSE.
//
// See http://www.quickfixengine.org/LICENSE for licensing information.
//
// Contact [email protected] if any conditions of this licensing
// are not clear to you.
package quickfix
import (
"crypto/tls"
"net"
"testing"
"github.com/quickfixgo/quickfix/config"
proxyproto "github.com/pires/go-proxyproto"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func TestAcceptor_Start(t *testing.T) {
sessionSettings := NewSessionSettings()
sessionSettings.Set(config.BeginString, BeginStringFIX42)
sessionSettings.Set(config.SenderCompID, "sender")
sessionSettings.Set(config.TargetCompID, "target")
settingsWithTCPProxy := NewSettings()
settingsWithTCPProxy.GlobalSettings().Set("UseTCPProxy", "Y")
settingsWithNoTCPProxy := NewSettings()
settingsWithNoTCPProxy.GlobalSettings().Set("UseTCPProxy", "N")
genericSettings := NewSettings()
const (
GenericListener = iota
ProxyListener
)
acceptorStartTests := []struct {
name string
settings *Settings
listenerType int
}{
{"with TCP proxy set", settingsWithTCPProxy, ProxyListener},
{"with no TCP proxy set", settingsWithNoTCPProxy, GenericListener},
{"no TCP proxy configuration set", genericSettings, GenericListener},
}
for _, tt := range acceptorStartTests {
t.Run(tt.name, func(t *testing.T) {
tt.settings.GlobalSettings().Set("SocketAcceptPort", "5001")
if _, err := tt.settings.AddSession(sessionSettings); err != nil {
assert.Nil(t, err)
}
acceptor := &Acceptor{settings: tt.settings}
if err := acceptor.Start(); err != nil {
assert.NotNil(t, err)
}
assert.Len(t, acceptor.listeners, 1)
for _, listener := range acceptor.listeners {
if tt.listenerType == ProxyListener {
_, ok := listener.(*proxyproto.Listener)
assert.True(t, ok)
}
if tt.listenerType == GenericListener {
_, ok := listener.(*net.TCPListener)
assert.True(t, ok)
}
}
acceptor.Stop()
})
}
}
func TestAcceptor_SetTLSConfig(t *testing.T) {
sessionSettings := NewSessionSettings()
sessionSettings.Set(config.BeginString, BeginStringFIX42)
sessionSettings.Set(config.SenderCompID, "sender")
sessionSettings.Set(config.TargetCompID, "target")
genericSettings := NewSettings()
genericSettings.GlobalSettings().Set("SocketAcceptPort", "5001")
_, err := genericSettings.AddSession(sessionSettings)
require.NoError(t, err)
logger, err := NewNullLogFactory().Create()
require.NoError(t, err)
acceptor := &Acceptor{settings: genericSettings, globalLog: logger}
defer acceptor.Stop()
// example of a customized tls.Config that loads the certificates dynamically by the `GetCertificate` function
// as opposed to the Certificates slice, that is static in nature, and is only populated once and needs application restart to reload the certs.
customizedTLSConfig := tls.Config{
Certificates: []tls.Certificate{},
GetCertificate: func(*tls.ClientHelloInfo) (*tls.Certificate, error) {
cert, err := tls.LoadX509KeyPair("_test_data/localhost.crt", "_test_data/localhost.key")
if err != nil {
return nil, err
}
return &cert, nil
},
}
acceptor.SetTLSConfig(&customizedTLSConfig)
assert.NoError(t, acceptor.Start())
assert.Len(t, acceptor.listeners, 1)
conn, err := tls.Dial("tcp", "localhost:5001", &tls.Config{
InsecureSkipVerify: true,
})
require.NoError(t, err)
assert.NotNil(t, conn)
defer conn.Close()
}