summaryrefslogtreecommitdiffstats
path: root/fluent-bit/lib/librdkafka-2.1.0/tests/0133-ssl_keys.c
diff options
context:
space:
mode:
Diffstat (limited to 'fluent-bit/lib/librdkafka-2.1.0/tests/0133-ssl_keys.c')
-rw-r--r--fluent-bit/lib/librdkafka-2.1.0/tests/0133-ssl_keys.c113
1 files changed, 0 insertions, 113 deletions
diff --git a/fluent-bit/lib/librdkafka-2.1.0/tests/0133-ssl_keys.c b/fluent-bit/lib/librdkafka-2.1.0/tests/0133-ssl_keys.c
deleted file mode 100644
index 850fa276..00000000
--- a/fluent-bit/lib/librdkafka-2.1.0/tests/0133-ssl_keys.c
+++ /dev/null
@@ -1,113 +0,0 @@
-/*
- * librdkafka - Apache Kafka C library
- *
- * Copyright (c) 2022, Magnus Edenhill
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions are met:
- *
- * 1. Redistributions of source code must retain the above copyright notice,
- * this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright notice,
- * this list of conditions and the following disclaimer in the documentation
- * and/or other materials provided with the distribution.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
- * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
- * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
- * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
- * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
- * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
- * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
- * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
- * POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include "test.h"
-#include "rdstring.h"
-
-/**
- * @brief Tests reading SSL PKCS#12 keystore or PEM certificate and key from
- * file. Decoding it with the correct password or not.
- *
- * Ensures it's read correctly on Windows too.
- * See https://github.com/edenhill/librdkafka/issues/3992
- */
-static void do_test_ssl_keys(const char *type, rd_bool_t correct_password) {
-#define TEST_FIXTURES_FOLDER "./fixtures"
-#define TEST_FIXTURES_SSL_FOLDER TEST_FIXTURES_FOLDER "/ssl/"
-#define TEST_FIXTURES_KEYSTORE_PASSWORD "use_strong_password_keystore_client"
-#define TEST_FIXTURES_KEY_PASSWORD "use_strong_password_keystore_client2"
-#define TEST_KEYSTORE_LOCATION TEST_FIXTURES_SSL_FOLDER "client.keystore.p12"
-#define TEST_CERTIFICATE_LOCATION \
- TEST_FIXTURES_SSL_FOLDER "client2.certificate.pem"
-#define TEST_KEY_LOCATION TEST_FIXTURES_SSL_FOLDER "client2.key"
-
- rd_kafka_conf_t *conf;
- rd_kafka_t *rk;
- char errstr[256];
-
- SUB_TEST_QUICK("keystore type = %s, correct password = %s", type,
- RD_STR_ToF(correct_password));
-
- test_conf_init(&conf, NULL, 30);
- test_conf_set(conf, "security.protocol", "SSL");
-
- if (!strcmp(type, "PKCS12")) {
- test_conf_set(conf, "ssl.keystore.location",
- TEST_KEYSTORE_LOCATION);
- if (correct_password)
- test_conf_set(conf, "ssl.keystore.password",
- TEST_FIXTURES_KEYSTORE_PASSWORD);
- else
- test_conf_set(conf, "ssl.keystore.password",
- TEST_FIXTURES_KEYSTORE_PASSWORD
- " and more");
- } else if (!strcmp(type, "PEM")) {
- test_conf_set(conf, "ssl.certificate.location",
- TEST_CERTIFICATE_LOCATION);
- test_conf_set(conf, "ssl.key.location", TEST_KEY_LOCATION);
- if (correct_password)
- test_conf_set(conf, "ssl.key.password",
- TEST_FIXTURES_KEY_PASSWORD);
- else
- test_conf_set(conf, "ssl.keystore.password",
- TEST_FIXTURES_KEYSTORE_PASSWORD
- " and more");
- } else {
- TEST_FAIL("Unexpected key type\n");
- }
-
- rk = rd_kafka_new(RD_KAFKA_PRODUCER, conf, errstr, sizeof(errstr));
- if ((rk != NULL) != correct_password) {
- TEST_FAIL("Expected rd_kafka creation to %s\n",
- correct_password ? "succeed" : "fail");
- }
-
- if (rk)
- rd_kafka_destroy(rk);
- else
- rd_kafka_conf_destroy(conf);
-
- SUB_TEST_PASS();
-
-#undef TEST_FIXTURES_KEYSTORE_PASSWORD
-#undef TEST_FIXTURES_KEY_PASSWORD
-#undef TEST_KEYSTORE_LOCATION
-#undef TEST_CERTIFICATE_LOCATION
-#undef TEST_KEY_LOCATION
-#undef TEST_FIXTURES_FOLDER
-#undef TEST_FIXTURES_SSL_FOLDER
-}
-
-
-int main_0133_ssl_keys(int argc, char **argv) {
- do_test_ssl_keys("PKCS12", rd_true);
- do_test_ssl_keys("PKCS12", rd_false);
- do_test_ssl_keys("PEM", rd_true);
- do_test_ssl_keys("PEM", rd_false);
- return 0;
-}