@@ -46,11 +46,11 @@ func TestStubStatusScraperTLS(t *testing.T) {
4646 IsCA : true ,
4747 }
4848
49- caPrivKey , err := rsa .GenerateKey (rand .Reader , 2048 )
50- require .NoError (t , err )
49+ caPrivKey , caPrivKeyErr := rsa .GenerateKey (rand .Reader , 2048 )
50+ require .NoError (t , caPrivKeyErr )
5151
52- caBytes , err := x509 .CreateCertificate (rand .Reader , ca , ca , & caPrivKey .PublicKey , caPrivKey )
53- require .NoError (t , err )
52+ caBytes , caBytesErr := x509 .CreateCertificate (rand .Reader , ca , ca , & caPrivKey .PublicKey , caPrivKey )
53+ require .NoError (t , caBytesErr )
5454
5555 // Create a test server certificate signed by the CA
5656 cert := & x509.Certificate {
@@ -67,23 +67,24 @@ func TestStubStatusScraperTLS(t *testing.T) {
6767 DNSNames : []string {"localhost" },
6868 }
6969
70- certPrivKey , err := rsa .GenerateKey (rand .Reader , 2048 )
71- require .NoError (t , err )
70+ certPrivKey , certPrivKeyErr := rsa .GenerateKey (rand .Reader , 2048 )
71+ require .NoError (t , certPrivKeyErr )
7272
73- certBytes , err := x509 .CreateCertificate (rand .Reader , cert , ca , & certPrivKey .PublicKey , caPrivKey )
74- require .NoError (t , err )
73+ certBytes , certBytesErr := x509 .CreateCertificate (rand .Reader , cert , ca , & certPrivKey .PublicKey , caPrivKey )
74+ require .NoError (t , certBytesErr )
7575
7676 // Create a temporary directory for test files
7777 tempDir := t .TempDir ()
7878
7979 // Save CA certificate to a file
8080 caFile := filepath .Join (tempDir , "ca.crt" )
8181 caPEM := pem .EncodeToMemory (& pem.Block {Type : "CERTIFICATE" , Bytes : caBytes })
82- err = os .WriteFile (caFile , caPEM , 0o600 )
83- require .NoError (t , err )
82+ writeErr : = os .WriteFile (caFile , caPEM , 0o600 )
83+ require .NoError (t , writeErr )
8484
8585 // Create a TLS config for the server
8686 serverTLSConfig := & tls.Config {
87+ MinVersion : tls .VersionTLS13 ,
8788 Certificates : []tls.Certificate {
8889 {
8990 Certificate : [][]byte {certBytes },
@@ -101,6 +102,7 @@ server accepts handled requests
101102 16630948 16630946 31070465
102103Reading: 6 Writing: 179 Waiting: 106
103104` ))
105+
104106 return
105107 }
106108 rw .WriteHeader (http .StatusNotFound )
@@ -129,14 +131,14 @@ Reading: 6 Writing: 179 Waiting: 106
129131}
130132
131133func TestStubStatusScraperUnixSocket (t * testing.T ) {
132- tempDir , err := os . MkdirTemp ( "" , "TestStubStatusScraperUnixSocket" )
133- require . NoError ( t , err )
134- t . Cleanup ( func () { os . RemoveAll ( tempDir ) })
135- socketPath := filepath . Join ( tempDir , "nginx.sock" )
134+ // Use a shorter path for the socket to avoid path length issues
135+ socketPath := filepath . Join ( os . TempDir (), "test-nginx.sock" )
136+ // Clean up the socket file after the test
137+ t . Cleanup ( func () { os . Remove ( socketPath ) } )
136138
137139 // Create a Unix domain socket listener
138- listener , err := net .Listen ("unix" , socketPath )
139- require .NoError (t , err )
140+ listener , listenErr := net .Listen ("unix" , socketPath )
141+ require .NoError (t , listenErr )
140142 defer listener .Close ()
141143
142144 // Start a simple HTTP server on the Unix socket
@@ -149,6 +151,7 @@ server accepts handled requests
149151 16630948 16630946 31070465
150152Reading: 6 Writing: 179 Waiting: 106
151153` ))
154+
152155 return
153156 }
154157 rw .WriteHeader (http .StatusNotFound )
0 commit comments