mirror of
https://github.com/xemu-project/xemu.git
synced 2024-11-27 13:30:52 +00:00
tests: add multifd migration tests of TLS with PSK credentials
This validates that we correctly handle multifd migration success and failure scenarios when using TLS with pre shared keys. Signed-off-by: Daniel P. Berrangé <berrange@redhat.com> Message-Id: <20220426160048.812266-8-berrange@redhat.com> Reviewed-by: Eric Blake <eblake@redhat.com> Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
This commit is contained in:
parent
490facffcf
commit
4d6d2e872a
@ -1816,6 +1816,48 @@ static void test_multifd_tcp_zstd(void)
|
||||
}
|
||||
#endif
|
||||
|
||||
#ifdef CONFIG_GNUTLS
|
||||
static void *
|
||||
test_migrate_multifd_tcp_tls_psk_start_match(QTestState *from,
|
||||
QTestState *to)
|
||||
{
|
||||
test_migrate_precopy_tcp_multifd_start_common(from, to, "none");
|
||||
return test_migrate_tls_psk_start_match(from, to);
|
||||
}
|
||||
|
||||
static void *
|
||||
test_migrate_multifd_tcp_tls_psk_start_mismatch(QTestState *from,
|
||||
QTestState *to)
|
||||
{
|
||||
test_migrate_precopy_tcp_multifd_start_common(from, to, "none");
|
||||
return test_migrate_tls_psk_start_mismatch(from, to);
|
||||
}
|
||||
|
||||
static void test_multifd_tcp_tls_psk_match(void)
|
||||
{
|
||||
MigrateCommon args = {
|
||||
.listen_uri = "defer",
|
||||
.start_hook = test_migrate_multifd_tcp_tls_psk_start_match,
|
||||
.finish_hook = test_migrate_tls_psk_finish,
|
||||
};
|
||||
test_precopy_common(&args);
|
||||
}
|
||||
|
||||
static void test_multifd_tcp_tls_psk_mismatch(void)
|
||||
{
|
||||
MigrateCommon args = {
|
||||
.start = {
|
||||
.hide_stderr = true,
|
||||
},
|
||||
.listen_uri = "defer",
|
||||
.start_hook = test_migrate_multifd_tcp_tls_psk_start_mismatch,
|
||||
.finish_hook = test_migrate_tls_psk_finish,
|
||||
.result = MIG_TEST_FAIL,
|
||||
};
|
||||
test_precopy_common(&args);
|
||||
}
|
||||
#endif /* CONFIG_GNUTLS */
|
||||
|
||||
/*
|
||||
* This test does:
|
||||
* source target
|
||||
@ -2026,12 +2068,22 @@ int main(int argc, char **argv)
|
||||
test_validate_uuid_dst_not_set);
|
||||
|
||||
qtest_add_func("/migration/auto_converge", test_migrate_auto_converge);
|
||||
qtest_add_func("/migration/multifd/tcp/none", test_multifd_tcp_none);
|
||||
qtest_add_func("/migration/multifd/tcp/cancel", test_multifd_tcp_cancel);
|
||||
qtest_add_func("/migration/multifd/tcp/zlib", test_multifd_tcp_zlib);
|
||||
qtest_add_func("/migration/multifd/tcp/plain/none",
|
||||
test_multifd_tcp_none);
|
||||
qtest_add_func("/migration/multifd/tcp/plain/cancel",
|
||||
test_multifd_tcp_cancel);
|
||||
qtest_add_func("/migration/multifd/tcp/plain/zlib",
|
||||
test_multifd_tcp_zlib);
|
||||
#ifdef CONFIG_ZSTD
|
||||
qtest_add_func("/migration/multifd/tcp/zstd", test_multifd_tcp_zstd);
|
||||
qtest_add_func("/migration/multifd/tcp/plain/zstd",
|
||||
test_multifd_tcp_zstd);
|
||||
#endif
|
||||
#ifdef CONFIG_GNUTLS
|
||||
qtest_add_func("/migration/multifd/tcp/tls/psk/match",
|
||||
test_multifd_tcp_tls_psk_match);
|
||||
qtest_add_func("/migration/multifd/tcp/tls/psk/mismatch",
|
||||
test_multifd_tcp_tls_psk_mismatch);
|
||||
#endif /* CONFIG_GNUTLS */
|
||||
|
||||
if (kvm_dirty_ring_supported()) {
|
||||
qtest_add_func("/migration/dirty_ring",
|
||||
|
Loading…
Reference in New Issue
Block a user