@@ -26,25 +26,27 @@ func TestTLS_SNI(t *testing.T) {
2626 require .NoError (t , err )
2727 options , err := parseOptions (config .URL )
2828 require .NoError (t , err )
29- cfg := tls.ClientConfig {ServerName : "host" , CertificateName : "host" }
29+ certVerifier := & tls.StandardCertVerifier {CertificateName : "host" }
30+ cfg := tls.ClientConfig {ServerName : "host" , CertVerifier : certVerifier }
3031 for _ , option := range options {
3132 option ("host" , & cfg )
3233 }
3334 require .Equal (t , "www.google.com" , cfg .ServerName )
34- require .Equal (t , "host" , cfg .CertificateName )
35+ require .Equal (t , certVerifier , cfg .CertVerifier )
3536}
3637
3738func TestTLS_NoSNI (t * testing.T ) {
3839 config , err := ParseConfig ("tls:sni=" )
3940 require .NoError (t , err )
4041 options , err := parseOptions (config .URL )
4142 require .NoError (t , err )
42- cfg := tls.ClientConfig {ServerName : "host" , CertificateName : "host" }
43+ certVerifier := & tls.StandardCertVerifier {CertificateName : "host" }
44+ cfg := tls.ClientConfig {ServerName : "host" , CertVerifier : certVerifier }
4345 for _ , option := range options {
4446 option ("host" , & cfg )
4547 }
4648 require .Equal (t , "" , cfg .ServerName )
47- require .Equal (t , "host" , cfg .CertificateName )
49+ require .Equal (t , certVerifier , cfg .CertVerifier )
4850}
4951
5052func TestTLS_MultipleSNI (t * testing.T ) {
@@ -59,25 +61,25 @@ func TestTLS_CertName(t *testing.T) {
5961 require .NoError (t , err )
6062 options , err := parseOptions (config .URL )
6163 require .NoError (t , err )
62- cfg := tls.ClientConfig {ServerName : "host" , CertificateName : "host" }
64+ cfg := tls.ClientConfig {ServerName : "host" , CertVerifier : & tls. StandardCertVerifier { CertificateName : "host" } }
6365 for _ , option := range options {
6466 option ("host" , & cfg )
6567 }
6668 require .Equal (t , "host" , cfg .ServerName )
67- require .Equal (t , "www.google.com" , cfg .CertificateName )
69+ require .Equal (t , "www.google.com" , cfg .CertVerifier .( * tls. StandardCertVerifier ). CertificateName )
6870}
6971
7072func TestTLS_Combined (t * testing.T ) {
7173 config , err := ParseConfig ("tls:SNI=sni.example.com&CertName=certname.example.com" )
7274 require .NoError (t , err )
7375 options , err := parseOptions (config .URL )
7476 require .NoError (t , err )
75- cfg := tls.ClientConfig {ServerName : "host" , CertificateName : "host" }
77+ cfg := tls.ClientConfig {ServerName : "host" , CertVerifier : & tls. StandardCertVerifier { CertificateName : "host" } }
7678 for _ , option := range options {
7779 option ("host" , & cfg )
7880 }
7981 require .Equal (t , "sni.example.com" , cfg .ServerName )
80- require .Equal (t , "certname.example.com" , cfg .CertificateName )
82+ require .Equal (t , "certname.example.com" , cfg .CertVerifier .( * tls. StandardCertVerifier ). CertificateName )
8183}
8284
8385func TestTLS_UnsupportedOption (t * testing.T ) {
0 commit comments