mirror of
https://github.com/gofiber/storage.git
synced 2025-10-04 16:22:52 +08:00
chore: use redis with TLS
This commit is contained in:
32
.github/workflows/test-redis.yml
vendored
32
.github/workflows/test-redis.yml
vendored
@@ -25,36 +25,6 @@ jobs:
|
|||||||
- name: Fetch Repository
|
- name: Fetch Repository
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
- name: Generate TLS certs
|
|
||||||
run: ./.github/scripts/gen-test-certs.sh
|
|
||||||
|
|
||||||
- name: Add Custom CA cert
|
|
||||||
run: sudo cp /home/runner/work/storage/storage/tls/ca.crt /usr/local/share/ca-certificates/custom.crt
|
|
||||||
|
|
||||||
- name: Trust Custom CA Cert
|
|
||||||
run: sudo update-ca-certificates
|
|
||||||
|
|
||||||
- name: Setup Redis
|
|
||||||
uses: shogo82148/actions-setup-redis@v1
|
|
||||||
with:
|
|
||||||
redis-version: ${{ matrix.redis }}
|
|
||||||
auto-start: 'false'
|
|
||||||
|
|
||||||
- name: Run Redis
|
|
||||||
run: |
|
|
||||||
redis-server --tls-port 6380 --port 6379 \
|
|
||||||
--tls-cert-file /home/runner/work/storage/storage/tls/redis.crt \
|
|
||||||
--tls-key-file /home/runner/work/storage/storage/tls/redis.key \
|
|
||||||
--tls-ca-cert-file /home/runner/work/storage/storage/tls/ca.crt &
|
|
||||||
|
|
||||||
- name: Run Redis instance with MTLS disabled
|
|
||||||
run: |
|
|
||||||
redis-server --tls-port 16380 --port 16379 \
|
|
||||||
--tls-cert-file /home/runner/work/storage/storage/tls/redis.crt \
|
|
||||||
--tls-key-file /home/runner/work/storage/storage/tls/redis.key \
|
|
||||||
--tls-ca-cert-file /home/runner/work/storage/storage/tls/ca.crt \
|
|
||||||
--tls-auth-clients no &
|
|
||||||
|
|
||||||
- name: Setup Redis Cluster
|
- name: Setup Redis Cluster
|
||||||
uses: vishnudxb/redis-cluster@1.0.9
|
uses: vishnudxb/redis-cluster@1.0.9
|
||||||
with:
|
with:
|
||||||
@@ -75,4 +45,6 @@ jobs:
|
|||||||
go-version: '${{ matrix.go-version }}'
|
go-version: '${{ matrix.go-version }}'
|
||||||
|
|
||||||
- name: Run Test
|
- name: Run Test
|
||||||
|
env:
|
||||||
|
TEST_REDIS_IMAGE: "docker.io/redis:7"
|
||||||
run: cd ./redis && go test ./... -v -race
|
run: cd ./redis && go test ./... -v -race
|
||||||
|
@@ -3,6 +3,7 @@ module github.com/gofiber/storage/redis/v3
|
|||||||
go 1.23.0
|
go 1.23.0
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
github.com/mdelapenya/tlscert v0.1.0
|
||||||
github.com/redis/go-redis/v9 v9.7.3
|
github.com/redis/go-redis/v9 v9.7.3
|
||||||
github.com/stretchr/testify v1.10.0
|
github.com/stretchr/testify v1.10.0
|
||||||
github.com/testcontainers/testcontainers-go v0.36.0
|
github.com/testcontainers/testcontainers-go v0.36.0
|
||||||
|
@@ -69,6 +69,8 @@ github.com/lufia/plan9stats v0.0.0-20211012122336-39d0f177ccd0 h1:6E+4a0GO5zZEnZ
|
|||||||
github.com/lufia/plan9stats v0.0.0-20211012122336-39d0f177ccd0/go.mod h1:zJYVVT2jmtg6P3p1VtQj7WsuWi/y4VnjVBn7F8KPB3I=
|
github.com/lufia/plan9stats v0.0.0-20211012122336-39d0f177ccd0/go.mod h1:zJYVVT2jmtg6P3p1VtQj7WsuWi/y4VnjVBn7F8KPB3I=
|
||||||
github.com/magiconair/properties v1.8.9 h1:nWcCbLq1N2v/cpNsy5WvQ37Fb+YElfq20WJ/a8RkpQM=
|
github.com/magiconair/properties v1.8.9 h1:nWcCbLq1N2v/cpNsy5WvQ37Fb+YElfq20WJ/a8RkpQM=
|
||||||
github.com/magiconair/properties v1.8.9/go.mod h1:Dhd985XPs7jluiymwWYZ0G4Z61jb3vdS329zhj2hYo0=
|
github.com/magiconair/properties v1.8.9/go.mod h1:Dhd985XPs7jluiymwWYZ0G4Z61jb3vdS329zhj2hYo0=
|
||||||
|
github.com/mdelapenya/tlscert v0.1.0 h1:YTpF579PYUX475eOL+6zyEO3ngLTOUWck78NBuJVXaM=
|
||||||
|
github.com/mdelapenya/tlscert v0.1.0/go.mod h1:wrbyM/DwbFCeCeqdPX/8c6hNOqQgbf0rUDErE1uD+64=
|
||||||
github.com/moby/docker-image-spec v1.3.1 h1:jMKff3w6PgbfSa69GfNg+zN/XLhfXJGnEx3Nl2EsFP0=
|
github.com/moby/docker-image-spec v1.3.1 h1:jMKff3w6PgbfSa69GfNg+zN/XLhfXJGnEx3Nl2EsFP0=
|
||||||
github.com/moby/docker-image-spec v1.3.1/go.mod h1:eKmb5VW8vQEh/BAr2yvVNvuiJuY6UIocYsFu/DxxRpo=
|
github.com/moby/docker-image-spec v1.3.1/go.mod h1:eKmb5VW8vQEh/BAr2yvVNvuiJuY6UIocYsFu/DxxRpo=
|
||||||
github.com/moby/patternmatcher v0.6.0 h1:GmP9lR19aU5GqSSFko+5pRqHi+Ohk1O69aFiKkVGiPk=
|
github.com/moby/patternmatcher v0.6.0 h1:GmP9lR19aU5GqSSFko+5pRqHi+Ohk1O69aFiKkVGiPk=
|
||||||
|
@@ -1,14 +1,16 @@
|
|||||||
package redis
|
package redis
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"context"
|
"context"
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"log"
|
"net"
|
||||||
"os"
|
"os"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/mdelapenya/tlscert"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
"github.com/testcontainers/testcontainers-go"
|
"github.com/testcontainers/testcontainers-go"
|
||||||
@@ -21,12 +23,18 @@ const (
|
|||||||
redisImage = "docker.io/redis:7"
|
redisImage = "docker.io/redis:7"
|
||||||
redisImageEnvVar = "TEST_REDIS_IMAGE"
|
redisImageEnvVar = "TEST_REDIS_IMAGE"
|
||||||
redisPort = "6379/tcp"
|
redisPort = "6379/tcp"
|
||||||
|
redisTLSPort = "6380/tcp"
|
||||||
)
|
)
|
||||||
|
|
||||||
type testStoreSettings struct {
|
type testStoreSettings struct {
|
||||||
withAddress bool
|
withAddress bool
|
||||||
withHostPort bool
|
withHostPort bool
|
||||||
withURL bool
|
withURL bool
|
||||||
|
|
||||||
|
// TLS settings
|
||||||
|
withSecureURL bool
|
||||||
|
withMTLSdisabled bool
|
||||||
|
withTLS bool
|
||||||
}
|
}
|
||||||
|
|
||||||
type testStoreOption func(*testStoreSettings)
|
type testStoreOption func(*testStoreSettings)
|
||||||
@@ -43,17 +51,72 @@ func withHostPort() testStoreOption {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func withTLS(secureURL bool, mtlsDisabled bool) testStoreOption {
|
||||||
|
return func(o *testStoreSettings) {
|
||||||
|
o.withTLS = true
|
||||||
|
o.withSecureURL = secureURL
|
||||||
|
o.withMTLSdisabled = mtlsDisabled
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// withURL sets the test store to use a URL.
|
// withURL sets the test store to use a URL.
|
||||||
// Use it when you want to explicitly combine multiple addresses in the same test
|
// Use it when you want to explicitly combine multiple addresses in the same test
|
||||||
// to verify which one is being used.
|
// to verify which one is being used.
|
||||||
// - true: the URL will receive the URI provided by the testcontainer
|
// - true: the URL will receive the URI provided by the testcontainer
|
||||||
// - false: the URL will be set to an empty string
|
// - false: the URL will be set to an empty string
|
||||||
func withURL(b bool) testStoreOption {
|
func withURL(useContainerURI bool) testStoreOption {
|
||||||
return func(o *testStoreSettings) {
|
return func(o *testStoreSettings) {
|
||||||
o.withURL = b
|
o.withURL = useContainerURI
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// createTLSCerts creates a CA certificate, a client certificate and a nats certificate,
|
||||||
|
// storing them in the given temporary directory.
|
||||||
|
func createTLSCerts(t testing.TB) (*tlscert.Certificate, *tlscert.Certificate, *tlscert.Certificate) {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
|
||||||
|
// ips is the extra list of IPs to include in the certificates.
|
||||||
|
// It's used to allow the client and Redis certificates to be used in the same host
|
||||||
|
// when the tests are run using a remote docker daemon.
|
||||||
|
ips := []net.IP{net.ParseIP("127.0.0.1")}
|
||||||
|
|
||||||
|
// Generate CA certificate
|
||||||
|
caCert := tlscert.SelfSignedFromRequest(tlscert.Request{
|
||||||
|
Host: "localhost",
|
||||||
|
IPAddresses: ips,
|
||||||
|
Name: "ca",
|
||||||
|
SubjectCommonName: "ca",
|
||||||
|
IsCA: true,
|
||||||
|
ParentDir: tmpDir,
|
||||||
|
})
|
||||||
|
require.NotNil(t, caCert)
|
||||||
|
|
||||||
|
// Generate client certificate
|
||||||
|
clientCert := tlscert.SelfSignedFromRequest(tlscert.Request{
|
||||||
|
Host: "localhost",
|
||||||
|
Name: "Redis Client",
|
||||||
|
SubjectCommonName: "localhost",
|
||||||
|
IPAddresses: ips,
|
||||||
|
Parent: caCert,
|
||||||
|
ParentDir: tmpDir,
|
||||||
|
})
|
||||||
|
require.NotNil(t, clientCert)
|
||||||
|
|
||||||
|
// Generate Redis certificate
|
||||||
|
redisCert := tlscert.SelfSignedFromRequest(tlscert.Request{
|
||||||
|
Host: "localhost",
|
||||||
|
IPAddresses: ips,
|
||||||
|
Name: "Redis Server",
|
||||||
|
Parent: caCert,
|
||||||
|
ParentDir: tmpDir,
|
||||||
|
})
|
||||||
|
require.NotNil(t, redisCert)
|
||||||
|
|
||||||
|
return caCert, clientCert, redisCert
|
||||||
|
}
|
||||||
|
|
||||||
func newTestStore(t testing.TB, opts ...testStoreOption) *Storage {
|
func newTestStore(t testing.TB, opts ...testStoreOption) *Storage {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
|
|
||||||
@@ -71,22 +134,80 @@ func newTestStore(t testing.TB, opts ...testStoreOption) *Storage {
|
|||||||
img = imgFromEnv
|
img = imgFromEnv
|
||||||
}
|
}
|
||||||
|
|
||||||
|
cfg := Config{
|
||||||
|
Reset: true,
|
||||||
|
}
|
||||||
|
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
c, err := redis.Run(
|
tcOpts := []testcontainers.ContainerCustomizer{}
|
||||||
ctx, img,
|
|
||||||
testcontainers.WithWaitStrategy(wait.ForListeningPort(redisPort).WithStartupTimeout(time.Second*10)),
|
waitStrategies := []wait.Strategy{
|
||||||
)
|
wait.ForListeningPort(redisPort).WithStartupTimeout(time.Second * 10),
|
||||||
|
}
|
||||||
|
|
||||||
|
if settings.withTLS {
|
||||||
|
// wait for the TLS port to be available
|
||||||
|
waitStrategies = append(waitStrategies, wait.ForListeningPort(redisTLSPort).WithStartupTimeout(time.Second*10))
|
||||||
|
|
||||||
|
cmds := []string{
|
||||||
|
"--port", "6379",
|
||||||
|
"--tls-port", "6380",
|
||||||
|
"--tls-cert-file", "/tls/server.crt",
|
||||||
|
"--tls-key-file", "/tls/server.key",
|
||||||
|
"--tls-ca-cert-file", "/tls/ca.crt",
|
||||||
|
"--tls-auth-clients", "yes",
|
||||||
|
}
|
||||||
|
|
||||||
|
if settings.withMTLSdisabled {
|
||||||
|
cmds = append(cmds, "--tls-auth-clients", "no")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Generate TLS certificates in the fly and add them to the container before it starts.
|
||||||
|
// Update the CMD to use the TLS certificates.
|
||||||
|
caCert, clientCert, serverCert := createTLSCerts(t)
|
||||||
|
|
||||||
|
tcOpts = append(tcOpts, testcontainers.CustomizeRequest(testcontainers.GenericContainerRequest{
|
||||||
|
ContainerRequest: testcontainers.ContainerRequest{
|
||||||
|
ExposedPorts: []string{"6380/tcp"},
|
||||||
|
Files: []testcontainers.ContainerFile{
|
||||||
|
{
|
||||||
|
Reader: bytes.NewReader(caCert.Bytes),
|
||||||
|
ContainerFilePath: "/tls/ca.crt",
|
||||||
|
FileMode: 0o644,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Reader: bytes.NewReader(serverCert.Bytes),
|
||||||
|
ContainerFilePath: "/tls/server.crt",
|
||||||
|
FileMode: 0o644,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Reader: bytes.NewReader(serverCert.KeyBytes),
|
||||||
|
ContainerFilePath: "/tls/server.key",
|
||||||
|
FileMode: 0o644,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Cmd: cmds,
|
||||||
|
},
|
||||||
|
}))
|
||||||
|
|
||||||
|
cfg.TLSConfig = &tls.Config{
|
||||||
|
MinVersion: tls.VersionTLS12,
|
||||||
|
RootCAs: caCert.TLSConfig().RootCAs,
|
||||||
|
Certificates: clientCert.TLSConfig().Certificates,
|
||||||
|
ServerName: "localhost", // Match the server cert's common name
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tcOpts = append(tcOpts, testcontainers.WithWaitStrategy(waitStrategies...))
|
||||||
|
|
||||||
|
c, err := redis.Run(ctx, img, tcOpts...)
|
||||||
testcontainers.CleanupContainer(t, c)
|
testcontainers.CleanupContainer(t, c)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
uri, err := c.ConnectionString(ctx)
|
uri, err := c.ConnectionString(ctx)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
cfg := Config{
|
|
||||||
Reset: true,
|
|
||||||
}
|
|
||||||
|
|
||||||
if settings.withHostPort {
|
if settings.withHostPort {
|
||||||
host, err := c.Host(ctx)
|
host, err := c.Host(ctx)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
@@ -107,6 +228,21 @@ func newTestStore(t testing.TB, opts ...testStoreOption) *Storage {
|
|||||||
cfg.URL = uri
|
cfg.URL = uri
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if settings.withTLS {
|
||||||
|
host, err := c.Host(ctx)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
port, err := c.MappedPort(ctx, redisTLSPort)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
scheme := "redis"
|
||||||
|
if settings.withSecureURL {
|
||||||
|
scheme = "rediss"
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.URL = scheme + "://" + host + ":" + port.Port()
|
||||||
|
}
|
||||||
|
|
||||||
return New(cfg)
|
return New(cfg)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -285,120 +421,46 @@ func Test_Redis_Initalize_WithHostPort(t *testing.T) {
|
|||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func Test_Redis_Initalize_WithURL_TLS(t *testing.T) {
|
|
||||||
cer, err := tls.LoadX509KeyPair("/home/runner/work/storage/storage/tls/client.crt", "/home/runner/work/storage/storage/tls/client.key")
|
|
||||||
if err != nil {
|
|
||||||
log.Println(err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
tlsCfg := &tls.Config{
|
|
||||||
MinVersion: tls.VersionTLS12,
|
|
||||||
CurvePreferences: []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256},
|
|
||||||
InsecureSkipVerify: true,
|
|
||||||
Certificates: []tls.Certificate{cer},
|
|
||||||
CipherSuites: []uint16{
|
|
||||||
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
||||||
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
|
||||||
tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
|
|
||||||
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
testStoreUrl := New(Config{
|
|
||||||
URL: "redis://localhost:6380",
|
|
||||||
TLSConfig: tlsCfg,
|
|
||||||
})
|
|
||||||
defer testStoreUrl.Close()
|
|
||||||
|
|
||||||
var (
|
|
||||||
key = "clark"
|
|
||||||
val = []byte("kent")
|
|
||||||
)
|
|
||||||
|
|
||||||
err = testStoreUrl.Set(key, val, 0)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
result, err := testStoreUrl.Get(key)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Equal(t, val, result)
|
|
||||||
|
|
||||||
err = testStoreUrl.Delete(key)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
keys, err := testStoreUrl.Keys()
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Nil(t, keys)
|
|
||||||
}
|
|
||||||
|
|
||||||
func Test_Redis_Initalize_WithURL_TLS_Verify(t *testing.T) {
|
func Test_Redis_Initalize_WithURL_TLS_Verify(t *testing.T) {
|
||||||
cer, err := tls.LoadX509KeyPair("/home/runner/work/storage/storage/tls/client.crt", "/home/runner/work/storage/storage/tls/client.key")
|
testFn := func(secureURL bool, mtlsDisabled bool) {
|
||||||
if err != nil {
|
testStore := newTestStore(t, withTLS(secureURL, mtlsDisabled))
|
||||||
log.Println(err)
|
defer testStore.Close()
|
||||||
return
|
|
||||||
}
|
var (
|
||||||
tlsCfg := &tls.Config{
|
key = "clark"
|
||||||
MinVersion: tls.VersionTLS12,
|
val = []byte("kent")
|
||||||
CurvePreferences: []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256},
|
)
|
||||||
InsecureSkipVerify: false,
|
|
||||||
Certificates: []tls.Certificate{cer},
|
err := testStore.Set(key, val, 0)
|
||||||
CipherSuites: []uint16{
|
require.NoError(t, err)
|
||||||
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
||||||
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
result, err := testStore.Get(key)
|
||||||
tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
|
require.NoError(t, err)
|
||||||
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
|
require.Equal(t, val, result)
|
||||||
},
|
|
||||||
|
err = testStore.Delete(key)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
keys, err := testStore.Keys()
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Nil(t, keys)
|
||||||
}
|
}
|
||||||
|
|
||||||
testStoreUrl := New(Config{
|
t.Run("insecure-url/mtls-disabled", func(t *testing.T) {
|
||||||
URL: "redis://localhost:6380",
|
testFn(false, true)
|
||||||
TLSConfig: tlsCfg,
|
|
||||||
})
|
})
|
||||||
defer testStoreUrl.Close()
|
|
||||||
|
|
||||||
var (
|
t.Run("insecure-url/mtls-enabled", func(t *testing.T) {
|
||||||
key = "clark"
|
testFn(false, false)
|
||||||
val = []byte("kent")
|
|
||||||
)
|
|
||||||
|
|
||||||
err = testStoreUrl.Set(key, val, 0)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
result, err := testStoreUrl.Get(key)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Equal(t, val, result)
|
|
||||||
|
|
||||||
err = testStoreUrl.Delete(key)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
keys, err := testStoreUrl.Keys()
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Nil(t, keys)
|
|
||||||
}
|
|
||||||
|
|
||||||
func Test_Redis_Initalize_With_Secure_URL(t *testing.T) {
|
|
||||||
testStoreUrl := New(Config{
|
|
||||||
URL: "rediss://localhost:16380",
|
|
||||||
})
|
})
|
||||||
defer testStoreUrl.Close()
|
|
||||||
|
|
||||||
var (
|
t.Run("secure-url/mtls-disabled", func(t *testing.T) {
|
||||||
key = "clark"
|
testFn(true, true)
|
||||||
val = []byte("kent")
|
})
|
||||||
)
|
|
||||||
|
|
||||||
err := testStoreUrl.Set(key, val, 0)
|
t.Run("secure-url/mtls-enabled", func(t *testing.T) {
|
||||||
require.NoError(t, err)
|
testFn(true, false)
|
||||||
|
})
|
||||||
result, err := testStoreUrl.Get(key)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Equal(t, val, result)
|
|
||||||
|
|
||||||
err = testStoreUrl.Delete(key)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
keys, err := testStoreUrl.Keys()
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Nil(t, keys)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func Test_Redis_Universal_Addrs(t *testing.T) {
|
func Test_Redis_Universal_Addrs(t *testing.T) {
|
||||||
|
Reference in New Issue
Block a user