[33af2b7] | 1 | SUBDIRS = tests |
---|
| 2 | |
---|
| 3 | dist_check_SCRIPTS = test-00_basic.bash \ |
---|
[c51e33a] | 4 | test-01_serverwide_priorities.bash \ |
---|
| 5 | test-02_cache_in_vhost.bash \ |
---|
| 6 | test-03_cachetimeout_in_vhost.bash \ |
---|
| 7 | test-04_basic_nosni.bash \ |
---|
| 8 | test-05_mismatched-priorities.bash \ |
---|
| 9 | test-06_verify_sni_a.bash \ |
---|
| 10 | test-07_verify_sni_b.bash \ |
---|
| 11 | test-08_verify_no_sni_fallback_to_first_vhost.bash \ |
---|
| 12 | test-09_verify_no_sni_fails_with_wrong_order.bash \ |
---|
| 13 | test-10_basic_client_verification.bash \ |
---|
| 14 | test-11_basic_client_verification_fail.bash \ |
---|
| 15 | test-12_cgi_variables.bash \ |
---|
| 16 | test-13_cgi_variables_no_client_cert.bash \ |
---|
[6c5c2ec] | 17 | test-14_resume_session.bash |
---|
[65c18ce] | 18 | if USE_MSVA |
---|
[33af2b7] | 19 | dist_check_SCRIPTS += test-15_basic_msva.bash |
---|
[65c18ce] | 20 | endif |
---|
[33af2b7] | 21 | dist_check_SCRIPTS += test-16_view-status.bash \ |
---|
[eea8a16] | 22 | test-17_cgi_vars_large_cert.bash \ |
---|
[6e6a4e4] | 23 | test-18_client_verification_wrong_cert.bash \ |
---|
[ed82a6a] | 24 | test-19_TLS_reverse_proxy.bash \ |
---|
| 25 | test-20_TLS_reverse_proxy_client_auth.bash \ |
---|
[907ae8f] | 26 | test-21_TLS_reverse_proxy_wrong_cert.bash \ |
---|
[f030883] | 27 | test-22_TLS_reverse_proxy_crl_revoke.bash \ |
---|
[3f00958] | 28 | test-23_TLS_reverse_proxy_mismatched_priorities.bash \ |
---|
[29d3311] | 29 | test-24_pkcs11_cert.bash \ |
---|
[8ac7c0d] | 30 | test-25_Disable_TLS_1.0.bash \ |
---|
[c4d6e77] | 31 | test-26_redirect_HTTP_to_HTTPS.bash \ |
---|
[d50dac5] | 32 | test-27_OCSP_server.bash \ |
---|
[359f009] | 33 | test-28_HTTP2_support.bash \ |
---|
[0062ede] | 34 | test-29_force_handshake_vhost.bash \ |
---|
[5cf8e99] | 35 | test-30_ip_based_vhosts.bash \ |
---|
| 36 | test-31_vhost_SNI_serveralias_match.bash \ |
---|
[dcc053e] | 37 | test-32_vhost_SNI_serveralias_mismatch.bash \ |
---|
[f674424] | 38 | test-33_vhost_SNI_serveralias_missinghost.bash \ |
---|
| 39 | test-34_TLS_reverse_proxy_h2.bash |
---|
[5951102] | 40 | |
---|
[339a49d] | 41 | TEST_EXTENSIONS = .bash |
---|
[33af2b7] | 42 | TESTS = $(dist_check_SCRIPTS) |
---|
[8f90bf4] | 43 | |
---|
[7921dc7] | 44 | check_PROGRAMS = pgpcrc |
---|
[42829ae] | 45 | pgpcrc_SOURCES = pgpcrc.c |
---|
| 46 | |
---|
[42bee37] | 47 | # build OCSP database tool |
---|
| 48 | if ENABLE_OCSP_TEST |
---|
[b674e95] | 49 | check_PROGRAMS += gen_ocsp_index |
---|
[42bee37] | 50 | gen_ocsp_index_SOURCES = gen_ocsp_index.c cert_helper.c |
---|
[439005a] | 51 | gen_ocsp_index_CFLAGS = $(LIBGNUTLS_CFLAGS) |
---|
[6c44ed2] | 52 | gen_ocsp_index_LDFLAGS = $(LIBGNUTLS_LIBS) |
---|
[42bee37] | 53 | noinst_HEADERS = cert_helper.h |
---|
| 54 | endif |
---|
| 55 | |
---|
[6d3dc34] | 56 | # Python tools for tests |
---|
| 57 | noinst_PYTHON = https-test-client.py mgstest/http.py mgstest/__init__.py \ |
---|
| 58 | mgstest/tests.py |
---|
| 59 | |
---|
[9a4d250] | 60 | # Identities in the miniature CA, server, and client environment for |
---|
| 61 | # the test suite |
---|
[e5546be] | 62 | shared_identities = authority authority/client |
---|
[c0bb823] | 63 | pgp_identities = $(shared_identities) |
---|
[c3aebe5] | 64 | x509_only_identities = authority/server authority/imposter \ |
---|
| 65 | authority/subca authority/subca/server \ |
---|
| 66 | rogueca rogueca/rogueclient |
---|
[a03f94e] | 67 | if ENABLE_OCSP_TEST |
---|
[7cfc02b] | 68 | x509_only_identities += authority/ocsp-responder authority/subca/ocsp-responder |
---|
[a03f94e] | 69 | endif |
---|
[c0bb823] | 70 | x509_identities = $(shared_identities) $(x509_only_identities) |
---|
| 71 | identities = $(shared_identities) $(x509_only_identities) |
---|
[9a4d250] | 72 | # Append strings after ":=" to each identity to generate a list of |
---|
| 73 | # necessary files |
---|
[d70dd6e] | 74 | pgp_tokens = $(pgp_identities:=/cert.pgp) \ |
---|
[c0bb823] | 75 | $(pgp_identities:=/secret.pgp) |
---|
| 76 | x509_keys = $(x509_identities:=/secret.key) |
---|
| 77 | x509_certs = $(x509_identities:=/x509.pem) |
---|
[9a4d250] | 78 | x509_tokens = $(x509_certs) $(x509_keys) |
---|
[39a27cf] | 79 | tokens = $(x509_tokens) |
---|
| 80 | if USE_MSVA |
---|
| 81 | tokens += $(pgp_tokens) |
---|
| 82 | endif |
---|
[9a4d250] | 83 | |
---|
[5b6a5d9] | 84 | if !DISABLE_FLOCK |
---|
| 85 | # flock command for write access to the authority keyring |
---|
[5725dca] | 86 | GPG_FLOCK = @FLOCK@ authority/lock |
---|
[5b6a5d9] | 87 | endif |
---|
| 88 | |
---|
[fc8e463b] | 89 | include $(srcdir)/test_ca.mk |
---|
[9a4d250] | 90 | |
---|
[39bd695] | 91 | # Test cases trying to create keys and certificates in parallel causes |
---|
| 92 | # race conditions. Ensure that all keys and certificates are generated |
---|
| 93 | # before tests get to run. |
---|
| 94 | # |
---|
| 95 | # NOTE: Once the support files have been generated, test cases can be |
---|
| 96 | # run with multiple jobs, but real parallelization would require |
---|
| 97 | # dynamic port assignments. At the moment, lock files ensure that only |
---|
| 98 | # one Apache instance (possibly plus a proxy back end instance) is |
---|
| 99 | # running at any time, so test cases actually have to wait for each |
---|
| 100 | # other - just not in any particular order. |
---|
[c825c3a] | 101 | check_DATA = $(tokens) authority/server/crl.pem |
---|
[39bd695] | 102 | |
---|
[c825c3a] | 103 | MOSTLYCLEANFILES = cache/* logs/* outputs/* authority/server/crl.pem |
---|
[6ce02e2] | 104 | |
---|
[e5546be] | 105 | cert_templates = authority/template.in authority/client/template.in \ |
---|
[e8498bf] | 106 | authority/imposter/template.in authority/ocsp-responder/template \ |
---|
[6dab61d] | 107 | authority/server/template.in \ |
---|
[c3aebe5] | 108 | authority/subca/template.in authority/subca/server/template.in \ |
---|
[7cfc02b] | 109 | authority/subca/ocsp-responder/template \ |
---|
[6dab61d] | 110 | rogueca/template rogueca/rogueclient/template.in |
---|
[e5546be] | 111 | generated_templates = authority/template authority/client/template \ |
---|
[6dab61d] | 112 | authority/imposter/template rogueca/rogueclient/template \ |
---|
[59afe51] | 113 | authority/server/template |
---|
[90a31a4] | 114 | |
---|
[9a4d250] | 115 | # Delete X.509 private keys on full clean. Note that unless you need |
---|
| 116 | # to generate fresh keys, the "mostlyclean" target should be |
---|
| 117 | # sufficient (see below). |
---|
| 118 | CLEANFILES = $(x509_keys) |
---|
| 119 | |
---|
[90a31a4] | 120 | # Delete X.509 certificates and generated templates on "mostlyclean" |
---|
| 121 | # target. Certificates can be rebuilt without generating new key |
---|
| 122 | # pairs, and regenerating them makes it possible to change identities |
---|
[7aeabcb] | 123 | # (e.g. host names) without wasting time on new keys (which would |
---|
[90a31a4] | 124 | # happen after "clean"). |
---|
[e5546be] | 125 | MOSTLYCLEANFILES += $(x509_certs) $(generated_templates) $(identities:=/uid) |
---|
[9a4d250] | 126 | |
---|
[90a31a4] | 127 | |
---|
[6ce02e2] | 128 | # Delete PGP keyrings on "mostlyclean" target. They are created from |
---|
| 129 | # the X.509 private keys and certificates with an expiration time of |
---|
| 130 | # one day, so regenerating them is both fast and frequently |
---|
| 131 | # necessary. |
---|
[e5546be] | 132 | pgp_patterns = /*.pgp /*.pgp.raw /*.gpg /*.gpg~ /gpg.conf \ |
---|
| 133 | /*.kbx /*.kbx~ /S.gpg-agent /private-keys-v1.d/* |
---|
| 134 | MOSTLYCLEANFILES += $(foreach pat,$(pgp_patterns),$(pgp_identities:=$(pat))) \ |
---|
| 135 | authority/lock authority/tofu.db |
---|
[9a4d250] | 136 | # GnuPG random pool, no need to regenerate on every build |
---|
| 137 | CLEANFILES += authority/random_seed |
---|
[1708045] | 138 | |
---|
[ee94de5] | 139 | # GnuPG 2 starts gpg-agent processes per GNUPGHOME (one for every PGP |
---|
| 140 | # identity) while creating the PGP certificates. This target is called |
---|
| 141 | # by both "check-local" and "mostlyclean-local": The former because |
---|
| 142 | # agent processes are started while preparing for "check" and are no |
---|
| 143 | # longer needed afterwards, the latter to make sure they are gone |
---|
| 144 | # along with their certificates. |
---|
| 145 | stop-gnupg-agent: |
---|
| 146 | for id in $(pgp_identities) $(msva_home); do \ |
---|
| 147 | GNUPGHOME=$$id/ gpgconf --kill gpg-agent || true; \ |
---|
| 148 | done |
---|
| 149 | |
---|
| 150 | check-local: stop-gnupg-agent |
---|
| 151 | |
---|
[9a4d250] | 152 | # Delete lock files for test servers on "mostlyclean" target. |
---|
| 153 | MOSTLYCLEANFILES += *.lock |
---|
| 154 | |
---|
| 155 | # rule to build MSVA trust database |
---|
| 156 | if USE_MSVA |
---|
| 157 | msva_home = msva.gnupghome |
---|
[e5546be] | 158 | check_DATA += $(msva_home)/trustdb.gpg authority/client/uid |
---|
| 159 | MOSTLYCLEANFILES += $(foreach pat,$(pgp_patterns),$(msva_home)$(pat)) |
---|
| 160 | $(msva_home)/trustdb.gpg: authority/minimal.pgp authority/client/cert.pgp |
---|
[9a4d250] | 161 | mkdir -p -m 0700 $(dir $@) |
---|
| 162 | GNUPGHOME=$(dir $@) gpg --import < $< |
---|
[ee94de5] | 163 | printf "%s:6:\n" "$$(GNUPGHOME=authority/ gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" | GNUPGHOME=$(dir $@) gpg --import-ownertrust |
---|
[e5546be] | 164 | GNUPGHOME=$(dir $@) gpg --import < authority/client/cert.pgp |
---|
[9a4d250] | 165 | printf "keyserver does-not-exist.example\n" > $(msva_home)/gpg.conf |
---|
| 166 | endif |
---|
[3f00958] | 167 | |
---|
[ea99ffe] | 168 | if ENABLE_OCSP_TEST |
---|
[20f8e99] | 169 | # rules to build OCSP database |
---|
[7cfc02b] | 170 | ocsp_index_data = authority/ocsp_index.txt authority/ocsp_index.txt.attr \ |
---|
| 171 | authority/subca/ocsp_index.txt authority/subca/ocsp_index.txt.attr |
---|
| 172 | check_DATA += $(ocsp_index_data) |
---|
| 173 | MOSTLYCLEANFILES += $(ocsp_index_data) |
---|
| 174 | |
---|
| 175 | # The "find" command builds a list of all certificates directly below |
---|
| 176 | # the CA that aren't for the ocsp-responder. |
---|
| 177 | %/ocsp_index.txt: $(x509_tokens) gen_ocsp_index |
---|
| 178 | ./gen_ocsp_index $$(find $(*) -mindepth 2 -maxdepth 2 ! -path '*/ocsp-responder/*' -name x509.pem) > $@ |
---|
| 179 | |
---|
| 180 | %/ocsp_index.txt.attr: |
---|
| 181 | @mkdir -m 0700 -p $(dir $@) |
---|
[ea99ffe] | 182 | echo "unique_subject = no" > $@ |
---|
[20f8e99] | 183 | |
---|
[f828974] | 184 | # Build certificate chain files. Note that intermediate tokens must be |
---|
| 185 | # listed explicitly, or the dependency chain will be broken because |
---|
| 186 | # the higher level pattern matches, too. |
---|
| 187 | chain_tokens = authority/server/x509-chain.pem \ |
---|
| 188 | authority/subca/x509-chain.pem \ |
---|
| 189 | authority/subca/server/x509-chain.pem |
---|
| 190 | check_DATA += $(chain_tokens) |
---|
[7cfc02b] | 191 | MOSTLYCLEANFILES += $(chain_tokens) authority/x509-chain.pem |
---|
[ea99ffe] | 192 | endif |
---|
[9a4d250] | 193 | |
---|
[b0e5dae] | 194 | # SoftHSM tokens. Note that the SoftHSM 2 token is a directory and |
---|
| 195 | # hence has to be treated slightly differently. |
---|
[c825c3a] | 196 | SOFTHSM_TOKEN = authority/server/softhsm.db |
---|
| 197 | SOFTHSM2_TOKEN = authority/server/softhsm2.db |
---|
[b0e5dae] | 198 | |
---|
| 199 | # Tokens should be cleaned whether or not the matching SoftHSM version |
---|
| 200 | # was detected on the last ./configure run. |
---|
| 201 | MOSTLYCLEANFILES += $(SOFTHSM_TOKEN) |
---|
| 202 | # included in mostlyclean-local below |
---|
| 203 | clean-softhsm2-db: |
---|
| 204 | -rm -rf $(SOFTHSM2_TOKEN) |
---|
| 205 | |
---|
| 206 | if HAVE_SOFTHSM1 |
---|
| 207 | check_DATA += $(SOFTHSM_TOKEN) |
---|
| 208 | endif HAVE_SOFTHSM1 |
---|
| 209 | |
---|
| 210 | if HAVE_SOFTHSM2 |
---|
| 211 | check_DATA += $(SOFTHSM2_TOKEN) |
---|
| 212 | endif HAVE_SOFTHSM2 |
---|
[9a4d250] | 213 | |
---|
| 214 | check_DATA += make-test-dirs |
---|
| 215 | extra_dirs = logs cache outputs |
---|
| 216 | make-test-dirs: |
---|
| 217 | mkdir -p $(extra_dirs) |
---|
[b0e5dae] | 218 | |
---|
[ee94de5] | 219 | .PHONY: make-test-dirs clean-softhsm2-db stop-gnupg-agent |
---|
| 220 | |
---|
[b0e5dae] | 221 | |
---|
[ee94de5] | 222 | mostlyclean-local: clean-softhsm2-db stop-gnupg-agent |
---|
[42829ae] | 223 | -rmdir $(pgp_identities:=/private-keys-v1.d) || true |
---|
| 224 | if USE_MSVA |
---|
| 225 | -rmdir $(msva_home)/private-keys-v1.d || true |
---|
| 226 | endif |
---|
[3f00958] | 227 | |
---|
[acea635] | 228 | # Delete test data directories, and wait for test services to |
---|
| 229 | # exit. The reason for the wait is that Apache instances may take some |
---|
| 230 | # time to exit and delete their PID files. Occasionally some PID files |
---|
| 231 | # where still around during "distcheck" runs by the time the target |
---|
| 232 | # checked if the build directory was really empty after "distclean", |
---|
| 233 | # breaking the build. Delaying "clean-local" until PID files are gone |
---|
| 234 | # avoids this issue, and the timeout will expose actually unclean |
---|
| 235 | # stops. |
---|
[9a4d250] | 236 | clean-local: |
---|
| 237 | -rmdir $(extra_dirs) || true |
---|
| 238 | if USE_MSVA |
---|
| 239 | -rmdir $(msva_home) || true |
---|
| 240 | endif |
---|
[acea635] | 241 | wait=0; \ |
---|
| 242 | while ls *.pid && test "$$wait" -lt "@TEST_LOCK_WAIT@"; do \ |
---|
| 243 | wait=$$(($$wait + 1)); \ |
---|
| 244 | echo "waiting for test services to exit ($$wait seconds)"; \ |
---|
| 245 | sleep 1; \ |
---|
| 246 | done |
---|
[33af2b7] | 247 | |
---|
[9a4d250] | 248 | # Apache configuration and data files |
---|
[b674e95] | 249 | apache_data = base_apache.conf cgi_module.conf data/dump.cgi data/ocsp.cgi \ |
---|
[b8b1990] | 250 | data/secret.txt data/test.txt ffdhe3072.pem mime.types \ |
---|
[94430e6] | 251 | proxy_mods.conf |
---|
[33af2b7] | 252 | |
---|
[c91382d] | 253 | EXTRA_DIST = $(apache_data) $(cert_templates) $(shared_identities:=/uid.in) \ |
---|
[c825c3a] | 254 | apache_service.bash common.bash runtests authority/server/crl.template \ |
---|
[6d3dc34] | 255 | softhsm.bash |
---|
[52c3f68] | 256 | |
---|
[34e5dc7] | 257 | # Lockfile for the main Apache process |
---|
| 258 | test_lockfile = ./test.lock |
---|
[412ee84] | 259 | # Lockfile for the proxy backend Apache process (if any) |
---|
| 260 | backend_lockfile = ./backend.lock |
---|
[94430e6] | 261 | # Lockfile for the OCSP server Apache process (if any) |
---|
| 262 | ocsp_lockfile = ./ocsp.lock |
---|
[50eab8e] | 263 | |
---|
[34e5dc7] | 264 | # port for the main Apache server |
---|
| 265 | TEST_PORT ?= 9932 |
---|
| 266 | # port for MSVA in test cases that use it |
---|
| 267 | MSVA_PORT ?= 9933 |
---|
[97d7c63] | 268 | # port for TLS proxy backend server |
---|
| 269 | BACKEND_PORT ?= 9934 |
---|
| 270 | # port for the OCSP responder |
---|
[21181b2] | 271 | if ENABLE_OCSP_TEST |
---|
| 272 | OCSP_PORT ?= 9936 |
---|
[b47dc70] | 273 | OCSP_URI_TEMPLATE = ocsp_uri = http://$(TEST_HOST):$(OCSP_PORT)/ocsp/ |
---|
[21181b2] | 274 | endif |
---|
[a61edfd] | 275 | # maximum time to wait for MSVA startup (milliseconds) |
---|
[4fb510d] | 276 | TEST_SERVICE_MAX_WAIT ?= 10000 |
---|
[a61edfd] | 277 | # wait loop time for MSVA startup (milliseconds) |
---|
[4fb510d] | 278 | TEST_SERVICE_WAIT ?= 400 |
---|
[34e5dc7] | 279 | |
---|
[5725dca] | 280 | AM_TESTS_ENVIRONMENT = export APACHE2=@APACHE2@; \ |
---|
| 281 | export AP_LIBEXECDIR=@AP_LIBEXECDIR@; \ |
---|
[8335f8c] | 282 | export PYTHON="@PYTHON@"; \ |
---|
[6c030c1] | 283 | export TEST_LOCK_WAIT="@TEST_LOCK_WAIT@"; \ |
---|
[849b87e] | 284 | export TEST_IP="@TEST_IP@"; \ |
---|
[5725dca] | 285 | export TEST_HOST="@TEST_HOST@"; \ |
---|
[34e5dc7] | 286 | export TEST_PORT="$(TEST_PORT)"; \ |
---|
| 287 | export MSVA_PORT="$(MSVA_PORT)"; \ |
---|
[4fb510d] | 288 | export TEST_SERVICE_MAX_WAIT="$(TEST_SERVICE_MAX_WAIT)"; \ |
---|
| 289 | export TEST_SERVICE_WAIT="$(TEST_SERVICE_WAIT)"; \ |
---|
[6c030c1] | 290 | export TEST_QUERY_TIMEOUT="@TEST_QUERY_TIMEOUT@"; \ |
---|
[5725dca] | 291 | export BACKEND_HOST="@TEST_HOST@"; \ |
---|
[97d7c63] | 292 | export BACKEND_PORT="$(BACKEND_PORT)"; \ |
---|
[67f2f58] | 293 | export HTTP_CLI="@HTTP_CLI@"; |
---|
[f9f184f] | 294 | |
---|
[5eb4544] | 295 | if HAVE_SOFTHSM |
---|
[74772b2] | 296 | AM_TESTS_ENVIRONMENT += export SOFTHSM="@SOFTHSM@"; \ |
---|
[aeaf28b] | 297 | export SOFTHSM_MAJOR_VERSION="@SOFTHSM_MAJOR_VERSION@"; \ |
---|
[a592762] | 298 | export SOFTHSM_LIB="@SOFTHSM_LIB@"; |
---|
[5eb4544] | 299 | endif |
---|
| 300 | |
---|
[21181b2] | 301 | if ENABLE_OCSP_TEST |
---|
| 302 | AM_TESTS_ENVIRONMENT += export OPENSSL="@OPENSSL@"; \ |
---|
| 303 | export OCSP_PORT="$(OCSP_PORT)"; |
---|
| 304 | endif |
---|
| 305 | |
---|
[cf4e708] | 306 | if ENABLE_NETNS |
---|
[5725dca] | 307 | AM_TESTS_ENVIRONMENT += export UNSHARE="@UNSHARE@"; \ |
---|
[cf4e708] | 308 | export USE_TEST_NAMESPACE=1; |
---|
| 309 | endif |
---|
[94430e6] | 310 | # Without flock tests must not run in parallel, and PID files are used |
---|
| 311 | # to prevent conflicts between server instances. Otherwise set lock |
---|
| 312 | # files for flock. |
---|
[412ee84] | 313 | if DISABLE_FLOCK |
---|
[94430e6] | 314 | AM_TESTS_ENVIRONMENT += export TEST_LOCK="apache2.pid"; \ |
---|
| 315 | export BACKEND_LOCK="backend.pid"; \ |
---|
| 316 | export OCSP_LOCK="ocsp.pid"; |
---|
[412ee84] | 317 | .NOTPARALLEL: |
---|
| 318 | else |
---|
[5725dca] | 319 | AM_TESTS_ENVIRONMENT += export FLOCK="@FLOCK@"; \ |
---|
[412ee84] | 320 | export TEST_LOCK="$(test_lockfile)"; \ |
---|
[94430e6] | 321 | export BACKEND_LOCK="$(backend_lockfile)"; \ |
---|
| 322 | export OCSP_LOCK="$(ocsp_lockfile)"; |
---|
[412ee84] | 323 | endif |
---|
| 324 | |
---|
[f9f184f] | 325 | # Echo AM_TESTS_ENVIRONMENT. This can be useful for debugging, e.g. if |
---|
| 326 | # you want to manually run an Apache instance with Valgrind using the |
---|
| 327 | # same configuration as a test case. |
---|
| 328 | show-test-env: export TEST_ENV=$(AM_TESTS_ENVIRONMENT) |
---|
| 329 | show-test-env: |
---|
| 330 | @echo "$${TEST_ENV}" |
---|