source: mod_gnutls/test/Makefile.am @ 2b80754

debian/masterdebian/stretch-backportsjessie-backportsupstream
Last change on this file since 2b80754 was 42829ae, checked in by Thomas Klute <thomas2.klute@…>, 4 years ago

Build pgpcrc through Automake, clean new GnuPG privkey files & directories

  • Property mode set to 100644
File size: 7.6 KB
RevLine 
[33af2b7]1SUBDIRS = tests
2
3dist_check_SCRIPTS = test-00_basic.bash \
[c51e33a]4        test-01_serverwide_priorities.bash \
5        test-02_cache_in_vhost.bash \
6        test-03_cachetimeout_in_vhost.bash \
7        test-04_basic_nosni.bash \
8        test-05_mismatched-priorities.bash \
9        test-06_verify_sni_a.bash \
10        test-07_verify_sni_b.bash \
11        test-08_verify_no_sni_fallback_to_first_vhost.bash \
12        test-09_verify_no_sni_fails_with_wrong_order.bash \
13        test-10_basic_client_verification.bash \
14        test-11_basic_client_verification_fail.bash \
15        test-12_cgi_variables.bash \
16        test-13_cgi_variables_no_client_cert.bash \
[65c18ce]17        test-14_basic_openpgp.bash
18if USE_MSVA
[33af2b7]19dist_check_SCRIPTS += test-15_basic_msva.bash
[65c18ce]20endif
[33af2b7]21dist_check_SCRIPTS += test-16_view-status.bash \
[eea8a16]22        test-17_cgi_vars_large_cert.bash \
[6e6a4e4]23        test-18_client_verification_wrong_cert.bash \
[ed82a6a]24        test-19_TLS_reverse_proxy.bash \
25        test-20_TLS_reverse_proxy_client_auth.bash \
[907ae8f]26        test-21_TLS_reverse_proxy_wrong_cert.bash \
[f030883]27        test-22_TLS_reverse_proxy_crl_revoke.bash \
[3f00958]28        test-23_TLS_reverse_proxy_mismatched_priorities.bash \
[29d3311]29        test-24_pkcs11_cert.bash \
[8ac7c0d]30        test-25_Disable_TLS_1.0.bash \
[7c0ccaf]31        test-26_redirect_HTTP_to_HTTPS.bash
[5951102]32
[33af2b7]33TESTS = $(dist_check_SCRIPTS)
[8f90bf4]34
[42829ae]35check_PROGRAMS = pgpcrc
36pgpcrc_SOURCES = pgpcrc.c
37
[9a4d250]38# Identities in the miniature CA, server, and client environment for
39# the test suite
[c0bb823]40shared_identities = server authority client imposter rogueca
41pgp_identities = $(shared_identities)
42x509_only_identities = rogueclient
43x509_identities = $(shared_identities) $(x509_only_identities)
44identities = $(shared_identities) $(x509_only_identities)
[9a4d250]45# Append strings after ":=" to each identity to generate a list of
46# necessary files
[d70dd6e]47pgp_tokens = $(pgp_identities:=/cert.pgp) \
[c0bb823]48        $(pgp_identities:=/secret.pgp)
49x509_keys = $(x509_identities:=/secret.key)
50x509_certs = $(x509_identities:=/x509.pem)
[9a4d250]51x509_tokens = $(x509_certs) $(x509_keys)
52tokens = $(x509_tokens) $(pgp_tokens)
53
[5b6a5d9]54if !DISABLE_FLOCK
55# flock command for write access to the authority keyring
[5725dca]56GPG_FLOCK = @FLOCK@ authority/lock
[5b6a5d9]57endif
58
[fc8e463b]59include $(srcdir)/test_ca.mk
[9a4d250]60
[39bd695]61# Test cases trying to create keys and certificates in parallel causes
62# race conditions. Ensure that all keys and certificates are generated
63# before tests get to run.
64#
65# NOTE: Once the support files have been generated, test cases can be
66# run with multiple jobs, but real parallelization would require
67# dynamic port assignments. At the moment, lock files ensure that only
68# one Apache instance (possibly plus a proxy back end instance) is
69# running at any time, so test cases actually have to wait for each
70# other - just not in any particular order.
[9a4d250]71check_DATA = $(tokens) server/crl.pem
[39bd695]72
[98ab9db]73MOSTLYCLEANFILES = cache/* logs/* outputs/* server/crl.pem
[6ce02e2]74
[90a31a4]75cert_templates = authority.template.in client.template.in \
[06f8005]76        imposter.template.in rogueca.template rogueclient.template.in \
77        server.template.in
[90a31a4]78generated_templates = authority.template client.template \
[06f8005]79        imposter.template rogueclient.template server.template
[90a31a4]80
[9a4d250]81# Delete X.509 private keys on full clean. Note that unless you need
82# to generate fresh keys, the "mostlyclean" target should be
83# sufficient (see below).
84CLEANFILES = $(x509_keys)
85
[90a31a4]86# Delete X.509 certificates and generated templates on "mostlyclean"
87# target. Certificates can be rebuilt without generating new key
88# pairs, and regenerating them makes it possible to change identities
[7aeabcb]89# (e.g. host names) without wasting time on new keys (which would
[90a31a4]90# happen after "clean").
[9a4d250]91MOSTLYCLEANFILES += */x509.pem $(generated_templates) *.uid
92
[90a31a4]93
[6ce02e2]94# Delete PGP keyrings on "mostlyclean" target. They are created from
95# the X.509 private keys and certificates with an expiration time of
96# one day, so regenerating them is both fast and frequently
97# necessary.
[42829ae]98MOSTLYCLEANFILES += */*.pgp */*.pgp.raw */*.gpg */*.gpg~ */gpg.conf \
99        authority/lock */*.kbx */*.kbx~ */S.gpg-agent */private-keys-v1.d/*
[9a4d250]100# GnuPG random pool, no need to regenerate on every build
101CLEANFILES += authority/random_seed
[1708045]102
[9a4d250]103# Delete lock files for test servers on "mostlyclean" target.
104MOSTLYCLEANFILES += *.lock
105
106# rule to build MSVA trust database
107if USE_MSVA
108msva_home = msva.gnupghome
109check_DATA += $(msva_home)/trustdb.gpg client.uid
110MOSTLYCLEANFILES += $(msva_home)/trustdb.gpg
111$(msva_home)/trustdb.gpg: authority/minimal.pgp client/cert.pgp
112        mkdir -p -m 0700 $(dir $@)
113        GNUPGHOME=$(dir $@) gpg --import < $<
114        printf "%s:6:\n" "$$(GNUPGHOME=authority gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" | GNUPGHOME=$(dir $@) gpg --import-ownertrust
115        GNUPGHOME=$(dir $@) gpg --import < client/cert.pgp
116        printf "keyserver does-not-exist.example\n" > $(msva_home)/gpg.conf
117endif
[3f00958]118
[9a4d250]119
[b0e5dae]120# SoftHSM tokens. Note that the SoftHSM 2 token is a directory and
121# hence has to be treated slightly differently.
122SOFTHSM_TOKEN = server/softhsm.db
123SOFTHSM2_TOKEN = server/softhsm2.db
124
125# Tokens should be cleaned whether or not the matching SoftHSM version
126# was detected on the last ./configure run.
127MOSTLYCLEANFILES += $(SOFTHSM_TOKEN)
128# included in mostlyclean-local below
129clean-softhsm2-db:
130        -rm -rf $(SOFTHSM2_TOKEN)
131
132if HAVE_SOFTHSM1
133check_DATA += $(SOFTHSM_TOKEN)
134endif HAVE_SOFTHSM1
135
136if HAVE_SOFTHSM2
137check_DATA += $(SOFTHSM2_TOKEN)
138endif HAVE_SOFTHSM2
[9a4d250]139
140check_DATA += make-test-dirs
141extra_dirs = logs cache outputs
142make-test-dirs:
143        mkdir -p $(extra_dirs)
[b0e5dae]144
145.PHONY: make-test-dirs clean-softhsm2-db
146
147mostlyclean-local: clean-softhsm2-db
[42829ae]148        -rmdir $(pgp_identities:=/private-keys-v1.d) || true
149if USE_MSVA
150        -rmdir $(msva_home)/private-keys-v1.d || true
151endif
[3f00958]152
[9a4d250]153clean-local:
154        -rmdir $(identities) || true
155        -rmdir $(extra_dirs) || true
156if USE_MSVA
157        -rmdir $(msva_home) || true
158endif
[33af2b7]159
[9a4d250]160# Apache configuration and data files
[0bda20f]161apache_data = base_apache.conf cgi_module.conf data/dump.cgi data/secret.txt data/test.txt mime.types proxy_mods.conf
[33af2b7]162
[0bda20f]163EXTRA_DIST = $(apache_data) $(cert_templates) $(shared_identities:=.uid.in) \
164        common.bash proxy_backend.bash runtests server-crl.template \
165        softhsm.bash
[52c3f68]166
[34e5dc7]167# Lockfile for the main Apache process
168test_lockfile = ./test.lock
[412ee84]169# Lockfile for the proxy backend Apache process (if any)
170backend_lockfile = ./backend.lock
171# Maximum wait time in seconds for flock to aquire instance lock
172# files, or Apache to remove its PID file
[50eab8e]173lock_wait = 30
174
[34e5dc7]175# port for the main Apache server
176TEST_PORT ?= 9932
177# port for MSVA in test cases that use it
178MSVA_PORT ?= 9933
[a61edfd]179# maximum time to wait for MSVA startup (milliseconds)
180TEST_MSVA_MAX_WAIT ?= 10000
181# wait loop time for MSVA startup (milliseconds)
182TEST_MSVA_WAIT ?= 400
[34e5dc7]183# seconds for the HTTP request to be sent and responded to
184TEST_QUERY_DELAY ?= 30
185
[5725dca]186AM_TESTS_ENVIRONMENT = export APACHE2=@APACHE2@; \
187        export AP_LIBEXECDIR=@AP_LIBEXECDIR@; \
[34e5dc7]188        export TEST_LOCK_WAIT="$(lock_wait)"; \
[5725dca]189        export TEST_HOST="@TEST_HOST@"; \
[34e5dc7]190        export TEST_PORT="$(TEST_PORT)"; \
191        export MSVA_PORT="$(MSVA_PORT)"; \
192        export TEST_MSVA_MAX_WAIT="$(TEST_MSVA_MAX_WAIT)"; \
193        export TEST_MSVA_WAIT="$(TEST_MSVA_WAIT)"; \
194        export TEST_QUERY_DELAY="$(TEST_QUERY_DELAY)"; \
[5725dca]195        export BACKEND_HOST="@TEST_HOST@"; \
[67f2f58]196        export HTTP_CLI="@HTTP_CLI@";
[f9f184f]197
[5eb4544]198if HAVE_SOFTHSM
[74772b2]199AM_TESTS_ENVIRONMENT += export SOFTHSM="@SOFTHSM@"; \
[aeaf28b]200        export SOFTHSM_MAJOR_VERSION="@SOFTHSM_MAJOR_VERSION@"; \
201        export SOFTHSM_LIB="@SOFTHSM_LIB@"
[5eb4544]202endif
203
[cf4e708]204if ENABLE_NETNS
[5725dca]205AM_TESTS_ENVIRONMENT += export UNSHARE="@UNSHARE@"; \
[cf4e708]206        export USE_TEST_NAMESPACE=1;
207endif
[412ee84]208# Without flock tests must not run in parallel. Otherwise set lock files.
209if DISABLE_FLOCK
210.NOTPARALLEL:
211else
[5725dca]212AM_TESTS_ENVIRONMENT += export FLOCK="@FLOCK@"; \
[412ee84]213        export TEST_LOCK="$(test_lockfile)"; \
214        export BACKEND_LOCK="$(backend_lockfile)";
215endif
216
[f9f184f]217# Echo AM_TESTS_ENVIRONMENT. This can be useful for debugging, e.g. if
218# you want to manually run an Apache instance with Valgrind using the
219# same configuration as a test case.
220show-test-env: export TEST_ENV=$(AM_TESTS_ENVIRONMENT)
221show-test-env:
222        @echo "$${TEST_ENV}"
Note: See TracBrowser for help on using the repository browser.