source: mod_gnutls/test/Makefile.am @ 97d7c63

debian/masterdebian/stretch-backportsupstream
Last change on this file since 97d7c63 was 97d7c63, checked in by Thomas Klute <thomas2.klute@…>, 2 years ago

Test suite: Port config for proxy backend in Makefile and Apache config

The shell function for server start does not need to care about the
port assignment any more, simplifying the code.

  • Property mode set to 100644
File size: 9.2 KB
RevLine 
[33af2b7]1SUBDIRS = tests
2
3dist_check_SCRIPTS = test-00_basic.bash \
[c51e33a]4        test-01_serverwide_priorities.bash \
5        test-02_cache_in_vhost.bash \
6        test-03_cachetimeout_in_vhost.bash \
7        test-04_basic_nosni.bash \
8        test-05_mismatched-priorities.bash \
9        test-06_verify_sni_a.bash \
10        test-07_verify_sni_b.bash \
11        test-08_verify_no_sni_fallback_to_first_vhost.bash \
12        test-09_verify_no_sni_fails_with_wrong_order.bash \
13        test-10_basic_client_verification.bash \
14        test-11_basic_client_verification_fail.bash \
15        test-12_cgi_variables.bash \
16        test-13_cgi_variables_no_client_cert.bash \
[65c18ce]17        test-14_basic_openpgp.bash
18if USE_MSVA
[33af2b7]19dist_check_SCRIPTS += test-15_basic_msva.bash
[65c18ce]20endif
[33af2b7]21dist_check_SCRIPTS += test-16_view-status.bash \
[eea8a16]22        test-17_cgi_vars_large_cert.bash \
[6e6a4e4]23        test-18_client_verification_wrong_cert.bash \
[ed82a6a]24        test-19_TLS_reverse_proxy.bash \
25        test-20_TLS_reverse_proxy_client_auth.bash \
[907ae8f]26        test-21_TLS_reverse_proxy_wrong_cert.bash \
[f030883]27        test-22_TLS_reverse_proxy_crl_revoke.bash \
[3f00958]28        test-23_TLS_reverse_proxy_mismatched_priorities.bash \
[29d3311]29        test-24_pkcs11_cert.bash \
[8ac7c0d]30        test-25_Disable_TLS_1.0.bash \
[c4d6e77]31        test-26_redirect_HTTP_to_HTTPS.bash \
32        test-27_OCSP_server.bash
[5951102]33
[339a49d]34TEST_EXTENSIONS = .bash
[33af2b7]35TESTS = $(dist_check_SCRIPTS)
[8f90bf4]36
[439005a]37check_PROGRAMS = pgpcrc gnutls_openpgp_support
[42829ae]38pgpcrc_SOURCES = pgpcrc.c
[439005a]39gnutls_openpgp_support_SOURCES = gnutls_openpgp_support.c
40gnutls_openpgp_support_CFLAGS = $(LIBGNUTLS_CFLAGS)
41gnutls_openpgp_support_LDFLAGS = $(LIBGNUTLS_LIBS)
[42829ae]42
[42bee37]43# build OCSP database tool
44if ENABLE_OCSP_TEST
[b674e95]45check_PROGRAMS += gen_ocsp_index
[42bee37]46gen_ocsp_index_SOURCES = gen_ocsp_index.c cert_helper.c
[439005a]47gen_ocsp_index_CFLAGS = $(LIBGNUTLS_CFLAGS)
[6c44ed2]48gen_ocsp_index_LDFLAGS = $(LIBGNUTLS_LIBS)
[42bee37]49noinst_HEADERS = cert_helper.h
50endif
51
[9a4d250]52# Identities in the miniature CA, server, and client environment for
53# the test suite
[c0bb823]54shared_identities = server authority client imposter rogueca
55pgp_identities = $(shared_identities)
56x509_only_identities = rogueclient
[a03f94e]57if ENABLE_OCSP_TEST
58x509_only_identities += ocsp-responder
59endif
[c0bb823]60x509_identities = $(shared_identities) $(x509_only_identities)
61identities = $(shared_identities) $(x509_only_identities)
[9a4d250]62# Append strings after ":=" to each identity to generate a list of
63# necessary files
[d70dd6e]64pgp_tokens = $(pgp_identities:=/cert.pgp) \
[c0bb823]65        $(pgp_identities:=/secret.pgp)
66x509_keys = $(x509_identities:=/secret.key)
67x509_certs = $(x509_identities:=/x509.pem)
[9a4d250]68x509_tokens = $(x509_certs) $(x509_keys)
69tokens = $(x509_tokens) $(pgp_tokens)
70
[5b6a5d9]71if !DISABLE_FLOCK
72# flock command for write access to the authority keyring
[5725dca]73GPG_FLOCK = @FLOCK@ authority/lock
[5b6a5d9]74endif
75
[fc8e463]76include $(srcdir)/test_ca.mk
[9a4d250]77
[39bd695]78# Test cases trying to create keys and certificates in parallel causes
79# race conditions. Ensure that all keys and certificates are generated
80# before tests get to run.
81#
82# NOTE: Once the support files have been generated, test cases can be
83# run with multiple jobs, but real parallelization would require
84# dynamic port assignments. At the moment, lock files ensure that only
85# one Apache instance (possibly plus a proxy back end instance) is
86# running at any time, so test cases actually have to wait for each
87# other - just not in any particular order.
[9a4d250]88check_DATA = $(tokens) server/crl.pem
[39bd695]89
[98ab9db]90MOSTLYCLEANFILES = cache/* logs/* outputs/* server/crl.pem
[6ce02e2]91
[90a31a4]92cert_templates = authority.template.in client.template.in \
[a03f94e]93        imposter.template.in ocsp-responder.template rogueca.template \
94        rogueclient.template.in server.template.in
[90a31a4]95generated_templates = authority.template client.template \
[06f8005]96        imposter.template rogueclient.template server.template
[90a31a4]97
[9a4d250]98# Delete X.509 private keys on full clean. Note that unless you need
99# to generate fresh keys, the "mostlyclean" target should be
100# sufficient (see below).
101CLEANFILES = $(x509_keys)
102
[90a31a4]103# Delete X.509 certificates and generated templates on "mostlyclean"
104# target. Certificates can be rebuilt without generating new key
105# pairs, and regenerating them makes it possible to change identities
[7aeabcb]106# (e.g. host names) without wasting time on new keys (which would
[90a31a4]107# happen after "clean").
[9a4d250]108MOSTLYCLEANFILES += */x509.pem $(generated_templates) *.uid
109
[90a31a4]110
[6ce02e2]111# Delete PGP keyrings on "mostlyclean" target. They are created from
112# the X.509 private keys and certificates with an expiration time of
113# one day, so regenerating them is both fast and frequently
114# necessary.
[42829ae]115MOSTLYCLEANFILES += */*.pgp */*.pgp.raw */*.gpg */*.gpg~ */gpg.conf \
116        authority/lock */*.kbx */*.kbx~ */S.gpg-agent */private-keys-v1.d/*
[9a4d250]117# GnuPG random pool, no need to regenerate on every build
118CLEANFILES += authority/random_seed
[1708045]119
[9a4d250]120# Delete lock files for test servers on "mostlyclean" target.
121MOSTLYCLEANFILES += *.lock
122
123# rule to build MSVA trust database
124if USE_MSVA
125msva_home = msva.gnupghome
126check_DATA += $(msva_home)/trustdb.gpg client.uid
127MOSTLYCLEANFILES += $(msva_home)/trustdb.gpg
128$(msva_home)/trustdb.gpg: authority/minimal.pgp client/cert.pgp
129        mkdir -p -m 0700 $(dir $@)
130        GNUPGHOME=$(dir $@) gpg --import < $<
131        printf "%s:6:\n" "$$(GNUPGHOME=authority gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" | GNUPGHOME=$(dir $@) gpg --import-ownertrust
132        GNUPGHOME=$(dir $@) gpg --import < client/cert.pgp
133        printf "keyserver does-not-exist.example\n" > $(msva_home)/gpg.conf
134endif
[3f00958]135
[ea99ffe]136if ENABLE_OCSP_TEST
[20f8e99]137# rules to build OCSP database
[ea99ffe]138check_DATA += authority/ocsp_index.txt
139MOSTLYCLEANFILES += authority/ocsp_index.txt authority/ocsp_index.txt.attr
140authority/ocsp_index.txt: $(x509_tokens) gen_ocsp_index authority/ocsp_index.txt.attr
141        ./gen_ocsp_index server/x509.pem client/x509.pem > $@
142
143authority/ocsp_index.txt.attr: authority/secret.key
144        echo "unique_subject = no" > $@
[20f8e99]145
146# build certificate chain file for server
147check_DATA += server/x509-chain.pem
148MOSTLYCLEANFILES += server/x509-chain.pem
149%/x509-chain.pem: %/x509.pem authority/x509.pem
150        cat $< authority/x509.pem > $@
[ea99ffe]151endif
[9a4d250]152
[b0e5dae]153# SoftHSM tokens. Note that the SoftHSM 2 token is a directory and
154# hence has to be treated slightly differently.
155SOFTHSM_TOKEN = server/softhsm.db
156SOFTHSM2_TOKEN = server/softhsm2.db
157
158# Tokens should be cleaned whether or not the matching SoftHSM version
159# was detected on the last ./configure run.
160MOSTLYCLEANFILES += $(SOFTHSM_TOKEN)
161# included in mostlyclean-local below
162clean-softhsm2-db:
163        -rm -rf $(SOFTHSM2_TOKEN)
164
165if HAVE_SOFTHSM1
166check_DATA += $(SOFTHSM_TOKEN)
167endif HAVE_SOFTHSM1
168
169if HAVE_SOFTHSM2
170check_DATA += $(SOFTHSM2_TOKEN)
171endif HAVE_SOFTHSM2
[9a4d250]172
173check_DATA += make-test-dirs
174extra_dirs = logs cache outputs
175make-test-dirs:
176        mkdir -p $(extra_dirs)
[b0e5dae]177
178.PHONY: make-test-dirs clean-softhsm2-db
179
180mostlyclean-local: clean-softhsm2-db
[42829ae]181        -rmdir $(pgp_identities:=/private-keys-v1.d) || true
182if USE_MSVA
183        -rmdir $(msva_home)/private-keys-v1.d || true
184endif
[3f00958]185
[9a4d250]186clean-local:
187        -rmdir $(identities) || true
188        -rmdir $(extra_dirs) || true
189if USE_MSVA
190        -rmdir $(msva_home) || true
191endif
[33af2b7]192
[9a4d250]193# Apache configuration and data files
[b674e95]194apache_data = base_apache.conf cgi_module.conf data/dump.cgi data/ocsp.cgi \
[b8b1990]195        data/secret.txt data/test.txt ffdhe3072.pem mime.types \
[94430e6]196        proxy_mods.conf
[33af2b7]197
[0bda20f]198EXTRA_DIST = $(apache_data) $(cert_templates) $(shared_identities:=.uid.in) \
199        common.bash proxy_backend.bash runtests server-crl.template \
200        softhsm.bash
[52c3f68]201
[34e5dc7]202# Lockfile for the main Apache process
203test_lockfile = ./test.lock
[412ee84]204# Lockfile for the proxy backend Apache process (if any)
205backend_lockfile = ./backend.lock
[94430e6]206# Lockfile for the OCSP server Apache process (if any)
207ocsp_lockfile = ./ocsp.lock
[50eab8e]208
[34e5dc7]209# port for the main Apache server
210TEST_PORT ?= 9932
211# port for MSVA in test cases that use it
212MSVA_PORT ?= 9933
[97d7c63]213# port for TLS proxy backend server
214BACKEND_PORT ?= 9934
215# port for the OCSP responder
[21181b2]216if ENABLE_OCSP_TEST
217OCSP_PORT ?= 9936
218endif
[a61edfd]219# maximum time to wait for MSVA startup (milliseconds)
[4fb510d]220TEST_SERVICE_MAX_WAIT ?= 10000
[a61edfd]221# wait loop time for MSVA startup (milliseconds)
[4fb510d]222TEST_SERVICE_WAIT ?= 400
[34e5dc7]223
[5725dca]224AM_TESTS_ENVIRONMENT = export APACHE2=@APACHE2@; \
225        export AP_LIBEXECDIR=@AP_LIBEXECDIR@; \
[6c030c1]226        export TEST_LOCK_WAIT="@TEST_LOCK_WAIT@"; \
[5725dca]227        export TEST_HOST="@TEST_HOST@"; \
[34e5dc7]228        export TEST_PORT="$(TEST_PORT)"; \
229        export MSVA_PORT="$(MSVA_PORT)"; \
[4fb510d]230        export TEST_SERVICE_MAX_WAIT="$(TEST_SERVICE_MAX_WAIT)"; \
231        export TEST_SERVICE_WAIT="$(TEST_SERVICE_WAIT)"; \
[6c030c1]232        export TEST_QUERY_TIMEOUT="@TEST_QUERY_TIMEOUT@"; \
[5725dca]233        export BACKEND_HOST="@TEST_HOST@"; \
[97d7c63]234        export BACKEND_PORT="$(BACKEND_PORT)"; \
[67f2f58]235        export HTTP_CLI="@HTTP_CLI@";
[f9f184f]236
[5eb4544]237if HAVE_SOFTHSM
[74772b2]238AM_TESTS_ENVIRONMENT += export SOFTHSM="@SOFTHSM@"; \
[aeaf28b]239        export SOFTHSM_MAJOR_VERSION="@SOFTHSM_MAJOR_VERSION@"; \
240        export SOFTHSM_LIB="@SOFTHSM_LIB@"
[5eb4544]241endif
242
[21181b2]243if ENABLE_OCSP_TEST
244AM_TESTS_ENVIRONMENT += export OPENSSL="@OPENSSL@"; \
245        export OCSP_PORT="$(OCSP_PORT)";
246endif
247
[cf4e708]248if ENABLE_NETNS
[5725dca]249AM_TESTS_ENVIRONMENT += export UNSHARE="@UNSHARE@"; \
[cf4e708]250        export USE_TEST_NAMESPACE=1;
251endif
[94430e6]252# Without flock tests must not run in parallel, and PID files are used
253# to prevent conflicts between server instances. Otherwise set lock
254# files for flock.
[412ee84]255if DISABLE_FLOCK
[94430e6]256AM_TESTS_ENVIRONMENT += export TEST_LOCK="apache2.pid"; \
257        export BACKEND_LOCK="backend.pid"; \
258        export OCSP_LOCK="ocsp.pid";
[412ee84]259.NOTPARALLEL:
260else
[5725dca]261AM_TESTS_ENVIRONMENT += export FLOCK="@FLOCK@"; \
[412ee84]262        export TEST_LOCK="$(test_lockfile)"; \
[94430e6]263        export BACKEND_LOCK="$(backend_lockfile)"; \
264        export OCSP_LOCK="$(ocsp_lockfile)";
[412ee84]265endif
266
[f9f184f]267# Echo AM_TESTS_ENVIRONMENT. This can be useful for debugging, e.g. if
268# you want to manually run an Apache instance with Valgrind using the
269# same configuration as a test case.
270show-test-env: export TEST_ENV=$(AM_TESTS_ENVIRONMENT)
271show-test-env:
272        @echo "$${TEST_ENV}"
Note: See TracBrowser for help on using the repository browser.