source: mod_gnutls/test/Makefile.am @ 0e55076

debian/masterproxy-ticket
Last change on this file since 0e55076 was dcc053e, checked in by Krista Karppinen <krista.celestia@…>, 21 months ago

Add test for missing Host header, SNI matching server alias

Test that a request to a virtual host with a server alias fails if
there is no Host header in the encapsulated HTTP request

  • Property mode set to 100644
File size: 10.6 KB
Line 
1SUBDIRS = tests
2
3dist_check_SCRIPTS = test-00_basic.bash \
4        test-01_serverwide_priorities.bash \
5        test-02_cache_in_vhost.bash \
6        test-03_cachetimeout_in_vhost.bash \
7        test-04_basic_nosni.bash \
8        test-05_mismatched-priorities.bash \
9        test-06_verify_sni_a.bash \
10        test-07_verify_sni_b.bash \
11        test-08_verify_no_sni_fallback_to_first_vhost.bash \
12        test-09_verify_no_sni_fails_with_wrong_order.bash \
13        test-10_basic_client_verification.bash \
14        test-11_basic_client_verification_fail.bash \
15        test-12_cgi_variables.bash \
16        test-13_cgi_variables_no_client_cert.bash \
17        test-14_resume_session.bash
18if USE_MSVA
19dist_check_SCRIPTS += test-15_basic_msva.bash
20endif
21dist_check_SCRIPTS += test-16_view-status.bash \
22        test-17_cgi_vars_large_cert.bash \
23        test-18_client_verification_wrong_cert.bash \
24        test-19_TLS_reverse_proxy.bash \
25        test-20_TLS_reverse_proxy_client_auth.bash \
26        test-21_TLS_reverse_proxy_wrong_cert.bash \
27        test-22_TLS_reverse_proxy_crl_revoke.bash \
28        test-23_TLS_reverse_proxy_mismatched_priorities.bash \
29        test-24_pkcs11_cert.bash \
30        test-25_Disable_TLS_1.0.bash \
31        test-26_redirect_HTTP_to_HTTPS.bash \
32        test-27_OCSP_server.bash \
33        test-28_HTTP2_support.bash \
34        test-29_force_handshake_vhost.bash \
35        test-30_ip_based_vhosts.bash \
36        test-31_vhost_SNI_serveralias_match.bash \
37        test-32_vhost_SNI_serveralias_mismatch.bash \
38        test-33_vhost_SNI_serveralias_missinghost.bash
39
40TEST_EXTENSIONS = .bash
41TESTS = $(dist_check_SCRIPTS)
42
43check_PROGRAMS = pgpcrc
44pgpcrc_SOURCES = pgpcrc.c
45
46# build OCSP database tool
47if ENABLE_OCSP_TEST
48check_PROGRAMS += gen_ocsp_index
49gen_ocsp_index_SOURCES = gen_ocsp_index.c cert_helper.c
50gen_ocsp_index_CFLAGS = $(LIBGNUTLS_CFLAGS)
51gen_ocsp_index_LDFLAGS = $(LIBGNUTLS_LIBS)
52noinst_HEADERS = cert_helper.h
53endif
54
55# Identities in the miniature CA, server, and client environment for
56# the test suite
57shared_identities = authority client
58pgp_identities = $(shared_identities)
59x509_only_identities = server rogueca imposter rogueclient
60if ENABLE_OCSP_TEST
61x509_only_identities += ocsp-responder
62endif
63x509_identities = $(shared_identities) $(x509_only_identities)
64identities = $(shared_identities) $(x509_only_identities)
65# Append strings after ":=" to each identity to generate a list of
66# necessary files
67pgp_tokens = $(pgp_identities:=/cert.pgp) \
68        $(pgp_identities:=/secret.pgp)
69x509_keys = $(x509_identities:=/secret.key)
70x509_certs = $(x509_identities:=/x509.pem)
71x509_tokens = $(x509_certs) $(x509_keys)
72tokens = $(x509_tokens) $(pgp_tokens)
73
74if !DISABLE_FLOCK
75# flock command for write access to the authority keyring
76GPG_FLOCK = @FLOCK@ authority/lock
77endif
78
79include $(srcdir)/test_ca.mk
80
81# Test cases trying to create keys and certificates in parallel causes
82# race conditions. Ensure that all keys and certificates are generated
83# before tests get to run.
84#
85# NOTE: Once the support files have been generated, test cases can be
86# run with multiple jobs, but real parallelization would require
87# dynamic port assignments. At the moment, lock files ensure that only
88# one Apache instance (possibly plus a proxy back end instance) is
89# running at any time, so test cases actually have to wait for each
90# other - just not in any particular order.
91check_DATA = $(tokens) server/crl.pem
92
93MOSTLYCLEANFILES = cache/* logs/* outputs/* server/crl.pem
94
95cert_templates = authority.template.in client.template.in \
96        imposter.template.in ocsp-responder.template rogueca.template \
97        rogueclient.template.in server.template.in
98generated_templates = authority.template client.template \
99        imposter.template rogueclient.template server.template
100
101# Delete X.509 private keys on full clean. Note that unless you need
102# to generate fresh keys, the "mostlyclean" target should be
103# sufficient (see below).
104CLEANFILES = $(x509_keys)
105
106# Delete X.509 certificates and generated templates on "mostlyclean"
107# target. Certificates can be rebuilt without generating new key
108# pairs, and regenerating them makes it possible to change identities
109# (e.g. host names) without wasting time on new keys (which would
110# happen after "clean").
111MOSTLYCLEANFILES += */x509.pem $(generated_templates) *.uid
112
113
114# Delete PGP keyrings on "mostlyclean" target. They are created from
115# the X.509 private keys and certificates with an expiration time of
116# one day, so regenerating them is both fast and frequently
117# necessary.
118MOSTLYCLEANFILES += */*.pgp */*.pgp.raw */*.gpg */*.gpg~ */gpg.conf \
119        authority/lock */*.kbx */*.kbx~ */S.gpg-agent */private-keys-v1.d/* \
120        authority/tofu.db
121# GnuPG random pool, no need to regenerate on every build
122CLEANFILES += authority/random_seed
123
124# GnuPG 2 starts gpg-agent processes per GNUPGHOME (one for every PGP
125# identity) while creating the PGP certificates. This target is called
126# by both "check-local" and "mostlyclean-local": The former because
127# agent processes are started while preparing for "check" and are no
128# longer needed afterwards, the latter to make sure they are gone
129# along with their certificates.
130stop-gnupg-agent:
131        for id in $(pgp_identities) $(msva_home); do \
132                GNUPGHOME=$$id/ gpgconf --kill gpg-agent || true; \
133        done
134
135check-local: stop-gnupg-agent
136
137# Delete lock files for test servers on "mostlyclean" target.
138MOSTLYCLEANFILES += *.lock
139
140# rule to build MSVA trust database
141if USE_MSVA
142msva_home = msva.gnupghome
143check_DATA += $(msva_home)/trustdb.gpg client.uid
144MOSTLYCLEANFILES += $(msva_home)/trustdb.gpg
145$(msva_home)/trustdb.gpg: authority/minimal.pgp client/cert.pgp
146        mkdir -p -m 0700 $(dir $@)
147        GNUPGHOME=$(dir $@) gpg --import < $<
148        printf "%s:6:\n" "$$(GNUPGHOME=authority/ gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" | GNUPGHOME=$(dir $@) gpg --import-ownertrust
149        GNUPGHOME=$(dir $@) gpg --import < client/cert.pgp
150        printf "keyserver does-not-exist.example\n" > $(msva_home)/gpg.conf
151endif
152
153if ENABLE_OCSP_TEST
154# rules to build OCSP database
155check_DATA += authority/ocsp_index.txt
156MOSTLYCLEANFILES += authority/ocsp_index.txt authority/ocsp_index.txt.attr
157authority/ocsp_index.txt: $(x509_tokens) gen_ocsp_index authority/ocsp_index.txt.attr
158        ./gen_ocsp_index server/x509.pem client/x509.pem > $@
159
160authority/ocsp_index.txt.attr: authority/secret.key
161        echo "unique_subject = no" > $@
162
163# build certificate chain file for server
164check_DATA += server/x509-chain.pem
165MOSTLYCLEANFILES += server/x509-chain.pem
166%/x509-chain.pem: %/x509.pem authority/x509.pem
167        cat $< authority/x509.pem > $@
168endif
169
170# SoftHSM tokens. Note that the SoftHSM 2 token is a directory and
171# hence has to be treated slightly differently.
172SOFTHSM_TOKEN = server/softhsm.db
173SOFTHSM2_TOKEN = server/softhsm2.db
174
175# Tokens should be cleaned whether or not the matching SoftHSM version
176# was detected on the last ./configure run.
177MOSTLYCLEANFILES += $(SOFTHSM_TOKEN)
178# included in mostlyclean-local below
179clean-softhsm2-db:
180        -rm -rf $(SOFTHSM2_TOKEN)
181
182if HAVE_SOFTHSM1
183check_DATA += $(SOFTHSM_TOKEN)
184endif HAVE_SOFTHSM1
185
186if HAVE_SOFTHSM2
187check_DATA += $(SOFTHSM2_TOKEN)
188endif HAVE_SOFTHSM2
189
190check_DATA += make-test-dirs
191extra_dirs = logs cache outputs
192make-test-dirs:
193        mkdir -p $(extra_dirs)
194
195.PHONY: make-test-dirs clean-softhsm2-db stop-gnupg-agent
196
197
198mostlyclean-local: clean-softhsm2-db stop-gnupg-agent
199        -rmdir $(pgp_identities:=/private-keys-v1.d) || true
200if USE_MSVA
201        -rmdir $(msva_home)/private-keys-v1.d || true
202endif
203
204# Delete test data directories, and wait for test services to
205# exit. The reason for the wait is that Apache instances may take some
206# time to exit and delete their PID files. Occasionally some PID files
207# where still around during "distcheck" runs by the time the target
208# checked if the build directory was really empty after "distclean",
209# breaking the build. Delaying "clean-local" until PID files are gone
210# avoids this issue, and the timeout will expose actually unclean
211# stops.
212clean-local:
213        -rmdir $(identities) || true
214        -rmdir $(extra_dirs) || true
215if USE_MSVA
216        -rmdir $(msva_home) || true
217endif
218        wait=0; \
219        while ls *.pid && test "$$wait" -lt "@TEST_LOCK_WAIT@"; do \
220                wait=$$(($$wait + 1)); \
221                echo "waiting for test services to exit ($$wait seconds)"; \
222                sleep 1; \
223        done
224
225# Apache configuration and data files
226apache_data = base_apache.conf cgi_module.conf data/dump.cgi data/ocsp.cgi \
227        data/secret.txt data/test.txt ffdhe3072.pem mime.types \
228        proxy_mods.conf
229
230EXTRA_DIST = $(apache_data) $(cert_templates) $(shared_identities:=.uid.in) \
231        apache_service.bash common.bash runtests server-crl.template \
232        softhsm.bash
233
234# Lockfile for the main Apache process
235test_lockfile = ./test.lock
236# Lockfile for the proxy backend Apache process (if any)
237backend_lockfile = ./backend.lock
238# Lockfile for the OCSP server Apache process (if any)
239ocsp_lockfile = ./ocsp.lock
240
241# port for the main Apache server
242TEST_PORT ?= 9932
243# port for MSVA in test cases that use it
244MSVA_PORT ?= 9933
245# port for TLS proxy backend server
246BACKEND_PORT ?= 9934
247# port for the OCSP responder
248if ENABLE_OCSP_TEST
249OCSP_PORT ?= 9936
250OCSP_URI_TEMPLATE = ocsp_uri = http://$(TEST_HOST):$(OCSP_PORT)/ocsp/
251endif
252# maximum time to wait for MSVA startup (milliseconds)
253TEST_SERVICE_MAX_WAIT ?= 10000
254# wait loop time for MSVA startup (milliseconds)
255TEST_SERVICE_WAIT ?= 400
256
257AM_TESTS_ENVIRONMENT = export APACHE2=@APACHE2@; \
258        export AP_LIBEXECDIR=@AP_LIBEXECDIR@; \
259        export TEST_LOCK_WAIT="@TEST_LOCK_WAIT@"; \
260        export TEST_IP="@TEST_IP@"; \
261        export TEST_HOST="@TEST_HOST@"; \
262        export TEST_PORT="$(TEST_PORT)"; \
263        export MSVA_PORT="$(MSVA_PORT)"; \
264        export TEST_SERVICE_MAX_WAIT="$(TEST_SERVICE_MAX_WAIT)"; \
265        export TEST_SERVICE_WAIT="$(TEST_SERVICE_WAIT)"; \
266        export TEST_QUERY_TIMEOUT="@TEST_QUERY_TIMEOUT@"; \
267        export BACKEND_HOST="@TEST_HOST@"; \
268        export BACKEND_PORT="$(BACKEND_PORT)"; \
269        export HTTP_CLI="@HTTP_CLI@";
270
271if HAVE_SOFTHSM
272AM_TESTS_ENVIRONMENT += export SOFTHSM="@SOFTHSM@"; \
273        export SOFTHSM_MAJOR_VERSION="@SOFTHSM_MAJOR_VERSION@"; \
274        export SOFTHSM_LIB="@SOFTHSM_LIB@"
275endif
276
277if ENABLE_OCSP_TEST
278AM_TESTS_ENVIRONMENT += export OPENSSL="@OPENSSL@"; \
279        export OCSP_PORT="$(OCSP_PORT)";
280endif
281
282if ENABLE_NETNS
283AM_TESTS_ENVIRONMENT += export UNSHARE="@UNSHARE@"; \
284        export USE_TEST_NAMESPACE=1;
285endif
286# Without flock tests must not run in parallel, and PID files are used
287# to prevent conflicts between server instances. Otherwise set lock
288# files for flock.
289if DISABLE_FLOCK
290AM_TESTS_ENVIRONMENT += export TEST_LOCK="apache2.pid"; \
291        export BACKEND_LOCK="backend.pid"; \
292        export OCSP_LOCK="ocsp.pid";
293.NOTPARALLEL:
294else
295AM_TESTS_ENVIRONMENT += export FLOCK="@FLOCK@"; \
296        export TEST_LOCK="$(test_lockfile)"; \
297        export BACKEND_LOCK="$(backend_lockfile)"; \
298        export OCSP_LOCK="$(ocsp_lockfile)";
299endif
300
301# Echo AM_TESTS_ENVIRONMENT. This can be useful for debugging, e.g. if
302# you want to manually run an Apache instance with Valgrind using the
303# same configuration as a test case.
304show-test-env: export TEST_ENV=$(AM_TESTS_ENVIRONMENT)
305show-test-env:
306        @echo "$${TEST_ENV}"
Note: See TracBrowser for help on using the repository browser.