source: mod_gnutls/test/Makefile.am @ 4f7edd5

debian/masterdebian/stretch-backportsupstream
Last change on this file since 4f7edd5 was 339a49d, checked in by Thomas Klute <thomas2.klute@…>, 3 years ago

Test suite: List .bash in TEST_EXTENSIONS

This way the test harness automatically removes ".bash" from test
names before adding .log/.trs for the output file names.

  • Property mode set to 100644
File size: 8.6 KB
Line 
1SUBDIRS = tests
2
3dist_check_SCRIPTS = test-00_basic.bash \
4        test-01_serverwide_priorities.bash \
5        test-02_cache_in_vhost.bash \
6        test-03_cachetimeout_in_vhost.bash \
7        test-04_basic_nosni.bash \
8        test-05_mismatched-priorities.bash \
9        test-06_verify_sni_a.bash \
10        test-07_verify_sni_b.bash \
11        test-08_verify_no_sni_fallback_to_first_vhost.bash \
12        test-09_verify_no_sni_fails_with_wrong_order.bash \
13        test-10_basic_client_verification.bash \
14        test-11_basic_client_verification_fail.bash \
15        test-12_cgi_variables.bash \
16        test-13_cgi_variables_no_client_cert.bash \
17        test-14_basic_openpgp.bash
18if USE_MSVA
19dist_check_SCRIPTS += test-15_basic_msva.bash
20endif
21dist_check_SCRIPTS += test-16_view-status.bash \
22        test-17_cgi_vars_large_cert.bash \
23        test-18_client_verification_wrong_cert.bash \
24        test-19_TLS_reverse_proxy.bash \
25        test-20_TLS_reverse_proxy_client_auth.bash \
26        test-21_TLS_reverse_proxy_wrong_cert.bash \
27        test-22_TLS_reverse_proxy_crl_revoke.bash \
28        test-23_TLS_reverse_proxy_mismatched_priorities.bash \
29        test-24_pkcs11_cert.bash \
30        test-25_Disable_TLS_1.0.bash \
31        test-26_redirect_HTTP_to_HTTPS.bash \
32        test-27_OCSP_server.bash
33
34TEST_EXTENSIONS = .bash
35TESTS = $(dist_check_SCRIPTS)
36
37check_PROGRAMS = pgpcrc
38pgpcrc_SOURCES = pgpcrc.c
39
40# build OCSP database tool
41if ENABLE_OCSP_TEST
42check_PROGRAMS += gen_ocsp_index
43gen_ocsp_index_SOURCES = gen_ocsp_index.c cert_helper.c
44gen_ocsp_index_LDFLAGS = $(LIBGNUTLS_LIBS)
45noinst_HEADERS = cert_helper.h
46endif
47
48# Identities in the miniature CA, server, and client environment for
49# the test suite
50shared_identities = server authority client imposter rogueca
51pgp_identities = $(shared_identities)
52x509_only_identities = rogueclient
53if ENABLE_OCSP_TEST
54x509_only_identities += ocsp-responder
55endif
56x509_identities = $(shared_identities) $(x509_only_identities)
57identities = $(shared_identities) $(x509_only_identities)
58# Append strings after ":=" to each identity to generate a list of
59# necessary files
60pgp_tokens = $(pgp_identities:=/cert.pgp) \
61        $(pgp_identities:=/secret.pgp)
62x509_keys = $(x509_identities:=/secret.key)
63x509_certs = $(x509_identities:=/x509.pem)
64x509_tokens = $(x509_certs) $(x509_keys)
65tokens = $(x509_tokens) $(pgp_tokens)
66
67if !DISABLE_FLOCK
68# flock command for write access to the authority keyring
69GPG_FLOCK = @FLOCK@ authority/lock
70endif
71
72include $(srcdir)/test_ca.mk
73
74# Test cases trying to create keys and certificates in parallel causes
75# race conditions. Ensure that all keys and certificates are generated
76# before tests get to run.
77#
78# NOTE: Once the support files have been generated, test cases can be
79# run with multiple jobs, but real parallelization would require
80# dynamic port assignments. At the moment, lock files ensure that only
81# one Apache instance (possibly plus a proxy back end instance) is
82# running at any time, so test cases actually have to wait for each
83# other - just not in any particular order.
84check_DATA = $(tokens) server/crl.pem
85
86MOSTLYCLEANFILES = cache/* logs/* outputs/* server/crl.pem
87
88cert_templates = authority.template.in client.template.in \
89        imposter.template.in ocsp-responder.template rogueca.template \
90        rogueclient.template.in server.template.in
91generated_templates = authority.template client.template \
92        imposter.template rogueclient.template server.template
93
94# Delete X.509 private keys on full clean. Note that unless you need
95# to generate fresh keys, the "mostlyclean" target should be
96# sufficient (see below).
97CLEANFILES = $(x509_keys)
98
99# Delete X.509 certificates and generated templates on "mostlyclean"
100# target. Certificates can be rebuilt without generating new key
101# pairs, and regenerating them makes it possible to change identities
102# (e.g. host names) without wasting time on new keys (which would
103# happen after "clean").
104MOSTLYCLEANFILES += */x509.pem $(generated_templates) *.uid
105
106
107# Delete PGP keyrings on "mostlyclean" target. They are created from
108# the X.509 private keys and certificates with an expiration time of
109# one day, so regenerating them is both fast and frequently
110# necessary.
111MOSTLYCLEANFILES += */*.pgp */*.pgp.raw */*.gpg */*.gpg~ */gpg.conf \
112        authority/lock */*.kbx */*.kbx~ */S.gpg-agent */private-keys-v1.d/*
113# GnuPG random pool, no need to regenerate on every build
114CLEANFILES += authority/random_seed
115
116# Delete lock files for test servers on "mostlyclean" target.
117MOSTLYCLEANFILES += *.lock
118
119# rule to build MSVA trust database
120if USE_MSVA
121msva_home = msva.gnupghome
122check_DATA += $(msva_home)/trustdb.gpg client.uid
123MOSTLYCLEANFILES += $(msva_home)/trustdb.gpg
124$(msva_home)/trustdb.gpg: authority/minimal.pgp client/cert.pgp
125        mkdir -p -m 0700 $(dir $@)
126        GNUPGHOME=$(dir $@) gpg --import < $<
127        printf "%s:6:\n" "$$(GNUPGHOME=authority gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" | GNUPGHOME=$(dir $@) gpg --import-ownertrust
128        GNUPGHOME=$(dir $@) gpg --import < client/cert.pgp
129        printf "keyserver does-not-exist.example\n" > $(msva_home)/gpg.conf
130endif
131
132if ENABLE_OCSP_TEST
133# rules to build OCSP database
134check_DATA += authority/ocsp_index.txt
135MOSTLYCLEANFILES += authority/ocsp_index.txt authority/ocsp_index.txt.attr
136authority/ocsp_index.txt: $(x509_tokens) gen_ocsp_index authority/ocsp_index.txt.attr
137        ./gen_ocsp_index server/x509.pem client/x509.pem > $@
138
139authority/ocsp_index.txt.attr: authority/secret.key
140        echo "unique_subject = no" > $@
141
142# build certificate chain file for server
143check_DATA += server/x509-chain.pem
144MOSTLYCLEANFILES += server/x509-chain.pem
145%/x509-chain.pem: %/x509.pem authority/x509.pem
146        cat $< authority/x509.pem > $@
147endif
148
149# SoftHSM tokens. Note that the SoftHSM 2 token is a directory and
150# hence has to be treated slightly differently.
151SOFTHSM_TOKEN = server/softhsm.db
152SOFTHSM2_TOKEN = server/softhsm2.db
153
154# Tokens should be cleaned whether or not the matching SoftHSM version
155# was detected on the last ./configure run.
156MOSTLYCLEANFILES += $(SOFTHSM_TOKEN)
157# included in mostlyclean-local below
158clean-softhsm2-db:
159        -rm -rf $(SOFTHSM2_TOKEN)
160
161if HAVE_SOFTHSM1
162check_DATA += $(SOFTHSM_TOKEN)
163endif HAVE_SOFTHSM1
164
165if HAVE_SOFTHSM2
166check_DATA += $(SOFTHSM2_TOKEN)
167endif HAVE_SOFTHSM2
168
169check_DATA += make-test-dirs
170extra_dirs = logs cache outputs
171make-test-dirs:
172        mkdir -p $(extra_dirs)
173
174.PHONY: make-test-dirs clean-softhsm2-db
175
176mostlyclean-local: clean-softhsm2-db
177        -rmdir $(pgp_identities:=/private-keys-v1.d) || true
178if USE_MSVA
179        -rmdir $(msva_home)/private-keys-v1.d || true
180endif
181
182clean-local:
183        -rmdir $(identities) || true
184        -rmdir $(extra_dirs) || true
185if USE_MSVA
186        -rmdir $(msva_home) || true
187endif
188
189# Apache configuration and data files
190apache_data = base_apache.conf cgi_module.conf data/dump.cgi data/ocsp.cgi \
191        data/secret.txt data/test.txt mime.types ocsp_server.conf \
192        proxy_mods.conf
193
194EXTRA_DIST = $(apache_data) $(cert_templates) $(shared_identities:=.uid.in) \
195        common.bash proxy_backend.bash runtests server-crl.template \
196        softhsm.bash
197
198# Lockfile for the main Apache process
199test_lockfile = ./test.lock
200# Lockfile for the proxy backend Apache process (if any)
201backend_lockfile = ./backend.lock
202
203# port for the main Apache server
204TEST_PORT ?= 9932
205# port for MSVA in test cases that use it
206MSVA_PORT ?= 9933
207# port for OCSP server (Apache vhost if enabled)
208if ENABLE_OCSP_TEST
209OCSP_PORT ?= 9936
210endif
211# maximum time to wait for MSVA startup (milliseconds)
212TEST_SERVICE_MAX_WAIT ?= 10000
213# wait loop time for MSVA startup (milliseconds)
214TEST_SERVICE_WAIT ?= 400
215
216AM_TESTS_ENVIRONMENT = export APACHE2=@APACHE2@; \
217        export AP_LIBEXECDIR=@AP_LIBEXECDIR@; \
218        export TEST_LOCK_WAIT="@TEST_LOCK_WAIT@"; \
219        export TEST_HOST="@TEST_HOST@"; \
220        export TEST_PORT="$(TEST_PORT)"; \
221        export MSVA_PORT="$(MSVA_PORT)"; \
222        export TEST_SERVICE_MAX_WAIT="$(TEST_SERVICE_MAX_WAIT)"; \
223        export TEST_SERVICE_WAIT="$(TEST_SERVICE_WAIT)"; \
224        export TEST_QUERY_TIMEOUT="@TEST_QUERY_TIMEOUT@"; \
225        export BACKEND_HOST="@TEST_HOST@"; \
226        export HTTP_CLI="@HTTP_CLI@";
227
228if HAVE_SOFTHSM
229AM_TESTS_ENVIRONMENT += export SOFTHSM="@SOFTHSM@"; \
230        export SOFTHSM_MAJOR_VERSION="@SOFTHSM_MAJOR_VERSION@"; \
231        export SOFTHSM_LIB="@SOFTHSM_LIB@"
232endif
233
234if ENABLE_OCSP_TEST
235AM_TESTS_ENVIRONMENT += export OPENSSL="@OPENSSL@"; \
236        export OCSP_PORT="$(OCSP_PORT)";
237endif
238
239if ENABLE_NETNS
240AM_TESTS_ENVIRONMENT += export UNSHARE="@UNSHARE@"; \
241        export USE_TEST_NAMESPACE=1;
242endif
243# Without flock tests must not run in parallel. Otherwise set lock files.
244if DISABLE_FLOCK
245.NOTPARALLEL:
246else
247AM_TESTS_ENVIRONMENT += export FLOCK="@FLOCK@"; \
248        export TEST_LOCK="$(test_lockfile)"; \
249        export BACKEND_LOCK="$(backend_lockfile)";
250endif
251
252# Echo AM_TESTS_ENVIRONMENT. This can be useful for debugging, e.g. if
253# you want to manually run an Apache instance with Valgrind using the
254# same configuration as a test case.
255show-test-env: export TEST_ENV=$(AM_TESTS_ENVIRONMENT)
256show-test-env:
257        @echo "$${TEST_ENV}"
Note: See TracBrowser for help on using the repository browser.