source: mod_gnutls/test/Makefile.am @ 5eb4544

debian/masterdebian/stretch-backportsjessie-backportsupstream
Last change on this file since 5eb4544 was 5eb4544, checked in by Thomas Klute <thomas2.klute@…>, 4 years ago

Test suite: Search SoftHSM during ./configure, detect module for v1 or v2

Preparations for SoftHSM 2 support. The PKCS #11 module name and
location will be different, so GnuTLSP11Module must be set from the
environment instead of using a fixed value.

  • Property mode set to 100644
File size: 6.8 KB
Line 
1SUBDIRS = tests
2
3dist_check_SCRIPTS = test-00_basic.bash \
4        test-01_serverwide_priorities.bash \
5        test-02_cache_in_vhost.bash \
6        test-03_cachetimeout_in_vhost.bash \
7        test-04_basic_nosni.bash \
8        test-05_mismatched-priorities.bash \
9        test-06_verify_sni_a.bash \
10        test-07_verify_sni_b.bash \
11        test-08_verify_no_sni_fallback_to_first_vhost.bash \
12        test-09_verify_no_sni_fails_with_wrong_order.bash \
13        test-10_basic_client_verification.bash \
14        test-11_basic_client_verification_fail.bash \
15        test-12_cgi_variables.bash \
16        test-13_cgi_variables_no_client_cert.bash \
17        test-14_basic_openpgp.bash
18if USE_MSVA
19dist_check_SCRIPTS += test-15_basic_msva.bash
20endif
21dist_check_SCRIPTS += test-16_view-status.bash \
22        test-17_cgi_vars_large_cert.bash \
23        test-18_client_verification_wrong_cert.bash \
24        test-19_TLS_reverse_proxy.bash \
25        test-20_TLS_reverse_proxy_client_auth.bash \
26        test-21_TLS_reverse_proxy_wrong_cert.bash \
27        test-22_TLS_reverse_proxy_crl_revoke.bash \
28        test-23_TLS_reverse_proxy_mismatched_priorities.bash \
29        test-24_pkcs11_cert.bash \
30        test-25_Disable_TLS_1.0.bash \
31        test-26_redirect_HTTP_to_HTTPS.bash
32
33TESTS = $(dist_check_SCRIPTS)
34
35# Identities in the miniature CA, server, and client environment for
36# the test suite
37shared_identities = server authority client imposter rogueca
38pgp_identities = $(shared_identities)
39x509_only_identities = rogueclient
40x509_identities = $(shared_identities) $(x509_only_identities)
41identities = $(shared_identities) $(x509_only_identities)
42# Append strings after ":=" to each identity to generate a list of
43# necessary files
44pgp_tokens = $(pgp_identities:=/secring.gpg) $(pgp_identities:=/cert.pgp) \
45        $(pgp_identities:=/secret.pgp)
46x509_keys = $(x509_identities:=/secret.key)
47x509_certs = $(x509_identities:=/x509.pem)
48x509_tokens = $(x509_certs) $(x509_keys)
49tokens = $(x509_tokens) $(pgp_tokens)
50
51if !DISABLE_FLOCK
52# flock command for write access to the authority keyring
53GPG_FLOCK = $(FLOCK) authority/lock
54endif
55
56include $(srcdir)/test_ca.mk
57
58# Test cases trying to create keys and certificates in parallel causes
59# race conditions. Ensure that all keys and certificates are generated
60# before tests get to run.
61#
62# NOTE: Once the support files have been generated, test cases can be
63# run with multiple jobs, but real parallelization would require
64# dynamic port assignments. At the moment, lock files ensure that only
65# one Apache instance (possibly plus a proxy back end instance) is
66# running at any time, so test cases actually have to wait for each
67# other - just not in any particular order.
68check_DATA = $(tokens) server/crl.pem
69
70MOSTLYCLEANFILES = cache/* logs/* outputs/* server/crl.pem
71
72cert_templates = authority.template.in client.template.in \
73        imposter.template.in rogueca.template rogueclient.template.in \
74        server.template.in
75generated_templates = authority.template client.template \
76        imposter.template rogueclient.template server.template
77
78# Delete X.509 private keys on full clean. Note that unless you need
79# to generate fresh keys, the "mostlyclean" target should be
80# sufficient (see below).
81CLEANFILES = $(x509_keys)
82
83# Delete X.509 certificates and generated templates on "mostlyclean"
84# target. Certificates can be rebuilt without generating new key
85# pairs, and regenerating them makes it possible to change identities
86# (e.g. host names) without wasting time on new keys (which would
87# happen after "clean").
88MOSTLYCLEANFILES += */x509.pem $(generated_templates) *.uid
89
90
91# Delete PGP keyrings on "mostlyclean" target. They are created from
92# the X.509 private keys and certificates with an expiration time of
93# one day, so regenerating them is both fast and frequently
94# necessary.
95MOSTLYCLEANFILES += */*.pgp */*.gpg */*.gpg~ */gpg.conf authority/lock
96# GnuPG random pool, no need to regenerate on every build
97CLEANFILES += authority/random_seed
98
99# Delete lock files for test servers on "mostlyclean" target.
100MOSTLYCLEANFILES += *.lock
101
102# rule to build MSVA trust database
103if USE_MSVA
104msva_home = msva.gnupghome
105check_DATA += $(msva_home)/trustdb.gpg client.uid
106MOSTLYCLEANFILES += $(msva_home)/trustdb.gpg
107$(msva_home)/trustdb.gpg: authority/minimal.pgp client/cert.pgp
108        mkdir -p -m 0700 $(dir $@)
109        GNUPGHOME=$(dir $@) gpg --import < $<
110        printf "%s:6:\n" "$$(GNUPGHOME=authority gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" | GNUPGHOME=$(dir $@) gpg --import-ownertrust
111        GNUPGHOME=$(dir $@) gpg --import < client/cert.pgp
112        printf "keyserver does-not-exist.example\n" > $(msva_home)/gpg.conf
113endif
114
115# SoftHSM files
116check_DATA += server/softhsm.db
117MOSTLYCLEANFILES += tests/24_pkcs11_cert/softhsm.conf server/softhsm.db
118
119
120check_DATA += make-test-dirs
121extra_dirs = logs cache outputs
122make-test-dirs:
123        mkdir -p $(extra_dirs)
124.PHONY: make-test-dirs
125
126clean-local:
127        -rmdir $(identities) || true
128        -rmdir $(extra_dirs) || true
129if USE_MSVA
130        -rmdir $(msva_home) || true
131endif
132
133# Apache configuration and data files
134apache_data = base_apache.conf cgi_module.conf data/* mime.types proxy_mods.conf
135
136EXTRA_DIST = $(apache_data) $(cert_templates) *.uid.in common.bash \
137        proxy_backend.bash runtests server-crl.template server-softhsm.conf \
138        softhsm.bash
139
140# Lockfile for the main Apache process
141test_lockfile = ./test.lock
142# Lockfile for the proxy backend Apache process (if any)
143backend_lockfile = ./backend.lock
144# Maximum wait time in seconds for flock to aquire instance lock
145# files, or Apache to remove its PID file
146lock_wait = 30
147
148# port for the main Apache server
149TEST_PORT ?= 9932
150# port for MSVA in test cases that use it
151MSVA_PORT ?= 9933
152# maximum time to wait for MSVA startup (milliseconds)
153TEST_MSVA_MAX_WAIT ?= 10000
154# wait loop time for MSVA startup (milliseconds)
155TEST_MSVA_WAIT ?= 400
156# seconds for the HTTP request to be sent and responded to
157TEST_QUERY_DELAY ?= 30
158
159AM_TESTS_ENVIRONMENT = export APACHE2=$(APACHE2); \
160        export AP_LIBEXECDIR=$(AP_LIBEXECDIR); \
161        export TEST_LOCK_WAIT="$(lock_wait)"; \
162        export TEST_HOST="$(TEST_HOST)"; \
163        export TEST_PORT="$(TEST_PORT)"; \
164        export MSVA_PORT="$(MSVA_PORT)"; \
165        export TEST_MSVA_MAX_WAIT="$(TEST_MSVA_MAX_WAIT)"; \
166        export TEST_MSVA_WAIT="$(TEST_MSVA_WAIT)"; \
167        export TEST_QUERY_DELAY="$(TEST_QUERY_DELAY)"; \
168        export BACKEND_HOST="$(TEST_HOST)"; \
169        export HTTP_CLI="@HTTP_CLI@";
170
171if HAVE_SOFTHSM
172AM_TESTS_ENVIRONMENT += export SOFTHSM="@SOFTHSM@";
173endif
174
175if ENABLE_NETNS
176AM_TESTS_ENVIRONMENT += export UNSHARE="$(UNSHARE)"; \
177        export USE_TEST_NAMESPACE=1;
178endif
179# Without flock tests must not run in parallel. Otherwise set lock files.
180if DISABLE_FLOCK
181.NOTPARALLEL:
182else
183AM_TESTS_ENVIRONMENT += export FLOCK="$(FLOCK)"; \
184        export TEST_LOCK="$(test_lockfile)"; \
185        export BACKEND_LOCK="$(backend_lockfile)";
186endif
187
188# Echo AM_TESTS_ENVIRONMENT. This can be useful for debugging, e.g. if
189# you want to manually run an Apache instance with Valgrind using the
190# same configuration as a test case.
191show-test-env: export TEST_ENV=$(AM_TESTS_ENVIRONMENT)
192show-test-env:
193        @echo "$${TEST_ENV}"
Note: See TracBrowser for help on using the repository browser.