1 | SUBDIRS = tests |
---|
2 | |
---|
3 | dist_check_SCRIPTS = test-00_basic.bash \ |
---|
4 | test-01_serverwide_priorities.bash \ |
---|
5 | test-02_cache_in_vhost.bash \ |
---|
6 | test-03_cachetimeout_in_vhost.bash \ |
---|
7 | test-04_basic_nosni.bash \ |
---|
8 | test-05_mismatched-priorities.bash \ |
---|
9 | test-06_verify_sni_a.bash \ |
---|
10 | test-07_verify_sni_b.bash \ |
---|
11 | test-08_verify_no_sni_fallback_to_first_vhost.bash \ |
---|
12 | test-09_verify_no_sni_fails_with_wrong_order.bash \ |
---|
13 | test-10_basic_client_verification.bash \ |
---|
14 | test-11_basic_client_verification_fail.bash \ |
---|
15 | test-12_cgi_variables.bash \ |
---|
16 | test-13_cgi_variables_no_client_cert.bash \ |
---|
17 | test-14_basic_openpgp.bash |
---|
18 | if USE_MSVA |
---|
19 | dist_check_SCRIPTS += test-15_basic_msva.bash |
---|
20 | endif |
---|
21 | dist_check_SCRIPTS += test-16_view-status.bash \ |
---|
22 | test-17_cgi_vars_large_cert.bash \ |
---|
23 | test-18_client_verification_wrong_cert.bash \ |
---|
24 | test-19_TLS_reverse_proxy.bash \ |
---|
25 | test-20_TLS_reverse_proxy_client_auth.bash \ |
---|
26 | test-21_TLS_reverse_proxy_wrong_cert.bash \ |
---|
27 | test-22_TLS_reverse_proxy_crl_revoke.bash \ |
---|
28 | test-23_TLS_reverse_proxy_mismatched_priorities.bash \ |
---|
29 | test-24_pkcs11_cert.bash \ |
---|
30 | test-25_Disable_TLS_1.0.bash \ |
---|
31 | test-26_redirect_HTTP_to_HTTPS.bash \ |
---|
32 | test-27_OCSP_server.bash |
---|
33 | |
---|
34 | TESTS = $(dist_check_SCRIPTS) |
---|
35 | |
---|
36 | check_PROGRAMS = pgpcrc |
---|
37 | pgpcrc_SOURCES = pgpcrc.c |
---|
38 | |
---|
39 | # build OCSP database tool |
---|
40 | if ENABLE_OCSP_TEST |
---|
41 | check_PROGRAMS += gen_ocsp_index |
---|
42 | gen_ocsp_index_SOURCES = gen_ocsp_index.c cert_helper.c |
---|
43 | gen_ocsp_index_LDFLAGS = $(LIBGNUTLS_LIBS) |
---|
44 | noinst_HEADERS = cert_helper.h |
---|
45 | endif |
---|
46 | |
---|
47 | # Identities in the miniature CA, server, and client environment for |
---|
48 | # the test suite |
---|
49 | shared_identities = server authority client imposter rogueca |
---|
50 | pgp_identities = $(shared_identities) |
---|
51 | x509_only_identities = rogueclient |
---|
52 | if ENABLE_OCSP_TEST |
---|
53 | x509_only_identities += ocsp-responder |
---|
54 | endif |
---|
55 | x509_identities = $(shared_identities) $(x509_only_identities) |
---|
56 | identities = $(shared_identities) $(x509_only_identities) |
---|
57 | # Append strings after ":=" to each identity to generate a list of |
---|
58 | # necessary files |
---|
59 | pgp_tokens = $(pgp_identities:=/cert.pgp) \ |
---|
60 | $(pgp_identities:=/secret.pgp) |
---|
61 | x509_keys = $(x509_identities:=/secret.key) |
---|
62 | x509_certs = $(x509_identities:=/x509.pem) |
---|
63 | x509_tokens = $(x509_certs) $(x509_keys) |
---|
64 | tokens = $(x509_tokens) $(pgp_tokens) |
---|
65 | |
---|
66 | if !DISABLE_FLOCK |
---|
67 | # flock command for write access to the authority keyring |
---|
68 | GPG_FLOCK = @FLOCK@ authority/lock |
---|
69 | endif |
---|
70 | |
---|
71 | include $(srcdir)/test_ca.mk |
---|
72 | |
---|
73 | # Test cases trying to create keys and certificates in parallel causes |
---|
74 | # race conditions. Ensure that all keys and certificates are generated |
---|
75 | # before tests get to run. |
---|
76 | # |
---|
77 | # NOTE: Once the support files have been generated, test cases can be |
---|
78 | # run with multiple jobs, but real parallelization would require |
---|
79 | # dynamic port assignments. At the moment, lock files ensure that only |
---|
80 | # one Apache instance (possibly plus a proxy back end instance) is |
---|
81 | # running at any time, so test cases actually have to wait for each |
---|
82 | # other - just not in any particular order. |
---|
83 | check_DATA = $(tokens) server/crl.pem |
---|
84 | |
---|
85 | MOSTLYCLEANFILES = cache/* logs/* outputs/* server/crl.pem |
---|
86 | |
---|
87 | cert_templates = authority.template.in client.template.in \ |
---|
88 | imposter.template.in ocsp-responder.template rogueca.template \ |
---|
89 | rogueclient.template.in server.template.in |
---|
90 | generated_templates = authority.template client.template \ |
---|
91 | imposter.template rogueclient.template server.template |
---|
92 | |
---|
93 | # Delete X.509 private keys on full clean. Note that unless you need |
---|
94 | # to generate fresh keys, the "mostlyclean" target should be |
---|
95 | # sufficient (see below). |
---|
96 | CLEANFILES = $(x509_keys) |
---|
97 | |
---|
98 | # Delete X.509 certificates and generated templates on "mostlyclean" |
---|
99 | # target. Certificates can be rebuilt without generating new key |
---|
100 | # pairs, and regenerating them makes it possible to change identities |
---|
101 | # (e.g. host names) without wasting time on new keys (which would |
---|
102 | # happen after "clean"). |
---|
103 | MOSTLYCLEANFILES += */x509.pem $(generated_templates) *.uid |
---|
104 | |
---|
105 | |
---|
106 | # Delete PGP keyrings on "mostlyclean" target. They are created from |
---|
107 | # the X.509 private keys and certificates with an expiration time of |
---|
108 | # one day, so regenerating them is both fast and frequently |
---|
109 | # necessary. |
---|
110 | MOSTLYCLEANFILES += */*.pgp */*.pgp.raw */*.gpg */*.gpg~ */gpg.conf \ |
---|
111 | authority/lock */*.kbx */*.kbx~ */S.gpg-agent */private-keys-v1.d/* |
---|
112 | # GnuPG random pool, no need to regenerate on every build |
---|
113 | CLEANFILES += authority/random_seed |
---|
114 | |
---|
115 | # Delete lock files for test servers on "mostlyclean" target. |
---|
116 | MOSTLYCLEANFILES += *.lock |
---|
117 | |
---|
118 | # rule to build MSVA trust database |
---|
119 | if USE_MSVA |
---|
120 | msva_home = msva.gnupghome |
---|
121 | check_DATA += $(msva_home)/trustdb.gpg client.uid |
---|
122 | MOSTLYCLEANFILES += $(msva_home)/trustdb.gpg |
---|
123 | $(msva_home)/trustdb.gpg: authority/minimal.pgp client/cert.pgp |
---|
124 | mkdir -p -m 0700 $(dir $@) |
---|
125 | GNUPGHOME=$(dir $@) gpg --import < $< |
---|
126 | printf "%s:6:\n" "$$(GNUPGHOME=authority gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" | GNUPGHOME=$(dir $@) gpg --import-ownertrust |
---|
127 | GNUPGHOME=$(dir $@) gpg --import < client/cert.pgp |
---|
128 | printf "keyserver does-not-exist.example\n" > $(msva_home)/gpg.conf |
---|
129 | endif |
---|
130 | |
---|
131 | if ENABLE_OCSP_TEST |
---|
132 | # rules to build OCSP database |
---|
133 | check_DATA += authority/ocsp_index.txt |
---|
134 | MOSTLYCLEANFILES += authority/ocsp_index.txt authority/ocsp_index.txt.attr |
---|
135 | authority/ocsp_index.txt: $(x509_tokens) gen_ocsp_index authority/ocsp_index.txt.attr |
---|
136 | ./gen_ocsp_index server/x509.pem client/x509.pem > $@ |
---|
137 | |
---|
138 | authority/ocsp_index.txt.attr: authority/secret.key |
---|
139 | echo "unique_subject = no" > $@ |
---|
140 | |
---|
141 | # build certificate chain file for server |
---|
142 | check_DATA += server/x509-chain.pem |
---|
143 | MOSTLYCLEANFILES += server/x509-chain.pem |
---|
144 | %/x509-chain.pem: %/x509.pem authority/x509.pem |
---|
145 | cat $< authority/x509.pem > $@ |
---|
146 | endif |
---|
147 | |
---|
148 | # SoftHSM tokens. Note that the SoftHSM 2 token is a directory and |
---|
149 | # hence has to be treated slightly differently. |
---|
150 | SOFTHSM_TOKEN = server/softhsm.db |
---|
151 | SOFTHSM2_TOKEN = server/softhsm2.db |
---|
152 | |
---|
153 | # Tokens should be cleaned whether or not the matching SoftHSM version |
---|
154 | # was detected on the last ./configure run. |
---|
155 | MOSTLYCLEANFILES += $(SOFTHSM_TOKEN) |
---|
156 | # included in mostlyclean-local below |
---|
157 | clean-softhsm2-db: |
---|
158 | -rm -rf $(SOFTHSM2_TOKEN) |
---|
159 | |
---|
160 | if HAVE_SOFTHSM1 |
---|
161 | check_DATA += $(SOFTHSM_TOKEN) |
---|
162 | endif HAVE_SOFTHSM1 |
---|
163 | |
---|
164 | if HAVE_SOFTHSM2 |
---|
165 | check_DATA += $(SOFTHSM2_TOKEN) |
---|
166 | endif HAVE_SOFTHSM2 |
---|
167 | |
---|
168 | check_DATA += make-test-dirs |
---|
169 | extra_dirs = logs cache outputs |
---|
170 | make-test-dirs: |
---|
171 | mkdir -p $(extra_dirs) |
---|
172 | |
---|
173 | .PHONY: make-test-dirs clean-softhsm2-db |
---|
174 | |
---|
175 | mostlyclean-local: clean-softhsm2-db |
---|
176 | -rmdir $(pgp_identities:=/private-keys-v1.d) || true |
---|
177 | if USE_MSVA |
---|
178 | -rmdir $(msva_home)/private-keys-v1.d || true |
---|
179 | endif |
---|
180 | |
---|
181 | clean-local: |
---|
182 | -rmdir $(identities) || true |
---|
183 | -rmdir $(extra_dirs) || true |
---|
184 | if USE_MSVA |
---|
185 | -rmdir $(msva_home) || true |
---|
186 | endif |
---|
187 | |
---|
188 | # Apache configuration and data files |
---|
189 | apache_data = base_apache.conf cgi_module.conf data/dump.cgi data/ocsp.cgi \ |
---|
190 | data/secret.txt data/test.txt mime.types ocsp_server.conf \ |
---|
191 | proxy_mods.conf |
---|
192 | |
---|
193 | EXTRA_DIST = $(apache_data) $(cert_templates) $(shared_identities:=.uid.in) \ |
---|
194 | common.bash proxy_backend.bash runtests server-crl.template \ |
---|
195 | softhsm.bash |
---|
196 | |
---|
197 | # Lockfile for the main Apache process |
---|
198 | test_lockfile = ./test.lock |
---|
199 | # Lockfile for the proxy backend Apache process (if any) |
---|
200 | backend_lockfile = ./backend.lock |
---|
201 | # Maximum wait time in seconds for flock to aquire instance lock |
---|
202 | # files, or Apache to remove its PID file |
---|
203 | lock_wait = 30 |
---|
204 | |
---|
205 | # port for the main Apache server |
---|
206 | TEST_PORT ?= 9932 |
---|
207 | # port for MSVA in test cases that use it |
---|
208 | MSVA_PORT ?= 9933 |
---|
209 | # port for OCSP server (Apache vhost if enabled) |
---|
210 | if ENABLE_OCSP_TEST |
---|
211 | OCSP_PORT ?= 9936 |
---|
212 | endif |
---|
213 | # maximum time to wait for MSVA startup (milliseconds) |
---|
214 | TEST_MSVA_MAX_WAIT ?= 10000 |
---|
215 | # wait loop time for MSVA startup (milliseconds) |
---|
216 | TEST_MSVA_WAIT ?= 400 |
---|
217 | # seconds for the HTTP request to be sent and responded to |
---|
218 | TEST_QUERY_DELAY ?= 30 |
---|
219 | |
---|
220 | AM_TESTS_ENVIRONMENT = export APACHE2=@APACHE2@; \ |
---|
221 | export AP_LIBEXECDIR=@AP_LIBEXECDIR@; \ |
---|
222 | export TEST_LOCK_WAIT="$(lock_wait)"; \ |
---|
223 | export TEST_HOST="@TEST_HOST@"; \ |
---|
224 | export TEST_PORT="$(TEST_PORT)"; \ |
---|
225 | export MSVA_PORT="$(MSVA_PORT)"; \ |
---|
226 | export TEST_MSVA_MAX_WAIT="$(TEST_MSVA_MAX_WAIT)"; \ |
---|
227 | export TEST_MSVA_WAIT="$(TEST_MSVA_WAIT)"; \ |
---|
228 | export TEST_QUERY_DELAY="$(TEST_QUERY_DELAY)"; \ |
---|
229 | export BACKEND_HOST="@TEST_HOST@"; \ |
---|
230 | export HTTP_CLI="@HTTP_CLI@"; |
---|
231 | |
---|
232 | if HAVE_SOFTHSM |
---|
233 | AM_TESTS_ENVIRONMENT += export SOFTHSM="@SOFTHSM@"; \ |
---|
234 | export SOFTHSM_MAJOR_VERSION="@SOFTHSM_MAJOR_VERSION@"; \ |
---|
235 | export SOFTHSM_LIB="@SOFTHSM_LIB@" |
---|
236 | endif |
---|
237 | |
---|
238 | if ENABLE_OCSP_TEST |
---|
239 | AM_TESTS_ENVIRONMENT += export OPENSSL="@OPENSSL@"; \ |
---|
240 | export OCSP_PORT="$(OCSP_PORT)"; |
---|
241 | endif |
---|
242 | |
---|
243 | if ENABLE_NETNS |
---|
244 | AM_TESTS_ENVIRONMENT += export UNSHARE="@UNSHARE@"; \ |
---|
245 | export USE_TEST_NAMESPACE=1; |
---|
246 | endif |
---|
247 | # Without flock tests must not run in parallel. Otherwise set lock files. |
---|
248 | if DISABLE_FLOCK |
---|
249 | .NOTPARALLEL: |
---|
250 | else |
---|
251 | AM_TESTS_ENVIRONMENT += export FLOCK="@FLOCK@"; \ |
---|
252 | export TEST_LOCK="$(test_lockfile)"; \ |
---|
253 | export BACKEND_LOCK="$(backend_lockfile)"; |
---|
254 | endif |
---|
255 | |
---|
256 | # Echo AM_TESTS_ENVIRONMENT. This can be useful for debugging, e.g. if |
---|
257 | # you want to manually run an Apache instance with Valgrind using the |
---|
258 | # same configuration as a test case. |
---|
259 | show-test-env: export TEST_ENV=$(AM_TESTS_ENVIRONMENT) |
---|
260 | show-test-env: |
---|
261 | @echo "$${TEST_ENV}" |
---|