Changeset 71e9a5c in mod_gnutls for test/TestMakefile
- Timestamp:
- Aug 22, 2015, 3:53:31 PM (6 years ago)
- Branches:
- debian/master, debian/stretch-backports, jessie-backports
- Children:
- b837187
- Parents:
- 2db6923 (diff), 4addf74 (diff)
Note: this is a merge changeset, the changes displayed below correspond to the merge itself.
Use the(diff)
links above to see all the changes relative to each parent. - File:
-
- 1 moved
Legend:
- Unmodified
- Added
- Removed
-
test/TestMakefile
r2db6923 r71e9a5c 6 6 # simple configuration choices. 7 7 8 export srcdir ?= . 9 # If the Apache binary is not set, try to find apache2 in default PATH 10 # (should only happen when the test script is run manually) 11 export APACHE2 ?= apache2 12 8 13 export TEST_HOST ?= localhost 9 14 export TEST_IP ?= ::1 … … 12 17 export MSVA_PORT ?= 9933 13 18 14 export TEST_GAP ?= 1.5 15 export TEST_QUERY_DELAY ?= 2 19 export TEST_GAP ?= 0.4 20 export TEST_MSVA_MAX_WAIT ?= 10 21 export TEST_QUERY_DELAY ?= 30 22 export TEST_LOCK_WAIT ?= 30 23 24 TEST_LOCK := ./test.lock 16 25 17 26 all: setup.done 18 ./runtests27 TEST_LOCK=$(TEST_LOCK) $(srcdir)/runtests 19 28 20 29 t-%: setup.done 21 ./runtests $@30 TEST_LOCK=$(TEST_LOCK) $(srcdir)/runtests $@ 22 31 23 32 … … 30 39 all_tokens := $(foreach id,$(identities),$(foreach token,$(tokens),$(id)/$(token))) 31 40 32 %.template: %.template.in41 %.template: $(srcdir)/%.template.in 33 42 sed s/__HOSTNAME__/$(TEST_HOST)/ < $< > $@ 34 43 35 server.uid: server.uid.in44 %.uid: $(srcdir)/%.uid.in 36 45 sed s/__HOSTNAME__/$(TEST_HOST)/ < $< > $@ 37 46 … … 55 64 GNUPGHOME=$(dir $@) gpg --armor --export "$$(GNUPGHOME=$(dir $@) gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" > $@ 56 65 66 # Import and signing modify the shared keyring, which leads to race 67 # conditions with parallel make. Locking avoids this problem. 57 68 %/cert.pgp: %/minimal.pgp authority/gpg.conf 58 GNUPGHOME=authority gpg --import $<59 GNUPGHOME=authority gpg --batch --sign-key --no-tty --yes "$$(GNUPGHOME=$(dir $@) gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)"69 GNUPGHOME=authority flock authority/lock gpg --import $< 70 GNUPGHOME=authority flock authority/lock gpg --batch --sign-key --no-tty --yes "$$(GNUPGHOME=$(dir $@) gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" 60 71 GNUPGHOME=authority gpg --armor --export "$$(GNUPGHOME=$(dir $@) gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" > $@ 61 72 62 73 # special cases for the authorities' root certs: 63 74 authority/x509.pem: authority.template authority/secret.key 64 certtool --generate-self-signed --load-privkey =authority/secret.key --template=authority.template > $@65 rogueca/x509.pem: rogueca.template rogueca/secret.key66 certtool --generate-self-signed --load-privkey =rogueca/secret.key --template=rogueca.template > $@75 certtool --generate-self-signed --load-privkey authority/secret.key --template authority.template > $@ 76 rogueca/x509.pem: $(srcdir)/rogueca.template rogueca/secret.key 77 certtool --generate-self-signed --load-privkey rogueca/secret.key --template $(srcdir)/rogueca.template > $@ 67 78 68 79 %/cert-request: %.template %/secret.key 69 certtool --generate-request --load-privkey =$(dir $@)secret.key --template=$< > $@80 certtool --generate-request --load-privkey $(dir $@)secret.key --template $< > $@ 70 81 71 82 %/x509.pem: %.template %/cert-request authority/secret.key authority/x509.pem 72 certtool --generate-certificate --load-ca-certificate=authority/x509.pem --load-ca-privkey=authority/secret.key --load-request=$(dir $@)cert-request --template=$< > $@ 83 certtool --generate-certificate --load-ca-certificate authority/x509.pem --load-ca-privkey authority/secret.key --load-request $(dir $@)cert-request --template $< > $@ 84 85 %/softhsm.db: %/x509.pem %/secret.key 86 SOFTHSM_CONF="$(srcdir)/$(*)-softhsm.conf" $(srcdir)/softhsm.bash init $(dir $@)secret.key $(dir $@)x509.pem 87 88 # Generate CRL revoking a certain certificate. Currently used to 89 # revoke the server certificate and check if setting the CRL as 90 # GnuTLSProxyCRLFile causes the connection to the back end server to 91 # fail. 92 %/crl.pem: %/x509.pem ${srcdir}/%-crl.template 93 certtool --generate-crl \ 94 --load-ca-privkey authority/secret.key \ 95 --load-ca-certificate authority/x509.pem \ 96 --load-certificate $< \ 97 --template "${srcdir}/$(*)-crl.template" \ 98 > $@ 73 99 74 100 msva.gnupghome/trustdb.gpg: authority/minimal.pgp client/cert.pgp … … 80 106 81 107 82 setup.done: $(all_tokens) msva.gnupghome/trustdb.gpg 108 setup.done: $(all_tokens) msva.gnupghome/trustdb.gpg client.uid 83 109 mkdir -p logs cache outputs 84 110 touch setup.done … … 86 112 87 113 clean: 88 rm -rf server client authority logs cache outputs setup.done server.template msva.gnupghome 114 rm -rf server client authority logs cache outputs setup.done \ 115 server.template imposter.template msva.gnupghome \ 116 */*.pgp */*.gpg */*.gpg~ */*.pem */*.key authority.template \ 117 client.template client.uid server.uid *.lock tests/*/*.pem 118 rmdir imposter rogueca || true 89 119 90 120 .PHONY: all clean
Note: See TracChangeset
for help on using the changeset viewer.