- Timestamp:
- Jun 24, 2019, 2:46:11 PM (4 years ago)
- Branches:
- asyncio, main, master, proxy-ticket
- Children:
- f205c5f
- Parents:
- c91382d
- Location:
- test
- Files:
-
- 2 edited
- 8 moved
Legend:
- Unmodified
- Added
- Removed
-
test/Makefile.am
rc91382d ra819501 97 97 MOSTLYCLEANFILES = cache/* logs/* outputs/* server/crl.pem 98 98 99 cert_templates = authority .template.in client.template.in \100 imposter .template.in ocsp-responder.template rogueca.template \101 rogueclient .template.in server.template.in102 generated_templates = authority .template client.template \103 imposter .template rogueclient.template server.template99 cert_templates = authority/template.in client/template.in \ 100 imposter/template.in ocsp-responder/template rogueca/template \ 101 rogueclient/template.in server/template.in 102 generated_templates = authority/template client/template \ 103 imposter/template rogueclient/template server/template 104 104 105 105 # Delete X.509 private keys on full clean. Note that unless you need … … 232 232 233 233 EXTRA_DIST = $(apache_data) $(cert_templates) $(shared_identities:=/uid.in) \ 234 apache_service.bash common.bash runtests server -crl.template \234 apache_service.bash common.bash runtests server/crl.template \ 235 235 softhsm.bash 236 236 -
test/test_ca.mk
rc91382d ra819501 7 7 # for the test suite 8 8 9 %.template: $(srcdir)/%.template.in 9 %/template: $(srcdir)/%/template.in % 10 @mkdir -m 0700 -p $(@D) 10 11 sed s/__HOSTNAME__/$(TEST_HOST)/ < $< > $@ 11 12 sed -i -e "s,__OCSP_URI__,$(OCSP_URI_TEMPLATE)," $@ … … 15 16 sed -i -e "s,__IP_ADDRESSES__,$${IP_ADDRS#\\n}," $@ 16 17 17 %/uid: $(srcdir)/%/uid.in 18 %/uid: $(srcdir)/%/uid.in % 19 @mkdir -m 0700 -p $(@D) 18 20 sed s/__HOSTNAME__/$(TEST_HOST)/ < $< > $@ 19 21 20 %/secret.key: 21 mkdir -p $(dir $@) 22 chmod 0700 $(dir $@) 22 %/secret.key: % 23 @mkdir -m 0700 -p $(@D) 23 24 certtool --outfile $@ --generate-privkey 24 25 … … 56 57 57 58 # special cases for the authorities' root certs: 58 authority/x509.pem: authority .template authority/secret.key59 certtool --outfile $@ --generate-self-signed --load-privkey authority/secret.key --template authority .template60 rogueca/x509.pem: $(srcdir)/rogueca .template rogueca/secret.key61 certtool --outfile $@ --generate-self-signed --load-privkey rogueca/secret.key --template $(srcdir)/rogueca .template59 authority/x509.pem: authority/template authority/secret.key 60 certtool --outfile $@ --generate-self-signed --load-privkey authority/secret.key --template authority/template 61 rogueca/x509.pem: $(srcdir)/rogueca/template rogueca/secret.key 62 certtool --outfile $@ --generate-self-signed --load-privkey rogueca/secret.key --template $(srcdir)/rogueca/template 62 63 63 64 # normal case: certificates signed by test CA 64 %/x509.pem: % .template %/secret.key authority/secret.key authority/x509.pem65 %/x509.pem: %/template %/secret.key authority/secret.key authority/x509.pem 65 66 certtool --outfile $@ --generate-certificate --load-ca-certificate authority/x509.pem --load-ca-privkey authority/secret.key --load-privkey $(dir $@)secret.key --template $< 66 67 67 68 # error case: certificates signed by rogue CA 68 rogue%/x509.pem: rogue% .template rogue%/secret.key rogueca/x509.pem69 rogue%/x509.pem: rogue%/template rogue%/secret.key rogueca/x509.pem 69 70 certtool --outfile $@ --generate-certificate --load-ca-certificate rogueca/x509.pem --load-ca-privkey rogueca/secret.key --load-privkey $(dir $@)secret.key --template $< 70 71 … … 92 93 # GnuTLSProxyCRLFile causes the connection to the back end server to 93 94 # fail. 94 %/crl.pem: %/x509.pem ${srcdir}/% -crl.template95 %/crl.pem: %/x509.pem ${srcdir}/%/crl.template 95 96 certtool --generate-crl \ 96 97 --outfile $@ \ … … 98 99 --load-ca-certificate authority/x509.pem \ 99 100 --load-certificate $< \ 100 --template "${srcdir}/$(*) -crl.template"101 --template "${srcdir}/$(*)/crl.template"
Note: See TracChangeset
for help on using the changeset viewer.