comparison ssl_stapling.t @ 1867:231b14e2041a

Tests: unbreak ssl_stapling.t after IO::Socket::SSL refactoring. Previously, the test used to check the established SSL/TLS protocol version using Net::SSLeay on the client side. Now it is provided on the server side within a server response. Added missing bits to make this actually work.
author Sergey Kandaurov <pluknet@nginx.com>
date Mon, 22 May 2023 20:44:33 +0400
parents 0e1865aa9b33
children 1ba5108b6c24
comparison
equal deleted inserted replaced
1866:a797d7428fa5 1867:231b14e2041a
54 54
55 ssl_certificate end-int.crt; 55 ssl_certificate end-int.crt;
56 ssl_certificate_key end.key; 56 ssl_certificate_key end.key;
57 57
58 ssl_ciphers DEFAULT:ECCdraft; 58 ssl_ciphers DEFAULT:ECCdraft;
59
60 add_header X-SSL-Protocol $ssl_protocol always;
59 61
60 server { 62 server {
61 listen 127.0.0.1:8443 ssl; 63 listen 127.0.0.1:8443 ssl;
62 listen 127.0.0.1:8080; 64 listen 127.0.0.1:8080;
63 server_name localhost; 65 server_name localhost;
339 return $s unless $s; 341 return $s unless $s;
340 return join ' ', @resp; 342 return join ' ', @resp;
341 } 343 }
342 344
343 sub test_tls13 { 345 sub test_tls13 {
344 return http_get('/', start => 1, SSL => 1) =~ /TLSv1.3/; 346 return http_get('/', SSL => 1) =~ /TLSv1.3/;
345 } 347 }
346 348
347 ############################################################################### 349 ###############################################################################
348 350
349 sub http_daemon { 351 sub http_daemon {