diff proxy_ssl_verify.t @ 393:3c9aeeb09ac8

Tests: proxy_ssl_name and proxy_ssl_verify tests.
author Maxim Dounin <mdounin@mdounin.ru>
date Fri, 18 Apr 2014 18:42:33 +0400
parents
children 907e89fba9c3
line wrap: on
line diff
new file mode 100644
--- /dev/null
+++ b/proxy_ssl_verify.t
@@ -0,0 +1,166 @@
+#!/usr/bin/perl
+
+# (C) Maxim Dounin
+# (C) Nginx, Inc.
+
+# Tests for proxy to ssl backend, backend certificate verification.
+
+###############################################################################
+
+use warnings;
+use strict;
+
+use Test::More;
+
+BEGIN { use FindBin; chdir($FindBin::Bin); }
+
+use lib 'lib';
+use Test::Nginx;
+
+###############################################################################
+
+select STDERR; $| = 1;
+select STDOUT; $| = 1;
+
+my $t = Test::Nginx->new()->has(qw/http http_ssl proxy/)
+	->has_daemon('openssl')
+	->write_file_expand('nginx.conf', <<'EOF');
+
+%%TEST_GLOBALS%%
+
+daemon off;
+
+events {
+}
+
+http {
+    %%TEST_GLOBALS_HTTP%%
+
+    server {
+        listen       127.0.0.1:8080;
+        server_name  localhost;
+
+        location /verify {
+            proxy_pass https://127.0.0.1:8081/;
+            proxy_ssl_name example.com;
+            proxy_ssl_verify on;
+            proxy_ssl_trusted_certificate 1.example.com.crt;
+        }
+
+        location /wildcard {
+            proxy_pass https://127.0.0.1:8081/;
+            proxy_ssl_name foo.example.com;
+            proxy_ssl_verify on;
+            proxy_ssl_trusted_certificate 1.example.com.crt;
+        }
+
+        location /fail {
+            proxy_pass https://127.0.0.1:8081/;
+            proxy_ssl_name no.match.example.com;
+            proxy_ssl_verify on;
+            proxy_ssl_trusted_certificate 1.example.com.crt;
+        }
+
+        location /cn {
+            proxy_pass https://127.0.0.1:8082/;
+            proxy_ssl_name 2.example.com;
+            proxy_ssl_verify on;
+            proxy_ssl_trusted_certificate 2.example.com.crt;
+        }
+
+        location /cn/fail {
+            proxy_pass https://127.0.0.1:8082/;
+            proxy_ssl_name bad.example.com;
+            proxy_ssl_verify on;
+            proxy_ssl_trusted_certificate 2.example.com.crt;
+        }
+
+        location /untrusted {
+            proxy_pass https://127.0.0.1:8082/;
+            proxy_ssl_verify on;
+            proxy_ssl_trusted_certificate 1.example.com.crt;
+            proxy_ssl_session_reuse off;
+        }
+    }
+
+    server {
+        listen 127.0.0.1:8081 ssl;
+        server_name 1.example.com;
+
+        ssl_certificate 1.example.com.crt;
+        ssl_certificate_key 1.example.com.key;
+
+        add_header X-Name $ssl_server_name;
+    }
+
+    server {
+        listen 127.0.0.1:8082 ssl;
+        server_name 2.example.com;
+
+        ssl_certificate 2.example.com.crt;
+        ssl_certificate_key 2.example.com.key;
+
+        add_header X-Name $ssl_server_name;
+    }
+}
+
+EOF
+
+$t->write_file('openssl.1.example.com.conf', <<EOF);
+[ req ]
+prompt = no
+default_bits = 1024
+encrypt_key = no
+distinguished_name = req_distinguished_name
+x509_extensions = v3_req
+
+[ req_distinguished_name ]
+commonName=no.match.example.com
+
+[ v3_req ]
+subjectAltName = DNS:example.com,DNS:*.example.com
+EOF
+
+$t->write_file('openssl.2.example.com.conf', <<EOF);
+[ req ]
+prompt = no
+default_bits = 1024
+encrypt_key = no
+distinguished_name = req_distinguished_name
+
+[ req_distinguished_name ]
+commonName=2.example.com
+EOF
+
+my $d = $t->testdir();
+
+foreach my $name ('1.example.com', '2.example.com') {
+	system('openssl req -x509 -new '
+		. "-config '$d/openssl.$name.conf' "
+		. "-out '$d/$name.crt' -keyout '$d/$name.key' "
+		. ">>$d/openssl.out 2>&1") == 0
+		or die "Can't create certificate for $name: $!\n";
+}
+
+$t->write_file('index.html', '');
+
+$t->try_run('no proxy_ssl_verify')->plan(6);
+
+###############################################################################
+
+# subjectAltName
+
+like(http_get('/verify'), qr/200 OK/ms, 'verify');
+like(http_get('/wildcard'), qr/200 OK/ms, 'verify wildcard');
+like(http_get('/fail'), qr/502 Bad/ms, 'verify fail');
+
+# commonName
+
+like(http_get('/cn'), qr/200 OK/ms, 'verify cn');
+like(http_get('/cn/fail'), qr/502 Bad/ms, 'verify cn fail');
+
+# untrusted
+
+like(http_get('/untrusted'), qr/502 Bad/ms, 'untrusted');
+
+###############################################################################