Mercurial > hg > nginx-tests
view h2_ssl_verify_client.t @ 1021:ebdf239722b9
Tests: relaxed proxy_cache_lock.t nolock tests to fix on Solaris.
Assumed that the order of responses being arrived in nolock case may be ignored.
An important part of such case is that the only last response should be cached.
author | Sergey Kandaurov <pluknet@nginx.com> |
---|---|
date | Fri, 02 Sep 2016 12:17:35 +0300 |
parents | 882267679006 |
children | 43eedbfea090 |
line wrap: on
line source
#!/usr/bin/perl # (C) Sergey Kandaurov # (C) Nginx, Inc. # Tests for HTTP/2 protocol with ssl, ssl_verify_client. ############################################################################### use warnings; use strict; use Test::More; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; use Test::Nginx::HTTP2; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; eval { require IO::Socket::SSL; }; plan(skip_all => 'IO::Socket::SSL not installed') if $@; eval { IO::Socket::SSL->can_client_sni() or die; }; plan(skip_all => 'IO::Socket::SSL with OpenSSL SNI support required') if $@; eval { IO::Socket::SSL->can_alpn() or die; }; plan(skip_all => 'OpenSSL ALPN support required') if $@; my $t = Test::Nginx->new()->has(qw/http http_ssl http_v2/) ->has_daemon('openssl')->plan(3); $t->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } http { %%TEST_GLOBALS_HTTP%% ssl_certificate_key localhost.key; ssl_certificate localhost.crt; ssl_verify_client optional_no_ca; add_header X-Verify $ssl_client_verify; server { listen 127.0.0.1:8080 ssl http2; server_name localhost; ssl_client_certificate client.crt; location / { } } server { listen 127.0.0.1:8080 ssl http2; server_name example.com; location / { } } } EOF $t->write_file('openssl.conf', <<EOF); [ req ] default_bits = 2048 encrypt_key = no distinguished_name = req_distinguished_name [ req_distinguished_name ] EOF my $d = $t->testdir(); foreach my $name ('localhost', 'client') { system('openssl req -x509 -new ' . "-config '$d/openssl.conf' -subj '/CN=$name/' " . "-out '$d/$name.crt' -keyout '$d/$name.key' " . ">>$d/openssl.out 2>&1") == 0 or die "Can't create certificate for $name: $!\n"; } $t->write_file('t', 'SEE-THIS'); $t->run(); ############################################################################### is(get('localhost')->{'x-verify'}, 'SUCCESS', 'success'); is(get('example.com')->{'x-verify'}, 'FAILED', 'failed'); # used to be "400 Bad Request" before 654d2dae97d3 (1.11.0) TODO: { local $TODO = 'not yet' unless $t->has_version('1.11.0'); is(get('localhost', 'example.com')->{':status'}, '421', 'misdirected'); } ############################################################################### sub get { my ($sni, $host) = @_; my $s; $host = $sni if !defined $host; eval { local $SIG{ALRM} = sub { die "timeout\n" }; local $SIG{PIPE} = sub { die "sigpipe\n" }; alarm(2); $s = IO::Socket::SSL->new( Proto => 'tcp', PeerAddr => '127.0.0.1', PeerPort => port(8080), SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE(), SSL_alpn_protocols => [ 'h2' ], SSL_hostname => $sni, SSL_cert_file => "$d/client.crt", SSL_key_file => "$d/client.key", SSL_error_trap => sub { die $_[1] } ); alarm(0); }; alarm(0); if ($@) { log_in("died: $@"); return undef; } my $sess = Test::Nginx::HTTP2->new(port(8080), socket => $s); my $sid = $sess->new_stream({ headers => [ { name => ':method', value => 'GET', mode => 0 }, { name => ':scheme', value => 'http', mode => 0 }, { name => ':path', value => '/t', mode => 1 }, { name => ':authority', value => $host, mode => 1 }]}); my $frames = $sess->read(all => [{ sid => $sid, fin => 1 }]); my ($frame) = grep { $_->{type} eq "HEADERS" } @$frames; return $frame->{'headers'}; } ###############################################################################