# HG changeset patch # User Sergey Kandaurov # Date 1551199507 -10800 # Node ID 7c217d343d1ee8f2e4eb06821d6ee6cec266d621 # Parent 4281225b0c527457db27a972be159f98756e190b Tests: ssl tests with dynamic certificates. diff --git a/ssl_certificate.t b/ssl_certificate.t new file mode 100644 --- /dev/null +++ b/ssl_certificate.t @@ -0,0 +1,219 @@ +#!/usr/bin/perl + +# (C) Sergey Kandaurov +# (C) Nginx, Inc. + +# Tests for http ssl module with dynamic certificates. + +############################################################################### + +use warnings; +use strict; + +use Test::More; + +use Socket qw/ :DEFAULT CRLF /; + +BEGIN { use FindBin; chdir($FindBin::Bin); } + +use lib 'lib'; +use Test::Nginx; + +############################################################################### + +select STDERR; $| = 1; +select STDOUT; $| = 1; + +eval { + require Net::SSLeay; + Net::SSLeay::load_error_strings(); + Net::SSLeay::SSLeay_add_ssl_algorithms(); + Net::SSLeay::randomize(); +}; +plan(skip_all => 'Net::SSLeay not installed') if $@; + +eval { + my $ctx = Net::SSLeay::CTX_new() or die; + my $ssl = Net::SSLeay::new($ctx) or die; + Net::SSLeay::set_tlsext_host_name($ssl, 'example.org') == 1 or die; +}; +plan(skip_all => 'Net::SSLeay with OpenSSL SNI support required') if $@; + +my $t = Test::Nginx->new()->has(qw/http http_ssl geo/) + ->has_daemon('openssl'); + +$t->{_configure_args} =~ /OpenSSL ([\d\.]+)/; +plan(skip_all => 'OpenSSL too old') unless defined $1 and $1 ge '1.0.2'; + +$t->write_file_expand('nginx.conf', <<'EOF'); + +%%TEST_GLOBALS%% + +daemon off; + +events { +} + +http { + %%TEST_GLOBALS_HTTP%% + + geo $one { + default one; + } + + geo $two { + default two; + } + + geo $pass { + default pass; + } + + add_header X-SSL $ssl_server_name:$ssl_session_reused; + ssl_session_cache shared:SSL:1m; + ssl_session_tickets off; + + server { + listen 127.0.0.1:8080 ssl; + server_name default; + + ssl_certificate $one.crt; + ssl_certificate_key $one.key; + } + + server { + listen 127.0.0.1:8080 ssl; + server_name virtual; + + # found in key + ssl_certificate $two.crt; + ssl_certificate_key $two.key; + } + + server { + listen 127.0.0.1:8080 ssl; + server_name no_ctx; + } + + server { + listen 127.0.0.1:8083 ssl; + server_name password; + + # found in key + ssl_certificate pass.crt; + ssl_certificate_key $pass.key; + ssl_password_file password_file; + } + + server { + listen 127.0.0.1:8081 ssl; + server_name default; + + ssl_certificate $one.crt; + ssl_certificate_key $one.key; + } + + server { + listen 127.0.0.1:8082 ssl; + server_name default; + + ssl_certificate $two.crt; + ssl_certificate_key $two.key; + } +} + +EOF + +$t->write_file('openssl.conf', <testdir(); + +foreach my $name ('one', 'two') { + system('openssl req -x509 -new ' + . "-config $d/openssl.conf -subj /CN=$name/ " + . "-out $d/$name.crt -keyout $d/$name.key " + . ">>$d/openssl.out 2>&1") == 0 + or die "Can't create certificate for $name: $!\n"; +} + +foreach my $name ('pass') { + system("openssl genrsa -out $d/$name.key -passout pass:pass " + . "-aes128 1024 >>$d/openssl.out 2>&1") == 0 + or die "Can't create $name key: $!\n"; + system("openssl req -x509 -new -config $d/openssl.conf " + . "-subj /CN=$name/ -out $d/$name.crt -key $d/$name.key " + . "-passin pass:pass >>$d/openssl.out 2>&1") == 0 + or die "Can't create $name certificate: $!\n"; +} + +$t->write_file('password_file', 'pass'); +$t->write_file('index.html', ''); + +$t->try_run('no ssl_certificate variables')->plan(10); + +############################################################################### + +like(cert('default', 8080), qr/CN=one/, 'default certificate'); +like(get('default', 8080), qr/default/, 'default context'); + +like(cert('virtual', 8080), qr/CN=two/, 'virtual server certificate'); +like(get('virtual', 8080), qr/virtual/, 'virtual server context'); + +like(cert('no_ctx', 8080), qr/CN=one/, 'certificate - no context'); +like(get('no_ctx', 8080), qr/no_ctx/, 'virtual server - no context'); + +like(get('password', 8083), qr/password/, 'ssl_password_file'); + +# session reuse + +my ($s, $ssl) = get_ssl_socket('default', 8080); +my $ses = Net::SSLeay::get_session($ssl); + +like(get('default', 8080, $ses), qr/default:r/, 'session reused'); +like(get('default', 8081, $ses), qr/default:r/, 'session id context match'); +like(get('default', 8082, $ses), qr/default:\./, 'session id context distinct'); + +############################################################################### + +sub get { + my ($host, $port, $ctx) = @_; + my ($s, $ssl) = get_ssl_socket($host, $port, $ctx) or return; + Net::SSLeay::write($ssl, 'GET / HTTP/1.0' . CRLF . CRLF); + my $r = Net::SSLeay::read($ssl); + $s->close(); + return $r; +} + +sub cert { + my ($host, $port, $ctx) = @_; + my ($s, $ssl) = get_ssl_socket($host, $port, $ctx) or return; + Net::SSLeay::dump_peer_certificate($ssl); +} + +sub get_ssl_socket { + my ($host, $port, $ses) = @_; + my $s; + + my $dest_ip = inet_aton('127.0.0.1'); + $port = port($port); + my $dest_serv_params = sockaddr_in($port, $dest_ip); + + socket($s, &AF_INET, &SOCK_STREAM, 0) or die "socket: $!"; + connect($s, $dest_serv_params) or die "connect: $!"; + + my $ctx = Net::SSLeay::CTX_new() or die("Failed to create SSL_CTX $!"); + my $ssl = Net::SSLeay::new($ctx) or die("Failed to create SSL $!"); + Net::SSLeay::set_tlsext_host_name($ssl, $host); + Net::SSLeay::set_session($ssl, $ses) if defined $ses; + Net::SSLeay::set_fd($ssl, fileno($s)); + Net::SSLeay::connect($ssl) or die("ssl connect"); + return ($s, $ssl); +} + +############################################################################### diff --git a/stream_ssl_certificate.t b/stream_ssl_certificate.t new file mode 100644 --- /dev/null +++ b/stream_ssl_certificate.t @@ -0,0 +1,199 @@ +#!/usr/bin/perl + +# (C) Sergey Kandaurov +# (C) Nginx, Inc. + +# Tests for stream ssl module with dynamic certificates. + +############################################################################### + +use warnings; +use strict; + +use Test::More; + +use Socket qw/ :DEFAULT CRLF /; + +BEGIN { use FindBin; chdir($FindBin::Bin); } + +use lib 'lib'; +use Test::Nginx; + +############################################################################### + +select STDERR; $| = 1; +select STDOUT; $| = 1; + +eval { + require Net::SSLeay; + Net::SSLeay::load_error_strings(); + Net::SSLeay::SSLeay_add_ssl_algorithms(); + Net::SSLeay::randomize(); +}; +plan(skip_all => 'Net::SSLeay not installed') if $@; + +eval { + my $ctx = Net::SSLeay::CTX_new() or die; + my $ssl = Net::SSLeay::new($ctx) or die; + Net::SSLeay::set_tlsext_host_name($ssl, 'example.org') == 1 or die; +}; +plan(skip_all => 'Net::SSLeay with OpenSSL SNI support required') if $@; + +my $t = Test::Nginx->new()->has(qw/stream stream_ssl stream_geo stream_return/) + ->has_daemon('openssl'); + +$t->{_configure_args} =~ /OpenSSL ([\d\.]+)/; +plan(skip_all => 'OpenSSL too old') unless defined $1 and $1 ge '1.0.2'; + +$t->write_file_expand('nginx.conf', <<'EOF'); + +%%TEST_GLOBALS%% + +daemon off; + +events { +} + +stream { + geo $one { + default one; + } + + geo $two { + default two; + } + + geo $pass { + default pass; + } + + ssl_session_cache shared:SSL:1m; + ssl_session_tickets off; + + server { + listen 127.0.0.1:8080 ssl; + return $ssl_server_name:$ssl_session_reused; + + ssl_certificate $one.crt; + ssl_certificate_key $one.key; + } + + server { + listen 127.0.0.1:8083 ssl; + return $ssl_server_name:$ssl_session_reused; + + # found in key + ssl_certificate pass.crt; + ssl_certificate_key $pass.key; + ssl_password_file password_file; + } + + server { + listen 127.0.0.1:8081 ssl; + return $ssl_server_name:$ssl_session_reused; + + ssl_certificate $one.crt; + ssl_certificate_key $one.key; + } + + server { + listen 127.0.0.1:8082 ssl; + return $ssl_server_name:$ssl_session_reused; + + ssl_certificate $two.crt; + ssl_certificate_key $two.key; + } +} + +EOF + +$t->write_file('openssl.conf', <testdir(); + +foreach my $name ('one', 'two') { + system('openssl req -x509 -new ' + . "-config $d/openssl.conf -subj /CN=$name/ " + . "-out $d/$name.crt -keyout $d/$name.key " + . ">>$d/openssl.out 2>&1") == 0 + or die "Can't create certificate for $name: $!\n"; +} + +foreach my $name ('pass') { + system("openssl genrsa -out $d/$name.key -passout pass:pass " + . "-aes128 1024 >>$d/openssl.out 2>&1") == 0 + or die "Can't create $name key: $!\n"; + system("openssl req -x509 -new -config $d/openssl.conf " + . "-subj /CN=$name/ -out $d/$name.crt -key $d/$name.key " + . "-passin pass:pass >>$d/openssl.out 2>&1") == 0 + or die "Can't create $name certificate: $!\n"; +} + +$t->write_file('password_file', 'pass'); +$t->write_file('index.html', ''); + +$t->try_run('no ssl_certificate variables')->plan(6); + +############################################################################### + +like(cert('default', 8080), qr/CN=one/, 'default certificate'); +like(get('default', 8080), qr/default/, 'default context'); + +like(get('password', 8083), qr/password/, 'ssl_password_file'); + +# session reuse + +my ($s, $ssl) = get_ssl_socket('default', 8080); +my $ses = Net::SSLeay::get_session($ssl); + +like(get('default', 8080, $ses), qr/:r/, 'session reused'); + +# do not check $ssl_server_name, since stream doesn't install SNI callback +# see for more details: https://github.com/openssl/openssl/issues/7014 + +like(get('default', 8081, $ses), qr/:r/, 'session id context match'); +like(get('default', 8082, $ses), qr/:\./, 'session id context distinct'); + +############################################################################### + +sub get { + my ($host, $port, $ctx) = @_; + my ($s, $ssl) = get_ssl_socket($host, $port, $ctx) or return; + my $r = Net::SSLeay::read($ssl); + $s->close(); + return $r; +} + +sub cert { + my ($host, $port, $ctx) = @_; + my ($s, $ssl) = get_ssl_socket($host, $port, $ctx) or return; + Net::SSLeay::dump_peer_certificate($ssl); +} + +sub get_ssl_socket { + my ($host, $port, $ses) = @_; + my $s; + + my $dest_ip = inet_aton('127.0.0.1'); + $port = port($port); + my $dest_serv_params = sockaddr_in($port, $dest_ip); + + socket($s, &AF_INET, &SOCK_STREAM, 0) or die "socket: $!"; + connect($s, $dest_serv_params) or die "connect: $!"; + + my $ctx = Net::SSLeay::CTX_new() or die("Failed to create SSL_CTX $!"); + my $ssl = Net::SSLeay::new($ctx) or die("Failed to create SSL $!"); + Net::SSLeay::set_tlsext_host_name($ssl, $host); + Net::SSLeay::set_session($ssl, $ses) if defined $ses; + Net::SSLeay::set_fd($ssl, fileno($s)); + Net::SSLeay::connect($ssl) or die("ssl connect"); + return ($s, $ssl); +} + +###############################################################################