Mercurial > hg > nginx-tests
view secure_link.t @ 1965:84f4d4930835
Tests: relaxed mail_imap_ssl.t cipher matching.
Previously, exact match between cipher name in the log and the one from
IO::Socket:SSL was needed, which might not be the case if nginx and
Net::SSLeay are compiled with different SSL libraries, notably LibreSSL
(which uses names like AEAD-AES256-GCM-SHA384 till 3.5.0), and
OpenSSL or BoringSSL (which use TLS_AES_256_GCM_SHA384). In particular,
this affects macOS, where Net::SSLeay compiled with LibreSSL 3.3.6 is
shipped with the OS, while nginx is likely to be compiled with OpenSSL.
Fix is to not require exact match but instead accept properly looking names
as checked by a regular expression, similarly to how it is already tested
in ssl.t and stream_ssl_variables.t.
author | Maxim Dounin <mdounin@mdounin.ru> |
---|---|
date | Mon, 06 May 2024 00:01:40 +0300 |
parents | 97c8280de681 |
children |
line wrap: on
line source
#!/usr/bin/perl # (C) Maxim Dounin # Tests for nginx secure_link module. ############################################################################### use warnings; use strict; use Test::More; use Digest::MD5 qw/ md5 md5_hex /; use MIME::Base64 qw/ encode_base64 /; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; my $t = Test::Nginx->new()->has(qw/http secure_link rewrite/)->plan(19); $t->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } http { %%TEST_GLOBALS_HTTP%% server { listen 127.0.0.1:8080; server_name localhost; location / { # new style # /test.html?hash=BASE64URL secure_link $arg_hash; secure_link_md5 secret$uri; # invalid hash if ($secure_link = "") { return 403; } # expired if ($secure_link = "0") { return 403; } # $secure_link = "1" } location = /expires.html { # new style with expires # /test.html?hash=BASE64URL&expires=12345678 add_header X-Expires $secure_link_expires; secure_link $arg_hash,$arg_expires; secure_link_md5 secret$uri$arg_expires; # invalid hash if ($secure_link = "") { return 403; } # expired if ($secure_link = "0") { return 403; } # $secure_link = "1" } location /p/ { # old style # /p/d8e8fca2dc0f896fd7cb4cb0031ba249/test.html secure_link_secret secret; if ($secure_link = "") { return 403; } rewrite ^ /$secure_link break; } location /inheritance/ { secure_link_secret secret; location = /inheritance/test { secure_link Xr4ilOzQ4PCOq3aQ0qbuaQ==; secure_link_md5 secret; if ($secure_link = "1") { rewrite ^ /test.html break; } return 403; } } location /stub { return 200 x$secure_link${secure_link_expires}x; } } } EOF $t->write_file('test.html', 'PASSED'); $t->write_file('expires.html', 'PASSED'); $t->run(); ############################################################################### # new style like(http_get('/test.html?hash=q-5vpkjBkRXXtkUMXiJVHA=='), qr/PASSED/, 'request md5'); like(http_get('/test.html?hash=q-5vpkjBkRXXtkUMXiJVHA'), qr/PASSED/, 'request md5 no padding'); like(http_get('/test.html?hash=q-5vpkjBkRXXtkUMXiJVHAQQ'), qr/^HTTP.*403/, 'request md5 too long'); like(http_get('/test.html?hash=q-5vpkjBkRXXtkUMXiJVHA-TOOLONG'), qr/^HTTP.*403/, 'request md5 too long encoding'); like(http_get('/test.html?hash=BADHASHLENGTH'), qr/^HTTP.*403/, 'request md5 decode error'); like(http_get('/test.html?hash=q-5vpkjBkRXXtkUMXiJVHX=='), qr/^HTTP.*403/, 'request md5 mismatch'); like(http_get('/test.html'), qr/^HTTP.*403/, 'request no hash'); # new style with expires my ($expires, $hash); $expires = time() + 86400; $hash = encode_base64url(md5("secret/expires.html$expires")); like(http_get('/expires.html?hash=' . $hash . '&expires=' . $expires), qr/PASSED/, 'request md5 not expired'); like(http_get('/expires.html?hash=' . $hash . '&expires=' . $expires), qr/X-Expires: $expires/, 'secure_link_expires variable'); $expires = time() - 86400; $hash = encode_base64url(md5("secret/expires.html$expires")); like(http_get('/expires.html?hash=' . $hash . '&expires=' . $expires), qr/^HTTP.*403/, 'request md5 expired'); $expires = 0; $hash = encode_base64url(md5("secret/expires.html$expires")); like(http_get('/expires.html?hash=' . $hash . '&expires=' . $expires), qr/^HTTP.*403/, 'request md5 invalid expiration'); # old style like(http_get('/p/' . md5_hex('test.html' . 'secret') . '/test.html'), qr/PASSED/, 'request old style'); like(http_get('/p/' . md5_hex('fake') . '/test.html'), qr/^HTTP.*403/, 'request old style fake hash'); like(http_get('/p/' . 'foo' . '/test.html'), qr/^HTTP.*403/, 'request old style short hash'); like(http_get('/p/' . 'x' x 32 . '/test.html'), qr/^HTTP.*403/, 'request old style corrupt hash'); like(http_get('/p%2f'), qr/^HTTP.*403/, 'request old style bad uri'); like(http_get('/p/test.html'), qr/^HTTP.*403/, 'request old style no hash'); like(http_get('/inheritance/test'), qr/PASSED/, 'inheritance'); like(http_get('/stub'), qr/xx/, 'secure_link not found'); ############################################################################### sub encode_base64url { my $e = encode_base64(shift, ""); $e =~ s/=+\z//; $e =~ tr[+/][-_]; return $e; } ###############################################################################