Mercurial > hg > nginx-tests
view auth_request_satisfy.t @ 1858:cdcd75657e52
Tests: added has_feature() tests for IO::Socket::SSL.
The following distinct features supported:
- "socket_ssl", which requires IO::Socket::SSL and also implies
existance of the IO::Socket::SSL::SSL_VERIFY_NONE() symbol.
It is used by most of the tests.
- "socket_ssl_sni", which requires IO::Socket::SSL with the can_client_sni()
function (1.84), and SNI support available in Net::SSLeay and the OpenSSL
library being used. Used by ssl_sni.t, ssl_sni_sessions.t,
stream_ssl_preread.t. Additional Net::SSLeay testing is believed to be
unneeded and was removed.
- "socket_ssl_alpn", which requires IO::Socket::SSL with ALPN support (2.009),
and ALPN support in Net::SSLeay and the OpenSSL library being used.
Used by h2_ssl.t, h2_ssl_verify_client.t, stream_ssl_alpn.t,
stream_ssl_preread_alpn.t.
- "socket_ssl_sslversion", which requires IO::Socket::SSL with
the get_sslversion() and get_sslversion_int() methods (1.964).
Used by mail_imap_ssl.t.
- "socket_ssl_reused", which requires IO::Socket::SSL with
the get_session_reused() method (2.057). To be used in the following
patches.
This makes it possible to simplify and unify various SSL tests.
author | Maxim Dounin <mdounin@mdounin.ru> |
---|---|
date | Thu, 18 May 2023 18:07:02 +0300 |
parents | 882267679006 |
children |
line wrap: on
line source
#!/usr/bin/perl # (C) Maxim Dounin # Tests for auth request module with satisfy directive. ############################################################################### use warnings; use strict; use Test::More; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; my $t = Test::Nginx->new() ->has(qw/http rewrite access auth_basic auth_request/) ->plan(18); $t->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } http { %%TEST_GLOBALS_HTTP%% server { listen 127.0.0.1:8080; server_name localhost; location / { return 444; } location /all/allow { satisfy all; allow all; auth_request /auth; } location /all/deny { satisfy all; deny all; auth_request /auth; } location /all/basic { satisfy all; auth_basic "restricted"; auth_basic_user_file %%TESTDIR%%/htpasswd; auth_request /auth; } location /any/allow { satisfy any; allow all; auth_request /auth; } location /any/deny { satisfy any; deny all; auth_request /auth; } location /any/basic { satisfy any; auth_basic "restricted"; auth_basic_user_file %%TESTDIR%%/htpasswd; auth_request /auth; } location = /auth { if ($request_uri ~ "open$") { return 204; } if ($request_uri ~ "unauthorized$") { return 401; } if ($request_uri ~ "forbidden$") { return 403; } } } } EOF $t->write_file('htpasswd', 'user:{PLAIN}secret' . "\n"); $t->run(); ############################################################################### # satisfy all - first 401/403 wins like(http_get('/all/allow+open'), qr/ 404 /, 'all allow+open'); like(http_get('/all/allow+unauthorized'), qr/ 401 /, 'all allow+unauthorized'); like(http_get('/all/allow+forbidden'), qr/ 403 /, 'all allow+forbidden'); like(http_get('/all/deny+open'), qr/ 403 /, 'all deny+open'); like(http_get('/all/deny+unauthorized'), qr/ 403 /, 'all deny+unauthorized'); like(http_get('/all/deny+forbidden'), qr/ 403 /, 'all deny+forbidden'); like(http_get('/all/basic+open'), qr/ 401 /, 'all basic+open'); like(http_get('/all/basic+unauthorized'), qr/ 401 /, 'all basic+unauthorized'); like(http_get('/all/basic+forbidden'), qr/ 401 /, 'all basic+forbidden'); # satisfy any - first ok wins # additionally, 403 shouldn't override 401 status like(http_get('/any/allow+open'), qr/ 404 /, 'any allow+open'); like(http_get('/any/allow+unauthorized'), qr/ 404 /, 'any allow+unauthorized'); like(http_get('/any/allow+forbidden'), qr/ 404 /, 'any allow+forbidden'); like(http_get('/any/deny+open'), qr/ 404 /, 'any deny+open'); like(http_get('/any/deny+unauthorized'), qr/ 401 /, 'any deny+unauthorized'); like(http_get('/any/deny+forbidden'), qr/ 403 /, 'any deny+forbidden'); like(http_get('/any/basic+open'), qr/ 404 /, 'any basic+open'); like(http_get('/any/basic+unauthorized'), qr/ 401 /, 'any basic+unauthorized'); like(http_get('/any/basic+forbidden'), qr/ 401 /, 'any basic+forbidden'); ###############################################################################