# HG changeset patch # User Sergey Kandaurov # Date 1603455739 -3600 # Node ID 4be791074207be02b68319fb7ab9fae709f0a391 # Parent 8d2d37a4b48efe4efa872b181a25866a8a488547 Tests: proxy_ssl_conf_command tests. diff --git a/proxy_ssl_conf_command.t b/proxy_ssl_conf_command.t new file mode 100644 --- /dev/null +++ b/proxy_ssl_conf_command.t @@ -0,0 +1,95 @@ +#!/usr/bin/perl + +# (C) Sergey Kandaurov +# (C) Nginx, Inc. + +# Tests for http proxy to ssl backend, proxy_ssl_conf_command. + +############################################################################### + +use warnings; +use strict; + +use Test::More; + +BEGIN { use FindBin; chdir($FindBin::Bin); } + +use lib 'lib'; +use Test::Nginx; + +############################################################################### + +select STDERR; $| = 1; +select STDOUT; $| = 1; + +my $t = Test::Nginx->new()->has(qw/http http_ssl proxy/) + ->has_daemon('openssl'); + +$t->write_file_expand('nginx.conf', <<'EOF'); + +%%TEST_GLOBALS%% + +daemon off; + +events { +} + +http { + %%TEST_GLOBALS_HTTP%% + + server { + listen 127.0.0.1:8080; + server_name localhost; + + proxy_ssl_certificate localhost.crt; + proxy_ssl_certificate_key localhost.key; + proxy_ssl_conf_command Certificate override.crt; + proxy_ssl_conf_command PrivateKey override.key; + + location / { + proxy_pass https://127.0.0.1:8081/; + } + } + + server { + listen 127.0.0.1:8081 ssl; + server_name localhost; + + ssl_certificate localhost.crt; + ssl_certificate_key localhost.key; + ssl_verify_client optional_no_ca; + + location / { + add_header X-Cert $ssl_client_s_dn; + } + } +} + +EOF + +$t->write_file('openssl.conf', <testdir(); + +foreach my $name ('localhost', 'override') { + system('openssl req -x509 -new ' + . "-config $d/openssl.conf -subj /CN=$name/ " + . "-out $d/$name.crt -keyout $d/$name.key " + . ">>$d/openssl.out 2>&1") == 0 + or die "Can't create certificate for $name: $!\n"; +} + +$t->write_file('index.html', ''); +$t->try_run('no proxy_ssl_conf_command')->plan(1); + +############################################################################### + +like(http_get('/'), qr/CN=override/, 'Certificate'); + +############################################################################### diff --git a/stream_proxy_ssl_conf_command.t b/stream_proxy_ssl_conf_command.t new file mode 100644 --- /dev/null +++ b/stream_proxy_ssl_conf_command.t @@ -0,0 +1,86 @@ +#!/usr/bin/perl + +# (C) Sergey Kandaurov +# (C) Nginx, Inc. + +# Tests for stream proxy to ssl backend, proxy_ssl_conf_command. + +############################################################################### + +use warnings; +use strict; + +use Test::More; + +BEGIN { use FindBin; chdir($FindBin::Bin); } + +use lib 'lib'; +use Test::Nginx; + +############################################################################### + +select STDERR; $| = 1; +select STDOUT; $| = 1; + +my $t = Test::Nginx->new()->has(qw/stream stream_ssl stream_return/) + ->has_daemon('openssl'); + +$t->write_file_expand('nginx.conf', <<'EOF'); + +%%TEST_GLOBALS%% + +daemon off; + +events { +} + +stream { + server { + listen 127.0.0.1:8080; + proxy_pass 127.0.0.1:8081; + proxy_ssl on; + + proxy_ssl_certificate localhost.crt; + proxy_ssl_certificate_key localhost.key; + proxy_ssl_conf_command Certificate override.crt; + proxy_ssl_conf_command PrivateKey override.key; + } + + server { + listen 127.0.0.1:8081 ssl; + return $ssl_client_s_dn; + + ssl_certificate localhost.crt; + ssl_certificate_key localhost.key; + ssl_verify_client optional_no_ca; + } +} + +EOF + +$t->write_file('openssl.conf', <testdir(); + +foreach my $name ('localhost', 'override') { + system('openssl req -x509 -new ' + . "-config $d/openssl.conf -subj /CN=$name/ " + . "-out $d/$name.crt -keyout $d/$name.key " + . ">>$d/openssl.out 2>&1") == 0 + or die "Can't create certificate for $name: $!\n"; +} + +$t->write_file('index.html', ''); +$t->try_run('no proxy_ssl_conf_command')->plan(1); + +############################################################################### + +like(http_get('/'), qr/CN=override/, 'Certificate'); + +###############################################################################