mirror of
https://github.com/apache/httpd.git
synced 2025-07-25 16:11:32 +00:00

[Daniel McCarney (@cpu}] git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1917270 13f79535-47bb-0310-9956-ffa450edef68
124 lines
4.9 KiB
Python
124 lines
4.9 KiB
Python
import re
|
|
import pytest
|
|
|
|
from .conf import TlsTestConf
|
|
from pyhttpd.env import HttpdTestEnv
|
|
|
|
|
|
class TestProxySSL:
|
|
|
|
@pytest.fixture(autouse=True, scope='class')
|
|
def _class_scope(self, env):
|
|
# add vhosts a+b and a ssl proxy from a to b
|
|
if not HttpdTestEnv.has_shared_module("tls"):
|
|
myoptions="SSLOptions +StdEnvVars"
|
|
myssl="mod_ssl"
|
|
else:
|
|
myoptions="TLSOptions +StdEnvVars"
|
|
myssl="mod_tls"
|
|
conf = TlsTestConf(env=env, extras={
|
|
'base': [
|
|
"LogLevel proxy:trace1 proxy_http:trace1 ssl:trace1 proxy_http2:trace1",
|
|
f"<Proxy https://127.0.0.1:{env.https_port}/>",
|
|
" SSLProxyEngine on",
|
|
" SSLProxyVerify require",
|
|
f" SSLProxyCACertificateFile {env.ca.cert_file}",
|
|
" ProxyPreserveHost on",
|
|
"</Proxy>",
|
|
f"<Proxy https://localhost:{env.https_port}/>",
|
|
" ProxyPreserveHost on",
|
|
"</Proxy>",
|
|
f"<Proxy h2://127.0.0.1:{env.https_port}/>",
|
|
" SSLProxyEngine on",
|
|
" SSLProxyVerify require",
|
|
f" SSLProxyCACertificateFile {env.ca.cert_file}",
|
|
" ProxyPreserveHost on",
|
|
"</Proxy>",
|
|
],
|
|
env.domain_b: [
|
|
"Protocols h2 http/1.1",
|
|
f'ProxyPass /proxy-ssl/ https://127.0.0.1:{env.https_port}/',
|
|
f'ProxyPass /proxy-local/ https://localhost:{env.https_port}/',
|
|
f'ProxyPass /proxy-h2-ssl/ h2://127.0.0.1:{env.https_port}/',
|
|
myoptions,
|
|
],
|
|
})
|
|
conf.add_tls_vhosts(domains=[env.domain_a, env.domain_b], ssl_module=myssl)
|
|
conf.install()
|
|
assert env.apache_restart() == 0
|
|
|
|
def test_tls_14_proxy_ssl_get(self, env):
|
|
data = env.tls_get_json(env.domain_b, "/proxy-ssl/index.json")
|
|
assert data == {'domain': env.domain_b}
|
|
|
|
def test_tls_14_proxy_ssl_get_local(self, env):
|
|
# does not work, since SSLProxy* not configured
|
|
data = env.tls_get_json(env.domain_b, "/proxy-local/index.json")
|
|
assert data is None
|
|
#
|
|
env.httpd_error_log.ignore_recent(
|
|
lognos = [
|
|
"AH01961", # failed to enable ssl support [Hint: if using mod_ssl, see SSLProxyEngine]
|
|
"AH00961" # failed to enable ssl support (mod_proxy)
|
|
]
|
|
)
|
|
|
|
def test_tls_14_proxy_ssl_h2_get(self, env):
|
|
r = env.tls_get(env.domain_b, "/proxy-h2-ssl/index.json")
|
|
assert r.exit_code == 0
|
|
assert r.json == {'domain': env.domain_b}
|
|
|
|
@pytest.mark.parametrize("name, value", [
|
|
("SERVER_NAME", "b.mod-tls.test"),
|
|
("SSL_SESSION_RESUMED", "Initial"),
|
|
("SSL_SECURE_RENEG", "false"),
|
|
("SSL_COMPRESS_METHOD", "NULL"),
|
|
("SSL_CIPHER_EXPORT", "false"),
|
|
("SSL_CLIENT_VERIFY", "NONE"),
|
|
])
|
|
def test_tls_14_proxy_tsl_vars_const(self, env, name: str, value: str):
|
|
if not HttpdTestEnv.has_shared_module("tls"):
|
|
return
|
|
r = env.tls_get(env.domain_b, f"/proxy-ssl/vars.py?name={name}")
|
|
assert r.exit_code == 0, r.stderr
|
|
assert r.json == {name: value}, r.stdout
|
|
|
|
@pytest.mark.parametrize("name, value", [
|
|
("SERVER_NAME", "b.mod-tls.test"),
|
|
("SSL_SESSION_RESUMED", "Initial"),
|
|
("SSL_SECURE_RENEG", "true"),
|
|
("SSL_COMPRESS_METHOD", "NULL"),
|
|
("SSL_CIPHER_EXPORT", "false"),
|
|
("SSL_CLIENT_VERIFY", "NONE"),
|
|
])
|
|
def test_tls_14_proxy_ssl_vars_const(self, env, name: str, value: str):
|
|
if HttpdTestEnv.has_shared_module("tls"):
|
|
return
|
|
r = env.tls_get(env.domain_b, f"/proxy-ssl/vars.py?name={name}")
|
|
assert r.exit_code == 0, r.stderr
|
|
assert r.json == {name: value}, r.stdout
|
|
|
|
@pytest.mark.parametrize("name, pattern", [
|
|
("SSL_VERSION_INTERFACE", r'mod_tls/\d+\.\d+\.\d+'),
|
|
("SSL_VERSION_LIBRARY", r'rustls-ffi/\d+\.\d+\.\d+/rustls/\d+\.\d+(\.\d+)?'),
|
|
])
|
|
def test_tls_14_proxy_tsl_vars_match(self, env, name: str, pattern: str):
|
|
if not HttpdTestEnv.has_shared_module("tls"):
|
|
return
|
|
r = env.tls_get(env.domain_b, f"/proxy-ssl/vars.py?name={name}")
|
|
assert r.exit_code == 0, r.stderr
|
|
assert name in r.json
|
|
assert re.match(pattern, r.json[name]), r.json
|
|
|
|
@pytest.mark.parametrize("name, pattern", [
|
|
("SSL_VERSION_INTERFACE", r'mod_ssl/\d+\.\d+\.\d+'),
|
|
("SSL_VERSION_LIBRARY", r'OpenSSL/\d+\.\d+\.\d+'),
|
|
])
|
|
def test_tls_14_proxy_ssl_vars_match(self, env, name: str, pattern: str):
|
|
if HttpdTestEnv.has_shared_module("tls"):
|
|
return
|
|
r = env.tls_get(env.domain_b, f"/proxy-ssl/vars.py?name={name}")
|
|
assert r.exit_code == 0, r.stderr
|
|
assert name in r.json
|
|
assert re.match(pattern, r.json[name]), r.json
|