blob: ff49eeed24326f74aa736a97f10fa3a6f4931537 [file] [log] [blame]
#!/usr/bin/perl
# (C) Sergey Kandaurov
# (C) Nginx, Inc.
# Tests for http ssl module with dynamic certificates.
###############################################################################
use warnings;
use strict;
use Test::More;
use Socket qw/ CRLF /;
BEGIN { use FindBin; chdir($FindBin::Bin); }
use lib 'lib';
use Test::Nginx;
###############################################################################
select STDERR; $| = 1;
select STDOUT; $| = 1;
eval {
require Net::SSLeay;
Net::SSLeay::load_error_strings();
Net::SSLeay::SSLeay_add_ssl_algorithms();
Net::SSLeay::randomize();
};
plan(skip_all => 'Net::SSLeay not installed') if $@;
eval {
my $ctx = Net::SSLeay::CTX_new() or die;
my $ssl = Net::SSLeay::new($ctx) or die;
Net::SSLeay::set_tlsext_host_name($ssl, 'example.org') == 1 or die;
};
plan(skip_all => 'Net::SSLeay with OpenSSL SNI support required') if $@;
my $t = Test::Nginx->new()->has(qw/http http_ssl geo/)
->has_daemon('openssl');
$t->{_configure_args} =~ /OpenSSL ([\d\.]+)/;
plan(skip_all => 'OpenSSL too old') unless defined $1 and $1 ge '1.0.2';
$t->write_file_expand('nginx.conf', <<'EOF');
%%TEST_GLOBALS%%
daemon off;
events {
}
http {
%%TEST_GLOBALS_HTTP%%
geo $one {
default one;
}
geo $two {
default two;
}
geo $pass {
default pass;
}
add_header X-SSL $ssl_server_name:$ssl_session_reused;
ssl_session_cache shared:SSL:1m;
ssl_session_tickets off;
server {
listen 127.0.0.1:8080 ssl;
server_name default;
ssl_certificate $one.crt;
ssl_certificate_key $one.key;
}
server {
listen 127.0.0.1:8080 ssl;
server_name virtual;
# found in key
ssl_certificate $two.crt;
ssl_certificate_key $two.key;
}
server {
listen 127.0.0.1:8080 ssl;
server_name no_ctx;
}
server {
listen 127.0.0.1:8083 ssl;
server_name password;
# found in key
ssl_certificate pass.crt;
ssl_certificate_key $pass.key;
ssl_password_file password_file;
}
server {
listen 127.0.0.1:8081 ssl;
server_name default;
ssl_certificate $one.crt;
ssl_certificate_key $one.key;
}
server {
listen 127.0.0.1:8082 ssl;
server_name default;
ssl_certificate $two.crt;
ssl_certificate_key $two.key;
}
server {
listen 127.0.0.1:8084 ssl;
server_name localhost;
ssl_certificate $ssl_server_name.crt;
ssl_certificate_key $ssl_server_name.key;
}
}
EOF
$t->write_file('openssl.conf', <<EOF);
[ req ]
default_bits = 2048
encrypt_key = no
distinguished_name = req_distinguished_name
[ req_distinguished_name ]
EOF
my $d = $t->testdir();
foreach my $name ('one', 'two') {
system('openssl req -x509 -new '
. "-config $d/openssl.conf -subj /CN=$name/ "
. "-out $d/$name.crt -keyout $d/$name.key "
. ">>$d/openssl.out 2>&1") == 0
or die "Can't create certificate for $name: $!\n";
}
foreach my $name ('pass') {
system("openssl genrsa -out $d/$name.key -passout pass:pass "
. "-aes128 2048 >>$d/openssl.out 2>&1") == 0
or die "Can't create $name key: $!\n";
system("openssl req -x509 -new -config $d/openssl.conf "
. "-subj /CN=$name/ -out $d/$name.crt -key $d/$name.key "
. "-passin pass:pass >>$d/openssl.out 2>&1") == 0
or die "Can't create $name certificate: $!\n";
}
$t->write_file('password_file', 'pass');
$t->write_file('index.html', '');
$t->run()->plan(11);
###############################################################################
like(cert('default', 8080), qr/CN=one/, 'default certificate');
like(get('default', 8080), qr/default/, 'default context');
like(cert('virtual', 8080), qr/CN=two/, 'virtual server certificate');
like(get('virtual', 8080), qr/virtual/, 'virtual server context');
like(cert('no_ctx', 8080), qr/CN=one/, 'certificate - no context');
like(get('no_ctx', 8080), qr/no_ctx/, 'virtual server - no context');
like(get('password', 8083), qr/password/, 'ssl_password_file');
# session reuse
my ($s, $ssl) = get('default', 8080);
my $ses = Net::SSLeay::get_session($ssl);
like(get('default', 8080, $ses), qr/default:r/, 'session reused');
like(get('default', 8081, $ses), qr/default:r/, 'session id context match');
like(get('default', 8082, $ses), qr/default:\./, 'session id context distinct');
# errors
Net::SSLeay::ERR_clear_error();
get_ssl_socket('nx', 8084);
ok(Net::SSLeay::ERR_peek_error(), 'no certificate');
###############################################################################
sub get {
my ($host, $port, $ctx) = @_;
my ($s, $ssl) = get_ssl_socket($host, $port, $ctx) or return;
local $SIG{PIPE} = 'IGNORE';
Net::SSLeay::write($ssl, 'GET / HTTP/1.0' . CRLF . CRLF);
my $r = Net::SSLeay::read($ssl);
Net::SSLeay::shutdown($ssl);
$s->close();
return $r unless wantarray();
return ($s, $ssl);
}
sub cert {
my ($host, $port, $ctx) = @_;
my ($s, $ssl) = get_ssl_socket($host, $port, $ctx) or return;
Net::SSLeay::dump_peer_certificate($ssl);
}
sub get_ssl_socket {
my ($host, $port, $ses) = @_;
my $s = IO::Socket::INET->new('127.0.0.1:' . port($port));
my $ctx = Net::SSLeay::CTX_new() or die("Failed to create SSL_CTX $!");
my $ssl = Net::SSLeay::new($ctx) or die("Failed to create SSL $!");
Net::SSLeay::set_tlsext_host_name($ssl, $host);
Net::SSLeay::set_session($ssl, $ses) if defined $ses;
Net::SSLeay::set_fd($ssl, fileno($s));
Net::SSLeay::connect($ssl);
return ($s, $ssl);
}
###############################################################################