| #!/usr/bin/perl |
| |
| # (C) Sergey Kandaurov |
| # (C) Nginx, Inc. |
| |
| # Tests for http ssl module with dynamic certificates. |
| |
| ############################################################################### |
| |
| use warnings; |
| use strict; |
| |
| use Test::More; |
| |
| use Socket qw/ CRLF /; |
| |
| BEGIN { use FindBin; chdir($FindBin::Bin); } |
| |
| use lib 'lib'; |
| use Test::Nginx; |
| |
| ############################################################################### |
| |
| select STDERR; $| = 1; |
| select STDOUT; $| = 1; |
| |
| eval { |
| require Net::SSLeay; |
| Net::SSLeay::load_error_strings(); |
| Net::SSLeay::SSLeay_add_ssl_algorithms(); |
| Net::SSLeay::randomize(); |
| }; |
| plan(skip_all => 'Net::SSLeay not installed') if $@; |
| |
| eval { |
| my $ctx = Net::SSLeay::CTX_new() or die; |
| my $ssl = Net::SSLeay::new($ctx) or die; |
| Net::SSLeay::set_tlsext_host_name($ssl, 'example.org') == 1 or die; |
| }; |
| plan(skip_all => 'Net::SSLeay with OpenSSL SNI support required') if $@; |
| |
| my $t = Test::Nginx->new()->has(qw/http http_ssl geo/) |
| ->has_daemon('openssl'); |
| |
| $t->{_configure_args} =~ /OpenSSL ([\d\.]+)/; |
| plan(skip_all => 'OpenSSL too old') unless defined $1 and $1 ge '1.0.2'; |
| |
| $t->write_file_expand('nginx.conf', <<'EOF'); |
| |
| %%TEST_GLOBALS%% |
| |
| daemon off; |
| |
| events { |
| } |
| |
| http { |
| %%TEST_GLOBALS_HTTP%% |
| |
| geo $one { |
| default one; |
| } |
| |
| geo $two { |
| default two; |
| } |
| |
| geo $pass { |
| default pass; |
| } |
| |
| add_header X-SSL $ssl_server_name:$ssl_session_reused; |
| ssl_session_cache shared:SSL:1m; |
| ssl_session_tickets off; |
| |
| server { |
| listen 127.0.0.1:8080 ssl; |
| server_name default; |
| |
| ssl_certificate $one.crt; |
| ssl_certificate_key $one.key; |
| } |
| |
| server { |
| listen 127.0.0.1:8080 ssl; |
| server_name virtual; |
| |
| # found in key |
| ssl_certificate $two.crt; |
| ssl_certificate_key $two.key; |
| } |
| |
| server { |
| listen 127.0.0.1:8080 ssl; |
| server_name no_ctx; |
| } |
| |
| server { |
| listen 127.0.0.1:8083 ssl; |
| server_name password; |
| |
| # found in key |
| ssl_certificate pass.crt; |
| ssl_certificate_key $pass.key; |
| ssl_password_file password_file; |
| } |
| |
| server { |
| listen 127.0.0.1:8081 ssl; |
| server_name default; |
| |
| ssl_certificate $one.crt; |
| ssl_certificate_key $one.key; |
| } |
| |
| server { |
| listen 127.0.0.1:8082 ssl; |
| server_name default; |
| |
| ssl_certificate $two.crt; |
| ssl_certificate_key $two.key; |
| } |
| |
| server { |
| listen 127.0.0.1:8084 ssl; |
| server_name localhost; |
| |
| ssl_certificate $ssl_server_name.crt; |
| ssl_certificate_key $ssl_server_name.key; |
| } |
| } |
| |
| EOF |
| |
| $t->write_file('openssl.conf', <<EOF); |
| [ req ] |
| default_bits = 2048 |
| encrypt_key = no |
| distinguished_name = req_distinguished_name |
| [ req_distinguished_name ] |
| EOF |
| |
| my $d = $t->testdir(); |
| |
| foreach my $name ('one', 'two') { |
| system('openssl req -x509 -new ' |
| . "-config $d/openssl.conf -subj /CN=$name/ " |
| . "-out $d/$name.crt -keyout $d/$name.key " |
| . ">>$d/openssl.out 2>&1") == 0 |
| or die "Can't create certificate for $name: $!\n"; |
| } |
| |
| foreach my $name ('pass') { |
| system("openssl genrsa -out $d/$name.key -passout pass:pass " |
| . "-aes128 2048 >>$d/openssl.out 2>&1") == 0 |
| or die "Can't create $name key: $!\n"; |
| system("openssl req -x509 -new -config $d/openssl.conf " |
| . "-subj /CN=$name/ -out $d/$name.crt -key $d/$name.key " |
| . "-passin pass:pass >>$d/openssl.out 2>&1") == 0 |
| or die "Can't create $name certificate: $!\n"; |
| } |
| |
| $t->write_file('password_file', 'pass'); |
| $t->write_file('index.html', ''); |
| |
| $t->run()->plan(11); |
| |
| ############################################################################### |
| |
| like(cert('default', 8080), qr/CN=one/, 'default certificate'); |
| like(get('default', 8080), qr/default/, 'default context'); |
| |
| like(cert('virtual', 8080), qr/CN=two/, 'virtual server certificate'); |
| like(get('virtual', 8080), qr/virtual/, 'virtual server context'); |
| |
| like(cert('no_ctx', 8080), qr/CN=one/, 'certificate - no context'); |
| like(get('no_ctx', 8080), qr/no_ctx/, 'virtual server - no context'); |
| |
| like(get('password', 8083), qr/password/, 'ssl_password_file'); |
| |
| # session reuse |
| |
| my ($s, $ssl) = get('default', 8080); |
| my $ses = Net::SSLeay::get_session($ssl); |
| |
| like(get('default', 8080, $ses), qr/default:r/, 'session reused'); |
| like(get('default', 8081, $ses), qr/default:r/, 'session id context match'); |
| like(get('default', 8082, $ses), qr/default:\./, 'session id context distinct'); |
| |
| # errors |
| |
| Net::SSLeay::ERR_clear_error(); |
| get_ssl_socket('nx', 8084); |
| ok(Net::SSLeay::ERR_peek_error(), 'no certificate'); |
| |
| ############################################################################### |
| |
| sub get { |
| my ($host, $port, $ctx) = @_; |
| my ($s, $ssl) = get_ssl_socket($host, $port, $ctx) or return; |
| |
| local $SIG{PIPE} = 'IGNORE'; |
| |
| Net::SSLeay::write($ssl, 'GET / HTTP/1.0' . CRLF . CRLF); |
| my $r = Net::SSLeay::read($ssl); |
| Net::SSLeay::shutdown($ssl); |
| $s->close(); |
| return $r unless wantarray(); |
| return ($s, $ssl); |
| } |
| |
| sub cert { |
| my ($host, $port, $ctx) = @_; |
| my ($s, $ssl) = get_ssl_socket($host, $port, $ctx) or return; |
| Net::SSLeay::dump_peer_certificate($ssl); |
| } |
| |
| sub get_ssl_socket { |
| my ($host, $port, $ses) = @_; |
| |
| my $s = IO::Socket::INET->new('127.0.0.1:' . port($port)); |
| my $ctx = Net::SSLeay::CTX_new() or die("Failed to create SSL_CTX $!"); |
| my $ssl = Net::SSLeay::new($ctx) or die("Failed to create SSL $!"); |
| Net::SSLeay::set_tlsext_host_name($ssl, $host); |
| Net::SSLeay::set_session($ssl, $ses) if defined $ses; |
| Net::SSLeay::set_fd($ssl, fileno($s)); |
| Net::SSLeay::connect($ssl); |
| return ($s, $ssl); |
| } |
| |
| ############################################################################### |