After the launch of the project, the testing infrastructure was shared with nginx project in some cases. To avoid port overlap, a decision was made to shift the port range for Unit tests. This problem was resolved a long time ago and is no longer relevant, so it is now safe to use port 8XXX range as the default, as it is more appropriate for testing purposes.
301 lines
8.3 KiB
Python
301 lines
8.3 KiB
Python
import ssl
|
|
import subprocess
|
|
|
|
import pytest
|
|
from unit.applications.tls import ApplicationTLS
|
|
from unit.option import option
|
|
|
|
prerequisites = {'modules': {'openssl': 'any'}}
|
|
|
|
client = ApplicationTLS()
|
|
|
|
|
|
@pytest.fixture(autouse=True)
|
|
def setup_method_fixture():
|
|
assert 'success' in client.conf(
|
|
{
|
|
"listeners": {"*:8080": {"pass": "routes"}},
|
|
"routes": [{"action": {"return": 200}}],
|
|
"applications": {},
|
|
}
|
|
)
|
|
|
|
|
|
def add_tls(cert='default'):
|
|
assert 'success' in client.conf(
|
|
{"pass": "routes", "tls": {"certificate": cert}},
|
|
'listeners/*:8080',
|
|
)
|
|
|
|
|
|
def check_cert(host, expect, ctx):
|
|
resp, sock = client.get_ssl(
|
|
headers={
|
|
'Host': host,
|
|
'Content-Length': '0',
|
|
'Connection': 'close',
|
|
},
|
|
start=True,
|
|
context=ctx,
|
|
)
|
|
|
|
assert resp['status'] == 200
|
|
assert sock.getpeercert()['subject'][0][0][1] == expect
|
|
|
|
|
|
def config_bundles(bundles):
|
|
client.certificate('root', False)
|
|
|
|
for b in bundles:
|
|
client.openssl_conf(rewrite=True, alt_names=bundles[b]['alt_names'])
|
|
subj = f'/CN={bundles[b]["subj"]}/' if 'subj' in bundles[b] else '/'
|
|
|
|
subprocess.check_output(
|
|
[
|
|
'openssl',
|
|
'req',
|
|
'-new',
|
|
'-subj',
|
|
subj,
|
|
'-config',
|
|
f'{option.temp_dir}/openssl.conf',
|
|
'-out',
|
|
f'{option.temp_dir}/{b}.csr',
|
|
'-keyout',
|
|
f'{option.temp_dir}/{b}.key',
|
|
],
|
|
stderr=subprocess.STDOUT,
|
|
)
|
|
|
|
generate_ca_conf()
|
|
|
|
for b in bundles:
|
|
subj = f'/CN={bundles[b]["subj"]}/' if 'subj' in bundles[b] else '/'
|
|
|
|
subprocess.check_output(
|
|
[
|
|
'openssl',
|
|
'ca',
|
|
'-batch',
|
|
'-subj',
|
|
subj,
|
|
'-config',
|
|
f'{option.temp_dir}/ca.conf',
|
|
'-keyfile',
|
|
f'{option.temp_dir}/root.key',
|
|
'-cert',
|
|
f'{option.temp_dir}/root.crt',
|
|
'-in',
|
|
f'{option.temp_dir}/{b}.csr',
|
|
'-out',
|
|
f'{option.temp_dir}/{b}.crt',
|
|
],
|
|
stderr=subprocess.STDOUT,
|
|
)
|
|
|
|
load_certs(bundles)
|
|
|
|
context = ssl.create_default_context()
|
|
context.check_hostname = False
|
|
context.verify_mode = ssl.CERT_REQUIRED
|
|
context.load_verify_locations(f'{option.temp_dir}/root.crt')
|
|
|
|
return context
|
|
|
|
|
|
def generate_ca_conf():
|
|
with open(f'{option.temp_dir}/ca.conf', 'w') as f:
|
|
f.write(
|
|
f"""[ ca ]
|
|
default_ca = myca
|
|
|
|
[ myca ]
|
|
new_certs_dir = {option.temp_dir}
|
|
database = {option.temp_dir}/certindex
|
|
default_md = sha256
|
|
policy = myca_policy
|
|
serial = {option.temp_dir}/certserial
|
|
default_days = 1
|
|
x509_extensions = myca_extensions
|
|
copy_extensions = copy
|
|
|
|
[ myca_policy ]
|
|
commonName = optional
|
|
|
|
[ myca_extensions ]
|
|
basicConstraints = critical,CA:TRUE"""
|
|
)
|
|
|
|
with open(f'{option.temp_dir}/certserial', 'w') as f:
|
|
f.write('1000')
|
|
|
|
with open(f'{option.temp_dir}/certindex', 'w') as f:
|
|
f.write('')
|
|
|
|
|
|
def load_certs(bundles):
|
|
for bname, bvalue in bundles.items():
|
|
assert 'success' in client.certificate_load(
|
|
bname, bname
|
|
), f'certificate {bvalue["subj"]} upload'
|
|
|
|
|
|
def remove_tls():
|
|
assert 'success' in client.conf({"pass": "routes"}, 'listeners/*:8080')
|
|
|
|
|
|
def test_tls_sni():
|
|
bundles = {
|
|
"default": {"subj": "default", "alt_names": ["default"]},
|
|
"localhost.com": {
|
|
"subj": "localhost.com",
|
|
"alt_names": ["alt1.localhost.com"],
|
|
},
|
|
"example.com": {
|
|
"subj": "example.com",
|
|
"alt_names": ["alt1.example.com", "alt2.example.com"],
|
|
},
|
|
}
|
|
ctx = config_bundles(bundles)
|
|
add_tls(["default", "localhost.com", "example.com"])
|
|
|
|
check_cert('alt1.localhost.com', bundles['localhost.com']['subj'], ctx)
|
|
check_cert('alt2.example.com', bundles['example.com']['subj'], ctx)
|
|
check_cert('blah', bundles['default']['subj'], ctx)
|
|
|
|
|
|
def test_tls_sni_no_hostname():
|
|
bundles = {
|
|
"localhost.com": {"subj": "localhost.com", "alt_names": []},
|
|
"example.com": {
|
|
"subj": "example.com",
|
|
"alt_names": ["example.com"],
|
|
},
|
|
}
|
|
ctx = config_bundles(bundles)
|
|
add_tls(["localhost.com", "example.com"])
|
|
|
|
resp, sock = client.get_ssl(
|
|
headers={'Content-Length': '0', 'Connection': 'close'},
|
|
start=True,
|
|
context=ctx,
|
|
)
|
|
assert resp['status'] == 200
|
|
assert (
|
|
sock.getpeercert()['subject'][0][0][1]
|
|
== bundles['localhost.com']['subj']
|
|
)
|
|
|
|
|
|
def test_tls_sni_upper_case():
|
|
bundles = {
|
|
"localhost.com": {"subj": "LOCALHOST.COM", "alt_names": []},
|
|
"example.com": {
|
|
"subj": "example.com",
|
|
"alt_names": ["ALT1.EXAMPLE.COM", "*.ALT2.EXAMPLE.COM"],
|
|
},
|
|
}
|
|
ctx = config_bundles(bundles)
|
|
add_tls(["localhost.com", "example.com"])
|
|
|
|
check_cert('localhost.com', bundles['localhost.com']['subj'], ctx)
|
|
check_cert('LOCALHOST.COM', bundles['localhost.com']['subj'], ctx)
|
|
check_cert('EXAMPLE.COM', bundles['localhost.com']['subj'], ctx)
|
|
check_cert('ALT1.EXAMPLE.COM', bundles['example.com']['subj'], ctx)
|
|
check_cert('WWW.ALT2.EXAMPLE.COM', bundles['example.com']['subj'], ctx)
|
|
|
|
|
|
def test_tls_sni_only_bundle():
|
|
bundles = {
|
|
"localhost.com": {
|
|
"subj": "localhost.com",
|
|
"alt_names": ["alt1.localhost.com", "alt2.localhost.com"],
|
|
}
|
|
}
|
|
ctx = config_bundles(bundles)
|
|
add_tls(["localhost.com"])
|
|
|
|
check_cert('domain.com', bundles['localhost.com']['subj'], ctx)
|
|
check_cert('alt1.domain.com', bundles['localhost.com']['subj'], ctx)
|
|
|
|
|
|
def test_tls_sni_wildcard():
|
|
bundles = {
|
|
"localhost.com": {"subj": "localhost.com", "alt_names": []},
|
|
"example.com": {
|
|
"subj": "example.com",
|
|
"alt_names": ["*.example.com", "*.alt.example.com"],
|
|
},
|
|
}
|
|
ctx = config_bundles(bundles)
|
|
add_tls(["localhost.com", "example.com"])
|
|
|
|
check_cert('example.com', bundles['localhost.com']['subj'], ctx)
|
|
check_cert('www.example.com', bundles['example.com']['subj'], ctx)
|
|
check_cert('alt.example.com', bundles['example.com']['subj'], ctx)
|
|
check_cert('www.alt.example.com', bundles['example.com']['subj'], ctx)
|
|
check_cert('www.alt.example.ru', bundles['localhost.com']['subj'], ctx)
|
|
|
|
|
|
def test_tls_sni_duplicated_bundle():
|
|
bundles = {
|
|
"localhost.com": {
|
|
"subj": "localhost.com",
|
|
"alt_names": ["localhost.com", "alt2.localhost.com"],
|
|
}
|
|
}
|
|
ctx = config_bundles(bundles)
|
|
add_tls(["localhost.com", "localhost.com"])
|
|
|
|
check_cert('localhost.com', bundles['localhost.com']['subj'], ctx)
|
|
check_cert('alt2.localhost.com', bundles['localhost.com']['subj'], ctx)
|
|
|
|
|
|
def test_tls_sni_same_alt():
|
|
bundles = {
|
|
"localhost": {"subj": "subj1", "alt_names": "same.altname.com"},
|
|
"example": {"subj": "subj2", "alt_names": "same.altname.com"},
|
|
}
|
|
ctx = config_bundles(bundles)
|
|
add_tls(["localhost", "example"])
|
|
|
|
check_cert('localhost', bundles['localhost']['subj'], ctx)
|
|
check_cert('example', bundles['localhost']['subj'], ctx)
|
|
|
|
|
|
def test_tls_sni_empty_cn():
|
|
bundles = {"localhost": {"alt_names": ["alt.localhost.com"]}}
|
|
ctx = config_bundles(bundles)
|
|
add_tls(["localhost"])
|
|
|
|
resp, sock = client.get_ssl(
|
|
headers={
|
|
'Host': 'domain.com',
|
|
'Content-Length': '0',
|
|
'Connection': 'close',
|
|
},
|
|
start=True,
|
|
context=ctx,
|
|
)
|
|
|
|
assert resp['status'] == 200
|
|
assert sock.getpeercert()['subjectAltName'][0][1] == 'alt.localhost.com'
|
|
|
|
|
|
def test_tls_sni_invalid():
|
|
_ = config_bundles({"localhost": {"subj": "subj1", "alt_names": ''}})
|
|
add_tls(["localhost"])
|
|
|
|
def check_certificate(cert):
|
|
assert 'error' in client.conf(
|
|
{"pass": "routes", "tls": {"certificate": cert}},
|
|
'listeners/*:8080',
|
|
)
|
|
|
|
check_certificate('')
|
|
check_certificate('blah')
|
|
check_certificate([])
|
|
check_certificate(['blah'])
|
|
check_certificate(['localhost', 'blah'])
|
|
check_certificate(['localhost', []])
|