REGTEST: ssl: tests the ssl_f_* sample fetches
Test the following ssl sample fetches:
ssl_f_der, ssl_f_sha1,hex, ssl_f_notafter, ssl_f_notbefore,
ssl_f_sig_alg, ssl_f_i_dn, ssl_f_s_dn, ssl_f_serial,hex, ssl_f_key_alg,
ssl_f_version
This reg-test could be used as far as haproxy 1.5.
2020-06-26 11:29:43 +02:00
#REGTEST_TYPE=devel
varnishtest "Test the ssl_f_* sample fetches"
#REQUIRE_OPTIONS=OPENSSL
feature ignore_unknown_macro
server s1 -repeat 3 {
rxreq
txresp
} -start
haproxy h1 -conf {
global
tune.ssl.default-dh-param 2048
2021-07-13 19:04:24 +02:00
tune.ssl.capture-buffer-size 1
REGTEST: ssl: tests the ssl_f_* sample fetches
Test the following ssl sample fetches:
ssl_f_der, ssl_f_sha1,hex, ssl_f_notafter, ssl_f_notbefore,
ssl_f_sig_alg, ssl_f_i_dn, ssl_f_s_dn, ssl_f_serial,hex, ssl_f_key_alg,
ssl_f_version
This reg-test could be used as far as haproxy 1.5.
2020-06-26 11:29:43 +02:00
crt-base ${testdir}
defaults
mode http
option httplog
log stderr local0 debug err
option logasap
2021-11-18 17:46:22 +01:00
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
REGTEST: ssl: tests the ssl_f_* sample fetches
Test the following ssl sample fetches:
ssl_f_der, ssl_f_sha1,hex, ssl_f_notafter, ssl_f_notbefore,
ssl_f_sig_alg, ssl_f_i_dn, ssl_f_s_dn, ssl_f_serial,hex, ssl_f_key_alg,
ssl_f_version
This reg-test could be used as far as haproxy 1.5.
2020-06-26 11:29:43 +02:00
listen clear-lst
bind "fd@${clearlst}"
balance roundrobin
server s1 "${tmpdir}/ssl.sock" ssl verify none
listen ssl-lst
mode http
http-response add-header x-ssl-der %[ssl_f_der,hex]
http-response add-header x-ssl-sha1 %[ssl_f_sha1,hex]
http-response add-header x-ssl-notafter %[ssl_f_notafter]
http-response add-header x-ssl-notbefore %[ssl_f_notbefore]
http-response add-header x-ssl-sig_alg %[ssl_f_sig_alg]
http-response add-header x-ssl-i_dn %[ssl_f_i_dn]
http-response add-header x-ssl-s_dn %[ssl_f_s_dn]
http-response add-header x-ssl-s_serial %[ssl_f_serial,hex]
http-response add-header x-ssl-key_alg %[ssl_f_key_alg]
http-response add-header x-ssl-version %[ssl_f_version]
bind "${tmpdir}/ssl.sock" ssl crt ${testdir}/common.pem
server s1 ${s1_addr}:${s1_port}
} -start
client c1 -connect ${h1_clearlst_sock} {
txreq
rxresp
expect resp.status == 200
2023-09-20 18:06:03 +02:00
expect resp.http.x-ssl-der ~ 308203C7308202AFA003020102021445B6C777.*65AD7F4469DB9C8581EE260ABCB727AEF8A7C3ADA
expect resp.http.x-ssl-sha1 == "DF3B6E847A7BF83DFAAFCFEC65EE9BC36230D3EA"
expect resp.http.x-ssl-notafter == "330917162600Z"
expect resp.http.x-ssl-notbefore == "230920162600Z"
REGTEST: ssl: tests the ssl_f_* sample fetches
Test the following ssl sample fetches:
ssl_f_der, ssl_f_sha1,hex, ssl_f_notafter, ssl_f_notbefore,
ssl_f_sig_alg, ssl_f_i_dn, ssl_f_s_dn, ssl_f_serial,hex, ssl_f_key_alg,
ssl_f_version
This reg-test could be used as far as haproxy 1.5.
2020-06-26 11:29:43 +02:00
expect resp.http.x-ssl-sig_alg == "RSA-SHA256"
2023-09-20 18:06:03 +02:00
expect resp.http.x-ssl-i_dn == "/C=FR/L=Paris/O=HAProxy Technologies/CN=HAProxy Test Intermediate CA"
expect resp.http.x-ssl-s_dn == "/C=FR/L=Paris/O=test1/CN=www.test1.com"
expect resp.http.x-ssl-s_serial == "45B6C777A017159A19126340C1053521B91E123B"
REGTEST: ssl: tests the ssl_f_* sample fetches
Test the following ssl sample fetches:
ssl_f_der, ssl_f_sha1,hex, ssl_f_notafter, ssl_f_notbefore,
ssl_f_sig_alg, ssl_f_i_dn, ssl_f_s_dn, ssl_f_serial,hex, ssl_f_key_alg,
ssl_f_version
This reg-test could be used as far as haproxy 1.5.
2020-06-26 11:29:43 +02:00
expect resp.http.x-ssl-key_alg == "rsaEncryption"
expect resp.http.x-ssl-version == "3"
} -run