summaryrefslogtreecommitdiffhomepage
path: root/test/test_tls_conf_command.py
blob: f22385744ccfc8a956f95368115456cb426b83a7 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
import ssl

import pytest
from unit.applications.tls import TestApplicationTLS


class TestTLSConfCommand(TestApplicationTLS):
    prerequisites = {'modules': {'openssl': 'any'}}

    @pytest.fixture(autouse=True)
    def setup_method_fixture(self):
        self.certificate()

        assert 'success' in self.conf(
            {
                "listeners": {
                    "*:7080": {
                        "pass": "routes",
                        "tls": {"certificate": "default"},
                    }
                },
                "routes": [{"action": {"return": 200}}],
                "applications": {},
            }
        ), 'load application configuration'

    def test_tls_conf_command(self):
        def check_no_connection():
            try:
                self.get_ssl()
                pytest.fail('Unexpected connection.')

            except (ssl.SSLError, ConnectionRefusedError):
                pass

        # Set one conf_commands (disable protocol).

        (_, sock) = self.get_ssl(start=True)

        shared_ciphers = sock.shared_ciphers()
        protocols = list(set(c[1] for c in shared_ciphers))
        protocol = sock.cipher()[1]

        if '/' in protocol:
            pytest.skip('Complex protocol format.')

        assert 'success' in self.conf(
            {
                "certificate": "default",
                "conf_commands": {"protocol": f'-{protocol}'},
            },
            'listeners/*:7080/tls',
        ), 'protocol disabled'

        sock.close()

        if len(protocols) > 1:
            (_, sock) = self.get_ssl(start=True)

            cipher = sock.cipher()
            assert cipher[1] != protocol, 'new protocol used'

            shared_ciphers = sock.shared_ciphers()
            ciphers = list(set(c for c in shared_ciphers if c[1] == cipher[1]))

            sock.close()
        else:
            check_no_connection()
            pytest.skip('One TLS protocol available only.')

        # Set two conf_commands (disable protocol and cipher).

        assert 'success' in self.conf(
            {
                "certificate": "default",
                "conf_commands": {
                    "protocol": f'-{protocol}',
                    "cipherstring": f"{cipher[1]}:!{cipher[0]}",
                },
            },
            'listeners/*:7080/tls',
        ), 'cipher disabled'

        if len(ciphers) > 1:
            (_, sock) = self.get_ssl(start=True)

            cipher_new = sock.cipher()
            assert cipher_new[1] == cipher[1], 'previous protocol used'
            assert cipher_new[0] != cipher[0], 'new cipher used'

            sock.close()

        else:
            check_no_connection()

    def test_tls_conf_command_invalid(self, skip_alert):
        skip_alert(r'SSL_CONF_cmd', r'failed to apply new conf')

        def check_conf_commands(conf_commands):
            assert 'error' in self.conf(
                {"certificate": "default", "conf_commands": conf_commands},
                'listeners/*:7080/tls',
            ), 'ivalid conf_commands'

        check_conf_commands([])
        check_conf_commands("blah")
        check_conf_commands({"": ""})
        check_conf_commands({"blah": ""})
        check_conf_commands({"protocol": {}})
        check_conf_commands({"protocol": "blah"})
        check_conf_commands({"protocol": "TLSv1.2", "blah": ""})