1 # Functions used by all tests.
3 # Copyright (C) 2011-2013 Simon Ruderich
5 # This program is free software: you can redistribute it and/or modify
6 # it under the terms of the GNU General Public License as published by
7 # the Free Software Foundation, either version 3 of the License, or
8 # (at your option) any later version.
10 # This program is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 # GNU General Public License for more details.
15 # You should have received a copy of the GNU General Public License
16 # along with this program. If not, see <http://www.gnu.org/licenses/>.
22 # Terminate all running servers when the script terminates.
24 # Same when the user presses Ctrl-C.
25 trap 'abort SIGINT' INT
31 certificate-localhost-proxy.pem certificate-localhost-server.pem
34 if test -n "$pid_server"; then
35 kill $pid_server || echo 'failed to kill gnutls-serv'
37 if test -n "$pid_tlsproxy"; then
38 kill $pid_tlsproxy || echo 'failed to kill tlsproxy'
47 # Don't waste time running `tlsproxy-setup` when all files are still
49 if test -f proxy-ca-key.pem &&
50 test -f proxy-ca.pem &&
51 test -f proxy-dh.pem &&
52 test -f proxy-invalid.pem &&
58 "$srcdir/../src/tlsproxy-setup" >/dev/null 2>&1
61 # `make distcheck` marks the source PEM-file as read-only which is copied
62 # over when using `cp`. This causes a check failure when tlsproxy_add() is
63 # called again with the same hostname. Instead use redirection which
65 "$srcdir/../src/tlsproxy-add" "$1" < "$srcdir/$2" >/dev/null 2>&1
67 tlsproxy_background() {
68 #valgrind --leak-check=full --error-exitcode=1 --track-fds=yes \
69 ../src/tlsproxy -d2 "$@" >tlsproxy-log 2>&1 &
73 gnutls-serv --http --port 4712 "$@" >/dev/null 2>&1 &
77 ./client ./proxy-ca.pem "$@" > tmp 2>&1
81 for x in 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20; do
84 # Check if each given port can be reached.
87 printf 'invalid request\r\n\r\n' \
88 | nc localhost "$port" >/dev/null 2>&1 \
92 if test -n "$ready"; then
96 echo "waiting for ports $* ..."
100 test_proxy_failure() {
101 grep 'proxy failure' tmp >/dev/null \
102 || abort 'test_proxy_failure'
103 grep 'response: HTTP/1.0 503 Forwarding failure' tmp >/dev/null \
104 || abort 'test_proxy_failure 2'
106 test_proxy_authentication_failure() {
107 grep 'proxy failure' tmp >/dev/null \
108 || abort 'test_proxy_authentication_failure'
109 grep 'response: HTTP/1.0 407 Proxy Authentication Required' tmp >/dev/null \
110 || abort 'test_proxy_authentication_failure 2'
112 test_authentication_missing() {
113 grep 'response: HTTP/1.0 407 Proxy Authentication Required' tmp >/dev/null \
114 || abort 'test_authentication_missing'
116 test_proxy_successful() {
117 grep 'response: HTTP/1.0 200 Connection established' tmp >/dev/null \
118 || abort 'test_proxy_successful'
120 test_invalid_certificate() {
121 grep 'certificate invalid' tmp >/dev/null \
122 || abort 'test_invalid_certificate'
124 test_no_invalid_certificate() {
125 grep 'certificate invalid' tmp >/dev/null \
126 && abort 'test_no_invalid_certificate' || true