X-Git-Url: https://ruderich.org/simon/gitweb/?a=blobdiff_plain;f=tests%2Ftests-passthrough.sh;h=e8eeffa1d283e5c26dd636755d97363b7cc2750f;hb=7eba49d24d56288d83746f3f0ce383d7c0c36552;hp=55846489e52c9f52bf827301615b7270b2944403;hpb=9fb20ff647d6d494d99184875d2c60586107d34c;p=tlsproxy%2Ftlsproxy.git diff --git a/tests/tests-passthrough.sh b/tests/tests-passthrough.sh index 5584648..e8eeffa 100755 --- a/tests/tests-passthrough.sh +++ b/tests/tests-passthrough.sh @@ -2,7 +2,7 @@ # tlsproxy tests for the -u option. # -# Copyright (C) 2011-2013 Simon Ruderich +# Copyright (C) 2011-2014 Simon Ruderich # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by @@ -24,12 +24,12 @@ test "x$srcdir" = x && srcdir=. # Create necessary files. cleanup -"$srcdir/../src/tlsproxy-setup" >/dev/null 2>/dev/null +tlsproxy_setup # Normal tests. -tlsproxy -u 4711 -server --x509certfile "$srcdir/server.pem" \ - --x509keyfile "$srcdir/server-key.pem" +tlsproxy_background -u 4711 +server_background --x509certfile "$srcdir/server.pem" \ + --x509keyfile "$srcdir/server-key.pem" wait_for_ports 4711 4712 @@ -44,8 +44,7 @@ test_proxy_successful test_invalid_certificate # Create the proxy certificate. -"$srcdir/../src/tlsproxy-add" localhost "$srcdir/server.pem" \ - >/dev/null 2>/dev/null +tlsproxy_add localhost server.pem echo missing server certificate mv certificate-localhost-server.pem .pem @@ -55,11 +54,11 @@ test_proxy_successful test_invalid_certificate echo missing proxy certificate -mv certificate-localhost-proxy.pem .pem +mv certificate-localhost-proxy.pem certificate-www.localhost-proxy.pem # "invalid" to prevent user error if the proxy certificate gets deleted (but # the server certificate is still readable). client localhost 4712 invalid || abort 'client localhost 4712 invalid' -mv .pem certificate-localhost-proxy.pem +mv certificate-www.localhost-proxy.pem certificate-localhost-proxy.pem test_proxy_successful test_invalid_certificate @@ -73,8 +72,9 @@ test_no_invalid_certificate # Stop server and try a "MITM" with a bad certificate. echo kill $pid_server || echo 'failed to kill gnutls-serv' -server --x509certfile "$srcdir/server-bad.pem" \ - --x509keyfile "$srcdir/server-key.pem" +sleep 3 # necessary on some systems like OpenBSD +server_background --x509certfile "$srcdir/server-bad.pem" \ + --x509keyfile "$srcdir/server-key.pem" wait_for_ports 4712 rm -f certificate-localhost-proxy.pem certificate-localhost-server.pem @@ -90,22 +90,21 @@ test_proxy_successful test_invalid_certificate # Create the proxy certificate. -"$srcdir/../src/tlsproxy-add" localhost "$srcdir/server.pem" \ - >/dev/null 2>/dev/null +tlsproxy_add localhost server.pem echo mitm missing server certificate -mv certificate-localhost-server.pem .pem +mv certificate-localhost-server.pem certificate-www.localhost-server.pem client localhost 4712 'test server bad' || abort 'client localhost 4712 test server bad' -mv .pem certificate-localhost-server.pem +mv certificate-www.localhost-server.pem certificate-localhost-server.pem test_proxy_successful test_invalid_certificate echo mitm missing proxy certificate -mv certificate-localhost-proxy.pem .pem +mv certificate-localhost-proxy.pem certificate-www.localhost-proxy.pem # "invalid" to prevent user error if the proxy certificate gets deleted (but # the server certificate is still readable). client localhost 4712 invalid || abort 'client localhost 4712 invalid' -mv .pem certificate-localhost-proxy.pem +mv certificate-www.localhost-proxy.pem certificate-localhost-proxy.pem test_proxy_successful test_invalid_certificate @@ -115,7 +114,7 @@ test_proxy_successful test_invalid_certificate -stop_servers +# stop_servers in trap-handler cleanup exit 0