cleanup() {
rm -f \
tmp tlsproxy-log \
- certificate-localhost-proxy.pem certificate-localhost-server.pem \
- proxy-ca-key.pem proxy-ca.pem proxy-invalid.pem proxy-key.pem
+ certificate-localhost-proxy.pem certificate-localhost-server.pem
}
stop_servers() {
if test -n "$pid_server"; then
exit 1
}
tlsproxy_setup() {
+ # Don't waste time running `tlsproxy-setup` when all files are still
+ # present.
+ if test -f proxy-ca-key.pem &&
+ test -f proxy-ca.pem &&
+ test -f proxy-dh.pem &&
+ test -f proxy-invalid.pem &&
+ test -f proxy-key.pem
+ then
+ return
+ fi
+
"$srcdir/../src/tlsproxy-setup" >/dev/null 2>&1
}
tlsproxy_add() {
- "$srcdir/../src/tlsproxy-add" "$1" "$srcdir/$2" >/dev/null 2>&1
+ # `make distcheck` marks the source PEM-file as read-only which is copied
+ # over when using `cp`. This causes a check failure when tlsproxy_add() is
+ # called again with the same hostname. Instead use redirection which
+ # doesn't use `cp`.
+ "$srcdir/../src/tlsproxy-add" "$1" < "$srcdir/$2" >/dev/null 2>&1
}
tlsproxy() {
+ #valgrind --leak-check=full --error-exitcode=1 --track-fds=yes \
../src/tlsproxy -d2 "$@" >tlsproxy-log 2>&1 &
pid_tlsproxy=$!
}
}
wait_for_ports() {
- while :; do
+ for x in 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20; do
sleep 1
# Check if each given port can be reached.
grep 'response: HTTP/1.0 503 Forwarding failure' tmp >/dev/null \
|| abort 'test_proxy_failure 2'
}
+test_proxy_authentication_failure() {
+ grep 'proxy failure' tmp >/dev/null \
+ || abort 'test_proxy_authentication_failure'
+ grep 'response: HTTP/1.0 407 Proxy Authentication Required' tmp >/dev/null \
+ || abort 'test_proxy_authentication_failure 2'
+}
+test_authentication_missing() {
+ grep 'response: HTTP/1.0 407 Proxy Authentication Required' tmp >/dev/null \
+ || abort 'test_authentication_missing'
+}
test_proxy_successful() {
grep 'response: HTTP/1.0 200 Connection established' tmp >/dev/null \
|| abort 'test_proxy_successful'