mirror of
https://github.com/nginx/nginx.git
synced 2025-07-20 19:27:29 +08:00
189 lines
4.3 KiB
Perl
189 lines
4.3 KiB
Perl
#!/usr/bin/perl
|
|
|
|
# (C) Sergey Kandaurov
|
|
# (C) Aleksei Bavshin
|
|
# (C) Nginx, Inc.
|
|
|
|
# Tests for "ssl_provider" directive.
|
|
|
|
###############################################################################
|
|
|
|
use warnings;
|
|
use strict;
|
|
|
|
use Test::More;
|
|
|
|
BEGIN { use FindBin; chdir($FindBin::Bin); }
|
|
|
|
use lib 'lib';
|
|
use Test::Nginx;
|
|
|
|
###############################################################################
|
|
|
|
select STDERR; $| = 1;
|
|
select STDOUT; $| = 1;
|
|
|
|
plan(skip_all => 'win32') if $^O eq 'MSWin32';
|
|
|
|
plan(skip_all => 'may not work, incompatible with sanitizers')
|
|
unless $ENV{TEST_NGINX_UNSAFE};
|
|
|
|
my $t = Test::Nginx->new()->has(qw/http proxy http_ssl openssl:3.2.0/)
|
|
->has_daemon('openssl')->has_daemon('softhsm2-util');
|
|
|
|
my $libsofthsm2_path;
|
|
my @so_paths = (
|
|
'/usr/lib/softhsm', # Debian-based
|
|
'/usr/local/lib/softhsm', # FreeBSD
|
|
'/opt/local/lib/softhsm', # MacPorts
|
|
'/lib64', # RHEL-based
|
|
split /:/, $ENV{TEST_NGINX_SOFTHSM} || ''
|
|
);
|
|
|
|
for my $so_path (@so_paths) {
|
|
$so_path .= '/libsofthsm2.so';
|
|
if (-e $so_path) {
|
|
$libsofthsm2_path = $so_path;
|
|
last;
|
|
}
|
|
};
|
|
|
|
plan(skip_all => "libsofthsm2.so not found") unless $libsofthsm2_path;
|
|
|
|
$t->write_file_expand('nginx.conf', <<EOF);
|
|
|
|
%%TEST_GLOBALS%%
|
|
|
|
daemon off;
|
|
|
|
env SOFTHSM2_CONF;
|
|
|
|
ssl_provider default;
|
|
ssl_provider pkcs11
|
|
pkcs11-module-path=$libsofthsm2_path
|
|
pkcs11-module-cache-pins=cache
|
|
"pkcs11-module-quirks=no-deinit no-operation-state";
|
|
|
|
events {
|
|
}
|
|
|
|
http {
|
|
%%TEST_GLOBALS_HTTP%%
|
|
|
|
server {
|
|
listen 127.0.0.1:8081 ssl;
|
|
listen 127.0.0.1:8080;
|
|
server_name localhost;
|
|
|
|
ssl_certificate localhost.crt;
|
|
ssl_certificate_key "store:pkcs11:token=NginxZero;object=nx_key_0";
|
|
|
|
ssl_password_file pin.txt;
|
|
|
|
location / {
|
|
# index index.html by default
|
|
}
|
|
|
|
location /proxy {
|
|
proxy_pass https://127.0.0.1:8081/;
|
|
}
|
|
|
|
location /var {
|
|
proxy_pass https://127.0.0.1:8082/;
|
|
proxy_ssl_name localhost;
|
|
proxy_ssl_server_name on;
|
|
}
|
|
}
|
|
|
|
server {
|
|
listen 127.0.0.1:8082 ssl;
|
|
server_name localhost;
|
|
|
|
ssl_certificate \$ssl_server_name.crt;
|
|
ssl_certificate_key "store:pkcs11:token=NginxZero;object=nx_key_0";
|
|
|
|
ssl_password_file pin.txt;
|
|
|
|
location / {
|
|
# index index.html by default
|
|
}
|
|
}
|
|
}
|
|
|
|
EOF
|
|
|
|
my $openssl_conf = <<EOF;
|
|
openssl_conf = openssl_def
|
|
|
|
[openssl_def]
|
|
providers = provider_sect
|
|
|
|
[provider_sect]
|
|
default = default_sect
|
|
pkcs11 = pkcs11_sect
|
|
|
|
[default_sect]
|
|
activate = 1
|
|
|
|
[pkcs11_sect]
|
|
pkcs11-module-path = $libsofthsm2_path
|
|
pkcs11-module-cache-pins = cache
|
|
# https://github.com/latchset/pkcs11-provider/commit/ab6370fd
|
|
pkcs11-module-quirks = no-deinit no-operation-state
|
|
module = /usr/local/lib/ossl-modules/pkcs11.so
|
|
activate = 1
|
|
|
|
[ req ]
|
|
default_bits = 2048
|
|
encrypt_key = no
|
|
distinguished_name = req_distinguished_name
|
|
[ req_distinguished_name ]
|
|
EOF
|
|
|
|
$openssl_conf =~ s|^(?=module)|# |m if $^O ne 'freebsd';
|
|
$t->write_file('openssl.conf', $openssl_conf);
|
|
|
|
my $d = $t->testdir();
|
|
|
|
$t->write_file('softhsm2.conf', <<EOF);
|
|
directories.tokendir = $d/tokens/
|
|
objectstore.backend = file
|
|
EOF
|
|
|
|
mkdir($d . '/tokens');
|
|
|
|
$ENV{SOFTHSM2_CONF} = "$d/softhsm2.conf";
|
|
|
|
foreach my $name ('localhost') {
|
|
system('softhsm2-util --init-token --slot 0 --label NginxZero '
|
|
. '--pin 1234 --so-pin 1234 '
|
|
. ">>$d/openssl.out 2>&1");
|
|
|
|
system("openssl genrsa -out $d/$name.key 2048 "
|
|
. ">>$d/openssl.out 2>&1") == 0
|
|
or die "Can't create private key: $!\n";
|
|
|
|
system("softhsm2-util --import $d/$name.key --id 00 --label nx_key_0 "
|
|
. '--token NginxZero --pin 1234 '
|
|
. ">>$d/openssl.out 2>&1") == 0
|
|
or die "Can't import private key: $!\n";
|
|
|
|
system("openssl req -x509 -new -config $d/openssl.conf "
|
|
. "-subj /CN=$name/ -out $d/$name.crt -text -passin pass:1234 "
|
|
. '-key "pkcs11:token=NginxZero;object=nx_key_0" '
|
|
. ">>$d/openssl.out 2>&1") == 0
|
|
or plan(skip_all => "missing pkcs11-provider");
|
|
}
|
|
|
|
$t->write_file('pin.txt', '1234');
|
|
$t->write_file('index.html', '');
|
|
|
|
$t->run()->plan(2);
|
|
|
|
###############################################################################
|
|
|
|
like(http_get('/proxy'), qr/200 OK/, 'ssl provider keys');
|
|
like(http_get('/var'), qr/200 OK/, 'ssl_certificate with variable');
|
|
|
|
###############################################################################
|