]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
dnsdist: Check that the expected TLS provider is in use in the regression tests
authorRemi Gacogne <remi.gacogne@powerdns.com>
Thu, 26 Aug 2021 14:26:04 +0000 (16:26 +0200)
committerRemi Gacogne <remi.gacogne@powerdns.com>
Thu, 26 Aug 2021 15:19:13 +0000 (17:19 +0200)
regression-tests.dnsdist/test_OCSP.py
regression-tests.dnsdist/test_TLS.py

index 7a10f6976183f94a5a30fed1cb480392f126aa14..6b29e3df554c2b9403bdcbaa0d66d7095d19e615 100644 (file)
@@ -32,6 +32,9 @@ class DNSDistOCSPStaplingTest(DNSDistTest):
 
         return serialNumber
 
+    def getTLSProvider(self):
+        return self.sendConsoleCommand("getBind(0):getEffectiveTLSProvider()").rstrip()
+
 @unittest.skipIf('SKIP_DOH_TESTS' in os.environ, 'DNS over HTTPS tests are disabled')
 class TestOCSPStaplingDOH(DNSDistOCSPStaplingTest):
 
@@ -116,6 +119,7 @@ class TestOCSPStaplingTLSGnuTLS(DNSDistOCSPStaplingTest):
         """
         output = self.checkOCSPStaplingStatus('127.0.0.1', self._tlsServerPort, self._serverName, self._caCert)
         self.assertIn('OCSP Response Status: successful (0x0)', output)
+        self.assertEquals(self.getTLSProvider(), "gnutls")
 
         serialNumber = self.getOCSPSerial(output)
         self.assertTrue(serialNumber)
@@ -158,6 +162,7 @@ class TestOCSPStaplingTLSOpenSSL(DNSDistOCSPStaplingTest):
         """
         output = self.checkOCSPStaplingStatus('127.0.0.1', self._tlsServerPort, self._serverName, self._caCert)
         self.assertIn('OCSP Response Status: successful (0x0)', output)
+        self.assertEquals(self.getTLSProvider(), "openssl")
 
         serialNumber = self.getOCSPSerial(output)
         self.assertTrue(serialNumber)
index c29bec9a74de460ca7cb7a4d0e7e4788572a0854..4b850bac8e8d01c78356e0779acf4db8443e5a4b 100644 (file)
@@ -14,6 +14,9 @@ class TLSTests(object):
         conn = self.openTLSConnection(self._tlsServerPort, self._serverName, self._caCert)
         return conn.getpeercert()
 
+    def getTLSProvider(self):
+        return self.sendConsoleCommand("getBind(0):getEffectiveTLSProvider()").rstrip()
+
     def testTLSSimple(self):
         """
         TLS: Single query
@@ -269,6 +272,9 @@ class TestOpenSSL(DNSDistTest, TLSTests):
     """
     _config_params = ['_consoleKeyB64', '_consolePort', '_testServerPort', '_tlsServerPort', '_serverCert', '_serverKey']
 
+    def testProvider(self):
+        self.assertEquals(self.getTLSProvider(), "openssl")
+
 class TestGnuTLS(DNSDistTest, TLSTests):
 
     _consoleKey = DNSDistTest.generateConsoleKey()
@@ -288,6 +294,9 @@ class TestGnuTLS(DNSDistTest, TLSTests):
     """
     _config_params = ['_consoleKeyB64', '_consolePort', '_testServerPort', '_tlsServerPort', '_serverCert', '_serverKey']
 
+    def testProvider(self):
+        self.assertEquals(self.getTLSProvider(), "gnutls")
+
 class TestDOTWithCache(DNSDistTest):
     _serverKey = 'server.key'
     _serverCert = 'server.chain'