From: Frederic Lecaille Date: Mon, 1 Dec 2025 17:44:56 +0000 (+0100) Subject: REGTESTS: quic: ssl_client_auth.vtc supported by QUIC X-Git-Tag: v3.4-dev1~40 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=47889154d2442d8abb47d17f2a4523ca1aae465a;p=thirdparty%2Fhaproxy.git REGTESTS: quic: ssl_client_auth.vtc supported by QUIC ssl/ssl_client_auth.vtc was renamed to ssl/ssl_client_auth.vtci to produce a common part runnable both for QUIC and TCP listeners. Then ssl_client_auth.vtc files were created both under ssl and quic directories to call this .vtci file with correct VTC_SOCK_TYPE environment values ("quic" for QUIC listeners and "stream" for TCP listeners); --- diff --git a/reg-tests/quic/ssl_client_auth.vtc b/reg-tests/quic/ssl_client_auth.vtc new file mode 100644 index 000000000..ee31f354f --- /dev/null +++ b/reg-tests/quic/ssl_client_auth.vtc @@ -0,0 +1,23 @@ +#REGTEST_TYPE=devel + +# This reg-test tests the client auth feature of HAProxy for both the backend +# and frontend section with a CRL list +# +# This reg-test uses 2 chained listeners because vtest does not handle the SSL. +# Test the frontend client auth and the backend side at the same time. +# +# The sends 3 requests one with a correct certificate, one with an expired one and one which was revoked. +# The client then check if we received the right one with the right error. +# +# Certificates, CA and CRL are expiring in 2050 so it should be fine for the CI. +# +# Detail about configuration is explained there: +# https://www.haproxy.com/blog/ssl-client-certificate-management-at-application-level/ + +varnishtest "Test the client auth" + +# QUIC backend are not supported with USE_QUIC_OPENSSL_COMPAT +feature cmd "$HAPROXY_PROGRAM -cc 'feature(QUIC) && !feature(QUIC_OPENSSL_COMPAT) && !feature(OPENSSL_WOLFSSL)'" + +setenv VTC_SOCK_TYPE quic +include ${testdir}/../ssl/ssl_client_auth.vtci diff --git a/reg-tests/ssl/ssl_client_auth.vtc b/reg-tests/ssl/ssl_client_auth.vtc index 64d60380b..9bb464eaa 100644 --- a/reg-tests/ssl/ssl_client_auth.vtc +++ b/reg-tests/ssl/ssl_client_auth.vtc @@ -16,67 +16,6 @@ varnishtest "Test the client auth" #REQUIRE_OPTIONS=OPENSSL -feature ignore_unknown_macro -server s1 -repeat 3 { - rxreq - txresp -} -start - -haproxy h1 -conf { - global - .if feature(THREAD) - thread-groups 1 - .endif - - .if !ssllib_name_startswith(AWS-LC) - tune.ssl.default-dh-param 2048 - .endif - - defaults - mode http - option httplog - log stderr local0 debug err - option logasap - timeout connect "${HAPROXY_TEST_TIMEOUT-5s}" - timeout client "${HAPROXY_TEST_TIMEOUT-5s}" - timeout server "${HAPROXY_TEST_TIMEOUT-5s}" - - listen clear-lst - bind "fd@${clearlst}" - balance roundrobin - # crt: certificate sent for a client certificate request - server s1 "${tmpdir}/ssl.sock" ssl verify none crt ${testdir}/certs/client1.pem - server s2 "${tmpdir}/ssl.sock" ssl verify none crt ${testdir}/certs/client2_expired.pem # expired - server s3 "${tmpdir}/ssl.sock" ssl verify none crt ${testdir}/certs/client3_revoked.pem # revoked - - listen ssl-lst - # crt: certificate of the server - # ca-file: CA used for client authentication request - # crl-file: revocation list for client auth: the client1 certificate is revoked - bind "${tmpdir}/ssl.sock" ssl crt ${testdir}/certs/common.pem ca-file ${testdir}/certs/ca-auth.crt verify optional crt-ignore-err X509_V_ERR_CERT_REVOKED,X509_V_ERR_CERT_HAS_EXPIRED crl-file ${testdir}/certs/crl-auth.pem - - http-response add-header X-SSL %[ssl_c_verify,x509_v_err_str] - server s1 ${s1_addr}:${s1_port} -} -start - -client c1 -connect ${h1_clearlst_sock} { - txreq - rxresp - expect resp.status == 200 - expect resp.http.x-ssl == "X509_V_OK" -} -run - -client c1 -connect ${h1_clearlst_sock} { - txreq - rxresp - expect resp.status == 200 - expect resp.http.x-ssl == "X509_V_ERR_CERT_HAS_EXPIRED" -} -run - -client c1 -connect ${h1_clearlst_sock} { - txreq - rxresp - expect resp.status == 200 - expect resp.http.x-ssl == "X509_V_ERR_CERT_REVOKED" -} -run +setenv VTC_SOCK_TYPE stream +include ${testdir}/ssl_client_auth.vtci diff --git a/reg-tests/ssl/ssl_client_auth.vtci b/reg-tests/ssl/ssl_client_auth.vtci new file mode 100644 index 000000000..a529f2b75 --- /dev/null +++ b/reg-tests/ssl/ssl_client_auth.vtci @@ -0,0 +1,68 @@ +feature ignore_unknown_macro + +server s1 -repeat 3 { + rxreq + txresp +} -start + +haproxy h1 -conf { + global + .if streq("$VTC_SOCK_TYPE",quic) + # required for backend connections + expose-experimental-directives + .endif + .if feature(THREAD) + thread-groups 1 + .endif + + .if !ssllib_name_startswith(AWS-LC) + tune.ssl.default-dh-param 2048 + .endif + + defaults + mode http + option httplog + log stderr local0 debug err + option logasap + timeout connect "${HAPROXY_TEST_TIMEOUT-5s}" + timeout client "${HAPROXY_TEST_TIMEOUT-5s}" + timeout server "${HAPROXY_TEST_TIMEOUT-5s}" + + listen clear-lst + bind "fd@${clearlst}" + balance roundrobin + # crt: certificate sent for a client certificate request + server s1 "${VTC_SOCK_TYPE}+${h1_ssl_sock}" ssl verify none crt ${testdir}/certs/client1.pem + server s2 "${VTC_SOCK_TYPE}+${h1_ssl_sock}" ssl verify none crt ${testdir}/certs/client2_expired.pem # expired + server s3 "${VTC_SOCK_TYPE}+${h1_ssl_sock}" ssl verify none crt ${testdir}/certs/client3_revoked.pem # revoked + + listen ssl-lst + # crt: certificate of the server + # ca-file: CA used for client authentication request + # crl-file: revocation list for client auth: the client1 certificate is revoked + bind "${VTC_SOCK_TYPE}+fd@${ssl}" ssl crt ${testdir}/certs/common.pem ca-file ${testdir}/certs/ca-auth.crt verify optional crt-ignore-err X509_V_ERR_CERT_REVOKED,X509_V_ERR_CERT_HAS_EXPIRED crl-file ${testdir}/certs/crl-auth.pem + + http-response add-header X-SSL %[ssl_c_verify,x509_v_err_str] + server s1 ${s1_addr}:${s1_port} +} -start + +client c1 -connect ${h1_clearlst_sock} { + txreq + rxresp + expect resp.status == 200 + expect resp.http.x-ssl == "X509_V_OK" +} -run + +client c1 -connect ${h1_clearlst_sock} { + txreq + rxresp + expect resp.status == 200 + expect resp.http.x-ssl == "X509_V_ERR_CERT_HAS_EXPIRED" +} -run + +client c1 -connect ${h1_clearlst_sock} { + txreq + rxresp + expect resp.status == 200 + expect resp.http.x-ssl == "X509_V_ERR_CERT_REVOKED" +} -run