Only run the tls-name-validation test if --tls is passed into runtest

This commit is contained in:
Vivek Saini 2022-04-20 00:30:01 +00:00 committed by John Sully
parent 71121dff4e
commit 345a3873a0

View File

@ -1,111 +1,120 @@
test {TLS: Able to connect with no allowlist} { # only run this test if tls is enabled
start_server {tags {"tls"}} { if {$::tls} {
catch {r PING} e package require tls
assert_match {PONG} $e test {TLS: Able to connect with no allowlist} {
start_server {tags {"tls"}} {
catch {r PING} e
assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect with allowlist '*'} { test {TLS: Able to connect with allowlist '*'} {
start_server {tags {"tls"} overrides {tls-allowlist *}} { start_server {tags {"tls"} overrides {tls-allowlist *}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect with matching CN} { test {TLS: Able to connect with matching CN} {
start_server {tags {"tls"} overrides {tls-allowlist client.keydb.dev}} { start_server {tags {"tls"} overrides {tls-allowlist client.keydb.dev}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect with matching SAN} { test {TLS: Able to connect with matching SAN} {
start_server {tags {"tls"} overrides {tls-allowlist san1.keydb.dev}} { start_server {tags {"tls"} overrides {tls-allowlist san1.keydb.dev}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect with matching CN with wildcard} { test {TLS: Able to connect with matching CN with wildcard} {
start_server {tags {"tls"} overrides {tls-allowlist client*.dev}} { start_server {tags {"tls"} overrides {tls-allowlist client*.dev}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect with matching SAN with wildcard} { test {TLS: Able to connect with matching SAN with wildcard} {
start_server {tags {"tls"} overrides {tls-allowlist san*.dev}} { start_server {tags {"tls"} overrides {tls-allowlist san*.dev}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect while with CN having a comprehensive list} { test {TLS: Able to connect while with CN having a comprehensive list} {
start_server {tags {"tls"} overrides {tls-allowlist {dummy.keydb.dev client.keydb.dev other.keydb.dev}}} { start_server {tags {"tls"} overrides {tls-allowlist {dummy.keydb.dev client.keydb.dev other.keydb.dev}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect while with SAN having a comprehensive list} { test {TLS: Able to connect while with SAN having a comprehensive list} {
start_server {tags {"tls"} overrides {tls-allowlist {dummy.keydb.dev san2.keydb.dev other.keydb.dev}}} { start_server {tags {"tls"} overrides {tls-allowlist {dummy.keydb.dev san2.keydb.dev other.keydb.dev}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect while with CN having a comprehensive list with wildcards} { test {TLS: Able to connect while with CN having a comprehensive list with wildcards} {
start_server {tags {"tls"} overrides {tls-allowlist {dummy.* client*.dev other.*}}} { start_server {tags {"tls"} overrides {tls-allowlist {dummy.* client*.dev other.*}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to connect while with SAN having a comprehensive list with wildcards} { test {TLS: Able to connect while with SAN having a comprehensive list with wildcards} {
start_server {tags {"tls"} overrides {tls-allowlist {dummy.* san*.dev other.*}}} { start_server {tags {"tls"} overrides {tls-allowlist {dummy.* san*.dev other.*}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Not matching CN or SAN rejected} { test {TLS: Not matching CN or SAN rejected} {
start_server {tags {"tls"} overrides {tls-allowlist {client.keydb.dev}}} { start_server {tags {"tls"} overrides {tls-allowlist {client.keydb.dev}}} {
catch {set r2 [redis_client_tls -keyfile "$::tlsdir/client2.key" -certfile "$::tlsdir/client2.crt" -require 1 -cafile "$::tlsdir/ca.crt"]} e catch {set r2 [redis_client_tls -keyfile "$::tlsdir/client2.key" -certfile "$::tlsdir/client2.crt" -require 1 -cafile "$::tlsdir/ca.crt"]} e
assert_match {*I/O error reading reply*} $e assert_match {*I/O error reading reply*} $e
}
} }
}
test {TLS: Able to match against DNS SAN} { test {TLS: Able to match against DNS SAN} {
start_server {tags {"tls"} overrides {tls-allowlist {san1.keydb.dev}}} { start_server {tags {"tls"} overrides {tls-allowlist {san1.keydb.dev}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to match against email SAN} { test {TLS: Able to match against email SAN} {
start_server {tags {"tls"} overrides {tls-allowlist {someone@keydb.dev}}} { start_server {tags {"tls"} overrides {tls-allowlist {someone@keydb.dev}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to match against IPv4 SAN} { test {TLS: Able to match against IPv4 SAN} {
start_server {tags {"tls"} overrides {tls-allowlist {192.168.0.1}}} { start_server {tags {"tls"} overrides {tls-allowlist {192.168.0.1}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to match against IPv4 with a wildcard} { test {TLS: Able to match against IPv4 with a wildcard} {
start_server {tags {"tls"} overrides {tls-allowlist {192.*}}} { start_server {tags {"tls"} overrides {tls-allowlist {192.*}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
}
test {TLS: Able to match against URI SAN} { test {TLS: Able to match against URI SAN} {
start_server {tags {"tls"} overrides {tls-allowlist {https://keydb.dev}}} { start_server {tags {"tls"} overrides {tls-allowlist {https://keydb.dev}}} {
catch {r PING} e catch {r PING} e
assert_match {PONG} $e assert_match {PONG} $e
}
} }
} } else {
start_server {} {
# just a dummy server so that the test doesn't panic if tls is disabled
# otherwise the test will try to bind to a server that just isn't there
}
}