This is an automated email from the ASF dual-hosted git repository.
remm pushed a commit to branch 10.1.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git
The following commit(s) were added to refs/heads/10.1.x by this push:
new 1466acb8a4 Skip tests for some OpenSSL derivatives
1466acb8a4 is described below
commit 1466acb8a4beb695d3d41a145ec4854e1324e1b8
Author: remm <[email protected]>
AuthorDate: Mon Oct 7 13:30:30 2024 +0200
Skip tests for some OpenSSL derivatives
---
test/org/apache/catalina/valves/rewrite/TestResolverSSL.java | 7 +++++++
test/org/apache/tomcat/util/net/TestClientCert.java | 12 ++++++++++++
test/org/apache/tomcat/util/net/TestClientCertTls13.java | 7 +++++++
.../apache/tomcat/util/net/TestCustomSslTrustManager.java | 7 +++++++
test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java | 5 +++++
test/org/apache/tomcat/util/net/TestSsl.java | 6 ++++++
test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java | 3 +++
7 files changed, 47 insertions(+)
diff --git a/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java
b/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java
index 0fcecf1f4b..8e15f79627 100644
--- a/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java
+++ b/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java
@@ -44,6 +44,7 @@ import org.apache.tomcat.util.buf.ByteChunk;
import org.apache.tomcat.util.net.SSLHostConfig;
import org.apache.tomcat.util.net.TesterSupport;
import org.apache.tomcat.util.net.openssl.OpenSSLImplementation;
+import org.apache.tomcat.util.net.openssl.OpenSSLStatus;
@RunWith(Parameterized.class)
public class TestResolverSSL extends TomcatBaseTest {
@@ -82,6 +83,12 @@ public class TestResolverSSL extends TomcatBaseTest {
sslHostConfig.setSessionCacheSize(20 * 1024);
tomcat.start();
+
+ Assume.assumeFalse("LibreSSL does not allow renegotiation",
+ OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+ Assume.assumeFalse("BoringSSL does not allow TLS renegotiation",
+ OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+
ByteChunk res = getUrl("https://localhost:" + getPort() +
"/protected");
// Just look a bit at the result
System.out.println(res.toString());
diff --git a/test/org/apache/tomcat/util/net/TestClientCert.java
b/test/org/apache/tomcat/util/net/TestClientCert.java
index eeabba688c..2ff237aac3 100644
--- a/test/org/apache/tomcat/util/net/TestClientCert.java
+++ b/test/org/apache/tomcat/util/net/TestClientCert.java
@@ -22,6 +22,7 @@ import java.util.Collection;
import java.util.List;
import org.junit.Assert;
+import org.junit.Assume;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;
@@ -31,6 +32,7 @@ import org.apache.catalina.Context;
import org.apache.catalina.startup.Tomcat;
import org.apache.catalina.startup.TomcatBaseTest;
import org.apache.tomcat.util.buf.ByteChunk;
+import org.apache.tomcat.util.net.openssl.OpenSSLStatus;
/**
* The keys and certificates used in this file are all available in svn and
were
@@ -84,6 +86,11 @@ public class TestClientCert extends TomcatBaseTest {
getTomcatInstance().start();
+ Assume.assumeFalse("LibreSSL does not allow renegotiation",
+ OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+ Assume.assumeFalse("BoringSSL does not allow TLS renegotiation",
+ OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+
// Unprotected resource
ByteChunk res = getUrl("https://localhost:" + getPort() +
"/unprotected");
@@ -156,6 +163,11 @@ public class TestClientCert extends TomcatBaseTest {
Tomcat tomcat = getTomcatInstance();
tomcat.start();
+ Assume.assumeFalse("LibreSSL does not allow renegotiation",
+ OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+ Assume.assumeFalse("BoringSSL does not allow TLS renegotiation",
+ OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+
byte[] body = new byte[bodySize];
Arrays.fill(body, TesterSupport.DATA);
diff --git a/test/org/apache/tomcat/util/net/TestClientCertTls13.java
b/test/org/apache/tomcat/util/net/TestClientCertTls13.java
index 5f8555b1c8..d74e2e8f87 100644
--- a/test/org/apache/tomcat/util/net/TestClientCertTls13.java
+++ b/test/org/apache/tomcat/util/net/TestClientCertTls13.java
@@ -79,6 +79,10 @@ public class TestClientCertTls13 extends TomcatBaseTest {
public void testClientCertGet() throws Exception {
Tomcat tomcat = getTomcatInstance();
tomcat.start();
+
+ Assume.assumeFalse("LibreSSL does not allow PHA",
+ OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+
ByteChunk res = getUrl("https://localhost:" + getPort() +
"/protected");
Assert.assertEquals("OK-" + TesterSupport.ROLE, res.toString());
}
@@ -88,6 +92,9 @@ public class TestClientCertTls13 extends TomcatBaseTest {
Tomcat tomcat = getTomcatInstance();
tomcat.start();
+ Assume.assumeFalse("LibreSSL does not allow PHA",
+ OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+
int size = 32 * 1024;
byte[] body = new byte[size];
diff --git a/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java
b/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java
index a7e1d3c5c0..8d87e256b2 100644
--- a/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java
+++ b/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java
@@ -24,6 +24,7 @@ import java.util.List;
import javax.net.ssl.SSLException;
import org.junit.Assert;
+import org.junit.Assume;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;
@@ -35,6 +36,7 @@ import org.apache.catalina.startup.TomcatBaseTest;
import org.apache.coyote.ProtocolHandler;
import org.apache.coyote.http11.AbstractHttp11JsseProtocol;
import org.apache.tomcat.util.buf.ByteChunk;
+import org.apache.tomcat.util.net.openssl.OpenSSLStatus;
/**
* The keys and certificates used in this file are all available in svn and
were
@@ -117,6 +119,11 @@ public class TestCustomSslTrustManager extends
TomcatBaseTest {
// Start Tomcat
tomcat.start();
+ Assume.assumeFalse("LibreSSL does not allow renegotiation",
+ OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+ Assume.assumeFalse("BoringSSL does not allow TLS renegotiation",
+ OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+
TesterSupport.configureClientSsl();
// Unprotected resource
diff --git a/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java
b/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java
index 47676bf118..91695b48cc 100644
--- a/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java
+++ b/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java
@@ -22,6 +22,7 @@ import java.util.Collection;
import java.util.List;
import org.junit.Assert;
+import org.junit.Assume;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;
@@ -36,6 +37,7 @@ import org.apache.tomcat.util.buf.ByteChunk;
import org.apache.tomcat.util.net.SSLHostConfigCertificate.StoreType;
import org.apache.tomcat.util.net.SSLHostConfigCertificate.Type;
import org.apache.tomcat.util.net.TesterSupport.ClientSSLSocketFactory;
+import org.apache.tomcat.util.net.openssl.OpenSSLStatus;
/*
* Tests compatibility of JSSE and OpenSSL settings.
@@ -292,6 +294,9 @@ public class TestSSLHostConfigCompat extends TomcatBaseTest
{
Tomcat tomcat = getTomcatInstance();
tomcat.start();
+ Assume.assumeFalse("BoringSSL removes support for many ciphers",
+ OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+
// Check a request can be made
ByteChunk res = getUrl("https://localhost:" + getPort() + "/");
Assert.assertEquals("OK", res.toString());
diff --git a/test/org/apache/tomcat/util/net/TestSsl.java
b/test/org/apache/tomcat/util/net/TestSsl.java
index 004765b3d5..46501ddd2b 100644
--- a/test/org/apache/tomcat/util/net/TestSsl.java
+++ b/test/org/apache/tomcat/util/net/TestSsl.java
@@ -45,6 +45,7 @@ import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;
import org.junit.Assert;
+import org.junit.Assume;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;
@@ -63,6 +64,7 @@ import org.apache.catalina.startup.Tomcat;
import org.apache.catalina.startup.TomcatBaseTest;
import org.apache.catalina.valves.ValveBase;
import org.apache.tomcat.util.buf.ByteChunk;
+import org.apache.tomcat.util.net.openssl.OpenSSLStatus;
import org.apache.tomcat.websocket.server.WsContextListener;
/**
@@ -147,6 +149,10 @@ public class TestSsl extends TomcatBaseTest {
TesterSupport.configureSSLImplementation(tomcat,
sslImplementationName, useOpenSSL);
tomcat.start();
+
+ Assume.assumeFalse("BoringSSL and LibreSSL return no session id",
+ OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName())
|| OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+
getUrl("https://localhost:" + getPort() +
"/examples/servlets/servlet/HelloWorldExample");
// SSL is the only source for the requested session ID, and
SessionTrackingMode.SSL is set on examples
Assert.assertNotNull(sessionId);
diff --git a/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java
b/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java
index 3bd32e6956..553597c776 100644
--- a/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java
+++ b/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java
@@ -123,6 +123,9 @@ public class TestOpenSSLConf extends TomcatBaseTest {
tomcat.start();
+ Assume.assumeFalse("BoringSSL does not support OpenSSLConf",
+ OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+
sslHostConfigs = connector.getProtocolHandler().findSslHostConfigs();
Assert.assertEquals("Wrong SSLHostConfigCount", 1,
sslHostConfigs.length);
return sslHostConfigs[0];
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]