This is an automated email from the ASF dual-hosted git repository. remm pushed a commit to branch 9.0.x in repository https://gitbox.apache.org/repos/asf/tomcat.git
The following commit(s) were added to refs/heads/9.0.x by this push: new 97d1d909e4 Skip tests for some OpenSSL derivatives 97d1d909e4 is described below commit 97d1d909e407ee783ee69d0a3dc5e5b00b3aadfd Author: remm <r...@apache.org> AuthorDate: Mon Oct 7 13:30:30 2024 +0200 Skip tests for some OpenSSL derivatives --- test/org/apache/catalina/valves/rewrite/TestResolverSSL.java | 7 +++++++ test/org/apache/tomcat/util/net/TestClientCert.java | 12 ++++++++++++ test/org/apache/tomcat/util/net/TestClientCertTls13.java | 7 +++++++ .../apache/tomcat/util/net/TestCustomSslTrustManager.java | 7 +++++++ test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java | 5 +++++ test/org/apache/tomcat/util/net/TestSsl.java | 6 ++++++ test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java | 3 +++ 7 files changed, 47 insertions(+) diff --git a/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java b/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java index c9374260f5..7b2c7a095b 100644 --- a/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java +++ b/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java @@ -44,6 +44,7 @@ import org.apache.tomcat.util.buf.ByteChunk; import org.apache.tomcat.util.net.SSLHostConfig; import org.apache.tomcat.util.net.TesterSupport; import org.apache.tomcat.util.net.openssl.OpenSSLImplementation; +import org.apache.tomcat.util.net.openssl.OpenSSLStatus; @RunWith(Parameterized.class) public class TestResolverSSL extends TomcatBaseTest { @@ -82,6 +83,12 @@ public class TestResolverSSL extends TomcatBaseTest { sslHostConfig.setSessionCacheSize(20 * 1024); tomcat.start(); + + Assume.assumeFalse("LibreSSL does not allow renegotiation", + OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName())); + Assume.assumeFalse("BoringSSL does not allow TLS renegotiation", + OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName())); + ByteChunk res = getUrl("https://localhost:" + getPort() + "/protected"); // Just look a bit at the result System.out.println(res.toString()); diff --git a/test/org/apache/tomcat/util/net/TestClientCert.java b/test/org/apache/tomcat/util/net/TestClientCert.java index eeabba688c..2ff237aac3 100644 --- a/test/org/apache/tomcat/util/net/TestClientCert.java +++ b/test/org/apache/tomcat/util/net/TestClientCert.java @@ -22,6 +22,7 @@ import java.util.Collection; import java.util.List; import org.junit.Assert; +import org.junit.Assume; import org.junit.Test; import org.junit.runner.RunWith; import org.junit.runners.Parameterized; @@ -31,6 +32,7 @@ import org.apache.catalina.Context; import org.apache.catalina.startup.Tomcat; import org.apache.catalina.startup.TomcatBaseTest; import org.apache.tomcat.util.buf.ByteChunk; +import org.apache.tomcat.util.net.openssl.OpenSSLStatus; /** * The keys and certificates used in this file are all available in svn and were @@ -84,6 +86,11 @@ public class TestClientCert extends TomcatBaseTest { getTomcatInstance().start(); + Assume.assumeFalse("LibreSSL does not allow renegotiation", + OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName())); + Assume.assumeFalse("BoringSSL does not allow TLS renegotiation", + OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName())); + // Unprotected resource ByteChunk res = getUrl("https://localhost:" + getPort() + "/unprotected"); @@ -156,6 +163,11 @@ public class TestClientCert extends TomcatBaseTest { Tomcat tomcat = getTomcatInstance(); tomcat.start(); + Assume.assumeFalse("LibreSSL does not allow renegotiation", + OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName())); + Assume.assumeFalse("BoringSSL does not allow TLS renegotiation", + OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName())); + byte[] body = new byte[bodySize]; Arrays.fill(body, TesterSupport.DATA); diff --git a/test/org/apache/tomcat/util/net/TestClientCertTls13.java b/test/org/apache/tomcat/util/net/TestClientCertTls13.java index 5f8555b1c8..d74e2e8f87 100644 --- a/test/org/apache/tomcat/util/net/TestClientCertTls13.java +++ b/test/org/apache/tomcat/util/net/TestClientCertTls13.java @@ -79,6 +79,10 @@ public class TestClientCertTls13 extends TomcatBaseTest { public void testClientCertGet() throws Exception { Tomcat tomcat = getTomcatInstance(); tomcat.start(); + + Assume.assumeFalse("LibreSSL does not allow PHA", + OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName())); + ByteChunk res = getUrl("https://localhost:" + getPort() + "/protected"); Assert.assertEquals("OK-" + TesterSupport.ROLE, res.toString()); } @@ -88,6 +92,9 @@ public class TestClientCertTls13 extends TomcatBaseTest { Tomcat tomcat = getTomcatInstance(); tomcat.start(); + Assume.assumeFalse("LibreSSL does not allow PHA", + OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName())); + int size = 32 * 1024; byte[] body = new byte[size]; diff --git a/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java b/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java index d82aa49a9d..0a7e638095 100644 --- a/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java +++ b/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java @@ -24,6 +24,7 @@ import java.util.List; import javax.net.ssl.SSLException; import org.junit.Assert; +import org.junit.Assume; import org.junit.Test; import org.junit.runner.RunWith; import org.junit.runners.Parameterized; @@ -35,6 +36,7 @@ import org.apache.catalina.startup.TomcatBaseTest; import org.apache.coyote.ProtocolHandler; import org.apache.coyote.http11.AbstractHttp11JsseProtocol; import org.apache.tomcat.util.buf.ByteChunk; +import org.apache.tomcat.util.net.openssl.OpenSSLStatus; /** * The keys and certificates used in this file are all available in svn and were @@ -122,6 +124,11 @@ public class TestCustomSslTrustManager extends TomcatBaseTest { // Start Tomcat tomcat.start(); + Assume.assumeFalse("LibreSSL does not allow renegotiation", + OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName())); + Assume.assumeFalse("BoringSSL does not allow TLS renegotiation", + OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName())); + TesterSupport.configureClientSsl(); // Unprotected resource diff --git a/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java b/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java index 47676bf118..91695b48cc 100644 --- a/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java +++ b/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java @@ -22,6 +22,7 @@ import java.util.Collection; import java.util.List; import org.junit.Assert; +import org.junit.Assume; import org.junit.Test; import org.junit.runner.RunWith; import org.junit.runners.Parameterized; @@ -36,6 +37,7 @@ import org.apache.tomcat.util.buf.ByteChunk; import org.apache.tomcat.util.net.SSLHostConfigCertificate.StoreType; import org.apache.tomcat.util.net.SSLHostConfigCertificate.Type; import org.apache.tomcat.util.net.TesterSupport.ClientSSLSocketFactory; +import org.apache.tomcat.util.net.openssl.OpenSSLStatus; /* * Tests compatibility of JSSE and OpenSSL settings. @@ -292,6 +294,9 @@ public class TestSSLHostConfigCompat extends TomcatBaseTest { Tomcat tomcat = getTomcatInstance(); tomcat.start(); + Assume.assumeFalse("BoringSSL removes support for many ciphers", + OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName())); + // Check a request can be made ByteChunk res = getUrl("https://localhost:" + getPort() + "/"); Assert.assertEquals("OK", res.toString()); diff --git a/test/org/apache/tomcat/util/net/TestSsl.java b/test/org/apache/tomcat/util/net/TestSsl.java index d9be2053be..03770e09a8 100644 --- a/test/org/apache/tomcat/util/net/TestSsl.java +++ b/test/org/apache/tomcat/util/net/TestSsl.java @@ -44,6 +44,7 @@ import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import org.junit.Assert; +import org.junit.Assume; import org.junit.Test; import org.junit.runner.RunWith; import org.junit.runners.Parameterized; @@ -62,6 +63,7 @@ import org.apache.catalina.startup.Tomcat; import org.apache.catalina.startup.TomcatBaseTest; import org.apache.catalina.valves.ValveBase; import org.apache.tomcat.util.buf.ByteChunk; +import org.apache.tomcat.util.net.openssl.OpenSSLStatus; import org.apache.tomcat.websocket.server.WsContextListener; /** @@ -146,6 +148,10 @@ public class TestSsl extends TomcatBaseTest { TesterSupport.configureSSLImplementation(tomcat, sslImplementationName, useOpenSSL); tomcat.start(); + + Assume.assumeFalse("BoringSSL and LibreSSL return no session id", + OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()) || OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName())); + getUrl("https://localhost:" + getPort() + "/examples/servlets/servlet/HelloWorldExample"); // SSL is the only source for the requested session ID, and SessionTrackingMode.SSL is set on examples Assert.assertNotNull(sessionId); diff --git a/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java b/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java index 5fc803bec3..8539bada27 100644 --- a/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java +++ b/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java @@ -135,6 +135,9 @@ public class TestOpenSSLConf extends TomcatBaseTest { tomcat.start(); + Assume.assumeFalse("BoringSSL does not support OpenSSLConf", + OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName())); + sslHostConfigs = connector.getProtocolHandler().findSslHostConfigs(); Assert.assertEquals("Wrong SSLHostConfigCount", 1, sslHostConfigs.length); return sslHostConfigs[0]; --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org