This is an automated email from the ASF dual-hosted git repository.

remm pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/main by this push:
     new 9d6ca73f74 Add additional check for the OpenSSL variant
9d6ca73f74 is described below

commit 9d6ca73f7485b65a8544c2b8f4f7f1209710b8d1
Author: remm <r...@apache.org>
AuthorDate: Wed Oct 16 15:14:15 2024 +0200

    Add additional check for the OpenSSL variant
    
    Otherwise since this is all static, JSSE could be skipped in some cases
    for example.
---
 test/org/apache/catalina/valves/rewrite/TestResolverSSL.java   | 4 ++--
 test/org/apache/tomcat/util/net/TestClientCert.java            | 8 ++++----
 test/org/apache/tomcat/util/net/TestClientCertTls13.java       | 4 ++--
 test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java | 4 ++--
 test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java   | 2 +-
 test/org/apache/tomcat/util/net/TestSsl.java                   | 3 ++-
 test/org/apache/tomcat/util/net/TesterSupport.java             | 6 ++++++
 test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java   | 5 +++--
 8 files changed, 22 insertions(+), 14 deletions(-)

diff --git a/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java 
b/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java
index 8e15f79627..4252beec09 100644
--- a/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java
+++ b/test/org/apache/catalina/valves/rewrite/TestResolverSSL.java
@@ -85,9 +85,9 @@ public class TestResolverSSL extends TomcatBaseTest {
         tomcat.start();
 
         Assume.assumeFalse("LibreSSL does not allow renegotiation",
-                OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.LIBRESSL));
         Assume.assumeFalse("BoringSSL does not allow TLS renegotiation",
-                OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.BORINGSSL));
 
         ByteChunk res = getUrl("https://localhost:"; + getPort() + 
"/protected");
         // Just look a bit at the result
diff --git a/test/org/apache/tomcat/util/net/TestClientCert.java 
b/test/org/apache/tomcat/util/net/TestClientCert.java
index 2ff237aac3..4659054559 100644
--- a/test/org/apache/tomcat/util/net/TestClientCert.java
+++ b/test/org/apache/tomcat/util/net/TestClientCert.java
@@ -87,9 +87,9 @@ public class TestClientCert extends TomcatBaseTest {
         getTomcatInstance().start();
 
         Assume.assumeFalse("LibreSSL does not allow renegotiation",
-                OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.LIBRESSL));
         Assume.assumeFalse("BoringSSL does not allow TLS renegotiation",
-                OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.BORINGSSL));
 
         // Unprotected resource
         ByteChunk res = getUrl("https://localhost:"; + getPort() + 
"/unprotected");
@@ -164,9 +164,9 @@ public class TestClientCert extends TomcatBaseTest {
         tomcat.start();
 
         Assume.assumeFalse("LibreSSL does not allow renegotiation",
-                OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.LIBRESSL));
         Assume.assumeFalse("BoringSSL does not allow TLS renegotiation",
-                OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.BORINGSSL));
 
         byte[] body = new byte[bodySize];
         Arrays.fill(body, TesterSupport.DATA);
diff --git a/test/org/apache/tomcat/util/net/TestClientCertTls13.java 
b/test/org/apache/tomcat/util/net/TestClientCertTls13.java
index d74e2e8f87..4cac01286a 100644
--- a/test/org/apache/tomcat/util/net/TestClientCertTls13.java
+++ b/test/org/apache/tomcat/util/net/TestClientCertTls13.java
@@ -81,7 +81,7 @@ public class TestClientCertTls13 extends TomcatBaseTest {
         tomcat.start();
 
         Assume.assumeFalse("LibreSSL does not allow PHA",
-                OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.LIBRESSL));
 
         ByteChunk res = getUrl("https://localhost:"; + getPort() + 
"/protected");
         Assert.assertEquals("OK-" + TesterSupport.ROLE, res.toString());
@@ -93,7 +93,7 @@ public class TestClientCertTls13 extends TomcatBaseTest {
         tomcat.start();
 
         Assume.assumeFalse("LibreSSL does not allow PHA",
-                OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.LIBRESSL));
 
         int size = 32 * 1024;
 
diff --git a/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java 
b/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java
index 92c5247654..74ea42aa4b 100644
--- a/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java
+++ b/test/org/apache/tomcat/util/net/TestCustomSslTrustManager.java
@@ -120,9 +120,9 @@ public class TestCustomSslTrustManager extends 
TomcatBaseTest {
         tomcat.start();
 
         Assume.assumeFalse("LibreSSL does not allow renegotiation",
-                OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.LIBRESSL));
         Assume.assumeFalse("BoringSSL does not allow TLS renegotiation",
-                OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.BORINGSSL));
 
         TesterSupport.configureClientSsl();
 
diff --git a/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java 
b/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java
index 14ec875c7d..47c50836b9 100644
--- a/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java
+++ b/test/org/apache/tomcat/util/net/TestSSLHostConfigCompat.java
@@ -299,7 +299,7 @@ public class TestSSLHostConfigCompat extends TomcatBaseTest 
{
         tomcat.start();
 
         Assume.assumeFalse("BoringSSL removes support for many ciphers",
-                OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.BORINGSSL));
 
         // Check a request can be made
         ByteChunk res = getUrl("https://localhost:"; + getPort() + "/");
diff --git a/test/org/apache/tomcat/util/net/TestSsl.java 
b/test/org/apache/tomcat/util/net/TestSsl.java
index 46501ddd2b..925e0a403e 100644
--- a/test/org/apache/tomcat/util/net/TestSsl.java
+++ b/test/org/apache/tomcat/util/net/TestSsl.java
@@ -151,7 +151,8 @@ public class TestSsl extends TomcatBaseTest {
         tomcat.start();
 
         Assume.assumeFalse("BoringSSL and LibreSSL return no session id",
-                OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()) 
|| OpenSSLStatus.Name.LIBRESSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.BORINGSSL)
+                    || TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.LIBRESSL));
 
         getUrl("https://localhost:"; + getPort() + 
"/examples/servlets/servlet/HelloWorldExample");
         // SSL is the only source for the requested session ID, and 
SessionTrackingMode.SSL is set on examples
diff --git a/test/org/apache/tomcat/util/net/TesterSupport.java 
b/test/org/apache/tomcat/util/net/TesterSupport.java
index 308f28acc2..fa870ddca4 100644
--- a/test/org/apache/tomcat/util/net/TesterSupport.java
+++ b/test/org/apache/tomcat/util/net/TesterSupport.java
@@ -66,6 +66,7 @@ import 
org.apache.tomcat.util.descriptor.web.SecurityConstraint;
 import org.apache.tomcat.util.net.SSLHostConfigCertificate.Type;
 import org.apache.tomcat.util.net.jsse.JSSEImplementation;
 import org.apache.tomcat.util.net.openssl.OpenSSLImplementation;
+import org.apache.tomcat.util.net.openssl.OpenSSLStatus;
 
 public final class TesterSupport {
 
@@ -230,6 +231,11 @@ public final class TesterSupport {
         
Assert.assertTrue(tomcat.getConnector().setProperty("sslImplementationName", 
sslImplementationName));
     }
 
+    public static boolean isOpenSSLVariant(String sslImplementationName, 
OpenSSLStatus.Name name) {
+        return 
"org.apache.tomcat.util.net.openssl.panama.OpenSSLImplementation".equals(sslImplementationName)
+                && name.equals(OpenSSLStatus.getName());
+    }
+
     public static void configureClientCertContext(Tomcat tomcat) {
         initSsl(tomcat);
 
diff --git a/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java 
b/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java
index 553597c776..46f07d0ac6 100644
--- a/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java
+++ b/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java
@@ -96,7 +96,8 @@ public class TestOpenSSLConf extends TomcatBaseTest {
         } else if 
("org.apache.tomcat.util.net.openssl.panama.OpenSSLImplementation".equals(sslImplementationName))
 {
             LifecycleListener listener = new OpenSSLLifecycleListener();
             Assume.assumeTrue(OpenSSLLifecycleListener.isAvailable());
-            
Assume.assumeFalse(Class.forName("org.apache.tomcat.util.openssl.openssl_h_Compatibility").getField("LIBRESSL").getBoolean(null));
+            Assume.assumeFalse("LibreSSL does not support OpenSSLConf",
+                    
Class.forName("org.apache.tomcat.util.openssl.openssl_h_Compatibility").getField("LIBRESSL").getBoolean(null));
             StandardServer server = (StandardServer) tomcat.getServer();
             server.addLifecycleListener(listener);
         }
@@ -124,7 +125,7 @@ public class TestOpenSSLConf extends TomcatBaseTest {
         tomcat.start();
 
         Assume.assumeFalse("BoringSSL does not support OpenSSLConf",
-                OpenSSLStatus.Name.BORINGSSL.equals(OpenSSLStatus.getName()));
+                TesterSupport.isOpenSSLVariant(sslImplementationName, 
OpenSSLStatus.Name.BORINGSSL));
 
         sslHostConfigs = connector.getProtocolHandler().findSslHostConfigs();
         Assert.assertEquals("Wrong SSLHostConfigCount", 1, 
sslHostConfigs.length);


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to