mirror of
https://github.com/certbot/certbot.git
synced 2026-01-26 07:41:33 +03:00
This is one of the things that newer versions of `pylint` complains about. * git grep -l super\( | xargs sed -i 's/super([^)]*)/super()/g' * fix spacing
187 lines
7.9 KiB
Python
187 lines
7.9 KiB
Python
"""Tests for certbot_nginx._internal.http_01"""
|
|
import unittest
|
|
|
|
import josepy as jose
|
|
try:
|
|
import mock
|
|
except ImportError: # pragma: no cover
|
|
from unittest import mock # type: ignore
|
|
|
|
from acme import challenges
|
|
from certbot import achallenges
|
|
from certbot.tests import acme_util
|
|
from certbot.tests import util as test_util
|
|
from certbot_nginx._internal.obj import Addr
|
|
import test_util as util
|
|
|
|
AUTH_KEY = jose.JWKRSA.load(test_util.load_vector("rsa512_key.pem"))
|
|
|
|
|
|
class HttpPerformTest(util.NginxTest):
|
|
"""Test the NginxHttp01 challenge."""
|
|
|
|
account_key = AUTH_KEY
|
|
achalls = [
|
|
achallenges.KeyAuthorizationAnnotatedChallenge(
|
|
challb=acme_util.chall_to_challb(
|
|
challenges.HTTP01(token=b"kNdwjwOeX0I_A8DXt9Msmg"), "pending"),
|
|
domain="www.example.com", account_key=account_key),
|
|
achallenges.KeyAuthorizationAnnotatedChallenge(
|
|
challb=acme_util.chall_to_challb(
|
|
challenges.HTTP01(
|
|
token=b"\xba\xa9\xda?<m\xaewmx\xea\xad\xadv\xf4\x02\xc9y"
|
|
b"\x80\xe2_X\t\xe7\xc7\xa4\t\xca\xf7&\x945"
|
|
), "pending"),
|
|
domain="ipv6.com", account_key=account_key),
|
|
achallenges.KeyAuthorizationAnnotatedChallenge(
|
|
challb=acme_util.chall_to_challb(
|
|
challenges.HTTP01(
|
|
token=b"\x8c\x8a\xbf_-f\\cw\xee\xd6\xf8/\xa5\xe3\xfd"
|
|
b"\xeb9\xf1\xf5\xb9\xefVM\xc9w\xa4u\x9c\xe1\x87\xb4"
|
|
), "pending"),
|
|
domain="www.example.org", account_key=account_key),
|
|
achallenges.KeyAuthorizationAnnotatedChallenge(
|
|
challb=acme_util.chall_to_challb(
|
|
challenges.HTTP01(token=b"kNdwjxOeX0I_A8DXt9Msmg"), "pending"),
|
|
domain="migration.com", account_key=account_key),
|
|
achallenges.KeyAuthorizationAnnotatedChallenge(
|
|
challb=acme_util.chall_to_challb(
|
|
challenges.HTTP01(token=b"kNdwjxOeX0I_A8DXt9Msmg"), "pending"),
|
|
domain="ipv6ssl.com", account_key=account_key),
|
|
]
|
|
|
|
def setUp(self):
|
|
super().setUp()
|
|
|
|
config = self.get_nginx_configurator(
|
|
self.config_path, self.config_dir, self.work_dir, self.logs_dir)
|
|
|
|
from certbot_nginx._internal import http_01
|
|
self.http01 = http_01.NginxHttp01(config)
|
|
|
|
def test_perform0(self):
|
|
responses = self.http01.perform()
|
|
self.assertEqual([], responses)
|
|
|
|
@mock.patch("certbot_nginx._internal.configurator.NginxConfigurator.save")
|
|
def test_perform1(self, mock_save):
|
|
self.http01.add_chall(self.achalls[0])
|
|
response = self.achalls[0].response(self.account_key)
|
|
|
|
responses = self.http01.perform()
|
|
|
|
self.assertEqual([response], responses)
|
|
self.assertEqual(mock_save.call_count, 1)
|
|
|
|
def test_perform2(self):
|
|
acme_responses = []
|
|
for achall in self.achalls:
|
|
self.http01.add_chall(achall)
|
|
acme_responses.append(achall.response(self.account_key))
|
|
|
|
http_responses = self.http01.perform()
|
|
|
|
self.assertEqual(len(http_responses), 5)
|
|
for i in range(5):
|
|
self.assertEqual(http_responses[i], acme_responses[i])
|
|
|
|
def test_mod_config(self):
|
|
self.http01.add_chall(self.achalls[0])
|
|
self.http01.add_chall(self.achalls[2])
|
|
|
|
self.http01._mod_config() # pylint: disable=protected-access
|
|
|
|
self.http01.configurator.save()
|
|
|
|
self.http01.configurator.parser.load()
|
|
|
|
# vhosts = self.http01.configurator.parser.get_vhosts()
|
|
|
|
# for vhost in vhosts:
|
|
# pass
|
|
# if the name matches
|
|
# check that the location block is in there and is correct
|
|
|
|
# if vhost.addrs == set(v_addr1):
|
|
# response = self.achalls[0].response(self.account_key)
|
|
# else:
|
|
# response = self.achalls[2].response(self.account_key)
|
|
# self.assertEqual(vhost.addrs, set(v_addr2_print))
|
|
# self.assertEqual(vhost.names, set([response.z_domain.decode('ascii')]))
|
|
|
|
@mock.patch('certbot_nginx._internal.parser.NginxParser.add_server_directives')
|
|
def test_mod_config_http_and_https(self, mock_add_server_directives):
|
|
"""A server_name with both HTTP and HTTPS vhosts should get modded in both vhosts"""
|
|
self.configuration.https_port = 443
|
|
self.http01.add_chall(self.achalls[3]) # migration.com
|
|
self.http01._mod_config() # pylint: disable=protected-access
|
|
|
|
# Domain has an HTTP and HTTPS vhost
|
|
# 2 * 'rewrite' + 2 * 'return 200 keyauthz' = 4
|
|
self.assertEqual(mock_add_server_directives.call_count, 4)
|
|
|
|
@mock.patch('certbot_nginx._internal.parser.nginxparser.dump')
|
|
@mock.patch('certbot_nginx._internal.parser.NginxParser.add_server_directives')
|
|
def test_mod_config_only_https(self, mock_add_server_directives, mock_dump):
|
|
"""A server_name with only an HTTPS vhost should get modded"""
|
|
self.http01.add_chall(self.achalls[4]) # ipv6ssl.com
|
|
self.http01._mod_config() # pylint: disable=protected-access
|
|
|
|
# It should modify the existing HTTPS vhost
|
|
self.assertEqual(mock_add_server_directives.call_count, 2)
|
|
# since there was no suitable HTTP vhost or default HTTP vhost, a non-empty one
|
|
# should have been created and written to the challenge conf file
|
|
self.assertNotEqual(mock_dump.call_args[0][0], [])
|
|
|
|
@mock.patch('certbot_nginx._internal.parser.NginxParser.add_server_directives')
|
|
def test_mod_config_deduplicate(self, mock_add_server_directives):
|
|
"""A vhost that appears in both HTTP and HTTPS vhosts only gets modded once"""
|
|
achall = achallenges.KeyAuthorizationAnnotatedChallenge(
|
|
challb=acme_util.chall_to_challb(
|
|
challenges.HTTP01(token=b"kNdwjxOeX0I_A8DXt9Msmg"), "pending"),
|
|
domain="ssl.both.com", account_key=AUTH_KEY)
|
|
self.http01.add_chall(achall)
|
|
self.http01._mod_config() # pylint: disable=protected-access
|
|
|
|
# Should only get called 5 times, rather than 6, because two vhosts are the same
|
|
self.assertEqual(mock_add_server_directives.call_count, 5*2)
|
|
|
|
@mock.patch("certbot_nginx._internal.configurator.NginxConfigurator.ipv6_info")
|
|
def test_default_listen_addresses_no_memoization(self, ipv6_info):
|
|
# pylint: disable=protected-access
|
|
ipv6_info.return_value = (True, True)
|
|
self.http01._default_listen_addresses()
|
|
self.assertEqual(ipv6_info.call_count, 1)
|
|
ipv6_info.return_value = (False, False)
|
|
self.http01._default_listen_addresses()
|
|
self.assertEqual(ipv6_info.call_count, 2)
|
|
|
|
@mock.patch("certbot_nginx._internal.configurator.NginxConfigurator.ipv6_info")
|
|
def test_default_listen_addresses_t_t(self, ipv6_info):
|
|
# pylint: disable=protected-access
|
|
ipv6_info.return_value = (True, True)
|
|
addrs = self.http01._default_listen_addresses()
|
|
http_addr = Addr.fromstring("80")
|
|
http_ipv6_addr = Addr.fromstring("[::]:80")
|
|
self.assertEqual(addrs, [http_addr, http_ipv6_addr])
|
|
|
|
@mock.patch("certbot_nginx._internal.configurator.NginxConfigurator.ipv6_info")
|
|
def test_default_listen_addresses_t_f(self, ipv6_info):
|
|
# pylint: disable=protected-access
|
|
ipv6_info.return_value = (True, False)
|
|
addrs = self.http01._default_listen_addresses()
|
|
http_addr = Addr.fromstring("80")
|
|
http_ipv6_addr = Addr.fromstring("[::]:80 ipv6only=on")
|
|
self.assertEqual(addrs, [http_addr, http_ipv6_addr])
|
|
|
|
@mock.patch("certbot_nginx._internal.configurator.NginxConfigurator.ipv6_info")
|
|
def test_default_listen_addresses_f_f(self, ipv6_info):
|
|
# pylint: disable=protected-access
|
|
ipv6_info.return_value = (False, False)
|
|
addrs = self.http01._default_listen_addresses()
|
|
http_addr = Addr.fromstring("80")
|
|
self.assertEqual(addrs, [http_addr])
|
|
|
|
if __name__ == "__main__":
|
|
unittest.main() # pragma: no cover
|