blob: 26f295f4637190807dcf3c4ad4347bdf384c7b8a [file] [log] [blame]
import os
from datetime import timedelta
import pytest
from pyhttpd.certs import CertificateSpec
from pyhttpd.env import HttpdTestEnv
from .md_cert_util import MDCertUtil
from .md_env import MDTestEnv
from .md_conf import MDConf
@pytest.mark.skipif(condition=not MDTestEnv.has_acme_server(),
reason="no ACME test server configured")
class TestAutov2:
@pytest.fixture(autouse=True, scope='class')
def _class_scope(self, env, acme):
env.APACHE_CONF_SRC = "data/test_auto"
acme.start(config='default')
env.check_acme()
env.clear_store()
MDConf(env).install()
assert env.apache_restart() == 0
@pytest.fixture(autouse=True, scope='function')
def _method_scope(self, env, request):
env.clear_store()
self.test_domain = env.get_request_domain(request)
def _write_res_file(self, doc_root, name, content):
if not os.path.exists(doc_root):
os.makedirs(doc_root)
open(os.path.join(doc_root, name), "w").write(content)
# create a MD not used in any virtual host, auto drive should NOT pick it up
def test_md_702_001(self, env):
domain = self.test_domain
# generate config with one MD
domains = [domain, "www." + domain]
conf = MDConf(env, admin="admin@" + domain)
conf.add_drive_mode("auto")
conf.add_md(domains)
conf.install()
#
# restart, check that MD is synched to store
assert env.apache_restart() == 0
env.check_md(domains)
stat = env.get_md_status(domain)
assert stat["watched"] == 0
#
# add vhost for MD, restart should drive it
conf.add_vhost(domains)
conf.install()
assert env.apache_restart() == 0
assert env.await_completion([domain])
env.check_md_complete(domain)
stat = env.get_md_status(domain)
assert stat["watched"] == 1
cert = env.get_cert(domain)
assert domain in cert.get_san_list()
#
# challenges should have been removed
# file system needs to have correct permissions
env.check_dir_empty(env.store_challenges())
env.check_file_permissions(domain)
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10045" # No VirtualHost matches Managed Domain test-md-702-001-1688648129.org
]
)
# test case: same as test_702_001, but with two parallel managed domains
def test_md_702_002(self, env):
domain = self.test_domain
domain_a = "a-" + domain
domain_b = "b-" + domain
#
# generate config with two MDs
domains_a = [domain_a, "www." + domain_a]
domains_b = [domain_b, "www." + domain_b]
conf = MDConf(env)
conf.add_drive_mode("auto")
conf.add_md(domains_a)
conf.add_md(domains_b)
conf.add_vhost(domains_a)
conf.add_vhost(domains_b)
conf.install()
#
# restart, check that md is in store
assert env.apache_restart() == 0
env.check_md(domains_a)
env.check_md(domains_b)
#
# await drive completion, do not restart
assert env.await_completion([domain_a, domain_b], restart=False)
# staged certificates are now visible on the status resources
status = env.get_md_status(domain_a)
assert 'renewal' in status
assert 'cert' in status['renewal']
assert 'rsa' in status['renewal']['cert']
assert 'sha256-fingerprint' in status['renewal']['cert']['rsa']
# check the non-staged status
assert status['state'] == 1
assert status['state-descr'] == "certificate(rsa) is missing"
# restart and activate
assert env.apache_restart() == 0
# check: SSL is running OK
cert_a = env.get_cert(domain_a)
assert domains_a == cert_a.get_san_list()
cert_b = env.get_cert(domain_b)
assert domains_b == cert_b.get_san_list()
# check that we created only one account
md_a = env.get_md_status(domain_a)
md_b = env.get_md_status(domain_b)
assert md_a['ca'] == md_b['ca']
# test case: one MD, that covers two vhosts
def test_md_702_003(self, env):
domain = self.test_domain
name_a = "test-a." + domain
name_b = "test-b." + domain
domains = [domain, name_a, name_b]
#
# generate 1 MD and 2 vhosts
conf = MDConf(env, admin="admin@" + domain)
conf.add_md(domains)
conf.add_vhost(name_a, doc_root="htdocs/a")
conf.add_vhost(name_b, doc_root="htdocs/b")
conf.install()
#
# create docRoot folder
self._write_res_file(os.path.join(env.server_docs_dir, "a"), "name.txt", name_a)
self._write_res_file(os.path.join(env.server_docs_dir, "b"), "name.txt", name_b)
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
env.check_md(domains)
assert env.await_completion([domain])
md = env.check_md_complete(domain)
assert md['ca']['url'], f"URL of CA used not set in md: {md}"
#
# check: SSL is running OK
cert_a = env.get_cert(name_a)
assert name_a in cert_a.get_san_list()
cert_b = env.get_cert(name_b)
assert name_b in cert_b.get_san_list()
assert cert_a.same_serial_as(cert_b)
#
assert env.get_content(name_a, "/name.txt") == name_a
assert env.get_content(name_b, "/name.txt") == name_b
# test case: drive with using single challenge type explicitly
@pytest.mark.parametrize("challenge_type", [
"tls-alpn-01", "http-01",
])
def test_md_702_004(self, env, challenge_type):
domain = self.test_domain
domains = [domain, "www." + domain]
#
# generate 1 MD and 1 vhost
conf = MDConf(env, admin="admin@" + domain)
conf.add("Protocols http/1.1 acme-tls/1")
conf.add_drive_mode("auto")
conf.add(f"MDCAChallenges {challenge_type}")
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
env.check_md(domains)
assert env.await_completion([domain])
env.check_md_complete(domain)
#
# check SSL running OK
cert = env.get_cert(domain)
assert domain in cert.get_san_list()
# test case: drive_mode manual, check that server starts, but requests to domain are 503'd
def test_md_702_005(self, env):
domain = self.test_domain
name_a = "test-a." + domain
domains = [domain, name_a]
#
# generate 1 MD and 1 vhost
conf = MDConf(env, admin="admin@" + domain)
conf.add_drive_mode("manual")
conf.add_md(domains)
conf.add_vhost(name_a, doc_root="htdocs/a")
conf.install()
#
# create docRoot folder
self._write_res_file(os.path.join(env.server_docs_dir, "a"), "name.txt", name_a)
#
# restart, check that md is in store
assert env.apache_restart() == 0
env.check_md(domains)
#
# check: that request to domains give 503 Service Unavailable
cert1 = env.get_cert(name_a)
assert name_a in cert1.get_san_list()
assert env.get_http_status(name_a, "/name.txt") == 503
#
# check temporary cert from server
cert2 = MDCertUtil(env.path_fallback_cert(domain))
assert cert1.same_serial_as(cert2), \
"Unexpected temporary certificate on vhost %s. Expected cn: %s , "\
"but found cn: %s" % (name_a, cert2.get_cn(), cert1.get_cn())
# test case: drive MD with only invalid challenges, domains should stay 503'd
def test_md_702_006(self, env):
domain = self.test_domain
name_a = "test-a." + domain
domains = [domain, name_a]
#
# generate 1 MD, 1 vhost
conf = MDConf(env, admin="admin@" + domain)
conf.add("MDCAChallenges invalid-01 invalid-02")
conf.add_md(domains)
conf.add_vhost(name_a, doc_root="htdocs/a")
conf.install()
#
# create docRoot folder
self._write_res_file(os.path.join(env.server_docs_dir, "a"), "name.txt", name_a)
#
# restart, check that md is in store
assert env.apache_restart() == 0
env.check_md(domains)
# await drive completion
md = env.await_error(domain)
assert md
assert md['renewal']['errors'] > 0
assert md['renewal']['last']['problem'] == 'challenge-mismatch'
assert 'account' not in md['ca']
#
# check: that request to domains give 503 Service Unavailable
cert = env.get_cert(name_a)
assert name_a in cert.get_san_list()
assert env.get_http_status(name_a, "/name.txt") == 503
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10056" # None of offered challenge types
],
matches = [
r'.*problem\[challenge-mismatch\].*'
]
)
# Specify a non-working http proxy
def test_md_702_008(self, env):
domain = self.test_domain
domains = [domain]
#
conf = MDConf(env, admin="admin@" + domain)
conf.add_drive_mode("always")
conf.add("MDHttpProxy http://localhost:1")
conf.add_md(domains)
conf.install()
#
# - restart (-> drive)
assert env.apache_restart() == 0
# await drive completion
md = env.await_error(domain)
assert md
assert md['renewal']['errors'] > 0
assert md['renewal']['last']['status-description'] == 'Connection refused'
assert 'account' not in md['ca']
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10056" # Unsuccessful in contacting ACME server
],
matches = [
r'.*Unsuccessful in contacting ACME server at .*'
]
)
# Specify a valid http proxy
def test_md_702_008a(self, env):
domain = self.test_domain
domains = [domain]
#
conf = MDConf(env, admin=f"admin@{domain}", proxy=True)
conf.add_drive_mode("always")
conf.add(f"MDHttpProxy http://localhost:{env.proxy_port}")
conf.add_md(domains)
conf.install()
#
# - restart (-> drive), check that md is in store
assert env.apache_restart() == 0
assert env.await_completion([domain])
assert env.apache_restart() == 0
env.check_md_complete(domain)
# Force cert renewal due to critical remaining valid duration
# Assert that new cert activation is delayed
def test_md_702_009(self, env):
domain = self.test_domain
domains = [domain]
#
# prepare md
conf = MDConf(env, admin="admin@" + domain)
conf.add_drive_mode("auto")
conf.add_renew_window("10d")
conf.add_md(domains)
conf.add_vhost(domain)
conf.install()
#
# restart (-> drive), check that md+cert is in store, TLS is up
assert env.apache_restart() == 0
assert env.await_completion([domain])
env.check_md_complete(domain)
cert1 = MDCertUtil(env.store_domain_file(domain, 'pubcert.pem'))
# compare with what md reports as status
stat = env.get_certificate_status(domain)
assert cert1.same_serial_as(stat['rsa']['serial'])
#
# create self-signed cert, with critical remaining valid duration -> drive again
creds = env.create_self_signed_cert(CertificateSpec(domains=[domain]),
valid_from=timedelta(days=-120),
valid_to=timedelta(days=2),
serial=7029)
creds.save_cert_pem(env.store_domain_file(domain, 'pubcert.pem'))
creds.save_pkey_pem(env.store_domain_file(domain, 'privkey.pem'))
assert creds.certificate.serial_number == 7029
assert env.apache_restart() == 0
stat = env.get_certificate_status(domain)
assert creds.certificate.serial_number == int(stat['rsa']['serial'], 16)
#
# cert should renew and be different afterwards
assert env.await_completion([domain], must_renew=True)
stat = env.get_certificate_status(domain)
creds.certificate.serial_number != int(stat['rsa']['serial'], 16)
# test case: drive with an unsupported challenge due to port availability
def test_md_702_010(self, env):
domain = self.test_domain
domains = [domain, "www." + domain]
#
# generate 1 MD and 1 vhost, map port 80 to where the server does not listen
conf = MDConf(env, admin="admin@" + domain)
conf.add_drive_mode("auto")
conf.add("MDPortMap 80:99")
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
assert env.apache_restart() == 0
md = env.await_error(domain)
assert md["renewal"]["errors"] > 0
#
# now the same with a 80 mapped to a supported port
conf = MDConf(env, admin="admin@" + domain)
conf.add_drive_mode("auto")
conf.add("MDCAChallenges http-01")
conf.add("MDPortMap 80:%s" % env.http_port)
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
assert env.apache_restart() == 0
env.check_md(domains)
assert env.await_completion([domain])
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10173", # None of the ACME challenge methods configured for this domain are suitable
"AH10056" # None of the ACME challenge methods configured for this domain are suitable
],
matches = [
r'.*None of the ACME challenge methods configured for this domain are suitable.*'
]
)
def test_md_702_011(self, env):
domain = self.test_domain
domains = [domain, "www." + domain]
#
# generate 1 MD and 1 vhost, map port 443 to where the server does not listen
conf = MDConf(env, admin="admin@" + domain)
conf.add("Protocols http/1.1 acme-tls/1")
conf.add_drive_mode("auto")
conf.add("MDPortMap https:99 http:99")
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
assert env.apache_restart() == 0
md = env.await_error(domain)
assert md["renewal"]["errors"] > 0
#
# now the same with a 443 mapped to a supported port
conf = MDConf(env, admin="admin@" + domain)
conf.add("Protocols http/1.1 acme-tls/1")
conf.add_drive_mode("auto")
conf.add("MDCAChallenges tls-alpn-01")
conf.add("MDPortMap https:%s" % env.https_port)
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
assert env.apache_restart() == 0
env.check_md(domains)
assert env.await_completion([domain])
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10173", # None of the ACME challenge methods configured for this domain are suitable
"AH10056" # None of the ACME challenge methods configured for this domain are suitable
],
matches = [
r'.*None of the ACME challenge methods configured for this domain are suitable.*'
]
)
# test case: one MD with several dns names. sign up. remove the *first* name
# in the MD. restart. should find and keep the existing MD.
# See: https://github.com/icing/mod_md/issues/68
def test_md_702_030(self, env):
domain = self.test_domain
name_x = "test-x." + domain
name_a = "test-a." + domain
name_b = "test-b." + domain
domains = [name_x, name_a, name_b]
#
# generate 1 MD and 2 vhosts
conf = MDConf(env, admin="admin@" + domain)
conf.add_md(domains)
conf.add_vhost(name_a)
conf.add_vhost(name_b)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
env.check_md(domains)
assert env.await_completion([name_x])
env.check_md_complete(name_x)
#
# check: SSL is running OK
cert_a = env.get_cert(name_a)
assert name_a in cert_a.get_san_list()
cert_b = env.get_cert(name_b)
assert name_b in cert_b.get_san_list()
assert cert_a.same_serial_as(cert_b)
#
# change MD by removing 1st name
new_list = [name_a, name_b]
conf = MDConf(env, admin="admin@" + domain)
conf.add_md(new_list)
conf.add_vhost(name_a)
conf.add_vhost(name_b)
conf.install()
# restart, check that host still works and kept the cert
assert env.apache_restart() == 0
env.check_md(new_list)
status = env.get_certificate_status(name_a)
assert cert_a.same_serial_as(status['rsa']['serial'])
# test case: Same as 7030, but remove *and* add another at the same time.
# restart. should find and keep the existing MD and renew for additional name.
# See: https://github.com/icing/mod_md/issues/68
def test_md_702_031(self, env):
domain = self.test_domain
name_x = "test-x." + domain
name_a = "test-a." + domain
name_b = "test-b." + domain
name_c = "test-c." + domain
domains = [name_x, name_a, name_b]
#
# generate 1 MD and 2 vhosts
conf = MDConf(env, admin="admin@" + domain)
conf.add_md(domains)
conf.add_vhost(name_a)
conf.add_vhost(name_b)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
env.check_md(domains)
assert env.await_completion([name_x])
env.check_md_complete(name_x)
#
# check: SSL is running OK
cert_a = env.get_cert(name_a)
assert name_a in cert_a.get_san_list()
cert_b = env.get_cert(name_b)
assert name_b in cert_b.get_san_list()
assert cert_a.same_serial_as(cert_b)
#
# change MD by removing 1st name and adding another
new_list = [name_a, name_b, name_c]
conf = MDConf(env, admin="admin@" + domain)
conf.add_md(new_list)
conf.add_vhost(name_a)
conf.add_vhost(name_b)
conf.install()
# restart, check that host still works and have new cert
assert env.apache_restart() == 0
env.check_md(new_list)
assert env.await_completion([name_a])
#
cert_a2 = env.get_cert(name_a)
assert name_a in cert_a2.get_san_list()
assert not cert_a.same_serial_as(cert_a2)
# test case: create two MDs, move them into one
# see: <https://bz.apache.org/bugzilla/show_bug.cgi?id=62572>
def test_md_702_032(self, env):
domain = self.test_domain
name1 = "server1." + domain
name2 = "server2.b" + domain # need a separate TLD to avoid rate limites
#
# generate 2 MDs and 2 vhosts
conf = MDConf(env, admin="admin@" + domain)
conf.add("MDMembers auto")
conf.add_md([name1])
conf.add_md([name2])
conf.add_vhost(name1)
conf.add_vhost(name2)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
env.check_md([name1])
env.check_md([name2])
assert env.await_completion([name1, name2])
env.check_md_complete(name2)
#
# check: SSL is running OK
cert1 = env.get_cert(name1)
assert name1 in cert1.get_san_list()
cert2 = env.get_cert(name2)
assert name2 in cert2.get_san_list()
#
# remove second md and vhost, add name2 to vhost1
conf = MDConf(env, admin="admin@" + domain)
conf.add("MDMembers auto")
conf.add_md([name1])
conf.add_vhost([name1, name2])
conf.install()
assert env.apache_restart() == 0
env.check_md([name1, name2])
assert env.await_completion([name1])
#
cert1b = env.get_cert(name1)
assert name1 in cert1b.get_san_list()
assert name2 in cert1b.get_san_list()
assert not cert1.same_serial_as(cert1b)
# test case: one MD on a vhost with ServerAlias. Renew.
# Exchange ServerName and ServerAlias. Is the rename detected?
# See: https://github.com/icing/mod_md/issues/338
def test_md_702_033(self, env):
domain = self.test_domain
name_x = "test-x." + domain
name_a = "test-a." + domain
domains1 = [name_x, name_a]
#
# generate 1 MD and 2 vhosts
conf = MDConf(env, admin="admin@" + domain)
conf.add_md(domains=[name_x])
conf.add_vhost(domains=domains1)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
env.check_md(domains1)
assert env.await_completion([name_x])
env.check_md_complete(name_x)
cert_x = env.get_cert(name_x)
#
# reverse ServerName and ServerAlias
domains2 = [name_a, name_x]
conf = MDConf(env, admin="admin@" + domain)
conf.add_md(domains=[name_a])
conf.add_vhost(domains=domains2)
conf.install()
# restart, check that host still works and kept the cert
assert env.apache_restart() == 0
status = env.get_certificate_status(name_a)
assert cert_x.same_serial_as(status['rsa']['serial'])
# test case: test "tls-alpn-01" challenge handling
def test_md_702_040(self, env):
domain = self.test_domain
domains = [domain, "www." + domain]
#
# generate 1 MD and 1 vhost
conf = MDConf(env, admin="admin@" + domain)
conf.add("LogLevel core:debug")
conf.add("Protocols http/1.1 acme-tls/1")
conf.add_drive_mode("auto")
conf.add("MDCAChallenges tls-alpn-01")
conf.add_md(domains)
conf.add_vhost(domains=domains)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
env.check_md(domains)
# check that acme-tls/1 is available for all domains
stat = env.get_md_status(domain)
assert stat["proto"]["acme-tls/1"] == domains
assert env.await_completion([domain])
env.check_md_complete(domain)
#
# check SSL running OK
cert = env.get_cert(domain)
assert domain in cert.get_san_list()
# test case: test "tls-alpn-01" without enabling 'acme-tls/1' challenge protocol
def test_md_702_041(self, env):
domain = self.test_domain
domains = [domain, "www." + domain]
#
# generate 1 MD and 1 vhost
conf = MDConf(env, admin="admin@" + domain)
conf.add("LogLevel core:debug")
conf.add_drive_mode("auto")
conf.add("MDCAChallenges tls-alpn-01")
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
#
# restart (-> drive), check that MD job shows errors
# and that missing proto is detected
assert env.apache_restart() == 0
env.check_md(domains)
# check that acme-tls/1 is available for none of the domains
stat = env.get_md_status(domain)
assert stat["proto"]["acme-tls/1"] == []
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10056" # None of the ACME challenge methods configured for this domain are suitable
],
matches = [
r'.*None of the ACME challenge types for domain. *'
]
)
# test case: 2.4.40 mod_ssl stumbles over a SSLCertificateChainFile when installing
# a fallback certificate
@pytest.mark.skipif(HttpdTestEnv.get_ssl_module() != "mod_ssl", reason="only for mod_ssl")
def test_md_702_042(self, env):
domain = self.test_domain
dns_list = [domain]
conf = MDConf(env, admin="admin@" + domain)
conf.add("LogLevel core:debug")
cred = env.get_credentials_for_name(f"test1.{env.http_tld}")[0]
conf.add(f"SSLCertificateChainFile {cred.cert_file}")
conf.add_drive_mode("auto")
conf.add_md(dns_list)
conf.add_vhost(dns_list)
conf.install()
env.httpd_error_log.clear_log()
assert env.apache_restart() == 0
assert env.await_completion([domain])
# test case: test "tls-alpn-01" without enabling 'acme-tls/1' challenge protocol
# and fallback "http-01" configured, see https://github.com/icing/mod_md/issues/255
def test_md_702_043(self, env):
domain = self.test_domain
domains = [domain, "www." + domain]
#
# generate 1 MD and 1 vhost
conf = MDConf(env, admin="admin@" + domain)
conf.add("LogLevel core:debug")
conf.add_drive_mode("auto")
conf.add("MDPortMap 80:%s" % env.http_port)
conf.add("MDCAChallenges tls-alpn-01 http-01")
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
#
# restart (-> drive), check that MD job shows errors
# and that missing proto is detected
assert env.apache_restart() == 0
env.check_md(domains)
# check that acme-tls/1 is available for none of the domains
stat = env.get_md_status(domain)
assert stat["proto"]["acme-tls/1"] == []
# but make sure it completes nevertheless
assert env.await_completion([domain])
# test case: drive with using single challenge type explicitly
# and make sure that dns names not mapped to a VirtualHost also work
@pytest.mark.parametrize("challenge_type", [
"tls-alpn-01" # , "http-01",
])
def test_md_702_044(self, env, challenge_type):
domain = self.test_domain
md_domains = [domain, "mail." + domain]
domains = [domain]
#
# generate 1 MD and 1 vhost
conf = MDConf(env, admin="admin@" + domain)
conf.add("Protocols http/1.1 acme-tls/1")
conf.add_drive_mode("auto")
conf.add(f"MDCAChallenges {challenge_type}")
conf.add_md(md_domains)
conf.add_vhost(domains)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
env.check_md(md_domains)
assert env.await_completion([domain])
env.check_md_complete(domain)
#
# check SSL running OK
cert = env.get_cert(domain)
assert md_domains[0] in cert.get_san_list()
assert md_domains[1] in cert.get_san_list()
# Make a setup using the base server. It will use http-01 challenge.
def test_md_702_050(self, env):
domain = self.test_domain
conf = MDConf(env, admin=f"admin@{domain}")
conf.add(f"""
MDBaseServer on
ServerName {domain}
""")
conf.add_md([domain])
conf.install()
assert env.apache_restart() == 0
assert env.await_completion([domain])
# Make a setup using the base server without http:, will fail.
def test_md_702_051(self, env):
domain = self.test_domain
conf = MDConf(env, admin=f"admin@{domain}")
conf.add(f"""
MDBaseServer on
MDPortMap http:-
ServerName {domain}
""")
conf.add_md([domain])
conf.install()
assert env.apache_restart() == 0
assert env.await_error(domain)
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10173", # None of the ACME challenge methods configured for this domain are suitable
"AH10056" # None of the ACME challenge methods configured for this domain are suitable
],
matches = [
r'.*None of the ACME challenge methods configured for this domain are suitable.*'
]
)
# Make a setup using the base server without http:, but with acme-tls/1, should work.
def test_md_702_052(self, env):
domain = self.test_domain
conf = MDConf(env, std_vhosts=False, admin=f"admin@{domain}")
conf.add([
"MDBaseServer on",
"MDPortMap http:-",
"Protocols h2 http/1.1 acme-tls/1",
f"ServerName {domain}",
"<IfModule ssl_module>",
" SSLEngine on",
"</IfModule>",
"<IfModule tls_module>",
f" TLSEngine {env.https_port}",
"</IfModule>",
])
conf.add_md([domain])
conf.install()
assert env.apache_restart() == 0
stat = env.get_md_status(domain, via_domain=env.http_addr, use_https=False)
assert stat["proto"]["acme-tls/1"] == [domain]
assert env.await_completion([domain], via_domain=env.http_addr, use_https=False)
# Test a domain name longer than 64 chars, but components < 64, see #227
# Background: DNS has an official limit of 253 ASCII chars and components must be
# of length [1, 63].
# However the CN in a certificate is restricted too, see
# <https://github.com/letsencrypt/boulder/issues/2093>.
@pytest.mark.skipif(MDTestEnv.is_pebble(), reason="pebble differs here from boulder")
@pytest.mark.parametrize("challenge_type", [
"tls-alpn-01", "http-01"
])
def test_md_702_060(self, env, challenge_type):
domain = self.test_domain
# use only too long names, this is expected to fail:
# see <https://github.com/jetstack/cert-manager/issues/1462>
long_domain = ("x" * (65 - len(domain))) + domain
domains = [long_domain, "www." + long_domain]
conf = MDConf(env, admin="admin@" + domain)
conf.add("Protocols http/1.1 acme-tls/1")
conf.add_drive_mode("auto")
conf.add(f"MDCAChallenges {challenge_type}")
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
assert env.apache_restart() == 0
env.check_md(domains)
assert env.await_error(long_domain)
# add a short domain to the SAN list, the CA should now use that one
# and issue a cert.
long_domain = ("y" * (65 - len(domain))) + domain
domains = [long_domain, "www." + long_domain, "xxx." + domain]
conf = MDConf(env, admin="admin@" + domain)
conf.add("Protocols http/1.1 acme-tls/1")
conf.add_drive_mode("auto")
conf.add(f"MDCAChallenges {challenge_type}")
conf.add_md(domains)
conf.add_vhost(domains)
conf.install()
assert env.apache_restart() == 0
assert env.await_completion([long_domain])
env.check_md_complete(long_domain)
#
# check SSL running OK
cert = env.get_cert(long_domain)
assert long_domain in cert.get_san_list()
# test case: fourth level domain
def test_md_702_070(self, env):
domain = self.test_domain
name_a = "one.test." + domain
name_b = "two.test." + domain
domains = [name_a, name_b]
#
# generate 1 MD and 2 vhosts
conf = MDConf(env)
conf.add_admin("admin@" + domain)
conf.add_md(domains)
conf.add_vhost(name_a)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
assert env.await_completion(domains)
env.check_md_complete(domains[0])
# test case: fifth level domain
def test_md_702_071(self, env):
domain = self.test_domain
name_a = "one.more.test." + domain
name_b = "two.more.test." + domain
domains = [name_a, name_b]
#
# generate 1 MD and 2 vhosts
conf = MDConf(env)
conf.add_admin("admin@" + domain)
conf.add_md(domains)
conf.add_vhost(name_a)
conf.install()
#
# restart (-> drive), check that MD was synched and completes
assert env.apache_restart() == 0
assert env.await_completion(domains)
env.check_md_complete(domains[0])