Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/certbot/certbot.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'certbot-apache/tests/configurator_test.py')
-rw-r--r--certbot-apache/tests/configurator_test.py1769
1 files changed, 1769 insertions, 0 deletions
diff --git a/certbot-apache/tests/configurator_test.py b/certbot-apache/tests/configurator_test.py
new file mode 100644
index 000000000..9fab5ea5d
--- /dev/null
+++ b/certbot-apache/tests/configurator_test.py
@@ -0,0 +1,1769 @@
+# pylint: disable=too-many-lines
+"""Test for certbot_apache._internal.configurator."""
+import copy
+import shutil
+import socket
+import tempfile
+import unittest
+
+import mock
+import six # pylint: disable=unused-import # six is used in mock.patch()
+
+from acme import challenges
+from certbot import achallenges
+from certbot import crypto_util
+from certbot import errors
+from certbot.compat import filesystem
+from certbot.compat import os
+from certbot.tests import acme_util
+from certbot.tests import util as certbot_util
+from certbot_apache._internal import apache_util
+from certbot_apache._internal import constants
+from certbot_apache._internal import obj
+from certbot_apache._internal import parser
+import util
+
+
+class MultipleVhostsTest(util.ApacheTest):
+ """Test two standard well-configured HTTP vhosts."""
+
+ def setUp(self): # pylint: disable=arguments-differ
+ super(MultipleVhostsTest, self).setUp()
+
+ self.config = util.get_apache_configurator(
+ self.config_path, self.vhost_path, self.config_dir, self.work_dir)
+ self.config = self.mock_deploy_cert(self.config)
+ self.vh_truth = util.get_vh_truth(
+ self.temp_dir, "debian_apache_2_4/multiple_vhosts")
+
+ def mock_deploy_cert(self, config):
+ """A test for a mock deploy cert"""
+ config.real_deploy_cert = self.config.deploy_cert
+
+ def mocked_deploy_cert(*args, **kwargs):
+ """a helper to mock a deployed cert"""
+ g_mod = "certbot_apache._internal.configurator.ApacheConfigurator.enable_mod"
+ with mock.patch(g_mod):
+ config.real_deploy_cert(*args, **kwargs)
+ self.config.deploy_cert = mocked_deploy_cert
+ return self.config
+
+ @mock.patch("certbot_apache._internal.configurator.path_surgery")
+ def test_prepare_no_install(self, mock_surgery):
+ silly_path = {"PATH": "/tmp/nothingness2342"}
+ mock_surgery.return_value = False
+ with mock.patch.dict('os.environ', silly_path):
+ self.assertRaises(errors.NoInstallationError, self.config.prepare)
+ self.assertEqual(mock_surgery.call_count, 1)
+
+ @mock.patch("certbot_apache._internal.parser.ApacheParser")
+ @mock.patch("certbot_apache._internal.configurator.util.exe_exists")
+ def test_prepare_version(self, mock_exe_exists, _):
+ mock_exe_exists.return_value = True
+ self.config.version = None
+ self.config.config_test = mock.Mock()
+ self.config.get_version = mock.Mock(return_value=(1, 1))
+
+ self.assertRaises(
+ errors.NotSupportedError, self.config.prepare)
+
+ def test_prepare_locked(self):
+ server_root = self.config.conf("server-root")
+ self.config.config_test = mock.Mock()
+ os.remove(os.path.join(server_root, ".certbot.lock"))
+ certbot_util.lock_and_call(self._test_prepare_locked, server_root)
+
+ @mock.patch("certbot_apache._internal.parser.ApacheParser")
+ @mock.patch("certbot_apache._internal.configurator.util.exe_exists")
+ def _test_prepare_locked(self, unused_parser, unused_exe_exists):
+ try:
+ self.config.prepare()
+ except errors.PluginError as err:
+ err_msg = str(err)
+ self.assertTrue("lock" in err_msg)
+ self.assertTrue(self.config.conf("server-root") in err_msg)
+ else: # pragma: no cover
+ self.fail("Exception wasn't raised!")
+
+ def test_add_parser_arguments(self): # pylint: disable=no-self-use
+ from certbot_apache._internal.configurator import ApacheConfigurator
+ # Weak test..
+ ApacheConfigurator.add_parser_arguments(mock.MagicMock())
+
+ def test_docs_parser_arguments(self):
+ os.environ["CERTBOT_DOCS"] = "1"
+ from certbot_apache._internal.configurator import ApacheConfigurator
+ mock_add = mock.MagicMock()
+ ApacheConfigurator.add_parser_arguments(mock_add)
+ parserargs = ["server_root", "enmod", "dismod", "le_vhost_ext",
+ "vhost_root", "logs_root", "challenge_location",
+ "handle_modules", "handle_sites", "ctl"]
+ exp = dict()
+
+ for k in ApacheConfigurator.OS_DEFAULTS:
+ if k in parserargs:
+ exp[k.replace("_", "-")] = ApacheConfigurator.OS_DEFAULTS[k]
+ # Special cases
+ exp["vhost-root"] = None
+
+ found = set()
+ for call in mock_add.call_args_list:
+ found.add(call[0][0])
+
+ # Make sure that all (and only) the expected values exist
+ self.assertEqual(len(mock_add.call_args_list), len(found))
+ for e in exp:
+ self.assertTrue(e in found)
+
+ del os.environ["CERTBOT_DOCS"]
+
+ def test_add_parser_arguments_all_configurators(self): # pylint: disable=no-self-use
+ from certbot_apache._internal.entrypoint import OVERRIDE_CLASSES
+ for cls in OVERRIDE_CLASSES.values():
+ cls.add_parser_arguments(mock.MagicMock())
+
+ def test_all_configurators_defaults_defined(self):
+ from certbot_apache._internal.entrypoint import OVERRIDE_CLASSES
+ from certbot_apache._internal.configurator import ApacheConfigurator
+ parameters = set(ApacheConfigurator.OS_DEFAULTS.keys())
+ for cls in OVERRIDE_CLASSES.values():
+ self.assertTrue(parameters.issubset(set(cls.OS_DEFAULTS.keys())))
+
+ def test_constant(self):
+ self.assertTrue("debian_apache_2_4/multiple_vhosts/apache" in
+ self.config.option("server_root"))
+ self.assertEqual(self.config.option("nonexistent"), None)
+
+ @certbot_util.patch_get_utility()
+ def test_get_all_names(self, mock_getutility):
+ mock_utility = mock_getutility()
+ mock_utility.notification = mock.MagicMock(return_value=True)
+ names = self.config.get_all_names()
+ self.assertEqual(names, set(
+ ["certbot.demo", "ocspvhost.com", "encryption-example.demo",
+ "nonsym.link", "vhost.in.rootconf", "www.certbot.demo",
+ "duplicate.example.com"]
+ ))
+
+ @certbot_util.patch_get_utility()
+ @mock.patch("certbot_apache._internal.configurator.socket.gethostbyaddr")
+ def test_get_all_names_addrs(self, mock_gethost, mock_getutility):
+ mock_gethost.side_effect = [("google.com", "", ""), socket.error]
+ mock_utility = mock_getutility()
+ mock_utility.notification.return_value = True
+ vhost = obj.VirtualHost(
+ "fp", "ap",
+ set([obj.Addr(("8.8.8.8", "443")),
+ obj.Addr(("zombo.com",)),
+ obj.Addr(("192.168.1.2"))]),
+ True, False)
+
+ self.config.vhosts.append(vhost)
+
+ names = self.config.get_all_names()
+ self.assertEqual(len(names), 9)
+ self.assertTrue("zombo.com" in names)
+ self.assertTrue("google.com" in names)
+ self.assertTrue("certbot.demo" in names)
+
+ def test_get_bad_path(self):
+ self.assertEqual(apache_util.get_file_path(None), None)
+ self.assertEqual(apache_util.get_file_path("nonexistent"), None)
+ self.assertEqual(self.config._create_vhost("nonexistent"), None) # pylint: disable=protected-access
+
+ def test_get_aug_internal_path(self):
+ from certbot_apache._internal.apache_util import get_internal_aug_path
+ internal_paths = [
+ "Virtualhost", "IfModule/VirtualHost", "VirtualHost", "VirtualHost",
+ "Macro/VirtualHost", "IfModule/VirtualHost", "VirtualHost",
+ "IfModule/VirtualHost"]
+
+ for i, internal_path in enumerate(internal_paths):
+ self.assertEqual(
+ get_internal_aug_path(self.vh_truth[i].path), internal_path)
+
+ def test_bad_servername_alias(self):
+ ssl_vh1 = obj.VirtualHost(
+ "fp1", "ap1", set([obj.Addr(("*", "443"))]),
+ True, False)
+ # pylint: disable=protected-access
+ self.config._add_servernames(ssl_vh1)
+ self.assertTrue(
+ self.config._add_servername_alias("oy_vey", ssl_vh1) is None)
+
+ def test_add_servernames_alias(self):
+ self.config.parser.add_dir(
+ self.vh_truth[2].path, "ServerAlias", ["*.le.co"])
+ # pylint: disable=protected-access
+ self.config._add_servernames(self.vh_truth[2])
+ self.assertEqual(
+ self.vh_truth[2].get_names(), set(["*.le.co", "ip-172-30-0-17"]))
+
+ def test_get_virtual_hosts(self):
+ """Make sure all vhosts are being properly found."""
+ vhs = self.config.get_virtual_hosts()
+ self.assertEqual(len(vhs), 12)
+ found = 0
+
+ for vhost in vhs:
+ for truth in self.vh_truth:
+ if vhost == truth:
+ found += 1
+ break
+ else:
+ raise Exception("Missed: %s" % vhost) # pragma: no cover
+
+ self.assertEqual(found, 12)
+
+ # Handle case of non-debian layout get_virtual_hosts
+ with mock.patch(
+ "certbot_apache._internal.configurator.ApacheConfigurator.conf"
+ ) as mock_conf:
+ mock_conf.return_value = False
+ vhs = self.config.get_virtual_hosts()
+ self.assertEqual(len(vhs), 12)
+
+ @mock.patch("certbot_apache._internal.display_ops.select_vhost")
+ def test_choose_vhost_none_avail(self, mock_select):
+ mock_select.return_value = None
+ self.assertRaises(
+ errors.PluginError, self.config.choose_vhost, "none.com")
+
+ @mock.patch("certbot_apache._internal.display_ops.select_vhost")
+ def test_choose_vhost_select_vhost_ssl(self, mock_select):
+ mock_select.return_value = self.vh_truth[1]
+ self.assertEqual(
+ self.vh_truth[1], self.config.choose_vhost("none.com"))
+
+ @mock.patch("certbot_apache._internal.display_ops.select_vhost")
+ @mock.patch("certbot_apache._internal.obj.VirtualHost.conflicts")
+ def test_choose_vhost_select_vhost_non_ssl(self, mock_conf, mock_select):
+ mock_select.return_value = self.vh_truth[0]
+ mock_conf.return_value = False
+ chosen_vhost = self.config.choose_vhost("none.com")
+ self.vh_truth[0].aliases.add("none.com")
+ self.assertEqual(
+ self.vh_truth[0].get_names(), chosen_vhost.get_names())
+
+ # Make sure we go from HTTP -> HTTPS
+ self.assertFalse(self.vh_truth[0].ssl)
+ self.assertTrue(chosen_vhost.ssl)
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator._find_best_vhost")
+ @mock.patch("certbot_apache._internal.parser.ApacheParser.add_dir")
+ def test_choose_vhost_and_servername_addition(self, mock_add, mock_find):
+ ret_vh = self.vh_truth[8]
+ ret_vh.enabled = False
+ mock_find.return_value = self.vh_truth[8]
+ self.config.choose_vhost("whatever.com")
+ self.assertTrue(mock_add.called)
+
+ @mock.patch("certbot_apache._internal.display_ops.select_vhost")
+ def test_choose_vhost_select_vhost_with_temp(self, mock_select):
+ mock_select.return_value = self.vh_truth[0]
+ chosen_vhost = self.config.choose_vhost("none.com", create_if_no_ssl=False)
+ self.assertEqual(self.vh_truth[0], chosen_vhost)
+
+ @mock.patch("certbot_apache._internal.display_ops.select_vhost")
+ def test_choose_vhost_select_vhost_conflicting_non_ssl(self, mock_select):
+ mock_select.return_value = self.vh_truth[3]
+ conflicting_vhost = obj.VirtualHost(
+ "path", "aug_path", set([obj.Addr.fromstring("*:443")]),
+ True, True)
+ self.config.vhosts.append(conflicting_vhost)
+
+ self.assertRaises(
+ errors.PluginError, self.config.choose_vhost, "none.com")
+
+ def test_find_best_http_vhost_default(self):
+ vh = obj.VirtualHost(
+ "fp", "ap", set([obj.Addr.fromstring("_default_:80")]), False, True)
+ self.config.vhosts = [vh]
+ self.assertEqual(self.config.find_best_http_vhost("foo.bar", False), vh)
+
+ def test_find_best_http_vhost_port(self):
+ port = "8080"
+ vh = obj.VirtualHost(
+ "fp", "ap", set([obj.Addr.fromstring("*:" + port)]),
+ False, True, "encryption-example.demo")
+ self.config.vhosts.append(vh)
+ self.assertEqual(self.config.find_best_http_vhost("foo.bar", False, port), vh)
+
+ def test_findbest_continues_on_short_domain(self):
+ # pylint: disable=protected-access
+ chosen_vhost = self.config._find_best_vhost("purple.com")
+ self.assertEqual(None, chosen_vhost)
+
+ def test_findbest_continues_on_long_domain(self):
+ # pylint: disable=protected-access
+ chosen_vhost = self.config._find_best_vhost("green.red.purple.com")
+ self.assertEqual(None, chosen_vhost)
+
+ def test_find_best_vhost(self):
+ # pylint: disable=protected-access
+ self.assertEqual(
+ self.vh_truth[3], self.config._find_best_vhost("certbot.demo"))
+ self.assertEqual(
+ self.vh_truth[0],
+ self.config._find_best_vhost("encryption-example.demo"))
+ self.assertEqual(
+ self.config._find_best_vhost("does-not-exist.com"), None)
+
+ def test_find_best_vhost_variety(self):
+ # pylint: disable=protected-access
+ ssl_vh = obj.VirtualHost(
+ "fp", "ap", set([obj.Addr(("*", "443")),
+ obj.Addr(("zombo.com",))]),
+ True, False)
+ self.config.vhosts.append(ssl_vh)
+ self.assertEqual(self.config._find_best_vhost("zombo.com"), ssl_vh)
+
+ def test_find_best_vhost_default(self):
+ # pylint: disable=protected-access
+ # Assume only the two default vhosts.
+ self.config.vhosts = [
+ vh for vh in self.config.vhosts
+ if vh.name not in ["certbot.demo", "nonsym.link",
+ "encryption-example.demo", "duplicate.example.com",
+ "ocspvhost.com", "vhost.in.rootconf"]
+ and "*.blue.purple.com" not in vh.aliases
+ ]
+ self.assertEqual(
+ self.config._find_best_vhost("encryption-example.demo"),
+ self.vh_truth[2])
+
+ def test_non_default_vhosts(self):
+ # pylint: disable=protected-access
+ vhosts = self.config._non_default_vhosts(self.config.vhosts)
+ self.assertEqual(len(vhosts), 10)
+
+ def test_deploy_cert_enable_new_vhost(self):
+ # Create
+ ssl_vhost = self.config.make_vhost_ssl(self.vh_truth[0])
+ self.config.parser.modules.add("ssl_module")
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("socache_shmcb_module")
+
+ self.assertFalse(ssl_vhost.enabled)
+ self.config.deploy_cert(
+ "encryption-example.demo", "example/cert.pem", "example/key.pem",
+ "example/cert_chain.pem", "example/fullchain.pem")
+ self.assertTrue(ssl_vhost.enabled)
+
+ def test_no_duplicate_include(self):
+ def mock_find_dir(directive, argument, _):
+ """Mock method for parser.find_dir"""
+ if directive == "Include" and argument.endswith("options-ssl-apache.conf"):
+ return ["/path/to/whatever"]
+ return None # pragma: no cover
+
+ mock_add = mock.MagicMock()
+ self.config.parser.add_dir = mock_add
+ self.config._add_dummy_ssl_directives(self.vh_truth[0]) # pylint: disable=protected-access
+ tried_to_add = False
+ for a in mock_add.call_args_list:
+ if a[0][1] == "Include" and a[0][2] == self.config.mod_ssl_conf:
+ tried_to_add = True
+ # Include should be added, find_dir is not patched, and returns falsy
+ self.assertTrue(tried_to_add)
+
+ self.config.parser.find_dir = mock_find_dir
+ mock_add.reset_mock()
+ self.config._add_dummy_ssl_directives(self.vh_truth[0]) # pylint: disable=protected-access
+ for a in mock_add.call_args_list:
+ if a[0][1] == "Include" and a[0][2] == self.config.mod_ssl_conf:
+ self.fail("Include shouldn't be added, as patched find_dir 'finds' existing one") \
+ # pragma: no cover
+
+ def test_deploy_cert(self):
+ self.config.parser.modules.add("ssl_module")
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("socache_shmcb_module")
+ # Patch _add_dummy_ssl_directives to make sure we write them correctly
+ # pylint: disable=protected-access
+ orig_add_dummy = self.config._add_dummy_ssl_directives
+ def mock_add_dummy_ssl(vhostpath):
+ """Mock method for _add_dummy_ssl_directives"""
+ def find_args(path, directive):
+ """Return list of arguments in requested directive at path"""
+ f_args = []
+ dirs = self.config.parser.find_dir(directive, None,
+ path)
+ for d in dirs:
+ f_args.append(self.config.parser.get_arg(d))
+ return f_args
+ # Verify that the dummy directives do not exist
+ self.assertFalse(
+ "insert_cert_file_path" in find_args(vhostpath,
+ "SSLCertificateFile"))
+ self.assertFalse(
+ "insert_key_file_path" in find_args(vhostpath,
+ "SSLCertificateKeyFile"))
+ orig_add_dummy(vhostpath)
+ # Verify that the dummy directives exist
+ self.assertTrue(
+ "insert_cert_file_path" in find_args(vhostpath,
+ "SSLCertificateFile"))
+ self.assertTrue(
+ "insert_key_file_path" in find_args(vhostpath,
+ "SSLCertificateKeyFile"))
+ # pylint: disable=protected-access
+ self.config._add_dummy_ssl_directives = mock_add_dummy_ssl
+
+ # Get the default 443 vhost
+ self.config.assoc["random.demo"] = self.vh_truth[1]
+ self.config.deploy_cert(
+ "random.demo",
+ "example/cert.pem", "example/key.pem", "example/cert_chain.pem")
+ self.config.save()
+
+ # Verify ssl_module was enabled.
+ self.assertTrue(self.vh_truth[1].enabled)
+ self.assertTrue("ssl_module" in self.config.parser.modules)
+
+ loc_cert = self.config.parser.find_dir(
+ "sslcertificatefile", "example/cert.pem", self.vh_truth[1].path)
+ loc_key = self.config.parser.find_dir(
+ "sslcertificateKeyfile", "example/key.pem", self.vh_truth[1].path)
+ loc_chain = self.config.parser.find_dir(
+ "SSLCertificateChainFile", "example/cert_chain.pem",
+ self.vh_truth[1].path)
+
+ # Verify one directive was found in the correct file
+ self.assertEqual(len(loc_cert), 1)
+ self.assertEqual(
+ apache_util.get_file_path(loc_cert[0]),
+ self.vh_truth[1].filep)
+
+ self.assertEqual(len(loc_key), 1)
+ self.assertEqual(
+ apache_util.get_file_path(loc_key[0]),
+ self.vh_truth[1].filep)
+
+ self.assertEqual(len(loc_chain), 1)
+ self.assertEqual(
+ apache_util.get_file_path(loc_chain[0]),
+ self.vh_truth[1].filep)
+
+ # One more time for chain directive setting
+ self.config.deploy_cert(
+ "random.demo",
+ "two/cert.pem", "two/key.pem", "two/cert_chain.pem")
+ self.assertTrue(self.config.parser.find_dir(
+ "SSLCertificateChainFile", "two/cert_chain.pem",
+ self.vh_truth[1].path))
+
+ def test_deploy_cert_invalid_vhost(self):
+ """For test cases where the `ApacheConfigurator` class' `_deploy_cert`
+ method is called with an invalid vhost parameter. Currently this tests
+ that a PluginError is appropriately raised when important directives
+ are missing in an SSL module."""
+ self.config.parser.modules.add("ssl_module")
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("socache_shmcb_module")
+
+ def side_effect(*args):
+ """Mocks case where an SSLCertificateFile directive can be found
+ but an SSLCertificateKeyFile directive is missing."""
+ if "SSLCertificateFile" in args:
+ return ["example/cert.pem"]
+ return []
+
+ mock_find_dir = mock.MagicMock(return_value=[])
+ mock_find_dir.side_effect = side_effect
+
+ self.config.parser.find_dir = mock_find_dir
+
+ # Get the default 443 vhost
+ self.config.assoc["random.demo"] = self.vh_truth[1]
+
+ self.assertRaises(
+ errors.PluginError, self.config.deploy_cert, "random.demo",
+ "example/cert.pem", "example/key.pem", "example/cert_chain.pem")
+
+ # Remove side_effect to mock case where both SSLCertificateFile
+ # and SSLCertificateKeyFile directives are missing
+ self.config.parser.find_dir.side_effect = None
+ self.assertRaises(
+ errors.PluginError, self.config.deploy_cert, "random.demo",
+ "example/cert.pem", "example/key.pem", "example/cert_chain.pem")
+
+ def test_is_name_vhost(self):
+ addr = obj.Addr.fromstring("*:80")
+ self.assertTrue(self.config.is_name_vhost(addr))
+ self.config.version = (2, 2)
+ self.assertFalse(self.config.is_name_vhost(addr))
+
+ def test_add_name_vhost(self):
+ self.config.add_name_vhost(obj.Addr.fromstring("*:443"))
+ self.config.add_name_vhost(obj.Addr.fromstring("*:80"))
+ self.assertTrue(self.config.parser.find_dir(
+ "NameVirtualHost", "*:443", exclude=False))
+ self.assertTrue(self.config.parser.find_dir(
+ "NameVirtualHost", "*:80"))
+
+ def test_add_listen_80(self):
+ mock_find = mock.Mock()
+ mock_add_dir = mock.Mock()
+ mock_find.return_value = []
+ self.config.parser.find_dir = mock_find
+ self.config.parser.add_dir = mock_add_dir
+ self.config.ensure_listen("80")
+ self.assertTrue(mock_add_dir.called)
+ self.assertTrue(mock_find.called)
+ self.assertEqual(mock_add_dir.call_args[0][1], "Listen")
+ self.assertEqual(mock_add_dir.call_args[0][2], "80")
+
+ def test_add_listen_80_named(self):
+ mock_find = mock.Mock()
+ mock_find.return_value = ["test1", "test2", "test3"]
+ mock_get = mock.Mock()
+ mock_get.side_effect = ["1.2.3.4:80", "[::1]:80", "1.1.1.1:443"]
+ mock_add_dir = mock.Mock()
+
+ self.config.parser.find_dir = mock_find
+ self.config.parser.get_arg = mock_get
+ self.config.parser.add_dir = mock_add_dir
+
+ self.config.ensure_listen("80")
+ self.assertEqual(mock_add_dir.call_count, 0)
+
+ # Reset return lists and inputs
+ mock_add_dir.reset_mock()
+ mock_get.side_effect = ["1.2.3.4:80", "[::1]:80", "1.1.1.1:443"]
+
+ # Test
+ self.config.ensure_listen("8080")
+ self.assertEqual(mock_add_dir.call_count, 3)
+ self.assertTrue(mock_add_dir.called)
+ self.assertEqual(mock_add_dir.call_args[0][1], "Listen")
+ call_found = False
+ for mock_call in mock_add_dir.mock_calls:
+ if mock_call[1][2] == ['1.2.3.4:8080']:
+ call_found = True
+ self.assertTrue(call_found)
+
+ def test_prepare_server_https(self):
+ mock_enable = mock.Mock()
+ self.config.enable_mod = mock_enable
+
+ mock_find = mock.Mock()
+ mock_add_dir = mock.Mock()
+ mock_find.return_value = []
+
+ # This will test the Add listen
+ self.config.parser.find_dir = mock_find
+ self.config.parser.add_dir_to_ifmodssl = mock_add_dir
+ self.config.prepare_server_https("443")
+ # Changing the order these modules are enabled breaks the reverter
+ self.assertEqual(mock_enable.call_args_list[0][0][0], "socache_shmcb")
+ self.assertEqual(mock_enable.call_args[0][0], "ssl")
+ self.assertEqual(mock_enable.call_args[1], {"temp": False})
+
+ self.config.prepare_server_https("8080", temp=True)
+ # Changing the order these modules are enabled breaks the reverter
+ self.assertEqual(mock_enable.call_args_list[2][0][0], "socache_shmcb")
+ self.assertEqual(mock_enable.call_args[0][0], "ssl")
+ # Enable mod is temporary
+ self.assertEqual(mock_enable.call_args[1], {"temp": True})
+
+ self.assertEqual(mock_add_dir.call_count, 2)
+
+ def test_prepare_server_https_named_listen(self):
+ mock_find = mock.Mock()
+ mock_find.return_value = ["test1", "test2", "test3"]
+ mock_get = mock.Mock()
+ mock_get.side_effect = ["1.2.3.4:80", "[::1]:80", "1.1.1.1:443"]
+ mock_add_dir = mock.Mock()
+ mock_enable = mock.Mock()
+
+ self.config.parser.find_dir = mock_find
+ self.config.parser.get_arg = mock_get
+ self.config.parser.add_dir_to_ifmodssl = mock_add_dir
+ self.config.enable_mod = mock_enable
+
+ # Test Listen statements with specific ip listeed
+ self.config.prepare_server_https("443")
+ # Should be 0 as one interface already listens to 443
+ self.assertEqual(mock_add_dir.call_count, 0)
+
+ # Reset return lists and inputs
+ mock_add_dir.reset_mock()
+ mock_get.side_effect = ["1.2.3.4:80", "[::1]:80", "1.1.1.1:443"]
+
+ # Test
+ self.config.prepare_server_https("8080", temp=True)
+ self.assertEqual(mock_add_dir.call_count, 3)
+ call_args_list = [mock_add_dir.call_args_list[i][0][2] for i in range(3)]
+ self.assertEqual(
+ sorted(call_args_list),
+ sorted([["1.2.3.4:8080", "https"],
+ ["[::1]:8080", "https"],
+ ["1.1.1.1:8080", "https"]]))
+
+ # mock_get.side_effect = ["1.2.3.4:80", "[::1]:80"]
+ # mock_find.return_value = ["test1", "test2", "test3"]
+ # self.config.parser.get_arg = mock_get
+ # self.config.prepare_server_https("8080", temp=True)
+ # self.assertEqual(self.listens, 0)
+
+ def test_prepare_server_https_needed_listen(self):
+ mock_find = mock.Mock()
+ mock_find.return_value = ["test1", "test2"]
+ mock_get = mock.Mock()
+ mock_get.side_effect = ["1.2.3.4:8080", "80"]
+ mock_add_dir = mock.Mock()
+ mock_enable = mock.Mock()
+
+ self.config.parser.find_dir = mock_find
+ self.config.parser.get_arg = mock_get
+ self.config.parser.add_dir_to_ifmodssl = mock_add_dir
+ self.config.enable_mod = mock_enable
+
+ self.config.prepare_server_https("443")
+ self.assertEqual(mock_add_dir.call_count, 1)
+
+ def test_prepare_server_https_mixed_listen(self):
+
+ mock_find = mock.Mock()
+ mock_find.return_value = ["test1", "test2"]
+ mock_get = mock.Mock()
+ mock_get.side_effect = ["1.2.3.4:8080", "443"]
+ mock_add_dir = mock.Mock()
+ mock_enable = mock.Mock()
+
+ self.config.parser.find_dir = mock_find
+ self.config.parser.get_arg = mock_get
+ self.config.parser.add_dir_to_ifmodssl = mock_add_dir
+ self.config.enable_mod = mock_enable
+
+ # Test Listen statements with specific ip listeed
+ self.config.prepare_server_https("443")
+ # Should only be 2 here, as the third interface
+ # already listens to the correct port
+ self.assertEqual(mock_add_dir.call_count, 0)
+
+ def test_make_vhost_ssl_with_mock_span(self):
+ # span excludes the closing </VirtualHost> tag in older versions
+ # of Augeas
+ return_value = [self.vh_truth[0].filep, 1, 12, 0, 0, 0, 1142]
+ with mock.patch.object(self.config.parser.aug, 'span') as mock_span:
+ mock_span.return_value = return_value
+ self.test_make_vhost_ssl()
+
+ def test_make_vhost_ssl_with_mock_span2(self):
+ # span includes the closing </VirtualHost> tag in newer versions
+ # of Augeas
+ return_value = [self.vh_truth[0].filep, 1, 12, 0, 0, 0, 1157]
+ with mock.patch.object(self.config.parser.aug, 'span') as mock_span:
+ mock_span.return_value = return_value
+ self.test_make_vhost_ssl()
+
+ def test_make_vhost_ssl_nonsymlink(self):
+ ssl_vhost_slink = self.config.make_vhost_ssl(self.vh_truth[8])
+ self.assertTrue(ssl_vhost_slink.ssl)
+ self.assertTrue(ssl_vhost_slink.enabled)
+ self.assertEqual(ssl_vhost_slink.name, "nonsym.link")
+
+ def test_make_vhost_ssl_nonexistent_vhost_path(self):
+ ssl_vhost = self.config.make_vhost_ssl(self.vh_truth[1])
+ self.assertEqual(os.path.dirname(ssl_vhost.filep),
+ os.path.dirname(filesystem.realpath(self.vh_truth[1].filep)))
+
+ def test_make_vhost_ssl(self):
+ ssl_vhost = self.config.make_vhost_ssl(self.vh_truth[0])
+
+ self.assertEqual(
+ ssl_vhost.filep,
+ os.path.join(self.config_path, "sites-available",
+ "encryption-example-le-ssl.conf"))
+
+ self.assertEqual(ssl_vhost.path,
+ "/files" + ssl_vhost.filep + "/IfModule/Virtualhost")
+ self.assertEqual(len(ssl_vhost.addrs), 1)
+ self.assertEqual(set([obj.Addr.fromstring("*:443")]), ssl_vhost.addrs)
+ self.assertEqual(ssl_vhost.name, "encryption-example.demo")
+ self.assertTrue(ssl_vhost.ssl)
+ self.assertFalse(ssl_vhost.enabled)
+
+ self.assertEqual(self.config.is_name_vhost(self.vh_truth[0]),
+ self.config.is_name_vhost(ssl_vhost))
+
+ self.assertEqual(len(self.config.vhosts), 13)
+
+ def test_clean_vhost_ssl(self):
+ # pylint: disable=protected-access
+ for directive in ["SSLCertificateFile", "SSLCertificateKeyFile",
+ "SSLCertificateChainFile", "SSLCACertificatePath"]:
+ for _ in range(10):
+ self.config.parser.add_dir(self.vh_truth[1].path,
+ directive, ["bogus"])
+ self.config.save()
+
+ self.config._clean_vhost(self.vh_truth[1])
+ self.config.save()
+
+ loc_cert = self.config.parser.find_dir(
+ 'SSLCertificateFile', None, self.vh_truth[1].path, False)
+ loc_key = self.config.parser.find_dir(
+ 'SSLCertificateKeyFile', None, self.vh_truth[1].path, False)
+ loc_chain = self.config.parser.find_dir(
+ 'SSLCertificateChainFile', None, self.vh_truth[1].path, False)
+ loc_cacert = self.config.parser.find_dir(
+ 'SSLCACertificatePath', None, self.vh_truth[1].path, False)
+
+ self.assertEqual(len(loc_cert), 1)
+ self.assertEqual(len(loc_key), 1)
+
+ self.assertEqual(len(loc_chain), 0)
+
+ self.assertEqual(len(loc_cacert), 10)
+
+ def test_deduplicate_directives(self):
+ # pylint: disable=protected-access
+ DIRECTIVE = "Foo"
+ for _ in range(10):
+ self.config.parser.add_dir(self.vh_truth[1].path,
+ DIRECTIVE, ["bar"])
+ self.config.save()
+
+ self.config._deduplicate_directives(self.vh_truth[1].path, [DIRECTIVE])
+ self.config.save()
+
+ self.assertEqual(
+ len(self.config.parser.find_dir(
+ DIRECTIVE, None, self.vh_truth[1].path, False)), 1)
+
+ def test_remove_directives(self):
+ # pylint: disable=protected-access
+ DIRECTIVES = ["Foo", "Bar"]
+ for directive in DIRECTIVES:
+ for _ in range(10):
+ self.config.parser.add_dir(self.vh_truth[2].path,
+ directive, ["baz"])
+ self.config.save()
+
+ self.config._remove_directives(self.vh_truth[2].path, DIRECTIVES)
+ self.config.save()
+
+ for directive in DIRECTIVES:
+ self.assertEqual(
+ len(self.config.parser.find_dir(
+ directive, None, self.vh_truth[2].path, False)), 0)
+
+ def test_make_vhost_ssl_bad_write(self):
+ mock_open = mock.mock_open()
+ # This calls open
+ self.config.reverter.register_file_creation = mock.Mock()
+ mock_open.side_effect = IOError
+ with mock.patch("six.moves.builtins.open", mock_open):
+ self.assertRaises(
+ errors.PluginError,
+ self.config.make_vhost_ssl, self.vh_truth[0])
+
+ def test_get_ssl_vhost_path(self):
+ # pylint: disable=protected-access
+ self.assertTrue(
+ self.config._get_ssl_vhost_path("example_path").endswith(".conf"))
+
+ def test_add_name_vhost_if_necessary(self):
+ # pylint: disable=protected-access
+ self.config.add_name_vhost = mock.Mock()
+ self.config.version = (2, 2)
+ self.config._add_name_vhost_if_necessary(self.vh_truth[0])
+ self.assertTrue(self.config.add_name_vhost.called)
+
+ new_addrs = set()
+ for addr in self.vh_truth[0].addrs:
+ new_addrs.add(obj.Addr(("_default_", addr.get_port(),)))
+
+ self.vh_truth[0].addrs = new_addrs
+ self.config._add_name_vhost_if_necessary(self.vh_truth[0])
+ self.assertEqual(self.config.add_name_vhost.call_count, 2)
+
+ @mock.patch("certbot_apache._internal.configurator.http_01.ApacheHttp01.perform")
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator.restart")
+ def test_perform(self, mock_restart, mock_http_perform):
+ # Only tests functionality specific to configurator.perform
+ # Note: As more challenges are offered this will have to be expanded
+ account_key, achalls = self.get_key_and_achalls()
+
+ expected = [achall.response(account_key) for achall in achalls]
+ mock_http_perform.return_value = expected
+
+ responses = self.config.perform(achalls)
+
+ self.assertEqual(mock_http_perform.call_count, 1)
+ self.assertEqual(responses, expected)
+
+ self.assertEqual(mock_restart.call_count, 1)
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator.restart")
+ @mock.patch("certbot_apache._internal.parser.ApacheParser._get_runtime_cfg")
+ def test_cleanup(self, mock_cfg, mock_restart):
+ mock_cfg.return_value = ""
+ _, achalls = self.get_key_and_achalls()
+
+ for achall in achalls:
+ self.config._chall_out.add(achall) # pylint: disable=protected-access
+
+ for i, achall in enumerate(achalls):
+ self.config.cleanup([achall])
+ if i == len(achalls) - 1:
+ self.assertTrue(mock_restart.called)
+ else:
+ self.assertFalse(mock_restart.called)
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator.restart")
+ @mock.patch("certbot_apache._internal.parser.ApacheParser._get_runtime_cfg")
+ def test_cleanup_no_errors(self, mock_cfg, mock_restart):
+ mock_cfg.return_value = ""
+ _, achalls = self.get_key_and_achalls()
+ self.config.http_doer = mock.MagicMock()
+
+ for achall in achalls:
+ self.config._chall_out.add(achall) # pylint: disable=protected-access
+
+ self.config.cleanup([achalls[-1]])
+ self.assertFalse(mock_restart.called)
+
+ self.config.cleanup(achalls)
+ self.assertTrue(mock_restart.called)
+
+ @mock.patch("certbot.util.run_script")
+ def test_get_version(self, mock_script):
+ mock_script.return_value = (
+ "Server Version: Apache/2.4.2 (Debian)", "")
+ self.assertEqual(self.config.get_version(), (2, 4, 2))
+
+ mock_script.return_value = (
+ "Server Version: Apache/2 (Linux)", "")
+ self.assertEqual(self.config.get_version(), (2,))
+
+ mock_script.return_value = (
+ "Server Version: Apache (Debian)", "")
+ self.assertRaises(errors.PluginError, self.config.get_version)
+
+ mock_script.return_value = (
+ "Server Version: Apache/2.3{0} Apache/2.4.7".format(
+ os.linesep), "")
+ self.assertRaises(errors.PluginError, self.config.get_version)
+
+ mock_script.side_effect = errors.SubprocessError("Can't find program")
+ self.assertRaises(errors.PluginError, self.config.get_version)
+
+ @mock.patch("certbot_apache._internal.configurator.util.run_script")
+ def test_restart(self, _):
+ self.config.restart()
+
+ @mock.patch("certbot_apache._internal.configurator.util.run_script")
+ def test_restart_bad_process(self, mock_run_script):
+ mock_run_script.side_effect = [None, errors.SubprocessError]
+
+ self.assertRaises(errors.MisconfigurationError, self.config.restart)
+
+ @mock.patch("certbot.util.run_script")
+ def test_config_test(self, _):
+ self.config.config_test()
+
+ @mock.patch("certbot.util.run_script")
+ def test_config_test_bad_process(self, mock_run_script):
+ mock_run_script.side_effect = errors.SubprocessError
+
+ self.assertRaises(errors.MisconfigurationError,
+ self.config.config_test)
+
+ def test_more_info(self):
+ self.assertTrue(self.config.more_info())
+
+ def test_get_chall_pref(self):
+ self.assertTrue(isinstance(self.config.get_chall_pref(""), list))
+
+ def test_install_ssl_options_conf(self):
+ path = os.path.join(self.work_dir, "test_it")
+ other_path = os.path.join(self.work_dir, "other_test_it")
+ self.config.install_ssl_options_conf(path, other_path)
+ self.assertTrue(os.path.isfile(path))
+ self.assertTrue(os.path.isfile(other_path))
+
+ # TEST ENHANCEMENTS
+ def test_supported_enhancements(self):
+ self.assertTrue(isinstance(self.config.supported_enhancements(), list))
+
+ def test_find_http_vhost_without_ancestor(self):
+ # pylint: disable=protected-access
+ vhost = self.vh_truth[0]
+ vhost.ssl = True
+ vhost.ancestor = None
+ res = self.config._get_http_vhost(vhost)
+ self.assertEqual(self.vh_truth[0].name, res.name)
+ self.assertEqual(self.vh_truth[0].aliases, res.aliases)
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator._get_http_vhost")
+ @mock.patch("certbot_apache._internal.display_ops.select_vhost")
+ @mock.patch("certbot.util.exe_exists")
+ def test_enhance_unknown_vhost(self, mock_exe, mock_sel_vhost, mock_get):
+ self.config.parser.modules.add("rewrite_module")
+ mock_exe.return_value = True
+ ssl_vh1 = obj.VirtualHost(
+ "fp1", "ap1", set([obj.Addr(("*", "443"))]),
+ True, False)
+ ssl_vh1.name = "satoshi.com"
+ self.config.vhosts.append(ssl_vh1)
+ mock_sel_vhost.return_value = None
+ mock_get.return_value = None
+
+ self.assertRaises(
+ errors.PluginError,
+ self.config.enhance, "satoshi.com", "redirect")
+
+ def test_enhance_unknown_enhancement(self):
+ self.assertRaises(
+ errors.PluginError,
+ self.config.enhance, "certbot.demo", "unknown_enhancement")
+
+ def test_enhance_no_ssl_vhost(self):
+ with mock.patch("certbot_apache._internal.configurator.logger.warning") as mock_log:
+ self.assertRaises(errors.PluginError, self.config.enhance,
+ "certbot.demo", "redirect")
+ # Check that correct logger.warning was printed
+ self.assertTrue("not able to find" in mock_log.call_args[0][0])
+ self.assertTrue("\"redirect\"" in mock_log.call_args[0][0])
+
+ mock_log.reset_mock()
+
+ self.assertRaises(errors.PluginError, self.config.enhance,
+ "certbot.demo", "ensure-http-header", "Test")
+ # Check that correct logger.warning was printed
+ self.assertTrue("not able to find" in mock_log.call_args[0][0])
+ self.assertTrue("Test" in mock_log.call_args[0][0])
+
+ @mock.patch("certbot.util.exe_exists")
+ def test_ocsp_stapling(self, mock_exe):
+ self.config.parser.update_runtime_variables = mock.Mock()
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("socache_shmcb_module")
+ self.config.get_version = mock.Mock(return_value=(2, 4, 7))
+ mock_exe.return_value = True
+
+ # This will create an ssl vhost for certbot.demo
+ self.config.choose_vhost("certbot.demo")
+ self.config.enhance("certbot.demo", "staple-ocsp")
+
+ # Get the ssl vhost for certbot.demo
+ ssl_vhost = self.config.assoc["certbot.demo"]
+
+ ssl_use_stapling_aug_path = self.config.parser.find_dir(
+ "SSLUseStapling", "on", ssl_vhost.path)
+
+ self.assertEqual(len(ssl_use_stapling_aug_path), 1)
+
+ ssl_vhost_aug_path = parser.get_aug_path(ssl_vhost.filep)
+ stapling_cache_aug_path = self.config.parser.find_dir('SSLStaplingCache',
+ "shmcb:/var/run/apache2/stapling_cache(128000)",
+ ssl_vhost_aug_path)
+
+ self.assertEqual(len(stapling_cache_aug_path), 1)
+
+ @mock.patch("certbot.util.exe_exists")
+ def test_ocsp_stapling_twice(self, mock_exe):
+ self.config.parser.update_runtime_variables = mock.Mock()
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("socache_shmcb_module")
+ self.config.get_version = mock.Mock(return_value=(2, 4, 7))
+ mock_exe.return_value = True
+
+ # Checking the case with already enabled ocsp stapling configuration
+ self.config.choose_vhost("ocspvhost.com")
+ self.config.enhance("ocspvhost.com", "staple-ocsp")
+
+ # Get the ssl vhost for letsencrypt.demo
+ ssl_vhost = self.config.assoc["ocspvhost.com"]
+
+ ssl_use_stapling_aug_path = self.config.parser.find_dir(
+ "SSLUseStapling", "on", ssl_vhost.path)
+
+ self.assertEqual(len(ssl_use_stapling_aug_path), 1)
+ ssl_vhost_aug_path = parser.get_aug_path(ssl_vhost.filep)
+ stapling_cache_aug_path = self.config.parser.find_dir('SSLStaplingCache',
+ "shmcb:/var/run/apache2/stapling_cache(128000)",
+ ssl_vhost_aug_path)
+
+ self.assertEqual(len(stapling_cache_aug_path), 1)
+
+
+ @mock.patch("certbot.util.exe_exists")
+ def test_ocsp_unsupported_apache_version(self, mock_exe):
+ mock_exe.return_value = True
+ self.config.parser.update_runtime_variables = mock.Mock()
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("socache_shmcb_module")
+ self.config.get_version = mock.Mock(return_value=(2, 2, 0))
+ self.config.choose_vhost("certbot.demo")
+
+ self.assertRaises(errors.PluginError,
+ self.config.enhance, "certbot.demo", "staple-ocsp")
+
+
+ def test_get_http_vhost_third_filter(self):
+ ssl_vh = obj.VirtualHost(
+ "fp", "ap", set([obj.Addr(("*", "443"))]),
+ True, False)
+ ssl_vh.name = "satoshi.com"
+ self.config.vhosts.append(ssl_vh)
+
+ # pylint: disable=protected-access
+ http_vh = self.config._get_http_vhost(ssl_vh)
+ self.assertFalse(http_vh.ssl)
+
+ @mock.patch("certbot.util.run_script")
+ @mock.patch("certbot.util.exe_exists")
+ def test_http_header_hsts(self, mock_exe, _):
+ self.config.parser.update_runtime_variables = mock.Mock()
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("headers_module")
+ mock_exe.return_value = True
+
+ # This will create an ssl vhost for certbot.demo
+ self.config.choose_vhost("certbot.demo")
+ self.config.enhance("certbot.demo", "ensure-http-header",
+ "Strict-Transport-Security")
+
+ # Get the ssl vhost for certbot.demo
+ ssl_vhost = self.config.assoc["certbot.demo"]
+
+ # These are not immediately available in find_dir even with save() and
+ # load(). They must be found in sites-available
+ hsts_header = self.config.parser.find_dir(
+ "Header", None, ssl_vhost.path)
+
+ # four args to HSTS header
+ self.assertEqual(len(hsts_header), 4)
+
+ def test_http_header_hsts_twice(self):
+ self.config.parser.modules.add("mod_ssl.c")
+ # skip the enable mod
+ self.config.parser.modules.add("headers_module")
+
+ # This will create an ssl vhost for encryption-example.demo
+ self.config.choose_vhost("encryption-example.demo")
+ self.config.enhance("encryption-example.demo", "ensure-http-header",
+ "Strict-Transport-Security")
+
+ self.assertRaises(
+ errors.PluginEnhancementAlreadyPresent,
+ self.config.enhance, "encryption-example.demo",
+ "ensure-http-header", "Strict-Transport-Security")
+
+ @mock.patch("certbot.util.run_script")
+ @mock.patch("certbot.util.exe_exists")
+ def test_http_header_uir(self, mock_exe, _):
+ self.config.parser.update_runtime_variables = mock.Mock()
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("headers_module")
+
+ mock_exe.return_value = True
+
+ # This will create an ssl vhost for certbot.demo
+ self.config.choose_vhost("certbot.demo")
+ self.config.enhance("certbot.demo", "ensure-http-header",
+ "Upgrade-Insecure-Requests")
+
+ self.assertTrue("headers_module" in self.config.parser.modules)
+
+ # Get the ssl vhost for certbot.demo
+ ssl_vhost = self.config.assoc["certbot.demo"]
+
+ # These are not immediately available in find_dir even with save() and
+ # load(). They must be found in sites-available
+ uir_header = self.config.parser.find_dir(
+ "Header", None, ssl_vhost.path)
+
+ # four args to HSTS header
+ self.assertEqual(len(uir_header), 4)
+
+ def test_http_header_uir_twice(self):
+ self.config.parser.modules.add("mod_ssl.c")
+ # skip the enable mod
+ self.config.parser.modules.add("headers_module")
+
+ # This will create an ssl vhost for encryption-example.demo
+ self.config.choose_vhost("encryption-example.demo")
+ self.config.enhance("encryption-example.demo", "ensure-http-header",
+ "Upgrade-Insecure-Requests")
+
+ self.assertRaises(
+ errors.PluginEnhancementAlreadyPresent,
+ self.config.enhance, "encryption-example.demo",
+ "ensure-http-header", "Upgrade-Insecure-Requests")
+
+ @mock.patch("certbot.util.run_script")
+ @mock.patch("certbot.util.exe_exists")
+ def test_redirect_well_formed_http(self, mock_exe, _):
+ self.config.parser.modules.add("rewrite_module")
+ self.config.parser.update_runtime_variables = mock.Mock()
+ mock_exe.return_value = True
+ self.config.get_version = mock.Mock(return_value=(2, 2))
+
+ # This will create an ssl vhost for certbot.demo
+ self.config.choose_vhost("certbot.demo")
+ self.config.enhance("certbot.demo", "redirect")
+
+ # These are not immediately available in find_dir even with save() and
+ # load(). They must be found in sites-available
+ rw_engine = self.config.parser.find_dir(
+ "RewriteEngine", "on", self.vh_truth[3].path)
+ rw_rule = self.config.parser.find_dir(
+ "RewriteRule", None, self.vh_truth[3].path)
+
+ self.assertEqual(len(rw_engine), 1)
+ # three args to rw_rule
+ self.assertEqual(len(rw_rule), 3)
+
+ # [:-3] to remove the vhost index number
+ self.assertTrue(rw_engine[0].startswith(self.vh_truth[3].path[:-3]))
+ self.assertTrue(rw_rule[0].startswith(self.vh_truth[3].path[:-3]))
+
+ def test_rewrite_rule_exists(self):
+ # Skip the enable mod
+ self.config.parser.modules.add("rewrite_module")
+ self.config.get_version = mock.Mock(return_value=(2, 3, 9))
+ self.config.parser.add_dir(
+ self.vh_truth[3].path, "RewriteRule", ["Unknown"])
+ # pylint: disable=protected-access
+ self.assertTrue(self.config._is_rewrite_exists(self.vh_truth[3]))
+
+ def test_rewrite_engine_exists(self):
+ # Skip the enable mod
+ self.config.parser.modules.add("rewrite_module")
+ self.config.get_version = mock.Mock(return_value=(2, 3, 9))
+ self.config.parser.add_dir(
+ self.vh_truth[3].path, "RewriteEngine", "on")
+ # pylint: disable=protected-access
+ self.assertTrue(self.config._is_rewrite_engine_on(self.vh_truth[3]))
+
+ @mock.patch("certbot.util.run_script")
+ @mock.patch("certbot.util.exe_exists")
+ def test_redirect_with_existing_rewrite(self, mock_exe, _):
+ self.config.parser.modules.add("rewrite_module")
+ self.config.parser.update_runtime_variables = mock.Mock()
+ mock_exe.return_value = True
+ self.config.get_version = mock.Mock(return_value=(2, 2, 0))
+
+ # Create a preexisting rewrite rule
+ self.config.parser.add_dir(
+ self.vh_truth[3].path, "RewriteRule", ["UnknownPattern",
+ "UnknownTarget"])
+ self.config.save()
+
+ # This will create an ssl vhost for certbot.demo
+ self.config.choose_vhost("certbot.demo")
+ self.config.enhance("certbot.demo", "redirect")
+
+ # These are not immediately available in find_dir even with save() and
+ # load(). They must be found in sites-available
+ rw_engine = self.config.parser.find_dir(
+ "RewriteEngine", "on", self.vh_truth[3].path)
+ rw_rule = self.config.parser.find_dir(
+ "RewriteRule", None, self.vh_truth[3].path)
+
+ self.assertEqual(len(rw_engine), 1)
+ # three args to rw_rule + 1 arg for the pre existing rewrite
+ self.assertEqual(len(rw_rule), 5)
+ # [:-3] to remove the vhost index number
+ self.assertTrue(rw_engine[0].startswith(self.vh_truth[3].path[:-3]))
+ self.assertTrue(rw_rule[0].startswith(self.vh_truth[3].path[:-3]))
+
+ self.assertTrue("rewrite_module" in self.config.parser.modules)
+
+ @mock.patch("certbot.util.run_script")
+ @mock.patch("certbot.util.exe_exists")
+ def test_redirect_with_old_https_redirection(self, mock_exe, _):
+ self.config.parser.modules.add("rewrite_module")
+ self.config.parser.update_runtime_variables = mock.Mock()
+ mock_exe.return_value = True
+ self.config.get_version = mock.Mock(return_value=(2, 2, 0))
+
+ ssl_vhost = self.config.choose_vhost("certbot.demo")
+
+ # pylint: disable=protected-access
+ http_vhost = self.config._get_http_vhost(ssl_vhost)
+
+ # Create an old (previously suppoorted) https redirectoin rewrite rule
+ self.config.parser.add_dir(
+ http_vhost.path, "RewriteRule",
+ ["^",
+ "https://%{SERVER_NAME}%{REQUEST_URI}",
+ "[L,QSA,R=permanent]"])
+
+ self.config.save()
+
+ try:
+ self.config.enhance("certbot.demo", "redirect")
+ except errors.PluginEnhancementAlreadyPresent:
+ args_paths = self.config.parser.find_dir(
+ "RewriteRule", None, http_vhost.path, False)
+ arg_vals = [self.config.parser.aug.get(x) for x in args_paths]
+ self.assertEqual(arg_vals, constants.REWRITE_HTTPS_ARGS)
+
+
+ def test_redirect_with_conflict(self):
+ self.config.parser.modules.add("rewrite_module")
+ ssl_vh = obj.VirtualHost(
+ "fp", "ap", set([obj.Addr(("*", "443")),
+ obj.Addr(("zombo.com",))]),
+ True, False)
+ # No names ^ this guy should conflict.
+
+ # pylint: disable=protected-access
+ self.assertRaises(
+ errors.PluginError, self.config._enable_redirect, ssl_vh, "")
+
+ def test_redirect_two_domains_one_vhost(self):
+ # Skip the enable mod
+ self.config.parser.modules.add("rewrite_module")
+ self.config.get_version = mock.Mock(return_value=(2, 3, 9))
+
+ # Creates ssl vhost for the domain
+ self.config.choose_vhost("red.blue.purple.com")
+
+ self.config.enhance("red.blue.purple.com", "redirect")
+ verify_no_redirect = ("certbot_apache._internal.configurator."
+ "ApacheConfigurator._verify_no_certbot_redirect")
+ with mock.patch(verify_no_redirect) as mock_verify:
+ self.config.enhance("green.blue.purple.com", "redirect")
+ self.assertFalse(mock_verify.called)
+
+ def test_redirect_from_previous_run(self):
+ # Skip the enable mod
+ self.config.parser.modules.add("rewrite_module")
+ self.config.get_version = mock.Mock(return_value=(2, 3, 9))
+ self.config.choose_vhost("red.blue.purple.com")
+ self.config.enhance("red.blue.purple.com", "redirect")
+ # Clear state about enabling redirect on this run
+ # pylint: disable=protected-access
+ self.config._enhanced_vhosts["redirect"].clear()
+
+ self.assertRaises(
+ errors.PluginEnhancementAlreadyPresent,
+ self.config.enhance, "green.blue.purple.com", "redirect")
+
+ def test_create_own_redirect(self):
+ self.config.parser.modules.add("rewrite_module")
+ self.config.get_version = mock.Mock(return_value=(2, 3, 9))
+ # For full testing... give names...
+ self.vh_truth[1].name = "default.com"
+ self.vh_truth[1].aliases = set(["yes.default.com"])
+
+ # pylint: disable=protected-access
+ self.config._enable_redirect(self.vh_truth[1], "")
+ self.assertEqual(len(self.config.vhosts), 13)
+
+ def test_create_own_redirect_for_old_apache_version(self):
+ self.config.parser.modules.add("rewrite_module")
+ self.config.get_version = mock.Mock(return_value=(2, 2))
+ # For full testing... give names...
+ self.vh_truth[1].name = "default.com"
+ self.vh_truth[1].aliases = set(["yes.default.com"])
+
+ # pylint: disable=protected-access
+ self.config._enable_redirect(self.vh_truth[1], "")
+ self.assertEqual(len(self.config.vhosts), 13)
+
+ def test_sift_rewrite_rule(self):
+ # pylint: disable=protected-access
+ small_quoted_target = "RewriteRule ^ \"http://\""
+ self.assertFalse(self.config._sift_rewrite_rule(small_quoted_target))
+
+ https_target = "RewriteRule ^ https://satoshi"
+ self.assertTrue(self.config._sift_rewrite_rule(https_target))
+
+ normal_target = "RewriteRule ^/(.*) http://www.a.com:1234/$1 [L,R]"
+ self.assertFalse(self.config._sift_rewrite_rule(normal_target))
+
+ not_rewriterule = "NotRewriteRule ^ ..."
+ self.assertFalse(self.config._sift_rewrite_rule(not_rewriterule))
+
+ def get_key_and_achalls(self):
+ """Return testing achallenges."""
+ account_key = self.rsa512jwk
+ achall1 = achallenges.KeyAuthorizationAnnotatedChallenge(
+ challb=acme_util.chall_to_challb(
+ challenges.HTTP01(
+ token=b"jIq_Xy1mXGN37tb4L6Xj_es58fW571ZNyXekdZzhh7Q"),
+ "pending"),
+ domain="encryption-example.demo", account_key=account_key)
+ achall2 = achallenges.KeyAuthorizationAnnotatedChallenge(
+ challb=acme_util.chall_to_challb(
+ challenges.HTTP01(
+ token=b"uqnaPzxtrndteOqtrXb0Asl5gOJfWAnnx6QJyvcmlDU"),
+ "pending"),
+ domain="certbot.demo", account_key=account_key)
+ achall3 = achallenges.KeyAuthorizationAnnotatedChallenge(
+ challb=acme_util.chall_to_challb(
+ challenges.HTTP01(token=(b'x' * 16)), "pending"),
+ domain="example.org", account_key=account_key)
+
+ return account_key, (achall1, achall2, achall3)
+
+ def test_enable_site_nondebian(self):
+ inc_path = "/path/to/wherever"
+ vhost = self.vh_truth[0]
+ vhost.enabled = False
+ vhost.filep = inc_path
+ self.assertFalse(self.config.parser.find_dir("Include", inc_path))
+ self.assertFalse(
+ os.path.dirname(inc_path) in self.config.parser.existing_paths)
+ self.config.enable_site(vhost)
+ self.assertTrue(self.config.parser.find_dir("Include", inc_path))
+ self.assertTrue(
+ os.path.dirname(inc_path) in self.config.parser.existing_paths)
+ self.assertTrue(
+ os.path.basename(inc_path) in self.config.parser.existing_paths[
+ os.path.dirname(inc_path)])
+
+ def test_deploy_cert_not_parsed_path(self):
+ # Make sure that we add include to root config for vhosts when
+ # handle-sites is false
+ self.config.parser.modules.add("ssl_module")
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("socache_shmcb_module")
+ tmp_path = filesystem.realpath(tempfile.mkdtemp("vhostroot"))
+ filesystem.chmod(tmp_path, 0o755)
+ mock_p = "certbot_apache._internal.configurator.ApacheConfigurator._get_ssl_vhost_path"
+ mock_a = "certbot_apache._internal.parser.ApacheParser.add_include"
+
+ with mock.patch(mock_p) as mock_path:
+ mock_path.return_value = os.path.join(tmp_path, "whatever.conf")
+ with mock.patch(mock_a) as mock_add:
+ self.config.deploy_cert(
+ "encryption-example.demo",
+ "example/cert.pem", "example/key.pem",
+ "example/cert_chain.pem")
+ # Test that we actually called add_include
+ self.assertTrue(mock_add.called)
+ shutil.rmtree(tmp_path)
+
+ @mock.patch("certbot_apache._internal.parser.ApacheParser.parsed_in_original")
+ def test_choose_vhost_and_servername_addition_parsed(self, mock_parsed):
+ ret_vh = self.vh_truth[8]
+ ret_vh.enabled = True
+ self.config.enable_site(ret_vh)
+ # Make sure that we return early
+ self.assertFalse(mock_parsed.called)
+
+ def test_enable_mod_unsupported(self):
+ self.assertRaises(errors.MisconfigurationError,
+ self.config.enable_mod,
+ "whatever")
+
+ def test_wildcard_domain(self):
+ # pylint: disable=protected-access
+ cases = {u"*.example.org": True, b"*.x.example.org": True,
+ u"a.example.org": False, b"a.x.example.org": False}
+ for key in cases:
+ self.assertEqual(self.config._wildcard_domain(key), cases[key])
+
+ def test_choose_vhosts_wildcard(self):
+ # pylint: disable=protected-access
+ mock_path = "certbot_apache._internal.display_ops.select_vhost_multiple"
+ with mock.patch(mock_path) as mock_select_vhs:
+ mock_select_vhs.return_value = [self.vh_truth[3]]
+ vhs = self.config._choose_vhosts_wildcard("*.certbot.demo",
+ create_ssl=True)
+ # Check that the dialog was called with one vh: certbot.demo
+ self.assertEqual(mock_select_vhs.call_args[0][0][0], self.vh_truth[3])
+ self.assertEqual(len(mock_select_vhs.call_args_list), 1)
+
+ # And the actual returned values
+ self.assertEqual(len(vhs), 1)
+ self.assertTrue(vhs[0].name == "certbot.demo")
+ self.assertTrue(vhs[0].ssl)
+
+ self.assertFalse(vhs[0] == self.vh_truth[3])
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator.make_vhost_ssl")
+ def test_choose_vhosts_wildcard_no_ssl(self, mock_makessl):
+ # pylint: disable=protected-access
+ mock_path = "certbot_apache._internal.display_ops.select_vhost_multiple"
+ with mock.patch(mock_path) as mock_select_vhs:
+ mock_select_vhs.return_value = [self.vh_truth[1]]
+ vhs = self.config._choose_vhosts_wildcard("*.certbot.demo",
+ create_ssl=False)
+ self.assertFalse(mock_makessl.called)
+ self.assertEqual(vhs[0], self.vh_truth[1])
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator._vhosts_for_wildcard")
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator.make_vhost_ssl")
+ def test_choose_vhosts_wildcard_already_ssl(self, mock_makessl, mock_vh_for_w):
+ # pylint: disable=protected-access
+ # Already SSL vhost
+ mock_vh_for_w.return_value = [self.vh_truth[7]]
+ mock_path = "certbot_apache._internal.display_ops.select_vhost_multiple"
+ with mock.patch(mock_path) as mock_select_vhs:
+ mock_select_vhs.return_value = [self.vh_truth[7]]
+ vhs = self.config._choose_vhosts_wildcard("whatever",
+ create_ssl=True)
+ self.assertEqual(mock_select_vhs.call_args[0][0][0], self.vh_truth[7])
+ self.assertEqual(len(mock_select_vhs.call_args_list), 1)
+ # Ensure that make_vhost_ssl was not called, vhost.ssl == true
+ self.assertFalse(mock_makessl.called)
+
+ # And the actual returned values
+ self.assertEqual(len(vhs), 1)
+ self.assertTrue(vhs[0].ssl)
+ self.assertEqual(vhs[0], self.vh_truth[7])
+
+
+ def test_deploy_cert_wildcard(self):
+ # pylint: disable=protected-access
+ mock_choose_vhosts = mock.MagicMock()
+ mock_choose_vhosts.return_value = [self.vh_truth[7]]
+ self.config._choose_vhosts_wildcard = mock_choose_vhosts
+ mock_d = "certbot_apache._internal.configurator.ApacheConfigurator._deploy_cert"
+ with mock.patch(mock_d) as mock_dep:
+ self.config.deploy_cert("*.wildcard.example.org", "/tmp/path",
+ "/tmp/path", "/tmp/path", "/tmp/path")
+ self.assertTrue(mock_dep.called)
+ self.assertEqual(len(mock_dep.call_args_list), 1)
+ self.assertEqual(self.vh_truth[7], mock_dep.call_args_list[0][0][0])
+
+ @mock.patch("certbot_apache._internal.display_ops.select_vhost_multiple")
+ def test_deploy_cert_wildcard_no_vhosts(self, mock_dialog):
+ # pylint: disable=protected-access
+ mock_dialog.return_value = []
+ self.assertRaises(errors.PluginError,
+ self.config.deploy_cert,
+ "*.wild.cat", "/tmp/path", "/tmp/path",
+ "/tmp/path", "/tmp/path")
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator._choose_vhosts_wildcard")
+ def test_enhance_wildcard_after_install(self, mock_choose):
+ # pylint: disable=protected-access
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("headers_module")
+ self.vh_truth[3].ssl = True
+ self.config._wildcard_vhosts["*.certbot.demo"] = [self.vh_truth[3]]
+ self.config.enhance("*.certbot.demo", "ensure-http-header",
+ "Upgrade-Insecure-Requests")
+ self.assertFalse(mock_choose.called)
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator._choose_vhosts_wildcard")
+ def test_enhance_wildcard_no_install(self, mock_choose):
+ self.vh_truth[3].ssl = True
+ mock_choose.return_value = [self.vh_truth[3]]
+ self.config.parser.modules.add("mod_ssl.c")
+ self.config.parser.modules.add("headers_module")
+ self.config.enhance("*.certbot.demo", "ensure-http-header",
+ "Upgrade-Insecure-Requests")
+ self.assertTrue(mock_choose.called)
+
+ def test_add_vhost_id(self):
+ for vh in [self.vh_truth[0], self.vh_truth[1], self.vh_truth[2]]:
+ vh_id = self.config.add_vhost_id(vh)
+ self.assertEqual(vh, self.config.find_vhost_by_id(vh_id))
+
+ def test_find_vhost_by_id_404(self):
+ self.assertRaises(errors.PluginError,
+ self.config.find_vhost_by_id,
+ "nonexistent")
+
+ def test_add_vhost_id_already_exists(self):
+ first_id = self.config.add_vhost_id(self.vh_truth[0])
+ second_id = self.config.add_vhost_id(self.vh_truth[0])
+ self.assertEqual(first_id, second_id)
+
+ def test_realpath_replaces_symlink(self):
+ orig_match = self.config.parser.aug.match
+ mock_vhost = copy.deepcopy(self.vh_truth[0])
+ mock_vhost.filep = mock_vhost.filep.replace('sites-enabled', u'sites-available')
+ mock_vhost.path = mock_vhost.path.replace('sites-enabled', 'sites-available')
+ mock_vhost.enabled = False
+ self.config.parser.parse_file(mock_vhost.filep)
+
+ def mock_match(aug_expr):
+ """Return a mocked match list of VirtualHosts"""
+ if "/mocked/path" in aug_expr:
+ return [self.vh_truth[1].path, self.vh_truth[0].path, mock_vhost.path]
+ return orig_match(aug_expr)
+
+ self.config.parser.parser_paths = ["/mocked/path"]
+ self.config.parser.aug.match = mock_match
+ vhs = self.config.get_virtual_hosts()
+ self.assertEqual(len(vhs), 2)
+ self.assertTrue(vhs[0] == self.vh_truth[1])
+ # mock_vhost should have replaced the vh_truth[0], because its filepath
+ # isn't a symlink
+ self.assertTrue(vhs[1] == mock_vhost)
+
+
+class AugeasVhostsTest(util.ApacheTest):
+ """Test vhosts with illegal names dependent on augeas version."""
+ # pylint: disable=protected-access
+
+ def setUp(self): # pylint: disable=arguments-differ
+ td = "debian_apache_2_4/augeas_vhosts"
+ cr = "debian_apache_2_4/augeas_vhosts/apache2"
+ vr = "debian_apache_2_4/augeas_vhosts/apache2/sites-available"
+ super(AugeasVhostsTest, self).setUp(test_dir=td,
+ config_root=cr,
+ vhost_root=vr)
+
+ self.config = util.get_apache_configurator(
+ self.config_path, self.vhost_path, self.config_dir,
+ self.work_dir)
+
+ def test_choosevhost_with_illegal_name(self):
+ self.config.parser.aug = mock.MagicMock()
+ self.config.parser.aug.match.side_effect = RuntimeError
+ path = "debian_apache_2_4/augeas_vhosts/apache2/sites-available/old-and-default.conf"
+ chosen_vhost = self.config._create_vhost(path)
+ self.assertEqual(None, chosen_vhost)
+
+ def test_choosevhost_works(self):
+ path = "debian_apache_2_4/augeas_vhosts/apache2/sites-available/old-and-default.conf"
+ chosen_vhost = self.config._create_vhost(path)
+ self.assertTrue(chosen_vhost is None or chosen_vhost.path == path)
+
+ @mock.patch("certbot_apache._internal.configurator.ApacheConfigurator._create_vhost")
+ def test_get_vhost_continue(self, mock_vhost):
+ mock_vhost.return_value = None
+ vhs = self.config.get_virtual_hosts()
+ self.assertEqual([], vhs)
+
+ def test_choose_vhost_with_matching_wildcard(self):
+ names = (
+ "an.example.net", "another.example.net", "an.other.example.net")
+ for name in names:
+ self.assertFalse(name in self.config.choose_vhost(name).aliases)
+
+ @mock.patch("certbot_apache._internal.obj.VirtualHost.conflicts")
+ def test_choose_vhost_without_matching_wildcard(self, mock_conflicts):
+ mock_conflicts.return_value = False
+ mock_path = "certbot_apache._internal.display_ops.select_vhost"
+ with mock.patch(mock_path, lambda _, vhosts: vhosts[0]):
+ for name in ("a.example.net", "other.example.net"):
+ self.assertTrue(name in self.config.choose_vhost(name).aliases)
+
+ @mock.patch("certbot_apache._internal.obj.VirtualHost.conflicts")
+ def test_choose_vhost_wildcard_not_found(self, mock_conflicts):
+ mock_conflicts.return_value = False
+ mock_path = "certbot_apache._internal.display_ops.select_vhost"
+ names = (
+ "abc.example.net", "not.there.tld", "aa.wildcard.tld"
+ )
+ with mock.patch(mock_path) as mock_select:
+ mock_select.return_value = self.config.vhosts[0]
+ for name in names:
+ orig_cc = mock_select.call_count
+ self.config.choose_vhost(name)
+ self.assertEqual(mock_select.call_count - orig_cc, 1)
+
+ def test_choose_vhost_wildcard_found(self):
+ mock_path = "certbot_apache._internal.display_ops.select_vhost"
+ names = (
+ "ab.example.net", "a.wildcard.tld", "yetanother.example.net"
+ )
+ with mock.patch(mock_path) as mock_select:
+ mock_select.return_value = self.config.vhosts[0]
+ for name in names:
+ self.config.choose_vhost(name)
+ self.assertEqual(mock_select.call_count, 0)
+
+ def test_augeas_span_error(self):
+ broken_vhost = self.config.vhosts[0]
+ broken_vhost.path = broken_vhost.path + "/nonexistent"
+ self.assertRaises(errors.PluginError, self.config.make_vhost_ssl,
+ broken_vhost)
+
+class MultiVhostsTest(util.ApacheTest):
+ """Test configuration with multiple virtualhosts in a single file."""
+ # pylint: disable=protected-access
+
+ def setUp(self): # pylint: disable=arguments-differ
+ td = "debian_apache_2_4/multi_vhosts"
+ cr = "debian_apache_2_4/multi_vhosts/apache2"
+ vr = "debian_apache_2_4/multi_vhosts/apache2/sites-available"
+ super(MultiVhostsTest, self).setUp(test_dir=td,
+ config_root=cr,
+ vhost_root=vr)
+
+ self.config = util.get_apache_configurator(
+ self.config_path, self.vhost_path,
+ self.config_dir, self.work_dir, conf_vhost_path=self.vhost_path)
+ self.vh_truth = util.get_vh_truth(
+ self.temp_dir, "debian_apache_2_4/multi_vhosts")
+
+ def test_make_vhost_ssl(self):
+ ssl_vhost = self.config.make_vhost_ssl(self.vh_truth[1])
+
+ self.assertEqual(
+ ssl_vhost.filep,
+ os.path.join(self.config_path, "sites-available",
+ "default-le-ssl.conf"))
+
+ self.assertEqual(ssl_vhost.path,
+ "/files" + ssl_vhost.filep + "/IfModule/VirtualHost")
+ self.assertEqual(len(ssl_vhost.addrs), 1)
+ self.assertEqual(set([obj.Addr.fromstring("*:443")]), ssl_vhost.addrs)
+ self.assertEqual(ssl_vhost.name, "banana.vomit.com")
+ self.assertTrue(ssl_vhost.ssl)
+ self.assertFalse(ssl_vhost.enabled)
+
+
+ self.assertEqual(self.config.is_name_vhost(self.vh_truth[1]),
+ self.config.is_name_vhost(ssl_vhost))
+
+ mock_path = "certbot_apache._internal.configurator.ApacheConfigurator._get_new_vh_path"
+ with mock.patch(mock_path) as mock_getpath:
+ mock_getpath.return_value = None
+ self.assertRaises(errors.PluginError, self.config.make_vhost_ssl,
+ self.vh_truth[1])
+
+ def test_get_new_path(self):
+ with_index_1 = ["/path[1]/section[1]"]
+ without_index = ["/path/section"]
+ with_index_2 = ["/path[2]/section[2]"]
+ self.assertEqual(self.config._get_new_vh_path(without_index,
+ with_index_1),
+ None)
+ self.assertEqual(self.config._get_new_vh_path(without_index,
+ with_index_2),
+ with_index_2[0])
+
+ both = with_index_1 + with_index_2
+ self.assertEqual(self.config._get_new_vh_path(without_index, both),
+ with_index_2[0])
+
+ @certbot_util.patch_get_utility()
+ def test_make_vhost_ssl_with_existing_rewrite_rule(self, mock_get_utility):
+ self.config.parser.modules.add("rewrite_module")
+
+ ssl_vhost = self.config.make_vhost_ssl(self.vh_truth[4])
+
+ self.assertTrue(self.config.parser.find_dir(
+ "RewriteEngine", "on", ssl_vhost.path, False))
+
+ with open(ssl_vhost.filep) as the_file:
+ conf_text = the_file.read()
+ commented_rewrite_rule = ("# RewriteRule \"^/secrets/(.+)\" "
+ "\"https://new.example.com/docs/$1\" [R,L]")
+ uncommented_rewrite_rule = ("RewriteRule \"^/docs/(.+)\" "
+ "\"http://new.example.com/docs/$1\" [R,L]")
+ self.assertTrue(commented_rewrite_rule in conf_text)
+ self.assertTrue(uncommented_rewrite_rule in conf_text)
+ mock_get_utility().add_message.assert_called_once_with(mock.ANY,
+ mock.ANY)
+
+ @certbot_util.patch_get_utility()
+ def test_make_vhost_ssl_with_existing_rewrite_conds(self, mock_get_utility):
+ self.config.parser.modules.add("rewrite_module")
+
+ ssl_vhost = self.config.make_vhost_ssl(self.vh_truth[3])
+
+ with open(ssl_vhost.filep) as the_file:
+ conf_lines = the_file.readlines()
+ conf_line_set = [l.strip() for l in conf_lines]
+ not_commented_cond1 = ("RewriteCond "
+ "%{DOCUMENT_ROOT}/%{REQUEST_FILENAME} !-f")
+ not_commented_rewrite_rule = ("RewriteRule "
+ "^(.*)$ b://u%{REQUEST_URI} [P,NE,L]")
+
+ commented_cond1 = "# RewriteCond %{HTTPS} !=on"
+ commented_cond2 = "# RewriteCond %{HTTPS} !^$"
+ commented_rewrite_rule = ("# RewriteRule ^ "
+ "https://%{SERVER_NAME}%{REQUEST_URI} "
+ "[L,NE,R=permanent]")
+
+ self.assertTrue(not_commented_cond1 in conf_line_set)
+ self.assertTrue(not_commented_rewrite_rule in conf_line_set)
+
+ self.assertTrue(commented_cond1 in conf_line_set)
+ self.assertTrue(commented_cond2 in conf_line_set)
+ self.assertTrue(commented_rewrite_rule in conf_line_set)
+ mock_get_utility().add_message.assert_called_once_with(mock.ANY,
+ mock.ANY)
+
+
+class InstallSslOptionsConfTest(util.ApacheTest):
+ """Test that the options-ssl-nginx.conf file is installed and updated properly."""
+
+ def setUp(self): # pylint: disable=arguments-differ
+ super(InstallSslOptionsConfTest, self).setUp()
+
+ self.config = util.get_apache_configurator(
+ self.config_path, self.vhost_path, self.config_dir, self.work_dir)
+
+ def _call(self):
+ self.config.install_ssl_options_conf(self.config.mod_ssl_conf,
+ self.config.updated_mod_ssl_conf_digest)
+
+ def _current_ssl_options_hash(self):
+ return crypto_util.sha256sum(self.config.option("MOD_SSL_CONF_SRC"))
+
+ def _assert_current_file(self):
+ self.assertTrue(os.path.isfile(self.config.mod_ssl_conf))
+ self.assertEqual(crypto_util.sha256sum(self.config.mod_ssl_conf),
+ self._current_ssl_options_hash())
+
+ def test_no_file(self):
+ # prepare should have placed a file there
+ self._assert_current_file()
+ os.remove(self.config.mod_ssl_conf)
+ self.assertFalse(os.path.isfile(self.config.mod_ssl_conf))
+ self._call()
+ self._assert_current_file()
+
+ def test_current_file(self):
+ self._assert_current_file()
+ self._call()
+ self._assert_current_file()
+
+ def test_prev_file_updates_to_current(self):
+ from certbot_apache._internal.constants import ALL_SSL_OPTIONS_HASHES
+ ALL_SSL_OPTIONS_HASHES.insert(0, "test_hash_does_not_match")
+ with mock.patch('certbot.crypto_util.sha256sum') as mock_sha256:
+ mock_sha256.return_value = ALL_SSL_OPTIONS_HASHES[0]
+ self._call()
+ self._assert_current_file()
+
+ def test_manually_modified_current_file_does_not_update(self):
+ with open(self.config.mod_ssl_conf, "a") as mod_ssl_conf:
+ mod_ssl_conf.write("a new line for the wrong hash\n")
+ with mock.patch("certbot.plugins.common.logger") as mock_logger:
+ self._call()
+ self.assertFalse(mock_logger.warning.called)
+ self.assertTrue(os.path.isfile(self.config.mod_ssl_conf))
+ self.assertEqual(crypto_util.sha256sum(
+ self.config.option("MOD_SSL_CONF_SRC")),
+ self._current_ssl_options_hash())
+ self.assertNotEqual(crypto_util.sha256sum(self.config.mod_ssl_conf),
+ self._current_ssl_options_hash())
+
+ def test_manually_modified_past_file_warns(self):
+ with open(self.config.mod_ssl_conf, "a") as mod_ssl_conf:
+ mod_ssl_conf.write("a new line for the wrong hash\n")
+ with open(self.config.updated_mod_ssl_conf_digest, "w") as f:
+ f.write("hashofanoldversion")
+ with mock.patch("certbot.plugins.common.logger") as mock_logger:
+ self._call()
+ self.assertEqual(mock_logger.warning.call_args[0][0],
+ "%s has been manually modified; updated file "
+ "saved to %s. We recommend updating %s for security purposes.")
+ self.assertEqual(crypto_util.sha256sum(
+ self.config.option("MOD_SSL_CONF_SRC")),
+ self._current_ssl_options_hash())
+ # only print warning once
+ with mock.patch("certbot.plugins.common.logger") as mock_logger:
+ self._call()
+ self.assertFalse(mock_logger.warning.called)
+
+ def test_current_file_hash_in_all_hashes(self):
+ from certbot_apache._internal.constants import ALL_SSL_OPTIONS_HASHES
+ self.assertTrue(self._current_ssl_options_hash() in ALL_SSL_OPTIONS_HASHES,
+ "Constants.ALL_SSL_OPTIONS_HASHES must be appended"
+ " with the sha256 hash of self.config.mod_ssl_conf when it is updated.")
+
+
+if __name__ == "__main__":
+ unittest.main() # pragma: no cover