mirror of
https://github.com/drwetter/testssl.sh.git
synced 2025-10-09 04:02:53 +02:00
Better order, "command not found added"
This commit is contained in:
62
t/11_baseline_ipv6_http.t.DISABLED
Executable file
62
t/11_baseline_ipv6_http.t.DISABLED
Executable file
@ -0,0 +1,62 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
# disabled as IPv6 is not supported by Travis, see https://github.com/drwetter/testssl.sh/issues/1177
|
||||
|
||||
# Just a functional test, whether there are any problems on the client side
|
||||
# Probably we could also inspect the JSON for any problems for
|
||||
# "id" : "scanProblem"
|
||||
# "finding" : "Scan interrupted"
|
||||
|
||||
use strict;
|
||||
use Test::More;
|
||||
use Data::Dumper;
|
||||
# use JSON;
|
||||
# if we need JSON we need to comment this and the lines below in
|
||||
|
||||
my $tests = 0;
|
||||
my $prg="./testssl.sh";
|
||||
my $check2run ="-p -s -P --fs -S -h -U -q --ip=one --color 0";
|
||||
my $uri="";
|
||||
my $socket_out="";
|
||||
my $openssl_out="";
|
||||
# Blacklists we use to trigger an error:
|
||||
my $socket_regex_bl='(e|E)rror|\.\/testssl\.sh: line |(f|F)atal';
|
||||
my $openssl_regex_bl='(e|E)rror|(f|F)atal|\.\/testssl\.sh: line |Oops|s_client connect problem';
|
||||
|
||||
# my $socket_json="";
|
||||
# my $openssl_json="";
|
||||
# $check2run="--jsonfile tmp.json $check2run";
|
||||
|
||||
die "Unable to open $prg" unless -f $prg;
|
||||
|
||||
$uri="testssl.net";
|
||||
|
||||
# unlink "tmp.json";
|
||||
printf "\n%s\n", "Baseline unit test IPv6 via sockets --> $uri ...";
|
||||
$socket_out = `./testssl.sh $check2run -6 $uri 2>&1`;
|
||||
# $socket_json = json('tmp.json');
|
||||
unlike($socket_out, qr/$socket_regex_bl/, "");
|
||||
$tests++;
|
||||
|
||||
# unlink "tmp.json";
|
||||
printf "\n%s\n", "Baseline unit test IPv6 via OpenSSL --> $uri ...";
|
||||
$openssl_out = `./testssl.sh --ssl-native $check2run -6 $uri 2>&1`;
|
||||
# $openssl_json = json('tmp.json');
|
||||
# With Google only we encounter an error as they return a 0 char with openssl, so we white list this pattern here:
|
||||
$openssl_out =~ s/testssl.*warning: command substitution: ignored null byte in input\n//g;
|
||||
unlike($openssl_out, qr/$openssl_regex_bl/, "");
|
||||
$tests++;
|
||||
|
||||
|
||||
done_testing($tests);
|
||||
unlink "tmp.json";
|
||||
|
||||
|
||||
|
||||
sub json($) {
|
||||
my $file = shift;
|
||||
$file = `cat $file`;
|
||||
unlink $file;
|
||||
return from_json($file);
|
||||
}
|
||||
|
Reference in New Issue
Block a user