mirror of
https://github.com/drwetter/testssl.sh.git
synced 2025-12-08 16:24:00 +01:00
term pattern seems better than the "colorized list"
This commit is contained in:
@@ -13,7 +13,7 @@ my $out="";
|
||||
|
||||
# Try to detect remainders from debugging:
|
||||
my $debug_regexp='^(\s)*set (-|\+)x';
|
||||
# Blacklists we use to trigger an error:
|
||||
# Patterns used to trigger an error:
|
||||
my $error_regexp1='(syntax|parse) (e|E)rror';
|
||||
my $error_regexp2='testssl.sh: line';
|
||||
my $error_regexp3='bash: warning';
|
||||
|
||||
@@ -8,7 +8,7 @@ use Test::More;
|
||||
|
||||
my $tests = 0;
|
||||
my $fileout="";
|
||||
# Blacklists we use to trigger an error:
|
||||
# Patterns used to trigger an error:
|
||||
my $error_regexp1='(syntax|parse) (e|E)rror';
|
||||
my $error_regexp2='testssl.sh: line';
|
||||
my $error_regexp3='bash: warning';
|
||||
|
||||
@@ -8,7 +8,7 @@ use Test::More;
|
||||
|
||||
my $tests = 0;
|
||||
my $fileout="";
|
||||
# Blacklists we use to trigger an error:
|
||||
# Patterns used to trigger an error:
|
||||
my $error_regexp1='(syntax|parse) (e|E)rror';
|
||||
my $error_regexp2='client-simulation.txt:';
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
# disabled as IPv6 wasn't supported by Travis CI and isn't by GH action, see https://github.com/testssl/testssl.sh/issues/1177
|
||||
# disabled as IPv6 wasn't supported by Travis CI and isn't also supported by GH action, see https://github.com/testssl/testssl.sh/issues/1177
|
||||
|
||||
# Just a functional test, whether there are any problems on the client side
|
||||
# Probably we could also inspect the JSON for any problems for
|
||||
@@ -10,8 +10,8 @@
|
||||
use strict;
|
||||
use Test::More;
|
||||
use Data::Dumper;
|
||||
# if JSON wlll be needed this and the lines below need to be uncommented
|
||||
# use JSON;
|
||||
# if we need JSON we need to comment this and the lines below in
|
||||
|
||||
my $tests = 0;
|
||||
my $prg="./testssl.sh";
|
||||
@@ -19,7 +19,7 @@ my $check2run ="-p -s -P --fs -S -h -U -q --ip=one --color 0";
|
||||
my $uri="";
|
||||
my $socket_out="";
|
||||
my $openssl_out="";
|
||||
# Blacklists we use to trigger an error:
|
||||
# Patterns used to trigger an error:
|
||||
my $socket_regex_bl='(e|E)rror|\.\/testssl\.sh: line |(f|F)atal|(c|C)ommand not found';
|
||||
my $openssl_regex_bl='(e|E)rror|(f|F)atal|\.\/testssl\.sh: line |Oops|s_client connect problem|(c|C)ommand not found';
|
||||
|
||||
|
||||
@@ -22,7 +22,7 @@ my $check2run="-q --ip=one --color 0";
|
||||
my $uri="";
|
||||
my $socket_out="";
|
||||
my $openssl_out="";
|
||||
# Blacklists we use to trigger an error:
|
||||
# Patterns used to trigger an error:
|
||||
my $socket_regex_bl='(e|E)rror|\.\/testssl\.sh: line |(f|F)atal|(c|C)ommand not found';
|
||||
my $openssl_regex_bl='(e|E)rror|(f|F)atal|\.\/testssl\.sh: line |Oops|s_client connect problem|(c|C)ommand not found';
|
||||
my $openssl_fallback_cmd=""; # empty for Linux
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
# Baseline diff test against testssl.sh (csv output)
|
||||
#
|
||||
# We don't use a full run yet and only the certificate section.
|
||||
# There we would need to blacklist more, like:
|
||||
# There we would need to block-list more, like:
|
||||
# cert_serialNumber, cert_fingerprintSHA1, cert_fingerprintSHA256, cert
|
||||
# cert_expirationStatus, cert_notBefore, cert_notAfter, cert_caIssuers, intermediate_cert
|
||||
#
|
||||
|
||||
Reference in New Issue
Block a user