mirror of
				https://github.com/drwetter/testssl.sh.git
				synced 2025-11-04 07:45:27 +01:00 
			
		
		
		
	* die statement if testssl.sh cannot be found from the current path * comment everything out for JSON * don't repeat the pattern, use a variable * use "speaking" variable names
		
			
				
	
	
		
			63 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Perl
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			63 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Perl
		
	
	
		
			Executable File
		
	
	
	
	
#!/usr/bin/env perl
 | 
						|
 | 
						|
# disabled as IPv6 is not supported by Travis, see https://github.com/drwetter/testssl.sh/issues/1177
 | 
						|
 | 
						|
# Just a functional test, whether there are any problems on the client side
 | 
						|
# Probably we could also inspect the JSON for any problems for
 | 
						|
#    "id"           : "scanProblem"
 | 
						|
#    "finding"      : "Scan interrupted"
 | 
						|
 | 
						|
use strict;
 | 
						|
use Test::More;
 | 
						|
use Data::Dumper;
 | 
						|
# use JSON;
 | 
						|
# if we need JSON we need to comment this and the lines below in
 | 
						|
 | 
						|
my $tests = 0;
 | 
						|
my $prg="./testssl.sh";
 | 
						|
my $check2run ="-p -s -P --pfs -S -h -U -q --ip=one --color 0";
 | 
						|
my $uri="";
 | 
						|
my $socket_out="";
 | 
						|
my $openssl_out="";
 | 
						|
# Blacklists we use to trigger an error:
 | 
						|
my $socket_regex_bl='(e|E)rror|\.\/testssl\.sh: line |(f|F)atal';
 | 
						|
my $openssl_regex_bl='(e|E)rror|(f|F)atal|\.\/testssl\.sh: line |Oops|s_client connect problem';
 | 
						|
 | 
						|
# my $socket_json="";
 | 
						|
# my $openssl_json="";
 | 
						|
# $check2run="--jsonfile tmp.json $check2run";
 | 
						|
 | 
						|
die "Unable to open $prg" unless -f $prg;
 | 
						|
 | 
						|
$uri="testssl.net";
 | 
						|
 | 
						|
# unlink "tmp.json";
 | 
						|
printf "\n%s\n", "Baseline unit test IPv6 via sockets --> $uri ...";
 | 
						|
$socket_out = `./testssl.sh $check2run -6 $uri 2>&1`;
 | 
						|
# $socket_json = json('tmp.json');
 | 
						|
unlike($socket_out, qr/$socket_regex_bl/, "");
 | 
						|
$tests++;
 | 
						|
 | 
						|
# unlink "tmp.json";
 | 
						|
printf "\n%s\n", "Baseline unit test IPv6 via OpenSSL --> $uri ...";
 | 
						|
$openssl_out = `./testssl.sh --ssl-native $check2run -6 $uri 2>&1`;
 | 
						|
# $openssl_json = json('tmp.json');
 | 
						|
# With Google only we encounter an error as they return a 0 char with openssl, so we white list this pattern here:
 | 
						|
$openssl_out =~ s/testssl.*warning: command substitution: ignored null byte in input\n//g;
 | 
						|
unlike($openssl_out, qr/$openssl_regex_bl/, "");
 | 
						|
$tests++;
 | 
						|
 | 
						|
 | 
						|
done_testing($tests);
 | 
						|
unlink "tmp.json";
 | 
						|
 | 
						|
 | 
						|
 | 
						|
sub json($) {
 | 
						|
	my $file = shift;
 | 
						|
	$file = `cat $file`;
 | 
						|
	unlink $file;
 | 
						|
	return from_json($file);
 | 
						|
}
 | 
						|
 |