1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
#!/usr/bin/env ruby
require File.expand_path(File.dirname(__FILE__) + '/../../lib/puppettest')
require 'puppettest'
require 'mocha'
class TestMongrelServer < PuppetTest::TestCase
confine "Missing mongrel" => Puppet.features.mongrel?
include PuppetTest::ServerTest
def mkserver(handlers = nil)
handlers ||= { :Status => nil }
mongrel = Puppet::Network::HTTPServer::Mongrel.new(handlers)
end
# Make sure client info is correctly extracted.
def test_client_info
obj = Object.new
obj.singleton_class.send(:attr_accessor, :params)
params = {}
obj.params = params
mongrel = mkserver
ip = Facter.value(:ipaddress)
params["REMOTE_ADDR"] = ip
params[Puppet[:ssl_client_header]] = ""
params[Puppet[:ssl_client_verify_header]] = "failure"
info = nil
Resolv.expects(:getname).with(ip).returns("host.domain.com").times(4)
assert_nothing_raised("Could not call client_info") do
info = mongrel.send(:client_info, obj)
end
assert(! info.authenticated?, "Client info object was marked valid even though headers were missing")
assert_equal(ip, info.ip, "Did not copy over ip correctly")
assert_equal("host.domain.com", info.name, "Did not copy over hostname correctly")
# Now pass the X-Forwarded-For header and check it is preferred over REMOTE_ADDR
params["REMOTE_ADDR"] = '127.0.0.1'
params["HTTP_X_FORWARDED_FOR"] = ip
info = nil
assert_nothing_raised("Could not call client_info") do
info = mongrel.send(:client_info, obj)
end
assert(! info.authenticated?, "Client info object was marked valid even though headers were missing")
assert_equal(ip, info.ip, "Did not copy over ip correctly")
assert_equal("host.domain.com", info.name, "Did not copy over hostname correctly")
# Now add a valid auth header.
params["REMOTE_ADDR"] = ip
params["HTTP_X_FORWARDED_FOR"] = nil
params[Puppet[:ssl_client_header]] = "/CN=host.domain.com"
assert_nothing_raised("Could not call client_info") do
info = mongrel.send(:client_info, obj)
end
assert(! info.authenticated?, "Client info object was marked valid even though the verify header was fals")
assert_equal(ip, info.ip, "Did not copy over ip correctly")
assert_equal("host.domain.com", info.name, "Did not copy over hostname correctly")
# Now change the verify header to be true
params[Puppet[:ssl_client_verify_header]] = "SUCCESS"
assert_nothing_raised("Could not call client_info") do
info = mongrel.send(:client_info, obj)
end
assert(info.authenticated?, "Client info object was not marked valid even though all headers were correct")
assert_equal(ip, info.ip, "Did not copy over ip correctly")
assert_equal("host.domain.com", info.name, "Did not copy over hostname correctly")
# Now try it with a different header name
params.delete(Puppet[:ssl_client_header])
Puppet[:ssl_client_header] = "header_testing"
params["header_testing"] = "/CN=other.domain.com"
info = nil
assert_nothing_raised("Could not call client_info with other header") do
info = mongrel.send(:client_info, obj)
end
assert(info.authenticated?, "Client info object was not marked valid even though the header was present")
assert_equal(ip, info.ip, "Did not copy over ip correctly")
assert_equal("other.domain.com", info.name, "Did not copy over hostname correctly")
# Now make sure it's considered invalid without that header
params.delete("header_testing")
info = nil
assert_nothing_raised("Could not call client_info with no header") do
info = mongrel.send(:client_info, obj)
end
assert(! info.authenticated?, "Client info object was marked valid without header")
assert_equal(ip, info.ip, "Did not copy over ip correctly")
assert_equal(Resolv.getname(ip), info.name, "Did not look up hostname correctly")
end
end
|