(This page was automatically generated by the tools in the opsboy project on 19:48:16 30-Mar-2018 GMT.)
Commit | Testing Time | Unexpected Failures |
Expected Failures |
Files | Tests | Elapsed Time |
---|---|---|---|---|---|---|
1a3f0a30 | 2017-09-23 20:13:10 GMT | 0 | 176 | 36 | 4308 | 103 sec |
File | Name | Details |
---|---|---|
balancer.t | TEST 16: https (keepalive) - status code ok |
got: '502' expected: '200' |
balancer.t | TEST 16: https (keepalive) - response_body - response is expected (repeated req 0, req 0) |
got: '<html> <head><title>502 Bad Gateway</title></head> <body bgcolor="white"> <center><h1>502 Bad Gateway</h1></center> <hr><center>nginx/1.11.2 (no pool)</center> </body> </html> ' expected: 'ok' |
balancer.t | TEST 16: https (keepalive) - pattern "[alert]" should not match any line in error.log but matches line "2017/09/23 22:50:39 [alert] 1925\#0: *1 ignoring stale global SSL error (SSL: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html) while SSL handshaking to upstream, client: 127.0.0.1, server: localhost, request: \"GET /t HTTP/1.1\", upstream: \"https://127.0.0.1:1234/back\", host: \"localhost\"" (req 0) | |
balancer.t | TEST 16: https (keepalive) - status code ok |
got: '502' expected: '200' |
balancer.t | TEST 16: https (keepalive) - response_body - response is expected (repeated req 1, req 0) |
got: '<html> <head><title>502 Bad Gateway</title></head> <body bgcolor="white"> <center><h1>502 Bad Gateway</h1></center> <hr><center>nginx/1.11.2 (no pool)</center> </body> </html> ' expected: 'ok' |
balancer.t | TEST 17: https (no keepalive) - status code ok |
got: '502' expected: '200' |
balancer.t | TEST 17: https (no keepalive) - response_body - response is expected (repeated req 0, req 0) |
got: '<html> <head><title>502 Bad Gateway</title></head> <body bgcolor="white"> <center><h1>502 Bad Gateway</h1></center> <hr><center>nginx/1.11.2 (no pool)</center> </body> </html> ' expected: 'ok' |
balancer.t | TEST 17: https (no keepalive) - pattern "[alert]" should not match any line in error.log but matches line "2017/09/23 22:50:40 [alert] 1969\#0: *1 ignoring stale global SSL error (SSL: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html) while SSL handshaking to upstream, client: 127.0.0.1, server: localhost, request: \"GET /t HTTP/1.1\", upstream: \"https://127.0.0.1:12347/back\", host: \"localhost\"" (req 0) | |
balancer.t | TEST 17: https (no keepalive) - status code ok |
got: '502' expected: '200' |
balancer.t | TEST 17: https (no keepalive) - response_body - response is expected (repeated req 1, req 0) |
got: '<html> <head><title>502 Bad Gateway</title></head> <body bgcolor="white"> <center><h1>502 Bad Gateway</h1></center> <hr><center>nginx/1.11.2 (no pool)</center> </body> </html> ' expected: 'ok' |
errlog.t | nginx: [emerg] | invalid capture error log size "3k", minimum size is 4096 in /home/ec2-user/git/lua-resty-core/t/servroot/conf/nginx.conf:25 |
errlog.t | nginx: [emerg] | invalid number of arguments in "lua_capture_error_log" directive in /home/ec2-user/git/lua-resty-core/t/servroot/conf/nginx.conf:25 |
ocsp.t | TEST 14: fail to validate OCSP response - OCSP response signed by an unknown cert and the OCSP response does not contain the unknown cert - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 14: fail to validate OCSP response - OCSP response signed by an unknown cert and the OCSP response does not contain the unknown cert - pattern "failed to validate OCSP response: OCSP_basic_verify() failed" should match a line in error.log (req 0) | |
ocsp.t | TEST 14: fail to validate OCSP response - OCSP response signed by an unknown cert and the OCSP response does not contain the unknown cert - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 14: fail to validate OCSP response - OCSP response signed by an unknown cert and the OCSP response does not contain the unknown cert - pattern "failed to validate OCSP response: OCSP_basic_verify() failed" should match a line in error.log (req 1) | |
ocsp.t | TEST 12: validate good OCSP response - no certs in response - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 12: validate good OCSP response - no certs in response - pattern "OCSP response validation ok" should match a line in error.log (req 0) | |
ocsp.t | TEST 12: validate good OCSP response - no certs in response - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 12: validate good OCSP response - no certs in response - pattern "OCSP response validation ok" should match a line in error.log (req 1) | |
ocsp.t | TEST 15: fail to validate OCSP response - OCSP response returns revoked status - pattern "failed to validate OCSP response: certificate status "revoked" in the OCSP response" should match a line in error.log (req 0) | |
ocsp.t | TEST 15: fail to validate OCSP response - OCSP response returns revoked status - pattern "failed to validate OCSP response: certificate status "revoked" in the OCSP response" should match a line in error.log (req 1) | |
ocsp.t | TEST 5: get OCSP responder (truncated) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 5: get OCSP responder (truncated) - pattern "OCSP url found: http:/," should match a line in error.log (req 0) | |
ocsp.t | TEST 5: get OCSP responder (truncated) - pattern "still get an error: truncated" should match a line in error.log (req 0) | |
ocsp.t | TEST 5: get OCSP responder (truncated) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 5: get OCSP responder (truncated) - pattern "OCSP url found: http:/," should match a line in error.log (req 1) | |
ocsp.t | TEST 5: get OCSP responder (truncated) - pattern "still get an error: truncated" should match a line in error.log (req 1) | |
ocsp.t | TEST 13: validate OCSP response - OCSP response signed by an unknown cert and the OCSP response contains the unknown cert - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 13: validate OCSP response - OCSP response signed by an unknown cert and the OCSP response contains the unknown cert - pattern "OCSP response validation ok" should match a line in error.log (req 0) | |
ocsp.t | TEST 13: validate OCSP response - OCSP response signed by an unknown cert and the OCSP response contains the unknown cert - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 13: validate OCSP response - OCSP response signed by an unknown cert and the OCSP response contains the unknown cert - pattern "OCSP response validation ok" should match a line in error.log (req 1) | |
ocsp.t | TEST 10: validate good OCSP response - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 10: validate good OCSP response - pattern "OCSP response validation ok" should match a line in error.log (req 0) | |
ocsp.t | TEST 10: validate good OCSP response - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 10: validate good OCSP response - pattern "OCSP response validation ok" should match a line in error.log (req 1) | |
ocsp.t | TEST 4: get OCSP responder (issuer cert not next to the leaf cert) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 4: get OCSP responder (issuer cert not next to the leaf cert) - pattern "failed to get OCSP responder: issuer certificate not next to leaf" should match a line in error.log (req 0) | |
ocsp.t | TEST 4: get OCSP responder (issuer cert not next to the leaf cert) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 4: get OCSP responder (issuer cert not next to the leaf cert) - pattern "failed to get OCSP responder: issuer certificate not next to leaf" should match a line in error.log (req 1) | |
ocsp.t | TEST 6: create OCSP request (good) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 6: create OCSP request (good) - pattern "OCSP request created with length 68" should match a line in error.log (req 0) | |
ocsp.t | TEST 6: create OCSP request (good) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 6: create OCSP request (good) - pattern "OCSP request created with length 68" should match a line in error.log (req 1) | |
ocsp.t | TEST 2: get OCSP responder (not found) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 2: get OCSP responder (not found) - pattern "OCSP responder not found" should match a line in error.log (req 0) | |
ocsp.t | TEST 2: get OCSP responder (not found) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 2: get OCSP responder (not found) - pattern "OCSP responder not found" should match a line in error.log (req 1) | |
ocsp.t | TEST 9: create OCSP request (no issuer cert in the chain) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 9: create OCSP request (no issuer cert in the chain) - pattern "failed to create OCSP request: no issuer certificate in chain" should match a line in error.log (req 0) | |
ocsp.t | TEST 9: create OCSP request (no issuer cert in the chain) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 9: create OCSP request (no issuer cert in the chain) - pattern "failed to create OCSP request: no issuer certificate in chain" should match a line in error.log (req 1) | |
ocsp.t | TEST 1: get OCSP responder (good case) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 1: get OCSP responder (good case) - pattern "OCSP url found: http://127.0.0.1:8888/ocsp?foo=1," should match a line in error.log (req 0) | |
ocsp.t | TEST 1: get OCSP responder (good case) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 1: get OCSP responder (good case) - pattern "OCSP url found: http://127.0.0.1:8888/ocsp?foo=1," should match a line in error.log (req 1) | |
ocsp.t | TEST 16: good status req from client - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 16: good status req from client - pattern "ocsp status resp set ok: nil," should match a line in error.log (req 0) | |
ocsp.t | TEST 16: good status req from client - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 16: good status req from client - pattern "ocsp status resp set ok: nil," should match a line in error.log (req 1) | |
ocsp.t | TEST 7: create OCSP request (buffer too small) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 7: create OCSP request (buffer too small) - pattern "failed to create OCSP request: output buffer too small: 68 > 67" should match a line in error.log (req 0) | |
ocsp.t | TEST 7: create OCSP request (buffer too small) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 7: create OCSP request (buffer too small) - pattern "failed to create OCSP request: output buffer too small: 68 > 67" should match a line in error.log (req 1) | |
ocsp.t | TEST 11: fail to validate OCSP response - no issuer cert - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 11: fail to validate OCSP response - no issuer cert - pattern "failed to validate OCSP response: no issuer certificate in chain" should match a line in error.log (req 0) | |
ocsp.t | TEST 11: fail to validate OCSP response - no issuer cert - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 11: fail to validate OCSP response - no issuer cert - pattern "failed to validate OCSP response: no issuer certificate in chain" should match a line in error.log (req 1) | |
ocsp.t | TEST 8: create OCSP request (empty string cert chain) - pattern "failed to create OCSP request: d2i_X509_bio() failed" should match a line in error.log (req 0) | |
ocsp.t | TEST 8: create OCSP request (empty string cert chain) - pattern "failed to create OCSP request: d2i_X509_bio() failed" should match a line in error.log (req 1) | |
ocsp.t | TEST 17: no status req from client - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 17: no status req from client - pattern "ocsp status resp set ok: no status req," should match a line in error.log (req 0) | |
ocsp.t | TEST 17: no status req from client - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 17: no status req from client - pattern "ocsp status resp set ok: no status req," should match a line in error.log (req 1) | |
ocsp.t | TEST 3: get OCSP responder (no issuer cert at all) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 3: get OCSP responder (no issuer cert at all) - pattern "failed to get OCSP responder: no issuer certificate in chain" should match a line in error.log (req 0) | |
ocsp.t | TEST 3: get OCSP responder (no issuer cert at all) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed ' |
ocsp.t | TEST 3: get OCSP responder (no issuer cert at all) - pattern "failed to get OCSP responder: no issuer certificate in chain" should match a line in error.log (req 1) | |
re-opt.t | TEST 1: default jit_stack_size too small - response_body - response is expected (repeated req 0, req 0) |
got: 'from: 1 to: 1563 ' expected: 'error: pcre_exec() failed: -27 ' |
re-opt.t | TEST 1: default jit_stack_size too small - response_body - response is expected (repeated req 1, req 0) |
got: 'from: 1 to: 1563 ' expected: 'error: pcre_exec() failed: -27 ' |
ssl-session-fetch.t | TEST 2: attempt to fetch new session in lua_ctx during resumption. - response_body - response is expected (repeated req 0, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-fetch.t | TEST 2: attempt to fetch new session in lua_ctx during resumption. - response_body - response is expected (repeated req 1, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-fetch.t | TEST 2: attempt to fetch new session in lua_ctx during resumption. - grep_error_log_out (req 1) |
got: '' expected: 'get session error: bad session in lua context ' |
ssl-session-fetch.t | TEST 1: get resume session id serialized - response_body - response is expected (repeated req 0, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-fetch.t | TEST 1: get resume session id serialized - response_body - response is expected (repeated req 1, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-fetch.t | TEST 1: get resume session id serialized - grep_error_log_out (req 1) |
'' doesn't match '(?^s:ssl_session_fetch_by_lua_block:4: session id: [a-fA-f\d]+)' |
ssl-session-fetch.t | TEST 3: store new session, and resume it - response_body - response is expected (repeated req 0, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-fetch.t | TEST 3: store new session, and resume it - grep_error_log_out (req 0) |
'' doesn't match '(?^s:ssl_session_store_by_lua_block:5: session id: [a-fA-F\d]+)' |
ssl-session-fetch.t | TEST 3: store new session, and resume it - response_body - response is expected (repeated req 1, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-fetch.t | TEST 3: store new session, and resume it - grep_error_log_out (req 1) |
'' doesn't match '(?^s:ssl_session_fetch_by_lua_block:4: session id: [a-fA-F\d]+)' |
ssl-session-fetch.t | TEST 4: attempt to resume a corrupted session - response_body - response is expected (repeated req 0, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-fetch.t | TEST 4: attempt to resume a corrupted session - grep_error_log_out (req 0) |
'' doesn't match '(?^s:^ssl_session_store_by_lua_block:5: session id: [a-fA-F\d]+$)' |
ssl-session-fetch.t | TEST 4: attempt to resume a corrupted session - response_body - response is expected (repeated req 1, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-fetch.t | TEST 4: attempt to resume a corrupted session - grep_error_log_out (req 1) |
'' doesn't match '(?^s:^ssl_session_fetch_by_lua_block:4: session id: [a-fA-F\d]+ failed to resume session: failed to de-serialize session ssl_session_store_by_lua_block:5: session id: [a-fA-F\d]+ $)' |
ssl-session-store.t | TEST 3: store the session via timer to memcached - response_body - response is expected (repeated req 0, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-store.t | TEST 3: store the session via timer to memcached - pattern "(?^s:ssl_session_store_by_lua_block:32: session id: [a-fA-f\d]+)" should match a line in error.log (req 0) | |
ssl-session-store.t | TEST 3: store the session via timer to memcached - pattern "(?^s:ssl_session_store_by_lua_block:34: session size: \d+)" should match a line in error.log (req 0) | |
ssl-session-store.t | TEST 3: store the session via timer to memcached - pattern "(?^s:received memc reply: STORED)" should match a line in error.log (req 0) | |
ssl-session-store.t | TEST 3: store the session via timer to memcached - response_body - response is expected (repeated req 1, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-store.t | TEST 3: store the session via timer to memcached - pattern "(?^s:ssl_session_store_by_lua_block:32: session id: [a-fA-f\d]+)" should match a line in error.log (req 1) | |
ssl-session-store.t | TEST 3: store the session via timer to memcached - pattern "(?^s:ssl_session_store_by_lua_block:34: session size: \d+)" should match a line in error.log (req 1) | |
ssl-session-store.t | TEST 3: store the session via timer to memcached - pattern "(?^s:received memc reply: STORED)" should match a line in error.log (req 1) | |
ssl-session-store.t | TEST 2: get new session id serialized - response_body - response is expected (repeated req 0, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-store.t | TEST 2: get new session id serialized - pattern "(?^s:ssl_session_store_by_lua_block:4: session id: [a-fA-f\d]+)" should match a line in error.log (req 0) | |
ssl-session-store.t | TEST 2: get new session id serialized - response_body - response is expected (repeated req 1, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-store.t | TEST 2: get new session id serialized - pattern "(?^s:ssl_session_store_by_lua_block:4: session id: [a-fA-f\d]+)" should match a line in error.log (req 1) | |
ssl-session-store.t | TEST 1: get new session serialized - response_body - response is expected (repeated req 0, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-store.t | TEST 1: get new session serialized - pattern "(?^s:ssl_session_store_by_lua_block:4: session size: \d+)" should match a line in error.log (req 0) | |
ssl-session-store.t | TEST 1: get new session serialized - response_body - response is expected (repeated req 1, req 0) |
@@ -1,3 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -close: 1 nil ' |
ssl-session-store.t | TEST 1: get new session serialized - pattern "(?^s:ssl_session_store_by_lua_block:4: session size: \d+)" should match a line in error.log (req 1) | |
ssl.t | TEST 11: tls version - TLSv1 - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 11: tls version - TLSv1 - pattern "got TLS1 version: TLSv1," should match a line in error.log (req 0) | |
ssl.t | TEST 11: tls version - TLSv1 - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 11: tls version - TLSv1 - pattern "got TLS1 version: TLSv1," should match a line in error.log (req 1) | |
ssl.t | TEST 12: tls version - TLSv1.1 - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 12: tls version - TLSv1.1 - pattern "got TLS1 version: TLSv1.1," should match a line in error.log (req 0) | |
ssl.t | TEST 12: tls version - TLSv1.1 - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 12: tls version - TLSv1.1 - pattern "got TLS1 version: TLSv1.1," should match a line in error.log (req 1) | |
ssl.t | TEST 19: parse PEM cert and key to cdata (bad priv key) - pattern "(?^:\[error\] .*? failed to parse pem key: PEM_read_bio_PrivateKey\(\) failed)" should match a line in error.log (req 0) | |
ssl.t | TEST 19: parse PEM cert and key to cdata (bad priv key) - pattern "[crit]" should not match any line in error.log but matches line "2017/09/23 22:52:06 [crit] 5207\#0: *1 SSL_do_handshake() failed (SSL: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html), client: 127.0.0.1, server: localhost, request: \"GET /t HTTP/1.1\", host: \"localhost\"" (req 0) | |
ssl.t | TEST 19: parse PEM cert and key to cdata (bad priv key) - pattern "(?^:\[error\] .*? failed to parse pem key: PEM_read_bio_PrivateKey\(\) failed)" should match a line in error.log (req 1) | |
ssl.t | TEST 19: parse PEM cert and key to cdata (bad priv key) - pattern "[crit]" should not match any line in error.log but matches line "2017/09/23 22:52:06 [crit] 5207\#0: *4 SSL_do_handshake() failed (SSL: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html), client: 127.0.0.1, server: localhost, request: \"GET /t HTTP/1.1\", host: \"localhost\"" (req 1) | |
ssl.t | TEST 14: ngx.semaphore in ssl_certificate_by_lua* - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 14: ngx.semaphore in ssl_certificate_by_lua* - grep_error_log_out (req 0) |
@@ -1,4 +0,0 @@ -http lua semaphore new -http lua semaphore wait -http lua semaphore wait yielding -http lua semaphore post ' |
ssl.t | TEST 14: ngx.semaphore in ssl_certificate_by_lua* - pattern "ssl cert by lua done" should match a line in error.log (req 0) | |
ssl.t | TEST 14: ngx.semaphore in ssl_certificate_by_lua* - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 14: ngx.semaphore in ssl_certificate_by_lua* - grep_error_log_out (req 1) |
@@ -1,4 +0,0 @@ -http lua semaphore new -http lua semaphore wait -http lua semaphore wait yielding -http lua semaphore post ' |
ssl.t | TEST 14: ngx.semaphore in ssl_certificate_by_lua* - pattern "ssl cert by lua done" should match a line in error.log (req 1) | |
ssl.t | TEST 16: parse PEM cert and key to cdata - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 16: parse PEM cert and key to cdata - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 6: read raw server addr via ssl.raw_server_addr() (IPv4) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 6: read raw server addr via ssl.raw_server_addr() (IPv4) - pattern "Using IPv4 address: 127.0.0.1" should match a line in error.log (req 0) | |
ssl.t | TEST 6: read raw server addr via ssl.raw_server_addr() (IPv4) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 6: read raw server addr via ssl.raw_server_addr() (IPv4) - pattern "Using IPv4 address: 127.0.0.1" should match a line in error.log (req 1) | |
ssl.t | TEST 13: tls version - TLSv1.2 - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 13: tls version - TLSv1.2 - pattern "got TLS1 version: TLSv1.2," should match a line in error.log (req 0) | |
ssl.t | TEST 13: tls version - TLSv1.2 - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 13: tls version - TLSv1.2 - pattern "got TLS1 version: TLSv1.2," should match a line in error.log (req 1) | |
ssl.t | TEST 5: read raw server addr via ssl.raw_server_addr() (unix domain socket) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 5: read raw server addr via ssl.raw_server_addr() (unix domain socket) - pattern "(?^:Using unix socket file .*?nginx\.sock)" should match a line in error.log (req 0) | |
ssl.t | TEST 5: read raw server addr via ssl.raw_server_addr() (unix domain socket) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 5: read raw server addr via ssl.raw_server_addr() (unix domain socket) - pattern "(?^:Using unix socket file .*?nginx\.sock)" should match a line in error.log (req 1) | |
ssl.t | TEST 4: read SNI name via ssl.server_name() when no SNI name specified - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 4: read SNI name via ssl.server_name() when no SNI name specified - pattern "read SNI name from Lua: nil, type: nil" should match a line in error.log (req 0) | |
ssl.t | TEST 4: read SNI name via ssl.server_name() when no SNI name specified - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 4: read SNI name via ssl.server_name() when no SNI name specified - pattern "read SNI name from Lua: nil, type: nil" should match a line in error.log (req 1) | |
ssl.t | TEST 15: read PEM key chain but set DER key chain - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 15: read PEM key chain but set DER key chain - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 2: set DER cert and private key - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 2: set DER cert and private key - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 8: set DER cert chain - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 8: set DER cert chain - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 3: read SNI name via ssl.server_name() - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 3: read SNI name via ssl.server_name() - pattern "read SNI name from Lua: test.com" should match a line in error.log (req 0) | |
ssl.t | TEST 3: read SNI name via ssl.server_name() - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 3: read SNI name via ssl.server_name() - pattern "read SNI name from Lua: test.com" should match a line in error.log (req 1) | |
ssl.t | TEST 17: parse PEM cert and key to cdata (bad cert 0 in the chain) - pattern "(?^:\[error\] .*? failed to parse pem cert: PEM_read_bio_X509_AUX\(\) failed)" should match a line in error.log (req 0) | |
ssl.t | TEST 17: parse PEM cert and key to cdata (bad cert 0 in the chain) - pattern "[crit]" should not match any line in error.log but matches line "2017/09/23 22:52:09 [crit] 5328\#0: *1 SSL_do_handshake() failed (SSL: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html), client: 127.0.0.1, server: localhost, request: \"GET /t HTTP/1.1\", host: \"localhost\"" (req 0) | |
ssl.t | TEST 17: parse PEM cert and key to cdata (bad cert 0 in the chain) - pattern "(?^:\[error\] .*? failed to parse pem cert: PEM_read_bio_X509_AUX\(\) failed)" should match a line in error.log (req 1) | |
ssl.t | TEST 17: parse PEM cert and key to cdata (bad cert 0 in the chain) - pattern "[crit]" should not match any line in error.log but matches line "2017/09/23 22:52:09 [crit] 5328\#0: *4 SSL_do_handshake() failed (SSL: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html), client: 127.0.0.1, server: localhost, request: \"GET /t HTTP/1.1\", host: \"localhost\"" (req 1) | |
ssl.t | TEST 1: clear certs - pattern "sslv3 alert handshake failure" should match a line in error.log (req 0) | |
ssl.t | TEST 1: clear certs - pattern "sslv3 alert handshake failure" should match a line in error.log (req 1) | |
ssl.t | TEST 10: tls version - SSLv3 - response_body - response is expected (repeated req 0, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 10: tls version - SSLv3 - pattern "got TLS1 version: SSLv3," should match a line in error.log (req 0) | |
ssl.t | TEST 10: tls version - SSLv3 - response_body - response is expected (repeated req 1, req 0) |
@@ -1,2 +1,2 @@ connected: 1 -ssl handshake: boolean +failed to do SSL handshake: handshake failed ' |
ssl.t | TEST 10: tls version - SSLv3 - pattern "got TLS1 version: SSLv3," should match a line in error.log (req 1) | |
ssl.t | TEST 9: read PEM cert chain but set DER cert chain - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 9: read PEM cert chain but set DER cert chain - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 18: parse PEM cert and key to cdata (bad cert 2 in the chain) - pattern "(?^:\[error\] .*? failed to parse pem cert: PEM_read_bio_X509\(\) failed)" should match a line in error.log (req 0) | |
ssl.t | TEST 18: parse PEM cert and key to cdata (bad cert 2 in the chain) - pattern "[crit]" should not match any line in error.log but matches line "2017/09/23 22:52:09 [crit] 5372\#0: *1 SSL_do_handshake() failed (SSL: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html), client: 127.0.0.1, server: localhost, request: \"GET /t HTTP/1.1\", host: \"localhost\"" (req 0) | |
ssl.t | TEST 18: parse PEM cert and key to cdata (bad cert 2 in the chain) - pattern "(?^:\[error\] .*? failed to parse pem cert: PEM_read_bio_X509\(\) failed)" should match a line in error.log (req 1) | |
ssl.t | TEST 18: parse PEM cert and key to cdata (bad cert 2 in the chain) - pattern "[crit]" should not match any line in error.log but matches line "2017/09/23 22:52:09 [crit] 5372\#0: *4 SSL_do_handshake() failed (SSL: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html), client: 127.0.0.1, server: localhost, request: \"GET /t HTTP/1.1\", host: \"localhost\"" (req 1) | |
ssl.t | TEST 7: read raw server addr via ssl.raw_server_addr() (IPv6) - response_body - response is expected (repeated req 0, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 7: read raw server addr via ssl.raw_server_addr() (IPv6) - pattern "Using IPv6 address: 0.0.0.1" should match a line in error.log (req 0) | |
ssl.t | TEST 7: read raw server addr via ssl.raw_server_addr() (IPv6) - response_body - response is expected (repeated req 1, req 0) |
@@ -1,11 +1,2 @@ connected: 1 -ssl handshake: userdata +failed to do SSL handshake: handshake failed -sent http request: 56 bytes. -received: HTTP/1.1 201 Created -received: Server: nginx -received: Content-Type: text/plain -received: Content-Length: 4 -received: Connection: close -received: -received: foo -close: 1 nil ' |
ssl.t | TEST 7: read raw server addr via ssl.raw_server_addr() (IPv6) - pattern "Using IPv6 address: 0.0.0.1" should match a line in error.log (req 1) |
Go back to the index page.