08-ssl-connect-cert-auth-expired.py 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
  1. #!/usr/bin/env python3
  2. # Test whether a valid CONNECT results in the correct CONNACK packet using an
  3. # SSL connection with client certificates required.
  4. from mosq_test_helper import *
  5. if sys.version < '2.7':
  6. print("WARNING: SSL not supported on Python 2.6")
  7. exit(0)
  8. def write_config(filename, port1, port2):
  9. with open(filename, 'w') as f:
  10. f.write("port %d\n" % (port2))
  11. f.write("\n")
  12. f.write("listener %d\n" % (port1))
  13. f.write("cafile ../ssl/all-ca.crt\n")
  14. f.write("certfile ../ssl/server.crt\n")
  15. f.write("keyfile ../ssl/server.key\n")
  16. f.write("require_certificate true\n")
  17. (port1, port2) = mosq_test.get_port(2)
  18. conf_file = os.path.basename(__file__).replace('.py', '.conf')
  19. write_config(conf_file, port1, port2)
  20. rc = 1
  21. keepalive = 10
  22. connect_packet = mosq_test.gen_connect("connect-success-test", keepalive=keepalive)
  23. broker = mosq_test.start_broker(filename=os.path.basename(__file__), port=port2, use_conf=True)
  24. try:
  25. sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  26. ssock = ssl.wrap_socket(sock, ca_certs="../ssl/test-root-ca.crt", certfile="../ssl/client-expired.crt", keyfile="../ssl/client-expired.key", cert_reqs=ssl.CERT_REQUIRED)
  27. ssock.settimeout(20)
  28. try:
  29. ssock.connect(("localhost", port1))
  30. mosq_test.do_send_receive(ssock, connect_packet, "", "connack")
  31. except ssl.SSLError as err:
  32. if err.errno == 1:
  33. rc = 0
  34. else:
  35. broker.terminate()
  36. raise ValueError(err.errno)
  37. except mosq_test.TestError:
  38. pass
  39. finally:
  40. os.remove(conf_file)
  41. time.sleep(0.5)
  42. broker.terminate()
  43. broker.wait()
  44. (stdo, stde) = broker.communicate()
  45. if rc:
  46. print(stde.decode('utf-8'))
  47. exit(rc)