08-ssl-connect-identity.py 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
  1. #!/usr/bin/env python3
  2. # Client connects with a certificate to a server that has use_identity_as_username=true. Shouldn't be rejected.
  3. from mosq_test_helper import *
  4. if sys.version < '2.7':
  5. print("WARNING: SSL not supported on Python 2.6")
  6. exit(0)
  7. def write_config(filename, port1, port2):
  8. with open(filename, 'w') as f:
  9. f.write("port %d\n" % (port2))
  10. f.write("\n")
  11. f.write("listener %d\n" %(port1))
  12. f.write("cafile ../ssl/all-ca.crt\n")
  13. f.write("certfile ../ssl/server.crt\n")
  14. f.write("keyfile ../ssl/server.key\n")
  15. f.write("\n")
  16. f.write("use_identity_as_username true\n")
  17. f.write("require_certificate true\n")
  18. (port1, port2) = mosq_test.get_port(2)
  19. conf_file = os.path.basename(__file__).replace('.py', '.conf')
  20. write_config(conf_file, port1, port2)
  21. rc = 1
  22. keepalive = 10
  23. connect_packet = mosq_test.gen_connect("connect-identity-test", keepalive=keepalive)
  24. connack_packet = mosq_test.gen_connack(rc=0)
  25. broker = mosq_test.start_broker(filename=os.path.basename(__file__), port=port2, use_conf=True)
  26. try:
  27. sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  28. ssock = ssl.wrap_socket(sock, ca_certs="../ssl/test-root-ca.crt", certfile="../ssl/client.crt", keyfile="../ssl/client.key", cert_reqs=ssl.CERT_REQUIRED)
  29. ssock.settimeout(20)
  30. ssock.connect(("localhost", port1))
  31. mosq_test.do_send_receive(ssock, connect_packet, connack_packet, "connack")
  32. rc = 0
  33. ssock.close()
  34. except mosq_test.TestError:
  35. pass
  36. finally:
  37. os.remove(conf_file)
  38. time.sleep(0.5)
  39. broker.terminate()
  40. broker.wait()
  41. (stdo, stde) = broker.communicate()
  42. if rc:
  43. print(stde.decode('utf-8'))
  44. exit(rc)