REGTESTS: set_ssl_server_cert.vtc: check the sha1 from the server

Check the sha1 from the server side with the sample ssl_c_sha1 sample
fetch in order to evict a possible problem with "show/set ssl cert".
This commit is contained in:
William Lallemand 2021-01-28 16:00:22 +01:00
parent 7e69637ac5
commit 7b79424c05
1 changed files with 4 additions and 0 deletions

View File

@ -48,6 +48,7 @@ haproxy h1 -conf {
http-response add-header X-SSL Ok if cert_ok
http-response add-header X-SSL Expired if cert_expired
http-response add-header X-SSL Revoked if cert_revoked
http-response add-header x-ssl-sha1 %[ssl_c_sha1,hex]
server s1 ${s1_addr}:${s1_port}
} -start
@ -56,6 +57,7 @@ client c1 -connect ${h1_clearlst_sock} {
txreq
rxresp
expect resp.status == 200
expect resp.http.x-ssl-sha1 == "D9C3BAE37EA5A7EDB7B3C9BDD4DCB2FE58A412E4"
expect resp.http.x-ssl == "Ok"
} -run
@ -81,6 +83,7 @@ client c1 -connect ${h1_clearlst_sock} {
txreq
rxresp
expect resp.status == 200
expect resp.http.x-ssl-sha1 == "C625EB01A0A660294B9D7F44C5CEEE5AFC495BE4"
expect resp.http.x-ssl == "Expired"
} -run
@ -100,6 +103,7 @@ client c1 -connect ${h1_clearlst_sock} {
txreq
rxresp
expect resp.status == 200
expect resp.http.x-ssl-sha1 == "992386628A40C9D49C89BAC0058B5D45D8575151"
expect resp.http.x-ssl == "Revoked"
} -run