varnishtest "Add server via cli with SSL activated" feature cmd "$HAPROXY_PROGRAM -cc 'version_atleast(2.5-dev0)'" feature cmd "$HAPROXY_PROGRAM -cc 'feature(OPENSSL)'" feature cmd "command -v socat" feature ignore_unknown_macro haproxy h1 -conf { global stats socket "${tmpdir}/h1/stats" level admin defaults mode http timeout connect "${HAPROXY_TEST_TIMEOUT-5s}" timeout client "${HAPROXY_TEST_TIMEOUT-5s}" timeout server "${HAPROXY_TEST_TIMEOUT-5s}" # proxy to attach a ssl server listen li-ssl bind "fd@${feSsl}" balance random # frontend used to respond to ssl connection frontend fe-ssl-term bind "fd@${feSslTerm}" ssl crt ${testdir}/common.pem http-request return status 200 } -start ### SSL SUPPORT # 1. first create a ca-file using CLI # 2. create an SSL server and use it client c1 -connect ${h1_feSsl_sock} { txreq rxresp expect resp.status == 503 } -run shell { echo "new ssl ca-file common.pem" | socat "${tmpdir}/h1/stats" - printf "set ssl ca-file common.pem <<\n$(cat ${testdir}/common.pem)\n\n" | socat "${tmpdir}/h1/stats" - echo "commit ssl ca-file common.pem" | socat "${tmpdir}/h1/stats" - } -run haproxy h1 -cli { send "show ssl ca-file common.pem" expect ~ ".*SHA1 FingerPrint: 9A6418E498C43EDBCF5DD3C4C6FCD1EE0D7A946D" } haproxy h1 -cli { # non existent backend send "experimental-mode on; add server li-ssl/s1 ${h1_feSslTerm_addr}:${h1_feSslTerm_port} ssl ca-file common.pem verify none" expect ~ "New server registered." send "enable server li-ssl/s1" expect ~ ".*" } client c2 -connect ${h1_feSsl_sock} { txreq rxresp expect resp.status == 200 } -run