Files
@ 23a5f9ba293c
Branch filter:
Location: majic-ansible-roles/roles/web_server/molecule/default/tests/test_optional.py
23a5f9ba293c
3.3 KiB
text/x-python
MAR-158: Split-up the TLS tests for web_server role:
- Better separation for testing individual properties of TLS
configuration (whether it's enabled, what protocols are enabled, and
finally enabled ciphers).
- Better separation for testing individual properties of TLS
configuration (whether it's enabled, what protocols are enabled, and
finally enabled ciphers).
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | import os
import testinfra.utils.ansible_runner
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('parameters-optional')
def test_certificate_validity_check_configuration(host):
"""
Tests if certificate validity check configuration file has been deployed
correctly.
"""
hostname = host.run('hostname').stdout.strip()
config = host.file('/etc/check_certificate/%s_https.conf' % hostname)
assert config.is_file
assert config.user == 'root'
assert config.group == 'root'
assert config.mode == 0o644
assert config.content_string == "/etc/ssl/certs/%s_https.pem" % hostname
def test_tls_enabled(host):
"""
Tests if TLS has been enabled.
"""
tls = host.run('wget -q -O - https://parameters-optional/')
assert tls.rc == 0
def test_tls_version(host):
"""
Tests if only the configured TLS protocol versions are allowed by
the server.
"""
old_tls_versions_disabled = host.run("echo 'Q' | openssl s_client -no_tls1_1 -no_tls1_2 -connect parameters-optional:443")
tls1_1_enabled = host.run("echo 'Q' | openssl s_client -tls1_1 -connect parameters-optional:443")
tls1_2_enabled = host.run("echo 'Q' | openssl s_client -tls1_2 -connect parameters-optional:443")
# Avoid false negatives by ensuring the client had actually
# established the TCP connection.
assert "CONNECTED" in old_tls_versions_disabled.stdout
assert old_tls_versions_disabled.rc != 0
# Avoid false negatives by ensuring the client had actually
# established the TCP connection.
assert "CONNECTED" in tls1_1_enabled.stdout
assert tls1_1_enabled.rc == 0
# Avoid false negatives by ensuring the client had actually
# established the TCP connection.
assert "CONNECTED" in tls1_2_enabled.stdout
assert tls1_2_enabled.rc == 0
def test_tls_ciphers(host):
"""
Tests available TLS ciphers on the server.
"""
cipher = host.run("echo 'Q' | openssl s_client -cipher ECDHE-RSA-AES128-SHA256 -connect parameters-optional:443")
assert cipher.rc == 0
assert "ECDHE-RSA-AES128-SHA256" in cipher.stdout
cipher = host.run("echo 'Q' | openssl s_client -cipher ECDHE-RSA-AES128-SHA -connect parameters-optional:443")
assert cipher.rc == 0
assert "ECDHE-RSA-AES128-SHA" in cipher.stdout
def test_https_enforcement(host):
"""
Tests if HTTPS is (not) being enforced.
"""
https_enforcement = host.run('curl -I http://parameters-optional/')
assert https_enforcement.rc == 0
assert 'HTTP/1.1 200 OK' in https_enforcement.stdout
assert 'HTTP/1.1 301 Moved Permanently' not in https_enforcement.stdout
assert 'Location: https://parameters-optional/' not in https_enforcement.stdout
https_enforcement = host.run('curl -I https://parameters-optional/')
assert https_enforcement.rc == 0
assert 'Strict-Transport-Security' not in https_enforcement.stdout
def test_default_vhost_index_page(host):
"""
Tests content of default vhost index page.
"""
page = host.run('curl https://parameters-optional/')
assert page.rc == 0
assert "<title>Optional Welcome</title>" in page.stdout
assert "<h1>Optional Welcome</h1>" in page.stdout
assert "<p>Welcome to parameters-optional, default virtual host.</p>" in page.stdout
|