import testinfra.utils.ansible_runner testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner( '.molecule/ansible_inventory').get_hosts('parameters-optional') def test_nginx_tls_files(File, Sudo): """ Tests if TLS private key and certificate have been deployed correctly. """ with Sudo(): tls_file = File('/etc/ssl/private/parameters-optional_https.key') assert tls_file.is_file assert tls_file.user == 'root' assert tls_file.group == 'root' assert tls_file.mode == 0o640 assert tls_file.content == open("tests/data/x509/parameters-optional_https.key.pem", "r").read().rstrip() tls_file = File('/etc/ssl/certs/parameters-optional_https.pem') assert tls_file.is_file assert tls_file.user == 'root' assert tls_file.group == 'root' assert tls_file.mode == 0o644 assert tls_file.content == open("tests/data/x509/parameters-optional_https.cert.pem", "r").read().rstrip() def test_certificate_validity_check_configuration(File): """ Tests if certificate validity check configuration file has been deployed correctly. """ config = File('/etc/check_certificate/parameters-optional_https.conf') assert config.is_file assert config.user == 'root' assert config.group == 'root' assert config.mode == 0o644 assert config.content == "/etc/ssl/certs/parameters-optional_https.pem" def test_tls_configuration(Command): """ Tests if the TLS has been configured correctly and works. """ tls = Command('wget -q -O - https://parameters-optional/') assert tls.rc == 0 old_tls_versions_disabled = Command("echo 'Q' | openssl s_client -no_tls1_1 -no_tls1_2 -connect parameters-optional:443") assert old_tls_versions_disabled.rc != 0 assert "CONNECTED" in old_tls_versions_disabled.stdout newer_tls_versions_enabled = Command("echo 'Q' | openssl s_client -no_tls1_2 -connect parameters-optional:443") assert newer_tls_versions_enabled.rc == 0 assert "CONNECTED" in newer_tls_versions_enabled.stdout cipher = Command("echo 'Q' | openssl s_client -cipher ECDHE-RSA-AES128-SHA256 -connect parameters-optional:443") assert cipher.rc == 0 assert "ECDHE-RSA-AES128-SHA256" in cipher.stdout cipher = Command("echo 'Q' | openssl s_client -cipher ECDHE-RSA-AES128-SHA -connect parameters-optional:443") assert cipher.rc == 0 assert "ECDHE-RSA-AES128-SHA" in cipher.stdout def test_https_enforcement(Command): """ Tests if HTTPS is (not) being enforced. """ https_enforcement = Command('curl -I http://parameters-optional/') assert https_enforcement.rc == 0 assert 'HTTP/1.1 200 OK' in https_enforcement.stdout assert 'HTTP/1.1 301 Moved Permanently' not in https_enforcement.stdout assert 'Location: https://parameters-optional/' not in https_enforcement.stdout https_enforcement = Command('curl -I https://parameters-optional/') assert https_enforcement.rc == 0 assert 'Strict-Transport-Security' not in https_enforcement.stdout def test_default_vhost_index_page(Command): """ Tests content of default vhost index page. """ page = Command('curl https://parameters-optional/') assert page.rc == 0 assert "Optional Welcome" in page.stdout assert "

Optional Welcome

" in page.stdout assert "

Welcome to parameters-optional, default virtual host.

" in page.stdout