summaryrefslogtreecommitdiffstats
path: root/test/modules/md/test_750_eab.py
diff options
context:
space:
mode:
authorStefan Eissing <icing@apache.org>2024-04-08 13:24:18 +0200
committerStefan Eissing <icing@apache.org>2024-04-08 13:24:18 +0200
commit8ffa19a1f7eb03b156e6bdbda65b3d2a2de9dfe8 (patch)
treed35722cd2abd68e42eaf9ddcc05cf05e8d57b703 /test/modules/md/test_750_eab.py
parentFix occasional pytest failures (diff)
downloadapache2-8ffa19a1f7eb03b156e6bdbda65b3d2a2de9dfe8.tar.xz
apache2-8ffa19a1f7eb03b156e6bdbda65b3d2a2de9dfe8.zip
mod_md: update to v2.4.26
- Using OCSP stapling information to trigger certificate renewals. Proposed by @frasertweedale. - Added directive `MDCheckInterval` to control how often the server checks for detected revocations. Added proposals for configurations in the README.md chapter "Revocations". - OCSP stapling: accept OCSP responses without a `nextUpdate` entry which is allowed in RFC 6960. Treat those as having an update interval of 12 hours. Added by @frasertweedale. - Adapt OpenSSL usage to changes in their API. By Yann Ylavic. Test Updates - workarounds for using Pebble v2.5 - disable EAB tests for Pebble since v2.5 no longer supports HS256 FWT for EAB keys - some stability improvemnets in error/warning checks git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1916861 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to '')
-rw-r--r--test/modules/md/test_750_eab.py21
1 files changed, 15 insertions, 6 deletions
diff --git a/test/modules/md/test_750_eab.py b/test/modules/md/test_750_eab.py
index 7d81917829..aec7e89b8c 100644
--- a/test/modules/md/test_750_eab.py
+++ b/test/modules/md/test_750_eab.py
@@ -82,14 +82,17 @@ class TestEab:
assert env.apache_restart() == 0
md = env.await_error(domain)
assert md['renewal']['errors'] > 0
- assert md['renewal']['last']['problem'] == 'urn:ietf:params:acme:error:unauthorized'
+ assert md['renewal']['last']['problem'] in [
+ 'urn:ietf:params:acme:error:unauthorized',
+ 'urn:ietf:params:acme:error:malformed',
+ ]
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10056" # the field 'kid' references a key that is not known to the ACME server
],
matches = [
- r'.*urn:ietf:params:acme:error:unauthorized.*'
+ r'.*urn:ietf:params:acme:error:(unauthorized|malformed).*'
]
)
@@ -105,14 +108,17 @@ class TestEab:
assert env.apache_restart() == 0
md = env.await_error(domain)
assert md['renewal']['errors'] > 0
- assert md['renewal']['last']['problem'] == 'urn:ietf:params:acme:error:unauthorized'
+ assert md['renewal']['last']['problem'] in [
+ 'urn:ietf:params:acme:error:unauthorized',
+ 'urn:ietf:params:acme:error:malformed',
+ ]
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10056" # the field 'kid' references a key that is not known to the ACME server
],
matches = [
- r'.*urn:ietf:params:acme:error:unauthorized.*'
+ r'.*urn:ietf:params:acme:error:(unauthorized|malformed).*'
]
)
@@ -128,14 +134,17 @@ class TestEab:
assert env.apache_restart() == 0
md = env.await_error(domain)
assert md['renewal']['errors'] > 0
- assert md['renewal']['last']['problem'] == 'urn:ietf:params:acme:error:unauthorized'
+ assert md['renewal']['last']['problem'] in [
+ 'urn:ietf:params:acme:error:unauthorized',
+ 'urn:ietf:params:acme:error:malformed',
+ ]
#
env.httpd_error_log.ignore_recent(
lognos = [
"AH10056" # external account binding JWS verification error: square/go-jose: error in cryptographic primitive
],
matches = [
- r'.*urn:ietf:params:acme:error:unauthorized.*'
+ r'.*urn:ietf:params:acme:error:(unauthorized|malformed).*'
]
)