[PATCH 1 of 6] Tests: unbreak ssl_stapling.t after IO::Socket::SSL refactoring
Sergey Kandaurov
pluknet at nginx.com
Mon May 22 19:52:13 UTC 2023
# HG changeset patch
# User Sergey Kandaurov <pluknet at nginx.com>
# Date 1684773873 -14400
# Mon May 22 20:44:33 2023 +0400
# Node ID 231b14e2041afed10f5c2e6f62aad298854a6379
# Parent a797d7428fa529e843181d802dd85bc4306b89e9
Tests: unbreak ssl_stapling.t after IO::Socket::SSL refactoring.
Previously, the test used to check the established SSL/TLS protocol version
using Net::SSLeay on the client side. Now it is provided on the server side
within a server response. Added missing bits to make this actually work.
diff --git a/ssl_stapling.t b/ssl_stapling.t
--- a/ssl_stapling.t
+++ b/ssl_stapling.t
@@ -57,6 +57,8 @@ http {
ssl_ciphers DEFAULT:ECCdraft;
+ add_header X-SSL-Protocol $ssl_protocol always;
+
server {
listen 127.0.0.1:8443 ssl;
listen 127.0.0.1:8080;
@@ -341,7 +343,7 @@ sub staple {
}
sub test_tls13 {
- return http_get('/', start => 1, SSL => 1) =~ /TLSv1.3/;
+ return http_get('/', SSL => 1) =~ /TLSv1.3/;
}
###############################################################################
More information about the nginx-devel
mailing list