Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | testing: Configure logging via syslog in strongswan.conf | Tobias Brunner | 2017-11-15 | 1 | -2/+0 |
| | | | | | Globally configure logging in strongswan.conf.testing and replace all charondebug statements with strongswan.conf settings. | ||||
* | testing: Disable logging via journal in charon-systemd | Tobias Brunner | 2017-11-15 | 1 | -0/+3 |
| | | | | | This avoids duplicate log messages as we already log via syslog to get daemon.log. | ||||
* | testing: Globally define logging via syslog for charon-systemd | Tobias Brunner | 2017-11-15 | 1 | -0/+9 |
| | | | | | | | We could make the same change for charon (actually setting it for charon in strongswan.conf.testing would work for charon-systemd too), however, there are dozens of test cases that currently set charondebug in ipsec.conf. | ||||
* | testing: Move collector.db in tnc/tnccs-20-ev-pt-tls scenario to /etc/db.d | Tobias Brunner | 2017-08-07 | 9 | -41/+1 |
| | | | | | Also move initialization to the pretest script (it's way faster in the in-memory database). | ||||
* | testing: Added tnc/tnccs-20-ev-pt-tls scenario | Andreas Steffen | 2017-08-04 | 9 | -21/+37 |
| | |||||
* | testing: Add wrapper around service command | Tobias Brunner | 2017-05-26 | 1 | -0/+22 |
| | | | | | | | | When charon is started via service command LEAK_DETECTIVE_LOG is not set because the command strips the environment. Since we only want the variable to be set during the automated test runs we can't just set it in /etc/default/charon. Instead, we do so in this wrapper when charon is started and remove the variable again when it is stopped. | ||||
* | Fixed some typos, courtesy of codespell | Tobias Brunner | 2017-05-26 | 1 | -1/+1 |
| | |||||
* | testing: Avoid expiration of allocated SPIs due to low retransmission settings | Tobias Brunner | 2017-05-23 | 1 | -1/+6 |
| | |||||
* | testing: Updated OCSP certificate for carol | Andreas Steffen | 2017-03-21 | 5 | -4/+32 |
| | |||||
* | testing: strongTNC does not come with django.db any more | Andreas Steffen | 2016-12-17 | 1 | -0/+15 |
| | |||||
* | Added swanctl/net2net-ed2559 scenario and needed Ed25519 certificates | Andreas Steffen | 2016-12-14 | 13 | -1/+82 |
| | |||||
* | testing: Renewed expired certificates | Andreas Steffen | 2016-10-18 | 7 | -8/+89 |
| | |||||
* | Save both base and delta CRLs to disk | Andreas Steffen | 2016-10-11 | 1 | -0/+6 |
| | |||||
* | testing: Added swanctl/net2net-sha3-rsa-cert and swanctl/rw-eap-tls-sha3-rsa ↵ | Andreas Steffen | 2016-09-22 | 11 | -0/+336 |
| | | | | scenarios | ||||
* | gmp: Support of SHA-3 RSA signatures | Andreas Steffen | 2016-09-22 | 1 | -0/+5 |
| | |||||
* | testing: Log leaks and fail tests if any are detected | Tobias Brunner | 2016-09-20 | 1 | -0/+1 |
| | |||||
* | testing: Serve images in testresults via mod_rewrite and not a symlink | Tobias Brunner | 2016-08-29 | 1 | -0/+3 |
| | |||||
* | Revert "testing: Only load selected plugins in swanctl" | Tobias Brunner | 2016-07-01 | 1 | -4/+0 |
| | | | | | | | This reverts commit dee01d019ba9743b2784b417155601d10c173a66. Thanks to 505c31870162 ("leak-detective: Try to properly free allocations after deinitialization") this is not required anymore. | ||||
* | testing: Only load selected plugins in swanctl | Tobias Brunner | 2016-06-20 | 1 | -0/+4 |
| | | | | | | | | | The main issue is that the ldap and curl plugins, or rather the libraries they use, initialize GnuTLS (curl, strangely, even when it is, by its own account, linked against OpenSSL). Some of these allocations are only freed once the libraries are unloaded. This means that the leak detective causes invalid frees when swanctl is terminated and libraries are unloaded after the leak detective is already deinitialized. | ||||
* | testing: Fix expect-connection for tkm tests | Tobias Brunner | 2016-06-16 | 1 | -1/+1 |
| | | | | We don't use swanctl there but there is no load statement either. | ||||
* | testing: Add root to fstab | Tobias Brunner | 2016-06-15 | 1 | -0/+1 |
| | | | | This seems to be required for systemd to remount it. | ||||
* | testing: Update Apache config for newer Debian releases | Tobias Brunner | 2016-06-15 | 4 | -10/+38 |
| | | | | | | It is still compatible with the current release as the config in sites-available will be ignored, while conf-enabled does not exist and is not included in the main config. | ||||
* | testing: Explicitly enable RC4 in SSH server config | Tobias Brunner | 2016-06-15 | 1 | -0/+1 |
| | | | | | | Newer OpenSSH versions disable this by default because it's unsafe. Since this is not relevant for our use case we enable it due to its speed. | ||||
* | testing: Disable leak detective when generating CRLs | Tobias Brunner | 2016-04-06 | 1 | -0/+4 |
| | | | | | | | | | GnuTLS, which can get loaded by the curl plugin, does not properly cleanup some allocated memory when deinitializing. This causes invalid frees if leak detective is active. Other invalid frees are related to time conversions (tzset). References #1382. | ||||
* | testing: Generate a CRL that has moon's actual certificate revoked | Tobias Brunner | 2016-03-10 | 1 | -0/+3 |
| | |||||
* | testing: Change sql scenarios to swanctl | Andreas Steffen | 2016-01-03 | 7 | -14/+14 |
| | |||||
* | testing: The expect-connection helper may use swanctl to check for connections | Tobias Brunner | 2015-12-11 | 1 | -1/+7 |
| | | | | | | Depending on the plugin configuration in the test scenario either `ipsec statusall` or `swanctl --list-conns` is used to check for a named connection. | ||||
* | testing: Updated expired mars.strongswan.org certificate | Andreas Steffen | 2015-11-26 | 5 | -4/+31 |
| | |||||
* | testing: Only send two retransmits after 1 second each to fail negative ↵ | Tobias Brunner | 2015-11-09 | 1 | -0/+6 |
| | | | | tests earlier | ||||
* | testing: Add a base strongswan.conf file used by all hosts in all scenarios | Tobias Brunner | 2015-11-09 | 1 | -0/+1 |
| | | | | | | We will use this to set some defaults (e.g. timeouts to make testing negative tests quicker). We don't want these settings to show up in the configs of the actual scenarios though. | ||||
* | testing: BLISS CA uses SHA-3 in its CRL | Andreas Steffen | 2015-11-03 | 1 | -1/+1 |
| | |||||
* | testing: Update AAA certificate on Freeradius as well | Andreas Steffen | 2015-08-05 | 2 | -42/+42 |
| | |||||
* | testing: Updated expired AAA server certificate | Andreas Steffen | 2015-08-04 | 5 | -4/+31 |
| | |||||
* | testing: Regenerated BLISS certificates due to oracle changes | Andreas Steffen | 2015-07-27 | 1 | -0/+0 |
| | |||||
* | testing: Updated loop ca certificates | Andreas Steffen | 2015-07-22 | 10 | -8/+60 |
| | |||||
* | testing: Updated carol's certificate from research CA and dave's certificate ↵5.3.1dr1 | Andreas Steffen | 2015-04-26 | 10 | -8/+61 |
| | | | | from sales CA | ||||
* | Implemented improved BLISS-B signature algorithm | Andreas Steffen | 2015-02-25 | 1 | -0/+0 |
| | |||||
* | Updated RFC3779 certificates5.2.2 | Andreas Steffen | 2014-12-28 | 18 | -10/+141 |
| | |||||
* | Updated BLISS scenario keys and certificates to new format | Andreas Steffen | 2014-12-12 | 2 | -0/+0 |
| | |||||
* | Renewed expired certificates | Andreas Steffen | 2014-11-29 | 16 | -110/+162 |
| | |||||
* | Created ikev2/rw-ntru-bliss scenario | Andreas Steffen | 2014-11-29 | 3 | -1/+3 |
| | |||||
* | testing: Enable virtio console for guests | Tobias Brunner | 2014-10-10 | 1 | -0/+71 |
| | | | | | | | | | | | This allows accessing the guests with `virsh console <name>`. Using a serial console would also be possible but our kernel configs have no serial drivers enabled, CONFIG_VIRTIO_CONSOLE is enabled though. So to avoid having to recompile the kernels let's do it this way, only requires rebuilding the guest images. References #729. | ||||
* | testing: Updated swanctl certificates and keys | Tobias Brunner | 2014-10-03 | 14 | -292/+292 |
| | |||||
* | testing: Update public keys and certificates in DNS zone | Tobias Brunner | 2014-10-03 | 1 | -64/+60 |
| | |||||
* | Generated new test certificates | Andreas Steffen | 2014-08-28 | 74 | -309/+500 |
| | |||||
* | Define default swanctl credentials in hosts directory | Andreas Steffen | 2014-06-10 | 21 | -0/+517 |
| | |||||
* | First swanctl scenario5.2.0dr5 | Andreas Steffen | 2014-06-01 | 1 | -0/+156 |
| | |||||
* | Test SWID REST API ins tnc/tnccs-20-pdp scenarios | Andreas Steffen | 2014-05-31 | 1 | -1/+1 |
| | |||||
* | Renewed expired user certificate | Andreas Steffen | 2014-04-15 | 5 | -7/+33 |
| | |||||
* | Renewed self-signed OCSP signer certificate | Andreas Steffen | 2014-03-27 | 2 | -15/+17 |
| |