This is an automated email from the ASF dual-hosted git repository.
rrm pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/trafficserver.git
The following commit(s) were added to refs/heads/master by this push:
new 6fd0fc3 Renames ssl_server_name.yaml to sni.yaml
6fd0fc3 is described below
commit 6fd0fc39413cd6f527b01fb3369e78fd69e5c465
Author: Randall Meyer <[email protected]>
AuthorDate: Fri May 31 13:43:16 2019 -0700
Renames ssl_server_name.yaml to sni.yaml
---
configs/Makefile.am | 2 +-
...l_server_name.yaml.default => sni.yaml.default} | 2 +-
doc/admin-guide/files/index.en.rst | 4 ++--
doc/admin-guide/files/records.config.en.rst | 10 ++++-----
...ssl_server_name.yaml.en.rst => sni.yaml.en.rst} | 6 ++---
doc/admin-guide/layer-4-routing.en.rst | 4 ++--
iocore/net/SSLSNIConfig.cc | 8 +++----
mgmt/RecordsConfig.cc | 2 +-
mgmt/utils/MgmtUtils.h | 2 --
src/traffic_manager/AddConfigFilesHere.cc | 2 +-
.../min_cfg/{ssl_server_name.yaml => sni.yaml} | 0
.../gold_tests/autest-site/trafficserver.test.ext | 2 +-
tests/gold_tests/h2/h2disable.test.py | 2 +-
.../client_context_dump.test.py | 2 +-
.../pluginTest/sslheaders/sslheaders.test.py | 2 +-
tests/gold_tests/tls/tls_client_cert.test.py | 26 +++++++++++-----------
tests/gold_tests/tls/tls_client_cert2.test.py | 4 ++--
tests/gold_tests/tls/tls_client_verify.test.py | 2 +-
tests/gold_tests/tls/tls_client_verify2.test.py | 2 +-
tests/gold_tests/tls/tls_client_versions.test.py | 4 ++--
tests/gold_tests/tls/tls_forward_nonhttp.test.py | 4 ++--
.../gold_tests/tls/tls_hooks_client_verify.test.py | 2 +-
tests/gold_tests/tls/tls_hooks_verify.test.py | 4 ++--
tests/gold_tests/tls/tls_tunnel.test.py | 24 ++++++++++----------
tests/gold_tests/tls/tls_tunnel_forward.test.py | 4 ++--
.../tls/tls_tunnel_plugin_rename.test.py | 4 ++--
tests/gold_tests/tls/tls_verify.test.py | 2 +-
tests/gold_tests/tls/tls_verify2.test.py | 16 ++++++-------
tests/gold_tests/tls/tls_verify3.test.py | 2 +-
tests/gold_tests/tls/tls_verify_base.test.py | 2 +-
30 files changed, 75 insertions(+), 77 deletions(-)
diff --git a/configs/Makefile.am b/configs/Makefile.am
index 0e03312..ccd4983 100644
--- a/configs/Makefile.am
+++ b/configs/Makefile.am
@@ -37,7 +37,7 @@ dist_sysconf_DATA = \
socks.config.default \
splitdns.config.default \
ssl_multicert.config.default \
- ssl_server_name.yaml.default \
+ sni.yaml.default \
volume.config.default
install-exec-hook:
diff --git a/configs/ssl_server_name.yaml.default b/configs/sni.yaml.default
similarity index 97%
rename from configs/ssl_server_name.yaml.default
rename to configs/sni.yaml.default
index 60bb6ea..7431229 100644
--- a/configs/ssl_server_name.yaml.default
+++ b/configs/sni.yaml.default
@@ -1,4 +1,4 @@
-# ssl_server_name.config.default
+# sni.yaml
#
# This configuration file
# - sets the SSL actions to be performed based on the servername provided
during SSL handhshake phase (SNI extension)
diff --git a/doc/admin-guide/files/index.en.rst
b/doc/admin-guide/files/index.en.rst
index 65b9018..9d16bc3 100644
--- a/doc/admin-guide/files/index.en.rst
+++ b/doc/admin-guide/files/index.en.rst
@@ -35,7 +35,7 @@ Configuration Files
remap.config.en
splitdns.config.en
ssl_multicert.config.en
- ssl_server_name.yaml.en
+ sni.yaml.en
storage.config.en
volume.config.en
@@ -74,7 +74,7 @@ Configuration Files
Configures |TS| to use different server certificates for SSL termination
when listening on multiple addresses or when clients employ SNI.
-:doc:`ssl_server_name.yaml.en`
+:doc:`sni.yaml.en`
Configures SNI based Layer 4 routing.
:doc:`storage.config.en`
diff --git a/doc/admin-guide/files/records.config.en.rst
b/doc/admin-guide/files/records.config.en.rst
index 887addd..3fcb13a 100644
--- a/doc/admin-guide/files/records.config.en.rst
+++ b/doc/admin-guide/files/records.config.en.rst
@@ -3185,9 +3185,9 @@ SSL Termination
note that OpenSSL session tickets are sensitive to the version of the
ca-certificates. Once the
file is changed with new tickets, use :option:`traffic_ctl config reload`
to begin using them.
-.. ts:cv:: CONFIG proxy.config.ssl.servername.filename STRING
ssl_server_name.yaml
+.. ts:cv:: CONFIG proxy.config.ssl.servername.filename STRING sni.yaml
- The filename of the :file:`ssl_server_name.yaml` configuration file.
+ The filename of the :file:`sni.yaml` configuration file.
If relative, it is relative to the configuration directory.
.. ts:cv:: CONFIG proxy.config.ssl.max_record_size INT 0
@@ -3314,9 +3314,9 @@ Client-Related Configuration
Configures |TS| to verify the origin server certificate
with the Certificate Authority (CA). This configuration takes a value of
:code:`DISABLED`, :code:`PERMISSIVE`, or :code:`ENFORCED`
- You can override this global setting on a per domain basis in the
ssl_server_name.yaml file using the :ref:`verify_server_policy
attribute<override-verify-server-policy>`.
+ You can override this global setting on a per domain basis in the sni.yaml
file using the :ref:`verify_server_policy
attribute<override-verify-server-policy>`.
- You can also override via the conf_remap plugin. Those changes will take
precedence over the changes in ssl_server_name.yaml.
+ You can also override via the conf_remap plugin. Those changes will take
precedence over the changes in sni.yaml.
:code:`DISABLED`
Server Certificate will not be verified
@@ -3333,7 +3333,7 @@ Client-Related Configuration
You can override this global setting on a per domain basis in the
ssl_servername.yaml file using the :ref:`verify_server_properties
attribute<override-verify-server-properties>`.
- You can also override via the conf_remap plugin. Those changes will take
precedence over the changes in ssl_server_name.yaml.
+ You can also override via the conf_remap plugin. Those changes will take
precedence over the changes in sni.yaml.
:code:`NONE`
Check nothing in the standard callback. Rely entirely on plugins to check
the certificate.
diff --git a/doc/admin-guide/files/ssl_server_name.yaml.en.rst
b/doc/admin-guide/files/sni.yaml.en.rst
similarity index 98%
rename from doc/admin-guide/files/ssl_server_name.yaml.en.rst
rename to doc/admin-guide/files/sni.yaml.en.rst
index cbdfba3..7c490b8 100644
--- a/doc/admin-guide/files/ssl_server_name.yaml.en.rst
+++ b/doc/admin-guide/files/sni.yaml.en.rst
@@ -17,10 +17,10 @@
.. include:: ../../common.defs
-ssl_server_name.yaml
+sni.yaml
**********************
-.. configfile:: ssl_server_name.yaml
+.. configfile:: sni.yaml
Description
===========
@@ -33,7 +33,7 @@ the items specified by this file and if there is a match, the
values specified i
the defaults. This is done during the inbound connection processing and be
some outbound properties
can be overridden again later, such as via :file:`remap.config` or plugins.
-By default this is named :file:`ssl_server_name.yaml`. The file can be changed
by setting
+By default this is named :file:`sni.yaml`. The file can be changed by setting
:ts:cv:`proxy.config.ssl.servername.filename`. This file is loaded on start up
and by
:option:`traffic_ctl config reload` if the file has been modified since
process start.
diff --git a/doc/admin-guide/layer-4-routing.en.rst
b/doc/admin-guide/layer-4-routing.en.rst
index 5501a4c..69042a9 100644
--- a/doc/admin-guide/layer-4-routing.en.rst
+++ b/doc/admin-guide/layer-4-routing.en.rst
@@ -51,7 +51,7 @@ SNI Routing
Currently the only directly supported layer 4 routing (as of version 8.0) is
SNI based routing. This
imposes the requirement on the traffic that the inbound connection must be TLS.
-SNI routing is configured by :file:`ssl_server_name.yaml`.
+SNI routing is configured by :file:`sni.yaml`.
If SNI Routing is enabled the initial "`CLIENT HELLO
<https://tools.ietf.org/html/rfc5246#section-7.4.1.2>`__" data of an inbound
TLS connection is
@@ -96,7 +96,7 @@ service-1.example.com app-server-29:443
service-2.example.com app-server-56:4443
========================== =====================================
-The :file:`ssl_server_name.yaml` contents would be
+The :file:`sni.yaml` contents would be
.. code:: yaml
diff --git a/iocore/net/SSLSNIConfig.cc b/iocore/net/SSLSNIConfig.cc
index 274a82e..895f698 100644
--- a/iocore/net/SSLSNIConfig.cc
+++ b/iocore/net/SSLSNIConfig.cc
@@ -125,11 +125,11 @@ SNIConfigParams::Initialize()
{
sni_filename =
ats_stringdup(RecConfigReadConfigPath("proxy.config.ssl.servername.filename"));
- Note("ssl_server_name.yaml loading ...");
+ Note("sni.yaml loading ...");
struct stat sbuf;
if (stat(sni_filename, &sbuf) == -1 && errno == ENOENT) {
- Note("ssl_server_name.yaml failed to load");
+ Note("sni.yaml failed to load");
Warning("Loading SNI configuration - filename: %s doesn't exist",
sni_filename);
return 1;
}
@@ -138,12 +138,12 @@ SNIConfigParams::Initialize()
if (!zret.isOK()) {
std::stringstream errMsg;
errMsg << zret;
- Error("ssl_server_name.yaml failed to load: %s", errMsg.str().c_str());
+ Error("sni.yaml failed to load: %s", errMsg.str().c_str());
return 1;
}
loadSNIConfig();
- Note("ssl_server_name.yaml finished loading");
+ Note("sni.yaml finished loading");
return 0;
}
diff --git a/mgmt/RecordsConfig.cc b/mgmt/RecordsConfig.cc
index 2e71638..7a2155f 100644
--- a/mgmt/RecordsConfig.cc
+++ b/mgmt/RecordsConfig.cc
@@ -1092,7 +1092,7 @@ static const RecordElement RecordsConfig[] =
,
{RECT_CONFIG, "proxy.config.ssl.server.multicert.exit_on_load_fail",
RECD_INT, "1", RECU_RESTART_TS, RR_NULL, RECC_NULL, "[0-1]", RECA_NULL}
,
- {RECT_CONFIG, "proxy.config.ssl.servername.filename", RECD_STRING,
"ssl_server_name.yaml", RECU_RESTART_TS, RR_NULL, RECC_NULL, nullptr, RECA_NULL}
+ {RECT_CONFIG, "proxy.config.ssl.servername.filename", RECD_STRING,
"sni.yaml", RECU_RESTART_TS, RR_NULL, RECC_NULL, nullptr, RECA_NULL}
,
{RECT_CONFIG, "proxy.config.ssl.server.ticket_key.filename", RECD_STRING,
nullptr, RECU_DYNAMIC, RR_NULL, RECC_NULL, nullptr, RECA_NULL}
,
diff --git a/mgmt/utils/MgmtUtils.h b/mgmt/utils/MgmtUtils.h
index 16a3da8..6e59a52 100644
--- a/mgmt/utils/MgmtUtils.h
+++ b/mgmt/utils/MgmtUtils.h
@@ -38,8 +38,6 @@
#include "records/P_RecCore.h"
-constexpr const char SSL_SERVER_NAME_CONFIG[] = "ssl_server_name.yaml";
-
int mgmt_readline(int fd, char *buf, int maxlen);
int mgmt_writeline(int fd, const char *data, int nbytes);
diff --git a/src/traffic_manager/AddConfigFilesHere.cc
b/src/traffic_manager/AddConfigFilesHere.cc
index 0ace074..6ac388b 100644
--- a/src/traffic_manager/AddConfigFilesHere.cc
+++ b/src/traffic_manager/AddConfigFilesHere.cc
@@ -84,7 +84,7 @@ initializeRegistry()
registerFile("", "plugin.config");
registerFile("proxy.config.dns.splitdns.filename", "splitdns.config");
registerFile("proxy.config.ssl.server.multicert.filename",
"ssl_multicert.config");
- registerFile("proxy.config.ssl.servername.filename", SSL_SERVER_NAME_CONFIG);
+ registerFile("proxy.config.ssl.servername.filename", "sni.config");
configFiles->registerCallback(testcall);
}
diff --git a/tests/gold_tests/autest-site/min_cfg/ssl_server_name.yaml
b/tests/gold_tests/autest-site/min_cfg/sni.yaml
similarity index 100%
rename from tests/gold_tests/autest-site/min_cfg/ssl_server_name.yaml
rename to tests/gold_tests/autest-site/min_cfg/sni.yaml
diff --git a/tests/gold_tests/autest-site/trafficserver.test.ext
b/tests/gold_tests/autest-site/trafficserver.test.ext
index 48976cf..e9412ef 100755
--- a/tests/gold_tests/autest-site/trafficserver.test.ext
+++ b/tests/gold_tests/autest-site/trafficserver.test.ext
@@ -246,7 +246,7 @@ def MakeATSProcess(obj, name, command='traffic_server',
select_ports=True):
tmpname = os.path.join(config_dir, fname)
p.Disk.File(tmpname, id=make_id(fname), typename="ats:config")
- fname = "ssl_server_name.yaml"
+ fname = "sni.yaml"
tmpname = os.path.join(config_dir, fname)
p.Disk.File(tmpname, id=make_id(fname), typename="ats:config")
diff --git a/tests/gold_tests/h2/h2disable.test.py
b/tests/gold_tests/h2/h2disable.test.py
index 4f6700d..17438d3 100644
--- a/tests/gold_tests/h2/h2disable.test.py
+++ b/tests/gold_tests/h2/h2disable.test.py
@@ -59,7 +59,7 @@ ts.Disk.records_config.update({
'proxy.config.url_remap.pristine_host_hdr': 1
})
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: bar.com',
' disable_h2: true',
'- fqdn: bob.*.com',
diff --git
a/tests/gold_tests/pluginTest/client_context_dump/client_context_dump.test.py
b/tests/gold_tests/pluginTest/client_context_dump/client_context_dump.test.py
index ce1a48e..366bf8f 100644
---
a/tests/gold_tests/pluginTest/client_context_dump/client_context_dump.test.py
+++
b/tests/gold_tests/pluginTest/client_context_dump/client_context_dump.test.py
@@ -47,7 +47,7 @@ ts.Disk.ssl_multicert_config.AddLine(
'dest_ip=* ssl_cert_name=one.com.pem ssl_key_name=one.com.pem'
)
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: "*one.com"',
' client_cert: "one.com.pem"',
'- fqdn: "*two.com"',
diff --git a/tests/gold_tests/pluginTest/sslheaders/sslheaders.test.py
b/tests/gold_tests/pluginTest/sslheaders/sslheaders.test.py
index c13d0da..fdfb5c8 100644
--- a/tests/gold_tests/pluginTest/sslheaders/sslheaders.test.py
+++ b/tests/gold_tests/pluginTest/sslheaders/sslheaders.test.py
@@ -71,7 +71,7 @@ ts.Disk.remap_config.AddLine(
'map https://bar.com http://127.0.0.1:{0}'.format(server.Variables.Port)
)
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: "*bar.com"',
' verify_client: STRICT',
])
diff --git a/tests/gold_tests/tls/tls_client_cert.test.py
b/tests/gold_tests/tls/tls_client_cert.test.py
index 5118769..7c57ca5 100644
--- a/tests/gold_tests/tls/tls_client_cert.test.py
+++ b/tests/gold_tests/tls/tls_client_cert.test.py
@@ -91,11 +91,11 @@ ts.Disk.remap_config.AddLine(
'map /case2 https://127.0.0.1:{0}/'.format(server2.Variables.SSL_Port)
)
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
'- fqdn: bar.com')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
' client_cert: {0}/signed2-bar.pem'.format(ts.Variables.SSLDir))
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
' client_key: {0}/signed-bar.key'.format(ts.Variables.SSLDir))
@@ -140,14 +140,14 @@ trbarfail.Processes.Default.Streams.stdout =
Testers.ContainsExpression("Could N
tr2 = Test.AddTestRun("Update config files")
# Update the SNI config
-snipath = ts.Disk.ssl_server_name_yaml.AbsPath
+snipath = ts.Disk.sni_yaml.AbsPath
recordspath = ts.Disk.records_config.AbsPath
-tr2.Disk.File(snipath, id = "ssl_server_name_yaml", typename="ats:config"),
-tr2.Disk.ssl_server_name_yaml.AddLine(
+tr2.Disk.File(snipath, id = "sni_yaml", typename="ats:config"),
+tr2.Disk.sni_yaml.AddLine(
'- fqdn: bar.com')
-tr2.Disk.ssl_server_name_yaml.AddLine(
+tr2.Disk.sni_yaml.AddLine(
' client_cert: {0}/signed-bar.pem'.format(ts.Variables.SSLDir))
-tr2.Disk.ssl_server_name_yaml.AddLine(
+tr2.Disk.sni_yaml.AddLine(
' client_key: {0}/signed-bar.key'.format(ts.Variables.SSLDir))
# recreate the records.config with the cert filename changed
tr2.Disk.File(recordspath, id = "records_config",
typename="ats:config:records"),
@@ -172,11 +172,11 @@ tr2.Processes.Default.Env = ts.Env
tr2.Processes.Default.ReturnCode = 0
# Parking this as a ready tester on a meaningless process
-# Stall the test runs until the ssl_server_name reload has completed
-# At that point the new ssl_server_name settings are ready to go
-def ssl_server_name_reload_done(tsenv):
+# Stall the test runs until the sni reload has completed
+# At that point the new sni settings are ready to go
+def sni_reload_done(tsenv):
def done_reload(process, hasRunFor, **kw):
- cmd = "grep 'ssl_server_name.yaml finished loading' {0} | wc -l >
{1}/test.out".format(ts.Disk.diags_log.Name, Test.RunDirectory)
+ cmd = "grep 'sni.yaml finished loading' {0} | wc -l >
{1}/test.out".format(ts.Disk.diags_log.Name, Test.RunDirectory)
retval = subprocess.run(cmd, shell=True, env=tsenv)
if retval.returncode == 0:
cmd ="if [ -f {0}/test.out -a \"`cat {0}/test.out`\" = \"2\" ] ; then
true; else false; fi".format(Test.RunDirectory)
@@ -198,7 +198,7 @@ tr2reload.Processes.Default.ReturnCode = 0
#Should succeed
tr3bar = Test.AddTestRun("Make request with other bar cert to first server")
# Wait for the reload to complete
-tr3bar.Processes.Default.StartBefore(server3,
ready=ssl_server_name_reload_done(ts.Env))
+tr3bar.Processes.Default.StartBefore(server3, ready=sni_reload_done(ts.Env))
tr3bar.StillRunningAfter = ts
tr3bar.StillRunningAfter = server
tr3bar.StillRunningAfter = server2
diff --git a/tests/gold_tests/tls/tls_client_cert2.test.py
b/tests/gold_tests/tls/tls_client_cert2.test.py
index a8cf9e2..02ff1a2 100644
--- a/tests/gold_tests/tls/tls_client_cert2.test.py
+++ b/tests/gold_tests/tls/tls_client_cert2.test.py
@@ -21,7 +21,7 @@ import os
import re
Test.Summary = '''
-Test client certs to origin selected via wildcard names in ssl_server_name
+Test client certs to origin selected via wildcard names in sni
'''
ts = Test.MakeATSProcess("ts", command="traffic_server", select_ports=False)
@@ -85,7 +85,7 @@ ts.Disk.remap_config.AddLine(
'map /case2 https://127.0.0.1:{0}/'.format(server2.Variables.SSL_Port)
)
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: bob.bar.com',
' client_cert: signed-bar.pem',
' client_key: signed-bar.key',
diff --git a/tests/gold_tests/tls/tls_client_verify.test.py
b/tests/gold_tests/tls/tls_client_verify.test.py
index 341577a..f878a84 100644
--- a/tests/gold_tests/tls/tls_client_verify.test.py
+++ b/tests/gold_tests/tls/tls_client_verify.test.py
@@ -64,7 +64,7 @@ ts.Disk.remap_config.AddLine(
)
# Scenario 1: Default no client cert required. cert required for bar.com
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: bob.bar.com',
' verify_client: NONE',
'- fqdn: bob.*.com',
diff --git a/tests/gold_tests/tls/tls_client_verify2.test.py
b/tests/gold_tests/tls/tls_client_verify2.test.py
index 2174b81..304a33b 100644
--- a/tests/gold_tests/tls/tls_client_verify2.test.py
+++ b/tests/gold_tests/tls/tls_client_verify2.test.py
@@ -64,7 +64,7 @@ ts.Disk.remap_config.AddLine(
)
# Scenario 1: Default no client cert required. cert required for bar.com
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: bob.bar.com',
' verify_client: STRICT',
'- fqdn: bob.*.com',
diff --git a/tests/gold_tests/tls/tls_client_versions.test.py
b/tests/gold_tests/tls/tls_client_versions.test.py
index c506af4..2a3dbd2 100644
--- a/tests/gold_tests/tls/tls_client_versions.test.py
+++ b/tests/gold_tests/tls/tls_client_versions.test.py
@@ -43,7 +43,7 @@ ts.addSSLfile("ssl/server.key")
ts.Variables.ssl_port = 4443
-# Need no remap rules. Everything should be proccessed by ssl_server_name
+# Need no remap rules. Everything should be proccessed by sni
# Make sure the TS server certs are different from the origin certs
ts.Disk.ssl_multicert_config.AddLine(
@@ -67,7 +67,7 @@ ts.Disk.records_config.update({
# foo.com should only offer the older TLS protocols
# bar.com should terminate.
# empty SNI should tunnel to server_bar
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: foo.com',
' valid_tls_versions_in: [ TLSv1, TLSv1_1 ]'
])
diff --git a/tests/gold_tests/tls/tls_forward_nonhttp.test.py
b/tests/gold_tests/tls/tls_forward_nonhttp.test.py
index 5cfdd39..4b3c22c 100644
--- a/tests/gold_tests/tls/tls_forward_nonhttp.test.py
+++ b/tests/gold_tests/tls/tls_forward_nonhttp.test.py
@@ -30,7 +30,7 @@ ts.addSSLfile("ssl/server.key")
ts.Variables.ssl_port = 4443
-# Need no remap rules. Everything should be proccessed by ssl_server_name
+# Need no remap rules. Everything should be proccessed by sni
# Make sure the TS server certs are different from the origin certs
ts.Disk.ssl_multicert_config.AddLine(
@@ -52,7 +52,7 @@ ts.Disk.records_config.update({
# foo.com should not terminate. Just tunnel to server_foo
# bar.com should terminate. Forward its tcp stream to server_bar
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
"- fqdn: bar.com",
" forward_route: localhost:4444"
])
diff --git a/tests/gold_tests/tls/tls_hooks_client_verify.test.py
b/tests/gold_tests/tls/tls_hooks_client_verify.test.py
index 12bf397..a166d46 100644
--- a/tests/gold_tests/tls/tls_hooks_client_verify.test.py
+++ b/tests/gold_tests/tls/tls_hooks_client_verify.test.py
@@ -66,7 +66,7 @@ ts.Disk.remap_config.AddLine(
'map https://random.com:{1}/
https://127.0.0.1:{0}'.format(server.Variables.SSL_Port, ts.Variables.ssl_port)
)
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: bar.com',
' verify_client: STRICT',
'- fqdn: foo.com',
diff --git a/tests/gold_tests/tls/tls_hooks_verify.test.py
b/tests/gold_tests/tls/tls_hooks_verify.test.py
index 1725700..0c99d7f 100644
--- a/tests/gold_tests/tls/tls_hooks_verify.test.py
+++ b/tests/gold_tests/tls/tls_hooks_verify.test.py
@@ -64,9 +64,9 @@ ts.Disk.remap_config.AddLine(
'map https://random.com:{1}/
https://127.0.0.1:{0}'.format(server.Variables.SSL_Port, ts.Variables.ssl_port)
)
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
'- fqdn: bar.com')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
' verify_server_policy: PERMISSIVE')
Test.PreparePlugin(os.path.join(Test.Variables.AtsTestToolsDir, 'plugins',
'ssl_verify_test.cc'), ts, '-count=2 -bad=random.com -bad=bar.com')
diff --git a/tests/gold_tests/tls/tls_tunnel.test.py
b/tests/gold_tests/tls/tls_tunnel.test.py
index 3e55ef3..b689bbc 100644
--- a/tests/gold_tests/tls/tls_tunnel.test.py
+++ b/tests/gold_tests/tls/tls_tunnel.test.py
@@ -47,7 +47,7 @@ ts.addSSLfile("ssl/signer.key")
ts.Variables.ssl_port = 4443
-# Need no remap rules. Everything should be proccessed by ssl_server_name
+# Need no remap rules. Everything should be proccessed by sni
# Make sure the TS server certs are different from the origin certs
ts.Disk.ssl_multicert_config.AddLine(
@@ -72,7 +72,7 @@ ts.Disk.records_config.update({
# foo.com should not terminate. Just tunnel to server_foo
# bar.com should terminate.
# empty SNI should tunnel to server_bar
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: foo.com',
" tunnel_route: localhost:{0}".format(server_foo.Variables.SSL_Port),
"- fqdn: bob.*.com",
@@ -124,13 +124,13 @@ tr.Processes.Default.Streams.All +=
Testers.ContainsExpression("HTTP/1.1 200 OK"
tr.Processes.Default.Streams.All += Testers.ExcludesExpression("ATS", "Do not
terminate on Traffic Server")
tr.Processes.Default.Streams.All += Testers.ContainsExpression("bar ok",
"Should get a response from bar")
-# Update ssl_server_name file and reload
+# Update sni file and reload
tr = Test.AddTestRun("Update config files")
# Update the SNI config
-snipath = ts.Disk.ssl_server_name_yaml.AbsPath
+snipath = ts.Disk.sni_yaml.AbsPath
recordspath = ts.Disk.records_config.AbsPath
-tr.Disk.File(snipath, id = "ssl_server_name_yaml", typename="ats:config"),
-tr.Disk.ssl_server_name_yaml.AddLines([
+tr.Disk.File(snipath, id = "sni_yaml", typename="ats:config"),
+tr.Disk.sni_yaml.AddLines([
'- fqdn: bar.com',
" tunnel_route: localhost:{0}".format(server_bar.Variables.SSL_Port),
])
@@ -151,11 +151,11 @@ trreload.Processes.Default.Env = ts.Env
trreload.Processes.Default.ReturnCode = 0
# Parking this as a ready tester on a meaningless process
-# Stall the test runs until the ssl_server_name reload has completed
-# At that point the new ssl_server_name settings are ready to go
-def ssl_server_name_reload_done(tsenv):
+# Stall the test runs until the sni reload has completed
+# At that point the new sni settings are ready to go
+def sni_reload_done(tsenv):
def done_reload(process, hasRunFor, **kw):
- cmd = "grep 'ssl_server_name.yaml finished loading' {0} | wc -l >
{1}/test.out".format(ts.Disk.diags_log.Name, Test.RunDirectory)
+ cmd = "grep 'sni.yaml finished loading' {0} | wc -l >
{1}/test.out".format(ts.Disk.diags_log.Name, Test.RunDirectory)
retval = subprocess.run(cmd, shell=True, env=tsenv)
if retval.returncode == 0:
cmd ="if [ -f {0}/test.out -a \"`cat {0}/test.out`\" = \"2\" ] ; then
true; else false; fi".format(Test.RunDirectory)
@@ -167,8 +167,8 @@ def ssl_server_name_reload_done(tsenv):
# Should termimate on traffic_server (not tunnel)
tr = Test.AddTestRun("foo.com no Tunnel-test")
tr.StillRunningAfter = ts
-# Wait for the reload to complete by running the ssl_server_name_reload_done
test
-tr.Processes.Default.StartBefore(server2,
ready=ssl_server_name_reload_done(ts.Env))
+# Wait for the reload to complete by running the sni_reload_done test
+tr.Processes.Default.StartBefore(server2, ready=sni_reload_done(ts.Env))
tr.Processes.Default.Command = "curl -v --resolve 'foo.com:{0}:127.0.0.1' -k
https://foo.com:{0}".format(ts.Variables.ssl_port)
tr.Processes.Default.Streams.All += Testers.ContainsExpression("Not Found on
Accelerato", "Terminates on on Traffic Server")
tr.Processes.Default.Streams.All += Testers.ContainsExpression("ATS",
"Terminate on Traffic Server")
diff --git a/tests/gold_tests/tls/tls_tunnel_forward.test.py
b/tests/gold_tests/tls/tls_tunnel_forward.test.py
index f72d105..c7bb6d6 100644
--- a/tests/gold_tests/tls/tls_tunnel_forward.test.py
+++ b/tests/gold_tests/tls/tls_tunnel_forward.test.py
@@ -49,7 +49,7 @@ ts.addSSLfile("ssl/signer.key")
ts.Variables.ssl_port = 4443
-# Need no remap rules. Everything should be proccessed by ssl_server_name
+# Need no remap rules. Everything should be proccessed by sni
# Make sure the TS server certs are different from the origin certs
ts.Disk.ssl_multicert_config.AddLine(
@@ -73,7 +73,7 @@ ts.Disk.records_config.update({
# foo.com should not terminate. Just tunnel to server_foo
# bar.com should terminate. Forward its tcp stream to server_bar
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
"- fqdn: 'foo.com'",
" tunnel_route: 'localhost:{0}'".format(server_foo.Variables.SSL_Port),
"- fqdn: 'bar.com'",
diff --git a/tests/gold_tests/tls/tls_tunnel_plugin_rename.test.py
b/tests/gold_tests/tls/tls_tunnel_plugin_rename.test.py
index 1da7aa2..fa5640b 100644
--- a/tests/gold_tests/tls/tls_tunnel_plugin_rename.test.py
+++ b/tests/gold_tests/tls/tls_tunnel_plugin_rename.test.py
@@ -47,7 +47,7 @@ ts.addSSLfile("ssl/signer.key")
ts.Variables.ssl_port = 4443
-# Need no remap rules. Everything should be proccessed by ssl_server_name
+# Need no remap rules. Everything should be proccessed by sni
# Make sure the TS server certs are different from the origin certs
ts.Disk.ssl_multicert_config.AddLine(
@@ -72,7 +72,7 @@ ts.Disk.records_config.update({
# bar.com should terminate.
# empty should tunnel to server_random (should not happen)
# newname should tunnel to server_bar
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
"- fqdn: newname",
" tunnel_route: localhost:{0}".format(server_bar.Variables.SSL_Port),
"- fqdn: ''", #default case
diff --git a/tests/gold_tests/tls/tls_verify.test.py
b/tests/gold_tests/tls/tls_verify.test.py
index cd68ff8..ba2f3ed 100644
--- a/tests/gold_tests/tls/tls_verify.test.py
+++ b/tests/gold_tests/tls/tls_verify.test.py
@@ -88,7 +88,7 @@ ts.Disk.records_config.update({
'proxy.config.url_remap.pristine_host_hdr': 1
})
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: bar.com',
' verify_server_policy: ENFORCED',
' verify_server_properties: ALL',
diff --git a/tests/gold_tests/tls/tls_verify2.test.py
b/tests/gold_tests/tls/tls_verify2.test.py
index 1dd8b31..1752f63 100644
--- a/tests/gold_tests/tls/tls_verify2.test.py
+++ b/tests/gold_tests/tls/tls_verify2.test.py
@@ -80,21 +80,21 @@ ts.Disk.records_config.update({
'proxy.config.url_remap.pristine_host_hdr': 1
})
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
'- fqdn: bar.com')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
' verify_server_policy: PERMISSIVE')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
' verify_server_properties: SIGNATURE')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
'- fqdn: bad_bar.com')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
' verify_server_policy: PERMISSIVE')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
' verify_server_properties: SIGNATURE')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
'- fqdn: random.com')
-ts.Disk.ssl_server_name_yaml.AddLine(
+ts.Disk.sni_yaml.AddLine(
' verify_server_policy: DISABLED')
tr = Test.AddTestRun("default-enforce")
diff --git a/tests/gold_tests/tls/tls_verify3.test.py
b/tests/gold_tests/tls/tls_verify3.test.py
index 9fc6d61..ec7df52 100644
--- a/tests/gold_tests/tls/tls_verify3.test.py
+++ b/tests/gold_tests/tls/tls_verify3.test.py
@@ -80,7 +80,7 @@ ts.Disk.records_config.update({
'proxy.config.url_remap.pristine_host_hdr': 1
})
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: bob.bar.com',
' verify_server_policy: ENFORCED',
' verify_server_properties: ALL',
diff --git a/tests/gold_tests/tls/tls_verify_base.test.py
b/tests/gold_tests/tls/tls_verify_base.test.py
index 19ddc95..3bdfdd1 100644
--- a/tests/gold_tests/tls/tls_verify_base.test.py
+++ b/tests/gold_tests/tls/tls_verify_base.test.py
@@ -80,7 +80,7 @@ ts.Disk.records_config.update({
'proxy.config.ssl.client.sni_policy': 'host'
})
-ts.Disk.ssl_server_name_yaml.AddLines([
+ts.Disk.sni_yaml.AddLines([
'- fqdn: bar.com',
' verify_server_policy: ENFORCED',
' verify_server_properties: ALL',