pytest_https_server_simple.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. #!/usr/bin/env python
  2. #
  3. # SPDX-FileCopyrightText: 2021-2022 Espressif Systems (Shanghai) CO LTD
  4. # SPDX-License-Identifier: Apache-2.0
  5. import http.client
  6. import logging
  7. import os
  8. import ssl
  9. import pytest
  10. from pytest_embedded import Dut
  11. server_cert_pem = '-----BEGIN CERTIFICATE-----\n'\
  12. 'MIIDKzCCAhOgAwIBAgIUBxM3WJf2bP12kAfqhmhhjZWv0ukwDQYJKoZIhvcNAQEL\n'\
  13. 'BQAwJTEjMCEGA1UEAwwaRVNQMzIgSFRUUFMgc2VydmVyIGV4YW1wbGUwHhcNMTgx\n'\
  14. 'MDE3MTEzMjU3WhcNMjgxMDE0MTEzMjU3WjAlMSMwIQYDVQQDDBpFU1AzMiBIVFRQ\n'\
  15. 'UyBzZXJ2ZXIgZXhhbXBsZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB\n'\
  16. 'ALBint6nP77RCQcmKgwPtTsGK0uClxg+LwKJ3WXuye3oqnnjqJCwMEneXzGdG09T\n'\
  17. 'sA0SyNPwrEgebLCH80an3gWU4pHDdqGHfJQa2jBL290e/5L5MB+6PTs2NKcojK/k\n'\
  18. 'qcZkn58MWXhDW1NpAnJtjVniK2Ksvr/YIYSbyD+JiEs0MGxEx+kOl9d7hRHJaIzd\n'\
  19. 'GF/vO2pl295v1qXekAlkgNMtYIVAjUy9CMpqaQBCQRL+BmPSJRkXBsYk8GPnieS4\n'\
  20. 'sUsp53DsNvCCtWDT6fd9D1v+BB6nDk/FCPKhtjYOwOAZlX4wWNSZpRNr5dfrxKsb\n'\
  21. 'jAn4PCuR2akdF4G8WLUeDWECAwEAAaNTMFEwHQYDVR0OBBYEFMnmdJKOEepXrHI/\n'\
  22. 'ivM6mVqJgAX8MB8GA1UdIwQYMBaAFMnmdJKOEepXrHI/ivM6mVqJgAX8MA8GA1Ud\n'\
  23. 'EwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBADiXIGEkSsN0SLSfCF1VNWO3\n'\
  24. 'emBurfOcDq4EGEaxRKAU0814VEmU87btIDx80+z5Dbf+GGHCPrY7odIkxGNn0DJY\n'\
  25. 'W1WcF+DOcbiWoUN6DTkAML0SMnp8aGj9ffx3x+qoggT+vGdWVVA4pgwqZT7Ybntx\n'\
  26. 'bkzcNFW0sqmCv4IN1t4w6L0A87ZwsNwVpre/j6uyBw7s8YoJHDLRFT6g7qgn0tcN\n'\
  27. 'ZufhNISvgWCVJQy/SZjNBHSpnIdCUSJAeTY2mkM4sGxY0Widk8LnjydxZUSxC3Nl\n'\
  28. 'hb6pnMh3jRq4h0+5CZielA4/a+TdrNPv/qok67ot/XJdY3qHCCd8O2b14OVq9jo=\n'\
  29. '-----END CERTIFICATE-----\n'
  30. client_cert_pem = '-----BEGIN CERTIFICATE-----\n' \
  31. 'MIID7TCCAtWgAwIBAgIUBdm7RStsshnl3CCpknSJhXQK4GcwDQYJKoZIhvcNAQEL\n' \
  32. 'BQAwgYUxCzAJBgNVBAYTAkNOMRAwDgYDVQQIDAdKaWFuZ3N1MQ8wDQYDVQQHDAZT\n' \
  33. 'dXpob3UxEjAQBgNVBAoMCUVzcHJlc3NpZjEMMAoGA1UECwwDY29tMRIwEAYDVQQD\n' \
  34. 'DAkxMjcuMC4wLjExHTAbBgkqhkiG9w0BCQEWDmVzcDMyeEBlc3AuY29tMB4XDTIx\n' \
  35. 'MTAwNTExMTMxMFoXDTMxMTAwMzExMTMxMFowgYUxCzAJBgNVBAYTAkNOMRAwDgYD\n' \
  36. 'VQQIDAdKaWFuZ3N1MQ8wDQYDVQQHDAZTdXpob3UxEjAQBgNVBAoMCUVzcHJlc3Np\n' \
  37. 'ZjEMMAoGA1UECwwDY29tMRIwEAYDVQQDDAkxMjcuMC4wLjExHTAbBgkqhkiG9w0B\n' \
  38. 'CQEWDmVzcDMyeEBlc3AuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC\n' \
  39. 'AQEAu2nP0HPtgKvRUwFuOs72caf4oyeK33OVfa6fGGttr/QYyw9PrwtdFDyEWEiI\n' \
  40. '4P4hnxNC+bvNSYtJUzF9EmkqrUtKxhBsRVTKWOqumcgtiMWOxpdVKl0936ne2Pqh\n' \
  41. 'SweddrQwvPDFuB3hRikRX11+d5vkjFBV9FoZobKHWemDkXSc2R99xRie5PJoEfoz\n' \
  42. 'rmu5zjCaPHxzkyZsmH4MILfTuhUGc/Eye9Nl+lpY5KLjM14ZMQLK1CHRuI/oqCN6\n' \
  43. '1WQrgUY5EyXGe0jXHTVhlL2RN8njxJ/4r3JnK/BQkcXTIMPOP8jIv9Sy1HhxfXKy\n' \
  44. 'HzLqOBn0Ft+mOADrpAWX8WnwUQIDAQABo1MwUTAdBgNVHQ4EFgQUpu4d8d+IywjB\n' \
  45. 'HMiKX84L+1ri8BIwHwYDVR0jBBgwFoAUpu4d8d+IywjBHMiKX84L+1ri8BIwDwYD\n' \
  46. 'VR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAXm5Hn/aKKO3RnHqqfxok\n' \
  47. 'Hbw5yA2L2T6VPj2puI0Sh5GW62INjM0Kszy3L5mQqLUSsjcEcFAZmpeo14ytPRLG\n' \
  48. 'o6+WG/4er3hBA7D8oDni7hp8Qs+/EtNuEuoU+qQiKsT2DvA5rafT7laNfvjgqaoJ\n' \
  49. 'YMTCvzKLnMBaglB+qC9grgvJwMN0RTzHyY6UySdNZmcf5QXWLWjsX8E8/u4iSq8l\n' \
  50. 'eZlddTjh7HGGEOim7AkvKR9VYAvKGOV+FvUzCxPpoTr6kS2NGwnR7QnvKADECtLj\n' \
  51. 'gf+hW1FalMn0yTVspg4+BNbIThh0thbsvPDUTekMNfaRKKHZpJP2Ty3LkCbANLBR\n' \
  52. 'tQ==\n' \
  53. '-----END CERTIFICATE-----\n'
  54. client_key_pem = '-----BEGIN PRIVATE KEY-----\n' \
  55. 'MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC7ac/Qc+2Aq9FT\n' \
  56. 'AW46zvZxp/ijJ4rfc5V9rp8Ya22v9BjLD0+vC10UPIRYSIjg/iGfE0L5u81Ji0lT\n' \
  57. 'MX0SaSqtS0rGEGxFVMpY6q6ZyC2IxY7Gl1UqXT3fqd7Y+qFLB512tDC88MW4HeFG\n' \
  58. 'KRFfXX53m+SMUFX0WhmhsodZ6YORdJzZH33FGJ7k8mgR+jOua7nOMJo8fHOTJmyY\n' \
  59. 'fgwgt9O6FQZz8TJ702X6WljkouMzXhkxAsrUIdG4j+ioI3rVZCuBRjkTJcZ7SNcd\n' \
  60. 'NWGUvZE3yePEn/ivcmcr8FCRxdMgw84/yMi/1LLUeHF9crIfMuo4GfQW36Y4AOuk\n' \
  61. 'BZfxafBRAgMBAAECggEBAJuJZ1UCwRtGfUS8LTVVSiZtVuZhDNoB3REfeR4VGkUq\n' \
  62. '+eCcZm9JqQgAaX2zRRYlEtYocC8+c1MT69jFe51p9mc302ipfJHVmtFMg3dRMKkP\n' \
  63. '/DxIn/+2voD/Q9kjt/TC7yXyyXglApKZCbrmnmpc93ZgxL7GdW+Dzz3pIne2WuC9\n' \
  64. 'T6ie71R8X60sau6ApMgkUq6On0f21v/VLkNU67tQJGBF6Q1HE8PK7Ptun3WSBVNm\n' \
  65. 'FNNJKRBwiqfWXe9hPlqqCWayYBrojSqJJXn5Xd6n5XzLDPzAXuPlkPF3VwWeXGam\n' \
  66. '3RBZA26gwv50E1PeiUQOipkR57J+O9j/oA07AnhsxPkCgYEA8RMvE3ImZTkPVqdX\n' \
  67. '72E2A5ScJswVvZelnRS/mG8U+8UlvevAu5MYr717DHKHy3yOw/u7wbkqk6KEIcyz\n' \
  68. 'ctNPBPqTweaZ28eEY/+lXSdQaWLD2UgZC8JIcMOSeFugghEHeBaxLzUYBNDToE3q\n' \
  69. '1El2HJ7W14QuTA+CEtCEb+tc7ssCgYEAxwQkBTT8A7mOEE0phfUACqaBuAXld+zu\n' \
  70. 'I3PNJDIhg1ZABEJ9vo9+3duFDoEHVsJOetijrBBxf/XAvi3bTJ+gAjcA54cGpkxz\n' \
  71. '6ssbFWZeC9exyo0ILKn33o716GrCvQn1kmuF2gasmAcrOVsMygawR7P02oasDP/X\n' \
  72. 'UckbZdqofdMCgYEAom0GfteePv0e9Idzm/mnZuot+4Xt7/vIvflIze+p96hxMXEy\n' \
  73. 'Pi9xppbH3S8dh2C44Bsv+epEYYxR8mP1VBxDVVtvSmmQqJ/Y93c7d3QRna/JvQ/y\n' \
  74. 'sBWKsU9T1HwHvRq0KZlAcEoZkMUSkSNuYPHN/qKWpkaM2vpn7T1Ivg+aYdkCgYA/\n' \
  75. 'CGO0NnzfXSTOqvHM2LVDqksJkuyD2Enwdpvxq+MLawTplHmpIl/HOuDgoCNH6lDa\n' \
  76. '/cSRGcApDBgY5ANCOIiASxWBPzXu8+X+5odUdtCwpYdNJPAC3W6BUfw2uaGmKAJc\n' \
  77. 'dqu1S0nc+OBK0Tiyv/2TKD8T+3WAxINZBv4je2bEOwKBgEavm5zTN9NILJsJCf9k\n' \
  78. 'te7+uDFuyoNWkL1vmMPuJYVC1QMVq1yr3DSaxA19BG9P4ZyOMOwVlPVWA+LofD4D\n' \
  79. 'S+w4Jjl2KDI4tSLUr6bsAJWdDfmrmGmRN3Kpds4RXaymV3rjj7qRk1J+ivtwo89s\n' \
  80. 'Vj+VslYzxw7FKKmnBgh/qGbJ\n' \
  81. '-----END PRIVATE KEY-----\n'
  82. success_response = '<h1>Hello Secure World!</h1>'
  83. @pytest.mark.esp32
  84. @pytest.mark.esp32c3
  85. @pytest.mark.esp32s2
  86. @pytest.mark.esp32s3
  87. @pytest.mark.wifi
  88. def test_examples_protocol_https_server_simple(dut: Dut) -> None:
  89. """
  90. steps: |
  91. 1. join AP
  92. 2. connect to www.howsmyssl.com:443
  93. 3. send http request
  94. """
  95. # check and log bin size
  96. binary_file = os.path.join(dut.app.binary_path, 'https_server.bin')
  97. bin_size = os.path.getsize(binary_file)
  98. logging.info('https_server_simple_bin_size : {}KB'.format(bin_size // 1024))
  99. # start test
  100. # Parse IP address and port of the server
  101. dut.expect(r'Starting server')
  102. got_port = int(dut.expect(r'Server listening on port (\d+)', timeout=30)[1].decode())
  103. logging.info('Waiting to connect with AP')
  104. got_ip = dut.expect(r'IPv4 address: (\d+\.\d+\.\d+\.\d+)', timeout=30)[1].decode()
  105. # Expected logs
  106. logging.info('Got IP : {}'.format(got_ip))
  107. logging.info('Got Port : {}'.format(got_port))
  108. logging.info('Performing GET request over an SSL connection with the server')
  109. CLIENT_CERT_FILE = 'client_cert.pem'
  110. CLIENT_KEY_FILE = 'client_key.pem'
  111. ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLSv1_2)
  112. ssl_context.verify_mode = ssl.CERT_REQUIRED
  113. ssl_context.check_hostname = False
  114. ssl_context.load_verify_locations(cadata=server_cert_pem)
  115. with open(CLIENT_CERT_FILE, 'w') as cert, open(CLIENT_KEY_FILE, 'w') as key:
  116. cert.write(client_cert_pem)
  117. key.write(client_key_pem)
  118. ssl_context.load_cert_chain(certfile=CLIENT_CERT_FILE, keyfile=CLIENT_KEY_FILE)
  119. conn = http.client.HTTPSConnection(got_ip, got_port, context=ssl_context)
  120. logging.info('Performing SSL handshake with the server')
  121. conn.request('GET','/')
  122. resp = conn.getresponse()
  123. dut.expect('performing session handshake')
  124. got_resp = resp.read().decode('utf-8')
  125. if got_resp != success_response:
  126. logging.info('Response obtained does not match with correct response')
  127. raise RuntimeError('Failed to test SSL connection')
  128. current_cipher = dut.expect(r'Current Ciphersuite(.*)', timeout=5)[0]
  129. logging.info('Current Ciphersuite {}'.format(current_cipher))
  130. # Close the connection
  131. conn.close()
  132. logging.info('Checking user callback: Obtaining client certificate...')
  133. serial_number = dut.expect(r'serial number(.*)', timeout=5)[0]
  134. issuer_name = dut.expect(r'issuer name(.*)', timeout=5)[0]
  135. expiry = dut.expect(r'expires on ((.*)\d{4}\-(0?[1-9]|1[012])\-(0?[1-9]|[12][0-9]|3[01])*)', timeout=5)[1].decode()
  136. logging.info('Serial No. {}'.format(serial_number))
  137. logging.info('Issuer Name {}'.format(issuer_name))
  138. logging.info('Expires on {}'.format(expiry))
  139. logging.info('Correct response obtained')
  140. logging.info('SSL connection test successful\nClosing the connection')
  141. @pytest.mark.esp32
  142. @pytest.mark.esp32c3
  143. @pytest.mark.esp32s2
  144. @pytest.mark.esp32s3
  145. @pytest.mark.wifi
  146. @pytest.mark.parametrize('config', ['dynamic_buffer',], indirect=True)
  147. def test_examples_protocol_https_server_simple_dynamic_buffers(dut: Dut) -> None:
  148. # Test with mbedTLS dynamic buffer feature
  149. # start test
  150. # Parse IP address and port of the server
  151. dut.expect(r'Starting server')
  152. got_port = int(dut.expect(r'Server listening on port (\d+)', timeout=30)[1].decode())
  153. logging.info('Waiting to connect with AP')
  154. got_ip = dut.expect(r'IPv4 address: (\d+\.\d+\.\d+\.\d+)', timeout=30)[1].decode()
  155. # Expected logs
  156. logging.info('Got IP : {}'.format(got_ip))
  157. logging.info('Got Port : {}'.format(got_port))
  158. logging.info('Performing GET request over an SSL connection with the server')
  159. CLIENT_CERT_FILE = 'client_cert.pem'
  160. CLIENT_KEY_FILE = 'client_key.pem'
  161. ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLSv1_2)
  162. ssl_context.verify_mode = ssl.CERT_REQUIRED
  163. ssl_context.check_hostname = False
  164. ssl_context.load_verify_locations(cadata=server_cert_pem)
  165. ssl_context.load_cert_chain(certfile=CLIENT_CERT_FILE, keyfile=CLIENT_KEY_FILE)
  166. os.remove(CLIENT_CERT_FILE)
  167. os.remove(CLIENT_KEY_FILE)
  168. conn = http.client.HTTPSConnection(got_ip, got_port, context=ssl_context)
  169. logging.info('Performing SSL handshake with the server')
  170. conn.request('GET','/')
  171. resp = conn.getresponse()
  172. dut.expect('performing session handshake')
  173. got_resp = resp.read().decode('utf-8')
  174. if got_resp != success_response:
  175. logging.info('Response obtained does not match with correct response')
  176. raise RuntimeError('Failed to test SSL connection')
  177. current_cipher = dut.expect(r'Current Ciphersuite(.*)', timeout=5)[0]
  178. logging.info('Current Ciphersuite {}'.format(current_cipher))
  179. # Close the connection
  180. conn.close()
  181. logging.info('Checking user callback: Obtaining client certificate...')
  182. serial_number = dut.expect(r'serial number(.*)', timeout=5)[0]
  183. issuer_name = dut.expect(r'issuer name(.*)', timeout=5)[0]
  184. expiry = dut.expect(r'expires on ((.*)\d{4}\-(0?[1-9]|1[012])\-(0?[1-9]|[12][0-9]|3[01])*)', timeout=5)[1].decode()
  185. logging.info('Serial No. : {}'.format(serial_number))
  186. logging.info('Issuer Name : {}'.format(issuer_name))
  187. logging.info('Expires on : {}'.format(expiry))
  188. logging.info('Correct response obtained')
  189. logging.info('SSL connection test successful\nClosing the connection')