%% %% %CopyrightBegin% %% %% Copyright Ericsson AB 2007-2013. All Rights Reserved. %% %% Licensed under the Apache License, Version 2.0 (the "License"); %% you may not use this file except in compliance with the License. %% You may obtain a copy of the License at %% %% http://www.apache.org/licenses/LICENSE-2.0 %% %% Unless required by applicable law or agreed to in writing, software %% distributed under the License is distributed on an "AS IS" BASIS, %% WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. %% See the License for the specific language governing permissions and %% limitations under the License. %% %% %CopyrightEnd% %% -module(ssl_dist_SUITE). -include_lib("common_test/include/ct.hrl"). %% Note: This directive should only be used in test suites. -compile(export_all). -define(DEFAULT_TIMETRAP_SECS, 240). -define(AWAIT_SSL_NODE_UP_TIMEOUT, 30000). -record(node_handle, {connection_handler, socket, name, nodename} ). %%-------------------------------------------------------------------- %% Common Test interface functions ----------------------------------- %%-------------------------------------------------------------------- all() -> [basic, payload, plain_options, plain_verify_options, listen_port_options]. groups() -> []. init_per_group(_GroupName, Config) -> Config. end_per_group(_GroupName, Config) -> Config. init_per_suite(Config0) -> try crypto:start() of ok -> %% Currently no ct function avilable for is_cover! case test_server:is_cover() of false -> Config = add_ssl_opts_config(Config0), setup_certs(Config), Config; true -> {skip, "Can not be covered"} end catch _:_ -> {skip, "Crypto did not start"} end. end_per_suite(Config) -> application:stop(crypto), Config. init_per_testcase(plain_verify_options = Case, Config) when is_list(Config) -> SslFlags = setup_dist_opts([{many_verify_opts, true} | Config]), Flags = case os:getenv("ERL_FLAGS") of false -> os:putenv("ERL_FLAGS", SslFlags), ""; OldFlags -> os:putenv("ERL_FLAGS", OldFlags ++ "" ++ SslFlags), OldFlags end, common_init(Case, [{old_flags, Flags} | Config]); init_per_testcase(Case, Config) when is_list(Config) -> common_init(Case, Config). common_init(Case, Config) -> ct:timetrap({seconds, ?DEFAULT_TIMETRAP_SECS}), [{testcase, Case}|Config]. end_per_testcase(Case, Config) when is_list(Config) -> Flags = proplists:get_value(old_flags, Config), catch os:putenv("ERL_FLAGS", Flags), common_end(Case, Config). common_end(_, _Config) -> ok. %%-------------------------------------------------------------------- %% Test Cases -------------------------------------------------------- %%-------------------------------------------------------------------- basic() -> [{doc,"Test that two nodes can connect via ssl distribution"}]. basic(Config) when is_list(Config) -> NH1 = start_ssl_node(Config), Node1 = NH1#node_handle.nodename, NH2 = start_ssl_node(Config), Node2 = NH2#node_handle.nodename, pong = apply_on_ssl_node(NH1, fun () -> net_adm:ping(Node2) end), [Node2] = apply_on_ssl_node(NH1, fun () -> nodes() end), [Node1] = apply_on_ssl_node(NH2, fun () -> nodes() end), %% The test_server node has the same cookie as the ssl nodes %% but it should not be able to communicate with the ssl nodes %% via the erlang distribution. pang = net_adm:ping(Node1), pang = net_adm:ping(Node2), %% SSL nodes should not be able to communicate with the test_server node %% either (and ping should return eventually). TestServer = node(), pang = apply_on_ssl_node(NH1, fun () -> net_adm:ping(TestServer) end), pang = apply_on_ssl_node(NH2, fun () -> net_adm:ping(TestServer) end), %% %% Check that we are able to communicate over the erlang %% distribution between the ssl nodes. %% Ref = make_ref(), spawn(fun () -> apply_on_ssl_node( NH1, fun () -> tstsrvr_format("Hi from ~p!~n", [node()]), send_to_tstcntrl({Ref, self()}), receive {From, ping} -> tstsrvr_format("Received ping ~p!~n", [node()]), From ! {self(), pong} end end) end), receive {Ref, SslPid} -> ok = apply_on_ssl_node( NH2, fun () -> tstsrvr_format("Hi from ~p!~n", [node()]), SslPid ! {self(), ping}, receive {SslPid, pong} -> ok end end) end, stop_ssl_node(NH1), stop_ssl_node(NH2), success(Config). %%-------------------------------------------------------------------- payload() -> [{doc,"Test that send a lot of data between the ssl distributed noes"}]. payload(Config) when is_list(Config) -> NH1 = start_ssl_node(Config), Node1 = NH1#node_handle.nodename, NH2 = start_ssl_node(Config), Node2 = NH2#node_handle.nodename, pong = apply_on_ssl_node(NH1, fun () -> net_adm:ping(Node2) end), [Node2] = apply_on_ssl_node(NH1, fun () -> nodes() end), [Node1] = apply_on_ssl_node(NH2, fun () -> nodes() end), Ref = make_ref(), spawn(fun () -> apply_on_ssl_node( NH1, fun () -> send_to_tstcntrl({Ref, self()}), receive {From, Msg} -> From ! {self(), Msg} end end) end), receive {Ref, SslPid} -> ok = apply_on_ssl_node( NH2, fun () -> Msg = crypto:rand_bytes(100000), SslPid ! {self(), Msg}, receive {SslPid, Msg} -> ok end end) end, stop_ssl_node(NH1), stop_ssl_node(NH2), success(Config). %%-------------------------------------------------------------------- plain_options() -> [{doc,"Test specifying additional options"}]. plain_options(Config) when is_list(Config) -> DistOpts = "-ssl_dist_opt server_secure_renegotiate true " "client_secure_renegotiate true " "server_reuse_sessions true client_reuse_sessions true " "client_verify verify_none server_verify verify_none " "server_depth 1 client_depth 1 " "server_hibernate_after 500 client_hibernate_after 500", NH1 = start_ssl_node([{additional_dist_opts, DistOpts} | Config]), Node1 = NH1#node_handle.nodename, NH2 = start_ssl_node([{additional_dist_opts, DistOpts} | Config]), Node2 = NH2#node_handle.nodename, pong = apply_on_ssl_node(NH1, fun () -> net_adm:ping(Node2) end), [Node2] = apply_on_ssl_node(NH1, fun () -> nodes() end), [Node1] = apply_on_ssl_node(NH2, fun () -> nodes() end), stop_ssl_node(NH1), stop_ssl_node(NH2), success(Config). %%-------------------------------------------------------------------- plain_verify_options() -> [{doc,"Test specifying additional options"}]. plain_verify_options(Config) when is_list(Config) -> DistOpts = "-ssl_dist_opt server_secure_renegotiate true " "client_secure_renegotiate true " "server_reuse_sessions true client_reuse_sessions true " "server_hibernate_after 500 client_hibernate_after 500", NH1 = start_ssl_node([{additional_dist_opts, DistOpts} | Config]), Node1 = NH1#node_handle.nodename, NH2 = start_ssl_node([{additional_dist_opts, DistOpts} | Config]), Node2 = NH2#node_handle.nodename, pong = apply_on_ssl_node(NH1, fun () -> net_adm:ping(Node2) end), [Node2] = apply_on_ssl_node(NH1, fun () -> nodes() end), [Node1] = apply_on_ssl_node(NH2, fun () -> nodes() end), stop_ssl_node(NH1), stop_ssl_node(NH2), success(Config). %%-------------------------------------------------------------------- listen_port_options() -> [{doc, "Test specifying listening ports"}]. listen_port_options(Config) when is_list(Config) -> %% Start a node, and get the port number it's listening on. NH1 = start_ssl_node(Config), Node1 = NH1#node_handle.nodename, Name1 = lists:takewhile(fun(C) -> C =/= $@ end, atom_to_list(Node1)), {ok, NodesPorts} = apply_on_ssl_node(NH1, fun net_adm:names/0), {Name1, Port1} = lists:keyfind(Name1, 1, NodesPorts), %% Now start a second node, configuring it to use the same port %% number. PortOpt1 = "-kernel inet_dist_listen_min " ++ integer_to_list(Port1) ++ " inet_dist_listen_max " ++ integer_to_list(Port1), try start_ssl_node([{additional_dist_opts, PortOpt1} | Config]) of #node_handle{} -> %% If the node was able to start, it didn't take the port %% option into account. exit(unexpected_success) catch exit:{accept_failed, timeout} -> %% The node failed to start, as expected. ok end, %% Try again, now specifying a high max port. PortOpt2 = "-kernel inet_dist_listen_min " ++ integer_to_list(Port1) ++ " inet_dist_listen_max 65535", NH2 = start_ssl_node([{additional_dist_opts, PortOpt2} | Config]), Node2 = NH2#node_handle.nodename, Name2 = lists:takewhile(fun(C) -> C =/= $@ end, atom_to_list(Node2)), {ok, NodesPorts2} = apply_on_ssl_node(NH2, fun net_adm:names/0), {Name2, Port2} = lists:keyfind(Name2, 1, NodesPorts2), %% The new port should be higher: if Port2 > Port1 -> ok; true -> error({port, Port2, not_higher_than, Port1}) end, stop_ssl_node(NH1), stop_ssl_node(NH2), success(Config). %%-------------------------------------------------------------------- %%% Internal functions ----------------------------------------------- %%-------------------------------------------------------------------- %% ssl_node side api %% tstsrvr_format(Fmt, ArgList) -> send_to_tstsrvr({format, Fmt, ArgList}). send_to_tstcntrl(Message) -> send_to_tstsrvr({message, Message}). %% %% test_server side api %% apply_on_ssl_node(Node, M, F, A) when is_atom(M), is_atom(F), is_list(A) -> Ref = make_ref(), send_to_ssl_node(Node, {apply, self(), Ref, M, F, A}), receive {Ref, Result} -> Result end. apply_on_ssl_node(Node, Fun) when is_function(Fun, 0) -> Ref = make_ref(), send_to_ssl_node(Node, {apply, self(), Ref, Fun}), receive {Ref, Result} -> Result end. stop_ssl_node(#node_handle{connection_handler = Handler, socket = Socket, name = Name}) -> ?t:format("Trying to stop ssl node ~s.~n", [Name]), Mon = erlang:monitor(process, Handler), unlink(Handler), case gen_tcp:send(Socket, term_to_binary(stop)) of ok -> receive {'DOWN', Mon, process, Handler, Reason} -> case Reason of normal -> ok; _ -> exit(Reason) end end; Error -> erlang:demonitor(Mon, [flush]), exit(Error) end. start_ssl_node(Config) -> start_ssl_node(Config, ""). start_ssl_node(Config, XArgs) -> Name = mk_node_name(Config), SSL = ?config(ssl_opts, Config), SSLDistOpts = setup_dist_opts(Config), start_ssl_node_raw(Name, SSL ++ " " ++ SSLDistOpts ++ XArgs). start_ssl_node_raw(Name, Args) -> {ok, LSock} = gen_tcp:listen(0, [binary, {packet, 4}, {active, false}]), {ok, ListenPort} = inet:port(LSock), CmdLine = mk_node_cmdline(ListenPort, Name, Args), ?t:format("Attempting to start ssl node ~ts: ~ts~n", [Name, CmdLine]), case open_port({spawn, CmdLine}, []) of Port when is_port(Port) -> unlink(Port), erlang:port_close(Port), case await_ssl_node_up(Name, LSock) of #node_handle{} = NodeHandle -> ?t:format("Ssl node ~s started.~n", [Name]), NodeName = list_to_atom(Name ++ "@" ++ host_name()), NodeHandle#node_handle{nodename = NodeName}; Error -> exit({failed_to_start_node, Name, Error}) end; Error -> exit({failed_to_start_node, Name, Error}) end. %% %% command line creation %% host_name() -> [$@ | Host] = lists:dropwhile(fun ($@) -> false; (_) -> true end, atom_to_list(node())), Host. mk_node_name(Config) -> {A, B, C} = erlang:now(), Case = ?config(testcase, Config), atom_to_list(?MODULE) ++ "_" ++ atom_to_list(Case) ++ "_" ++ integer_to_list(A) ++ "-" ++ integer_to_list(B) ++ "-" ++ integer_to_list(C). mk_node_cmdline(ListenPort, Name, Args) -> Static = "-detached -noinput", Pa = filename:dirname(code:which(?MODULE)), Prog = case catch init:get_argument(progname) of {ok,[[P]]} -> P; _ -> exit(no_progname_argument_found) end, NameSw = case net_kernel:longnames() of false -> "-sname "; _ -> "-name " end, {ok, Pwd} = file:get_cwd(), "\"" ++ Prog ++ "\" " ++ Static ++ " " ++ NameSw ++ " " ++ Name ++ " " ++ "-pa " ++ Pa ++ " " ++ "-run application start crypto -run application start public_key " ++ "-run " ++ atom_to_list(?MODULE) ++ " cnct2tstsrvr " ++ host_name() ++ " " ++ integer_to_list(ListenPort) ++ " " ++ Args ++ " " ++ "-env ERL_CRASH_DUMP " ++ Pwd ++ "/erl_crash_dump." ++ Name ++ " " ++ "-setcookie " ++ atom_to_list(erlang:get_cookie()). %% %% Connection handler test_server side %% await_ssl_node_up(Name, LSock) -> case gen_tcp:accept(LSock, ?AWAIT_SSL_NODE_UP_TIMEOUT) of timeout -> gen_tcp:close(LSock), ?t:format("Timeout waiting for ssl node ~s to come up~n", [Name]), timeout; {ok, Socket} -> gen_tcp:close(LSock), case gen_tcp:recv(Socket, 0) of {ok, Bin} -> check_ssl_node_up(Socket, Name, Bin); {error, closed} -> gen_tcp:close(Socket), exit({lost_connection_with_ssl_node_before_up, Name}) end; {error, Error} -> gen_tcp:close(LSock), exit({accept_failed, Error}) end. check_ssl_node_up(Socket, Name, Bin) -> case catch binary_to_term(Bin) of {'EXIT', _} -> gen_tcp:close(Socket), exit({bad_data_received_from_ssl_node, Name, Bin}); {ssl_node_up, NodeName} -> case list_to_atom(Name++"@"++host_name()) of NodeName -> Parent = self(), Go = make_ref(), %% Spawn connection handler on test server side Pid = spawn_link( fun () -> receive Go -> ok end, tstsrvr_con_loop(Name, Socket, Parent) end), ok = gen_tcp:controlling_process(Socket, Pid), Pid ! Go, #node_handle{connection_handler = Pid, socket = Socket, name = Name}; _ -> exit({unexpected_ssl_node_connected, NodeName}) end; Msg -> exit({unexpected_msg_instead_of_ssl_node_up, Name, Msg}) end. send_to_ssl_node(#node_handle{connection_handler = Hndlr}, Term) -> Hndlr ! {relay_to_ssl_node, term_to_binary(Term)}, ok. tstsrvr_con_loop(Name, Socket, Parent) -> inet:setopts(Socket,[{active,once}]), receive {relay_to_ssl_node, Data} when is_binary(Data) -> case gen_tcp:send(Socket, Data) of ok -> ok; _Error -> gen_tcp:close(Socket), exit({failed_to_relay_data_to_ssl_node, Name, Data}) end; {tcp, Socket, Bin} -> case catch binary_to_term(Bin) of {'EXIT', _} -> gen_tcp:close(Socket), exit({bad_data_received_from_ssl_node, Name, Bin}); {format, FmtStr, ArgList} -> ?t:format(FmtStr, ArgList); {message, Msg} -> ?t:format("Got message ~p", [Msg]), Parent ! Msg; {apply_res, To, Ref, Res} -> To ! {Ref, Res}; bye -> ?t:format("Ssl node ~s stopped.~n", [Name]), gen_tcp:close(Socket), exit(normal); Unknown -> exit({unexpected_message_from_ssl_node, Name, Unknown}) end; {tcp_closed, Socket} -> gen_tcp:close(Socket), exit({lost_connection_with_ssl_node, Name}) end, tstsrvr_con_loop(Name, Socket, Parent). %% %% Connection handler ssl_node side %% % cnct2tstsrvr() is called via command line arg -run ... cnct2tstsrvr([Host, Port]) when is_list(Host), is_list(Port) -> %% Spawn connection handler on ssl node side ConnHandler = spawn(fun () -> case catch gen_tcp:connect(Host, list_to_integer(Port), [binary, {packet, 4}, {active, false}]) of {ok, Socket} -> notify_ssl_node_up(Socket), ets:new(test_server_info, [set, public, named_table, {keypos, 1}]), ets:insert(test_server_info, {test_server_handler, self()}), ssl_node_con_loop(Socket); Error -> halt("Failed to connect to test server " ++ lists:flatten(io_lib:format("Host:~p ~n Port:~p~n Error:~p~n", [Host, Port, Error]))) end end), spawn(fun () -> Mon = erlang:monitor(process, ConnHandler), receive {'DOWN', Mon, process, ConnHandler, Reason} -> receive after 1000 -> ok end, halt("test server connection handler terminated: " ++ lists:flatten(io_lib:format("~p", [Reason]))) end end). notify_ssl_node_up(Socket) -> case catch gen_tcp:send(Socket, term_to_binary({ssl_node_up, node()})) of ok -> ok; _ -> halt("Failed to notify test server that I'm up") end. send_to_tstsrvr(Term) -> case catch ets:lookup_element(test_server_info, test_server_handler, 2) of Hndlr when is_pid(Hndlr) -> Hndlr ! {relay_to_test_server, term_to_binary(Term)}, ok; _ -> receive after 200 -> ok end, send_to_tstsrvr(Term) end. ssl_node_con_loop(Socket) -> inet:setopts(Socket,[{active,once}]), receive {relay_to_test_server, Data} when is_binary(Data) -> case gen_tcp:send(Socket, Data) of ok -> ok; _Error -> gen_tcp:close(Socket), halt("Failed to relay data to test server") end; {tcp, Socket, Bin} -> case catch binary_to_term(Bin) of {'EXIT', _} -> gen_tcp:close(Socket), halt("test server sent me bad data"); {apply, From, Ref, M, F, A} -> spawn_link( fun () -> send_to_tstsrvr({apply_res, From, Ref, (catch apply(M, F, A))}) end); {apply, From, Ref, Fun} -> spawn_link(fun () -> send_to_tstsrvr({apply_res, From, Ref, (catch Fun())}) end); stop -> gen_tcp:send(Socket, term_to_binary(bye)), gen_tcp:close(Socket), init:stop(), receive after infinity -> ok end; _Unknown -> halt("test server sent me an unexpected message") end; {tcp_closed, Socket} -> halt("Lost connection to test server") end, ssl_node_con_loop(Socket). %% %% Setup ssl dist info %% rand_bin(N) -> rand_bin(N, []). rand_bin(0, Acc) -> Acc; rand_bin(N, Acc) -> rand_bin(N-1, [random:uniform(256)-1|Acc]). make_randfile(Dir) -> {ok, IoDev} = file:open(filename:join([Dir, "RAND"]), [write]), {A, B, C} = erlang:now(), random:seed(A, B, C), ok = file:write(IoDev, rand_bin(1024)), file:close(IoDev). append_files(FileNames, ResultFileName) -> {ok, ResultFile} = file:open(ResultFileName, [write]), do_append_files(FileNames, ResultFile). do_append_files([], RF) -> ok = file:close(RF); do_append_files([F|Fs], RF) -> {ok, Data} = file:read_file(F), ok = file:write(RF, Data), do_append_files(Fs, RF). setup_certs(Config) -> PrivDir = ?config(priv_dir, Config), NodeDir = filename:join([PrivDir, "Certs"]), RGenDir = filename:join([NodeDir, "rand_gen"]), ok = file:make_dir(NodeDir), ok = file:make_dir(RGenDir), make_randfile(RGenDir), {ok, _} = make_certs:all(RGenDir, NodeDir), SDir = filename:join([NodeDir, "server"]), SC = filename:join([SDir, "cert.pem"]), SK = filename:join([SDir, "key.pem"]), SKC = filename:join([SDir, "keycert.pem"]), append_files([SK, SC], SKC), CDir = filename:join([NodeDir, "client"]), CC = filename:join([CDir, "cert.pem"]), CK = filename:join([CDir, "key.pem"]), CKC = filename:join([CDir, "keycert.pem"]), append_files([CK, CC], CKC). setup_dist_opts(Config) -> PrivDir = ?config(priv_dir, Config), DataDir = ?config(data_dir, Config), Dhfile = filename:join([DataDir, "dHParam.pem"]), NodeDir = filename:join([PrivDir, "Certs"]), SDir = filename:join([NodeDir, "server"]), CDir = filename:join([NodeDir, "client"]), SC = filename:join([SDir, "cert.pem"]), SK = filename:join([SDir, "key.pem"]), SKC = filename:join([SDir, "keycert.pem"]), SCA = filename:join([CDir, "cacerts.pem"]), CC = filename:join([CDir, "cert.pem"]), CK = filename:join([CDir, "key.pem"]), CKC = filename:join([CDir, "keycert.pem"]), CCA = filename:join([SDir, "cacerts.pem"]), DistOpts = case proplists:get_value(many_verify_opts, Config, false) of false -> "-proto_dist inet_tls " ++ "-ssl_dist_opt server_certfile " ++ SKC ++ " " ++ "-ssl_dist_opt client_certfile " ++ CKC ++ " "; true -> case os:type() of {win32, _} -> "-proto_dist inet_tls " ++ "-ssl_dist_opt server_certfile " ++ SKC ++ " " ++ "-ssl_dist_opt server_cacertfile " ++ SCA ++ " " ++ "-ssl_dist_opt server_verify verify_peer " ++ "-ssl_dist_opt server_fail_if_no_peer_cert true " ++ "-ssl_dist_opt server_ciphers DHE-RSA-AES256-SHA\:DHE-RSA-AES128-SHA " ++ "-ssl_dist_opt server_dhfile " ++ Dhfile ++ " " ++ "-ssl_dist_opt client_certfile " ++ CKC ++ " " ++ "-ssl_dist_opt client_cacertfile " ++ CCA ++ " " ++ "-ssl_dist_opt client_verify verify_peer " ++ "-ssl_dist_opt client_ciphers DHE-RSA-AES256-SHA\:DHE-RSA-AES128-SHA "; _ -> "-proto_dist inet_tls " ++ "-ssl_dist_opt server_certfile " ++ SC ++ " " ++ "-ssl_dist_opt server_keyfile " ++ SK ++ " " ++ "-ssl_dist_opt server_cacertfile " ++ SCA ++ " " ++ "-ssl_dist_opt server_verify verify_peer " ++ "-ssl_dist_opt server_fail_if_no_peer_cert true " ++ "-ssl_dist_opt server_ciphers DHE-RSA-AES256-SHA\:DHE-RSA-AES128-SHA " ++ "-ssl_dist_opt server_dhfile " ++ Dhfile ++ " " ++ "-ssl_dist_opt client_certfile " ++ CC ++ " " ++ "-ssl_dist_opt client_keyfile " ++ CK ++ " " ++ "-ssl_dist_opt client_cacertfile " ++ CCA ++ " " ++ "-ssl_dist_opt client_verify verify_peer " ++ "-ssl_dist_opt client_ciphers DHE-RSA-AES256-SHA\:DHE-RSA-AES128-SHA " end end, MoreOpts = proplists:get_value(additional_dist_opts, Config, []), DistOpts ++ MoreOpts. %% %% Start scripts etc... %% add_ssl_opts_config(Config) -> %% %% Start with boot scripts if on an installed system; otherwise, %% just point out ssl ebin with -pa. %% try Dir = ?config(priv_dir, Config), LibDir = code:lib_dir(), Apps = application:which_applications(), {value, {stdlib, _, STDL_VSN}} = lists:keysearch(stdlib, 1, Apps), {value, {kernel, _, KRNL_VSN}} = lists:keysearch(kernel, 1, Apps), StdlDir = filename:join([LibDir, "stdlib-" ++ STDL_VSN]), KrnlDir = filename:join([LibDir, "kernel-" ++ KRNL_VSN]), {ok, _} = file:read_file_info(StdlDir), {ok, _} = file:read_file_info(KrnlDir), SSL_VSN = vsn(ssl), VSN_CRYPTO = vsn(crypto), VSN_PKEY = vsn(public_key), SslDir = filename:join([LibDir, "ssl-" ++ SSL_VSN]), {ok, _} = file:read_file_info(SslDir), %% We are using an installed otp system, create the boot script. Script = filename:join(Dir, atom_to_list(?MODULE)), {ok, RelFile} = file:open(Script ++ ".rel", [write]), io:format(RelFile, "{release, ~n" " {\"SSL distribution test release\", \"~s\"},~n" " {erts, \"~s\"},~n" " [{kernel, \"~s\"},~n" " {stdlib, \"~s\"},~n" " {crypto, \"~s\"},~n" " {public_key, \"~s\"},~n" " {ssl, \"~s\"}]}.~n", [case catch erlang:system_info(otp_release) of {'EXIT', _} -> "R11B"; Rel -> Rel end, erlang:system_info(version), KRNL_VSN, STDL_VSN, VSN_CRYPTO, VSN_PKEY, SSL_VSN]), ok = file:close(RelFile), ok = systools:make_script(Script, []), [{ssl_opts, "-boot " ++ Script} | Config] catch _:_ -> [{ssl_opts, "-pa \"" ++ filename:dirname(code:which(ssl))++"\""} | add_comment_config( "Bootscript wasn't used since the test wasn't run on an " "installed OTP system.", Config)] end. %% %% Add common comments to config %% add_comment_config(Comment, []) -> [{comment, Comment}]; add_comment_config(Comment, [{comment, OldComment} | Cs]) -> [{comment, Comment ++ " " ++ OldComment} | Cs]; add_comment_config(Comment, [C|Cs]) -> [C|add_comment_config(Comment, Cs)]. %% %% Call when test case success %% success(Config) -> case lists:keysearch(comment, 1, Config) of {value, {comment, _} = Res} -> Res; _ -> ok end. vsn(App) -> application:start(App), try {value, {ssl, _, VSN}} = lists:keysearch(App, 1, application:which_applications()), VSN after application:stop(ssl) end.