mirror of
https://github.com/openjdk/jdk.git
synced 2025-09-22 12:04:39 +02:00
8217429: WebSocket over authenticating proxy fails to send Upgrade headers
Reviewed-by: dfuchs, prappo
This commit is contained in:
parent
ef07b1b314
commit
46f4ab603b
8 changed files with 724 additions and 50 deletions
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2015, 2018, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2015, 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -43,6 +43,7 @@ import java.net.http.HttpHeaders;
|
||||||
import java.net.http.HttpRequest;
|
import java.net.http.HttpRequest;
|
||||||
import jdk.internal.net.http.common.HttpHeadersBuilder;
|
import jdk.internal.net.http.common.HttpHeadersBuilder;
|
||||||
import jdk.internal.net.http.common.Utils;
|
import jdk.internal.net.http.common.Utils;
|
||||||
|
import jdk.internal.net.http.websocket.OpeningHandshake;
|
||||||
import jdk.internal.net.http.websocket.WebSocketRequest;
|
import jdk.internal.net.http.websocket.WebSocketRequest;
|
||||||
|
|
||||||
import static jdk.internal.net.http.common.Utils.ALLOWED_HEADERS;
|
import static jdk.internal.net.http.common.Utils.ALLOWED_HEADERS;
|
||||||
|
@ -157,7 +158,11 @@ public class HttpRequestImpl extends HttpRequest implements WebSocketRequest {
|
||||||
|
|
||||||
/** Returns a new instance suitable for authentication. */
|
/** Returns a new instance suitable for authentication. */
|
||||||
public static HttpRequestImpl newInstanceForAuthentication(HttpRequestImpl other) {
|
public static HttpRequestImpl newInstanceForAuthentication(HttpRequestImpl other) {
|
||||||
return new HttpRequestImpl(other.uri(), other.method(), other);
|
HttpRequestImpl request = new HttpRequestImpl(other.uri(), other.method(), other);
|
||||||
|
if (request.isWebSocket()) {
|
||||||
|
Utils.setWebSocketUpgradeHeaders(request);
|
||||||
|
}
|
||||||
|
return request;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -263,6 +263,15 @@ public final class Utils {
|
||||||
: ! PROXY_AUTH_DISABLED_SCHEMES.isEmpty();
|
: ! PROXY_AUTH_DISABLED_SCHEMES.isEmpty();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// WebSocket connection Upgrade headers
|
||||||
|
private static final String HEADER_CONNECTION = "Connection";
|
||||||
|
private static final String HEADER_UPGRADE = "Upgrade";
|
||||||
|
|
||||||
|
public static final void setWebSocketUpgradeHeaders(HttpRequestImpl request) {
|
||||||
|
request.setSystemHeader(HEADER_UPGRADE, "websocket");
|
||||||
|
request.setSystemHeader(HEADER_CONNECTION, "Upgrade");
|
||||||
|
}
|
||||||
|
|
||||||
public static IllegalArgumentException newIAE(String message, Object... args) {
|
public static IllegalArgumentException newIAE(String message, Object... args) {
|
||||||
return new IllegalArgumentException(format(message, args));
|
return new IllegalArgumentException(format(message, args));
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2015, 2018, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2015, 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -143,8 +143,7 @@ public class OpeningHandshake {
|
||||||
requestBuilder.version(Version.HTTP_1_1).GET();
|
requestBuilder.version(Version.HTTP_1_1).GET();
|
||||||
request = requestBuilder.buildForWebSocket();
|
request = requestBuilder.buildForWebSocket();
|
||||||
request.isWebSocket(true);
|
request.isWebSocket(true);
|
||||||
request.setSystemHeader(HEADER_UPGRADE, "websocket");
|
Utils.setWebSocketUpgradeHeaders(request);
|
||||||
request.setSystemHeader(HEADER_CONNECTION, "Upgrade");
|
|
||||||
request.setProxy(proxy);
|
request.setProxy(proxy);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2015, 2018, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2015, 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -25,6 +25,9 @@ import java.net.*;
|
||||||
import java.io.*;
|
import java.io.*;
|
||||||
import java.util.*;
|
import java.util.*;
|
||||||
import java.security.*;
|
import java.security.*;
|
||||||
|
import static java.nio.charset.StandardCharsets.UTF_8;
|
||||||
|
import static java.util.Arrays.asList;
|
||||||
|
import static java.util.stream.Collectors.toList;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A minimal proxy server that supports CONNECT tunneling. It does not do
|
* A minimal proxy server that supports CONNECT tunneling. It does not do
|
||||||
|
@ -37,6 +40,18 @@ public class ProxyServer extends Thread implements Closeable {
|
||||||
ServerSocket listener;
|
ServerSocket listener;
|
||||||
int port;
|
int port;
|
||||||
volatile boolean debug;
|
volatile boolean debug;
|
||||||
|
private final Credentials credentials; // may be null
|
||||||
|
|
||||||
|
private static class Credentials {
|
||||||
|
private final String name;
|
||||||
|
private final String password;
|
||||||
|
private Credentials(String name, String password) {
|
||||||
|
this.name = name;
|
||||||
|
this.password = password;
|
||||||
|
}
|
||||||
|
public String name() { return name; }
|
||||||
|
public String password() { return password; }
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Create proxy on port (zero means don't care). Call getPort()
|
* Create proxy on port (zero means don't care). Call getPort()
|
||||||
|
@ -46,19 +61,42 @@ public class ProxyServer extends Thread implements Closeable {
|
||||||
this(port, false);
|
this(port, false);
|
||||||
}
|
}
|
||||||
|
|
||||||
public ProxyServer(Integer port, Boolean debug) throws IOException {
|
public ProxyServer(Integer port,
|
||||||
|
Boolean debug,
|
||||||
|
String username,
|
||||||
|
String password)
|
||||||
|
throws IOException
|
||||||
|
{
|
||||||
|
this(port, debug, new Credentials(username, password));
|
||||||
|
}
|
||||||
|
|
||||||
|
public ProxyServer(Integer port,
|
||||||
|
Boolean debug)
|
||||||
|
throws IOException
|
||||||
|
{
|
||||||
|
this(port, debug, null);
|
||||||
|
}
|
||||||
|
|
||||||
|
public ProxyServer(Integer port,
|
||||||
|
Boolean debug,
|
||||||
|
Credentials credentials)
|
||||||
|
throws IOException
|
||||||
|
{
|
||||||
this.debug = debug;
|
this.debug = debug;
|
||||||
listener = new ServerSocket();
|
listener = new ServerSocket();
|
||||||
listener.setReuseAddress(false);
|
listener.setReuseAddress(false);
|
||||||
listener.bind(new InetSocketAddress(InetAddress.getLoopbackAddress(), port));
|
listener.bind(new InetSocketAddress(InetAddress.getLoopbackAddress(), port));
|
||||||
this.port = listener.getLocalPort();
|
this.port = listener.getLocalPort();
|
||||||
|
this.credentials = credentials;
|
||||||
setName("ProxyListener");
|
setName("ProxyListener");
|
||||||
setDaemon(true);
|
setDaemon(true);
|
||||||
connections = new LinkedList<>();
|
connections = new LinkedList<>();
|
||||||
start();
|
start();
|
||||||
}
|
}
|
||||||
|
|
||||||
public ProxyServer(String s) { }
|
public ProxyServer(String s) {
|
||||||
|
credentials = null;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the port number this proxy is listening on
|
* Returns the port number this proxy is listening on
|
||||||
|
@ -194,16 +232,69 @@ public class ProxyServer extends Thread implements Closeable {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Checks credentials in the request against those allowable by the proxy.
|
||||||
|
private boolean authorized(Credentials credentials,
|
||||||
|
List<String> requestHeaders) {
|
||||||
|
List<String> authorization = requestHeaders.stream()
|
||||||
|
.filter(n -> n.toLowerCase(Locale.US).startsWith("proxy-authorization"))
|
||||||
|
.collect(toList());
|
||||||
|
|
||||||
|
if (authorization.isEmpty())
|
||||||
|
return false;
|
||||||
|
|
||||||
|
if (authorization.size() != 1) {
|
||||||
|
throw new IllegalStateException("Authorization unexpected count:" + authorization);
|
||||||
|
}
|
||||||
|
String value = authorization.get(0).substring("proxy-authorization".length()).trim();
|
||||||
|
if (!value.startsWith(":"))
|
||||||
|
throw new IllegalStateException("Authorization malformed: " + value);
|
||||||
|
value = value.substring(1).trim();
|
||||||
|
|
||||||
|
if (!value.startsWith("Basic "))
|
||||||
|
throw new IllegalStateException("Authorization not Basic: " + value);
|
||||||
|
|
||||||
|
value = value.substring("Basic ".length());
|
||||||
|
String values = new String(Base64.getDecoder().decode(value), UTF_8);
|
||||||
|
int sep = values.indexOf(':');
|
||||||
|
if (sep < 1) {
|
||||||
|
throw new IllegalStateException("Authorization no colon: " + values);
|
||||||
|
}
|
||||||
|
String name = values.substring(0, sep);
|
||||||
|
String password = values.substring(sep + 1);
|
||||||
|
|
||||||
|
if (name.equals(credentials.name()) && password.equals(credentials.password()))
|
||||||
|
return true;
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
public void init() {
|
public void init() {
|
||||||
try {
|
try {
|
||||||
byte[] buf = readHeaders(clientIn);
|
byte[] buf;
|
||||||
int p = findCRLF(buf);
|
while (true) {
|
||||||
if (p == -1) {
|
buf = readHeaders(clientIn);
|
||||||
close();
|
if (findCRLF(buf) == -1) {
|
||||||
return;
|
close();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
List<String> headers = asList(new String(buf, UTF_8).split("\r\n"));
|
||||||
|
// check authorization credentials, if required by the server
|
||||||
|
if (credentials != null && !authorized(credentials, headers)) {
|
||||||
|
String resp = "HTTP/1.1 407 Proxy Authentication Required\r\n" +
|
||||||
|
"Content-Length: 0\r\n" +
|
||||||
|
"Proxy-Authenticate: Basic realm=\"proxy realm\"\r\n\r\n";
|
||||||
|
|
||||||
|
clientOut.write(resp.getBytes(UTF_8));
|
||||||
|
} else {
|
||||||
|
break;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int p = findCRLF(buf);
|
||||||
String cmd = new String(buf, 0, p, "US-ASCII");
|
String cmd = new String(buf, 0, p, "US-ASCII");
|
||||||
String[] params = cmd.split(" ");
|
String[] params = cmd.split(" ");
|
||||||
|
|
||||||
if (params[0].equals("CONNECT")) {
|
if (params[0].equals("CONNECT")) {
|
||||||
doTunnel(params[1]);
|
doTunnel(params[1]);
|
||||||
} else {
|
} else {
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2016, 2018, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2016, 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -46,13 +46,14 @@ import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.concurrent.CountDownLatch;
|
import java.util.concurrent.CountDownLatch;
|
||||||
import java.util.concurrent.atomic.AtomicBoolean;
|
import java.util.concurrent.atomic.AtomicBoolean;
|
||||||
import java.util.function.Function;
|
import java.util.function.BiFunction;
|
||||||
import java.util.regex.Pattern;
|
import java.util.regex.Pattern;
|
||||||
import java.util.stream.Collectors;
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
import static java.lang.String.format;
|
import static java.lang.String.format;
|
||||||
import static java.lang.System.err;
|
import static java.lang.System.err;
|
||||||
import static java.nio.charset.StandardCharsets.ISO_8859_1;
|
import static java.nio.charset.StandardCharsets.ISO_8859_1;
|
||||||
|
import static java.nio.charset.StandardCharsets.UTF_8;
|
||||||
import static java.util.Arrays.asList;
|
import static java.util.Arrays.asList;
|
||||||
import static java.util.Objects.requireNonNull;
|
import static java.util.Objects.requireNonNull;
|
||||||
|
|
||||||
|
@ -92,12 +93,32 @@ public class DummyWebSocketServer implements Closeable {
|
||||||
private ByteBuffer read = ByteBuffer.allocate(16384);
|
private ByteBuffer read = ByteBuffer.allocate(16384);
|
||||||
private final CountDownLatch readReady = new CountDownLatch(1);
|
private final CountDownLatch readReady = new CountDownLatch(1);
|
||||||
|
|
||||||
public DummyWebSocketServer() {
|
private static class Credentials {
|
||||||
this(defaultMapping());
|
private final String name;
|
||||||
|
private final String password;
|
||||||
|
private Credentials(String name, String password) {
|
||||||
|
this.name = name;
|
||||||
|
this.password = password;
|
||||||
|
}
|
||||||
|
public String name() { return name; }
|
||||||
|
public String password() { return password; }
|
||||||
}
|
}
|
||||||
|
|
||||||
public DummyWebSocketServer(Function<List<String>, List<String>> mapping) {
|
public DummyWebSocketServer() {
|
||||||
|
this(defaultMapping(), null, null);
|
||||||
|
}
|
||||||
|
|
||||||
|
public DummyWebSocketServer(String username, String password) {
|
||||||
|
this(defaultMapping(), username, password);
|
||||||
|
}
|
||||||
|
|
||||||
|
public DummyWebSocketServer(BiFunction<List<String>,Credentials,List<String>> mapping,
|
||||||
|
String username,
|
||||||
|
String password) {
|
||||||
requireNonNull(mapping);
|
requireNonNull(mapping);
|
||||||
|
Credentials credentials = username != null ?
|
||||||
|
new Credentials(username, password) : null;
|
||||||
|
|
||||||
thread = new Thread(() -> {
|
thread = new Thread(() -> {
|
||||||
try {
|
try {
|
||||||
while (!Thread.currentThread().isInterrupted()) {
|
while (!Thread.currentThread().isInterrupted()) {
|
||||||
|
@ -107,14 +128,23 @@ public class DummyWebSocketServer implements Closeable {
|
||||||
try {
|
try {
|
||||||
channel.setOption(StandardSocketOptions.TCP_NODELAY, true);
|
channel.setOption(StandardSocketOptions.TCP_NODELAY, true);
|
||||||
channel.configureBlocking(true);
|
channel.configureBlocking(true);
|
||||||
StringBuilder request = new StringBuilder();
|
while (true) {
|
||||||
if (!readRequest(channel, request)) {
|
StringBuilder request = new StringBuilder();
|
||||||
throw new IOException("Bad request:" + request);
|
if (!readRequest(channel, request)) {
|
||||||
|
throw new IOException("Bad request:[" + request + "]");
|
||||||
|
}
|
||||||
|
List<String> strings = asList(request.toString().split("\r\n"));
|
||||||
|
List<String> response = mapping.apply(strings, credentials);
|
||||||
|
writeResponse(channel, response);
|
||||||
|
|
||||||
|
if (response.get(0).startsWith("HTTP/1.1 401")) {
|
||||||
|
err.println("Sent 401 Authentication response " + channel);
|
||||||
|
continue;
|
||||||
|
} else {
|
||||||
|
serve(channel);
|
||||||
|
break;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
List<String> strings = asList(request.toString().split("\r\n"));
|
|
||||||
List<String> response = mapping.apply(strings);
|
|
||||||
writeResponse(channel, response);
|
|
||||||
serve(channel);
|
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
err.println("Error in connection: " + channel + ", " + e);
|
err.println("Error in connection: " + channel + ", " + e);
|
||||||
} finally {
|
} finally {
|
||||||
|
@ -125,7 +155,7 @@ public class DummyWebSocketServer implements Closeable {
|
||||||
}
|
}
|
||||||
} catch (ClosedByInterruptException ignored) {
|
} catch (ClosedByInterruptException ignored) {
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
err.println(e);
|
e.printStackTrace(err);
|
||||||
} finally {
|
} finally {
|
||||||
close(ssc);
|
close(ssc);
|
||||||
err.println("Stopped at: " + getURI());
|
err.println("Stopped at: " + getURI());
|
||||||
|
@ -256,8 +286,8 @@ public class DummyWebSocketServer implements Closeable {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private static Function<List<String>, List<String>> defaultMapping() {
|
private static BiFunction<List<String>,Credentials,List<String>> defaultMapping() {
|
||||||
return request -> {
|
return (request, credentials) -> {
|
||||||
List<String> response = new LinkedList<>();
|
List<String> response = new LinkedList<>();
|
||||||
Iterator<String> iterator = request.iterator();
|
Iterator<String> iterator = request.iterator();
|
||||||
if (!iterator.hasNext()) {
|
if (!iterator.hasNext()) {
|
||||||
|
@ -309,14 +339,57 @@ public class DummyWebSocketServer implements Closeable {
|
||||||
sha1.update(x.getBytes(ISO_8859_1));
|
sha1.update(x.getBytes(ISO_8859_1));
|
||||||
String v = Base64.getEncoder().encodeToString(sha1.digest());
|
String v = Base64.getEncoder().encodeToString(sha1.digest());
|
||||||
response.add("Sec-WebSocket-Accept: " + v);
|
response.add("Sec-WebSocket-Accept: " + v);
|
||||||
|
|
||||||
|
// check authorization credentials, if required by the server
|
||||||
|
if (credentials != null && !authorized(credentials, requestHeaders)) {
|
||||||
|
response.clear();
|
||||||
|
response.add("HTTP/1.1 401 Unauthorized");
|
||||||
|
response.add("Content-Length: 0");
|
||||||
|
response.add("WWW-Authenticate: Basic realm=\"dummy server realm\"");
|
||||||
|
}
|
||||||
|
|
||||||
return response;
|
return response;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Checks credentials in the request against those allowable by the server.
|
||||||
|
private static boolean authorized(Credentials credentials,
|
||||||
|
Map<String,List<String>> requestHeaders) {
|
||||||
|
List<String> authorization = requestHeaders.get("Authorization");
|
||||||
|
if (authorization == null)
|
||||||
|
return false;
|
||||||
|
|
||||||
|
if (authorization.size() != 1) {
|
||||||
|
throw new IllegalStateException("Authorization unexpected count:" + authorization);
|
||||||
|
}
|
||||||
|
String header = authorization.get(0);
|
||||||
|
if (!header.startsWith("Basic "))
|
||||||
|
throw new IllegalStateException("Authorization not Basic: " + header);
|
||||||
|
|
||||||
|
header = header.substring("Basic ".length());
|
||||||
|
String values = new String(Base64.getDecoder().decode(header), UTF_8);
|
||||||
|
int sep = values.indexOf(':');
|
||||||
|
if (sep < 1) {
|
||||||
|
throw new IllegalStateException("Authorization not colon: " + values);
|
||||||
|
}
|
||||||
|
String name = values.substring(0, sep);
|
||||||
|
String password = values.substring(sep + 1);
|
||||||
|
|
||||||
|
if (name.equals(credentials.name()) && password.equals(credentials.password()))
|
||||||
|
return true;
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
protected static String expectHeader(Map<String, List<String>> headers,
|
protected static String expectHeader(Map<String, List<String>> headers,
|
||||||
String name,
|
String name,
|
||||||
String value) {
|
String value) {
|
||||||
List<String> v = headers.get(name);
|
List<String> v = headers.get(name);
|
||||||
|
if (v == null) {
|
||||||
|
throw new IllegalStateException(
|
||||||
|
format("Expected '%s' header, not present in %s",
|
||||||
|
name, headers));
|
||||||
|
}
|
||||||
if (!v.contains(value)) {
|
if (!v.contains(value)) {
|
||||||
throw new IllegalStateException(
|
throw new IllegalStateException(
|
||||||
format("Expected '%s: %s', actual: '%s: %s'",
|
format("Expected '%s: %s', actual: '%s: %s'",
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2018, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2018, 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -79,16 +79,32 @@ public class Support {
|
||||||
}
|
}
|
||||||
|
|
||||||
public static DummyWebSocketServer serverWithCannedData(int... data) {
|
public static DummyWebSocketServer serverWithCannedData(int... data) {
|
||||||
|
return serverWithCannedDataAndAuthentication(null, null, data);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static DummyWebSocketServer serverWithCannedDataAndAuthentication(
|
||||||
|
String username,
|
||||||
|
String password,
|
||||||
|
int... data)
|
||||||
|
{
|
||||||
byte[] copy = new byte[data.length];
|
byte[] copy = new byte[data.length];
|
||||||
for (int i = 0; i < data.length; i++) {
|
for (int i = 0; i < data.length; i++) {
|
||||||
copy[i] = (byte) data[i];
|
copy[i] = (byte) data[i];
|
||||||
}
|
}
|
||||||
return serverWithCannedData(copy);
|
return serverWithCannedDataAndAuthentication(username, password, copy);
|
||||||
}
|
}
|
||||||
|
|
||||||
public static DummyWebSocketServer serverWithCannedData(byte... data) {
|
public static DummyWebSocketServer serverWithCannedData(byte... data) {
|
||||||
|
return serverWithCannedDataAndAuthentication(null, null, data);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static DummyWebSocketServer serverWithCannedDataAndAuthentication(
|
||||||
|
String username,
|
||||||
|
String password,
|
||||||
|
byte... data)
|
||||||
|
{
|
||||||
byte[] copy = Arrays.copyOf(data, data.length);
|
byte[] copy = Arrays.copyOf(data, data.length);
|
||||||
return new DummyWebSocketServer() {
|
return new DummyWebSocketServer(username, password) {
|
||||||
@Override
|
@Override
|
||||||
protected void write(SocketChannel ch) throws IOException {
|
protected void write(SocketChannel ch) throws IOException {
|
||||||
int off = 0; int n = 1; // 1 byte at a time
|
int off = 0; int n = 1; // 1 byte at a time
|
||||||
|
|
309
test/jdk/java/net/httpclient/websocket/WebSocketProxyTest.java
Normal file
309
test/jdk/java/net/httpclient/websocket/WebSocketProxyTest.java
Normal file
|
@ -0,0 +1,309 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
|
*
|
||||||
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU General Public License version 2 only, as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||||
|
* version 2 for more details (a copy is included in the LICENSE file that
|
||||||
|
* accompanied this code).
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License version
|
||||||
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||||
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
|
*
|
||||||
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||||
|
* or visit www.oracle.com if you need additional information or have any
|
||||||
|
* questions.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* @test
|
||||||
|
* @bug 8217429
|
||||||
|
* @summary WebSocket proxy tunneling tests
|
||||||
|
* @compile DummyWebSocketServer.java ../ProxyServer.java
|
||||||
|
* @run testng/othervm
|
||||||
|
* -Djdk.http.auth.tunneling.disabledSchemes=
|
||||||
|
* WebSocketProxyTest
|
||||||
|
*/
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.io.UncheckedIOException;
|
||||||
|
import java.net.Authenticator;
|
||||||
|
import java.net.InetAddress;
|
||||||
|
import java.net.InetSocketAddress;
|
||||||
|
import java.net.PasswordAuthentication;
|
||||||
|
import java.net.ProxySelector;
|
||||||
|
import java.net.http.HttpResponse;
|
||||||
|
import java.net.http.WebSocket;
|
||||||
|
import java.net.http.WebSocketHandshakeException;
|
||||||
|
import java.nio.ByteBuffer;
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Base64;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.concurrent.CompletableFuture;
|
||||||
|
import java.util.concurrent.CompletionException;
|
||||||
|
import java.util.concurrent.CompletionStage;
|
||||||
|
import java.util.function.Function;
|
||||||
|
import java.util.function.Supplier;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
import org.testng.annotations.DataProvider;
|
||||||
|
import org.testng.annotations.Test;
|
||||||
|
import static java.net.http.HttpClient.newBuilder;
|
||||||
|
import static java.nio.charset.StandardCharsets.UTF_8;
|
||||||
|
import static org.testng.Assert.assertEquals;
|
||||||
|
import static org.testng.FileAssert.fail;
|
||||||
|
|
||||||
|
public class WebSocketProxyTest {
|
||||||
|
|
||||||
|
// Used to verify a proxy/websocket server requiring Authentication
|
||||||
|
private static final String USERNAME = "wally";
|
||||||
|
private static final String PASSWORD = "xyz987";
|
||||||
|
|
||||||
|
static class WSAuthenticator extends Authenticator {
|
||||||
|
@Override
|
||||||
|
protected PasswordAuthentication getPasswordAuthentication() {
|
||||||
|
return new PasswordAuthentication(USERNAME, PASSWORD.toCharArray());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static final Function<int[],DummyWebSocketServer> SERVER_WITH_CANNED_DATA =
|
||||||
|
new Function<>() {
|
||||||
|
@Override public DummyWebSocketServer apply(int[] data) {
|
||||||
|
return Support.serverWithCannedData(data); }
|
||||||
|
@Override public String toString() { return "SERVER_WITH_CANNED_DATA"; }
|
||||||
|
};
|
||||||
|
|
||||||
|
static final Function<int[],DummyWebSocketServer> AUTH_SERVER_WITH_CANNED_DATA =
|
||||||
|
new Function<>() {
|
||||||
|
@Override public DummyWebSocketServer apply(int[] data) {
|
||||||
|
return Support.serverWithCannedDataAndAuthentication(USERNAME, PASSWORD, data); }
|
||||||
|
@Override public String toString() { return "AUTH_SERVER_WITH_CANNED_DATA"; }
|
||||||
|
};
|
||||||
|
|
||||||
|
static final Supplier<ProxyServer> TUNNELING_PROXY_SERVER =
|
||||||
|
new Supplier<>() {
|
||||||
|
@Override public ProxyServer get() {
|
||||||
|
try { return new ProxyServer(0, true);}
|
||||||
|
catch(IOException e) { throw new UncheckedIOException(e); } }
|
||||||
|
@Override public String toString() { return "TUNNELING_PROXY_SERVER"; }
|
||||||
|
};
|
||||||
|
static final Supplier<ProxyServer> AUTH_TUNNELING_PROXY_SERVER =
|
||||||
|
new Supplier<>() {
|
||||||
|
@Override public ProxyServer get() {
|
||||||
|
try { return new ProxyServer(0, true, USERNAME, PASSWORD);}
|
||||||
|
catch(IOException e) { throw new UncheckedIOException(e); } }
|
||||||
|
@Override public String toString() { return "AUTH_TUNNELING_PROXY_SERVER"; }
|
||||||
|
};
|
||||||
|
|
||||||
|
@DataProvider(name = "servers")
|
||||||
|
public Object[][] servers() {
|
||||||
|
return new Object[][] {
|
||||||
|
{ SERVER_WITH_CANNED_DATA, TUNNELING_PROXY_SERVER },
|
||||||
|
{ SERVER_WITH_CANNED_DATA, AUTH_TUNNELING_PROXY_SERVER },
|
||||||
|
{ AUTH_SERVER_WITH_CANNED_DATA, TUNNELING_PROXY_SERVER },
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(dataProvider = "servers")
|
||||||
|
public void simpleAggregatingBinaryMessages
|
||||||
|
(Function<int[],DummyWebSocketServer> serverSupplier,
|
||||||
|
Supplier<ProxyServer> proxyServerSupplier)
|
||||||
|
throws IOException
|
||||||
|
{
|
||||||
|
List<byte[]> expected = List.of("hello", "chegar")
|
||||||
|
.stream()
|
||||||
|
.map(s -> s.getBytes(StandardCharsets.US_ASCII))
|
||||||
|
.collect(Collectors.toList());
|
||||||
|
int[] binary = new int[]{
|
||||||
|
0x82, 0x05, 0x68, 0x65, 0x6C, 0x6C, 0x6F, // hello
|
||||||
|
0x82, 0x06, 0x63, 0x68, 0x65, 0x67, 0x61, 0x72, // chegar
|
||||||
|
0x88, 0x00 // <CLOSE>
|
||||||
|
};
|
||||||
|
CompletableFuture<List<byte[]>> actual = new CompletableFuture<>();
|
||||||
|
|
||||||
|
try (var proxyServer = proxyServerSupplier.get();
|
||||||
|
var server = serverSupplier.apply(binary)) {
|
||||||
|
|
||||||
|
InetSocketAddress proxyAddress = new InetSocketAddress(
|
||||||
|
InetAddress.getLoopbackAddress(), proxyServer.getPort());
|
||||||
|
server.open();
|
||||||
|
|
||||||
|
WebSocket.Listener listener = new WebSocket.Listener() {
|
||||||
|
|
||||||
|
List<byte[]> collectedBytes = new ArrayList<>();
|
||||||
|
ByteBuffer buffer = ByteBuffer.allocate(1024);
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public CompletionStage<?> onBinary(WebSocket webSocket,
|
||||||
|
ByteBuffer message,
|
||||||
|
boolean last) {
|
||||||
|
System.out.printf("onBinary(%s, %s)%n", message, last);
|
||||||
|
webSocket.request(1);
|
||||||
|
|
||||||
|
append(message);
|
||||||
|
if (last) {
|
||||||
|
buffer.flip();
|
||||||
|
byte[] bytes = new byte[buffer.remaining()];
|
||||||
|
buffer.get(bytes);
|
||||||
|
buffer.clear();
|
||||||
|
processWholeBinary(bytes);
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
private void append(ByteBuffer message) {
|
||||||
|
if (buffer.remaining() < message.remaining()) {
|
||||||
|
assert message.remaining() > 0;
|
||||||
|
int cap = (buffer.capacity() + message.remaining()) * 2;
|
||||||
|
ByteBuffer b = ByteBuffer.allocate(cap);
|
||||||
|
b.put(buffer.flip());
|
||||||
|
buffer = b;
|
||||||
|
}
|
||||||
|
buffer.put(message);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void processWholeBinary(byte[] bytes) {
|
||||||
|
String stringBytes = new String(bytes, UTF_8);
|
||||||
|
System.out.println("processWholeBinary: " + stringBytes);
|
||||||
|
collectedBytes.add(bytes);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public CompletionStage<?> onClose(WebSocket webSocket,
|
||||||
|
int statusCode,
|
||||||
|
String reason) {
|
||||||
|
actual.complete(collectedBytes);
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onError(WebSocket webSocket, Throwable error) {
|
||||||
|
actual.completeExceptionally(error);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
var webSocket = newBuilder()
|
||||||
|
.proxy(ProxySelector.of(proxyAddress))
|
||||||
|
.authenticator(new WSAuthenticator())
|
||||||
|
.build().newWebSocketBuilder()
|
||||||
|
.buildAsync(server.getURI(), listener)
|
||||||
|
.join();
|
||||||
|
|
||||||
|
List<byte[]> a = actual.join();
|
||||||
|
assertEquals(a, expected);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// -- authentication specific tests
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Ensures authentication succeeds when an Authenticator set on client builder.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void clientAuthenticate() throws IOException {
|
||||||
|
try (var proxyServer = AUTH_TUNNELING_PROXY_SERVER.get();
|
||||||
|
var server = new DummyWebSocketServer()){
|
||||||
|
server.open();
|
||||||
|
InetSocketAddress proxyAddress = new InetSocketAddress(
|
||||||
|
InetAddress.getLoopbackAddress(), proxyServer.getPort());
|
||||||
|
|
||||||
|
var webSocket = newBuilder()
|
||||||
|
.proxy(ProxySelector.of(proxyAddress))
|
||||||
|
.authenticator(new WSAuthenticator())
|
||||||
|
.build()
|
||||||
|
.newWebSocketBuilder()
|
||||||
|
.buildAsync(server.getURI(), new WebSocket.Listener() { })
|
||||||
|
.join();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Ensures authentication succeeds when an `Authorization` header is explicitly set.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void explicitAuthenticate() throws IOException {
|
||||||
|
try (var proxyServer = AUTH_TUNNELING_PROXY_SERVER.get();
|
||||||
|
var server = new DummyWebSocketServer()) {
|
||||||
|
server.open();
|
||||||
|
InetSocketAddress proxyAddress = new InetSocketAddress(
|
||||||
|
InetAddress.getLoopbackAddress(), proxyServer.getPort());
|
||||||
|
|
||||||
|
String hv = "Basic " + Base64.getEncoder().encodeToString(
|
||||||
|
(USERNAME + ":" + PASSWORD).getBytes(UTF_8));
|
||||||
|
|
||||||
|
var webSocket = newBuilder()
|
||||||
|
.proxy(ProxySelector.of(proxyAddress)).build()
|
||||||
|
.newWebSocketBuilder()
|
||||||
|
.header("Proxy-Authorization", hv)
|
||||||
|
.buildAsync(server.getURI(), new WebSocket.Listener() { })
|
||||||
|
.join();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Ensures authentication does not succeed when no authenticator is present.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void failNoAuthenticator() throws IOException {
|
||||||
|
try (var proxyServer = AUTH_TUNNELING_PROXY_SERVER.get();
|
||||||
|
var server = new DummyWebSocketServer(USERNAME, PASSWORD)) {
|
||||||
|
server.open();
|
||||||
|
InetSocketAddress proxyAddress = new InetSocketAddress(
|
||||||
|
InetAddress.getLoopbackAddress(), proxyServer.getPort());
|
||||||
|
|
||||||
|
CompletableFuture<WebSocket> cf = newBuilder()
|
||||||
|
.proxy(ProxySelector.of(proxyAddress)).build()
|
||||||
|
.newWebSocketBuilder()
|
||||||
|
.buildAsync(server.getURI(), new WebSocket.Listener() { });
|
||||||
|
|
||||||
|
try {
|
||||||
|
var webSocket = cf.join();
|
||||||
|
fail("Expected exception not thrown");
|
||||||
|
} catch (CompletionException expected) {
|
||||||
|
WebSocketHandshakeException e = (WebSocketHandshakeException)expected.getCause();
|
||||||
|
HttpResponse<?> response = e.getResponse();
|
||||||
|
assertEquals(response.statusCode(), 407);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Ensures authentication does not succeed when the authenticator presents
|
||||||
|
* unauthorized credentials.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void failBadCredentials() throws IOException {
|
||||||
|
try (var proxyServer = AUTH_TUNNELING_PROXY_SERVER.get();
|
||||||
|
var server = new DummyWebSocketServer(USERNAME, PASSWORD)) {
|
||||||
|
server.open();
|
||||||
|
InetSocketAddress proxyAddress = new InetSocketAddress(
|
||||||
|
InetAddress.getLoopbackAddress(), proxyServer.getPort());
|
||||||
|
|
||||||
|
Authenticator authenticator = new Authenticator() {
|
||||||
|
@Override protected PasswordAuthentication getPasswordAuthentication() {
|
||||||
|
return new PasswordAuthentication("BAD"+USERNAME, "".toCharArray());
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
CompletableFuture<WebSocket> cf = newBuilder()
|
||||||
|
.proxy(ProxySelector.of(proxyAddress))
|
||||||
|
.authenticator(authenticator)
|
||||||
|
.build()
|
||||||
|
.newWebSocketBuilder()
|
||||||
|
.buildAsync(server.getURI(), new WebSocket.Listener() { });
|
||||||
|
|
||||||
|
try {
|
||||||
|
var webSocket = cf.join();
|
||||||
|
fail("Expected exception not thrown");
|
||||||
|
} catch (CompletionException expected) {
|
||||||
|
System.out.println("caught expected exception:" + expected);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2018, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2018, 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
@ -23,6 +23,7 @@
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* @test
|
* @test
|
||||||
|
* @bug 8217429
|
||||||
* @build DummyWebSocketServer
|
* @build DummyWebSocketServer
|
||||||
* @run testng/othervm
|
* @run testng/othervm
|
||||||
* WebSocketTest
|
* WebSocketTest
|
||||||
|
@ -33,23 +34,32 @@ import org.testng.annotations.DataProvider;
|
||||||
import org.testng.annotations.Test;
|
import org.testng.annotations.Test;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
import java.net.Authenticator;
|
||||||
|
import java.net.PasswordAuthentication;
|
||||||
|
import java.net.http.HttpResponse;
|
||||||
import java.net.http.WebSocket;
|
import java.net.http.WebSocket;
|
||||||
|
import java.net.http.WebSocketHandshakeException;
|
||||||
import java.nio.ByteBuffer;
|
import java.nio.ByteBuffer;
|
||||||
import java.nio.charset.StandardCharsets;
|
import java.nio.charset.StandardCharsets;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
|
import java.util.Base64;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.concurrent.CompletableFuture;
|
import java.util.concurrent.CompletableFuture;
|
||||||
|
import java.util.concurrent.CompletionException;
|
||||||
import java.util.concurrent.CompletionStage;
|
import java.util.concurrent.CompletionStage;
|
||||||
import java.util.concurrent.TimeUnit;
|
import java.util.concurrent.TimeUnit;
|
||||||
import java.util.concurrent.atomic.AtomicBoolean;
|
import java.util.concurrent.atomic.AtomicBoolean;
|
||||||
|
import java.util.function.Function;
|
||||||
import java.util.function.Supplier;
|
import java.util.function.Supplier;
|
||||||
import java.util.stream.Collectors;
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
import static java.net.http.HttpClient.Builder.NO_PROXY;
|
import static java.net.http.HttpClient.Builder.NO_PROXY;
|
||||||
import static java.net.http.HttpClient.newBuilder;
|
import static java.net.http.HttpClient.newBuilder;
|
||||||
import static java.net.http.WebSocket.NORMAL_CLOSURE;
|
import static java.net.http.WebSocket.NORMAL_CLOSURE;
|
||||||
|
import static java.nio.charset.StandardCharsets.UTF_8;
|
||||||
import static org.testng.Assert.assertEquals;
|
import static org.testng.Assert.assertEquals;
|
||||||
import static org.testng.Assert.assertThrows;
|
import static org.testng.Assert.assertThrows;
|
||||||
|
import static org.testng.Assert.fail;
|
||||||
|
|
||||||
public class WebSocketTest {
|
public class WebSocketTest {
|
||||||
|
|
||||||
|
@ -68,8 +78,11 @@ public class WebSocketTest {
|
||||||
|
|
||||||
@AfterTest
|
@AfterTest
|
||||||
public void cleanup() {
|
public void cleanup() {
|
||||||
server.close();
|
System.out.println("AFTER TEST");
|
||||||
webSocket.abort();
|
if (server != null)
|
||||||
|
server.close();
|
||||||
|
if (webSocket != null)
|
||||||
|
webSocket.abort();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -134,6 +147,8 @@ public class WebSocketTest {
|
||||||
assertThrows(IAE, () -> webSocket.request(Long.MIN_VALUE));
|
assertThrows(IAE, () -> webSocket.request(Long.MIN_VALUE));
|
||||||
assertThrows(IAE, () -> webSocket.request(-1));
|
assertThrows(IAE, () -> webSocket.request(-1));
|
||||||
assertThrows(IAE, () -> webSocket.request(0));
|
assertThrows(IAE, () -> webSocket.request(0));
|
||||||
|
|
||||||
|
server.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -149,6 +164,7 @@ public class WebSocketTest {
|
||||||
// Pings & Pongs are fine
|
// Pings & Pongs are fine
|
||||||
webSocket.sendPing(ByteBuffer.allocate(125)).join();
|
webSocket.sendPing(ByteBuffer.allocate(125)).join();
|
||||||
webSocket.sendPong(ByteBuffer.allocate(125)).join();
|
webSocket.sendPong(ByteBuffer.allocate(125)).join();
|
||||||
|
server.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -165,6 +181,7 @@ public class WebSocketTest {
|
||||||
// Pings & Pongs are fine
|
// Pings & Pongs are fine
|
||||||
webSocket.sendPing(ByteBuffer.allocate(125)).join();
|
webSocket.sendPing(ByteBuffer.allocate(125)).join();
|
||||||
webSocket.sendPong(ByteBuffer.allocate(125)).join();
|
webSocket.sendPong(ByteBuffer.allocate(125)).join();
|
||||||
|
server.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -198,6 +215,8 @@ public class WebSocketTest {
|
||||||
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(124)));
|
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(124)));
|
||||||
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(1)));
|
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(1)));
|
||||||
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(0)));
|
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(0)));
|
||||||
|
|
||||||
|
server.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
@DataProvider(name = "sequence")
|
@DataProvider(name = "sequence")
|
||||||
|
@ -318,6 +337,8 @@ public class WebSocketTest {
|
||||||
listener.invocations();
|
listener.invocations();
|
||||||
violation.complete(null); // won't affect if completed exceptionally
|
violation.complete(null); // won't affect if completed exceptionally
|
||||||
violation.join();
|
violation.join();
|
||||||
|
|
||||||
|
server.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -372,10 +393,48 @@ public class WebSocketTest {
|
||||||
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(124)));
|
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(124)));
|
||||||
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(1)));
|
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(1)));
|
||||||
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(0)));
|
assertFails(IOE, webSocket.sendPong(ByteBuffer.allocate(0)));
|
||||||
|
|
||||||
|
server.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
// Used to verify a server requiring Authentication
|
||||||
public void simpleAggregatingBinaryMessages() throws IOException {
|
private static final String USERNAME = "chegar";
|
||||||
|
private static final String PASSWORD = "a1b2c3";
|
||||||
|
|
||||||
|
static class WSAuthenticator extends Authenticator {
|
||||||
|
@Override
|
||||||
|
protected PasswordAuthentication getPasswordAuthentication() {
|
||||||
|
return new PasswordAuthentication(USERNAME, PASSWORD.toCharArray());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static final Function<int[],DummyWebSocketServer> SERVER_WITH_CANNED_DATA =
|
||||||
|
new Function<>() {
|
||||||
|
@Override public DummyWebSocketServer apply(int[] data) {
|
||||||
|
return Support.serverWithCannedData(data); }
|
||||||
|
@Override public String toString() { return "SERVER_WITH_CANNED_DATA"; }
|
||||||
|
};
|
||||||
|
|
||||||
|
static final Function<int[],DummyWebSocketServer> AUTH_SERVER_WITH_CANNED_DATA =
|
||||||
|
new Function<>() {
|
||||||
|
@Override public DummyWebSocketServer apply(int[] data) {
|
||||||
|
return Support.serverWithCannedDataAndAuthentication(USERNAME, PASSWORD, data); }
|
||||||
|
@Override public String toString() { return "AUTH_SERVER_WITH_CANNED_DATA"; }
|
||||||
|
};
|
||||||
|
|
||||||
|
@DataProvider(name = "servers")
|
||||||
|
public Object[][] servers() {
|
||||||
|
return new Object[][] {
|
||||||
|
{ SERVER_WITH_CANNED_DATA },
|
||||||
|
{ AUTH_SERVER_WITH_CANNED_DATA },
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(dataProvider = "servers")
|
||||||
|
public void simpleAggregatingBinaryMessages
|
||||||
|
(Function<int[],DummyWebSocketServer> serverSupplier)
|
||||||
|
throws IOException
|
||||||
|
{
|
||||||
List<byte[]> expected = List.of("alpha", "beta", "gamma", "delta")
|
List<byte[]> expected = List.of("alpha", "beta", "gamma", "delta")
|
||||||
.stream()
|
.stream()
|
||||||
.map(s -> s.getBytes(StandardCharsets.US_ASCII))
|
.map(s -> s.getBytes(StandardCharsets.US_ASCII))
|
||||||
|
@ -399,7 +458,7 @@ public class WebSocketTest {
|
||||||
};
|
};
|
||||||
CompletableFuture<List<byte[]>> actual = new CompletableFuture<>();
|
CompletableFuture<List<byte[]>> actual = new CompletableFuture<>();
|
||||||
|
|
||||||
server = Support.serverWithCannedData(binary);
|
server = serverSupplier.apply(binary);
|
||||||
server.open();
|
server.open();
|
||||||
|
|
||||||
WebSocket.Listener listener = new WebSocket.Listener() {
|
WebSocket.Listener listener = new WebSocket.Listener() {
|
||||||
|
@ -437,7 +496,7 @@ public class WebSocketTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
private void processWholeBinary(byte[] bytes) {
|
private void processWholeBinary(byte[] bytes) {
|
||||||
String stringBytes = new String(bytes, StandardCharsets.UTF_8);
|
String stringBytes = new String(bytes, UTF_8);
|
||||||
System.out.println("processWholeBinary: " + stringBytes);
|
System.out.println("processWholeBinary: " + stringBytes);
|
||||||
collectedBytes.add(bytes);
|
collectedBytes.add(bytes);
|
||||||
}
|
}
|
||||||
|
@ -456,17 +515,24 @@ public class WebSocketTest {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
webSocket = newBuilder().proxy(NO_PROXY).build().newWebSocketBuilder()
|
webSocket = newBuilder()
|
||||||
|
.proxy(NO_PROXY)
|
||||||
|
.authenticator(new WSAuthenticator())
|
||||||
|
.build().newWebSocketBuilder()
|
||||||
.buildAsync(server.getURI(), listener)
|
.buildAsync(server.getURI(), listener)
|
||||||
.join();
|
.join();
|
||||||
|
|
||||||
List<byte[]> a = actual.join();
|
List<byte[]> a = actual.join();
|
||||||
assertEquals(a, expected);
|
assertEquals(a, expected);
|
||||||
|
|
||||||
|
server.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test(dataProvider = "servers")
|
||||||
public void simpleAggregatingTextMessages() throws IOException {
|
public void simpleAggregatingTextMessages
|
||||||
|
(Function<int[],DummyWebSocketServer> serverSupplier)
|
||||||
|
throws IOException
|
||||||
|
{
|
||||||
List<String> expected = List.of("alpha", "beta", "gamma", "delta");
|
List<String> expected = List.of("alpha", "beta", "gamma", "delta");
|
||||||
|
|
||||||
int[] binary = new int[]{
|
int[] binary = new int[]{
|
||||||
|
@ -488,7 +554,7 @@ public class WebSocketTest {
|
||||||
};
|
};
|
||||||
CompletableFuture<List<String>> actual = new CompletableFuture<>();
|
CompletableFuture<List<String>> actual = new CompletableFuture<>();
|
||||||
|
|
||||||
server = Support.serverWithCannedData(binary);
|
server = serverSupplier.apply(binary);
|
||||||
server.open();
|
server.open();
|
||||||
|
|
||||||
WebSocket.Listener listener = new WebSocket.Listener() {
|
WebSocket.Listener listener = new WebSocket.Listener() {
|
||||||
|
@ -530,21 +596,28 @@ public class WebSocketTest {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
webSocket = newBuilder().proxy(NO_PROXY).build().newWebSocketBuilder()
|
webSocket = newBuilder()
|
||||||
|
.proxy(NO_PROXY)
|
||||||
|
.authenticator(new WSAuthenticator())
|
||||||
|
.build().newWebSocketBuilder()
|
||||||
.buildAsync(server.getURI(), listener)
|
.buildAsync(server.getURI(), listener)
|
||||||
.join();
|
.join();
|
||||||
|
|
||||||
List<String> a = actual.join();
|
List<String> a = actual.join();
|
||||||
assertEquals(a, expected);
|
assertEquals(a, expected);
|
||||||
|
|
||||||
|
server.close();
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Exercises the scenario where requests for more messages are made prior to
|
* Exercises the scenario where requests for more messages are made prior to
|
||||||
* completing the returned CompletionStage instances.
|
* completing the returned CompletionStage instances.
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test(dataProvider = "servers")
|
||||||
public void aggregatingTextMessages() throws IOException {
|
public void aggregatingTextMessages
|
||||||
|
(Function<int[],DummyWebSocketServer> serverSupplier)
|
||||||
|
throws IOException
|
||||||
|
{
|
||||||
List<String> expected = List.of("alpha", "beta", "gamma", "delta");
|
List<String> expected = List.of("alpha", "beta", "gamma", "delta");
|
||||||
|
|
||||||
int[] binary = new int[]{
|
int[] binary = new int[]{
|
||||||
|
@ -566,8 +639,7 @@ public class WebSocketTest {
|
||||||
};
|
};
|
||||||
CompletableFuture<List<String>> actual = new CompletableFuture<>();
|
CompletableFuture<List<String>> actual = new CompletableFuture<>();
|
||||||
|
|
||||||
|
server = serverSupplier.apply(binary);
|
||||||
server = Support.serverWithCannedData(binary);
|
|
||||||
server.open();
|
server.open();
|
||||||
|
|
||||||
WebSocket.Listener listener = new WebSocket.Listener() {
|
WebSocket.Listener listener = new WebSocket.Listener() {
|
||||||
|
@ -623,11 +695,111 @@ public class WebSocketTest {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
webSocket = newBuilder().proxy(NO_PROXY).build().newWebSocketBuilder()
|
webSocket = newBuilder()
|
||||||
|
.proxy(NO_PROXY)
|
||||||
|
.authenticator(new WSAuthenticator())
|
||||||
|
.build().newWebSocketBuilder()
|
||||||
.buildAsync(server.getURI(), listener)
|
.buildAsync(server.getURI(), listener)
|
||||||
.join();
|
.join();
|
||||||
|
|
||||||
List<String> a = actual.join();
|
List<String> a = actual.join();
|
||||||
assertEquals(a, expected);
|
assertEquals(a, expected);
|
||||||
|
|
||||||
|
server.close();
|
||||||
|
}
|
||||||
|
|
||||||
|
// -- authentication specific tests
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Ensures authentication succeeds when an Authenticator set on client builder.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void clientAuthenticate() throws IOException {
|
||||||
|
try (var server = new DummyWebSocketServer(USERNAME, PASSWORD)){
|
||||||
|
server.open();
|
||||||
|
|
||||||
|
var webSocket = newBuilder()
|
||||||
|
.proxy(NO_PROXY)
|
||||||
|
.authenticator(new WSAuthenticator())
|
||||||
|
.build()
|
||||||
|
.newWebSocketBuilder()
|
||||||
|
.buildAsync(server.getURI(), new WebSocket.Listener() { })
|
||||||
|
.join();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Ensures authentication succeeds when an `Authorization` header is explicitly set.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void explicitAuthenticate() throws IOException {
|
||||||
|
try (var server = new DummyWebSocketServer(USERNAME, PASSWORD)) {
|
||||||
|
server.open();
|
||||||
|
|
||||||
|
String hv = "Basic " + Base64.getEncoder().encodeToString(
|
||||||
|
(USERNAME + ":" + PASSWORD).getBytes(UTF_8));
|
||||||
|
|
||||||
|
var webSocket = newBuilder()
|
||||||
|
.proxy(NO_PROXY).build()
|
||||||
|
.newWebSocketBuilder()
|
||||||
|
.header("Authorization", hv)
|
||||||
|
.buildAsync(server.getURI(), new WebSocket.Listener() { })
|
||||||
|
.join();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Ensures authentication does not succeed when no authenticator is present.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void failNoAuthenticator() throws IOException {
|
||||||
|
try (var server = new DummyWebSocketServer(USERNAME, PASSWORD)) {
|
||||||
|
server.open();
|
||||||
|
|
||||||
|
CompletableFuture<WebSocket> cf = newBuilder()
|
||||||
|
.proxy(NO_PROXY).build()
|
||||||
|
.newWebSocketBuilder()
|
||||||
|
.buildAsync(server.getURI(), new WebSocket.Listener() { });
|
||||||
|
|
||||||
|
try {
|
||||||
|
var webSocket = cf.join();
|
||||||
|
fail("Expected exception not thrown");
|
||||||
|
} catch (CompletionException expected) {
|
||||||
|
WebSocketHandshakeException e = (WebSocketHandshakeException)expected.getCause();
|
||||||
|
HttpResponse<?> response = e.getResponse();
|
||||||
|
assertEquals(response.statusCode(), 401);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Ensures authentication does not succeed when the authenticator presents
|
||||||
|
* unauthorized credentials.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void failBadCredentials() throws IOException {
|
||||||
|
try (var server = new DummyWebSocketServer(USERNAME, PASSWORD)) {
|
||||||
|
server.open();
|
||||||
|
|
||||||
|
Authenticator authenticator = new Authenticator() {
|
||||||
|
@Override protected PasswordAuthentication getPasswordAuthentication() {
|
||||||
|
return new PasswordAuthentication("BAD"+USERNAME, "".toCharArray());
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
CompletableFuture<WebSocket> cf = newBuilder()
|
||||||
|
.proxy(NO_PROXY)
|
||||||
|
.authenticator(authenticator)
|
||||||
|
.build()
|
||||||
|
.newWebSocketBuilder()
|
||||||
|
.buildAsync(server.getURI(), new WebSocket.Listener() { });
|
||||||
|
|
||||||
|
try {
|
||||||
|
var webSocket = cf.join();
|
||||||
|
fail("Expected exception not thrown");
|
||||||
|
} catch (CompletionException expected) {
|
||||||
|
System.out.println("caught expected exception:" + expected);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue