mirror of
https://github.com/google/nomulus.git
synced 2025-05-03 13:37:51 +02:00
Previously the ssl initializer tests always uses JDK, which is not really testing what happens in production when we take advantage of the OpenSSL provider. Now the tests will run with all providers that are available (through JUnit parameterization). Some bugs that may cause flakiness are fixed in the process. Change how SNI is verified in tests. It turns out that the old method (only verifying the SSL parameters in the SSL engine) does not actually ensure that the SNI address is sent to the peer, but only that the SSL engine is configured to send it (this value exists even before a handshake is performed). Also there's likely a bug in Netty's SSL engine that does not set this parameter when created with a peer host. Lastly HTTP test utils are changed so that they do not use pre-defined constants for header names and values. We want the test to confirm that these constants are what we expect they are. Using string literals makes these tests also more explicit. ------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=207930282
149 lines
6 KiB
Java
149 lines
6 KiB
Java
// Copyright 2017 The Nomulus Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package google.registry.proxy;
|
|
|
|
import static com.google.common.truth.Truth.assertThat;
|
|
import static java.nio.charset.StandardCharsets.US_ASCII;
|
|
|
|
import io.netty.buffer.ByteBuf;
|
|
import io.netty.buffer.Unpooled;
|
|
import io.netty.handler.codec.http.DefaultFullHttpRequest;
|
|
import io.netty.handler.codec.http.DefaultFullHttpResponse;
|
|
import io.netty.handler.codec.http.FullHttpMessage;
|
|
import io.netty.handler.codec.http.FullHttpRequest;
|
|
import io.netty.handler.codec.http.FullHttpResponse;
|
|
import io.netty.handler.codec.http.HttpMessage;
|
|
import io.netty.handler.codec.http.HttpMethod;
|
|
import io.netty.handler.codec.http.HttpRequest;
|
|
import io.netty.handler.codec.http.HttpResponseStatus;
|
|
import io.netty.handler.codec.http.HttpVersion;
|
|
import io.netty.handler.codec.http.cookie.ClientCookieEncoder;
|
|
import io.netty.handler.codec.http.cookie.Cookie;
|
|
import io.netty.handler.codec.http.cookie.ServerCookieEncoder;
|
|
|
|
/** Utility class for various helper methods used in testing. */
|
|
public class TestUtils {
|
|
|
|
public static FullHttpRequest makeHttpPostRequest(String content, String host, String path) {
|
|
ByteBuf buf = Unpooled.wrappedBuffer(content.getBytes(US_ASCII));
|
|
FullHttpRequest request =
|
|
new DefaultFullHttpRequest(HttpVersion.HTTP_1_1, HttpMethod.POST, path, buf);
|
|
request
|
|
.headers()
|
|
.set("user-agent", "Proxy")
|
|
.set("host", host)
|
|
.setInt("content-length", buf.readableBytes());
|
|
return request;
|
|
}
|
|
|
|
public static FullHttpRequest makeHttpGetRequest(String host, String path) {
|
|
FullHttpRequest request =
|
|
new DefaultFullHttpRequest(HttpVersion.HTTP_1_1, HttpMethod.GET, path);
|
|
request.headers().set("host", host).setInt("content-length", 0);
|
|
return request;
|
|
}
|
|
|
|
public static FullHttpResponse makeHttpResponse(String content, HttpResponseStatus status) {
|
|
ByteBuf buf = Unpooled.wrappedBuffer(content.getBytes(US_ASCII));
|
|
FullHttpResponse response = new DefaultFullHttpResponse(HttpVersion.HTTP_1_1, status, buf);
|
|
response.headers().setInt("content-length", buf.readableBytes());
|
|
return response;
|
|
}
|
|
|
|
public static FullHttpResponse makeHttpResponse(HttpResponseStatus status) {
|
|
FullHttpResponse response = new DefaultFullHttpResponse(HttpVersion.HTTP_1_1, status);
|
|
response.headers().setInt("content-length", 0);
|
|
return response;
|
|
}
|
|
|
|
public static FullHttpRequest makeWhoisHttpRequest(
|
|
String content, String host, String path, String accessToken) {
|
|
FullHttpRequest request = makeHttpPostRequest(content, host, path);
|
|
request
|
|
.headers()
|
|
.set("authorization", "Bearer " + accessToken)
|
|
.set("content-type", "text/plain")
|
|
.set("accept", "text/plain");
|
|
return request;
|
|
}
|
|
|
|
public static FullHttpRequest makeEppHttpRequest(
|
|
String content,
|
|
String host,
|
|
String path,
|
|
String accessToken,
|
|
String sslClientCertificateHash,
|
|
String serverHostname,
|
|
String clientAddress,
|
|
Cookie... cookies) {
|
|
FullHttpRequest request = makeHttpPostRequest(content, host, path);
|
|
request
|
|
.headers()
|
|
.set("authorization", "Bearer " + accessToken)
|
|
.set("content-type", "application/epp+xml")
|
|
.set("accept", "application/epp+xml")
|
|
.set("X-SSL-Certificate", sslClientCertificateHash)
|
|
.set("X-Requested-Servername-SNI", serverHostname)
|
|
.set("X-Forwarded-For", clientAddress);
|
|
if (cookies.length != 0) {
|
|
request.headers().set("cookie", ClientCookieEncoder.STRICT.encode(cookies));
|
|
}
|
|
return request;
|
|
}
|
|
|
|
public static FullHttpResponse makeWhoisHttpResponse(String content, HttpResponseStatus status) {
|
|
FullHttpResponse response = makeHttpResponse(content, status);
|
|
response.headers().set("content-type", "text/plain");
|
|
return response;
|
|
}
|
|
|
|
public static FullHttpResponse makeEppHttpResponse(
|
|
String content, HttpResponseStatus status, Cookie... cookies) {
|
|
FullHttpResponse response = makeHttpResponse(content, status);
|
|
response.headers().set("content-type", "application/epp+xml");
|
|
for (Cookie cookie : cookies) {
|
|
response.headers().add("set-cookie", ServerCookieEncoder.STRICT.encode(cookie));
|
|
}
|
|
return response;
|
|
}
|
|
|
|
/**
|
|
* Compares two {@link FullHttpMessage} for equivalency.
|
|
*
|
|
* <p>This method is needed because an HTTP message decoded and aggregated from inbound {@link
|
|
* ByteBuf} is of a different class than the one written to the outbound {@link ByteBuf}, and The
|
|
* {@link ByteBuf} implementations that hold the content of the HTTP messages are different, even
|
|
* though the actual content, headers, etc are the same.
|
|
*
|
|
* <p>This method is not type-safe, msg1 & msg2 can be a request and a response, respectively. Do
|
|
* not use this method directly.
|
|
*/
|
|
private static void assertHttpMessageEquivalent(HttpMessage msg1, HttpMessage msg2) {
|
|
assertThat(msg1.protocolVersion()).isEqualTo(msg2.protocolVersion());
|
|
assertThat(msg1.headers()).isEqualTo(msg2.headers());
|
|
if (msg1 instanceof FullHttpRequest && msg2 instanceof FullHttpRequest) {
|
|
assertThat(((FullHttpRequest) msg1).content()).isEqualTo(((FullHttpRequest) msg2).content());
|
|
}
|
|
}
|
|
|
|
public static void assertHttpResponseEquivalent(FullHttpResponse res1, FullHttpResponse res2) {
|
|
assertThat(res1.status()).isEqualTo(res2.status());
|
|
assertHttpMessageEquivalent(res1, res2);
|
|
}
|
|
|
|
public static void assertHttpRequestEquivalent(HttpRequest req1, HttpRequest req2) {
|
|
assertHttpMessageEquivalent(req1, req2);
|
|
}
|
|
}
|