| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| |
| package org.apache.druid.server.initialization; |
| |
| import com.google.common.collect.ImmutableList; |
| import com.google.common.util.concurrent.ListenableFuture; |
| import com.google.inject.Binder; |
| import com.google.inject.Injector; |
| import com.google.inject.Key; |
| import com.google.inject.Module; |
| import com.google.inject.multibindings.Multibinder; |
| import org.apache.commons.io.IOUtils; |
| import org.apache.druid.guice.GuiceInjectors; |
| import org.apache.druid.guice.Jerseys; |
| import org.apache.druid.guice.JsonConfigProvider; |
| import org.apache.druid.guice.LazySingleton; |
| import org.apache.druid.guice.LifecycleModule; |
| import org.apache.druid.guice.annotations.Self; |
| import org.apache.druid.initialization.Initialization; |
| import org.apache.druid.java.util.http.client.HttpClient; |
| import org.apache.druid.java.util.http.client.HttpClientConfig; |
| import org.apache.druid.java.util.http.client.HttpClientInit; |
| import org.apache.druid.java.util.http.client.Request; |
| import org.apache.druid.java.util.http.client.response.InputStreamResponseHandler; |
| import org.apache.druid.java.util.http.client.response.StatusResponseHandler; |
| import org.apache.druid.java.util.http.client.response.StatusResponseHolder; |
| import org.apache.druid.metadata.PasswordProvider; |
| import org.apache.druid.server.DruidNode; |
| import org.apache.druid.server.initialization.jetty.JettyServerInitializer; |
| import org.apache.druid.server.initialization.jetty.JettyServerModule; |
| import org.apache.druid.server.initialization.jetty.ServletFilterHolder; |
| import org.apache.druid.server.security.AuthTestUtils; |
| import org.apache.druid.server.security.AuthorizerMapper; |
| import org.eclipse.jetty.server.Server; |
| import org.jboss.netty.handler.codec.http.HttpMethod; |
| import org.joda.time.Duration; |
| import org.junit.Assert; |
| import org.junit.Ignore; |
| import org.junit.Rule; |
| import org.junit.Test; |
| import org.junit.rules.TemporaryFolder; |
| |
| import javax.servlet.DispatcherType; |
| import javax.servlet.Filter; |
| import javax.servlet.http.HttpServletResponse; |
| import javax.ws.rs.core.MediaType; |
| import java.io.ByteArrayOutputStream; |
| import java.io.File; |
| import java.io.IOException; |
| import java.io.InputStream; |
| import java.io.StringWriter; |
| import java.net.HttpURLConnection; |
| import java.net.URL; |
| import java.nio.charset.Charset; |
| import java.nio.charset.StandardCharsets; |
| import java.nio.file.Files; |
| import java.nio.file.Path; |
| import java.util.EnumSet; |
| import java.util.Locale; |
| import java.util.Map; |
| import java.util.concurrent.CountDownLatch; |
| import java.util.concurrent.ExecutorService; |
| import java.util.concurrent.Executors; |
| import java.util.concurrent.ThreadLocalRandom; |
| import java.util.concurrent.TimeUnit; |
| import java.util.concurrent.atomic.AtomicLong; |
| import java.util.zip.GZIPInputStream; |
| import java.util.zip.GZIPOutputStream; |
| |
| public class JettyTest extends BaseJettyTest |
| { |
| @Rule |
| public TemporaryFolder folder = new TemporaryFolder(); |
| |
| private HttpClientConfig sslConfig; |
| |
| private Injector injector; |
| |
| private LatchedRequestStateHolder latchedRequestState; |
| |
| @Override |
| protected Injector setupInjector() |
| { |
| TLSServerConfig tlsConfig; |
| try { |
| File keyStore = new File(JettyTest.class.getClassLoader().getResource("server.jks").getFile()); |
| Path tmpKeyStore = Files.copy(keyStore.toPath(), new File(folder.newFolder(), "server.jks").toPath()); |
| File trustStore = new File(JettyTest.class.getClassLoader().getResource("truststore.jks").getFile()); |
| Path tmpTrustStore = Files.copy(trustStore.toPath(), new File(folder.newFolder(), "truststore.jks").toPath()); |
| PasswordProvider pp = () -> "druid123"; |
| tlsConfig = new TLSServerConfig() |
| { |
| @Override |
| public String getKeyStorePath() |
| { |
| return tmpKeyStore.toString(); |
| } |
| |
| @Override |
| public String getKeyStoreType() |
| { |
| return "jks"; |
| } |
| |
| @Override |
| public PasswordProvider getKeyStorePasswordProvider() |
| { |
| return pp; |
| } |
| |
| @Override |
| public PasswordProvider getKeyManagerPasswordProvider() |
| { |
| return pp; |
| } |
| |
| @Override |
| public String getTrustStorePath() |
| { |
| return tmpTrustStore.toString(); |
| } |
| |
| @Override |
| public String getTrustStoreAlgorithm() |
| { |
| return "PKIX"; |
| } |
| |
| @Override |
| public PasswordProvider getTrustStorePasswordProvider() |
| { |
| return pp; |
| } |
| |
| @Override |
| public String getCertAlias() |
| { |
| return "druid"; |
| } |
| |
| @Override |
| public boolean isRequireClientCertificate() |
| { |
| return false; |
| } |
| |
| @Override |
| public boolean isRequestClientCertificate() |
| { |
| return false; |
| } |
| |
| @Override |
| public boolean isValidateHostnames() |
| { |
| return false; |
| } |
| }; |
| |
| sslConfig = |
| HttpClientConfig.builder() |
| .withSslContext( |
| HttpClientInit.sslContextWithTrustedKeyStore(tmpTrustStore.toString(), pp.getPassword()) |
| ) |
| .withWorkerCount(1) |
| .withReadTimeout(Duration.ZERO) |
| .build(); |
| } |
| catch (IOException e) { |
| throw new RuntimeException(e); |
| } |
| |
| final int ephemeralPort = ThreadLocalRandom.current().nextInt(49152, 65535); |
| |
| latchedRequestState = new LatchedRequestStateHolder(); |
| injector = Initialization.makeInjectorWithModules( |
| GuiceInjectors.makeStartupInjector(), |
| ImmutableList.<Module>of( |
| new Module() |
| { |
| @Override |
| public void configure(Binder binder) |
| { |
| JsonConfigProvider.bindInstance( |
| binder, |
| Key.get(DruidNode.class, Self.class), |
| new DruidNode("test", "localhost", false, ephemeralPort, ephemeralPort + 1, true, true) |
| ); |
| binder.bind(TLSServerConfig.class).toInstance(tlsConfig); |
| binder.bind(JettyServerInitializer.class).to(JettyServerInit.class).in(LazySingleton.class); |
| binder.bind(LatchedRequestStateHolder.class).toInstance(latchedRequestState); |
| |
| Multibinder<ServletFilterHolder> multibinder = Multibinder.newSetBinder( |
| binder, |
| ServletFilterHolder.class |
| ); |
| |
| multibinder.addBinding().toInstance( |
| new ServletFilterHolder() |
| { |
| @Override |
| public String getPath() |
| { |
| return "/*"; |
| } |
| |
| @Override |
| public Map<String, String> getInitParameters() |
| { |
| return null; |
| } |
| |
| @Override |
| public Class<? extends Filter> getFilterClass() |
| { |
| return DummyAuthFilter.class; |
| } |
| |
| @Override |
| public Filter getFilter() |
| { |
| return null; |
| } |
| |
| @Override |
| public EnumSet<DispatcherType> getDispatcherType() |
| { |
| return null; |
| } |
| } |
| ); |
| |
| |
| Jerseys.addResource(binder, SlowResource.class); |
| Jerseys.addResource(binder, LatchedResource.class); |
| Jerseys.addResource(binder, ExceptionResource.class); |
| Jerseys.addResource(binder, DefaultResource.class); |
| Jerseys.addResource(binder, DirectlyReturnResource.class); |
| binder.bind(AuthorizerMapper.class).toInstance(AuthTestUtils.TEST_AUTHORIZER_MAPPER); |
| LifecycleModule.register(binder, Server.class); |
| } |
| } |
| ) |
| ); |
| |
| return injector; |
| } |
| |
| @Test |
| @Ignore // this test will deadlock if it hits an issue, so ignored by default |
| public void testTimeouts() throws Exception |
| { |
| // test for request timeouts properly not locking up all threads |
| final ExecutorService executor = Executors.newFixedThreadPool(100); |
| final AtomicLong count = new AtomicLong(0); |
| final CountDownLatch latch = new CountDownLatch(1000); |
| for (int i = 0; i < 10000; i++) { |
| executor.execute( |
| new Runnable() |
| { |
| @Override |
| public void run() |
| { |
| executor.execute( |
| new Runnable() |
| { |
| @Override |
| public void run() |
| { |
| long startTime = System.currentTimeMillis(); |
| long startTime2 = 0; |
| try { |
| ListenableFuture<StatusResponseHolder> go = |
| client.go( |
| new Request(HttpMethod.GET, new URL("http://localhost:" + port + "/slow/hello")), |
| StatusResponseHandler.getInstance() |
| ); |
| startTime2 = System.currentTimeMillis(); |
| go.get(); |
| } |
| catch (Exception e) { |
| e.printStackTrace(); |
| } |
| finally { |
| System.out.printf( |
| Locale.ENGLISH, |
| "Response time client%dtime taken for getting future%dCounter %d%n", |
| System.currentTimeMillis() - startTime, |
| System.currentTimeMillis() - startTime2, |
| count.incrementAndGet() |
| ); |
| latch.countDown(); |
| |
| } |
| } |
| } |
| ); |
| } |
| } |
| ); |
| } |
| |
| latch.await(); |
| } |
| |
| @Test |
| public void testGzipResponseCompression() throws Exception |
| { |
| final URL url = new URL("http://localhost:" + port + "/default"); |
| final HttpURLConnection get = (HttpURLConnection) url.openConnection(); |
| get.setRequestProperty("Accept-Encoding", "gzip"); |
| Assert.assertEquals("gzip", get.getContentEncoding()); |
| Assert.assertEquals( |
| DEFAULT_RESPONSE_CONTENT, |
| IOUtils.toString(new GZIPInputStream(get.getInputStream()), StandardCharsets.UTF_8) |
| ); |
| |
| final HttpURLConnection post = (HttpURLConnection) url.openConnection(); |
| post.setRequestProperty("Accept-Encoding", "gzip"); |
| post.setRequestMethod("POST"); |
| Assert.assertEquals("gzip", post.getContentEncoding()); |
| Assert.assertEquals( |
| DEFAULT_RESPONSE_CONTENT, |
| IOUtils.toString(new GZIPInputStream(post.getInputStream()), StandardCharsets.UTF_8) |
| ); |
| |
| final HttpURLConnection getNoGzip = (HttpURLConnection) url.openConnection(); |
| Assert.assertNotEquals("gzip", getNoGzip.getContentEncoding()); |
| Assert.assertEquals(DEFAULT_RESPONSE_CONTENT, IOUtils.toString(getNoGzip.getInputStream(), StandardCharsets.UTF_8)); |
| |
| final HttpURLConnection postNoGzip = (HttpURLConnection) url.openConnection(); |
| postNoGzip.setRequestMethod("POST"); |
| Assert.assertNotEquals("gzip", postNoGzip.getContentEncoding()); |
| Assert.assertEquals( |
| DEFAULT_RESPONSE_CONTENT, |
| IOUtils.toString(postNoGzip.getInputStream(), StandardCharsets.UTF_8) |
| ); |
| } |
| |
| // Tests that threads are not stuck when partial chunk is not finalized |
| // https://bugs.eclipse.org/bugs/show_bug.cgi?id=424107 |
| @Test |
| @Ignore |
| // above bug is not fixed in jetty for gzip encoding, and the chunk is still finalized instead of throwing exception. |
| public void testChunkNotFinalized() throws Exception |
| { |
| ListenableFuture<InputStream> go = |
| client.go( |
| new Request(HttpMethod.GET, new URL("http://localhost:" + port + "/exception/exception")), |
| new InputStreamResponseHandler() |
| ); |
| try { |
| StringWriter writer = new StringWriter(); |
| IOUtils.copy(go.get(), writer, "utf-8"); |
| Assert.fail("Should have thrown Exception"); |
| } |
| catch (IOException e) { |
| // Expected. |
| } |
| |
| } |
| |
| @Test |
| public void testThreadNotStuckOnException() throws Exception |
| { |
| final CountDownLatch latch = new CountDownLatch(1); |
| Executors.newSingleThreadExecutor().execute( |
| new Runnable() |
| { |
| @Override |
| public void run() |
| { |
| try { |
| ListenableFuture<InputStream> go = client.go( |
| new Request(HttpMethod.GET, new URL("http://localhost:" + port + "/exception/exception")), |
| new InputStreamResponseHandler() |
| ); |
| StringWriter writer = new StringWriter(); |
| IOUtils.copy(go.get(), writer, "utf-8"); |
| } |
| catch (IOException e) { |
| // Expected. |
| } |
| catch (Throwable t) { |
| throw new RuntimeException(t); |
| } |
| latch.countDown(); |
| } |
| } |
| ); |
| |
| latch.await(5, TimeUnit.SECONDS); |
| } |
| |
| @Test |
| public void testExtensionAuthFilter() throws Exception |
| { |
| URL url = new URL("http://localhost:" + port + "/default"); |
| HttpURLConnection get = (HttpURLConnection) url.openConnection(); |
| get.setRequestProperty(DummyAuthFilter.AUTH_HDR, DummyAuthFilter.SECRET_USER); |
| Assert.assertEquals(HttpServletResponse.SC_OK, get.getResponseCode()); |
| |
| get = (HttpURLConnection) url.openConnection(); |
| get.setRequestProperty(DummyAuthFilter.AUTH_HDR, "hacker"); |
| Assert.assertEquals(HttpServletResponse.SC_UNAUTHORIZED, get.getResponseCode()); |
| } |
| |
| @Test |
| public void testGzipRequestDecompression() throws Exception |
| { |
| String text = "hello"; |
| ByteArrayOutputStream out = new ByteArrayOutputStream(); |
| try (GZIPOutputStream gzipOutputStream = new GZIPOutputStream(out)) { |
| gzipOutputStream.write(text.getBytes(Charset.defaultCharset())); |
| } |
| Request request = new Request(HttpMethod.POST, new URL("http://localhost:" + port + "/return")); |
| request.setHeader("Content-Encoding", "gzip"); |
| request.setContent(MediaType.TEXT_PLAIN, out.toByteArray()); |
| Assert.assertEquals(text, new String(IOUtils.toByteArray(client.go( |
| request, |
| new InputStreamResponseHandler() |
| ).get()), Charset.defaultCharset())); |
| } |
| |
| @Test |
| public void testNumConnectionsMetricHttp() throws Exception |
| { |
| String text = "hello"; |
| ByteArrayOutputStream out = new ByteArrayOutputStream(); |
| try (GZIPOutputStream gzipOutputStream = new GZIPOutputStream(out)) { |
| gzipOutputStream.write(text.getBytes(Charset.defaultCharset())); |
| } |
| Request request = new Request(HttpMethod.GET, new URL("http://localhost:" + port + "/latched/hello")); |
| request.setHeader("Content-Encoding", "gzip"); |
| request.setContent(MediaType.TEXT_PLAIN, out.toByteArray()); |
| |
| JettyServerModule jsm = injector.getInstance(JettyServerModule.class); |
| latchedRequestState.reset(); |
| waitForJettyServerModuleActiveConnectionsZero(jsm); |
| |
| Assert.assertEquals(0, jsm.getActiveConnections()); |
| ListenableFuture<InputStream> go = client.go( |
| request, |
| new InputStreamResponseHandler() |
| ); |
| latchedRequestState.clientWaitForServerToStartRequest(); |
| Assert.assertEquals(1, jsm.getActiveConnections()); |
| latchedRequestState.clientReadyToFinishRequest(); |
| go.get(); |
| waitForJettyServerModuleActiveConnectionsZero(jsm); |
| Assert.assertEquals(0, jsm.getActiveConnections()); |
| } |
| |
| @Test |
| public void testNumConnectionsMetricHttps() throws Exception |
| { |
| String text = "hello"; |
| ByteArrayOutputStream out = new ByteArrayOutputStream(); |
| try (GZIPOutputStream gzipOutputStream = new GZIPOutputStream(out)) { |
| gzipOutputStream.write(text.getBytes(Charset.defaultCharset())); |
| } |
| Request request = new Request(HttpMethod.GET, new URL("https://localhost:" + tlsPort + "/latched/hello")); |
| request.setHeader("Content-Encoding", "gzip"); |
| request.setContent(MediaType.TEXT_PLAIN, out.toByteArray()); |
| HttpClient client; |
| try { |
| client = HttpClientInit.createClient( |
| sslConfig, |
| lifecycle |
| ); |
| } |
| catch (Exception e) { |
| throw new RuntimeException(e); |
| } |
| |
| JettyServerModule jsm = injector.getInstance(JettyServerModule.class); |
| latchedRequestState.reset(); |
| |
| waitForJettyServerModuleActiveConnectionsZero(jsm); |
| Assert.assertEquals(0, jsm.getActiveConnections()); |
| ListenableFuture<InputStream> go = client.go( |
| request, |
| new InputStreamResponseHandler() |
| ); |
| latchedRequestState.clientWaitForServerToStartRequest(); |
| Assert.assertEquals(1, jsm.getActiveConnections()); |
| latchedRequestState.clientReadyToFinishRequest(); |
| go.get(); |
| waitForJettyServerModuleActiveConnectionsZero(jsm); |
| Assert.assertEquals(0, jsm.getActiveConnections()); |
| } |
| |
| private void waitForJettyServerModuleActiveConnectionsZero(JettyServerModule jsm) throws InterruptedException |
| { |
| // it can take a bit to close the connection, so maybe sleep for a while and hope it closes |
| final int sleepTimeMills = 10; |
| final int totalSleeps = 15_000 / sleepTimeMills; |
| int count = 0; |
| while (jsm.getActiveConnections() > 0 && count++ < totalSleeps) { |
| Thread.sleep(sleepTimeMills); |
| } |
| if (jsm.getActiveConnections() > 0) { |
| throw new RuntimeException("Connections greater than 0. activeConnections=" + jsm.getActiveConnections() + " port=" + port); |
| } |
| } |
| } |