| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| |
| #include "test_bits.hpp" |
| |
| #include "proton/connect_config.hpp" |
| #include "proton/connection.hpp" |
| #include "proton/connection_options.hpp" |
| #include "proton/container.hpp" |
| #include "proton/error_condition.hpp" |
| #include "proton/transport.hpp" |
| #include "proton/ssl.hpp" |
| #include "proton/sasl.hpp" |
| |
| // The C++ API lacks a way to test for presence of extended SASL or SSL support. |
| #include "proton/sasl.h" |
| #include "proton/ssl.h" |
| |
| #include "test_handler.hpp" |
| |
| #include <sstream> |
| #include <fstream> |
| #include <cstdio> |
| #include <cstdlib> |
| |
| // Used to inspect items from the proton-c level of the API |
| #include "proton/internal/object.hpp" |
| #include "proton/returned.hpp" |
| #include <proton/transport.h> |
| #include <proton/connection.h> |
| |
| #include <json/version.h> |
| |
| // Windows has a different set of APIs for setting the environment |
| #ifdef _WIN32 |
| #include <string.h> |
| namespace { |
| void setenv(const char* var, const char* value, int) { |
| int vlen = strlen(var); |
| int len = vlen+strlen(value)+1; |
| char* buff = new char[len+1]; |
| strcpy(buff, var); |
| strcpy(buff+vlen, "="); |
| strcpy(buff+vlen+1, value); |
| _putenv(buff); |
| delete [] buff; |
| } |
| |
| void unsetenv(const char* var) { |
| int len = strlen(var); |
| char* buff = new char[len+1]; |
| strcpy(buff, var); |
| strcpy(buff+len, "="); |
| _putenv(buff); |
| delete [] buff; |
| } |
| } |
| |
| #endif |
| namespace { |
| |
| using namespace std; |
| using namespace proton; |
| |
| void test_default_file() { |
| // Default file locations in order of preference. |
| ::setenv("MESSAGING_CONNECT_FILE", "environment", 1); |
| ofstream("connect.json") << R"({ "host": "current" })" << endl; |
| ::setenv("HOME", "testdata", 1); |
| ofstream("testdata/.config/messaging/connect.json") << R"({ "host": ".config" })" << endl; |
| ASSERT_EQUAL("environment", connect_config::default_file()); |
| ::unsetenv("MESSAGING_CONNECT_FILE"); |
| ASSERT_EQUAL("connect.json", connect_config::default_file()); |
| remove("connect.json"); |
| ASSERT_EQUAL("testdata/.config/messaging/connect.json", connect_config::default_file()); |
| remove("testdata/.config/messaging/connect.json"); |
| |
| // We can't fully test prefix and /etc locations, we have no control. |
| try { |
| ASSERT_SUBSTRING("/etc/messaging", connect_config::default_file()); |
| } catch (...) {} // OK if not there |
| } |
| |
| void test_addr() { |
| connection_options opts; |
| ASSERT_EQUAL("foo:bar", configure(opts, R"({ "host":"foo", "port":"bar" })")); |
| ASSERT_EQUAL("foo:1234", configure(opts, R"({ "host":"foo", "port":"1234" })")); |
| ASSERT_EQUAL("localhost:amqps", configure(opts, "{}")); |
| ASSERT_EQUAL("localhost:amqp", configure(opts, R"({"scheme":"amqp"})")); |
| ASSERT_EQUAL("foo:bar", configure(opts, R"( |
| { "host":"foo", /* inline comment */"port":"bar" // end of line comment |
| } |
| )")); |
| |
| ASSERT_THROWS_MSG(error, "'scheme' must be", configure(opts, R"({"scheme":"bad"})")); |
| ASSERT_THROWS_MSG(error, "'scheme' expected string, found boolean", configure(opts, R"({"scheme":true})")); |
| ASSERT_THROWS_MSG(error, "'port' expected string or uint, found boolean", configure(opts, R"({"port":true})")); |
| ASSERT_THROWS_MSG(error, "'host' expected string, found boolean", configure(opts, R"({"host":true})")); |
| } |
| |
| void test_invalid_config() { |
| connection_options opts; |
| ASSERT_THROWS_MSG(proton::error, "expected string", configure(opts, R"({ "scheme":true})")); |
| ASSERT_THROWS_MSG(proton::error, "expected object", configure(opts, R"({ "tls":""})")); |
| ASSERT_THROWS_MSG(proton::error, "expected object", configure(opts, R"({ "sasl":true})")); |
| ASSERT_THROWS_MSG(proton::error, "expected boolean", configure(opts, R"({ "sasl": { "enable":""}})")); |
| ASSERT_THROWS_MSG(proton::error, "expected boolean", configure(opts, R"({ "tls": { "verify":""}})")); |
| } |
| |
| void test_invalid_json() { |
| connection_options opts; |
| // ancient versions of jsoncpp use a generic error message for parse errors |
| // in the exception, and print the detailed message to stderr |
| // https://github.com/open-source-parsers/jsoncpp/commit/6b10ce8c0d07ea07861e82f65f17d9fd6abd658d |
| if (std::make_tuple(JSONCPP_VERSION_MAJOR, JSONCPP_VERSION_MINOR) < std::make_tuple(1, 7)) { |
| ASSERT_THROWS_MSG(proton::error, "reader error", configure(opts, "{")); |
| ASSERT_THROWS_MSG(proton::error, "reader error", configure(opts, "")); |
| ASSERT_THROWS_MSG(proton::error, "reader error", configure(opts, R"({ "user" : "x" "host" : "y"})")); |
| } else { |
| ASSERT_THROWS_MSG(proton::error, "Missing '}'", configure(opts, "{")); |
| ASSERT_THROWS_MSG(proton::error, "Syntax error", configure(opts, "")); |
| ASSERT_THROWS_MSG(proton::error, "Missing ','", configure(opts, R"({ "user":"x" "host":"y"})")); |
| } |
| } |
| |
| class test_almost_default_connect : public test_handler { |
| public: |
| |
| void on_listener_start(container& c) override { |
| ofstream os("connect.json"); |
| ASSERT(os << config_with_port(R"("scheme":"amqp")")); |
| os.close(); |
| c.connect(); |
| } |
| |
| void check_connection(connection& c) override { |
| ASSERT_EQUAL("localhost", c.virtual_host()); |
| } |
| }; |
| |
| class test_default_connect : public test_handler { |
| public: |
| |
| void on_listener_start(container& c) override { |
| c.connect(); |
| } |
| |
| // on_transport_open will be called whatever happens to the connection whether it's |
| // connected or rejected due to error. |
| // |
| // We use a hacky way to get to the underlying C objects to check what's in them |
| void on_transport_open(proton::transport& transport) override { |
| proton::connection connection = transport.connection(); |
| internal_access_of<proton::connection, pn_connection_t> ic(connection); |
| pn_connection_t* c = ic.pn_object(); |
| ASSERT_EQUAL(std::string("localhost"), pn_connection_get_hostname(c)); |
| } |
| |
| void on_transport_error(proton::transport& t) override { |
| ASSERT_SUBSTRING("localhost:5671", t.error().description()); |
| t.connection().container().stop(); |
| } |
| |
| void run() { |
| container(*this).run(); |
| } |
| }; |
| |
| class test_host_user_pass : public test_handler { |
| public: |
| |
| void on_listener_start(proton::container & c) override { |
| connect(c, R"("scheme":"amqp", "host":"127.0.0.1", "user":"user@proton", "password":"password")"); |
| } |
| |
| void check_connection(connection& c) override { |
| ASSERT_EQUAL("127.0.0.1", c.virtual_host()); |
| if (pn_sasl_extended()) { |
| ASSERT_EQUAL("user@proton", c.user()); |
| } else { |
| ASSERT_EQUAL("anonymous", c.user()); |
| } |
| } |
| }; |
| |
| class test_tls : public test_handler { |
| static connection_options make_opts() { |
| ssl_certificate cert("testdata/certs/server-certificate.pem", |
| "testdata/certs/server-private-key.pem", |
| "server-password"); |
| connection_options opts; |
| opts.ssl_server_options(ssl_server_options(cert)); |
| return opts; |
| } |
| |
| public: |
| |
| test_tls() : test_handler(make_opts()) {} |
| |
| void on_listener_start(proton::container & c) override { |
| connect(c, R"("scheme":"amqps", "tls": { "verify":false })"); |
| } |
| }; |
| |
| class test_tls_default_fail : public test_handler { |
| static connection_options make_opts() { |
| ssl_certificate cert("testdata/certs/server-certificate.pem", |
| "testdata/certs/server-private-key.pem", |
| "server-password"); |
| connection_options opts; |
| opts.ssl_server_options(ssl_server_options(cert)); |
| return opts; |
| } |
| bool failed_; |
| |
| public: |
| |
| test_tls_default_fail() : test_handler(make_opts()), failed_(false) {} |
| |
| void on_listener_start(proton::container& c) override { |
| connect(c, R"("scheme":"amqps")"); |
| } |
| |
| void on_messaging_error(const proton::error_condition& c) override { |
| if (failed_) return; |
| |
| ASSERT_SUBSTRING("verify failed", c.description()); |
| failed_ = true; |
| stop_listener(); |
| } |
| |
| void run() { |
| container(*this).run(); |
| ASSERT(failed_); |
| } |
| }; |
| |
| class test_tls_external : public test_handler { |
| |
| static connection_options make_opts() { |
| ssl_certificate cert("testdata/certs/server-certificate-lh.pem", |
| "testdata/certs/server-private-key-lh.pem", |
| "server-password"); |
| connection_options opts; |
| opts.ssl_server_options(ssl_server_options(cert, |
| "testdata/certs/ca-certificate.pem", |
| "testdata/certs/ca-certificate.pem", |
| ssl::VERIFY_PEER)); |
| return opts; |
| } |
| |
| public: |
| |
| test_tls_external() : test_handler(make_opts()) {} |
| |
| void on_listener_start(container& c) override { |
| connect(c, R"( |
| "scheme":"amqps", |
| "sasl":{ "mechanisms": "EXTERNAL" }, |
| "tls": { |
| "cert":"testdata/certs/client-certificate.pem", |
| "key":"testdata/certs/client-private-key-no-password.pem", |
| "ca":"testdata/certs/ca-certificate.pem", |
| "verify":true })" |
| ); |
| } |
| }; |
| |
| class test_tls_plain : public test_handler { |
| |
| static connection_options make_opts() { |
| ssl_certificate cert("testdata/certs/server-certificate-lh.pem", |
| "testdata/certs/server-private-key-lh.pem", |
| "server-password"); |
| connection_options opts; |
| opts.ssl_server_options(ssl_server_options(cert, |
| "testdata/certs/ca-certificate.pem", |
| "testdata/certs/ca-certificate.pem", |
| ssl::VERIFY_PEER)); |
| return opts; |
| } |
| |
| public: |
| |
| test_tls_plain() : test_handler(make_opts()) {} |
| |
| void on_listener_start(container& c) override { |
| connect(c, R"( |
| "scheme":"amqps", "user":"user@proton", "password": "password", |
| "sasl":{ "mechanisms": "PLAIN" }, |
| "tls": { |
| "cert":"testdata/certs/client-certificate.pem", |
| "key":"testdata/certs/client-private-key-no-password.pem", |
| "ca":"testdata/certs/ca-certificate.pem", |
| "verify":true })" |
| ); |
| } |
| }; |
| |
| } // namespace |
| |
| |
| int main(int argc, char** argv) { |
| int failed = 0; |
| RUN_ARGV_TEST(failed, test_default_file()); |
| RUN_ARGV_TEST(failed, test_addr()); |
| RUN_ARGV_TEST(failed, test_invalid_config()); |
| RUN_ARGV_TEST(failed, test_invalid_json()); |
| RUN_ARGV_TEST(failed, test_default_connect().run()); |
| RUN_ARGV_TEST(failed, test_almost_default_connect().run()); |
| |
| bool have_sasl = pn_sasl_extended() && getenv("PN_SASL_CONFIG_PATH"); |
| pn_ssl_domain_t *have_ssl = pn_ssl_domain(PN_SSL_MODE_SERVER); |
| |
| if (have_sasl) { |
| RUN_ARGV_TEST(failed, test_host_user_pass().run()); |
| } |
| #ifndef _WIN32 |
| if (have_ssl) { |
| pn_ssl_domain_free(have_ssl); |
| RUN_ARGV_TEST(failed, test_tls().run()); |
| RUN_ARGV_TEST(failed, test_tls_default_fail().run()); |
| RUN_ARGV_TEST(failed, test_tls_external().run()); |
| if (have_sasl) { |
| RUN_ARGV_TEST(failed, test_tls_plain().run()); |
| } |
| } else { |
| std::cout << "SKIP: TLS tests, not available" << std::endl; |
| } |
| #else |
| std::cout << "SKIP: TLS tests, expected to fail on windows" << std::endl; |
| #endif |
| return failed; |
| } |