blob: 46638f315aabbeb6190f629074e15cd1104c330e [file]
'''
'''
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import os
Test.Summary = '''
Test unsupported values for chunked_encoding
'''
Test.ContinueOnFail = True
# Define default ATS
ts = Test.MakeATSProcess("ts1")
server = Test.MakeOriginServer("server")
testName = ""
request_header = {
"headers": "POST /case1 HTTP/1.1\r\nHost: www.example.com\r\nuuid:1\r\n\r\n",
"timestamp": "1469733493.993",
"body": "stuff"
}
response_header = {
"headers": "HTTP/1.1 200 OK\r\nServer: uServer\r\nConnection: close\r\nTransfer-Encoding: chunked\r\n\r\n",
"timestamp": "1469733493.993",
"body": "more stuff"
}
server.addResponse("sessionlog.json", request_header, response_header)
ts.Disk.records_config.update({'proxy.config.diags.debug.enabled': 0, 'proxy.config.diags.debug.tags': 'http'})
ts.Disk.remap_config.AddLine('map / http://127.0.0.1:{0}'.format(server.Variables.Port))
# HTTP1.1 POST: www.example.com/case1 with gzip transfer-encoding
tr = Test.AddTestRun()
tr.TimeOut = 5
tr.MakeCurlCommand(
'-H "host: example.com" -H "transfer-encoding: gzip" -d "stuff" http://127.0.0.1:{0}/case1 --verbose'.format(
ts.Variables.port),
ts=ts)
tr.Processes.Default.ReturnCode = 0
tr.Processes.Default.StartBefore(server)
tr.Processes.Default.StartBefore(ts)
tr.Processes.Default.Streams.All = Testers.ContainsExpression("501 Field not implemented", "Should fail")
tr.Processes.Default.Streams.All = Testers.ExcludesExpression("200 OK", "Should not succeed")
tr.StillRunningAfter = server
tr.StillRunningAfter = ts
# HTTP1.1 POST: www.example.com/case1 with gzip and chunked transfer-encoding
tr = Test.AddTestRun()
tr.TimeOut = 5
tr.MakeCurlCommand(
'-H "host: example.com" -H "transfer-encoding: gzip" -H "transfer-encoding: chunked" -d "stuff" http://127.0.0.1:{0}/case1 --verbose'
.format(ts.Variables.port),
ts=ts)
tr.Processes.Default.ReturnCode = 0
tr.Processes.Default.Streams.All = Testers.ContainsExpression("501 Field not implemented", "Should fail")
tr.Processes.Default.Streams.All = Testers.ExcludesExpression("200 OK", "Should not succeed")
tr.StillRunningAfter = server
tr.StillRunningAfter = ts
class HTTP10Test:
chunkedReplayFile = "replays/chunked_in_http_1_0.replay.yaml"
def __init__(self):
self.setupOriginServer()
self.setupTS()
def setupOriginServer(self):
self.server = Test.MakeVerifierServerProcess("verifier-server1", self.chunkedReplayFile)
def setupTS(self):
self.ts = Test.MakeATSProcess("ts2", enable_tls=True, enable_cache=False)
self.ts.addDefaultSSLFiles()
self.ts.Disk.records_config.update(
{
"proxy.config.diags.debug.enabled": 1,
"proxy.config.diags.debug.tags": "http",
"proxy.config.ssl.server.cert.path": f'{self.ts.Variables.SSLDir}',
"proxy.config.ssl.server.private_key.path": f'{self.ts.Variables.SSLDir}',
"proxy.config.ssl.client.verify.server.policy": 'PERMISSIVE',
})
self.ts.Disk.ssl_multicert_yaml.AddLines(
"""
ssl_multicert:
- dest_ip: "*"
ssl_cert_name: server.pem
ssl_key_name: server.key
""".split("\n"))
self.ts.Disk.remap_config.AddLine(f"map / http://127.0.0.1:{self.server.Variables.http_port}/",)
def runChunkedTraffic(self):
tr = Test.AddTestRun()
tr.AddVerifierClientProcess(
"client1", self.chunkedReplayFile, http_ports=[self.ts.Variables.port], https_ports=[self.ts.Variables.ssl_port])
tr.Processes.Default.StartBefore(self.server)
tr.Processes.Default.StartBefore(self.ts)
tr.StillRunningAfter = self.server
tr.StillRunningAfter = self.ts
def run(self):
self.runChunkedTraffic()
HTTP10Test().run()
class MalformedChunkHeaderTest:
chunkedReplayFile = "replays/malformed_chunked_header.replay.yaml"
def __init__(self):
self.setupOriginServer()
self.setupTS()
def setupOriginServer(self):
self.server = Test.MakeVerifierServerProcess("verifier-server2", self.chunkedReplayFile)
# The server's responses will fail the first three transactions
# because ATS will close the connection due to the malformed
# chunk headers.
self.server.Streams.stdout += Testers.ContainsExpression(
"Unexpected chunked content for key 1: too small", "Verify that writing the first response failed.")
self.server.Streams.stdout += Testers.ExcludesExpression(
"chunked body of 3 bytes for key 2 with chunk stream", "Verify that writing the second response failed.")
self.server.Streams.stdout += Testers.ContainsExpression(
"Unexpected chunked content for key 3: too small", "Verify that writing the third response failed.")
self.server.Streams.stdout += Testers.ContainsExpression(
"Unexpected chunked content for key 8: too small", "Verify that writing the sixth response failed.")
# ATS should close the connection before any body gets through. "abcwxyz"
# is the body sent by the client for each of these chunked cases.
self.server.Streams.stdout += Testers.ExcludesExpression("abcwxyz", "Verify that the body never got through.")
def setupTS(self):
self.ts = Test.MakeATSProcess("ts3", enable_tls=True, enable_cache=False)
self.ts.addDefaultSSLFiles()
self.ts.Disk.records_config.update(
{
"proxy.config.diags.debug.enabled": 1,
"proxy.config.diags.debug.tags": "http",
"proxy.config.ssl.server.cert.path": f'{self.ts.Variables.SSLDir}',
"proxy.config.ssl.server.private_key.path": f'{self.ts.Variables.SSLDir}',
"proxy.config.ssl.client.verify.server.policy": 'PERMISSIVE',
})
self.ts.Disk.ssl_multicert_yaml.AddLines(
"""
ssl_multicert:
- dest_ip: "*"
ssl_cert_name: server.pem
ssl_key_name: server.key
""".split("\n"))
self.ts.Disk.remap_config.AddLine(f"map / http://127.0.0.1:{self.server.Variables.http_port}/",)
self.ts.Disk.traffic_out.Content += Testers.ContainsExpression(
"user agent post chunk decoding error", "Verify that ATS detected a problem parsing a chunk.")
def runChunkedTraffic(self):
tr = Test.AddTestRun()
tr.AddVerifierClientProcess(
"client2", self.chunkedReplayFile, http_ports=[self.ts.Variables.port], https_ports=[self.ts.Variables.ssl_port])
tr.Processes.Default.StartBefore(self.server)
tr.Processes.Default.StartBefore(self.ts)
tr.StillRunningAfter = self.server
tr.StillRunningAfter = self.ts
# The aborted connections will result in errors and a non-zero return
# code from the verifier client.
tr.Processes.Default.ReturnCode = 1
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"(Unexpected chunked content for key 101: too small|Failed HTTP/1 transaction with key: 101)",
"Verify that ATS closed the forth transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"(Unexpected chunked content for key 102: too small|Failed HTTP/1 transaction with key: 102)",
"Verify that ATS closed the fifth transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"(Unexpected chunked content for key 103: too small|Failed HTTP/1 transaction with key: 103)",
"Verify that ATS closed the sixth transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"Received an HTTP/1 400 response for key 1 with headers", "Verify that ATS returns a response for uuid:1 transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"Received an HTTP/1 400 response for key 2 with headers", "Verify that ATS returns a response for uuid:2 transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"Received an HTTP/1 400 response for key 3 with headers", "Verify that ATS returns a response for uuid:3 transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"Received an HTTP/1 400 response for key 4 with headers", "Verify that ATS returns a response for uuid:4 transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"Received an HTTP/1 400 response for key 5 with headers", "Verify that ATS returns a response for uuid:5 transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"Received an HTTP/1 400 response for key 6 with headers", "Verify that ATS returns a response for uuid:6 transaction.")
tr.Processes.Default.Streams.stdout += Testers.ContainsExpression(
r"Received an HTTP/1 400 response for key 7 with headers", "Verify that ATS returns a response for uuid:7 transaction.")
# ATS should close the connection before any body gets through. "def"
# is the body sent by the server for each of these chunked cases.
tr.Processes.Default.Streams.stdout += Testers.ExcludesExpression("def", "Verify that the body never got through.")
def run(self):
self.runChunkedTraffic()
MalformedChunkHeaderTest().run()