| ''' |
| ''' |
| # Licensed to the Apache Software Foundation (ASF) under one |
| # or more contributor license agreements. See the NOTICE file |
| # distributed with this work for additional information |
| # regarding copyright ownership. The ASF licenses this file |
| # to you under the Apache License, Version 2.0 (the |
| # "License"); you may not use this file except in compliance |
| # with the License. You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| import os |
| |
| Test.Summary = ''' |
| Test unsupported values for chunked_encoding |
| ''' |
| |
| Test.ContinueOnFail = True |
| |
| # Define default ATS |
| ts = Test.MakeATSProcess("ts1") |
| server = Test.MakeOriginServer("server") |
| |
| testName = "" |
| request_header = { |
| "headers": "POST /case1 HTTP/1.1\r\nHost: www.example.com\r\nuuid:1\r\n\r\n", |
| "timestamp": "1469733493.993", |
| "body": "stuff" |
| } |
| response_header = { |
| "headers": "HTTP/1.1 200 OK\r\nServer: uServer\r\nConnection: close\r\nTransfer-Encoding: chunked\r\n\r\n", |
| "timestamp": "1469733493.993", |
| "body": "more stuff" |
| } |
| |
| server.addResponse("sessionlog.json", request_header, response_header) |
| |
| ts.Disk.records_config.update({'proxy.config.diags.debug.enabled': 0, 'proxy.config.diags.debug.tags': 'http'}) |
| |
| ts.Disk.remap_config.AddLine('map / http://127.0.0.1:{0}'.format(server.Variables.Port)) |
| |
| # HTTP1.1 POST: www.example.com/case1 with gzip transfer-encoding |
| tr = Test.AddTestRun() |
| tr.TimeOut = 5 |
| tr.MakeCurlCommand( |
| '-H "host: example.com" -H "transfer-encoding: gzip" -d "stuff" http://127.0.0.1:{0}/case1 --verbose'.format( |
| ts.Variables.port), |
| ts=ts) |
| tr.Processes.Default.ReturnCode = 0 |
| tr.Processes.Default.StartBefore(server) |
| tr.Processes.Default.StartBefore(ts) |
| tr.Processes.Default.Streams.All = Testers.ContainsExpression("501 Field not implemented", "Should fail") |
| tr.Processes.Default.Streams.All = Testers.ExcludesExpression("200 OK", "Should not succeed") |
| tr.StillRunningAfter = server |
| tr.StillRunningAfter = ts |
| |
| # HTTP1.1 POST: www.example.com/case1 with gzip and chunked transfer-encoding |
| tr = Test.AddTestRun() |
| tr.TimeOut = 5 |
| tr.MakeCurlCommand( |
| '-H "host: example.com" -H "transfer-encoding: gzip" -H "transfer-encoding: chunked" -d "stuff" http://127.0.0.1:{0}/case1 --verbose' |
| .format(ts.Variables.port), |
| ts=ts) |
| tr.Processes.Default.ReturnCode = 0 |
| tr.Processes.Default.Streams.All = Testers.ContainsExpression("501 Field not implemented", "Should fail") |
| tr.Processes.Default.Streams.All = Testers.ExcludesExpression("200 OK", "Should not succeed") |
| tr.StillRunningAfter = server |
| tr.StillRunningAfter = ts |
| |
| |
| class HTTP10Test: |
| chunkedReplayFile = "replays/chunked_in_http_1_0.replay.yaml" |
| |
| def __init__(self): |
| self.setupOriginServer() |
| self.setupTS() |
| |
| def setupOriginServer(self): |
| self.server = Test.MakeVerifierServerProcess("verifier-server1", self.chunkedReplayFile) |
| |
| def setupTS(self): |
| self.ts = Test.MakeATSProcess("ts2", enable_tls=True, enable_cache=False) |
| self.ts.addDefaultSSLFiles() |
| self.ts.Disk.records_config.update( |
| { |
| "proxy.config.diags.debug.enabled": 1, |
| "proxy.config.diags.debug.tags": "http", |
| "proxy.config.ssl.server.cert.path": f'{self.ts.Variables.SSLDir}', |
| "proxy.config.ssl.server.private_key.path": f'{self.ts.Variables.SSLDir}', |
| "proxy.config.ssl.client.verify.server.policy": 'PERMISSIVE', |
| }) |
| self.ts.Disk.ssl_multicert_yaml.AddLines( |
| """ |
| ssl_multicert: |
| - dest_ip: "*" |
| ssl_cert_name: server.pem |
| ssl_key_name: server.key |
| """.split("\n")) |
| self.ts.Disk.remap_config.AddLine(f"map / http://127.0.0.1:{self.server.Variables.http_port}/",) |
| |
| def runChunkedTraffic(self): |
| tr = Test.AddTestRun() |
| tr.AddVerifierClientProcess( |
| "client1", self.chunkedReplayFile, http_ports=[self.ts.Variables.port], https_ports=[self.ts.Variables.ssl_port]) |
| tr.Processes.Default.StartBefore(self.server) |
| tr.Processes.Default.StartBefore(self.ts) |
| tr.StillRunningAfter = self.server |
| tr.StillRunningAfter = self.ts |
| |
| def run(self): |
| self.runChunkedTraffic() |
| |
| |
| HTTP10Test().run() |
| |
| |
| class MalformedChunkHeaderTest: |
| chunkedReplayFile = "replays/malformed_chunked_header.replay.yaml" |
| |
| def __init__(self): |
| self.setupOriginServer() |
| self.setupTS() |
| |
| def setupOriginServer(self): |
| self.server = Test.MakeVerifierServerProcess("verifier-server2", self.chunkedReplayFile) |
| |
| # The server's responses will fail the first three transactions |
| # because ATS will close the connection due to the malformed |
| # chunk headers. |
| self.server.Streams.stdout += Testers.ContainsExpression( |
| "Unexpected chunked content for key 1: too small", "Verify that writing the first response failed.") |
| self.server.Streams.stdout += Testers.ExcludesExpression( |
| "chunked body of 3 bytes for key 2 with chunk stream", "Verify that writing the second response failed.") |
| self.server.Streams.stdout += Testers.ContainsExpression( |
| "Unexpected chunked content for key 3: too small", "Verify that writing the third response failed.") |
| self.server.Streams.stdout += Testers.ContainsExpression( |
| "Unexpected chunked content for key 8: too small", "Verify that writing the sixth response failed.") |
| |
| # ATS should close the connection before any body gets through. "abcwxyz" |
| # is the body sent by the client for each of these chunked cases. |
| self.server.Streams.stdout += Testers.ExcludesExpression("abcwxyz", "Verify that the body never got through.") |
| |
| def setupTS(self): |
| self.ts = Test.MakeATSProcess("ts3", enable_tls=True, enable_cache=False) |
| self.ts.addDefaultSSLFiles() |
| self.ts.Disk.records_config.update( |
| { |
| "proxy.config.diags.debug.enabled": 1, |
| "proxy.config.diags.debug.tags": "http", |
| "proxy.config.ssl.server.cert.path": f'{self.ts.Variables.SSLDir}', |
| "proxy.config.ssl.server.private_key.path": f'{self.ts.Variables.SSLDir}', |
| "proxy.config.ssl.client.verify.server.policy": 'PERMISSIVE', |
| }) |
| self.ts.Disk.ssl_multicert_yaml.AddLines( |
| """ |
| ssl_multicert: |
| - dest_ip: "*" |
| ssl_cert_name: server.pem |
| ssl_key_name: server.key |
| """.split("\n")) |
| self.ts.Disk.remap_config.AddLine(f"map / http://127.0.0.1:{self.server.Variables.http_port}/",) |
| self.ts.Disk.traffic_out.Content += Testers.ContainsExpression( |
| "user agent post chunk decoding error", "Verify that ATS detected a problem parsing a chunk.") |
| |
| def runChunkedTraffic(self): |
| tr = Test.AddTestRun() |
| tr.AddVerifierClientProcess( |
| "client2", self.chunkedReplayFile, http_ports=[self.ts.Variables.port], https_ports=[self.ts.Variables.ssl_port]) |
| tr.Processes.Default.StartBefore(self.server) |
| tr.Processes.Default.StartBefore(self.ts) |
| tr.StillRunningAfter = self.server |
| tr.StillRunningAfter = self.ts |
| |
| # The aborted connections will result in errors and a non-zero return |
| # code from the verifier client. |
| tr.Processes.Default.ReturnCode = 1 |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"(Unexpected chunked content for key 101: too small|Failed HTTP/1 transaction with key: 101)", |
| "Verify that ATS closed the forth transaction.") |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"(Unexpected chunked content for key 102: too small|Failed HTTP/1 transaction with key: 102)", |
| "Verify that ATS closed the fifth transaction.") |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"(Unexpected chunked content for key 103: too small|Failed HTTP/1 transaction with key: 103)", |
| "Verify that ATS closed the sixth transaction.") |
| |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"Received an HTTP/1 400 response for key 1 with headers", "Verify that ATS returns a response for uuid:1 transaction.") |
| |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"Received an HTTP/1 400 response for key 2 with headers", "Verify that ATS returns a response for uuid:2 transaction.") |
| |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"Received an HTTP/1 400 response for key 3 with headers", "Verify that ATS returns a response for uuid:3 transaction.") |
| |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"Received an HTTP/1 400 response for key 4 with headers", "Verify that ATS returns a response for uuid:4 transaction.") |
| |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"Received an HTTP/1 400 response for key 5 with headers", "Verify that ATS returns a response for uuid:5 transaction.") |
| |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"Received an HTTP/1 400 response for key 6 with headers", "Verify that ATS returns a response for uuid:6 transaction.") |
| |
| tr.Processes.Default.Streams.stdout += Testers.ContainsExpression( |
| r"Received an HTTP/1 400 response for key 7 with headers", "Verify that ATS returns a response for uuid:7 transaction.") |
| |
| # ATS should close the connection before any body gets through. "def" |
| # is the body sent by the server for each of these chunked cases. |
| tr.Processes.Default.Streams.stdout += Testers.ExcludesExpression("def", "Verify that the body never got through.") |
| |
| def run(self): |
| self.runChunkedTraffic() |
| |
| |
| MalformedChunkHeaderTest().run() |