You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

SmartClientSmartServerSslTest.java 11KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341
  1. /*
  2. * Copyright (C) 2017 Thomas Wolf <thomas.wolf@paranor.ch>
  3. * and other copyright owners as documented in the project's IP log.
  4. *
  5. * This program and the accompanying materials are made available
  6. * under the terms of the Eclipse Distribution License v1.0 which
  7. * accompanies this distribution, is reproduced below, and is
  8. * available at http://www.eclipse.org/org/documents/edl-v10.php
  9. *
  10. * All rights reserved.
  11. *
  12. * Redistribution and use in source and binary forms, with or
  13. * without modification, are permitted provided that the following
  14. * conditions are met:
  15. *
  16. * - Redistributions of source code must retain the above copyright
  17. * notice, this list of conditions and the following disclaimer.
  18. *
  19. * - Redistributions in binary form must reproduce the above
  20. * copyright notice, this list of conditions and the following
  21. * disclaimer in the documentation and/or other materials provided
  22. * with the distribution.
  23. *
  24. * - Neither the name of the Eclipse Foundation, Inc. nor the
  25. * names of its contributors may be used to endorse or promote
  26. * products derived from this software without specific prior
  27. * written permission.
  28. *
  29. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
  30. * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
  31. * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  32. * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  33. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
  34. * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  35. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  36. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  37. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  38. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  39. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  40. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  41. * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  42. */
  43. package org.eclipse.jgit.http.test;
  44. import static org.junit.Assert.assertEquals;
  45. import static org.junit.Assert.assertFalse;
  46. import static org.junit.Assert.assertTrue;
  47. import static org.junit.Assert.fail;
  48. import java.io.IOException;
  49. import java.util.Arrays;
  50. import java.util.Collection;
  51. import java.util.EnumSet;
  52. import java.util.List;
  53. import javax.servlet.DispatcherType;
  54. import javax.servlet.Filter;
  55. import javax.servlet.FilterChain;
  56. import javax.servlet.FilterConfig;
  57. import javax.servlet.ServletException;
  58. import javax.servlet.ServletRequest;
  59. import javax.servlet.ServletResponse;
  60. import javax.servlet.http.HttpServletRequest;
  61. import javax.servlet.http.HttpServletResponse;
  62. import org.eclipse.jetty.servlet.FilterHolder;
  63. import org.eclipse.jetty.servlet.ServletContextHandler;
  64. import org.eclipse.jetty.servlet.ServletHolder;
  65. import org.eclipse.jgit.errors.TransportException;
  66. import org.eclipse.jgit.errors.UnsupportedCredentialItem;
  67. import org.eclipse.jgit.http.server.GitServlet;
  68. import org.eclipse.jgit.junit.TestRepository;
  69. import org.eclipse.jgit.junit.http.AccessEvent;
  70. import org.eclipse.jgit.junit.http.AppServer;
  71. import org.eclipse.jgit.junit.http.HttpTestCase;
  72. import org.eclipse.jgit.lib.ConfigConstants;
  73. import org.eclipse.jgit.lib.NullProgressMonitor;
  74. import org.eclipse.jgit.lib.Repository;
  75. import org.eclipse.jgit.revwalk.RevBlob;
  76. import org.eclipse.jgit.revwalk.RevCommit;
  77. import org.eclipse.jgit.transport.CredentialItem;
  78. import org.eclipse.jgit.transport.CredentialsProvider;
  79. import org.eclipse.jgit.transport.HttpTransport;
  80. import org.eclipse.jgit.transport.Transport;
  81. import org.eclipse.jgit.transport.URIish;
  82. import org.eclipse.jgit.transport.UsernamePasswordCredentialsProvider;
  83. import org.eclipse.jgit.transport.http.HttpConnectionFactory;
  84. import org.eclipse.jgit.transport.http.JDKHttpConnectionFactory;
  85. import org.eclipse.jgit.transport.http.apache.HttpClientConnectionFactory;
  86. import org.eclipse.jgit.util.HttpSupport;
  87. import org.junit.Before;
  88. import org.junit.Test;
  89. import org.junit.runner.RunWith;
  90. import org.junit.runners.Parameterized;
  91. import org.junit.runners.Parameterized.Parameters;
  92. @RunWith(Parameterized.class)
  93. public class SmartClientSmartServerSslTest extends HttpTestCase {
  94. // We run these tests with a server on localhost with a self-signed
  95. // certificate. We don't do authentication tests here, so there's no need
  96. // for username and password.
  97. //
  98. // But the server certificate will not validate. We know that Transport will
  99. // ask whether we trust the server all the same. This credentials provider
  100. // blindly trusts the self-signed certificate by answering "Yes" to all
  101. // questions.
  102. private CredentialsProvider testCredentials = new CredentialsProvider() {
  103. @Override
  104. public boolean isInteractive() {
  105. return false;
  106. }
  107. @Override
  108. public boolean supports(CredentialItem... items) {
  109. for (CredentialItem item : items) {
  110. if (item instanceof CredentialItem.InformationalMessage) {
  111. continue;
  112. }
  113. if (item instanceof CredentialItem.YesNoType) {
  114. continue;
  115. }
  116. return false;
  117. }
  118. return true;
  119. }
  120. @Override
  121. public boolean get(URIish uri, CredentialItem... items)
  122. throws UnsupportedCredentialItem {
  123. for (CredentialItem item : items) {
  124. if (item instanceof CredentialItem.InformationalMessage) {
  125. continue;
  126. }
  127. if (item instanceof CredentialItem.YesNoType) {
  128. ((CredentialItem.YesNoType) item).setValue(true);
  129. continue;
  130. }
  131. return false;
  132. }
  133. return true;
  134. }
  135. };
  136. private URIish remoteURI;
  137. private URIish secureURI;
  138. private RevBlob A_txt;
  139. private RevCommit A, B;
  140. @Parameters
  141. public static Collection<Object[]> data() {
  142. // run all tests with both connection factories we have
  143. return Arrays.asList(new Object[][] {
  144. { new JDKHttpConnectionFactory() },
  145. { new HttpClientConnectionFactory() } });
  146. }
  147. public SmartClientSmartServerSslTest(HttpConnectionFactory cf) {
  148. HttpTransport.setConnectionFactory(cf);
  149. }
  150. @Override
  151. protected AppServer createServer() {
  152. return new AppServer(0, 0);
  153. }
  154. @Override
  155. @Before
  156. public void setUp() throws Exception {
  157. super.setUp();
  158. final TestRepository<Repository> src = createTestRepository();
  159. final String srcName = src.getRepository().getDirectory().getName();
  160. src.getRepository()
  161. .getConfig()
  162. .setBoolean(ConfigConstants.CONFIG_CORE_SECTION, null,
  163. ConfigConstants.CONFIG_KEY_LOGALLREFUPDATES, true);
  164. GitServlet gs = new GitServlet();
  165. ServletContextHandler app = addNormalContext(gs, src, srcName);
  166. server.setUp();
  167. remoteURI = toURIish(app, srcName);
  168. secureURI = new URIish(rewriteUrl(remoteURI.toString(), "https",
  169. server.getSecurePort()));
  170. A_txt = src.blob("A");
  171. A = src.commit().add("A_txt", A_txt).create();
  172. B = src.commit().parent(A).add("A_txt", "C").add("B", "B").create();
  173. src.update(master, B);
  174. src.update("refs/garbage/a/very/long/ref/name/to/compress", B);
  175. }
  176. private ServletContextHandler addNormalContext(GitServlet gs, TestRepository<Repository> src, String srcName) {
  177. ServletContextHandler app = server.addContext("/git");
  178. app.addFilter(new FilterHolder(new Filter() {
  179. @Override
  180. public void init(FilterConfig filterConfig)
  181. throws ServletException {
  182. // empty
  183. }
  184. // Redirects http to https for requests containing "/https/".
  185. @Override
  186. public void doFilter(ServletRequest request,
  187. ServletResponse response, FilterChain chain)
  188. throws IOException, ServletException {
  189. final HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  190. final HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  191. final StringBuffer fullUrl = httpServletRequest.getRequestURL();
  192. if (httpServletRequest.getQueryString() != null) {
  193. fullUrl.append("?")
  194. .append(httpServletRequest.getQueryString());
  195. }
  196. String urlString = rewriteUrl(fullUrl.toString(), "https",
  197. server.getSecurePort());
  198. httpServletResponse
  199. .setStatus(HttpServletResponse.SC_MOVED_PERMANENTLY);
  200. httpServletResponse.setHeader(HttpSupport.HDR_LOCATION,
  201. urlString.replace("/https/", "/"));
  202. }
  203. @Override
  204. public void destroy() {
  205. // empty
  206. }
  207. }), "/https/*", EnumSet.of(DispatcherType.REQUEST));
  208. app.addFilter(new FilterHolder(new Filter() {
  209. @Override
  210. public void init(FilterConfig filterConfig)
  211. throws ServletException {
  212. // empty
  213. }
  214. // Redirects https back to http for requests containing "/back/".
  215. @Override
  216. public void doFilter(ServletRequest request,
  217. ServletResponse response, FilterChain chain)
  218. throws IOException, ServletException {
  219. final HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  220. final HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  221. final StringBuffer fullUrl = httpServletRequest.getRequestURL();
  222. if (httpServletRequest.getQueryString() != null) {
  223. fullUrl.append("?")
  224. .append(httpServletRequest.getQueryString());
  225. }
  226. String urlString = rewriteUrl(fullUrl.toString(), "http",
  227. server.getPort());
  228. httpServletResponse
  229. .setStatus(HttpServletResponse.SC_MOVED_PERMANENTLY);
  230. httpServletResponse.setHeader(HttpSupport.HDR_LOCATION,
  231. urlString.replace("/back/", "/"));
  232. }
  233. @Override
  234. public void destroy() {
  235. // empty
  236. }
  237. }), "/back/*", EnumSet.of(DispatcherType.REQUEST));
  238. gs.setRepositoryResolver(new TestRepositoryResolver(src, srcName));
  239. app.addServlet(new ServletHolder(gs), "/*");
  240. return app;
  241. }
  242. @Test
  243. public void testInitialClone_ViaHttps() throws Exception {
  244. Repository dst = createBareRepository();
  245. assertFalse(dst.hasObject(A_txt));
  246. try (Transport t = Transport.open(dst, secureURI)) {
  247. t.setCredentialsProvider(testCredentials);
  248. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  249. }
  250. assertTrue(dst.hasObject(A_txt));
  251. assertEquals(B, dst.exactRef(master).getObjectId());
  252. fsck(dst, B);
  253. List<AccessEvent> requests = getRequests();
  254. assertEquals(2, requests.size());
  255. }
  256. @Test
  257. public void testInitialClone_RedirectToHttps() throws Exception {
  258. Repository dst = createBareRepository();
  259. assertFalse(dst.hasObject(A_txt));
  260. URIish cloneFrom = extendPath(remoteURI, "/https");
  261. try (Transport t = Transport.open(dst, cloneFrom)) {
  262. t.setCredentialsProvider(testCredentials);
  263. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  264. }
  265. assertTrue(dst.hasObject(A_txt));
  266. assertEquals(B, dst.exactRef(master).getObjectId());
  267. fsck(dst, B);
  268. List<AccessEvent> requests = getRequests();
  269. assertEquals(3, requests.size());
  270. }
  271. @Test
  272. public void testInitialClone_RedirectBackToHttp() throws Exception {
  273. Repository dst = createBareRepository();
  274. assertFalse(dst.hasObject(A_txt));
  275. URIish cloneFrom = extendPath(secureURI, "/back");
  276. try (Transport t = Transport.open(dst, cloneFrom)) {
  277. t.setCredentialsProvider(testCredentials);
  278. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  279. fail("Should have failed (redirect from https to http)");
  280. } catch (TransportException e) {
  281. assertTrue(e.getMessage().contains("not allowed"));
  282. }
  283. }
  284. @Test
  285. public void testInitialClone_SslFailure() throws Exception {
  286. Repository dst = createBareRepository();
  287. assertFalse(dst.hasObject(A_txt));
  288. try (Transport t = Transport.open(dst, secureURI)) {
  289. // Set a credentials provider that doesn't handle questions
  290. t.setCredentialsProvider(
  291. new UsernamePasswordCredentialsProvider("any", "anypwd"));
  292. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  293. fail("Should have failed (SSL certificate not trusted)");
  294. } catch (TransportException e) {
  295. assertTrue(e.getMessage().contains("Secure connection"));
  296. }
  297. }
  298. }