You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

SmartClientSmartServerSslTest.java 9.3KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293
  1. /*
  2. * Copyright (C) 2017 Thomas Wolf <thomas.wolf@paranor.ch> and others
  3. *
  4. * This program and the accompanying materials are made available under the
  5. * terms of the Eclipse Distribution License v. 1.0 which is available at
  6. * https://www.eclipse.org/org/documents/edl-v10.php.
  7. *
  8. * SPDX-License-Identifier: BSD-3-Clause
  9. */
  10. package org.eclipse.jgit.http.test;
  11. import static org.junit.Assert.assertEquals;
  12. import static org.junit.Assert.assertFalse;
  13. import static org.junit.Assert.assertTrue;
  14. import static org.junit.Assert.fail;
  15. import java.io.IOException;
  16. import java.util.EnumSet;
  17. import java.util.List;
  18. import javax.servlet.DispatcherType;
  19. import javax.servlet.Filter;
  20. import javax.servlet.FilterChain;
  21. import javax.servlet.FilterConfig;
  22. import javax.servlet.ServletException;
  23. import javax.servlet.ServletRequest;
  24. import javax.servlet.ServletResponse;
  25. import javax.servlet.http.HttpServletRequest;
  26. import javax.servlet.http.HttpServletResponse;
  27. import org.eclipse.jetty.servlet.FilterHolder;
  28. import org.eclipse.jetty.servlet.ServletContextHandler;
  29. import org.eclipse.jetty.servlet.ServletHolder;
  30. import org.eclipse.jgit.errors.TransportException;
  31. import org.eclipse.jgit.errors.UnsupportedCredentialItem;
  32. import org.eclipse.jgit.http.server.GitServlet;
  33. import org.eclipse.jgit.junit.TestRepository;
  34. import org.eclipse.jgit.junit.http.AccessEvent;
  35. import org.eclipse.jgit.junit.http.AppServer;
  36. import org.eclipse.jgit.lib.ConfigConstants;
  37. import org.eclipse.jgit.lib.NullProgressMonitor;
  38. import org.eclipse.jgit.lib.Repository;
  39. import org.eclipse.jgit.revwalk.RevBlob;
  40. import org.eclipse.jgit.revwalk.RevCommit;
  41. import org.eclipse.jgit.transport.CredentialItem;
  42. import org.eclipse.jgit.transport.CredentialsProvider;
  43. import org.eclipse.jgit.transport.Transport;
  44. import org.eclipse.jgit.transport.URIish;
  45. import org.eclipse.jgit.transport.UsernamePasswordCredentialsProvider;
  46. import org.eclipse.jgit.transport.http.HttpConnectionFactory;
  47. import org.eclipse.jgit.util.HttpSupport;
  48. import org.junit.Before;
  49. import org.junit.Test;
  50. import org.junit.runner.RunWith;
  51. import org.junit.runners.Parameterized;
  52. @RunWith(Parameterized.class)
  53. public class SmartClientSmartServerSslTest extends AllFactoriesHttpTestCase {
  54. // We run these tests with a server on localhost with a self-signed
  55. // certificate. We don't do authentication tests here, so there's no need
  56. // for username and password.
  57. //
  58. // But the server certificate will not validate. We know that Transport will
  59. // ask whether we trust the server all the same. This credentials provider
  60. // blindly trusts the self-signed certificate by answering "Yes" to all
  61. // questions.
  62. private CredentialsProvider testCredentials = new CredentialsProvider() {
  63. @Override
  64. public boolean isInteractive() {
  65. return false;
  66. }
  67. @Override
  68. public boolean supports(CredentialItem... items) {
  69. for (CredentialItem item : items) {
  70. if (item instanceof CredentialItem.InformationalMessage) {
  71. continue;
  72. }
  73. if (item instanceof CredentialItem.YesNoType) {
  74. continue;
  75. }
  76. return false;
  77. }
  78. return true;
  79. }
  80. @Override
  81. public boolean get(URIish uri, CredentialItem... items)
  82. throws UnsupportedCredentialItem {
  83. for (CredentialItem item : items) {
  84. if (item instanceof CredentialItem.InformationalMessage) {
  85. continue;
  86. }
  87. if (item instanceof CredentialItem.YesNoType) {
  88. ((CredentialItem.YesNoType) item).setValue(true);
  89. continue;
  90. }
  91. return false;
  92. }
  93. return true;
  94. }
  95. };
  96. private URIish remoteURI;
  97. private URIish secureURI;
  98. private RevBlob A_txt;
  99. private RevCommit A, B;
  100. public SmartClientSmartServerSslTest(HttpConnectionFactory cf) {
  101. super(cf);
  102. }
  103. @Override
  104. protected AppServer createServer() {
  105. return new AppServer(0, 0);
  106. }
  107. @Override
  108. @Before
  109. public void setUp() throws Exception {
  110. super.setUp();
  111. final TestRepository<Repository> src = createTestRepository();
  112. final String srcName = src.getRepository().getDirectory().getName();
  113. src.getRepository()
  114. .getConfig()
  115. .setBoolean(ConfigConstants.CONFIG_CORE_SECTION, null,
  116. ConfigConstants.CONFIG_KEY_LOGALLREFUPDATES, true);
  117. GitServlet gs = new GitServlet();
  118. ServletContextHandler app = addNormalContext(gs, src, srcName);
  119. server.setUp();
  120. remoteURI = toURIish(app, srcName);
  121. secureURI = new URIish(rewriteUrl(remoteURI.toString(), "https",
  122. server.getSecurePort()));
  123. A_txt = src.blob("A");
  124. A = src.commit().add("A_txt", A_txt).create();
  125. B = src.commit().parent(A).add("A_txt", "C").add("B", "B").create();
  126. src.update(master, B);
  127. src.update("refs/garbage/a/very/long/ref/name/to/compress", B);
  128. }
  129. private ServletContextHandler addNormalContext(GitServlet gs, TestRepository<Repository> src, String srcName) {
  130. ServletContextHandler app = server.addContext("/git");
  131. app.addFilter(new FilterHolder(new Filter() {
  132. @Override
  133. public void init(FilterConfig filterConfig)
  134. throws ServletException {
  135. // empty
  136. }
  137. // Redirects http to https for requests containing "/https/".
  138. @Override
  139. public void doFilter(ServletRequest request,
  140. ServletResponse response, FilterChain chain)
  141. throws IOException, ServletException {
  142. final HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  143. final HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  144. final StringBuffer fullUrl = httpServletRequest.getRequestURL();
  145. if (httpServletRequest.getQueryString() != null) {
  146. fullUrl.append("?")
  147. .append(httpServletRequest.getQueryString());
  148. }
  149. String urlString = rewriteUrl(fullUrl.toString(), "https",
  150. server.getSecurePort());
  151. httpServletResponse
  152. .setStatus(HttpServletResponse.SC_MOVED_PERMANENTLY);
  153. httpServletResponse.setHeader(HttpSupport.HDR_LOCATION,
  154. urlString.replace("/https/", "/"));
  155. }
  156. @Override
  157. public void destroy() {
  158. // empty
  159. }
  160. }), "/https/*", EnumSet.of(DispatcherType.REQUEST));
  161. app.addFilter(new FilterHolder(new Filter() {
  162. @Override
  163. public void init(FilterConfig filterConfig)
  164. throws ServletException {
  165. // empty
  166. }
  167. // Redirects https back to http for requests containing "/back/".
  168. @Override
  169. public void doFilter(ServletRequest request,
  170. ServletResponse response, FilterChain chain)
  171. throws IOException, ServletException {
  172. final HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  173. final HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  174. final StringBuffer fullUrl = httpServletRequest.getRequestURL();
  175. if (httpServletRequest.getQueryString() != null) {
  176. fullUrl.append("?")
  177. .append(httpServletRequest.getQueryString());
  178. }
  179. String urlString = rewriteUrl(fullUrl.toString(), "http",
  180. server.getPort());
  181. httpServletResponse
  182. .setStatus(HttpServletResponse.SC_MOVED_PERMANENTLY);
  183. httpServletResponse.setHeader(HttpSupport.HDR_LOCATION,
  184. urlString.replace("/back/", "/"));
  185. }
  186. @Override
  187. public void destroy() {
  188. // empty
  189. }
  190. }), "/back/*", EnumSet.of(DispatcherType.REQUEST));
  191. gs.setRepositoryResolver(new TestRepositoryResolver(src, srcName));
  192. app.addServlet(new ServletHolder(gs), "/*");
  193. return app;
  194. }
  195. @Test
  196. public void testInitialClone_ViaHttps() throws Exception {
  197. Repository dst = createBareRepository();
  198. assertFalse(dst.getObjectDatabase().has(A_txt));
  199. try (Transport t = Transport.open(dst, secureURI)) {
  200. t.setCredentialsProvider(testCredentials);
  201. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  202. }
  203. assertTrue(dst.getObjectDatabase().has(A_txt));
  204. assertEquals(B, dst.exactRef(master).getObjectId());
  205. fsck(dst, B);
  206. List<AccessEvent> requests = getRequests();
  207. assertEquals(2, requests.size());
  208. }
  209. @Test
  210. public void testInitialClone_RedirectToHttps() throws Exception {
  211. Repository dst = createBareRepository();
  212. assertFalse(dst.getObjectDatabase().has(A_txt));
  213. URIish cloneFrom = extendPath(remoteURI, "/https");
  214. try (Transport t = Transport.open(dst, cloneFrom)) {
  215. t.setCredentialsProvider(testCredentials);
  216. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  217. }
  218. assertTrue(dst.getObjectDatabase().has(A_txt));
  219. assertEquals(B, dst.exactRef(master).getObjectId());
  220. fsck(dst, B);
  221. List<AccessEvent> requests = getRequests();
  222. assertEquals(3, requests.size());
  223. }
  224. @Test
  225. public void testInitialClone_RedirectBackToHttp() throws Exception {
  226. Repository dst = createBareRepository();
  227. assertFalse(dst.getObjectDatabase().has(A_txt));
  228. URIish cloneFrom = extendPath(secureURI, "/back");
  229. try (Transport t = Transport.open(dst, cloneFrom)) {
  230. t.setCredentialsProvider(testCredentials);
  231. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  232. fail("Should have failed (redirect from https to http)");
  233. } catch (TransportException e) {
  234. assertTrue(e.getMessage().contains("not allowed"));
  235. }
  236. }
  237. @Test
  238. public void testInitialClone_SslFailure() throws Exception {
  239. Repository dst = createBareRepository();
  240. assertFalse(dst.getObjectDatabase().has(A_txt));
  241. try (Transport t = Transport.open(dst, secureURI)) {
  242. // Set a credentials provider that doesn't handle questions
  243. t.setCredentialsProvider(
  244. new UsernamePasswordCredentialsProvider("any", "anypwd"));
  245. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  246. fail("Should have failed (SSL certificate not trusted)");
  247. } catch (TransportException e) {
  248. assertTrue(e.getMessage().contains("Secure connection"));
  249. }
  250. }
  251. }