You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

SmartClientSmartServerSslTest.java 9.5KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
  1. /*
  2. * Copyright (C) 2017 Thomas Wolf <thomas.wolf@paranor.ch>
  3. * and other copyright owners as documented in the project's IP log.
  4. *
  5. * This program and the accompanying materials are made available
  6. * under the terms of the Eclipse Distribution License v1.0 which
  7. * accompanies this distribution, is reproduced below, and is
  8. * available at http://www.eclipse.org/org/documents/edl-v10.php
  9. *
  10. * All rights reserved.
  11. *
  12. * Redistribution and use in source and binary forms, with or
  13. * without modification, are permitted provided that the following
  14. * conditions are met:
  15. *
  16. * - Redistributions of source code must retain the above copyright
  17. * notice, this list of conditions and the following disclaimer.
  18. *
  19. * - Redistributions in binary form must reproduce the above
  20. * copyright notice, this list of conditions and the following
  21. * disclaimer in the documentation and/or other materials provided
  22. * with the distribution.
  23. *
  24. * - Neither the name of the Eclipse Foundation, Inc. nor the
  25. * names of its contributors may be used to endorse or promote
  26. * products derived from this software without specific prior
  27. * written permission.
  28. *
  29. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
  30. * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
  31. * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  32. * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  33. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
  34. * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  35. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  36. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  37. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  38. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  39. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  40. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  41. * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  42. */
  43. package org.eclipse.jgit.http.test;
  44. import static org.junit.Assert.assertEquals;
  45. import static org.junit.Assert.assertFalse;
  46. import static org.junit.Assert.assertTrue;
  47. import static org.junit.Assert.fail;
  48. import java.io.IOException;
  49. import java.util.Arrays;
  50. import java.util.Collection;
  51. import java.util.EnumSet;
  52. import java.util.List;
  53. import javax.servlet.DispatcherType;
  54. import javax.servlet.Filter;
  55. import javax.servlet.FilterChain;
  56. import javax.servlet.FilterConfig;
  57. import javax.servlet.ServletException;
  58. import javax.servlet.ServletRequest;
  59. import javax.servlet.ServletResponse;
  60. import javax.servlet.http.HttpServletRequest;
  61. import javax.servlet.http.HttpServletResponse;
  62. import org.eclipse.jetty.servlet.FilterHolder;
  63. import org.eclipse.jetty.servlet.ServletContextHandler;
  64. import org.eclipse.jetty.servlet.ServletHolder;
  65. import org.eclipse.jgit.errors.TransportException;
  66. import org.eclipse.jgit.http.server.GitServlet;
  67. import org.eclipse.jgit.junit.TestRepository;
  68. import org.eclipse.jgit.junit.http.AccessEvent;
  69. import org.eclipse.jgit.junit.http.AppServer;
  70. import org.eclipse.jgit.junit.http.HttpTestCase;
  71. import org.eclipse.jgit.lib.ConfigConstants;
  72. import org.eclipse.jgit.lib.NullProgressMonitor;
  73. import org.eclipse.jgit.lib.Repository;
  74. import org.eclipse.jgit.revwalk.RevBlob;
  75. import org.eclipse.jgit.revwalk.RevCommit;
  76. import org.eclipse.jgit.storage.file.FileBasedConfig;
  77. import org.eclipse.jgit.transport.HttpTransport;
  78. import org.eclipse.jgit.transport.Transport;
  79. import org.eclipse.jgit.transport.URIish;
  80. import org.eclipse.jgit.transport.http.HttpConnectionFactory;
  81. import org.eclipse.jgit.transport.http.JDKHttpConnectionFactory;
  82. import org.eclipse.jgit.transport.http.apache.HttpClientConnectionFactory;
  83. import org.eclipse.jgit.util.FS;
  84. import org.eclipse.jgit.util.HttpSupport;
  85. import org.eclipse.jgit.util.SystemReader;
  86. import org.junit.Before;
  87. import org.junit.Test;
  88. import org.junit.runner.RunWith;
  89. import org.junit.runners.Parameterized;
  90. import org.junit.runners.Parameterized.Parameters;
  91. @RunWith(Parameterized.class)
  92. public class SmartClientSmartServerSslTest extends HttpTestCase {
  93. private URIish remoteURI;
  94. private URIish secureURI;
  95. private RevBlob A_txt;
  96. private RevCommit A, B;
  97. @Parameters
  98. public static Collection<Object[]> data() {
  99. // run all tests with both connection factories we have
  100. return Arrays.asList(new Object[][] {
  101. { new JDKHttpConnectionFactory() },
  102. { new HttpClientConnectionFactory() } });
  103. }
  104. public SmartClientSmartServerSslTest(HttpConnectionFactory cf) {
  105. HttpTransport.setConnectionFactory(cf);
  106. }
  107. @Override
  108. protected AppServer createServer() {
  109. return new AppServer(0, 0);
  110. }
  111. @Override
  112. @Before
  113. public void setUp() throws Exception {
  114. super.setUp();
  115. final TestRepository<Repository> src = createTestRepository();
  116. final String srcName = src.getRepository().getDirectory().getName();
  117. src.getRepository()
  118. .getConfig()
  119. .setBoolean(ConfigConstants.CONFIG_CORE_SECTION, null,
  120. ConfigConstants.CONFIG_KEY_LOGALLREFUPDATES, true);
  121. GitServlet gs = new GitServlet();
  122. ServletContextHandler app = addNormalContext(gs, src, srcName);
  123. server.setUp();
  124. remoteURI = toURIish(app, srcName);
  125. secureURI = new URIish(rewriteUrl(remoteURI.toString(), "https",
  126. server.getSecurePort()));
  127. A_txt = src.blob("A");
  128. A = src.commit().add("A_txt", A_txt).create();
  129. B = src.commit().parent(A).add("A_txt", "C").add("B", "B").create();
  130. src.update(master, B);
  131. src.update("refs/garbage/a/very/long/ref/name/to/compress", B);
  132. FileBasedConfig userConfig = SystemReader.getInstance()
  133. .openUserConfig(null, FS.DETECTED);
  134. userConfig.setBoolean("http", null, "sslVerify", false);
  135. userConfig.save();
  136. }
  137. private ServletContextHandler addNormalContext(GitServlet gs, TestRepository<Repository> src, String srcName) {
  138. ServletContextHandler app = server.addContext("/git");
  139. app.addFilter(new FilterHolder(new Filter() {
  140. @Override
  141. public void init(FilterConfig filterConfig)
  142. throws ServletException {
  143. // empty
  144. }
  145. // Redirects http to https for requests containing "/https/".
  146. @Override
  147. public void doFilter(ServletRequest request,
  148. ServletResponse response, FilterChain chain)
  149. throws IOException, ServletException {
  150. final HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  151. final HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  152. final StringBuffer fullUrl = httpServletRequest.getRequestURL();
  153. if (httpServletRequest.getQueryString() != null) {
  154. fullUrl.append("?")
  155. .append(httpServletRequest.getQueryString());
  156. }
  157. String urlString = rewriteUrl(fullUrl.toString(), "https",
  158. server.getSecurePort());
  159. httpServletResponse
  160. .setStatus(HttpServletResponse.SC_MOVED_PERMANENTLY);
  161. httpServletResponse.setHeader(HttpSupport.HDR_LOCATION,
  162. urlString.replace("/https/", "/"));
  163. }
  164. @Override
  165. public void destroy() {
  166. // empty
  167. }
  168. }), "/https/*", EnumSet.of(DispatcherType.REQUEST));
  169. app.addFilter(new FilterHolder(new Filter() {
  170. @Override
  171. public void init(FilterConfig filterConfig)
  172. throws ServletException {
  173. // empty
  174. }
  175. // Redirects https back to http for requests containing "/back/".
  176. @Override
  177. public void doFilter(ServletRequest request,
  178. ServletResponse response, FilterChain chain)
  179. throws IOException, ServletException {
  180. final HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  181. final HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  182. final StringBuffer fullUrl = httpServletRequest.getRequestURL();
  183. if (httpServletRequest.getQueryString() != null) {
  184. fullUrl.append("?")
  185. .append(httpServletRequest.getQueryString());
  186. }
  187. String urlString = rewriteUrl(fullUrl.toString(), "http",
  188. server.getPort());
  189. httpServletResponse
  190. .setStatus(HttpServletResponse.SC_MOVED_PERMANENTLY);
  191. httpServletResponse.setHeader(HttpSupport.HDR_LOCATION,
  192. urlString.replace("/back/", "/"));
  193. }
  194. @Override
  195. public void destroy() {
  196. // empty
  197. }
  198. }), "/back/*", EnumSet.of(DispatcherType.REQUEST));
  199. gs.setRepositoryResolver(new TestRepositoryResolver(src, srcName));
  200. app.addServlet(new ServletHolder(gs), "/*");
  201. return app;
  202. }
  203. @Test
  204. public void testInitialClone_ViaHttps() throws Exception {
  205. Repository dst = createBareRepository();
  206. assertFalse(dst.hasObject(A_txt));
  207. try (Transport t = Transport.open(dst, secureURI)) {
  208. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  209. }
  210. assertTrue(dst.hasObject(A_txt));
  211. assertEquals(B, dst.exactRef(master).getObjectId());
  212. fsck(dst, B);
  213. List<AccessEvent> requests = getRequests();
  214. assertEquals(2, requests.size());
  215. }
  216. @Test
  217. public void testInitialClone_RedirectToHttps() throws Exception {
  218. Repository dst = createBareRepository();
  219. assertFalse(dst.hasObject(A_txt));
  220. URIish cloneFrom = extendPath(remoteURI, "/https");
  221. try (Transport t = Transport.open(dst, cloneFrom)) {
  222. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  223. }
  224. assertTrue(dst.hasObject(A_txt));
  225. assertEquals(B, dst.exactRef(master).getObjectId());
  226. fsck(dst, B);
  227. List<AccessEvent> requests = getRequests();
  228. assertEquals(3, requests.size());
  229. }
  230. @Test
  231. public void testInitialClone_RedirectBackToHttp() throws Exception {
  232. Repository dst = createBareRepository();
  233. assertFalse(dst.hasObject(A_txt));
  234. URIish cloneFrom = extendPath(secureURI, "/back");
  235. try (Transport t = Transport.open(dst, cloneFrom)) {
  236. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  237. fail("Should have failed (redirect from https to http)");
  238. } catch (TransportException e) {
  239. assertTrue(e.getMessage().contains("not allowed"));
  240. }
  241. }
  242. }