You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

SmartClientSmartServerSslTest.java 9.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294
  1. /*
  2. * Copyright (C) 2017, 2020 Thomas Wolf <thomas.wolf@paranor.ch> and others
  3. *
  4. * This program and the accompanying materials are made available under the
  5. * terms of the Eclipse Distribution License v. 1.0 which is available at
  6. * https://www.eclipse.org/org/documents/edl-v10.php.
  7. *
  8. * SPDX-License-Identifier: BSD-3-Clause
  9. */
  10. package org.eclipse.jgit.http.test;
  11. import static org.junit.Assert.assertEquals;
  12. import static org.junit.Assert.assertFalse;
  13. import static org.junit.Assert.assertTrue;
  14. import static org.junit.Assert.fail;
  15. import java.io.IOException;
  16. import java.util.EnumSet;
  17. import java.util.List;
  18. import javax.servlet.DispatcherType;
  19. import javax.servlet.Filter;
  20. import javax.servlet.FilterChain;
  21. import javax.servlet.FilterConfig;
  22. import javax.servlet.ServletException;
  23. import javax.servlet.ServletRequest;
  24. import javax.servlet.ServletResponse;
  25. import javax.servlet.http.HttpServletRequest;
  26. import javax.servlet.http.HttpServletResponse;
  27. import org.eclipse.jetty.servlet.FilterHolder;
  28. import org.eclipse.jetty.servlet.ServletContextHandler;
  29. import org.eclipse.jetty.servlet.ServletHolder;
  30. import org.eclipse.jgit.errors.TransportException;
  31. import org.eclipse.jgit.errors.UnsupportedCredentialItem;
  32. import org.eclipse.jgit.http.server.GitServlet;
  33. import org.eclipse.jgit.junit.TestRepository;
  34. import org.eclipse.jgit.junit.http.AccessEvent;
  35. import org.eclipse.jgit.junit.http.AppServer;
  36. import org.eclipse.jgit.lib.ConfigConstants;
  37. import org.eclipse.jgit.lib.NullProgressMonitor;
  38. import org.eclipse.jgit.lib.Repository;
  39. import org.eclipse.jgit.lib.StoredConfig;
  40. import org.eclipse.jgit.revwalk.RevBlob;
  41. import org.eclipse.jgit.revwalk.RevCommit;
  42. import org.eclipse.jgit.transport.CredentialItem;
  43. import org.eclipse.jgit.transport.CredentialsProvider;
  44. import org.eclipse.jgit.transport.Transport;
  45. import org.eclipse.jgit.transport.URIish;
  46. import org.eclipse.jgit.transport.UsernamePasswordCredentialsProvider;
  47. import org.eclipse.jgit.util.HttpSupport;
  48. import org.junit.Before;
  49. import org.junit.Test;
  50. import org.junit.runner.RunWith;
  51. import org.junit.runners.Parameterized;
  52. @RunWith(Parameterized.class)
  53. public class SmartClientSmartServerSslTest extends AllProtocolsHttpTestCase {
  54. // We run these tests with a server on localhost with a self-signed
  55. // certificate. We don't do authentication tests here, so there's no need
  56. // for username and password.
  57. //
  58. // But the server certificate will not validate. We know that Transport will
  59. // ask whether we trust the server all the same. This credentials provider
  60. // blindly trusts the self-signed certificate by answering "Yes" to all
  61. // questions.
  62. private CredentialsProvider testCredentials = new CredentialsProvider() {
  63. @Override
  64. public boolean isInteractive() {
  65. return false;
  66. }
  67. @Override
  68. public boolean supports(CredentialItem... items) {
  69. for (CredentialItem item : items) {
  70. if (item instanceof CredentialItem.InformationalMessage) {
  71. continue;
  72. }
  73. if (item instanceof CredentialItem.YesNoType) {
  74. continue;
  75. }
  76. return false;
  77. }
  78. return true;
  79. }
  80. @Override
  81. public boolean get(URIish uri, CredentialItem... items)
  82. throws UnsupportedCredentialItem {
  83. for (CredentialItem item : items) {
  84. if (item instanceof CredentialItem.InformationalMessage) {
  85. continue;
  86. }
  87. if (item instanceof CredentialItem.YesNoType) {
  88. ((CredentialItem.YesNoType) item).setValue(true);
  89. continue;
  90. }
  91. return false;
  92. }
  93. return true;
  94. }
  95. };
  96. private URIish remoteURI;
  97. private URIish secureURI;
  98. private RevBlob A_txt;
  99. private RevCommit A, B;
  100. public SmartClientSmartServerSslTest(TestParameters params) {
  101. super(params);
  102. }
  103. @Override
  104. protected AppServer createServer() {
  105. return new AppServer(0, 0);
  106. }
  107. @Override
  108. @Before
  109. public void setUp() throws Exception {
  110. super.setUp();
  111. final TestRepository<Repository> src = createTestRepository();
  112. final String srcName = src.getRepository().getDirectory().getName();
  113. StoredConfig cfg = src.getRepository().getConfig();
  114. cfg.setBoolean(ConfigConstants.CONFIG_CORE_SECTION, null,
  115. ConfigConstants.CONFIG_KEY_LOGALLREFUPDATES, true);
  116. cfg.setInt("protocol", null, "version", enableProtocolV2 ? 2 : 0);
  117. cfg.save();
  118. GitServlet gs = new GitServlet();
  119. ServletContextHandler app = addNormalContext(gs, src, srcName);
  120. server.setUp();
  121. remoteURI = toURIish(app, srcName);
  122. secureURI = new URIish(rewriteUrl(remoteURI.toString(), "https",
  123. server.getSecurePort()));
  124. A_txt = src.blob("A");
  125. A = src.commit().add("A_txt", A_txt).create();
  126. B = src.commit().parent(A).add("A_txt", "C").add("B", "B").create();
  127. src.update(master, B);
  128. src.update("refs/garbage/a/very/long/ref/name/to/compress", B);
  129. }
  130. private ServletContextHandler addNormalContext(GitServlet gs, TestRepository<Repository> src, String srcName) {
  131. ServletContextHandler app = server.addContext("/git");
  132. app.addFilter(new FilterHolder(new Filter() {
  133. @Override
  134. public void init(FilterConfig filterConfig)
  135. throws ServletException {
  136. // empty
  137. }
  138. // Redirects http to https for requests containing "/https/".
  139. @Override
  140. public void doFilter(ServletRequest request,
  141. ServletResponse response, FilterChain chain)
  142. throws IOException, ServletException {
  143. final HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  144. final HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  145. final StringBuffer fullUrl = httpServletRequest.getRequestURL();
  146. if (httpServletRequest.getQueryString() != null) {
  147. fullUrl.append("?")
  148. .append(httpServletRequest.getQueryString());
  149. }
  150. String urlString = rewriteUrl(fullUrl.toString(), "https",
  151. server.getSecurePort());
  152. httpServletResponse
  153. .setStatus(HttpServletResponse.SC_MOVED_PERMANENTLY);
  154. httpServletResponse.setHeader(HttpSupport.HDR_LOCATION,
  155. urlString.replace("/https/", "/"));
  156. }
  157. @Override
  158. public void destroy() {
  159. // empty
  160. }
  161. }), "/https/*", EnumSet.of(DispatcherType.REQUEST));
  162. app.addFilter(new FilterHolder(new Filter() {
  163. @Override
  164. public void init(FilterConfig filterConfig)
  165. throws ServletException {
  166. // empty
  167. }
  168. // Redirects https back to http for requests containing "/back/".
  169. @Override
  170. public void doFilter(ServletRequest request,
  171. ServletResponse response, FilterChain chain)
  172. throws IOException, ServletException {
  173. final HttpServletResponse httpServletResponse = (HttpServletResponse) response;
  174. final HttpServletRequest httpServletRequest = (HttpServletRequest) request;
  175. final StringBuffer fullUrl = httpServletRequest.getRequestURL();
  176. if (httpServletRequest.getQueryString() != null) {
  177. fullUrl.append("?")
  178. .append(httpServletRequest.getQueryString());
  179. }
  180. String urlString = rewriteUrl(fullUrl.toString(), "http",
  181. server.getPort());
  182. httpServletResponse
  183. .setStatus(HttpServletResponse.SC_MOVED_PERMANENTLY);
  184. httpServletResponse.setHeader(HttpSupport.HDR_LOCATION,
  185. urlString.replace("/back/", "/"));
  186. }
  187. @Override
  188. public void destroy() {
  189. // empty
  190. }
  191. }), "/back/*", EnumSet.of(DispatcherType.REQUEST));
  192. gs.setRepositoryResolver(new TestRepositoryResolver(src, srcName));
  193. app.addServlet(new ServletHolder(gs), "/*");
  194. return app;
  195. }
  196. @Test
  197. public void testInitialClone_ViaHttps() throws Exception {
  198. Repository dst = createBareRepository();
  199. assertFalse(dst.getObjectDatabase().has(A_txt));
  200. try (Transport t = Transport.open(dst, secureURI)) {
  201. t.setCredentialsProvider(testCredentials);
  202. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  203. }
  204. assertTrue(dst.getObjectDatabase().has(A_txt));
  205. assertEquals(B, dst.exactRef(master).getObjectId());
  206. fsck(dst, B);
  207. List<AccessEvent> requests = getRequests();
  208. assertEquals(enableProtocolV2 ? 3 : 2, requests.size());
  209. }
  210. @Test
  211. public void testInitialClone_RedirectToHttps() throws Exception {
  212. Repository dst = createBareRepository();
  213. assertFalse(dst.getObjectDatabase().has(A_txt));
  214. URIish cloneFrom = extendPath(remoteURI, "/https");
  215. try (Transport t = Transport.open(dst, cloneFrom)) {
  216. t.setCredentialsProvider(testCredentials);
  217. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  218. }
  219. assertTrue(dst.getObjectDatabase().has(A_txt));
  220. assertEquals(B, dst.exactRef(master).getObjectId());
  221. fsck(dst, B);
  222. List<AccessEvent> requests = getRequests();
  223. assertEquals(enableProtocolV2 ? 4 : 3, requests.size());
  224. }
  225. @Test
  226. public void testInitialClone_RedirectBackToHttp() throws Exception {
  227. Repository dst = createBareRepository();
  228. assertFalse(dst.getObjectDatabase().has(A_txt));
  229. URIish cloneFrom = extendPath(secureURI, "/back");
  230. try (Transport t = Transport.open(dst, cloneFrom)) {
  231. t.setCredentialsProvider(testCredentials);
  232. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  233. fail("Should have failed (redirect from https to http)");
  234. } catch (TransportException e) {
  235. assertTrue(e.getMessage().contains("not allowed"));
  236. }
  237. }
  238. @Test
  239. public void testInitialClone_SslFailure() throws Exception {
  240. Repository dst = createBareRepository();
  241. assertFalse(dst.getObjectDatabase().has(A_txt));
  242. try (Transport t = Transport.open(dst, secureURI)) {
  243. // Set a credentials provider that doesn't handle questions
  244. t.setCredentialsProvider(
  245. new UsernamePasswordCredentialsProvider("any", "anypwd"));
  246. t.fetch(NullProgressMonitor.INSTANCE, mirror(master));
  247. fail("Should have failed (SSL certificate not trusted)");
  248. } catch (TransportException e) {
  249. assertTrue(e.getMessage().contains("Secure connection"));
  250. }
  251. }
  252. }