| // Copyright 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ |
| #define NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ |
| |
| #include <memory> |
| #include <string> |
| #include <utility> |
| #include <vector> |
| |
| #include "base/compiler_specific.h" |
| #include "base/files/file_path.h" |
| #include "base/macros.h" |
| #include "base/memory/ref_counted.h" |
| #include "net/base/host_port_pair.h" |
| #include "net/ssl/ssl_client_cert_type.h" |
| #include "starboard/types.h" |
| |
| class GURL; |
| |
| namespace base { |
| class DictionaryValue; |
| } |
| |
| namespace net { |
| |
| class AddressList; |
| class ScopedPortException; |
| class X509Certificate; |
| |
| // The base class of Test server implementation. |
| class BaseTestServer { |
| public: |
| typedef std::pair<std::string, std::string> StringPair; |
| |
| // Following types represent protocol schemes. See also |
| // http://www.iana.org/assignments/uri-schemes.html |
| enum Type { |
| TYPE_BASIC_AUTH_PROXY, |
| TYPE_FTP, |
| TYPE_HTTP, |
| TYPE_HTTPS, |
| TYPE_WS, |
| TYPE_WSS, |
| TYPE_TCP_ECHO, |
| TYPE_UDP_ECHO, |
| TYPE_PROXY, |
| }; |
| |
| // Container for various options to control how the HTTPS or WSS server is |
| // initialized. |
| struct SSLOptions { |
| enum ServerCertificate { |
| CERT_OK, |
| |
| // CERT_AUTO causes the testserver to generate a test certificate issued |
| // by "Testing CA" (see net/data/ssl/certificates/ocsp-test-root.pem). |
| CERT_AUTO, |
| // As with CERT_AUTO, but the chain will include a generated intermediate |
| // as well. The testserver will include the intermediate cert in the TLS |
| // handshake. |
| CERT_AUTO_WITH_INTERMEDIATE, |
| // Generate an intermediate cert issued by "Testing CA", and generate a |
| // test certificate issued by that intermediate with an AIA record for |
| // retrieving the intermediate. |
| CERT_AUTO_AIA_INTERMEDIATE, |
| |
| CERT_MISMATCHED_NAME, |
| CERT_EXPIRED, |
| // Cross-signed certificate to test PKIX path building. Contains an |
| // intermediate cross-signed by an unknown root, while the client (via |
| // TestRootStore) is expected to have a self-signed version of the |
| // intermediate. |
| CERT_CHAIN_WRONG_ROOT, |
| |
| // Causes the testserver to use a hostname that is a domain |
| // instead of an IP. |
| CERT_COMMON_NAME_IS_DOMAIN, |
| |
| // A certificate with invalid notBefore and notAfter times. Windows' |
| // certificate library will not parse this certificate. |
| CERT_BAD_VALIDITY, |
| }; |
| |
| // OCSPStatus enumerates the types of OCSP response that the testserver |
| // can produce. |
| enum OCSPStatus { |
| OCSP_OK, |
| OCSP_REVOKED, |
| OCSP_INVALID_RESPONSE, |
| OCSP_UNAUTHORIZED, |
| OCSP_UNKNOWN, |
| OCSP_INVALID_RESPONSE_DATA, |
| OCSP_TRY_LATER, |
| OCSP_MISMATCHED_SERIAL, |
| }; |
| |
| // OCSPDate enumerates the date ranges for OCSP responses that the |
| // testserver can produce. |
| enum OCSPDate { |
| OCSP_DATE_VALID, |
| OCSP_DATE_OLD, |
| OCSP_DATE_EARLY, |
| OCSP_DATE_LONG, |
| OCSP_DATE_LONGER, |
| }; |
| |
| // OCSPSingleResponse is used when specifying multiple stapled responses, |
| // each |
| // with their own CertStatus and date validity. |
| struct OCSPSingleResponse { |
| OCSPStatus status; |
| OCSPDate date; |
| }; |
| |
| // OCSPProduced enumerates the validity of the producedAt field in OCSP |
| // responses produced by the testserver. |
| enum OCSPProduced { |
| OCSP_PRODUCED_VALID, |
| OCSP_PRODUCED_BEFORE_CERT, |
| OCSP_PRODUCED_AFTER_CERT, |
| }; |
| |
| // Bitmask of key exchange algorithms that the test server supports and that |
| // can be selectively enabled or disabled. |
| enum KeyExchange { |
| // Special value used to indicate that any algorithm the server supports |
| // is acceptable. Preferred over explicitly OR-ing all key exchange |
| // algorithms. |
| KEY_EXCHANGE_ANY = 0, |
| |
| KEY_EXCHANGE_RSA = (1 << 0), |
| KEY_EXCHANGE_DHE_RSA = (1 << 1), |
| KEY_EXCHANGE_ECDHE_RSA = (1 << 2), |
| }; |
| |
| // Bitmask of bulk encryption algorithms that the test server supports |
| // and that can be selectively enabled or disabled. |
| enum BulkCipher { |
| // Special value used to indicate that any algorithm the server supports |
| // is acceptable. Preferred over explicitly OR-ing all ciphers. |
| BULK_CIPHER_ANY = 0, |
| |
| BULK_CIPHER_RC4 = (1 << 0), |
| BULK_CIPHER_AES128 = (1 << 1), |
| BULK_CIPHER_AES256 = (1 << 2), |
| |
| // NOTE: 3DES support in the Python test server has external |
| // dependencies and not be available on all machines. Clients may not |
| // be able to connect if only 3DES is specified. |
| BULK_CIPHER_3DES = (1 << 3), |
| |
| BULK_CIPHER_AES128GCM = (1 << 4), |
| }; |
| |
| // NOTE: the values of these enumerators are passed to the the Python test |
| // server. Do not change them. |
| enum TLSIntolerantLevel { |
| TLS_INTOLERANT_NONE = 0, |
| TLS_INTOLERANT_ALL = 1, // Intolerant of all TLS versions. |
| TLS_INTOLERANT_TLS1_1 = 2, // Intolerant of TLS 1.1 or higher. |
| TLS_INTOLERANT_TLS1_2 = 3, // Intolerant of TLS 1.2 or higher. |
| TLS_INTOLERANT_TLS1_3 = 4, // Intolerant of TLS 1.3 or higher. |
| }; |
| |
| // Values which control how the server reacts in response to a ClientHello |
| // it is intolerant of. |
| enum TLSIntoleranceType { |
| TLS_INTOLERANCE_ALERT = 0, // Send a handshake_failure alert. |
| TLS_INTOLERANCE_CLOSE = 1, // Close the connection. |
| TLS_INTOLERANCE_RESET = 2, // Send a TCP reset. |
| }; |
| |
| // Initialize a new SSLOptions using CERT_OK as the certificate. |
| SSLOptions(); |
| |
| // Initialize a new SSLOptions that will use the specified certificate. |
| explicit SSLOptions(ServerCertificate cert); |
| SSLOptions(const SSLOptions& other); |
| ~SSLOptions(); |
| |
| // Returns the relative filename of the file that contains the |
| // |server_certificate|. |
| base::FilePath GetCertificateFile() const; |
| |
| // GetOCSPArgument returns the value of any OCSP argument to testserver or |
| // the empty string if there is none. |
| std::string GetOCSPArgument() const; |
| |
| // GetOCSPDateArgument returns the value of the OCSP date argument to |
| // testserver or the empty string if there is none. |
| std::string GetOCSPDateArgument() const; |
| |
| // GetOCSPProducedArgument returns the value of the OCSP produced argument |
| // to testserver or the empty string if there is none. |
| std::string GetOCSPProducedArgument() const; |
| |
| // GetOCSPIntermediateArgument returns the value of any OCSP intermediate |
| // argument to testserver or the empty string if there is none. |
| std::string GetOCSPIntermediateArgument() const; |
| |
| // GetOCSPIntermediateDateArgument returns the value of the OCSP |
| // intermediate date argument to testserver or the empty string if there is |
| // none. |
| std::string GetOCSPIntermediateDateArgument() const; |
| |
| // GetOCSPIntermediateProducedArgument returns the value of the OCSP |
| // intermediate produced argument to testserver or the empty string if |
| // there is none. |
| std::string GetOCSPIntermediateProducedArgument() const; |
| |
| // The certificate to use when serving requests. |
| ServerCertificate server_certificate = CERT_OK; |
| |
| // If |server_certificate==CERT_AUTO| or |CERT_AUTO_WITH_INTERMEDIATE| then |
| // this determines the type of leaf OCSP response returned. Ignored if |
| // |ocsp_responses| is non-empty. |
| OCSPStatus ocsp_status = OCSP_OK; |
| |
| // If |server_certificate==CERT_AUTO| or |CERT_AUTO_WITH_INTERMEDIATE| then |
| // this determines the date range set on the leaf OCSP response returned. |
| // Ignore if |ocsp_responses| is non-empty. |
| OCSPDate ocsp_date = OCSP_DATE_VALID; |
| |
| // If |server_certificate==CERT_AUTO| or |CERT_AUTO_WITH_INTERMEDIATE|, |
| // contains the status and validity for multiple stapled responeses. |
| // Overrides |ocsp_status| and |ocsp_date| when |
| // non-empty. |
| std::vector<OCSPSingleResponse> ocsp_responses; |
| |
| // If |server_certificate==CERT_AUTO| or |CERT_AUTO_WITH_INTERMEDIATE| then |
| // this determines the validity of the producedAt field on the returned |
| // leaf OCSP response. |
| OCSPProduced ocsp_produced = OCSP_PRODUCED_VALID; |
| |
| // If |server_certificate==CERT_AUTO_WITH_INTERMEDIATE| then this |
| // determines the type of intermediate OCSP response returned. Ignored if |
| // |ocsp_intermediate_responses| is non-empty. |
| OCSPStatus ocsp_intermediate_status = OCSP_OK; |
| |
| // If |server_certificate==CERT_AUTO_WITH_INTERMEDIATE| then this |
| // determines the date range set on the intermediate OCSP response |
| // returned. Ignore if |ocsp_intermediate_responses| is non-empty. |
| OCSPDate ocsp_intermediate_date = OCSP_DATE_VALID; |
| |
| // If |server_certificate==CERT_AUTO_WITH_INTERMEDIATE|, contains the |
| // status and validity for multiple stapled responeses. Overrides |
| // |ocsp_intermediate_status| and |ocsp_intermediate_date| when non-empty. |
| // TODO(mattm): testserver doesn't actually staple OCSP responses for |
| // intermediates. |
| std::vector<OCSPSingleResponse> ocsp_intermediate_responses; |
| |
| // If |server_certificate==CERT_AUTO_WITH_INTERMEDIATE| then this |
| // determines the validity of the producedAt field on the returned |
| // intermediate OCSP response. |
| OCSPProduced ocsp_intermediate_produced = OCSP_PRODUCED_VALID; |
| |
| // If not zero, |cert_serial| will be the serial number of the |
| // auto-generated leaf certificate when |server_certificate==CERT_AUTO|. |
| uint64_t cert_serial = 0; |
| |
| // If not empty, |cert_common_name| will be the common name of the |
| // auto-generated leaf certificate when |server_certificate==CERT_AUTO|. |
| std::string cert_common_name; |
| |
| // True if a CertificateRequest should be sent to the client during |
| // handshaking. |
| bool request_client_certificate = false; |
| |
| // If |request_client_certificate| is true, an optional list of files, |
| // each containing a single, PEM-encoded X.509 certificates. The subject |
| // from each certificate will be added to the certificate_authorities |
| // field of the CertificateRequest. |
| std::vector<base::FilePath> client_authorities; |
| |
| // If |request_client_certificate| is true, an optional list of |
| // SSLClientCertType values to populate the certificate_types field of the |
| // CertificateRequest. |
| std::vector<SSLClientCertType> client_cert_types; |
| |
| // A bitwise-OR of KeyExchnage that should be used by the |
| // HTTPS server, or KEY_EXCHANGE_ANY to indicate that all implemented |
| // key exchange algorithms are acceptable. |
| int key_exchanges = KEY_EXCHANGE_ANY; |
| |
| // A bitwise-OR of BulkCipher that should be used by the |
| // HTTPS server, or BULK_CIPHER_ANY to indicate that all implemented |
| // ciphers are acceptable. |
| int bulk_ciphers = BULK_CIPHER_ANY; |
| |
| // If true, pass the --https-record-resume argument to testserver.py which |
| // causes it to log session cache actions and echo the log on |
| // /ssl-session-cache. |
| bool record_resume = false; |
| |
| // If not TLS_INTOLERANT_NONE, the server will abort any handshake that |
| // negotiates an intolerant TLS version in order to test version fallback. |
| TLSIntolerantLevel tls_intolerant = TLS_INTOLERANT_NONE; |
| |
| // If |tls_intolerant| is not TLS_INTOLERANT_NONE, how the server reacts to |
| // an intolerant TLS version. |
| TLSIntoleranceType tls_intolerance_type = TLS_INTOLERANCE_ALERT; |
| |
| // fallback_scsv_enabled, if true, causes the server to process the |
| // TLS_FALLBACK_SCSV cipher suite. This cipher suite is sent by Chrome |
| // when performing TLS version fallback in response to an SSL handshake |
| // failure. If this option is enabled then the server will reject fallback |
| // connections. |
| bool fallback_scsv_enabled = false; |
| |
| // Temporary glue for testing: validation of SCTs is application-controlled |
| // and can be appropriately mocked out, so sending fake data here does not |
| // affect handshaking behaviour. |
| // TODO(ekasper): replace with valid SCT files for test certs. |
| // (Fake) SignedCertificateTimestampList (as a raw binary string) to send in |
| // a TLS extension. |
| std::string signed_cert_timestamps_tls_ext; |
| |
| // Whether to staple the OCSP response. |
| bool staple_ocsp_response = false; |
| |
| // Whether to make the OCSP server unavailable. This does not affect the |
| // stapled OCSP response. |
| bool ocsp_server_unavailable = false; |
| |
| // List of protocols to advertise in NPN extension. NPN is not supported if |
| // list is empty. Note that regardless of what protocol is negotiated, the |
| // test server will continue to speak HTTP/1.1. |
| std::vector<std::string> npn_protocols; |
| |
| // List of supported ALPN protocols. |
| std::vector<std::string> alpn_protocols; |
| |
| // Whether to send a fatal alert immediately after completing the handshake. |
| bool alert_after_handshake = false; |
| |
| // If true, disables channel ID on the server. |
| bool disable_channel_id = false; |
| |
| // If true, disables extended master secret tls extension. |
| bool disable_extended_master_secret = false; |
| }; |
| |
| // Initialize a TestServer. |
| explicit BaseTestServer(Type type); |
| |
| // Initialize a TestServer with a specific set of SSLOptions for HTTPS or WSS. |
| BaseTestServer(Type type, const SSLOptions& ssl_options); |
| |
| // Starts the server blocking until the server is ready. |
| bool Start() WARN_UNUSED_RESULT; |
| |
| // Start the test server without blocking. Use this if you need multiple test |
| // servers (such as WebSockets and HTTP, or HTTP and HTTPS). You must call |
| // BlockUntilStarted on all servers your test requires before executing the |
| // test. For example: |
| // |
| // // Start the servers in parallel. |
| // ASSERT_TRUE(http_server.StartInBackground()); |
| // ASSERT_TRUE(websocket_server.StartInBackground()); |
| // // Wait for both servers to be ready. |
| // ASSERT_TRUE(http_server.BlockUntilStarted()); |
| // ASSERT_TRUE(websocket_server.BlockUntilStarted()); |
| // RunMyTest(); |
| // |
| // Returns true on success. |
| virtual bool StartInBackground() WARN_UNUSED_RESULT = 0; |
| |
| // Block until the test server is ready. Returns true on success. See |
| // StartInBackground() documentation for more information. |
| virtual bool BlockUntilStarted() WARN_UNUSED_RESULT = 0; |
| |
| // Returns the host port pair used by current Python based test server only |
| // if the server is started. |
| const HostPortPair& host_port_pair() const; |
| |
| const base::FilePath& document_root() const { return document_root_; } |
| const base::DictionaryValue& server_data() const; |
| std::string GetScheme() const; |
| bool GetAddressList(AddressList* address_list) const WARN_UNUSED_RESULT; |
| |
| GURL GetURL(const std::string& path) const; |
| |
| GURL GetURLWithUser(const std::string& path, |
| const std::string& user) const; |
| |
| GURL GetURLWithUserAndPassword(const std::string& path, |
| const std::string& user, |
| const std::string& password) const; |
| |
| static bool GetFilePathWithReplacements( |
| const std::string& original_path, |
| const std::vector<StringPair>& text_to_replace, |
| std::string* replacement_path); |
| |
| static bool UsingSSL(Type type) { |
| return type == BaseTestServer::TYPE_HTTPS || |
| type == BaseTestServer::TYPE_WSS; |
| } |
| |
| // Enable HTTP basic authentication. Currently this only works for TYPE_WS and |
| // TYPE_WSS. |
| void set_websocket_basic_auth(bool ws_basic_auth) { |
| ws_basic_auth_ = ws_basic_auth; |
| } |
| |
| // Disable creation of anonymous FTP user. |
| void set_no_anonymous_ftp_user(bool no_anonymous_ftp_user) { |
| no_anonymous_ftp_user_ = no_anonymous_ftp_user; |
| } |
| |
| // Redirect proxied CONNECT requests to localhost. |
| void set_redirect_connect_to_localhost(bool redirect_connect_to_localhost) { |
| redirect_connect_to_localhost_ = redirect_connect_to_localhost; |
| } |
| |
| // Registers the test server's certs for the current process. |
| static void RegisterTestCerts(); |
| |
| // Marks the root certificate of an HTTPS test server as trusted for |
| // the duration of tests. |
| bool LoadTestRootCert() const WARN_UNUSED_RESULT; |
| |
| // Returns the certificate that the server is using. |
| scoped_refptr<X509Certificate> GetCertificate() const; |
| |
| protected: |
| virtual ~BaseTestServer(); |
| Type type() const { return type_; } |
| const SSLOptions& ssl_options() const { return ssl_options_; } |
| |
| bool started() const { return started_; } |
| |
| // Gets port currently assigned to host_port_pair_ without checking |
| // whether it's available (server started) or not. |
| uint16_t GetPort(); |
| |
| // Sets |port| as the actual port used by Python based test server. |
| void SetPort(uint16_t port); |
| |
| // Set up internal status when the server is started. |
| bool SetupWhenServerStarted() WARN_UNUSED_RESULT; |
| |
| // Clean up internal status when starting to stop server. |
| void CleanUpWhenStoppingServer(); |
| |
| // Set path of test resources. |
| void SetResourcePath(const base::FilePath& document_root, |
| const base::FilePath& certificates_dir); |
| |
| // Parses the server data read from the test server and sets |server_data_|. |
| // *port is set to the port number specified in server_data. The port may be |
| // different from the local port set in |host_port_pair_|, specifically when |
| // using RemoteTestServer (which proxies connections from 127.0.0.1 to a |
| // different IP). Returns true on success. |
| bool SetAndParseServerData(const std::string& server_data, |
| int* port) WARN_UNUSED_RESULT; |
| |
| // Generates a DictionaryValue with the arguments for launching the external |
| // Python test server. |
| bool GenerateArguments(base::DictionaryValue* arguments) const |
| WARN_UNUSED_RESULT; |
| |
| // Subclasses can override this to add arguments that are specific to their |
| // own test servers. |
| virtual bool GenerateAdditionalArguments( |
| base::DictionaryValue* arguments) const WARN_UNUSED_RESULT; |
| |
| private: |
| void Init(const std::string& host); |
| |
| // Document root of the test server. |
| base::FilePath document_root_; |
| |
| // Directory that contains the SSL certificates. |
| base::FilePath certificates_dir_; |
| |
| // Address on which the tests should connect to the server. With |
| // RemoteTestServer it may be different from the address on which the server |
| // listens on. |
| HostPortPair host_port_pair_; |
| |
| // Holds the data sent from the server (e.g., port number). |
| std::unique_ptr<base::DictionaryValue> server_data_; |
| |
| // If |type_| is TYPE_HTTPS or TYPE_WSS, the TLS settings to use for the test |
| // server. |
| SSLOptions ssl_options_; |
| |
| Type type_; |
| |
| // Has the server been started? |
| bool started_ = false; |
| |
| // Enables logging of the server to the console. |
| bool log_to_console_ = false; |
| |
| // Is WebSocket basic HTTP authentication enabled? |
| bool ws_basic_auth_ = false; |
| |
| // Disable creation of anonymous FTP user? |
| bool no_anonymous_ftp_user_ = false; |
| |
| // Redirect proxied CONNECT requests to localhost? |
| bool redirect_connect_to_localhost_ = false; |
| |
| std::unique_ptr<ScopedPortException> allowed_port_; |
| |
| DISALLOW_COPY_AND_ASSIGN(BaseTestServer); |
| }; |
| |
| } // namespace net |
| |
| #endif // NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ |