| // |
| // ======================================================================== |
| // Copyright (c) 1995-2015 Mort Bay Consulting Pty. Ltd. |
| // ------------------------------------------------------------------------ |
| // All rights reserved. This program and the accompanying materials |
| // are made available under the terms of the Eclipse Public License v1.0 |
| // and Apache License v2.0 which accompanies this distribution. |
| // |
| // The Eclipse Public License is available at |
| // http://www.eclipse.org/legal/epl-v10.html |
| // |
| // The Apache License v2.0 is available at |
| // http://www.opensource.org/licenses/apache2.0.php |
| // |
| // You may elect to redistribute this code under either of these licenses. |
| // ======================================================================== |
| // |
| |
| package org.eclipse.jetty.server.handler; |
| |
| import static org.hamcrest.Matchers.containsString; |
| import static org.hamcrest.Matchers.not; |
| import static org.junit.Assert.assertThat; |
| |
| import java.io.ByteArrayOutputStream; |
| import java.io.File; |
| import java.io.IOException; |
| import java.io.InputStream; |
| import java.net.URI; |
| import java.nio.charset.StandardCharsets; |
| import java.security.KeyStore; |
| import java.util.concurrent.Executor; |
| |
| import javax.net.ssl.HostnameVerifier; |
| import javax.net.ssl.HttpsURLConnection; |
| import javax.net.ssl.SSLContext; |
| import javax.net.ssl.SSLSession; |
| import javax.net.ssl.TrustManagerFactory; |
| import javax.servlet.ServletException; |
| import javax.servlet.http.HttpServletRequest; |
| import javax.servlet.http.HttpServletResponse; |
| |
| import org.eclipse.jetty.http.HttpStatus; |
| import org.eclipse.jetty.io.ByteBufferPool; |
| import org.eclipse.jetty.io.LeakTrackingByteBufferPool; |
| import org.eclipse.jetty.io.MappedByteBufferPool; |
| import org.eclipse.jetty.server.AbstractConnectionFactory; |
| import org.eclipse.jetty.server.HttpConnectionFactory; |
| import org.eclipse.jetty.server.Request; |
| import org.eclipse.jetty.server.Server; |
| import org.eclipse.jetty.server.ServerConnector; |
| import org.eclipse.jetty.toolchain.test.MavenTestingUtils; |
| import org.eclipse.jetty.toolchain.test.SimpleRequest; |
| import org.eclipse.jetty.util.ssl.SslContextFactory; |
| import org.eclipse.jetty.util.thread.Scheduler; |
| import org.junit.After; |
| import org.junit.Before; |
| import org.junit.Test; |
| |
| public class DebugHandlerTest |
| { |
| public final static HostnameVerifier __hostnameverifier = new HostnameVerifier() |
| { |
| public boolean verify(String hostname, SSLSession session) |
| { |
| return true; |
| } |
| }; |
| |
| private SSLContext sslContext; |
| private Server server; |
| private URI serverURI; |
| private URI secureServerURI; |
| |
| @SuppressWarnings("deprecation") |
| private DebugHandler debugHandler; |
| private ByteArrayOutputStream capturedLog; |
| |
| @SuppressWarnings("deprecation") |
| @Before |
| public void startServer() throws Exception |
| { |
| server = new Server(); |
| |
| ServerConnector httpConnector = new ServerConnector(server); |
| httpConnector.setPort(0); |
| server.addConnector(httpConnector); |
| |
| File keystorePath = MavenTestingUtils.getTestResourceFile("keystore"); |
| SslContextFactory sslContextFactory = new SslContextFactory(); |
| sslContextFactory.setKeyStorePath(keystorePath.getAbsolutePath()); |
| sslContextFactory.setKeyStorePassword("storepwd"); |
| sslContextFactory.setKeyManagerPassword("keypwd"); |
| sslContextFactory.setTrustStorePath(keystorePath.getAbsolutePath()); |
| sslContextFactory.setTrustStorePassword("storepwd"); |
| ByteBufferPool pool = new LeakTrackingByteBufferPool(new MappedByteBufferPool.Tagged()); |
| ServerConnector sslConnector = new ServerConnector(server, |
| (Executor)null, |
| (Scheduler)null, pool, 1, 1, |
| AbstractConnectionFactory.getFactories(sslContextFactory,new HttpConnectionFactory())); |
| |
| server.addConnector(sslConnector); |
| |
| debugHandler = new DebugHandler(); |
| capturedLog = new ByteArrayOutputStream(); |
| debugHandler.setOutputStream(capturedLog); |
| debugHandler.setHandler(new AbstractHandler() |
| { |
| @Override |
| public void handle(String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException |
| { |
| baseRequest.setHandled(true); |
| response.setStatus(HttpStatus.OK_200); |
| } |
| }); |
| server.setHandler(debugHandler); |
| server.start(); |
| |
| String host = httpConnector.getHost(); |
| if(host == null) host = "localhost"; |
| |
| serverURI = URI.create(String.format("http://%s:%d/", host, httpConnector.getLocalPort())); |
| secureServerURI = URI.create(String.format("https://%s:%d/", host, sslConnector.getLocalPort())); |
| |
| KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType()); |
| try (InputStream stream = sslContextFactory.getKeyStoreResource().getInputStream()) |
| { |
| keystore.load(stream, "storepwd".toCharArray()); |
| } |
| TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm()); |
| trustManagerFactory.init(keystore); |
| sslContext = SSLContext.getInstance("TLS"); |
| sslContext.init(null, trustManagerFactory.getTrustManagers(), null); |
| |
| try |
| { |
| HttpsURLConnection.setDefaultHostnameVerifier(__hostnameverifier); |
| SSLContext sc = SSLContext.getInstance("TLS"); |
| sc.init(null, SslContextFactory.TRUST_ALL_CERTS, new java.security.SecureRandom()); |
| HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory()); |
| } |
| catch(Exception e) |
| { |
| e.printStackTrace(); |
| throw new RuntimeException(e); |
| } |
| } |
| |
| @After |
| public void stopServer() throws Exception |
| { |
| server.stop(); |
| } |
| |
| @Test |
| public void testThreadName() throws IOException |
| { |
| SimpleRequest req = new SimpleRequest(serverURI); |
| req.getString("/foo/bar?a=b"); |
| |
| String log = capturedLog.toString(StandardCharsets.UTF_8.name()); |
| String expectedThreadName = String.format("//%s:%s/foo/bar?a=b",serverURI.getHost(),serverURI.getPort()); |
| assertThat("ThreadName", log, containsString(expectedThreadName)); |
| // Look for bad/mangled/duplicated schemes |
| assertThat("ThreadName", log, not(containsString("http:"+expectedThreadName))); |
| assertThat("ThreadName", log, not(containsString("https:"+expectedThreadName))); |
| } |
| |
| @Test |
| public void testSecureThreadName() throws IOException |
| { |
| SimpleRequest req = new SimpleRequest(secureServerURI); |
| req.getString("/foo/bar?a=b"); |
| |
| String log = capturedLog.toString(StandardCharsets.UTF_8.name()); |
| String expectedThreadName = String.format("https://%s:%s/foo/bar?a=b",secureServerURI.getHost(),secureServerURI.getPort()); |
| assertThat("ThreadName", log, containsString(expectedThreadName)); |
| // Look for bad/mangled/duplicated schemes |
| assertThat("ThreadName", log, not(containsString("http:"+expectedThreadName))); |
| assertThat("ThreadName", log, not(containsString("https:"+expectedThreadName))); |
| } |
| } |