123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235 |
- // +build !race
- /*
- *
- * Copyright 2017 gRPC authors.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
- package grpc
- import (
- "bufio"
- "context"
- "encoding/base64"
- "fmt"
- "io"
- "net"
- "net/http"
- "net/url"
- "testing"
- "time"
- "google.golang.org/grpc/internal/leakcheck"
- )
- const (
- envTestAddr = "1.2.3.4:8080"
- envProxyAddr = "2.3.4.5:7687"
- )
- // overwriteAndRestore overwrite function httpProxyFromEnvironment and
- // returns a function to restore the default values.
- func overwrite(hpfe func(req *http.Request) (*url.URL, error)) func() {
- backHPFE := httpProxyFromEnvironment
- httpProxyFromEnvironment = hpfe
- return func() {
- httpProxyFromEnvironment = backHPFE
- }
- }
- type proxyServer struct {
- t *testing.T
- lis net.Listener
- in net.Conn
- out net.Conn
- requestCheck func(*http.Request) error
- }
- func (p *proxyServer) run() {
- in, err := p.lis.Accept()
- if err != nil {
- return
- }
- p.in = in
- req, err := http.ReadRequest(bufio.NewReader(in))
- if err != nil {
- p.t.Errorf("failed to read CONNECT req: %v", err)
- return
- }
- if err := p.requestCheck(req); err != nil {
- resp := http.Response{StatusCode: http.StatusMethodNotAllowed}
- resp.Write(p.in)
- p.in.Close()
- p.t.Errorf("get wrong CONNECT req: %+v, error: %v", req, err)
- return
- }
- out, err := net.Dial("tcp", req.URL.Host)
- if err != nil {
- p.t.Errorf("failed to dial to server: %v", err)
- return
- }
- resp := http.Response{StatusCode: http.StatusOK, Proto: "HTTP/1.0"}
- resp.Write(p.in)
- p.out = out
- go io.Copy(p.in, p.out)
- go io.Copy(p.out, p.in)
- }
- func (p *proxyServer) stop() {
- p.lis.Close()
- if p.in != nil {
- p.in.Close()
- }
- if p.out != nil {
- p.out.Close()
- }
- }
- func testHTTPConnect(t *testing.T, proxyURLModify func(*url.URL) *url.URL, proxyReqCheck func(*http.Request) error) {
- defer leakcheck.Check(t)
- plis, err := net.Listen("tcp", "localhost:0")
- if err != nil {
- t.Fatalf("failed to listen: %v", err)
- }
- p := &proxyServer{
- t: t,
- lis: plis,
- requestCheck: proxyReqCheck,
- }
- go p.run()
- defer p.stop()
- blis, err := net.Listen("tcp", "localhost:0")
- if err != nil {
- t.Fatalf("failed to listen: %v", err)
- }
- msg := []byte{4, 3, 5, 2}
- recvBuf := make([]byte, len(msg))
- done := make(chan struct{})
- go func() {
- in, err := blis.Accept()
- if err != nil {
- t.Errorf("failed to accept: %v", err)
- return
- }
- defer in.Close()
- in.Read(recvBuf)
- close(done)
- }()
- // Overwrite the function in the test and restore them in defer.
- hpfe := func(req *http.Request) (*url.URL, error) {
- return proxyURLModify(&url.URL{Host: plis.Addr().String()}), nil
- }
- defer overwrite(hpfe)()
- // Dial to proxy server.
- dialer := newProxyDialer(func(ctx context.Context, addr string) (net.Conn, error) {
- if deadline, ok := ctx.Deadline(); ok {
- return net.DialTimeout("tcp", addr, deadline.Sub(time.Now()))
- }
- return net.Dial("tcp", addr)
- })
- ctx, cancel := context.WithTimeout(context.Background(), time.Second)
- defer cancel()
- c, err := dialer(ctx, blis.Addr().String())
- if err != nil {
- t.Fatalf("http connect Dial failed: %v", err)
- }
- defer c.Close()
- // Send msg on the connection.
- c.Write(msg)
- <-done
- // Check received msg.
- if string(recvBuf) != string(msg) {
- t.Fatalf("received msg: %v, want %v", recvBuf, msg)
- }
- }
- func TestHTTPConnect(t *testing.T) {
- testHTTPConnect(t,
- func(in *url.URL) *url.URL {
- return in
- },
- func(req *http.Request) error {
- if req.Method != http.MethodConnect {
- return fmt.Errorf("unexpected Method %q, want %q", req.Method, http.MethodConnect)
- }
- if req.UserAgent() != grpcUA {
- return fmt.Errorf("unexpect user agent %q, want %q", req.UserAgent(), grpcUA)
- }
- return nil
- },
- )
- }
- func TestHTTPConnectBasicAuth(t *testing.T) {
- const (
- user = "notAUser"
- password = "notAPassword"
- )
- testHTTPConnect(t,
- func(in *url.URL) *url.URL {
- in.User = url.UserPassword(user, password)
- return in
- },
- func(req *http.Request) error {
- if req.Method != http.MethodConnect {
- return fmt.Errorf("unexpected Method %q, want %q", req.Method, http.MethodConnect)
- }
- if req.UserAgent() != grpcUA {
- return fmt.Errorf("unexpect user agent %q, want %q", req.UserAgent(), grpcUA)
- }
- wantProxyAuthStr := "Basic " + base64.StdEncoding.EncodeToString([]byte(user+":"+password))
- if got := req.Header.Get(proxyAuthHeaderKey); got != wantProxyAuthStr {
- gotDecoded, _ := base64.StdEncoding.DecodeString(got)
- wantDecoded, _ := base64.StdEncoding.DecodeString(wantProxyAuthStr)
- return fmt.Errorf("unexpected auth %q (%q), want %q (%q)", got, gotDecoded, wantProxyAuthStr, wantDecoded)
- }
- return nil
- },
- )
- }
- func TestMapAddressEnv(t *testing.T) {
- defer leakcheck.Check(t)
- // Overwrite the function in the test and restore them in defer.
- hpfe := func(req *http.Request) (*url.URL, error) {
- if req.URL.Host == envTestAddr {
- return &url.URL{
- Scheme: "https",
- Host: envProxyAddr,
- }, nil
- }
- return nil, nil
- }
- defer overwrite(hpfe)()
- // envTestAddr should be handled by ProxyFromEnvironment.
- got, err := mapAddress(context.Background(), envTestAddr)
- if err != nil {
- t.Error(err)
- }
- if got.Host != envProxyAddr {
- t.Errorf("want %v, got %v", envProxyAddr, got)
- }
- }
|