|  | #!/usr/bin/perl | 
|  |  | 
|  | # (C) Sergey Kandaurov | 
|  | # (C) Nginx, Inc. | 
|  |  | 
|  | # Tests for stream_ssl_preread module. | 
|  |  | 
|  | ############################################################################### | 
|  |  | 
|  | use warnings; | 
|  | use strict; | 
|  |  | 
|  | use Test::More; | 
|  |  | 
|  | BEGIN { use FindBin; chdir($FindBin::Bin); } | 
|  |  | 
|  | use lib 'lib'; | 
|  | use Test::Nginx; | 
|  | use Test::Nginx::Stream qw/ stream /; | 
|  |  | 
|  | ############################################################################### | 
|  |  | 
|  | select STDERR; $| = 1; | 
|  | select STDOUT; $| = 1; | 
|  |  | 
|  | my $t = Test::Nginx->new()->has(qw/stream stream_map stream_ssl_preread/) | 
|  | ->has(qw/stream_ssl stream_return/)->has_daemon('openssl') | 
|  | ->write_file_expand('nginx.conf', <<'EOF'); | 
|  |  | 
|  | %%TEST_GLOBALS%% | 
|  |  | 
|  | daemon off; | 
|  |  | 
|  | events { | 
|  | } | 
|  |  | 
|  | stream { | 
|  | log_format status $status; | 
|  |  | 
|  | map $ssl_preread_server_name $name { | 
|  | ""       127.0.0.1:8093; | 
|  | default  $ssl_preread_server_name; | 
|  | } | 
|  |  | 
|  | upstream foo { | 
|  | server 127.0.0.1:8091; | 
|  | } | 
|  |  | 
|  | upstream bar { | 
|  | server 127.0.0.1:8092; | 
|  | } | 
|  |  | 
|  | upstream next { | 
|  | server 127.0.0.1:8094; | 
|  | server 127.0.0.1:8080; | 
|  | } | 
|  |  | 
|  | ssl_preread  on; | 
|  |  | 
|  | server { | 
|  | listen       127.0.0.1:8080; | 
|  | return       $name; | 
|  | } | 
|  |  | 
|  | server { | 
|  | listen       127.0.0.1:8081; | 
|  | proxy_pass   $name; | 
|  | } | 
|  |  | 
|  | server { | 
|  | listen       127.0.0.1:8082; | 
|  | proxy_pass   $name; | 
|  | ssl_preread  off; | 
|  | } | 
|  |  | 
|  | server { | 
|  | listen       127.0.0.1:8083; | 
|  | proxy_pass   $name; | 
|  |  | 
|  | preread_timeout      2s; | 
|  | preread_buffer_size  42; | 
|  |  | 
|  | access_log %%TESTDIR%%/status.log status; | 
|  | } | 
|  |  | 
|  | server { | 
|  | listen       127.0.0.1:8084; | 
|  | proxy_pass   next; | 
|  |  | 
|  | proxy_connect_timeout  2s; | 
|  | preread_buffer_size    8; | 
|  | } | 
|  |  | 
|  | ssl_certificate_key localhost.key; | 
|  | ssl_certificate localhost.crt; | 
|  |  | 
|  | server { | 
|  | listen       127.0.0.1:8091 ssl; | 
|  | listen       127.0.0.1:8092 ssl; | 
|  | listen       127.0.0.1:8093 ssl; | 
|  | ssl_preread  off; | 
|  | return       $server_port; | 
|  | } | 
|  | } | 
|  |  | 
|  | EOF | 
|  |  | 
|  | eval { require IO::Socket::SSL; die if $IO::Socket::SSL::VERSION < 1.56; }; | 
|  | plan(skip_all => 'IO::Socket::SSL version >= 1.56 required') if $@; | 
|  |  | 
|  | eval { | 
|  | if (IO::Socket::SSL->can('can_client_sni')) { | 
|  | IO::Socket::SSL->can_client_sni() or die; | 
|  | } | 
|  | }; | 
|  | plan(skip_all => 'IO::Socket::SSL with OpenSSL SNI support required') if $@; | 
|  |  | 
|  | eval { | 
|  | my $ctx = Net::SSLeay::CTX_new() or die; | 
|  | my $ssl = Net::SSLeay::new($ctx) or die; | 
|  | Net::SSLeay::set_tlsext_host_name($ssl, 'example.org') == 1 or die; | 
|  | }; | 
|  | plan(skip_all => 'Net::SSLeay with OpenSSL SNI support required') if $@; | 
|  |  | 
|  | $t->plan(13); | 
|  |  | 
|  | $t->write_file('openssl.conf', <<EOF); | 
|  | [ req ] | 
|  | default_bits = 1024 | 
|  | encrypt_key = no | 
|  | distinguished_name = req_distinguished_name | 
|  | [ req_distinguished_name ] | 
|  | EOF | 
|  |  | 
|  | my $d = $t->testdir(); | 
|  |  | 
|  | foreach my $name ('localhost') { | 
|  | system('openssl req -x509 -new ' | 
|  | . "-config $d/openssl.conf -subj /CN=$name/ " | 
|  | . "-out $d/$name.crt -keyout $d/$name.key " | 
|  | . ">>$d/openssl.out 2>&1") == 0 | 
|  | or die "Can't create certificate for $name: $!\n"; | 
|  | } | 
|  |  | 
|  | $t->run(); | 
|  |  | 
|  | ############################################################################### | 
|  |  | 
|  | my ($p1, $p2, $p3, $p4) = (port(8091), port(8092), port(8093), port(8084)); | 
|  |  | 
|  | is(get_ssl('foo', 8081), $p1, 'sni'); | 
|  | is(get_ssl('foo', 8081), $p1, 'sni again'); | 
|  |  | 
|  | is(get_ssl('bar', 8081), $p2, 'sni 2'); | 
|  | is(get_ssl('bar', 8081), $p2, 'sni 2 again'); | 
|  |  | 
|  | # fallback to an empty value for some reason | 
|  |  | 
|  | is(get_ssl('', 8081), $p3, 'no sni'); | 
|  | is(get_ssl('foo', 8082), $p3, 'preread off'); | 
|  | is(get_ssl('foo', 8083), undef, 'preread buffer full'); | 
|  | is(stream('127.0.0.1:' . port(8080))->io('x' x 1000), "127.0.0.1:$p3", | 
|  | 'not a handshake'); | 
|  |  | 
|  | # ticket #1317 | 
|  |  | 
|  | is(stream("127.0.0.1:$p4")->io('x' x 16), "127.0.0.1:$p3", | 
|  | 'pending buffers on next upstream'); | 
|  |  | 
|  | # no junk in variable due to short ClientHello length value | 
|  |  | 
|  | is(get_short(), "127.0.0.1:$p3", 'short client hello'); | 
|  |  | 
|  | # allow record with older SSL version, such as 3.0 | 
|  |  | 
|  | is(get_oldver(), 'foo', 'older version in ssl record'); | 
|  |  | 
|  | # SNI "foo|f" fragmented across TLS records | 
|  |  | 
|  | is(get_frag(), 'foof', 'handshake fragment split on SNI'); | 
|  |  | 
|  | $t->stop(); | 
|  |  | 
|  | is($t->read_file('status.log'), "400\n", 'preread buffer full - log'); | 
|  |  | 
|  | ############################################################################### | 
|  |  | 
|  | sub get_frag { | 
|  | my $r = pack("N*", 0x16030100, 0x3b010000, 0x380303ac, | 
|  | 0x8c8678a0, 0xaa1e7eed, 0x3644eed6, 0xc3bd2c69, | 
|  | 0x7bc7deda, 0x249db0e3, 0x0c339eba, 0xa80b7600, | 
|  | 0x00020000, 0x0100000d, 0x00000009, 0x00070000, | 
|  | 0x04666f6f, 0x16030100); | 
|  | $r .= pack("n", 0x0166); | 
|  |  | 
|  | http($r); | 
|  | } | 
|  |  | 
|  | sub get_short { | 
|  | my $r = pack("N*", 0x16030100, 0x38010000, 0x330303eb); | 
|  | $r .= pack("N*", 0x6357cdba, 0xa6b8d853, 0xf1f6ac0f); | 
|  | $r .= pack("N*", 0xdf03178c, 0x0ae41824, 0xe7643682); | 
|  | $r .= pack("N*", 0x3c1b273f, 0xbfde4b00, 0x00000000); | 
|  | $r .= pack("CN3", 0x0c, 0x00000008, 0x00060000, 0x03666f6f); | 
|  |  | 
|  | http($r); | 
|  | } | 
|  |  | 
|  | sub get_oldver { | 
|  | my $r = pack("N*", 0x16030000, 0x38010000, 0x340303eb); | 
|  | $r .= pack("N*", 0x6357cdba, 0xa6b8d853, 0xf1f6ac0f); | 
|  | $r .= pack("N*", 0xdf03178c, 0x0ae41824, 0xe7643682); | 
|  | $r .= pack("N*", 0x3c1b273f, 0xbfde4b00, 0x00000000); | 
|  | $r .= pack("CN3", 0x0c, 0x00000008, 0x00060000, 0x03666f6f); | 
|  |  | 
|  | http($r); | 
|  | } | 
|  |  | 
|  | sub get_ssl { | 
|  | my ($host, $port) = @_; | 
|  | my $s = stream('127.0.0.1:' . port($port)); | 
|  |  | 
|  | eval { | 
|  | local $SIG{ALRM} = sub { die "timeout\n" }; | 
|  | local $SIG{PIPE} = sub { die "sigpipe\n" }; | 
|  | alarm(8); | 
|  | IO::Socket::SSL->start_SSL($s->{_socket}, | 
|  | SSL_hostname => $host, | 
|  | SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE(), | 
|  | SSL_error_trap => sub { die $_[1] } | 
|  | ); | 
|  | alarm(0); | 
|  | }; | 
|  | alarm(0); | 
|  |  | 
|  | if ($@) { | 
|  | log_in("died: $@"); | 
|  | return undef; | 
|  | } | 
|  |  | 
|  | return $s->read(); | 
|  | } | 
|  |  | 
|  | ############################################################################### |