| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183 | 
							- package http2interop
 
- import (
 
- 	"crypto/tls"
 
- 	"crypto/x509"
 
- 	"encoding/json"
 
- 	"flag"
 
- 	"fmt"
 
- 	"io/ioutil"
 
- 	"os"
 
- 	"strconv"
 
- 	"strings"
 
- 	"testing"
 
- )
 
- var (
 
- 	serverHost = flag.String("server_host", "", "The host to test")
 
- 	serverPort = flag.Int("server_port", 443, "The port to test")
 
- 	useTls     = flag.Bool("use_tls", true, "Should TLS tests be run")
 
- 	testCase   = flag.String("test_case", "", "What test cases to run (tls, framing)")
 
- 	// The rest of these are unused, but present to fulfill the client interface
 
- 	serverHostOverride    = flag.String("server_host_override", "", "Unused")
 
- 	useTestCa             = flag.Bool("use_test_ca", false, "Unused")
 
- 	defaultServiceAccount = flag.String("default_service_account", "", "Unused")
 
- 	oauthScope            = flag.String("oauth_scope", "", "Unused")
 
- 	serviceAccountKeyFile = flag.String("service_account_key_file", "", "Unused")
 
- )
 
- func InteropCtx(t *testing.T) *HTTP2InteropCtx {
 
- 	ctx := &HTTP2InteropCtx{
 
- 		ServerHost:             *serverHost,
 
- 		ServerPort:             *serverPort,
 
- 		ServerHostnameOverride: *serverHostOverride,
 
- 		UseTLS:                 *useTls,
 
- 		UseTestCa:              *useTestCa,
 
- 		T:                      t,
 
- 	}
 
- 	ctx.serverSpec = ctx.ServerHost
 
- 	if ctx.ServerPort != -1 {
 
- 		ctx.serverSpec += ":" + strconv.Itoa(ctx.ServerPort)
 
- 	}
 
- 	if ctx.ServerHostnameOverride == "" {
 
- 		ctx.authority = ctx.ServerHost
 
- 	} else {
 
- 		ctx.authority = ctx.ServerHostnameOverride
 
- 	}
 
- 	if ctx.UseTestCa {
 
- 		// It would be odd if useTestCa was true, but not useTls.  meh
 
- 		certData, err := ioutil.ReadFile("src/core/lib/tsi/test_creds/ca.pem")
 
- 		if err != nil {
 
- 			t.Fatal(err)
 
- 		}
 
- 		ctx.rootCAs = x509.NewCertPool()
 
- 		if !ctx.rootCAs.AppendCertsFromPEM(certData) {
 
- 			t.Fatal(fmt.Errorf("Unable to parse pem data"))
 
- 		}
 
- 	}
 
- 	return ctx
 
- }
 
- func (ctx *HTTP2InteropCtx) Close() error {
 
- 	// currently a noop
 
- 	return nil
 
- }
 
- func TestSoonClientShortSettings(t *testing.T) {
 
- 	defer Report(t)
 
- 	if *testCase != "framing" {
 
- 		t.SkipNow()
 
- 	}
 
- 	ctx := InteropCtx(t)
 
- 	for i := 1; i <= 5; i++ {
 
- 		err := testClientShortSettings(ctx, i)
 
- 		matchError(t, err, "EOF")
 
- 	}
 
- }
 
- func TestSoonShortPreface(t *testing.T) {
 
- 	defer Report(t)
 
- 	if *testCase != "framing" {
 
- 		t.SkipNow()
 
- 	}
 
- 	ctx := InteropCtx(t)
 
- 	for i := 0; i < len(Preface)-1; i++ {
 
- 		err := testShortPreface(ctx, Preface[:i]+"X")
 
- 		matchError(t, err, "EOF")
 
- 	}
 
- }
 
- func TestSoonUnknownFrameType(t *testing.T) {
 
- 	defer Report(t)
 
- 	if *testCase != "framing" {
 
- 		t.SkipNow()
 
- 	}
 
- 	ctx := InteropCtx(t)
 
- 	if err := testUnknownFrameType(ctx); err != nil {
 
- 		t.Fatal(err)
 
- 	}
 
- }
 
- func TestSoonClientPrefaceWithStreamId(t *testing.T) {
 
- 	defer Report(t)
 
- 	if *testCase != "framing" {
 
- 		t.SkipNow()
 
- 	}
 
- 	ctx := InteropCtx(t)
 
- 	err := testClientPrefaceWithStreamId(ctx)
 
- 	matchError(t, err, "EOF")
 
- }
 
- func TestSoonTLSApplicationProtocol(t *testing.T) {
 
- 	defer Report(t)
 
- 	if *testCase != "tls" {
 
- 		t.SkipNow()
 
- 	}
 
- 	ctx := InteropCtx(t)
 
- 	err := testTLSApplicationProtocol(ctx)
 
- 	matchError(t, err, "EOF", "broken pipe")
 
- }
 
- func TestSoonTLSMaxVersion(t *testing.T) {
 
- 	defer Report(t)
 
- 	if *testCase != "tls" {
 
- 		t.SkipNow()
 
- 	}
 
- 	ctx := InteropCtx(t)
 
- 	err := testTLSMaxVersion(ctx, tls.VersionTLS11)
 
- 	// TODO(carl-mastrangelo): maybe this should be some other error.  If the server picks
 
- 	// the wrong protocol version, thats bad too.
 
- 	matchError(t, err, "EOF", "server selected unsupported protocol")
 
- }
 
- func TestSoonTLSBadCipherSuites(t *testing.T) {
 
- 	defer Report(t)
 
- 	if *testCase != "tls" {
 
- 		t.SkipNow()
 
- 	}
 
- 	ctx := InteropCtx(t)
 
- 	err := testTLSBadCipherSuites(ctx)
 
- 	matchError(t, err, "EOF", "Got goaway frame")
 
- }
 
- func matchError(t *testing.T, err error, matches ...string) {
 
- 	if err == nil {
 
- 		t.Fatal("Expected an error")
 
- 	}
 
- 	for _, s := range matches {
 
- 		if strings.Contains(err.Error(), s) {
 
- 			return
 
- 		}
 
- 	}
 
- 	t.Fatalf("Error %v not in %+v", err, matches)
 
- }
 
- func TestMain(m *testing.M) {
 
- 	flag.Parse()
 
- 	m.Run()
 
- 	var fatal bool
 
- 	var any bool
 
- 	for _, ci := range allCaseInfos.Cases {
 
- 		if ci.Skipped {
 
- 			continue
 
- 		}
 
- 		any = true
 
- 		if !ci.Passed && ci.Fatal {
 
- 			fatal = true
 
- 		}
 
- 	}
 
- 	if err := json.NewEncoder(os.Stderr).Encode(&allCaseInfos); err != nil {
 
- 		fmt.Println("Failed to encode", err)
 
- 	}
 
- 	var code int
 
- 	if !any || fatal {
 
- 		code = 1
 
- 	}
 
- 	os.Exit(code)
 
- }
 
 
  |