7df012884f
Motivation Per javadoc in 4.1.x SimpleChannelInboundHandler: "Please keep in mind that channelRead0(ChannelHandlerContext, I) will be renamed to messageReceived(ChannelHandlerContext, I) in 5.0." Modifications Rename aforementioned method and all references/overrides. Result Method is renamed.
217 lines
7.9 KiB
Java
217 lines
7.9 KiB
Java
/*
|
|
* Copyright 2015 The Netty Project
|
|
*
|
|
* The Netty Project licenses this file to you under the Apache License,
|
|
* version 2.0 (the "License"); you may not use this file except in compliance
|
|
* with the License. You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
* License for the specific language governing permissions and limitations
|
|
* under the License.
|
|
*/
|
|
package io.netty.testsuite.transport.socket;
|
|
|
|
import io.netty.bootstrap.Bootstrap;
|
|
import io.netty.bootstrap.ServerBootstrap;
|
|
import io.netty.buffer.ByteBuf;
|
|
import io.netty.buffer.ByteBufUtil;
|
|
import io.netty.buffer.Unpooled;
|
|
import io.netty.channel.Channel;
|
|
import io.netty.channel.ChannelHandlerContext;
|
|
import io.netty.channel.ChannelHandler.Sharable;
|
|
import io.netty.channel.ChannelInitializer;
|
|
import io.netty.channel.SimpleChannelInboundHandler;
|
|
import io.netty.channel.socket.SocketChannel;
|
|
import io.netty.handler.ssl.SslContext;
|
|
import io.netty.handler.ssl.SslContextBuilder;
|
|
import io.netty.handler.ssl.SslHandler;
|
|
import io.netty.handler.ssl.SslProvider;
|
|
import io.netty.handler.ssl.util.SelfSignedCertificate;
|
|
import io.netty.util.internal.logging.InternalLogger;
|
|
import io.netty.util.internal.logging.InternalLoggerFactory;
|
|
|
|
import org.junit.Test;
|
|
import org.junit.runner.RunWith;
|
|
import org.junit.runners.Parameterized;
|
|
import org.junit.runners.Parameterized.Parameters;
|
|
|
|
import javax.net.ssl.SSLEngine;
|
|
import javax.net.ssl.SSLSessionContext;
|
|
|
|
import java.io.File;
|
|
import java.io.IOException;
|
|
import java.net.InetSocketAddress;
|
|
import java.security.cert.CertificateException;
|
|
import java.util.Collection;
|
|
import java.util.Collections;
|
|
import java.util.Enumeration;
|
|
import java.util.HashSet;
|
|
import java.util.Set;
|
|
import java.util.concurrent.atomic.AtomicReference;
|
|
|
|
import static org.junit.Assert.*;
|
|
|
|
@RunWith(Parameterized.class)
|
|
public class SocketSslSessionReuseTest extends AbstractSocketTest {
|
|
|
|
private static final InternalLogger logger = InternalLoggerFactory.getInstance(SocketSslSessionReuseTest.class);
|
|
|
|
private static final File CERT_FILE;
|
|
private static final File KEY_FILE;
|
|
|
|
static {
|
|
SelfSignedCertificate ssc;
|
|
try {
|
|
ssc = new SelfSignedCertificate();
|
|
} catch (CertificateException e) {
|
|
throw new Error(e);
|
|
}
|
|
CERT_FILE = ssc.certificate();
|
|
KEY_FILE = ssc.privateKey();
|
|
}
|
|
|
|
@Parameters(name = "{index}: serverEngine = {0}, clientEngine = {1}")
|
|
public static Collection<Object[]> data() throws Exception {
|
|
return Collections.singletonList(new Object[] {
|
|
SslContextBuilder.forServer(CERT_FILE, KEY_FILE).sslProvider(SslProvider.JDK).build(),
|
|
SslContextBuilder.forClient().trustManager(CERT_FILE).sslProvider(SslProvider.JDK).build()
|
|
});
|
|
}
|
|
|
|
private final SslContext serverCtx;
|
|
private final SslContext clientCtx;
|
|
|
|
public SocketSslSessionReuseTest(SslContext serverCtx, SslContext clientCtx) {
|
|
this.serverCtx = serverCtx;
|
|
this.clientCtx = clientCtx;
|
|
}
|
|
|
|
@Test(timeout = 30000)
|
|
public void testSslSessionReuse() throws Throwable {
|
|
run();
|
|
}
|
|
|
|
public void testSslSessionReuse(ServerBootstrap sb, Bootstrap cb) throws Throwable {
|
|
final ReadAndDiscardHandler sh = new ReadAndDiscardHandler(true, true);
|
|
final ReadAndDiscardHandler ch = new ReadAndDiscardHandler(false, true);
|
|
final String[] protocols = { "TLSv1", "TLSv1.1", "TLSv1.2" };
|
|
|
|
sb.childHandler(new ChannelInitializer<SocketChannel>() {
|
|
@Override
|
|
protected void initChannel(SocketChannel sch) throws Exception {
|
|
SSLEngine engine = serverCtx.newEngine(sch.alloc());
|
|
engine.setUseClientMode(false);
|
|
engine.setEnabledProtocols(protocols);
|
|
|
|
sch.pipeline().addLast(new SslHandler(engine));
|
|
sch.pipeline().addLast(sh);
|
|
}
|
|
});
|
|
final Channel sc = sb.bind().sync().channel();
|
|
|
|
cb.handler(new ChannelInitializer<SocketChannel>() {
|
|
@Override
|
|
protected void initChannel(SocketChannel sch) throws Exception {
|
|
InetSocketAddress serverAddr = (InetSocketAddress) sc.localAddress();
|
|
SSLEngine engine = clientCtx.newEngine(sch.alloc(), serverAddr.getHostString(), serverAddr.getPort());
|
|
engine.setUseClientMode(true);
|
|
engine.setEnabledProtocols(protocols);
|
|
|
|
sch.pipeline().addLast(new SslHandler(engine));
|
|
sch.pipeline().addLast(ch);
|
|
}
|
|
});
|
|
|
|
try {
|
|
SSLSessionContext clientSessionCtx = clientCtx.sessionContext();
|
|
ByteBuf msg = Unpooled.wrappedBuffer(new byte[] { 0xa, 0xb, 0xc, 0xd }, 0, 4);
|
|
Channel cc = cb.connect(sc.localAddress()).sync().channel();
|
|
cc.writeAndFlush(msg).sync();
|
|
cc.closeFuture().sync();
|
|
rethrowHandlerExceptions(sh, ch);
|
|
Set<String> sessions = sessionIdSet(clientSessionCtx.getIds());
|
|
|
|
msg = Unpooled.wrappedBuffer(new byte[] { 0xa, 0xb, 0xc, 0xd }, 0, 4);
|
|
cc = cb.connect(sc.localAddress()).sync().channel();
|
|
cc.writeAndFlush(msg).sync();
|
|
cc.closeFuture().sync();
|
|
assertEquals("Expected no new sessions", sessions, sessionIdSet(clientSessionCtx.getIds()));
|
|
rethrowHandlerExceptions(sh, ch);
|
|
} finally {
|
|
sc.close().awaitUninterruptibly();
|
|
}
|
|
}
|
|
|
|
private static void rethrowHandlerExceptions(ReadAndDiscardHandler sh, ReadAndDiscardHandler ch) throws Throwable {
|
|
if (sh.exception.get() != null && !(sh.exception.get() instanceof IOException)) {
|
|
throw sh.exception.get();
|
|
}
|
|
if (ch.exception.get() != null && !(ch.exception.get() instanceof IOException)) {
|
|
throw ch.exception.get();
|
|
}
|
|
if (sh.exception.get() != null) {
|
|
throw sh.exception.get();
|
|
}
|
|
if (ch.exception.get() != null) {
|
|
throw ch.exception.get();
|
|
}
|
|
}
|
|
|
|
private static Set<String> sessionIdSet(Enumeration<byte[]> sessionIds) {
|
|
Set<String> idSet = new HashSet<>();
|
|
byte[] id;
|
|
while (sessionIds.hasMoreElements()) {
|
|
id = sessionIds.nextElement();
|
|
idSet.add(ByteBufUtil.hexDump(Unpooled.wrappedBuffer(id)));
|
|
}
|
|
return idSet;
|
|
}
|
|
|
|
@Sharable
|
|
private static class ReadAndDiscardHandler extends SimpleChannelInboundHandler<ByteBuf> {
|
|
final AtomicReference<Throwable> exception = new AtomicReference<>();
|
|
private final boolean server;
|
|
private final boolean autoRead;
|
|
|
|
ReadAndDiscardHandler(boolean server, boolean autoRead) {
|
|
this.server = server;
|
|
this.autoRead = autoRead;
|
|
}
|
|
|
|
@Override
|
|
public void messageReceived(ChannelHandlerContext ctx, ByteBuf in) throws Exception {
|
|
byte[] actual = new byte[in.readableBytes()];
|
|
in.readBytes(actual);
|
|
ctx.close();
|
|
}
|
|
|
|
@Override
|
|
public void channelReadComplete(ChannelHandlerContext ctx) throws Exception {
|
|
try {
|
|
ctx.flush();
|
|
} finally {
|
|
if (!autoRead) {
|
|
ctx.read();
|
|
}
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public void exceptionCaught(ChannelHandlerContext ctx,
|
|
Throwable cause) throws Exception {
|
|
if (logger.isWarnEnabled()) {
|
|
logger.warn(
|
|
"Unexpected exception from the " +
|
|
(server? "server" : "client") + " side", cause);
|
|
}
|
|
|
|
exception.compareAndSet(null, cause);
|
|
ctx.close();
|
|
}
|
|
}
|
|
}
|