mirror of
https://github.com/VCMP-SqMod/SqMod.git
synced 2024-11-08 16:57:16 +01:00
9298065cef
CPR has features disabled and PCRE is fully disabled until updated to new code.
390 lines
14 KiB
C++
390 lines
14 KiB
C++
/* SPDX-License-Identifier: MPL-2.0 */
|
|
#include "testutil_security.hpp"
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
const char *test_zap_domain = "ZAPTEST";
|
|
|
|
void socket_config_null_client (void *server_, void *server_secret_)
|
|
{
|
|
LIBZMQ_UNUSED (server_);
|
|
LIBZMQ_UNUSED (server_secret_);
|
|
}
|
|
|
|
void socket_config_null_server (void *server_, void *server_secret_)
|
|
{
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
|
|
server_, ZMQ_ZAP_DOMAIN, test_zap_domain, strlen (test_zap_domain)));
|
|
#ifdef ZMQ_ZAP_ENFORCE_DOMAIN
|
|
int required = server_secret_ ? *static_cast<int *> (server_secret_) : 0;
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (server_, ZMQ_ZAP_ENFORCE_DOMAIN,
|
|
&required, sizeof (int)));
|
|
#else
|
|
LIBZMQ_UNUSED (server_secret_);
|
|
#endif
|
|
}
|
|
|
|
static const char test_plain_username[] = "testuser";
|
|
static const char test_plain_password[] = "testpass";
|
|
|
|
void socket_config_plain_client (void *server_, void *server_secret_)
|
|
{
|
|
LIBZMQ_UNUSED (server_secret_);
|
|
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (server_, ZMQ_PLAIN_PASSWORD, test_plain_password, 8));
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (server_, ZMQ_PLAIN_USERNAME, test_plain_username, 8));
|
|
}
|
|
|
|
void socket_config_plain_server (void *server_, void *server_secret_)
|
|
{
|
|
LIBZMQ_UNUSED (server_secret_);
|
|
|
|
int as_server = 1;
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (server_, ZMQ_PLAIN_SERVER, &as_server, sizeof (int)));
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
|
|
server_, ZMQ_ZAP_DOMAIN, test_zap_domain, strlen (test_zap_domain)));
|
|
}
|
|
|
|
char valid_client_public[41];
|
|
char valid_client_secret[41];
|
|
char valid_server_public[41];
|
|
char valid_server_secret[41];
|
|
|
|
void setup_testutil_security_curve ()
|
|
{
|
|
// Generate new keypairs for these tests
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_curve_keypair (valid_client_public, valid_client_secret));
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_curve_keypair (valid_server_public, valid_server_secret));
|
|
}
|
|
|
|
void socket_config_curve_server (void *server_, void *server_secret_)
|
|
{
|
|
int as_server = 1;
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (server_, ZMQ_CURVE_SERVER, &as_server, sizeof (int)));
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (server_, ZMQ_CURVE_SECRETKEY, server_secret_, 41));
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
|
|
server_, ZMQ_ZAP_DOMAIN, test_zap_domain, strlen (test_zap_domain)));
|
|
|
|
#ifdef ZMQ_ZAP_ENFORCE_DOMAIN
|
|
int required = 1;
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (server_, ZMQ_ZAP_ENFORCE_DOMAIN,
|
|
&required, sizeof (int)));
|
|
#endif
|
|
}
|
|
|
|
void socket_config_curve_client (void *client_, void *data_)
|
|
{
|
|
const curve_client_data_t *const curve_client_data =
|
|
static_cast<const curve_client_data_t *> (data_);
|
|
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
|
|
client_, ZMQ_CURVE_SERVERKEY, curve_client_data->server_public, 41));
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
|
|
client_, ZMQ_CURVE_PUBLICKEY, curve_client_data->client_public, 41));
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
|
|
client_, ZMQ_CURVE_SECRETKEY, curve_client_data->client_secret, 41));
|
|
}
|
|
|
|
void *zap_requests_handled;
|
|
|
|
void zap_handler_generic (zap_protocol_t zap_protocol_,
|
|
const char *expected_routing_id_)
|
|
{
|
|
void *control = zmq_socket (get_test_context (), ZMQ_REQ);
|
|
TEST_ASSERT_NOT_NULL (control);
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_connect (control, "inproc://handler-control"));
|
|
|
|
void *handler = zmq_socket (get_test_context (), ZMQ_REP);
|
|
TEST_ASSERT_NOT_NULL (handler);
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_bind (handler, "inproc://zeromq.zap.01"));
|
|
|
|
// Signal main thread that we are ready
|
|
send_string_expect_success (control, "GO", 0);
|
|
|
|
zmq_pollitem_t items[] = {
|
|
{control, 0, ZMQ_POLLIN, 0},
|
|
{handler, 0, ZMQ_POLLIN, 0},
|
|
};
|
|
|
|
// if ordered not to receive the request, ignore the second poll item
|
|
const int numitems = (zap_protocol_ == zap_do_not_recv) ? 1 : 2;
|
|
|
|
// Process ZAP requests forever
|
|
while (zmq_poll (items, numitems, -1) >= 0) {
|
|
if (items[0].revents & ZMQ_POLLIN) {
|
|
recv_string_expect_success (control, "STOP", 0);
|
|
break; // Terminating - main thread signal
|
|
}
|
|
if (!(items[1].revents & ZMQ_POLLIN))
|
|
continue;
|
|
|
|
char *version = s_recv (handler);
|
|
if (!version)
|
|
break; // Terminating - peer's socket closed
|
|
if (zap_protocol_ == zap_disconnect) {
|
|
free (version);
|
|
break;
|
|
}
|
|
|
|
char *sequence = s_recv (handler);
|
|
char *domain = s_recv (handler);
|
|
char *address = s_recv (handler);
|
|
char *routing_id = s_recv (handler);
|
|
char *mechanism = s_recv (handler);
|
|
bool authentication_succeeded = false;
|
|
if (streq (mechanism, "CURVE")) {
|
|
uint8_t client_key[32];
|
|
TEST_ASSERT_EQUAL_INT (32, TEST_ASSERT_SUCCESS_ERRNO (zmq_recv (
|
|
handler, client_key, 32, 0)));
|
|
|
|
char client_key_text[41];
|
|
zmq_z85_encode (client_key_text, client_key, 32);
|
|
|
|
authentication_succeeded =
|
|
streq (client_key_text, valid_client_public);
|
|
} else if (streq (mechanism, "PLAIN")) {
|
|
char client_username[32];
|
|
int size = TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_recv (handler, client_username, 32, 0));
|
|
client_username[size] = 0;
|
|
|
|
char client_password[32];
|
|
size = TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_recv (handler, client_password, 32, 0));
|
|
client_password[size] = 0;
|
|
|
|
authentication_succeeded =
|
|
streq (test_plain_username, client_username)
|
|
&& streq (test_plain_password, client_password);
|
|
} else if (streq (mechanism, "NULL")) {
|
|
authentication_succeeded = true;
|
|
} else {
|
|
char msg[128];
|
|
printf ("Unsupported mechanism: %s\n", mechanism);
|
|
TEST_FAIL_MESSAGE (msg);
|
|
}
|
|
|
|
TEST_ASSERT_EQUAL_STRING ("1.0", version);
|
|
TEST_ASSERT_EQUAL_STRING (expected_routing_id_, routing_id);
|
|
|
|
send_string_expect_success (
|
|
handler,
|
|
zap_protocol_ == zap_wrong_version ? "invalid_version" : version,
|
|
ZMQ_SNDMORE);
|
|
send_string_expect_success (handler,
|
|
zap_protocol_ == zap_wrong_request_id
|
|
? "invalid_request_id"
|
|
: sequence,
|
|
ZMQ_SNDMORE);
|
|
|
|
if (authentication_succeeded) {
|
|
const char *status_code;
|
|
switch (zap_protocol_) {
|
|
case zap_status_internal_error:
|
|
status_code = "500";
|
|
break;
|
|
case zap_status_temporary_failure:
|
|
status_code = "300";
|
|
break;
|
|
case zap_status_invalid:
|
|
status_code = "invalid_status";
|
|
break;
|
|
default:
|
|
status_code = "200";
|
|
}
|
|
send_string_expect_success (handler, status_code, ZMQ_SNDMORE);
|
|
send_string_expect_success (handler, "OK", ZMQ_SNDMORE);
|
|
send_string_expect_success (handler, "anonymous", ZMQ_SNDMORE);
|
|
if (zap_protocol_ == zap_too_many_parts) {
|
|
send_string_expect_success (handler, "", ZMQ_SNDMORE);
|
|
}
|
|
if (zap_protocol_ != zap_do_not_send)
|
|
send_string_expect_success (handler, "", 0);
|
|
} else {
|
|
send_string_expect_success (handler, "400", ZMQ_SNDMORE);
|
|
send_string_expect_success (handler, "Invalid client public key",
|
|
ZMQ_SNDMORE);
|
|
send_string_expect_success (handler, "", ZMQ_SNDMORE);
|
|
if (zap_protocol_ != zap_do_not_send)
|
|
send_string_expect_success (handler, "", 0);
|
|
}
|
|
free (version);
|
|
free (sequence);
|
|
free (domain);
|
|
free (address);
|
|
free (routing_id);
|
|
free (mechanism);
|
|
|
|
zmq_atomic_counter_inc (zap_requests_handled);
|
|
}
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_unbind (handler, "inproc://zeromq.zap.01"));
|
|
close_zero_linger (handler);
|
|
|
|
if (zap_protocol_ != zap_disconnect) {
|
|
send_string_expect_success (control, "STOPPED", 0);
|
|
}
|
|
close_zero_linger (control);
|
|
}
|
|
|
|
void zap_handler (void *)
|
|
{
|
|
zap_handler_generic (zap_ok);
|
|
}
|
|
|
|
static void setup_handshake_socket_monitor (void *server_,
|
|
void **server_mon_,
|
|
const char *monitor_endpoint_)
|
|
{
|
|
// Monitor handshake events on the server
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_socket_monitor (
|
|
server_, monitor_endpoint_,
|
|
ZMQ_EVENT_HANDSHAKE_SUCCEEDED | ZMQ_EVENT_HANDSHAKE_FAILED_NO_DETAIL
|
|
| ZMQ_EVENT_HANDSHAKE_FAILED_AUTH
|
|
| ZMQ_EVENT_HANDSHAKE_FAILED_PROTOCOL));
|
|
|
|
// Create socket for collecting monitor events
|
|
*server_mon_ = test_context_socket (ZMQ_PAIR);
|
|
int linger = 0;
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (*server_mon_, ZMQ_LINGER, &linger, sizeof (linger)));
|
|
|
|
// Connect it to the inproc endpoints so they'll get events
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_connect (*server_mon_, monitor_endpoint_));
|
|
}
|
|
|
|
void setup_context_and_server_side (void **zap_control_,
|
|
void **zap_thread_,
|
|
void **server_,
|
|
void **server_mon_,
|
|
char *my_endpoint_,
|
|
zmq_thread_fn zap_handler_,
|
|
socket_config_fn socket_config_,
|
|
void *socket_config_data_,
|
|
const char *routing_id_)
|
|
{
|
|
// Spawn ZAP handler
|
|
zap_requests_handled = zmq_atomic_counter_new ();
|
|
TEST_ASSERT_NOT_NULL (zap_requests_handled);
|
|
|
|
*zap_control_ = test_context_socket (ZMQ_REP);
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_bind (*zap_control_, "inproc://handler-control"));
|
|
int linger = 0;
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (*zap_control_, ZMQ_LINGER, &linger, sizeof (linger)));
|
|
|
|
if (zap_handler_ != NULL) {
|
|
*zap_thread_ = zmq_threadstart (zap_handler_, NULL);
|
|
|
|
recv_string_expect_success (*zap_control_, "GO", 0);
|
|
} else
|
|
*zap_thread_ = NULL;
|
|
|
|
// Server socket will accept connections
|
|
*server_ = test_context_socket (ZMQ_DEALER);
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (*server_, ZMQ_LINGER, &linger, sizeof (linger)));
|
|
// As per API by default there's no limit to the size of a message,
|
|
// but the sanitizer allocator will barf over a gig or so
|
|
int64_t max_msg_size = 64 * 1024 * 1024;
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
|
|
*server_, ZMQ_MAXMSGSIZE, &max_msg_size, sizeof (int64_t)));
|
|
|
|
socket_config_ (*server_, socket_config_data_);
|
|
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
|
|
*server_, ZMQ_ROUTING_ID, routing_id_, strlen (routing_id_)));
|
|
|
|
bind_loopback_ipv4 (*server_, my_endpoint_, MAX_SOCKET_STRING);
|
|
|
|
const char server_monitor_endpoint[] = "inproc://monitor-server";
|
|
setup_handshake_socket_monitor (*server_, server_mon_,
|
|
server_monitor_endpoint);
|
|
}
|
|
|
|
void shutdown_context_and_server_side (void *zap_thread_,
|
|
void *server_,
|
|
void *server_mon_,
|
|
void *zap_control_,
|
|
bool zap_handler_stopped_)
|
|
{
|
|
if (zap_thread_ && !zap_handler_stopped_) {
|
|
send_string_expect_success (zap_control_, "STOP", 0);
|
|
recv_string_expect_success (zap_control_, "STOPPED", 0);
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_unbind (zap_control_, "inproc://handler-control"));
|
|
}
|
|
test_context_socket_close (zap_control_);
|
|
zmq_socket_monitor (server_, NULL, 0);
|
|
test_context_socket_close (server_mon_);
|
|
test_context_socket_close (server_);
|
|
|
|
// Wait until ZAP handler terminates
|
|
if (zap_thread_)
|
|
zmq_threadclose (zap_thread_);
|
|
|
|
zmq_atomic_counter_destroy (&zap_requests_handled);
|
|
}
|
|
|
|
void *create_and_connect_client (char *my_endpoint_,
|
|
socket_config_fn socket_config_,
|
|
void *socket_config_data_,
|
|
void **client_mon_)
|
|
{
|
|
void *client = test_context_socket (ZMQ_DEALER);
|
|
// As per API by default there's no limit to the size of a message,
|
|
// but the sanitizer allocator will barf over a gig or so
|
|
int64_t max_msg_size = 64 * 1024 * 1024;
|
|
TEST_ASSERT_SUCCESS_ERRNO (
|
|
zmq_setsockopt (client, ZMQ_MAXMSGSIZE, &max_msg_size, sizeof (int64_t)));
|
|
|
|
socket_config_ (client, socket_config_data_);
|
|
|
|
TEST_ASSERT_SUCCESS_ERRNO (zmq_connect (client, my_endpoint_));
|
|
|
|
if (client_mon_) {
|
|
setup_handshake_socket_monitor (client, client_mon_,
|
|
"inproc://client-monitor");
|
|
}
|
|
|
|
return client;
|
|
}
|
|
|
|
void expect_new_client_bounce_fail (char *my_endpoint_,
|
|
void *server_,
|
|
socket_config_fn socket_config_,
|
|
void *socket_config_data_,
|
|
void **client_mon_,
|
|
int expected_client_event_,
|
|
int expected_client_value_)
|
|
{
|
|
void *my_client_mon = NULL;
|
|
TEST_ASSERT_TRUE (client_mon_ == NULL || expected_client_event_ == 0);
|
|
if (expected_client_event_ != 0)
|
|
client_mon_ = &my_client_mon;
|
|
void *client = create_and_connect_client (my_endpoint_, socket_config_,
|
|
socket_config_data_, client_mon_);
|
|
expect_bounce_fail (server_, client);
|
|
|
|
if (expected_client_event_ != 0) {
|
|
int events_received = 0;
|
|
events_received = expect_monitor_event_multiple (
|
|
my_client_mon, expected_client_event_, expected_client_value_, false);
|
|
|
|
TEST_ASSERT_EQUAL_INT (1, events_received);
|
|
|
|
test_context_socket_close (my_client_mon);
|
|
}
|
|
|
|
test_context_socket_close_zero_linger (client);
|
|
}
|