changeset 1882:3619dcc8ba6d

Tests: HTTP/3 tests with server_name captures.
author Sergey Kandaurov <pluknet@nginx.com>
date Fri, 13 Jan 2023 17:12:20 +0400
parents 33432a6877f7
children ff50c265a5ac
files h3_server_name.t
diffstat 1 files changed, 168 insertions(+), 0 deletions(-) [+]
line wrap: on
line diff
new file mode 100644
--- /dev/null
+++ b/h3_server_name.t
@@ -0,0 +1,168 @@
+#!/usr/bin/perl
+
+# (C) Sergey Kandaurov
+# (C) Nginx, Inc.
+
+# Tests for HTTP/3 protocol, SNI TLS extension and regex in server_name.
+
+###############################################################################
+
+use warnings;
+use strict;
+
+use Test::More;
+
+BEGIN { use FindBin; chdir($FindBin::Bin); }
+
+use lib 'lib';
+use Test::Nginx;
+use Test::Nginx::HTTP2;
+use Test::Nginx::HTTP3;
+
+###############################################################################
+
+select STDERR; $| = 1;
+select STDOUT; $| = 1;
+
+eval { require IO::Socket::SSL; die if $IO::Socket::SSL::VERSION < 1.56; };
+plan(skip_all => 'IO::Socket::SSL version >= 1.56 required') if $@;
+
+eval { IO::Socket::SSL->can_client_sni() or die; };
+plan(skip_all => 'IO::Socket::SSL with OpenSSL SNI support required') if $@;
+
+eval { IO::Socket::SSL->can_alpn() or die; };
+plan(skip_all => 'IO::Socket::SSL with OpenSSL ALPN support required') if $@;
+
+eval { require Crypt::Misc; die if $Crypt::Misc::VERSION < 0.067; };
+plan(skip_all => 'CryptX version >= 0.067 required') if $@;
+
+my $t = Test::Nginx->new()->has(qw/http http_ssl http_v2 http_v3 rewrite/)
+	->has_daemon('openssl')->plan(6);
+
+$t->write_file_expand('nginx.conf', <<'EOF');
+
+%%TEST_GLOBALS%%
+
+daemon off;
+
+events {
+}
+
+http {
+    %%TEST_GLOBALS_HTTP%%
+
+    ssl_certificate_key localhost.key;
+    ssl_certificate localhost.crt;
+
+    server {
+        listen       127.0.0.1:8080 ssl http2;
+        listen       127.0.0.1:%%PORT_8980_UDP%% quic;
+        server_name  ~^(?P<name>.+)\.example\.com$;
+
+        location / {
+            return 200 $name;
+        }
+    }
+}
+
+EOF
+
+$t->write_file('openssl.conf', <<EOF);
+[ req ]
+default_bits = 2048
+encrypt_key = no
+distinguished_name = req_distinguished_name
+[ req_distinguished_name ]
+EOF
+
+my $d = $t->testdir();
+
+foreach my $name ('localhost') {
+	system('openssl req -x509 -new '
+		. "-config $d/openssl.conf -subj /CN=$name/ "
+		. "-out $d/$name.crt -keyout $d/$name.key "
+		. ">>$d/openssl.out 2>&1") == 0
+		or die "Can't create certificate for $name: $!\n";
+}
+
+$t->run();
+
+###############################################################################
+
+# ssl_servername_regex wasn't inherited from QUIC connection,
+# other protocols are provided for convenience
+
+is(get1('test.example.com'), 'test', 'http1 - sni match');
+is(get1('test.example.com', 'localhost'), 'test', 'http1 - sni not found');
+
+is(get2('test.example.com'), 'test', 'http2 - sni match');
+is(get2('test.example.com', 'localhost'), 'test', 'http2 - sni not found');
+
+is(get3('test.example.com'), 'test', 'http3 - sni match');
+is(get3('test.example.com', 'localhost'), 'test', 'http3 - sni not found');
+
+###############################################################################
+
+sub get1 {
+	my ($host, $sni) = @_;
+	my $s = get_ssl_socket(sni => $sni || $host, alpn => ['http/1.1']);
+	http(<<EOF, socket => $s) =~ /.*?\x0d\x0a?\x0d\x0a?(.*)/ms;
+GET / HTTP/1.1
+Host: $host
+Connection: close
+
+EOF
+	return $1;
+}
+
+sub get2 {
+	my ($host, $sni) = @_;
+	my $sock = get_ssl_socket(sni => $sni || $host, alpn => ['h2']);
+	my $s = Test::Nginx::HTTP2->new(undef, socket => $sock);
+	my $sid = $s->new_stream({ host => $host });
+	my $frames = $s->read(all => [{ sid => $sid, fin => 1 }]);
+
+	my ($frame) = grep { $_->{type} eq "DATA" } @$frames;
+	return $frame->{data};
+}
+
+sub get3 {
+	my ($host, $sni) = @_;
+	my $s = Test::Nginx::HTTP3->new(8980, sni => $sni || $host);
+	my $sid = $s->new_stream({ host => $host });
+	my $frames = $s->read(all => [{ sid => $sid, fin => 1 }]);
+
+	my ($frame) = grep { $_->{type} eq "DATA" } @$frames;
+	return $frame->{data};
+}
+
+sub get_ssl_socket {
+	my (%extra) = @_;
+	my $s;
+
+	eval {
+		local $SIG{ALRM} = sub { die "timeout\n" };
+		local $SIG{PIPE} = sub { die "sigpipe\n" };
+		alarm(8);
+		$s = IO::Socket::SSL->new(
+			Proto => 'tcp',
+			PeerAddr => '127.0.0.1',
+			PeerPort => port(8080),
+			SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE(),
+			SSL_hostname => $extra{sni},
+			SSL_alpn_protocols => $extra{alpn},
+			SSL_error_trap => sub { die $_[1] }
+		);
+		alarm(0);
+	};
+	alarm(0);
+
+	if ($@) {
+		log_in("died: $@");
+		return undef;
+	}
+
+	return $s;
+}
+
+###############################################################################