2019-03-11 16:56:48 +00:00
|
|
|
package http01
|
2018-12-06 21:50:17 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
2019-10-05 11:44:38 +00:00
|
|
|
"fmt"
|
2018-12-06 21:50:17 +00:00
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
2019-10-05 11:44:38 +00:00
|
|
|
"net/textproto"
|
2018-12-06 21:50:17 +00:00
|
|
|
"testing"
|
|
|
|
|
2020-09-02 01:20:01 +00:00
|
|
|
"github.com/go-acme/lego/v4/acme"
|
|
|
|
"github.com/go-acme/lego/v4/acme/api"
|
|
|
|
"github.com/go-acme/lego/v4/challenge"
|
|
|
|
"github.com/go-acme/lego/v4/platform/tester"
|
2018-12-06 21:50:17 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestChallenge(t *testing.T) {
|
|
|
|
_, apiURL, tearDown := tester.SetupFakeAPI()
|
|
|
|
defer tearDown()
|
|
|
|
|
2019-10-05 11:44:38 +00:00
|
|
|
providerServer := NewProviderServer("", "23457")
|
2018-12-06 21:50:17 +00:00
|
|
|
|
|
|
|
validate := func(_ *api.Core, _ string, chlng acme.Challenge) error {
|
|
|
|
uri := "http://localhost" + providerServer.GetAddress() + ChallengePath(chlng.Token)
|
|
|
|
|
|
|
|
resp, err := http.DefaultClient.Get(uri)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
if want := "text/plain"; resp.Header.Get("Content-Type") != want {
|
|
|
|
t.Errorf("Get(%q) Content-Type: got %q, want %q", uri, resp.Header.Get("Content-Type"), want)
|
|
|
|
}
|
|
|
|
|
|
|
|
body, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
bodyStr := string(body)
|
|
|
|
|
|
|
|
if bodyStr != chlng.KeyAuthorization {
|
|
|
|
t.Errorf("Get(%q) Body: got %q, want %q", uri, bodyStr, chlng.KeyAuthorization)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
privateKey, err := rsa.GenerateKey(rand.Reader, 512)
|
|
|
|
require.NoError(t, err, "Could not generate test key")
|
|
|
|
|
|
|
|
core, err := api.New(http.DefaultClient, "lego-test", apiURL+"/dir", "", privateKey)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
solver := NewChallenge(core, validate, providerServer)
|
|
|
|
|
|
|
|
authz := acme.Authorization{
|
|
|
|
Identifier: acme.Identifier{
|
|
|
|
Value: "localhost:23457",
|
|
|
|
},
|
|
|
|
Challenges: []acme.Challenge{
|
|
|
|
{Type: challenge.HTTP01.String(), Token: "http1"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
err = solver.Solve(authz)
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestChallengeInvalidPort(t *testing.T) {
|
|
|
|
_, apiURL, tearDown := tester.SetupFakeAPI()
|
|
|
|
defer tearDown()
|
|
|
|
|
|
|
|
privateKey, err := rsa.GenerateKey(rand.Reader, 128)
|
|
|
|
require.NoError(t, err, "Could not generate test key")
|
|
|
|
|
|
|
|
core, err := api.New(http.DefaultClient, "lego-test", apiURL+"/dir", "", privateKey)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
validate := func(_ *api.Core, _ string, _ acme.Challenge) error { return nil }
|
|
|
|
|
2019-10-05 11:44:38 +00:00
|
|
|
solver := NewChallenge(core, validate, NewProviderServer("", "123456"))
|
2018-12-06 21:50:17 +00:00
|
|
|
|
|
|
|
authz := acme.Authorization{
|
|
|
|
Identifier: acme.Identifier{
|
|
|
|
Value: "localhost:123456",
|
|
|
|
},
|
|
|
|
Challenges: []acme.Challenge{
|
|
|
|
{Type: challenge.HTTP01.String(), Token: "http2"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
err = solver.Solve(authz)
|
|
|
|
require.Error(t, err)
|
|
|
|
assert.Contains(t, err.Error(), "invalid port")
|
|
|
|
assert.Contains(t, err.Error(), "123456")
|
|
|
|
}
|
2019-10-05 11:44:38 +00:00
|
|
|
|
|
|
|
type testProxyHeader struct {
|
|
|
|
name string
|
|
|
|
values []string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (h *testProxyHeader) update(r *http.Request) {
|
|
|
|
if h == nil || len(h.values) == 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if h.name == "Host" {
|
|
|
|
r.Host = h.values[0]
|
|
|
|
} else if h.name != "" {
|
|
|
|
r.Header[h.name] = h.values
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestChallengeWithProxy(t *testing.T) {
|
|
|
|
h := func(name string, values ...string) *testProxyHeader {
|
|
|
|
name = textproto.CanonicalMIMEHeaderKey(name)
|
|
|
|
return &testProxyHeader{name, values}
|
|
|
|
}
|
|
|
|
|
|
|
|
const (
|
|
|
|
ok = "localhost:23457"
|
|
|
|
nook = "example.com"
|
|
|
|
)
|
|
|
|
|
2020-07-09 23:48:18 +00:00
|
|
|
testCases := []struct {
|
2019-10-05 11:44:38 +00:00
|
|
|
name string
|
|
|
|
header *testProxyHeader
|
|
|
|
extra *testProxyHeader
|
|
|
|
isErr bool
|
|
|
|
}{
|
|
|
|
// tests for hostMatcher
|
|
|
|
{
|
|
|
|
name: "no proxy",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "empty string",
|
|
|
|
header: h(""),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "empty Host",
|
|
|
|
header: h("host"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "matching Host",
|
|
|
|
header: h("host", ok),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Host mismatch",
|
|
|
|
header: h("host", nook),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Host mismatch (ignoring forwarding header)",
|
|
|
|
header: h("host", nook),
|
|
|
|
extra: h("X-Forwarded-Host", ok),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
// test for arbitraryMatcher
|
|
|
|
{
|
|
|
|
name: "matching X-Forwarded-Host",
|
|
|
|
header: h("X-Forwarded-Host", ok),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "matching X-Forwarded-Host (multiple fields)",
|
|
|
|
header: h("X-Forwarded-Host", ok, nook),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "matching X-Forwarded-Host (chain value)",
|
|
|
|
header: h("X-Forwarded-Host", ok+", "+nook),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "X-Forwarded-Host mismatch",
|
|
|
|
header: h("X-Forwarded-Host", nook),
|
|
|
|
extra: h("host", ok),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "X-Forwarded-Host mismatch (multiple fields)",
|
|
|
|
header: h("X-Forwarded-Host", nook, ok),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "matching X-Something-Else",
|
|
|
|
header: h("X-Something-Else", ok),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "matching X-Something-Else (multiple fields)",
|
|
|
|
header: h("X-Something-Else", ok, nook),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "matching X-Something-Else (chain value)",
|
|
|
|
header: h("X-Something-Else", ok+", "+nook),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "X-Something-Else mismatch",
|
|
|
|
header: h("X-Something-Else", nook),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "X-Something-Else mismatch (multiple fields)",
|
|
|
|
header: h("X-Something-Else", nook, ok),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "X-Something-Else mismatch (chain value)",
|
|
|
|
header: h("X-Something-Else", nook+", "+ok),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
// tests for forwardedHeader
|
|
|
|
{
|
|
|
|
name: "matching Forwarded",
|
|
|
|
header: h("Forwarded", fmt.Sprintf("host=%q;foo=bar", ok)),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "matching Forwarded (multiple fields)",
|
|
|
|
header: h("Forwarded", fmt.Sprintf("host=%q", ok), "host="+nook),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "matching Forwarded (chain value)",
|
|
|
|
header: h("Forwarded", fmt.Sprintf("host=%q, host=%s", ok, nook)),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Forwarded mismatch",
|
|
|
|
header: h("Forwarded", "host="+nook),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Forwarded mismatch (missing information)",
|
|
|
|
header: h("Forwarded", "for=127.0.0.1"),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Forwarded mismatch (multiple fields)",
|
|
|
|
header: h("Forwarded", "host="+nook, fmt.Sprintf("host=%q", ok)),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Forwarded mismatch (chain value)",
|
|
|
|
header: h("Forwarded", fmt.Sprintf("host=%s, host=%q", nook, ok)),
|
|
|
|
isErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, test := range testCases {
|
|
|
|
t.Run(test.name, func(t *testing.T) {
|
|
|
|
testServeWithProxy(t, test.header, test.extra, test.isErr)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func testServeWithProxy(t *testing.T, header, extra *testProxyHeader, expectError bool) {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
_, apiURL, tearDown := tester.SetupFakeAPI()
|
|
|
|
defer tearDown()
|
|
|
|
|
|
|
|
providerServer := NewProviderServer("localhost", "23457")
|
|
|
|
if header != nil {
|
|
|
|
providerServer.SetProxyHeader(header.name)
|
|
|
|
}
|
|
|
|
|
|
|
|
validate := func(_ *api.Core, _ string, chlng acme.Challenge) error {
|
|
|
|
uri := "http://" + providerServer.GetAddress() + ChallengePath(chlng.Token)
|
|
|
|
|
|
|
|
req, err := http.NewRequest(http.MethodGet, uri, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
header.update(req)
|
|
|
|
extra.update(req)
|
|
|
|
|
|
|
|
resp, err := http.DefaultClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
if want := "text/plain"; resp.Header.Get("Content-Type") != want {
|
|
|
|
return fmt.Errorf("Get(%q) Content-Type: got %q, want %q", uri, resp.Header.Get("Content-Type"), want)
|
|
|
|
}
|
|
|
|
|
|
|
|
body, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
bodyStr := string(body)
|
|
|
|
|
|
|
|
if bodyStr != chlng.KeyAuthorization {
|
|
|
|
return fmt.Errorf("Get(%q) Body: got %q, want %q", uri, bodyStr, chlng.KeyAuthorization)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
privateKey, err := rsa.GenerateKey(rand.Reader, 512)
|
|
|
|
require.NoError(t, err, "Could not generate test key")
|
|
|
|
|
|
|
|
core, err := api.New(http.DefaultClient, "lego-test", apiURL+"/dir", "", privateKey)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
solver := NewChallenge(core, validate, providerServer)
|
|
|
|
|
|
|
|
authz := acme.Authorization{
|
|
|
|
Identifier: acme.Identifier{
|
|
|
|
Value: "localhost:23457",
|
|
|
|
},
|
|
|
|
Challenges: []acme.Challenge{
|
|
|
|
{Type: challenge.HTTP01.String(), Token: "http1"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
err = solver.Solve(authz)
|
|
|
|
if expectError {
|
|
|
|
require.Error(t, err)
|
|
|
|
} else {
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
}
|