123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416 |
- /*
- Copyright (c) 2007-2019 Contributors as noted in the AUTHORS file
- This file is part of libzmq, the ZeroMQ core engine in C++.
- libzmq is free software; you can redistribute it and/or modify it under
- the terms of the GNU Lesser General Public License (LGPL) as published
- by the Free Software Foundation; either version 3 of the License, or
- (at your option) any later version.
- As a special exception, the Contributors give you permission to link
- this library with independent modules to produce an executable,
- regardless of the license terms of these independent modules, and to
- copy and distribute the resulting executable under terms of your choice,
- provided that you also meet, for each linked independent module, the
- terms and conditions of the license of that module. An independent
- module is a module which is not derived from or based on this library.
- If you modify this library, you must extend this exception to your
- version of the library.
- libzmq is distributed in the hope that it will be useful, but WITHOUT
- ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
- FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
- License for more details.
- You should have received a copy of the GNU Lesser General Public License
- along with this program. If not, see <http://www.gnu.org/licenses/>.
- */
- #include "testutil_security.hpp"
- #include <stdlib.h>
- #include <string.h>
- const char *test_zap_domain = "ZAPTEST";
- void socket_config_null_client (void *server_, void *server_secret_)
- {
- LIBZMQ_UNUSED (server_);
- LIBZMQ_UNUSED (server_secret_);
- }
- void socket_config_null_server (void *server_, void *server_secret_)
- {
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
- server_, ZMQ_ZAP_DOMAIN, test_zap_domain, strlen (test_zap_domain)));
- #ifdef ZMQ_ZAP_ENFORCE_DOMAIN
- int required = server_secret_ ? *static_cast<int *> (server_secret_) : 0;
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (server_, ZMQ_ZAP_ENFORCE_DOMAIN,
- &required, sizeof (int)));
- #else
- LIBZMQ_UNUSED (server_secret_);
- #endif
- }
- static const char test_plain_username[] = "testuser";
- static const char test_plain_password[] = "testpass";
- void socket_config_plain_client (void *server_, void *server_secret_)
- {
- LIBZMQ_UNUSED (server_secret_);
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (server_, ZMQ_PLAIN_PASSWORD, test_plain_password, 8));
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (server_, ZMQ_PLAIN_USERNAME, test_plain_username, 8));
- }
- void socket_config_plain_server (void *server_, void *server_secret_)
- {
- LIBZMQ_UNUSED (server_secret_);
- int as_server = 1;
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (server_, ZMQ_PLAIN_SERVER, &as_server, sizeof (int)));
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
- server_, ZMQ_ZAP_DOMAIN, test_zap_domain, strlen (test_zap_domain)));
- }
- char valid_client_public[41];
- char valid_client_secret[41];
- char valid_server_public[41];
- char valid_server_secret[41];
- void setup_testutil_security_curve ()
- {
- // Generate new keypairs for these tests
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_curve_keypair (valid_client_public, valid_client_secret));
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_curve_keypair (valid_server_public, valid_server_secret));
- }
- void socket_config_curve_server (void *server_, void *server_secret_)
- {
- int as_server = 1;
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (server_, ZMQ_CURVE_SERVER, &as_server, sizeof (int)));
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (server_, ZMQ_CURVE_SECRETKEY, server_secret_, 41));
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
- server_, ZMQ_ZAP_DOMAIN, test_zap_domain, strlen (test_zap_domain)));
- #ifdef ZMQ_ZAP_ENFORCE_DOMAIN
- int required = 1;
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (server_, ZMQ_ZAP_ENFORCE_DOMAIN,
- &required, sizeof (int)));
- #endif
- }
- void socket_config_curve_client (void *client_, void *data_)
- {
- const curve_client_data_t *const curve_client_data =
- static_cast<const curve_client_data_t *> (data_);
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
- client_, ZMQ_CURVE_SERVERKEY, curve_client_data->server_public, 41));
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
- client_, ZMQ_CURVE_PUBLICKEY, curve_client_data->client_public, 41));
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
- client_, ZMQ_CURVE_SECRETKEY, curve_client_data->client_secret, 41));
- }
- void *zap_requests_handled;
- void zap_handler_generic (zap_protocol_t zap_protocol_,
- const char *expected_routing_id_)
- {
- void *control = zmq_socket (get_test_context (), ZMQ_REQ);
- TEST_ASSERT_NOT_NULL (control);
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_connect (control, "inproc://handler-control"));
- void *handler = zmq_socket (get_test_context (), ZMQ_REP);
- TEST_ASSERT_NOT_NULL (handler);
- TEST_ASSERT_SUCCESS_ERRNO (zmq_bind (handler, "inproc://zeromq.zap.01"));
- // Signal main thread that we are ready
- send_string_expect_success (control, "GO", 0);
- zmq_pollitem_t items[] = {
- {control, 0, ZMQ_POLLIN, 0},
- {handler, 0, ZMQ_POLLIN, 0},
- };
- // if ordered not to receive the request, ignore the second poll item
- const int numitems = (zap_protocol_ == zap_do_not_recv) ? 1 : 2;
- // Process ZAP requests forever
- while (zmq_poll (items, numitems, -1) >= 0) {
- if (items[0].revents & ZMQ_POLLIN) {
- recv_string_expect_success (control, "STOP", 0);
- break; // Terminating - main thread signal
- }
- if (!(items[1].revents & ZMQ_POLLIN))
- continue;
- char *version = s_recv (handler);
- if (!version)
- break; // Terminating - peer's socket closed
- if (zap_protocol_ == zap_disconnect) {
- free (version);
- break;
- }
- char *sequence = s_recv (handler);
- char *domain = s_recv (handler);
- char *address = s_recv (handler);
- char *routing_id = s_recv (handler);
- char *mechanism = s_recv (handler);
- bool authentication_succeeded = false;
- if (streq (mechanism, "CURVE")) {
- uint8_t client_key[32];
- TEST_ASSERT_EQUAL_INT (32, TEST_ASSERT_SUCCESS_ERRNO (zmq_recv (
- handler, client_key, 32, 0)));
- char client_key_text[41];
- zmq_z85_encode (client_key_text, client_key, 32);
- authentication_succeeded =
- streq (client_key_text, valid_client_public);
- } else if (streq (mechanism, "PLAIN")) {
- char client_username[32];
- int size = TEST_ASSERT_SUCCESS_ERRNO (
- zmq_recv (handler, client_username, 32, 0));
- client_username[size] = 0;
- char client_password[32];
- size = TEST_ASSERT_SUCCESS_ERRNO (
- zmq_recv (handler, client_password, 32, 0));
- client_password[size] = 0;
- authentication_succeeded =
- streq (test_plain_username, client_username)
- && streq (test_plain_password, client_password);
- } else if (streq (mechanism, "NULL")) {
- authentication_succeeded = true;
- } else {
- char msg[128];
- printf ("Unsupported mechanism: %s\n", mechanism);
- TEST_FAIL_MESSAGE (msg);
- }
- TEST_ASSERT_EQUAL_STRING ("1.0", version);
- TEST_ASSERT_EQUAL_STRING (expected_routing_id_, routing_id);
- send_string_expect_success (
- handler,
- zap_protocol_ == zap_wrong_version ? "invalid_version" : version,
- ZMQ_SNDMORE);
- send_string_expect_success (handler,
- zap_protocol_ == zap_wrong_request_id
- ? "invalid_request_id"
- : sequence,
- ZMQ_SNDMORE);
- if (authentication_succeeded) {
- const char *status_code;
- switch (zap_protocol_) {
- case zap_status_internal_error:
- status_code = "500";
- break;
- case zap_status_temporary_failure:
- status_code = "300";
- break;
- case zap_status_invalid:
- status_code = "invalid_status";
- break;
- default:
- status_code = "200";
- }
- send_string_expect_success (handler, status_code, ZMQ_SNDMORE);
- send_string_expect_success (handler, "OK", ZMQ_SNDMORE);
- send_string_expect_success (handler, "anonymous", ZMQ_SNDMORE);
- if (zap_protocol_ == zap_too_many_parts) {
- send_string_expect_success (handler, "", ZMQ_SNDMORE);
- }
- if (zap_protocol_ != zap_do_not_send)
- send_string_expect_success (handler, "", 0);
- } else {
- send_string_expect_success (handler, "400", ZMQ_SNDMORE);
- send_string_expect_success (handler, "Invalid client public key",
- ZMQ_SNDMORE);
- send_string_expect_success (handler, "", ZMQ_SNDMORE);
- if (zap_protocol_ != zap_do_not_send)
- send_string_expect_success (handler, "", 0);
- }
- free (version);
- free (sequence);
- free (domain);
- free (address);
- free (routing_id);
- free (mechanism);
- zmq_atomic_counter_inc (zap_requests_handled);
- }
- TEST_ASSERT_SUCCESS_ERRNO (zmq_unbind (handler, "inproc://zeromq.zap.01"));
- close_zero_linger (handler);
- if (zap_protocol_ != zap_disconnect) {
- send_string_expect_success (control, "STOPPED", 0);
- }
- close_zero_linger (control);
- }
- void zap_handler (void *)
- {
- zap_handler_generic (zap_ok);
- }
- static void setup_handshake_socket_monitor (void *server_,
- void **server_mon_,
- const char *monitor_endpoint_)
- {
- // Monitor handshake events on the server
- TEST_ASSERT_SUCCESS_ERRNO (zmq_socket_monitor (
- server_, monitor_endpoint_,
- ZMQ_EVENT_HANDSHAKE_SUCCEEDED | ZMQ_EVENT_HANDSHAKE_FAILED_NO_DETAIL
- | ZMQ_EVENT_HANDSHAKE_FAILED_AUTH
- | ZMQ_EVENT_HANDSHAKE_FAILED_PROTOCOL));
- // Create socket for collecting monitor events
- *server_mon_ = test_context_socket (ZMQ_PAIR);
- int linger = 0;
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (*server_mon_, ZMQ_LINGER, &linger, sizeof (linger)));
- // Connect it to the inproc endpoints so they'll get events
- TEST_ASSERT_SUCCESS_ERRNO (zmq_connect (*server_mon_, monitor_endpoint_));
- }
- void setup_context_and_server_side (void **zap_control_,
- void **zap_thread_,
- void **server_,
- void **server_mon_,
- char *my_endpoint_,
- zmq_thread_fn zap_handler_,
- socket_config_fn socket_config_,
- void *socket_config_data_,
- const char *routing_id_)
- {
- // Spawn ZAP handler
- zap_requests_handled = zmq_atomic_counter_new ();
- TEST_ASSERT_NOT_NULL (zap_requests_handled);
- *zap_control_ = test_context_socket (ZMQ_REP);
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_bind (*zap_control_, "inproc://handler-control"));
- int linger = 0;
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (*zap_control_, ZMQ_LINGER, &linger, sizeof (linger)));
- if (zap_handler_ != NULL) {
- *zap_thread_ = zmq_threadstart (zap_handler_, NULL);
- recv_string_expect_success (*zap_control_, "GO", 0);
- } else
- *zap_thread_ = NULL;
- // Server socket will accept connections
- *server_ = test_context_socket (ZMQ_DEALER);
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (*server_, ZMQ_LINGER, &linger, sizeof (linger)));
- // As per API by default there's no limit to the size of a message,
- // but the sanitizer allocator will barf over a gig or so
- int64_t max_msg_size = 64 * 1024 * 1024;
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
- *server_, ZMQ_MAXMSGSIZE, &max_msg_size, sizeof (int64_t)));
- socket_config_ (*server_, socket_config_data_);
- TEST_ASSERT_SUCCESS_ERRNO (zmq_setsockopt (
- *server_, ZMQ_ROUTING_ID, routing_id_, strlen (routing_id_)));
- bind_loopback_ipv4 (*server_, my_endpoint_, MAX_SOCKET_STRING);
- const char server_monitor_endpoint[] = "inproc://monitor-server";
- setup_handshake_socket_monitor (*server_, server_mon_,
- server_monitor_endpoint);
- }
- void shutdown_context_and_server_side (void *zap_thread_,
- void *server_,
- void *server_mon_,
- void *zap_control_,
- bool zap_handler_stopped_)
- {
- if (zap_thread_ && !zap_handler_stopped_) {
- send_string_expect_success (zap_control_, "STOP", 0);
- recv_string_expect_success (zap_control_, "STOPPED", 0);
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_unbind (zap_control_, "inproc://handler-control"));
- }
- test_context_socket_close (zap_control_);
- zmq_socket_monitor (server_, NULL, 0);
- test_context_socket_close (server_mon_);
- test_context_socket_close (server_);
- // Wait until ZAP handler terminates
- if (zap_thread_)
- zmq_threadclose (zap_thread_);
- zmq_atomic_counter_destroy (&zap_requests_handled);
- }
- void *create_and_connect_client (char *my_endpoint_,
- socket_config_fn socket_config_,
- void *socket_config_data_,
- void **client_mon_)
- {
- void *client = test_context_socket (ZMQ_DEALER);
- // As per API by default there's no limit to the size of a message,
- // but the sanitizer allocator will barf over a gig or so
- int64_t max_msg_size = 64 * 1024 * 1024;
- TEST_ASSERT_SUCCESS_ERRNO (
- zmq_setsockopt (client, ZMQ_MAXMSGSIZE, &max_msg_size, sizeof (int64_t)));
- socket_config_ (client, socket_config_data_);
- TEST_ASSERT_SUCCESS_ERRNO (zmq_connect (client, my_endpoint_));
- if (client_mon_) {
- setup_handshake_socket_monitor (client, client_mon_,
- "inproc://client-monitor");
- }
- return client;
- }
- void expect_new_client_bounce_fail (char *my_endpoint_,
- void *server_,
- socket_config_fn socket_config_,
- void *socket_config_data_,
- void **client_mon_,
- int expected_client_event_,
- int expected_client_value_)
- {
- void *my_client_mon = NULL;
- TEST_ASSERT_TRUE (client_mon_ == NULL || expected_client_event_ == 0);
- if (expected_client_event_ != 0)
- client_mon_ = &my_client_mon;
- void *client = create_and_connect_client (my_endpoint_, socket_config_,
- socket_config_data_, client_mon_);
- expect_bounce_fail (server_, client);
- if (expected_client_event_ != 0) {
- int events_received = 0;
- events_received = expect_monitor_event_multiple (
- my_client_mon, expected_client_event_, expected_client_value_, false);
- TEST_ASSERT_EQUAL_INT (1, events_received);
- test_context_socket_close (my_client_mon);
- }
- test_context_socket_close_zero_linger (client);
- }
|