http2interop.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420
  1. // Copyright 2019 The gRPC Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package http2interop
  15. import (
  16. "crypto/tls"
  17. "crypto/x509"
  18. "fmt"
  19. "io"
  20. "net"
  21. "testing"
  22. "time"
  23. )
  24. const (
  25. Preface = "PRI * HTTP/2.0\r\n\r\nSM\r\n\r\n"
  26. )
  27. var (
  28. defaultTimeout = 1 * time.Second
  29. )
  30. type HTTP2InteropCtx struct {
  31. // Inputs
  32. ServerHost string
  33. ServerPort int
  34. UseTLS bool
  35. UseTestCa bool
  36. ServerHostnameOverride string
  37. T *testing.T
  38. // Derived
  39. serverSpec string
  40. authority string
  41. rootCAs *x509.CertPool
  42. }
  43. func parseFrame(r io.Reader) (Frame, error) {
  44. fh := FrameHeader{}
  45. if err := fh.Parse(r); err != nil {
  46. return nil, err
  47. }
  48. var f Frame
  49. switch fh.Type {
  50. case PingFrameType:
  51. f = &PingFrame{
  52. Header: fh,
  53. }
  54. case SettingsFrameType:
  55. f = &SettingsFrame{
  56. Header: fh,
  57. }
  58. case HTTP1FrameType:
  59. f = &HTTP1Frame{
  60. Header: fh,
  61. }
  62. default:
  63. f = &UnknownFrame{
  64. Header: fh,
  65. }
  66. }
  67. if err := f.ParsePayload(r); err != nil {
  68. return nil, err
  69. }
  70. return f, nil
  71. }
  72. func streamFrame(w io.Writer, f Frame) error {
  73. raw, err := f.MarshalBinary()
  74. if err != nil {
  75. return err
  76. }
  77. if _, err := w.Write(raw); err != nil {
  78. return err
  79. }
  80. return nil
  81. }
  82. func testClientShortSettings(ctx *HTTP2InteropCtx, length int) error {
  83. conn, err := connect(ctx)
  84. if err != nil {
  85. return err
  86. }
  87. defer conn.Close()
  88. conn.SetDeadline(time.Now().Add(defaultTimeout))
  89. if _, err := conn.Write([]byte(Preface)); err != nil {
  90. return err
  91. }
  92. // Bad, settings, non multiple of 6
  93. sf := &UnknownFrame{
  94. Header: FrameHeader{
  95. Type: SettingsFrameType,
  96. },
  97. Data: make([]byte, length),
  98. }
  99. if err := streamFrame(conn, sf); err != nil {
  100. ctx.T.Log("Unable to stream frame", sf)
  101. return err
  102. }
  103. if _, err := expectGoAwaySoon(conn); err != nil {
  104. return err
  105. }
  106. return nil
  107. }
  108. func testClientPrefaceWithStreamId(ctx *HTTP2InteropCtx) error {
  109. conn, err := connect(ctx)
  110. if err != nil {
  111. return err
  112. }
  113. defer conn.Close()
  114. conn.SetDeadline(time.Now().Add(defaultTimeout))
  115. // Good so far
  116. if _, err := conn.Write([]byte(Preface)); err != nil {
  117. return err
  118. }
  119. // Bad, settings do not have ids
  120. sf := &SettingsFrame{
  121. Header: FrameHeader{
  122. StreamID: 1,
  123. },
  124. }
  125. if err := streamFrame(conn, sf); err != nil {
  126. return err
  127. }
  128. if _, err := expectGoAwaySoon(conn); err != nil {
  129. return err
  130. }
  131. return nil
  132. }
  133. func testUnknownFrameType(ctx *HTTP2InteropCtx) error {
  134. conn, err := connect(ctx)
  135. if err != nil {
  136. return err
  137. }
  138. defer conn.Close()
  139. conn.SetDeadline(time.Now().Add(defaultTimeout))
  140. if err := http2Connect(conn, nil); err != nil {
  141. return err
  142. }
  143. // Write a bunch of invalid frame types.
  144. // Frame number 11 is the upcoming ALTSVC frame, and should not be tested.
  145. for ft := ContinuationFrameType + 2; ft != 0; ft++ {
  146. fh := &UnknownFrame{
  147. Header: FrameHeader{
  148. Type: ft,
  149. },
  150. }
  151. if err := streamFrame(conn, fh); err != nil {
  152. ctx.T.Log("Unable to stream frame", fh)
  153. return err
  154. }
  155. }
  156. pf := &PingFrame{
  157. Data: []byte("01234567"),
  158. }
  159. if err := streamFrame(conn, pf); err != nil {
  160. ctx.T.Log("Unable to stream frame", pf)
  161. return err
  162. }
  163. for {
  164. frame, err := parseFrame(conn)
  165. if err != nil {
  166. ctx.T.Log("Unable to parse frame", err)
  167. return err
  168. }
  169. if npf, ok := frame.(*PingFrame); !ok {
  170. ctx.T.Log("Got frame", frame.GetHeader().Type)
  171. continue
  172. } else {
  173. if string(npf.Data) != string(pf.Data) || npf.Header.Flags&PING_ACK == 0 {
  174. return fmt.Errorf("Bad ping %+v", *npf)
  175. }
  176. return nil
  177. }
  178. }
  179. return nil
  180. }
  181. func testShortPreface(ctx *HTTP2InteropCtx, prefacePrefix string) error {
  182. conn, err := connect(ctx)
  183. if err != nil {
  184. return err
  185. }
  186. defer conn.Close()
  187. conn.SetDeadline(time.Now().Add(defaultTimeout))
  188. if _, err := conn.Write([]byte(prefacePrefix)); err != nil {
  189. return err
  190. }
  191. if _, err := expectGoAwaySoon(conn); err != nil {
  192. return err
  193. }
  194. return nil
  195. }
  196. func testTLSMaxVersion(ctx *HTTP2InteropCtx, version uint16) error {
  197. config := buildTlsConfig(ctx)
  198. config.MaxVersion = version
  199. conn, err := connectWithTls(ctx, config)
  200. if err != nil {
  201. return err
  202. }
  203. defer conn.Close()
  204. conn.SetDeadline(time.Now().Add(defaultTimeout))
  205. if err := http2Connect(conn, nil); err != nil {
  206. return err
  207. }
  208. gf, err := expectGoAway(conn)
  209. if err != nil {
  210. return err
  211. }
  212. // TODO: make an enum out of this
  213. if gf.Code != 0xC {
  214. return fmt.Errorf("Expected an Inadequate security code: %v", gf)
  215. }
  216. return nil
  217. }
  218. func testTLSApplicationProtocol(ctx *HTTP2InteropCtx) error {
  219. config := buildTlsConfig(ctx)
  220. config.NextProtos = []string{"h2c"}
  221. conn, err := connectWithTls(ctx, config)
  222. if err != nil {
  223. return err
  224. }
  225. defer conn.Close()
  226. conn.SetDeadline(time.Now().Add(defaultTimeout))
  227. if err := http2Connect(conn, nil); err != nil {
  228. return err
  229. }
  230. gf, err := expectGoAway(conn)
  231. if err != nil {
  232. return err
  233. }
  234. // TODO: make an enum out of this
  235. if gf.Code != 0xC {
  236. return fmt.Errorf("Expected an Inadequate security code: %v", gf)
  237. }
  238. return nil
  239. }
  240. func testTLSBadCipherSuites(ctx *HTTP2InteropCtx) error {
  241. config := buildTlsConfig(ctx)
  242. // These are the suites that Go supports, but are forbidden by http2.
  243. config.CipherSuites = []uint16{
  244. tls.TLS_RSA_WITH_RC4_128_SHA,
  245. tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
  246. tls.TLS_RSA_WITH_AES_128_CBC_SHA,
  247. tls.TLS_RSA_WITH_AES_256_CBC_SHA,
  248. tls.TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
  249. tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
  250. tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
  251. tls.TLS_ECDHE_RSA_WITH_RC4_128_SHA,
  252. tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
  253. tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
  254. tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
  255. }
  256. conn, err := connectWithTls(ctx, config)
  257. if err != nil {
  258. return err
  259. }
  260. defer conn.Close()
  261. conn.SetDeadline(time.Now().Add(defaultTimeout))
  262. if err := http2Connect(conn, nil); err != nil {
  263. return err
  264. }
  265. gf, err := expectGoAway(conn)
  266. if err != nil {
  267. return err
  268. }
  269. // TODO: make an enum out of this
  270. if gf.Code != 0xC {
  271. return fmt.Errorf("Expected an Inadequate security code: %v", gf)
  272. }
  273. return nil
  274. }
  275. func expectGoAway(conn net.Conn) (*GoAwayFrame, error) {
  276. f, err := parseFrame(conn)
  277. if err != nil {
  278. return nil, err
  279. }
  280. if gf, ok := f.(*GoAwayFrame); !ok {
  281. return nil, fmt.Errorf("Expected GoAway Frame %+v", f)
  282. } else {
  283. return gf, nil
  284. }
  285. }
  286. // expectGoAwaySoon checks that a GOAWAY frame eventually comes. Servers usually send
  287. // the initial settings frames before any data has actually arrived. This function
  288. // checks that a go away shows.
  289. func expectGoAwaySoon(conn net.Conn) (*GoAwayFrame, error) {
  290. for {
  291. f, err := parseFrame(conn)
  292. if err != nil {
  293. return nil, err
  294. }
  295. if gf, ok := f.(*GoAwayFrame); !ok {
  296. continue
  297. } else {
  298. return gf, nil
  299. }
  300. }
  301. }
  302. func http2Connect(c net.Conn, sf *SettingsFrame) error {
  303. if _, err := c.Write([]byte(Preface)); err != nil {
  304. return err
  305. }
  306. if sf == nil {
  307. sf = &SettingsFrame{}
  308. }
  309. if err := streamFrame(c, sf); err != nil {
  310. return err
  311. }
  312. return nil
  313. }
  314. // CapConn captures connection traffic if Log is non-nil
  315. type CapConn struct {
  316. net.Conn
  317. Log func(args ...interface{})
  318. }
  319. func (c *CapConn) Write(data []byte) (int, error) {
  320. if c.Log != nil {
  321. c.Log(" SEND: ", data)
  322. }
  323. return c.Conn.Write(data)
  324. }
  325. func (c *CapConn) Read(data []byte) (int, error) {
  326. n, err := c.Conn.Read(data)
  327. if c.Log != nil {
  328. c.Log(" RECV: ", data[:n], err)
  329. }
  330. return n, err
  331. }
  332. func connect(ctx *HTTP2InteropCtx) (*CapConn, error) {
  333. var conn *CapConn
  334. var err error
  335. if !ctx.UseTLS {
  336. conn, err = connectWithoutTls(ctx)
  337. } else {
  338. config := buildTlsConfig(ctx)
  339. conn, err = connectWithTls(ctx, config)
  340. }
  341. if err != nil {
  342. return nil, err
  343. }
  344. conn.SetDeadline(time.Now().Add(defaultTimeout))
  345. return conn, nil
  346. }
  347. func buildTlsConfig(ctx *HTTP2InteropCtx) *tls.Config {
  348. return &tls.Config{
  349. RootCAs: ctx.rootCAs,
  350. NextProtos: []string{"h2"},
  351. ServerName: ctx.authority,
  352. MinVersion: tls.VersionTLS12,
  353. }
  354. }
  355. func connectWithoutTls(ctx *HTTP2InteropCtx) (*CapConn, error) {
  356. conn, err := net.DialTimeout("tcp", ctx.serverSpec, defaultTimeout)
  357. if err != nil {
  358. return nil, err
  359. }
  360. return &CapConn{Conn: conn}, nil
  361. }
  362. func connectWithTls(ctx *HTTP2InteropCtx, config *tls.Config) (*CapConn, error) {
  363. conn, err := connectWithoutTls(ctx)
  364. if err != nil {
  365. return nil, err
  366. }
  367. return &CapConn{Conn: tls.Client(conn, config)}, nil
  368. }