/*
 * Copyright (c) 2024, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

import java.io.FileInputStream;
import java.io.IOException;
import java.net.InetAddress;
import java.net.InetSocketAddress;
import java.net.SocketException;
import java.net.URI;
import java.net.http.HttpClient;
import java.net.http.HttpRequest;
import java.net.http.HttpResponse;
import java.net.http.HttpResponse.BodyHandlers;
import java.security.AccessController;
import java.security.KeyStore;
import java.security.PrivilegedExceptionAction;
import java.util.concurrent.Executor;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
import java.util.concurrent.ThreadFactory;
import java.util.concurrent.atomic.AtomicInteger;

import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLHandshakeException;
import javax.net.ssl.SSLParameters;
import javax.net.ssl.TrustManagerFactory;

import com.sun.net.httpserver.HttpExchange;
import com.sun.net.httpserver.HttpHandler;
import com.sun.net.httpserver.HttpsConfigurator;
import com.sun.net.httpserver.HttpsParameters;
import com.sun.net.httpserver.HttpsServer;
import jdk.test.lib.net.SimpleSSLContext;
import jdk.test.lib.net.URIBuilder;
import org.junit.jupiter.api.Test;
import org.junit.jupiter.params.ParameterizedTest;
import org.junit.jupiter.params.provider.ValueSource;
import static java.net.http.HttpClient.Builder.NO_PROXY;
import static java.net.http.HttpClient.Version.HTTP_1_1;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.junit.jupiter.api.Assertions.assertFalse;
import static org.junit.jupiter.api.Assertions.assertNotNull;
import static org.junit.jupiter.api.Assertions.assertTrue;
import static org.junit.jupiter.api.Assertions.fail;

/*
 * @test
 * @bug 8326381
 * @summary verifies that the setNeedClientAuth() and setWantClientAuth()
 *          methods on HttpsParameters class work as expected
 * @library /test/lib
 * @build jdk.test.lib.net.SimpleSSLContext jdk.test.lib.net.URIBuilder
 * @run junit HttpsParametersClientAuthTest
 */
public class HttpsParametersClientAuthTest {

    private static final AtomicInteger TID = new AtomicInteger();
    private static final ThreadFactory SRV_THREAD_FACTORY = (r) -> {
        final Thread t = new Thread(r);
        t.setDaemon(true);
        t.setName("server-thread-" + TID.incrementAndGet());
        return t;
    };

    /**
     * verifies default values of {@link HttpsParameters#setNeedClientAuth(boolean)}
     * and {@link HttpsParameters#setWantClientAuth(boolean)} methods
     */
    @Test
    public void testDefaultClientAuth() throws Exception {
        // test default values
        HttpsParameters defaultParams = new Params();
        assertFalse(defaultParams.getNeedClientAuth(),
                "needClientAuth was expected to be false but wasn't");
        assertFalse(defaultParams.getWantClientAuth(),
                "wantClientAuth was expected to be false but wasn't");
    }

    /**
     * sets {@link HttpsParameters#setNeedClientAuth(boolean)} and verifies
     * that subsequent calls to {@link HttpsParameters#getNeedClientAuth()} returns
     * the set value and {@link HttpsParameters#getWantClientAuth()} returns false
     */
    @ParameterizedTest
    @ValueSource(booleans = {true, false})
    public void testNeedClientAuth(final boolean initialWantClientAuth) throws Exception {
        HttpsParameters needClientAuthParams = new Params();
        // first set wantClientAuth to an initial value to verify that it later gets reset
        needClientAuthParams.setWantClientAuth(initialWantClientAuth);
        // needClientAuth = true and thus wantClientAuth = false
        needClientAuthParams.setNeedClientAuth(true);
        assertTrue(needClientAuthParams.getNeedClientAuth(),
                "needClientAuth was expected to be true but wasn't");
        assertFalse(needClientAuthParams.getWantClientAuth(),
                "wantClientAuth was expected to be false but wasn't");
        // now set needClientAuth = false and verify that both needClientAuth and wantClientAuth
        // are now false
        needClientAuthParams.setNeedClientAuth(false);
        assertFalse(needClientAuthParams.getNeedClientAuth(),
                "needClientAuth was expected to be false but wasn't");
        assertFalse(needClientAuthParams.getWantClientAuth(),
                "wantClientAuth was expected to be false but wasn't");
    }

    /**
     * sets {@link HttpsParameters#setWantClientAuth(boolean)} and verifies
     * that subsequent calls to {@link HttpsParameters#getWantClientAuth()} returns
     * the set value and {@link HttpsParameters#getNeedClientAuth()} returns false
     */
    @ParameterizedTest
    @ValueSource(booleans = {true, false})
    public void testWantClientAuth(final boolean initialNeedClientAuth) throws Exception {
        HttpsParameters wantClientAuthParams = new Params();
        // first set needClientAuth to an initial value to verify that it later gets reset
        wantClientAuthParams.setNeedClientAuth(initialNeedClientAuth);
        // wantClientAuth = true and thus needClientAuth = false
        wantClientAuthParams.setWantClientAuth(true);
        assertTrue(wantClientAuthParams.getWantClientAuth(),
                "wantClientAuth was expected to be true but wasn't");
        assertFalse(wantClientAuthParams.getNeedClientAuth(),
                "needClientAuth was expected to be false but wasn't");
        // now set wantClientAuth = false and verify that both wantClientAuth and needClientAuth
        // are now false
        wantClientAuthParams.setWantClientAuth(false);
        assertFalse(wantClientAuthParams.getWantClientAuth(),
                "wantClientAuth was expected to be false but wasn't");
        assertFalse(wantClientAuthParams.getNeedClientAuth(),
                "needClientAuth was expected to be false but wasn't");
    }

    /**
     * Starts a {@link HttpsServer} by
     * {@linkplain HttpsParameters#setNeedClientAuth(boolean) setting needClientAuth} as
     * {@code true}. The client is then configured either to present the client certificates
     * during the TLS handshake or configured not to present them. In the case where the
     * client presents the client certificates, the HTTP request issued by the client is
     * expected to pass. In the other case where the client doesn't present the certificates,
     * the test verifies that the HTTP request fails due to a connection error
     * (caused by TLS handshake failure)
     *
     * @param presentClientCerts true if the client should present certificates
     *                           during TLS handshake, false otherwise
     */
    @ParameterizedTest
    @ValueSource(booleans = {true, false})
    public void testServerNeedClientAuth(final boolean presentClientCerts) throws Exception {
        // SSLContext which contains both the key and the trust material and will be used
        // by the server
        final SSLContext serverSSLCtx = new SimpleSSLContext().get();
        assertNotNull(serverSSLCtx, "could not create SSLContext");
        final HttpsConfigurator configurator = new HttpsConfigurator(serverSSLCtx) {
            @Override
            public void configure(final HttpsParameters params) {
                // we intentionally don't call params.setSSLParameters()
                // and instead call params.setNeedClientAuth()
                params.setNeedClientAuth(true); // "require" the client to present certs
            }
        };
        try (final ExecutorService executor = Executors.newCachedThreadPool(SRV_THREAD_FACTORY)) {
            final HttpsServer server = createHttpsServer(executor, configurator);
            server.start();
            System.out.println("started server at " + server.getAddress());
            try {
                final HttpClient.Builder builder = createClientBuilder();
                // if the client is expected to present client certificates, then
                // we construct a SSLContext which has both key and trust material.
                // otherwise we construct a SSLContext that only has trust material
                // and thus won't present certificates during TLS handshake
                final SSLContext clientSSLCtx = presentClientCerts
                        ? serverSSLCtx : onlyTrustStoreContext();
                // construct the client using the SSLContext
                try (final HttpClient client = builder.sslContext(clientSSLCtx)
                        .build()) {
                    // issue a request
                    final URI reqURI = URIBuilder.newBuilder()
                            .scheme("https")
                            .host(server.getAddress().getAddress())
                            .port(server.getAddress().getPort())
                            .path("/")
                            .build();
                    System.out.println("issuing request to " + reqURI);
                    final HttpResponse<Void> resp;
                    try {
                        resp = client.send(HttpRequest.newBuilder(reqURI).build(),
                                BodyHandlers.discarding());
                        if (!presentClientCerts) {
                            // request was expected to fail since the server was configured to force
                            // the client to present the client cert, but the client didn't
                            // present any
                            fail("request was expected to fail, but didn't");
                        }
                        assertEquals(200, resp.statusCode(), "unexpected response code");
                        // verify the client did present the certs
                        assertTrue(resp.sslSession().isPresent(), "missing SSLSession on response");
                        assertNotNull(resp.sslSession().get().getLocalCertificates(),
                                "client was expected to present certs to the server, but didn't");
                    } catch (IOException ioe) {
                        if (presentClientCerts) {
                            // wasn't expected to fail, just let the exception propagate
                            throw ioe;
                        }
                        // verify it failed due to right reason
                        Throwable cause = ioe;
                        while (cause != null) {
                            // either of SocketException or SSLHandshakeException are OK
                            if (cause instanceof SocketException se) {
                                final String msg = se.getMessage();
                                assertTrue(msg != null && msg.contains("Connection reset"),
                                        "unexpected message in SocketException: " + msg);
                                System.out.println("received the expected exception: " + se);
                                break;
                            } else if (cause instanceof SSLHandshakeException she) {
                                final String msg = she.getMessage();
                                assertTrue(msg != null && msg.contains("certificate_required"),
                                        "unexpected message in SSLHandshakeException: " + msg);
                                System.out.println("received the expected exception: " + she);
                                break;
                            }
                            cause = cause.getCause();
                        }
                        if (cause == null) {
                            // didn't find expected exception, rethrow original exception
                            throw ioe;
                        }
                    }
                }
            } finally {
                System.out.println("Stopping server at " + server.getAddress());
                server.stop(0 /* delay */);
            }
        }
    }

    /**
     * Starts a {@link HttpsServer} by
     * {@linkplain HttpsParameters#setWantClientAuth(boolean) setting wantClientAuth} as
     * {@code true}. The client is then configured to either present the client certificates
     * during the TLS handshake or configured not to present them. In both these cases the
     * HTTP request issued by the client is expected to pass.
     *
     * @param presentClientCerts true if the client should present certificates
     *                           during TLS handshake, false otherwise
     */
    @ParameterizedTest
    @ValueSource(booleans = {true, false})
    public void testServerWantClientAuth(final boolean presentClientCerts) throws Exception {
        // SSLContext which contains both the key and the trust material and will be used
        // by the server
        final SSLContext serverSSLCtx = new SimpleSSLContext().get();
        assertNotNull(serverSSLCtx, "could not create SSLContext");
        final HttpsConfigurator configurator = new HttpsConfigurator(serverSSLCtx) {
            @Override
            public void configure(final HttpsParameters params) {
                // we intentionally don't call params.setSSLParameters()
                // and instead call params.setWantClientAuth()
                params.setWantClientAuth(true); // "request" the client to present certs
            }
        };
        try (final ExecutorService executor = Executors.newCachedThreadPool(SRV_THREAD_FACTORY)) {
            final HttpsServer server = createHttpsServer(executor, configurator);
            server.start();
            System.out.println("started server at " + server.getAddress());
            try {
                final HttpClient.Builder builder = createClientBuilder();
                // if the client is expected to present client certificates, then
                // we construct a SSLContext which has both key and trust material.
                // otherwise we construct a SSLContext that only has trust material
                // and thus won't present certificates during TLS handshake
                final SSLContext clientSSLCtx = presentClientCerts
                        ? serverSSLCtx : onlyTrustStoreContext();
                // construct the client using the SSLContext
                try (final HttpClient client = builder.sslContext(clientSSLCtx)
                        .build()) {
                    // issue a request
                    final URI reqURI = URIBuilder.newBuilder()
                            .scheme("https")
                            .host(server.getAddress().getAddress())
                            .port(server.getAddress().getPort())
                            .path("/")
                            .build();
                    System.out.println("issuing request to " + reqURI);
                    final HttpResponse<Void> resp = client.send(
                            HttpRequest.newBuilder(reqURI).build(), BodyHandlers.discarding());
                    assertEquals(200, resp.statusCode(), "unexpected response code");
                    if (presentClientCerts) {
                        // verify the client did present the certs
                        assertTrue(resp.sslSession().isPresent(), "missing SSLSession on response");
                        assertNotNull(resp.sslSession().get().getLocalCertificates(),
                                "client was expected to present certs to the server, but didn't");
                    }
                }
            } finally {
                System.out.println("Stopping server at " + server.getAddress());
                server.stop(0 /* delay */);
            }
        }
    }

    private static HttpsServer createHttpsServer(final Executor executor,
                                                 final HttpsConfigurator configurator)
            throws IOException {
        final InetAddress loopback = InetAddress.getLoopbackAddress();
        final HttpsServer server = HttpsServer.create(
                new InetSocketAddress(loopback, 0), 0 /* backlog */);
        server.setExecutor(executor);
        server.setHttpsConfigurator(configurator);
        server.createContext("/", new AllOKHandler());
        return server;
    }

    private static HttpClient.Builder createClientBuilder() {
        return HttpClient.newBuilder().version(HTTP_1_1)
                .proxy(NO_PROXY);
    }

    /**
     * Creates and returns a {@link SSLContext} which only has trust material
     * and doesn't have any test specific keys.
     */
    private static SSLContext onlyTrustStoreContext() throws Exception {
        final KeyStore keyStore = loadTestKeyStore();
        final TrustManagerFactory tmf = TrustManagerFactory.getInstance("PKIX");
        tmf.init(keyStore);
        final SSLContext ctx = SSLContext.getInstance("TLS");
        // initialize with only trust managers
        ctx.init(null, tmf.getTrustManagers(), null);
        return ctx;
    }

    private static KeyStore loadTestKeyStore() throws Exception {
        return AccessController.doPrivileged(
                new PrivilegedExceptionAction<KeyStore>() {
                    @Override
                    public KeyStore run() throws Exception {
                        final String testKeys = System.getProperty("test.src")
                                + "/"
                                + "../../../../../../test/lib/jdk/test/lib/net/testkeys";
                        try (final FileInputStream fis = new FileInputStream(testKeys)) {
                            final char[] passphrase = "passphrase".toCharArray();
                            final KeyStore ks = KeyStore.getInstance("PKCS12");
                            ks.load(fis, passphrase);
                            return ks;
                        }
                    }
                });
    }

    // no-op implementations of the abstract methods of HttpsParameters
    private static final class Params extends HttpsParameters {

        @Override
        public HttpsConfigurator getHttpsConfigurator() {
            // no-op
            return null;
        }

        @Override
        public InetSocketAddress getClientAddress() {
            // no-op
            return null;
        }

        @Override
        public void setSSLParameters(SSLParameters params) {
            // no-op
        }
    }

    // A HttpHandler which just returns 200 response code
    private static final class AllOKHandler implements HttpHandler {

        private static final int NO_RESPONSE_BODY = -1;

        @Override
        public void handle(final HttpExchange exchange) throws IOException {
            System.out.println("responding to request: " + exchange.getRequestURI());
            exchange.sendResponseHeaders(200, NO_RESPONSE_BODY);
        }
    }
}