jdk-24/test/jdk/com/sun/net/httpserver/simpleserver/HttpsServerAlertTest.java
Daniel Jeliński 42f5b9e7aa 8315436: HttpsServer does not send TLS alerts
Reviewed-by: dfuchs, michaelm
2023-09-01 10:19:53 +00:00

111 lines
3.9 KiB
Java

/*
* Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/*
* @test
* @bug 8315436
* @summary Test if HttpsServer sends the TLS alerts produced
* @library /test/lib
* @build jdk.test.lib.net.SimpleSSLContext
* @run testng/othervm HttpsServerAlertTest
*/
import com.sun.net.httpserver.HttpsConfigurator;
import com.sun.net.httpserver.HttpsParameters;
import com.sun.net.httpserver.HttpsServer;
import jdk.test.lib.net.SimpleSSLContext;
import org.testng.annotations.BeforeTest;
import org.testng.annotations.Test;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLHandshakeException;
import javax.net.ssl.SSLParameters;
import javax.net.ssl.SSLSocket;
import javax.net.ssl.SSLSocketFactory;
import java.io.EOFException;
import java.io.IOException;
import java.net.InetAddress;
import java.net.InetSocketAddress;
import java.util.logging.ConsoleHandler;
import java.util.logging.Level;
import java.util.logging.Logger;
import static org.testng.Assert.fail;
public class HttpsServerAlertTest {
static final InetSocketAddress LOOPBACK_ADDR = new InetSocketAddress(InetAddress.getLoopbackAddress(), 0);
static final boolean ENABLE_LOGGING = true;
static final Logger LOGGER = Logger.getLogger("com.sun.net.httpserver");
SSLContext sslContext;
@BeforeTest
public void setup() throws IOException {
if (ENABLE_LOGGING) {
ConsoleHandler ch = new ConsoleHandler();
LOGGER.setLevel(Level.ALL);
ch.setLevel(Level.ALL);
LOGGER.addHandler(ch);
}
sslContext = new SimpleSSLContext().get();
SSLContext.setDefault(sslContext);
}
@Test
public void testProtocolMismatch() throws Exception {
SSLSocketFactory sf = sslContext.getSocketFactory();
var server = HttpsServer.create(LOOPBACK_ADDR, 0);
server.setHttpsConfigurator(new Configurator(sslContext));
server.start();
try (SSLSocket s = (SSLSocket) sf.createSocket()) {
// server only accepts TLS 1.3
s.setEnabledProtocols(new String[]{"TLSv1.2"});
s.connect(server.getAddress());
s.startHandshake();
fail("Expected a handshake failure");
} catch (SSLHandshakeException e) {
System.out.println("Got exception: " + e);
if (e.getCause() instanceof EOFException ||
!e.getMessage().contains("protocol_version"))
throw e;
} finally {
server.stop(0);
}
}
private static class Configurator extends HttpsConfigurator {
public Configurator(SSLContext sslContext) {
super(sslContext);
}
@Override
public void configure(HttpsParameters params) {
SSLParameters sslParams = getSSLContext().getDefaultSSLParameters();
sslParams.setProtocols(new String[]{"TLSv1.3"});
params.setSSLParameters(sslParams);
}
}
}