338dae4d36
Reviewed-by: dfuchs
214 lines
7.5 KiB
Java
214 lines
7.5 KiB
Java
/*
|
|
* Copyright (c) 2002, 2021, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
/**
|
|
* @test
|
|
* @bug 4678055
|
|
* @library /test/lib
|
|
* @run main/othervm B4678055
|
|
* @run main/othervm -Djava.net.preferIPv6Addresses=true B4678055
|
|
* @summary Basic Authentication fails with multiple realms
|
|
*/
|
|
|
|
import java.io.IOException;
|
|
import java.io.InputStream;
|
|
import java.io.PrintWriter;
|
|
import java.net.Authenticator;
|
|
import java.net.InetAddress;
|
|
import java.net.InetSocketAddress;
|
|
import java.net.PasswordAuthentication;
|
|
import java.net.ProxySelector;
|
|
import java.net.URL;
|
|
import java.net.URLConnection;
|
|
import java.util.concurrent.Executors;
|
|
|
|
import com.sun.net.httpserver.HttpExchange;
|
|
import com.sun.net.httpserver.HttpHandler;
|
|
import com.sun.net.httpserver.HttpServer;
|
|
import jdk.test.lib.net.URIBuilder;
|
|
|
|
public class B4678055 implements HttpHandler {
|
|
|
|
static volatile int count = 0;
|
|
static volatile String authstring;
|
|
|
|
private void errorReply(HttpExchange req, String reply) throws IOException {
|
|
req.getResponseHeaders().set("Connection", "close");
|
|
req.getResponseHeaders().set("WWW-Authenticate", reply);
|
|
req.sendResponseHeaders(401, -1);
|
|
}
|
|
|
|
private void okReply (HttpExchange req) throws IOException {
|
|
req.sendResponseHeaders(200, 0);
|
|
try(PrintWriter pw = new PrintWriter(req.getResponseBody())) {
|
|
pw.print("Hello .");
|
|
}
|
|
}
|
|
|
|
public void handle (HttpExchange req) {
|
|
try {
|
|
System.out.println("Server handling case: "+ count);
|
|
if(req.getRequestHeaders().get("Authorization") != null) {
|
|
authstring = req.getRequestHeaders().get("Authorization").get(0);
|
|
System.out.println(authstring);
|
|
}
|
|
switch (count) {
|
|
case 0:
|
|
errorReply (req, "Basic realm=\"wallyworld\"");
|
|
break;
|
|
case 1:
|
|
/* client stores a username/pw for wallyworld
|
|
*/
|
|
okReply (req);
|
|
break;
|
|
case 2:
|
|
/* emulates a server that has configured a second
|
|
* realm, but by misconfiguration uses the same
|
|
* realm string as the previous one.
|
|
*
|
|
* An alternative (more likely) scenario that shows this behavior is
|
|
* the case where the password in the original realm has changed
|
|
*/
|
|
errorReply (req, "Basic realm=\"wallyworld\"");
|
|
break;
|
|
case 3:
|
|
/* The client replies with the username/password
|
|
* from the first realm, which is wrong (unexpectedly)
|
|
*/
|
|
errorReply (req, "Basic realm=\"wallyworld\"");
|
|
break;
|
|
case 4:
|
|
/* The client re-prompts for a password and
|
|
* we now reply with an OK. The client with the bug
|
|
* will throw NPE at this point.
|
|
*/
|
|
case 5:
|
|
/* Repeat the OK, to make sure the same new auth string is sent */
|
|
okReply (req);
|
|
break;
|
|
}
|
|
count ++;
|
|
} catch (IOException e) {
|
|
System.err.println("Unexpected exception for case " + count + ": " + e);
|
|
e.printStackTrace();
|
|
}
|
|
}
|
|
|
|
static void read (InputStream is) throws IOException {
|
|
int c;
|
|
System.out.println ("reading");
|
|
while ((c=is.read()) != -1) {
|
|
System.out.write (c);
|
|
}
|
|
System.out.println ("");
|
|
System.out.println ("finished reading");
|
|
}
|
|
|
|
static boolean checkFinalAuth () {
|
|
return authstring.equals ("Basic dXNlcjpwYXNzMg==");
|
|
}
|
|
|
|
static void client (String u) throws Exception {
|
|
URL url = new URL (u);
|
|
System.out.println ("client opening connection to: " + u);
|
|
URLConnection urlc = url.openConnection ();
|
|
InputStream is = urlc.getInputStream ();
|
|
read (is);
|
|
is.close();
|
|
}
|
|
|
|
static HttpServer server;
|
|
|
|
public static void main (String[] args) throws Exception {
|
|
B4678055 b4678055 = new B4678055();
|
|
MyAuthenticator auth = new MyAuthenticator ();
|
|
Authenticator.setDefault (auth);
|
|
ProxySelector.setDefault(ProxySelector.of(null)); // no proxy
|
|
try {
|
|
InetAddress loopback = InetAddress.getLoopbackAddress();
|
|
server = HttpServer.create(new InetSocketAddress(loopback, 0), 10);
|
|
server.createContext("/", b4678055);
|
|
server.setExecutor(Executors.newSingleThreadExecutor());
|
|
server.start();
|
|
String serverURL = URIBuilder.newBuilder()
|
|
.scheme("http")
|
|
.loopback()
|
|
.port(server.getAddress().getPort())
|
|
.path("/")
|
|
.build()
|
|
.toString();
|
|
System.out.println("Server: listening at: " + serverURL);
|
|
client(serverURL + "d1/foo.html");
|
|
client(serverURL + "d2/foo.html");
|
|
client(serverURL + "d2/foo.html");
|
|
} catch (Exception e) {
|
|
System.out.println("Client got exception: " + e);
|
|
System.out.println("Terminating server");
|
|
if (server != null) {
|
|
server.stop(1);
|
|
}
|
|
throw e;
|
|
}
|
|
int f = auth.getCount();
|
|
if (f != 2) {
|
|
except ("Authenticator was called "+f+" times. Should be 2");
|
|
}
|
|
/* this checks the authorization string corresponding to second password "pass2"*/
|
|
if (!checkFinalAuth()) {
|
|
except ("Wrong authorization string received from client");
|
|
}
|
|
System.out.println("Terminating server");
|
|
server.stop(1);
|
|
}
|
|
|
|
public static void except (String s) {
|
|
System.out.println("Check failed: " + s);
|
|
System.out.println("Terminating server");
|
|
server.stop(1);
|
|
throw new RuntimeException (s);
|
|
}
|
|
|
|
static class MyAuthenticator extends Authenticator {
|
|
MyAuthenticator () {
|
|
super ();
|
|
}
|
|
|
|
volatile int count = 0;
|
|
|
|
public PasswordAuthentication getPasswordAuthentication () {
|
|
PasswordAuthentication pw;
|
|
if (count == 0) {
|
|
pw = new PasswordAuthentication ("user", "pass1".toCharArray());
|
|
} else {
|
|
pw = new PasswordAuthentication ("user", "pass2".toCharArray());
|
|
}
|
|
count ++;
|
|
return pw;
|
|
}
|
|
|
|
public int getCount () {
|
|
return (count);
|
|
}
|
|
}
|
|
}
|