Mercurial > hg > nginx-tests
view quic_retry.t @ 1920:79ca9ab75310
Tests: fixed h2_http2.t when nginx compiled without ALPN support.
ALPN support is only available with OpenSSL 1.0.2 or newer.
author | Maxim Dounin <mdounin@mdounin.ru> |
---|---|
date | Wed, 12 Jul 2023 02:40:15 +0300 |
parents | 161dc73812b3 |
children | 24482e311749 |
line wrap: on
line source
#!/usr/bin/perl # (C) Sergey Kandaurov # (C) Nginx, Inc. # Tests for QUIC address validation. ############################################################################### use warnings; use strict; use Test::More; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; use Test::Nginx::HTTP3; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; my $t = Test::Nginx->new()->has(qw/http http_v3 cryptx/) ->has_daemon('openssl')->plan(7) ->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } http { %%TEST_GLOBALS_HTTP%% ssl_certificate_key localhost.key; ssl_certificate localhost.crt; quic_retry on; server { listen 127.0.0.1:%%PORT_8980_UDP%% quic; server_name localhost; location / { } } } EOF $t->write_file('openssl.conf', <<EOF); [ req ] default_bits = 2048 encrypt_key = no distinguished_name = req_distinguished_name [ req_distinguished_name ] EOF my $d = $t->testdir(); foreach my $name ('localhost') { system('openssl req -x509 -new ' . "-config $d/openssl.conf -subj /CN=$name/ " . "-out $d/$name.crt -keyout $d/$name.key " . ">>$d/openssl.out 2>&1") == 0 or die "Can't create certificate for $name: $!\n"; } $t->run(); ############################################################################### my ($s, $sid, $frames, $frame); $s = Test::Nginx::HTTP3->new(8980); $sid = $s->new_stream(); $frames = $s->read(all => [{ sid => $sid, fin => 1 }, { type => 'NEW_TOKEN' }]); ($frame) = grep { $_->{type} eq "HEADERS" } @$frames; is($frame->{headers}->{':status'}, 403, 'retry success'); is(unpack("H*", $s->retry_tag()), unpack("H*", $s->retry_verify_tag()), 'retry integrity tag'); ($frame) = grep { $_->{type} eq "NEW_TOKEN" } @$frames; ok(my $new_token = $frame->{token}, 'new token received'); ok(my $retry_token = $s->retry_token(), 'retry token received'); # connection with new token $s = Test::Nginx::HTTP3->new(8980, token => $new_token); $sid = $s->new_stream(); $frames = $s->read(all => [{ sid => $sid, fin => 1 }]); ($frame) = grep { $_->{type} eq "HEADERS" } @$frames; is($frame->{headers}->{':status'}, 403, 'new token success'); # connection with retry token, port won't match $s = Test::Nginx::HTTP3->new(8980, token => $retry_token, probe => 1); $frames = $s->read(all => [{ type => 'CONNECTION_CLOSE' }]); ($frame) = grep { $_->{type} eq "CONNECTION_CLOSE" } @$frames; is($frame->{error}, 11, 'retry token invalid'); # connection with retry token, corrupted TODO: { local $TODO = 'not yet' unless $t->has_version('1.25.2'); substr($retry_token, 32) ^= "\xff"; $s = Test::Nginx::HTTP3->new(8980, token => $retry_token, probe => 1); $frames = $s->read(all => [{ type => 'CONNECTION_CLOSE' }]); ($frame) = grep { $_->{type} eq "CONNECTION_CLOSE" } @$frames; is($frame->{error}, 11, 'retry token decrypt error'); } ###############################################################################