test/jdk/java/net/Authenticator/B4722333.java
changeset 47216 71c04702a3d5
parent 30820 0d4717a011d3
child 54681 edd709e64ea1
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/test/jdk/java/net/Authenticator/B4722333.java	Tue Sep 12 19:03:39 2017 +0200
@@ -0,0 +1,179 @@
+/*
+ * Copyright (c) 2002, 2012, Oracle and/or its affiliates. All rights reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License version 2 only, as
+ * published by the Free Software Foundation.
+ *
+ * This code is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * version 2 for more details (a copy is included in the LICENSE file that
+ * accompanied this code).
+ *
+ * You should have received a copy of the GNU General Public License version
+ * 2 along with this work; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+ * or visit www.oracle.com if you need additional information or have any
+ * questions.
+ */
+
+/**
+ * @test
+ * @bug 4722333
+ * @modules java.base/sun.net.www
+ * @library ../../../sun/net/www/httptest/
+ * @build HttpCallback TestHttpServer ClosedChannelList HttpTransaction
+ * @run main B4722333
+ * @summary JRE Proxy Authentication Not Working with ISA2000
+ */
+
+import java.io.*;
+import java.net.*;
+
+public class B4722333 implements HttpCallback {
+
+    static int count = 0;
+
+    static String [][] expected = {
+       /* scheme  realm/prompt */
+        {"basic", "foo"},
+        {"basic", "foobar"},
+        {"digest", "biz"},
+        {"digest", "bizbar"},
+        {"digest", "foobiz"}
+    };
+
+    public void request (HttpTransaction req) {
+        try {
+            if (count % 2 == 1 ) {
+                req.setResponseEntityBody ("Hello .");
+                req.sendResponse (200, "Ok");
+                req.orderlyClose();
+            } else {
+                switch (count) {
+                  case 0:
+                    req.addResponseHeader ("Connection", "close");
+                    req.addResponseHeader ("WWW-Authenticate", "Basic realm=\"foo\"");
+                    req.addResponseHeader ("WWW-Authenticate", "Foo realm=\"bar\"");
+                    req.sendResponse (401, "Unauthorized");
+                    req.orderlyClose();
+                    break;
+                  case 2:
+                    req.addResponseHeader ("Connection", "close");
+                    req.addResponseHeader ("WWW-Authenticate", "Basic realm=\"foobar\" Foo realm=\"bar\"");
+                    req.sendResponse (401, "Unauthorized");
+                    break;
+                  case 4:
+                    req.addResponseHeader ("Connection", "close");
+                    req.addResponseHeader ("WWW-Authenticate", "Digest realm=biz domain=/foo nonce=thisisanonce ");
+                    req.addResponseHeader ("WWW-Authenticate", "Basic realm=bizbar");
+                    req.sendResponse (401, "Unauthorized");
+                    req.orderlyClose();
+                    break;
+                  case 6:
+                    req.addResponseHeader ("Connection", "close");
+                    req.addResponseHeader ("WWW-Authenticate", "Digest realm=\"bizbar\" domain=/biz nonce=\"hereisanonce\" Basic realm=\"foobar\" Foo realm=\"bar\"");
+                    req.sendResponse (401, "Unauthorized");
+                    req.orderlyClose();
+                    break;
+                  case 8:
+                    req.addResponseHeader ("Connection", "close");
+                    req.addResponseHeader ("WWW-Authenticate", "Foo p1=1 p2=2 p3=3 p4=4 p5=5 p6=6 p7=7 p8=8 p9=10 Digest realm=foobiz domain=/foobiz nonce=newnonce");
+                    req.addResponseHeader ("WWW-Authenticate", "Basic realm=bizbar");
+                    req.sendResponse (401, "Unauthorized");
+                    req.orderlyClose();
+                    break;
+                }
+            }
+            count ++;
+        } catch (IOException e) {
+            e.printStackTrace();
+        }
+    }
+
+    static void read (InputStream is) throws IOException {
+        int c;
+        System.out.println ("reading");
+        while ((c=is.read()) != -1) {
+            System.out.write (c);
+        }
+        System.out.println ("");
+        System.out.println ("finished reading");
+    }
+
+
+    static void client (String u) throws Exception {
+        URL url = new URL (u);
+        System.out.println ("client opening connection to: " + u);
+        URLConnection urlc = url.openConnection ();
+        InputStream is = urlc.getInputStream ();
+        read (is);
+        is.close();
+    }
+
+    static TestHttpServer server;
+
+    public static void main (String[] args) throws Exception {
+        MyAuthenticator auth = new MyAuthenticator ();
+        Authenticator.setDefault (auth);
+        try {
+            server = new TestHttpServer (new B4722333(), 1, 10, 0);
+            System.out.println ("Server started: listening on port: " + server.getLocalPort());
+            client ("http://localhost:"+server.getLocalPort()+"/d1/d2/d3/foo.html");
+            client ("http://localhost:"+server.getLocalPort()+"/ASD/d3/x.html");
+            client ("http://localhost:"+server.getLocalPort()+"/biz/d3/x.html");
+            client ("http://localhost:"+server.getLocalPort()+"/bar/d3/x.html");
+            client ("http://localhost:"+server.getLocalPort()+"/fuzz/d3/x.html");
+        } catch (Exception e) {
+            if (server != null) {
+                server.terminate();
+            }
+            throw e;
+        }
+        int f = auth.getCount();
+        if (f != expected.length) {
+            except ("Authenticator was called "+f+" times. Should be " + expected.length);
+        }
+        server.terminate();
+    }
+
+    public static void except (String s) {
+        server.terminate();
+        throw new RuntimeException (s);
+    }
+
+    static class MyAuthenticator extends Authenticator {
+        MyAuthenticator () {
+            super ();
+        }
+
+        int count = 0;
+
+        public PasswordAuthentication getPasswordAuthentication ()
+            {
+            System.out.println ("Auth called");
+            String scheme = getRequestingScheme();
+            System.out.println ("getRequestingScheme() returns " + scheme);
+            String prompt = getRequestingPrompt();
+            System.out.println ("getRequestingPrompt() returns " + prompt);
+
+            if (!scheme.equals (expected [count][0])) {
+                B4722333.except ("wrong scheme received, " + scheme + " expected " + expected [count][0]);
+            }
+            if (!prompt.equals (expected [count][1])) {
+                B4722333.except ("wrong realm received, " + prompt + " expected " + expected [count][1]);
+            }
+            count ++;
+            return (new PasswordAuthentication ("user", "passwordNotCheckedAnyway".toCharArray()));
+        }
+
+        public int getCount () {
+            return (count);
+        }
+    }
+
+}