test/jdk/java/net/httpclient/InvalidSSLContextTest.java
branchhttp-client-branch
changeset 56044 a8423a38386e
child 56082 1da51fab3032
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/test/jdk/java/net/httpclient/InvalidSSLContextTest.java	Tue Jan 30 13:52:40 2018 +0000
@@ -0,0 +1,182 @@
+/*
+ * Copyright (c) 2018, Oracle and/or its affiliates. All rights reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License version 2 only, as
+ * published by the Free Software Foundation.
+ *
+ * This code is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * version 2 for more details (a copy is included in the LICENSE file that
+ * accompanied this code).
+ *
+ * You should have received a copy of the GNU General Public License version
+ * 2 along with this work; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+ * or visit www.oracle.com if you need additional information or have any
+ * questions.
+ */
+
+/*
+ * @test
+ * @summary Test to ensure the HTTP client throws an appropriate SSL exception
+ *          when SSL context is not valid.
+ * @library /lib/testlibrary
+ * @build jdk.testlibrary.SimpleSSLContext
+ * @run testng/othervm -Djdk.internal.httpclient.debug=true InvalidSSLContextTest
+ */
+
+import java.io.IOException;
+import java.io.UncheckedIOException;
+import java.net.URI;
+import java.util.concurrent.CompletableFuture;
+import java.util.concurrent.CompletionException;
+import javax.net.ssl.SSLContext;
+import javax.net.ssl.SSLException;
+import javax.net.ssl.SSLHandshakeException;
+import javax.net.ssl.SSLServerSocket;
+import javax.net.ssl.SSLSocket;
+import jdk.incubator.http.HttpClient;
+import jdk.incubator.http.HttpClient.Version;
+import jdk.incubator.http.HttpRequest;
+import jdk.incubator.http.HttpResponse;
+import jdk.incubator.http.HttpResponse.BodyHandler;
+import jdk.testlibrary.SimpleSSLContext;
+import org.testng.Assert;
+import org.testng.annotations.AfterTest;
+import org.testng.annotations.BeforeTest;
+import org.testng.annotations.DataProvider;
+import org.testng.annotations.Test;
+import static jdk.incubator.http.HttpClient.Version.HTTP_1_1;
+import static jdk.incubator.http.HttpClient.Version.HTTP_2;
+
+
+public class InvalidSSLContextTest {
+
+    SSLContext sslContext;
+    volatile SSLServerSocket sslServerSocket;
+    volatile String uri;
+
+    @DataProvider(name = "versions")
+    public Object[][] versions() {
+        return new Object[][]{
+                { HTTP_1_1 },
+                { HTTP_2   }
+        };
+    }
+
+    @Test(dataProvider = "versions")
+    public void testSync(Version version) throws Exception {
+        // client-side uses a different context to that of the server-side
+        HttpClient client = HttpClient.newBuilder()
+                .sslContext(SSLContext.getDefault())
+                .build();
+
+        HttpRequest request = HttpRequest.newBuilder(URI.create(uri))
+                .version(version)
+                .build();
+
+        try {
+            HttpResponse<?> response = client.send(request, BodyHandler.discard(""));
+            Assert.fail("UNEXPECTED response" + response);
+        } catch (SSLException sslex) {
+            System.out.println("Caught expected: " + sslex);
+        }
+    }
+
+    @Test(dataProvider = "versions")
+    public void testAsync(Version version) throws Exception {
+        // client-side uses a different context to that of the server-side
+        HttpClient client = HttpClient.newBuilder()
+                .sslContext(SSLContext.getDefault())
+                .build();
+
+        HttpRequest request = HttpRequest.newBuilder(URI.create(uri))
+                .version(version)
+                .build();
+
+        assertExceptionally(SSLException.class,
+                            client.sendAsync(request, BodyHandler.discard("")));
+    }
+
+    static void assertExceptionally(Class<? extends Throwable> clazz,
+                                    CompletableFuture<?> stage) {
+        stage.handle((result, error) -> {
+            if (result != null) {
+                Assert.fail("UNEXPECTED result: " + result);
+                return null;
+            }
+            if (error instanceof CompletionException) {
+                Throwable cause = error.getCause();
+                if (cause == null) {
+                    Assert.fail("Unexpected null cause: " + error);
+                }
+                assertException(clazz, cause);
+            } else {
+                assertException(clazz, error);
+            }
+            return null;
+        }).join();
+    }
+
+    static void assertException(Class<? extends Throwable> clazz, Throwable t) {
+        if (t == null) {
+            Assert.fail("Expected " + clazz + ", caught nothing");
+        }
+        if (!clazz.isInstance(t)) {
+            Assert.fail("Expected " + clazz + ", caught " + t);
+        }
+    }
+
+    @BeforeTest
+    public void setup() throws Exception {
+        sslContext = new SimpleSSLContext().get();
+        if (sslContext == null)
+            throw new AssertionError("Unexpected null sslContext");
+
+        // server-side uses a different context to that of the client-side
+        sslServerSocket = (SSLServerSocket)sslContext
+                .getServerSocketFactory()
+                .createServerSocket(0);
+        uri = "https://localhost:" + sslServerSocket.getLocalPort() + "/";
+
+        Thread t = new Thread("SSL-Server-Side") {
+            @Override
+            public void run() {
+                while (true) {
+                    try {
+                        SSLSocket s = (SSLSocket) sslServerSocket.accept();
+                        System.out.println("SERVER: accepted: " + s);
+                        // artificially slow down the handshake reply to mimic
+                        // a slow(ish) network, and hopefully delay the
+                        // SequentialScheduler on in the client.
+                        Thread.sleep(500);
+                        s.startHandshake();
+                        s.close();
+                        Assert.fail("SERVER: UNEXPECTED ");
+                    } catch (SSLHandshakeException he) {
+                        System.out.println("SERVER: caught expected " + he);
+                    } catch (IOException e) {
+                        System.out.println("SERVER: caught: " + e);
+                        if (!sslServerSocket.isClosed()) {
+                            throw new UncheckedIOException(e);
+                        }
+                        break;
+                    } catch (InterruptedException ie) {
+                        throw new RuntimeException(ie);
+                    }
+                }
+            }
+        };
+        t.start();
+    }
+
+    @AfterTest
+    public void teardown() throws Exception {
+        sslServerSocket.close();
+    }
+}