thttpclient_ssl.nim 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152
  1. discard """
  2. cmd: "nim $target --mm:refc -d:ssl $options $file"
  3. disabled: "openbsd"
  4. retries: 2
  5. """
  6. # Nim - Basic SSL integration tests
  7. # (c) Copyright 2018 Nim contributors
  8. #
  9. # See the file "copying.txt", included in this
  10. # distribution, for details about the copyright.
  11. #
  12. ## Warning: this test performs local networking.
  13. ## Test with:
  14. ## ./bin/nim c -d:ssl -p:. --threads:on -r tests/stdlib/thttpclient_ssl.nim
  15. from stdtest/testutils import disableSSLTesting
  16. when not defined(windows) and not disableSSLTesting():
  17. # Disabled on Windows due to old OpenSSL version
  18. import std/[formatfloat, syncio]
  19. import
  20. httpclient,
  21. net,
  22. openssl,
  23. os,
  24. strutils,
  25. threadpool,
  26. times,
  27. unittest
  28. # bogus self-signed certificate
  29. const
  30. certFile = "tests/stdlib/thttpclient_ssl_cert.pem"
  31. keyFile = "tests/stdlib/thttpclient_ssl_key.pem"
  32. proc log(msg: string) =
  33. when defined(ssldebug):
  34. echo " [" & $epochTime() & "] " & msg
  35. # FIXME
  36. echo " [" & $epochTime() & "] " & msg
  37. discard
  38. proc runServer(port: Port): bool {.thread.} =
  39. ## Run a trivial HTTPS server in a {.thread.}
  40. ## Exit after serving one request
  41. var socket = newSocket()
  42. socket.setSockOpt(OptReusePort, true)
  43. socket.bindAddr(port)
  44. var ctx = newContext(certFile=certFile, keyFile=keyFile)
  45. ## Handle one connection
  46. socket.listen()
  47. var client: Socket
  48. var address = ""
  49. log "server: ready"
  50. socket.acceptAddr(client, address)
  51. log "server: incoming connection"
  52. var ssl: SslPtr = SSL_new(ctx.context)
  53. discard SSL_set_fd(ssl, client.getFd())
  54. log "server: accepting connection"
  55. ErrClearError()
  56. if SSL_accept(ssl) <= 0:
  57. ERR_print_errors_fp(stderr)
  58. else:
  59. const reply = "HTTP/1.0 200 OK\r\nServer: test\r\nContent-type: text/html\r\nContent-Length: 0\r\n\r\n"
  60. log "server: sending reply"
  61. discard SSL_write(ssl, reply.cstring, reply.len)
  62. log "server: receiving a line"
  63. let line = client.recvLine()
  64. log "server: received $# bytes" % $line.len
  65. log "closing"
  66. SSL_free(ssl)
  67. close(client)
  68. close(socket)
  69. log "server: exited"
  70. suite "SSL self signed certificate check":
  71. test "TCP socket":
  72. const port = 12347.Port
  73. let t = spawn runServer(port)
  74. sleep(100)
  75. var sock = newSocket()
  76. var ctx = newContext()
  77. ctx.wrapSocket(sock)
  78. try:
  79. log "client: connect"
  80. sock.connect("127.0.0.1", port)
  81. fail()
  82. except:
  83. let msg = getCurrentExceptionMsg()
  84. check(msg.contains("certificate verify failed"))
  85. test "HttpClient default: no check":
  86. const port = 12345.Port
  87. let t = spawn runServer(port)
  88. sleep(100)
  89. var client = newHttpClient(sslContext=newContext(verifyMode=CVerifyNone))
  90. try:
  91. log "client: connect"
  92. discard client.getContent("https://127.0.0.1:12345")
  93. except:
  94. let msg = getCurrentExceptionMsg()
  95. log "client: unexpected exception: " & msg
  96. fail()
  97. test "HttpClient with CVerifyPeer":
  98. const port = 12346.Port
  99. let t = spawn runServer(port)
  100. sleep(100)
  101. var client = newHttpClient(sslContext=newContext(verifyMode=CVerifyPeer))
  102. try:
  103. log "client: connect"
  104. discard client.getContent("https://127.0.0.1:12346")
  105. log "getContent should have raised an exception"
  106. fail()
  107. except:
  108. let msg = getCurrentExceptionMsg()
  109. log "client: exception: " & msg
  110. # SSL_shutdown:shutdown while in init
  111. if not (msg.contains("alert number 48") or
  112. msg.contains("certificate verify failed")):
  113. echo "CVerifyPeer exception: " & msg
  114. check(false)
  115. test "HttpClient with CVerifyPeerUseEnvVars":
  116. const port = 12346.Port
  117. let t = spawn runServer(port)
  118. sleep(100)
  119. putEnv("SSL_CERT_FILE", getCurrentDir() / certFile)
  120. var client = newHttpClient(sslContext=newContext(verifyMode=CVerifyPeerUseEnvVars))
  121. try:
  122. log "client: connect"
  123. discard client.getContent("https://127.0.0.1:12346")
  124. except:
  125. let msg = getCurrentExceptionMsg()
  126. log "client: exception: " & msg
  127. log "getContent should not have raised an exception"
  128. fail()