%%
%% %CopyrightBegin%
%%
%% Copyright Ericsson AB 2013-2014. All Rights Reserved.
%%
%% The contents of this file are subject to the Erlang Public License,
%% Version 1.1, (the "License"); you may not use this file except in
%% compliance with the License. You should have received a copy of the
%% Erlang Public License along with this software. If not, it can be
%% retrieved online at http://www.erlang.org/.
%%
%% Software distributed under the License is distributed on an "AS IS"
%% basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
%% the License for the specific language governing rights and limitations
%% under the License.
%%
%% %CopyrightEnd%
%%
%%
%%
%% ct:run("../inets_test", httpd_SUITE).
%%
-module(httpd_SUITE).
-include_lib("kernel/include/file.hrl").
-include_lib("common_test/include/ct.hrl").
-include_lib("public_key/include/public_key.hrl").
-include("inets_test_lib.hrl").
%% Note: This directive should only be used in test suites.
-compile(export_all).
-record(httpd_user, {user_name, password, user_data}).
-record(httpd_group, {group_name, userlist}).
%%--------------------------------------------------------------------
%% Common Test interface functions -----------------------------------
%%--------------------------------------------------------------------
suite() ->
[{ct_hooks,[ts_install_cth]}].
all() ->
[
{group, http},
{group, http_limit},
{group, https}
].
groups() ->
[
{http, [], all_groups()},
{https, [], all_groups()},
{http_limit, [], [max_clients_1_1, max_clients_1_0, max_clients_0_9]},
{http_1_1, [], [host, chunked, expect, cgi, trace, range] ++ http_head() ++ http_get()},
{http_1_0, [], [host, cgi, trace] ++ http_head() ++ http_get()},
{http_0_9, [], http_head() ++ http_get()}
].
all_groups ()->
[{group, http_1_1},
{group, http_1_0},
{group, http_0_9}
].
http_head() ->
[head].
http_get() ->
[alias, get,
basic_auth,
esi, ssi].
init_per_suite(Config) ->
PrivDir = ?config(priv_dir, Config),
DataDir = ?config(data_dir, Config),
inets_test_lib:stop_apps([inets]),
inets_test_lib:start_apps([inets]),
ServerRoot = filename:join(PrivDir, "server_root"),
inets_test_lib:del_dirs(ServerRoot),
DocRoot = filename:join(ServerRoot, "htdocs"),
setup_server_dirs(ServerRoot, DocRoot, DataDir),
[{server_root, ServerRoot},
{doc_root, DocRoot},
{node, node()},
{host, inets_test_lib:hostname()} | Config].
end_per_suite(_Config) ->
ok.
%%--------------------------------------------------------------------
init_per_group(https = Group, Config0) ->
PrivDir = ?config(priv_dir, Config0),
CaKey = {_Trusted,_} =
erl_make_certs:make_cert([{key, dsa},
{subject,
[{name, "Public Key"},
{?'id-at-name',
{printableString, "public_key"}},
{?'id-at-pseudonym',
{printableString, "pubkey"}},
{city, "Stockholm"},
{country, "SE"},
{org, "erlang"},
{org_unit, "testing dep"}
]}
]),
ok = erl_make_certs:write_pem(PrivDir, "public_key_cacert", CaKey),
CertK1 = {_Cert1, _} = erl_make_certs:make_cert([{issuer, CaKey}]),
CertK2 = {_Cert2,_} = erl_make_certs:make_cert([{issuer, CertK1},
{digest, md5},
{extensions, false}]),
ok = erl_make_certs:write_pem(PrivDir, "public_key_cert", CertK2),
case start_apps(Group) of
ok ->
init_httpd(Group, [{type, ssl} | Config0]);
_ ->
{skip, "Could not start https apps"}
end;
init_per_group(Group, Config0) when Group == http; Group == http_limit ->
init_httpd(Group, [{type, ip_comm} | Config0]);
init_per_group(http_1_1, Config) ->
[{http_version, "HTTP/1.1"} | Config];
init_per_group(http_1_0, Config) ->
[{http_version, "HTTP/1.0"} | Config];
init_per_group(http_0_9, Config) ->
[{http_version, "HTTP/0.9"} | Config];
init_per_group(_, Config) ->
Config.
end_per_group(http, _Config) ->
ok;
end_per_group(https, _Config) ->
ssl:stop();
end_per_group(_, _) ->
ok.
init_httpd(Group, Config0) ->
Config1 = proplists:delete(port, Config0),
Config = proplists:delete(server_pid, Config1),
{Pid, Port} = server_start(Group, server_config(Group, Config)),
[{server_pid, Pid}, {port, Port} | Config].
%%--------------------------------------------------------------------
init_per_testcase(Case, Config) when Case == host; Case == trace ->
Prop = ?config(tc_group_properties, Config),
Name = proplists:get_value(name, Prop),
Cb = case Name of
http_1_0 ->
httpd_1_0;
http_1_1 ->
httpd_1_1
end,
[{version_cb, Cb} | proplists:delete(version_cb, Config)];
init_per_testcase(range, Config) ->
DocRoot = ?config(doc_root, Config),
create_range_data(DocRoot),
Config;
init_per_testcase(_, Config) ->
Config.
%% init_per_testcase(basic_auth = Case, Config) ->
%% start_mnesia(?config(node, Config)),
%% common_init_per_test_case(Case, Config);
%% end_per_testcase(basic_auth, Config) ->
%% cleanup_mnesia();
end_per_testcase(_Case, _Config) ->
ok.
%%-------------------------------------------------------------------------
%% Test cases starts here.
%%-------------------------------------------------------------------------
head() ->
[{doc, "HTTP HEAD request for static page"}].
head(Config) when is_list(Config) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
ok = httpd_test_lib:verify_request(?config(type, Config), Host,
?config(port, Config), ?config(node, Config),
http_request("HEAD /index.html ", Version, Host),
[{statuscode, head_status(Version)},
{version, Version}]).
get() ->
[{doc, "HTTP GET request for static page"}].
get(Config) when is_list(Config) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
Type = ?config(type, Config),
ok = httpd_test_lib:verify_request(?config(type, Config), Host,
?config(port, Config),
transport_opts(Type, Config),
?config(node, Config),
http_request("GET /index.html ", Version, Host),
[{statuscode, 200},
{header, "Content-Type", "text/html"},
{header, "Date"},
{header, "Server"},
{version, Version}]).
basic_auth() ->
[{doc, "Test Basic authentication with WWW-Authenticate header"}].
basic_auth(Config) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
basic_auth_requiered(Config),
%% Authentication OK! ["one:OnePassword" user first in user list]
ok = auth_status(auth_request("/open/dummy.html", "one", "onePassword", Version, Host), Config,
[{statuscode, 200}]),
%% Authentication OK and a directory listing is supplied!
%% ["Aladdin:open sesame" user second in user list]
ok = auth_status(auth_request("/open/", "Aladdin", "AladdinPassword", Version, Host), Config,
[{statuscode, 200}]),
%% User correct but wrong password! ["one:one" user first in user list]
ok = auth_status(auth_request("/open/dummy.html", "one", "one", Version, Host), Config,
[{statuscode, 401},
{header, "WWW-Authenticate"}]),
%% Make sure Authenticate header is received even the second time
%% we try a incorrect password! Otherwise a browser client will hang!
ok = auth_status(auth_request("/open/dummy.html", "one", "one", Version, Host), Config,
[{statuscode, 401},
{header, "WWW-Authenticate"}]),
%% Neither user or password correct! ["dummy:dummy"]
ok = auth_status(auth_request("/open/dummy.html", "dummy", "dummy", Version, Host), Config,
[{statuscode, 401}]),
%% Nested secret/top_secret OK! ["Aladdin:open sesame"]
ok = http_status(auth_request("/secret/top_secret/", "Aladdin", "AladdinPassword", Version, Host),
Config, [{statuscode, 200}]),
%% Authentication still required!
basic_auth_requiered(Config).
ssi() ->
[{doc, "HTTP GET server side include test"}].
ssi(Config) when is_list(Config) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
Type = ?config(type, Config),
ok = httpd_test_lib:verify_request(?config(type, Config), Host, ?config(port, Config),
transport_opts(Type, Config),
?config(node, Config),
http_request("GET /fsize.shtml ", Version, Host),
[{statuscode, 200},
{header, "Content-Type", "text/html"},
{header, "Date"},
{header, "Server"},
{version, Version}]).
host() ->
[{doc, "Test host header"}].
host(Config) when is_list(Config) ->
Cb = ?config(version_cb, Config),
Cb:host(?config(type, Config), ?config(port, Config),
?config(host, Config), ?config(node, Config)).
chunked() ->
[{doc, "Check that the server accepts chunked requests."}].
chunked(Config) when is_list(Config) ->
httpd_1_1:chunked(?config(type, Config), ?config(port, Config),
?config(host, Config), ?config(node, Config)).
expect() ->
["Check that the server handles request with the expect header "
"field appropiate"].
expect(Config) when is_list(Config) ->
httpd_1_1:expect(?config(type, Config), ?config(port, Config),
?config(host, Config), ?config(node, Config)).
max_clients_1_1() ->
[{doc, "Test max clients limit"}].
max_clients_1_1(Config) when is_list(Config) ->
do_max_clients([{http_version, "HTTP/1.1"} | Config]).
max_clients_1_0() ->
[{doc, "Test max clients limit"}].
max_clients_1_0(Config) when is_list(Config) ->
do_max_clients([{http_version, "HTTP/1.0"} | Config]).
max_clients_0_9() ->
[{doc, "Test max clients limit"}].
max_clients_0_9(Config) when is_list(Config) ->
do_max_clients([{http_version, "HTTP/0.9"} | Config]).
esi() ->
[{doc, "Test mod_esi"}].
esi(Config) when is_list(Config) ->
ok = http_status("GET /eval?httpd_example:print(\"Hi!\") ",
Config, [{statuscode, 200}]),
ok = http_status("GET /eval?not_allowed:print(\"Hi!\") ",
Config, [{statuscode, 403}]),
ok = http_status("GET /eval?httpd_example:undef(\"Hi!\") ",
Config, [{statuscode, 500}]),
ok = http_status("GET /cgi-bin/erl/httpd_example ",
Config, [{statuscode, 400}]),
ok = http_status("GET /cgi-bin/erl/httpd_example:get ",
Config, [{statuscode, 200}]),
ok = http_status("GET /cgi-bin/erl/httpd_example:"
"get?input=4711 ", Config,
[{statuscode, 200}]),
ok = http_status("GET /cgi-bin/erl/httpd_example:post ",
Config, [{statuscode, 200}]),
ok = http_status("GET /cgi-bin/erl/not_allowed:post ",
Config, [{statuscode, 403}]),
ok = http_status("GET /cgi-bin/erl/httpd_example:undef ",
Config, [{statuscode, 404}]),
ok = http_status("GET /cgi-bin/erl/httpd_example/yahoo ",
Config, [{statuscode, 302}]),
%% Check "ErlScriptNoCache" directive (default: false)
ok = http_status("GET /cgi-bin/erl/httpd_example:get ",
Config, [{statuscode, 200},
{no_header, "cache-control"}]).
cgi() ->
[{doc, "Test mod_cgi"}].
cgi(Config) when is_list(Config) ->
{Script, Script2, Script3} =
case test_server:os_type() of
{win32, _} ->
{"printenv.bat", "printenv.sh", "cgi_echo.exe"};
_ ->
{"printenv.sh", "printenv.bat", "cgi_echo"}
end,
%%The length (> 100) is intentional
ok = http_status("POST /cgi-bin/" ++ Script3 ++ " ",
{"Content-Length:100 \r\n",
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"},
Config,
[{statuscode, 200},
{header, "content-type", "text/plain"}]),
ok = http_status("GET /cgi-bin/"++ Script ++ " ", Config, [{statuscode, 200}]),
ok = http_status("GET /cgi-bin/not_there ", Config,
[{statuscode, 404}, {statuscode, 500}]),
ok = http_status("GET /cgi-bin/"++ Script ++ "?Nisse:kkk?sss/lll ",
Config,
[{statuscode, 200}]),
ok = http_status("POST /cgi-bin/"++ Script ++ " ", Config,
[{statuscode, 200}]),
ok = http_status("GET /htbin/"++ Script ++ " ", Config,
[{statuscode, 200}]),
ok = http_status("GET /htbin/not_there ", Config,
[{statuscode, 404},{statuscode, 500}]),
ok = http_status("GET /htbin/"++ Script ++ "?Nisse:kkk?sss/lll ", Config,
[{statuscode, 200}]),
ok = http_status("POST /htbin/"++ Script ++ " ", Config,
[{statuscode, 200}]),
ok = http_status("POST /htbin/"++ Script ++ " ", Config,
[{statuscode, 200}]),
%% Execute an existing, but bad CGI script..
ok = http_status("POST /htbin/"++ Script2 ++ " ", Config,
[{statuscode, 404}]),
ok = http_status("POST /cgi-bin/"++ Script2 ++ " ", Config,
[{statuscode, 404}]),
%% Check "ScriptNoCache" directive (default: false)
ok = http_status("GET /cgi-bin/" ++ Script ++ " ", Config,
[{statuscode, 200},
{no_header, "cache-control"}]).
alias() ->
[{doc, "Test mod_alias"}].
alias(Config) when is_list(Config) ->
ok = http_status("GET /pics/icon.sheet.gif ", Config,
[{statuscode, 200},
{header, "Content-Type","image/gif"},
{header, "Server"},
{header, "Date"}]),
ok = http_status("GET / ", Config,
[{statuscode, 200},
{header, "Content-Type","text/html"},
{header, "Server"},
{header, "Date"}]),
ok = http_status("GET /misc/ ", Config,
[{statuscode, 200},
{header, "Content-Type","text/html"},
{header, "Server"},
{header, "Date"}]),
%% Check redirection if trailing slash is missing.
ok = http_status("GET /misc ", Config,
[{statuscode, 301},
{header, "Location"},
{header, "Content-Type","text/html"}]).
%% action() ->
%% [{doc, "Test mod_actions"}].
%% action(Config) when is_list(Config) ->
%% ok = http_status("HEAD /", Config,
%% [{statuscode, 200}]).
range() ->
[{doc, "Test Range header"}].
range(Config) when is_list(Config) ->
httpd_1_1:range(?config(type, Config), ?config(port, Config),
?config(host, Config), ?config(node, Config)).
if_modified_since() ->
[{doc, "Test If-Modified-Since header"}].
if_modified_since(Config) when is_list(Config) ->
httpd_1_1:if_test(?config(type, Config), ?config(port, Config),
?config(host, Config), ?config(node, Config),
?config(doc_root, Config)).
trace() ->
[{doc, "Test TRACE method"}].
trace(Config) when is_list(Config) ->
Cb = ?config(version_cb, Config),
Cb:trace(?config(type, Config), ?config(port, Config),
?config(host, Config), ?config(node, Config)).
%% auth_api() ->
%% [{doc, "Test mod_auth API"}].
%% auth_api(Config) when is_list(Config) ->
%% Version = ?config(http_version, Config),
%% Host = ?config(host, Config),
%% ok = http_status("GET / ", Config,
%% [{statuscode, 200}]),
%% ok = auth_status(auth_request("/", "one", "WrongPassword", Version, Host), Config,
%% [{statuscode, 200}]),
%% %% Make sure Authenticate header is received even the second time
%% %% we try a incorrect password! Otherwise a browser client will hang!
%% ok = auth_status(auth_request("/" ++ AuthStoreType ++ "open/",
%% "dummy", "WrongPassword", Host), Config,
%% [{statuscode, 401},
%% {header, "WWW-Authenticate"}]),
%% ok = auth_status(auth_request("/" ++ AuthStoreType ++ "open/", "dummy", "WrongPassword",
%% Host), Config, [{statuscode, 401},
%% {header, "WWW-Authenticate"}]),
%% %% Change the password to DummyPassword then try to add a user
%% %% Get an error and set it to NoPassword
%% ok = update_password(Node, ServerRoot, Host, Port, AuthStoreType ++
%% "open", "NoPassword", "DummyPassword"),
%% {error,bad_password} =
%% add_user(Node, ServerRoot, Port, AuthStoreType ++ "open", "one",
%% "onePassword", []),
%% ok = update_password(Node, ServerRoot, Host, Port, AuthStoreType ++"open",
%% "DummyPassword", "NoPassword"),
%% %% Test /*open, require user one Aladdin
%% remove_users(Node, ServerRoot, Host, Port, AuthStoreType ++ "open"),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
%% "one", "onePassword", [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
%% "two", "twoPassword", [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
%% "Aladdin", "onePassword", [{statuscode, 401}]),
%% add_user(Node, ServerRoot, Port, AuthStoreType ++ "open", "one",
%% "onePassword", []),
%% add_user(Node, ServerRoot, Port, AuthStoreType ++ "open", "two",
%% "twoPassword", []),
%% add_user(Node, ServerRoot, Port, AuthStoreType ++ "open", "Aladdin",
%% "AladdinPassword", []),
%% {ok, [_|_]} = list_users(Node, ServerRoot, Host, Port,
%% AuthStoreType++"open"),
%% auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++ "open/",
%% "one", "WrongPassword", [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++ "open/",
%% "one", "onePassword", [{statuscode, 200}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
%% "two", "twoPassword", [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++ "open/",
%% "Aladdin", "WrongPassword", [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
%% "Aladdin", "AladdinPassword", [{statuscode, 200}]),
%% remove_users(Node, ServerRoot, Host, Port, AuthStoreType++"open"),
%% {ok, []} = list_users(Node, ServerRoot, Host, Port,
%% AuthStoreType++"open"),
%% %% Phase 2
%% remove_users(Node, ServerRoot, Host, Port, AuthStoreType++"secret"),
%% {ok, []} = list_users(Node, ServerRoot, Host, Port, AuthStoreType ++
%% "secret"),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
%% "one", "onePassword", [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
%% "two", "twoPassword", [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++ "secret/",
%% "three", "threePassword", [{statuscode, 401}]),
%% add_user(Node, ServerRoot, Port, AuthStoreType ++ "secret", "one",
%% "onePassword",
%% []),
%% add_user(Node, ServerRoot, Port, AuthStoreType ++ "secret",
%% "two", "twoPassword", []),
%% add_user(Node, ServerRoot, Port, AuthStoreType++"secret", "Aladdin",
%% "AladdinPassword",[]),
%% add_group_member(Node, ServerRoot, Port, AuthStoreType ++ "secret",
%% "one", "group1"),
%% add_group_member(Node, ServerRoot, Port, AuthStoreType ++ "secret",
%% "two", "group1"),
%% add_group_member(Node, ServerRoot, Port, AuthStoreType ++
%% "secret", "Aladdin", "group2"),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
%% "one", "onePassword", [{statuscode, 200}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
%% "two", "twoPassword", [{statuscode, 200}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
%% "Aladdin", "AladdinPassword", [{statuscode, 200}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
%% "three", "threePassword", [{statuscode, 401}]),
%% remove_users(Node, ServerRoot, Host, Port, AuthStoreType ++ "secret"),
%% {ok, []} = list_users(Node, ServerRoot, Host, Port,
%% AuthStoreType ++ "secret"),
%% remove_groups(Node, ServerRoot, Host, Port, AuthStoreType ++ "secret"),
%% Directory = filename:join([ServerRoot, "htdocs", AuthStoreType ++
%% "secret"]),
%% {ok, []} = list_groups(Node, ServerRoot, Host, Port, Directory),
%% %% Phase 3
%% remove_users(Node, ServerRoot, Host, Port, AuthStoreType ++
%% "secret/top_secret"),
%% remove_groups(Node, ServerRoot, Host, Port, AuthStoreType ++
%% "secret/top_secret"),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++
%% "secret/top_secret/",
%% "three", "threePassword", [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++
%% "secret/top_secret/", "two", "twoPassword",
%% [{statuscode, 401}]),
%% add_user(Node, ServerRoot, Port, AuthStoreType ++
%% "secret/top_secret","three",
%% "threePassword",[]),
%% add_user(Node, ServerRoot, Port, AuthStoreType ++ "secret/top_secret",
%% "two","twoPassword", []),
%% add_group_member(Node, ServerRoot, Port, AuthStoreType ++
%% "secret/top_secret",
%% "three", "group3"),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++
%% "secret/top_secret/", "three", "threePassword",
%% [{statuscode, 200}]),
%% auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++
%% "secret/top_secret/", "two", "twoPassword",
%% [{statuscode, 401}]),
%% add_group_member(Node, ServerRoot, Port, AuthStoreType ++
%% "secret/top_secret",
%% "two", "group3"),
%% auth_request(Type,Host,Port,Node,"/" ++ AuthStoreType ++
%% "secret/top_secret/",
%% "two", "twoPassword", [{statuscode, 200}]),
%% remove_users(Node, ServerRoot, Host, Port, AuthStoreType ++
%% "secret/top_secret"),
%% {ok, []} = list_users(Node, ServerRoot, Host, Port,
%% AuthStoreType ++ "secret/top_secret"),
%% remove_groups(Node, ServerRoot, Host, Port, AuthStoreType ++
%% "secret/top_secret"),
%% Directory2 = filename:join([ServerRoot, "htdocs",
%% AuthStoreType ++ "secret/top_secret"]),
%% {ok, []} = list_groups(Node, ServerRoot, Host, Port, Directory2),
%% auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++
%% "secret/top_secret/", "two", "twoPassword",
%% [{statuscode, 401}]),
%% auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++
%% "secret/top_secret/","three", "threePassword",
%% [{statuscode, 401}]).
%%--------------------------------------------------------------------
%% Internal functions -----------------------------------
%%--------------------------------------------------------------------
do_max_clients(Config) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
Type = ?config(type, Config),
start_blocker(Config),
ok = httpd_test_lib:verify_request(?config(type, Config), Host,
?config(port, Config),
transport_opts(Type, Config),
?config(node, Config),
http_request("GET /index.html ", Version, Host),
[{statuscode, 503},
{version, Version}]),
receive
after 2000 ->
ok = httpd_test_lib:verify_request(?config(type, Config), Host,
?config(port, Config),
transport_opts(Type, Config),
?config(node, Config),
http_request("GET /index.html ", Version, Host),
[{statuscode, 200},
{version, Version}])
end.
setup_server_dirs(ServerRoot, DocRoot, DataDir) ->
CgiDir = filename:join(ServerRoot, "cgi-bin"),
AuthDir = filename:join(ServerRoot, "auth"),
PicsDir = filename:join(ServerRoot, "icons"),
ok = file:make_dir(ServerRoot),
ok = file:make_dir(DocRoot),
ok = file:make_dir(CgiDir),
ok = file:make_dir(AuthDir),
ok = file:make_dir(PicsDir),
DocSrc = filename:join(DataDir, "server_root/htdocs"),
AuthSrc = filename:join(DataDir, "server_root/auth"),
CgiSrc = filename:join(DataDir, "server_root/cgi-bin"),
PicsSrc = filename:join(DataDir, "server_root/icons"),
inets_test_lib:copy_dirs(DocSrc, DocRoot),
inets_test_lib:copy_dirs(AuthSrc, AuthDir),
inets_test_lib:copy_dirs(CgiSrc, CgiDir),
inets_test_lib:copy_dirs(PicsSrc, PicsDir),
Cgi = case test_server:os_type() of
{win32, _} ->
"cgi_echo.exe";
_ ->
"cgi_echo"
end,
inets_test_lib:copy_file(Cgi, DataDir, CgiDir),
AbsCgi = filename:join([CgiDir, Cgi]),
{ok, FileInfo} = file:read_file_info(AbsCgi),
ok = file:write_file_info(AbsCgi, FileInfo#file_info{mode = 8#00755}),
EnvCGI = filename:join([ServerRoot, "cgi-bin", "printenv.sh"]),
{ok, FileInfo1} = file:read_file_info(EnvCGI),
ok = file:write_file_info(EnvCGI,
FileInfo1#file_info{mode = 8#00755}).
start_apps(https) ->
inets_test_lib:start_apps([asn1, crypto, public_key, ssl]);
start_apps(_) ->
ok.
server_start(_, HttpdConfig) ->
{ok, Pid} = inets:start(httpd, HttpdConfig),
Serv = inets:services_info(),
{value, {_, _, Info}} = lists:keysearch(Pid, 2, Serv),
{Pid, proplists:get_value(port, Info)}.
server_config(http, Config) ->
ServerRoot = ?config(server_root, Config),
[{port, 0},
{server_name,"httpd_test"},
{server_root, ServerRoot},
{document_root, ?config(doc_root, Config)},
{bind_address, any},
{ipfamily, inet},
{max_header_size, 256},
{max_header_action, close},
{mime_types, [{"html","text/html"},{"htm","text/html"}, {"shtml","text/html"},
{"gif", "image/gif"}]},
{alias, {"/icons/", filename:join(ServerRoot,"icons") ++ "/"}},
{alias, {"/pics/", filename:join(ServerRoot,"icons") ++ "/"}},
{script_alias, {"/cgi-bin/", filename:join(ServerRoot, "cgi-bin") ++ "/"}},
{script_alias, {"/htbin/", filename:join(ServerRoot, "cgi-bin") ++ "/"}},
{erl_script_alias, {"/cgi-bin/erl", [httpd_example, io]}},
{eval_script_alias, {"/eval", [httpd_example, io]}}
] ++ auth_conf(ServerRoot) ++ mod_conf();
server_config(http_limit, Config) ->
[{max_clients, 1}] ++ server_config(http, Config);
%% server_config(range, Config) ->
%% range_conf() ++ server_config(http, Config);
%% server_config(if_modified_since, Config) ->
%% if_modified_since_conf() ++ server_config(http, Config);
%% server_config(trace, Config) ->
%% trace_conf() ++ server_config(http, Config);
server_config(https, Config) ->
PrivDir = ?config(priv_dir, Config),
[{socket_type, {essl,
[{cacertfile,
filename:join(PrivDir, "public_key_cacert.pem")},
{certfile,
filename:join(PrivDir, "public_key_cert.pem")},
{keyfile,
filename:join(PrivDir, "public_key_cert_key.pem")}
]}}] ++ server_config(http, Config).
http_request(Request, "HTTP/1.1" = Version, Host, {Headers, Body}) ->
Request ++ Version ++ "\r\nhost:" ++ Host ++ "\r\n" ++ Headers ++ "\r\n" ++ Body;
http_request(Request, Version, _, {Headers, Body}) ->
Request ++ Version ++ "\r\n" ++ Headers ++ "\r\n" ++ Body.
http_request(Request, "HTTP/1.1" = Version, Host) ->
Request ++ Version ++ "\r\nhost:" ++ Host ++ "\r\n\r\n";
http_request(Request, Version, _) ->
Request ++ Version ++ "\r\n\r\n".
auth_request(Path, User, Passwd, "HTTP/1.1" = Version, Host) ->
"GET " ++ Path ++ " " ++ Version ++ "\r\nhost:" ++ Host ++
"\r\nAuthorization: Basic " ++
base64:encode_to_string(User++":"++Passwd) ++
"\r\n\r\n";
auth_request(Path, User, Passwd, Version, _Host) ->
"GET " ++ Path ++ " " ++ Version ++
"\r\nAuthorization: Basic " ++
base64:encode_to_string(User++":"++Passwd) ++
"\r\n\r\n".
head_status("HTTP/0.9") ->
501; %% Not implemented in HTTP/0.9
head_status(_) ->
200.
auth_conf(Root) ->
[{directory, {filename:join(Root, "htdocs/open"),
[{auth_type, plain},
{auth_name, "Open Area"},
{auth_user_file, filename:join(Root, "auth/passwd")},
{auth_group_file, filename:join(Root, "auth/group")},
{require_user, ["one", "Aladdin"]}]}},
{directory, {filename:join(Root, "htdocs/secret"),
[{auth_type, plain},
{auth_name, "Secret Area"},
{auth_user_file, filename:join(Root, "auth/passwd")},
{auth_group_file, filename:join(Root, "auth/group")},
{require_group, ["group1", "group2"]}]}},
{directory, {filename:join(Root, "htdocs/secret/top_secret"),
[{auth_type, plain},
{auth_name, "Top Secret Area"},
{auth_user_file, filename:join(Root, "auth/passwd")},
{auth_group_file, filename:join(Root, "auth/group")},
{require_group, ["group3"]}]}},
{directory, {filename:join(Root, "htdocs/open"),
[{auth_type, mnesia},
{auth_name, "Open Area"},
{auth_user_file, filename:join(Root, "auth/passwd")},
{auth_group_file, filename:join(Root, "auth/group")},
{require_user, ["one", "Aladdin"]}]}},
{directory, {filename:join(Root, "htdocs/secret"),
[{auth_type, mnesia},
{auth_name, "Secret Area"},
{auth_user_file, filename:join(Root, "auth/passwd")},
{auth_group_file, filename:join(Root, "auth/group")},
{require_group, ["group1", "group2"]}]}}
].
mod_conf() ->
[{modules, [mod_alias, mod_auth, mod_responsecontrol, mod_esi, mod_actions, mod_cgi, mod_trace, mod_include,
mod_dir, mod_range, mod_get, mod_head, mod_log, mod_disk_log]}].
http_status(Request, Config, Expected) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
Type = ?config(type, Config),
httpd_test_lib:verify_request(?config(type, Config), Host,
?config(port, Config),
transport_opts(Type, Config),
?config(node, Config),
http_request(Request, Version, Host),
Expected ++ [{version, Version}]).
http_status(Request, HeadersAndBody, Config, Expected) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
Type = ?config(type, Config),
httpd_test_lib:verify_request(?config(type, Config), Host,
?config(port, Config),
transport_opts(Type, Config),
?config(node, Config),
http_request(Request, Version, Host, HeadersAndBody),
Expected ++ [{version, Version}]).
auth_status(AuthRequest, Config, Expected) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
Type = ?config(type, Config),
httpd_test_lib:verify_request(?config(type, Config), Host,
?config(port, Config),
transport_opts(Type, Config),
?config(node, Config),
AuthRequest,
Expected ++ [{version, Version}]).
basic_auth_requiered(Config) ->
ok = http_status("GET /open/ ", Config, [{statuscode, 401},
{header, "WWW-Authenticate"}]),
ok = http_status("GET /secret/ ", Config, [{statuscode, 401},
{header, "WWW-Authenticate"}]),
ok = http_status("GET /secret/top_secret/ ", Config, [{statuscode, 401},
{header, "WWW-Authenticate"}]).
start_mnesia(Node) ->
case rpc:call(Node, ?MODULE, cleanup_mnesia, []) of
ok ->
ok;
Other ->
ct:fail({failed_to_cleanup_mnesia, Other})
end,
case rpc:call(Node, ?MODULE, setup_mnesia, []) of
{atomic, ok} ->
ok;
Other2 ->
ct:fail({failed_to_setup_mnesia, Other2})
end,
ok.
setup_mnesia() ->
setup_mnesia([node()]).
setup_mnesia(Nodes) ->
ok = mnesia:create_schema(Nodes),
ok = mnesia:start(),
{atomic, ok} = mnesia:create_table(httpd_user,
[{attributes,
record_info(fields, httpd_user)},
{disc_copies,Nodes}, {type, set}]),
{atomic, ok} = mnesia:create_table(httpd_group,
[{attributes,
record_info(fields,
httpd_group)},
{disc_copies,Nodes}, {type,bag}]).
cleanup_mnesia() ->
mnesia:start(),
mnesia:delete_table(httpd_user),
mnesia:delete_table(httpd_group),
stopped = mnesia:stop(),
mnesia:delete_schema([node()]),
ok.
start_blocker(Config) ->
spawn(httpd_SUITE, init_blocker, [self(), Config]),
receive
blocker_start ->
ok
end.
init_blocker(From, Config) ->
From ! blocker_start,
block(Config).
block(Config) ->
Version = ?config(http_version, Config),
Host = ?config(host, Config),
Type = ?config(type, Config),
httpd_test_lib:verify_request(?config(type, Config), Host,
?config(port, Config),
transport_opts(Type, Config),
?config(node, Config),
http_request("GET /eval?httpd_example:delay(1000) ",
Version, Host),
[{statuscode, 200},
{version, Version}]).
transport_opts(ssl, Config) ->
PrivDir = ?config(priv_dir, Config),
[{cacertfile, filename:join(PrivDir, "public_key_cacert.pem")}];
transport_opts(_, _) ->
[].
create_range_data(Path) ->
PathAndFileName=filename:join([Path,"range.txt"]),
case file:read_file(PathAndFileName) of
{error, enoent} ->
file:write_file(PathAndFileName,list_to_binary(["12345678901234567890",
"12345678901234567890",
"12345678901234567890",
"12345678901234567890",
"12345678901234567890"]));
_ ->
ok
end.