%%
%% %CopyrightBegin%
%%
%% Copyright Ericsson AB 2005-2012. All Rights Reserved.
%%
%% The contents of this file are subject to the Erlang Public License,
%% Version 1.1, (the "License"); you may not use this file except in
%% compliance with the License. You should have received a copy of the
%% Erlang Public License along with this software. If not, it can be
%% retrieved online at http://www.erlang.org/.
%%
%% Software distributed under the License is distributed on an "AS IS"
%% basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
%% the License for the specific language governing rights and limitations
%% under the License.
%%
%% %CopyrightEnd%
%%
%%
-module(httpd_mod).
-include("test_server.hrl").
-include("test_server_line.hrl").
%% General testcases bodies called from httpd_SUITE
-export([alias/4, actions/4, security/5, auth/4, auth_api/6,
auth_mnesia_api/4, htaccess/4,
cgi/4, esi/4, get/4, head/4, all/4]).
%% Help functions
-export([event/4, ssl_password_cb/0]).
%% Seconds before successful auths timeout.
-define(AUTH_TIMEOUT,5).
%%-------------------------------------------------------------------------
%% Test cases starts here.
%%-------------------------------------------------------------------------
alias(Type, Port, Host, Node) ->
%% This is very crude, but...
tsp("alias -> Has IPv6 support: ~p", [inets_test_lib:has_ipv6_support()]),
Opts = [],
ok = httpd_test_lib:verify_request(Type, Host, Port, Opts, Node,
"GET /pics/icon.sheet.gif "
"HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{header, "Content-Type","image/gif"},
{header, "Server"},
{header, "Date"},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Opts, Node,
"GET / HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{header, "Content-Type","text/html"},
{header, "Server"},
{header, "Date"},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Opts, Node,
"GET /misc/ HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{header, "Content-Type","text/html"},
{header, "Server"},
{header, "Date"},
{version, "HTTP/1.0"}]),
%% Check redirection if trailing slash is missing.
ok = httpd_test_lib:verify_request(Type, Host, Port, Opts, Node,
"GET /misc HTTP/1.0\r\n\r\n",
[{statuscode, 301},
{header, "Location"},
{header, "Content-Type","text/html"},
{version, "HTTP/1.0"}]).
%%-------------------------------------------------------------------------
actions(Type, Port, Host, Node) ->
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"HEAD / HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]).
%%-------------------------------------------------------------------------
security(ServerRoot, Type, Port, Host, Node) ->
tsp("security -> "
"entry with"
"~n ServerRoot: ~p"
"~n Type: ~p"
"~n Port: ~p"
"~n Host: ~p"
"~n Node: ~p", [ServerRoot, Type, Port, Host, Node]),
tsp("security -> "
"register - receive security events"),
global:register_name(mod_security_test, self()), % Receive events
tsp("security -> "
"sleep"),
test_server:sleep(5000),
OpenDir = filename:join([ServerRoot, "htdocs", "open"]),
%% Test blocking / unblocking of users.
%% /open, require user one Aladdin
tsp("security -> "
"blocking and unblocking of users - "
"remove all existing users"),
remove_users(Node, ServerRoot, Host, Port, "open"),
tsp("security -> "
"blocking and unblocking of users - "
"auth request for nonex user 'one' - expect 401"),
auth_request(Type, Host, Port, Node, "/open/", "one", "onePassword",
[{statuscode, 401}]),
tsp("security -> "
"blocking and unblocking of users - "
"await fail security event"),
receive_security_event({event, auth_fail, Port, OpenDir,
[{user, "one"}, {password, "onePassword"}]},
Node, Port),
tsp("security -> "
"blocking and unblocking of users - "
"auth request for nonex user 'two' - expect 401"),
auth_request(Type,Host,Port,Node,"/open/", "two", "twoPassword",
[{statuscode, 401}]),
tsp("security -> "
"blocking and unblocking of users - "
"await fail security event"),
receive_security_event({event, auth_fail, Port, OpenDir,
[{user, "two"}, {password, "twoPassword"}]},
Node, Port),
tsp("security -> "
"blocking and unblocking of users - "
"auth request for nonex user 'Alladin' - expect 401"),
auth_request(Type, Host, Port, Node,"/open/", "Aladdin",
"AladdinPassword", [{statuscode, 401}]),
tsp("security -> "
"blocking and unblocking of users - "
"await fail security event"),
receive_security_event({event, auth_fail, Port, OpenDir,
[{user, "Aladdin"},
{password, "AladdinPassword"}]},
Node, Port),
tsp("security -> "
"blocking and unblocking of users - "
"add user 'one'"),
add_user(Node, ServerRoot, Port, "open", "one", "onePassword", []),
tsp("security -> "
"blocking and unblocking of users - "
"add user 'two'"),
add_user(Node, ServerRoot, Port, "open", "two", "twoPassword", []),
tsp("security -> "
"blocking and unblocking of users - "
"auth request 1 for user 'one' with wrong password - expect 401"),
auth_request(Type, Host, Port, Node,"/open/", "one", "WrongPassword",
[{statuscode, 401}]),
tsp("security -> "
"blocking and unblocking of users - "
"await fail security event"),
receive_security_event({event, auth_fail, Port, OpenDir,
[{user, "one"}, {password, "WrongPassword"}]},
Node, Port),
tsp("security -> "
"blocking and unblocking of users - "
"auth request 2 for user 'one' with wrong password - expect 401"),
auth_request(Type, Host, Port, Node,"/open/", "one", "WrongPassword",
[{statuscode, 401}]),
tsp("security -> "
"blocking and unblocking of users - "
"await fail security event"),
receive_security_event({event, auth_fail, Port, OpenDir,
[{user, "one"}, {password, "WrongPassword"}]},
Node, Port),
tsp("security -> "
"blocking and unblocking of users - "
"await block security event (two failed attempts)"),
receive_security_event({event, user_block, Port, OpenDir,
[{user, "one"}]}, Node, Port),
tsp("security -> "
"blocking and unblocking of users - "
"unregister - no more security events"),
global:unregister_name(mod_security_test), % No more events.
tsp("security -> "
"blocking and unblocking of users - "
"auth request for user 'one' with wrong password - expect 401"),
auth_request(Type, Host, Port, Node,"/open/", "one", "WrongPassword",
[{statuscode, 401}]),
tsp("security -> "
"blocking and unblocking of users - "
"auth request for user 'one' with correct password - expect 403"),
auth_request(Type, Host, Port, Node,"/open/", "one", "onePassword",
[{statuscode, 403}]),
%% User "one" should be blocked now..
tsp("security -> "
"blocking and unblocking of users - "
"list blocked users - 'one' should be the only one"),
case list_blocked_users(Node, Port) of
[{"one",_, Port, OpenDir,_}] ->
ok;
Blocked ->
tsp(" *** unexpected blocked users ***"
"~n Blocked: ~p", [Blocked]),
exit({unexpected_blocked, Blocked})
end,
tsp("security -> "
"blocking and unblocking of users - "
"list users blocked for dir '~p' - "
"user 'one' should be the only one", [OpenDir]),
[{"one",_, Port, OpenDir,_}] = list_blocked_users(Node, Port, OpenDir),
tsp("security -> "
"blocking and unblocking of users - "
"unblock user 'one' for dir '~p'", [OpenDir]),
true = unblock_user(Node, "one", Port, OpenDir),
%% User "one" should not be blocked any more.
tsp("security -> "
"blocking and unblocking of users - "
"ensure user 'one' is no longer blocked"),
[] = list_blocked_users(Node, Port),
tsp("security -> "
"blocking and unblocking of users - "
"auth request for user 'one' with correct password - expect 200"),
auth_request(Type, Host, Port, Node,"/open/", "one", "onePassword",
[{statuscode, 200}]),
%% Test list_auth_users & auth_timeout
tsp("security -> "
"list-auth-users and auth-timeout - "
"list auth users - expect user 'one'"),
["one"] = list_auth_users(Node, Port),
tsp("security -> "
"list-auth-users and auth-timeout - "
"auth request for user 'two' with wrong password - expect 401"),
auth_request(Type, Host, Port, Node,"/open/", "two", "onePassword",
[{statuscode, 401}]),
tsp("security -> "
"list-auth-users and auth-timeout - "
"list auth users - expect user 'one'"),
["one"] = list_auth_users(Node, Port),
tsp("security -> "
"list-auth-users and auth-timeout - "
"list auth users for dir '~p' - expect user 'one'", [OpenDir]),
["one"] = list_auth_users(Node, Port, OpenDir),
tsp("security -> "
"list-auth-users and auth-timeout - "
"auth request for user 'two' with correct password - expect 401"),
auth_request(Type, Host, Port, Node,"/open/", "two", "twoPassword",
[{statuscode, 401}]),
tsp("security -> "
"list-auth-users and auth-timeout - "
"list auth users - expect user 'one'"),
["one"] = list_auth_users(Node, Port),
tsp("security -> "
"list-auth-users and auth-timeout - "
"list auth users for dir '~p' - expect user 'one'", [OpenDir]),
["one"] = list_auth_users(Node, Port, OpenDir),
%% Wait for successful auth to timeout.
tsp("security -> "
"list-auth-users and auth-timeout - "
"wait for successful auth to timeout"),
test_server:sleep(?AUTH_TIMEOUT*1001),
tsp("security -> "
"list-auth-users and auth-timeout - "
"list auth users - expect none"),
[] = list_auth_users(Node, Port),
tsp("security -> "
"list-auth-users and auth-timeout - "
"list auth users for dir '~p'~n - expect none", [OpenDir]),
[] = list_auth_users(Node, Port, OpenDir),
%% "two" is blocked.
tsp("security -> "
"list-auth-users and auth-timeout - "
"unblock user 'two' for dir '~p'", [OpenDir]),
true = unblock_user(Node, "two", Port, OpenDir),
%% Test explicit blocking. Block user 'two'.
tsp("security -> "
"explicit blocking - list blocked users - should be none"),
[] = list_blocked_users(Node,Port,OpenDir),
tsp("security -> "
"explicit blocking - "
"block user 'two' for dir '~p'", [OpenDir]),
true = block_user(Node, "two", Port, OpenDir, 10),
tsp("security -> "
"explicit blocking - "
"auth request for user 'two' with correct password - expect 401"),
auth_request(Type, Host, Port, Node,"/open/", "two", "twoPassword",
[{statuscode, 401}]),
tsp("security -> "
"done").
%%-------------------------------------------------------------------------
auth(Type, Port, Host, Node) ->
tsp("auth -> "
"entry with"
"~n Type: ~p"
"~n Port: ~p"
"~n Host: ~p"
"~n Node: ~p", [Type, Port, Host, Node]),
%% Authentication required!
ok = httpd_test_lib:verify_request(Type,Host,Port,Node,
"GET /open/ HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
ok = httpd_test_lib:verify_request(Type,Host,Port,Node,
"GET /secret/ HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
ok = httpd_test_lib:verify_request(Type,Host,Port,Node,
"GET /secret/top_secret/"
" HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
%% Authentication OK! ["one:OnePassword" user first in user list]
auth_request(Type, Host, Port, Node, "/open/dummy.html", "one",
"onePassword", [{statuscode, 200}]),
%% Authentication OK and a directory listing is supplied!
%% ["Aladdin:open sesame" user second in user list]
auth_request(Type, Host, Port, Node, "/open/","Aladdin",
"AladdinPassword", [{statuscode, 200}]),
%% User correct but wrong password! ["one:one" user first in user list]
auth_request(Type, Host, Port, Node, "/open/", "one", "one",
[{statuscode, 401},{header, "WWW-Authenticate"}]),
%% Make sure Authenticate header is received even the second time
%% we try a incorrect password! Otherwise a browser client will hang!
auth_request(Type, Host, Port, Node, "/open/", "one", "one",
[{statuscode, 401},{header, "WWW-Authenticate"}]),
%% Neither user or password correct! ["dummy:dummy"]
auth_request(Type, Host, Port, Node, "/open/", "dummy", "dummy",
[{statuscode, 401}]),
%% Authentication OK! ["two:TwoPassword" user in first group]
auth_request(Type, Host, Port, Node, "/secret/dummy.html", "two",
"twoPassword", [{statuscode, 200}]),
%% Authentication OK and a directory listing is supplied!
%% ["three:ThreePassword" user in second group]
auth_request(Type, Host, Port, Node,"/secret/", "three",
"threePassword", [{statuscode, 200}]),
%% User correct but wrong password! ["two:two" user in first group]
auth_request(Type, Host, Port, Node, "/secret/", "two", "two",
[{statuscode, 401}]),
%% Neither user or password correct! ["dummy:dummy"]
auth_request(Type, Host, Port, Node,"/secret/", "dummy", "dummy",
[{statuscode, 401}]),
%% Nested secret/top_secret OK! ["Aladdin:open sesame"]
auth_request(Type, Host, Port, Node, "/secret/top_secret/", "Aladdin",
"AladdinPassword", [{statuscode, 200}]),
%% Authentication still required!
ok = httpd_test_lib:verify_request(Type, Host, Port, Node, "GET /open/ "
"HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node, "GET /secret/ "
"HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /secret/top_secret/ "
"HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]).
%%-------------------------------------------------------------------------
%% What to test here:
%%
%% /open - plain, require user one Aladdin
%% /secret - plain, require group group1 group2
%% /secret/top_secret - plain, require group group3
%% /dets_open - dets, require user one Aladdin
%% /dets_secret - dets, require group group1 group2
%% /dets_secret/top_secret - dets, require group group3
%% /mnesia_open/ - mnesia, require user one Aladdin
%% /mnesia_secret/ - mnesia, require group group1 group2
%% /mnesia_secret/top_secret/ - mnesia, require group group3
auth_api(ServerRoot, AuthStoreType, Type, Port, Host, Node) ->
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET / HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
auth_request(Type, Host, Port, Node, "/", "one", "WrongPassword",
[{statuscode, 200}]),
%% Make sure Authenticate header is received even the second time
%% we try a incorrect password! Otherwise a browser client will hang!
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
"dummy", "WrongPassword", [{statuscode, 401},
{header, "WWW-Authenticate"}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
"dummy", "WrongPassword", [{statuscode, 401},
{header, "WWW-Authenticate"}]),
%% Change the password to DummyPassword then try to add a user
%% Get an error and set it to NoPassword
ok = update_password(Node, ServerRoot, Host, Port, AuthStoreType ++
"open", "NoPassword", "DummyPassword"),
{error,bad_password} =
add_user(Node, ServerRoot, Port, AuthStoreType ++ "open", "one",
"onePassword", []),
ok = update_password(Node, ServerRoot, Host, Port, AuthStoreType ++"open",
"DummyPassword", "NoPassword"),
%% Test /*open, require user one Aladdin
remove_users(Node, ServerRoot, Host, Port, AuthStoreType ++ "open"),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
"one", "onePassword", [{statuscode, 401}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
"two", "twoPassword", [{statuscode, 401}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
"Aladdin", "onePassword", [{statuscode, 401}]),
add_user(Node, ServerRoot, Port, AuthStoreType ++ "open", "one",
"onePassword", []),
add_user(Node, ServerRoot, Port, AuthStoreType ++ "open", "two",
"twoPassword", []),
add_user(Node, ServerRoot, Port, AuthStoreType ++ "open", "Aladdin",
"AladdinPassword", []),
{ok, [_|_]} = list_users(Node, ServerRoot, Host, Port,
AuthStoreType++"open"),
auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++ "open/",
"one", "WrongPassword", [{statuscode, 401}]),
auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++ "open/",
"one", "onePassword", [{statuscode, 200}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
"two", "twoPassword", [{statuscode, 401}]),
auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++ "open/",
"Aladdin", "WrongPassword", [{statuscode, 401}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "open/",
"Aladdin", "AladdinPassword", [{statuscode, 200}]),
remove_users(Node, ServerRoot, Host, Port, AuthStoreType++"open"),
{ok, []} = list_users(Node, ServerRoot, Host, Port,
AuthStoreType++"open"),
%% Phase 2
remove_users(Node, ServerRoot, Host, Port, AuthStoreType++"secret"),
{ok, []} = list_users(Node, ServerRoot, Host, Port, AuthStoreType ++
"secret"),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
"one", "onePassword", [{statuscode, 401}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
"two", "twoPassword", [{statuscode, 401}]),
auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++ "secret/",
"three", "threePassword", [{statuscode, 401}]),
add_user(Node, ServerRoot, Port, AuthStoreType ++ "secret", "one",
"onePassword",
[]),
add_user(Node, ServerRoot, Port, AuthStoreType ++ "secret",
"two", "twoPassword", []),
add_user(Node, ServerRoot, Port, AuthStoreType++"secret", "Aladdin",
"AladdinPassword",[]),
add_group_member(Node, ServerRoot, Port, AuthStoreType ++ "secret",
"one", "group1"),
add_group_member(Node, ServerRoot, Port, AuthStoreType ++ "secret",
"two", "group1"),
add_group_member(Node, ServerRoot, Port, AuthStoreType ++
"secret", "Aladdin", "group2"),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
"one", "onePassword", [{statuscode, 200}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
"two", "twoPassword", [{statuscode, 200}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
"Aladdin", "AladdinPassword", [{statuscode, 200}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++ "secret/",
"three", "threePassword", [{statuscode, 401}]),
remove_users(Node, ServerRoot, Host, Port, AuthStoreType ++ "secret"),
{ok, []} = list_users(Node, ServerRoot, Host, Port,
AuthStoreType ++ "secret"),
remove_groups(Node, ServerRoot, Host, Port, AuthStoreType ++ "secret"),
Directory = filename:join([ServerRoot, "htdocs", AuthStoreType ++
"secret"]),
{ok, []} = list_groups(Node, ServerRoot, Host, Port, Directory),
%% Phase 3
remove_users(Node, ServerRoot, Host, Port, AuthStoreType ++
"secret/top_secret"),
remove_groups(Node, ServerRoot, Host, Port, AuthStoreType ++
"secret/top_secret"),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++
"secret/top_secret/",
"three", "threePassword", [{statuscode, 401}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++
"secret/top_secret/", "two", "twoPassword",
[{statuscode, 401}]),
add_user(Node, ServerRoot, Port, AuthStoreType ++
"secret/top_secret","three",
"threePassword",[]),
add_user(Node, ServerRoot, Port, AuthStoreType ++ "secret/top_secret",
"two","twoPassword", []),
add_group_member(Node, ServerRoot, Port, AuthStoreType ++
"secret/top_secret",
"three", "group3"),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++
"secret/top_secret/", "three", "threePassword",
[{statuscode, 200}]),
auth_request(Type, Host, Port, Node,"/" ++ AuthStoreType ++
"secret/top_secret/", "two", "twoPassword",
[{statuscode, 401}]),
add_group_member(Node, ServerRoot, Port, AuthStoreType ++
"secret/top_secret",
"two", "group3"),
auth_request(Type,Host,Port,Node,"/" ++ AuthStoreType ++
"secret/top_secret/",
"two", "twoPassword", [{statuscode, 200}]),
remove_users(Node, ServerRoot, Host, Port, AuthStoreType ++
"secret/top_secret"),
{ok, []} = list_users(Node, ServerRoot, Host, Port,
AuthStoreType ++ "secret/top_secret"),
remove_groups(Node, ServerRoot, Host, Port, AuthStoreType ++
"secret/top_secret"),
Directory2 = filename:join([ServerRoot, "htdocs",
AuthStoreType ++ "secret/top_secret"]),
{ok, []} = list_groups(Node, ServerRoot, Host, Port, Directory2),
auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++
"secret/top_secret/", "two", "twoPassword",
[{statuscode, 401}]),
auth_request(Type, Host, Port, Node, "/" ++ AuthStoreType ++
"secret/top_secret/","three", "threePassword",
[{statuscode, 401}]).
%%--------------------------------------------------------------------------
auth_mnesia_api(_Type, Port, _Host, _Node) ->
%% Create three groups:
%% group1 : one Aladdin
%% group2 : two
%% group3 : three
mod_auth_mnesia:store_user("one", "onePassword", Port,
"/mnesia_open", ""),
mod_auth_mnesia:store_user("Aladdin", "AladdinPassword", Port,
"/mnesia_open", ""),
mod_auth_mnesia:store_user("two", "twoPassword", Port,
"/mnesia_open", ""),
mod_auth_mnesia:store_user("three", "threePassword", Port,
"/mnesia_open", ""),
Users = mod_auth_mnesia:list_users(Port, "/mnesia_open"),
ok = check_lists_members(Users,["Aladdin","one","two","three"]),
true = mod_auth_mnesia:store_group_member("group1", "one", Port,
"/mnesia_open", ""),
true = mod_auth_mnesia:store_group_member("group1","Aladdin", Port,
"/mnesia_open", ""),
true = mod_auth_mnesia:store_group_member("group2","two", Port,
"/mnesia_open", ""),
true = mod_auth_mnesia:store_group_member("group3","three", Port,
"/mnesia_open", ""),
%% Check that all three created groups exist.
Groups = mod_auth_mnesia:list_groups(Port, "/mnesia_open"),
ok = check_lists_members(Groups, ["group1","group2","group3"]),
%% Check that the members of all groups are correct.
Group1 = mod_auth_mnesia:list_group_members("group1", Port,
"/mnesia_open"),
ok = check_lists_members(Group1,["one","Aladdin"]),
{ok,["two"]} = mod_auth_mnesia:list_group_members("group2", Port,
"/mnesia_open"),
{ok,["three"]} = mod_auth_mnesia:list_group_members("group3", Port,
"/mnesia_open"),
%% Delete user 'one' from group one and check that he was removed
%% correctly.
true = mod_auth_mnesia:remove_group_member("group1", "one", Port,
"/mnesia_open", ""),
{ok,["Aladdin"]} = mod_auth_mnesia:list_group_members("group1", Port,
"/mnesia_open"),
%% Remove group1 and check that the group was removed correctly.
true = mod_auth_mnesia:remove_group("group1", Port, "/mnesia_open", ""),
Groups_1 = mod_auth_mnesia:list_groups(Port, "/mnesia_open"),
ok = check_lists_members(Groups_1,["group2","group3"]),
%% Check that the other users still exist in their groups.
Users_1 = mod_auth_mnesia:list_users(Port, "/mnesia_open"),
ok = check_lists_members(Users_1,["Aladdin","one","two","three"]),
{ok,["two"]} = mod_auth_mnesia:list_group_members("group2", Port,
"/mnesia_open"),
{ok,["three"]} = mod_auth_mnesia:list_group_members("group3", Port,
"/mnesia_open"),
%% Remove the remaining groups/users and check that all
%% users/groups are removed.
true = mod_auth_mnesia:remove_group("group2", Port, "/mnesia_open", ""),
true = mod_auth_mnesia:remove_group("group3", Port, "/mnesia_open", ""),
{ok, []} = mod_auth_mnesia:list_groups(Port, "/mnesia_open"),
true = mod_auth_mnesia:remove_user("one", Port, "/mnesia_open", ""),
true = mod_auth_mnesia:remove_user("Aladdin", Port, "/mnesia_open", ""),
true = mod_auth_mnesia:remove_user("two", Port, "/mnesia_open", ""),
true = mod_auth_mnesia:remove_user("three", Port, "/mnesia_open", ""),
{ok, []} = mod_auth_mnesia:list_users(Port, "/mnesia_open"),
ok.
%%--------------------------------------------------------------------------
htaccess(Type, Port, Host, Node) ->
%% Control that authentication required!
%% Control that the pages that shall be
%% authenticated really need authenticatin
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /ht/open/ HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /ht/secret/ HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /ht/secret/top_secret/ "
"HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
%% Make sure Authenticate header is received even the second time
%% we try a incorrect password! Otherwise a browser client will hang!
auth_request(Type, Host, Port, Node,"/ht/open/",
"dummy", "WrongPassword", [{statuscode, 401},
{header, "WWW-Authenticate"}]),
auth_request(Type, Host, Port, Node,"/ht/open/",
"dummy", "WrongPassword", [{statuscode, 401},
{header, "WWW-Authenticate"}]),
%% Control that not just the first user in the list is valid
%% Control the first user
%% Authennticating ["one:OnePassword" user first in user list]
auth_request(Type, Host, Port, Node, "/ht/open/dummy.html", "one",
"OnePassword", [{statuscode, 200}]),
%% Control the second user
%% Authentication OK and a directory listing is supplied!
%% ["Aladdin:open sesame" user second in user list]
auth_request(Type, Host, Port, Node, "/ht/open/","Aladdin",
"AladdinPassword", [{statuscode, 200}]),
%% Contro that bad passwords and userids get a good denial
%% User correct but wrong password! ["one:one" user first in user list]
auth_request(Type, Host, Port, Node, "/ht/open/", "one", "one",
[{statuscode, 401}]),
%% Neither user or password correct! ["dummy:dummy"]
auth_request(Type, Host, Port, Node, "/ht/open/", "dummy", "dummy",
[{statuscode, 401}]),
%% Control that authetication still works, even if its a member in a group
%% Authentication OK! ["two:TwoPassword" user in first group]
auth_request(Type, Host, Port, Node, "/ht/secret/dummy.html", "two",
"TwoPassword", [{statuscode, 200}]),
%% Authentication OK and a directory listing is supplied!
%% ["three:ThreePassword" user in second group]
auth_request(Type, Host, Port, Node,"/ht/secret/", "three",
"ThreePassword", [{statuscode, 200}]),
%% Deny users with bad passwords even if the user is a group member
%% User correct but wrong password! ["two:two" user in first group]
auth_request(Type, Host, Port, Node, "/ht/secret/", "two", "two",
[{statuscode, 401}]),
%% Neither user or password correct! ["dummy:dummy"]
auth_request(Type, Host, Port, Node,"/ht/secret/", "dummy", "dummy",
[{statuscode, 401}]),
%% control that we deny the users that are in subnet above the allowed
auth_request(Type, Host, Port, Node,"/ht/blocknet/dummy.html", "four",
"FourPassword", [{statuscode, 403}]),
%% Control that we only applies the rules to the right methods
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"HEAD /ht/blocknet/dummy.html"
" HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
%% Control that the rerquire directive can be overrideen
auth_request(Type, Host, Port, Node,
"/ht/secret/top_secret/", "Aladdin", "AladdinPassword",
[{statuscode, 401}]),
%% Authentication still required!
ok = httpd_test_lib:verify_request(Type, Host, Port, Node, "GET /ht/open/ "
"HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /ht/secret/ HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /ht/secret/top_secret/ "
"HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{version, "HTTP/1.0"},
{header, "WWW-Authenticate"}]).
%%--------------------------------------------------------------------
cgi(Type, Port, Host, Node) ->
%% tsp("cgi -> entry with"
%% "~n Type: ~p"
%% "~n Port: ~p"
%% "~n Host: ~p"
%% "~n Node: ~p", []),
{Script, Script2, Script3} =
case test_server:os_type() of
{win32, _} ->
{"printenv.bat", "printenv.sh", "cgi_echo.exe"};
_ ->
{"printenv.sh", "printenv.bat", "cgi_echo"}
end,
%% The length (> 100) is intentional
%% tsp("cgi -> request 01 with length > 100"),
ok = httpd_test_lib:
verify_request(Type, Host, Port, Node,
"POST /cgi-bin/" ++ Script3 ++
" HTTP/1.0\r\n"
"Content-Length:100 \r\n\r\n "
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ"
" \r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"},
{header, "content-type", "text/plain"}]),
%% tsp("cgi -> request 02"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/"++ Script ++
" HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 03"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/not_there "
"HTTP/1.0\r\n\r\n",
[{statuscode, 404},{statuscode, 500},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 04"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/"++ Script ++
"?Nisse:kkk?sss/lll HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 04"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"POST /cgi-bin/"++ Script ++
" HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 05"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /htbin/"++ Script ++
" HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 06"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /htbin/not_there "
"HTTP/1.0\r\n\r\n",
[{statuscode, 404},{statuscode, 500},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 07"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /htbin/"++ Script ++
"?Nisse:kkk?sss/lll HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 08"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"POST /htbin/"++ Script ++
" HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 09"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"POST /htbin/"++ Script ++
" HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
%% Execute an existing, but bad CGI script..
%% tsp("cgi -> request 10 - bad script"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"POST /htbin/"++ Script2 ++
" HTTP/1.0\r\n\r\n",
[{statuscode, 404},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> request 11 - bad script"),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"POST /cgi-bin/"++ Script2 ++
" HTTP/1.0\r\n\r\n",
[{statuscode, 404},
{version, "HTTP/1.0"}]),
%% tsp("cgi -> done"),
ok.
%%--------------------------------------------------------------------
esi(Type, Port, Host, Node) ->
%% Check "ErlScriptAlias" and "EvalScriptAlias" directives
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /eval?httpd_example:print(\"Hi!\")"
" HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /eval?not_allowed:print(\"Hi!\")"
" HTTP/1.0\r\n\r\n",
[{statuscode, 403},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /eval?httpd_example:undef(\"Hi!\")"
" HTTP/1.0\r\n\r\n",
[{statuscode, 500},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/erl/httpd_example "
"HTTP/1.0\r\n\r\n",
[{statuscode, 400},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/erl/httpd_example:get "
"HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/erl/httpd_example:"
"get?input=4711"
" HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/erl/httpd_example:"
"post HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/erl/not_allowed:post "
"HTTP/1.0\r\n\r\n",
[{statuscode, 403},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/erl/httpd_example:undef "
"HTTP/1.0\r\n\r\n",
[{statuscode, 404},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /cgi-bin/erl/httpd_example/yahoo"
" HTTP/1.0\r\n\r\n",
[{statuscode, 302},
{version, "HTTP/1.0"}]),
ok.
%%--------------------------------------------------------------------
get(Type, Port, Host, Node) ->
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /index.html HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{header, "Content-Type", "text/html"},
{header, "Date"},
{header, "Server"},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /fsize.shtml HTTP/1.1\r\nHost:"
++ Host ++ "\r\n\r\n",
[{statuscode, 200},
{header, "Content-Type", "text/html"},
{header, "Date"},
{header, "Server"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /fsize.shtml HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{header, "Content-Type"},
{header, "Server"},
{header, "Date"},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /secret/dummy.html "
"HTTP/1.0\r\n\r\n",
[{statuscode, 401},
{header, "WWW-Authenticate"},
{version, "HTTP/1.0"}]),
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"GET /index.html HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{header, "Server"},
{header, "Date"},
{header, "Content-Type",
"text/html"},
{version, "HTTP/1.0"}]),
ok.
%%--------------------------------------------------------------------
head(Type, Port, Host, Node) ->
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
"HEAD /index.html HTTP/1.0\r\n\r\n",
[{statuscode, 200},
{version, "HTTP/1.0"}]),
ok.
%%--------------------------------------------------------------------
all(Type, Port, Host, Node) ->
actions(Type, Port, Host, Node),
alias(Type, Port, Host, Node),
auth(Type, Port, Host, Node),
cgi(Type, Port, Host, Node),
esi(Type, Port, Host, Node),
get(Type, Port, Host, Node),
head(Type, Port, Host, Node),
ok.
%%--------------------------------------------------------------------
%% Internal functions
%%--------------------------------------------------------------------
auth_request(Type, Host, Port, Node, URI, User, Passwd, Expect) ->
Req = ["GET ", URI, " HTTP/1.0\r\n",
"Authorization: Basic ",
base64:encode_to_string(User++":"++Passwd),
"\r\n\r\n"],
ok = httpd_test_lib:verify_request(Type, Host, Port, Node,
lists:flatten(Req),
[{version, "HTTP/1.0"} | Expect]).
remove_users(Node, ServerRoot, Host, Port, Dir) ->
%% List users, delete them, and make sure they are gone.
case list_users(Node, ServerRoot, Host, Port, Dir) of
{ok, Users} ->
lists:foreach(fun(User) ->
delete_user(Node, ServerRoot, Host,
Port, Dir, User)
end,
Users),
{ok, []} = list_users(Node, ServerRoot, Host, Port, Dir);
_ ->
ok
end.
add_user(Node, Root, Port, Dir, User, Password, UserData) ->
Addr = undefined,
Directory = filename:join([Root, "htdocs", Dir]),
rpc:call(Node, mod_auth, add_user,
[User, Password, UserData, Addr, Port, Directory]).
delete_user(Node, Root, _Host, Port, Dir, User) ->
Addr = undefined,
Directory = filename:join([Root, "htdocs", Dir]),
rpc:call(Node, mod_auth, delete_user, [User, Addr, Port, Directory]).
list_users(Node, Root, _Host, Port, Dir) ->
Addr = undefined,
Directory = filename:join([Root, "htdocs", Dir]),
rpc:call(Node, mod_auth, list_users, [Addr, Port, Directory]).
receive_security_event(Event, Node, Port) ->
%% io:format(user, "~w:receive_security_event -> entry with"
%% "~n Event: ~p"
%% "~n Node: ~p"
%% "~n Port: ~p"
%% "~n", [?MODULE, Event, Node, Port]),
receive
Event ->
ok;
{'EXIT', _, _} ->
receive_security_event(Event, Node, Port)
after 5000 ->
%% Flush the message queue, to see if we got something...
Msgs = inets_test_lib:flush(),
tsf({expected_event_not_received, Msgs})
end.
%% receive_security_event(Event, Node, Port) ->
%% io:format(user, "~w:receive_security_event -> entry with"
%% "~n Event: ~p"
%% "~n Node: ~p"
%% "~n Port: ~p"
%% "~n", [?MODULE, Event, Node, Port]),
%% receive
%% Event ->
%% ok;
%% {'EXIT', _, _} ->
%% receive_security_event(Event, Node, Port);
%% Other ->
%% test_server:fail({unexpected_event,
%% {expected, Event}, {received, Other}})
%% after 5000 ->
%% test_server:fail(no_event_recived)
%% end.
list_blocked_users(Node,Port) ->
Addr = undefined, % Assumed to be on the same host
rpc:call(Node, mod_security, list_blocked_users, [Addr,Port]).
list_blocked_users(Node,Port,Dir) ->
Addr = undefined, % Assumed to be on the same host
rpc:call(Node, mod_security, list_blocked_users, [Addr,Port,Dir]).
block_user(Node,User,Port,Dir,Sec) ->
Addr = undefined, % Assumed to be on the same host
rpc:call(Node, mod_security, block_user, [User, Addr, Port, Dir, Sec]).
unblock_user(Node,User,Port,Dir) ->
Addr = undefined, % Assumed to be on the same host
rpc:call(Node, mod_security, unblock_user, [User, Addr, Port, Dir]).
list_auth_users(Node,Port) ->
Addr = undefined, % Assumed to be on the same host
rpc:call(Node, mod_security, list_auth_users, [Addr,Port]).
list_auth_users(Node,Port,Dir) ->
Addr = undefined, % Assumed to be on the same host
rpc:call(Node, mod_security, list_auth_users, [Addr,Port,Dir]).
update_password(Node, ServerRoot, _Address, Port, Dir, Old, New)->
Directory = filename:join([ServerRoot, "htdocs", Dir]),
rpc:call(Node, mod_auth, update_password,
[undefined, Port, Directory, Old, New, New]).
remove_groups(Node, ServerRoot, Host, Port, Dir) ->
Directory = filename:join([ServerRoot, "htdocs", Dir]),
{ok, Groups} = list_groups(Node, ServerRoot, Host, Port, Directory),
lists:foreach(fun(Group) ->
delete_group(Node, Group, Port, Directory)
end,
Groups),
{ok, []} = list_groups(Node, ServerRoot, Host, Port, Directory),
ok.
delete_group(Node, Group, Port, Dir) ->
Addr = undefined,
rpc:call(Node, mod_auth, delete_group, [Group, Addr, Port, Dir]).
list_groups(Node, _, _, Port, Dir) ->
Addr = undefined,
rpc:call(Node, mod_auth, list_groups, [Addr, Port, Dir]).
add_group_member(Node, ServerRoot, Port, Dir, User, Group) ->
Addr = undefined,
rpc:call(Node, mod_auth, add_group_member, [Group, User, Addr, Port,
filename:join(
[ServerRoot,
"htdocs",Dir])]).
event(What, Port, Dir, Data) ->
Msg = {event, What, Port, Dir, Data},
case global:whereis_name(mod_security_test) of
undefined ->
ok;
_Pid ->
global:send(mod_security_test, Msg)
end.
ssl_password_cb() ->
"dummy-ssl-password".
check_lists_members({ok,L},L) ->
ok;
check_lists_members({ok,L1},L2) ->
check_lists_members1(lists:sort(L1),lists:sort(L2));
check_lists_members(Error,_L) ->
Error.
check_lists_members1(L,L) ->
ok;
check_lists_members1(L1,L2) ->
{error,{lists_not_equal,L1,L2}}.
%% p(F) ->
%% p(F, []).
%% p(F, A) ->
%% io:format(user, "~w:" ++ F ++ "~n", [?MODULE|A]).
tsp(F) ->
inets_test_lib:tsp(F).
tsp(F, A) ->
inets_test_lib:tsp(F, A).
tsf(Reason) ->
test_server:fail(Reason).