/* * Copyright (c) 2001, 2014, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ /* * This test is run using PostThruProxy.sh */ import java.io.*; import java.net.*; import java.security.KeyStore; import javax.net.*; import javax.net.ssl.*; import java.security.cert.*; /* * This test case is written to test the https POST through a proxy. * There is no proxy authentication done. * * PostThruProxy.java -- includes a simple server that serves * http POST method requests in secure channel, and a client * that makes https POST request through a proxy. */ public class PostThruProxy { /* * Where do we find the keystores? */ static String pathToStores = "../../../../../../javax/net/ssl/etc"; static String keyStoreFile = "keystore"; static String trustStoreFile = "truststore"; static String passwd = "passphrase"; private static int serverPort = 0; /* * The TestServer implements a OriginServer that * processes HTTP requests and responses. */ static class TestServer extends OriginServer { public TestServer(ServerSocket ss) throws Exception { super(ss); } /* * Returns an array of bytes containing the bytes for * the data sent in the response. * * @return bytes for the data in the response */ public byte[] getBytes() { return "Https POST thru proxy is successful". getBytes(); } } /* * Main method to create the server and client */ public static void main(String args[]) throws Exception { String keyFilename = args[1] + "/" + pathToStores + "/" + keyStoreFile; String trustFilename = args[1] + "/" + pathToStores + "/" + trustStoreFile; System.setProperty("javax.net.ssl.keyStore", keyFilename); System.setProperty("javax.net.ssl.keyStorePassword", passwd); System.setProperty("javax.net.ssl.trustStore", trustFilename); System.setProperty("javax.net.ssl.trustStorePassword", passwd); boolean useSSL = true; /* * setup the server */ try { ServerSocketFactory ssf = PostThruProxy.getServerSocketFactory(useSSL); ServerSocket ss = ssf.createServerSocket(serverPort); ss.setSoTimeout(30000); // 30 seconds serverPort = ss.getLocalPort(); new TestServer(ss); } catch (Exception e) { System.out.println("Server side failed:" + e.getMessage()); throw e; } // trigger the client try { doClientSide(args[0]); } catch (Exception e) { System.out.println("Client side failed: " + e.getMessage()); throw e; } } private static ServerSocketFactory getServerSocketFactory (boolean useSSL) throws Exception { if (useSSL) { SSLServerSocketFactory ssf = null; // set up key manager to do server authentication SSLContext ctx; KeyManagerFactory kmf; KeyStore ks; char[] passphrase = passwd.toCharArray(); ctx = SSLContext.getInstance("TLS"); kmf = KeyManagerFactory.getInstance("SunX509"); ks = KeyStore.getInstance("JKS"); ks.load(new FileInputStream(System.getProperty( "javax.net.ssl.keyStore")), passphrase); kmf.init(ks, passphrase); ctx.init(kmf.getKeyManagers(), null, null); ssf = ctx.getServerSocketFactory(); return ssf; } else { return ServerSocketFactory.getDefault(); } } /* * Message to be posted */ static String postMsg = "Testing HTTP post on a https server"; static void doClientSide(String hostname) throws Exception { HostnameVerifier reservedHV = HttpsURLConnection.getDefaultHostnameVerifier(); try { /* * setup up a proxy */ SocketAddress pAddr = setupProxy(); /* * we want to avoid URLspoofCheck failures in cases where the cert * DN name does not match the hostname in the URL. */ HttpsURLConnection.setDefaultHostnameVerifier( new NameVerifier()); URL url = new URL("https://" + hostname+ ":" + serverPort); Proxy p = new Proxy(Proxy.Type.HTTP, pAddr); HttpsURLConnection https = (HttpsURLConnection)url.openConnection(p); https.setDoOutput(true); https.setRequestMethod("POST"); PrintStream ps = null; try { ps = new PrintStream(https.getOutputStream()); ps.println(postMsg); ps.flush(); if (https.getResponseCode() != 200) { throw new RuntimeException("test Failed"); } ps.close(); // clear the pipe BufferedReader in = new BufferedReader( new InputStreamReader( https.getInputStream())); String inputLine; while ((inputLine = in.readLine()) != null) System.out.println("Client received: " + inputLine); in.close(); } catch (SSLException e) { if (ps != null) ps.close(); throw e; } } finally { HttpsURLConnection.setDefaultHostnameVerifier(reservedHV); } } static class NameVerifier implements HostnameVerifier { public boolean verify(String hostname, SSLSession session) { return true; } } static SocketAddress setupProxy() throws IOException { ProxyTunnelServer pserver = new ProxyTunnelServer(); // disable proxy authentication pserver.needUserAuth(false); pserver.start(); return new InetSocketAddress("localhost", pserver.getPort()); } }