1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-22 13:34:15 +03:00
samba-mirror/source4/client/http_test.c
Stefan Metzmacher ca93631291 s4:lib/tls: add support for gnutls_certificate_set_x509_{system_trust,trust_dir}()
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
2024-04-23 23:50:34 +00:00

406 lines
9.0 KiB
C

#include "includes.h"
#include "version.h"
#include "libcli/libcli.h"
#include "lib/events/events.h"
#include "libcli/resolve/resolve.h"
#include "param/param.h"
#include "libcli/raw/raw_proto.h"
#include "libcli/http/http.h"
#include "credentials.h"
#include "util/tevent_ntstatus.h"
#include "lib/tls/tls.h"
#include "lib/cmdline/cmdline.h"
struct http_client_info {
struct http_conn *http_conn;
uint16_t server_port;
const char *server_addr;
struct tstream_tls_params *tls_params;
struct cli_credentials *creds;
struct loadparm_context *lp_ctx;
const char *uri;
};
static bool send_http_request(TALLOC_CTX *mem_ctx,
struct tevent_context *ev_ctx,
struct http_client_info* es,
size_t response_size,
NTSTATUS *pstatus)
{
struct http_request *http_req = NULL;
struct tevent_req *req = NULL;
char *uri = NULL;
struct http_request *http_response = NULL;
NTSTATUS status;
http_req = talloc_zero(mem_ctx, struct http_request);
if (!http_req) {
DBG_ERR("no memory\n");
return false;
}
uri = talloc_strdup(mem_ctx, es->uri);
http_req->type = HTTP_REQ_POST;
http_req->uri = uri;
http_req->body = data_blob_null;
http_req->major = '1';
http_req->minor = '1';
http_add_header(mem_ctx, &http_req->headers,
"User-Agent", "Samba/http_test");
http_add_header(mem_ctx, &http_req->headers,
"Accept", "*/*");
req = http_send_auth_request_send(mem_ctx,
ev_ctx,
es->http_conn,
http_req,
es->creds,
es->lp_ctx,
HTTP_AUTH_BASIC);
if (!tevent_req_set_endtime(req, ev_ctx, timeval_current_ofs(10, 0))) {
DBG_ERR("Failed to set timeout\n");
return false;
}
if (!tevent_req_poll_ntstatus(req, ev_ctx, pstatus)) {
DBG_ERR("Failed to connect: %s\n", nt_errstr(*pstatus));
return false;
}
status = http_send_auth_request_recv(req);
if (!NT_STATUS_IS_OK(status)) {
DBG_ERR("Auth request failed: %s\n", nt_errstr(status));
return false;
}
req = http_read_response_send(mem_ctx,
ev_ctx,
es->http_conn,
response_size);
if (!req) {
DBG_ERR("no memory\n");
return -1;
}
if (!tevent_req_set_endtime(req, ev_ctx, timeval_current_ofs(10, 0))) {
DBG_ERR("Failed to set timeout\n");
return false;
}
if (!tevent_req_poll_ntstatus(req, ev_ctx, pstatus)) {
DBG_ERR("Failed to read_resonse: %s\n", nt_errstr(*pstatus));
return false;
}
*pstatus = http_read_response_recv(req, mem_ctx, &http_response);
if (!NT_STATUS_IS_OK(*pstatus)) {
DBG_ERR("Failed to receive response: %s\n", nt_errstr(*pstatus));
return false;
}
/* following are not 'hard' errors */
if (http_response->response_code != 200) {
fprintf(stdout, "HTTP server response: %u\n",
http_response->response_code);
fflush(stdout);
return false;
}
if (http_response->body.length == 0) {
fprintf(stdout, "unexpected 0 len response\n");
fflush(stdout);
return false;
}
DBG_ERR("response: len (%d)\n%s\n",
(int)http_response->body.length,
talloc_strndup(mem_ctx,
(char *)http_response->body.data,
http_response->body.length));
fprintf(stdout,"%s", talloc_strndup(mem_ctx,
(char *)http_response->body.data,
http_response->body.length));
fflush(stdout);
return true;
}
int main(int argc, const char *argv[])
{
TALLOC_CTX *mem_ctx;
struct tevent_context *ev_ctx;
int retries = 4;
int count = 0;
struct http_client_info *http_info = NULL;
bool use_tls = false;
int res;
NTSTATUS status;
struct tevent_req *req = NULL;
bool connected = false;
poptContext pc;
const char **const_argv = discard_const_p(const char *, argv);
int opt;
bool ok;
const char *ca_file = NULL;
int port = 0;
size_t response_size = 8192000;
struct cli_credentials *cli_creds;
struct poptOption long_options[] = {
POPT_AUTOHELP
{
.longName = "usetls",
.shortName = 't',
.argInfo = POPT_ARG_NONE,
.arg = NULL,
.val = 't',
.descrip = "Use tls",
.argDescrip = "enable tls",
},
{
.longName = "ip-address",
.shortName = 'I',
.argInfo = POPT_ARG_STRING,
.arg = NULL,
.val = 'I',
.descrip = "Use this IP to connect to",
.argDescrip = "IP",
},
{
.longName = "port",
.shortName = 'p',
.argInfo = POPT_ARG_INT,
.arg = &port,
.val = 'p',
.descrip = "port to connect to",
.argDescrip = "port",
},
{
.longName = "cacart",
.shortName = 'c',
.argInfo = POPT_ARG_STRING,
.arg = NULL,
.val = 'c',
.descrip = "CA certificate to verify peer against",
.argDescrip = "ca cert",
},
{
.longName = "uri",
.shortName = 'u',
.argInfo = POPT_ARG_STRING,
.arg = NULL,
.val = 'u',
.descrip = "uri to send as part of http request",
.argDescrip = "uri",
},
{
.longName = "rsize",
.argInfo = POPT_ARG_LONG,
.arg = &response_size,
.descrip = "response size",
},
POPT_COMMON_SAMBA
POPT_COMMON_CREDENTIALS
POPT_TABLEEND
};
mem_ctx = talloc_init("http_test");
if (!mem_ctx) {
DBG_ERR("Not enough memory\n");
res = -1;
goto done;
}
http_info = talloc_zero(mem_ctx, struct http_client_info);
if (http_info == NULL) {
DBG_ERR("Not enough memory\n");
res = -1;
goto done;
}
ok = samba_cmdline_init(mem_ctx,
SAMBA_CMDLINE_CONFIG_CLIENT,
false /* require_smbconf */);
if (!ok) {
DBG_ERR("Failed to init cmdline parser!\n");
res = -1;
goto done;
}
pc = samba_popt_get_context(getprogname(),
argc,
const_argv,
long_options,
0);
if (pc == NULL) {
DBG_ERR("Failed to setup popt context!\n");
res = -1;
goto done;
}
/* some defaults */
http_info->server_addr = "localhost";
http_info->uri = "/_search?pretty";
while ((opt = poptGetNextOpt(pc)) != -1) {
switch (opt) {
case 't':
use_tls = true;
break;
case 'c': {
ca_file = talloc_strdup(mem_ctx,
poptGetOptArg(pc));
if (ca_file == NULL) {
DBG_ERR("Not enough memory\n");
res = -1;
goto done;
}
break;
}
case 'I': {
http_info->server_addr = talloc_strdup(mem_ctx,
poptGetOptArg(pc));
if (http_info->server_addr == NULL) {
DBG_ERR("Not enough memory\n");
res = -1;
goto done;
}
break;
}
case 'u': {
http_info->uri = talloc_strdup(mem_ctx,
poptGetOptArg(pc));
if (http_info->uri == NULL) {
DBG_ERR("Not enough memory\n");
res = -1;
goto done;
}
break;
}
}
}
if (use_tls && ca_file == NULL) {
DBG_ERR("No cacert\n");
res = -1;
poptPrintUsage(pc, stderr, 0);
goto done;
}
if (!port) {
port = 8080;
}
http_info->server_port = port;
ev_ctx = s4_event_context_init(mem_ctx);
if (!ev_ctx) {
DBG_ERR("Not enough memory\n");
res = -1;
goto done;
}
cli_creds = samba_cmdline_get_creds();
if (!cli_credentials_is_anonymous(cli_creds)) {
http_info->creds = cli_credentials_init(mem_ctx);
cli_credentials_set_username(
http_info->creds,
cli_credentials_get_username(cli_creds),
CRED_SPECIFIED);
cli_credentials_set_password(http_info->creds,
cli_credentials_get_password(cli_creds),
CRED_SPECIFIED);
} else {
DBG_DEBUG("Anonymous creds!!!\n");
http_info->creds = cli_creds;
}
if (http_info->creds == NULL) {
DBG_ERR("Failed to create creds\n");
res = -1;
goto done;
}
http_info->lp_ctx = samba_cmdline_get_lp_ctx();
DBG_ERR("retries = %d/%d, Using server %s, port %d, using tls %s\n",
count, retries,
http_info->server_addr,
http_info->server_port,
use_tls ? "true" : "false");
while (count < retries) {
int error;
DBG_ERR("Connecting to HTTP [%s] port [%"PRIu16"]%s\n",
http_info->server_addr, http_info->server_port,
use_tls ? " with tls" : " without tls");
if (use_tls) {
bool system_cas = false;
const char * const *ca_dirs = NULL;
const char *crl_file = NULL;
const char *tls_priority = "NORMAL:-VERS-SSL3.0";
enum tls_verify_peer_state verify_peer =
TLS_VERIFY_PEER_CA_ONLY;
status = tstream_tls_params_client(mem_ctx,
system_cas,
ca_dirs,
ca_file,
crl_file,
tls_priority,
verify_peer,
http_info->server_addr,
&http_info->tls_params);
if (!NT_STATUS_IS_OK(status)) {
DBG_ERR("Failed tstream_tls_params_client - %s\n",
nt_errstr(status));
res = -1;
goto done;
}
}
req = http_connect_send(mem_ctx,
ev_ctx,
http_info->server_addr,
http_info->server_port,
http_info->creds,
http_info->tls_params);
if (!tevent_req_poll_ntstatus(req, ev_ctx, &status)) {
res = -1;
goto done;
}
error = http_connect_recv(req,
mem_ctx,
&http_info->http_conn);
if (error != 0) {
count++;
DBG_ERR("HTTP connection failed retry %d/%d: %s\n", count, retries, strerror(error));
} else {
DBG_ERR("HTTP connection succeeded\n");
connected = true;
break;
}
}
if (!connected) {
DBG_ERR("Leaving early\n");
res = -1;
goto done;
}
if (!send_http_request(mem_ctx, ev_ctx, http_info, response_size, &status)) {
DBG_ERR("Failure\n");
res = -1;
goto done;
}
res = 0;
done:
TALLOC_FREE(mem_ctx);
return res;
}