|
| 1 | +// Copyright (c) 2025, the Dart project authors. Please see the AUTHORS file |
| 2 | +// for details. All rights reserved. Use of this source code is governed by a |
| 3 | +// BSD-style license that can be found in the LICENSE file. |
| 4 | + |
| 5 | +import 'dart:async'; |
| 6 | +import 'dart:convert'; |
| 7 | +import 'dart:io'; |
| 8 | + |
| 9 | +import "package:expect/async_helper.dart"; |
| 10 | +import "package:expect/expect.dart"; |
| 11 | + |
| 12 | +class Server { |
| 13 | + late HttpServer server; |
| 14 | + |
| 15 | + Future<Server> start() async { |
| 16 | + server = await HttpServer.bind(InternetAddress.loopbackIPv4.address, 0); |
| 17 | + server.listen((request) { |
| 18 | + final response = request.response; |
| 19 | + |
| 20 | + // WARNING: this authenticate header is malformed because of missing |
| 21 | + // commas between the arguments |
| 22 | + if (request.uri.path == "/malformedAuthenticate") { |
| 23 | + response.statusCode = HttpStatus.unauthorized; |
| 24 | + response.headers.set( |
| 25 | + HttpHeaders.wwwAuthenticateHeader, |
| 26 | + "Bearer realm=\"realm\" error=\"invalid_token\"", |
| 27 | + ); |
| 28 | + response.close(); |
| 29 | + return; |
| 30 | + } |
| 31 | + |
| 32 | + // NOTE: see RFC6750 section 3 regarding the authenticate response header |
| 33 | + // field: |
| 34 | + // https://www.rfc-editor.org/rfc/rfc6750.html#section-3 |
| 35 | + if (request.headers[HttpHeaders.authorizationHeader] != null) { |
| 36 | + final token = base64.encode(utf8.encode(request.uri.path.substring(1))); |
| 37 | + Expect.equals( |
| 38 | + 1, |
| 39 | + request.headers[HttpHeaders.authorizationHeader]!.length, |
| 40 | + ); |
| 41 | + final authorizationHeaderParts = request |
| 42 | + .headers[HttpHeaders.authorizationHeader]![0] |
| 43 | + .split(" "); |
| 44 | + Expect.equals("Bearer", authorizationHeaderParts[0]); |
| 45 | + if (token != authorizationHeaderParts[1]) { |
| 46 | + response.statusCode = HttpStatus.unauthorized; |
| 47 | + response.headers.set( |
| 48 | + HttpHeaders.wwwAuthenticateHeader, |
| 49 | + "Bearer realm=\"realm\", error=\"invalid_token\"", |
| 50 | + ); |
| 51 | + } |
| 52 | + } else { |
| 53 | + response.statusCode = HttpStatus.unauthorized; |
| 54 | + response.headers.set( |
| 55 | + HttpHeaders.wwwAuthenticateHeader, |
| 56 | + "Bearer realm=\"realm\"", |
| 57 | + ); |
| 58 | + } |
| 59 | + response.close(); |
| 60 | + }); |
| 61 | + return this; |
| 62 | + } |
| 63 | + |
| 64 | + void shutdown() { |
| 65 | + server.close(); |
| 66 | + } |
| 67 | + |
| 68 | + String get host => server.address.address; |
| 69 | + |
| 70 | + int get port => server.port; |
| 71 | +} |
| 72 | + |
| 73 | +void testCreateValidBearerTokens() { |
| 74 | + HttpClientBearerCredentials("977ce44bc56dc5000c9d2c329e682547"); |
| 75 | + HttpClientBearerCredentials("dGVzdHRlc3R0ZXN0dGVzdA=="); |
| 76 | + HttpClientBearerCredentials("mF_9.B5f-4.1JqM"); |
| 77 | +} |
| 78 | + |
| 79 | +void testCreateInvalidBearerTokens() { |
| 80 | + Expect.throws(() => HttpClientBearerCredentials("#(&%)")); |
| 81 | + Expect.throws(() => HttpClientBearerCredentials("áéîöü")); |
| 82 | + Expect.throws(() => HttpClientBearerCredentials("あいうえお")); |
| 83 | + Expect.throws(() => HttpClientBearerCredentials(" ")); |
| 84 | +} |
| 85 | + |
| 86 | +void testBearerWithoutCredentials() async { |
| 87 | + final server = await Server().start(); |
| 88 | + final client = HttpClient(); |
| 89 | + |
| 90 | + Future makeRequest(Uri url) async { |
| 91 | + final request = await client.getUrl(url); |
| 92 | + final response = await request.close(); |
| 93 | + Expect.equals(HttpStatus.unauthorized, response.statusCode); |
| 94 | + return response.drain(); |
| 95 | + } |
| 96 | + |
| 97 | + await Future.wait([ |
| 98 | + for (int i = 0; i < 5; i++) ...[ |
| 99 | + makeRequest(Uri.parse("http://${server.host}:${server.port}/test$i")), |
| 100 | + ], |
| 101 | + ]); |
| 102 | + |
| 103 | + server.shutdown(); |
| 104 | + client.close(); |
| 105 | +} |
| 106 | + |
| 107 | +void testBearerWithCredentials() async { |
| 108 | + final server = await Server().start(); |
| 109 | + final client = HttpClient(); |
| 110 | + |
| 111 | + Future makeRequest(Uri url) async { |
| 112 | + final request = await client.getUrl(url); |
| 113 | + final response = await request.close(); |
| 114 | + Expect.equals(HttpStatus.ok, response.statusCode); |
| 115 | + return response.drain(); |
| 116 | + } |
| 117 | + |
| 118 | + for (int i = 0; i < 5; i++) { |
| 119 | + final token = base64.encode(utf8.encode("test$i")); |
| 120 | + client.addCredentials( |
| 121 | + Uri.parse("http://${server.host}:${server.port}/test$i"), |
| 122 | + "realm", |
| 123 | + HttpClientBearerCredentials(token), |
| 124 | + ); |
| 125 | + } |
| 126 | + |
| 127 | + await Future.wait([ |
| 128 | + for (int i = 0; i < 5; i++) ...[ |
| 129 | + makeRequest(Uri.parse("http://${server.host}:${server.port}/test$i")), |
| 130 | + ], |
| 131 | + ]); |
| 132 | + |
| 133 | + server.shutdown(); |
| 134 | + client.close(); |
| 135 | +} |
| 136 | + |
| 137 | +void testBearerWithAuthenticateCallback() async { |
| 138 | + final server = await Server().start(); |
| 139 | + final client = HttpClient(); |
| 140 | + |
| 141 | + final callbacks = <String>{}; |
| 142 | + |
| 143 | + client.authenticate = (url, scheme, realm) async { |
| 144 | + Expect.equals("Bearer", scheme); |
| 145 | + Expect.equals("realm", realm); |
| 146 | + callbacks.add(url.path.substring(1)); |
| 147 | + String token = base64.encode(utf8.encode(url.path.substring(1))); |
| 148 | + client.addCredentials(url, realm!, HttpClientBearerCredentials(token)); |
| 149 | + return true; |
| 150 | + }; |
| 151 | + |
| 152 | + Future makeRequest(Uri url) async { |
| 153 | + final request = await client.getUrl(url); |
| 154 | + final response = await request.close(); |
| 155 | + Expect.equals(HttpStatus.ok, response.statusCode); |
| 156 | + return response.drain(); |
| 157 | + } |
| 158 | + |
| 159 | + await Future.wait([ |
| 160 | + for (int i = 0; i < 5; i++) ...[ |
| 161 | + makeRequest(Uri.parse("http://${server.host}:${server.port}/test$i")), |
| 162 | + ], |
| 163 | + ]); |
| 164 | + |
| 165 | + // assert that all authenticate callbacks have actually been called |
| 166 | + Expect.setEquals({for (int i = 0; i < 5; i++) "test$i"}, callbacks); |
| 167 | + |
| 168 | + server.shutdown(); |
| 169 | + client.close(); |
| 170 | +} |
| 171 | + |
| 172 | +void testMalformedAuthenticateHeaderWithoutCredentials() async { |
| 173 | + final server = await Server().start(); |
| 174 | + final client = HttpClient(); |
| 175 | + final uri = Uri.parse( |
| 176 | + "http://${server.host}:${server.port}/malformedAuthenticate", |
| 177 | + ); |
| 178 | + |
| 179 | + // the request should resolve normally if no authentication is configured |
| 180 | + final request = await client.getUrl(uri); |
| 181 | + final response = await request.close(); |
| 182 | + |
| 183 | + server.shutdown(); |
| 184 | + client.close(); |
| 185 | +} |
| 186 | + |
| 187 | +void testMalformedAuthenticateHeaderWithCredentials() async { |
| 188 | + final server = await Server().start(); |
| 189 | + final client = HttpClient(); |
| 190 | + final uri = Uri.parse( |
| 191 | + "http://${server.host}:${server.port}/malformedAuthenticate", |
| 192 | + ); |
| 193 | + final token = base64.encode(utf8.encode("test")); |
| 194 | + |
| 195 | + // the request should throw an exception if credentials have been added |
| 196 | + client.addCredentials(uri, "realm", HttpClientBearerCredentials(token)); |
| 197 | + await asyncExpectThrows<HttpException>( |
| 198 | + Future(() async { |
| 199 | + final request = await client.getUrl(uri); |
| 200 | + final response = await request.close(); |
| 201 | + }), |
| 202 | + ); |
| 203 | + |
| 204 | + server.shutdown(); |
| 205 | + client.close(); |
| 206 | +} |
| 207 | + |
| 208 | +void testMalformedAuthenticateHeaderWithAuthenticateCallback() async { |
| 209 | + final server = await Server().start(); |
| 210 | + final client = HttpClient(); |
| 211 | + final uri = Uri.parse( |
| 212 | + "http://${server.host}:${server.port}/malformedAuthenticate", |
| 213 | + ); |
| 214 | + |
| 215 | + // the request should throw an exception if the authenticate handler is set |
| 216 | + client.authenticate = (url, scheme, realm) async => false; |
| 217 | + await asyncExpectThrows<HttpException>( |
| 218 | + Future(() async { |
| 219 | + final request = await client.getUrl(uri); |
| 220 | + final response = await request.close(); |
| 221 | + }), |
| 222 | + ); |
| 223 | + |
| 224 | + server.shutdown(); |
| 225 | + client.close(); |
| 226 | +} |
| 227 | + |
| 228 | +void testLocalServerBearer() async { |
| 229 | + final client = HttpClient(); |
| 230 | + |
| 231 | + client.authenticate = (url, scheme, realm) async { |
| 232 | + final token = base64.encode(utf8.encode("test")); |
| 233 | + client.addCredentials( |
| 234 | + Uri.parse("http://127.0.0.1/bearer"), |
| 235 | + "test", |
| 236 | + HttpClientBearerCredentials(token), |
| 237 | + ); |
| 238 | + return true; |
| 239 | + }; |
| 240 | + |
| 241 | + final request = await client.getUrl( |
| 242 | + Uri.parse("http://127.0.0.1/bearer/test"), |
| 243 | + ); |
| 244 | + final response = await request.close(); |
| 245 | + Expect.equals(HttpStatus.ok, response.statusCode); |
| 246 | + await response.drain(); |
| 247 | + |
| 248 | + client.close(); |
| 249 | +} |
| 250 | + |
| 251 | +main() { |
| 252 | + testCreateValidBearerTokens(); |
| 253 | + testCreateInvalidBearerTokens(); |
| 254 | + testBearerWithoutCredentials(); |
| 255 | + testBearerWithCredentials(); |
| 256 | + testBearerWithAuthenticateCallback(); |
| 257 | + testMalformedAuthenticateHeaderWithoutCredentials(); |
| 258 | + testMalformedAuthenticateHeaderWithCredentials(); |
| 259 | + testMalformedAuthenticateHeaderWithAuthenticateCallback(); |
| 260 | + // These tests are not normally run. They can be used for locally |
| 261 | + // testing with another web server (e.g. Apache). |
| 262 | + // testLocalServerBearer(); |
| 263 | +} |
0 commit comments