imaginary/source_http_test.go

486 lines
14 KiB
Go
Executable File

package main
import (
"io/ioutil"
"net/http"
"net/http/httptest"
"net/url"
"testing"
)
const fixtureImage = "testdata/large.jpg"
const fixture1024Bytes = "testdata/1024bytes"
func TestHttpImageSource(t *testing.T) {
var body []byte
var err error
buf, _ := ioutil.ReadFile(fixtureImage)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
_, _ = w.Write(buf)
}))
defer ts.Close()
source := NewHTTPImageSource(&SourceConfig{})
fakeHandler := func(w http.ResponseWriter, r *http.Request) {
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
body, err = source.GetImage(r)
if err != nil {
t.Fatalf("Error while reading the body: %s", err)
}
_, _ = w.Write(body)
}
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url="+ts.URL, nil)
w := httptest.NewRecorder()
fakeHandler(w, r)
if len(body) != len(buf) {
t.Error("Invalid response body")
}
}
func TestHttpImageSourceAllowedOrigin(t *testing.T) {
buf, _ := ioutil.ReadFile(fixtureImage)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
_, _ = w.Write(buf)
}))
defer ts.Close()
origin, _ := url.Parse(ts.URL)
origins := []*url.URL{origin}
source := NewHTTPImageSource(&SourceConfig{AllowedOrigins: origins})
fakeHandler := func(w http.ResponseWriter, r *http.Request) {
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
body, err := source.GetImage(r)
if err != nil {
t.Fatalf("Error while reading the body: %s", err)
}
_, _ = w.Write(body)
if len(body) != len(buf) {
t.Error("Invalid response body length")
}
}
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url="+ts.URL, nil)
w := httptest.NewRecorder()
fakeHandler(w, r)
}
func TestHttpImageSourceNotAllowedOrigin(t *testing.T) {
origin, _ := url.Parse("http://foo")
origins := []*url.URL{origin}
source := NewHTTPImageSource(&SourceConfig{AllowedOrigins: origins})
fakeHandler := func(w http.ResponseWriter, r *http.Request) {
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
_, err := source.GetImage(r)
if err == nil {
t.Fatal("Error cannot be empty")
}
if err.Error() != "not allowed remote URL origin: bar.com" {
t.Fatalf("Invalid error message: %s", err)
}
}
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url=http://bar.com", nil)
w := httptest.NewRecorder()
fakeHandler(w, r)
}
func TestHttpImageSourceForwardAuthHeader(t *testing.T) {
cases := []string{
"X-Forward-Authorization",
"Authorization",
}
for _, header := range cases {
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url=http://bar.com", nil)
r.Header.Set(header, "foobar")
source := &HTTPImageSource{&SourceConfig{AuthForwarding: true}}
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
oreq := &http.Request{Header: make(http.Header)}
source.setAuthorizationHeader(oreq, r)
if oreq.Header.Get("Authorization") != "foobar" {
t.Fatal("Missmatch Authorization header")
}
}
}
func TestHttpImageSourceForwardHeaders(t *testing.T) {
cases := []string{
"X-Custom",
"X-Token",
}
for _, header := range cases {
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url=http://bar.com", nil)
r.Header.Set(header, "foobar")
source := &HTTPImageSource{&SourceConfig{ForwardHeaders: cases}}
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
oreq := &http.Request{Header: make(http.Header)}
source.setForwardHeaders(oreq, r)
if oreq.Header.Get(header) != "foobar" {
t.Fatal("Missmatch custom header")
}
}
}
func TestHttpImageSourceNotForwardHeaders(t *testing.T) {
cases := []string{
"X-Custom",
"X-Token",
}
testURL := createURL("http://bar.com", t)
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url="+testURL.String(), nil)
r.Header.Set("Not-Forward", "foobar")
source := &HTTPImageSource{&SourceConfig{ForwardHeaders: cases}}
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
oreq := newHTTPRequest(source, r, http.MethodGet, testURL)
if oreq.Header.Get("Not-Forward") != "" {
t.Fatal("Forwarded unspecified header")
}
}
func TestHttpImageSourceForwardedHeadersNotOverride(t *testing.T) {
cases := []string{
"Authorization",
"X-Custom",
}
testURL := createURL("http://bar.com", t)
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url="+testURL.String(), nil)
r.Header.Set("Authorization", "foobar")
source := &HTTPImageSource{&SourceConfig{Authorization: "ValidAPIKey", ForwardHeaders: cases}}
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
oreq := newHTTPRequest(source, r, http.MethodGet, testURL)
if oreq.Header.Get("Authorization") != "ValidAPIKey" {
t.Fatal("Authorization header override")
}
}
func TestHttpImageSourceCaseSensitivityInForwardedHeaders(t *testing.T) {
cases := []string{
"X-Custom",
"X-Token",
}
testURL := createURL("http://bar.com", t)
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url="+testURL.String(), nil)
r.Header.Set("x-custom", "foobar")
source := &HTTPImageSource{&SourceConfig{ForwardHeaders: cases}}
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
oreq := newHTTPRequest(source, r, http.MethodGet, testURL)
if oreq.Header.Get("X-Custom") == "" {
t.Fatal("Case sensitive not working on forwarded headers")
}
}
func TestHttpImageSourceEmptyForwardedHeaders(t *testing.T) {
var cases []string
testURL := createURL("http://bar.com", t)
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url="+testURL.String(), nil)
source := &HTTPImageSource{&SourceConfig{ForwardHeaders: cases}}
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
if len(source.Config.ForwardHeaders) != 0 {
t.Log(source.Config.ForwardHeaders)
t.Fatal("Setted empty custom header")
}
oreq := newHTTPRequest(source, r, http.MethodGet, testURL)
if oreq == nil {
t.Fatal("Error creating request using empty custom headers")
}
}
func TestHttpImageSourceError(t *testing.T) {
var err error
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
w.WriteHeader(404)
_, _ = w.Write([]byte("Not found"))
}))
defer ts.Close()
source := NewHTTPImageSource(&SourceConfig{})
fakeHandler := func(w http.ResponseWriter, r *http.Request) {
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
_, err = source.GetImage(r)
if err == nil {
t.Fatalf("Server response should not be valid: %s", err)
}
}
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url="+ts.URL, nil)
w := httptest.NewRecorder()
fakeHandler(w, r)
}
func TestHttpImageSourceExceedsMaximumAllowedLength(t *testing.T) {
var body []byte
var err error
buf, _ := ioutil.ReadFile(fixture1024Bytes)
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
_, _ = w.Write(buf)
}))
defer ts.Close()
source := NewHTTPImageSource(&SourceConfig{
MaxAllowedSize: 1023,
})
fakeHandler := func(w http.ResponseWriter, r *http.Request) {
if !source.Matches(r) {
t.Fatal("Cannot match the request")
}
body, err = source.GetImage(r)
if err == nil {
t.Fatalf("It should not allow a request to image exceeding maximum allowed size: %s", err)
}
_, _ = w.Write(body)
}
r, _ := http.NewRequest(http.MethodGet, "http://foo/bar?url="+ts.URL, nil)
w := httptest.NewRecorder()
fakeHandler(w, r)
}
func TestShouldRestrictOrigin(t *testing.T) {
plainOrigins := parseOrigins(
"https://example.org",
)
wildCardOrigins := parseOrigins(
"https://localhost,https://*.example.org,https://some.s3.bucket.on.aws.org,https://*.s3.bucket.on.aws.org",
)
withPathOrigins := parseOrigins(
"https://localhost/foo/bar/,https://*.example.org/foo/,https://some.s3.bucket.on.aws.org/my/bucket/," +
"https://*.s3.bucket.on.aws.org/my/bucket/,https://no-leading-path-slash.example.org/assets",
)
with2Buckets := parseOrigins(
"https://some.s3.bucket.on.aws.org/my/bucket1/,https://some.s3.bucket.on.aws.org/my/bucket2/",
)
pathWildCard := parseOrigins(
"https://some.s3.bucket.on.aws.org/my-bucket-name*",
)
t.Run("Plain origin", func(t *testing.T) {
testURL := createURL("https://example.org/logo.jpg", t)
if shouldRestrictOrigin(testURL, plainOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, plainOrigins)
}
})
t.Run("Wildcard origin, plain URL", func(t *testing.T) {
testURL := createURL("https://example.org/logo.jpg", t)
if shouldRestrictOrigin(testURL, wildCardOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, wildCardOrigins)
}
})
t.Run("Wildcard origin, sub domain URL", func(t *testing.T) {
testURL := createURL("https://node-42.example.org/logo.jpg", t)
if shouldRestrictOrigin(testURL, wildCardOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, wildCardOrigins)
}
})
t.Run("Wildcard origin, sub-sub domain URL", func(t *testing.T) {
testURL := createURL("https://n.s3.bucket.on.aws.org/our/bucket/logo.jpg", t)
if shouldRestrictOrigin(testURL, wildCardOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, wildCardOrigins)
}
})
t.Run("Wildcard origin, incorrect domain URL", func(t *testing.T) {
testURL := createURL("https://myexample.org/logo.jpg", t)
if !shouldRestrictOrigin(testURL, plainOrigins) {
t.Errorf("Expected '%s' to not be allowed with plain origins: %+v", testURL, plainOrigins)
}
if !shouldRestrictOrigin(testURL, wildCardOrigins) {
t.Errorf("Expected '%s' to not be allowed with wildcard origins: %+v", testURL, wildCardOrigins)
}
})
t.Run("Loopback origin with path, correct URL", func(t *testing.T) {
testURL := createURL("https://localhost/foo/bar/logo.png", t)
if shouldRestrictOrigin(testURL, withPathOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, withPathOrigins)
}
})
t.Run("Wildcard origin with path, correct URL", func(t *testing.T) {
testURL := createURL("https://our.company.s3.bucket.on.aws.org/my/bucket/logo.gif", t)
if shouldRestrictOrigin(testURL, withPathOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, withPathOrigins)
}
})
t.Run("Wildcard origin with partial path, correct URL", func(t *testing.T) {
testURL := createURL("https://our.company.s3.bucket.on.aws.org/my/bucket/a/b/c/d/e/logo.gif", t)
if shouldRestrictOrigin(testURL, withPathOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, withPathOrigins)
}
})
t.Run("Wildcard origin with partial path, correct URL double slashes", func(t *testing.T) {
testURL := createURL("https://static.example.org/foo//a//b//c/d/e/logo.webp", t)
if shouldRestrictOrigin(testURL, withPathOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, withPathOrigins)
}
})
t.Run("Wildcard origin with path missing trailing slash, correct URL", func(t *testing.T) {
testURL := createURL("https://no-leading-path-slash.example.org/assets/logo.webp", t)
if shouldRestrictOrigin(testURL, parseOrigins("https://*.example.org/assets")) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, withPathOrigins)
}
})
t.Run("Loopback origin with path, incorrect URL", func(t *testing.T) {
testURL := createURL("https://localhost/wrong/logo.png", t)
if !shouldRestrictOrigin(testURL, withPathOrigins) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, withPathOrigins)
}
})
t.Run("2 buckets, bucket1", func(t *testing.T) {
testURL := createURL("https://some.s3.bucket.on.aws.org/my/bucket1/logo.jpg", t)
if shouldRestrictOrigin(testURL, with2Buckets) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, with2Buckets)
}
})
t.Run("2 buckets, bucket2", func(t *testing.T) {
testURL := createURL("https://some.s3.bucket.on.aws.org/my/bucket2/logo.jpg", t)
if shouldRestrictOrigin(testURL, with2Buckets) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, with2Buckets)
}
})
t.Run("Path wildcard", func(t *testing.T) {
testURL := createURL("https://some.s3.bucket.on.aws.org/my-bucket-name/logo.jpg", t)
testURLFail := createURL("https://some.s3.bucket.on.aws.org/my-other-bucket-name/logo.jpg", t)
if shouldRestrictOrigin(testURL, pathWildCard) {
t.Errorf("Expected '%s' to be allowed with origins: %+v", testURL, pathWildCard)
}
if !shouldRestrictOrigin(testURLFail, pathWildCard) {
t.Errorf("Expected '%s' to be restricted with origins: %+v", testURLFail, pathWildCard)
}
})
}
func TestParseOrigins(t *testing.T) {
t.Run("Appending a trailing slash on paths", func(t *testing.T) {
origins := parseOrigins("http://foo.example.org/assets")
if origins[0].Path != "/assets/" {
t.Errorf("Expected the path to have a trailing /, instead it was: %q", origins[0].Path)
}
})
t.Run("Paths should not receive multiple trailing slashes", func(t *testing.T) {
origins := parseOrigins("http://foo.example.org/assets/")
if origins[0].Path != "/assets/" {
t.Errorf("Expected the path to have a single trailing /, instead it was: %q", origins[0].Path)
}
})
t.Run("Empty paths are fine", func(t *testing.T) {
origins := parseOrigins("http://foo.example.org")
if origins[0].Path != "" {
t.Errorf("Expected the path to remain empty, instead it was: %q", origins[0].Path)
}
})
t.Run("Root paths are fine", func(t *testing.T) {
origins := parseOrigins("http://foo.example.org/")
if origins[0].Path != "/" {
t.Errorf("Expected the path to remain a slash, instead it was: %q", origins[0].Path)
}
})
}
func createURL(urlStr string, t *testing.T) *url.URL {
t.Helper()
result, err := url.Parse(urlStr)
if err != nil {
t.Error("Test setup failed, unable to parse test URL")
}
return result
}