haproxy/reg-tests/converter/secure_memcmp.vtc
Christopher Faulet 0dc70ab799 REGTESTS: fix the race conditions in secure_memcmp.vtc
In the same way than for normalize_uri.vtc, a "Connection: close" header is
added to all responses to avoid any connection reuse. This should avoid any
"HTTP header incomplete" errors.
2022-03-01 11:24:31 +01:00

144 lines
3.3 KiB
Plaintext

varnishtest "secure_memcmp converter Test"
#REQUIRE_VERSION=2.2
#REQUIRE_OPTION=OPENSSL
feature ignore_unknown_macro
server s1 {
rxreq
txresp -hdr "Connection: close"
} -repeat 4 -start
server s2 {
rxreq
txresp -hdr "Connection: close"
} -repeat 7 -start
haproxy h1 -conf {
global
# WT: limit false-positives causing "HTTP header incomplete" due to
# idle server connections being randomly used and randomly expiring
# under us.
tune.idle-pool.shared off
defaults
mode http
timeout connect "${HAPROXY_TEST_TIMEOUT-5s}"
timeout client "${HAPROXY_TEST_TIMEOUT-5s}"
timeout server "${HAPROXY_TEST_TIMEOUT-5s}"
frontend fe
# This frontend matches two base64 encoded values and does not need to
# handle null bytes.
bind "fd@${fe}"
#### requests
http-request set-var(txn.hash) req.hdr(hash)
http-request set-var(txn.raw) req.hdr(raw)
acl is_match var(txn.raw),sha1,base64,secure_memcmp(txn.hash)
http-response set-header Match true if is_match
http-response set-header Match false if !is_match
default_backend be
frontend fe2
# This frontend matches two binary values, needing to handle null
# bytes.
bind "fd@${fe2}"
#### requests
http-request set-var(txn.hash) req.hdr(hash),b64dec
http-request set-var(txn.raw) req.hdr(raw)
acl is_match var(txn.raw),sha1,secure_memcmp(txn.hash)
http-response set-header Match true if is_match
http-response set-header Match false if !is_match
default_backend be2
backend be
server s1 ${s1_addr}:${s1_port}
backend be2
server s2 ${s2_addr}:${s2_port}
} -start
client c1 -connect ${h1_fe_sock} {
txreq -url "/" \
-hdr "Raw: 1" \
-hdr "Hash: NWoZK3kTsExUV00Ywo1G5jlUKKs="
rxresp
expect resp.status == 200
expect resp.http.match == "true"
txreq -url "/" \
-hdr "Raw: 2" \
-hdr "Hash: 2kuSN7rMzfGcB2DKt67EqDWQELA="
rxresp
expect resp.status == 200
expect resp.http.match == "true"
txreq -url "/" \
-hdr "Raw: 2" \
-hdr "Hash: 2kuSN7rMzfGcB2DKt67EqDWQELX="
rxresp
expect resp.status == 200
expect resp.http.match == "false"
txreq -url "/" \
-hdr "Raw: 3" \
-hdr "Hash: 2kuSN7rMzfGcB2DKt67EqDWQELA="
rxresp
expect resp.status == 200
expect resp.http.match == "false"
} -run
client c2 -connect ${h1_fe2_sock} {
txreq -url "/" \
-hdr "Raw: 1" \
-hdr "Hash: NWoZK3kTsExUV00Ywo1G5jlUKKs="
rxresp
expect resp.status == 200
expect resp.http.match == "true"
txreq -url "/" \
-hdr "Raw: 2" \
-hdr "Hash: 2kuSN7rMzfGcB2DKt67EqDWQELA="
rxresp
expect resp.status == 200
expect resp.http.match == "true"
txreq -url "/" \
-hdr "Raw: 2" \
-hdr "Hash: 2kuSN7rMzfGcB2DKt67EqDWQELX="
rxresp
expect resp.status == 200
expect resp.http.match == "false"
txreq -url "/" \
-hdr "Raw: 3" \
-hdr "Hash: 2kuSN7rMzfGcB2DKt67EqDWQELA="
rxresp
expect resp.status == 200
expect resp.http.match == "false"
# Test for values with leading nullbytes.
txreq -url "/" \
-hdr "Raw: 6132845" \
-hdr "Hash: AAAAVaeL9nNcSok1j6sd40EEw8s="
rxresp
expect resp.status == 200
expect resp.http.match == "true"
txreq -url "/" \
-hdr "Raw: 49177200" \
-hdr "Hash: AAAA9GLglTNv2JoMv2n/w9Xadhc="
rxresp
expect resp.status == 200
expect resp.http.match == "true"
txreq -url "/" \
-hdr "Raw: 6132845" \
-hdr "Hash: AAAA9GLglTNv2JoMv2n/w9Xadhc="
rxresp
expect resp.status == 200
expect resp.http.match == "false"
} -run