101 lines
4.1 KiB
C#
101 lines
4.1 KiB
C#
// Copyright (c) .NET Foundation. All rights reserved.
|
|
// Licensed under the Apache License, Version 2.0. See License.txt in the project root for license information.
|
|
|
|
#if NETCOREAPP2_2
|
|
|
|
using System;
|
|
using System.Net;
|
|
using System.Net.Http;
|
|
using System.Net.Security;
|
|
using System.Runtime.InteropServices;
|
|
using System.Security.Cryptography.X509Certificates;
|
|
using System.Threading.Tasks;
|
|
using Microsoft.AspNetCore.Hosting;
|
|
using Microsoft.AspNetCore.Http;
|
|
using Microsoft.AspNetCore.Server.Kestrel.Core;
|
|
using Microsoft.AspNetCore.Server.Kestrel.Core.Features;
|
|
using Microsoft.AspNetCore.Testing;
|
|
using Microsoft.AspNetCore.Testing.xunit;
|
|
using Microsoft.Extensions.Logging.Testing;
|
|
using Xunit;
|
|
|
|
namespace Microsoft.AspNetCore.Server.Kestrel.FunctionalTests.Http2
|
|
{
|
|
[OSSkipCondition(OperatingSystems.MacOSX, SkipReason = "Missing SslStream ALPN support: https://github.com/dotnet/corefx/issues/30492")]
|
|
[OSSkipCondition(OperatingSystems.Linux, SkipReason = "Curl requires a custom install to support HTTP/2, see https://askubuntu.com/questions/884899/how-do-i-install-curl-with-http2-support")]
|
|
[MinimumOSVersion(OperatingSystems.Windows, WindowsVersions.Win10)]
|
|
public class HandshakeTests : LoggedTest
|
|
{
|
|
private static X509Certificate2 _x509Certificate2 = TestResources.GetTestCertificate();
|
|
|
|
public HttpClient Client { get; set; }
|
|
|
|
public HandshakeTests()
|
|
{
|
|
if (RuntimeInformation.IsOSPlatform(OSPlatform.Windows))
|
|
{
|
|
// We don't want the default SocketsHttpHandler, it doesn't support HTTP/2 yet.
|
|
Client = new HttpClient(new WinHttpHandler
|
|
{
|
|
ServerCertificateValidationCallback = HttpClientHandler.DangerousAcceptAnyServerCertificateValidator
|
|
});
|
|
}
|
|
}
|
|
|
|
[ConditionalFact]
|
|
public async Task TlsAlpnHandshakeSelectsHttp2From1and2()
|
|
{
|
|
using (var server = new TestServer(context =>
|
|
{
|
|
var tlsFeature = context.Features.Get<ITlsApplicationProtocolFeature>();
|
|
Assert.NotNull(tlsFeature);
|
|
Assert.True(SslApplicationProtocol.Http2.Protocol.Span.SequenceEqual(tlsFeature.ApplicationProtocol.Span),
|
|
"ALPN: " + tlsFeature.ApplicationProtocol.Length);
|
|
|
|
return context.Response.WriteAsync("hello world " + context.Request.Protocol);
|
|
}, new TestServiceContext(LoggerFactory),
|
|
kestrelOptions =>
|
|
{
|
|
kestrelOptions.Listen(IPAddress.Loopback, 0, listenOptions =>
|
|
{
|
|
listenOptions.Protocols = HttpProtocols.Http1AndHttp2;
|
|
listenOptions.UseHttps(_x509Certificate2);
|
|
});
|
|
}))
|
|
{
|
|
var result = await Client.GetStringAsync($"https://localhost:{server.Port}/");
|
|
Assert.Equal("hello world HTTP/2", result);
|
|
}
|
|
}
|
|
|
|
[ConditionalFact]
|
|
public async Task TlsAlpnHandshakeSelectsHttp2()
|
|
{
|
|
using (var server = new TestServer(context =>
|
|
{
|
|
var tlsFeature = context.Features.Get<ITlsApplicationProtocolFeature>();
|
|
Assert.NotNull(tlsFeature);
|
|
Assert.True(SslApplicationProtocol.Http2.Protocol.Span.SequenceEqual(tlsFeature.ApplicationProtocol.Span),
|
|
"ALPN: " + tlsFeature.ApplicationProtocol.Length);
|
|
|
|
return context.Response.WriteAsync("hello world " + context.Request.Protocol);
|
|
}, new TestServiceContext(LoggerFactory),
|
|
kestrelOptions =>
|
|
{
|
|
kestrelOptions.Listen(IPAddress.Loopback, 0, listenOptions =>
|
|
{
|
|
listenOptions.Protocols = HttpProtocols.Http2;
|
|
listenOptions.UseHttps(_x509Certificate2);
|
|
});
|
|
}))
|
|
{
|
|
var result = await Client.GetStringAsync($"https://localhost:{server.Port}/");
|
|
Assert.Equal("hello world HTTP/2", result);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#elif NET461 // No ALPN support
|
|
#else
|
|
#error TFMs need updating
|
|
#endif |