malformed_host_override_test.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124
  1. // +build !windows
  2. package hack
  3. import (
  4. "bytes"
  5. "io"
  6. "net"
  7. "strings"
  8. "testing"
  9. )
  10. type bufConn struct {
  11. net.Conn
  12. buf *bytes.Buffer
  13. }
  14. func (bc *bufConn) Read(b []byte) (int, error) {
  15. return bc.buf.Read(b)
  16. }
  17. func TestHeaderOverrideHack(t *testing.T) {
  18. tests := [][2][]byte{
  19. {
  20. []byte("GET /foo\nHost: /var/run/docker.sock\nUser-Agent: Docker\r\n\r\n"),
  21. []byte("GET /foo\nHost: \r\nConnection: close\r\nUser-Agent: Docker\r\n\r\n"),
  22. },
  23. {
  24. []byte("GET /foo\nHost: /var/run/docker.sock\nUser-Agent: Docker\nFoo: Bar\r\n"),
  25. []byte("GET /foo\nHost: \r\nConnection: close\r\nUser-Agent: Docker\nFoo: Bar\r\n"),
  26. },
  27. {
  28. []byte("GET /foo\nHost: /var/run/docker.sock\nUser-Agent: Docker\r\n\r\ntest something!"),
  29. []byte("GET /foo\nHost: \r\nConnection: close\r\nUser-Agent: Docker\r\n\r\ntest something!"),
  30. },
  31. {
  32. []byte("GET /foo\nHost: /var/run/docker.sock\nUser-Agent: Docker\r\n\r\ntest something! " + strings.Repeat("test", 15000)),
  33. []byte("GET /foo\nHost: \r\nConnection: close\r\nUser-Agent: Docker\r\n\r\ntest something! " + strings.Repeat("test", 15000)),
  34. },
  35. {
  36. []byte("GET /foo\nFoo: Bar\nHost: /var/run/docker.sock\nUser-Agent: Docker\r\n\r\n"),
  37. []byte("GET /foo\nFoo: Bar\nHost: /var/run/docker.sock\nUser-Agent: Docker\r\n\r\n"),
  38. },
  39. }
  40. // Test for https://github.com/docker/docker/issues/23045
  41. h0 := "GET /foo\nUser-Agent: Docker\r\n\r\n"
  42. h0 = h0 + strings.Repeat("a", 4096-len(h0)-1) + "\n"
  43. tests = append(tests, [2][]byte{[]byte(h0), []byte(h0)})
  44. for _, pair := range tests {
  45. read := make([]byte, 4096)
  46. client := &bufConn{
  47. buf: bytes.NewBuffer(pair[0]),
  48. }
  49. l := MalformedHostHeaderOverrideConn{client, true}
  50. n, err := l.Read(read)
  51. if err != nil && err != io.EOF {
  52. t.Fatalf("read: %d - %d, err: %v\n%s", n, len(pair[0]), err, string(read[:n]))
  53. }
  54. if !bytes.Equal(read[:n], pair[1][:n]) {
  55. t.Fatalf("\n%s\n%s\n", read[:n], pair[1][:n])
  56. }
  57. }
  58. }
  59. func BenchmarkWithHack(b *testing.B) {
  60. client, srv := net.Pipe()
  61. done := make(chan struct{})
  62. req := []byte("GET /foo\nHost: /var/run/docker.sock\nUser-Agent: Docker\n")
  63. read := make([]byte, 4096)
  64. b.SetBytes(int64(len(req) * 30))
  65. l := MalformedHostHeaderOverrideConn{client, true}
  66. go func() {
  67. for {
  68. if _, err := srv.Write(req); err != nil {
  69. srv.Close()
  70. break
  71. }
  72. l.first = true // make sure each subsequent run uses the hack parsing
  73. }
  74. close(done)
  75. }()
  76. for i := 0; i < b.N; i++ {
  77. for i := 0; i < 30; i++ {
  78. if n, err := l.Read(read); err != nil && err != io.EOF {
  79. b.Fatalf("read: %d - %d, err: %v\n%s", n, len(req), err, string(read[:n]))
  80. }
  81. }
  82. }
  83. l.Close()
  84. <-done
  85. }
  86. func BenchmarkNoHack(b *testing.B) {
  87. client, srv := net.Pipe()
  88. done := make(chan struct{})
  89. req := []byte("GET /foo\nHost: /var/run/docker.sock\nUser-Agent: Docker\n")
  90. read := make([]byte, 4096)
  91. b.SetBytes(int64(len(req) * 30))
  92. go func() {
  93. for {
  94. if _, err := srv.Write(req); err != nil {
  95. srv.Close()
  96. break
  97. }
  98. }
  99. close(done)
  100. }()
  101. for i := 0; i < b.N; i++ {
  102. for i := 0; i < 30; i++ {
  103. if _, err := client.Read(read); err != nil && err != io.EOF {
  104. b.Fatal(err)
  105. }
  106. }
  107. }
  108. client.Close()
  109. <-done
  110. }