226 lines
7.4 KiB
Groovy
226 lines
7.4 KiB
Groovy
/*
|
|
* Copyright The OpenTelemetry Authors
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
import io.netty.bootstrap.Bootstrap
|
|
import io.netty.buffer.Unpooled
|
|
import io.netty.channel.Channel
|
|
import io.netty.channel.ChannelInitializer
|
|
import io.netty.channel.ChannelPipeline
|
|
import io.netty.channel.EventLoopGroup
|
|
import io.netty.channel.nio.NioEventLoopGroup
|
|
import io.netty.channel.socket.SocketChannel
|
|
import io.netty.channel.socket.nio.NioSocketChannel
|
|
import io.netty.handler.codec.http.DefaultFullHttpRequest
|
|
import io.netty.handler.codec.http.HttpClientCodec
|
|
import io.netty.handler.codec.http.HttpHeaderNames
|
|
import io.netty.handler.codec.http.HttpMethod
|
|
import io.netty.handler.codec.http.HttpVersion
|
|
import io.netty.handler.ssl.SslContext
|
|
import io.netty.handler.ssl.SslContextBuilder
|
|
import io.netty.handler.ssl.SslHandler
|
|
import io.opentelemetry.instrumentation.test.AgentInstrumentationSpecification
|
|
import io.opentelemetry.instrumentation.testing.junit.http.HttpClientTestServer
|
|
import io.opentelemetry.semconv.trace.attributes.SemanticAttributes
|
|
import spock.lang.Shared
|
|
|
|
import javax.net.ssl.SSLEngine
|
|
import javax.net.ssl.SSLHandshakeException
|
|
import java.util.concurrent.CompletableFuture
|
|
import java.util.concurrent.ExecutionException
|
|
import java.util.concurrent.TimeUnit
|
|
|
|
import static io.opentelemetry.api.trace.SpanKind.CLIENT
|
|
import static io.opentelemetry.api.trace.SpanKind.INTERNAL
|
|
import static io.opentelemetry.api.trace.SpanKind.SERVER
|
|
import static io.opentelemetry.api.trace.StatusCode.ERROR
|
|
import static io.opentelemetry.semconv.trace.attributes.SemanticAttributes.NetTransportValues.IP_TCP
|
|
|
|
class Netty41ClientSslTest extends AgentInstrumentationSpecification {
|
|
|
|
@Shared
|
|
HttpClientTestServer server
|
|
@Shared
|
|
EventLoopGroup eventLoopGroup
|
|
|
|
def setupSpec() {
|
|
server = new HttpClientTestServer(openTelemetry)
|
|
server.start()
|
|
eventLoopGroup = new NioEventLoopGroup()
|
|
}
|
|
|
|
def cleanupSpec() {
|
|
server.stop().get(10, TimeUnit.SECONDS)
|
|
eventLoopGroup.shutdownGracefully().sync()
|
|
}
|
|
|
|
def "should fail SSL handshake"() {
|
|
given:
|
|
def bootstrap = createBootstrap(eventLoopGroup, ["SSLv3"])
|
|
|
|
def uri = server.resolveHttpsAddress("/success")
|
|
def request = new DefaultFullHttpRequest(HttpVersion.HTTP_1_1, HttpMethod.GET, uri.toString(), Unpooled.EMPTY_BUFFER)
|
|
request.headers().set(HttpHeaderNames.HOST, uri.host)
|
|
|
|
when:
|
|
Channel channel = null
|
|
runWithSpan("parent") {
|
|
channel = bootstrap.connect(uri.host, uri.port).sync().channel()
|
|
def result = new CompletableFuture<Integer>()
|
|
channel.pipeline().addLast(new ClientHandler(result))
|
|
channel.writeAndFlush(request).get(10, TimeUnit.SECONDS)
|
|
result.get(10, TimeUnit.SECONDS)
|
|
}
|
|
|
|
then:
|
|
Throwable thrownException = thrown()
|
|
if (thrownException instanceof ExecutionException) {
|
|
thrownException = thrownException.cause
|
|
}
|
|
|
|
assertTraces(1) {
|
|
trace(0, 4) {
|
|
span(0) {
|
|
name "parent"
|
|
status ERROR
|
|
errorEvent(thrownException.class, thrownException.message)
|
|
}
|
|
span(1) {
|
|
name "RESOLVE"
|
|
kind INTERNAL
|
|
childOf span(0)
|
|
attributes {
|
|
"${SemanticAttributes.NET_TRANSPORT.key}" IP_TCP
|
|
"${SemanticAttributes.NET_PEER_NAME.key}" uri.host
|
|
"${SemanticAttributes.NET_PEER_PORT.key}" uri.port
|
|
}
|
|
}
|
|
span(2) {
|
|
name "CONNECT"
|
|
kind INTERNAL
|
|
childOf span(0)
|
|
attributes {
|
|
"${SemanticAttributes.NET_TRANSPORT.key}" IP_TCP
|
|
"${SemanticAttributes.NET_PEER_NAME.key}" uri.host
|
|
"${SemanticAttributes.NET_PEER_PORT.key}" uri.port
|
|
"${SemanticAttributes.NET_PEER_IP.key}" { it == null || it == "127.0.0.1" }
|
|
}
|
|
}
|
|
span(3) {
|
|
name "SSL handshake"
|
|
kind INTERNAL
|
|
childOf span(0)
|
|
status ERROR
|
|
// netty swallows the exception, it doesn't make any sense to hard-code the message
|
|
errorEventWithAnyMessage(SSLHandshakeException)
|
|
attributes {
|
|
"${SemanticAttributes.NET_TRANSPORT.key}" IP_TCP
|
|
"${SemanticAttributes.NET_PEER_NAME.key}" uri.host
|
|
"${SemanticAttributes.NET_PEER_PORT.key}" uri.port
|
|
"${SemanticAttributes.NET_PEER_IP.key}" { it == null || it == "127.0.0.1" }
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
cleanup:
|
|
channel?.close()?.sync()
|
|
}
|
|
|
|
def "should successfully establish SSL handshake"() {
|
|
given:
|
|
def bootstrap = createBootstrap(eventLoopGroup)
|
|
|
|
def uri = server.resolveHttpsAddress("/success")
|
|
def request = new DefaultFullHttpRequest(HttpVersion.HTTP_1_1, HttpMethod.GET, uri.toString(), Unpooled.EMPTY_BUFFER)
|
|
request.headers().set(HttpHeaderNames.HOST, uri.host)
|
|
|
|
when:
|
|
Channel channel = null
|
|
runWithSpan("parent") {
|
|
channel = bootstrap.connect(uri.host, uri.port).sync().channel()
|
|
def result = new CompletableFuture<Integer>()
|
|
channel.pipeline().addLast(new ClientHandler(result))
|
|
channel.writeAndFlush(request).get(10, TimeUnit.SECONDS)
|
|
result.get(10, TimeUnit.SECONDS)
|
|
}
|
|
|
|
then:
|
|
assertTraces(1) {
|
|
trace(0, 6) {
|
|
span(0) {
|
|
name "parent"
|
|
}
|
|
span(1) {
|
|
name "RESOLVE"
|
|
kind INTERNAL
|
|
childOf span(0)
|
|
attributes {
|
|
"${SemanticAttributes.NET_TRANSPORT.key}" IP_TCP
|
|
"${SemanticAttributes.NET_PEER_NAME.key}" uri.host
|
|
"${SemanticAttributes.NET_PEER_PORT.key}" uri.port
|
|
}
|
|
}
|
|
span(2) {
|
|
name "CONNECT"
|
|
kind INTERNAL
|
|
childOf span(0)
|
|
attributes {
|
|
"${SemanticAttributes.NET_TRANSPORT.key}" IP_TCP
|
|
"${SemanticAttributes.NET_PEER_NAME.key}" uri.host
|
|
"${SemanticAttributes.NET_PEER_PORT.key}" uri.port
|
|
"${SemanticAttributes.NET_PEER_IP.key}" { it == null || it == "127.0.0.1" }
|
|
}
|
|
}
|
|
span(3) {
|
|
name "SSL handshake"
|
|
kind INTERNAL
|
|
childOf span(0)
|
|
attributes {
|
|
"${SemanticAttributes.NET_TRANSPORT.key}" IP_TCP
|
|
"${SemanticAttributes.NET_PEER_NAME.key}" uri.host
|
|
"${SemanticAttributes.NET_PEER_PORT.key}" uri.port
|
|
"${SemanticAttributes.NET_PEER_IP.key}" { it == null || it == "127.0.0.1" }
|
|
}
|
|
}
|
|
span(4) {
|
|
name "HTTP GET"
|
|
kind CLIENT
|
|
childOf(span(0))
|
|
}
|
|
span(5) {
|
|
name "test-http-server"
|
|
kind SERVER
|
|
childOf(span(4))
|
|
}
|
|
}
|
|
}
|
|
|
|
cleanup:
|
|
channel?.close()?.sync()
|
|
}
|
|
|
|
private static Bootstrap createBootstrap(EventLoopGroup eventLoopGroup, List<String> enabledProtocols = null) {
|
|
def bootstrap = new Bootstrap()
|
|
bootstrap.group(eventLoopGroup)
|
|
.channel(NioSocketChannel)
|
|
.handler(new ChannelInitializer<SocketChannel>() {
|
|
@Override
|
|
protected void initChannel(SocketChannel socketChannel) throws Exception {
|
|
ChannelPipeline pipeline = socketChannel.pipeline()
|
|
|
|
SslContext sslContext = SslContextBuilder.forClient().build()
|
|
SSLEngine sslEngine = sslContext.newEngine(socketChannel.alloc())
|
|
if (enabledProtocols != null) {
|
|
sslEngine.setEnabledProtocols(enabledProtocols as String[])
|
|
}
|
|
pipeline.addLast(new SslHandler(sslEngine))
|
|
|
|
pipeline.addLast(new HttpClientCodec())
|
|
}
|
|
})
|
|
bootstrap
|
|
}
|
|
}
|