mirror of
https://github.com/emikulic/darkhttpd.git
synced 2023-08-10 21:13:08 +03:00
Custom headers with the CLI option --header
(#28)
These changes add a command-line option --header, e.g. --header 'Access-Control-Allow-Origin: *'. Basic tests are included for this option. When accepting the argument, a very simple sanitization is made, the string is required to contain ": ", and can’t contain a '\n' character. These checks are far from what is required to truly validate a HTTP header, but will at least detect simple mistakes and forbid the abuse of having arguments that include more than one header, or, worse, that include a body for the response (after "\r\n\r\n"). This should also close the Issue #16 and PR #27, I think, since CORS functionality can be obtained by specifying a custom header.
This commit is contained in:
@ -120,6 +120,22 @@ runtests() {
|
||||
kill $PID
|
||||
wait $PID
|
||||
|
||||
echo "===> run --header tests"
|
||||
# Wrong flags:
|
||||
./a.out . --header >/dev/null 2>/dev/null
|
||||
./a.out . --header missing_colon >/dev/null 2>/dev/null
|
||||
./a.out . --header $'X-Header: Abusive\r\n\r\nBody' >/dev/null 2>/dev/null
|
||||
# Correct flags:
|
||||
./a.out $DIR --port $PORT \
|
||||
--header 'X-Header-A: First Value' --header 'X-Header-B: Second Value' \
|
||||
--forward example.com http://www.example.com \
|
||||
>>test.out.stdout 2>>test.out.stderr &
|
||||
PID=$!
|
||||
kill -0 $PID || exit 1
|
||||
python3 test_custom_headers.py
|
||||
kill $PID
|
||||
wait $PID
|
||||
|
||||
echo "===> run --forward-https tests"
|
||||
./a.out $DIR --port $PORT --forward-https \
|
||||
>>test.out.stdout 2>>test.out.stderr &
|
||||
|
95
devel/test_custom_headers.py
Normal file
95
devel/test_custom_headers.py
Normal file
@ -0,0 +1,95 @@
|
||||
#!/usr/bin/env python3
|
||||
# This is run by the "run-tests" script.
|
||||
import unittest
|
||||
import os
|
||||
from test import WWWROOT, TestHelper, parse, random_bytes
|
||||
|
||||
class TestCustomHeaders(TestHelper):
|
||||
def setUp(self):
|
||||
self.datalen = 2345
|
||||
self.data = random_bytes(self.datalen)
|
||||
self.url = '/data.jpeg'
|
||||
self.not_found = '/not_found.jpeg'
|
||||
self.fn = WWWROOT + self.url
|
||||
with open(self.fn, 'wb') as f:
|
||||
f.write(self.data)
|
||||
|
||||
def tearDown(self):
|
||||
os.unlink(self.fn)
|
||||
|
||||
def test_custom_headers(self):
|
||||
resp = self.get(self.url)
|
||||
status, hdrs, body = parse(resp)
|
||||
self.assertContains(status, '200 OK')
|
||||
self.assertEqual(hdrs["Accept-Ranges"], "bytes")
|
||||
self.assertEqual(hdrs["Content-Length"], str(self.datalen))
|
||||
self.assertEqual(hdrs["Content-Type"], "image/jpeg")
|
||||
self.assertEqual(hdrs["X-Header-A"], "First Value")
|
||||
self.assertEqual(hdrs["X-Header-B"], "Second Value")
|
||||
self.assertContains(hdrs["Server"], "darkhttpd/")
|
||||
assert body == self.data, [self.url, resp, status, hdrs, body]
|
||||
self.assertEqual(body, self.data)
|
||||
|
||||
def test_custom_headers_not_found(self):
|
||||
resp = self.get(self.not_found)
|
||||
status, hdrs, body = parse(resp)
|
||||
self.assertContains(status, '404 Not Found')
|
||||
self.assertContains(hdrs["Server"], "darkhttpd/")
|
||||
self.assertEqual(hdrs["X-Header-A"], "First Value")
|
||||
self.assertEqual(hdrs["X-Header-B"], "Second Value")
|
||||
|
||||
def test_custom_headers_listing(self):
|
||||
resp = self.get("/")
|
||||
status, hdrs, body = parse(resp)
|
||||
self.assertContains(status, '200 OK')
|
||||
self.assertContains(body, '<a href="data.jpeg">data.jpeg</a>')
|
||||
self.assertContains(body, 'Generated by darkhttpd/')
|
||||
self.assertEqual(hdrs["Accept-Ranges"], "bytes")
|
||||
self.assertEqual(hdrs["Content-Type"], "text/html; charset=UTF-8")
|
||||
self.assertEqual(hdrs["X-Header-A"], "First Value")
|
||||
self.assertEqual(hdrs["X-Header-B"], "Second Value")
|
||||
self.assertContains(hdrs["Server"], "darkhttpd/")
|
||||
|
||||
def test_custom_headers_range(self):
|
||||
resp = self.get(self.url, req_hdrs={'Range': 'bytes=0-99'})
|
||||
status, hdrs, body = parse(resp)
|
||||
self.assertContains(status, '206 Partial Content')
|
||||
self.assertEqual(hdrs["Accept-Ranges"], "bytes")
|
||||
self.assertEqual(hdrs["Content-Length"], '100')
|
||||
self.assertEqual(hdrs["Content-Type"], "image/jpeg")
|
||||
self.assertEqual(hdrs["X-Header-A"], "First Value")
|
||||
self.assertEqual(hdrs["X-Header-B"], "Second Value")
|
||||
self.assertContains(hdrs["Server"], "darkhttpd/")
|
||||
assert body == self.data[0:100], [self.url, resp, status, hdrs, body]
|
||||
self.assertEqual(body, self.data[0:100])
|
||||
|
||||
def test_custom_header_if_modified_since(self):
|
||||
resp1 = self.get(self.url, method="HEAD")
|
||||
status, hdrs, body = parse(resp1)
|
||||
lastmod = hdrs["Last-Modified"]
|
||||
|
||||
resp2 = self.get(self.url, method="GET", req_hdrs=
|
||||
{"If-Modified-Since": lastmod })
|
||||
status, hdrs, body = parse(resp2)
|
||||
self.assertContains(status, "304 Not Modified")
|
||||
self.assertEqual(hdrs["Accept-Ranges"], "bytes")
|
||||
self.assertFalse("Last-Modified" in hdrs)
|
||||
self.assertFalse("Content-Length" in hdrs)
|
||||
self.assertFalse("Content-Type" in hdrs)
|
||||
self.assertEqual(hdrs["X-Header-A"], "First Value")
|
||||
self.assertEqual(hdrs["X-Header-B"], "Second Value")
|
||||
|
||||
def test_custom_header_forward(self):
|
||||
resp = self.get('/', req_hdrs={'Host': 'example.com'})
|
||||
status, hdrs, body = parse(resp)
|
||||
self.assertEqual(hdrs["X-Header-A"], "First Value")
|
||||
self.assertEqual(hdrs["X-Header-B"], "Second Value")
|
||||
self.assertContains(status, "301 Moved Permanently")
|
||||
expect = "http://www.example.com/"
|
||||
self.assertEqual(hdrs["Location"], expect)
|
||||
self.assertContains(body, expect)
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main()
|
||||
|
||||
# vim:set ts=4 sw=4 et:
|
Reference in New Issue
Block a user