blob: 0e44092876b6a41214b0c41f4f1d4c7175b8d641 [file] [log] [blame]
// Copyright 2019 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
// This file is reponsible for the masque_client binary. It allows testing
// our MASQUE client code by connecting to a MASQUE proxy and then sending
// HTTP/3 requests to web servers tunnelled over that MASQUE connection.
// e.g.: masque_client $PROXY_HOST:$PROXY_PORT $URL1 $URL2
#include <memory>
#include "absl/strings/string_view.h"
#include "net/third_party/quiche/src/quic/core/quic_server_id.h"
#include "net/third_party/quiche/src/quic/masque/masque_client_tools.h"
#include "net/third_party/quiche/src/quic/masque/masque_encapsulated_epoll_client.h"
#include "net/third_party/quiche/src/quic/masque/masque_epoll_client.h"
#include "net/third_party/quiche/src/quic/masque/masque_utils.h"
#include "net/third_party/quiche/src/quic/platform/api/quic_default_proof_providers.h"
#include "net/third_party/quiche/src/quic/platform/api/quic_flags.h"
#include "net/third_party/quiche/src/quic/platform/api/quic_socket_address.h"
#include "net/third_party/quiche/src/quic/platform/api/quic_system_event_loop.h"
#include "net/third_party/quiche/src/quic/tools/fake_proof_verifier.h"
#include "net/third_party/quiche/src/quic/tools/quic_url.h"
#include "net/third_party/quiche/src/common/platform/api/quiche_str_cat.h"
#include "net/third_party/quiche/src/common/platform/api/quiche_text_utils.h"
DEFINE_QUIC_COMMAND_LINE_FLAG(bool,
disable_certificate_verification,
false,
"If true, don't verify the server certificate.");
namespace quic {
namespace {
int RunMasqueClient(int argc, char* argv[]) {
QuicSystemEventLoop event_loop("masque_client");
const char* usage = "Usage: masque_client [options] <url>";
// The first non-flag argument is the MASQUE server. All subsequent ones are
// interpreted as URLs to fetch via the MASQUE server.
std::vector<std::string> urls = QuicParseCommandLineFlags(usage, argc, argv);
if (urls.empty()) {
QuicPrintCommandLineFlagHelp(usage);
return 1;
}
const bool disable_certificate_verification =
GetQuicFlag(FLAGS_disable_certificate_verification);
QuicEpollServer epoll_server;
QuicUrl masque_url(urls[0], "https");
if (masque_url.host().empty()) {
masque_url = QuicUrl(quiche::QuicheStrCat("https://", urls[0]), "https");
}
if (masque_url.host().empty()) {
QUIC_LOG(ERROR) << "Failed to parse MASQUE server address " << urls[0];
return 1;
}
std::unique_ptr<ProofVerifier> proof_verifier;
if (disable_certificate_verification) {
proof_verifier = std::make_unique<FakeProofVerifier>();
} else {
proof_verifier = CreateDefaultProofVerifier(masque_url.host());
}
std::unique_ptr<MasqueEpollClient> masque_client =
MasqueEpollClient::Create(masque_url.host(), masque_url.port(),
&epoll_server, std::move(proof_verifier));
if (masque_client == nullptr) {
return 1;
}
std::cerr << "MASQUE is connected " << masque_client->connection_id()
<< std::endl;
for (size_t i = 1; i < urls.size(); ++i) {
if (!tools::SendEncapsulatedMasqueRequest(
masque_client.get(), &epoll_server, urls[i],
disable_certificate_verification)) {
return 1;
}
}
return 0;
}
} // namespace
} // namespace quic
int main(int argc, char* argv[]) {
return quic::RunMasqueClient(argc, argv);
}