| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <cmath> |
| #include <utility> |
| #include <vector> |
| |
| #include "base/bind.h" |
| #include "base/bind_helpers.h" |
| #include "base/compiler_specific.h" |
| #include "base/files/file_util.h" |
| #include "base/files/scoped_temp_dir.h" |
| #include "base/run_loop.h" |
| #include "base/strings/string_piece.h" |
| #include "base/test/metrics/histogram_tester.h" |
| #include "base/test/test_file_util.h" |
| #include "base/threading/thread_task_runner_handle.h" |
| #include "net/base/auth.h" |
| #include "net/base/chunked_upload_data_stream.h" |
| #include "net/base/completion_once_callback.h" |
| #include "net/base/elements_upload_data_stream.h" |
| #include "net/base/proxy_delegate.h" |
| #include "net/base/proxy_server.h" |
| #include "net/base/request_priority.h" |
| #include "net/base/test_proxy_delegate.h" |
| #include "net/base/upload_bytes_element_reader.h" |
| #include "net/base/upload_file_element_reader.h" |
| #include "net/dns/mock_host_resolver.h" |
| #include "net/http/http_auth_scheme.h" |
| #include "net/http/http_network_session.h" |
| #include "net/http/http_network_session_peer.h" |
| #include "net/http/http_network_transaction.h" |
| #include "net/http/http_response_info.h" |
| #include "net/http/http_server_properties.h" |
| #include "net/http/http_transaction_test_util.h" |
| #include "net/log/net_log_event_type.h" |
| #include "net/log/net_log_with_source.h" |
| #include "net/log/test_net_log.h" |
| #include "net/log/test_net_log_entry.h" |
| #include "net/log/test_net_log_util.h" |
| #include "net/socket/client_socket_pool_base.h" |
| #include "net/socket/next_proto.h" |
| #include "net/socket/socket_tag.h" |
| #include "net/spdy/buffered_spdy_framer.h" |
| #include "net/spdy/spdy_http_stream.h" |
| #include "net/spdy/spdy_http_utils.h" |
| #include "net/spdy/spdy_session.h" |
| #include "net/spdy/spdy_session_pool.h" |
| #include "net/spdy/spdy_test_util_common.h" |
| #include "net/ssl/ssl_connection_status_flags.h" |
| #include "net/test/cert_test_util.h" |
| #include "net/test/gtest_util.h" |
| #include "net/test/test_data_directory.h" |
| #include "net/test/test_with_scoped_task_environment.h" |
| #include "net/third_party/quiche/src/spdy/core/spdy_protocol.h" |
| #include "net/third_party/quiche/src/spdy/core/spdy_test_utils.h" |
| #include "net/traffic_annotation/network_traffic_annotation_test_helper.h" |
| #include "net/url_request/url_request_test_util.h" |
| #include "net/websockets/websocket_test_util.h" |
| #include "starboard/common/string.h" |
| #include "starboard/memory.h" |
| #include "testing/gmock/include/gmock/gmock.h" |
| #include "testing/platform_test.h" |
| |
| using net::test::IsError; |
| using net::test::IsOk; |
| |
| //----------------------------------------------------------------------------- |
| |
| namespace net { |
| |
| namespace { |
| |
| using testing::Each; |
| using testing::Eq; |
| |
| const int32_t kBufferSize = SpdyHttpStream::kRequestBodyBufferSize; |
| |
| } // namespace |
| |
| const char kPushedUrl[] = "https://www.example.org/foo.dat"; |
| |
| class SpdyNetworkTransactionTest : public TestWithScopedTaskEnvironment { |
| protected: |
| SpdyNetworkTransactionTest() |
| : default_url_(kDefaultUrl), |
| host_port_pair_(HostPortPair::FromURL(default_url_)) {} |
| |
| ~SpdyNetworkTransactionTest() override { |
| // UploadDataStream may post a deletion task back to the message loop on |
| // destruction. |
| upload_data_stream_.reset(); |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| void SetUp() override { |
| request_.method = "GET"; |
| request_.url = GURL(kDefaultUrl); |
| request_.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); |
| } |
| |
| struct TransactionHelperResult { |
| int rv; |
| std::string status_line; |
| std::string response_data; |
| HttpResponseInfo response_info; |
| }; |
| |
| // A helper class that handles all the initial npn/ssl setup. |
| class NormalSpdyTransactionHelper { |
| public: |
| NormalSpdyTransactionHelper( |
| const HttpRequestInfo& request, |
| RequestPriority priority, |
| const NetLogWithSource& log, |
| std::unique_ptr<SpdySessionDependencies> session_deps) |
| : request_(request), |
| priority_(priority), |
| session_deps_(session_deps.get() == nullptr |
| ? std::make_unique<SpdySessionDependencies>() |
| : std::move(session_deps)), |
| log_(log) { |
| session_deps_->net_log = log.net_log(); |
| session_ = |
| SpdySessionDependencies::SpdyCreateSession(session_deps_.get()); |
| } |
| |
| ~NormalSpdyTransactionHelper() { |
| // Any test which doesn't close the socket by sending it an EOF will |
| // have a valid session left open, which leaks the entire session pool. |
| // This is just fine - in fact, some of our tests intentionally do this |
| // so that we can check consistency of the SpdySessionPool as the test |
| // finishes. If we had put an EOF on the socket, the SpdySession would |
| // have closed and we wouldn't be able to check the consistency. |
| |
| // Forcefully close existing sessions here. |
| session()->spdy_session_pool()->CloseAllSessions(); |
| } |
| |
| void RunPreTestSetup() { |
| // We're now ready to use SSL-npn SPDY. |
| trans_ = |
| std::make_unique<HttpNetworkTransaction>(priority_, session_.get()); |
| } |
| |
| // Start the transaction, read some data, finish. |
| void RunDefaultTest() { |
| if (!StartDefaultTest()) |
| return; |
| FinishDefaultTest(); |
| } |
| |
| bool StartDefaultTest() { |
| output_.rv = trans_->Start(&request_, callback_.callback(), log_); |
| |
| // We expect an IO Pending or some sort of error. |
| EXPECT_LT(output_.rv, 0); |
| return output_.rv == ERR_IO_PENDING; |
| } |
| |
| void FinishDefaultTest() { |
| output_.rv = callback_.WaitForResult(); |
| // Finish async network reads/writes. |
| base::RunLoop().RunUntilIdle(); |
| if (output_.rv != OK) { |
| session_->spdy_session_pool()->CloseCurrentSessions(ERR_ABORTED); |
| return; |
| } |
| |
| // Verify responses. |
| const HttpResponseInfo* response = trans_->GetResponseInfo(); |
| ASSERT_TRUE(response); |
| ASSERT_TRUE(response->headers); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2, |
| response->connection_info); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_EQ("127.0.0.1", response->socket_address.host()); |
| EXPECT_EQ(443, response->socket_address.port()); |
| output_.status_line = response->headers->GetStatusLine(); |
| output_.response_info = *response; // Make a copy so we can verify. |
| output_.rv = ReadTransaction(trans_.get(), &output_.response_data); |
| } |
| |
| void FinishDefaultTestWithoutVerification() { |
| output_.rv = callback_.WaitForResult(); |
| // Finish async network reads/writes. |
| base::RunLoop().RunUntilIdle(); |
| if (output_.rv != OK) |
| session_->spdy_session_pool()->CloseCurrentSessions(ERR_ABORTED); |
| } |
| |
| void WaitForCallbackToComplete() { output_.rv = callback_.WaitForResult(); } |
| |
| // Most tests will want to call this function. In particular, the MockReads |
| // should end with an empty read, and that read needs to be processed to |
| // ensure proper deletion of the spdy_session_pool. |
| void VerifyDataConsumed() { |
| for (const SocketDataProvider* provider : data_vector_) { |
| EXPECT_TRUE(provider->AllReadDataConsumed()); |
| EXPECT_TRUE(provider->AllWriteDataConsumed()); |
| } |
| } |
| |
| // Occasionally a test will expect to error out before certain reads are |
| // processed. In that case we want to explicitly ensure that the reads were |
| // not processed. |
| void VerifyDataNotConsumed() { |
| for (const SocketDataProvider* provider : data_vector_) { |
| EXPECT_FALSE(provider->AllReadDataConsumed()); |
| EXPECT_FALSE(provider->AllWriteDataConsumed()); |
| } |
| } |
| |
| void RunToCompletion(SocketDataProvider* data) { |
| RunPreTestSetup(); |
| AddData(data); |
| RunDefaultTest(); |
| VerifyDataConsumed(); |
| } |
| |
| void RunToCompletionWithSSLData( |
| SocketDataProvider* data, |
| std::unique_ptr<SSLSocketDataProvider> ssl_provider) { |
| RunPreTestSetup(); |
| AddDataWithSSLSocketDataProvider(data, std::move(ssl_provider)); |
| RunDefaultTest(); |
| VerifyDataConsumed(); |
| } |
| |
| void AddData(SocketDataProvider* data) { |
| auto ssl_provider = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| ssl_provider->ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| AddDataWithSSLSocketDataProvider(data, std::move(ssl_provider)); |
| } |
| |
| void AddDataWithSSLSocketDataProvider( |
| SocketDataProvider* data, |
| std::unique_ptr<SSLSocketDataProvider> ssl_provider) { |
| data_vector_.push_back(data); |
| if (ssl_provider->next_proto == kProtoUnknown) |
| ssl_provider->next_proto = kProtoHTTP2; |
| |
| session_deps_->socket_factory->AddSSLSocketDataProvider( |
| ssl_provider.get()); |
| ssl_vector_.push_back(std::move(ssl_provider)); |
| |
| session_deps_->socket_factory->AddSocketDataProvider(data); |
| } |
| |
| HttpNetworkTransaction* trans() { return trans_.get(); } |
| void ResetTrans() { trans_.reset(); } |
| const TransactionHelperResult& output() { return output_; } |
| HttpNetworkSession* session() const { return session_.get(); } |
| SpdySessionDependencies* session_deps() { return session_deps_.get(); } |
| |
| private: |
| typedef std::vector<SocketDataProvider*> DataVector; |
| typedef std::vector<std::unique_ptr<SSLSocketDataProvider>> SSLVector; |
| typedef std::vector<std::unique_ptr<SocketDataProvider>> AlternateVector; |
| const HttpRequestInfo request_; |
| const RequestPriority priority_; |
| std::unique_ptr<SpdySessionDependencies> session_deps_; |
| std::unique_ptr<HttpNetworkSession> session_; |
| TransactionHelperResult output_; |
| SSLVector ssl_vector_; |
| TestCompletionCallback callback_; |
| std::unique_ptr<HttpNetworkTransaction> trans_; |
| DataVector data_vector_; |
| const NetLogWithSource log_; |
| }; |
| |
| void ConnectStatusHelperWithExpectedStatus(const MockRead& status, |
| int expected_status); |
| |
| void ConnectStatusHelper(const MockRead& status); |
| |
| HttpRequestInfo CreateGetPushRequest() const WARN_UNUSED_RESULT { |
| HttpRequestInfo request; |
| request.method = "GET"; |
| request.url = GURL(kPushedUrl); |
| request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| return request; |
| } |
| |
| void UsePostRequest() { |
| ASSERT_FALSE(upload_data_stream_); |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| element_readers.push_back(std::make_unique<UploadBytesElementReader>( |
| kUploadData, kUploadDataSize)); |
| upload_data_stream_ = std::make_unique<ElementsUploadDataStream>( |
| std::move(element_readers), 0); |
| |
| request_.method = "POST"; |
| request_.upload_data_stream = upload_data_stream_.get(); |
| } |
| |
| void UseFilePostRequest() { |
| ASSERT_FALSE(upload_data_stream_); |
| base::FilePath file_path; |
| CHECK(base::CreateTemporaryFileInDir(temp_dir_.GetPath(), &file_path)); |
| CHECK_EQ(static_cast<int>(kUploadDataSize), |
| base::WriteFile(file_path, kUploadData, kUploadDataSize)); |
| |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| element_readers.push_back(std::make_unique<UploadFileElementReader>( |
| base::ThreadTaskRunnerHandle::Get().get(), file_path, 0, |
| kUploadDataSize, base::Time())); |
| upload_data_stream_ = std::make_unique<ElementsUploadDataStream>( |
| std::move(element_readers), 0); |
| |
| request_.method = "POST"; |
| request_.upload_data_stream = upload_data_stream_.get(); |
| request_.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| } |
| |
| #if !defined(STARBOARD) |
| // base::MakeFileUnreadable is not supported. |
| void UseUnreadableFilePostRequest() { |
| ASSERT_FALSE(upload_data_stream_); |
| base::FilePath file_path; |
| CHECK(base::CreateTemporaryFileInDir(temp_dir_.GetPath(), &file_path)); |
| CHECK_EQ(static_cast<int>(kUploadDataSize), |
| base::WriteFile(file_path, kUploadData, kUploadDataSize)); |
| CHECK(base::MakeFileUnreadable(file_path)); |
| |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| element_readers.push_back(std::make_unique<UploadFileElementReader>( |
| base::ThreadTaskRunnerHandle::Get().get(), file_path, 0, |
| kUploadDataSize, base::Time())); |
| upload_data_stream_ = std::make_unique<ElementsUploadDataStream>( |
| std::move(element_readers), 0); |
| |
| request_.method = "POST"; |
| request_.upload_data_stream = upload_data_stream_.get(); |
| } |
| #endif |
| |
| void UseComplexPostRequest() { |
| ASSERT_FALSE(upload_data_stream_); |
| const int kFileRangeOffset = 1; |
| const int kFileRangeLength = 3; |
| CHECK_LT(kFileRangeOffset + kFileRangeLength, kUploadDataSize); |
| |
| base::FilePath file_path; |
| CHECK(base::CreateTemporaryFileInDir(temp_dir_.GetPath(), &file_path)); |
| CHECK_EQ(static_cast<int>(kUploadDataSize), |
| base::WriteFile(file_path, kUploadData, kUploadDataSize)); |
| |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| element_readers.push_back(std::make_unique<UploadBytesElementReader>( |
| kUploadData, kFileRangeOffset)); |
| element_readers.push_back(std::make_unique<UploadFileElementReader>( |
| base::ThreadTaskRunnerHandle::Get().get(), file_path, kFileRangeOffset, |
| kFileRangeLength, base::Time())); |
| element_readers.push_back(std::make_unique<UploadBytesElementReader>( |
| kUploadData + kFileRangeOffset + kFileRangeLength, |
| kUploadDataSize - (kFileRangeOffset + kFileRangeLength))); |
| upload_data_stream_ = std::make_unique<ElementsUploadDataStream>( |
| std::move(element_readers), 0); |
| |
| request_.method = "POST"; |
| request_.upload_data_stream = upload_data_stream_.get(); |
| } |
| |
| void UseChunkedPostRequest() { |
| ASSERT_FALSE(upload_chunked_data_stream_); |
| upload_chunked_data_stream_ = std::make_unique<ChunkedUploadDataStream>(0); |
| request_.method = "POST"; |
| request_.upload_data_stream = upload_chunked_data_stream_.get(); |
| } |
| |
| // Read the result of a particular transaction, knowing that we've got |
| // multiple transactions in the read pipeline; so as we read, we may have |
| // to skip over data destined for other transactions while we consume |
| // the data for |trans|. |
| int ReadResult(HttpNetworkTransaction* trans, std::string* result) { |
| const int kSize = 3000; |
| |
| int bytes_read = 0; |
| scoped_refptr<IOBufferWithSize> buf = |
| base::MakeRefCounted<IOBufferWithSize>(kSize); |
| TestCompletionCallback callback; |
| while (true) { |
| int rv = trans->Read(buf.get(), kSize, callback.callback()); |
| if (rv == ERR_IO_PENDING) { |
| rv = callback.WaitForResult(); |
| } else if (rv <= 0) { |
| break; |
| } |
| result->append(buf->data(), rv); |
| bytes_read += rv; |
| } |
| return bytes_read; |
| } |
| |
| void VerifyStreamsClosed(const NormalSpdyTransactionHelper& helper) { |
| // This lengthy block is reaching into the pool to dig out the active |
| // session. Once we have the session, we verify that the streams are |
| // all closed and not leaked at this point. |
| SpdySessionKey key(HostPortPair::FromURL(request_.url), |
| ProxyServer::Direct(), PRIVACY_MODE_DISABLED, |
| SocketTag()); |
| HttpNetworkSession* session = helper.session(); |
| base::WeakPtr<SpdySession> spdy_session = |
| session->spdy_session_pool()->FindAvailableSession( |
| key, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| ASSERT_TRUE(spdy_session); |
| EXPECT_EQ(0u, num_active_streams(spdy_session)); |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session)); |
| } |
| |
| void RunServerPushTest(SequencedSocketData* data, |
| HttpResponseInfo* response, |
| HttpResponseInfo* push_response, |
| const std::string& expected) { |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| // Start the transaction with basic parameters. |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| |
| // Finish async network reads/writes. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Request the pushed path. |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo request = CreateGetPushRequest(); |
| rv = trans2.Start(&request, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| base::RunLoop().RunUntilIdle(); |
| |
| // The data for the pushed path may be coming in more than 1 frame. Compile |
| // the results into a single string. |
| |
| // Read the server push body. |
| std::string result2; |
| ReadResult(&trans2, &result2); |
| // Read the response body. |
| std::string result; |
| ReadResult(trans, &result); |
| |
| // Verify that we consumed all test data. |
| EXPECT_TRUE(data->AllReadDataConsumed()); |
| EXPECT_TRUE(data->AllWriteDataConsumed()); |
| |
| LoadTimingInfo load_timing_info; |
| EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); |
| EXPECT_TRUE(load_timing_info.push_start.is_null()); |
| EXPECT_TRUE(load_timing_info.push_end.is_null()); |
| |
| LoadTimingInfo load_timing_info2; |
| EXPECT_TRUE(trans2.GetLoadTimingInfo(&load_timing_info2)); |
| EXPECT_FALSE(load_timing_info2.push_start.is_null()); |
| EXPECT_FALSE(load_timing_info2.push_end.is_null()); |
| |
| // Verify that the received push data is same as the expected push data. |
| EXPECT_EQ(result2.compare(expected), 0) << "Received data: " |
| << result2 |
| << "||||| Expected data: " |
| << expected; |
| |
| // Verify the response HEADERS. |
| // Copy the response info, because trans goes away. |
| *response = *trans->GetResponseInfo(); |
| *push_response = *trans2.GetResponseInfo(); |
| |
| VerifyStreamsClosed(helper); |
| } |
| |
| void RunBrokenPushTest(SequencedSocketData* data, int expected_rv) { |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| // Start the transaction with basic parameters. |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| EXPECT_EQ(expected_rv, rv); |
| |
| // Finish async network reads/writes. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that we consumed all test data. |
| EXPECT_TRUE(data->AllReadDataConsumed()); |
| EXPECT_TRUE(data->AllWriteDataConsumed()); |
| |
| if (expected_rv == OK) { |
| // Expected main request to succeed, even if push failed. |
| HttpResponseInfo response = *trans->GetResponseInfo(); |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| } |
| } |
| |
| static void DeleteSessionCallback(NormalSpdyTransactionHelper* helper, |
| int result) { |
| helper->ResetTrans(); |
| } |
| |
| static void StartTransactionCallback(HttpNetworkSession* session, |
| GURL url, |
| NetLogWithSource log, |
| int result) { |
| HttpRequestInfo request; |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session); |
| TestCompletionCallback callback; |
| request.method = "GET"; |
| request.url = url; |
| request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| int rv = trans.Start(&request, callback.callback(), log); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| callback.WaitForResult(); |
| } |
| |
| ChunkedUploadDataStream* upload_chunked_data_stream() { |
| return upload_chunked_data_stream_.get(); |
| } |
| |
| size_t num_active_streams(base::WeakPtr<SpdySession> session) { |
| return session->active_streams_.size(); |
| } |
| |
| static size_t num_unclaimed_pushed_streams( |
| base::WeakPtr<SpdySession> session) { |
| return session->pool_->push_promise_index()->CountStreamsForSession( |
| session.get()); |
| } |
| |
| static bool has_unclaimed_pushed_stream_for_url( |
| base::WeakPtr<SpdySession> session, |
| const GURL& url) { |
| return session->pool_->push_promise_index()->FindStream( |
| url, session.get()) != kNoPushedStreamFound; |
| } |
| |
| static spdy::SpdyStreamId spdy_stream_hi_water_mark( |
| base::WeakPtr<SpdySession> session) { |
| return session->stream_hi_water_mark_; |
| } |
| |
| const GURL default_url_; |
| const HostPortPair host_port_pair_; |
| HttpRequestInfo request_; |
| SpdyTestUtil spdy_util_; |
| const NetLogWithSource log_; |
| |
| private: |
| std::unique_ptr<ChunkedUploadDataStream> upload_chunked_data_stream_; |
| std::unique_ptr<UploadDataStream> upload_data_stream_; |
| base::ScopedTempDir temp_dir_; |
| }; |
| |
| // Verify HttpNetworkTransaction constructor. |
| TEST_F(SpdyNetworkTransactionTest, Constructor) { |
| auto session_deps = std::make_unique<SpdySessionDependencies>(); |
| std::unique_ptr<HttpNetworkSession> session( |
| SpdySessionDependencies::SpdyCreateSession(session_deps.get())); |
| auto trans = |
| std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, Get) { |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, SetPriority) { |
| for (bool set_priority_before_starting_transaction : {true, false}) { |
| SpdyTestUtil spdy_test_util; |
| spdy::SpdySerializedFrame req( |
| spdy_test_util.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_test_util.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body( |
| spdy_test_util.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = {CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, HIGHEST, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| if (set_priority_before_starting_transaction) { |
| helper.trans()->SetPriority(LOWEST); |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| } else { |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| helper.trans()->SetPriority(LOWEST); |
| } |
| |
| helper.FinishDefaultTest(); |
| helper.VerifyDataConsumed(); |
| |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| } |
| |
| // Test that changing the request priority of an existing stream triggers |
| // sending PRIORITY frames in case there are multiple open streams and their |
| // relative priorities change. |
| TEST_F(SpdyNetworkTransactionTest, SetPriorityOnExistingStream) { |
| const char* kUrl2 = "https://www.example.org/bar"; |
| |
| spdy::SpdySerializedFrame req1( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, HIGHEST)); |
| spdy::SpdySerializedFrame req2(spdy_util_.ConstructSpdyGet(kUrl2, 3, MEDIUM)); |
| spdy::SpdySerializedFrame priority1( |
| spdy_util_.ConstructSpdyPriority(3, 0, MEDIUM, true)); |
| spdy::SpdySerializedFrame priority2( |
| spdy_util_.ConstructSpdyPriority(1, 3, LOWEST, true)); |
| MockWrite writes[] = {CreateMockWrite(req1, 0), CreateMockWrite(req2, 2), |
| CreateMockWrite(priority1, 4), |
| CreateMockWrite(priority2, 5)}; |
| |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| MockRead reads[] = {CreateMockRead(resp1, 1), CreateMockRead(resp2, 3), |
| CreateMockRead(body1, 6), CreateMockRead(body2, 7), |
| MockRead(ASYNC, 0, 8)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, HIGHEST, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| |
| // Open HTTP/2 connection and create first stream. |
| base::RunLoop().RunUntilIdle(); |
| |
| HttpNetworkTransaction trans2(MEDIUM, helper.session()); |
| HttpRequestInfo request2; |
| request2.url = GURL(kUrl2); |
| request2.method = "GET"; |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback2; |
| int rv = trans2.Start(&request2, callback2.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Create second stream. |
| base::RunLoop().RunUntilIdle(); |
| |
| // First request has HIGHEST priority, second request has MEDIUM priority. |
| // Changing the priority of the first request to LOWEST changes their order, |
| // and therefore triggers sending PRIORITY frames. |
| helper.trans()->SetPriority(LOWEST); |
| |
| helper.FinishDefaultTest(); |
| helper.VerifyDataConsumed(); |
| |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| |
| rv = callback2.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| const HttpResponseInfo* response2 = trans2.GetResponseInfo(); |
| ASSERT_TRUE(response2); |
| ASSERT_TRUE(response2->headers); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2, |
| response2->connection_info); |
| EXPECT_EQ("HTTP/1.1 200", response2->headers->GetStatusLine()); |
| } |
| |
| // Create two requests: a lower priority one first, then a higher priority one. |
| // Test that the second request gets sent out first. |
| TEST_F(SpdyNetworkTransactionTest, RequestsOrderedByPriority) { |
| const char* kUrl2 = "https://www.example.org/foo"; |
| |
| // First send second request on stream 1, then first request on stream 3. |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(kUrl2, 1, HIGHEST)); |
| spdy::SpdySerializedFrame req1( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOW)); |
| MockWrite writes[] = {CreateMockWrite(req2, 0), CreateMockWrite(req1, 1)}; |
| |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2( |
| spdy_util_.ConstructSpdyDataFrame(1, "stream 1", true)); |
| spdy::SpdySerializedFrame body1( |
| spdy_util_.ConstructSpdyDataFrame(3, "stream 3", true)); |
| MockRead reads[] = {CreateMockRead(resp2, 2), CreateMockRead(body2, 3), |
| CreateMockRead(resp1, 4), CreateMockRead(body1, 5), |
| MockRead(ASYNC, 0, 6)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, LOW, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| // Create HTTP/2 connection. This is necessary because starting the first |
| // transaction does not create the connection yet, so the second request |
| // could not use the same connection, whereas running the message loop after |
| // starting the first transaction would call Socket::Write() with the first |
| // HEADERS frame, so the second transaction could not get ahead of it. |
| SpdySessionKey key(HostPortPair("www.example.org", 443), |
| ProxyServer::Direct(), PRIVACY_MODE_DISABLED, SocketTag()); |
| auto spdy_session = CreateSpdySession(helper.session(), key, log_); |
| EXPECT_TRUE(spdy_session); |
| |
| // Start first transaction. |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| |
| // Start second transaction. |
| HttpNetworkTransaction trans2(HIGHEST, helper.session()); |
| HttpRequestInfo request2; |
| request2.url = GURL(kUrl2); |
| request2.method = "GET"; |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback2; |
| int rv = trans2.Start(&request2, callback2.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Complete first transaction and verify results. |
| helper.FinishDefaultTest(); |
| helper.VerifyDataConsumed(); |
| |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("stream 3", out.response_data); |
| |
| // Complete second transaction and verify results. |
| rv = callback2.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| const HttpResponseInfo* response2 = trans2.GetResponseInfo(); |
| ASSERT_TRUE(response2); |
| ASSERT_TRUE(response2->headers); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2, |
| response2->connection_info); |
| EXPECT_EQ("HTTP/1.1 200", response2->headers->GetStatusLine()); |
| std::string response_data; |
| ReadTransaction(&trans2, &response_data); |
| EXPECT_EQ("stream 1", response_data); |
| } |
| |
| // Test that already enqueued HEADERS frames are reordered if their relative |
| // priority changes. |
| TEST_F(SpdyNetworkTransactionTest, QueuedFramesReorderedOnPriorityChange) { |
| const char* kUrl2 = "https://www.example.org/foo"; |
| const char* kUrl3 = "https://www.example.org/bar"; |
| |
| spdy::SpdySerializedFrame req1( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, DEFAULT_PRIORITY)); |
| spdy::SpdySerializedFrame req3(spdy_util_.ConstructSpdyGet(kUrl3, 3, MEDIUM)); |
| spdy::SpdySerializedFrame req2(spdy_util_.ConstructSpdyGet(kUrl2, 5, LOWEST)); |
| MockWrite writes[] = {MockWrite(ASYNC, ERR_IO_PENDING, 0), |
| CreateMockWrite(req1, 1), CreateMockWrite(req3, 2), |
| CreateMockWrite(req2, 3)}; |
| |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame resp3( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 5)); |
| spdy::SpdySerializedFrame body1( |
| spdy_util_.ConstructSpdyDataFrame(1, "stream 1", true)); |
| spdy::SpdySerializedFrame body3( |
| spdy_util_.ConstructSpdyDataFrame(3, "stream 3", true)); |
| spdy::SpdySerializedFrame body2( |
| spdy_util_.ConstructSpdyDataFrame(5, "stream 5", true)); |
| MockRead reads[] = {CreateMockRead(resp1, 4), CreateMockRead(body1, 5), |
| CreateMockRead(resp3, 6), CreateMockRead(body3, 7), |
| CreateMockRead(resp2, 8), CreateMockRead(body2, 9), |
| MockRead(ASYNC, 0, 10)}; |
| |
| SequencedSocketData data(reads, writes); |
| // Priority of first request does not matter, because Socket::Write() will be |
| // called with its HEADERS frame before the other requests start. |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| |
| // Open HTTP/2 connection, create HEADERS frame for first request, and call |
| // Socket::Write() with that frame. After this, no other request can get |
| // ahead of the first one. |
| base::RunLoop().RunUntilIdle(); |
| |
| HttpNetworkTransaction trans2(HIGHEST, helper.session()); |
| HttpRequestInfo request2; |
| request2.url = GURL(kUrl2); |
| request2.method = "GET"; |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback2; |
| int rv = trans2.Start(&request2, callback2.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| HttpNetworkTransaction trans3(MEDIUM, helper.session()); |
| HttpRequestInfo request3; |
| request3.url = GURL(kUrl3); |
| request3.method = "GET"; |
| request3.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback3; |
| rv = trans3.Start(&request3, callback3.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Create HEADERS frames for second and third request and enqueue them in |
| // SpdyWriteQueue with their original priorities. Writing of the first |
| // HEADERS frame to the socked still has not completed. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Second request is of HIGHEST, third of MEDIUM priority. Changing second |
| // request to LOWEST changes their relative order. This should result in |
| // already enqueued frames being reordered within SpdyWriteQueue. |
| trans2.SetPriority(LOWEST); |
| |
| // Complete async write of the first HEADERS frame. |
| data.Resume(); |
| |
| helper.FinishDefaultTest(); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("stream 1", out.response_data); |
| |
| rv = callback2.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| const HttpResponseInfo* response2 = trans2.GetResponseInfo(); |
| ASSERT_TRUE(response2); |
| ASSERT_TRUE(response2->headers); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2, |
| response2->connection_info); |
| EXPECT_EQ("HTTP/1.1 200", response2->headers->GetStatusLine()); |
| std::string response_data; |
| ReadTransaction(&trans2, &response_data); |
| EXPECT_EQ("stream 5", response_data); |
| |
| rv = callback3.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| const HttpResponseInfo* response3 = trans3.GetResponseInfo(); |
| ASSERT_TRUE(response3); |
| ASSERT_TRUE(response3->headers); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2, |
| response3->connection_info); |
| EXPECT_EQ("HTTP/1.1 200", response3->headers->GetStatusLine()); |
| ReadTransaction(&trans3, &response_data); |
| EXPECT_EQ("stream 3", response_data); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, GetAtEachPriority) { |
| for (RequestPriority p = MINIMUM_PRIORITY; p <= MAXIMUM_PRIORITY; |
| p = RequestPriority(p + 1)) { |
| SpdyTestUtil spdy_test_util; |
| |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_test_util.ConstructSpdyGet(nullptr, 0, 1, p)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdyPriority spdy_prio = 0; |
| EXPECT_TRUE(GetSpdyPriority(req, &spdy_prio)); |
| // this repeats the RequestPriority-->spdy::SpdyPriority mapping from |
| // spdy::SpdyFramer::ConvertRequestPriorityToSpdyPriority to make |
| // sure it's being done right. |
| switch (p) { |
| case HIGHEST: |
| EXPECT_EQ(0, spdy_prio); |
| break; |
| case MEDIUM: |
| EXPECT_EQ(1, spdy_prio); |
| break; |
| case LOW: |
| EXPECT_EQ(2, spdy_prio); |
| break; |
| case LOWEST: |
| EXPECT_EQ(3, spdy_prio); |
| break; |
| case IDLE: |
| EXPECT_EQ(4, spdy_prio); |
| break; |
| case THROTTLED: |
| EXPECT_EQ(5, spdy_prio); |
| break; |
| default: |
| FAIL(); |
| } |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_test_util.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body( |
| spdy_test_util.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, p, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| } |
| |
| // Start three gets simultaniously; making sure that multiplexed |
| // streams work properly. |
| |
| // This can't use the TransactionHelper method, since it only |
| // handles a single transaction, and finishes them as soon |
| // as it launches them. |
| |
| // TODO(gavinp): create a working generalized TransactionHelper that |
| // can allow multiple streams in flight. |
| |
| TEST_F(SpdyNetworkTransactionTest, ThreeGets) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame fbody(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, false)); |
| spdy::SpdySerializedFrame fbody2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| |
| spdy::SpdySerializedFrame req3( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 5, LOWEST)); |
| spdy::SpdySerializedFrame resp3( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 5)); |
| spdy::SpdySerializedFrame body3(spdy_util_.ConstructSpdyDataFrame(5, false)); |
| spdy::SpdySerializedFrame fbody3(spdy_util_.ConstructSpdyDataFrame(5, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(req2, 3), |
| CreateMockWrite(req3, 6), |
| }; |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| CreateMockRead(resp2, 4), CreateMockRead(body2, 5), |
| CreateMockRead(resp3, 7), CreateMockRead(body3, 8), |
| |
| CreateMockRead(fbody, 9), CreateMockRead(fbody2, 10), |
| CreateMockRead(fbody3, 11), |
| |
| MockRead(ASYNC, 0, 12), // EOF |
| }; |
| SequencedSocketData data(reads, writes); |
| SequencedSocketData data_placeholder1; |
| SequencedSocketData data_placeholder2; |
| |
| TransactionHelperResult out; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| // We require placeholder data because three get requests are sent out at |
| // the same time which results in three sockets being connected. The first |
| // on will negotiate SPDY and will be used for all requests. |
| helper.AddData(&data_placeholder1); |
| helper.AddData(&data_placeholder2); |
| TestCompletionCallback callback1; |
| TestCompletionCallback callback2; |
| TestCompletionCallback callback3; |
| |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans3(DEFAULT_PRIORITY, helper.session()); |
| |
| out.rv = trans1.Start(&request_, callback1.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| out.rv = trans2.Start(&request_, callback2.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| out.rv = trans3.Start(&request_, callback3.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| |
| out.rv = callback1.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| out.rv = callback3.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| const HttpResponseInfo* response1 = trans1.GetResponseInfo(); |
| EXPECT_TRUE(response1->headers); |
| EXPECT_TRUE(response1->was_fetched_via_spdy); |
| out.status_line = response1->headers->GetStatusLine(); |
| out.response_info = *response1; |
| |
| trans2.GetResponseInfo(); |
| |
| out.rv = ReadTransaction(&trans1, &out.response_data); |
| helper.VerifyDataConsumed(); |
| EXPECT_THAT(out.rv, IsOk()); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, TwoGetsLateBinding) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame fbody(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, false)); |
| spdy::SpdySerializedFrame fbody2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(req2, 3), |
| }; |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| CreateMockRead(resp2, 4), CreateMockRead(body2, 5), |
| CreateMockRead(fbody, 6), CreateMockRead(fbody2, 7), |
| MockRead(ASYNC, 0, 8), // EOF |
| }; |
| SequencedSocketData data(reads, writes); |
| |
| MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING); |
| SequencedSocketData data_placeholder; |
| data_placeholder.set_connect_data(never_finishing_connect); |
| |
| TransactionHelperResult out; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| // We require placeholder data because two requests are sent out at |
| // the same time which results in two sockets being connected. The first |
| // on will negotiate SPDY and will be used for all requests. |
| helper.AddData(&data_placeholder); |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| |
| TestCompletionCallback callback1; |
| TestCompletionCallback callback2; |
| |
| out.rv = trans1.Start(&request_, callback1.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| out.rv = trans2.Start(&request_, callback2.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| |
| out.rv = callback1.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| out.rv = callback2.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| const HttpResponseInfo* response1 = trans1.GetResponseInfo(); |
| EXPECT_TRUE(response1->headers); |
| EXPECT_TRUE(response1->was_fetched_via_spdy); |
| out.status_line = response1->headers->GetStatusLine(); |
| out.response_info = *response1; |
| out.rv = ReadTransaction(&trans1, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| const HttpResponseInfo* response2 = trans2.GetResponseInfo(); |
| EXPECT_TRUE(response2->headers); |
| EXPECT_TRUE(response2->was_fetched_via_spdy); |
| out.status_line = response2->headers->GetStatusLine(); |
| out.response_info = *response2; |
| out.rv = ReadTransaction(&trans2, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, TwoGetsLateBindingFromPreconnect) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame fbody(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, false)); |
| spdy::SpdySerializedFrame fbody2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(req2, 3), |
| }; |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| CreateMockRead(resp2, 4), CreateMockRead(body2, 5), |
| CreateMockRead(fbody, 6), CreateMockRead(fbody2, 7), |
| MockRead(ASYNC, 0, 8), // EOF |
| }; |
| SequencedSocketData preconnect_data(reads, writes); |
| |
| MockConnect never_finishing_connect(ASYNC, ERR_IO_PENDING); |
| |
| SequencedSocketData data_placeholder; |
| data_placeholder.set_connect_data(never_finishing_connect); |
| |
| TransactionHelperResult out; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&preconnect_data); |
| // We require placeholder data because 3 connections are attempted (first is |
| // the preconnect, 2nd and 3rd are the never finished connections. |
| helper.AddData(&data_placeholder); |
| helper.AddData(&data_placeholder); |
| |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| |
| TestCompletionCallback callback1; |
| TestCompletionCallback callback2; |
| |
| // Preconnect the first. |
| HttpStreamFactory* http_stream_factory = |
| helper.session()->http_stream_factory(); |
| |
| http_stream_factory->PreconnectStreams(1, request_); |
| |
| out.rv = trans1.Start(&request_, callback1.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| out.rv = trans2.Start(&request_, callback2.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| |
| out.rv = callback1.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| out.rv = callback2.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| const HttpResponseInfo* response1 = trans1.GetResponseInfo(); |
| EXPECT_TRUE(response1->headers); |
| EXPECT_TRUE(response1->was_fetched_via_spdy); |
| out.status_line = response1->headers->GetStatusLine(); |
| out.response_info = *response1; |
| out.rv = ReadTransaction(&trans1, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| const HttpResponseInfo* response2 = trans2.GetResponseInfo(); |
| EXPECT_TRUE(response2->headers); |
| EXPECT_TRUE(response2->was_fetched_via_spdy); |
| out.status_line = response2->headers->GetStatusLine(); |
| out.response_info = *response2; |
| out.rv = ReadTransaction(&trans2, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Similar to ThreeGets above, however this test adds a SETTINGS |
| // frame. The SETTINGS frame is read during the IO loop waiting on |
| // the first transaction completion, and sets a maximum concurrent |
| // stream limit of 1. This means that our IO loop exists after the |
| // second transaction completes, so we can assert on read_index(). |
| TEST_F(SpdyNetworkTransactionTest, ThreeGetsWithMaxConcurrent) { |
| // Construct the request. |
| // Each request fully completes before the next starts. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame fbody(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, false)); |
| spdy::SpdySerializedFrame fbody2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| spdy_util_.UpdateWithStreamDestruction(3); |
| |
| spdy::SpdySerializedFrame req3( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 5, LOWEST)); |
| spdy::SpdySerializedFrame resp3( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 5)); |
| spdy::SpdySerializedFrame body3(spdy_util_.ConstructSpdyDataFrame(5, false)); |
| spdy::SpdySerializedFrame fbody3(spdy_util_.ConstructSpdyDataFrame(5, true)); |
| |
| spdy::SettingsMap settings; |
| const uint32_t max_concurrent_streams = 1; |
| settings[spdy::SETTINGS_MAX_CONCURRENT_STREAMS] = max_concurrent_streams; |
| spdy::SpdySerializedFrame settings_frame( |
| spdy_util_.ConstructSpdySettings(settings)); |
| spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(settings_ack, 5), |
| CreateMockWrite(req2, 6), CreateMockWrite(req3, 10), |
| }; |
| |
| MockRead reads[] = { |
| CreateMockRead(settings_frame, 1), |
| CreateMockRead(resp, 2), |
| CreateMockRead(body, 3), |
| CreateMockRead(fbody, 4), |
| CreateMockRead(resp2, 7), |
| CreateMockRead(body2, 8), |
| CreateMockRead(fbody2, 9), |
| CreateMockRead(resp3, 11), |
| CreateMockRead(body3, 12), |
| CreateMockRead(fbody3, 13), |
| |
| MockRead(ASYNC, 0, 14), // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| TransactionHelperResult out; |
| { |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans3(DEFAULT_PRIORITY, helper.session()); |
| |
| TestCompletionCallback callback1; |
| TestCompletionCallback callback2; |
| TestCompletionCallback callback3; |
| |
| out.rv = trans1.Start(&request_, callback1.callback(), log_); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| // Run transaction 1 through quickly to force a read of our SETTINGS |
| // frame. |
| out.rv = callback1.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| out.rv = trans2.Start(&request_, callback2.callback(), log_); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| out.rv = trans3.Start(&request_, callback3.callback(), log_); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| out.rv = callback2.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| out.rv = callback3.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| const HttpResponseInfo* response1 = trans1.GetResponseInfo(); |
| ASSERT_TRUE(response1); |
| EXPECT_TRUE(response1->headers); |
| EXPECT_TRUE(response1->was_fetched_via_spdy); |
| out.status_line = response1->headers->GetStatusLine(); |
| out.response_info = *response1; |
| out.rv = ReadTransaction(&trans1, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| const HttpResponseInfo* response2 = trans2.GetResponseInfo(); |
| out.status_line = response2->headers->GetStatusLine(); |
| out.response_info = *response2; |
| out.rv = ReadTransaction(&trans2, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| const HttpResponseInfo* response3 = trans3.GetResponseInfo(); |
| out.status_line = response3->headers->GetStatusLine(); |
| out.response_info = *response3; |
| out.rv = ReadTransaction(&trans3, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| helper.VerifyDataConsumed(); |
| } |
| EXPECT_THAT(out.rv, IsOk()); |
| } |
| |
| // Similar to ThreeGetsWithMaxConcurrent above, however this test adds |
| // a fourth transaction. The third and fourth transactions have |
| // different data ("hello!" vs "hello!hello!") and because of the |
| // user specified priority, we expect to see them inverted in |
| // the response from the server. |
| TEST_F(SpdyNetworkTransactionTest, FourGetsWithMaxConcurrentPriority) { |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame fbody(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, false)); |
| spdy::SpdySerializedFrame fbody2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| spdy_util_.UpdateWithStreamDestruction(3); |
| |
| spdy::SpdySerializedFrame req4( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 5, HIGHEST)); |
| spdy::SpdySerializedFrame resp4( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 5)); |
| spdy::SpdySerializedFrame fbody4(spdy_util_.ConstructSpdyDataFrame(5, true)); |
| spdy_util_.UpdateWithStreamDestruction(5); |
| |
| spdy::SpdySerializedFrame req3( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 7, LOWEST)); |
| spdy::SpdySerializedFrame resp3( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 7)); |
| spdy::SpdySerializedFrame body3(spdy_util_.ConstructSpdyDataFrame(7, false)); |
| spdy::SpdySerializedFrame fbody3(spdy_util_.ConstructSpdyDataFrame(7, true)); |
| |
| spdy::SettingsMap settings; |
| const uint32_t max_concurrent_streams = 1; |
| settings[spdy::SETTINGS_MAX_CONCURRENT_STREAMS] = max_concurrent_streams; |
| spdy::SpdySerializedFrame settings_frame( |
| spdy_util_.ConstructSpdySettings(settings)); |
| spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(settings_ack, 5), |
| // By making these synchronous, it guarantees that they are not *started* |
| // before their sequence number, which in turn verifies that only a single |
| // request is in-flight at a time. |
| CreateMockWrite(req2, 6, SYNCHRONOUS), |
| CreateMockWrite(req4, 10, SYNCHRONOUS), |
| CreateMockWrite(req3, 13, SYNCHRONOUS), |
| }; |
| MockRead reads[] = { |
| CreateMockRead(settings_frame, 1), |
| CreateMockRead(resp, 2), |
| CreateMockRead(body, 3), |
| CreateMockRead(fbody, 4), |
| CreateMockRead(resp2, 7), |
| CreateMockRead(body2, 8), |
| CreateMockRead(fbody2, 9), |
| CreateMockRead(resp4, 11), |
| CreateMockRead(fbody4, 12), |
| CreateMockRead(resp3, 14), |
| CreateMockRead(body3, 15), |
| CreateMockRead(fbody3, 16), |
| |
| MockRead(ASYNC, 0, 17), // EOF |
| }; |
| SequencedSocketData data(reads, writes); |
| TransactionHelperResult out; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans3(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans4(HIGHEST, helper.session()); |
| |
| TestCompletionCallback callback1; |
| TestCompletionCallback callback2; |
| TestCompletionCallback callback3; |
| TestCompletionCallback callback4; |
| |
| out.rv = trans1.Start(&request_, callback1.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| // Run transaction 1 through quickly to force a read of our SETTINGS frame. |
| out.rv = callback1.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| // Finish async network reads and writes associated with |trans1|. |
| base::RunLoop().RunUntilIdle(); |
| |
| out.rv = trans2.Start(&request_, callback2.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| out.rv = trans3.Start(&request_, callback3.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| out.rv = trans4.Start(&request_, callback4.callback(), log_); |
| ASSERT_THAT(out.rv, IsError(ERR_IO_PENDING)); |
| |
| out.rv = callback2.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| out.rv = callback3.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| const HttpResponseInfo* response1 = trans1.GetResponseInfo(); |
| EXPECT_TRUE(response1->headers); |
| EXPECT_TRUE(response1->was_fetched_via_spdy); |
| out.status_line = response1->headers->GetStatusLine(); |
| out.response_info = *response1; |
| out.rv = ReadTransaction(&trans1, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| const HttpResponseInfo* response2 = trans2.GetResponseInfo(); |
| out.status_line = response2->headers->GetStatusLine(); |
| out.response_info = *response2; |
| out.rv = ReadTransaction(&trans2, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| // notice: response3 gets two hellos, response4 gets one |
| // hello, so we know dequeuing priority was respected. |
| const HttpResponseInfo* response3 = trans3.GetResponseInfo(); |
| out.status_line = response3->headers->GetStatusLine(); |
| out.response_info = *response3; |
| out.rv = ReadTransaction(&trans3, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| out.rv = callback4.WaitForResult(); |
| EXPECT_THAT(out.rv, IsOk()); |
| const HttpResponseInfo* response4 = trans4.GetResponseInfo(); |
| out.status_line = response4->headers->GetStatusLine(); |
| out.response_info = *response4; |
| out.rv = ReadTransaction(&trans4, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| helper.VerifyDataConsumed(); |
| EXPECT_THAT(out.rv, IsOk()); |
| } |
| |
| // Similar to ThreeGetsMaxConcurrrent above, however, this test |
| // deletes a session in the middle of the transaction to ensure |
| // that we properly remove pendingcreatestream objects from |
| // the spdy_session |
| TEST_F(SpdyNetworkTransactionTest, ThreeGetsWithMaxConcurrentDelete) { |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame fbody(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, false)); |
| spdy::SpdySerializedFrame fbody2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| |
| spdy::SettingsMap settings; |
| const uint32_t max_concurrent_streams = 1; |
| settings[spdy::SETTINGS_MAX_CONCURRENT_STREAMS] = max_concurrent_streams; |
| spdy::SpdySerializedFrame settings_frame( |
| spdy_util_.ConstructSpdySettings(settings)); |
| spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(settings_ack, 5), |
| CreateMockWrite(req2, 6), |
| }; |
| MockRead reads[] = { |
| CreateMockRead(settings_frame, 1), CreateMockRead(resp, 2), |
| CreateMockRead(body, 3), CreateMockRead(fbody, 4), |
| CreateMockRead(resp2, 7), CreateMockRead(body2, 8), |
| CreateMockRead(fbody2, 9), MockRead(ASYNC, 0, 10), // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| TransactionHelperResult out; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, |
| helper.session()); |
| auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, |
| helper.session()); |
| auto trans3 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, |
| helper.session()); |
| |
| TestCompletionCallback callback1; |
| TestCompletionCallback callback2; |
| TestCompletionCallback callback3; |
| |
| out.rv = trans1->Start(&request_, callback1.callback(), log_); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| // Run transaction 1 through quickly to force a read of our SETTINGS frame. |
| out.rv = callback1.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| out.rv = trans2->Start(&request_, callback2.callback(), log_); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| out.rv = trans3->Start(&request_, callback3.callback(), log_); |
| trans3.reset(); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| out.rv = callback2.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| const HttpResponseInfo* response1 = trans1->GetResponseInfo(); |
| ASSERT_TRUE(response1); |
| EXPECT_TRUE(response1->headers); |
| EXPECT_TRUE(response1->was_fetched_via_spdy); |
| out.status_line = response1->headers->GetStatusLine(); |
| out.response_info = *response1; |
| out.rv = ReadTransaction(trans1.get(), &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| |
| const HttpResponseInfo* response2 = trans2->GetResponseInfo(); |
| ASSERT_TRUE(response2); |
| out.status_line = response2->headers->GetStatusLine(); |
| out.response_info = *response2; |
| out.rv = ReadTransaction(trans2.get(), &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!hello!", out.response_data); |
| helper.VerifyDataConsumed(); |
| EXPECT_THAT(out.rv, IsOk()); |
| } |
| |
| namespace { |
| |
| // A helper class that will delete |transaction| on error when the callback is |
| // invoked. |
| class KillerCallback : public TestCompletionCallbackBase { |
| public: |
| explicit KillerCallback(HttpNetworkTransaction* transaction) |
| : transaction_(transaction) {} |
| |
| ~KillerCallback() override = default; |
| |
| CompletionOnceCallback callback() { |
| return base::BindOnce(&KillerCallback::OnComplete, base::Unretained(this)); |
| } |
| |
| private: |
| void OnComplete(int result) { |
| if (result < 0) |
| delete transaction_; |
| |
| SetResult(result); |
| } |
| |
| HttpNetworkTransaction* transaction_; |
| }; |
| |
| } // namespace |
| |
| // Similar to ThreeGetsMaxConcurrrentDelete above, however, this test |
| // closes the socket while we have a pending transaction waiting for |
| // a pending stream creation. http://crbug.com/52901 |
| TEST_F(SpdyNetworkTransactionTest, ThreeGetsWithMaxConcurrentSocketClose) { |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame fin_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| |
| spdy::SettingsMap settings; |
| const uint32_t max_concurrent_streams = 1; |
| settings[spdy::SETTINGS_MAX_CONCURRENT_STREAMS] = max_concurrent_streams; |
| spdy::SpdySerializedFrame settings_frame( |
| spdy_util_.ConstructSpdySettings(settings)); |
| spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(settings_ack, 5), |
| CreateMockWrite(req2, 6), |
| }; |
| MockRead reads[] = { |
| CreateMockRead(settings_frame, 1), |
| CreateMockRead(resp, 2), |
| CreateMockRead(body, 3), |
| CreateMockRead(fin_body, 4), |
| CreateMockRead(resp2, 7), |
| MockRead(ASYNC, ERR_CONNECTION_RESET, 8), // Abort! |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| SequencedSocketData data_placeholder; |
| |
| TransactionHelperResult out; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| // We require placeholder data because three get requests are sent out, so |
| // there needs to be three sets of SSL connection data. |
| helper.AddData(&data_placeholder); |
| helper.AddData(&data_placeholder); |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpNetworkTransaction* trans3( |
| new HttpNetworkTransaction(DEFAULT_PRIORITY, helper.session())); |
| |
| TestCompletionCallback callback1; |
| TestCompletionCallback callback2; |
| KillerCallback callback3(trans3); |
| |
| out.rv = trans1.Start(&request_, callback1.callback(), log_); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| // Run transaction 1 through quickly to force a read of our SETTINGS frame. |
| out.rv = callback1.WaitForResult(); |
| ASSERT_THAT(out.rv, IsOk()); |
| |
| out.rv = trans2.Start(&request_, callback2.callback(), log_); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| out.rv = trans3->Start(&request_, callback3.callback(), log_); |
| ASSERT_EQ(out.rv, ERR_IO_PENDING); |
| out.rv = callback3.WaitForResult(); |
| ASSERT_THAT(out.rv, IsError(ERR_ABORTED)); |
| |
| const HttpResponseInfo* response1 = trans1.GetResponseInfo(); |
| ASSERT_TRUE(response1); |
| EXPECT_TRUE(response1->headers); |
| EXPECT_TRUE(response1->was_fetched_via_spdy); |
| out.status_line = response1->headers->GetStatusLine(); |
| out.response_info = *response1; |
| out.rv = ReadTransaction(&trans1, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| |
| const HttpResponseInfo* response2 = trans2.GetResponseInfo(); |
| ASSERT_TRUE(response2); |
| out.status_line = response2->headers->GetStatusLine(); |
| out.response_info = *response2; |
| out.rv = ReadTransaction(&trans2, &out.response_data); |
| EXPECT_THAT(out.rv, IsError(ERR_CONNECTION_RESET)); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Test that a simple PUT request works. |
| TEST_F(SpdyNetworkTransactionTest, Put) { |
| // Setup the request. |
| request_.method = "PUT"; |
| |
| spdy::SpdyHeaderBlock put_headers( |
| spdy_util_.ConstructPutHeaderBlock(kDefaultUrl, 0)); |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(put_headers), LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| } |
| |
| // Test that a simple HEAD request works. |
| TEST_F(SpdyNetworkTransactionTest, Head) { |
| // Setup the request. |
| request_.method = "HEAD"; |
| |
| spdy::SpdyHeaderBlock head_headers( |
| spdy_util_.ConstructHeadHeaderBlock(kDefaultUrl, 0)); |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyHeaders( |
| 1, std::move(head_headers), LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| } |
| |
| // Test that a simple POST works. |
| TEST_F(SpdyNetworkTransactionTest, Post) { |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyPost( |
| kDefaultUrl, 1, kUploadDataSize, LOWEST, nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(body, 1), // POST upload frame |
| }; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 2), CreateMockRead(body, 3), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| UsePostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| // Test that a POST with a file works. |
| TEST_F(SpdyNetworkTransactionTest, FilePost) { |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyPost( |
| kDefaultUrl, 1, kUploadDataSize, LOWEST, nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(body, 1), // POST upload frame |
| }; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 2), CreateMockRead(body, 3), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| UseFilePostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| #if !defined(STARBOARD) |
| // Test that a POST with a unreadable file fails. |
| TEST_F(SpdyNetworkTransactionTest, UnreadableFilePost) { |
| MockWrite writes[] = { |
| MockWrite(ASYNC, 0, 0) // EOF |
| }; |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 1) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| UseUnreadableFilePostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.RunDefaultTest(); |
| |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataNotConsumed(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_ACCESS_DENIED)); |
| } |
| #endif |
| |
| // Test that a complex POST works. |
| TEST_F(SpdyNetworkTransactionTest, ComplexPost) { |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyPost( |
| kDefaultUrl, 1, kUploadDataSize, LOWEST, nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(body, 1), // POST upload frame |
| }; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 2), CreateMockRead(body, 3), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| UseComplexPostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| // Test that a chunked POST works. |
| TEST_F(SpdyNetworkTransactionTest, ChunkedPost) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructChunkedSpdyPost(nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(body, 1), |
| }; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 2), CreateMockRead(body, 3), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| UseChunkedPostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| // These chunks get merged into a single frame when being sent. |
| const int kFirstChunkSize = kUploadDataSize/2; |
| upload_chunked_data_stream()->AppendData(kUploadData, kFirstChunkSize, false); |
| upload_chunked_data_stream()->AppendData( |
| kUploadData + kFirstChunkSize, kUploadDataSize - kFirstChunkSize, true); |
| |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ(kUploadData, out.response_data); |
| } |
| |
| // Test that a chunked POST works with chunks appended after transaction starts. |
| TEST_F(SpdyNetworkTransactionTest, DelayedChunkedPost) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructChunkedSpdyPost(nullptr, 0)); |
| spdy::SpdySerializedFrame chunk1(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame chunk2(spdy_util_.ConstructSpdyDataFrame(1, false)); |
| spdy::SpdySerializedFrame chunk3(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(chunk1, 1), |
| CreateMockWrite(chunk2, 2), CreateMockWrite(chunk3, 3), |
| }; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 4), CreateMockRead(chunk1, 5), |
| CreateMockRead(chunk2, 6), CreateMockRead(chunk3, 7), |
| MockRead(ASYNC, 0, 8) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| UseChunkedPostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| upload_chunked_data_stream()->AppendData(kUploadData, kUploadDataSize, false); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| ASSERT_TRUE(helper.StartDefaultTest()); |
| |
| base::RunLoop().RunUntilIdle(); |
| upload_chunked_data_stream()->AppendData(kUploadData, kUploadDataSize, false); |
| base::RunLoop().RunUntilIdle(); |
| upload_chunked_data_stream()->AppendData(kUploadData, kUploadDataSize, true); |
| |
| helper.FinishDefaultTest(); |
| helper.VerifyDataConsumed(); |
| |
| std::string expected_response; |
| expected_response += kUploadData; |
| expected_response += kUploadData; |
| expected_response += kUploadData; |
| |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ(expected_response, out.response_data); |
| } |
| |
| // Test that a POST without any post data works. |
| TEST_F(SpdyNetworkTransactionTest, NullPost) { |
| // Setup the request. |
| request_.method = "POST"; |
| // Create an empty UploadData. |
| request_.upload_data_stream = nullptr; |
| |
| // When request.upload_data_stream is NULL for post, content-length is |
| // expected to be 0. |
| spdy::SpdyHeaderBlock req_block( |
| spdy_util_.ConstructPostHeaderBlock(kDefaultUrl, 0)); |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(req_block), LOWEST, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), |
| }; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| // Test that a simple POST works. |
| TEST_F(SpdyNetworkTransactionTest, EmptyPost) { |
| // Create an empty UploadDataStream. |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| ElementsUploadDataStream stream(std::move(element_readers), 0); |
| |
| // Setup the request. |
| request_.method = "POST"; |
| request_.upload_data_stream = &stream; |
| |
| const uint64_t kContentLength = 0; |
| |
| spdy::SpdyHeaderBlock req_block( |
| spdy_util_.ConstructPostHeaderBlock(kDefaultUrl, kContentLength)); |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(req_block), LOWEST, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), |
| }; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| // While we're doing a post, the server sends the reply before upload completes. |
| TEST_F(SpdyNetworkTransactionTest, ResponseBeforePostCompletes) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructChunkedSpdyPost(nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(body, 3), |
| }; |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| // Write the request headers, and read the complete response |
| // while still waiting for chunked request data. |
| SequencedSocketData data(reads, writes); |
| UseChunkedPostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| ASSERT_TRUE(helper.StartDefaultTest()); |
| |
| base::RunLoop().RunUntilIdle(); |
| |
| // Process the request headers, response headers, and response body. |
| // The request body is still in flight. |
| const HttpResponseInfo* response = helper.trans()->GetResponseInfo(); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| |
| // Finish sending the request body. |
| upload_chunked_data_stream()->AppendData(kUploadData, kUploadDataSize, true); |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsOk()); |
| |
| std::string response_body; |
| EXPECT_THAT(ReadTransaction(helper.trans(), &response_body), IsOk()); |
| EXPECT_EQ(kUploadData, response_body); |
| |
| // Finish async network reads/writes. |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| // The client upon cancellation tries to send a RST_STREAM frame. The mock |
| // socket causes the TCP write to return zero. This test checks that the client |
| // tries to queue up the RST_STREAM frame again. |
| TEST_F(SpdyNetworkTransactionTest, SocketWriteReturnsZero) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0, SYNCHRONOUS), MockWrite(SYNCHRONOUS, 0, 0, 2), |
| CreateMockWrite(rst, 3, SYNCHRONOUS), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1, ASYNC), MockRead(ASYNC, 0, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.StartDefaultTest(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_IO_PENDING)); |
| |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsOk()); |
| |
| helper.ResetTrans(); |
| base::RunLoop().RunUntilIdle(); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Test that the transaction doesn't crash when we don't have a reply. |
| TEST_F(SpdyNetworkTransactionTest, ResponseWithoutHeaders) { |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(body, 1), MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(rst, 2), |
| }; |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| } |
| |
| // Test that the transaction doesn't crash when we get two replies on the same |
| // stream ID. See http://crbug.com/45639. |
| TEST_F(SpdyNetworkTransactionTest, ResponseWithTwoSynReplies) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(rst, 4), |
| }; |
| |
| spdy::SpdySerializedFrame resp0( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp0, 1), CreateMockRead(resp1, 2), |
| CreateMockRead(body, 3), MockRead(ASYNC, 0, 5) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| ASSERT_TRUE(response); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| std::string response_data; |
| rv = ReadTransaction(trans, &response_data); |
| EXPECT_THAT(rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ResetReplyWithTransferEncoding) { |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(rst, 2), |
| }; |
| |
| const char* const headers[] = { |
| "transfer-encoding", "chunked" |
| }; |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(headers, 1, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 3), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| |
| helper.session()->spdy_session_pool()->CloseAllSessions(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ResetPushWithTransferEncoding) { |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(priority, 3), |
| CreateMockWrite(rst, 5), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| const char* const headers[] = { |
| "transfer-encoding", "chunked" |
| }; |
| spdy::SpdySerializedFrame push(spdy_util_.ConstructSpdyPush( |
| headers, arraysize(headers) / 2, 2, 1, "https://www.example.org/1")); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(push, 2), CreateMockRead(body, 4), |
| MockRead(ASYNC, 0, 6) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| |
| helper.session()->spdy_session_pool()->CloseAllSessions(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, CancelledTransaction) { |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = { |
| CreateMockWrite(req), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp), |
| // This following read isn't used by the test, except during the |
| // RunUntilIdle() call at the end since the SpdySession survives the |
| // HttpNetworkTransaction and still tries to continue Read()'ing. Any |
| // MockRead will do here. |
| MockRead(ASYNC, 0, 0) // EOF |
| }; |
| |
| StaticSocketDataProvider data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| helper.ResetTrans(); // Cancel the transaction. |
| |
| // Flush the MessageLoop while the SpdySessionDependencies (in particular, the |
| // MockClientSocketFactory) are still alive. |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataNotConsumed(); |
| } |
| |
| // Verify that the client sends a Rst Frame upon cancelling the stream. |
| TEST_F(SpdyNetworkTransactionTest, CancelledTransactionSendRst) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0, SYNCHRONOUS), |
| CreateMockWrite(rst, 2, SYNCHRONOUS), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1, ASYNC), MockRead(ASYNC, 0, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(callback.GetResult(rv), IsOk()); |
| |
| helper.ResetTrans(); |
| base::RunLoop().RunUntilIdle(); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Verify that the client can correctly deal with the user callback attempting |
| // to start another transaction on a session that is closing down. See |
| // http://crbug.com/47455 |
| TEST_F(SpdyNetworkTransactionTest, StartTransactionOnReadCallback) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req)}; |
| MockWrite writes2[] = {CreateMockWrite(req, 0), |
| MockWrite(SYNCHRONOUS, ERR_IO_PENDING, 3)}; |
| |
| // The indicated length of this frame is longer than its actual length. When |
| // the session receives an empty frame after this one, it shuts down the |
| // session, and calls the read callback with the incomplete data. |
| const uint8_t kGetBodyFrame2[] = { |
| 0x00, 0x00, 0x00, 0x01, 0x01, 0x00, 0x00, |
| 0x07, 'h', 'e', 'l', 'l', 'o', '!', |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), |
| MockRead(ASYNC, ERR_IO_PENDING, 2), // Force a pause |
| MockRead(ASYNC, reinterpret_cast<const char*>(kGetBodyFrame2), |
| arraysize(kGetBodyFrame2), 3), |
| MockRead(ASYNC, ERR_IO_PENDING, 4), // Force a pause |
| MockRead(ASYNC, 0, 0, 5), // EOF |
| }; |
| MockRead reads2[] = { |
| CreateMockRead(resp, 1), MockRead(ASYNC, 0, 0, 2), // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| SequencedSocketData data2(reads2, writes2); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.AddData(&data2); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| // Start the transaction with basic parameters. |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| |
| const int kSize = 3000; |
| scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(kSize); |
| rv = trans->Read( |
| buf.get(), kSize, |
| base::Bind(&SpdyNetworkTransactionTest::StartTransactionCallback, |
| helper.session(), default_url_, log_)); |
| ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); |
| // This forces an err_IO_pending, which sets the callback. |
| data.Resume(); |
| data.RunUntilPaused(); |
| |
| // This finishes the read. |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Verify that the client can correctly deal with the user callback deleting |
| // the transaction. Failures will usually be flagged by thread and/or memory |
| // checking tools. See http://crbug.com/46925 |
| TEST_F(SpdyNetworkTransactionTest, DeleteSessionOnReadCallback) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), |
| MockRead(ASYNC, ERR_IO_PENDING, 2), // Force a pause |
| CreateMockRead(body, 3), MockRead(ASYNC, 0, 0, 4), // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| // Start the transaction with basic parameters. |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| |
| // Setup a user callback which will delete the session, and clear out the |
| // memory holding the stream object. Note that the callback deletes trans. |
| const int kSize = 3000; |
| scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(kSize); |
| rv = trans->Read( |
| buf.get(), |
| kSize, |
| base::Bind(&SpdyNetworkTransactionTest::DeleteSessionCallback, |
| base::Unretained(&helper))); |
| ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); |
| data.Resume(); |
| |
| // Finish running rest of tasks. |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, TestRawHeaderSizeSuccessfullRequest) { |
| spdy::SpdyHeaderBlock headers( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultUrl)); |
| headers["user-agent"] = ""; |
| headers["accept-encoding"] = "gzip, deflate"; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| |
| spdy::SpdySerializedFrame response_body_frame( |
| spdy_util_.ConstructSpdyDataFrame(1, "should not include", true)); |
| |
| MockRead response_headers(CreateMockRead(resp, 1)); |
| MockRead reads[] = { |
| response_headers, CreateMockRead(response_body_frame, 2), |
| MockRead(ASYNC, 0, 0, 3) // EOF |
| }; |
| SequencedSocketData data(reads, writes); |
| |
| TestDelegate delegate; |
| SpdyURLRequestContext spdy_url_request_context; |
| TestNetworkDelegate network_delegate; |
| spdy_url_request_context.set_network_delegate(&network_delegate); |
| SSLSocketDataProvider ssl_data(ASYNC, OK); |
| ssl_data.next_proto = kProtoHTTP2; |
| |
| std::unique_ptr<URLRequest> request(spdy_url_request_context.CreateRequest( |
| GURL(kDefaultUrl), DEFAULT_PRIORITY, &delegate, |
| TRAFFIC_ANNOTATION_FOR_TESTS)); |
| spdy_url_request_context.socket_factory().AddSSLSocketDataProvider(&ssl_data); |
| spdy_url_request_context.socket_factory().AddSocketDataProvider(&data); |
| |
| request->Start(); |
| base::RunLoop().Run(); |
| |
| EXPECT_LT(0, request->GetTotalSentBytes()); |
| EXPECT_LT(0, request->GetTotalReceivedBytes()); |
| EXPECT_EQ(network_delegate.total_network_bytes_sent(), |
| request->GetTotalSentBytes()); |
| EXPECT_EQ(network_delegate.total_network_bytes_received(), |
| request->GetTotalReceivedBytes()); |
| EXPECT_EQ(response_headers.data_len, request->raw_header_size()); |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, |
| TestRawHeaderSizeSuccessfullPushHeadersFirst) { |
| spdy::SpdyHeaderBlock headers( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultUrl)); |
| headers["user-agent"] = ""; |
| headers["accept-encoding"] = "gzip, deflate"; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true)); |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(priority, 2), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame response_body_frame( |
| spdy_util_.ConstructSpdyDataFrame(1, "should not include", true)); |
| |
| spdy::SpdyHeaderBlock push_headers; |
| push_headers[":method"] = "GET"; |
| spdy_util_.AddUrlToHeaderBlock(std::string(kDefaultUrl) + "b.dat", |
| &push_headers); |
| |
| spdy::SpdySerializedFrame push_init_frame( |
| spdy_util_.ConstructSpdyPushPromise(1, 2, std::move(push_headers))); |
| |
| spdy::SpdySerializedFrame push_headers_frame( |
| spdy_util_.ConstructSpdyPushHeaders(2, nullptr, 0)); |
| |
| spdy::SpdySerializedFrame push_body_frame( |
| spdy_util_.ConstructSpdyDataFrame(2, "should not include either", false)); |
| |
| MockRead push_init_read(CreateMockRead(push_init_frame, 1)); |
| MockRead response_headers(CreateMockRead(resp, 5)); |
| // raw_header_size() will contain the size of the push promise frame |
| // initialization. |
| int expected_response_headers_size = |
| response_headers.data_len + push_init_read.data_len; |
| |
| MockRead reads[] = { |
| push_init_read, |
| CreateMockRead(push_headers_frame, 3), |
| CreateMockRead(push_body_frame, 4), |
| response_headers, |
| CreateMockRead(response_body_frame, 6), |
| MockRead(ASYNC, 0, 7) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| TestDelegate delegate; |
| SpdyURLRequestContext spdy_url_request_context; |
| TestNetworkDelegate network_delegate; |
| spdy_url_request_context.set_network_delegate(&network_delegate); |
| SSLSocketDataProvider ssl_data(ASYNC, OK); |
| ssl_data.next_proto = kProtoHTTP2; |
| |
| std::unique_ptr<URLRequest> request(spdy_url_request_context.CreateRequest( |
| GURL(kDefaultUrl), DEFAULT_PRIORITY, &delegate, |
| TRAFFIC_ANNOTATION_FOR_TESTS)); |
| spdy_url_request_context.socket_factory().AddSSLSocketDataProvider(&ssl_data); |
| spdy_url_request_context.socket_factory().AddSocketDataProvider(&data); |
| |
| request->Start(); |
| base::RunLoop().Run(); |
| |
| EXPECT_LT(0, request->GetTotalSentBytes()); |
| EXPECT_LT(0, request->GetTotalReceivedBytes()); |
| EXPECT_EQ(network_delegate.total_network_bytes_sent(), |
| request->GetTotalSentBytes()); |
| EXPECT_EQ(network_delegate.total_network_bytes_received(), |
| request->GetTotalReceivedBytes()); |
| EXPECT_EQ(expected_response_headers_size, request->raw_header_size()); |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, RedirectGetRequest) { |
| SpdyURLRequestContext spdy_url_request_context; |
| |
| SSLSocketDataProvider ssl_provider0(ASYNC, OK); |
| ssl_provider0.next_proto = kProtoHTTP2; |
| spdy_url_request_context.socket_factory().AddSSLSocketDataProvider( |
| &ssl_provider0); |
| |
| spdy::SpdyHeaderBlock headers0( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultUrl)); |
| headers0["user-agent"] = ""; |
| headers0["accept-encoding"] = "gzip, deflate"; |
| |
| spdy::SpdySerializedFrame req0( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(headers0), LOWEST, true)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL)); |
| MockWrite writes0[] = {CreateMockWrite(req0, 0), CreateMockWrite(rst, 2)}; |
| |
| const char* const kExtraHeaders[] = {"location", |
| "https://www.foo.com/index.php"}; |
| spdy::SpdySerializedFrame resp0(spdy_util_.ConstructSpdyReplyError( |
| "301", kExtraHeaders, arraysize(kExtraHeaders) / 2, 1)); |
| MockRead reads0[] = {CreateMockRead(resp0, 1), MockRead(ASYNC, 0, 3)}; |
| |
| SequencedSocketData data0(reads0, writes0); |
| spdy_url_request_context.socket_factory().AddSocketDataProvider(&data0); |
| |
| SSLSocketDataProvider ssl_provider1(ASYNC, OK); |
| ssl_provider1.next_proto = kProtoHTTP2; |
| spdy_url_request_context.socket_factory().AddSSLSocketDataProvider( |
| &ssl_provider1); |
| |
| SpdyTestUtil spdy_util1; |
| spdy::SpdyHeaderBlock headers1( |
| spdy_util1.ConstructGetHeaderBlock("https://www.foo.com/index.php")); |
| headers1["user-agent"] = ""; |
| headers1["accept-encoding"] = "gzip, deflate"; |
| spdy::SpdySerializedFrame req1( |
| spdy_util1.ConstructSpdyHeaders(1, std::move(headers1), LOWEST, true)); |
| MockWrite writes1[] = {CreateMockWrite(req1, 0)}; |
| |
| spdy::SpdySerializedFrame resp1( |
| spdy_util1.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body1(spdy_util1.ConstructSpdyDataFrame(1, true)); |
| MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2), |
| MockRead(ASYNC, 0, 3)}; |
| |
| SequencedSocketData data1(reads1, writes1); |
| spdy_url_request_context.socket_factory().AddSocketDataProvider(&data1); |
| |
| TestDelegate delegate; |
| |
| std::unique_ptr<URLRequest> request = spdy_url_request_context.CreateRequest( |
| default_url_, DEFAULT_PRIORITY, &delegate, TRAFFIC_ANNOTATION_FOR_TESTS); |
| request->Start(); |
| delegate.RunUntilRedirect(); |
| |
| EXPECT_EQ(1, delegate.received_redirect_count()); |
| |
| request->FollowDeferredRedirect(base::nullopt /* modified_request_headers */); |
| delegate.RunUntilComplete(); |
| |
| EXPECT_EQ(1, delegate.response_started_count()); |
| EXPECT_FALSE(delegate.received_data_before_response()); |
| EXPECT_THAT(delegate.request_status(), IsOk()); |
| EXPECT_EQ("hello!", delegate.data_received()); |
| |
| // Pump the message loop to allow read data to be consumed. |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_TRUE(data0.AllReadDataConsumed()); |
| EXPECT_TRUE(data0.AllWriteDataConsumed()); |
| EXPECT_TRUE(data1.AllReadDataConsumed()); |
| EXPECT_TRUE(data1.AllWriteDataConsumed()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, RedirectServerPush) { |
| const char redirected_url[] = "https://www.foo.com/index.php"; |
| SpdyURLRequestContext spdy_url_request_context; |
| |
| SSLSocketDataProvider ssl_provider0(ASYNC, OK); |
| ssl_provider0.next_proto = kProtoHTTP2; |
| ssl_provider0.ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| ASSERT_TRUE(ssl_provider0.ssl_info.cert); |
| spdy_url_request_context.socket_factory().AddSSLSocketDataProvider( |
| &ssl_provider0); |
| |
| spdy::SpdyHeaderBlock headers0( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultUrl)); |
| headers0["user-agent"] = ""; |
| headers0["accept-encoding"] = "gzip, deflate"; |
| spdy::SpdySerializedFrame req0( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(headers0), LOWEST, true)); |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_CANCEL)); |
| MockWrite writes[] = {CreateMockWrite(req0, 0), CreateMockWrite(priority, 3), |
| CreateMockWrite(rst, 5)}; |
| |
| spdy::SpdySerializedFrame resp0( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame push(spdy_util_.ConstructSpdyPush( |
| nullptr, 0, 2, 1, kPushedUrl, "301", redirected_url)); |
| spdy::SpdySerializedFrame body0(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = {CreateMockRead(resp0, 1), CreateMockRead(push, 2), |
| CreateMockRead(body0, 4), MockRead(ASYNC, 0, 6)}; |
| |
| SequencedSocketData data0(reads, writes); |
| spdy_url_request_context.socket_factory().AddSocketDataProvider(&data0); |
| |
| SSLSocketDataProvider ssl_provider1(ASYNC, OK); |
| ssl_provider1.next_proto = kProtoHTTP2; |
| spdy_url_request_context.socket_factory().AddSSLSocketDataProvider( |
| &ssl_provider1); |
| |
| SpdyTestUtil spdy_util1; |
| spdy::SpdyHeaderBlock headers1( |
| spdy_util1.ConstructGetHeaderBlock(redirected_url)); |
| headers1["user-agent"] = ""; |
| headers1["accept-encoding"] = "gzip, deflate"; |
| spdy::SpdySerializedFrame req1( |
| spdy_util1.ConstructSpdyHeaders(1, std::move(headers1), LOWEST, true)); |
| MockWrite writes1[] = {CreateMockWrite(req1, 0)}; |
| |
| spdy::SpdySerializedFrame resp1( |
| spdy_util1.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body1(spdy_util1.ConstructSpdyDataFrame(1, true)); |
| MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2), |
| MockRead(ASYNC, 0, 3)}; |
| |
| SequencedSocketData data1(reads1, writes1); |
| spdy_url_request_context.socket_factory().AddSocketDataProvider(&data1); |
| |
| TestDelegate delegate0; |
| std::unique_ptr<URLRequest> request = spdy_url_request_context.CreateRequest( |
| default_url_, DEFAULT_PRIORITY, &delegate0, TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| request->Start(); |
| delegate0.RunUntilComplete(); |
| |
| EXPECT_EQ(0, delegate0.received_redirect_count()); |
| EXPECT_EQ("hello!", delegate0.data_received()); |
| |
| TestDelegate delegate1; |
| std::unique_ptr<URLRequest> request1 = spdy_url_request_context.CreateRequest( |
| GURL(kPushedUrl), DEFAULT_PRIORITY, &delegate1, |
| TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| request1->Start(); |
| delegate1.RunUntilRedirect(); |
| EXPECT_EQ(1, delegate1.received_redirect_count()); |
| |
| request1->FollowDeferredRedirect( |
| base::nullopt /* modified_request_headers */); |
| delegate1.RunUntilComplete(); |
| EXPECT_EQ(1, delegate1.response_started_count()); |
| EXPECT_FALSE(delegate1.received_data_before_response()); |
| EXPECT_EQ(OK, delegate1.request_status()); |
| EXPECT_EQ("hello!", delegate1.data_received()); |
| |
| // Pump the message loop to allow read data to be consumed. |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_TRUE(data0.AllReadDataConsumed()); |
| EXPECT_TRUE(data0.AllWriteDataConsumed()); |
| EXPECT_TRUE(data1.AllReadDataConsumed()); |
| EXPECT_TRUE(data1.AllWriteDataConsumed()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushSingleDataFrame) { |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_priority, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| const char kPushedData[] = "pushed"; |
| spdy::SpdySerializedFrame stream2_body( |
| spdy_util_.ConstructSpdyDataFrame(2, kPushedData, true)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream1_body, 4), CreateMockRead(stream2_body, 5), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6), // Force a pause |
| }; |
| |
| HttpResponseInfo response; |
| HttpResponseInfo response2; |
| std::string expected_push_result("pushed"); |
| SequencedSocketData data(reads, writes); |
| RunServerPushTest(&data, |
| &response, |
| &response2, |
| expected_push_result); |
| |
| // Verify the response headers. |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| // Verify the pushed stream. |
| EXPECT_TRUE(response2.headers); |
| EXPECT_EQ("HTTP/1.1 200", response2.headers->GetStatusLine()); |
| } |
| |
| // When server push is disabled by |
| // HttpNetworkSession::initial_settings[SETTINGS_ENABLE_PUSH] = 0, verify that |
| // such a setting is sent out in the initial SETTINGS frame, and if the server |
| // creates a pushed stream despite of this, it is immediately reset. |
| TEST_F(SpdyNetworkTransactionTest, ServerPushDisabled) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame preface( |
| const_cast<char*>(spdy::kHttp2ConnectionHeaderPrefix), |
| spdy::kHttp2ConnectionHeaderPrefixSize, |
| /* owns_buffer = */ false); |
| |
| spdy::SettingsMap initial_settings; |
| initial_settings[spdy::SETTINGS_HEADER_TABLE_SIZE] = kSpdyMaxHeaderTableSize; |
| initial_settings[spdy::SETTINGS_ENABLE_PUSH] = 0; |
| initial_settings[spdy::SETTINGS_MAX_CONCURRENT_STREAMS] = |
| kSpdyMaxConcurrentPushedStreams; |
| spdy::SpdySerializedFrame initial_settings_frame( |
| spdy_util_.ConstructSpdySettings(initial_settings)); |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_REFUSED_STREAM)); |
| |
| MockWrite writes[] = {CreateMockWrite(preface, 0), |
| CreateMockWrite(initial_settings_frame, 1), |
| CreateMockWrite(req, 2), CreateMockWrite(rst, 5)}; |
| |
| spdy::SpdySerializedFrame reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame push( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = {CreateMockRead(reply, 3), CreateMockRead(push, 4), |
| CreateMockRead(body, 6), MockRead(ASYNC, OK, 7)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| auto session_deps = std::make_unique<SpdySessionDependencies>(); |
| session_deps->http2_settings[spdy::SETTINGS_ENABLE_PUSH] = 0; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| |
| SpdySessionPool* spdy_session_pool = helper.session()->spdy_session_pool(); |
| SpdySessionPoolPeer pool_peer(spdy_session_pool); |
| pool_peer.SetEnableSendingInitialData(true); |
| |
| helper.RunToCompletion(&data); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kPushDisabled), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushHeadMethod) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(priority, 2)}; |
| |
| spdy::SpdyHeaderBlock push_promise_header_block; |
| push_promise_header_block[spdy::kHttp2MethodHeader] = "HEAD"; |
| spdy_util_.AddUrlToHeaderBlock(kPushedUrl, &push_promise_header_block); |
| spdy::SpdySerializedFrame push_promise(spdy_util_.ConstructSpdyPushPromise( |
| 1, 2, std::move(push_promise_header_block))); |
| |
| spdy::SpdyHeaderBlock push_response_headers; |
| push_response_headers[spdy::kHttp2StatusHeader] = "200"; |
| push_response_headers["foo"] = "bar"; |
| spdy::SpdyHeadersIR headers_ir(2, std::move(push_response_headers)); |
| spdy::SpdySerializedFrame push_headers(spdy_util_.SerializeFrame(headers_ir)); |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(push_promise, 1), CreateMockRead(push_headers, 3), |
| CreateMockRead(resp, 4), CreateMockRead(body, 5), |
| // Do not close the connection after first request is done. |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| // Run first request. This reads PUSH_PROMISE. |
| helper.RunDefaultTest(); |
| |
| // Request the pushed resource. |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo request = CreateGetPushRequest(); |
| request.method = "HEAD"; |
| request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| const HttpResponseInfo* response = trans.GetResponseInfo(); |
| ASSERT_TRUE(response); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| ASSERT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| std::string value; |
| EXPECT_TRUE(response->headers->GetNormalizedHeader("foo", &value)); |
| EXPECT_EQ("bar", value); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushHeadDoesNotMatchGetRequest) { |
| spdy::SpdySerializedFrame req1( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(kPushedUrl, 3, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req1, 0), CreateMockWrite(priority, 2), |
| CreateMockWrite(req2, 6)}; |
| |
| spdy::SpdyHeaderBlock push_promise_header_block; |
| push_promise_header_block[spdy::kHttp2MethodHeader] = "HEAD"; |
| spdy_util_.AddUrlToHeaderBlock(kPushedUrl, &push_promise_header_block); |
| spdy::SpdySerializedFrame push_promise(spdy_util_.ConstructSpdyPushPromise( |
| 1, 2, std::move(push_promise_header_block))); |
| |
| spdy::SpdyHeaderBlock push_response_headers; |
| push_response_headers[spdy::kHttp2StatusHeader] = "200"; |
| push_response_headers["foo"] = "bar"; |
| spdy::SpdyHeadersIR headers_ir(2, std::move(push_response_headers)); |
| spdy::SpdySerializedFrame push_headers(spdy_util_.SerializeFrame(headers_ir)); |
| |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| MockRead reads[] = {CreateMockRead(push_promise, 1), |
| CreateMockRead(push_headers, 3), |
| CreateMockRead(resp1, 4), |
| CreateMockRead(body1, 5), |
| CreateMockRead(resp2, 7), |
| CreateMockRead(body2, 8), |
| MockRead(ASYNC, 0, 9)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| // Run first request. This reads PUSH_PROMISE. |
| helper.RunDefaultTest(); |
| |
| // Request the pushed resource. |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo request = CreateGetPushRequest(); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| const HttpResponseInfo* response = trans.GetResponseInfo(); |
| ASSERT_TRUE(response); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| ASSERT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| std::string value; |
| EXPECT_FALSE(response->headers->GetNormalizedHeader("foo", &value)); |
| std::string result; |
| ReadResult(&trans, &result); |
| EXPECT_EQ("hello!", result); |
| |
| // Read EOF. |
| base::RunLoop().RunUntilIdle(); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushSingleDataFrame2) { |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_priority, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| const char kPushedData[] = "pushed"; |
| spdy::SpdySerializedFrame stream2_body( |
| spdy_util_.ConstructSpdyDataFrame(2, kPushedData, true)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), |
| CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream2_body, 4), |
| CreateMockRead(stream1_body, 5, SYNCHRONOUS), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6), // Force a pause |
| }; |
| |
| HttpResponseInfo response; |
| HttpResponseInfo response2; |
| std::string expected_push_result("pushed"); |
| SequencedSocketData data(reads, writes); |
| RunServerPushTest(&data, |
| &response, |
| &response2, |
| expected_push_result); |
| |
| // Verify the response headers. |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| // Verify the pushed stream. |
| EXPECT_TRUE(response2.headers); |
| EXPECT_EQ("HTTP/1.1 200", response2.headers->GetStatusLine()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushUpdatesPriority) { |
| spdy::SpdySerializedFrame stream1_headers( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, HIGHEST)); |
| spdy::SpdySerializedFrame stream3_headers( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, MEDIUM)); |
| spdy::SpdySerializedFrame stream5_headers( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 5, MEDIUM)); |
| |
| // Stream 1 pushes two streams that are initially prioritized below stream 5. |
| // Stream 2 is later prioritized below stream 1 after it matches a request. |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 5, IDLE, true)); |
| spdy::SpdySerializedFrame stream4_priority( |
| spdy_util_.ConstructSpdyPriority(4, 2, IDLE, true)); |
| spdy::SpdySerializedFrame stream4_priority_update( |
| spdy_util_.ConstructSpdyPriority(4, 5, IDLE, true)); |
| spdy::SpdySerializedFrame stream2_priority_update( |
| spdy_util_.ConstructSpdyPriority(2, 1, HIGHEST, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_headers, 0), |
| CreateMockWrite(stream3_headers, 1), |
| CreateMockWrite(stream5_headers, 2), |
| CreateMockWrite(stream2_priority, 7), |
| CreateMockWrite(stream4_priority, 9), |
| CreateMockWrite(stream4_priority_update, 11), |
| CreateMockWrite(stream2_priority_update, 12), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream3_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame stream5_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 5)); |
| |
| spdy::SpdySerializedFrame stream2_push( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame stream4_push(spdy_util_.ConstructSpdyPush( |
| nullptr, 0, 4, 1, "https://www.example.org/bar.dat")); |
| |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame stream2_body( |
| spdy_util_.ConstructSpdyDataFrame(2, true)); |
| spdy::SpdySerializedFrame stream3_body( |
| spdy_util_.ConstructSpdyDataFrame(3, true)); |
| spdy::SpdySerializedFrame stream5_body( |
| spdy_util_.ConstructSpdyDataFrame(5, true)); |
| |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 3), |
| CreateMockRead(stream3_reply, 4), |
| CreateMockRead(stream5_reply, 5), |
| CreateMockRead(stream2_push, 6), |
| CreateMockRead(stream4_push, 8), |
| MockRead(ASYNC, ERR_IO_PENDING, 10), |
| CreateMockRead(stream1_body, 13), |
| CreateMockRead(stream2_body, 14), |
| CreateMockRead(stream3_body, 15), |
| CreateMockRead(stream5_body, 16), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 17), // Force a pause |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| SequencedSocketData data_placeholder1; |
| SequencedSocketData data_placeholder2; |
| SequencedSocketData data_placeholder3; |
| |
| NormalSpdyTransactionHelper helper(request_, LOWEST, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.AddData(&data_placeholder1); // other requests reuse the same socket |
| helper.AddData(&data_placeholder2); |
| helper.AddData(&data_placeholder3); |
| HttpNetworkTransaction trans1(HIGHEST, helper.session()); |
| HttpNetworkTransaction trans3(MEDIUM, helper.session()); |
| HttpNetworkTransaction trans5(MEDIUM, helper.session()); |
| |
| TestCompletionCallback callback1; |
| TestCompletionCallback callback3; |
| TestCompletionCallback callback5; |
| |
| // Start the ordinary requests. |
| ASSERT_THAT(trans1.Start(&request_, callback1.callback(), log_), |
| IsError(ERR_IO_PENDING)); |
| ASSERT_THAT(trans3.Start(&request_, callback3.callback(), log_), |
| IsError(ERR_IO_PENDING)); |
| ASSERT_THAT(trans5.Start(&request_, callback5.callback(), log_), |
| IsError(ERR_IO_PENDING)); |
| data.RunUntilPaused(); |
| |
| // Start a request that matches the push. |
| HttpRequestInfo push_req = CreateGetPushRequest(); |
| |
| HttpNetworkTransaction trans2(HIGHEST, helper.session()); |
| TestCompletionCallback callback2; |
| ASSERT_THAT(trans2.Start(&push_req, callback2.callback(), log_), |
| IsError(ERR_IO_PENDING)); |
| data.Resume(); |
| |
| base::RunLoop().RunUntilIdle(); |
| ASSERT_THAT(callback1.WaitForResult(), IsOk()); |
| ASSERT_THAT(callback2.WaitForResult(), IsOk()); |
| ASSERT_THAT(callback3.WaitForResult(), IsOk()); |
| ASSERT_THAT(callback5.WaitForResult(), IsOk()); |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushServerAborted) { |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_priority, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame stream2_rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), |
| CreateMockRead(stream2_syn, 2, SYNCHRONOUS), |
| CreateMockRead(stream2_rst, 4), |
| CreateMockRead(stream1_body, 5, SYNCHRONOUS), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6), // Force a pause |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| // Start the transaction with basic parameters. |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| // Verify that we consumed all test data. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| |
| // Verify the response headers. |
| HttpResponseInfo response = *trans->GetResponseInfo(); |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| } |
| |
| // Verify that we don't leak streams and that we properly send a reset |
| // if the server pushes the same stream twice. |
| TEST_F(SpdyNetworkTransactionTest, ServerPushDuplicate) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| spdy::SpdySerializedFrame stream3_rst( |
| spdy_util_.ConstructSpdyRstStream(4, spdy::ERROR_CODE_REFUSED_STREAM)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_priority, 3), |
| CreateMockWrite(stream3_rst, 5), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame stream3_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 4, 1, kPushedUrl)); |
| |
| const char kPushedData[] = "pushed"; |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame stream2_body( |
| spdy_util_.ConstructSpdyDataFrame(2, kPushedData, true)); |
| |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), |
| CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream3_syn, 4), |
| CreateMockRead(stream1_body, 6), |
| CreateMockRead(stream2_body, 7), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 8), // Force a pause |
| }; |
| |
| HttpResponseInfo response; |
| HttpResponseInfo response2; |
| std::string expected_push_result("pushed"); |
| SequencedSocketData data(reads, writes); |
| RunServerPushTest(&data, |
| &response, |
| &response2, |
| expected_push_result); |
| |
| // Verify the response headers. |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| // Verify the pushed stream. |
| EXPECT_TRUE(response2.headers); |
| EXPECT_EQ("HTTP/1.1 200", response2.headers->GetStatusLine()); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kAcceptedNoVary), 1); |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kDuplicateUrl), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 2); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushMultipleDataFrame) { |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_priority, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| static const char kPushedData[] = "pushed payload for chunked test"; |
| spdy::SpdySerializedFrame stream2_body_base( |
| spdy_util_.ConstructSpdyDataFrame(2, kPushedData, true)); |
| const size_t kChunkSize = SbStringGetLength(kPushedData) / 4; |
| spdy::SpdySerializedFrame stream2_body1(stream2_body_base.data(), kChunkSize, |
| false); |
| spdy::SpdySerializedFrame stream2_body2(stream2_body_base.data() + kChunkSize, |
| kChunkSize, false); |
| spdy::SpdySerializedFrame stream2_body3( |
| stream2_body_base.data() + 2 * kChunkSize, kChunkSize, false); |
| spdy::SpdySerializedFrame stream2_body4( |
| stream2_body_base.data() + 3 * kChunkSize, |
| stream2_body_base.size() - 3 * kChunkSize, false); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), |
| CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream2_body1, 4), |
| CreateMockRead(stream2_body2, 5), |
| CreateMockRead(stream2_body3, 6), |
| CreateMockRead(stream2_body4, 7), |
| CreateMockRead(stream1_body, 8, SYNCHRONOUS), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 9), // Force a pause |
| }; |
| |
| HttpResponseInfo response; |
| HttpResponseInfo response2; |
| std::string expected_push_result(kPushedData); |
| SequencedSocketData data(reads, writes); |
| RunServerPushTest(&data, &response, &response2, kPushedData); |
| |
| // Verify the response headers. |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| // Verify the pushed stream. |
| EXPECT_TRUE(response2.headers); |
| EXPECT_EQ("HTTP/1.1 200", response2.headers->GetStatusLine()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushMultipleDataFrameInterrupted) { |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_priority, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| static const char kPushedData[] = "pushed payload for chunked test"; |
| spdy::SpdySerializedFrame stream2_body_base( |
| spdy_util_.ConstructSpdyDataFrame(2, kPushedData, true)); |
| const size_t kChunkSize = SbStringGetLength(kPushedData) / 4; |
| spdy::SpdySerializedFrame stream2_body1(stream2_body_base.data(), kChunkSize, |
| false); |
| spdy::SpdySerializedFrame stream2_body2(stream2_body_base.data() + kChunkSize, |
| kChunkSize, false); |
| spdy::SpdySerializedFrame stream2_body3( |
| stream2_body_base.data() + 2 * kChunkSize, kChunkSize, false); |
| spdy::SpdySerializedFrame stream2_body4( |
| stream2_body_base.data() + 3 * kChunkSize, |
| stream2_body_base.size() - 3 * kChunkSize, false); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), |
| CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream2_body1, 4), |
| CreateMockRead(stream2_body2, 5), |
| CreateMockRead(stream2_body3, 6), |
| CreateMockRead(stream2_body4, 7), |
| CreateMockRead(stream1_body, 8, SYNCHRONOUS), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 9) // Force a pause. |
| }; |
| |
| HttpResponseInfo response; |
| HttpResponseInfo response2; |
| SequencedSocketData data(reads, writes); |
| RunServerPushTest(&data, &response, &response2, kPushedData); |
| |
| // Verify the response headers. |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| // Verify the pushed stream. |
| EXPECT_TRUE(response2.headers); |
| EXPECT_EQ("HTTP/1.1 200", response2.headers->GetStatusLine()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushInvalidUrl) { |
| base::HistogramTester histogram_tester; |
| |
| // Coverage on how a non-empty invalid GURL in a PUSH_PROMISE is handled. |
| spdy::SpdyHeaderBlock headers( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultUrl)); |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true)); |
| |
| // Can't use ConstructSpdyPush here since it wants to parse a URL and |
| // split it into the appropriate :header pieces. So we have to hand-fill |
| // those pieces in. |
| spdy::SpdyHeaderBlock push_promise_header_block; |
| push_promise_header_block[spdy::kHttp2AuthorityHeader] = ""; |
| push_promise_header_block[spdy::kHttp2SchemeHeader] = ""; |
| push_promise_header_block[spdy::kHttp2PathHeader] = "/index.html"; |
| |
| spdy::SpdySerializedFrame push_promise(spdy_util_.ConstructSpdyPushPromise( |
| 1, 2, std::move(push_promise_header_block))); |
| |
| spdy::SpdySerializedFrame stream2_rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_REFUSED_STREAM)); |
| |
| MockWrite writes[] = {CreateMockWrite(req, 0), |
| CreateMockWrite(stream2_rst, 2)}; |
| MockRead reads[] = { |
| CreateMockRead(push_promise, 1), MockRead(ASYNC, 0, 3) /* EOF */ |
| }; |
| SequencedSocketData data(reads, writes); |
| RunBrokenPushTest(&data, ERR_CONNECTION_CLOSED); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kInvalidUrl), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushInvalidAssociatedStreamID0) { |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame goaway( |
| spdy_util_.ConstructSpdyGoAway(0, spdy::ERROR_CODE_PROTOCOL_ERROR, |
| "Framer error: 1 (INVALID_STREAM_ID).")); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(goaway, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 0, kPushedUrl)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), CreateMockRead(stream2_syn, 2), |
| }; |
| SequencedSocketData data(reads, writes); |
| RunBrokenPushTest(&data, OK); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushInvalidAssociatedStreamID9) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame stream2_rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_STREAM_CLOSED)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_rst, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 9, kPushedUrl)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream1_body, 4), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 5), // Force a pause |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| RunBrokenPushTest(&data, OK); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kInactiveAssociatedStream), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerPushNoURL) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame stream2_rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_REFUSED_STREAM)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_rst, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdyHeaderBlock incomplete_headers; |
| incomplete_headers[spdy::kHttp2StatusHeader] = "200 OK"; |
| incomplete_headers["hello"] = "bye"; |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPushPromise(1, 2, std::move(incomplete_headers))); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream1_body, 4), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 5) // Force a pause |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| RunBrokenPushTest(&data, OK); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kInvalidUrl), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| // PUSH_PROMISE on a server-initiated stream should trigger GOAWAY. |
| TEST_F(SpdyNetworkTransactionTest, ServerPushOnPushedStream) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway( |
| 2, spdy::ERROR_CODE_PROTOCOL_ERROR, |
| "Received pushed stream id 4 on invalid stream id 2 (must be odd).")); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(stream2_priority, 3), |
| CreateMockWrite(goaway, 5), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame stream3_syn(spdy_util_.ConstructSpdyPush( |
| nullptr, 0, 4, 2, "https://www.example.org/bar.dat")); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream3_syn, 4), |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kAssociatedStreamIdParityError), |
| 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| // PUSH_PROMISE on a closed client-initiated stream should trigger RST_STREAM. |
| TEST_F(SpdyNetworkTransactionTest, ServerPushOnClosedStream) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_STREAM_CLOSED)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(rst, 5), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), CreateMockRead(stream1_body, 2), |
| CreateMockRead(stream2_syn, 3), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 4), |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| rv = callback.GetResult(rv); |
| EXPECT_THAT(rv, IsOk()); |
| |
| // Finish async network reads/writes. |
| base::RunLoop().RunUntilIdle(); |
| |
| HttpResponseInfo response = *trans->GetResponseInfo(); |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| VerifyStreamsClosed(helper); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kInactiveAssociatedStream), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| // PUSH_PROMISE on a server-initiated stream should trigger GOAWAY even if |
| // stream is closed. |
| TEST_F(SpdyNetworkTransactionTest, ServerPushOnClosedPushedStream) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream2_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway( |
| 2, spdy::ERROR_CODE_PROTOCOL_ERROR, |
| "Received pushed stream id 4 on invalid stream id 2 (must be odd).")); |
| MockWrite writes[] = {CreateMockWrite(stream1_syn, 0), |
| CreateMockWrite(stream2_priority, 3), |
| CreateMockWrite(goaway, 8)}; |
| |
| spdy::SpdySerializedFrame stream2_syn( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| const char kPushedData[] = "pushed"; |
| spdy::SpdySerializedFrame stream2_body( |
| spdy_util_.ConstructSpdyDataFrame(2, kPushedData, true)); |
| spdy::SpdySerializedFrame stream3_syn(spdy_util_.ConstructSpdyPush( |
| nullptr, 0, 4, 2, "https://www.example.org/bar.dat")); |
| |
| MockRead reads[] = { |
| CreateMockRead(stream2_syn, 1), CreateMockRead(stream1_reply, 2), |
| CreateMockRead(stream1_body, 4), CreateMockRead(stream2_body, 5), |
| MockRead(ASYNC, ERR_IO_PENDING, 6), CreateMockRead(stream3_syn, 7)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans1 = helper.trans(); |
| TestCompletionCallback callback1; |
| int rv = trans1->Start(&request_, callback1.callback(), log_); |
| rv = callback1.GetResult(rv); |
| EXPECT_THAT(rv, IsOk()); |
| HttpResponseInfo response = *trans1->GetResponseInfo(); |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| TestCompletionCallback callback2; |
| HttpRequestInfo request = CreateGetPushRequest(); |
| rv = trans2.Start(&request, callback2.callback(), log_); |
| rv = callback2.GetResult(rv); |
| EXPECT_THAT(rv, IsOk()); |
| response = *trans2.GetResponseInfo(); |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| std::string result; |
| ReadResult(&trans2, &result); |
| EXPECT_EQ(kPushedData, result); |
| |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kAssociatedStreamIdParityError), |
| 1); |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kAcceptedNoVary), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 2); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ServerCancelsPush) { |
| spdy::SpdySerializedFrame req1( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(kPushedUrl, 3, LOWEST)); |
| MockWrite writes1[] = {CreateMockWrite(req1, 0), CreateMockWrite(priority, 3), |
| CreateMockWrite(req2, 6)}; |
| |
| spdy::SpdySerializedFrame reply1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame push( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_INTERNAL_ERROR)); |
| spdy::SpdySerializedFrame reply2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| MockRead reads1[] = {CreateMockRead(reply1, 1), CreateMockRead(push, 2), |
| CreateMockRead(body1, 4), CreateMockRead(rst, 5), |
| CreateMockRead(reply2, 7), CreateMockRead(body2, 8), |
| MockRead(ASYNC, 0, 9)}; |
| |
| SequencedSocketData data(reads1, writes1); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| // First request opens up connection. |
| HttpNetworkTransaction* trans1 = helper.trans(); |
| TestCompletionCallback callback1; |
| int rv = trans1->Start(&request_, callback1.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Read until response body arrives. PUSH_PROMISE comes earlier. |
| rv = callback1.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| const HttpResponseInfo* response = trans1->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| std::string result1; |
| ReadResult(trans1, &result1); |
| EXPECT_EQ("hello!", result1); |
| |
| SpdySessionPool* spdy_session_pool = helper.session()->spdy_session_pool(); |
| SpdySessionKey key(host_port_pair_, ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| base::WeakPtr<SpdySession> spdy_session = |
| spdy_session_pool->FindAvailableSession( |
| key, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| EXPECT_EQ(1u, num_unclaimed_pushed_streams(spdy_session)); |
| |
| // Create request matching pushed stream. |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo request2 = CreateGetPushRequest(); |
| TestCompletionCallback callback2; |
| rv = trans2.Start(&request2, callback2.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pushed stream is now claimed by second request. |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session)); |
| |
| // Second request receives RST_STREAM and is retried on the same connection. |
| rv = callback2.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| response = trans2.GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| std::string result2; |
| ReadResult(&trans2, &result2); |
| EXPECT_EQ("hello!", result2); |
| |
| // Read EOF. |
| base::RunLoop().RunUntilIdle(); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Regression test for https://crbug.com/776415. |
| // A client-initiated request can only pool to an existing HTTP/2 connection if |
| // the IP address matches. However, a resource can be pushed by the server on a |
| // connection even if the IP address does not match. This test verifies that if |
| // the request binds to such a pushed stream, and after that the server resets |
| // the stream before SpdySession::GetPushedStream() is called, then the retry |
| // (using a client-initiated stream) does not pool to this connection. |
| TEST_F(SpdyNetworkTransactionTest, ServerCancelsCrossOriginPush) { |
| const char* kUrl1 = "https://www.example.org"; |
| const char* kUrl2 = "https://mail.example.org"; |
| |
| auto resolver = std::make_unique<MockHostResolver>(); |
| resolver->rules()->ClearRules(); |
| resolver->rules()->AddRule("www.example.org", "127.0.0.1"); |
| resolver->rules()->AddRule("mail.example.org", "127.0.0.2"); |
| |
| auto session_deps = std::make_unique<SpdySessionDependencies>(); |
| session_deps->host_resolver = std::move(resolver); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| |
| spdy::SpdySerializedFrame req1(spdy_util_.ConstructSpdyGet(kUrl1, 1, LOWEST)); |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes1[] = {CreateMockWrite(req1, 0), |
| CreateMockWrite(priority, 3)}; |
| |
| spdy::SpdySerializedFrame reply1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame push( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kUrl2)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_INTERNAL_ERROR)); |
| MockRead reads1[] = { |
| CreateMockRead(reply1, 1), CreateMockRead(push, 2), |
| CreateMockRead(body1, 4), CreateMockRead(rst, 5), |
| MockRead(ASYNC, ERR_IO_PENDING, 6), MockRead(ASYNC, 0, 7)}; |
| |
| SequencedSocketData data1(reads1, writes1); |
| |
| SpdyTestUtil spdy_util2; |
| spdy::SpdySerializedFrame req2(spdy_util2.ConstructSpdyGet(kUrl2, 1, LOWEST)); |
| MockWrite writes2[] = {CreateMockWrite(req2, 0)}; |
| |
| spdy::SpdySerializedFrame reply2( |
| spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body2(spdy_util2.ConstructSpdyDataFrame( |
| 1, "Response on the second connection.", true)); |
| MockRead reads2[] = {CreateMockRead(reply2, 1), CreateMockRead(body2, 2), |
| MockRead(ASYNC, 0, 3)}; |
| |
| SequencedSocketData data2(reads2, writes2); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data1); |
| helper.AddData(&data2); |
| |
| // First request opens up connection to www.example.org. |
| HttpNetworkTransaction* trans1 = helper.trans(); |
| HttpRequestInfo request1; |
| request1.method = "GET"; |
| request1.url = GURL(kUrl1); |
| request1.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback1; |
| int rv = trans1->Start(&request1, callback1.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Read until response body arrives. PUSH_PROMISE comes earlier. |
| rv = callback1.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| const HttpResponseInfo* response = trans1->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| std::string result1; |
| ReadResult(trans1, &result1); |
| EXPECT_EQ("hello!", result1); |
| |
| SpdySessionPool* spdy_session_pool = helper.session()->spdy_session_pool(); |
| SpdySessionKey key1(HostPortPair::FromURL(GURL(kUrl1)), ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| base::WeakPtr<SpdySession> spdy_session1 = |
| spdy_session_pool->FindAvailableSession( |
| key1, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| EXPECT_EQ(1u, num_unclaimed_pushed_streams(spdy_session1)); |
| |
| // While cross-origin push for kUrl2 is allowed on spdy_session1, |
| // a client-initiated request would not pool to this connection, |
| // because the IP address does not match. |
| SpdySessionKey key2(HostPortPair::FromURL(GURL(kUrl2)), ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| EXPECT_FALSE(spdy_session_pool->FindAvailableSession( |
| key2, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_)); |
| |
| // Create request matching pushed stream. |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo request2; |
| request2.method = "GET"; |
| request2.url = GURL(kUrl2); |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback2; |
| rv = trans2.Start(&request2, callback2.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pushed stream is now claimed by second request. |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session1)); |
| |
| // Second request receives RST_STREAM and is retried on a new connection. |
| rv = callback2.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| response = trans2.GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| std::string result2; |
| ReadResult(&trans2, &result2); |
| EXPECT_EQ("Response on the second connection.", result2); |
| |
| // Make sure that the first connection is still open. This is important in |
| // order to test that the retry created its own connection (because the IP |
| // address does not match), instead of using the connection of the cancelled |
| // pushed stream. |
| EXPECT_TRUE(spdy_session1); |
| |
| // Read EOF. |
| data1.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Regression test for https://crbug.com/727653. |
| TEST_F(SpdyNetworkTransactionTest, RejectServerPushWithNoMethod) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_REFUSED_STREAM)); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(rst, 3)}; |
| |
| spdy::SpdySerializedFrame reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| |
| spdy::SpdyHeaderBlock push_promise_header_block; |
| spdy_util_.AddUrlToHeaderBlock(kPushedUrl, &push_promise_header_block); |
| spdy::SpdySerializedFrame push_promise(spdy_util_.ConstructSpdyPushPromise( |
| 1, 2, std::move(push_promise_header_block))); |
| |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = {CreateMockRead(reply, 1), CreateMockRead(push_promise, 2), |
| CreateMockRead(body, 4), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 5)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kInvalidUrl), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| // Regression test for https://crbug.com/727653. |
| TEST_F(SpdyNetworkTransactionTest, RejectServerPushWithInvalidMethod) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_REFUSED_STREAM)); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(rst, 3)}; |
| |
| spdy::SpdySerializedFrame reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| |
| spdy::SpdyHeaderBlock push_promise_header_block; |
| push_promise_header_block[":method"] = "POST"; |
| spdy_util_.AddUrlToHeaderBlock(kPushedUrl, &push_promise_header_block); |
| spdy::SpdySerializedFrame push_promise(spdy_util_.ConstructSpdyPushPromise( |
| 1, 2, std::move(push_promise_header_block))); |
| |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = {CreateMockRead(reply, 1), CreateMockRead(push_promise, 2), |
| CreateMockRead(body, 4), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 5)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kInvalidUrl), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| // Verify that various response headers parse correctly through the HTTP layer. |
| TEST_F(SpdyNetworkTransactionTest, ResponseHeaders) { |
| struct ResponseHeadersTests { |
| int extra_header_count; |
| const char* extra_headers[4]; |
| size_t expected_header_count; |
| base::StringPiece expected_headers[8]; |
| } test_cases[] = { |
| // No extra headers. |
| {0, {}, 2, {"status", "200", "hello", "bye"}}, |
| // Comma-separated header value. |
| {1, |
| {"cookie", "val1, val2"}, |
| 3, |
| {"status", "200", "hello", "bye", "cookie", "val1, val2"}}, |
| // Multiple headers are preserved: they are joined with \0 separator in |
| // spdy::SpdyHeaderBlock.AppendValueOrAddHeader(), then split up in |
| // HpackEncoder, then joined with \0 separator when |
| // spdy::HpackDecoderAdapter::ListenerAdapter::OnHeader() calls |
| // spdy::SpdyHeaderBlock.AppendValueOrAddHeader(), then split up again in |
| // HttpResponseHeaders. |
| {2, |
| {"content-encoding", "val1", "content-encoding", "val2"}, |
| 4, |
| {"status", "200", "hello", "bye", "content-encoding", "val1", |
| "content-encoding", "val2"}}, |
| // Cookie header is not split up by HttpResponseHeaders. |
| {2, |
| {"cookie", "val1", "cookie", "val2"}, |
| 3, |
| {"status", "200", "hello", "bye", "cookie", "val1; val2"}}}; |
| |
| for (size_t i = 0; i < arraysize(test_cases); ++i) { |
| SpdyTestUtil spdy_test_util; |
| spdy::SpdySerializedFrame req( |
| spdy_test_util.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp(spdy_test_util.ConstructSpdyGetReply( |
| test_cases[i].extra_headers, test_cases[i].extra_header_count, 1)); |
| spdy::SpdySerializedFrame body( |
| spdy_test_util.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| |
| scoped_refptr<HttpResponseHeaders> headers = out.response_info.headers; |
| EXPECT_TRUE(headers); |
| size_t iter = 0; |
| std::string name, value; |
| size_t expected_header_index = 0; |
| while (headers->EnumerateHeaderLines(&iter, &name, &value)) { |
| ASSERT_LT(expected_header_index, test_cases[i].expected_header_count) |
| << i; |
| EXPECT_EQ(name, test_cases[i].expected_headers[2 * expected_header_index]) |
| << i; |
| EXPECT_EQ(value, |
| test_cases[i].expected_headers[2 * expected_header_index + 1]) |
| << i; |
| ++expected_header_index; |
| } |
| EXPECT_EQ(expected_header_index, test_cases[i].expected_header_count) << i; |
| } |
| } |
| |
| // Verify that various response headers parse vary fields correctly through the |
| // HTTP layer, and the response matches the request. |
| TEST_F(SpdyNetworkTransactionTest, ResponseHeadersVary) { |
| // Modify the following data to change/add test cases: |
| struct ResponseTests { |
| bool vary_matches; |
| int num_headers[2]; |
| const char* extra_headers[2][16]; |
| } test_cases[] = { |
| // Test the case of a multi-valued cookie. When the value is delimited |
| // with NUL characters, it needs to be unfolded into multiple headers. |
| {true, |
| {1, 3}, |
| {{"cookie", "val1,val2", nullptr}, |
| {spdy::kHttp2StatusHeader, "200", spdy::kHttp2PathHeader, "/index.php", |
| "vary", "cookie", nullptr}}}, |
| {// Multiple vary fields. |
| true, |
| {2, 4}, |
| {{"friend", "barney", "enemy", "snaggletooth", nullptr}, |
| {spdy::kHttp2StatusHeader, "200", spdy::kHttp2PathHeader, "/index.php", |
| "vary", "friend", "vary", "enemy", nullptr}}}, |
| {// Test a '*' vary field. |
| true, |
| {1, 3}, |
| {{"cookie", "val1,val2", nullptr}, |
| {spdy::kHttp2StatusHeader, "200", spdy::kHttp2PathHeader, "/index.php", |
| "vary", "*", nullptr}}}, |
| {// Test w/o a vary field. |
| false, |
| {1, 2}, |
| {{"cookie", "val1,val2", nullptr}, |
| {spdy::kHttp2StatusHeader, "200", spdy::kHttp2PathHeader, "/index.php", |
| nullptr}}}, |
| |
| {// Multiple comma-separated vary fields. |
| true, |
| {2, 3}, |
| {{"friend", "barney", "enemy", "snaggletooth", nullptr}, |
| {spdy::kHttp2StatusHeader, "200", spdy::kHttp2PathHeader, "/index.php", |
| "vary", "friend,enemy", nullptr}}}}; |
| |
| for (size_t i = 0; i < arraysize(test_cases); ++i) { |
| SpdyTestUtil spdy_test_util; |
| |
| // Construct the request. |
| spdy::SpdySerializedFrame frame_req(spdy_test_util.ConstructSpdyGet( |
| test_cases[i].extra_headers[0], test_cases[i].num_headers[0], 1, |
| LOWEST)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(frame_req, 0), |
| }; |
| |
| // Construct the reply. |
| spdy::SpdyHeaderBlock reply_headers; |
| AppendToHeaderBlock(test_cases[i].extra_headers[1], |
| test_cases[i].num_headers[1], |
| &reply_headers); |
| // Construct the expected header reply string before moving |reply_headers|. |
| std::string expected_reply = |
| spdy_test_util.ConstructSpdyReplyString(reply_headers); |
| |
| spdy::SpdySerializedFrame frame_reply( |
| spdy_test_util.ConstructSpdyReply(1, std::move(reply_headers))); |
| |
| spdy::SpdySerializedFrame body( |
| spdy_test_util.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(frame_reply, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| // Attach the headers to the request. |
| int header_count = test_cases[i].num_headers[0]; |
| |
| HttpRequestInfo request; |
| request.method = "GET"; |
| request.url = GURL(kDefaultUrl); |
| request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| for (int ct = 0; ct < header_count; ct++) { |
| const char* header_key = test_cases[i].extra_headers[0][ct * 2]; |
| const char* header_value = test_cases[i].extra_headers[0][ct * 2 + 1]; |
| request.extra_headers.SetHeader(header_key, header_value); |
| } |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request, DEFAULT_PRIORITY, log_, |
| nullptr); |
| |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| |
| EXPECT_EQ(OK, out.rv) << i; |
| EXPECT_EQ("HTTP/1.1 200", out.status_line) << i; |
| EXPECT_EQ("hello!", out.response_data) << i; |
| |
| // Test the response information. |
| EXPECT_EQ(out.response_info.vary_data.is_valid(), |
| test_cases[i].vary_matches) << i; |
| |
| // Check the headers. |
| scoped_refptr<HttpResponseHeaders> headers = out.response_info.headers; |
| ASSERT_TRUE(headers) << i; |
| size_t iter = 0; |
| std::string name, value, lines; |
| while (headers->EnumerateHeaderLines(&iter, &name, &value)) { |
| lines.append(name); |
| lines.append(": "); |
| lines.append(value); |
| lines.append("\n"); |
| } |
| |
| EXPECT_EQ(expected_reply, lines) << i; |
| } |
| } |
| |
| // Verify that we don't crash on invalid response headers. |
| TEST_F(SpdyNetworkTransactionTest, InvalidResponseHeaders) { |
| struct InvalidResponseHeadersTests { |
| int num_headers; |
| const char* headers[10]; |
| } test_cases[] = { |
| // Response headers missing status header |
| { |
| 3, |
| {spdy::kHttp2PathHeader, "/index.php", "cookie", "val1", "cookie", |
| "val2", nullptr}, |
| }, |
| // Response headers missing version header |
| { |
| 1, {spdy::kHttp2PathHeader, "/index.php", "status", "200", nullptr}, |
| }, |
| // Response headers with no headers |
| { |
| 0, {nullptr}, |
| }, |
| }; |
| |
| for (size_t i = 0; i < arraysize(test_cases); ++i) { |
| SpdyTestUtil spdy_test_util; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_test_util.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst(spdy_test_util.ConstructSpdyRstStream( |
| 1, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(rst, 2), |
| }; |
| |
| // Construct the reply. |
| spdy::SpdyHeaderBlock reply_headers; |
| AppendToHeaderBlock( |
| test_cases[i].headers, test_cases[i].num_headers, &reply_headers); |
| spdy::SpdySerializedFrame resp( |
| spdy_test_util.ConstructSpdyReply(1, std::move(reply_headers))); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| } |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, CorruptFrameSessionError) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame goaway( |
| spdy_util_.ConstructSpdyGoAway(0, spdy::ERROR_CODE_COMPRESSION_ERROR, |
| "Framer error: 6 (DECOMPRESS_FAILURE).")); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(goaway, 2)}; |
| |
| // This is the length field that's too short. |
| spdy::SpdySerializedFrame reply_wrong_length( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| size_t right_size = reply_wrong_length.size() - spdy::kFrameHeaderSize; |
| size_t wrong_size = right_size - 4; |
| spdy::test::SetFrameLength(&reply_wrong_length, wrong_size); |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, reply_wrong_length.data(), reply_wrong_length.size() - 4, |
| 1), |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_COMPRESSION_ERROR)); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, GoAwayOnDecompressionFailure) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame goaway( |
| spdy_util_.ConstructSpdyGoAway(0, spdy::ERROR_CODE_COMPRESSION_ERROR, |
| "Framer error: 6 (DECOMPRESS_FAILURE).")); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(goaway, 2)}; |
| |
| // Read HEADERS with corrupted payload. |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| SbMemorySet(resp.data() + 12, 0xcf, resp.size() - 12); |
| MockRead reads[] = {CreateMockRead(resp, 1)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_COMPRESSION_ERROR)); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, GoAwayOnFrameSizeError) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway( |
| 0, spdy::ERROR_CODE_FRAME_SIZE_ERROR, |
| "Framer error: 15 (INVALID_CONTROL_FRAME_SIZE).")); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(goaway, 2)}; |
| |
| // Read WINDOW_UPDATE with incorrectly-sized payload. |
| spdy::SpdySerializedFrame bad_window_update( |
| spdy_util_.ConstructSpdyWindowUpdate(1, 1)); |
| spdy::test::SetFrameLength(&bad_window_update, bad_window_update.size() - 1); |
| MockRead reads[] = {CreateMockRead(bad_window_update, 1)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_FRAME_SIZE_ERROR)); |
| } |
| |
| // Test that we shutdown correctly on write errors. |
| TEST_F(SpdyNetworkTransactionTest, WriteError) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = { |
| // We'll write 10 bytes successfully |
| MockWrite(ASYNC, req.data(), 10, 1), |
| // Followed by ERROR! |
| MockWrite(ASYNC, ERR_FAILED, 2), |
| // Session drains and attempts to write a GOAWAY: Another ERROR! |
| MockWrite(ASYNC, ERR_FAILED, 3), |
| }; |
| |
| MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| helper.FinishDefaultTest(); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_FAILED)); |
| } |
| |
| // Test that partial writes work. |
| TEST_F(SpdyNetworkTransactionTest, PartialWrite) { |
| // Chop the HEADERS frame into 5 chunks. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| const int kChunks = 5; |
| std::unique_ptr<MockWrite[]> writes = ChopWriteFrame(req, kChunks); |
| for (int i = 0; i < kChunks; ++i) { |
| writes[i].sequence_number = i; |
| } |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, kChunks), CreateMockRead(body, kChunks + 1), |
| MockRead(ASYNC, 0, kChunks + 2) // EOF |
| }; |
| |
| SequencedSocketData data(reads, base::make_span(writes.get(), kChunks)); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| // Test that the NetLog contains good data for a simple GET request. |
| TEST_F(SpdyNetworkTransactionTest, NetLog) { |
| static const char* const kExtraHeaders[] = { |
| "user-agent", "Chrome", |
| }; |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(kExtraHeaders, 1, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| BoundTestNetLog log; |
| |
| SequencedSocketData data(reads, writes); |
| request_.extra_headers.SetHeader("User-Agent", "Chrome"); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log.bound(), |
| nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| |
| // Check that the NetLog was filled reasonably. |
| // This test is intentionally non-specific about the exact ordering of the |
| // log; instead we just check to make sure that certain events exist, and that |
| // they are in the right order. |
| TestNetLogEntry::List entries; |
| log.GetEntries(&entries); |
| |
| EXPECT_LT(0u, entries.size()); |
| int pos = 0; |
| pos = ExpectLogContainsSomewhere( |
| entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST, |
| NetLogEventPhase::BEGIN); |
| pos = ExpectLogContainsSomewhere( |
| entries, pos + 1, NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST, |
| NetLogEventPhase::END); |
| pos = ExpectLogContainsSomewhere( |
| entries, pos + 1, NetLogEventType::HTTP_TRANSACTION_READ_HEADERS, |
| NetLogEventPhase::BEGIN); |
| pos = ExpectLogContainsSomewhere( |
| entries, pos + 1, NetLogEventType::HTTP_TRANSACTION_READ_HEADERS, |
| NetLogEventPhase::END); |
| pos = ExpectLogContainsSomewhere(entries, pos + 1, |
| NetLogEventType::HTTP_TRANSACTION_READ_BODY, |
| NetLogEventPhase::BEGIN); |
| pos = ExpectLogContainsSomewhere(entries, pos + 1, |
| NetLogEventType::HTTP_TRANSACTION_READ_BODY, |
| NetLogEventPhase::END); |
| |
| // Check that we logged all the headers correctly |
| pos = ExpectLogContainsSomewhere(entries, 0, |
| NetLogEventType::HTTP2_SESSION_SEND_HEADERS, |
| NetLogEventPhase::NONE); |
| |
| base::ListValue* header_list; |
| ASSERT_TRUE(entries[pos].params.get()); |
| ASSERT_TRUE(entries[pos].params->GetList("headers", &header_list)); |
| |
| std::vector<std::string> expected; |
| expected.push_back(std::string(spdy::kHttp2AuthorityHeader) + |
| ": www.example.org"); |
| expected.push_back(std::string(spdy::kHttp2PathHeader) + ": /"); |
| expected.push_back(std::string(spdy::kHttp2SchemeHeader) + ": " + |
| default_url_.scheme()); |
| expected.push_back(std::string(spdy::kHttp2MethodHeader) + ": GET"); |
| expected.push_back("user-agent: Chrome"); |
| EXPECT_EQ(expected.size(), header_list->GetSize()); |
| for (std::vector<std::string>::const_iterator it = expected.begin(); |
| it != expected.end(); ++it) { |
| base::Value header(*it); |
| EXPECT_NE(header_list->end(), header_list->Find(header)) << |
| "Header not found: " << *it; |
| } |
| } |
| |
| // Since we buffer the IO from the stream to the renderer, this test verifies |
| // that when we read out the maximum amount of data (e.g. we received 50 bytes |
| // on the network, but issued a Read for only 5 of those bytes) that the data |
| // flow still works correctly. |
| TEST_F(SpdyNetworkTransactionTest, BufferFull) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| // 2 data frames in a single read. |
| spdy::SpdySerializedFrame data_frame_1( |
| spdy_util_.ConstructSpdyDataFrame(1, "goodby", /*fin=*/false)); |
| spdy::SpdySerializedFrame data_frame_2( |
| spdy_util_.ConstructSpdyDataFrame(1, "e worl", /*fin=*/false)); |
| spdy::SpdySerializedFrame combined_data_frames = |
| CombineFrames({&data_frame_1, &data_frame_2}); |
| |
| spdy::SpdySerializedFrame last_frame( |
| spdy_util_.ConstructSpdyDataFrame(1, "d", /*fin=*/true)); |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), |
| MockRead(ASYNC, ERR_IO_PENDING, 2), // Force a pause |
| CreateMockRead(combined_data_frames, 3), |
| MockRead(ASYNC, ERR_IO_PENDING, 4), // Force a pause |
| CreateMockRead(last_frame, 5), |
| MockRead(ASYNC, 0, 6) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| TestCompletionCallback callback; |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| TransactionHelperResult out = helper.output(); |
| out.rv = callback.WaitForResult(); |
| EXPECT_EQ(out.rv, OK); |
| |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| out.status_line = response->headers->GetStatusLine(); |
| out.response_info = *response; // Make a copy so we can verify. |
| |
| // Read Data |
| TestCompletionCallback read_callback; |
| |
| std::string content; |
| do { |
| // Read small chunks at a time. |
| const int kSmallReadSize = 3; |
| scoped_refptr<IOBuffer> buf = |
| base::MakeRefCounted<IOBuffer>(kSmallReadSize); |
| rv = trans->Read(buf.get(), kSmallReadSize, read_callback.callback()); |
| if (rv == ERR_IO_PENDING) { |
| data.Resume(); |
| rv = read_callback.WaitForResult(); |
| } |
| if (rv > 0) { |
| content.append(buf->data(), rv); |
| } else if (rv < 0) { |
| NOTREACHED(); |
| } |
| } while (rv > 0); |
| |
| out.response_data.swap(content); |
| |
| // Flush the MessageLoop while the SpdySessionDependencies (in particular, the |
| // MockClientSocketFactory) are still alive. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that we consumed all test data. |
| helper.VerifyDataConsumed(); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("goodbye world", out.response_data); |
| } |
| |
| // Verify that basic buffering works; when multiple data frames arrive |
| // at the same time, ensure that we don't notify a read completion for |
| // each data frame individually. |
| TEST_F(SpdyNetworkTransactionTest, Buffering) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| // 4 data frames in a single read. |
| spdy::SpdySerializedFrame data_frame( |
| spdy_util_.ConstructSpdyDataFrame(1, "message", /*fin=*/false)); |
| spdy::SpdySerializedFrame data_frame_fin( |
| spdy_util_.ConstructSpdyDataFrame(1, "message", /*fin=*/true)); |
| spdy::SpdySerializedFrame combined_data_frames = |
| CombineFrames({&data_frame, &data_frame, &data_frame, &data_frame_fin}); |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), |
| MockRead(ASYNC, ERR_IO_PENDING, 2), // Force a pause |
| CreateMockRead(combined_data_frames, 3), MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| TransactionHelperResult out = helper.output(); |
| out.rv = callback.WaitForResult(); |
| EXPECT_EQ(out.rv, OK); |
| |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| out.status_line = response->headers->GetStatusLine(); |
| out.response_info = *response; // Make a copy so we can verify. |
| |
| // Read Data |
| TestCompletionCallback read_callback; |
| |
| std::string content; |
| int reads_completed = 0; |
| do { |
| // Read small chunks at a time. |
| const int kSmallReadSize = 14; |
| scoped_refptr<IOBuffer> buf = |
| base::MakeRefCounted<IOBuffer>(kSmallReadSize); |
| rv = trans->Read(buf.get(), kSmallReadSize, read_callback.callback()); |
| if (rv == ERR_IO_PENDING) { |
| data.Resume(); |
| rv = read_callback.WaitForResult(); |
| } |
| if (rv > 0) { |
| EXPECT_EQ(kSmallReadSize, rv); |
| content.append(buf->data(), rv); |
| } else if (rv < 0) { |
| FAIL() << "Unexpected read error: " << rv; |
| } |
| reads_completed++; |
| } while (rv > 0); |
| |
| EXPECT_EQ(3, reads_completed); // Reads are: 14 bytes, 14 bytes, 0 bytes. |
| |
| out.response_data.swap(content); |
| |
| // Flush the MessageLoop while the SpdySessionDependencies (in particular, the |
| // MockClientSocketFactory) are still alive. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that we consumed all test data. |
| helper.VerifyDataConsumed(); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("messagemessagemessagemessage", out.response_data); |
| } |
| |
| // Verify the case where we buffer data but read it after it has been buffered. |
| TEST_F(SpdyNetworkTransactionTest, BufferedAll) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| // 5 data frames in a single read. |
| spdy::SpdySerializedFrame reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame data_frame( |
| spdy_util_.ConstructSpdyDataFrame(1, "message", /*fin=*/false)); |
| spdy::SpdySerializedFrame data_frame_fin( |
| spdy_util_.ConstructSpdyDataFrame(1, "message", /*fin=*/true)); |
| spdy::SpdySerializedFrame combined_frames = CombineFrames( |
| {&reply, &data_frame, &data_frame, &data_frame, &data_frame_fin}); |
| |
| MockRead reads[] = { |
| CreateMockRead(combined_frames, 1), MockRead(ASYNC, 0, 2) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| TransactionHelperResult out = helper.output(); |
| out.rv = callback.WaitForResult(); |
| EXPECT_EQ(out.rv, OK); |
| |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| out.status_line = response->headers->GetStatusLine(); |
| out.response_info = *response; // Make a copy so we can verify. |
| |
| // Read Data |
| TestCompletionCallback read_callback; |
| |
| std::string content; |
| int reads_completed = 0; |
| do { |
| // Read small chunks at a time. |
| const int kSmallReadSize = 14; |
| scoped_refptr<IOBuffer> buf = |
| base::MakeRefCounted<IOBuffer>(kSmallReadSize); |
| rv = trans->Read(buf.get(), kSmallReadSize, read_callback.callback()); |
| if (rv > 0) { |
| EXPECT_EQ(kSmallReadSize, rv); |
| content.append(buf->data(), rv); |
| } else if (rv < 0) { |
| FAIL() << "Unexpected read error: " << rv; |
| } |
| reads_completed++; |
| } while (rv > 0); |
| |
| EXPECT_EQ(3, reads_completed); |
| |
| out.response_data.swap(content); |
| |
| // Flush the MessageLoop while the SpdySessionDependencies (in particular, the |
| // MockClientSocketFactory) are still alive. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that we consumed all test data. |
| helper.VerifyDataConsumed(); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("messagemessagemessagemessage", out.response_data); |
| } |
| |
| // Verify the case where we buffer data and close the connection. |
| TEST_F(SpdyNetworkTransactionTest, BufferedClosed) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| // All data frames in a single read. |
| // NOTE: We don't FIN the stream. |
| spdy::SpdySerializedFrame data_frame( |
| spdy_util_.ConstructSpdyDataFrame(1, "message", /*fin=*/false)); |
| spdy::SpdySerializedFrame combined_data_frames = |
| CombineFrames({&data_frame, &data_frame, &data_frame, &data_frame}); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), |
| MockRead(ASYNC, ERR_IO_PENDING, 2), // Force a wait |
| CreateMockRead(combined_data_frames, 3), MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| TransactionHelperResult out = helper.output(); |
| out.rv = callback.WaitForResult(); |
| EXPECT_EQ(out.rv, OK); |
| |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| out.status_line = response->headers->GetStatusLine(); |
| out.response_info = *response; // Make a copy so we can verify. |
| |
| // Read Data |
| TestCompletionCallback read_callback; |
| |
| std::string content; |
| int reads_completed = 0; |
| do { |
| // Read small chunks at a time. |
| const int kSmallReadSize = 14; |
| scoped_refptr<IOBuffer> buf = |
| base::MakeRefCounted<IOBuffer>(kSmallReadSize); |
| rv = trans->Read(buf.get(), kSmallReadSize, read_callback.callback()); |
| if (rv == ERR_IO_PENDING) { |
| data.Resume(); |
| rv = read_callback.WaitForResult(); |
| } |
| if (rv > 0) { |
| content.append(buf->data(), rv); |
| } else if (rv < 0) { |
| // This test intentionally closes the connection, and will get an error. |
| EXPECT_THAT(rv, IsError(ERR_CONNECTION_CLOSED)); |
| break; |
| } |
| reads_completed++; |
| } while (rv > 0); |
| |
| EXPECT_EQ(0, reads_completed); |
| |
| out.response_data.swap(content); |
| |
| // Flush the MessageLoop while the SpdySessionDependencies (in particular, the |
| // MockClientSocketFactory) are still alive. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that we consumed all test data. |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Verify the case where we buffer data and cancel the transaction. |
| TEST_F(SpdyNetworkTransactionTest, BufferedCancelled) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL)); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(rst, 4)}; |
| |
| // NOTE: We don't FIN the stream. |
| spdy::SpdySerializedFrame data_frame( |
| spdy_util_.ConstructSpdyDataFrame(1, "message", /*fin=*/false)); |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), |
| MockRead(ASYNC, ERR_IO_PENDING, 2), // Force a wait |
| CreateMockRead(data_frame, 3), MockRead(ASYNC, 0, 5) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| TestCompletionCallback callback; |
| |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| TransactionHelperResult out = helper.output(); |
| out.rv = callback.WaitForResult(); |
| EXPECT_EQ(out.rv, OK); |
| |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| out.status_line = response->headers->GetStatusLine(); |
| out.response_info = *response; // Make a copy so we can verify. |
| |
| // Read Data |
| TestCompletionCallback read_callback; |
| |
| const int kReadSize = 256; |
| scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(kReadSize); |
| rv = trans->Read(buf.get(), kReadSize, read_callback.callback()); |
| ASSERT_EQ(ERR_IO_PENDING, rv) << "Unexpected read: " << rv; |
| |
| // Complete the read now, which causes buffering to start. |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| // Destroy the transaction, causing the stream to get cancelled |
| // and orphaning the buffered IO task. |
| helper.ResetTrans(); |
| |
| // Flush the MessageLoop; this will cause the buffered IO task |
| // to run for the final time. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that we consumed all test data. |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Request should fail upon receiving a GOAWAY frame |
| // with Last-Stream-ID lower than the stream id corresponding to the request |
| // and with error code other than NO_ERROR. |
| TEST_F(SpdyNetworkTransactionTest, FailOnGoAway) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame go_away( |
| spdy_util_.ConstructSpdyGoAway(0, spdy::ERROR_CODE_INTERNAL_ERROR, "")); |
| MockRead reads[] = { |
| CreateMockRead(go_away, 1), |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_ABORTED)); |
| } |
| |
| // Request should be retried on a new connection upon receiving a GOAWAY frame |
| // with Last-Stream-ID lower than the stream id corresponding to the request |
| // and with error code NO_ERROR. |
| TEST_F(SpdyNetworkTransactionTest, RetryOnGoAway) { |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| // First connection. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes1[] = {CreateMockWrite(req, 0)}; |
| spdy::SpdySerializedFrame go_away( |
| spdy_util_.ConstructSpdyGoAway(0, spdy::ERROR_CODE_NO_ERROR, "")); |
| MockRead reads1[] = {CreateMockRead(go_away, 1)}; |
| SequencedSocketData data1(reads1, writes1); |
| helper.AddData(&data1); |
| |
| // Second connection. |
| MockWrite writes2[] = {CreateMockWrite(req, 0)}; |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads2[] = {CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3)}; |
| SequencedSocketData data2(reads2, writes2); |
| helper.AddData(&data2); |
| |
| helper.RunPreTestSetup(); |
| helper.RunDefaultTest(); |
| |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // A server can gracefully shut down by sending a GOAWAY frame |
| // with maximum last-stream-id value. |
| // Transactions started before receiving such a GOAWAY frame should succeed, |
| // but SpdySession should be unavailable for new streams. |
| TEST_F(SpdyNetworkTransactionTest, GracefulGoaway) { |
| spdy::SpdySerializedFrame req1( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet("https://www.example.org/foo", 3, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req1, 0), CreateMockWrite(req2, 3)}; |
| |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway( |
| 0x7fffffff, spdy::ERROR_CODE_NO_ERROR, "Graceful shutdown.")); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| MockRead reads[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2), |
| CreateMockRead(goaway, 4), CreateMockRead(resp2, 5), |
| CreateMockRead(body2, 6), MockRead(ASYNC, 0, 7)}; |
| |
| // Run first transaction. |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.RunDefaultTest(); |
| |
| // Verify first response. |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| |
| // GOAWAY frame has not yet been received, SpdySession should be available. |
| SpdySessionPool* spdy_session_pool = helper.session()->spdy_session_pool(); |
| SpdySessionKey key(host_port_pair_, ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| base::WeakPtr<SpdySession> spdy_session = |
| spdy_session_pool->FindAvailableSession( |
| key, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| EXPECT_TRUE(spdy_session); |
| |
| // Start second transaction. |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| TestCompletionCallback callback; |
| HttpRequestInfo request2; |
| request2.method = "GET"; |
| request2.url = GURL("https://www.example.org/foo"); |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| int rv = trans2.Start(&request2, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| // Verify second response. |
| const HttpResponseInfo* response = trans2.GetResponseInfo(); |
| ASSERT_TRUE(response); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2, response->connection_info); |
| ASSERT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_EQ("127.0.0.1", response->socket_address.host()); |
| EXPECT_EQ(443, response->socket_address.port()); |
| std::string response_data; |
| rv = ReadTransaction(&trans2, &response_data); |
| EXPECT_THAT(rv, IsOk()); |
| EXPECT_EQ("hello!", response_data); |
| |
| // Graceful GOAWAY was received, SpdySession should be unavailable. |
| spdy_session = spdy_session_pool->FindAvailableSession( |
| key, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| EXPECT_FALSE(spdy_session); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, CloseWithActiveStream) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), MockRead(SYNCHRONOUS, 0, 2) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.StartDefaultTest(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_IO_PENDING)); |
| |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_CONNECTION_CLOSED)); |
| |
| const HttpResponseInfo* response = helper.trans()->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| |
| // Verify that we consumed all test data. |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, GoAwayImmediately) { |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway(1)); |
| MockRead reads[] = {CreateMockRead(goaway, 0, SYNCHRONOUS)}; |
| SequencedSocketData data(reads, base::span<MockWrite>()); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.StartDefaultTest(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_IO_PENDING)); |
| |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_CONNECTION_CLOSED)); |
| |
| const HttpResponseInfo* response = helper.trans()->GetResponseInfo(); |
| EXPECT_FALSE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| |
| // Verify that we consumed all test data. |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Retry with HTTP/1.1 when receiving HTTP_1_1_REQUIRED. Note that no actual |
| // protocol negotiation happens, instead this test forces protocols for both |
| // sockets. |
| TEST_F(SpdyNetworkTransactionTest, HTTP11RequiredRetry) { |
| request_.method = "GET"; |
| // Do not force SPDY so that second socket can negotiate HTTP/1.1. |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| // First socket: HTTP/2 request rejected with HTTP_1_1_REQUIRED. |
| spdy::SpdyHeaderBlock headers( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultUrl)); |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true)); |
| MockWrite writes0[] = {CreateMockWrite(req, 0)}; |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_HTTP_1_1_REQUIRED)); |
| MockRead reads0[] = {CreateMockRead(rst, 1)}; |
| SequencedSocketData data0(reads0, writes0); |
| |
| auto ssl_provider0 = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| // Expect HTTP/2 protocols too in SSLConfig. |
| ssl_provider0->next_protos_expected_in_ssl_config = |
| NextProtoVector{kProtoHTTP2, kProtoHTTP11}; |
| // Force SPDY. |
| ssl_provider0->next_proto = kProtoHTTP2; |
| helper.AddDataWithSSLSocketDataProvider(&data0, std::move(ssl_provider0)); |
| |
| // Second socket: falling back to HTTP/1.1. |
| MockWrite writes1[] = {MockWrite(ASYNC, 0, |
| "GET / HTTP/1.1\r\n" |
| "Host: www.example.org\r\n" |
| "Connection: keep-alive\r\n\r\n")}; |
| MockRead reads1[] = {MockRead(ASYNC, 1, |
| "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 5\r\n\r\n" |
| "hello")}; |
| SequencedSocketData data1(reads1, writes1); |
| |
| auto ssl_provider1 = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| // Expect only HTTP/1.1 protocol in SSLConfig. |
| ssl_provider1->next_protos_expected_in_ssl_config = |
| NextProtoVector{kProtoHTTP11}; |
| // Force HTTP/1.1. |
| ssl_provider1->next_proto = kProtoHTTP11; |
| helper.AddDataWithSSLSocketDataProvider(&data1, std::move(ssl_provider1)); |
| |
| HttpServerProperties* http_server_properties = |
| helper.session()->spdy_session_pool()->http_server_properties(); |
| EXPECT_FALSE(http_server_properties->RequiresHTTP11(host_port_pair_)); |
| |
| helper.RunPreTestSetup(); |
| helper.StartDefaultTest(); |
| helper.FinishDefaultTestWithoutVerification(); |
| helper.VerifyDataConsumed(); |
| EXPECT_TRUE(http_server_properties->RequiresHTTP11(host_port_pair_)); |
| |
| const HttpResponseInfo* response = helper.trans()->GetResponseInfo(); |
| ASSERT_TRUE(response); |
| ASSERT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| EXPECT_FALSE(response->was_fetched_via_spdy); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP1_1, |
| response->connection_info); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_TRUE(request_.url.SchemeIs("https")); |
| EXPECT_EQ("127.0.0.1", response->socket_address.host()); |
| EXPECT_EQ(443, response->socket_address.port()); |
| std::string response_data; |
| ASSERT_THAT(ReadTransaction(helper.trans(), &response_data), IsOk()); |
| EXPECT_EQ("hello", response_data); |
| } |
| |
| // Retry with HTTP/1.1 to the proxy when receiving HTTP_1_1_REQUIRED from the |
| // proxy. Note that no actual protocol negotiation happens, instead this test |
| // forces protocols for both sockets. |
| TEST_F(SpdyNetworkTransactionTest, HTTP11RequiredProxyRetry) { |
| request_.method = "GET"; |
| auto session_deps = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixedFromPacResult( |
| "HTTPS myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS)); |
| // Do not force SPDY so that second socket can negotiate HTTP/1.1. |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| |
| // First socket: HTTP/2 CONNECT rejected with HTTP_1_1_REQUIRED. |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyConnect( |
| nullptr, 0, 1, LOWEST, HostPortPair("www.example.org", 443))); |
| MockWrite writes0[] = {CreateMockWrite(req, 0)}; |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_HTTP_1_1_REQUIRED)); |
| MockRead reads0[] = {CreateMockRead(rst, 1)}; |
| SequencedSocketData data0(reads0, writes0); |
| |
| auto ssl_provider0 = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| // Expect HTTP/2 protocols too in SSLConfig. |
| ssl_provider0->next_protos_expected_in_ssl_config = |
| NextProtoVector{kProtoHTTP2, kProtoHTTP11}; |
| // Force SPDY. |
| ssl_provider0->next_proto = kProtoHTTP2; |
| helper.AddDataWithSSLSocketDataProvider(&data0, std::move(ssl_provider0)); |
| |
| // Second socket: retry using HTTP/1.1. |
| MockWrite writes1[] = { |
| MockWrite(ASYNC, 0, |
| "CONNECT www.example.org:443 HTTP/1.1\r\n" |
| "Host: www.example.org:443\r\n" |
| "Proxy-Connection: keep-alive\r\n\r\n"), |
| MockWrite(ASYNC, 2, |
| "GET / HTTP/1.1\r\n" |
| "Host: www.example.org\r\n" |
| "Connection: keep-alive\r\n\r\n"), |
| }; |
| |
| MockRead reads1[] = { |
| MockRead(ASYNC, 1, "HTTP/1.1 200 OK\r\n\r\n"), |
| MockRead(ASYNC, 3, |
| "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 5\r\n\r\n" |
| "hello"), |
| }; |
| SequencedSocketData data1(reads1, writes1); |
| |
| auto ssl_provider1 = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| // Expect only HTTP/1.1 protocol in SSLConfig. |
| ssl_provider1->next_protos_expected_in_ssl_config = |
| NextProtoVector{kProtoHTTP11}; |
| // Force HTTP/1.1. |
| ssl_provider1->next_proto = kProtoHTTP11; |
| helper.AddDataWithSSLSocketDataProvider(&data1, std::move(ssl_provider1)); |
| |
| // A third socket is needed for the tunnelled connection. |
| auto ssl_provider2 = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| helper.session_deps()->socket_factory->AddSSLSocketDataProvider( |
| ssl_provider2.get()); |
| |
| HttpServerProperties* http_server_properties = |
| helper.session()->spdy_session_pool()->http_server_properties(); |
| const HostPortPair proxy_host_port_pair = HostPortPair("myproxy", 70); |
| EXPECT_FALSE(http_server_properties->RequiresHTTP11(proxy_host_port_pair)); |
| |
| helper.RunPreTestSetup(); |
| helper.StartDefaultTest(); |
| helper.FinishDefaultTestWithoutVerification(); |
| helper.VerifyDataConsumed(); |
| EXPECT_TRUE(http_server_properties->RequiresHTTP11(proxy_host_port_pair)); |
| |
| const HttpResponseInfo* response = helper.trans()->GetResponseInfo(); |
| ASSERT_TRUE(response); |
| ASSERT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| EXPECT_FALSE(response->was_fetched_via_spdy); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP1_1, |
| response->connection_info); |
| EXPECT_FALSE(response->was_alpn_negotiated); |
| EXPECT_TRUE(request_.url.SchemeIs("https")); |
| EXPECT_EQ("127.0.0.1", response->socket_address.host()); |
| EXPECT_EQ(70, response->socket_address.port()); |
| std::string response_data; |
| ASSERT_THAT(ReadTransaction(helper.trans(), &response_data), IsOk()); |
| EXPECT_EQ("hello", response_data); |
| } |
| |
| // Test to make sure we can correctly connect through a proxy. |
| TEST_F(SpdyNetworkTransactionTest, ProxyConnect) { |
| auto session_deps = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixedFromPacResult( |
| "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS)); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| helper.RunPreTestSetup(); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| const char kConnect443[] = { |
| "CONNECT www.example.org:443 HTTP/1.1\r\n" |
| "Host: www.example.org:443\r\n" |
| "Proxy-Connection: keep-alive\r\n\r\n"}; |
| const char kHTTP200[] = {"HTTP/1.1 200 OK\r\n\r\n"}; |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| |
| MockWrite writes[] = { |
| MockWrite(SYNCHRONOUS, kConnect443, arraysize(kConnect443) - 1, 0), |
| CreateMockWrite(req, 2), |
| }; |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, kHTTP200, arraysize(kHTTP200) - 1, 1), |
| CreateMockRead(resp, 3), CreateMockRead(body, 4), |
| MockRead(ASYNC, 0, 0, 5), |
| }; |
| SequencedSocketData data(reads, writes); |
| |
| helper.AddData(&data); |
| TestCompletionCallback callback; |
| |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| rv = callback.WaitForResult(); |
| EXPECT_EQ(0, rv); |
| |
| // Verify the response headers. |
| HttpResponseInfo response = *trans->GetResponseInfo(); |
| ASSERT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| std::string response_data; |
| ASSERT_THAT(ReadTransaction(trans, &response_data), IsOk()); |
| EXPECT_EQ("hello!", response_data); |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Test to make sure we can correctly connect through a proxy to |
| // www.example.org, if there already exists a direct spdy connection to |
| // www.example.org. See https://crbug.com/49874. |
| TEST_F(SpdyNetworkTransactionTest, DirectConnectProxyReconnect) { |
| // Use a proxy service which returns a proxy fallback list from DIRECT to |
| // myproxy:70. For this test there will be no fallback, so it is equivalent |
| // to simply DIRECT. The reason for appending the second proxy is to verify |
| // that the session pool key used does is just "DIRECT". |
| auto session_deps = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixedFromPacResult( |
| "DIRECT; PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS)); |
| // When setting up the first transaction, we store the SpdySessionPool so that |
| // we can use the same pool in the second transaction. |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| |
| SpdySessionPool* spdy_session_pool = helper.session()->spdy_session_pool(); |
| helper.RunPreTestSetup(); |
| |
| // Construct and send a simple GET request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3), // Force a pause |
| }; |
| SequencedSocketData data(reads, writes); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| TransactionHelperResult out; |
| out.rv = trans->Start(&request_, callback.callback(), log_); |
| |
| EXPECT_EQ(out.rv, ERR_IO_PENDING); |
| out.rv = callback.WaitForResult(); |
| EXPECT_EQ(out.rv, OK); |
| |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| out.rv = ReadTransaction(trans, &out.response_data); |
| EXPECT_THAT(out.rv, IsOk()); |
| out.status_line = response->headers->GetStatusLine(); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| |
| // Check that the SpdySession is still in the SpdySessionPool. |
| SpdySessionKey session_pool_key_direct(host_port_pair_, ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool, session_pool_key_direct)); |
| SpdySessionKey session_pool_key_proxy( |
| host_port_pair_, |
| ProxyServer::FromURI("www.foo.com", ProxyServer::SCHEME_HTTP), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool, session_pool_key_proxy)); |
| |
| // New SpdyTestUtil instance for the session that will be used for the |
| // proxy connection. |
| SpdyTestUtil spdy_util_2; |
| |
| // Set up data for the proxy connection. |
| const char kConnect443[] = { |
| "CONNECT www.example.org:443 HTTP/1.1\r\n" |
| "Host: www.example.org:443\r\n" |
| "Proxy-Connection: keep-alive\r\n\r\n"}; |
| const char kHTTP200[] = {"HTTP/1.1 200 OK\r\n\r\n"}; |
| spdy::SpdySerializedFrame req2( |
| spdy_util_2.ConstructSpdyGet(kPushedUrl, 1, LOWEST)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_2.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body2(spdy_util_2.ConstructSpdyDataFrame(1, true)); |
| |
| MockWrite writes2[] = { |
| MockWrite(SYNCHRONOUS, kConnect443, arraysize(kConnect443) - 1, 0), |
| CreateMockWrite(req2, 2), |
| }; |
| MockRead reads2[] = { |
| MockRead(SYNCHRONOUS, kHTTP200, arraysize(kHTTP200) - 1, 1), |
| CreateMockRead(resp2, 3), CreateMockRead(body2, 4), |
| MockRead(ASYNC, 0, 5) // EOF |
| }; |
| |
| SequencedSocketData data_proxy(reads2, writes2); |
| |
| // Create another request to www.example.org, but this time through a proxy. |
| request_.method = "GET"; |
| request_.url = GURL(kPushedUrl); |
| auto session_deps_proxy = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixedFromPacResult( |
| "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS)); |
| NormalSpdyTransactionHelper helper_proxy(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps_proxy)); |
| |
| helper_proxy.RunPreTestSetup(); |
| helper_proxy.AddData(&data_proxy); |
| |
| HttpNetworkTransaction* trans_proxy = helper_proxy.trans(); |
| TestCompletionCallback callback_proxy; |
| int rv = trans_proxy->Start(&request_, callback_proxy.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback_proxy.WaitForResult(); |
| EXPECT_EQ(0, rv); |
| |
| HttpResponseInfo response_proxy = *trans_proxy->GetResponseInfo(); |
| ASSERT_TRUE(response_proxy.headers); |
| EXPECT_EQ("HTTP/1.1 200", response_proxy.headers->GetStatusLine()); |
| |
| std::string response_data; |
| ASSERT_THAT(ReadTransaction(trans_proxy, &response_data), IsOk()); |
| EXPECT_EQ("hello!", response_data); |
| |
| helper_proxy.VerifyDataConsumed(); |
| } |
| |
| // When we get a TCP-level RST, we need to retry a HttpNetworkTransaction |
| // on a new connection, if the connection was previously known to be good. |
| // This can happen when a server reboots without saying goodbye, or when |
| // we're behind a NAT that masked the RST. |
| TEST_F(SpdyNetworkTransactionTest, VerifyRetryOnConnectionReset) { |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, ERR_IO_PENDING, 3), |
| MockRead(ASYNC, ERR_CONNECTION_RESET, 4), |
| }; |
| |
| MockRead reads2[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| // In all cases the connection will be reset before req3 can be |
| // dispatched, destroying both streams. |
| spdy_util_.UpdateWithStreamDestruction(1); |
| spdy::SpdySerializedFrame req3( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| MockWrite writes1[] = {CreateMockWrite(req, 0), CreateMockWrite(req3, 5)}; |
| MockWrite writes2[] = {CreateMockWrite(req, 0)}; |
| |
| // This test has a couple of variants. |
| enum { |
| // Induce the RST while waiting for our transaction to send. |
| VARIANT_RST_DURING_SEND_COMPLETION = 0, |
| // Induce the RST while waiting for our transaction to read. |
| // In this case, the send completed - everything copied into the SNDBUF. |
| VARIANT_RST_DURING_READ_COMPLETION = 1 |
| }; |
| |
| for (int variant = VARIANT_RST_DURING_SEND_COMPLETION; |
| variant <= VARIANT_RST_DURING_READ_COMPLETION; |
| ++variant) { |
| SequencedSocketData data1(reads, |
| base::make_span(writes1).first(1 + variant)); |
| |
| SequencedSocketData data2(reads2, writes2); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| nullptr); |
| helper.AddData(&data1); |
| helper.AddData(&data2); |
| helper.RunPreTestSetup(); |
| |
| for (int i = 0; i < 2; ++i) { |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, helper.session()); |
| |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| // On the second transaction, we trigger the RST. |
| if (i == 1) { |
| if (variant == VARIANT_RST_DURING_READ_COMPLETION) { |
| // Writes to the socket complete asynchronously on SPDY by running |
| // through the message loop. Complete the write here. |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| // Now schedule the ERR_CONNECTION_RESET. |
| data1.Resume(); |
| } |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| const HttpResponseInfo* response = trans.GetResponseInfo(); |
| ASSERT_TRUE(response); |
| EXPECT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| std::string response_data; |
| rv = ReadTransaction(&trans, &response_data); |
| EXPECT_THAT(rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| EXPECT_EQ("hello!", response_data); |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| helper.VerifyDataConsumed(); |
| base::RunLoop().RunUntilIdle(); |
| } |
| } |
| |
| // Tests that Basic authentication works over SPDY |
| TEST_F(SpdyNetworkTransactionTest, SpdyBasicAuth) { |
| // The first request will be a bare GET, the second request will be a |
| // GET with an Authorization header. |
| spdy::SpdySerializedFrame req_get( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| // Will be refused for lack of auth. |
| spdy_util_.UpdateWithStreamDestruction(1); |
| const char* const kExtraAuthorizationHeaders[] = { |
| "authorization", "Basic Zm9vOmJhcg==" |
| }; |
| spdy::SpdySerializedFrame req_get_authorization(spdy_util_.ConstructSpdyGet( |
| kExtraAuthorizationHeaders, arraysize(kExtraAuthorizationHeaders) / 2, 3, |
| LOWEST)); |
| MockWrite spdy_writes[] = { |
| CreateMockWrite(req_get, 0), CreateMockWrite(req_get_authorization, 3), |
| }; |
| |
| // The first response is a 401 authentication challenge, and the second |
| // response will be a 200 response since the second request includes a valid |
| // Authorization header. |
| const char* const kExtraAuthenticationHeaders[] = { |
| "www-authenticate", |
| "Basic realm=\"MyRealm\"" |
| }; |
| spdy::SpdySerializedFrame resp_authentication( |
| spdy_util_.ConstructSpdyReplyError( |
| "401", kExtraAuthenticationHeaders, |
| arraysize(kExtraAuthenticationHeaders) / 2, 1)); |
| spdy::SpdySerializedFrame body_authentication( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame resp_data( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body_data( |
| spdy_util_.ConstructSpdyDataFrame(3, true)); |
| |
| MockRead spdy_reads[] = { |
| CreateMockRead(resp_authentication, 1), |
| CreateMockRead(body_authentication, 2, SYNCHRONOUS), |
| CreateMockRead(resp_data, 4), |
| CreateMockRead(body_data, 5), |
| MockRead(ASYNC, 0, 6), |
| }; |
| |
| SequencedSocketData data(spdy_reads, spdy_writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.StartDefaultTest(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_IO_PENDING)); |
| |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsOk()); |
| |
| // Make sure the response has an auth challenge. |
| HttpNetworkTransaction* trans = helper.trans(); |
| const HttpResponseInfo* const response_start = trans->GetResponseInfo(); |
| ASSERT_TRUE(response_start); |
| ASSERT_TRUE(response_start->headers); |
| EXPECT_EQ(401, response_start->headers->response_code()); |
| EXPECT_TRUE(response_start->was_fetched_via_spdy); |
| AuthChallengeInfo* auth_challenge = response_start->auth_challenge.get(); |
| ASSERT_TRUE(auth_challenge); |
| EXPECT_FALSE(auth_challenge->is_proxy); |
| EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme); |
| EXPECT_EQ("MyRealm", auth_challenge->realm); |
| |
| // Restart with a username/password. |
| AuthCredentials credentials(base::ASCIIToUTF16("foo"), |
| base::ASCIIToUTF16("bar")); |
| TestCompletionCallback callback_restart; |
| const int rv_restart = trans->RestartWithAuth( |
| credentials, callback_restart.callback()); |
| EXPECT_THAT(rv_restart, IsError(ERR_IO_PENDING)); |
| const int rv_restart_complete = callback_restart.WaitForResult(); |
| EXPECT_THAT(rv_restart_complete, IsOk()); |
| // TODO(cbentzel): This is actually the same response object as before, but |
| // data has changed. |
| const HttpResponseInfo* const response_restart = trans->GetResponseInfo(); |
| ASSERT_TRUE(response_restart); |
| ASSERT_TRUE(response_restart->headers); |
| EXPECT_EQ(200, response_restart->headers->response_code()); |
| EXPECT_TRUE(response_restart->auth_challenge.get() == nullptr); |
| } |
| |
| struct PushHeaderTestParams { |
| std::vector<std::pair<base::StringPiece, base::StringPiece>> |
| extra_request_headers; |
| std::vector<std::pair<base::StringPiece, base::StringPiece>> |
| extra_pushed_request_headers; |
| std::vector<std::pair<base::StringPiece, base::StringPiece>> |
| extra_pushed_response_headers; |
| base::StringPiece pushed_status_code; |
| bool push_accepted; |
| SpdyPushedStreamFate expected_fate; |
| } push_header_test_cases[] = { |
| // Base case: no extra headers. |
| {{}, {}, {}, "200", true, SpdyPushedStreamFate::kAcceptedNoVary}, |
| // Cookie headers match. |
| {{{"cookie", "value=foo"}}, |
| {{"cookie", "value=foo"}}, |
| {{"vary", "Cookie"}}, |
| "200", |
| true, |
| SpdyPushedStreamFate::kAcceptedMatchingVary}, |
| // Cookie headers mismatch. |
| {{{"cookie", "value=foo"}}, |
| {{"cookie", "value=bar"}}, |
| {{"vary", "Cookie"}}, |
| "200", |
| false, |
| SpdyPushedStreamFate::kVaryMismatch}, |
| // Partial Content response, no Range headers. |
| {{}, {}, {}, "206", false, SpdyPushedStreamFate::kClientRequestNotRange}, |
| // Partial Content response, no Range headers in pushed request. |
| {{{"range", "0-42"}}, |
| {}, |
| {}, |
| "206", |
| false, |
| SpdyPushedStreamFate::kPushedRequestNotRange}, |
| // Partial Content response, no Range headers in client request. |
| {{}, |
| {{"range", "0-42"}}, |
| {}, |
| "206", |
| false, |
| SpdyPushedStreamFate::kClientRequestNotRange}, |
| // Partial Content response, mismatching Range headers. |
| {{{"range", "0-42"}}, |
| {{"range", "10-42"}}, |
| {}, |
| "206", |
| false, |
| SpdyPushedStreamFate::kRangeMismatch}, |
| // Partial Content response, matching Range headers. |
| {{{"range", "0-42"}}, |
| {{"range", "0-42"}}, |
| {}, |
| "206", |
| true, |
| SpdyPushedStreamFate::kAcceptedNoVary}, |
| }; |
| |
| class SpdyNetworkTransactionPushHeaderTest |
| : public SpdyNetworkTransactionTest, |
| public ::testing::WithParamInterface<PushHeaderTestParams> { |
| protected: |
| void RunTest(bool pushed_response_headers_received_before_request) { |
| base::HistogramTester histogram_tester; |
| |
| int seq = 0; |
| std::vector<MockWrite> writes; |
| std::vector<MockRead> reads; |
| |
| spdy::SpdySerializedFrame req1( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| writes.push_back(CreateMockWrite(req1, seq++)); |
| |
| spdy::SpdyHeaderBlock pushed_request_headers; |
| pushed_request_headers[spdy::kHttp2MethodHeader] = "GET"; |
| for (const auto& header : GetParam().extra_pushed_request_headers) { |
| pushed_request_headers.insert(header); |
| } |
| spdy_util_.AddUrlToHeaderBlock(kPushedUrl, &pushed_request_headers); |
| spdy::SpdySerializedFrame pushed_request( |
| spdy_util_.ConstructSpdyPushPromise(1, 2, |
| std::move(pushed_request_headers))); |
| reads.push_back(CreateMockRead(pushed_request, seq++)); |
| |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| writes.push_back(CreateMockWrite(priority, seq++)); |
| |
| reads.push_back(MockRead(ASYNC, ERR_IO_PENDING, seq++)); |
| |
| spdy::SpdyHeaderBlock pushed_response_headers; |
| pushed_response_headers[spdy::kHttp2StatusHeader] = |
| GetParam().pushed_status_code; |
| for (const auto& header : GetParam().extra_pushed_response_headers) { |
| pushed_response_headers.insert(header); |
| } |
| spdy::SpdySerializedFrame pushed_response( |
| spdy_util_.ConstructSpdyReply(2, std::move(pushed_response_headers))); |
| reads.push_back(CreateMockRead(pushed_response, seq++)); |
| |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| reads.push_back(CreateMockRead(resp1, seq++)); |
| |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| reads.push_back(CreateMockRead(body1, seq++)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| |
| spdy::SpdySerializedFrame pushed_body( |
| spdy_util_.ConstructSpdyDataFrame(2, "This is pushed.", true)); |
| reads.push_back(CreateMockRead(pushed_body, seq++)); |
| |
| // If push is not accepted, a new request is sent on the wire. |
| spdy::SpdySerializedFrame rst; |
| spdy::SpdySerializedFrame req2; |
| spdy::SpdySerializedFrame resp2; |
| spdy::SpdySerializedFrame body2; |
| if (!GetParam().push_accepted) { |
| rst = spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_CANCEL); |
| writes.push_back(CreateMockWrite(rst, seq++)); |
| |
| spdy::SpdyHeaderBlock request_headers2( |
| spdy_util_.ConstructGetHeaderBlock(kPushedUrl)); |
| for (const auto& header : GetParam().extra_request_headers) { |
| request_headers2.insert(header); |
| } |
| req2 = spdy_util_.ConstructSpdyHeaders(3, std::move(request_headers2), |
| LOWEST, true); |
| writes.push_back(CreateMockWrite(req2, seq++)); |
| |
| resp2 = spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3); |
| reads.push_back(CreateMockRead(resp2, seq++)); |
| |
| body2 = spdy_util_.ConstructSpdyDataFrame(3, "This is not pushed.", true); |
| reads.push_back(CreateMockRead(body2, seq++)); |
| } |
| |
| reads.push_back(MockRead(ASYNC, ERR_IO_PENDING, seq++)); |
| |
| reads.push_back(MockRead(ASYNC, 0, seq++)); |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| TestCompletionCallback callback1; |
| int rv = trans->Start(&request_, callback1.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Open connection. |
| base::RunLoop().RunUntilIdle(); |
| |
| if (pushed_response_headers_received_before_request) { |
| // Read pushed response headers. |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| HttpRequestInfo request2 = CreateGetPushRequest(); |
| for (const auto& header : GetParam().extra_request_headers) { |
| request2.extra_headers.SetHeader(header.first, header.second); |
| } |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| TestCompletionCallback callback2; |
| rv = trans2.Start(&request2, callback2.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| base::RunLoop().RunUntilIdle(); |
| |
| if (!pushed_response_headers_received_before_request) { |
| // Read pushed response headers. |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| rv = callback1.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| const HttpResponseInfo* const response1 = trans->GetResponseInfo(); |
| EXPECT_TRUE(response1->headers); |
| EXPECT_EQ("HTTP/1.1 200", response1->headers->GetStatusLine()); |
| |
| std::string result1; |
| ReadResult(trans, &result1); |
| EXPECT_EQ(result1, "hello!"); |
| |
| rv = callback2.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| std::string result2; |
| ReadResult(&trans2, &result2); |
| EXPECT_EQ(result2, GetParam().push_accepted ? "This is pushed." |
| : "This is not pushed."); |
| |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", static_cast<int>(GetParam().expected_fate), |
| 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| }; |
| |
| INSTANTIATE_TEST_CASE_P(, |
| SpdyNetworkTransactionPushHeaderTest, |
| ::testing::ValuesIn(push_header_test_cases)); |
| |
| TEST_P(SpdyNetworkTransactionPushHeaderTest, |
| PushedResponseHeadersReceivedBeforeRequest) { |
| RunTest(/* pushed_response_headers_received_before_request = */ true); |
| } |
| |
| TEST_P(SpdyNetworkTransactionPushHeaderTest, |
| PushedResponseHeadersReceivedAfterRequest) { |
| RunTest(/* pushed_response_headers_received_before_request = */ false); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, ResponseHeadersTwice) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(rst, 4), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| |
| spdy::SpdyHeaderBlock late_headers; |
| late_headers["hello"] = "bye"; |
| spdy::SpdySerializedFrame stream1_headers( |
| spdy_util_.ConstructSpdyResponseHeaders(1, std::move(late_headers), |
| false)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), CreateMockRead(stream1_headers, 2), |
| CreateMockRead(stream1_body, 3), MockRead(ASYNC, 0, 5) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| } |
| |
| // Tests that receiving HEADERS, DATA, HEADERS, and DATA in that sequence will |
| // trigger a ERR_SPDY_PROTOCOL_ERROR because trailing HEADERS must not be |
| // followed by any DATA frames. |
| TEST_F(SpdyNetworkTransactionTest, SyncReplyDataAfterTrailers) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(rst, 5), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_util_.ConstructSpdyDataFrame(1, false)); |
| |
| spdy::SpdyHeaderBlock late_headers; |
| late_headers["hello"] = "bye"; |
| spdy::SpdySerializedFrame stream1_headers( |
| spdy_util_.ConstructSpdyResponseHeaders(1, std::move(late_headers), |
| false)); |
| spdy::SpdySerializedFrame stream1_body2( |
| spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), CreateMockRead(stream1_body, 2), |
| CreateMockRead(stream1_headers, 3), CreateMockRead(stream1_body2, 4), |
| MockRead(ASYNC, 0, 6) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| } |
| |
| struct PushUrlTestParams { |
| const char* url_to_fetch; |
| const char* url_to_push; |
| bool client_cert_sent; |
| SpdyPushedStreamFate expected_fate; |
| } push_url_test_cases[] = { |
| // http scheme cannot be pushed (except by trusted proxy). |
| {"https://www.example.org/foo.html", "http://www.example.org/foo.js", false, |
| SpdyPushedStreamFate::kNonHttpsPushedScheme}, |
| // ftp scheme cannot be pushed. |
| {"https://www.example.org/foo.html", "ftp://www.example.org/foo.js", false, |
| SpdyPushedStreamFate::kInvalidUrl}, |
| // Cross subdomain, certificate not valid. |
| {"https://www.example.org/foo.html", "https://blat.www.example.org/foo.js", |
| false, SpdyPushedStreamFate::kCertificateMismatch}, |
| // Cross domain, certificate not valid. |
| {"https://www.example.org/foo.html", "https://www.foo.com/foo.js", false, |
| SpdyPushedStreamFate::kCertificateMismatch}, |
| // Cross domain, certificate valid, but cross-origin push is rejected on a |
| // connection with client certificate. |
| {"https://www.example.org/foo.html", "https://mail.example.org/foo.js", |
| true, SpdyPushedStreamFate::kCertificateMismatch}}; |
| |
| class SpdyNetworkTransactionPushUrlTest |
| : public SpdyNetworkTransactionTest, |
| public ::testing::WithParamInterface<PushUrlTestParams> { |
| protected: |
| // In this test we want to verify that we can't accidentally push content |
| // which can't be pushed by this content server. |
| // This test assumes that: |
| // - if we're requesting http://www.foo.com/barbaz |
| // - the browser has made a connection to "www.foo.com". |
| void RunTest() { |
| base::HistogramTester histogram_tester; |
| |
| SpdyTestUtil spdy_test_util; |
| spdy::SpdySerializedFrame stream1_syn( |
| spdy_test_util.ConstructSpdyGet(GetParam().url_to_fetch, 1, LOWEST)); |
| spdy::SpdySerializedFrame stream1_body( |
| spdy_test_util.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame push_rst(spdy_test_util.ConstructSpdyRstStream( |
| 2, spdy::ERROR_CODE_REFUSED_STREAM)); |
| MockWrite writes[] = { |
| CreateMockWrite(stream1_syn, 0), CreateMockWrite(push_rst, 3), |
| }; |
| |
| spdy::SpdySerializedFrame stream1_reply( |
| spdy_test_util.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame stream2_syn(spdy_test_util.ConstructSpdyPush( |
| nullptr, 0, 2, 1, GetParam().url_to_push)); |
| const char kPushedData[] = "pushed"; |
| spdy::SpdySerializedFrame stream2_body( |
| spdy_test_util.ConstructSpdyDataFrame(2, kPushedData, true)); |
| spdy::SpdySerializedFrame rst( |
| spdy_test_util.ConstructSpdyRstStream(2, spdy::ERROR_CODE_CANCEL)); |
| |
| MockRead reads[] = { |
| CreateMockRead(stream1_reply, 1), |
| CreateMockRead(stream2_syn, 2), |
| CreateMockRead(stream1_body, 4), |
| CreateMockRead(stream2_body, 5), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6), // Force a pause |
| }; |
| |
| HttpResponseInfo response; |
| SequencedSocketData data(reads, writes); |
| |
| request_.url = GURL(GetParam().url_to_fetch); |
| |
| // Enable cross-origin push. Since we are not using a proxy, this should |
| // not actually enable cross-origin SPDY push. |
| auto session_deps = std::make_unique<SpdySessionDependencies>(); |
| auto proxy_delegate = std::make_unique<TestProxyDelegate>(); |
| proxy_delegate->set_trusted_spdy_proxy(net::ProxyServer::FromURI( |
| "https://123.45.67.89:443", net::ProxyServer::SCHEME_HTTP)); |
| session_deps->proxy_resolution_service->SetProxyDelegate( |
| proxy_delegate.get()); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| |
| helper.RunPreTestSetup(); |
| |
| auto ssl_provider = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| ssl_provider->ssl_info.client_cert_sent = GetParam().client_cert_sent; |
| ssl_provider->ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| helper.AddDataWithSSLSocketDataProvider(&data, std::move(ssl_provider)); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| // Start the transaction with basic parameters. |
| TestCompletionCallback callback; |
| |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| |
| // Finish async network reads/writes. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Read the response body. |
| std::string result; |
| ReadResult(trans, &result); |
| |
| // Verify that we consumed all test data. |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| |
| // Verify the response headers. |
| // Copy the response info, because trans goes away. |
| response = *trans->GetResponseInfo(); |
| |
| VerifyStreamsClosed(helper); |
| |
| // Verify the response headers. |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", static_cast<int>(GetParam().expected_fate), |
| 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| }; |
| |
| INSTANTIATE_TEST_CASE_P(, |
| SpdyNetworkTransactionPushUrlTest, |
| ::testing::ValuesIn(push_url_test_cases)); |
| |
| TEST_P(SpdyNetworkTransactionPushUrlTest, PushUrlTest) { |
| RunTest(); |
| } |
| |
| // Verify that push works cross origin as long as the certificate is valid for |
| // the pushed authority. |
| TEST_F(SpdyNetworkTransactionTest, ServerPushValidCrossOrigin) { |
| // "spdy_pooling.pem" is valid for both www.example.org and mail.example.org. |
| const char* url_to_fetch = "https://www.example.org"; |
| const char* url_to_push = "https://mail.example.org"; |
| |
| spdy::SpdySerializedFrame headers( |
| spdy_util_.ConstructSpdyGet(url_to_fetch, 1, LOWEST)); |
| spdy::SpdySerializedFrame push_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(headers, 0), CreateMockWrite(push_priority, 3), |
| }; |
| |
| spdy::SpdySerializedFrame reply( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame push( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, url_to_push)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| const char kPushedData[] = "pushed"; |
| spdy::SpdySerializedFrame pushed_body( |
| spdy_util_.ConstructSpdyDataFrame(2, kPushedData, true)); |
| MockRead reads[] = { |
| CreateMockRead(reply, 1), |
| CreateMockRead(push, 2, SYNCHRONOUS), |
| CreateMockRead(body, 4), |
| CreateMockRead(pushed_body, 5, SYNCHRONOUS), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6), |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| request_.url = GURL(url_to_fetch); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans0 = helper.trans(); |
| TestCompletionCallback callback0; |
| int rv = trans0->Start(&request_, callback0.callback(), log_); |
| rv = callback0.GetResult(rv); |
| EXPECT_THAT(rv, IsOk()); |
| |
| SpdySessionPool* spdy_session_pool = helper.session()->spdy_session_pool(); |
| SpdySessionKey key(host_port_pair_, ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| base::WeakPtr<SpdySession> spdy_session = |
| spdy_session_pool->FindAvailableSession( |
| key, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| |
| EXPECT_EQ(1u, num_unclaimed_pushed_streams(spdy_session)); |
| EXPECT_TRUE( |
| has_unclaimed_pushed_stream_for_url(spdy_session, GURL(url_to_push))); |
| |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo push_request; |
| push_request.method = "GET"; |
| push_request.url = GURL(url_to_push); |
| push_request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback1; |
| rv = trans1.Start(&push_request, callback1.callback(), log_); |
| rv = callback1.GetResult(rv); |
| EXPECT_THAT(rv, IsOk()); |
| |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session)); |
| |
| HttpResponseInfo response = *trans0->GetResponseInfo(); |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| |
| std::string result0; |
| ReadResult(trans0, &result0); |
| EXPECT_EQ("hello!", result0); |
| |
| HttpResponseInfo push_response = *trans1.GetResponseInfo(); |
| EXPECT_TRUE(push_response.headers); |
| EXPECT_EQ("HTTP/1.1 200", push_response.headers->GetStatusLine()); |
| |
| std::string result1; |
| ReadResult(&trans1, &result1); |
| EXPECT_EQ(kPushedData, result1); |
| |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| VerifyStreamsClosed(helper); |
| } |
| |
| // Regression test for https://crbug.com/832859: Server push is accepted on a |
| // connection with client certificate, as long as SpdySessionKey matches. |
| TEST_F(SpdyNetworkTransactionTest, ServerPushWithClientCert) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, DEFAULT_PRIORITY)); |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(priority, 3)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame push( |
| spdy_util_.ConstructSpdyPush(nullptr, 0, 2, 1, kPushedUrl)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame body2( |
| spdy_util_.ConstructSpdyDataFrame(2, "pushed", true)); |
| MockRead reads[] = {CreateMockRead(resp, 1), CreateMockRead(push, 2), |
| CreateMockRead(body1, 4), CreateMockRead(body2, 5), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| auto ssl_provider = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| ssl_provider->ssl_info.client_cert_sent = true; |
| ssl_provider->ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddDataWithSSLSocketDataProvider(&data, std::move(ssl_provider)); |
| |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| helper.FinishDefaultTest(); |
| |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo request = CreateGetPushRequest(); |
| TestCompletionCallback callback; |
| int rv = trans2.Start(&request, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| const HttpResponseInfo* const response = trans2.GetResponseInfo(); |
| EXPECT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| |
| std::string result; |
| ReadResult(&trans2, &result); |
| EXPECT_EQ("pushed", result); |
| |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| |
| VerifyStreamsClosed(helper); |
| } |
| |
| // Verify that push works cross origin, even if there is already a connection |
| // open to origin of pushed resource. |
| TEST_F(SpdyNetworkTransactionTest, ServerPushValidCrossOriginWithOpenSession) { |
| const char* url_to_fetch0 = "https://mail.example.org/foo"; |
| const char* url_to_fetch1 = "https://docs.example.org"; |
| const char* url_to_push = "https://mail.example.org/bar"; |
| |
| SpdyTestUtil spdy_util_0; |
| |
| spdy::SpdySerializedFrame headers0( |
| spdy_util_0.ConstructSpdyGet(url_to_fetch0, 1, LOWEST)); |
| MockWrite writes0[] = { |
| CreateMockWrite(headers0, 0), |
| }; |
| |
| spdy::SpdySerializedFrame reply0( |
| spdy_util_0.ConstructSpdyGetReply(nullptr, 0, 1)); |
| const char kData0[] = "first"; |
| spdy::SpdySerializedFrame body0( |
| spdy_util_0.ConstructSpdyDataFrame(1, kData0, true)); |
| MockRead reads0[] = {CreateMockRead(reply0, 1), CreateMockRead(body0, 2), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3)}; |
| |
| SequencedSocketData data0(reads0, writes0); |
| |
| SpdyTestUtil spdy_util_1; |
| |
| spdy::SpdySerializedFrame headers1( |
| spdy_util_1.ConstructSpdyGet(url_to_fetch1, 1, LOWEST)); |
| spdy::SpdySerializedFrame push_priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes1[] = { |
| CreateMockWrite(headers1, 0), |
| CreateMockWrite(push_priority, 3, SYNCHRONOUS), |
| }; |
| |
| spdy::SpdySerializedFrame reply1( |
| spdy_util_1.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame push( |
| spdy_util_1.ConstructSpdyPush(nullptr, 0, 2, 1, url_to_push)); |
| const char kData1[] = "second"; |
| spdy::SpdySerializedFrame body1( |
| spdy_util_1.ConstructSpdyDataFrame(1, kData1, true)); |
| const char kPushedData[] = "pushed"; |
| spdy::SpdySerializedFrame pushed_body( |
| spdy_util_1.ConstructSpdyDataFrame(2, kPushedData, true)); |
| |
| MockRead reads1[] = { |
| CreateMockRead(reply1, 1), |
| CreateMockRead(push, 2, SYNCHRONOUS), |
| CreateMockRead(body1, 4), |
| CreateMockRead(pushed_body, 5, SYNCHRONOUS), |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6), |
| }; |
| |
| SequencedSocketData data1(reads1, writes1); |
| |
| // Request |url_to_fetch0| to open connection to mail.example.org. |
| request_.url = GURL(url_to_fetch0); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| |
| // "spdy_pooling.pem" is valid for www.example.org, but not for |
| // docs.example.org. |
| auto ssl_provider0 = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| ssl_provider0->ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| ASSERT_TRUE(ssl_provider0->ssl_info.cert); |
| helper.AddDataWithSSLSocketDataProvider(&data0, std::move(ssl_provider0)); |
| |
| // "wildcard.pem" is valid for both www.example.org and docs.example.org. |
| auto ssl_provider1 = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| ssl_provider1->ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); |
| ASSERT_TRUE(ssl_provider1->ssl_info.cert); |
| helper.AddDataWithSSLSocketDataProvider(&data1, std::move(ssl_provider1)); |
| |
| HttpNetworkTransaction* trans0 = helper.trans(); |
| TestCompletionCallback callback0; |
| int rv = trans0->Start(&request_, callback0.callback(), log_); |
| rv = callback0.GetResult(rv); |
| EXPECT_THAT(rv, IsOk()); |
| |
| // Request |url_to_fetch1|, during which docs.example.org pushes |
| // |url_to_push|, which happens to be for www.example.org, to which there is |
| // already an open connection. |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo request1; |
| request1.method = "GET"; |
| request1.url = GURL(url_to_fetch1); |
| request1.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback1; |
| rv = trans1.Start(&request1, callback1.callback(), log_); |
| rv = callback1.GetResult(rv); |
| EXPECT_THAT(rv, IsOk()); |
| |
| SpdySessionPool* spdy_session_pool = helper.session()->spdy_session_pool(); |
| HostPortPair host_port_pair0("mail.example.org", 443); |
| SpdySessionKey key0(host_port_pair0, ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| base::WeakPtr<SpdySession> spdy_session0 = |
| spdy_session_pool->FindAvailableSession( |
| key0, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session0)); |
| |
| HostPortPair host_port_pair1("docs.example.org", 443); |
| SpdySessionKey key1(host_port_pair1, ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| base::WeakPtr<SpdySession> spdy_session1 = |
| spdy_session_pool->FindAvailableSession( |
| key1, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| |
| EXPECT_EQ(1u, num_unclaimed_pushed_streams(spdy_session1)); |
| EXPECT_TRUE( |
| has_unclaimed_pushed_stream_for_url(spdy_session1, GURL(url_to_push))); |
| |
| // Request |url_to_push|, which should be served from the pushed resource. |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| HttpRequestInfo push_request; |
| push_request.method = "GET"; |
| push_request.url = GURL(url_to_push); |
| push_request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback2; |
| rv = trans2.Start(&push_request, callback2.callback(), log_); |
| rv = callback2.GetResult(rv); |
| EXPECT_THAT(rv, IsOk()); |
| |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session0)); |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session1)); |
| |
| HttpResponseInfo response0 = *trans0->GetResponseInfo(); |
| EXPECT_TRUE(response0.headers); |
| EXPECT_EQ("HTTP/1.1 200", response0.headers->GetStatusLine()); |
| |
| std::string result0; |
| ReadResult(trans0, &result0); |
| EXPECT_EQ(kData0, result0); |
| |
| HttpResponseInfo response1 = *trans1.GetResponseInfo(); |
| EXPECT_TRUE(response1.headers); |
| EXPECT_EQ("HTTP/1.1 200", response1.headers->GetStatusLine()); |
| |
| std::string result1; |
| ReadResult(&trans1, &result1); |
| EXPECT_EQ(kData1, result1); |
| |
| HttpResponseInfo push_response = *trans2.GetResponseInfo(); |
| EXPECT_TRUE(push_response.headers); |
| EXPECT_EQ("HTTP/1.1 200", push_response.headers->GetStatusLine()); |
| |
| std::string result2; |
| ReadResult(&trans2, &result2); |
| EXPECT_EQ(kPushedData, result2); |
| |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| VerifyStreamsClosed(helper); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, RetryAfterRefused) { |
| // Construct the request. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| // Will be destroyed by the RST before stream 3 starts. |
| spdy_util_.UpdateWithStreamDestruction(1); |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, LOWEST)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(req2, 2), |
| }; |
| |
| spdy::SpdySerializedFrame refused( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_REFUSED_STREAM)); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| MockRead reads[] = { |
| CreateMockRead(refused, 1), CreateMockRead(resp, 3), |
| CreateMockRead(body, 4), MockRead(ASYNC, 0, 5) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| // Start the transaction with basic parameters. |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| // Finish async network reads. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that we consumed all test data. |
| EXPECT_TRUE(data.AllReadDataConsumed()); |
| EXPECT_TRUE(data.AllWriteDataConsumed()); |
| |
| // Verify the response headers. |
| HttpResponseInfo response = *trans->GetResponseInfo(); |
| EXPECT_TRUE(response.headers); |
| EXPECT_EQ("HTTP/1.1 200", response.headers->GetStatusLine()); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, OutOfOrderHeaders) { |
| // This first request will start to establish the SpdySession. |
| // Then we will start the second (MEDIUM priority) and then third |
| // (HIGHEST priority) request in such a way that the third will actually |
| // start before the second, causing the second to be numbered differently |
| // than the order they were created. |
| // |
| // Note that the requests and responses created below are expectations |
| // of what the above will produce on the wire, and hence are in the |
| // initial->HIGHEST->LOWEST priority. |
| // |
| // Frames are created by SpdySession just before the write associated |
| // with the frame is attempted, so stream dependencies will be based |
| // on the streams alive at the point of the request write attempt. Thus |
| // req1 is alive when req2 is attempted (during but not after the |
| // |data.RunFor(2);| statement below) but not when req3 is attempted. |
| // The call to spdy_util_.UpdateWithStreamDestruction() reflects this. |
| spdy::SpdySerializedFrame req1( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 3, HIGHEST)); |
| spdy_util_.UpdateWithStreamDestruction(1); |
| spdy::SpdySerializedFrame req3( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 5, MEDIUM)); |
| MockWrite writes[] = { |
| MockWrite(ASYNC, ERR_IO_PENDING, 0), CreateMockWrite(req1, 1), |
| CreateMockWrite(req2, 5), CreateMockWrite(req3, 6), |
| }; |
| |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| spdy::SpdySerializedFrame resp3( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 5)); |
| spdy::SpdySerializedFrame body3(spdy_util_.ConstructSpdyDataFrame(5, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp1, 2), MockRead(ASYNC, ERR_IO_PENDING, 3), |
| CreateMockRead(body1, 4), CreateMockRead(resp2, 7), |
| CreateMockRead(body2, 8), CreateMockRead(resp3, 9), |
| CreateMockRead(body3, 10), MockRead(ASYNC, 0, 11) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, LOWEST, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| // Start the first transaction to set up the SpdySession |
| HttpNetworkTransaction* trans = helper.trans(); |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Run the message loop, but do not allow the write to complete. |
| // This leaves the SpdySession with a write pending, which prevents |
| // SpdySession from attempting subsequent writes until this write completes. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Now, start both new transactions |
| TestCompletionCallback callback2; |
| HttpNetworkTransaction trans2(MEDIUM, helper.session()); |
| rv = trans2.Start(&request_, callback2.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| base::RunLoop().RunUntilIdle(); |
| |
| TestCompletionCallback callback3; |
| HttpNetworkTransaction trans3(HIGHEST, helper.session()); |
| rv = trans3.Start(&request_, callback3.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| base::RunLoop().RunUntilIdle(); |
| |
| // We now have two HEADERS frames queued up which will be |
| // dequeued only once the first write completes, which we |
| // now allow to happen. |
| ASSERT_TRUE(data.IsPaused()); |
| data.Resume(); |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| // And now we can allow everything else to run to completion. |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_THAT(callback2.WaitForResult(), IsOk()); |
| EXPECT_THAT(callback3.WaitForResult(), IsOk()); |
| |
| helper.VerifyDataConsumed(); |
| |
| // At this point the test is completed and we need to safely destroy |
| // all allocated structures. Helper stores a transaction that has a |
| // reference to a stack allocated request, which has a short lifetime, |
| // and is accessed during the transaction destruction. We need to delete |
| // the transaction while the request is still a valid object. |
| helper.ResetTrans(); |
| } |
| |
| // Test that sent data frames and received WINDOW_UPDATE frames change |
| // the send_window_size_ correctly. |
| |
| // WINDOW_UPDATE is different than most other frames in that it can arrive |
| // while the client is still sending the request body. In order to enforce |
| // this scenario, we feed a couple of dummy frames and give a delay of 0 to |
| // socket data provider, so that initial read that is done as soon as the |
| // stream is created, succeeds and schedules another read. This way reads |
| // and writes are interleaved; after doing a full frame write, SpdyStream |
| // will break out of DoLoop and will read and process a WINDOW_UPDATE. |
| // Once our WINDOW_UPDATE is read, we cannot send HEADERS right away |
| // since request has not been completely written, therefore we feed |
| // enough number of WINDOW_UPDATEs to finish the first read and cause a |
| // write, leading to a complete write of request body; after that we send |
| // a reply with a body, to cause a graceful shutdown. |
| |
| // TODO(agayev): develop a socket data provider where both, reads and |
| // writes are ordered so that writing tests like these are easy and rewrite |
| // all these tests using it. Right now we are working around the |
| // limitations as described above and it's not deterministic, tests may |
| // fail under specific circumstances. |
| TEST_F(SpdyNetworkTransactionTest, WindowUpdateReceived) { |
| static int kFrameCount = 2; |
| std::string content(kMaxSpdyFrameChunkSize, 'a'); |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyPost( |
| kDefaultUrl, 1, kMaxSpdyFrameChunkSize * kFrameCount, LOWEST, nullptr, |
| 0)); |
| spdy::SpdySerializedFrame body( |
| spdy_util_.ConstructSpdyDataFrame(1, content, false)); |
| spdy::SpdySerializedFrame body_end( |
| spdy_util_.ConstructSpdyDataFrame(1, content, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(body, 1), |
| CreateMockWrite(body_end, 2), |
| }; |
| |
| static const int32_t kDeltaWindowSize = 0xff; |
| static const int kDeltaCount = 4; |
| spdy::SpdySerializedFrame window_update( |
| spdy_util_.ConstructSpdyWindowUpdate(1, kDeltaWindowSize)); |
| spdy::SpdySerializedFrame window_update_dummy( |
| spdy_util_.ConstructSpdyWindowUpdate(2, kDeltaWindowSize)); |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| MockRead reads[] = { |
| CreateMockRead(window_update_dummy, 3), |
| CreateMockRead(window_update_dummy, 4), |
| CreateMockRead(window_update_dummy, 5), |
| CreateMockRead(window_update, 6), // Four updates, therefore window |
| CreateMockRead(window_update, 7), // size should increase by |
| CreateMockRead(window_update, 8), // kDeltaWindowSize * 4 |
| CreateMockRead(window_update, 9), |
| CreateMockRead(resp, 10), |
| MockRead(ASYNC, ERR_IO_PENDING, 11), |
| CreateMockRead(body_end, 12), |
| MockRead(ASYNC, 0, 13) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| for (int i = 0; i < kFrameCount; ++i) { |
| element_readers.push_back(std::make_unique<UploadBytesElementReader>( |
| content.data(), content.size())); |
| } |
| ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); |
| |
| // Setup the request. |
| request_.method = "POST"; |
| request_.upload_data_stream = &upload_data_stream; |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.AddData(&data); |
| helper.RunPreTestSetup(); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| data.RunUntilPaused(); |
| base::RunLoop().RunUntilIdle(); |
| |
| SpdyHttpStream* stream = static_cast<SpdyHttpStream*>(trans->stream_.get()); |
| ASSERT_TRUE(stream); |
| ASSERT_TRUE(stream->stream()); |
| EXPECT_EQ(static_cast<int>(kDefaultInitialWindowSize) + |
| kDeltaWindowSize * kDeltaCount - |
| kMaxSpdyFrameChunkSize * kFrameCount, |
| stream->stream()->send_window_size()); |
| |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Test that received data frames and sent WINDOW_UPDATE frames change |
| // the recv_window_size_ correctly. |
| TEST_F(SpdyNetworkTransactionTest, WindowUpdateSent) { |
| // Session level maximum window size that is more than twice the default |
| // initial window size so that an initial window update is sent. |
| const int32_t session_max_recv_window_size = 5 * 64 * 1024; |
| ASSERT_LT(2 * kDefaultInitialWindowSize, session_max_recv_window_size); |
| // Stream level maximum window size that is less than the session level |
| // maximum window size so that we test for confusion between the two. |
| const int32_t stream_max_recv_window_size = 4 * 64 * 1024; |
| ASSERT_GT(session_max_recv_window_size, stream_max_recv_window_size); |
| // Size of body to be sent. Has to be less than or equal to both window sizes |
| // so that we do not run out of receiving window. Also has to be greater than |
| // half of them so that it triggers both a session level and a stream level |
| // window update frame. |
| const int32_t kTargetSize = 3 * 64 * 1024; |
| ASSERT_GE(session_max_recv_window_size, kTargetSize); |
| ASSERT_GE(stream_max_recv_window_size, kTargetSize); |
| ASSERT_LT(session_max_recv_window_size / 2, kTargetSize); |
| ASSERT_LT(stream_max_recv_window_size / 2, kTargetSize); |
| // Size of each DATA frame. |
| const int32_t kChunkSize = 4096; |
| // Size of window updates. |
| ASSERT_EQ(0, session_max_recv_window_size / 2 % kChunkSize); |
| const int32_t session_window_update_delta = |
| session_max_recv_window_size / 2 + kChunkSize; |
| ASSERT_EQ(0, stream_max_recv_window_size / 2 % kChunkSize); |
| const int32_t stream_window_update_delta = |
| stream_max_recv_window_size / 2 + kChunkSize; |
| |
| spdy::SpdySerializedFrame preface( |
| const_cast<char*>(spdy::kHttp2ConnectionHeaderPrefix), |
| spdy::kHttp2ConnectionHeaderPrefixSize, |
| /* owns_buffer = */ false); |
| |
| spdy::SettingsMap initial_settings; |
| initial_settings[spdy::SETTINGS_HEADER_TABLE_SIZE] = kSpdyMaxHeaderTableSize; |
| initial_settings[spdy::SETTINGS_MAX_CONCURRENT_STREAMS] = |
| kSpdyMaxConcurrentPushedStreams; |
| initial_settings[spdy::SETTINGS_INITIAL_WINDOW_SIZE] = |
| stream_max_recv_window_size; |
| spdy::SpdySerializedFrame initial_settings_frame( |
| spdy_util_.ConstructSpdySettings(initial_settings)); |
| |
| spdy::SpdySerializedFrame initial_window_update( |
| spdy_util_.ConstructSpdyWindowUpdate( |
| spdy::kSessionFlowControlStreamId, |
| session_max_recv_window_size - kDefaultInitialWindowSize)); |
| |
| spdy::SpdySerializedFrame combined_frames = CombineFrames( |
| {&preface, &initial_settings_frame, &initial_window_update}); |
| |
| std::vector<MockWrite> writes; |
| writes.push_back(CreateMockWrite(combined_frames)); |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| writes.push_back(CreateMockWrite(req, writes.size())); |
| |
| std::vector<MockRead> reads; |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| reads.push_back(CreateMockRead(resp, writes.size() + reads.size())); |
| |
| std::vector<spdy::SpdySerializedFrame> body_frames; |
| const std::string body_data(kChunkSize, 'x'); |
| for (size_t remaining = kTargetSize; remaining != 0;) { |
| size_t frame_size = std::min(remaining, body_data.size()); |
| body_frames.push_back(spdy_util_.ConstructSpdyDataFrame( |
| 1, base::StringPiece(body_data.data(), frame_size), false)); |
| reads.push_back( |
| CreateMockRead(body_frames.back(), writes.size() + reads.size())); |
| remaining -= frame_size; |
| } |
| // Yield. |
| reads.push_back( |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, writes.size() + reads.size())); |
| |
| spdy::SpdySerializedFrame session_window_update( |
| spdy_util_.ConstructSpdyWindowUpdate(0, session_window_update_delta)); |
| writes.push_back( |
| CreateMockWrite(session_window_update, writes.size() + reads.size())); |
| spdy::SpdySerializedFrame stream_window_update( |
| spdy_util_.ConstructSpdyWindowUpdate(1, stream_window_update_delta)); |
| writes.push_back( |
| CreateMockWrite(stream_window_update, writes.size() + reads.size())); |
| |
| SequencedSocketData data(reads, writes); |
| |
| auto session_deps = std::make_unique<SpdySessionDependencies>(); |
| session_deps->session_max_recv_window_size = session_max_recv_window_size; |
| session_deps->http2_settings[spdy::SETTINGS_INITIAL_WINDOW_SIZE] = |
| stream_max_recv_window_size; |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| helper.AddData(&data); |
| helper.RunPreTestSetup(); |
| |
| SpdySessionPool* spdy_session_pool = helper.session()->spdy_session_pool(); |
| SpdySessionPoolPeer pool_peer(spdy_session_pool); |
| pool_peer.SetEnableSendingInitialData(true); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| // Finish async network reads. |
| base::RunLoop().RunUntilIdle(); |
| |
| SpdyHttpStream* stream = |
| static_cast<SpdyHttpStream*>(trans->stream_.get()); |
| ASSERT_TRUE(stream); |
| ASSERT_TRUE(stream->stream()); |
| |
| // All data has been read, but not consumed. The window reflects this. |
| EXPECT_EQ(static_cast<int>(stream_max_recv_window_size - kTargetSize), |
| stream->stream()->recv_window_size()); |
| |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| ASSERT_TRUE(response); |
| ASSERT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| |
| // Issue a read which will cause a WINDOW_UPDATE to be sent and window |
| // size increased to default. |
| scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(kTargetSize); |
| EXPECT_EQ(static_cast<int>(kTargetSize), |
| trans->Read(buf.get(), kTargetSize, CompletionOnceCallback())); |
| EXPECT_EQ(static_cast<int>(stream_max_recv_window_size), |
| stream->stream()->recv_window_size()); |
| EXPECT_THAT(base::StringPiece(buf->data(), kTargetSize), Each(Eq('x'))); |
| |
| // Allow scheduled WINDOW_UPDATE frames to write. |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Test that WINDOW_UPDATE frame causing overflow is handled correctly. |
| TEST_F(SpdyNetworkTransactionTest, WindowUpdateOverflow) { |
| // Number of full frames we hope to write (but will not, used to |
| // set content-length header correctly) |
| static int kFrameCount = 3; |
| |
| std::string content(kMaxSpdyFrameChunkSize, 'a'); |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyPost( |
| kDefaultUrl, 1, kMaxSpdyFrameChunkSize * kFrameCount, LOWEST, nullptr, |
| 0)); |
| spdy::SpdySerializedFrame body( |
| spdy_util_.ConstructSpdyDataFrame(1, content, false)); |
| spdy::SpdySerializedFrame rst(spdy_util_.ConstructSpdyRstStream( |
| 1, spdy::ERROR_CODE_FLOW_CONTROL_ERROR)); |
| |
| // We're not going to write a data frame with FIN, we'll receive a bad |
| // WINDOW_UPDATE while sending a request and will send a RST_STREAM frame. |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(body, 2), |
| CreateMockWrite(rst, 3), |
| }; |
| |
| static const int32_t kDeltaWindowSize = 0x7fffffff; // cause an overflow |
| spdy::SpdySerializedFrame window_update( |
| spdy_util_.ConstructSpdyWindowUpdate(1, kDeltaWindowSize)); |
| MockRead reads[] = { |
| CreateMockRead(window_update, 1), MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| for (int i = 0; i < kFrameCount; ++i) { |
| element_readers.push_back(std::make_unique<UploadBytesElementReader>( |
| content.data(), content.size())); |
| } |
| ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); |
| |
| // Setup the request. |
| request_.method = "POST"; |
| request_.upload_data_stream = &upload_data_stream; |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| base::RunLoop().RunUntilIdle(); |
| ASSERT_TRUE(callback.have_result()); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_SPDY_FLOW_CONTROL_ERROR)); |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Regression test for https://crbug.com/732019. |
| // RFC7540 Section 6.9.2: A spdy::SETTINGS_INITIAL_WINDOW_SIZE change that |
| // causes any stream flow control window to overflow MUST be treated as a |
| // connection error. |
| TEST_F(SpdyNetworkTransactionTest, InitialWindowSizeOverflow) { |
| spdy::SpdySerializedFrame window_update( |
| spdy_util_.ConstructSpdyWindowUpdate(1, 0x60000000)); |
| spdy::SettingsMap settings; |
| settings[spdy::SETTINGS_INITIAL_WINDOW_SIZE] = 0x60000000; |
| spdy::SpdySerializedFrame settings_frame( |
| spdy_util_.ConstructSpdySettings(settings)); |
| MockRead reads[] = {CreateMockRead(window_update, 1), |
| CreateMockRead(settings_frame, 2)}; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| spdy::SpdySerializedFrame goaway( |
| spdy_util_.ConstructSpdyGoAway(0, spdy::ERROR_CODE_FLOW_CONTROL_ERROR, |
| "New spdy::SETTINGS_INITIAL_WINDOW_SIZE " |
| "value overflows flow control window of " |
| "stream 1.")); |
| MockWrite writes[] = {CreateMockWrite(req, 0), |
| CreateMockWrite(settings_ack, 3), |
| CreateMockWrite(goaway, 4)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_FLOW_CONTROL_ERROR)); |
| } |
| |
| // Test that after hitting a send window size of 0, the write process |
| // stalls and upon receiving WINDOW_UPDATE frame write resumes. |
| |
| // This test constructs a POST request followed by enough data frames |
| // containing 'a' that would make the window size 0, followed by another |
| // data frame containing default content (which is "hello!") and this frame |
| // also contains a FIN flag. SequencedSocketData is used to enforce all |
| // writes, save the last, go through before a read could happen. The last frame |
| // ("hello!") is not permitted to go through since by the time its turn |
| // arrives, window size is 0. At this point MessageLoop::Run() called via |
| // callback would block. Therefore we call MessageLoop::RunUntilIdle() |
| // which returns after performing all possible writes. We use DCHECKS to |
| // ensure that last data frame is still there and stream has stalled. |
| // After that, next read is artifically enforced, which causes a |
| // WINDOW_UPDATE to be read and I/O process resumes. |
| TEST_F(SpdyNetworkTransactionTest, FlowControlStallResume) { |
| const int32_t initial_window_size = kDefaultInitialWindowSize; |
| // Number of upload data buffers we need to send to zero out the window size |
| // is the minimal number of upload buffers takes to be bigger than |
| // |initial_window_size|. |
| size_t num_upload_buffers = |
| ceil(static_cast<double>(initial_window_size) / kBufferSize); |
| // Each upload data buffer consists of |num_frames_in_one_upload_buffer| |
| // frames, each with |kMaxSpdyFrameChunkSize| bytes except the last frame, |
| // which has kBufferSize % kMaxSpdyChunkSize bytes. |
| size_t num_frames_in_one_upload_buffer = |
| ceil(static_cast<double>(kBufferSize) / kMaxSpdyFrameChunkSize); |
| |
| // Construct content for a data frame of maximum size. |
| std::string content(kMaxSpdyFrameChunkSize, 'a'); |
| |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyPost( |
| kDefaultUrl, 1, |
| /*content_length=*/kBufferSize * num_upload_buffers + kUploadDataSize, |
| LOWEST, nullptr, 0)); |
| |
| // Full frames. |
| spdy::SpdySerializedFrame body1( |
| spdy_util_.ConstructSpdyDataFrame(1, content, false)); |
| |
| // Last frame in each upload data buffer. |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame( |
| 1, |
| base::StringPiece(content.data(), kBufferSize % kMaxSpdyFrameChunkSize), |
| false)); |
| |
| // The very last frame before the stalled frames. |
| spdy::SpdySerializedFrame body3(spdy_util_.ConstructSpdyDataFrame( |
| 1, |
| base::StringPiece(content.data(), initial_window_size % kBufferSize % |
| kMaxSpdyFrameChunkSize), |
| false)); |
| |
| // Data frames to be sent once WINDOW_UPDATE frame is received. |
| |
| // If kBufferSize * num_upload_buffers > initial_window_size, |
| // we need one additional frame to send the rest of 'a'. |
| std::string last_body(kBufferSize * num_upload_buffers - initial_window_size, |
| 'a'); |
| spdy::SpdySerializedFrame body4( |
| spdy_util_.ConstructSpdyDataFrame(1, last_body, false)); |
| |
| // Also send a "hello!" after WINDOW_UPDATE. |
| spdy::SpdySerializedFrame body5(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| |
| // Fill in mock writes. |
| size_t i = 0; |
| std::vector<MockWrite> writes; |
| writes.push_back(CreateMockWrite(req, i++)); |
| for (size_t j = 0; j < num_upload_buffers; j++) { |
| for (size_t k = 0; k < num_frames_in_one_upload_buffer; k++) { |
| if (k == num_frames_in_one_upload_buffer - 1 && |
| kBufferSize % kMaxSpdyFrameChunkSize != 0) { |
| if (j == num_upload_buffers - 1 && |
| (initial_window_size % kBufferSize != 0)) { |
| writes.push_back(CreateMockWrite(body3, i++)); |
| } else { |
| writes.push_back(CreateMockWrite(body2, i++)); |
| } |
| } else { |
| writes.push_back(CreateMockWrite(body1, i++)); |
| } |
| } |
| } |
| |
| // Fill in mock reads. |
| std::vector<MockRead> reads; |
| // Force a pause. |
| reads.push_back(MockRead(ASYNC, ERR_IO_PENDING, i++)); |
| // Construct read frame for window updates that gives enough space to upload |
| // the rest of the data. |
| spdy::SpdySerializedFrame session_window_update( |
| spdy_util_.ConstructSpdyWindowUpdate(0, |
| kUploadDataSize + last_body.size())); |
| spdy::SpdySerializedFrame window_update(spdy_util_.ConstructSpdyWindowUpdate( |
| 1, kUploadDataSize + last_body.size())); |
| |
| reads.push_back(CreateMockRead(session_window_update, i++)); |
| reads.push_back(CreateMockRead(window_update, i++)); |
| |
| // Stalled frames which can be sent after receiving window updates. |
| if (last_body.size() > 0) |
| writes.push_back(CreateMockWrite(body4, i++)); |
| writes.push_back(CreateMockWrite(body5, i++)); |
| |
| spdy::SpdySerializedFrame reply( |
| spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| reads.push_back(CreateMockRead(reply, i++)); |
| reads.push_back(CreateMockRead(body2, i++)); |
| reads.push_back(CreateMockRead(body5, i++)); |
| reads.push_back(MockRead(ASYNC, 0, i++)); // EOF |
| |
| SequencedSocketData data(reads, writes); |
| |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| std::string upload_data_string(kBufferSize * num_upload_buffers, 'a'); |
| upload_data_string.append(kUploadData, kUploadDataSize); |
| element_readers.push_back(std::make_unique<UploadBytesElementReader>( |
| upload_data_string.c_str(), upload_data_string.size())); |
| ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); |
| |
| request_.method = "POST"; |
| request_.upload_data_stream = &upload_data_stream; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.AddData(&data); |
| helper.RunPreTestSetup(); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| base::RunLoop().RunUntilIdle(); // Write as much as we can. |
| |
| SpdyHttpStream* stream = static_cast<SpdyHttpStream*>(trans->stream_.get()); |
| ASSERT_TRUE(stream); |
| ASSERT_TRUE(stream->stream()); |
| EXPECT_EQ(0, stream->stream()->send_window_size()); |
| if (initial_window_size % kBufferSize != 0) { |
| // If it does not take whole number of full upload buffer to zero out |
| // initial window size, then the upload data is not at EOF, because the |
| // last read must be stalled. |
| EXPECT_FALSE(upload_data_stream.IsEOF()); |
| } else { |
| // All the body data should have been read. |
| // TODO(satorux): This is because of the weirdness in reading the request |
| // body in OnSendBodyComplete(). See crbug.com/113107. |
| EXPECT_TRUE(upload_data_stream.IsEOF()); |
| } |
| // But the body is not yet fully sent (kUploadData is not yet sent) |
| // since we're send-stalled. |
| EXPECT_TRUE(stream->stream()->send_stalled_by_flow_control()); |
| |
| data.Resume(); // Read in WINDOW_UPDATE frame. |
| rv = callback.WaitForResult(); |
| EXPECT_THAT(rv, IsOk()); |
| |
| // Finish async network reads. |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Test we correctly handle the case where the SETTINGS frame results in |
| // unstalling the send window. |
| TEST_F(SpdyNetworkTransactionTest, FlowControlStallResumeAfterSettings) { |
| const int32_t initial_window_size = kDefaultInitialWindowSize; |
| // Number of upload data buffers we need to send to zero out the window size |
| // is the minimal number of upload buffers takes to be bigger than |
| // |initial_window_size|. |
| size_t num_upload_buffers = |
| ceil(static_cast<double>(initial_window_size) / kBufferSize); |
| // Each upload data buffer consists of |num_frames_in_one_upload_buffer| |
| // frames, each with |kMaxSpdyFrameChunkSize| bytes except the last frame, |
| // which has kBufferSize % kMaxSpdyChunkSize bytes. |
| size_t num_frames_in_one_upload_buffer = |
| ceil(static_cast<double>(kBufferSize) / kMaxSpdyFrameChunkSize); |
| |
| // Construct content for a data frame of maximum size. |
| std::string content(kMaxSpdyFrameChunkSize, 'a'); |
| |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyPost( |
| kDefaultUrl, 1, |
| /*content_length=*/kBufferSize * num_upload_buffers + kUploadDataSize, |
| LOWEST, nullptr, 0)); |
| |
| // Full frames. |
| spdy::SpdySerializedFrame body1( |
| spdy_util_.ConstructSpdyDataFrame(1, content, false)); |
| |
| // Last frame in each upload data buffer. |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame( |
| 1, |
| base::StringPiece(content.data(), kBufferSize % kMaxSpdyFrameChunkSize), |
| false)); |
| |
| // The very last frame before the stalled frames. |
| spdy::SpdySerializedFrame body3(spdy_util_.ConstructSpdyDataFrame( |
| 1, |
| base::StringPiece(content.data(), initial_window_size % kBufferSize % |
| kMaxSpdyFrameChunkSize), |
| false)); |
| |
| // Data frames to be sent once WINDOW_UPDATE frame is received. |
| |
| // If kBufferSize * num_upload_buffers > initial_window_size, |
| // we need one additional frame to send the rest of 'a'. |
| std::string last_body(kBufferSize * num_upload_buffers - initial_window_size, |
| 'a'); |
| spdy::SpdySerializedFrame body4( |
| spdy_util_.ConstructSpdyDataFrame(1, last_body, false)); |
| |
| // Also send a "hello!" after WINDOW_UPDATE. |
| spdy::SpdySerializedFrame body5(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| |
| // Fill in mock writes. |
| size_t i = 0; |
| std::vector<MockWrite> writes; |
| writes.push_back(CreateMockWrite(req, i++)); |
| for (size_t j = 0; j < num_upload_buffers; j++) { |
| for (size_t k = 0; k < num_frames_in_one_upload_buffer; k++) { |
| if (k == num_frames_in_one_upload_buffer - 1 && |
| kBufferSize % kMaxSpdyFrameChunkSize != 0) { |
| if (j == num_upload_buffers - 1 && |
| (initial_window_size % kBufferSize != 0)) { |
| writes.push_back(CreateMockWrite(body3, i++)); |
| } else { |
| writes.push_back(CreateMockWrite(body2, i++)); |
| } |
| } else { |
| writes.push_back(CreateMockWrite(body1, i++)); |
| } |
| } |
| } |
| |
| // Fill in mock reads. |
| std::vector<MockRead> reads; |
| // Force a pause. |
| reads.push_back(MockRead(ASYNC, ERR_IO_PENDING, i++)); |
| |
| // Construct read frame for SETTINGS that gives enough space to upload the |
| // rest of the data. |
| spdy::SettingsMap settings; |
| settings[spdy::SETTINGS_INITIAL_WINDOW_SIZE] = initial_window_size * 2; |
| spdy::SpdySerializedFrame settings_frame_large( |
| spdy_util_.ConstructSpdySettings(settings)); |
| |
| reads.push_back(CreateMockRead(settings_frame_large, i++)); |
| |
| spdy::SpdySerializedFrame session_window_update( |
| spdy_util_.ConstructSpdyWindowUpdate(0, |
| last_body.size() + kUploadDataSize)); |
| reads.push_back(CreateMockRead(session_window_update, i++)); |
| |
| spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| writes.push_back(CreateMockWrite(settings_ack, i++)); |
| |
| // Stalled frames which can be sent after |settings_ack|. |
| if (last_body.size() > 0) |
| writes.push_back(CreateMockWrite(body4, i++)); |
| writes.push_back(CreateMockWrite(body5, i++)); |
| |
| spdy::SpdySerializedFrame reply( |
| spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| reads.push_back(CreateMockRead(reply, i++)); |
| reads.push_back(CreateMockRead(body2, i++)); |
| reads.push_back(CreateMockRead(body5, i++)); |
| reads.push_back(MockRead(ASYNC, 0, i++)); // EOF |
| |
| // Force all writes to happen before any read, last write will not |
| // actually queue a frame, due to window size being 0. |
| SequencedSocketData data(reads, writes); |
| |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| std::string upload_data_string(kBufferSize * num_upload_buffers, 'a'); |
| upload_data_string.append(kUploadData, kUploadDataSize); |
| element_readers.push_back(std::make_unique<UploadBytesElementReader>( |
| upload_data_string.c_str(), upload_data_string.size())); |
| ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); |
| |
| request_.method = "POST"; |
| request_.upload_data_stream = &upload_data_stream; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| data.RunUntilPaused(); // Write as much as we can. |
| base::RunLoop().RunUntilIdle(); |
| |
| SpdyHttpStream* stream = static_cast<SpdyHttpStream*>(trans->stream_.get()); |
| ASSERT_TRUE(stream); |
| ASSERT_TRUE(stream->stream()); |
| EXPECT_EQ(0, stream->stream()->send_window_size()); |
| |
| if (initial_window_size % kBufferSize != 0) { |
| // If it does not take whole number of full upload buffer to zero out |
| // initial window size, then the upload data is not at EOF, because the |
| // last read must be stalled. |
| EXPECT_FALSE(upload_data_stream.IsEOF()); |
| } else { |
| // All the body data should have been read. |
| // TODO(satorux): This is because of the weirdness in reading the request |
| // body in OnSendBodyComplete(). See crbug.com/113107. |
| EXPECT_TRUE(upload_data_stream.IsEOF()); |
| } |
| // But the body is not yet fully sent (kUploadData is not yet sent) |
| // since we're send-stalled. |
| EXPECT_TRUE(stream->stream()->send_stalled_by_flow_control()); |
| |
| // Read in SETTINGS frame to unstall. |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| |
| rv = callback.WaitForResult(); |
| helper.VerifyDataConsumed(); |
| // If stream is nullptr, that means it was unstalled and closed. |
| EXPECT_TRUE(stream->stream() == nullptr); |
| } |
| |
| // Test we correctly handle the case where the SETTINGS frame results in a |
| // negative send window size. |
| TEST_F(SpdyNetworkTransactionTest, FlowControlNegativeSendWindowSize) { |
| const int32_t initial_window_size = kDefaultInitialWindowSize; |
| // Number of upload data buffers we need to send to zero out the window size |
| // is the minimal number of upload buffers takes to be bigger than |
| // |initial_window_size|. |
| size_t num_upload_buffers = |
| ceil(static_cast<double>(initial_window_size) / kBufferSize); |
| // Each upload data buffer consists of |num_frames_in_one_upload_buffer| |
| // frames, each with |kMaxSpdyFrameChunkSize| bytes except the last frame, |
| // which has kBufferSize % kMaxSpdyChunkSize bytes. |
| size_t num_frames_in_one_upload_buffer = |
| ceil(static_cast<double>(kBufferSize) / kMaxSpdyFrameChunkSize); |
| |
| // Construct content for a data frame of maximum size. |
| std::string content(kMaxSpdyFrameChunkSize, 'a'); |
| |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyPost( |
| kDefaultUrl, 1, |
| /*content_length=*/kBufferSize * num_upload_buffers + kUploadDataSize, |
| LOWEST, nullptr, 0)); |
| |
| // Full frames. |
| spdy::SpdySerializedFrame body1( |
| spdy_util_.ConstructSpdyDataFrame(1, content, false)); |
| |
| // Last frame in each upload data buffer. |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame( |
| 1, |
| base::StringPiece(content.data(), kBufferSize % kMaxSpdyFrameChunkSize), |
| false)); |
| |
| // The very last frame before the stalled frames. |
| spdy::SpdySerializedFrame body3(spdy_util_.ConstructSpdyDataFrame( |
| 1, |
| base::StringPiece(content.data(), initial_window_size % kBufferSize % |
| kMaxSpdyFrameChunkSize), |
| false)); |
| |
| // Data frames to be sent once WINDOW_UPDATE frame is received. |
| |
| // If kBufferSize * num_upload_buffers > initial_window_size, |
| // we need one additional frame to send the rest of 'a'. |
| std::string last_body(kBufferSize * num_upload_buffers - initial_window_size, |
| 'a'); |
| spdy::SpdySerializedFrame body4( |
| spdy_util_.ConstructSpdyDataFrame(1, last_body, false)); |
| |
| // Also send a "hello!" after WINDOW_UPDATE. |
| spdy::SpdySerializedFrame body5(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| |
| // Fill in mock writes. |
| size_t i = 0; |
| std::vector<MockWrite> writes; |
| writes.push_back(CreateMockWrite(req, i++)); |
| for (size_t j = 0; j < num_upload_buffers; j++) { |
| for (size_t k = 0; k < num_frames_in_one_upload_buffer; k++) { |
| if (k == num_frames_in_one_upload_buffer - 1 && |
| kBufferSize % kMaxSpdyFrameChunkSize != 0) { |
| if (j == num_upload_buffers - 1 && |
| (initial_window_size % kBufferSize != 0)) { |
| writes.push_back(CreateMockWrite(body3, i++)); |
| } else { |
| writes.push_back(CreateMockWrite(body2, i++)); |
| } |
| } else { |
| writes.push_back(CreateMockWrite(body1, i++)); |
| } |
| } |
| } |
| |
| // Fill in mock reads. |
| std::vector<MockRead> reads; |
| // Force a pause. |
| reads.push_back(MockRead(ASYNC, ERR_IO_PENDING, i++)); |
| // Construct read frame for SETTINGS that makes the send_window_size |
| // negative. |
| spdy::SettingsMap new_settings; |
| new_settings[spdy::SETTINGS_INITIAL_WINDOW_SIZE] = initial_window_size / 2; |
| spdy::SpdySerializedFrame settings_frame_small( |
| spdy_util_.ConstructSpdySettings(new_settings)); |
| // Construct read frames for WINDOW_UPDATE that makes the send_window_size |
| // positive. |
| spdy::SpdySerializedFrame session_window_update_init_size( |
| spdy_util_.ConstructSpdyWindowUpdate(0, initial_window_size)); |
| spdy::SpdySerializedFrame window_update_init_size( |
| spdy_util_.ConstructSpdyWindowUpdate(1, initial_window_size)); |
| |
| reads.push_back(CreateMockRead(settings_frame_small, i++)); |
| reads.push_back(CreateMockRead(session_window_update_init_size, i++)); |
| reads.push_back(CreateMockRead(window_update_init_size, i++)); |
| |
| spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| writes.push_back(CreateMockWrite(settings_ack, i++)); |
| |
| // Stalled frames which can be sent after |settings_ack|. |
| if (last_body.size() > 0) |
| writes.push_back(CreateMockWrite(body4, i++)); |
| writes.push_back(CreateMockWrite(body5, i++)); |
| |
| spdy::SpdySerializedFrame reply( |
| spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| reads.push_back(CreateMockRead(reply, i++)); |
| reads.push_back(CreateMockRead(body2, i++)); |
| reads.push_back(CreateMockRead(body5, i++)); |
| reads.push_back(MockRead(ASYNC, 0, i++)); // EOF |
| |
| // Force all writes to happen before any read, last write will not |
| // actually queue a frame, due to window size being 0. |
| SequencedSocketData data(reads, writes); |
| |
| std::vector<std::unique_ptr<UploadElementReader>> element_readers; |
| std::string upload_data_string(kBufferSize * num_upload_buffers, 'a'); |
| upload_data_string.append(kUploadData, kUploadDataSize); |
| element_readers.push_back(std::make_unique<UploadBytesElementReader>( |
| upload_data_string.c_str(), upload_data_string.size())); |
| ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); |
| |
| request_.method = "POST"; |
| request_.upload_data_stream = &upload_data_stream; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| data.RunUntilPaused(); // Write as much as we can. |
| base::RunLoop().RunUntilIdle(); |
| |
| SpdyHttpStream* stream = static_cast<SpdyHttpStream*>(trans->stream_.get()); |
| ASSERT_TRUE(stream); |
| ASSERT_TRUE(stream->stream()); |
| EXPECT_EQ(0, stream->stream()->send_window_size()); |
| |
| if (initial_window_size % kBufferSize != 0) { |
| // If it does not take whole number of full upload buffer to zero out |
| // initial window size, then the upload data is not at EOF, because the |
| // last read must be stalled. |
| EXPECT_FALSE(upload_data_stream.IsEOF()); |
| } else { |
| // All the body data should have been read. |
| // TODO(satorux): This is because of the weirdness in reading the request |
| // body in OnSendBodyComplete(). See crbug.com/113107. |
| EXPECT_TRUE(upload_data_stream.IsEOF()); |
| } |
| |
| // Read in WINDOW_UPDATE or SETTINGS frame. |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| rv = callback.WaitForResult(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, GoAwayOnOddPushStreamId) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdyHeaderBlock push_headers; |
| spdy_util_.AddUrlToHeaderBlock("http://www.example.org/a.dat", &push_headers); |
| spdy::SpdySerializedFrame push( |
| spdy_util_.ConstructSpdyPushPromise(1, 3, std::move(push_headers))); |
| MockRead reads[] = {CreateMockRead(push, 1)}; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway( |
| 0, spdy::ERROR_CODE_PROTOCOL_ERROR, |
| "Received invalid pushed stream id 3 (must be even) on stream id 1.")); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(goaway, 2), |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kPromisedStreamIdParityError), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, |
| GoAwayOnPushStreamIdLesserOrEqualThanLastAccepted) { |
| base::HistogramTester histogram_tester; |
| |
| spdy::SpdySerializedFrame push_a(spdy_util_.ConstructSpdyPush( |
| nullptr, 0, 4, 1, "https://www.example.org/a.dat")); |
| spdy::SpdyHeaderBlock push_b_headers; |
| spdy_util_.AddUrlToHeaderBlock("https://www.example.org/b.dat", |
| &push_b_headers); |
| spdy::SpdySerializedFrame push_b( |
| spdy_util_.ConstructSpdyPushPromise(1, 2, std::move(push_b_headers))); |
| MockRead reads[] = { |
| CreateMockRead(push_a, 1), CreateMockRead(push_b, 3), |
| }; |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame priority_a( |
| spdy_util_.ConstructSpdyPriority(4, 1, IDLE, true)); |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway( |
| 4, spdy::ERROR_CODE_PROTOCOL_ERROR, |
| "Received pushed stream id 2 must be larger than last accepted id 4.")); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(priority_a, 2), |
| CreateMockWrite(goaway, 4), |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdyPushedStreamFate", |
| static_cast<int>(SpdyPushedStreamFate::kStreamIdOutOfOrder), 1); |
| histogram_tester.ExpectTotalCount("Net.SpdyPushedStreamFate", 1); |
| } |
| |
| // Regression test for https://crbug.com/493348: request header exceeds 16 kB |
| // and thus sent in multiple frames when using HTTP/2. |
| TEST_F(SpdyNetworkTransactionTest, LargeRequest) { |
| const std::string kKey("foo"); |
| const std::string kValue(1 << 15, 'z'); |
| |
| request_.extra_headers.SetHeader(kKey, kValue); |
| |
| spdy::SpdyHeaderBlock headers( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultUrl)); |
| headers[kKey] = kValue; |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| // Regression test for https://crbug.com/535629: response header exceeds 16 kB. |
| TEST_F(SpdyNetworkTransactionTest, LargeResponseHeader) { |
| spdy::SpdyHeaderBlock headers( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultUrl)); |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), |
| }; |
| |
| // HPACK decoder implementation limits string literal length to 16 kB. |
| const char* response_headers[2]; |
| const std::string kKey(16 * 1024, 'a'); |
| response_headers[0] = kKey.data(); |
| const std::string kValue(16 * 1024, 'b'); |
| response_headers[1] = kValue.data(); |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(response_headers, 1, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| SequencedSocketData data(reads, writes); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| ASSERT_TRUE(out.response_info.headers->HasHeaderValue(kKey, kValue)); |
| } |
| |
| // End of line delimiter is forbidden according to RFC 7230 Section 3.2. |
| TEST_F(SpdyNetworkTransactionTest, CRLFInHeaderValue) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_PROTOCOL_ERROR)); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(rst, 2)}; |
| |
| const char* response_headers[] = {"folded", "foo\r\nbar"}; |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(response_headers, 1, 1)); |
| MockRead reads[] = {CreateMockRead(resp, 1), MockRead(ASYNC, 0, 3)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| } |
| |
| // Regression test for https://crbug.com/603182. |
| // No response headers received before RST_STREAM: error. |
| TEST_F(SpdyNetworkTransactionTest, RstStreamNoError) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructChunkedSpdyPost(nullptr, 0)); |
| MockWrite writes[] = {CreateMockWrite(req, 0, ASYNC)}; |
| |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_NO_ERROR)); |
| MockRead reads[] = {CreateMockRead(rst, 1), MockRead(ASYNC, 0, 2)}; |
| |
| SequencedSocketData data(reads, writes); |
| UseChunkedPostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_PROTOCOL_ERROR)); |
| } |
| |
| // Regression test for https://crbug.com/603182. |
| // Response headers and data, then RST_STREAM received, |
| // before request body is sent: success. |
| TEST_F(SpdyNetworkTransactionTest, RstStreamNoErrorAfterResponse) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructChunkedSpdyPost(nullptr, 0)); |
| MockWrite writes[] = {CreateMockWrite(req, 0, ASYNC)}; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_NO_ERROR)); |
| MockRead reads[] = {CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| CreateMockRead(rst, 3), MockRead(ASYNC, 0, 4)}; |
| |
| SequencedSocketData data(reads, writes); |
| UseChunkedPostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, 100Continue) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdyHeaderBlock informational_headers; |
| informational_headers[spdy::kHttp2StatusHeader] = "100"; |
| spdy::SpdySerializedFrame informational_response( |
| spdy_util_.ConstructSpdyReply(1, std::move(informational_headers))); |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(informational_response, 1), CreateMockRead(resp, 2), |
| CreateMockRead(body, 3), MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| // "A server can send a complete response prior to the client sending an entire |
| // request if the response does not depend on any portion of the request that |
| // has not been sent and received." (RFC7540 Section 8.1) |
| // Regression test for https://crbug.com/606990. Server responds before POST |
| // data are sent and closes connection: this must result in |
| // ERR_CONNECTION_CLOSED (as opposed to ERR_SPDY_PROTOCOL_ERROR). |
| TEST_F(SpdyNetworkTransactionTest, ResponseBeforePostDataSent) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructChunkedSpdyPost(nullptr, 0)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = {CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3)}; |
| |
| SequencedSocketData data(reads, writes); |
| UseChunkedPostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.StartDefaultTest(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_IO_PENDING)); |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_CONNECTION_CLOSED)); |
| } |
| |
| // Regression test for https://crbug.com/606990. |
| // Server responds before POST data are sent and resets stream with NO_ERROR. |
| TEST_F(SpdyNetworkTransactionTest, ResponseAndRstStreamBeforePostDataSent) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructChunkedSpdyPost(nullptr, 0)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyPostReply(nullptr, 0)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame rst( |
| spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_NO_ERROR)); |
| MockRead reads[] = {CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| CreateMockRead(rst, 3), MockRead(ASYNC, 0, 4)}; |
| |
| SequencedSocketData data(reads, writes); |
| UseChunkedPostRequest(); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.RunToCompletion(&data); |
| |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| // Unsupported frames must be ignored. This is especially important for frame |
| // type 0xb, which used to be the BLOCKED frame in previous versions of SPDY, |
| // but is going to be used for the ORIGIN frame. |
| // TODO(bnc): Implement ORIGIN frame support. https://crbug.com/697333 |
| TEST_F(SpdyNetworkTransactionTest, IgnoreUnsupportedOriginFrame) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| const char origin_frame_on_stream_zero[] = { |
| 0x00, 0x00, 0x05, // Length |
| 0x0b, // Type |
| 0x00, // Flags |
| 0x00, 0x00, 0x00, 0x00, // Stream ID |
| 0x00, 0x03, // Origin-Len |
| 'f', 'o', 'o' // ASCII-Origin |
| }; |
| |
| const char origin_frame_on_stream_one[] = { |
| 0x00, 0x00, 0x05, // Length |
| 0x0b, // Type |
| 0x00, // Flags |
| 0x00, 0x00, 0x00, 0x01, // Stream ID |
| 0x00, 0x03, // Origin-Len |
| 'b', 'a', 'r' // ASCII-Origin |
| }; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = {MockRead(ASYNC, origin_frame_on_stream_zero, |
| arraysize(origin_frame_on_stream_zero), 1), |
| CreateMockRead(resp, 2), |
| MockRead(ASYNC, origin_frame_on_stream_one, |
| arraysize(origin_frame_on_stream_one), 3), |
| CreateMockRead(body, 4), MockRead(ASYNC, 0, 5)}; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunToCompletion(&data); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsOk()); |
| EXPECT_EQ("HTTP/1.1 200", out.status_line); |
| EXPECT_EQ("hello!", out.response_data); |
| } |
| |
| class SpdyNetworkTransactionTLSUsageCheckTest |
| : public SpdyNetworkTransactionTest { |
| protected: |
| void RunTLSUsageCheckTest( |
| std::unique_ptr<SSLSocketDataProvider> ssl_provider) { |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway( |
| 0, spdy::ERROR_CODE_INADEQUATE_SECURITY, "")); |
| MockWrite writes[] = {CreateMockWrite(goaway)}; |
| |
| StaticSocketDataProvider data(base::span<MockRead>(), writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| nullptr); |
| helper.RunToCompletionWithSSLData(&data, std::move(ssl_provider)); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY)); |
| } |
| }; |
| |
| TEST_F(SpdyNetworkTransactionTLSUsageCheckTest, TLSVersionTooOld) { |
| auto ssl_provider = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| SSLConnectionStatusSetVersion(SSL_CONNECTION_VERSION_SSL3, |
| &ssl_provider->ssl_info.connection_status); |
| |
| RunTLSUsageCheckTest(std::move(ssl_provider)); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTLSUsageCheckTest, TLSCipherSuiteSucky) { |
| auto ssl_provider = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| // Set to TLS_RSA_WITH_NULL_MD5 |
| SSLConnectionStatusSetCipherSuite(0x1, |
| &ssl_provider->ssl_info.connection_status); |
| |
| RunTLSUsageCheckTest(std::move(ssl_provider)); |
| } |
| |
| // Regression test for https://crbug.com/737143. |
| // This test sets up an old TLS version just like in TLSVersionTooOld, |
| // and makes sure that it results in an spdy::ERROR_CODE_INADEQUATE_SECURITY |
| // even for a non-secure request URL. |
| TEST_F(SpdyNetworkTransactionTest, InsecureUrlCreatesSecureSpdySession) { |
| auto ssl_provider = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| SSLConnectionStatusSetVersion(SSL_CONNECTION_VERSION_SSL3, |
| &ssl_provider->ssl_info.connection_status); |
| |
| spdy::SpdySerializedFrame goaway(spdy_util_.ConstructSpdyGoAway( |
| 0, spdy::ERROR_CODE_INADEQUATE_SECURITY, "")); |
| MockWrite writes[] = {CreateMockWrite(goaway)}; |
| StaticSocketDataProvider data(base::span<MockRead>(), writes); |
| |
| request_.url = GURL("http://www.example.org/"); |
| |
| // Need secure proxy so that insecure URL can use HTTP/2. |
| auto session_deps = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixedFromPacResult( |
| "HTTPS myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS)); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| |
| helper.RunToCompletionWithSSLData(&data, std::move(ssl_provider)); |
| TransactionHelperResult out = helper.output(); |
| EXPECT_THAT(out.rv, IsError(ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY)); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, RequestHeadersCallback) { |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, DEFAULT_PRIORITY)); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| HttpRawRequestHeaders raw_headers; |
| |
| SequencedSocketData data(reads, writes); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| helper.trans()->SetRequestHeadersCallback(base::Bind( |
| &HttpRawRequestHeaders::Assign, base::Unretained(&raw_headers))); |
| helper.StartDefaultTest(); |
| helper.FinishDefaultTestWithoutVerification(); |
| EXPECT_FALSE(raw_headers.headers().empty()); |
| std::string value; |
| EXPECT_TRUE(raw_headers.FindHeaderForTest(":path", &value)); |
| EXPECT_EQ("/", value); |
| EXPECT_TRUE(raw_headers.FindHeaderForTest(":method", &value)); |
| EXPECT_EQ("GET", value); |
| EXPECT_TRUE(raw_headers.request_line().empty()); |
| } |
| |
| // A request that has adopted a push promise and later got reset by the server |
| // should be retried on a new stream. |
| // Regression test for https://crbug.com/798508. |
| TEST_F(SpdyNetworkTransactionTest, PushCanceledByServerAfterClaimed) { |
| const char pushed_url[] = "https://www.example.org/a.dat"; |
| // Construct a request to the default URL on stream 1. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); |
| spdy::SpdySerializedFrame req2( |
| spdy_util_.ConstructSpdyGet(pushed_url, 3, LOWEST)); |
| // Construct a priority frame for stream 2. |
| spdy::SpdySerializedFrame priority( |
| spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); |
| MockWrite writes[] = {CreateMockWrite(req, 0), CreateMockWrite(priority, 3), |
| CreateMockWrite(req2, 6)}; |
| |
| // Construct a Push Promise frame, with no response. |
| spdy::SpdySerializedFrame push_promise(spdy_util_.ConstructSpdyPushPromise( |
| 1, 2, spdy_util_.ConstructGetHeaderBlock(pushed_url))); |
| // Construct a RST frame, canceling stream 2. |
| spdy::SpdySerializedFrame rst_server( |
| spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_CANCEL)); |
| // Construct response headers and bodies. |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame resp2( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true)); |
| MockRead reads[] = { |
| CreateMockRead(push_promise, 1), MockRead(ASYNC, ERR_IO_PENDING, 2), |
| CreateMockRead(rst_server, 4), MockRead(ASYNC, ERR_IO_PENDING, 5), |
| CreateMockRead(resp1, 7), CreateMockRead(body1, 8), |
| CreateMockRead(resp2, 9), CreateMockRead(body2, 10), |
| MockRead(ASYNC, 0, 11)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| |
| // First request to start the connection. |
| TestCompletionCallback callback1; |
| int rv = trans->Start(&request_, callback1.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| data.RunUntilPaused(); |
| |
| // Get a SpdySession. |
| SpdySessionKey key(HostPortPair::FromURL(request_.url), ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| HttpNetworkSession* session = helper.session(); |
| base::WeakPtr<SpdySession> spdy_session = |
| session->spdy_session_pool()->FindAvailableSession( |
| key, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| |
| // Verify that there is one unclaimed push stream. |
| EXPECT_EQ(1u, num_unclaimed_pushed_streams(spdy_session)); |
| |
| // Claim the pushed stream. |
| HttpNetworkTransaction transaction2(DEFAULT_PRIORITY, session); |
| TestCompletionCallback callback2; |
| HttpRequestInfo request2; |
| request2.method = "GET"; |
| request2.url = GURL(pushed_url); |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| transaction2.Start(&request2, callback2.callback(), log_); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_EQ(3u, spdy_stream_hi_water_mark(spdy_session)); |
| |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session)); |
| |
| // Continue reading and get the RST. |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| |
| // Make sure we got the RST and retried the request. |
| EXPECT_EQ(2u, num_active_streams(spdy_session)); |
| EXPECT_EQ(0u, num_unclaimed_pushed_streams(spdy_session)); |
| EXPECT_EQ(5u, spdy_stream_hi_water_mark(spdy_session)); |
| |
| data.Resume(); |
| |
| // Test that transactions succeeded. |
| rv = callback1.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| |
| rv = callback2.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| |
| // Read EOF. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that all data was read and written. |
| helper.VerifyDataConsumed(); |
| } |
| |
| #if BUILDFLAG(ENABLE_WEBSOCKETS) |
| |
| TEST_F(SpdyNetworkTransactionTest, WebSocketOpensNewConnection) { |
| base::HistogramTester histogram_tester; |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| |
| // First request opens up an HTTP/2 connection. |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, DEFAULT_PRIORITY)); |
| MockWrite writes1[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| MockRead reads1[] = {CreateMockRead(resp, 1), CreateMockRead(body, 2), |
| MockRead(ASYNC, ERR_IO_PENDING, 3), |
| MockRead(ASYNC, 0, 4)}; |
| |
| SequencedSocketData data1(reads1, writes1); |
| helper.AddData(&data1); |
| |
| // WebSocket request opens a new connection with HTTP/2 disabled. |
| MockWrite writes2[] = { |
| MockWrite("GET / HTTP/1.1\r\n" |
| "Host: www.example.org\r\n" |
| "Connection: Upgrade\r\n" |
| "Upgrade: websocket\r\n" |
| "Origin: http://www.example.org\r\n" |
| "Sec-WebSocket-Version: 13\r\n" |
| "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" |
| "Sec-WebSocket-Extensions: permessage-deflate; " |
| "client_max_window_bits\r\n\r\n")}; |
| |
| MockRead reads2[] = { |
| MockRead("HTTP/1.1 101 Switching Protocols\r\n" |
| "Upgrade: websocket\r\n" |
| "Connection: Upgrade\r\n" |
| "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")}; |
| |
| StaticSocketDataProvider data2(reads2, writes2); |
| |
| auto ssl_provider2 = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| // Test that request has empty |alpn_protos|, that is, HTTP/2 is disabled. |
| ssl_provider2->next_protos_expected_in_ssl_config = NextProtoVector{}; |
| // Force socket to use HTTP/1.1, the default protocol without ALPN. |
| ssl_provider2->next_proto = kProtoHTTP11; |
| ssl_provider2->ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| helper.AddDataWithSSLSocketDataProvider(&data2, std::move(ssl_provider2)); |
| |
| TestCompletionCallback callback1; |
| HttpNetworkTransaction trans1(DEFAULT_PRIORITY, helper.session()); |
| int rv = trans1.Start(&request_, callback1.callback(), log_); |
| ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback1.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| |
| const HttpResponseInfo* response = trans1.GetResponseInfo(); |
| ASSERT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| |
| std::string response_data; |
| rv = ReadTransaction(&trans1, &response_data); |
| EXPECT_THAT(rv, IsOk()); |
| EXPECT_EQ("hello!", response_data); |
| |
| SpdySessionKey key(HostPortPair::FromURL(request_.url), ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| base::WeakPtr<SpdySession> spdy_session = |
| helper.session()->spdy_session_pool()->FindAvailableSession( |
| key, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ false, log_); |
| ASSERT_TRUE(spdy_session); |
| EXPECT_FALSE(spdy_session->support_websocket()); |
| |
| HttpRequestInfo request2; |
| request2.method = "GET"; |
| request2.url = GURL("wss://www.example.org/"); |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| EXPECT_TRUE(HostPortPair::FromURL(request_.url) |
| .Equals(HostPortPair::FromURL(request2.url))); |
| request2.extra_headers.SetHeader("Connection", "Upgrade"); |
| request2.extra_headers.SetHeader("Upgrade", "websocket"); |
| request2.extra_headers.SetHeader("Origin", "http://www.example.org"); |
| request2.extra_headers.SetHeader("Sec-WebSocket-Version", "13"); |
| |
| TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; |
| |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| trans2.SetWebSocketHandshakeStreamCreateHelper( |
| &websocket_stream_create_helper); |
| |
| TestCompletionCallback callback2; |
| rv = trans2.Start(&request2, callback2.callback(), log_); |
| ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback2.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| |
| // HTTP/2 connection is still open, but WebSocket request did not pool to it. |
| ASSERT_TRUE(spdy_session); |
| |
| data1.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| |
| // Server did not advertise WebSocket support. |
| histogram_tester.ExpectUniqueSample("Net.SpdySession.ServerSupportsWebSocket", |
| /* support_websocket = false */ 0, |
| /* expected_count = */ 1); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, WebSocketOverHTTP2) { |
| base::HistogramTester histogram_tester; |
| auto session_deps = std::make_unique<SpdySessionDependencies>(); |
| session_deps->enable_websocket_over_http2 = true; |
| NormalSpdyTransactionHelper helper(request_, HIGHEST, log_, |
| std::move(session_deps)); |
| helper.RunPreTestSetup(); |
| |
| spdy::SpdySerializedFrame req( |
| spdy_util_.ConstructSpdyGet(nullptr, 0, 1, HIGHEST)); |
| spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| |
| spdy::SpdyHeaderBlock websocket_request_headers; |
| websocket_request_headers[spdy::kHttp2MethodHeader] = "CONNECT"; |
| websocket_request_headers[spdy::kHttp2AuthorityHeader] = "www.example.org"; |
| websocket_request_headers[spdy::kHttp2SchemeHeader] = "https"; |
| websocket_request_headers[spdy::kHttp2PathHeader] = "/"; |
| websocket_request_headers[spdy::kHttp2ProtocolHeader] = "websocket"; |
| websocket_request_headers["origin"] = "http://www.example.org"; |
| websocket_request_headers["sec-websocket-version"] = "13"; |
| websocket_request_headers["sec-websocket-extensions"] = |
| "permessage-deflate; client_max_window_bits"; |
| spdy::SpdySerializedFrame websocket_request(spdy_util_.ConstructSpdyHeaders( |
| 3, std::move(websocket_request_headers), MEDIUM, false)); |
| |
| spdy::SpdySerializedFrame priority1( |
| spdy_util_.ConstructSpdyPriority(3, 0, MEDIUM, true)); |
| spdy::SpdySerializedFrame priority2( |
| spdy_util_.ConstructSpdyPriority(1, 3, LOWEST, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(req, 0), CreateMockWrite(settings_ack, 2), |
| CreateMockWrite(websocket_request, 4), CreateMockWrite(priority1, 5), |
| CreateMockWrite(priority2, 6)}; |
| |
| spdy::SettingsMap settings; |
| settings[spdy::SETTINGS_ENABLE_CONNECT_PROTOCOL] = 1; |
| spdy::SpdySerializedFrame settings_frame( |
| spdy_util_.ConstructSpdySettings(settings)); |
| spdy::SpdySerializedFrame resp1( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); |
| spdy::SpdySerializedFrame websocket_response( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); |
| MockRead reads[] = {CreateMockRead(settings_frame, 1), |
| CreateMockRead(resp1, 3), CreateMockRead(body1, 7), |
| CreateMockRead(websocket_response, 8), |
| MockRead(ASYNC, 0, 9)}; |
| |
| SequencedSocketData data(reads, writes); |
| helper.AddData(&data); |
| |
| TestCompletionCallback callback1; |
| int rv = helper.trans()->Start(&request_, callback1.callback(), log_); |
| ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Create HTTP/2 connection. |
| base::RunLoop().RunUntilIdle(); |
| |
| SpdySessionKey key(HostPortPair::FromURL(request_.url), ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED, SocketTag()); |
| base::WeakPtr<SpdySession> spdy_session = |
| helper.session()->spdy_session_pool()->FindAvailableSession( |
| key, /* enable_ip_based_pooling = */ true, |
| /* is_websocket = */ true, log_); |
| ASSERT_TRUE(spdy_session); |
| EXPECT_TRUE(spdy_session->support_websocket()); |
| |
| HttpRequestInfo request2; |
| request2.method = "GET"; |
| request2.url = GURL("wss://www.example.org/"); |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| EXPECT_TRUE(HostPortPair::FromURL(request_.url) |
| .Equals(HostPortPair::FromURL(request2.url))); |
| request2.extra_headers.SetHeader("Origin", "http://www.example.org"); |
| request2.extra_headers.SetHeader("Sec-WebSocket-Version", "13"); |
| // The following two headers must be removed by WebSocketHttp2HandshakeStream. |
| request2.extra_headers.SetHeader("Connection", "Upgrade"); |
| request2.extra_headers.SetHeader("Upgrade", "websocket"); |
| |
| TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; |
| |
| HttpNetworkTransaction trans2(MEDIUM, helper.session()); |
| trans2.SetWebSocketHandshakeStreamCreateHelper( |
| &websocket_stream_create_helper); |
| |
| TestCompletionCallback callback2; |
| rv = trans2.Start(&request2, callback2.callback(), log_); |
| ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Create WebSocket stream. |
| base::RunLoop().RunUntilIdle(); |
| ASSERT_TRUE(spdy_session); |
| |
| // First request has HIGHEST priority, WebSocket request has MEDIUM priority. |
| // Changing the priority of the first request to LOWEST changes their order, |
| // and therefore triggers sending PRIORITY frames. |
| helper.trans()->SetPriority(LOWEST); |
| |
| rv = callback1.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| |
| const HttpResponseInfo* response = helper.trans()->GetResponseInfo(); |
| ASSERT_TRUE(response->headers); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| |
| std::string response_data; |
| rv = ReadTransaction(helper.trans(), &response_data); |
| EXPECT_THAT(rv, IsOk()); |
| EXPECT_EQ("hello!", response_data); |
| |
| rv = callback2.WaitForResult(); |
| ASSERT_THAT(rv, IsOk()); |
| |
| helper.VerifyDataConsumed(); |
| |
| // Server advertised WebSocket support. |
| histogram_tester.ExpectUniqueSample("Net.SpdySession.ServerSupportsWebSocket", |
| /* support_websocket = true */ 1, |
| /* expected_count = */ 1); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, WebSocketNegotiatesHttp2) { |
| HttpRequestInfo request; |
| request.method = "GET"; |
| request.url = GURL("wss://www.example.org/"); |
| request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| EXPECT_TRUE(HostPortPair::FromURL(request_.url) |
| .Equals(HostPortPair::FromURL(request.url))); |
| request.extra_headers.SetHeader("Connection", "Upgrade"); |
| request.extra_headers.SetHeader("Upgrade", "websocket"); |
| request.extra_headers.SetHeader("Origin", "http://www.example.org"); |
| request.extra_headers.SetHeader("Sec-WebSocket-Version", "13"); |
| |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, nullptr); |
| helper.RunPreTestSetup(); |
| |
| StaticSocketDataProvider data; |
| |
| auto ssl_provider = std::make_unique<SSLSocketDataProvider>(ASYNC, OK); |
| // Test that request has empty |alpn_protos|, that is, HTTP/2 is disabled. |
| ssl_provider->next_protos_expected_in_ssl_config = NextProtoVector{}; |
| // Force socket to use HTTP/2, which should never happen (TLS implementation |
| // should fail TLS handshake if server chooses HTTP/2 without client |
| // advertising support). |
| ssl_provider->next_proto = kProtoHTTP2; |
| ssl_provider->ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| helper.AddDataWithSSLSocketDataProvider(&data, std::move(ssl_provider)); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; |
| trans->SetWebSocketHandshakeStreamCreateHelper( |
| &websocket_stream_create_helper); |
| |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request, callback.callback(), log_); |
| ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); |
| rv = callback.WaitForResult(); |
| ASSERT_THAT(rv, IsError(ERR_NOT_IMPLEMENTED)); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Plaintext WebSocket over HTTP/2 is not implemented, see |
| // https://crbug.com/684681. |
| TEST_F(SpdyNetworkTransactionTest, PlaintextWebSocketOverHttp2Proxy) { |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyConnect( |
| nullptr, 0, 1, LOWEST, HostPortPair("www.example.org", 80))); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = {CreateMockRead(resp, 1), MockRead(ASYNC, 0, 2)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| request_.url = GURL("ws://www.example.org/"); |
| auto session_deps = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixed("https://proxy:70", |
| TRAFFIC_ANNOTATION_FOR_TESTS)); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; |
| trans->SetWebSocketHandshakeStreamCreateHelper( |
| &websocket_stream_create_helper); |
| |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_NOT_IMPLEMENTED)); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Regression test for https://crbug.com/819101. Open two identical plaintext |
| // websocket requests over proxy. The HttpStreamFactory::Job for the second |
| // request should reuse the first connection. |
| TEST_F(SpdyNetworkTransactionTest, TwoWebSocketRequestsOverHttp2Proxy) { |
| spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyConnect( |
| nullptr, 0, 1, LOWEST, HostPortPair("www.example.org", 80))); |
| MockWrite writes[] = {CreateMockWrite(req, 0)}; |
| |
| spdy::SpdySerializedFrame resp( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = {CreateMockRead(resp, 1), |
| MockRead(ASYNC, ERR_IO_PENDING, 2), |
| MockRead(ASYNC, 0, 3)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| request_.url = GURL("ws://www.example.org/"); |
| auto session_deps = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixed("https://proxy:70", |
| TRAFFIC_ANNOTATION_FOR_TESTS)); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| HttpNetworkTransaction* trans1 = helper.trans(); |
| TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; |
| trans1->SetWebSocketHandshakeStreamCreateHelper( |
| &websocket_stream_create_helper); |
| |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_NOT_IMPLEMENTED)); |
| |
| HttpNetworkTransaction trans2(DEFAULT_PRIORITY, helper.session()); |
| trans2.SetWebSocketHandshakeStreamCreateHelper( |
| &websocket_stream_create_helper); |
| |
| TestCompletionCallback callback2; |
| int rv = trans2.Start(&request_, callback2.callback(), log_); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| rv = callback2.WaitForResult(); |
| EXPECT_THAT(rv, IsError(ERR_NOT_IMPLEMENTED)); |
| |
| data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| |
| helper.VerifyDataConsumed(); |
| } |
| |
| TEST_F(SpdyNetworkTransactionTest, SecureWebSocketOverHttp2Proxy) { |
| spdy::SpdySerializedFrame connect_request(spdy_util_.ConstructSpdyConnect( |
| nullptr, 0, 1, LOWEST, HostPortPair("www.example.org", 443))); |
| const char kWebSocketRequest[] = |
| "GET / HTTP/1.1\r\n" |
| "Host: www.example.org\r\n" |
| "Connection: Upgrade\r\n" |
| "Upgrade: websocket\r\n" |
| "Origin: http://www.example.org\r\n" |
| "Sec-WebSocket-Version: 13\r\n" |
| "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" |
| "Sec-WebSocket-Extensions: permessage-deflate; " |
| "client_max_window_bits\r\n\r\n"; |
| spdy::SpdySerializedFrame websocket_request( |
| spdy_util_.ConstructSpdyDataFrame(1, kWebSocketRequest, false)); |
| MockWrite writes[] = {CreateMockWrite(connect_request, 0), |
| CreateMockWrite(websocket_request, 2)}; |
| |
| spdy::SpdySerializedFrame connect_response( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| const char kWebSocketResponse[] = |
| "HTTP/1.1 101 Switching Protocols\r\n" |
| "Upgrade: websocket\r\n" |
| "Connection: Upgrade\r\n" |
| "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n"; |
| spdy::SpdySerializedFrame websocket_response( |
| spdy_util_.ConstructSpdyDataFrame(1, kWebSocketResponse, false)); |
| MockRead reads[] = {CreateMockRead(connect_response, 1), |
| CreateMockRead(websocket_response, 3), |
| MockRead(ASYNC, 0, 4)}; |
| |
| SequencedSocketData data(reads, writes); |
| |
| request_.url = GURL("wss://www.example.org/"); |
| request_.extra_headers.SetHeader("Connection", "Upgrade"); |
| request_.extra_headers.SetHeader("Upgrade", "websocket"); |
| request_.extra_headers.SetHeader("Origin", "http://www.example.org"); |
| request_.extra_headers.SetHeader("Sec-WebSocket-Version", "13"); |
| auto session_deps = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixed("https://proxy:70", |
| TRAFFIC_ANNOTATION_FOR_TESTS)); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| // Add SSL data for the tunneled connection. |
| SSLSocketDataProvider ssl_provider(ASYNC, OK); |
| ssl_provider.ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); |
| // A WebSocket request should not advertise HTTP/2 support. |
| ssl_provider.next_protos_expected_in_ssl_config = NextProtoVector{}; |
| // This test uses WebSocket over HTTP/1.1. |
| ssl_provider.next_proto = kProtoHTTP11; |
| helper.session_deps()->socket_factory->AddSSLSocketDataProvider( |
| &ssl_provider); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; |
| trans->SetWebSocketHandshakeStreamCreateHelper( |
| &websocket_stream_create_helper); |
| |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsOk()); |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| ASSERT_TRUE(response); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP1_1, |
| response->connection_info); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_FALSE(response->was_fetched_via_spdy); |
| EXPECT_EQ(70, response->socket_address.port()); |
| ASSERT_TRUE(response->headers); |
| EXPECT_EQ("HTTP/1.1 101 Switching Protocols", |
| response->headers->GetStatusLine()); |
| |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| // Regression test for https://crbug.com/828865. |
| TEST_F(SpdyNetworkTransactionTest, |
| SecureWebSocketOverHttp2ProxyNegotiatesHttp2) { |
| spdy::SpdySerializedFrame connect_request(spdy_util_.ConstructSpdyConnect( |
| nullptr, 0, 1, LOWEST, HostPortPair("www.example.org", 443))); |
| MockWrite writes[] = {CreateMockWrite(connect_request, 0)}; |
| spdy::SpdySerializedFrame connect_response( |
| spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); |
| MockRead reads[] = {CreateMockRead(connect_response, 1), |
| MockRead(ASYNC, 0, 2)}; |
| SequencedSocketData data(reads, writes); |
| |
| request_.url = GURL("wss://www.example.org/"); |
| request_.extra_headers.SetHeader("Connection", "Upgrade"); |
| request_.extra_headers.SetHeader("Upgrade", "websocket"); |
| request_.extra_headers.SetHeader("Origin", "http://www.example.org"); |
| request_.extra_headers.SetHeader("Sec-WebSocket-Version", "13"); |
| auto session_deps = std::make_unique<SpdySessionDependencies>( |
| ProxyResolutionService::CreateFixed("https://proxy:70", |
| TRAFFIC_ANNOTATION_FOR_TESTS)); |
| NormalSpdyTransactionHelper helper(request_, DEFAULT_PRIORITY, log_, |
| std::move(session_deps)); |
| helper.RunPreTestSetup(); |
| helper.AddData(&data); |
| |
| // Add SSL data for the tunneled connection. |
| SSLSocketDataProvider ssl_provider(ASYNC, OK); |
| ssl_provider.ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); |
| // A WebSocket request should not advertise HTTP/2 support. |
| ssl_provider.next_protos_expected_in_ssl_config = NextProtoVector{}; |
| // The server should not negotiate HTTP/2 over the tunnelled connection, |
| // but it must be handled gracefully if it does. |
| ssl_provider.next_proto = kProtoHTTP2; |
| helper.session_deps()->socket_factory->AddSSLSocketDataProvider( |
| &ssl_provider); |
| |
| HttpNetworkTransaction* trans = helper.trans(); |
| TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; |
| trans->SetWebSocketHandshakeStreamCreateHelper( |
| &websocket_stream_create_helper); |
| |
| EXPECT_TRUE(helper.StartDefaultTest()); |
| helper.WaitForCallbackToComplete(); |
| EXPECT_THAT(helper.output().rv, IsError(ERR_NOT_IMPLEMENTED)); |
| |
| base::RunLoop().RunUntilIdle(); |
| helper.VerifyDataConsumed(); |
| } |
| |
| #endif // BUILDFLAG(ENABLE_WEBSOCKETS) |
| |
| } // namespace net |