blob: 672b5aacc5d0ff5e6868c1255f7b36f0a1d0bb5b [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <algorithm>
#include <ostream>
#include <string>
#include <utility>
#include <vector>
#include "base/bind.h"
#include "base/compiler_specific.h"
#include "base/macros.h"
#include "base/run_loop.h"
#include "base/stl_util.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_piece.h"
#include "base/strings/stringprintf.h"
#include "base/test/metrics/histogram_tester.h"
#include "net/base/chunked_upload_data_stream.h"
#include "net/base/completion_once_callback.h"
#include "net/base/ip_endpoint.h"
#include "net/base/mock_network_change_notifier.h"
#include "net/base/test_completion_callback.h"
#include "net/base/test_proxy_delegate.h"
#include "net/cert/ct_policy_enforcer.h"
#include "net/cert/mock_cert_verifier.h"
#include "net/cert/multi_log_ct_verifier.h"
#include "net/dns/mock_host_resolver.h"
#include "net/http/http_auth_handler_factory.h"
#include "net/http/http_network_session.h"
#include "net/http/http_network_transaction.h"
#include "net/http/http_server_properties_impl.h"
#include "net/http/http_stream.h"
#include "net/http/http_stream_factory.h"
#include "net/http/http_transaction_test_util.h"
#include "net/http/transport_security_state.h"
#include "net/log/net_log_event_type.h"
#include "net/log/test_net_log.h"
#include "net/log/test_net_log_entry.h"
#include "net/log/test_net_log_util.h"
#include "net/proxy_resolution/proxy_config_service_fixed.h"
#include "net/proxy_resolution/proxy_resolution_service.h"
#include "net/proxy_resolution/proxy_resolver.h"
#include "net/quic/crypto/proof_verifier_chromium.h"
#include "net/quic/mock_crypto_client_stream_factory.h"
#include "net/quic/mock_quic_data.h"
#include "net/quic/quic_chromium_alarm_factory.h"
#include "net/quic/quic_http_stream.h"
#include "net/quic/quic_http_utils.h"
#include "net/quic/quic_stream_factory_peer.h"
#include "net/quic/quic_test_packet_maker.h"
#include "net/quic/test_task_runner.h"
#include "net/socket/client_socket_factory.h"
#include "net/socket/mock_client_socket_pool_manager.h"
#include "net/socket/next_proto.h"
#include "net/socket/socket_performance_watcher.h"
#include "net/socket/socket_performance_watcher_factory.h"
#include "net/socket/socket_test_util.h"
#include "net/spdy/spdy_test_util_common.h"
#include "net/ssl/ssl_config_service_defaults.h"
#include "net/test/cert_test_util.h"
#include "net/test/gtest_util.h"
#include "net/test/test_data_directory.h"
#include "net/test/test_with_scoped_task_environment.h"
#include "net/third_party/quic/core/crypto/quic_decrypter.h"
#include "net/third_party/quic/core/crypto/quic_encrypter.h"
#include "net/third_party/quic/core/quic_framer.h"
#include "net/third_party/quic/core/quic_utils.h"
#include "net/third_party/quic/platform/api/quic_str_cat.h"
#include "net/third_party/quic/platform/api/quic_string_piece.h"
#include "net/third_party/quic/platform/api/quic_test.h"
#include "net/third_party/quic/test_tools/crypto_test_utils.h"
#include "net/third_party/quic/test_tools/mock_clock.h"
#include "net/third_party/quic/test_tools/mock_random.h"
#include "net/third_party/quic/test_tools/quic_spdy_session_peer.h"
#include "net/third_party/quic/test_tools/quic_test_utils.h"
#include "net/third_party/quiche/src/spdy/core/spdy_frame_builder.h"
#include "net/third_party/quiche/src/spdy/core/spdy_framer.h"
#include "net/traffic_annotation/network_traffic_annotation_test_helper.h"
#include "net/url_request/url_request.h"
#include "net/url_request/url_request_job_factory_impl.h"
#include "net/url_request/url_request_test_util.h"
#include "starboard/string.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "testing/platform_test.h"
#include "url/gurl.h"
using ::testing::ElementsAre;
using ::testing::Key;
namespace net {
namespace test {
namespace {
enum DestinationType {
// In pooling tests with two requests for different origins to the same
// destination, the destination should be
SAME_AS_FIRST, // the same as the first origin,
SAME_AS_SECOND, // the same as the second origin, or
DIFFERENT, // different from both.
};
static const char kQuicAlternativeServiceHeader[] =
"Alt-Svc: quic=\":443\"\r\n\r\n";
static const char kQuicAlternativeServiceWithProbabilityHeader[] =
"Alt-Svc: quic=\":443\";p=\".5\"\r\n\r\n";
static const char kQuicAlternativeServiceDifferentPortHeader[] =
"Alt-Svc: quic=\":137\"\r\n\r\n";
const char kDefaultServerHostName[] = "mail.example.org";
const char kDifferentHostname[] = "different.example.com";
// Run QuicNetworkTransactionWithDestinationTest instances with all value
// combinations of version and destination_type.
struct PoolingTestParams {
friend std::ostream& operator<<(std::ostream& os,
const PoolingTestParams& p) {
os << "{ version: " << QuicVersionToString(p.version)
<< ", destination_type: ";
switch (p.destination_type) {
case SAME_AS_FIRST:
os << "SAME_AS_FIRST";
break;
case SAME_AS_SECOND:
os << "SAME_AS_SECOND";
break;
case DIFFERENT:
os << "DIFFERENT";
break;
}
os << ", client_headers_include_h2_stream_dependency: "
<< p.client_headers_include_h2_stream_dependency;
os << " }";
return os;
}
quic::QuicTransportVersion version;
DestinationType destination_type;
bool client_headers_include_h2_stream_dependency;
};
std::string GenerateQuicVersionsListForAltSvcHeader(
const quic::QuicTransportVersionVector& versions) {
std::string result = "";
for (const quic::QuicTransportVersion& version : versions) {
if (!result.empty())
result.append(",");
result.append(base::NumberToString(version));
}
return result;
}
std::vector<PoolingTestParams> GetPoolingTestParams() {
std::vector<PoolingTestParams> params;
quic::QuicTransportVersionVector all_supported_versions =
quic::AllSupportedTransportVersions();
for (const quic::QuicTransportVersion version : all_supported_versions) {
params.push_back(PoolingTestParams{version, SAME_AS_FIRST, false});
params.push_back(PoolingTestParams{version, SAME_AS_FIRST, true});
params.push_back(PoolingTestParams{version, SAME_AS_SECOND, false});
params.push_back(PoolingTestParams{version, SAME_AS_SECOND, true});
params.push_back(PoolingTestParams{version, DIFFERENT, false});
params.push_back(PoolingTestParams{version, DIFFERENT, true});
}
return params;
}
} // namespace
class HeadersHandler {
public:
HeadersHandler() : was_proxied_(false) {}
bool was_proxied() { return was_proxied_; }
void OnBeforeHeadersSent(const ProxyInfo& proxy_info,
HttpRequestHeaders* request_headers) {
if (!proxy_info.is_http() && !proxy_info.is_https() &&
!proxy_info.is_quic()) {
return;
}
was_proxied_ = true;
}
private:
bool was_proxied_;
};
class TestSocketPerformanceWatcher : public SocketPerformanceWatcher {
public:
TestSocketPerformanceWatcher(bool* should_notify_updated_rtt,
bool* rtt_notification_received)
: should_notify_updated_rtt_(should_notify_updated_rtt),
rtt_notification_received_(rtt_notification_received) {}
~TestSocketPerformanceWatcher() override {}
bool ShouldNotifyUpdatedRTT() const override {
return *should_notify_updated_rtt_;
}
void OnUpdatedRTTAvailable(const base::TimeDelta& rtt) override {
*rtt_notification_received_ = true;
}
void OnConnectionChanged() override {}
private:
bool* should_notify_updated_rtt_;
bool* rtt_notification_received_;
DISALLOW_COPY_AND_ASSIGN(TestSocketPerformanceWatcher);
};
class TestSocketPerformanceWatcherFactory
: public SocketPerformanceWatcherFactory {
public:
TestSocketPerformanceWatcherFactory()
: watcher_count_(0u),
should_notify_updated_rtt_(true),
rtt_notification_received_(false) {}
~TestSocketPerformanceWatcherFactory() override {}
// SocketPerformanceWatcherFactory implementation:
std::unique_ptr<SocketPerformanceWatcher> CreateSocketPerformanceWatcher(
const Protocol protocol,
const AddressList& /* address_list */) override {
if (protocol != PROTOCOL_QUIC) {
return nullptr;
}
++watcher_count_;
return std::unique_ptr<SocketPerformanceWatcher>(
new TestSocketPerformanceWatcher(&should_notify_updated_rtt_,
&rtt_notification_received_));
}
size_t watcher_count() const { return watcher_count_; }
bool rtt_notification_received() const { return rtt_notification_received_; }
void set_should_notify_updated_rtt(bool should_notify_updated_rtt) {
should_notify_updated_rtt_ = should_notify_updated_rtt;
}
private:
size_t watcher_count_;
bool should_notify_updated_rtt_;
bool rtt_notification_received_;
DISALLOW_COPY_AND_ASSIGN(TestSocketPerformanceWatcherFactory);
};
class QuicNetworkTransactionTest
: public PlatformTest,
public ::testing::WithParamInterface<
std::tuple<quic::QuicTransportVersion, bool>>,
public WithScopedTaskEnvironment {
protected:
QuicNetworkTransactionTest()
: version_(std::get<0>(GetParam())),
client_headers_include_h2_stream_dependency_(std::get<1>(GetParam())),
supported_versions_(quic::test::SupportedTransportVersions(version_)),
random_generator_(0),
client_maker_(
version_,
quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_,
kDefaultServerHostName,
quic::Perspective::IS_CLIENT,
client_headers_include_h2_stream_dependency_),
server_maker_(
version_,
quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_,
kDefaultServerHostName,
quic::Perspective::IS_SERVER,
false),
cert_transparency_verifier_(new MultiLogCTVerifier()),
ssl_config_service_(new SSLConfigServiceDefaults),
proxy_resolution_service_(ProxyResolutionService::CreateDirect()),
#if defined(COBALT_QUIC46)
// m70 code.
auth_handler_factory_(
HttpAuthHandlerFactory::CreateDefault(nullptr)),
#else
auth_handler_factory_(HttpAuthHandlerFactory::CreateDefault()),
#endif
ssl_data_(ASYNC, OK) {
request_.method = "GET";
std::string url("https://");
url.append(kDefaultServerHostName);
request_.url = GURL(url);
request_.load_flags = 0;
request_.traffic_annotation =
net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
clock_.AdvanceTime(quic::QuicTime::Delta::FromMilliseconds(20));
scoped_refptr<X509Certificate> cert(
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"));
verify_details_.cert_verify_result.verified_cert = cert;
verify_details_.cert_verify_result.is_issued_by_known_root = true;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_);
}
void SetUp() override {
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
}
void TearDown() override {
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
// Empty the current queue.
base::RunLoop().RunUntilIdle();
PlatformTest::TearDown();
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
session_.reset();
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientConnectionClosePacket(uint64_t num) {
return client_maker_.MakeConnectionClosePacket(
num, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!");
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructServerConnectionClosePacket(uint64_t num) {
return server_maker_.MakeConnectionClosePacket(
num, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!");
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerGoAwayPacket(
uint64_t num,
quic::QuicErrorCode error_code,
std::string reason_phrase) {
return server_maker_.MakeGoAwayPacket(num, error_code, reason_phrase);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckPacket(
uint64_t packet_number,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked) {
return client_maker_.MakeAckPacket(packet_number, largest_received,
smallest_received, least_unacked, true);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckPacket(
uint64_t packet_number,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked,
quic::QuicTime::Delta ack_delay_time) {
return client_maker_.MakeAckPacket(packet_number, largest_received,
smallest_received, least_unacked, true,
ack_delay_time);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckAndRstPacket(
uint64_t num,
quic::QuicStreamId stream_id,
quic::QuicRstStreamErrorCode error_code,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked) {
return client_maker_.MakeAckAndRstPacket(
num, false, stream_id, error_code, largest_received, smallest_received,
least_unacked, true);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientRstPacket(
uint64_t num,
quic::QuicStreamId stream_id,
quic::QuicRstStreamErrorCode error_code,
size_t bytes_written) {
return client_maker_.MakeRstPacket(num, false, stream_id, error_code,
bytes_written,
/*include_stop_sending_if_v99=*/true);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientAckAndConnectionClosePacket(uint64_t packet_number,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked) {
return client_maker_.MakeAckPacket(packet_number, largest_received,
smallest_received, least_unacked, true);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientAckAndConnectionClosePacket(
uint64_t num,
quic::QuicTime::Delta delta_time_largest_observed,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked,
quic::QuicErrorCode quic_error,
const std::string& quic_error_details) {
return client_maker_.MakeAckAndConnectionClosePacket(
num, false, delta_time_largest_observed, largest_received,
smallest_received, least_unacked, quic_error, quic_error_details);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerRstPacket(
uint64_t num,
bool include_version,
quic::QuicStreamId stream_id,
quic::QuicRstStreamErrorCode error_code) {
return server_maker_.MakeRstPacket(num, include_version, stream_id,
error_code);
}
std::unique_ptr<quic::QuicReceivedPacket> ConstructInitialSettingsPacket(
uint64_t packet_number,
quic::QuicStreamOffset* offset) {
return client_maker_.MakeInitialSettingsPacket(packet_number, offset);
}
std::unique_ptr<quic::QuicReceivedPacket> ConstructServerAckPacket(
uint64_t packet_number,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked) {
return server_maker_.MakeAckPacket(packet_number, largest_received,
smallest_received, least_unacked, false);
}
std::unique_ptr<quic::QuicReceivedPacket> ConstructClientPriorityPacket(
uint64_t packet_number,
bool should_include_version,
quic::QuicStreamId id,
quic::QuicStreamId parent_stream_id,
RequestPriority request_priority,
quic::QuicStreamOffset* offset) {
return client_maker_.MakePriorityPacket(
packet_number, should_include_version, id, parent_stream_id,
ConvertRequestPriorityToQuicPriority(request_priority), offset);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientAckAndPriorityFramesPacket(
uint64_t packet_number,
bool should_include_version,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked,
const std::vector<QuicTestPacketMaker::Http2StreamDependency>&
priority_frames,
quic::QuicStreamOffset* offset) {
return client_maker_.MakeAckAndMultiplePriorityFramesPacket(
packet_number, should_include_version, largest_received,
smallest_received, least_unacked, priority_frames, offset);
}
// Uses default QuicTestPacketMaker.
spdy::SpdyHeaderBlock GetRequestHeaders(const std::string& method,
const std::string& scheme,
const std::string& path) {
return GetRequestHeaders(method, scheme, path, &client_maker_);
}
// Uses customized QuicTestPacketMaker.
spdy::SpdyHeaderBlock GetRequestHeaders(const std::string& method,
const std::string& scheme,
const std::string& path,
QuicTestPacketMaker* maker) {
return maker->GetRequestHeaders(method, scheme, path);
}
spdy::SpdyHeaderBlock ConnectRequestHeaders(const std::string& host_port) {
return client_maker_.ConnectRequestHeaders(host_port);
}
spdy::SpdyHeaderBlock GetResponseHeaders(const std::string& status) {
return server_maker_.GetResponseHeaders(status);
}
// Appends alt_svc headers in the response headers.
spdy::SpdyHeaderBlock GetResponseHeaders(const std::string& status,
const std::string& alt_svc) {
return server_maker_.GetResponseHeaders(status, alt_svc);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerDataPacket(
uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
quic::QuicStreamOffset offset,
quic::QuicStringPiece data) {
return server_maker_.MakeDataPacket(
packet_number, stream_id, should_include_version, fin, offset, data);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientDataPacket(
uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
quic::QuicStreamOffset offset,
quic::QuicStringPiece data) {
return client_maker_.MakeDataPacket(
packet_number, stream_id, should_include_version, fin, offset, data);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientMultipleDataFramesPacket(
uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
quic::QuicStreamOffset offset,
const std::vector<std::string> data_writes) {
return client_maker_.MakeMultipleDataFramesPacket(packet_number, stream_id,
should_include_version,
fin, offset, data_writes);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckAndDataPacket(
uint64_t packet_number,
bool include_version,
quic::QuicStreamId stream_id,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked,
bool fin,
quic::QuicStreamOffset offset,
quic::QuicStringPiece data) {
return client_maker_.MakeAckAndDataPacket(
packet_number, include_version, stream_id, largest_received,
smallest_received, least_unacked, fin, offset, data);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientAckAndMultipleDataFramesPacket(
uint64_t packet_number,
bool include_version,
quic::QuicStreamId stream_id,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked,
bool fin,
quic::QuicStreamOffset offset,
const std::vector<std::string> data_writes) {
return client_maker_.MakeAckAndMultipleDataFramesPacket(
packet_number, include_version, stream_id, largest_received,
smallest_received, least_unacked, fin, offset, data_writes);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientForceHolDataPacket(
uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
quic::QuicStreamOffset* offset,
quic::QuicStringPiece data) {
return client_maker_.MakeForceHolDataPacket(
packet_number, stream_id, should_include_version, fin, offset, data);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientRequestHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
spdy::SpdyHeaderBlock headers) {
return ConstructClientRequestHeadersPacket(packet_number, stream_id,
should_include_version, fin,
std::move(headers), nullptr);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientRequestHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
spdy::SpdyHeaderBlock headers,
quic::QuicStreamOffset* offset) {
return ConstructClientRequestHeadersPacket(packet_number, stream_id,
should_include_version, fin,
std::move(headers), 0, offset);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientRequestHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
spdy::SpdyHeaderBlock headers,
quic::QuicStreamId parent_stream_id,
quic::QuicStreamOffset* offset) {
return ConstructClientRequestHeadersPacket(
packet_number, stream_id, should_include_version, fin, DEFAULT_PRIORITY,
std::move(headers), parent_stream_id, offset);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientRequestHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
RequestPriority request_priority,
spdy::SpdyHeaderBlock headers,
quic::QuicStreamId parent_stream_id,
quic::QuicStreamOffset* offset) {
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(request_priority);
return client_maker_.MakeRequestHeadersPacketWithOffsetTracking(
packet_number, stream_id, should_include_version, fin, priority,
std::move(headers), parent_stream_id, offset);
}
std::unique_ptr<quic::QuicReceivedPacket>
ConstructClientRequestHeadersAndDataFramesPacket(
uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
RequestPriority request_priority,
spdy::SpdyHeaderBlock headers,
quic::QuicStreamId parent_stream_id,
quic::QuicStreamOffset* offset,
size_t* spdy_headers_frame_length,
const std::vector<std::string>& data_writes) {
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(request_priority);
return client_maker_.MakeRequestHeadersAndMultipleDataFramesPacket(
packet_number, stream_id, should_include_version, fin, priority,
std::move(headers), parent_stream_id, offset, spdy_headers_frame_length,
data_writes);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientMultipleDataFramesPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
const std::vector<std::string>& data,
quic::QuicStreamOffset offset) {
return client_maker_.MakeMultipleDataFramesPacket(
packet_number, stream_id, should_include_version, fin, offset, data);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerPushPromisePacket(
uint64_t packet_number,
quic::QuicStreamId stream_id,
quic::QuicStreamId promised_stream_id,
bool should_include_version,
spdy::SpdyHeaderBlock headers,
quic::QuicStreamOffset* offset,
QuicTestPacketMaker* maker) {
return maker->MakePushPromisePacket(
packet_number, stream_id, promised_stream_id, should_include_version,
false, std::move(headers), nullptr, offset);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructServerResponseHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
spdy::SpdyHeaderBlock headers) {
return ConstructServerResponseHeadersPacket(packet_number, stream_id,
should_include_version, fin,
std::move(headers), nullptr);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructServerResponseHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
bool fin,
spdy::SpdyHeaderBlock headers,
quic::QuicStreamOffset* offset) {
return server_maker_.MakeResponseHeadersPacketWithOffsetTracking(
packet_number, stream_id, should_include_version, fin,
std::move(headers), offset);
}
quic::QuicString ConstructDataHeader(size_t body_len) {
if (version_ != quic::QUIC_VERSION_99) {
return "";
}
quic::HttpEncoder encoder;
std::unique_ptr<char[]> buffer;
auto header_length = encoder.SerializeDataFrameHeader(body_len, &buffer);
return quic::QuicString(buffer.get(), header_length);
}
void CreateSession(
const quic::QuicTransportVersionVector& supported_versions) {
session_params_.enable_quic = true;
session_params_.quic_supported_versions = supported_versions;
session_params_.quic_headers_include_h2_stream_dependency =
client_headers_include_h2_stream_dependency_;
session_context_.quic_clock = &clock_;
session_context_.quic_random = &random_generator_;
session_context_.client_socket_factory = &socket_factory_;
session_context_.quic_crypto_client_stream_factory =
&crypto_client_stream_factory_;
session_context_.host_resolver = &host_resolver_;
session_context_.cert_verifier = &cert_verifier_;
session_context_.transport_security_state = &transport_security_state_;
session_context_.cert_transparency_verifier =
cert_transparency_verifier_.get();
session_context_.ct_policy_enforcer = &ct_policy_enforcer_;
session_context_.socket_performance_watcher_factory =
&test_socket_performance_watcher_factory_;
session_context_.proxy_resolution_service = proxy_resolution_service_.get();
session_context_.ssl_config_service = ssl_config_service_.get();
session_context_.http_auth_handler_factory = auth_handler_factory_.get();
session_context_.http_server_properties = &http_server_properties_;
session_context_.net_log = net_log_.bound().net_log();
session_.reset(new HttpNetworkSession(session_params_, session_context_));
session_->quic_stream_factory()->set_require_confirmation(false);
SpdySessionPoolPeer spdy_pool_peer(session_->spdy_session_pool());
spdy_pool_peer.SetEnableSendingInitialData(false);
}
void CreateSession() { return CreateSession(supported_versions_); }
void CheckWasQuicResponse(HttpNetworkTransaction* trans) {
const HttpResponseInfo* response = trans->GetResponseInfo();
ASSERT_TRUE(response != nullptr);
ASSERT_TRUE(response->headers.get() != nullptr);
EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
EXPECT_TRUE(response->was_fetched_via_spdy);
EXPECT_TRUE(response->was_alpn_negotiated);
EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_),
response->connection_info);
}
void CheckResponsePort(HttpNetworkTransaction* trans, uint16_t port) {
const HttpResponseInfo* response = trans->GetResponseInfo();
ASSERT_TRUE(response != nullptr);
#if defined(COBALT_QUIC46)
EXPECT_EQ(port, response->socket_address.port());
#else
EXPECT_EQ(port, response->remote_endpoint.port());
#endif
}
void CheckWasHttpResponse(HttpNetworkTransaction* trans) {
const HttpResponseInfo* response = trans->GetResponseInfo();
ASSERT_TRUE(response != nullptr);
ASSERT_TRUE(response->headers.get() != nullptr);
EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
EXPECT_FALSE(response->was_fetched_via_spdy);
EXPECT_FALSE(response->was_alpn_negotiated);
EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP1_1,
response->connection_info);
}
void CheckWasSpdyResponse(HttpNetworkTransaction* trans) {
const HttpResponseInfo* response = trans->GetResponseInfo();
ASSERT_TRUE(response != nullptr);
ASSERT_TRUE(response->headers.get() != nullptr);
EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
EXPECT_TRUE(response->was_fetched_via_spdy);
EXPECT_TRUE(response->was_alpn_negotiated);
EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2,
response->connection_info);
}
void CheckResponseData(HttpNetworkTransaction* trans,
const std::string& expected) {
std::string response_data;
ASSERT_THAT(ReadTransaction(trans, &response_data), IsOk());
EXPECT_EQ(expected, response_data);
}
void RunTransaction(HttpNetworkTransaction* trans) {
TestCompletionCallback callback;
int rv = trans->Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
EXPECT_THAT(callback.WaitForResult(), IsOk());
}
void SendRequestAndExpectHttpResponse(const std::string& expected) {
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
RunTransaction(&trans);
CheckWasHttpResponse(&trans);
CheckResponseData(&trans, expected);
}
void SendRequestAndExpectHttpResponseFromProxy(const std::string& expected,
bool used_proxy,
uint16_t port) {
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::Bind(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
RunTransaction(&trans);
CheckWasHttpResponse(&trans);
CheckResponsePort(&trans, port);
CheckResponseData(&trans, expected);
EXPECT_EQ(used_proxy, headers_handler.was_proxied());
if (used_proxy) {
EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_https());
} else {
EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_direct());
}
}
void SendRequestAndExpectQuicResponse(const std::string& expected) {
SendRequestAndExpectQuicResponseMaybeFromProxy(expected, false, 443);
}
void SendRequestAndExpectQuicResponseFromProxyOnPort(
const std::string& expected,
uint16_t port) {
SendRequestAndExpectQuicResponseMaybeFromProxy(expected, true, port);
}
void AddQuicAlternateProtocolMapping(
MockCryptoClientStream::HandshakeMode handshake_mode) {
crypto_client_stream_factory_.set_handshake_mode(handshake_mode);
url::SchemeHostPort server(request_.url);
AlternativeService alternative_service(kProtoQUIC, server.host(), 443);
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
http_server_properties_.SetQuicAlternativeService(
server, alternative_service, expiration, supported_versions_);
}
void AddQuicRemoteAlternativeServiceMapping(
MockCryptoClientStream::HandshakeMode handshake_mode,
const HostPortPair& alternative) {
crypto_client_stream_factory_.set_handshake_mode(handshake_mode);
url::SchemeHostPort server(request_.url);
AlternativeService alternative_service(kProtoQUIC, alternative.host(),
alternative.port());
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
http_server_properties_.SetQuicAlternativeService(
server, alternative_service, expiration, supported_versions_);
}
void ExpectBrokenAlternateProtocolMapping() {
const url::SchemeHostPort server(request_.url);
const AlternativeServiceInfoVector alternative_service_info_vector =
http_server_properties_.GetAlternativeServiceInfos(server);
EXPECT_EQ(1u, alternative_service_info_vector.size());
EXPECT_TRUE(http_server_properties_.IsAlternativeServiceBroken(
alternative_service_info_vector[0].alternative_service()));
}
void ExpectQuicAlternateProtocolMapping() {
const url::SchemeHostPort server(request_.url);
const AlternativeServiceInfoVector alternative_service_info_vector =
http_server_properties_.GetAlternativeServiceInfos(server);
EXPECT_EQ(1u, alternative_service_info_vector.size());
EXPECT_EQ(
kProtoQUIC,
alternative_service_info_vector[0].alternative_service().protocol);
EXPECT_FALSE(http_server_properties_.IsAlternativeServiceBroken(
alternative_service_info_vector[0].alternative_service()));
}
void AddHangingNonAlternateProtocolSocketData() {
std::unique_ptr<StaticSocketDataProvider> hanging_data;
hanging_data.reset(new StaticSocketDataProvider());
MockConnect hanging_connect(SYNCHRONOUS, ERR_IO_PENDING);
hanging_data->set_connect_data(hanging_connect);
hanging_data_.push_back(std::move(hanging_data));
socket_factory_.AddSocketDataProvider(hanging_data_.back().get());
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
}
void SetUpTestForRetryConnectionOnAlternateNetwork() {
session_params_.quic_migrate_sessions_on_network_change_v2 = true;
session_params_.quic_migrate_sessions_early_v2 = true;
session_params_.quic_retry_on_alternate_network_before_handshake = true;
scoped_mock_change_notifier_.reset(new ScopedMockNetworkChangeNotifier());
MockNetworkChangeNotifier* mock_ncn =
scoped_mock_change_notifier_->mock_network_change_notifier();
mock_ncn->ForceNetworkHandlesSupported();
mock_ncn->SetConnectedNetworksList(
{kDefaultNetworkForTests, kNewNetworkForTests});
}
// Fetches two non-cryptographic URL requests via a HTTPS proxy with a QUIC
// alternative proxy. Verifies that if the alternative proxy job returns
// |error_code|, the request is fetched successfully by the main job.
void TestAlternativeProxy(int error_code) {
// Use a non-cryptographic scheme for the request URL since this request
// will be fetched via proxy with QUIC as the alternative service.
request_.url = GURL("http://example.org/");
// Data for the alternative proxy server job.
MockWrite quic_writes[] = {MockWrite(SYNCHRONOUS, error_code, 1)};
MockRead quic_reads[] = {
MockRead(SYNCHRONOUS, error_code, 0),
};
SequencedSocketData quic_data(quic_reads, quic_writes);
socket_factory_.AddSocketDataProvider(&quic_data);
// Main job succeeds and the alternative job fails.
// Add data for two requests that will be read by the main job.
MockRead http_reads_1[] = {
MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
MockRead http_reads_2[] = {
MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data_1(http_reads_1, base::span<MockWrite>());
StaticSocketDataProvider http_data_2(http_reads_2, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data_1);
socket_factory_.AddSocketDataProvider(&http_data_2);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
TestProxyDelegate test_proxy_delegate;
// Proxy URL is different from the request URL.
test_proxy_delegate.set_alternative_proxy_server(
ProxyServer::FromPacString("QUIC myproxy.org:443"));
proxy_resolution_service_ =
ProxyResolutionService::CreateFixedFromPacResult(
"HTTPS myproxy.org:443", TRAFFIC_ANNOTATION_FOR_TESTS);
proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate);
CreateSession();
EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_valid());
// The first request should be fetched via the HTTPS proxy.
SendRequestAndExpectHttpResponseFromProxy("hello from http", true, 443);
// Since the main job succeeded only the alternative proxy server should be
// marked as bad.
EXPECT_THAT(session_->proxy_resolution_service()->proxy_retry_info(),
ElementsAre(Key("quic://myproxy.org:443")));
// Verify that the second request completes successfully, and the
// alternative proxy server job is not started.
SendRequestAndExpectHttpResponseFromProxy("hello from http", true, 443);
}
quic::QuicStreamId GetNthClientInitiatedBidirectionalStreamId(int n) {
return quic::test::GetNthClientInitiatedBidirectionalStreamId(version_, n);
}
quic::QuicStreamId GetNthServerInitiatedUnidirectionalStreamId(int n) {
return quic::test::GetNthServerInitiatedUnidirectionalStreamId(version_, n);
}
static void AddCertificate(SSLSocketDataProvider* ssl_data) {
ssl_data->ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
ASSERT_TRUE(ssl_data->ssl_info.cert);
}
const quic::QuicTransportVersion version_;
const bool client_headers_include_h2_stream_dependency_;
quic::QuicTransportVersionVector supported_versions_;
QuicFlagSaver flags_; // Save/restore all QUIC flag values.
quic::MockClock clock_;
quic::test::MockRandom random_generator_;
QuicTestPacketMaker client_maker_;
QuicTestPacketMaker server_maker_;
std::unique_ptr<HttpNetworkSession> session_;
MockClientSocketFactory socket_factory_;
ProofVerifyDetailsChromium verify_details_;
MockCryptoClientStreamFactory crypto_client_stream_factory_;
MockHostResolver host_resolver_;
MockCertVerifier cert_verifier_;
TransportSecurityState transport_security_state_;
std::unique_ptr<CTVerifier> cert_transparency_verifier_;
DefaultCTPolicyEnforcer ct_policy_enforcer_;
TestSocketPerformanceWatcherFactory test_socket_performance_watcher_factory_;
std::unique_ptr<SSLConfigServiceDefaults> ssl_config_service_;
std::unique_ptr<ProxyResolutionService> proxy_resolution_service_;
std::unique_ptr<HttpAuthHandlerFactory> auth_handler_factory_;
HttpServerPropertiesImpl http_server_properties_;
HttpNetworkSession::Params session_params_;
HttpNetworkSession::Context session_context_;
HttpRequestInfo request_;
BoundTestNetLog net_log_;
std::vector<std::unique_ptr<StaticSocketDataProvider>> hanging_data_;
SSLSocketDataProvider ssl_data_;
std::unique_ptr<ScopedMockNetworkChangeNotifier> scoped_mock_change_notifier_;
private:
void SendRequestAndExpectQuicResponseMaybeFromProxy(
const std::string& expected,
bool used_proxy,
uint16_t port) {
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::Bind(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
RunTransaction(&trans);
CheckWasQuicResponse(&trans);
CheckResponsePort(&trans, port);
CheckResponseData(&trans, expected);
EXPECT_EQ(used_proxy, headers_handler.was_proxied());
if (used_proxy) {
EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic());
} else {
EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_direct());
}
}
};
INSTANTIATE_TEST_SUITE_P(
VersionIncludeStreamDependencySequence,
QuicNetworkTransactionTest,
::testing::Combine(
::testing::ValuesIn(quic::AllSupportedTransportVersions()),
::testing::Bool()));
TEST_P(QuicNetworkTransactionTest, WriteErrorHandshakeConfirmed) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
base::HistogramTester histograms;
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
crypto_client_stream_factory_.set_handshake_mode(
MockCryptoClientStream::CONFIRM_HANDSHAKE);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(SYNCHRONOUS, ERR_INTERNET_DISCONNECTED);
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // Pause
mock_quic_data.AddRead(ASYNC, OK); // No more data to read
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
histograms.ExpectBucketCount("Net.QuicSession.WriteError",
-ERR_INTERNET_DISCONNECTED, 1);
histograms.ExpectBucketCount("Net.QuicSession.WriteError.HandshakeConfirmed",
-ERR_INTERNET_DISCONNECTED, 1);
}
TEST_P(QuicNetworkTransactionTest, WriteErrorHandshakeConfirmedAsync) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
base::HistogramTester histograms;
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
crypto_client_stream_factory_.set_handshake_mode(
MockCryptoClientStream::CONFIRM_HANDSHAKE);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(ASYNC, ERR_INTERNET_DISCONNECTED);
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // Pause
mock_quic_data.AddRead(ASYNC, OK); // No more data to read
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
histograms.ExpectBucketCount("Net.QuicSession.WriteError",
-ERR_INTERNET_DISCONNECTED, 1);
histograms.ExpectBucketCount("Net.QuicSession.WriteError.HandshakeConfirmed",
-ERR_INTERNET_DISCONNECTED, 1);
}
TEST_P(QuicNetworkTransactionTest, SocketWatcherEnabled) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
test_socket_performance_watcher_factory_.set_should_notify_updated_rtt(true);
EXPECT_FALSE(
test_socket_performance_watcher_factory_.rtt_notification_received());
SendRequestAndExpectQuicResponse("hello!");
EXPECT_TRUE(
test_socket_performance_watcher_factory_.rtt_notification_received());
}
TEST_P(QuicNetworkTransactionTest, SocketWatcherDisabled) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
test_socket_performance_watcher_factory_.set_should_notify_updated_rtt(false);
EXPECT_FALSE(
test_socket_performance_watcher_factory_.rtt_notification_received());
SendRequestAndExpectQuicResponse("hello!");
EXPECT_FALSE(
test_socket_performance_watcher_factory_.rtt_notification_received());
}
TEST_P(QuicNetworkTransactionTest, ForceQuic) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
SendRequestAndExpectQuicResponse("hello!");
// Check that the NetLog was filled reasonably.
TestNetLogEntry::List entries;
net_log_.GetEntries(&entries);
EXPECT_LT(0u, entries.size());
// Check that we logged a QUIC_SESSION_PACKET_RECEIVED.
int pos = ExpectLogContainsSomewhere(
entries, 0, NetLogEventType::QUIC_SESSION_PACKET_RECEIVED,
NetLogEventPhase::NONE);
EXPECT_LT(0, pos);
// ... and also a TYPE_QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED.
pos = ExpectLogContainsSomewhere(
entries, 0,
NetLogEventType::QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED,
NetLogEventPhase::NONE);
EXPECT_LT(0, pos);
int packet_number;
ASSERT_TRUE(entries[pos].GetIntegerValue("packet_number", &packet_number));
EXPECT_EQ(1, packet_number);
// ... and also a TYPE_QUIC_SESSION_PACKET_AUTHENTICATED.
pos = ExpectLogContainsSomewhere(
entries, 0, NetLogEventType::QUIC_SESSION_PACKET_AUTHENTICATED,
NetLogEventPhase::NONE);
EXPECT_LT(0, pos);
// ... and also a QUIC_SESSION_STREAM_FRAME_RECEIVED.
pos = ExpectLogContainsSomewhere(
entries, 0, NetLogEventType::QUIC_SESSION_STREAM_FRAME_RECEIVED,
NetLogEventPhase::NONE);
EXPECT_LT(0, pos);
int log_stream_id;
ASSERT_TRUE(entries[pos].GetIntegerValue("stream_id", &log_stream_id));
EXPECT_EQ(quic::QuicUtils::GetHeadersStreamId(version_),
static_cast<quic::QuicStreamId>(log_stream_id));
}
TEST_P(QuicNetworkTransactionTest, LargeResponseHeaders) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
spdy::SpdyHeaderBlock response_headers = GetResponseHeaders("200 OK");
response_headers["key1"] = std::string(30000, 'A');
response_headers["key2"] = std::string(30000, 'A');
response_headers["key3"] = std::string(30000, 'A');
response_headers["key4"] = std::string(30000, 'A');
response_headers["key5"] = std::string(30000, 'A');
response_headers["key6"] = std::string(30000, 'A');
response_headers["key7"] = std::string(30000, 'A');
response_headers["key8"] = std::string(30000, 'A');
spdy::SpdyHeadersIR headers_frame(
GetNthClientInitiatedBidirectionalStreamId(0),
std::move(response_headers));
spdy::SpdyFramer response_framer(spdy::SpdyFramer::ENABLE_COMPRESSION);
spdy::SpdySerializedFrame spdy_frame =
response_framer.SerializeFrame(headers_frame);
uint64_t packet_number = 1;
size_t chunk_size = 1200;
for (size_t offset = 0; offset < spdy_frame.size(); offset += chunk_size) {
size_t len = std::min(chunk_size, spdy_frame.size() - offset);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
packet_number++,
quic::QuicUtils::GetHeadersStreamId(version_), false, false,
offset, base::StringPiece(spdy_frame.data() + offset, len)));
}
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
packet_number, GetNthClientInitiatedBidirectionalStreamId(0),
false, true, 0, header + "hello!"));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(ASYNC, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddWrite(ASYNC,
ConstructClientAckPacket(4, packet_number, 3, 1));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest, TooLargeResponseHeaders) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
spdy::SpdyHeaderBlock response_headers = GetResponseHeaders("200 OK");
response_headers["key1"] = std::string(30000, 'A');
response_headers["key2"] = std::string(30000, 'A');
response_headers["key3"] = std::string(30000, 'A');
response_headers["key4"] = std::string(30000, 'A');
response_headers["key5"] = std::string(30000, 'A');
response_headers["key6"] = std::string(30000, 'A');
response_headers["key7"] = std::string(30000, 'A');
response_headers["key8"] = std::string(30000, 'A');
response_headers["key9"] = std::string(30000, 'A');
spdy::SpdyHeadersIR headers_frame(
GetNthClientInitiatedBidirectionalStreamId(0),
std::move(response_headers));
spdy::SpdyFramer response_framer(spdy::SpdyFramer::ENABLE_COMPRESSION);
spdy::SpdySerializedFrame spdy_frame =
response_framer.SerializeFrame(headers_frame);
uint64_t packet_number = 1;
size_t chunk_size = 1200;
for (size_t offset = 0; offset < spdy_frame.size(); offset += chunk_size) {
size_t len = std::min(chunk_size, spdy_frame.size() - offset);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
packet_number++,
quic::QuicUtils::GetHeadersStreamId(version_), false, false,
offset, base::StringPiece(spdy_frame.data() + offset, len)));
}
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
packet_number, GetNthClientInitiatedBidirectionalStreamId(0),
false, true, 0, header + "hello!"));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(ASYNC, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddWrite(
ASYNC, ConstructClientAckAndRstPacket(
4, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_HEADERS_TOO_LARGE, packet_number, 3, 1));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
}
TEST_P(QuicNetworkTransactionTest, ForceQuicForAll) {
session_params_.origins_to_force_quic_on.insert(HostPortPair());
AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
SendRequestAndExpectQuicResponse("hello!");
EXPECT_TRUE(
test_socket_performance_watcher_factory_.rtt_notification_received());
}
TEST_P(QuicNetworkTransactionTest, QuicProxy) {
session_params_.enable_quic = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC mail.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "http", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
EXPECT_FALSE(
test_socket_performance_watcher_factory_.rtt_notification_received());
// There is no need to set up an alternate protocol job, because
// no attempt will be made to speak to the proxy over TCP.
request_.url = GURL("http://mail.example.org/");
CreateSession();
SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 70);
EXPECT_TRUE(
test_socket_performance_watcher_factory_.rtt_notification_received());
}
// Regression test for https://crbug.com/492458. Test that for an HTTP
// connection through a QUIC proxy, the certificate exhibited by the proxy is
// checked against the proxy hostname, not the origin hostname.
TEST_P(QuicNetworkTransactionTest, QuicProxyWithCert) {
const std::string origin_host = "mail.example.com";
const std::string proxy_host = "www.example.org";
session_params_.enable_quic = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC " + proxy_host + ":70", TRAFFIC_ANNOTATION_FOR_TESTS);
client_maker_.set_hostname(origin_host);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "http", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
scoped_refptr<X509Certificate> cert(
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"));
ASSERT_TRUE(cert.get());
// This certificate is valid for the proxy, but not for the origin.
EXPECT_TRUE(cert->VerifyNameMatch(proxy_host));
EXPECT_FALSE(cert->VerifyNameMatch(origin_host));
ProofVerifyDetailsChromium verify_details;
verify_details.cert_verify_result.verified_cert = cert;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details);
ProofVerifyDetailsChromium verify_details2;
verify_details2.cert_verify_result.verified_cert = cert;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details2);
request_.url = GURL("http://" + origin_host);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE);
SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 70);
}
TEST_P(QuicNetworkTransactionTest, AlternativeServicesDifferentHost) {
session_params_.quic_allow_remote_alt_svc = true;
HostPortPair origin("www.example.org", 443);
HostPortPair alternative("mail.example.org", 443);
base::FilePath certs_dir = GetTestCertsDirectory();
scoped_refptr<X509Certificate> cert(
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"));
ASSERT_TRUE(cert.get());
// TODO(rch): the connection should be "to" the origin, so if the cert is
// valid for the origin but not the alternative, that should work too.
EXPECT_TRUE(cert->VerifyNameMatch(origin.host()));
EXPECT_TRUE(cert->VerifyNameMatch(alternative.host()));
ProofVerifyDetailsChromium verify_details;
verify_details.cert_verify_result.verified_cert = cert;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details);
client_maker_.set_hostname(origin.host());
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
request_.url = GURL("https://" + origin.host());
AddQuicRemoteAlternativeServiceMapping(
MockCryptoClientStream::CONFIRM_HANDSHAKE, alternative);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest, DoNotUseQuicForUnsupportedVersion) {
quic::QuicTransportVersion unsupported_version =
quic::QUIC_VERSION_UNSUPPORTED;
// Add support for another QUIC version besides |version_|. Also find a
// unsupported version.
for (const quic::QuicTransportVersion& version :
quic::AllSupportedTransportVersions()) {
if (version == version_)
continue;
if (supported_versions_.size() != 2) {
supported_versions_.push_back(version);
continue;
}
unsupported_version = version;
break;
}
DCHECK_NE(unsupported_version, quic::QUIC_VERSION_UNSUPPORTED);
// Set up alternative service to use QUIC with a version that is not
// supported.
url::SchemeHostPort server(request_.url);
AlternativeService alternative_service(kProtoQUIC, kDefaultServerHostName,
443);
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
http_server_properties_.SetQuicAlternativeService(
server, alternative_service, expiration, {unsupported_version});
AlternativeServiceInfoVector alt_svc_info_vector =
http_server_properties_.GetAlternativeServiceInfos(server);
EXPECT_EQ(1u, alt_svc_info_vector.size());
EXPECT_EQ(kProtoQUIC, alt_svc_info_vector[0].alternative_service().protocol);
EXPECT_EQ(1u, alt_svc_info_vector[0].advertised_versions().size());
EXPECT_EQ(unsupported_version,
alt_svc_info_vector[0].advertised_versions()[0]);
// First request should still be sent via TCP as the QUIC version advertised
// in the stored AlternativeService is not supported by the client. However,
// the response from the server will advertise new Alt-Svc with supported
// versions.
std::string advertised_versions_list_str =
GenerateQuicVersionsListForAltSvcHeader(
quic::AllSupportedTransportVersions());
std::string altsvc_header =
base::StringPrintf("Alt-Svc: quic=\":443\"; v=\"%s\"\r\n\r\n",
advertised_versions_list_str.c_str());
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// Second request should be sent via QUIC as a new list of verions supported
// by the client has been advertised by the server.
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession(supported_versions_);
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
// Check alternative service list is updated with new versions.
alt_svc_info_vector =
session_->http_server_properties()->GetAlternativeServiceInfos(server);
EXPECT_EQ(1u, alt_svc_info_vector.size());
EXPECT_EQ(kProtoQUIC, alt_svc_info_vector[0].alternative_service().protocol);
EXPECT_EQ(2u, alt_svc_info_vector[0].advertised_versions().size());
// Advertised versions will be lised in a sorted order.
std::sort(supported_versions_.begin(), supported_versions_.end());
EXPECT_EQ(supported_versions_[0],
alt_svc_info_vector[0].advertised_versions()[0]);
EXPECT_EQ(supported_versions_[1],
alt_svc_info_vector[0].advertised_versions()[1]);
}
// Regression test for https://crbug.com/546991.
// The server might not be able to serve a request on an alternative connection,
// and might send a 421 Misdirected Request response status to indicate this.
// HttpNetworkTransaction should reset the request and retry without using
// alternative services.
TEST_P(QuicNetworkTransactionTest, RetryMisdirectedRequest) {
// Set up alternative service to use QUIC.
// Note that |origins_to_force_quic_on| cannot be used in this test, because
// that overrides |enable_alternative_services|.
url::SchemeHostPort server(request_.url);
AlternativeService alternative_service(kProtoQUIC, kDefaultServerHostName,
443);
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
http_server_properties_.SetQuicAlternativeService(
server, alternative_service, expiration, supported_versions_);
// First try: The alternative job uses QUIC and reports an HTTP 421
// Misdirected Request error. The main job uses TCP, but |http_data| below is
// paused at Connect(), so it will never exit the socket pool. This ensures
// that the alternate job always wins the race and keeps whether the
// |http_data| exits the socket pool before the main job is aborted
// deterministic. The first main job gets aborted without the socket pool ever
// dispensing the socket, making it available for the second try.
MockQuicData mock_quic_data;
quic::QuicStreamOffset request_header_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
GetResponseHeaders("421"), nullptr));
mock_quic_data.AddRead(ASYNC, OK);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// Second try: The main job uses TCP, and there is no alternate job. Once the
// Connect() is unblocked, |http_data| will leave the socket pool, binding to
// the main job of the second request. It then succeeds over HTTP/1.1.
// Note that if there was an alternative QUIC Job created for the second try,
// that would read these data, and would fail with ERR_QUIC_PROTOCOL_ERROR.
// Therefore this test ensures that no alternative Job is created on retry.
MockWrite writes[] = {MockWrite(ASYNC, 0, "GET / HTTP/1.1\r\n"),
MockWrite(ASYNC, 1, "Host: mail.example.org\r\n"),
MockWrite(ASYNC, 2, "Connection: keep-alive\r\n\r\n")};
MockRead reads[] = {MockRead(ASYNC, 3, "HTTP/1.1 200 OK\r\n\r\n"),
MockRead(ASYNC, 4, "hello!"), MockRead(ASYNC, OK, 5)};
SequencedSocketData http_data(MockConnect(ASYNC, ERR_IO_PENDING) /* pause */,
reads, writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
// Run until |mock_quic_data| has failed and |http_data| has paused.
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
base::RunLoop().RunUntilIdle();
// |mock_quic_data| must have run to completion.
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
// Now that the QUIC data has been consumed, unblock |http_data|.
http_data.socket()->OnConnectComplete(MockConnect());
// The retry logic must hide the 421 status. The transaction succeeds on
// |http_data|.
EXPECT_THAT(callback.WaitForResult(), IsOk());
CheckWasHttpResponse(&trans);
CheckResponsePort(&trans, 443);
CheckResponseData(&trans, "hello!");
}
TEST_P(QuicNetworkTransactionTest, ForceQuicWithErrorConnecting) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data1;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data1.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data1.AddRead(ASYNC, ERR_SOCKET_NOT_CONNECTED);
MockQuicData mock_quic_data2;
header_stream_offset = 0;
mock_quic_data2.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_);
mock_quic_data2.AddRead(ASYNC, ERR_SOCKET_NOT_CONNECTED);
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_);
mock_quic_data1.AddSocketDataToFactory(&socket_factory_);
mock_quic_data2.AddSocketDataToFactory(&socket_factory_);
CreateSession();
EXPECT_EQ(0U, test_socket_performance_watcher_factory_.watcher_count());
for (size_t i = 0; i < 2; ++i) {
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_CLOSED));
EXPECT_EQ(1 + i, test_socket_performance_watcher_factory_.watcher_count());
NetErrorDetails details;
trans.PopulateNetErrorDetails(&details);
EXPECT_EQ(quic::QUIC_PACKET_READ_ERROR, details.quic_connection_error);
}
}
TEST_P(QuicNetworkTransactionTest, DoNotForceQuicForHttps) {
// Attempt to "force" quic on 443, which will not be honored.
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("www.google.com:443"));
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&data);
SSLSocketDataProvider ssl(ASYNC, OK);
socket_factory_.AddSSLSocketDataProvider(&ssl);
CreateSession();
SendRequestAndExpectHttpResponse("hello world");
EXPECT_EQ(0U, test_socket_performance_watcher_factory_.watcher_count());
}
TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceForQuic) {
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceWithVersionForQuic1) {
// Both server advertises and client supports two QUIC versions.
// Only |version_| is advertised and supported.
// The QuicStreamFactoy will pick up |version_|, which is verified as the
// PacketMakers are using |version_|.
// Add support for another QUIC version besides |version_| on the client side.
// Also find a different version advertised by the server.
quic::QuicTransportVersion advertised_version_2 =
quic::QUIC_VERSION_UNSUPPORTED;
for (const quic::QuicTransportVersion& version :
quic::AllSupportedTransportVersions()) {
if (version == version_)
continue;
if (supported_versions_.size() != 2) {
supported_versions_.push_back(version);
continue;
}
advertised_version_2 = version;
break;
}
DCHECK_NE(advertised_version_2, quic::QUIC_VERSION_UNSUPPORTED);
std::string QuicAltSvcWithVersionHeader =
base::StringPrintf("Alt-Svc: quic=\":443\";v=\"%d,%d\"\r\n\r\n",
advertised_version_2, version_);
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead(QuicAltSvcWithVersionHeader.c_str()), MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession(supported_versions_);
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceWithVersionForQuic2) {
// Client and server mutually support more than one QUIC_VERSION.
// The QuicStreamFactoy will pick the preferred QUIC_VERSION: |version_|,
// which is verified as the PacketMakers are using |version_|.
quic::QuicTransportVersion common_version_2 = quic::QUIC_VERSION_UNSUPPORTED;
for (const quic::QuicTransportVersion& version :
quic::AllSupportedTransportVersions()) {
if (version == version_)
continue;
common_version_2 = version;
break;
}
DCHECK_NE(common_version_2, quic::QUIC_VERSION_UNSUPPORTED);
supported_versions_.push_back(
common_version_2); // Supported but unpreferred.
std::string QuicAltSvcWithVersionHeader = base::StringPrintf(
"Alt-Svc: quic=\":443\";v=\"%d,%d\"\r\n\r\n", common_version_2, version_);
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead(QuicAltSvcWithVersionHeader.c_str()), MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession(supported_versions_);
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest,
UseAlternativeServiceWithProbabilityForQuic) {
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead(kQuicAlternativeServiceWithProbabilityHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest, SetAlternativeServiceWithScheme) {
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
// Send https request, ignore alternative service advertising if response
// header advertises alternative service for mail.example.org.
request_.url = GURL("https://mail.example.org:443");
SendRequestAndExpectHttpResponse("hello world");
HttpServerProperties* http_server_properties =
session_->http_server_properties();
url::SchemeHostPort http_server("http", "mail.example.org", 443);
url::SchemeHostPort https_server("https", "mail.example.org", 443);
// Check alternative service is set for the correct origin.
EXPECT_EQ(
2u,
http_server_properties->GetAlternativeServiceInfos(https_server).size());
EXPECT_TRUE(
http_server_properties->GetAlternativeServiceInfos(http_server).empty());
}
TEST_P(QuicNetworkTransactionTest, DoNotGetAltSvcForDifferentOrigin) {
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
AddCertificate(&ssl_data_);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
// Send https request and set alternative services if response header
// advertises alternative service for mail.example.org.
SendRequestAndExpectHttpResponse("hello world");
HttpServerProperties* http_server_properties =
session_->http_server_properties();
const url::SchemeHostPort https_server(request_.url);
// Check alternative service is set.
EXPECT_EQ(
2u,
http_server_properties->GetAlternativeServiceInfos(https_server).size());
// Send http request to the same origin but with diffrent scheme, should not
// use QUIC.
request_.url = GURL("http://mail.example.org:443");
SendRequestAndExpectHttpResponse("hello world");
}
TEST_P(QuicNetworkTransactionTest,
StoreMutuallySupportedVersionsWhenProcessAltSvc) {
// Add support for another QUIC version besides |version_|.
for (const quic::QuicTransportVersion& version :
quic::AllSupportedTransportVersions()) {
if (version == version_)
continue;
supported_versions_.push_back(version);
break;
}
std::string advertised_versions_list_str =
GenerateQuicVersionsListForAltSvcHeader(
quic::AllSupportedTransportVersions());
std::string altsvc_header =
base::StringPrintf("Alt-Svc: quic=\":443\"; v=\"%s\"\r\n\r\n",
advertised_versions_list_str.c_str());
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession(supported_versions_);
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
// Check alternative service is set with only mutually supported versions.
const url::SchemeHostPort https_server(request_.url);
const AlternativeServiceInfoVector alt_svc_info_vector =
session_->http_server_properties()->GetAlternativeServiceInfos(
https_server);
EXPECT_EQ(1u, alt_svc_info_vector.size());
EXPECT_EQ(kProtoQUIC, alt_svc_info_vector[0].alternative_service().protocol);
EXPECT_EQ(2u, alt_svc_info_vector[0].advertised_versions().size());
// Advertised versions will be lised in a sorted order.
std::sort(supported_versions_.begin(), supported_versions_.end());
EXPECT_EQ(supported_versions_[0],
alt_svc_info_vector[0].advertised_versions()[0]);
EXPECT_EQ(supported_versions_[1],
alt_svc_info_vector[0].advertised_versions()[1]);
}
TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceAllSupportedVersion) {
std::string altsvc_header =
base::StringPrintf("Alt-Svc: quic=\":443\"; v=\"%u\"\r\n\r\n", version_);
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest, GoAwayWithConnectionMigrationOnPortsOnly) {
if (version_ == quic::QUIC_VERSION_99) {
// Not available under version 99
return;
}
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
// Read a GoAway packet with
// quic::QuicErrorCode: quic::QUIC_ERROR_MIGRATING_PORT from the peer.
mock_quic_data.AddRead(SYNCHRONOUS,
ConstructServerGoAwayPacket(
2, quic::QUIC_ERROR_MIGRATING_PORT,
"connection migration with port change only"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
SYNCHRONOUS, ConstructServerDataPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0), false,
true, 0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndRstPacket(
4, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED, 3, 3, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
EXPECT_THAT(callback.WaitForResult(), IsOk());
// Check whether this transaction is correctly marked as received a go-away
// because of migrating port.
NetErrorDetails details;
EXPECT_FALSE(details.quic_port_migration_detected);
trans.PopulateNetErrorDetails(&details);
EXPECT_TRUE(details.quic_port_migration_detected);
}
// This test verifies that a new QUIC connection will be attempted on the
// alternate network if the original QUIC connection fails with idle timeout
// before handshake is confirmed. If TCP succeeds and QUIC fails on the
// alternate network as well, QUIC is marked as broken and the brokenness will
// not expire when default network changes.
TEST_P(QuicNetworkTransactionTest, QuicFailsOnBothNetworksWhileTCPSucceeds) {
if (version_ >= quic::QUIC_VERSION_47) {
// TODO(nharper): reenable once MakeDummyCHLOPacket() fixed
return;
}
SetUpTestForRetryConnectionOnAlternateNetwork();
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Hanging read
int packet_num = 1;
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++)); // CHLO
// Retranmit the handshake messages.
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
// TODO(zhongyi): remove condition check once b/115926584 is fixed.
if (version_ <= quic::QUIC_VERSION_39) {
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
}
// After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT.
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
"No recent network activity."));
quic_data.AddSocketDataToFactory(&socket_factory_);
// Add successful TCP data so that TCP job will succeed.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "TCP succeeds"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// Add data for the second QUIC connection to fail.
MockQuicData quic_data2;
quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING);
quic_data2.AddWrite(SYNCHRONOUS, ERR_ADDRESS_UNREACHABLE); // Write error.
quic_data2.AddSocketDataToFactory(&socket_factory_);
// Resolve the host resolution synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
// Add alternate protocol mapping to race QUIC and TCP.
// QUIC connection requires handshake to be confirmed and sends CHLO to the
// peer.
AddQuicAlternateProtocolMapping(
MockCryptoClientStream::COLD_START_WITH_CHLO_SENT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
// Request will be served with TCP job.
base::RunLoop().RunUntilIdle();
EXPECT_THAT(callback.WaitForResult(), IsOk());
CheckResponseData(&trans, "TCP succeeds");
// Fire the retransmission alarm, from this point, connection will idle
// timeout after 4 seconds.
if (!GetQuicReloadableFlag(
quic_fix_time_of_first_packet_sent_after_receiving)) {
quic_task_runner_->RunNextTask();
}
// Fast forward to idle timeout the original connection. A new connection will
// be kicked off on the alternate network.
quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4));
ASSERT_TRUE(quic_data.AllReadDataConsumed());
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
// Run the message loop to execute posted tasks, which will report job status.
base::RunLoop().RunUntilIdle();
// Verify that QUIC is marked as broken.
ExpectBrokenAlternateProtocolMapping();
// Deliver a message to notify the new network becomes default, the brokenness
// will not expire as QUIC is broken on both networks.
scoped_mock_change_notifier_->mock_network_change_notifier()
->NotifyNetworkMadeDefault(kNewNetworkForTests);
ExpectBrokenAlternateProtocolMapping();
ASSERT_TRUE(quic_data2.AllReadDataConsumed());
ASSERT_TRUE(quic_data2.AllWriteDataConsumed());
}
// This test verifies that a new QUIC connection will be attempted on the
// alternate network if the original QUIC connection fails with idle timeout
// before handshake is confirmed. If TCP succeeds and QUIC succeeds on the
// alternate network, QUIC is marked as broken. The brokenness will expire when
// the default network changes.
TEST_P(QuicNetworkTransactionTest, RetryOnAlternateNetworkWhileTCPSucceeds) {
if (version_ >= quic::QUIC_VERSION_47) {
// TODO(nharper): reenable once MakeDummyCHLOPacket() fixed
return;
}
SetUpTestForRetryConnectionOnAlternateNetwork();
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Hanging read
int packet_num = 1;
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++)); // CHLO
// Retranmit the handshake messages.
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
// TODO(zhongyi): remove condition check once b/115926584 is fixed.
if (version_ <= quic::QUIC_VERSION_39) {
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
}
// After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT.
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
"No recent network activity."));
quic_data.AddSocketDataToFactory(&socket_factory_);
// Add successful TCP data so that TCP job will succeed.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "TCP succeeds"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// Quic connection will be retried on the alternate network after the initial
// one fails on the default network.
MockQuicData quic_data2;
quic::QuicStreamOffset header_stream_offset = 0;
quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Handing read.
quic_data2.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(1)); // CHLO
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data2.AddWrite(SYNCHRONOUS,
ConstructInitialSettingsPacket(2, &header_stream_offset));
quic_data2.AddSocketDataToFactory(&socket_factory_);
// Resolve the host resolution synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
// Add alternate protocol mapping to race QUIC and TCP.
// QUIC connection requires handshake to be confirmed and sends CHLO to the
// peer.
AddQuicAlternateProtocolMapping(
MockCryptoClientStream::COLD_START_WITH_CHLO_SENT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
// Request will be served with TCP job.
base::RunLoop().RunUntilIdle();
EXPECT_THAT(callback.WaitForResult(), IsOk());
CheckResponseData(&trans, "TCP succeeds");
// Fire the retransmission alarm, after which connection will idle
// timeout after 4 seconds.
if (!GetQuicReloadableFlag(
quic_fix_time_of_first_packet_sent_after_receiving)) {
quic_task_runner_->RunNextTask();
}
// Fast forward to idle timeout the original connection. A new connection will
// be kicked off on the alternate network.
quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4));
ASSERT_TRUE(quic_data.AllReadDataConsumed());
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
// The second connection hasn't finish handshake, verify that QUIC is not
// marked as broken.
ExpectQuicAlternateProtocolMapping();
// Explicitly confirm the handshake on the second connection.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Run message loop to execute posted tasks, which will notify JoController
// about the orphaned job status.
base::RunLoop().RunUntilIdle();
// Verify that QUIC is marked as broken.
ExpectBrokenAlternateProtocolMapping();
// Deliver a message to notify the new network becomes default, the previous
// brokenness will be clear as the brokenness is bond with old default
// network.
scoped_mock_change_notifier_->mock_network_change_notifier()
->NotifyNetworkMadeDefault(kNewNetworkForTests);
ExpectQuicAlternateProtocolMapping();
ASSERT_TRUE(quic_data2.AllReadDataConsumed());
ASSERT_TRUE(quic_data2.AllWriteDataConsumed());
}
// This test verifies that a new QUIC connection will be attempted on the
// alternate network if the original QUIC connection fails with idle timeout
// before handshake is confirmed. If TCP doesn't succeed but QUIC on the
// alternative network succeeds, QUIC is not marked as broken.
TEST_P(QuicNetworkTransactionTest, RetryOnAlternateNetworkWhileTCPHanging) {
if (version_ >= quic::QUIC_VERSION_47) {
// TODO(nharper): reenable once MakeDummyCHLOPacket() fixed
return;
}
SetUpTestForRetryConnectionOnAlternateNetwork();
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Hanging read
int packet_num = 1;
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++)); // CHLO
// Retranmit the handshake messages.
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
// TODO(zhongyi): remove condition check once b/115926584 is fixed, i.e.,
// quic_fix_has_pending_crypto_data is introduced and enabled.
if (version_ <= quic::QUIC_VERSION_39) {
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(packet_num++));
}
// After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT.
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeConnectionClosePacket(
packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
"No recent network activity."));
quic_data.AddSocketDataToFactory(&socket_factory_);
// Add hanging TCP data so that TCP job will never succeeded.
AddHangingNonAlternateProtocolSocketData();
// Quic connection will then be retried on the alternate network.
MockQuicData quic_data2;
quic::QuicStreamOffset header_stream_offset = 0;
quic_data2.AddWrite(SYNCHRONOUS,
client_maker_.MakeDummyCHLOPacket(1)); // CHLO
const quic::QuicString body = "hello!";
quic::QuicString header = ConstructDataHeader(body.length());
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data2.AddWrite(SYNCHRONOUS,
ConstructInitialSettingsPacket(2, &header_stream_offset));
quic_data2.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
quic_data2.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic_data2.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + body));
quic_data2.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 2, 1, 1));
quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
quic_data2.AddSocketDataToFactory(&socket_factory_);
// Resolve the host resolution synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
// Add alternate protocol mapping to race QUIC and TCP.
// QUIC connection requires handshake to be confirmed and sends CHLO to the
// peer.
AddQuicAlternateProtocolMapping(
MockCryptoClientStream::COLD_START_WITH_CHLO_SENT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
if (!GetQuicReloadableFlag(
quic_fix_time_of_first_packet_sent_after_receiving)) {
quic_task_runner_->RunNextTask();
}
// Fast forward to idle timeout the original connection. A new connection will
// be kicked off on the alternate network.
quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4));
ASSERT_TRUE(quic_data.AllReadDataConsumed());
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
// Verify that QUIC is not marked as broken.
ExpectQuicAlternateProtocolMapping();
// Explicitly confirm the handshake on the second connection.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Read the response.
EXPECT_THAT(callback.WaitForResult(), IsOk());
CheckResponseData(&trans, body);
// Verify that QUIC is not marked as broken.
ExpectQuicAlternateProtocolMapping();
// Deliver a message to notify the new network becomes default.
scoped_mock_change_notifier_->mock_network_change_notifier()
->NotifyNetworkMadeDefault(kNewNetworkForTests);
ExpectQuicAlternateProtocolMapping();
ASSERT_TRUE(quic_data2.AllReadDataConsumed());
ASSERT_TRUE(quic_data2.AllWriteDataConsumed());
}
// Verify that if a QUIC connection times out, the QuicHttpStream will
// return QUIC_PROTOCOL_ERROR.
TEST_P(QuicNetworkTransactionTest, TimeoutAfterHandshakeConfirmed) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
session_params_.quic_idle_connection_timeout_seconds = 5;
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
// TLP 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
3, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// TLP 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
4, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
5, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
6, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
7, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
8, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 3
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
9, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
10, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket(
11, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
"No recent network activity."));
quic_data.AddRead(ASYNC, ERR_IO_PENDING);
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Run the QUIC session to completion.
quic_task_runner_->RunUntilIdle();
ExpectQuicAlternateProtocolMapping();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
}
// Verify that if a QUIC connection RTOs, the QuicHttpStream will
// return QUIC_PROTOCOL_ERROR.
TEST_P(QuicNetworkTransactionTest, TooManyRtosAfterHandshakeConfirmed) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
session_params_.quic_connection_options.push_back(quic::k5RTO);
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
// TLP 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
3, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// TLP 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
4, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
5, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
6, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
7, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
8, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 3
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
9, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
10, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 4
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
11, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
12, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 5
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket(
13, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Run the QUIC session to completion.
quic_task_runner_->RunUntilIdle();
ExpectQuicAlternateProtocolMapping();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
}
// Verify that if a QUIC connection RTOs, while there are no active streams
// QUIC will not be marked as broken.
TEST_P(QuicNetworkTransactionTest,
TooManyRtosAfterHandshakeConfirmedAndStreamReset) {
session_params_.quic_connection_options.push_back(quic::k5RTO);
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRstPacket(
3, true, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
// TLP 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
4, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// TLP 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
5, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRstPacket(
6, true, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
7, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// RTO 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
8, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRstPacket(
9, true, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
// RTO 3
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
10, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
11, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 4
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeRstPacket(
12, true, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
13, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// RTO 5
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket(
14, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
session_.get());
TestCompletionCallback callback;
int rv = trans->Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Now cancel the request.
trans.reset();
// Run the QUIC session to completion.
quic_task_runner_->RunUntilIdle();
ExpectQuicAlternateProtocolMapping();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
}
// Verify that if a QUIC protocol error occurs after the handshake is confirmed
// the request fails with QUIC_PROTOCOL_ERROR.
TEST_P(QuicNetworkTransactionTest, ProtocolErrorAfterHandshakeConfirmed) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
ConstructInitialSettingsPacket(2, &header_stream_offset));
// Peer sending data from an non-existing stream causes this end to raise
// error and close connection.
quic_data.AddRead(
ASYNC, ConstructServerRstPacket(
1, false, GetNthClientInitiatedBidirectionalStreamId(47),
quic::QUIC_STREAM_LAST_ERROR));
std::string quic_error_details = "Data for nonexistent stream";
quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndConnectionClosePacket(
3, quic::QuicTime::Delta::Zero(), 1, 1, 1,
quic::QUIC_INVALID_STREAM_ID, quic_error_details));
quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
ASSERT_FALSE(quic_data.AllReadDataConsumed());
// Run the QUIC session to completion.
base::RunLoop().RunUntilIdle();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ASSERT_TRUE(quic_data.AllReadDataConsumed());
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
ExpectQuicAlternateProtocolMapping();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
}
// Verify that with mark_quic_broken_when_network_blackholes enabled, if a QUIC
// connection times out, then QUIC will be marked as broken and the request
// retried over TCP.
TEST_P(QuicNetworkTransactionTest, TimeoutAfterHandshakeConfirmedThenBroken) {
session_params_.mark_quic_broken_when_network_blackholes = true;
session_params_.quic_idle_connection_timeout_seconds = 5;
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
// TLP 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
3, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// TLP 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
4, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
5, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
6, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
7, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
8, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 3
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
9, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
10, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket(
11, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
"No recent network activity."));
quic_data.AddRead(ASYNC, ERR_IO_PENDING);
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// After that fails, it will be resent via TCP.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Run the QUIC session to completion.
quic_task_runner_->RunUntilIdle();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
// Let the transaction proceed which will result in QUIC being marked
// as broken and the request falling back to TCP.
EXPECT_THAT(callback.WaitForResult(), IsOk());
ExpectBrokenAlternateProtocolMapping();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ASSERT_FALSE(http_data.AllReadDataConsumed());
// Read the response body over TCP.
CheckResponseData(&trans, "hello world");
ASSERT_TRUE(http_data.AllWriteDataConsumed());
ASSERT_TRUE(http_data.AllReadDataConsumed());
}
// Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC
// connection times out, then QUIC will be marked as broken and the request
// retried over TCP.
TEST_P(QuicNetworkTransactionTest, TimeoutAfterHandshakeConfirmedThenBroken2) {
session_params_.quic_idle_connection_timeout_seconds = 5;
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
// TLP 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
3, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// TLP 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
4, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
5, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
6, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
7, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
8, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 3
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
9, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
10, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket(
11, true, quic::QUIC_NETWORK_IDLE_TIMEOUT,
"No recent network activity."));
quic_data.AddRead(ASYNC, ERR_IO_PENDING);
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// After that fails, it will be resent via TCP.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Run the QUIC session to completion.
quic_task_runner_->RunUntilIdle();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ExpectQuicAlternateProtocolMapping();
// Let the transaction proceed which will result in QUIC being marked
// as broken and the request falling back to TCP.
EXPECT_THAT(callback.WaitForResult(), IsOk());
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ASSERT_FALSE(http_data.AllReadDataConsumed());
// Read the response body over TCP.
CheckResponseData(&trans, "hello world");
ExpectBrokenAlternateProtocolMapping();
ASSERT_TRUE(http_data.AllWriteDataConsumed());
ASSERT_TRUE(http_data.AllReadDataConsumed());
}
// Verify that with mark_quic_broken_when_network_blackholes enabled, if a QUIC
// connection times out, then QUIC will be marked as broken but the request
// will not be retried over TCP.
TEST_P(QuicNetworkTransactionTest,
TimeoutAfterHandshakeConfirmedAndHeadersThenBrokenNotRetried) {
session_params_.mark_quic_broken_when_network_blackholes = true;
session_params_.quic_idle_connection_timeout_seconds = 5;
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
quic_data.AddRead(ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0),
false, false, GetResponseHeaders("200 OK")));
// quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 1, 1));
quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckPacket(3, 1, 1, 1,
quic::QuicTime::Delta::FromMilliseconds(25)));
// TLP 1
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
4, quic::QuicUtils::GetHeadersStreamId(version_), false,
false, 0, request_data));
// TLP 2
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
5, quic::QuicUtils::GetHeadersStreamId(version_), false,
false, settings_offset, settings_data));
// RTO 1
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
6, quic::QuicUtils::GetHeadersStreamId(version_), false,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
7, quic::QuicUtils::GetHeadersStreamId(version_), false,
false, settings_offset, settings_data));
// RTO 2
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
8, quic::QuicUtils::GetHeadersStreamId(version_), false,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
9, quic::QuicUtils::GetHeadersStreamId(version_), false,
false, settings_offset, settings_data));
// RTO 3
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
10, quic::QuicUtils::GetHeadersStreamId(version_), false,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
11, quic::QuicUtils::GetHeadersStreamId(version_), false,
false, settings_offset, settings_data));
if (GetQuicReloadableFlag(
quic_fix_time_of_first_packet_sent_after_receiving)) {
quic_data.AddWrite(
SYNCHRONOUS,
client_maker_.MakeAckAndConnectionClosePacket(
12, false, quic::QuicTime::Delta::FromMilliseconds(4000), 1, 1, 1,
quic::QUIC_NETWORK_IDLE_TIMEOUT, "No recent network activity."));
} else {
quic_data.AddWrite(
SYNCHRONOUS,
client_maker_.MakeAckAndConnectionClosePacket(
12, false, quic::QuicTime::Delta::FromMilliseconds(4200), 1, 1, 1,
quic::QUIC_NETWORK_IDLE_TIMEOUT, "No recent network activity."));
}
quic_data.AddRead(ASYNC, ERR_IO_PENDING);
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Run the QUIC session to completion.
quic_task_runner_->RunUntilIdle();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
// Let the transaction proceed which will result in QUIC being marked
// as broken and the request falling back to TCP.
EXPECT_THAT(callback.WaitForResult(), IsOk());
ExpectBrokenAlternateProtocolMapping();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
std::string response_data;
ASSERT_THAT(ReadTransaction(&trans, &response_data),
IsError(ERR_QUIC_PROTOCOL_ERROR));
}
// Verify that with mark_quic_broken_when_network_blackholes enabled, if a QUIC
// connection RTOs, then QUIC will be marked as broken and the request retried
// over TCP.
TEST_P(QuicNetworkTransactionTest,
TooManyRtosAfterHandshakeConfirmedThenBroken) {
session_params_.mark_quic_broken_when_network_blackholes = true;
session_params_.quic_connection_options.push_back(quic::k5RTO);
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
// TLP 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
3, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// TLP 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
4, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
5, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
6, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
7, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
8, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 3
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
9, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
10, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 4
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
11, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
12, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket(
13, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// After that fails, it will be resent via TCP.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Run the QUIC session to completion.
quic_task_runner_->RunUntilIdle();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
// Let the transaction proceed which will result in QUIC being marked
// as broken and the request falling back to TCP.
EXPECT_THAT(callback.WaitForResult(), IsOk());
ExpectBrokenAlternateProtocolMapping();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ASSERT_FALSE(http_data.AllReadDataConsumed());
// Read the response body over TCP.
CheckResponseData(&trans, "hello world");
ASSERT_TRUE(http_data.AllWriteDataConsumed());
ASSERT_TRUE(http_data.AllReadDataConsumed());
}
// Verify that if a QUIC connection RTOs, while there are no active streams
// QUIC will be marked as broken.
TEST_P(QuicNetworkTransactionTest,
TooManyRtosAfterHandshakeConfirmedAndStreamResetThenBroken) {
session_params_.mark_quic_broken_when_network_blackholes = true;
session_params_.quic_connection_options.push_back(quic::k5RTO);
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRstPacket(
3, true, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
// TLP 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
4, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// TLP 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
5, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 1
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRstPacket(
6, true, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
7, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// RTO 2
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeDataPacket(
8, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRstPacket(
9, true, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
// RTO 3
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
10, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
11, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, settings_offset, settings_data));
// RTO 4
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeRstPacket(
12, true, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
quic_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeDataPacket(
13, quic::QuicUtils::GetHeadersStreamId(version_), true,
false, 0, request_data));
// RTO 5
quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket(
14, true, quic::QUIC_TOO_MANY_RTOS,
"5 consecutive retransmission timeouts"));
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
session_.get());
TestCompletionCallback callback;
int rv = trans->Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Now cancel the request.
trans.reset();
// Run the QUIC session to completion.
quic_task_runner_->RunUntilIdle();
ExpectBrokenAlternateProtocolMapping();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
}
// Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC
// protocol error occurs after the handshake is confirmed, the request
// retried over TCP and the QUIC will be marked as broken.
TEST_P(QuicNetworkTransactionTest,
ProtocolErrorAfterHandshakeConfirmedThenBroken) {
session_params_.quic_idle_connection_timeout_seconds = 5;
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
ConstructInitialSettingsPacket(2, &header_stream_offset));
// Peer sending data from an non-existing stream causes this end to raise
// error and close connection.
quic_data.AddRead(
ASYNC, ConstructServerRstPacket(
1, false, GetNthClientInitiatedBidirectionalStreamId(47),
quic::QUIC_STREAM_LAST_ERROR));
std::string quic_error_details = "Data for nonexistent stream";
quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndConnectionClosePacket(
3, quic::QuicTime::Delta::Zero(), 1, 1, 1,
quic::QUIC_INVALID_STREAM_ID, quic_error_details));
quic_data.AddSocketDataToFactory(&socket_factory_);
// After that fails, it will be resent via TCP.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Run the QUIC session to completion.
base::RunLoop().RunUntilIdle();
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ExpectQuicAlternateProtocolMapping();
// Let the transaction proceed which will result in QUIC being marked
// as broken and the request falling back to TCP.
EXPECT_THAT(callback.WaitForResult(), IsOk());
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ASSERT_FALSE(http_data.AllReadDataConsumed());
// Read the response body over TCP.
CheckResponseData(&trans, "hello world");
ExpectBrokenAlternateProtocolMapping();
ASSERT_TRUE(http_data.AllWriteDataConsumed());
ASSERT_TRUE(http_data.AllReadDataConsumed());
}
// Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC
// request is reset from, then QUIC will be marked as broken and the request
// retried over TCP.
TEST_P(QuicNetworkTransactionTest, ResetAfterHandshakeConfirmedThenBroken) {
// The request will initially go out over QUIC.
MockQuicData quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::string request_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeRequestHeadersPacketAndSaveData(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, priority, GetRequestHeaders("GET", "https", "/"),
0, nullptr, &header_stream_offset, &request_data));
std::string settings_data;
// quic::QuicStreamOffset settings_offset = header_stream_offset;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
quic_data.AddWrite(SYNCHRONOUS,
client_maker_.MakeInitialSettingsPacketAndSaveData(
2, &header_stream_offset, &settings_data));
quic_data.AddRead(ASYNC,
ConstructServerRstPacket(
1, false, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_HEADERS_TOO_LARGE));
quic_data.AddRead(ASYNC, OK);
quic_data.AddSocketDataToFactory(&socket_factory_);
// After that fails, it will be resent via TCP.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Pump the message loop to get the request started.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Run the QUIC session to completion.
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ExpectQuicAlternateProtocolMapping();
// Let the transaction proceed which will result in QUIC being marked
// as broken and the request falling back to TCP.
EXPECT_THAT(callback.WaitForResult(), IsOk());
ASSERT_TRUE(quic_data.AllWriteDataConsumed());
ASSERT_FALSE(http_data.AllReadDataConsumed());
// Read the response body over TCP.
CheckResponseData(&trans, "hello world");
ExpectBrokenAlternateProtocolMapping();
ASSERT_TRUE(http_data.AllWriteDataConsumed());
ASSERT_TRUE(http_data.AllReadDataConsumed());
}
// Verify that when an origin has two alt-svc advertisements, one local and one
// remote, that when the local is broken the request will go over QUIC via
// the remote Alt-Svc.
// This is a regression test for crbug/825646.
TEST_P(QuicNetworkTransactionTest, RemoteAltSvcWorkingWhileLocalAltSvcBroken) {
session_params_.quic_allow_remote_alt_svc = true;
GURL origin1 = request_.url; // mail.example.org
GURL origin2("https://www.example.org/");
ASSERT_NE(origin1.host(), origin2.host());
scoped_refptr<X509Certificate> cert(
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"));
ASSERT_TRUE(cert->VerifyNameMatch("www.example.org"));
ASSERT_TRUE(cert->VerifyNameMatch("mail.example.org"));
ProofVerifyDetailsChromium verify_details;
verify_details.cert_verify_result.verified_cert = cert;
verify_details.cert_verify_result.is_issued_by_known_root = true;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details);
MockQuicData mock_quic_data;
quic::QuicStreamOffset request_header_offset(0);
quic::QuicStreamOffset response_header_offset(0);
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
MockQuicData mock_quic_data2;
mock_quic_data2.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
// Set up alternative service for |origin1|.
AlternativeService local_alternative(kProtoQUIC, "mail.example.org", 443);
AlternativeService remote_alternative(kProtoQUIC, "www.example.org", 443);
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
AlternativeServiceInfoVector alternative_services;
alternative_services.push_back(
AlternativeServiceInfo::CreateQuicAlternativeServiceInfo(
local_alternative, expiration,
session_->params().quic_supported_versions));
alternative_services.push_back(
AlternativeServiceInfo::CreateQuicAlternativeServiceInfo(
remote_alternative, expiration,
session_->params().quic_supported_versions));
http_server_properties_.SetAlternativeServices(url::SchemeHostPort(origin1),
alternative_services);
http_server_properties_.MarkAlternativeServiceBroken(local_alternative);
SendRequestAndExpectQuicResponse("hello!");
}
// Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC
// request is reset from, then QUIC will be marked as broken and the request
// retried over TCP. Then, subsequent requests will go over a new QUIC
// connection instead of going back to the broken QUIC connection.
// This is a regression tests for crbug/731303.
TEST_P(QuicNetworkTransactionTest,
ResetPooledAfterHandshakeConfirmedThenBroken) {
session_params_.quic_allow_remote_alt_svc = true;
GURL origin1 = request_.url;
GURL origin2("https://www.example.org/");
ASSERT_NE(origin1.host(), origin2.host());
MockQuicData mock_quic_data;
quic::QuicStreamOffset request_header_offset(0);
quic::QuicStreamOffset response_header_offset(0);
scoped_refptr<X509Certificate> cert(
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"));
ASSERT_TRUE(cert->VerifyNameMatch("www.example.org"));
ASSERT_TRUE(cert->VerifyNameMatch("mail.example.org"));
ProofVerifyDetailsChromium verify_details;
verify_details.cert_verify_result.verified_cert = cert;
verify_details.cert_verify_result.is_issued_by_known_root = true;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details);
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset));
// First request.
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
// Second request will go over the pooled QUIC connection, but will be
// reset by the server.
QuicTestPacketMaker client_maker2(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin2.host(), quic::Perspective::IS_CLIENT,
client_headers_include_h2_stream_dependency_);
QuicTestPacketMaker server_maker2(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin2.host(), quic::Perspective::IS_SERVER, false);
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
GetRequestHeaders("GET", "https", "/", &client_maker2),
GetNthClientInitiatedBidirectionalStreamId(0),
&request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerRstPacket(
3, false, GetNthClientInitiatedBidirectionalStreamId(1),
quic::QUIC_HEADERS_TOO_LARGE));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// After that fails, it will be resent via TCP.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: www.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// Then the next request to the second origin will be sent over TCP.
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
// Set up alternative service for |origin1|.
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
AlternativeService alternative1(kProtoQUIC, origin1.host(), 443);
http_server_properties_.SetQuicAlternativeService(
url::SchemeHostPort(origin1), alternative1, expiration,
supported_versions_);
// Set up alternative service for |origin2|.
AlternativeService alternative2(kProtoQUIC, origin2.host(), 443);
http_server_properties_.SetQuicAlternativeService(
url::SchemeHostPort(origin2), alternative2, expiration,
supported_versions_);
// First request opens connection to |destination1|
// with quic::QuicServerId.host() == origin1.host().
SendRequestAndExpectQuicResponse("hello!");
// Second request pools to existing connection with same destination,
// because certificate matches, even though quic::QuicServerId is different.
// After it is reset, it will fail back to QUIC and mark QUIC as broken.
request_.url = origin2;
SendRequestAndExpectHttpResponse("hello world");
EXPECT_FALSE(http_server_properties_.IsAlternativeServiceBroken(alternative1))
<< alternative1.ToString();
EXPECT_TRUE(http_server_properties_.IsAlternativeServiceBroken(alternative2))
<< alternative2.ToString();
// The third request should use a new QUIC connection, not the broken
// QUIC connection.
SendRequestAndExpectHttpResponse("hello world");
}
TEST_P(QuicNetworkTransactionTest,
DoNotUseAlternativeServiceQuicUnsupportedVersion) {
std::string altsvc_header = base::StringPrintf(
"Alt-Svc: quic=\":443\"; v=\"%u\"\r\n\r\n", version_ - 1);
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectHttpResponse("hello world");
}
// When multiple alternative services are advertised, HttpStreamFactory should
// select the alternative service which uses existing QUIC session if available.
// If no existing QUIC session can be used, use the first alternative service
// from the list.
TEST_P(QuicNetworkTransactionTest, UseExistingAlternativeServiceForQuic) {
session_params_.quic_allow_remote_alt_svc = true;
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
quic::QuicStreamOffset request_header_offset = 0;
quic::QuicStreamOffset response_header_offset = 0;
// First QUIC request data.
// Open a session to foo.example.org:443 using the first entry of the
// alternative service list.
MockQuicData mock_quic_data;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &request_header_offset));
std::string alt_svc_list =
"quic=\"mail.example.org:444\", quic=\"foo.example.org:443\", "
"quic=\"bar.example.org:445\"";
mock_quic_data.AddRead(
ASYNC,
ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK", alt_svc_list), &response_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
// Second QUIC request data.
// Connection pooling, using existing session, no need to include version
// as version negotiation has been completed.
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false,
true, GetRequestHeaders("GET", "https", "/"),
GetNthClientInitiatedBidirectionalStreamId(0),
&request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
SendRequestAndExpectQuicResponse("hello!");
}
// Check that an existing QUIC connection to an alternative proxy server is
// used.
TEST_P(QuicNetworkTransactionTest, UseExistingQUICAlternativeProxy) {
base::HistogramTester histogram_tester;
quic::QuicStreamOffset request_header_offset = 0;
quic::QuicStreamOffset response_header_offset = 0;
// First QUIC request data.
// Open a session to foo.example.org:443 using the first entry of the
// alternative service list.
MockQuicData mock_quic_data;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "http", "/"), &request_header_offset));
std::string alt_svc_list;
mock_quic_data.AddRead(
ASYNC,
ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK", alt_svc_list), &response_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
// Second QUIC request data.
// Connection pooling, using existing session, no need to include version
// as version negotiation has been completed.
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false,
true, GetRequestHeaders("GET", "http", "/"),
GetNthClientInitiatedBidirectionalStreamId(0),
&request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
TestProxyDelegate test_proxy_delegate;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"HTTPS mail.example.org:443", TRAFFIC_ANNOTATION_FOR_TESTS);
test_proxy_delegate.set_alternative_proxy_server(
ProxyServer::FromPacString("QUIC mail.example.org:443"));
proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate);
request_.url = GURL("http://mail.example.org/");
CreateSession();
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 443);
histogram_tester.ExpectUniqueSample("Net.QuicAlternativeProxy.Usage",
1 /* ALTERNATIVE_PROXY_USAGE_WON_RACE */,
1);
SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 443);
histogram_tester.ExpectTotalCount("Net.QuicAlternativeProxy.Usage", 2);
histogram_tester.ExpectBucketCount("Net.QuicAlternativeProxy.Usage",
0 /* ALTERNATIVE_PROXY_USAGE_NO_RACE */,
1);
}
// Pool to existing session with matching quic::QuicServerId
// even if alternative service destination is different.
TEST_P(QuicNetworkTransactionTest, PoolByOrigin) {
session_params_.quic_allow_remote_alt_svc = true;
MockQuicData mock_quic_data;
quic::QuicStreamOffset request_header_offset(0);
quic::QuicStreamOffset response_header_offset(0);
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset));
// First request.
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
// Second request.
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false,
true, GetRequestHeaders("GET", "https", "/"),
GetNthClientInitiatedBidirectionalStreamId(0),
&request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
AddHangingNonAlternateProtocolSocketData();
CreateSession();
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
const char destination1[] = "first.example.com";
const char destination2[] = "second.example.com";
// Set up alternative service entry to destination1.
url::SchemeHostPort server(request_.url);
AlternativeService alternative_service(kProtoQUIC, destination1, 443);
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
http_server_properties_.SetQuicAlternativeService(
server, alternative_service, expiration, supported_versions_);
// First request opens connection to |destination1|
// with quic::QuicServerId.host() == kDefaultServerHostName.
SendRequestAndExpectQuicResponse("hello!");
// Set up alternative service entry to a different destination.
alternative_service = AlternativeService(kProtoQUIC, destination2, 443);
http_server_properties_.SetQuicAlternativeService(
server, alternative_service, expiration, supported_versions_);
// Second request pools to existing connection with same quic::QuicServerId,
// even though alternative service destination is different.
SendRequestAndExpectQuicResponse("hello!");
}
// Pool to existing session with matching destination and matching certificate
// even if origin is different, and even if the alternative service with
// matching destination is not the first one on the list.
TEST_P(QuicNetworkTransactionTest, PoolByDestination) {
session_params_.quic_allow_remote_alt_svc = true;
GURL origin1 = request_.url;
GURL origin2("https://www.example.org/");
ASSERT_NE(origin1.host(), origin2.host());
MockQuicData mock_quic_data;
quic::QuicStreamOffset request_header_offset(0);
quic::QuicStreamOffset response_header_offset(0);
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset));
// First request.
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
// Second request.
QuicTestPacketMaker client_maker2(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin2.host(), quic::Perspective::IS_CLIENT,
client_headers_include_h2_stream_dependency_);
QuicTestPacketMaker server_maker2(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin2.host(), quic::Perspective::IS_SERVER, false);
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
GetRequestHeaders("GET", "https", "/", &client_maker2),
GetNthClientInitiatedBidirectionalStreamId(0),
&request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
AddHangingNonAlternateProtocolSocketData();
CreateSession();
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
const char destination1[] = "first.example.com";
const char destination2[] = "second.example.com";
// Set up alternative service for |origin1|.
AlternativeService alternative_service1(kProtoQUIC, destination1, 443);
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
http_server_properties_.SetQuicAlternativeService(
url::SchemeHostPort(origin1), alternative_service1, expiration,
supported_versions_);
// Set up multiple alternative service entries for |origin2|,
// the first one with a different destination as for |origin1|,
// the second one with the same. The second one should be used,
// because the request can be pooled to that one.
AlternativeService alternative_service2(kProtoQUIC, destination2, 443);
AlternativeServiceInfoVector alternative_services;
alternative_services.push_back(
AlternativeServiceInfo::CreateQuicAlternativeServiceInfo(
alternative_service2, expiration,
session_->params().quic_supported_versions));
alternative_services.push_back(
AlternativeServiceInfo::CreateQuicAlternativeServiceInfo(
alternative_service1, expiration,
session_->params().quic_supported_versions));
http_server_properties_.SetAlternativeServices(url::SchemeHostPort(origin2),
alternative_services);
// First request opens connection to |destination1|
// with quic::QuicServerId.host() == origin1.host().
SendRequestAndExpectQuicResponse("hello!");
// Second request pools to existing connection with same destination,
// because certificate matches, even though quic::QuicServerId is different.
request_.url = origin2;
SendRequestAndExpectQuicResponse("hello!");
}
// Multiple origins have listed the same alternative services. When there's a
// existing QUIC session opened by a request to other origin,
// if the cert is valid, should select this QUIC session to make the request
// if this is also the first existing QUIC session.
TEST_P(QuicNetworkTransactionTest,
UseSharedExistingAlternativeServiceForQuicWithValidCert) {
session_params_.quic_allow_remote_alt_svc = true;
// Default cert is valid for *.example.org
// HTTP data for request to www.example.org.
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead("Alt-Svc: quic=\":443\"\r\n\r\n"),
MockRead("hello world from www.example.org"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// HTTP data for request to mail.example.org.
MockRead http_reads2[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead("Alt-Svc: quic=\":444\", quic=\"www.example.org:443\"\r\n\r\n"),
MockRead("hello world from mail.example.org"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data2(http_reads2, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data2);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
quic::QuicStreamOffset request_header_offset = 0;
quic::QuicStreamOffset response_header_offset = 0;
QuicTestPacketMaker client_maker(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, "mail.example.org", quic::Perspective::IS_CLIENT,
client_headers_include_h2_stream_dependency_);
server_maker_.set_hostname("www.example.org");
client_maker_.set_hostname("www.example.org");
MockQuicData mock_quic_data;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset));
// First QUIC request data.
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
quic::QuicString header = ConstructDataHeader(21);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello from mail QUIC!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
// Second QUIC request data.
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
GetRequestHeaders("GET", "https", "/", &client_maker),
GetNthClientInitiatedBidirectionalStreamId(0),
&request_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &response_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
0, header + "hello from mail QUIC!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
// Send two HTTP requests, responses set up alt-svc lists for the origins.
request_.url = GURL("https://www.example.org/");
SendRequestAndExpectHttpResponse("hello world from www.example.org");
request_.url = GURL("https://mail.example.org/");
SendRequestAndExpectHttpResponse("hello world from mail.example.org");
// Open a QUIC session to mail.example.org:443 when making request
// to mail.example.org.
request_.url = GURL("https://www.example.org/");
SendRequestAndExpectQuicResponse("hello from mail QUIC!");
// Uses the existing QUIC session when making request to www.example.org.
request_.url = GURL("https://mail.example.org/");
SendRequestAndExpectQuicResponse("hello from mail QUIC!");
}
TEST_P(QuicNetworkTransactionTest, AlternativeServiceDifferentPort) {
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"),
MockRead(kQuicAlternativeServiceDifferentPortHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
SendRequestAndExpectHttpResponse("hello world");
url::SchemeHostPort http_server("https", kDefaultServerHostName, 443);
AlternativeServiceInfoVector alternative_service_info_vector =
http_server_properties_.GetAlternativeServiceInfos(http_server);
ASSERT_EQ(1u, alternative_service_info_vector.size());
const AlternativeService alternative_service =
alternative_service_info_vector[0].alternative_service();
EXPECT_EQ(kProtoQUIC, alternative_service.protocol);
EXPECT_EQ(kDefaultServerHostName, alternative_service.host);
EXPECT_EQ(137, alternative_service.port);
}
TEST_P(QuicNetworkTransactionTest, ConfirmAlternativeService) {
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AlternativeService alternative_service(kProtoQUIC,
HostPortPair::FromURL(request_.url));
http_server_properties_.MarkAlternativeServiceRecentlyBroken(
alternative_service);
EXPECT_TRUE(http_server_properties_.WasAlternativeServiceRecentlyBroken(
alternative_service));
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
mock_quic_data.Resume();
EXPECT_FALSE(http_server_properties_.WasAlternativeServiceRecentlyBroken(
alternative_service));
EXPECT_NE(nullptr,
http_server_properties_.GetServerNetworkStats(
url::SchemeHostPort("https", request_.url.host(), 443)));
}
TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceForQuicForHttps) {
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
// TODO(rtenneti): Test QUIC over HTTPS, GetSSLInfo().
SendRequestAndExpectHttpResponse("hello world");
}
// Tests that the connection to an HTTPS proxy is raced with an available
// alternative proxy server.
TEST_P(QuicNetworkTransactionTest, QuicProxyWithRacing) {
base::HistogramTester histogram_tester;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"HTTPS mail.example.org:443", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "http", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// There is no need to set up main job, because no attempt will be made to
// speak to the proxy over TCP.
request_.url = GURL("http://mail.example.org/");
TestProxyDelegate test_proxy_delegate;
const HostPortPair host_port_pair("mail.example.org", 443);
test_proxy_delegate.set_alternative_proxy_server(
ProxyServer::FromPacString("QUIC mail.example.org:443"));
proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate);
CreateSession();
EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_quic());
// The main job needs to hang in order to guarantee that the alternative
// proxy server job will "win".
AddHangingNonAlternateProtocolSocketData();
SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 443);
// Verify that the alternative proxy server is not marked as broken.
EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_quic());
// Verify that the proxy server is not marked as broken.
EXPECT_TRUE(session_->proxy_resolution_service()->proxy_retry_info().empty());
histogram_tester.ExpectUniqueSample("Net.QuicAlternativeProxy.Usage",
1 /* ALTERNATIVE_PROXY_USAGE_WON_RACE */,
1);
}
TEST_P(QuicNetworkTransactionTest, HungAlternativeService) {
crypto_client_stream_factory_.set_handshake_mode(
MockCryptoClientStream::COLD_START);
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)};
SequencedSocketData http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// The QUIC transaction will not be allowed to complete.
MockWrite quic_writes[] = {MockWrite(SYNCHRONOUS, ERR_IO_PENDING, 1)};
MockRead quic_reads[] = {
MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0),
};
SequencedSocketData quic_data(quic_reads, quic_writes);
socket_factory_.AddSocketDataProvider(&quic_data);
// The HTTP transaction will complete.
SequencedSocketData http_data2(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data2);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
// Run the first request.
SendRequestAndExpectHttpResponse("hello world");
ASSERT_TRUE(http_data.AllReadDataConsumed());
ASSERT_TRUE(http_data.AllWriteDataConsumed());
// Now run the second request in which the QUIC socket hangs,
// and verify the the transaction continues over HTTP.
SendRequestAndExpectHttpResponse("hello world");
base::RunLoop().RunUntilIdle();
ASSERT_TRUE(http_data2.AllReadDataConsumed());
ASSERT_TRUE(http_data2.AllWriteDataConsumed());
ASSERT_TRUE(quic_data.AllReadDataConsumed());
}
TEST_P(QuicNetworkTransactionTest, ZeroRTTWithHttpRace) {
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
SendRequestAndExpectQuicResponse("hello!");
EXPECT_EQ(nullptr,
http_server_properties_.GetServerNetworkStats(
url::SchemeHostPort("https", request_.url.host(), 443)));
}
TEST_P(QuicNetworkTransactionTest, ZeroRTTWithNoHttpRace) {
MockQuicData mock_quic_data;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, GetRequestHeaders("GET", "https", "/")));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest, ZeroRTTWithProxy) {
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
// Since we are using a proxy, the QUIC job will not succeed.
MockWrite http_writes[] = {
MockWrite(SYNCHRONOUS, 0, "GET http://mail.example.org/ HTTP/1.1\r\n"),
MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"),
MockWrite(SYNCHRONOUS, 2, "Proxy-Connection: keep-alive\r\n\r\n")};
MockRead http_reads[] = {
MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"),
MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader),
MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)};
StaticSocketDataProvider http_data(http_reads, http_writes);
socket_factory_.AddSocketDataProvider(&http_data);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
request_.url = GURL("http://mail.example.org/");
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
SendRequestAndExpectHttpResponse("hello world");
}
TEST_P(QuicNetworkTransactionTest, ZeroRTTWithConfirmationRequired) {
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
EXPECT_THAT(callback.WaitForResult(), IsOk());
CheckWasQuicResponse(&trans);
CheckResponseData(&trans, "hello!");
}
TEST_P(QuicNetworkTransactionTest, ZeroRTTWithTooEarlyResponse) {
MockQuicData mock_quic_data;
quic::QuicStreamOffset client_header_stream_offset = 0;
quic::QuicStreamOffset server_header_stream_offset = 0;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, GetRequestHeaders("GET", "https", "/"),
&client_header_stream_offset));
mock_quic_data.AddRead(
ASYNC,
ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("425 TOO_EARLY"), &server_header_stream_offset));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndRstPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED, 1, 1, 1));
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
spdy::SpdySettingsIR settings_frame;
settings_frame.AddSetting(spdy::SETTINGS_MAX_HEADER_LIST_SIZE,
quic::kDefaultMaxUncompressedHeaderSize);
spdy::SpdySerializedFrame spdy_frame(
client_maker_.spdy_request_framer()->SerializeFrame(settings_frame));
mock_quic_data.AddWrite(
SYNCHRONOUS,
client_maker_.MakeDataPacket(
3, quic::QuicUtils::GetHeadersStreamId(version_), false, false,
client_header_stream_offset,
quic::QuicStringPiece(spdy_frame.data(), spdy_frame.size())));
client_header_stream_offset += spdy_frame.size();
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false,
true, GetRequestHeaders("GET", "https", "/"),
GetNthClientInitiatedBidirectionalStreamId(0),
&client_header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &server_header_stream_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
3, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 3, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Confirm the handshake after the 425 Too Early.
base::RunLoop().RunUntilIdle();
// The handshake hasn't been confirmed yet, so the retry should not have
// succeeded.
EXPECT_FALSE(callback.have_result());
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
EXPECT_THAT(callback.WaitForResult(), IsOk());
CheckWasQuicResponse(&trans);
CheckResponseData(&trans, "hello!");
}
TEST_P(QuicNetworkTransactionTest, ZeroRTTWithMultipleTooEarlyResponse) {
MockQuicData mock_quic_data;
quic::QuicStreamOffset client_header_stream_offset = 0;
quic::QuicStreamOffset server_header_stream_offset = 0;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, GetRequestHeaders("GET", "https", "/"),
&client_header_stream_offset));
mock_quic_data.AddRead(
ASYNC,
ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("425 TOO_EARLY"), &server_header_stream_offset));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndRstPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED, 1, 1, 1));
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE);
spdy::SpdySettingsIR settings_frame;
settings_frame.AddSetting(spdy::SETTINGS_MAX_HEADER_LIST_SIZE,
quic::kDefaultMaxUncompressedHeaderSize);
spdy::SpdySerializedFrame spdy_frame(
client_maker_.spdy_request_framer()->SerializeFrame(settings_frame));
mock_quic_data.AddWrite(
SYNCHRONOUS,
client_maker_.MakeDataPacket(
3, quic::QuicUtils::GetHeadersStreamId(version_), false, false,
client_header_stream_offset,
quic::QuicStringPiece(spdy_frame.data(), spdy_frame.size())));
client_header_stream_offset += spdy_frame.size();
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false,
true, GetRequestHeaders("GET", "https", "/"),
GetNthClientInitiatedBidirectionalStreamId(0),
&client_header_stream_offset));
mock_quic_data.AddRead(
ASYNC,
ConstructServerResponseHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("425 TOO_EARLY"), &server_header_stream_offset));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndRstPacket(
5, GetNthClientInitiatedBidirectionalStreamId(1),
quic::QUIC_STREAM_CANCELLED, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Confirm the handshake after the 425 Too Early.
base::RunLoop().RunUntilIdle();
// The handshake hasn't been confirmed yet, so the retry should not have
// succeeded.
EXPECT_FALSE(callback.have_result());
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
EXPECT_THAT(callback.WaitForResult(), IsOk());
const HttpResponseInfo* response = trans.GetResponseInfo();
ASSERT_TRUE(response != nullptr);
ASSERT_TRUE(response->headers.get() != nullptr);
EXPECT_EQ("HTTP/1.1 425 TOO_EARLY", response->headers->GetStatusLine());
EXPECT_TRUE(response->was_fetched_via_spdy);
EXPECT_TRUE(response->was_alpn_negotiated);
EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_),
response->connection_info);
}
TEST_P(QuicNetworkTransactionTest,
LogGranularQuicErrorCodeOnQuicProtocolErrorLocal) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
// Read a close connection packet with
// quic::QuicErrorCode: quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED from the peer.
mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
NetErrorDetails details;
EXPECT_EQ(quic::QUIC_NO_ERROR, details.quic_connection_error);
trans.PopulateNetErrorDetails(&details);
// Verify the error code logged is what sent by the peer.
EXPECT_EQ(quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED,
details.quic_connection_error);
}
TEST_P(QuicNetworkTransactionTest,
LogGranularQuicErrorCodeOnQuicProtocolErrorRemote) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
// Peer sending data from an non-existing stream causes this end to raise
// error and close connection.
mock_quic_data.AddRead(
ASYNC, ConstructServerRstPacket(
1, false, GetNthClientInitiatedBidirectionalStreamId(47),
quic::QUIC_STREAM_LAST_ERROR));
std::string quic_error_details = "Data for nonexistent stream";
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(
3, quic::QuicTime::Delta::Zero(), 1, 1, 1,
quic::QUIC_INVALID_STREAM_ID, quic_error_details));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
NetErrorDetails details;
EXPECT_EQ(quic::QUIC_NO_ERROR, details.quic_connection_error);
trans.PopulateNetErrorDetails(&details);
EXPECT_EQ(quic::QUIC_INVALID_STREAM_ID, details.quic_connection_error);
}
TEST_P(QuicNetworkTransactionTest, RstSteamErrorHandling) {
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
// Read the response headers, then a RST_STREAM frame.
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
mock_quic_data.AddRead(
ASYNC, ConstructServerRstPacket(
2, false, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data.
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Read the headers.
EXPECT_THAT(callback.WaitForResult(), IsOk());
const HttpResponseInfo* response = trans.GetResponseInfo();
ASSERT_TRUE(response != nullptr);
ASSERT_TRUE(response->headers.get() != nullptr);
EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
EXPECT_TRUE(response->was_fetched_via_spdy);
EXPECT_TRUE(response->was_alpn_negotiated);
EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_),
response->connection_info);
std::string response_data;
ASSERT_EQ(ERR_QUIC_PROTOCOL_ERROR, ReadTransaction(&trans, &response_data));
}
TEST_P(QuicNetworkTransactionTest, RstSteamBeforeHeaders) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerRstPacket(
1, false, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data.
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously. Of course, even though QUIC *could* perform a 0-RTT
// connection to the the server, in this test we require confirmation
// before encrypting so the HTTP job will still start.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
// Read the headers.
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocol) {
// Alternate-protocol job
std::unique_ptr<quic::QuicEncryptedPacket> close(
ConstructServerConnectionClosePacket(1));
MockRead quic_reads[] = {
MockRead(ASYNC, close->data(), close->length()),
MockRead(ASYNC, ERR_IO_PENDING), // No more data to read
MockRead(ASYNC, OK), // EOF
};
StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&quic_data);
// Main job which will succeed even though the alternate job fails.
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
AddQuicAlternateProtocolMapping(
MockCryptoClientStream::COLD_START_WITH_CHLO_SENT);
SendRequestAndExpectHttpResponse("hello from http");
ExpectBrokenAlternateProtocolMapping();
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocolReadError) {
// Alternate-protocol job
MockRead quic_reads[] = {
MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED),
};
StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&quic_data);
// Main job which will succeed even though the alternate job fails.
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START);
SendRequestAndExpectHttpResponse("hello from http");
ExpectBrokenAlternateProtocolMapping();
}
TEST_P(QuicNetworkTransactionTest, NoBrokenAlternateProtocolIfTcpFails) {
// Alternate-protocol job will fail when the session attempts to read.
MockRead quic_reads[] = {
MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED),
};
StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&quic_data);
// Main job will also fail.
MockRead http_reads[] = {
MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED),
};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
http_data.set_connect_data(MockConnect(ASYNC, ERR_SOCKET_NOT_CONNECTED));
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_SOCKET_NOT_CONNECTED));
ExpectQuicAlternateProtocolMapping();
}
TEST_P(QuicNetworkTransactionTest, DelayTCPOnStartWithQuicSupportOnSameIP) {
// Tests that TCP job is delayed and QUIC job does not require confirmation
// if QUIC was recently supported on the same IP on start.
// Set QUIC support on the last IP address, which is same with the local IP
// address. Require confirmation mode will be turned off immediately when
// local IP address is sorted out after we configure the UDP socket.
http_server_properties_.SetSupportsQuic(true, IPAddress(192, 0, 2, 33));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT);
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// No HTTP data is mocked as TCP job never starts in this case.
CreateSession();
// QuicStreamFactory by default requires confirmation on construction.
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
// Stall host resolution so that QUIC job will not succeed synchronously.
// Socket will not be configured immediately and QUIC support is not sorted
// out, TCP job will still be delayed as server properties indicates QUIC
// support on last IP address.
host_resolver_.set_synchronous_mode(false);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
EXPECT_THAT(trans.Start(&request_, callback.callback(), net_log_.bound()),
IsError(ERR_IO_PENDING));
// Complete host resolution in next message loop so that QUIC job could
// proceed.
base::RunLoop().RunUntilIdle();
EXPECT_THAT(callback.WaitForResult(), IsOk());
CheckWasQuicResponse(&trans);
CheckResponseData(&trans, "hello!");
}
TEST_P(QuicNetworkTransactionTest,
DelayTCPOnStartWithQuicSupportOnDifferentIP) {
// Tests that TCP job is delayed and QUIC job requires confirmation if QUIC
// was recently supported on a different IP address on start.
// Set QUIC support on the last IP address, which is different with the local
// IP address. Require confirmation mode will remain when local IP address is
// sorted out after we configure the UDP socket.
http_server_properties_.SetSupportsQuic(true, IPAddress(1, 2, 3, 4));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// No HTTP data is mocked as TCP job will be delayed and never starts.
CreateSession();
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
// Stall host resolution so that QUIC job could not proceed and unblocks TCP.
// Socket will not be configured immediately and QUIC support is not sorted
// out, TCP job will still be delayed as server properties indicates QUIC
// support on last IP address.
host_resolver_.set_synchronous_mode(false);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
EXPECT_THAT(trans.Start(&request_, callback.callback(), net_log_.bound()),
IsError(ERR_IO_PENDING));
// Complete host resolution in next message loop so that QUIC job could
// proceed.
base::RunLoop().RunUntilIdle();
// Explicitly confirm the handshake so that QUIC job could succeed.
crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent(
quic::QuicSession::HANDSHAKE_CONFIRMED);
EXPECT_THAT(callback.WaitForResult(), IsOk());
CheckWasQuicResponse(&trans);
CheckResponseData(&trans, "hello!");
}
TEST_P(QuicNetworkTransactionTest, NetErrorDetailsSetBeforeHandshake) {
// Test that NetErrorDetails is correctly populated, even if the
// handshake has not yet been confirmed and no stream has been created.
// QUIC job will pause. When resumed, it will fail.
MockQuicData mock_quic_data;
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);
mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// Main job will also fail.
MockRead http_reads[] = {
MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED),
};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
http_data.set_connect_data(MockConnect(ASYNC, ERR_SOCKET_NOT_CONNECTED));
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
// Require handshake confirmation to ensure that no QUIC streams are
// created, and to ensure that the TCP job does not wait for the QUIC
// job to fail before it starts.
session_->quic_stream_factory()->set_require_confirmation(true);
AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
// Allow the TCP job to fail.
base::RunLoop().RunUntilIdle();
// Now let the QUIC job fail.
mock_quic_data.Resume();
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
ExpectQuicAlternateProtocolMapping();
NetErrorDetails details;
trans.PopulateNetErrorDetails(&details);
EXPECT_EQ(quic::QUIC_PACKET_READ_ERROR, details.quic_connection_error);
}
TEST_P(QuicNetworkTransactionTest, FailedZeroRttBrokenAlternateProtocol) {
// Alternate-protocol job
MockRead quic_reads[] = {
MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED),
};
StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&quic_data);
// Second Alternate-protocol job which will race with the TCP job.
StaticSocketDataProvider quic_data2(quic_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&quic_data2);
// Final job that will proceed when the QUIC job fails.
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
SendRequestAndExpectHttpResponse("hello from http");
ExpectBrokenAlternateProtocolMapping();
EXPECT_TRUE(quic_data.AllReadDataConsumed());
EXPECT_TRUE(quic_data.AllWriteDataConsumed());
}
TEST_P(QuicNetworkTransactionTest, DISABLED_HangingZeroRttFallback) {
// Alternate-protocol job
MockRead quic_reads[] = {
MockRead(SYNCHRONOUS, ERR_IO_PENDING),
};
StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&quic_data);
// Main job that will proceed when the QUIC job fails.
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT);
SendRequestAndExpectHttpResponse("hello from http");
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocolOnConnectFailure) {
// Alternate-protocol job will fail before creating a QUIC session.
StaticSocketDataProvider quic_data;
quic_data.set_connect_data(MockConnect(SYNCHRONOUS, ERR_CONNECTION_FAILED));
socket_factory_.AddSocketDataProvider(&quic_data);
// Main job which will succeed even though the alternate job fails.
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START);
SendRequestAndExpectHttpResponse("hello from http");
ExpectBrokenAlternateProtocolMapping();
}
TEST_P(QuicNetworkTransactionTest, ConnectionCloseDuringConnect) {
if (version_ >= quic::QUIC_VERSION_47) {
// TODO(nharper): reenable once MakeDummyCHLOPacket() fixed
return;
}
MockQuicData mock_quic_data;
mock_quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeDummyCHLOPacket(1));
mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// When the QUIC connection fails, we will try the request again over HTTP.
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1",
"");
CreateSession();
// TODO(rch): Check if we need a 0RTT version of ConnectionCloseDuringConnect
AddQuicAlternateProtocolMapping(
MockCryptoClientStream::COLD_START_WITH_CHLO_SENT);
SendRequestAndExpectHttpResponse("hello world");
}
// For an alternative proxy that supports QUIC, test that the request is
// successfully fetched by the main job when the alternate proxy job encounters
// an error.
TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxySocketNotConnected) {
TestAlternativeProxy(ERR_SOCKET_NOT_CONNECTED);
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyConnectionFailed) {
TestAlternativeProxy(ERR_CONNECTION_FAILED);
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyConnectionTimedOut) {
TestAlternativeProxy(ERR_CONNECTION_TIMED_OUT);
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyConnectionRefused) {
TestAlternativeProxy(ERR_CONNECTION_REFUSED);
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyQuicHandshakeFailed) {
TestAlternativeProxy(ERR_QUIC_HANDSHAKE_FAILED);
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyQuicProtocolError) {
TestAlternativeProxy(ERR_QUIC_PROTOCOL_ERROR);
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyIOPending) {
TestAlternativeProxy(ERR_IO_PENDING);
}
TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyAddressUnreachable) {
TestAlternativeProxy(ERR_ADDRESS_UNREACHABLE);
}
TEST_P(QuicNetworkTransactionTest, ConnectionCloseDuringConnectProxy) {
MockQuicData mock_quic_data;
mock_quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeDummyCHLOPacket(1));
mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, GetRequestHeaders("GET", "https", "/")));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 1, 1, 1));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// When the QUIC connection fails, we will try the request again over HTTP.
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
TestProxyDelegate test_proxy_delegate;
const HostPortPair host_port_pair("myproxy.org", 443);
test_proxy_delegate.set_alternative_proxy_server(
ProxyServer::FromPacString("QUIC myproxy.org:443"));
EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_quic());
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"HTTPS myproxy.org:443", TRAFFIC_ANNOTATION_FOR_TESTS);
proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate);
request_.url = GURL("http://mail.example.org/");
// In order for a new QUIC session to be established via alternate-protocol
// without racing an HTTP connection, we need the host resolution to happen
// synchronously.
host_resolver_.set_synchronous_mode(true);
host_resolver_.rules()->AddIPLiteralRule("myproxy.org", "192.168.0.1", "");
CreateSession();
crypto_client_stream_factory_.set_handshake_mode(
MockCryptoClientStream::COLD_START_WITH_CHLO_SENT);
SendRequestAndExpectHttpResponseFromProxy("hello world", true, 443);
EXPECT_THAT(session_->proxy_resolution_service()->proxy_retry_info(),
ElementsAre(Key("quic://myproxy.org:443")));
}
TEST_P(QuicNetworkTransactionTest, SecureResourceOverSecureQuic) {
client_maker_.set_hostname("www.example.org");
EXPECT_FALSE(
test_socket_performance_watcher_factory_.rtt_notification_received());
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data.
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
request_.url = GURL("https://www.example.org:443");
AddHangingNonAlternateProtocolSocketData();
CreateSession();
AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE);
SendRequestAndExpectQuicResponse("hello!");
EXPECT_TRUE(
test_socket_performance_watcher_factory_.rtt_notification_received());
}
// TODO(zhongyi): disabled this broken test as it was not testing the correct
// code path. Need a fix to re-enable this test, tracking at crbug.com/704596.
TEST_P(QuicNetworkTransactionTest,
DISABLED_QuicUploadToAlternativeProxyServer) {
base::HistogramTester histogram_tester;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"HTTPS mail.example.org:443", TRAFFIC_ANNOTATION_FOR_TESTS);
TestProxyDelegate test_proxy_delegate;
test_proxy_delegate.set_alternative_proxy_server(
ProxyServer::FromPacString("QUIC mail.example.org:443"));
proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate);
request_.url = GURL("http://mail.example.org/");
MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)};
MockWrite writes[] = {MockWrite(SYNCHRONOUS, ERR_FAILED, 1)};
SequencedSocketData socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
request_.method = "POST";
ChunkedUploadDataStream upload_data(0);
upload_data.AppendData("1", 1, true);
request_.upload_data_stream = &upload_data;
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
EXPECT_NE(OK, callback.WaitForResult());
// Verify that the alternative proxy server is not marked as broken.
EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_quic());
// Verify that the proxy server is not marked as broken.
EXPECT_TRUE(session_->proxy_resolution_service()->proxy_retry_info().empty());
histogram_tester.ExpectUniqueSample("Net.QuicAlternativeProxy.Usage",
1 /* ALTERNATIVE_PROXY_USAGE_WON_RACE */,
1);
}
TEST_P(QuicNetworkTransactionTest, QuicUpload) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)};
MockWrite writes[] = {MockWrite(SYNCHRONOUS, ERR_FAILED, 1)};
SequencedSocketData socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
request_.method = "POST";
ChunkedUploadDataStream upload_data(0);
upload_data.AppendData("1", 1, true);
request_.upload_data_stream = &upload_data;
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
EXPECT_NE(OK, callback.WaitForResult());
}
TEST_P(QuicNetworkTransactionTest, QuicUploadWriteError) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
ScopedMockNetworkChangeNotifier network_change_notifier;
MockNetworkChangeNotifier* mock_ncn =
network_change_notifier.mock_network_change_notifier();
mock_ncn->ForceNetworkHandlesSupported();
mock_ncn->SetConnectedNetworksList(
{kDefaultNetworkForTests, kNewNetworkForTests});
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
session_params_.quic_migrate_sessions_on_network_change_v2 = true;
MockQuicData socket_data;
socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);
quic::QuicStreamOffset offset = 0;
socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset));
socket_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, false,
GetRequestHeaders("POST", "https", "/"), &offset));
socket_data.AddWrite(SYNCHRONOUS, ERR_FAILED);
socket_data.AddSocketDataToFactory(&socket_factory_);
MockQuicData socket_data2;
socket_data2.AddConnect(SYNCHRONOUS, ERR_ADDRESS_INVALID);
socket_data2.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
request_.method = "POST";
ChunkedUploadDataStream upload_data(0);
request_.upload_data_stream = &upload_data;
std::unique_ptr<HttpNetworkTransaction> trans(
new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get()));
TestCompletionCallback callback;
int rv = trans->Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
base::RunLoop().RunUntilIdle();
upload_data.AppendData("1", 1, true);
base::RunLoop().RunUntilIdle();
EXPECT_NE(OK, callback.WaitForResult());
trans.reset();
session_.reset();
}
TEST_P(QuicNetworkTransactionTest, RetryAfterAsyncNoBufferSpace) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData socket_data;
quic::QuicStreamOffset offset = 0;
socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset));
socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE);
socket_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, GetRequestHeaders("GET", "https", "/"), &offset));
socket_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
socket_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
socket_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
socket_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeAckAndConnectionClosePacket(
4, false, quic::QuicTime::Delta::FromMilliseconds(0), 2,
1, 1, quic::QUIC_CONNECTION_CANCELLED, "net error"));
socket_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
SendRequestAndExpectQuicResponse("hello!");
session_.reset();
}
TEST_P(QuicNetworkTransactionTest, RetryAfterSynchronousNoBufferSpace) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData socket_data;
quic::QuicStreamOffset offset = 0;
socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset));
socket_data.AddWrite(SYNCHRONOUS, ERR_NO_BUFFER_SPACE);
socket_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, GetRequestHeaders("GET", "https", "/"), &offset));
socket_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
socket_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
socket_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
socket_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeAckAndConnectionClosePacket(
4, false, quic::QuicTime::Delta::FromMilliseconds(0), 2,
1, 1, quic::QUIC_CONNECTION_CANCELLED, "net error"));
socket_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
SendRequestAndExpectQuicResponse("hello!");
session_.reset();
}
TEST_P(QuicNetworkTransactionTest, MaxRetriesAfterAsyncNoBufferSpace) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData socket_data;
quic::QuicStreamOffset offset = 0;
socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset));
for (int i = 0; i < 13; ++i) { // 12 retries then one final failure.
socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE);
}
socket_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetTaskRunner(session_->quic_stream_factory(),
quic_task_runner_.get());
quic::QuicTime start = clock_.Now();
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
while (!callback.have_result()) {
base::RunLoop().RunUntilIdle();
quic_task_runner_->RunUntilIdle();
}
ASSERT_TRUE(callback.have_result());
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
EXPECT_TRUE(socket_data.AllReadDataConsumed());
EXPECT_TRUE(socket_data.AllWriteDataConsumed());
// Backoff should take between 4 - 5 seconds.
EXPECT_TRUE(clock_.Now() - start > quic::QuicTime::Delta::FromSeconds(4));
EXPECT_TRUE(clock_.Now() - start < quic::QuicTime::Delta::FromSeconds(5));
}
TEST_P(QuicNetworkTransactionTest, MaxRetriesAfterSynchronousNoBufferSpace) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData socket_data;
quic::QuicStreamOffset offset = 0;
socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset));
for (int i = 0; i < 13; ++i) { // 12 retries then one final failure.
socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE);
}
socket_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
// Use a TestTaskRunner to avoid waiting in real time for timeouts.
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetTaskRunner(session_->quic_stream_factory(),
quic_task_runner_.get());
quic::QuicTime start = clock_.Now();
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
while (!callback.have_result()) {
base::RunLoop().RunUntilIdle();
quic_task_runner_->RunUntilIdle();
}
ASSERT_TRUE(callback.have_result());
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
EXPECT_TRUE(socket_data.AllReadDataConsumed());
EXPECT_TRUE(socket_data.AllWriteDataConsumed());
// Backoff should take between 4 - 5 seconds.
EXPECT_TRUE(clock_.Now() - start > quic::QuicTime::Delta::FromSeconds(4));
EXPECT_TRUE(clock_.Now() - start < quic::QuicTime::Delta::FromSeconds(5));
}
TEST_P(QuicNetworkTransactionTest, NoMigrationForMsgTooBig) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
const quic::QuicString error_details =
quic::QuicStrCat("Write failed with error: ", ERR_MSG_TOO_BIG, " (",
#if defined(STARBOARD)
// This reflects the change in quic_connection.cc to
// fix the strerror leak.
ERR_MSG_TOO_BIG, ")");
#else
strerror(ERR_MSG_TOO_BIG), ")");
#endif
MockQuicData socket_data;
quic::QuicStreamOffset offset = 0;
socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);
socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset));
socket_data.AddWrite(SYNCHRONOUS, ERR_MSG_TOO_BIG);
// Connection close packet will be sent for MSG_TOO_BIG.
socket_data.AddWrite(
SYNCHRONOUS, client_maker_.MakeConnectionClosePacket(
3, true, quic::QUIC_PACKET_WRITE_ERROR, error_details));
socket_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
base::RunLoop().RunUntilIdle();
ASSERT_TRUE(callback.have_result());
EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
EXPECT_TRUE(socket_data.AllReadDataConsumed());
EXPECT_TRUE(socket_data.AllWriteDataConsumed());
}
// Adds coverage to catch regression such as https://crbug.com/622043
TEST_P(QuicNetworkTransactionTest, QuicServerPush) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
uint64_t client_packet_number = 1;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(client_packet_number++,
&header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0),
true, true, GetRequestHeaders("GET", "https", "/"),
&header_stream_offset));
quic::QuicStreamOffset server_header_offset = 0;
mock_quic_data.AddRead(
ASYNC, ConstructServerPushPromisePacket(
1, GetNthClientInitiatedBidirectionalStreamId(0),
GetNthServerInitiatedUnidirectionalStreamId(0), false,
GetRequestHeaders("GET", "https", "/pushed.jpg"),
&server_header_offset, &server_maker_));
if (client_headers_include_h2_stream_dependency_ &&
version_ >= quic::QUIC_VERSION_43) {
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientPriorityPacket(
client_packet_number++, false,
GetNthServerInitiatedUnidirectionalStreamId(0),
GetNthClientInitiatedBidirectionalStreamId(0),
DEFAULT_PRIORITY, &header_stream_offset));
}
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &server_header_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1, 1));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthServerInitiatedUnidirectionalStreamId(0), false,
false, GetResponseHeaders("200 OK"), &server_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 4, 3, 1));
quic::QuicString header2 = ConstructDataHeader(10);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
5, GetNthServerInitiatedUnidirectionalStreamId(0), false, true,
0, header2 + "and hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndRstPacket(
client_packet_number++,
GetNthServerInitiatedUnidirectionalStreamId(0),
quic::QUIC_RST_ACKNOWLEDGEMENT, 5, 5, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
// PUSH_PROMISE handling in the http layer gets exercised here.
SendRequestAndExpectQuicResponse("hello!");
request_.url = GURL("https://mail.example.org/pushed.jpg");
SendRequestAndExpectQuicResponse("and hello!");
// Check that the NetLog was filled reasonably.
TestNetLogEntry::List entries;
net_log_.GetEntries(&entries);
EXPECT_LT(0u, entries.size());
// Check that we logged a QUIC_HTTP_STREAM_ADOPTED_PUSH_STREAM
int pos = ExpectLogContainsSomewhere(
entries, 0, NetLogEventType::QUIC_HTTP_STREAM_ADOPTED_PUSH_STREAM,
NetLogEventPhase::NONE);
EXPECT_LT(0, pos);
}
// Regression test for http://crbug.com/719461 in which a promised stream
// is closed before the pushed headers arrive, but after the connection
// is closed and before the callbacks are executed.
TEST_P(QuicNetworkTransactionTest, CancelServerPushAfterConnectionClose) {
session_params_.retry_without_alt_svc_on_quic_errors = false;
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
uint64_t client_packet_number = 1;
// Initial SETTINGS frame.
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(client_packet_number++,
&header_stream_offset));
// First request: GET https://mail.example.org/
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0),
true, true, GetRequestHeaders("GET", "https", "/"),
&header_stream_offset));
quic::QuicStreamOffset server_header_offset = 0;
// Server promise for: https://mail.example.org/pushed.jpg
mock_quic_data.AddRead(
ASYNC, ConstructServerPushPromisePacket(
1, GetNthClientInitiatedBidirectionalStreamId(0),
GetNthServerInitiatedUnidirectionalStreamId(0), false,
GetRequestHeaders("GET", "https", "/pushed.jpg"),
&server_header_offset, &server_maker_));
if (client_headers_include_h2_stream_dependency_ &&
version_ >= quic::QUIC_VERSION_43) {
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientPriorityPacket(
client_packet_number++, false,
GetNthServerInitiatedUnidirectionalStreamId(0),
GetNthClientInitiatedBidirectionalStreamId(0),
DEFAULT_PRIORITY, &header_stream_offset));
}
// Response headers for first request.
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &server_header_offset));
// Client ACKs the response headers.
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1, 1));
// Response body for first request.
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
// Write error for the third request.
mock_quic_data.AddWrite(SYNCHRONOUS, ERR_FAILED);
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
// Send a request which triggers a push promise from the server.
SendRequestAndExpectQuicResponse("hello!");
// Start a push transaction that will be cancelled after the connection
// is closed, but before the callback is executed.
request_.url = GURL("https://mail.example.org/pushed.jpg");
auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
session_.get());
TestCompletionCallback callback2;
int rv = trans2->Start(&request_, callback2.callback(), net_log_.bound());
EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
base::RunLoop().RunUntilIdle();
// Cause the connection to close on a write error.
HttpRequestInfo request3;
request3.method = "GET";
request3.url = GURL("https://mail.example.org/");
request3.load_flags = 0;
request3.traffic_annotation =
net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
HttpNetworkTransaction trans3(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback3;
EXPECT_THAT(trans3.Start(&request3, callback3.callback(), net_log_.bound()),
IsError(ERR_IO_PENDING));
base::RunLoop().RunUntilIdle();
// When |trans2| is destroyed, the underlying stream will be closed.
EXPECT_FALSE(callback2.have_result());
trans2 = nullptr;
EXPECT_THAT(callback3.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR));
}
TEST_P(QuicNetworkTransactionTest, QuicForceHolBlocking) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset offset = 0;
int write_packet_index = 1;
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(
write_packet_index++, &offset));
quic::QuicString header = ConstructDataHeader(1);
if (version_ != quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersAndDataFramesPacket(
write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0),
true, true, DEFAULT_PRIORITY,
GetRequestHeaders("POST", "https", "/"), 0, &offset, nullptr,
{"1"}));
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersAndDataFramesPacket(
write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0),
true, true, DEFAULT_PRIORITY,
GetRequestHeaders("POST", "https", "/"), 0, &offset, nullptr,
{header, "1"}));
}
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header2 = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header2 + "hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(write_packet_index++, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
request_.method = "POST";
ChunkedUploadDataStream upload_data(0);
upload_data.AppendData("1", 1, true);
request_.upload_data_stream = &upload_data;
SendRequestAndExpectQuicResponse("hello!");
}
class QuicURLRequestContext : public URLRequestContext {
public:
QuicURLRequestContext(std::unique_ptr<HttpNetworkSession> session,
MockClientSocketFactory* socket_factory)
: storage_(this) {
socket_factory_ = socket_factory;
storage_.set_host_resolver(std::make_unique<MockHostResolver>());
storage_.set_cert_verifier(std::make_unique<MockCertVerifier>());
storage_.set_transport_security_state(
std::make_unique<TransportSecurityState>());
storage_.set_proxy_resolution_service(
ProxyResolutionService::CreateDirect());
storage_.set_ssl_config_service(
std::make_unique<SSLConfigServiceDefaults>());
storage_.set_http_auth_handler_factory(
#if defined(COBALT_QUIC46)
// m70 code.
HttpAuthHandlerFactory::CreateDefault(nullptr));
#else
HttpAuthHandlerFactory::CreateDefault());
#endif
storage_.set_http_server_properties(
std::make_unique<HttpServerPropertiesImpl>());
storage_.set_job_factory(std::make_unique<URLRequestJobFactoryImpl>());
storage_.set_http_network_session(std::move(session));
#ifdef HTTP_CACHE_DISABLED_FOR_STARBOARD
storage_.set_http_transaction_factory(
std::make_unique<HttpNetworkLayer>(storage_.http_network_session()));
#else
storage_.set_http_transaction_factory(std::make_unique<HttpCache>(
storage_.http_network_session(), HttpCache::DefaultBackend::InMemory(0),
false));
#endif
}
~QuicURLRequestContext() override { AssertNoURLRequests(); }
MockClientSocketFactory& socket_factory() { return *socket_factory_; }
private:
MockClientSocketFactory* socket_factory_;
URLRequestContextStorage storage_;
};
TEST_P(QuicNetworkTransactionTest, RawHeaderSizeSuccessfullRequest) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
spdy::SpdyHeaderBlock headers(GetRequestHeaders("GET", "https", "/"));
headers["user-agent"] = "";
headers["accept-encoding"] = "gzip, deflate";
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
true, std::move(headers), &header_stream_offset));
quic::QuicStreamOffset expected_raw_header_response_size = 0;
mock_quic_data.AddRead(
ASYNC,
ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &expected_raw_header_response_size));
quic::QuicString header = ConstructDataHeader(18);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, "Main Resource Data"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, 0); // EOF
CreateSession();
TestDelegate delegate;
QuicURLRequestContext quic_url_request_context(std::move(session_),
&socket_factory_);
mock_quic_data.AddSocketDataToFactory(
&quic_url_request_context.socket_factory());
TestNetworkDelegate network_delegate;
quic_url_request_context.set_network_delegate(&network_delegate);
std::unique_ptr<URLRequest> request(quic_url_request_context.CreateRequest(
GURL("https://mail.example.org/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS));
quic_url_request_context.socket_factory().AddSSLSocketDataProvider(
&ssl_data_);
request->Start();
delegate.RunUntilComplete();
EXPECT_LT(0, request->GetTotalSentBytes());
EXPECT_LT(0, request->GetTotalReceivedBytes());
EXPECT_EQ(network_delegate.total_network_bytes_sent(),
request->GetTotalSentBytes());
EXPECT_EQ(network_delegate.total_network_bytes_received(),
request->GetTotalReceivedBytes());
EXPECT_EQ(static_cast<int>(expected_raw_header_response_size),
request->raw_header_size());
// Pump the message loop to allow all data to be consumed.
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
TEST_P(QuicNetworkTransactionTest, RawHeaderSizeSuccessfullPushHeadersFirst) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
uint64_t client_packet_number = 1;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(client_packet_number++,
&header_stream_offset));
spdy::SpdyHeaderBlock headers(GetRequestHeaders("GET", "https", "/"));
headers["user-agent"] = "";
headers["accept-encoding"] = "gzip, deflate";
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0),
true, true, std::move(headers), &header_stream_offset));
quic::QuicStreamOffset server_header_offset = 0;
quic::QuicStreamOffset expected_raw_header_response_size = 0;
mock_quic_data.AddRead(
ASYNC, ConstructServerPushPromisePacket(
1, GetNthClientInitiatedBidirectionalStreamId(0),
GetNthServerInitiatedUnidirectionalStreamId(0), false,
GetRequestHeaders("GET", "https", "/pushed.jpg"),
&server_header_offset, &server_maker_));
if (client_headers_include_h2_stream_dependency_ &&
version_ >= quic::QUIC_VERSION_43) {
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientPriorityPacket(
client_packet_number++, false,
GetNthServerInitiatedUnidirectionalStreamId(0),
GetNthClientInitiatedBidirectionalStreamId(0),
DEFAULT_PRIORITY, &header_stream_offset));
}
expected_raw_header_response_size = server_header_offset;
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &server_header_offset));
expected_raw_header_response_size =
server_header_offset - expected_raw_header_response_size;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1, 1));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthServerInitiatedUnidirectionalStreamId(0), false,
false, GetResponseHeaders("200 OK"), &server_header_offset));
quic::QuicString header = ConstructDataHeader(20);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthServerInitiatedUnidirectionalStreamId(0), false, true,
0, header + "Pushed Resource Data"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 4, 3, 1));
quic::QuicString header2 = ConstructDataHeader(18);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
5, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header2 + "Main Resource Data"));
mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(6));
CreateSession();
TestDelegate delegate;
QuicURLRequestContext quic_url_request_context(std::move(session_),
&socket_factory_);
mock_quic_data.AddSocketDataToFactory(
&quic_url_request_context.socket_factory());
TestNetworkDelegate network_delegate;
quic_url_request_context.set_network_delegate(&network_delegate);
std::unique_ptr<URLRequest> request(quic_url_request_context.CreateRequest(
GURL("https://mail.example.org/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS));
quic_url_request_context.socket_factory().AddSSLSocketDataProvider(
&ssl_data_);
request->Start();
delegate.RunUntilComplete();
EXPECT_LT(0, request->GetTotalSentBytes());
EXPECT_LT(0, request->GetTotalReceivedBytes());
EXPECT_EQ(network_delegate.total_network_bytes_sent(),
request->GetTotalSentBytes());
EXPECT_EQ(network_delegate.total_network_bytes_received(),
request->GetTotalReceivedBytes());
EXPECT_EQ(static_cast<int>(expected_raw_header_response_size),
request->raw_header_size());
// Pump the message loop to allow all data to be consumed.
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
TEST_P(QuicNetworkTransactionTest, HostInWhitelist) {
session_params_.quic_host_whitelist.insert("mail.example.org");
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectQuicResponse("hello!");
}
TEST_P(QuicNetworkTransactionTest, HostNotInWhitelist) {
session_params_.quic_host_whitelist.insert("mail.example.com");
MockRead http_reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader),
MockRead("hello world"),
MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
MockRead(ASYNC, OK)};
StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
socket_factory_.AddSocketDataProvider(&http_data);
AddCertificate(&ssl_data_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
AddHangingNonAlternateProtocolSocketData();
CreateSession();
SendRequestAndExpectHttpResponse("hello world");
SendRequestAndExpectHttpResponse("hello world");
}
class QuicNetworkTransactionWithDestinationTest
: public PlatformTest,
public ::testing::WithParamInterface<PoolingTestParams>,
public WithScopedTaskEnvironment {
protected:
QuicNetworkTransactionWithDestinationTest()
: version_(GetParam().version),
client_headers_include_h2_stream_dependency_(
GetParam().client_headers_include_h2_stream_dependency),
supported_versions_(quic::test::SupportedTransportVersions(version_)),
destination_type_(GetParam().destination_type),
cert_transparency_verifier_(new MultiLogCTVerifier()),
ssl_config_service_(new SSLConfigServiceDefaults),
proxy_resolution_service_(ProxyResolutionService::CreateDirect()),
#if defined(COBALT_QUIC46)
// m70 code.
auth_handler_factory_(
HttpAuthHandlerFactory::CreateDefault(nullptr)),
#else
auth_handler_factory_(HttpAuthHandlerFactory::CreateDefault()),
#endif
random_generator_(0),
ssl_data_(ASYNC, OK) {}
void SetUp() override {
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
HttpNetworkSession::Params session_params;
session_params.enable_quic = true;
session_params.quic_allow_remote_alt_svc = true;
session_params.quic_supported_versions = supported_versions_;
session_params.quic_headers_include_h2_stream_dependency =
client_headers_include_h2_stream_dependency_;
HttpNetworkSession::Context session_context;
clock_.AdvanceTime(quic::QuicTime::Delta::FromMilliseconds(20));
session_context.quic_clock = &clock_;
crypto_client_stream_factory_.set_handshake_mode(
MockCryptoClientStream::CONFIRM_HANDSHAKE);
session_context.quic_crypto_client_stream_factory =
&crypto_client_stream_factory_;
session_context.quic_random = &random_generator_;
session_context.client_socket_factory = &socket_factory_;
session_context.host_resolver = &host_resolver_;
session_context.cert_verifier = &cert_verifier_;
session_context.transport_security_state = &transport_security_state_;
session_context.cert_transparency_verifier =
cert_transparency_verifier_.get();
session_context.ct_policy_enforcer = &ct_policy_enforcer_;
session_context.socket_performance_watcher_factory =
&test_socket_performance_watcher_factory_;
session_context.ssl_config_service = ssl_config_service_.get();
session_context.proxy_resolution_service = proxy_resolution_service_.get();
session_context.http_auth_handler_factory = auth_handler_factory_.get();
session_context.http_server_properties = &http_server_properties_;
session_.reset(new HttpNetworkSession(session_params, session_context));
session_->quic_stream_factory()->set_require_confirmation(true);
}
void TearDown() override {
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
// Empty the current queue.
base::RunLoop().RunUntilIdle();
PlatformTest::TearDown();
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
session_.reset();
}
void SetQuicAlternativeService(const std::string& origin) {
HostPortPair destination;
switch (destination_type_) {
case SAME_AS_FIRST:
destination = HostPortPair(origin1_, 443);
break;
case SAME_AS_SECOND:
destination = HostPortPair(origin2_, 443);
break;
case DIFFERENT:
destination = HostPortPair(kDifferentHostname, 443);
break;
}
AlternativeService alternative_service(kProtoQUIC, destination);
base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1);
http_server_properties_.SetQuicAlternativeService(
url::SchemeHostPort("https", origin, 443), alternative_service,
expiration, supported_versions_);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientRequestHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
quic::QuicStreamOffset* offset,
QuicTestPacketMaker* maker) {
return ConstructClientRequestHeadersPacket(
packet_number, stream_id, should_include_version, 0, offset, maker);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientRequestHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
quic::QuicStreamId parent_stream_id,
quic::QuicStreamOffset* offset,
QuicTestPacketMaker* maker) {
spdy::SpdyPriority priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
spdy::SpdyHeaderBlock headers(
maker->GetRequestHeaders("GET", "https", "/"));
return maker->MakeRequestHeadersPacketWithOffsetTracking(
packet_number, stream_id, should_include_version, true, priority,
std::move(headers), parent_stream_id, offset);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructClientRequestHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
bool should_include_version,
QuicTestPacketMaker* maker) {
return ConstructClientRequestHeadersPacket(
packet_number, stream_id, should_include_version, nullptr, maker);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructServerResponseHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
quic::QuicStreamOffset* offset,
QuicTestPacketMaker* maker) {
spdy::SpdyHeaderBlock headers(maker->GetResponseHeaders("200 OK"));
return maker->MakeResponseHeadersPacketWithOffsetTracking(
packet_number, stream_id, false, false, std::move(headers), offset);
}
std::unique_ptr<quic::QuicEncryptedPacket>
ConstructServerResponseHeadersPacket(uint64_t packet_number,
quic::QuicStreamId stream_id,
QuicTestPacketMaker* maker) {
return ConstructServerResponseHeadersPacket(packet_number, stream_id,
nullptr, maker);
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerDataPacket(
uint64_t packet_number,
quic::QuicStreamId stream_id,
QuicTestPacketMaker* maker) {
quic::QuicString header = "";
if (version_ == quic::QUIC_VERSION_99) {
quic::HttpEncoder encoder;
std::unique_ptr<char[]> buffer;
auto header_length = encoder.SerializeDataFrameHeader(5, &buffer);
header = quic::QuicString(buffer.get(), header_length);
}
return maker->MakeDataPacket(packet_number, stream_id, false, true, 0,
header + "hello");
}
std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckPacket(
uint64_t packet_number,
uint64_t largest_received,
uint64_t smallest_received,
uint64_t least_unacked,
QuicTestPacketMaker* maker) {
return maker->MakeAckPacket(packet_number, largest_received,
smallest_received, least_unacked, true);
}
std::unique_ptr<quic::QuicReceivedPacket> ConstructInitialSettingsPacket(
uint64_t packet_number,
quic::QuicStreamOffset* offset,
QuicTestPacketMaker* maker) {
return maker->MakeInitialSettingsPacket(packet_number, offset);
}
void AddRefusedSocketData() {
std::unique_ptr<StaticSocketDataProvider> refused_data(
new StaticSocketDataProvider());
MockConnect refused_connect(SYNCHRONOUS, ERR_CONNECTION_REFUSED);
refused_data->set_connect_data(refused_connect);
socket_factory_.AddSocketDataProvider(refused_data.get());
static_socket_data_provider_vector_.push_back(std::move(refused_data));
}
void AddHangingSocketData() {
std::unique_ptr<StaticSocketDataProvider> hanging_data(
new StaticSocketDataProvider());
MockConnect hanging_connect(SYNCHRONOUS, ERR_IO_PENDING);
hanging_data->set_connect_data(hanging_connect);
socket_factory_.AddSocketDataProvider(hanging_data.get());
static_socket_data_provider_vector_.push_back(std::move(hanging_data));
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
}
bool AllDataConsumed() {
for (const auto& socket_data_ptr : static_socket_data_provider_vector_) {
if (!socket_data_ptr->AllReadDataConsumed() ||
!socket_data_ptr->AllWriteDataConsumed()) {
return false;
}
}
return true;
}
void SendRequestAndExpectQuicResponse(const std::string& host) {
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HttpRequestInfo request;
std::string url("https://");
url.append(host);
request.url = GURL(url);
request.load_flags = 0;
request.method = "GET";
request.traffic_annotation =
net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
TestCompletionCallback callback;
int rv = trans.Start(&request, callback.callback(), net_log_.bound());
EXPECT_THAT(callback.GetResult(rv), IsOk());
std::string response_data;
ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
EXPECT_EQ("hello", response_data);
const HttpResponseInfo* response = trans.GetResponseInfo();
ASSERT_TRUE(response != nullptr);
ASSERT_TRUE(response->headers.get() != nullptr);
EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
EXPECT_TRUE(response->was_fetched_via_spdy);
EXPECT_TRUE(response->was_alpn_negotiated);
EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_),
response->connection_info);
#if defined(COBALT_QUIC46)
EXPECT_EQ(443, response->socket_address.port());
#else
EXPECT_EQ(443, response->remote_endpoint.port());
#endif
}
quic::QuicStreamId GetNthClientInitiatedBidirectionalStreamId(int n) {
return quic::test::GetNthClientInitiatedBidirectionalStreamId(version_, n);
}
quic::MockClock clock_;
const quic::QuicTransportVersion version_;
const bool client_headers_include_h2_stream_dependency_;
quic::QuicTransportVersionVector supported_versions_;
DestinationType destination_type_;
std::string origin1_;
std::string origin2_;
std::unique_ptr<HttpNetworkSession> session_;
MockClientSocketFactory socket_factory_;
MockHostResolver host_resolver_;
MockCertVerifier cert_verifier_;
TransportSecurityState transport_security_state_;
std::unique_ptr<CTVerifier> cert_transparency_verifier_;
DefaultCTPolicyEnforcer ct_policy_enforcer_;
TestSocketPerformanceWatcherFactory test_socket_performance_watcher_factory_;
std::unique_ptr<SSLConfigServiceDefaults> ssl_config_service_;
std::unique_ptr<ProxyResolutionService> proxy_resolution_service_;
std::unique_ptr<HttpAuthHandlerFactory> auth_handler_factory_;
quic::test::MockRandom random_generator_;
HttpServerPropertiesImpl http_server_properties_;
BoundTestNetLog net_log_;
MockCryptoClientStreamFactory crypto_client_stream_factory_;
std::vector<std::unique_ptr<StaticSocketDataProvider>>
static_socket_data_provider_vector_;
SSLSocketDataProvider ssl_data_;
};
INSTANTIATE_TEST_SUITE_P(VersionIncludeStreamDependencySequence,
QuicNetworkTransactionWithDestinationTest,
::testing::ValuesIn(GetPoolingTestParams()));
// A single QUIC request fails because the certificate does not match the origin
// hostname, regardless of whether it matches the alternative service hostname.
TEST_P(QuicNetworkTransactionWithDestinationTest, InvalidCertificate) {
if (destination_type_ == DIFFERENT)
return;
GURL url("https://mail.example.com/");
origin1_ = url.host();
// Not used for requests, but this provides a test case where the certificate
// is valid for the hostname of the alternative service.
origin2_ = "mail.example.org";
SetQuicAlternativeService(origin1_);
scoped_refptr<X509Certificate> cert(
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"));
ASSERT_FALSE(cert->VerifyNameMatch(origin1_));
ASSERT_TRUE(cert->VerifyNameMatch(origin2_));
ProofVerifyDetailsChromium verify_details;
verify_details.cert_verify_result.verified_cert = cert;
verify_details.cert_verify_result.is_issued_by_known_root = true;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details);
MockQuicData mock_quic_data;
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);
mock_quic_data.AddRead(ASYNC, 0);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddRefusedSocketData();
HttpRequestInfo request;
request.url = url;
request.traffic_annotation =
net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request, callback.callback(), net_log_.bound());
EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED));
EXPECT_TRUE(AllDataConsumed());
}
// First request opens QUIC session to alternative service. Second request
// pools to it, because destination matches and certificate is valid, even
// though quic::QuicServerId is different.
TEST_P(QuicNetworkTransactionWithDestinationTest, PoolIfCertificateValid) {
origin1_ = "mail.example.org";
origin2_ = "news.example.org";
SetQuicAlternativeService(origin1_);
SetQuicAlternativeService(origin2_);
scoped_refptr<X509Certificate> cert(
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"));
ASSERT_TRUE(cert->VerifyNameMatch(origin1_));
ASSERT_TRUE(cert->VerifyNameMatch(origin2_));
ASSERT_FALSE(cert->VerifyNameMatch(kDifferentHostname));
ProofVerifyDetailsChromium verify_details;
verify_details.cert_verify_result.verified_cert = cert;
verify_details.cert_verify_result.is_issued_by_known_root = true;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details);
QuicTestPacketMaker client_maker(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin1_, quic::Perspective::IS_CLIENT,
client_headers_include_h2_stream_dependency_);
QuicTestPacketMaker server_maker(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin1_, quic::Perspective::IS_SERVER, false);
quic::QuicStreamOffset request_header_offset(0);
quic::QuicStreamOffset response_header_offset(0);
MockQuicData mock_quic_data;
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructInitialSettingsPacket(1, &request_header_offset, &client_maker));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
&request_header_offset, &client_maker));
mock_quic_data.AddRead(ASYNC,
ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0),
&response_header_offset, &server_maker));
mock_quic_data.AddRead(
ASYNC,
ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckPacket(3, 2, 1, 1, &client_maker));
client_maker.set_hostname(origin2_);
server_maker.set_hostname(origin2_);
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false,
GetNthClientInitiatedBidirectionalStreamId(0),
&request_header_offset, &client_maker));
mock_quic_data.AddRead(ASYNC,
ConstructServerResponseHeadersPacket(
3, GetNthClientInitiatedBidirectionalStreamId(1),
&response_header_offset, &server_maker));
mock_quic_data.AddRead(
ASYNC,
ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), &server_maker));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckPacket(5, 4, 3, 1, &client_maker));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
AddHangingSocketData();
AddHangingSocketData();
scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_));
QuicStreamFactoryPeer::SetAlarmFactory(
session_->quic_stream_factory(),
std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(),
&clock_));
SendRequestAndExpectQuicResponse(origin1_);
SendRequestAndExpectQuicResponse(origin2_);
EXPECT_TRUE(AllDataConsumed());
}
// First request opens QUIC session to alternative service. Second request does
// not pool to it, even though destination matches, because certificate is not
// valid. Instead, a new QUIC session is opened to the same destination with a
// different quic::QuicServerId.
TEST_P(QuicNetworkTransactionWithDestinationTest,
DoNotPoolIfCertificateInvalid) {
origin1_ = "news.example.org";
origin2_ = "mail.example.com";
SetQuicAlternativeService(origin1_);
SetQuicAlternativeService(origin2_);
scoped_refptr<X509Certificate> cert1(
ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"));
ASSERT_TRUE(cert1->VerifyNameMatch(origin1_));
ASSERT_FALSE(cert1->VerifyNameMatch(origin2_));
ASSERT_FALSE(cert1->VerifyNameMatch(kDifferentHostname));
scoped_refptr<X509Certificate> cert2(
ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"));
ASSERT_TRUE(cert2->VerifyNameMatch(origin2_));
ASSERT_FALSE(cert2->VerifyNameMatch(kDifferentHostname));
ProofVerifyDetailsChromium verify_details1;
verify_details1.cert_verify_result.verified_cert = cert1;
verify_details1.cert_verify_result.is_issued_by_known_root = true;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details1);
ProofVerifyDetailsChromium verify_details2;
verify_details2.cert_verify_result.verified_cert = cert2;
verify_details2.cert_verify_result.is_issued_by_known_root = true;
crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details2);
QuicTestPacketMaker client_maker1(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin1_, quic::Perspective::IS_CLIENT,
client_headers_include_h2_stream_dependency_);
QuicTestPacketMaker server_maker1(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin1_, quic::Perspective::IS_SERVER, false);
MockQuicData mock_quic_data1;
quic::QuicStreamOffset header_stream_offset1 = 0;
mock_quic_data1.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset1,
&client_maker1));
mock_quic_data1.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
&header_stream_offset1, &client_maker1));
mock_quic_data1.AddRead(
ASYNC,
ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker1));
mock_quic_data1.AddRead(
ASYNC,
ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker1));
mock_quic_data1.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1, &client_maker1));
mock_quic_data1.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data1.AddRead(ASYNC, 0); // EOF
mock_quic_data1.AddSocketDataToFactory(&socket_factory_);
QuicTestPacketMaker client_maker2(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin2_, quic::Perspective::IS_CLIENT,
client_headers_include_h2_stream_dependency_);
QuicTestPacketMaker server_maker2(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, origin2_, quic::Perspective::IS_SERVER, false);
MockQuicData mock_quic_data2;
quic::QuicStreamOffset header_stream_offset2 = 0;
mock_quic_data2.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset2,
&client_maker2));
mock_quic_data2.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
&header_stream_offset2, &client_maker2));
mock_quic_data2.AddRead(
ASYNC,
ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker2));
mock_quic_data2.AddRead(
ASYNC,
ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker2));
mock_quic_data2.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1, &client_maker2));
mock_quic_data2.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data2.AddRead(ASYNC, 0); // EOF
mock_quic_data2.AddSocketDataToFactory(&socket_factory_);
SendRequestAndExpectQuicResponse(origin1_);
SendRequestAndExpectQuicResponse(origin2_);
EXPECT_TRUE(AllDataConsumed());
}
// crbug.com/705109 - this confirms that matching request with a body
// triggers a crash (pre-fix).
TEST_P(QuicNetworkTransactionTest, QuicServerPushMatchesRequestWithBody) {
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
uint64_t client_packet_number = 1;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(client_packet_number++,
&header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0),
true, true, GetRequestHeaders("GET", "https", "/"),
&header_stream_offset));
quic::QuicStreamOffset server_header_offset = 0;
mock_quic_data.AddRead(
ASYNC, ConstructServerPushPromisePacket(
1, GetNthClientInitiatedBidirectionalStreamId(0),
GetNthServerInitiatedUnidirectionalStreamId(0), false,
GetRequestHeaders("GET", "https", "/pushed.jpg"),
&server_header_offset, &server_maker_));
if (client_headers_include_h2_stream_dependency_ &&
version_ >= quic::QUIC_VERSION_43) {
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientPriorityPacket(
client_packet_number++, false,
GetNthServerInitiatedUnidirectionalStreamId(0),
GetNthClientInitiatedBidirectionalStreamId(0),
DEFAULT_PRIORITY, &header_stream_offset));
}
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &server_header_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1, 1));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthServerInitiatedUnidirectionalStreamId(0), false,
false, GetResponseHeaders("200 OK"), &server_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 4, 3, 1));
quic::QuicString header2 = ConstructDataHeader(10);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
5, GetNthServerInitiatedUnidirectionalStreamId(0), false, true,
0, header2 + "and hello!"));
// Because the matching request has a body, we will see the push
// stream get cancelled, and the matching request go out on the
// wire.
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndRstPacket(
client_packet_number++,
GetNthServerInitiatedUnidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED, 5, 5, 1));
const char kBody[] = "1";
quic::QuicString header3 = ConstructDataHeader(1);
if (version_ != quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersAndDataFramesPacket(
client_packet_number++,
GetNthClientInitiatedBidirectionalStreamId(1), false, true,
DEFAULT_PRIORITY, GetRequestHeaders("GET", "https", "/pushed.jpg"),
GetNthServerInitiatedUnidirectionalStreamId(0),
&header_stream_offset, nullptr, {kBody}));
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersAndDataFramesPacket(
client_packet_number++,
GetNthClientInitiatedBidirectionalStreamId(1), false, true,
DEFAULT_PRIORITY, GetRequestHeaders("GET", "https", "/pushed.jpg"),
GetNthServerInitiatedUnidirectionalStreamId(0),
&header_stream_offset, nullptr, {header3, kBody}));
}
// We see the same response as for the earlier pushed and cancelled
// stream.
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
6, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &server_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
7, GetNthClientInitiatedBidirectionalStreamId(1), false, true,
0, header2 + "and hello!"));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 7, 6, 1));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
// PUSH_PROMISE handling in the http layer gets exercised here.
SendRequestAndExpectQuicResponse("hello!");
request_.url = GURL("https://mail.example.org/pushed.jpg");
ChunkedUploadDataStream upload_data(0);
upload_data.AppendData("1", 1, true);
request_.upload_data_stream = &upload_data;
SendRequestAndExpectQuicResponse("and hello!");
}
// Regression test for https://crbug.com/797825: If pushed headers describe a
// valid URL with empty hostname, then X509Certificate::VerifyHostname() must
// not be called (otherwise a DCHECK fails).
TEST_P(QuicNetworkTransactionTest, QuicServerPushWithEmptyHostname) {
spdy::SpdyHeaderBlock pushed_request_headers;
pushed_request_headers[":authority"] = "";
pushed_request_headers[":method"] = "GET";
pushed_request_headers[":path"] = "/";
pushed_request_headers[":scheme"] = "nosuchscheme";
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, true,
GetRequestHeaders("GET", "https", "/"), &header_stream_offset));
quic::QuicStreamOffset server_header_offset = 0;
mock_quic_data.AddRead(
ASYNC, ConstructServerPushPromisePacket(
1, GetNthClientInitiatedBidirectionalStreamId(0),
GetNthServerInitiatedUnidirectionalStreamId(0), false,
std::move(pushed_request_headers), &server_header_offset,
&server_maker_));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientRstPacket(
3, GetNthServerInitiatedUnidirectionalStreamId(0),
quic::QUIC_INVALID_PROMISE_URL, 0));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &server_header_offset));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 2, 1, 1));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, GetNthServerInitiatedUnidirectionalStreamId(0), false,
false, GetResponseHeaders("200 OK"), &server_header_offset));
quic::QuicString header = ConstructDataHeader(6);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
0, header + "hello!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(5, 4, 3, 1));
mock_quic_data.AddRead(ASYNC, 0);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
// PUSH_PROMISE handling in the http layer gets exercised here.
SendRequestAndExpectQuicResponse("hello!");
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Cobalt prohibits QUIC proxies.
// Chromium m70 does not support QUIC proxies properly, see
// https://chromium-review.googlesource.com/c/chromium/src/+/1377709
// and its related bugs for background info.
// Cobalt's m70 net + m74 QUIC combo fail the following tests due to missing
// net commits including the one listed above.
// Even after the Chromium fix, QUIC proxies support is turned off by default.
// This setting is configurable through
// session_params.enable_quic_proxies_for_https_urls, a QUIC field trial
// param(which Cobalt does not support).
// These tests should be green after the next rebase.
#if !defined(COBALT_QUIC46)
// Performs an HTTPS/1.1 request over QUIC proxy tunnel.
TEST_P(QuicNetworkTransactionTest, QuicProxyConnectHttpsServer) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
false, ConnectRequestHeaders("mail.example.org:443"),
&header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
const char get_request[] =
"GET / HTTP/1.1\r\n"
"Host: mail.example.org\r\n"
"Connection: keep-alive\r\n\r\n";
quic::QuicString header = ConstructDataHeader(SbStringGetLength(get_request));
if (version_ != quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndDataPacket(
3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1,
false, 0, quic::QuicStringPiece(get_request)));
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndMultipleDataFramesPacket(
3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1,
false, 0, {header, quic::QuicString(get_request)}));
}
const char get_response[] =
"HTTP/1.1 200 OK\r\n"
"Content-Length: 10\r\n\r\n";
quic::QuicString header2 = ConstructDataHeader(SbStringGetLength(get_response));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
0, header2 + quic::QuicString(get_response)));
quic::QuicString header3 = ConstructDataHeader(10);
mock_quic_data.AddRead(
SYNCHRONOUS, ConstructServerDataPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0), false,
false, SbStringGetLength(get_response) + header2.length(),
header3 + quic::QuicString("0123456789")));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 3, 2, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRstPacket(5, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED,
SbStringGetLength(get_request) + header.length()));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
request_.url = GURL("https://mail.example.org/");
AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE);
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
RunTransaction(&trans);
CheckWasHttpResponse(&trans);
CheckResponsePort(&trans, 70);
CheckResponseData(&trans, "0123456789");
EXPECT_TRUE(headers_handler.was_proxied());
EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic());
// Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC
// proxy socket to disconnect.
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Performs an HTTP/2 request over QUIC proxy tunnel.
TEST_P(QuicNetworkTransactionTest, QuicProxyConnectSpdyServer) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
false, ConnectRequestHeaders("mail.example.org:443"),
&header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
SpdyTestUtil spdy_util;
spdy::SpdySerializedFrame get_frame =
spdy_util.ConstructSpdyGet("https://mail.example.org/", 1, LOWEST);
quic::QuicString header = ConstructDataHeader(get_frame.size());
if (version_ != quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndDataPacket(
3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1,
false, 0,
quic::QuicStringPiece(get_frame.data(), get_frame.size())));
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndMultipleDataFramesPacket(
3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1,
false, 0,
{header, quic::QuicString(get_frame.data(), get_frame.size())}));
}
spdy::SpdySerializedFrame resp_frame =
spdy_util.ConstructSpdyGetReply(nullptr, 0, 1);
quic::QuicString header2 = ConstructDataHeader(resp_frame.size());
mock_quic_data.AddRead(
ASYNC,
ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, 0,
header2 + quic::QuicString(resp_frame.data(), resp_frame.size())));
spdy::SpdySerializedFrame data_frame =
spdy_util.ConstructSpdyDataFrame(1, "0123456789", true);
quic::QuicString header3 = ConstructDataHeader(resp_frame.size());
mock_quic_data.AddRead(
SYNCHRONOUS,
ConstructServerDataPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
resp_frame.size() + header2.length(),
header3 + quic::QuicString(data_frame.data(), data_frame.size())));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 3, 2, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRstPacket(5, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED,
get_frame.size() + header.length()));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
SSLSocketDataProvider ssl_data(ASYNC, OK);
ssl_data.next_proto = kProtoHTTP2;
socket_factory_.AddSSLSocketDataProvider(&ssl_data);
CreateSession();
request_.url = GURL("https://mail.example.org/");
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
RunTransaction(&trans);
CheckWasSpdyResponse(&trans);
CheckResponsePort(&trans, 70);
CheckResponseData(&trans, "0123456789");
EXPECT_TRUE(headers_handler.was_proxied());
EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic());
// Causes MockSSLClientSocket to disconproxyconnecthttpnect, which causes the
// underlying QUIC proxy socket to disconnect.
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Make two HTTP/1.1 requests to the same host over a QUIC proxy tunnel and
// check that the proxy socket is reused for the second request.
TEST_P(QuicNetworkTransactionTest, QuicProxyConnectReuseTransportSocket) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
int write_packet_index = 1;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_index++,
&header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0),
true, false, ConnectRequestHeaders("mail.example.org:443"),
&header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK")));
quic::QuicStreamOffset client_data_offset = 0;
quic::QuicStreamOffset server_data_offset = 0;
const char get_request_1[] =
"GET / HTTP/1.1\r\n"
"Host: mail.example.org\r\n"
"Connection: keep-alive\r\n\r\n";
quic::QuicString header = ConstructDataHeader(SbStringGetLength(get_request_1));
if (version_ != quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndDataPacket(
write_packet_index++, false,
GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, false,
client_data_offset, quic::QuicStringPiece(get_request_1)));
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndMultipleDataFramesPacket(
write_packet_index++, false,
GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, false,
client_data_offset, {header, quic::QuicString(get_request_1)}));
}
client_data_offset += SbStringGetLength(get_request_1) + header.length();
const char get_response_1[] =
"HTTP/1.1 200 OK\r\n"
"Content-Length: 10\r\n\r\n";
quic::QuicString header2 = ConstructDataHeader(SbStringGetLength(get_response_1));
mock_quic_data.AddRead(
ASYNC,
ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
server_data_offset, header2 + quic::QuicString(get_response_1)));
server_data_offset += SbStringGetLength(get_response_1) + header2.length();
quic::QuicString header3 = ConstructDataHeader(10);
mock_quic_data.AddRead(
SYNCHRONOUS,
ConstructServerDataPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
server_data_offset, header3 + quic::QuicString("0123456789")));
server_data_offset += 10 + header3.length();
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(write_packet_index++, 3, 2, 1));
const char get_request_2[] =
"GET /2 HTTP/1.1\r\n"
"Host: mail.example.org\r\n"
"Connection: keep-alive\r\n\r\n";
quic::QuicString header4 = ConstructDataHeader(SbStringGetLength(get_request_2));
if (version_ == quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientMultipleDataFramesPacket(
write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0),
false, false, client_data_offset,
{header4, quic::QuicString(get_request_2)}));
client_data_offset += header4.length() + SbStringGetLength(get_request_2);
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientDataPacket(write_packet_index++,
GetNthClientInitiatedBidirectionalStreamId(0),
false, false, client_data_offset,
quic::QuicStringPiece(get_request_2)));
client_data_offset += SbStringGetLength(get_request_2);
}
const char get_response_2[] =
"HTTP/1.1 200 OK\r\n"
"Content-Length: 7\r\n\r\n";
quic::QuicString header5 = ConstructDataHeader(SbStringGetLength(get_response_2));
mock_quic_data.AddRead(
ASYNC,
ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
server_data_offset, header5 + quic::QuicString(get_response_2)));
server_data_offset += SbStringGetLength(get_response_2) + header5.length();
quic::QuicString header6 = ConstructDataHeader(7);
mock_quic_data.AddRead(
SYNCHRONOUS,
ConstructServerDataPacket(
5, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
server_data_offset, header6 + quic::QuicString("0123456")));
server_data_offset += 7 + header6.length();
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientAckPacket(write_packet_index++, 5, 4, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRstPacket(
write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED, client_data_offset));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
request_.url = GURL("https://mail.example.org/");
HttpNetworkTransaction trans_1(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler_1;
trans_1.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler_1)));
RunTransaction(&trans_1);
CheckWasHttpResponse(&trans_1);
CheckResponsePort(&trans_1, 70);
CheckResponseData(&trans_1, "0123456789");
EXPECT_TRUE(headers_handler_1.was_proxied());
EXPECT_TRUE(trans_1.GetResponseInfo()->proxy_server.is_quic());
request_.url = GURL("https://mail.example.org/2");
HttpNetworkTransaction trans_2(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler_2;
trans_2.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler_2)));
RunTransaction(&trans_2);
CheckWasHttpResponse(&trans_2);
CheckResponsePort(&trans_2, 70);
CheckResponseData(&trans_2, "0123456");
EXPECT_TRUE(headers_handler_2.was_proxied());
EXPECT_TRUE(trans_2.GetResponseInfo()->proxy_server.is_quic());
// Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC
// proxy socket to disconnect.
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Make an HTTP/1.1 request to one host and an HTTP/2 request to a different
// host over a QUIC proxy tunnel. Check that the QUIC session to the proxy
// server is reused for the second request.
TEST_P(QuicNetworkTransactionTest, QuicProxyConnectReuseQuicSession) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset client_header_stream_offset = 0;
quic::QuicStreamOffset server_header_stream_offset = 0;
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(
1, &client_header_stream_offset));
// CONNECT request and response for first request
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
false, ConnectRequestHeaders("mail.example.org:443"),
&client_header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &server_header_stream_offset));
// GET request, response, and data over QUIC tunnel for first request
const char get_request[] =
"GET / HTTP/1.1\r\n"
"Host: mail.example.org\r\n"
"Connection: keep-alive\r\n\r\n";
quic::QuicString header = ConstructDataHeader(SbStringGetLength(get_request));
if (version_ != quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndDataPacket(
3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1,
false, 0, quic::QuicStringPiece(get_request)));
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndMultipleDataFramesPacket(
3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1,
false, 0, {header, quic::QuicString(get_request)}));
}
const char get_response[] =
"HTTP/1.1 200 OK\r\n"
"Content-Length: 10\r\n\r\n";
quic::QuicString header2 = ConstructDataHeader(SbStringGetLength(get_response));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
0, header2 + quic::QuicString(get_response)));
quic::QuicString header3 = ConstructDataHeader(10);
mock_quic_data.AddRead(
SYNCHRONOUS, ConstructServerDataPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0), false,
false, SbStringGetLength(get_response) + header2.length(),
header3 + quic::QuicString("0123456789")));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 3, 2, 1));
// CONNECT request and response for second request
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
5, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
ConnectRequestHeaders("different.example.org:443"),
GetNthClientInitiatedBidirectionalStreamId(0),
&client_header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &server_header_stream_offset));
// GET request, response, and data over QUIC tunnel for second request
SpdyTestUtil spdy_util;
spdy::SpdySerializedFrame get_frame =
spdy_util.ConstructSpdyGet("https://different.example.org/", 1, LOWEST);
quic::QuicString header4 = ConstructDataHeader(get_frame.size());
if (version_ != quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndDataPacket(
6, false, GetNthClientInitiatedBidirectionalStreamId(1), 4, 4, 1,
false, 0,
quic::QuicStringPiece(get_frame.data(), get_frame.size())));
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndMultipleDataFramesPacket(
6, false, GetNthClientInitiatedBidirectionalStreamId(1), 4, 4, 1,
false, 0,
{header4, quic::QuicString(get_frame.data(), get_frame.size())}));
}
spdy::SpdySerializedFrame resp_frame =
spdy_util.ConstructSpdyGetReply(nullptr, 0, 1);
quic::QuicString header5 = ConstructDataHeader(resp_frame.size());
mock_quic_data.AddRead(
ASYNC,
ConstructServerDataPacket(
5, GetNthClientInitiatedBidirectionalStreamId(1), false, false, 0,
header5 + quic::QuicString(resp_frame.data(), resp_frame.size())));
spdy::SpdySerializedFrame data_frame =
spdy_util.ConstructSpdyDataFrame(1, "0123456", true);
quic::QuicString header6 = ConstructDataHeader(data_frame.size());
mock_quic_data.AddRead(
ASYNC,
ConstructServerDataPacket(
6, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
resp_frame.size() + header5.length(),
header6 + quic::QuicString(data_frame.data(), data_frame.size())));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(7, 6, 5, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRstPacket(8, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED,
SbStringGetLength(get_request) + header.length()));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRstPacket(9, GetNthClientInitiatedBidirectionalStreamId(1),
quic::QUIC_STREAM_CANCELLED,
get_frame.size() + header4.length()));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
SSLSocketDataProvider ssl_data(ASYNC, OK);
ssl_data.next_proto = kProtoHTTP2;
socket_factory_.AddSSLSocketDataProvider(&ssl_data);
CreateSession();
request_.url = GURL("https://mail.example.org/");
HttpNetworkTransaction trans_1(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler_1;
trans_1.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler_1)));
RunTransaction(&trans_1);
CheckWasHttpResponse(&trans_1);
CheckResponsePort(&trans_1, 70);
CheckResponseData(&trans_1, "0123456789");
EXPECT_TRUE(headers_handler_1.was_proxied());
EXPECT_TRUE(trans_1.GetResponseInfo()->proxy_server.is_quic());
request_.url = GURL("https://different.example.org/");
HttpNetworkTransaction trans_2(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler_2;
trans_2.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler_2)));
RunTransaction(&trans_2);
CheckWasSpdyResponse(&trans_2);
CheckResponsePort(&trans_2, 70);
CheckResponseData(&trans_2, "0123456");
EXPECT_TRUE(headers_handler_2.was_proxied());
EXPECT_TRUE(trans_2.GetResponseInfo()->proxy_server.is_quic());
// Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC
// proxy socket to disconnect.
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Sends a CONNECT request to a QUIC proxy and receive a 500 response.
TEST_P(QuicNetworkTransactionTest, QuicProxyConnectFailure) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
false, ConnectRequestHeaders("mail.example.org:443"),
&header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, true,
GetResponseHeaders("500")));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndRstPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED, 1, 1, 1));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_);
CreateSession();
request_.url = GURL("https://mail.example.org/");
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_EQ(ERR_IO_PENDING, rv);
EXPECT_EQ(ERR_TUNNEL_CONNECTION_FAILED, callback.WaitForResult());
EXPECT_EQ(false, headers_handler.was_proxied());
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Sends a CONNECT request to a QUIC proxy and get a UDP socket read error.
TEST_P(QuicNetworkTransactionTest, QuicProxyQuicConnectionError) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
false, ConnectRequestHeaders("mail.example.org:443"),
&header_stream_offset));
mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
request_.url = GURL("https://mail.example.org/");
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_EQ(ERR_IO_PENDING, rv);
EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult());
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Sends an HTTP/1.1 request over QUIC proxy tunnel and gets a bad cert from the
// host. Retries request and succeeds.
TEST_P(QuicNetworkTransactionTest, QuicProxyConnectBadCertificate) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset client_header_stream_offset = 0;
quic::QuicStreamOffset server_header_stream_offset = 0;
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(
1, &client_header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
false, ConnectRequestHeaders("mail.example.org:443"),
&client_header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, GetNthClientInitiatedBidirectionalStreamId(0), false, false,
GetResponseHeaders("200 OK"), &server_header_stream_offset));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientAckAndRstPacket(
3, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED, 1, 1, 1));
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false,
false, ConnectRequestHeaders("mail.example.org:443"),
GetNthClientInitiatedBidirectionalStreamId(0),
&client_header_stream_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
GetResponseHeaders("200 OK"), &server_header_stream_offset));
const char get_request[] =
"GET / HTTP/1.1\r\n"
"Host: mail.example.org\r\n"
"Connection: keep-alive\r\n\r\n";
quic::QuicString header = ConstructDataHeader(SbStringGetLength(get_request));
if (version_ != quic::QUIC_VERSION_99) {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndDataPacket(
5, false, GetNthClientInitiatedBidirectionalStreamId(1), 2, 2, 1,
false, 0, quic::QuicStringPiece(get_request)));
} else {
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndMultipleDataFramesPacket(
5, false, GetNthClientInitiatedBidirectionalStreamId(1), 2, 2, 1,
false, 0, {header, quic::QuicString(get_request)}));
}
const char get_response[] =
"HTTP/1.1 200 OK\r\n"
"Content-Length: 10\r\n\r\n";
quic::QuicString header2 = ConstructDataHeader(SbStringGetLength(get_response));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(
3, GetNthClientInitiatedBidirectionalStreamId(1), false, false,
0, header2 + quic::QuicString(get_response)));
quic::QuicString header3 = ConstructDataHeader(10);
mock_quic_data.AddRead(
SYNCHRONOUS, ConstructServerDataPacket(
4, GetNthClientInitiatedBidirectionalStreamId(1), false,
false, SbStringGetLength(get_response) + header2.length(),
header3 + quic::QuicString("0123456789")));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(6, 4, 3, 1));
mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRstPacket(7, GetNthClientInitiatedBidirectionalStreamId(1),
quic::QUIC_STREAM_CANCELLED,
SbStringGetLength(get_request) + header.length()));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
SSLSocketDataProvider ssl_data_bad_cert(ASYNC, ERR_CERT_AUTHORITY_INVALID);
socket_factory_.AddSSLSocketDataProvider(&ssl_data_bad_cert);
SSLSocketDataProvider ssl_data(ASYNC, OK);
socket_factory_.AddSSLSocketDataProvider(&ssl_data);
CreateSession();
request_.url = GURL("https://mail.example.org/");
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_EQ(ERR_IO_PENDING, rv);
EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, callback.WaitForResult());
rv = trans.RestartIgnoringLastError(callback.callback());
EXPECT_EQ(ERR_IO_PENDING, rv);
EXPECT_EQ(OK, callback.WaitForResult());
CheckWasHttpResponse(&trans);
CheckResponsePort(&trans, 70);
CheckResponseData(&trans, "0123456789");
EXPECT_EQ(true, headers_handler.was_proxied());
EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic());
// Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC
// proxy socket to disconnect.
NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Checks if a request's specified "user-agent" header shows up correctly in the
// CONNECT request to a QUIC proxy.
TEST_P(QuicNetworkTransactionTest, QuicProxyUserAgent) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
spdy::SpdyHeaderBlock headers = ConnectRequestHeaders("mail.example.org:443");
headers["user-agent"] = "Chromium Ultra Awesome X Edition";
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true,
false, std::move(headers), &header_stream_offset));
// Return an error, so the transaction stops here (this test isn't interested
// in the rest).
mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
request_.url = GURL("https://mail.example.org/");
request_.extra_headers.SetHeader(HttpRequestHeaders::kUserAgent,
"Chromium Ultra Awesome X Edition");
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_EQ(ERR_IO_PENDING, rv);
EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult());
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Makes sure the CONNECT request packet for a QUIC proxy contains the correct
// HTTP/2 stream dependency and weights given the request priority.
TEST_P(QuicNetworkTransactionTest, QuicProxyRequestPriority) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
const RequestPriority request_priority = MEDIUM;
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, false,
request_priority, ConnectRequestHeaders("mail.example.org:443"), 0,
&header_stream_offset));
// Return an error, so the transaction stops here (this test isn't interested
// in the rest).
mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
CreateSession();
request_.url = GURL("https://mail.example.org/");
HttpNetworkTransaction trans(request_priority, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_EQ(ERR_IO_PENDING, rv);
EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult());
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
// Makes sure the CONNECT request packet for a QUIC proxy contains the correct
// HTTP/2 stream dependency and weights given the request priority.
TEST_P(QuicNetworkTransactionTest, QuicProxyMultipleRequestsError) {
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
const RequestPriority kRequestPriority = MEDIUM;
const RequestPriority kRequestPriority2 = LOWEST;
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
mock_quic_data.AddWrite(
ASYNC, ConstructInitialSettingsPacket(1, &header_stream_offset));
mock_quic_data.AddWrite(SYNCHRONOUS, ERR_FAILED);
// This should never be reached.
mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED);
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// Second connection attempt just fails - result doesn't really matter.
MockQuicData mock_quic_data2;
mock_quic_data2.AddConnect(SYNCHRONOUS, ERR_FAILED);
mock_quic_data2.AddSocketDataToFactory(&socket_factory_);
int original_max_sockets_per_group =
ClientSocketPoolManager::max_sockets_per_group(
HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL);
ClientSocketPoolManager::set_max_sockets_per_group(
HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, 1);
int original_max_sockets_per_pool =
ClientSocketPoolManager::max_sockets_per_pool(
HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL);
ClientSocketPoolManager::set_max_sockets_per_pool(
HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, 1);
CreateSession();
request_.url = GURL("https://mail.example.org/");
HttpNetworkTransaction trans(kRequestPriority, session_.get());
TestCompletionCallback callback;
int rv = trans.Start(&request_, callback.callback(), net_log_.bound());
EXPECT_EQ(ERR_IO_PENDING, rv);
HttpRequestInfo request2;
request2.url = GURL("https://mail.example.org/some/other/path/");
request2.traffic_annotation =
net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
HttpNetworkTransaction trans2(kRequestPriority2, session_.get());
TestCompletionCallback callback2;
int rv2 = trans2.Start(&request2, callback2.callback(), net_log_.bound());
EXPECT_EQ(ERR_IO_PENDING, rv2);
EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
EXPECT_EQ(ERR_FAILED, callback2.WaitForResult());
ClientSocketPoolManager::set_max_sockets_per_pool(
HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL,
original_max_sockets_per_pool);
ClientSocketPoolManager::set_max_sockets_per_group(
HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL,
original_max_sockets_per_group);
}
// Test the request-challenge-retry sequence for basic auth, over a QUIC
// connection when setting up a QUIC proxy tunnel.
TEST_P(QuicNetworkTransactionTest, QuicProxyAuth) {
const base::string16 kBaz(base::ASCIIToUTF16("baz"));
const base::string16 kFoo(base::ASCIIToUTF16("foo"));
const spdy::SpdyPriority default_priority =
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY);
std::unique_ptr<QuicTestPacketMaker> client_maker;
std::unique_ptr<QuicTestPacketMaker> server_maker;
// On the second pass, the body read of the auth challenge is synchronous, so
// IsConnectedAndIdle returns false. The socket should still be drained and
// reused. See http://crbug.com/544255.
for (int i = 0; i < 2; ++i) {
client_maker.reset(new QuicTestPacketMaker(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, kDefaultServerHostName, quic::Perspective::IS_CLIENT,
client_headers_include_h2_stream_dependency_));
server_maker.reset(new QuicTestPacketMaker(
version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_),
&clock_, kDefaultServerHostName, quic::Perspective::IS_SERVER, false));
session_params_.enable_quic = true;
session_params_.enable_quic_proxies_for_https_urls = true;
proxy_resolution_service_ =
ProxyResolutionService::CreateFixedFromPacResult(
"QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS);
MockQuicData mock_quic_data;
quic::QuicStreamOffset client_header_stream_offset = 0;
quic::QuicStreamOffset server_header_stream_offset = 0;
quic::QuicStreamOffset client_data_offset = 0;
quic::QuicStreamOffset server_data_offset = 0;
mock_quic_data.AddWrite(SYNCHRONOUS,
client_maker->MakeInitialSettingsPacket(
1, &client_header_stream_offset));
mock_quic_data.AddWrite(
SYNCHRONOUS,
client_maker->MakeRequestHeadersPacketWithOffsetTracking(
2, GetNthClientInitiatedBidirectionalStreamId(0), true, false,
default_priority,
client_maker->ConnectRequestHeaders("mail.example.org:443"), 0,
&client_header_stream_offset));
spdy::SpdyHeaderBlock headers =
server_maker->GetResponseHeaders("407 Proxy Authentication Required");
headers["proxy-authenticate"] = "Basic realm=\"MyRealm1\"";
headers["content-length"] = "10";
mock_quic_data.AddRead(
ASYNC, server_maker->MakeResponseHeadersPacketWithOffsetTracking(
1, GetNthClientInitiatedBidirectionalStreamId(0), false,
false, std::move(headers), &server_header_stream_offset));
if (i == 0) {
mock_quic_data.AddRead(
ASYNC, server_maker->MakeDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0), false,
false, server_data_offset, "0123456789"));
} else {
mock_quic_data.AddRead(
SYNCHRONOUS, server_maker->MakeDataPacket(
2, GetNthClientInitiatedBidirectionalStreamId(0),
false, false, server_data_offset, "0123456789"));
}
server_data_offset += 10;
mock_quic_data.AddWrite(SYNCHRONOUS,
client_maker->MakeAckPacket(3, 2, 1, 1, true));
mock_quic_data.AddWrite(
SYNCHRONOUS,
client_maker->MakeRstPacket(
4, false, GetNthClientInitiatedBidirectionalStreamId(0),
quic::QUIC_STREAM_CANCELLED, client_data_offset,
/*include_stop_sending_if_v99=*/true));
headers = client_maker->ConnectRequestHeaders("mail.example.org:443");
headers["proxy-authorization"] = "Basic Zm9vOmJheg==";
mock_quic_data.AddWrite(
SYNCHRONOUS, client_maker->MakeRequestHeadersPacketWithOffsetTracking(
5, GetNthClientInitiatedBidirectionalStreamId(1),
false, false, default_priority, std::move(headers),
GetNthClientInitiatedBidirectionalStreamId(0),
&client_header_stream_offset));
// Response to wrong password
headers =
server_maker->GetResponseHeaders("407 Proxy Authentication Required");
headers["proxy-authenticate"] = "Basic realm=\"MyRealm1\"";
headers["content-length"] = "10";
mock_quic_data.AddRead(
ASYNC, server_maker->MakeResponseHeadersPacketWithOffsetTracking(
3, GetNthClientInitiatedBidirectionalStreamId(1), false,
false, std::move(headers), &server_header_stream_offset));
mock_quic_data.AddRead(SYNCHRONOUS,
ERR_IO_PENDING); // No more data to read
mock_quic_data.AddWrite(
SYNCHRONOUS,
client_maker->MakeAckAndRstPacket(
6, false, GetNthClientInitiatedBidirectionalStreamId(1),
quic::QUIC_STREAM_CANCELLED, 3, 3, 1, true));
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
mock_quic_data.GetSequencedSocketData()->set_busy_before_sync_reads(true);
CreateSession();
request_.url = GURL("https://mail.example.org/");
// Ensure that proxy authentication is attempted even
// when the no authentication data flag is set.
request_.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA;
{
HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get());
HeadersHandler headers_handler;
trans.SetBeforeHeadersSentCallback(
base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent,
base::Unretained(&headers_handler)));
RunTransaction(&trans);
const HttpResponseInfo* response = trans.GetResponseInfo();
ASSERT_TRUE(response != nullptr);
ASSERT_TRUE(response->headers.get() != nullptr);
EXPECT_EQ("HTTP/1.1 407 Proxy Authentication Required",
response->headers->GetStatusLine());
EXPECT_TRUE(response->headers->IsKeepAlive());
EXPECT_EQ(407, response->headers->response_code());
EXPECT_EQ(10, response->headers->GetContentLength());
EXPECT_EQ(HttpVersion(1, 1), response->headers->GetHttpVersion());
const AuthChallengeInfo* auth_challenge = response->auth_challenge.get();
ASSERT_TRUE(auth_challenge != nullptr);
EXPECT_TRUE(auth_challenge->is_proxy);
EXPECT_EQ("https://proxy.example.org:70",
auth_challenge->challenger.Serialize());
EXPECT_EQ("MyRealm1", auth_challenge->realm);
EXPECT_EQ("basic", auth_challenge->scheme);
TestCompletionCallback callback;
int rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBaz),
callback.callback());
EXPECT_EQ(ERR_IO_PENDING, rv);
EXPECT_EQ(OK, callback.WaitForResult());
response = trans.GetResponseInfo();
ASSERT_TRUE(response != nullptr);
ASSERT_TRUE(response->headers.get() != nullptr);
EXPECT_EQ("HTTP/1.1 407 Proxy Authentication Required",
response->headers->GetStatusLine());
EXPECT_TRUE(response->headers->IsKeepAlive());
EXPECT_EQ(407, response->headers->response_code());
EXPECT_EQ(10, response->headers->GetContentLength());
EXPECT_EQ(HttpVersion(1, 1), response->headers->GetHttpVersion());
auth_challenge = response->auth_challenge.get();
ASSERT_TRUE(auth_challenge != nullptr);
EXPECT_TRUE(auth_challenge->is_proxy);
EXPECT_EQ("https://proxy.example.org:70",
auth_challenge->challenger.Serialize());
EXPECT_EQ("MyRealm1", auth_challenge->realm);
EXPECT_EQ("basic", auth_challenge->scheme);
}
// HttpNetworkTransaction is torn down now that it's out of scope, causing
// the QUIC stream to be cleaned up (since the proxy socket cannot be
// reused because it's not connected).
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
}
#endif // COBALT_QUIC46
TEST_P(QuicNetworkTransactionTest, QuicServerPushUpdatesPriority) {
// Only run this test if HTTP/2 stream dependency info is sent by client (sent
// in HEADERS frames for requests and PRIORITY frames).
if (version_ < quic::QUIC_VERSION_43 ||
!client_headers_include_h2_stream_dependency_) {
return;
}
session_params_.origins_to_force_quic_on.insert(
HostPortPair::FromString("mail.example.org:443"));
const quic::QuicStreamId client_stream_0 =
GetNthClientInitiatedBidirectionalStreamId(0);
const quic::QuicStreamId client_stream_1 =
GetNthClientInitiatedBidirectionalStreamId(1);
const quic::QuicStreamId client_stream_2 =
GetNthClientInitiatedBidirectionalStreamId(2);
const quic::QuicStreamId push_stream_0 =
GetNthServerInitiatedUnidirectionalStreamId(0);
const quic::QuicStreamId push_stream_1 =
GetNthServerInitiatedUnidirectionalStreamId(1);
MockQuicData mock_quic_data;
quic::QuicStreamOffset header_stream_offset = 0;
quic::QuicStreamOffset server_header_offset = 0;
mock_quic_data.AddWrite(
SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset));
// Client sends "GET" requests for "/0.png", "/1.png", "/2.png".
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
2, client_stream_0, true, true, HIGHEST,
GetRequestHeaders("GET", "https", "/0.jpg"), 0,
&header_stream_offset));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
3, client_stream_1, true, true, MEDIUM,
GetRequestHeaders("GET", "https", "/1.jpg"),
client_stream_0, &header_stream_offset));
mock_quic_data.AddWrite(SYNCHRONOUS,
ConstructClientRequestHeadersPacket(
4, client_stream_2, true, true, MEDIUM,
GetRequestHeaders("GET", "https", "/2.jpg"),
client_stream_1, &header_stream_offset));
// Server replies "OK" for the three requests.
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
1, client_stream_0, false, false, GetResponseHeaders("200 OK"),
&server_header_offset));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
2, client_stream_1, false, false, GetResponseHeaders("200 OK"),
&server_header_offset));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(5, 2, 1, 1));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
3, client_stream_2, false, false, GetResponseHeaders("200 OK"),
&server_header_offset));
// Server sends two push promises associated with |client_stream_0|; client
// responds with a PRIORITY frame after each to notify server of HTTP/2 stream
// dependency info for each push promise stream.
mock_quic_data.AddRead(ASYNC,
ConstructServerPushPromisePacket(
4, client_stream_0, push_stream_0, false,
GetRequestHeaders("GET", "https", "/pushed_0.jpg"),
&server_header_offset, &server_maker_));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndPriorityFramesPacket(
6, false, 4, 3, 1,
{{push_stream_0, client_stream_2,
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY)}},
&header_stream_offset));
mock_quic_data.AddRead(ASYNC,
ConstructServerPushPromisePacket(
5, client_stream_0, push_stream_1, false,
GetRequestHeaders("GET", "https", "/pushed_1.jpg"),
&server_header_offset, &server_maker_));
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientPriorityPacket(7, false, push_stream_1, push_stream_0,
DEFAULT_PRIORITY, &header_stream_offset));
// Server sends the response headers for the two push promises.
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
6, push_stream_0, false, false, GetResponseHeaders("200 OK"),
&server_header_offset));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(8, 6, 5, 1));
mock_quic_data.AddRead(
ASYNC, ConstructServerResponseHeadersPacket(
7, push_stream_1, false, false, GetResponseHeaders("200 OK"),
&server_header_offset));
// Request for "pushed_0.jpg" matches |push_stream_0|. |push_stream_0|'s
// priority updates to match the request's priority. Client sends PRIORITY
// frames to inform server of new HTTP/2 stream dependencies.
mock_quic_data.AddWrite(
SYNCHRONOUS,
ConstructClientAckAndPriorityFramesPacket(
9, false, 7, 7, 1,
{{push_stream_1, client_stream_2,
ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY)},
{push_stream_0, client_stream_0,
ConvertRequestPriorityToQuicPriority(HIGHEST)}},
&header_stream_offset));
// Server sends data for the three requests and the two push promises.
quic::QuicString header = ConstructDataHeader(8);
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(8, client_stream_0, false, true, 0,
header + "hello 0!"));
mock_quic_data.AddRead(
SYNCHRONOUS, ConstructServerDataPacket(9, client_stream_1, false, true, 0,
header + "hello 1!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(10, 9, 8, 1));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(10, client_stream_2, false, true, 0,
header + "hello 2!"));
quic::QuicString header2 = ConstructDataHeader(12);
mock_quic_data.AddRead(
SYNCHRONOUS, ConstructServerDataPacket(11, push_stream_0, false, true, 0,
header2 + "and hello 0!"));
mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(11, 11, 10, 1));
mock_quic_data.AddRead(
ASYNC, ConstructServerDataPacket(12, push_stream_1, false, true, 0,
header2 + "and hello 1!"));
mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read
mock_quic_data.AddRead(ASYNC, 0); // EOF
mock_quic_data.AddSocketDataToFactory(&socket_factory_);
// The non-alternate protocol job needs to hang in order to guarantee that
// the alternate-protocol job will "win".
AddHangingNonAlternateProtocolSocketData();
CreateSession();
request_.url = GURL("https://mail.example.org/0.jpg");
HttpNetworkTransaction trans_0(HIGHEST, session_.get());
TestCompletionCallback callback_0;
EXPECT_EQ(ERR_IO_PENDING,
trans_0.Start(&request_, callback_0.callback(), net_log_.bound()));
base::RunLoop().RunUntilIdle();
request_.url = GURL("https://mail.example.org/1.jpg");
HttpNetworkTransaction trans_1(MEDIUM, session_.get());
TestCompletionCallback callback_1;
EXPECT_EQ(ERR_IO_PENDING,
trans_1.Start(&request_, callback_1.callback(), net_log_.bound()));
base::RunLoop().RunUntilIdle();
request_.url = GURL("https://mail.example.org/2.jpg");
HttpNetworkTransaction trans_2(MEDIUM, session_.get());
TestCompletionCallback callback_2;
EXPECT_EQ(ERR_IO_PENDING,
trans_2.Start(&request_, callback_2.callback(), net_log_.bound()));
base::RunLoop().RunUntilIdle();
// Client makes request that matches resource pushed in |pushed_stream_0|.
request_.url = GURL("https://mail.example.org/pushed_0.jpg");
HttpNetworkTransaction trans_3(HIGHEST, session_.get());
TestCompletionCallback callback_3;
EXPECT_EQ(ERR_IO_PENDING,
trans_3.Start(&request_, callback_3.callback(), net_log_.bound()));
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(callback_0.have_result());
EXPECT_EQ(OK, callback_0.WaitForResult());
EXPECT_TRUE(callback_1.have_result());
EXPECT_EQ(OK, callback_1.WaitForResult());
EXPECT_TRUE(callback_2.have_result());
EXPECT_EQ(OK, callback_2.WaitForResult());
CheckResponseData(&trans_0, "hello 0!"); // Closes stream 5
CheckResponseData(&trans_1, "hello 1!"); // Closes stream 7
CheckResponseData(&trans_2, "hello 2!"); // Closes strema 9
CheckResponseData(&trans_3, "and hello 0!"); // Closes stream 2, sends RST
mock_quic_data.Resume();
base::RunLoop().RunUntilIdle();
EXPECT_TRUE(mock_quic_data.AllReadDataConsumed());
EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed());
}
} // namespace test
} // namespace net