| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <algorithm> |
| #include <ostream> |
| #include <string> |
| #include <utility> |
| #include <vector> |
| |
| #include "base/bind.h" |
| #include "base/compiler_specific.h" |
| #include "base/macros.h" |
| #include "base/run_loop.h" |
| #include "base/stl_util.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/strings/string_piece.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/test/metrics/histogram_tester.h" |
| #include "net/base/chunked_upload_data_stream.h" |
| #include "net/base/completion_once_callback.h" |
| #include "net/base/ip_endpoint.h" |
| #include "net/base/mock_network_change_notifier.h" |
| #include "net/base/test_completion_callback.h" |
| #include "net/base/test_proxy_delegate.h" |
| #include "net/cert/ct_policy_enforcer.h" |
| #include "net/cert/mock_cert_verifier.h" |
| #include "net/cert/multi_log_ct_verifier.h" |
| #include "net/dns/mock_host_resolver.h" |
| #include "net/http/http_auth_handler_factory.h" |
| #include "net/http/http_network_session.h" |
| #include "net/http/http_network_transaction.h" |
| #include "net/http/http_server_properties_impl.h" |
| #include "net/http/http_stream.h" |
| #include "net/http/http_stream_factory.h" |
| #include "net/http/http_transaction_test_util.h" |
| #include "net/http/transport_security_state.h" |
| #include "net/log/net_log_event_type.h" |
| #include "net/log/test_net_log.h" |
| #include "net/log/test_net_log_entry.h" |
| #include "net/log/test_net_log_util.h" |
| #include "net/proxy_resolution/proxy_config_service_fixed.h" |
| #include "net/proxy_resolution/proxy_resolution_service.h" |
| #include "net/proxy_resolution/proxy_resolver.h" |
| #include "net/quic/crypto/proof_verifier_chromium.h" |
| #include "net/quic/mock_crypto_client_stream_factory.h" |
| #include "net/quic/mock_quic_data.h" |
| #include "net/quic/quic_chromium_alarm_factory.h" |
| #include "net/quic/quic_http_stream.h" |
| #include "net/quic/quic_http_utils.h" |
| #include "net/quic/quic_stream_factory_peer.h" |
| #include "net/quic/quic_test_packet_maker.h" |
| #include "net/quic/test_task_runner.h" |
| #include "net/socket/client_socket_factory.h" |
| #include "net/socket/mock_client_socket_pool_manager.h" |
| #include "net/socket/next_proto.h" |
| #include "net/socket/socket_performance_watcher.h" |
| #include "net/socket/socket_performance_watcher_factory.h" |
| #include "net/socket/socket_test_util.h" |
| #include "net/spdy/spdy_test_util_common.h" |
| #include "net/ssl/ssl_config_service_defaults.h" |
| #include "net/test/cert_test_util.h" |
| #include "net/test/gtest_util.h" |
| #include "net/test/test_data_directory.h" |
| #include "net/test/test_with_scoped_task_environment.h" |
| #include "net/third_party/quic/core/crypto/quic_decrypter.h" |
| #include "net/third_party/quic/core/crypto/quic_encrypter.h" |
| #include "net/third_party/quic/core/quic_framer.h" |
| #include "net/third_party/quic/core/quic_utils.h" |
| #include "net/third_party/quic/platform/api/quic_str_cat.h" |
| #include "net/third_party/quic/platform/api/quic_string_piece.h" |
| #include "net/third_party/quic/platform/api/quic_test.h" |
| #include "net/third_party/quic/test_tools/crypto_test_utils.h" |
| #include "net/third_party/quic/test_tools/mock_clock.h" |
| #include "net/third_party/quic/test_tools/mock_random.h" |
| #include "net/third_party/quic/test_tools/quic_spdy_session_peer.h" |
| #include "net/third_party/quic/test_tools/quic_test_utils.h" |
| #include "net/third_party/quiche/src/spdy/core/spdy_frame_builder.h" |
| #include "net/third_party/quiche/src/spdy/core/spdy_framer.h" |
| #include "net/traffic_annotation/network_traffic_annotation_test_helper.h" |
| #include "net/url_request/url_request.h" |
| #include "net/url_request/url_request_job_factory_impl.h" |
| #include "net/url_request/url_request_test_util.h" |
| #include "starboard/string.h" |
| #include "testing/gmock/include/gmock/gmock.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| #include "testing/platform_test.h" |
| #include "url/gurl.h" |
| |
| using ::testing::ElementsAre; |
| using ::testing::Key; |
| |
| namespace net { |
| namespace test { |
| |
| namespace { |
| |
| enum DestinationType { |
| // In pooling tests with two requests for different origins to the same |
| // destination, the destination should be |
| SAME_AS_FIRST, // the same as the first origin, |
| SAME_AS_SECOND, // the same as the second origin, or |
| DIFFERENT, // different from both. |
| }; |
| |
| static const char kQuicAlternativeServiceHeader[] = |
| "Alt-Svc: quic=\":443\"\r\n\r\n"; |
| static const char kQuicAlternativeServiceWithProbabilityHeader[] = |
| "Alt-Svc: quic=\":443\";p=\".5\"\r\n\r\n"; |
| static const char kQuicAlternativeServiceDifferentPortHeader[] = |
| "Alt-Svc: quic=\":137\"\r\n\r\n"; |
| |
| const char kDefaultServerHostName[] = "mail.example.org"; |
| const char kDifferentHostname[] = "different.example.com"; |
| |
| // Run QuicNetworkTransactionWithDestinationTest instances with all value |
| // combinations of version and destination_type. |
| struct PoolingTestParams { |
| friend std::ostream& operator<<(std::ostream& os, |
| const PoolingTestParams& p) { |
| os << "{ version: " << QuicVersionToString(p.version) |
| << ", destination_type: "; |
| switch (p.destination_type) { |
| case SAME_AS_FIRST: |
| os << "SAME_AS_FIRST"; |
| break; |
| case SAME_AS_SECOND: |
| os << "SAME_AS_SECOND"; |
| break; |
| case DIFFERENT: |
| os << "DIFFERENT"; |
| break; |
| } |
| os << ", client_headers_include_h2_stream_dependency: " |
| << p.client_headers_include_h2_stream_dependency; |
| os << " }"; |
| return os; |
| } |
| |
| quic::QuicTransportVersion version; |
| DestinationType destination_type; |
| bool client_headers_include_h2_stream_dependency; |
| }; |
| |
| std::string GenerateQuicVersionsListForAltSvcHeader( |
| const quic::QuicTransportVersionVector& versions) { |
| std::string result = ""; |
| for (const quic::QuicTransportVersion& version : versions) { |
| if (!result.empty()) |
| result.append(","); |
| result.append(base::NumberToString(version)); |
| } |
| return result; |
| } |
| |
| std::vector<PoolingTestParams> GetPoolingTestParams() { |
| std::vector<PoolingTestParams> params; |
| quic::QuicTransportVersionVector all_supported_versions = |
| quic::AllSupportedTransportVersions(); |
| for (const quic::QuicTransportVersion version : all_supported_versions) { |
| params.push_back(PoolingTestParams{version, SAME_AS_FIRST, false}); |
| params.push_back(PoolingTestParams{version, SAME_AS_FIRST, true}); |
| params.push_back(PoolingTestParams{version, SAME_AS_SECOND, false}); |
| params.push_back(PoolingTestParams{version, SAME_AS_SECOND, true}); |
| params.push_back(PoolingTestParams{version, DIFFERENT, false}); |
| params.push_back(PoolingTestParams{version, DIFFERENT, true}); |
| } |
| return params; |
| } |
| |
| } // namespace |
| |
| class HeadersHandler { |
| public: |
| HeadersHandler() : was_proxied_(false) {} |
| |
| bool was_proxied() { return was_proxied_; } |
| |
| void OnBeforeHeadersSent(const ProxyInfo& proxy_info, |
| HttpRequestHeaders* request_headers) { |
| if (!proxy_info.is_http() && !proxy_info.is_https() && |
| !proxy_info.is_quic()) { |
| return; |
| } |
| was_proxied_ = true; |
| } |
| |
| private: |
| bool was_proxied_; |
| }; |
| |
| class TestSocketPerformanceWatcher : public SocketPerformanceWatcher { |
| public: |
| TestSocketPerformanceWatcher(bool* should_notify_updated_rtt, |
| bool* rtt_notification_received) |
| : should_notify_updated_rtt_(should_notify_updated_rtt), |
| rtt_notification_received_(rtt_notification_received) {} |
| ~TestSocketPerformanceWatcher() override {} |
| |
| bool ShouldNotifyUpdatedRTT() const override { |
| return *should_notify_updated_rtt_; |
| } |
| |
| void OnUpdatedRTTAvailable(const base::TimeDelta& rtt) override { |
| *rtt_notification_received_ = true; |
| } |
| |
| void OnConnectionChanged() override {} |
| |
| private: |
| bool* should_notify_updated_rtt_; |
| bool* rtt_notification_received_; |
| |
| DISALLOW_COPY_AND_ASSIGN(TestSocketPerformanceWatcher); |
| }; |
| |
| class TestSocketPerformanceWatcherFactory |
| : public SocketPerformanceWatcherFactory { |
| public: |
| TestSocketPerformanceWatcherFactory() |
| : watcher_count_(0u), |
| should_notify_updated_rtt_(true), |
| rtt_notification_received_(false) {} |
| ~TestSocketPerformanceWatcherFactory() override {} |
| |
| // SocketPerformanceWatcherFactory implementation: |
| std::unique_ptr<SocketPerformanceWatcher> CreateSocketPerformanceWatcher( |
| const Protocol protocol, |
| const AddressList& /* address_list */) override { |
| if (protocol != PROTOCOL_QUIC) { |
| return nullptr; |
| } |
| ++watcher_count_; |
| return std::unique_ptr<SocketPerformanceWatcher>( |
| new TestSocketPerformanceWatcher(&should_notify_updated_rtt_, |
| &rtt_notification_received_)); |
| } |
| |
| size_t watcher_count() const { return watcher_count_; } |
| |
| bool rtt_notification_received() const { return rtt_notification_received_; } |
| |
| void set_should_notify_updated_rtt(bool should_notify_updated_rtt) { |
| should_notify_updated_rtt_ = should_notify_updated_rtt; |
| } |
| |
| private: |
| size_t watcher_count_; |
| bool should_notify_updated_rtt_; |
| bool rtt_notification_received_; |
| |
| DISALLOW_COPY_AND_ASSIGN(TestSocketPerformanceWatcherFactory); |
| }; |
| |
| class QuicNetworkTransactionTest |
| : public PlatformTest, |
| public ::testing::WithParamInterface< |
| std::tuple<quic::QuicTransportVersion, bool>>, |
| public WithScopedTaskEnvironment { |
| protected: |
| QuicNetworkTransactionTest() |
| : version_(std::get<0>(GetParam())), |
| client_headers_include_h2_stream_dependency_(std::get<1>(GetParam())), |
| supported_versions_(quic::test::SupportedTransportVersions(version_)), |
| random_generator_(0), |
| client_maker_( |
| version_, |
| quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, |
| kDefaultServerHostName, |
| quic::Perspective::IS_CLIENT, |
| client_headers_include_h2_stream_dependency_), |
| server_maker_( |
| version_, |
| quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, |
| kDefaultServerHostName, |
| quic::Perspective::IS_SERVER, |
| false), |
| cert_transparency_verifier_(new MultiLogCTVerifier()), |
| ssl_config_service_(new SSLConfigServiceDefaults), |
| proxy_resolution_service_(ProxyResolutionService::CreateDirect()), |
| #if defined(COBALT_QUIC46) |
| // m70 code. |
| auth_handler_factory_( |
| HttpAuthHandlerFactory::CreateDefault(nullptr)), |
| #else |
| auth_handler_factory_(HttpAuthHandlerFactory::CreateDefault()), |
| #endif |
| ssl_data_(ASYNC, OK) { |
| request_.method = "GET"; |
| std::string url("https://"); |
| url.append(kDefaultServerHostName); |
| request_.url = GURL(url); |
| request_.load_flags = 0; |
| request_.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| clock_.AdvanceTime(quic::QuicTime::Delta::FromMilliseconds(20)); |
| |
| scoped_refptr<X509Certificate> cert( |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| verify_details_.cert_verify_result.verified_cert = cert; |
| verify_details_.cert_verify_result.is_issued_by_known_root = true; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); |
| } |
| |
| void SetUp() override { |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| void TearDown() override { |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| // Empty the current queue. |
| base::RunLoop().RunUntilIdle(); |
| PlatformTest::TearDown(); |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| base::RunLoop().RunUntilIdle(); |
| session_.reset(); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientConnectionClosePacket(uint64_t num) { |
| return client_maker_.MakeConnectionClosePacket( |
| num, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!"); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructServerConnectionClosePacket(uint64_t num) { |
| return server_maker_.MakeConnectionClosePacket( |
| num, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!"); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerGoAwayPacket( |
| uint64_t num, |
| quic::QuicErrorCode error_code, |
| std::string reason_phrase) { |
| return server_maker_.MakeGoAwayPacket(num, error_code, reason_phrase); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckPacket( |
| uint64_t packet_number, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked) { |
| return client_maker_.MakeAckPacket(packet_number, largest_received, |
| smallest_received, least_unacked, true); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckPacket( |
| uint64_t packet_number, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked, |
| quic::QuicTime::Delta ack_delay_time) { |
| return client_maker_.MakeAckPacket(packet_number, largest_received, |
| smallest_received, least_unacked, true, |
| ack_delay_time); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckAndRstPacket( |
| uint64_t num, |
| quic::QuicStreamId stream_id, |
| quic::QuicRstStreamErrorCode error_code, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked) { |
| return client_maker_.MakeAckAndRstPacket( |
| num, false, stream_id, error_code, largest_received, smallest_received, |
| least_unacked, true); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientRstPacket( |
| uint64_t num, |
| quic::QuicStreamId stream_id, |
| quic::QuicRstStreamErrorCode error_code, |
| size_t bytes_written) { |
| return client_maker_.MakeRstPacket(num, false, stream_id, error_code, |
| bytes_written, |
| /*include_stop_sending_if_v99=*/true); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientAckAndConnectionClosePacket(uint64_t packet_number, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked) { |
| return client_maker_.MakeAckPacket(packet_number, largest_received, |
| smallest_received, least_unacked, true); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientAckAndConnectionClosePacket( |
| uint64_t num, |
| quic::QuicTime::Delta delta_time_largest_observed, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked, |
| quic::QuicErrorCode quic_error, |
| const std::string& quic_error_details) { |
| return client_maker_.MakeAckAndConnectionClosePacket( |
| num, false, delta_time_largest_observed, largest_received, |
| smallest_received, least_unacked, quic_error, quic_error_details); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerRstPacket( |
| uint64_t num, |
| bool include_version, |
| quic::QuicStreamId stream_id, |
| quic::QuicRstStreamErrorCode error_code) { |
| return server_maker_.MakeRstPacket(num, include_version, stream_id, |
| error_code); |
| } |
| |
| std::unique_ptr<quic::QuicReceivedPacket> ConstructInitialSettingsPacket( |
| uint64_t packet_number, |
| quic::QuicStreamOffset* offset) { |
| return client_maker_.MakeInitialSettingsPacket(packet_number, offset); |
| } |
| |
| std::unique_ptr<quic::QuicReceivedPacket> ConstructServerAckPacket( |
| uint64_t packet_number, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked) { |
| return server_maker_.MakeAckPacket(packet_number, largest_received, |
| smallest_received, least_unacked, false); |
| } |
| |
| std::unique_ptr<quic::QuicReceivedPacket> ConstructClientPriorityPacket( |
| uint64_t packet_number, |
| bool should_include_version, |
| quic::QuicStreamId id, |
| quic::QuicStreamId parent_stream_id, |
| RequestPriority request_priority, |
| quic::QuicStreamOffset* offset) { |
| return client_maker_.MakePriorityPacket( |
| packet_number, should_include_version, id, parent_stream_id, |
| ConvertRequestPriorityToQuicPriority(request_priority), offset); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientAckAndPriorityFramesPacket( |
| uint64_t packet_number, |
| bool should_include_version, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked, |
| const std::vector<QuicTestPacketMaker::Http2StreamDependency>& |
| priority_frames, |
| quic::QuicStreamOffset* offset) { |
| return client_maker_.MakeAckAndMultiplePriorityFramesPacket( |
| packet_number, should_include_version, largest_received, |
| smallest_received, least_unacked, priority_frames, offset); |
| } |
| |
| // Uses default QuicTestPacketMaker. |
| spdy::SpdyHeaderBlock GetRequestHeaders(const std::string& method, |
| const std::string& scheme, |
| const std::string& path) { |
| return GetRequestHeaders(method, scheme, path, &client_maker_); |
| } |
| |
| // Uses customized QuicTestPacketMaker. |
| spdy::SpdyHeaderBlock GetRequestHeaders(const std::string& method, |
| const std::string& scheme, |
| const std::string& path, |
| QuicTestPacketMaker* maker) { |
| return maker->GetRequestHeaders(method, scheme, path); |
| } |
| |
| spdy::SpdyHeaderBlock ConnectRequestHeaders(const std::string& host_port) { |
| return client_maker_.ConnectRequestHeaders(host_port); |
| } |
| |
| spdy::SpdyHeaderBlock GetResponseHeaders(const std::string& status) { |
| return server_maker_.GetResponseHeaders(status); |
| } |
| |
| // Appends alt_svc headers in the response headers. |
| spdy::SpdyHeaderBlock GetResponseHeaders(const std::string& status, |
| const std::string& alt_svc) { |
| return server_maker_.GetResponseHeaders(status, alt_svc); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerDataPacket( |
| uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| quic::QuicStreamOffset offset, |
| quic::QuicStringPiece data) { |
| return server_maker_.MakeDataPacket( |
| packet_number, stream_id, should_include_version, fin, offset, data); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientDataPacket( |
| uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| quic::QuicStreamOffset offset, |
| quic::QuicStringPiece data) { |
| return client_maker_.MakeDataPacket( |
| packet_number, stream_id, should_include_version, fin, offset, data); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientMultipleDataFramesPacket( |
| uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| quic::QuicStreamOffset offset, |
| const std::vector<std::string> data_writes) { |
| return client_maker_.MakeMultipleDataFramesPacket(packet_number, stream_id, |
| should_include_version, |
| fin, offset, data_writes); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckAndDataPacket( |
| uint64_t packet_number, |
| bool include_version, |
| quic::QuicStreamId stream_id, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked, |
| bool fin, |
| quic::QuicStreamOffset offset, |
| quic::QuicStringPiece data) { |
| return client_maker_.MakeAckAndDataPacket( |
| packet_number, include_version, stream_id, largest_received, |
| smallest_received, least_unacked, fin, offset, data); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientAckAndMultipleDataFramesPacket( |
| uint64_t packet_number, |
| bool include_version, |
| quic::QuicStreamId stream_id, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked, |
| bool fin, |
| quic::QuicStreamOffset offset, |
| const std::vector<std::string> data_writes) { |
| return client_maker_.MakeAckAndMultipleDataFramesPacket( |
| packet_number, include_version, stream_id, largest_received, |
| smallest_received, least_unacked, fin, offset, data_writes); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientForceHolDataPacket( |
| uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| quic::QuicStreamOffset* offset, |
| quic::QuicStringPiece data) { |
| return client_maker_.MakeForceHolDataPacket( |
| packet_number, stream_id, should_include_version, fin, offset, data); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientRequestHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| spdy::SpdyHeaderBlock headers) { |
| return ConstructClientRequestHeadersPacket(packet_number, stream_id, |
| should_include_version, fin, |
| std::move(headers), nullptr); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientRequestHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| spdy::SpdyHeaderBlock headers, |
| quic::QuicStreamOffset* offset) { |
| return ConstructClientRequestHeadersPacket(packet_number, stream_id, |
| should_include_version, fin, |
| std::move(headers), 0, offset); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientRequestHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| spdy::SpdyHeaderBlock headers, |
| quic::QuicStreamId parent_stream_id, |
| quic::QuicStreamOffset* offset) { |
| return ConstructClientRequestHeadersPacket( |
| packet_number, stream_id, should_include_version, fin, DEFAULT_PRIORITY, |
| std::move(headers), parent_stream_id, offset); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientRequestHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| RequestPriority request_priority, |
| spdy::SpdyHeaderBlock headers, |
| quic::QuicStreamId parent_stream_id, |
| quic::QuicStreamOffset* offset) { |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(request_priority); |
| return client_maker_.MakeRequestHeadersPacketWithOffsetTracking( |
| packet_number, stream_id, should_include_version, fin, priority, |
| std::move(headers), parent_stream_id, offset); |
| } |
| |
| std::unique_ptr<quic::QuicReceivedPacket> |
| ConstructClientRequestHeadersAndDataFramesPacket( |
| uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| RequestPriority request_priority, |
| spdy::SpdyHeaderBlock headers, |
| quic::QuicStreamId parent_stream_id, |
| quic::QuicStreamOffset* offset, |
| size_t* spdy_headers_frame_length, |
| const std::vector<std::string>& data_writes) { |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(request_priority); |
| return client_maker_.MakeRequestHeadersAndMultipleDataFramesPacket( |
| packet_number, stream_id, should_include_version, fin, priority, |
| std::move(headers), parent_stream_id, offset, spdy_headers_frame_length, |
| data_writes); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientMultipleDataFramesPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| const std::vector<std::string>& data, |
| quic::QuicStreamOffset offset) { |
| return client_maker_.MakeMultipleDataFramesPacket( |
| packet_number, stream_id, should_include_version, fin, offset, data); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerPushPromisePacket( |
| uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| quic::QuicStreamId promised_stream_id, |
| bool should_include_version, |
| spdy::SpdyHeaderBlock headers, |
| quic::QuicStreamOffset* offset, |
| QuicTestPacketMaker* maker) { |
| return maker->MakePushPromisePacket( |
| packet_number, stream_id, promised_stream_id, should_include_version, |
| false, std::move(headers), nullptr, offset); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructServerResponseHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| spdy::SpdyHeaderBlock headers) { |
| return ConstructServerResponseHeadersPacket(packet_number, stream_id, |
| should_include_version, fin, |
| std::move(headers), nullptr); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructServerResponseHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| bool fin, |
| spdy::SpdyHeaderBlock headers, |
| quic::QuicStreamOffset* offset) { |
| return server_maker_.MakeResponseHeadersPacketWithOffsetTracking( |
| packet_number, stream_id, should_include_version, fin, |
| std::move(headers), offset); |
| } |
| |
| quic::QuicString ConstructDataHeader(size_t body_len) { |
| if (version_ != quic::QUIC_VERSION_99) { |
| return ""; |
| } |
| quic::HttpEncoder encoder; |
| std::unique_ptr<char[]> buffer; |
| auto header_length = encoder.SerializeDataFrameHeader(body_len, &buffer); |
| return quic::QuicString(buffer.get(), header_length); |
| } |
| |
| void CreateSession( |
| const quic::QuicTransportVersionVector& supported_versions) { |
| session_params_.enable_quic = true; |
| session_params_.quic_supported_versions = supported_versions; |
| session_params_.quic_headers_include_h2_stream_dependency = |
| client_headers_include_h2_stream_dependency_; |
| |
| session_context_.quic_clock = &clock_; |
| session_context_.quic_random = &random_generator_; |
| session_context_.client_socket_factory = &socket_factory_; |
| session_context_.quic_crypto_client_stream_factory = |
| &crypto_client_stream_factory_; |
| session_context_.host_resolver = &host_resolver_; |
| session_context_.cert_verifier = &cert_verifier_; |
| session_context_.transport_security_state = &transport_security_state_; |
| session_context_.cert_transparency_verifier = |
| cert_transparency_verifier_.get(); |
| session_context_.ct_policy_enforcer = &ct_policy_enforcer_; |
| session_context_.socket_performance_watcher_factory = |
| &test_socket_performance_watcher_factory_; |
| session_context_.proxy_resolution_service = proxy_resolution_service_.get(); |
| session_context_.ssl_config_service = ssl_config_service_.get(); |
| session_context_.http_auth_handler_factory = auth_handler_factory_.get(); |
| session_context_.http_server_properties = &http_server_properties_; |
| session_context_.net_log = net_log_.bound().net_log(); |
| |
| session_.reset(new HttpNetworkSession(session_params_, session_context_)); |
| session_->quic_stream_factory()->set_require_confirmation(false); |
| SpdySessionPoolPeer spdy_pool_peer(session_->spdy_session_pool()); |
| spdy_pool_peer.SetEnableSendingInitialData(false); |
| } |
| |
| void CreateSession() { return CreateSession(supported_versions_); } |
| |
| void CheckWasQuicResponse(HttpNetworkTransaction* trans) { |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| ASSERT_TRUE(response->headers.get() != nullptr); |
| EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_), |
| response->connection_info); |
| } |
| |
| void CheckResponsePort(HttpNetworkTransaction* trans, uint16_t port) { |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| #if defined(COBALT_QUIC46) |
| EXPECT_EQ(port, response->socket_address.port()); |
| #else |
| EXPECT_EQ(port, response->remote_endpoint.port()); |
| #endif |
| } |
| |
| void CheckWasHttpResponse(HttpNetworkTransaction* trans) { |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| ASSERT_TRUE(response->headers.get() != nullptr); |
| EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| EXPECT_FALSE(response->was_fetched_via_spdy); |
| EXPECT_FALSE(response->was_alpn_negotiated); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP1_1, |
| response->connection_info); |
| } |
| |
| void CheckWasSpdyResponse(HttpNetworkTransaction* trans) { |
| const HttpResponseInfo* response = trans->GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| ASSERT_TRUE(response->headers.get() != nullptr); |
| EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2, |
| response->connection_info); |
| } |
| |
| void CheckResponseData(HttpNetworkTransaction* trans, |
| const std::string& expected) { |
| std::string response_data; |
| ASSERT_THAT(ReadTransaction(trans, &response_data), IsOk()); |
| EXPECT_EQ(expected, response_data); |
| } |
| |
| void RunTransaction(HttpNetworkTransaction* trans) { |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| } |
| |
| void SendRequestAndExpectHttpResponse(const std::string& expected) { |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| RunTransaction(&trans); |
| CheckWasHttpResponse(&trans); |
| CheckResponseData(&trans, expected); |
| } |
| |
| void SendRequestAndExpectHttpResponseFromProxy(const std::string& expected, |
| bool used_proxy, |
| uint16_t port) { |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::Bind(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| RunTransaction(&trans); |
| CheckWasHttpResponse(&trans); |
| CheckResponsePort(&trans, port); |
| CheckResponseData(&trans, expected); |
| EXPECT_EQ(used_proxy, headers_handler.was_proxied()); |
| if (used_proxy) { |
| EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_https()); |
| } else { |
| EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_direct()); |
| } |
| } |
| |
| void SendRequestAndExpectQuicResponse(const std::string& expected) { |
| SendRequestAndExpectQuicResponseMaybeFromProxy(expected, false, 443); |
| } |
| |
| void SendRequestAndExpectQuicResponseFromProxyOnPort( |
| const std::string& expected, |
| uint16_t port) { |
| SendRequestAndExpectQuicResponseMaybeFromProxy(expected, true, port); |
| } |
| |
| void AddQuicAlternateProtocolMapping( |
| MockCryptoClientStream::HandshakeMode handshake_mode) { |
| crypto_client_stream_factory_.set_handshake_mode(handshake_mode); |
| url::SchemeHostPort server(request_.url); |
| AlternativeService alternative_service(kProtoQUIC, server.host(), 443); |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| http_server_properties_.SetQuicAlternativeService( |
| server, alternative_service, expiration, supported_versions_); |
| } |
| |
| void AddQuicRemoteAlternativeServiceMapping( |
| MockCryptoClientStream::HandshakeMode handshake_mode, |
| const HostPortPair& alternative) { |
| crypto_client_stream_factory_.set_handshake_mode(handshake_mode); |
| url::SchemeHostPort server(request_.url); |
| AlternativeService alternative_service(kProtoQUIC, alternative.host(), |
| alternative.port()); |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| http_server_properties_.SetQuicAlternativeService( |
| server, alternative_service, expiration, supported_versions_); |
| } |
| |
| void ExpectBrokenAlternateProtocolMapping() { |
| const url::SchemeHostPort server(request_.url); |
| const AlternativeServiceInfoVector alternative_service_info_vector = |
| http_server_properties_.GetAlternativeServiceInfos(server); |
| EXPECT_EQ(1u, alternative_service_info_vector.size()); |
| EXPECT_TRUE(http_server_properties_.IsAlternativeServiceBroken( |
| alternative_service_info_vector[0].alternative_service())); |
| } |
| |
| void ExpectQuicAlternateProtocolMapping() { |
| const url::SchemeHostPort server(request_.url); |
| const AlternativeServiceInfoVector alternative_service_info_vector = |
| http_server_properties_.GetAlternativeServiceInfos(server); |
| EXPECT_EQ(1u, alternative_service_info_vector.size()); |
| EXPECT_EQ( |
| kProtoQUIC, |
| alternative_service_info_vector[0].alternative_service().protocol); |
| EXPECT_FALSE(http_server_properties_.IsAlternativeServiceBroken( |
| alternative_service_info_vector[0].alternative_service())); |
| } |
| |
| void AddHangingNonAlternateProtocolSocketData() { |
| std::unique_ptr<StaticSocketDataProvider> hanging_data; |
| hanging_data.reset(new StaticSocketDataProvider()); |
| MockConnect hanging_connect(SYNCHRONOUS, ERR_IO_PENDING); |
| hanging_data->set_connect_data(hanging_connect); |
| hanging_data_.push_back(std::move(hanging_data)); |
| socket_factory_.AddSocketDataProvider(hanging_data_.back().get()); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| } |
| |
| void SetUpTestForRetryConnectionOnAlternateNetwork() { |
| session_params_.quic_migrate_sessions_on_network_change_v2 = true; |
| session_params_.quic_migrate_sessions_early_v2 = true; |
| session_params_.quic_retry_on_alternate_network_before_handshake = true; |
| scoped_mock_change_notifier_.reset(new ScopedMockNetworkChangeNotifier()); |
| MockNetworkChangeNotifier* mock_ncn = |
| scoped_mock_change_notifier_->mock_network_change_notifier(); |
| mock_ncn->ForceNetworkHandlesSupported(); |
| mock_ncn->SetConnectedNetworksList( |
| {kDefaultNetworkForTests, kNewNetworkForTests}); |
| } |
| |
| // Fetches two non-cryptographic URL requests via a HTTPS proxy with a QUIC |
| // alternative proxy. Verifies that if the alternative proxy job returns |
| // |error_code|, the request is fetched successfully by the main job. |
| void TestAlternativeProxy(int error_code) { |
| // Use a non-cryptographic scheme for the request URL since this request |
| // will be fetched via proxy with QUIC as the alternative service. |
| request_.url = GURL("http://example.org/"); |
| // Data for the alternative proxy server job. |
| MockWrite quic_writes[] = {MockWrite(SYNCHRONOUS, error_code, 1)}; |
| MockRead quic_reads[] = { |
| MockRead(SYNCHRONOUS, error_code, 0), |
| }; |
| |
| SequencedSocketData quic_data(quic_reads, quic_writes); |
| socket_factory_.AddSocketDataProvider(&quic_data); |
| |
| // Main job succeeds and the alternative job fails. |
| // Add data for two requests that will be read by the main job. |
| MockRead http_reads_1[] = { |
| MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| MockRead http_reads_2[] = { |
| MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data_1(http_reads_1, base::span<MockWrite>()); |
| StaticSocketDataProvider http_data_2(http_reads_2, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data_1); |
| socket_factory_.AddSocketDataProvider(&http_data_2); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| TestProxyDelegate test_proxy_delegate; |
| // Proxy URL is different from the request URL. |
| test_proxy_delegate.set_alternative_proxy_server( |
| ProxyServer::FromPacString("QUIC myproxy.org:443")); |
| |
| proxy_resolution_service_ = |
| ProxyResolutionService::CreateFixedFromPacResult( |
| "HTTPS myproxy.org:443", TRAFFIC_ANNOTATION_FOR_TESTS); |
| proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate); |
| |
| CreateSession(); |
| EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_valid()); |
| |
| // The first request should be fetched via the HTTPS proxy. |
| SendRequestAndExpectHttpResponseFromProxy("hello from http", true, 443); |
| |
| // Since the main job succeeded only the alternative proxy server should be |
| // marked as bad. |
| EXPECT_THAT(session_->proxy_resolution_service()->proxy_retry_info(), |
| ElementsAre(Key("quic://myproxy.org:443"))); |
| |
| // Verify that the second request completes successfully, and the |
| // alternative proxy server job is not started. |
| SendRequestAndExpectHttpResponseFromProxy("hello from http", true, 443); |
| } |
| |
| quic::QuicStreamId GetNthClientInitiatedBidirectionalStreamId(int n) { |
| return quic::test::GetNthClientInitiatedBidirectionalStreamId(version_, n); |
| } |
| |
| quic::QuicStreamId GetNthServerInitiatedUnidirectionalStreamId(int n) { |
| return quic::test::GetNthServerInitiatedUnidirectionalStreamId(version_, n); |
| } |
| |
| static void AddCertificate(SSLSocketDataProvider* ssl_data) { |
| ssl_data->ssl_info.cert = |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); |
| ASSERT_TRUE(ssl_data->ssl_info.cert); |
| } |
| |
| const quic::QuicTransportVersion version_; |
| const bool client_headers_include_h2_stream_dependency_; |
| quic::QuicTransportVersionVector supported_versions_; |
| QuicFlagSaver flags_; // Save/restore all QUIC flag values. |
| quic::MockClock clock_; |
| quic::test::MockRandom random_generator_; |
| QuicTestPacketMaker client_maker_; |
| QuicTestPacketMaker server_maker_; |
| std::unique_ptr<HttpNetworkSession> session_; |
| MockClientSocketFactory socket_factory_; |
| ProofVerifyDetailsChromium verify_details_; |
| MockCryptoClientStreamFactory crypto_client_stream_factory_; |
| MockHostResolver host_resolver_; |
| MockCertVerifier cert_verifier_; |
| TransportSecurityState transport_security_state_; |
| std::unique_ptr<CTVerifier> cert_transparency_verifier_; |
| DefaultCTPolicyEnforcer ct_policy_enforcer_; |
| TestSocketPerformanceWatcherFactory test_socket_performance_watcher_factory_; |
| std::unique_ptr<SSLConfigServiceDefaults> ssl_config_service_; |
| std::unique_ptr<ProxyResolutionService> proxy_resolution_service_; |
| std::unique_ptr<HttpAuthHandlerFactory> auth_handler_factory_; |
| HttpServerPropertiesImpl http_server_properties_; |
| HttpNetworkSession::Params session_params_; |
| HttpNetworkSession::Context session_context_; |
| HttpRequestInfo request_; |
| BoundTestNetLog net_log_; |
| std::vector<std::unique_ptr<StaticSocketDataProvider>> hanging_data_; |
| SSLSocketDataProvider ssl_data_; |
| std::unique_ptr<ScopedMockNetworkChangeNotifier> scoped_mock_change_notifier_; |
| |
| private: |
| void SendRequestAndExpectQuicResponseMaybeFromProxy( |
| const std::string& expected, |
| bool used_proxy, |
| uint16_t port) { |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::Bind(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| RunTransaction(&trans); |
| CheckWasQuicResponse(&trans); |
| CheckResponsePort(&trans, port); |
| CheckResponseData(&trans, expected); |
| EXPECT_EQ(used_proxy, headers_handler.was_proxied()); |
| if (used_proxy) { |
| EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic()); |
| } else { |
| EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_direct()); |
| } |
| } |
| }; |
| |
| INSTANTIATE_TEST_SUITE_P( |
| VersionIncludeStreamDependencySequence, |
| QuicNetworkTransactionTest, |
| ::testing::Combine( |
| ::testing::ValuesIn(quic::AllSupportedTransportVersions()), |
| ::testing::Bool())); |
| |
| TEST_P(QuicNetworkTransactionTest, WriteErrorHandshakeConfirmed) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| base::HistogramTester histograms; |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| crypto_client_stream_factory_.set_handshake_mode( |
| MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ERR_INTERNET_DISCONNECTED); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // Pause |
| mock_quic_data.AddRead(ASYNC, OK); // No more data to read |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| |
| histograms.ExpectBucketCount("Net.QuicSession.WriteError", |
| -ERR_INTERNET_DISCONNECTED, 1); |
| histograms.ExpectBucketCount("Net.QuicSession.WriteError.HandshakeConfirmed", |
| -ERR_INTERNET_DISCONNECTED, 1); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, WriteErrorHandshakeConfirmedAsync) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| base::HistogramTester histograms; |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| crypto_client_stream_factory_.set_handshake_mode( |
| MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite(ASYNC, ERR_INTERNET_DISCONNECTED); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // Pause |
| mock_quic_data.AddRead(ASYNC, OK); // No more data to read |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| |
| histograms.ExpectBucketCount("Net.QuicSession.WriteError", |
| -ERR_INTERNET_DISCONNECTED, 1); |
| histograms.ExpectBucketCount("Net.QuicSession.WriteError.HandshakeConfirmed", |
| -ERR_INTERNET_DISCONNECTED, 1); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, SocketWatcherEnabled) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| test_socket_performance_watcher_factory_.set_should_notify_updated_rtt(true); |
| |
| EXPECT_FALSE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| SendRequestAndExpectQuicResponse("hello!"); |
| EXPECT_TRUE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, SocketWatcherDisabled) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| test_socket_performance_watcher_factory_.set_should_notify_updated_rtt(false); |
| |
| EXPECT_FALSE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| SendRequestAndExpectQuicResponse("hello!"); |
| EXPECT_FALSE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ForceQuic) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| // Check that the NetLog was filled reasonably. |
| TestNetLogEntry::List entries; |
| net_log_.GetEntries(&entries); |
| EXPECT_LT(0u, entries.size()); |
| |
| // Check that we logged a QUIC_SESSION_PACKET_RECEIVED. |
| int pos = ExpectLogContainsSomewhere( |
| entries, 0, NetLogEventType::QUIC_SESSION_PACKET_RECEIVED, |
| NetLogEventPhase::NONE); |
| EXPECT_LT(0, pos); |
| |
| // ... and also a TYPE_QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED. |
| pos = ExpectLogContainsSomewhere( |
| entries, 0, |
| NetLogEventType::QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED, |
| NetLogEventPhase::NONE); |
| EXPECT_LT(0, pos); |
| |
| int packet_number; |
| ASSERT_TRUE(entries[pos].GetIntegerValue("packet_number", &packet_number)); |
| EXPECT_EQ(1, packet_number); |
| |
| // ... and also a TYPE_QUIC_SESSION_PACKET_AUTHENTICATED. |
| pos = ExpectLogContainsSomewhere( |
| entries, 0, NetLogEventType::QUIC_SESSION_PACKET_AUTHENTICATED, |
| NetLogEventPhase::NONE); |
| EXPECT_LT(0, pos); |
| |
| // ... and also a QUIC_SESSION_STREAM_FRAME_RECEIVED. |
| pos = ExpectLogContainsSomewhere( |
| entries, 0, NetLogEventType::QUIC_SESSION_STREAM_FRAME_RECEIVED, |
| NetLogEventPhase::NONE); |
| EXPECT_LT(0, pos); |
| |
| int log_stream_id; |
| ASSERT_TRUE(entries[pos].GetIntegerValue("stream_id", &log_stream_id)); |
| EXPECT_EQ(quic::QuicUtils::GetHeadersStreamId(version_), |
| static_cast<quic::QuicStreamId>(log_stream_id)); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, LargeResponseHeaders) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| spdy::SpdyHeaderBlock response_headers = GetResponseHeaders("200 OK"); |
| response_headers["key1"] = std::string(30000, 'A'); |
| response_headers["key2"] = std::string(30000, 'A'); |
| response_headers["key3"] = std::string(30000, 'A'); |
| response_headers["key4"] = std::string(30000, 'A'); |
| response_headers["key5"] = std::string(30000, 'A'); |
| response_headers["key6"] = std::string(30000, 'A'); |
| response_headers["key7"] = std::string(30000, 'A'); |
| response_headers["key8"] = std::string(30000, 'A'); |
| spdy::SpdyHeadersIR headers_frame( |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| std::move(response_headers)); |
| spdy::SpdyFramer response_framer(spdy::SpdyFramer::ENABLE_COMPRESSION); |
| spdy::SpdySerializedFrame spdy_frame = |
| response_framer.SerializeFrame(headers_frame); |
| |
| uint64_t packet_number = 1; |
| size_t chunk_size = 1200; |
| for (size_t offset = 0; offset < spdy_frame.size(); offset += chunk_size) { |
| size_t len = std::min(chunk_size, spdy_frame.size() - offset); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| packet_number++, |
| quic::QuicUtils::GetHeadersStreamId(version_), false, false, |
| offset, base::StringPiece(spdy_frame.data() + offset, len))); |
| } |
| |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| packet_number, GetNthClientInitiatedBidirectionalStreamId(0), |
| false, true, 0, header + "hello!")); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddWrite(ASYNC, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddWrite(ASYNC, |
| ConstructClientAckPacket(4, packet_number, 3, 1)); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, TooLargeResponseHeaders) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| spdy::SpdyHeaderBlock response_headers = GetResponseHeaders("200 OK"); |
| response_headers["key1"] = std::string(30000, 'A'); |
| response_headers["key2"] = std::string(30000, 'A'); |
| response_headers["key3"] = std::string(30000, 'A'); |
| response_headers["key4"] = std::string(30000, 'A'); |
| response_headers["key5"] = std::string(30000, 'A'); |
| response_headers["key6"] = std::string(30000, 'A'); |
| response_headers["key7"] = std::string(30000, 'A'); |
| response_headers["key8"] = std::string(30000, 'A'); |
| response_headers["key9"] = std::string(30000, 'A'); |
| spdy::SpdyHeadersIR headers_frame( |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| std::move(response_headers)); |
| spdy::SpdyFramer response_framer(spdy::SpdyFramer::ENABLE_COMPRESSION); |
| spdy::SpdySerializedFrame spdy_frame = |
| response_framer.SerializeFrame(headers_frame); |
| |
| uint64_t packet_number = 1; |
| size_t chunk_size = 1200; |
| for (size_t offset = 0; offset < spdy_frame.size(); offset += chunk_size) { |
| size_t len = std::min(chunk_size, spdy_frame.size() - offset); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| packet_number++, |
| quic::QuicUtils::GetHeadersStreamId(version_), false, false, |
| offset, base::StringPiece(spdy_frame.data() + offset, len))); |
| } |
| |
| quic::QuicString header = ConstructDataHeader(6); |
| |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| packet_number, GetNthClientInitiatedBidirectionalStreamId(0), |
| false, true, 0, header + "hello!")); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddWrite(ASYNC, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddWrite( |
| ASYNC, ConstructClientAckAndRstPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_HEADERS_TOO_LARGE, packet_number, 3, 1)); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ForceQuicForAll) { |
| session_params_.origins_to_force_quic_on.insert(HostPortPair()); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| EXPECT_TRUE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, QuicProxy) { |
| session_params_.enable_quic = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC mail.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "http", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| EXPECT_FALSE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| // There is no need to set up an alternate protocol job, because |
| // no attempt will be made to speak to the proxy over TCP. |
| |
| request_.url = GURL("http://mail.example.org/"); |
| CreateSession(); |
| |
| SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 70); |
| EXPECT_TRUE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| } |
| |
| // Regression test for https://crbug.com/492458. Test that for an HTTP |
| // connection through a QUIC proxy, the certificate exhibited by the proxy is |
| // checked against the proxy hostname, not the origin hostname. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyWithCert) { |
| const std::string origin_host = "mail.example.com"; |
| const std::string proxy_host = "www.example.org"; |
| |
| session_params_.enable_quic = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC " + proxy_host + ":70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| client_maker_.set_hostname(origin_host); |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "http", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| scoped_refptr<X509Certificate> cert( |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| ASSERT_TRUE(cert.get()); |
| // This certificate is valid for the proxy, but not for the origin. |
| EXPECT_TRUE(cert->VerifyNameMatch(proxy_host)); |
| EXPECT_FALSE(cert->VerifyNameMatch(origin_host)); |
| ProofVerifyDetailsChromium verify_details; |
| verify_details.cert_verify_result.verified_cert = cert; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| ProofVerifyDetailsChromium verify_details2; |
| verify_details2.cert_verify_result.verified_cert = cert; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details2); |
| |
| request_.url = GURL("http://" + origin_host); |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 70); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, AlternativeServicesDifferentHost) { |
| session_params_.quic_allow_remote_alt_svc = true; |
| HostPortPair origin("www.example.org", 443); |
| HostPortPair alternative("mail.example.org", 443); |
| |
| base::FilePath certs_dir = GetTestCertsDirectory(); |
| scoped_refptr<X509Certificate> cert( |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| ASSERT_TRUE(cert.get()); |
| // TODO(rch): the connection should be "to" the origin, so if the cert is |
| // valid for the origin but not the alternative, that should work too. |
| EXPECT_TRUE(cert->VerifyNameMatch(origin.host())); |
| EXPECT_TRUE(cert->VerifyNameMatch(alternative.host())); |
| ProofVerifyDetailsChromium verify_details; |
| verify_details.cert_verify_result.verified_cert = cert; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| |
| client_maker_.set_hostname(origin.host()); |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| request_.url = GURL("https://" + origin.host()); |
| AddQuicRemoteAlternativeServiceMapping( |
| MockCryptoClientStream::CONFIRM_HANDSHAKE, alternative); |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, DoNotUseQuicForUnsupportedVersion) { |
| quic::QuicTransportVersion unsupported_version = |
| quic::QUIC_VERSION_UNSUPPORTED; |
| // Add support for another QUIC version besides |version_|. Also find a |
| // unsupported version. |
| for (const quic::QuicTransportVersion& version : |
| quic::AllSupportedTransportVersions()) { |
| if (version == version_) |
| continue; |
| if (supported_versions_.size() != 2) { |
| supported_versions_.push_back(version); |
| continue; |
| } |
| unsupported_version = version; |
| break; |
| } |
| DCHECK_NE(unsupported_version, quic::QUIC_VERSION_UNSUPPORTED); |
| |
| // Set up alternative service to use QUIC with a version that is not |
| // supported. |
| url::SchemeHostPort server(request_.url); |
| AlternativeService alternative_service(kProtoQUIC, kDefaultServerHostName, |
| 443); |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| http_server_properties_.SetQuicAlternativeService( |
| server, alternative_service, expiration, {unsupported_version}); |
| |
| AlternativeServiceInfoVector alt_svc_info_vector = |
| http_server_properties_.GetAlternativeServiceInfos(server); |
| EXPECT_EQ(1u, alt_svc_info_vector.size()); |
| EXPECT_EQ(kProtoQUIC, alt_svc_info_vector[0].alternative_service().protocol); |
| EXPECT_EQ(1u, alt_svc_info_vector[0].advertised_versions().size()); |
| EXPECT_EQ(unsupported_version, |
| alt_svc_info_vector[0].advertised_versions()[0]); |
| |
| // First request should still be sent via TCP as the QUIC version advertised |
| // in the stored AlternativeService is not supported by the client. However, |
| // the response from the server will advertise new Alt-Svc with supported |
| // versions. |
| std::string advertised_versions_list_str = |
| GenerateQuicVersionsListForAltSvcHeader( |
| quic::AllSupportedTransportVersions()); |
| std::string altsvc_header = |
| base::StringPrintf("Alt-Svc: quic=\":443\"; v=\"%s\"\r\n\r\n", |
| advertised_versions_list_str.c_str()); |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // Second request should be sent via QUIC as a new list of verions supported |
| // by the client has been advertised by the server. |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(supported_versions_); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| // Check alternative service list is updated with new versions. |
| alt_svc_info_vector = |
| session_->http_server_properties()->GetAlternativeServiceInfos(server); |
| EXPECT_EQ(1u, alt_svc_info_vector.size()); |
| EXPECT_EQ(kProtoQUIC, alt_svc_info_vector[0].alternative_service().protocol); |
| EXPECT_EQ(2u, alt_svc_info_vector[0].advertised_versions().size()); |
| // Advertised versions will be lised in a sorted order. |
| std::sort(supported_versions_.begin(), supported_versions_.end()); |
| EXPECT_EQ(supported_versions_[0], |
| alt_svc_info_vector[0].advertised_versions()[0]); |
| EXPECT_EQ(supported_versions_[1], |
| alt_svc_info_vector[0].advertised_versions()[1]); |
| } |
| |
| // Regression test for https://crbug.com/546991. |
| // The server might not be able to serve a request on an alternative connection, |
| // and might send a 421 Misdirected Request response status to indicate this. |
| // HttpNetworkTransaction should reset the request and retry without using |
| // alternative services. |
| TEST_P(QuicNetworkTransactionTest, RetryMisdirectedRequest) { |
| // Set up alternative service to use QUIC. |
| // Note that |origins_to_force_quic_on| cannot be used in this test, because |
| // that overrides |enable_alternative_services|. |
| url::SchemeHostPort server(request_.url); |
| AlternativeService alternative_service(kProtoQUIC, kDefaultServerHostName, |
| 443); |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| http_server_properties_.SetQuicAlternativeService( |
| server, alternative_service, expiration, supported_versions_); |
| |
| // First try: The alternative job uses QUIC and reports an HTTP 421 |
| // Misdirected Request error. The main job uses TCP, but |http_data| below is |
| // paused at Connect(), so it will never exit the socket pool. This ensures |
| // that the alternate job always wins the race and keeps whether the |
| // |http_data| exits the socket pool before the main job is aborted |
| // deterministic. The first main job gets aborted without the socket pool ever |
| // dispensing the socket, making it available for the second try. |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset request_header_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| GetResponseHeaders("421"), nullptr)); |
| mock_quic_data.AddRead(ASYNC, OK); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // Second try: The main job uses TCP, and there is no alternate job. Once the |
| // Connect() is unblocked, |http_data| will leave the socket pool, binding to |
| // the main job of the second request. It then succeeds over HTTP/1.1. |
| // Note that if there was an alternative QUIC Job created for the second try, |
| // that would read these data, and would fail with ERR_QUIC_PROTOCOL_ERROR. |
| // Therefore this test ensures that no alternative Job is created on retry. |
| MockWrite writes[] = {MockWrite(ASYNC, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(ASYNC, 1, "Host: mail.example.org\r\n"), |
| MockWrite(ASYNC, 2, "Connection: keep-alive\r\n\r\n")}; |
| MockRead reads[] = {MockRead(ASYNC, 3, "HTTP/1.1 200 OK\r\n\r\n"), |
| MockRead(ASYNC, 4, "hello!"), MockRead(ASYNC, OK, 5)}; |
| SequencedSocketData http_data(MockConnect(ASYNC, ERR_IO_PENDING) /* pause */, |
| reads, writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| |
| // Run until |mock_quic_data| has failed and |http_data| has paused. |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| base::RunLoop().RunUntilIdle(); |
| |
| // |mock_quic_data| must have run to completion. |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| |
| // Now that the QUIC data has been consumed, unblock |http_data|. |
| http_data.socket()->OnConnectComplete(MockConnect()); |
| |
| // The retry logic must hide the 421 status. The transaction succeeds on |
| // |http_data|. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| CheckWasHttpResponse(&trans); |
| CheckResponsePort(&trans, 443); |
| CheckResponseData(&trans, "hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ForceQuicWithErrorConnecting) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data1; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data1.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data1.AddRead(ASYNC, ERR_SOCKET_NOT_CONNECTED); |
| MockQuicData mock_quic_data2; |
| header_stream_offset = 0; |
| mock_quic_data2.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); |
| mock_quic_data2.AddRead(ASYNC, ERR_SOCKET_NOT_CONNECTED); |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); |
| |
| mock_quic_data1.AddSocketDataToFactory(&socket_factory_); |
| mock_quic_data2.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| EXPECT_EQ(0U, test_socket_performance_watcher_factory_.watcher_count()); |
| for (size_t i = 0; i < 2; ++i) { |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_CLOSED)); |
| EXPECT_EQ(1 + i, test_socket_performance_watcher_factory_.watcher_count()); |
| |
| NetErrorDetails details; |
| trans.PopulateNetErrorDetails(&details); |
| EXPECT_EQ(quic::QUIC_PACKET_READ_ERROR, details.quic_connection_error); |
| } |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, DoNotForceQuicForHttps) { |
| // Attempt to "force" quic on 443, which will not be honored. |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("www.google.com:443")); |
| |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&data); |
| SSLSocketDataProvider ssl(ASYNC, OK); |
| socket_factory_.AddSSLSocketDataProvider(&ssl); |
| |
| CreateSession(); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| EXPECT_EQ(0U, test_socket_performance_watcher_factory_.watcher_count()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceForQuic) { |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceWithVersionForQuic1) { |
| // Both server advertises and client supports two QUIC versions. |
| // Only |version_| is advertised and supported. |
| // The QuicStreamFactoy will pick up |version_|, which is verified as the |
| // PacketMakers are using |version_|. |
| |
| // Add support for another QUIC version besides |version_| on the client side. |
| // Also find a different version advertised by the server. |
| quic::QuicTransportVersion advertised_version_2 = |
| quic::QUIC_VERSION_UNSUPPORTED; |
| for (const quic::QuicTransportVersion& version : |
| quic::AllSupportedTransportVersions()) { |
| if (version == version_) |
| continue; |
| if (supported_versions_.size() != 2) { |
| supported_versions_.push_back(version); |
| continue; |
| } |
| advertised_version_2 = version; |
| break; |
| } |
| DCHECK_NE(advertised_version_2, quic::QUIC_VERSION_UNSUPPORTED); |
| |
| std::string QuicAltSvcWithVersionHeader = |
| base::StringPrintf("Alt-Svc: quic=\":443\";v=\"%d,%d\"\r\n\r\n", |
| advertised_version_2, version_); |
| |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead(QuicAltSvcWithVersionHeader.c_str()), MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(supported_versions_); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceWithVersionForQuic2) { |
| // Client and server mutually support more than one QUIC_VERSION. |
| // The QuicStreamFactoy will pick the preferred QUIC_VERSION: |version_|, |
| // which is verified as the PacketMakers are using |version_|. |
| |
| quic::QuicTransportVersion common_version_2 = quic::QUIC_VERSION_UNSUPPORTED; |
| for (const quic::QuicTransportVersion& version : |
| quic::AllSupportedTransportVersions()) { |
| if (version == version_) |
| continue; |
| common_version_2 = version; |
| break; |
| } |
| DCHECK_NE(common_version_2, quic::QUIC_VERSION_UNSUPPORTED); |
| |
| supported_versions_.push_back( |
| common_version_2); // Supported but unpreferred. |
| |
| std::string QuicAltSvcWithVersionHeader = base::StringPrintf( |
| "Alt-Svc: quic=\":443\";v=\"%d,%d\"\r\n\r\n", common_version_2, version_); |
| |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead(QuicAltSvcWithVersionHeader.c_str()), MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(supported_versions_); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, |
| UseAlternativeServiceWithProbabilityForQuic) { |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead(kQuicAlternativeServiceWithProbabilityHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, SetAlternativeServiceWithScheme) { |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| // Send https request, ignore alternative service advertising if response |
| // header advertises alternative service for mail.example.org. |
| request_.url = GURL("https://mail.example.org:443"); |
| SendRequestAndExpectHttpResponse("hello world"); |
| HttpServerProperties* http_server_properties = |
| session_->http_server_properties(); |
| url::SchemeHostPort http_server("http", "mail.example.org", 443); |
| url::SchemeHostPort https_server("https", "mail.example.org", 443); |
| // Check alternative service is set for the correct origin. |
| EXPECT_EQ( |
| 2u, |
| http_server_properties->GetAlternativeServiceInfos(https_server).size()); |
| EXPECT_TRUE( |
| http_server_properties->GetAlternativeServiceInfos(http_server).empty()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, DoNotGetAltSvcForDifferentOrigin) { |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| AddCertificate(&ssl_data_); |
| |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| |
| // Send https request and set alternative services if response header |
| // advertises alternative service for mail.example.org. |
| SendRequestAndExpectHttpResponse("hello world"); |
| HttpServerProperties* http_server_properties = |
| session_->http_server_properties(); |
| |
| const url::SchemeHostPort https_server(request_.url); |
| // Check alternative service is set. |
| EXPECT_EQ( |
| 2u, |
| http_server_properties->GetAlternativeServiceInfos(https_server).size()); |
| |
| // Send http request to the same origin but with diffrent scheme, should not |
| // use QUIC. |
| request_.url = GURL("http://mail.example.org:443"); |
| SendRequestAndExpectHttpResponse("hello world"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, |
| StoreMutuallySupportedVersionsWhenProcessAltSvc) { |
| // Add support for another QUIC version besides |version_|. |
| for (const quic::QuicTransportVersion& version : |
| quic::AllSupportedTransportVersions()) { |
| if (version == version_) |
| continue; |
| supported_versions_.push_back(version); |
| break; |
| } |
| |
| std::string advertised_versions_list_str = |
| GenerateQuicVersionsListForAltSvcHeader( |
| quic::AllSupportedTransportVersions()); |
| std::string altsvc_header = |
| base::StringPrintf("Alt-Svc: quic=\":443\"; v=\"%s\"\r\n\r\n", |
| advertised_versions_list_str.c_str()); |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(supported_versions_); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| // Check alternative service is set with only mutually supported versions. |
| const url::SchemeHostPort https_server(request_.url); |
| const AlternativeServiceInfoVector alt_svc_info_vector = |
| session_->http_server_properties()->GetAlternativeServiceInfos( |
| https_server); |
| EXPECT_EQ(1u, alt_svc_info_vector.size()); |
| EXPECT_EQ(kProtoQUIC, alt_svc_info_vector[0].alternative_service().protocol); |
| EXPECT_EQ(2u, alt_svc_info_vector[0].advertised_versions().size()); |
| // Advertised versions will be lised in a sorted order. |
| std::sort(supported_versions_.begin(), supported_versions_.end()); |
| EXPECT_EQ(supported_versions_[0], |
| alt_svc_info_vector[0].advertised_versions()[0]); |
| EXPECT_EQ(supported_versions_[1], |
| alt_svc_info_vector[0].advertised_versions()[1]); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceAllSupportedVersion) { |
| std::string altsvc_header = |
| base::StringPrintf("Alt-Svc: quic=\":443\"; v=\"%u\"\r\n\r\n", version_); |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, GoAwayWithConnectionMigrationOnPortsOnly) { |
| if (version_ == quic::QUIC_VERSION_99) { |
| // Not available under version 99 |
| return; |
| } |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| // Read a GoAway packet with |
| // quic::QuicErrorCode: quic::QUIC_ERROR_MIGRATING_PORT from the peer. |
| mock_quic_data.AddRead(SYNCHRONOUS, |
| ConstructServerGoAwayPacket( |
| 2, quic::QUIC_ERROR_MIGRATING_PORT, |
| "connection migration with port change only")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, ConstructServerDataPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), false, |
| true, 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndRstPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, 3, 3, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| // Check whether this transaction is correctly marked as received a go-away |
| // because of migrating port. |
| NetErrorDetails details; |
| EXPECT_FALSE(details.quic_port_migration_detected); |
| trans.PopulateNetErrorDetails(&details); |
| EXPECT_TRUE(details.quic_port_migration_detected); |
| } |
| |
| // This test verifies that a new QUIC connection will be attempted on the |
| // alternate network if the original QUIC connection fails with idle timeout |
| // before handshake is confirmed. If TCP succeeds and QUIC fails on the |
| // alternate network as well, QUIC is marked as broken and the brokenness will |
| // not expire when default network changes. |
| TEST_P(QuicNetworkTransactionTest, QuicFailsOnBothNetworksWhileTCPSucceeds) { |
| if (version_ >= quic::QUIC_VERSION_47) { |
| // TODO(nharper): reenable once MakeDummyCHLOPacket() fixed |
| return; |
| } |
| SetUpTestForRetryConnectionOnAlternateNetwork(); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Hanging read |
| int packet_num = 1; |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); // CHLO |
| // Retranmit the handshake messages. |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| // TODO(zhongyi): remove condition check once b/115926584 is fixed. |
| if (version_ <= quic::QUIC_VERSION_39) { |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| } |
| // After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT. |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeConnectionClosePacket( |
| packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, |
| "No recent network activity.")); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // Add successful TCP data so that TCP job will succeed. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "TCP succeeds"), MockRead(SYNCHRONOUS, OK, 6)}; |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // Add data for the second QUIC connection to fail. |
| MockQuicData quic_data2; |
| quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING); |
| quic_data2.AddWrite(SYNCHRONOUS, ERR_ADDRESS_UNREACHABLE); // Write error. |
| quic_data2.AddSocketDataToFactory(&socket_factory_); |
| |
| // Resolve the host resolution synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| // Add alternate protocol mapping to race QUIC and TCP. |
| // QUIC connection requires handshake to be confirmed and sends CHLO to the |
| // peer. |
| AddQuicAlternateProtocolMapping( |
| MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| // Request will be served with TCP job. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| CheckResponseData(&trans, "TCP succeeds"); |
| |
| // Fire the retransmission alarm, from this point, connection will idle |
| // timeout after 4 seconds. |
| if (!GetQuicReloadableFlag( |
| quic_fix_time_of_first_packet_sent_after_receiving)) { |
| quic_task_runner_->RunNextTask(); |
| } |
| // Fast forward to idle timeout the original connection. A new connection will |
| // be kicked off on the alternate network. |
| quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4)); |
| ASSERT_TRUE(quic_data.AllReadDataConsumed()); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| // Run the message loop to execute posted tasks, which will report job status. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that QUIC is marked as broken. |
| ExpectBrokenAlternateProtocolMapping(); |
| |
| // Deliver a message to notify the new network becomes default, the brokenness |
| // will not expire as QUIC is broken on both networks. |
| scoped_mock_change_notifier_->mock_network_change_notifier() |
| ->NotifyNetworkMadeDefault(kNewNetworkForTests); |
| ExpectBrokenAlternateProtocolMapping(); |
| |
| ASSERT_TRUE(quic_data2.AllReadDataConsumed()); |
| ASSERT_TRUE(quic_data2.AllWriteDataConsumed()); |
| } |
| |
| // This test verifies that a new QUIC connection will be attempted on the |
| // alternate network if the original QUIC connection fails with idle timeout |
| // before handshake is confirmed. If TCP succeeds and QUIC succeeds on the |
| // alternate network, QUIC is marked as broken. The brokenness will expire when |
| // the default network changes. |
| TEST_P(QuicNetworkTransactionTest, RetryOnAlternateNetworkWhileTCPSucceeds) { |
| if (version_ >= quic::QUIC_VERSION_47) { |
| // TODO(nharper): reenable once MakeDummyCHLOPacket() fixed |
| return; |
| } |
| SetUpTestForRetryConnectionOnAlternateNetwork(); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Hanging read |
| int packet_num = 1; |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); // CHLO |
| // Retranmit the handshake messages. |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| // TODO(zhongyi): remove condition check once b/115926584 is fixed. |
| if (version_ <= quic::QUIC_VERSION_39) { |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| } |
| // After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT. |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeConnectionClosePacket( |
| packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, |
| "No recent network activity.")); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // Add successful TCP data so that TCP job will succeed. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "TCP succeeds"), MockRead(SYNCHRONOUS, OK, 6)}; |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // Quic connection will be retried on the alternate network after the initial |
| // one fails on the default network. |
| MockQuicData quic_data2; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Handing read. |
| quic_data2.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(1)); // CHLO |
| |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data2.AddWrite(SYNCHRONOUS, |
| ConstructInitialSettingsPacket(2, &header_stream_offset)); |
| quic_data2.AddSocketDataToFactory(&socket_factory_); |
| |
| // Resolve the host resolution synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| // Add alternate protocol mapping to race QUIC and TCP. |
| // QUIC connection requires handshake to be confirmed and sends CHLO to the |
| // peer. |
| AddQuicAlternateProtocolMapping( |
| MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| // Request will be served with TCP job. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| CheckResponseData(&trans, "TCP succeeds"); |
| |
| // Fire the retransmission alarm, after which connection will idle |
| // timeout after 4 seconds. |
| if (!GetQuicReloadableFlag( |
| quic_fix_time_of_first_packet_sent_after_receiving)) { |
| quic_task_runner_->RunNextTask(); |
| } |
| // Fast forward to idle timeout the original connection. A new connection will |
| // be kicked off on the alternate network. |
| quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4)); |
| ASSERT_TRUE(quic_data.AllReadDataConsumed()); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| // The second connection hasn't finish handshake, verify that QUIC is not |
| // marked as broken. |
| ExpectQuicAlternateProtocolMapping(); |
| // Explicitly confirm the handshake on the second connection. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| // Run message loop to execute posted tasks, which will notify JoController |
| // about the orphaned job status. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Verify that QUIC is marked as broken. |
| ExpectBrokenAlternateProtocolMapping(); |
| |
| // Deliver a message to notify the new network becomes default, the previous |
| // brokenness will be clear as the brokenness is bond with old default |
| // network. |
| scoped_mock_change_notifier_->mock_network_change_notifier() |
| ->NotifyNetworkMadeDefault(kNewNetworkForTests); |
| ExpectQuicAlternateProtocolMapping(); |
| |
| ASSERT_TRUE(quic_data2.AllReadDataConsumed()); |
| ASSERT_TRUE(quic_data2.AllWriteDataConsumed()); |
| } |
| |
| // This test verifies that a new QUIC connection will be attempted on the |
| // alternate network if the original QUIC connection fails with idle timeout |
| // before handshake is confirmed. If TCP doesn't succeed but QUIC on the |
| // alternative network succeeds, QUIC is not marked as broken. |
| TEST_P(QuicNetworkTransactionTest, RetryOnAlternateNetworkWhileTCPHanging) { |
| if (version_ >= quic::QUIC_VERSION_47) { |
| // TODO(nharper): reenable once MakeDummyCHLOPacket() fixed |
| return; |
| } |
| SetUpTestForRetryConnectionOnAlternateNetwork(); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Hanging read |
| int packet_num = 1; |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); // CHLO |
| // Retranmit the handshake messages. |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| // TODO(zhongyi): remove condition check once b/115926584 is fixed, i.e., |
| // quic_fix_has_pending_crypto_data is introduced and enabled. |
| if (version_ <= quic::QUIC_VERSION_39) { |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(packet_num++)); |
| } |
| // After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT. |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeConnectionClosePacket( |
| packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, |
| "No recent network activity.")); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // Add hanging TCP data so that TCP job will never succeeded. |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| // Quic connection will then be retried on the alternate network. |
| MockQuicData quic_data2; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| quic_data2.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDummyCHLOPacket(1)); // CHLO |
| |
| const quic::QuicString body = "hello!"; |
| quic::QuicString header = ConstructDataHeader(body.length()); |
| |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data2.AddWrite(SYNCHRONOUS, |
| ConstructInitialSettingsPacket(2, &header_stream_offset)); |
| quic_data2.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| quic_data2.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic_data2.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + body)); |
| quic_data2.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 2, 1, 1)); |
| quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| quic_data2.AddSocketDataToFactory(&socket_factory_); |
| |
| // Resolve the host resolution synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| // Add alternate protocol mapping to race QUIC and TCP. |
| // QUIC connection requires handshake to be confirmed and sends CHLO to the |
| // peer. |
| AddQuicAlternateProtocolMapping( |
| MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| if (!GetQuicReloadableFlag( |
| quic_fix_time_of_first_packet_sent_after_receiving)) { |
| quic_task_runner_->RunNextTask(); |
| } |
| |
| // Fast forward to idle timeout the original connection. A new connection will |
| // be kicked off on the alternate network. |
| quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4)); |
| ASSERT_TRUE(quic_data.AllReadDataConsumed()); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| // Verify that QUIC is not marked as broken. |
| ExpectQuicAlternateProtocolMapping(); |
| // Explicitly confirm the handshake on the second connection. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Read the response. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| CheckResponseData(&trans, body); |
| // Verify that QUIC is not marked as broken. |
| ExpectQuicAlternateProtocolMapping(); |
| |
| // Deliver a message to notify the new network becomes default. |
| scoped_mock_change_notifier_->mock_network_change_notifier() |
| ->NotifyNetworkMadeDefault(kNewNetworkForTests); |
| ExpectQuicAlternateProtocolMapping(); |
| ASSERT_TRUE(quic_data2.AllReadDataConsumed()); |
| ASSERT_TRUE(quic_data2.AllWriteDataConsumed()); |
| } |
| |
| // Verify that if a QUIC connection times out, the QuicHttpStream will |
| // return QUIC_PROTOCOL_ERROR. |
| TEST_P(QuicNetworkTransactionTest, TimeoutAfterHandshakeConfirmed) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| session_params_.quic_idle_connection_timeout_seconds = 5; |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| // TLP 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 3, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // TLP 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 4, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 5, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 6, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 7, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 8, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 3 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 9, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 10, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| |
| quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket( |
| 11, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, |
| "No recent network activity.")); |
| |
| quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Run the QUIC session to completion. |
| quic_task_runner_->RunUntilIdle(); |
| |
| ExpectQuicAlternateProtocolMapping(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| } |
| |
| // Verify that if a QUIC connection RTOs, the QuicHttpStream will |
| // return QUIC_PROTOCOL_ERROR. |
| TEST_P(QuicNetworkTransactionTest, TooManyRtosAfterHandshakeConfirmed) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| session_params_.quic_connection_options.push_back(quic::k5RTO); |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| // TLP 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 3, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // TLP 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 4, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 5, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 6, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 7, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 8, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 3 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 9, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 10, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 4 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 11, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 12, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 5 |
| quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket( |
| 13, true, quic::QUIC_TOO_MANY_RTOS, |
| "5 consecutive retransmission timeouts")); |
| |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Run the QUIC session to completion. |
| quic_task_runner_->RunUntilIdle(); |
| |
| ExpectQuicAlternateProtocolMapping(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| } |
| |
| // Verify that if a QUIC connection RTOs, while there are no active streams |
| // QUIC will not be marked as broken. |
| TEST_P(QuicNetworkTransactionTest, |
| TooManyRtosAfterHandshakeConfirmedAndStreamReset) { |
| session_params_.quic_connection_options.push_back(quic::k5RTO); |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRstPacket( |
| 3, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| // TLP 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 4, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // TLP 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 5, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRstPacket( |
| 6, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 7, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // RTO 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 8, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRstPacket( |
| 9, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| // RTO 3 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 10, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 11, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 4 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 12, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 13, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // RTO 5 |
| quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket( |
| 14, true, quic::QUIC_TOO_MANY_RTOS, |
| "5 consecutive retransmission timeouts")); |
| |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, |
| session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Now cancel the request. |
| trans.reset(); |
| |
| // Run the QUIC session to completion. |
| quic_task_runner_->RunUntilIdle(); |
| |
| ExpectQuicAlternateProtocolMapping(); |
| |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Verify that if a QUIC protocol error occurs after the handshake is confirmed |
| // the request fails with QUIC_PROTOCOL_ERROR. |
| TEST_P(QuicNetworkTransactionTest, ProtocolErrorAfterHandshakeConfirmed) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| ConstructInitialSettingsPacket(2, &header_stream_offset)); |
| // Peer sending data from an non-existing stream causes this end to raise |
| // error and close connection. |
| quic_data.AddRead( |
| ASYNC, ConstructServerRstPacket( |
| 1, false, GetNthClientInitiatedBidirectionalStreamId(47), |
| quic::QUIC_STREAM_LAST_ERROR)); |
| std::string quic_error_details = "Data for nonexistent stream"; |
| quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndConnectionClosePacket( |
| 3, quic::QuicTime::Delta::Zero(), 1, 1, 1, |
| quic::QUIC_INVALID_STREAM_ID, quic_error_details)); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| ASSERT_FALSE(quic_data.AllReadDataConsumed()); |
| |
| // Run the QUIC session to completion. |
| base::RunLoop().RunUntilIdle(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| ASSERT_TRUE(quic_data.AllReadDataConsumed()); |
| |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| ExpectQuicAlternateProtocolMapping(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Verify that with mark_quic_broken_when_network_blackholes enabled, if a QUIC |
| // connection times out, then QUIC will be marked as broken and the request |
| // retried over TCP. |
| TEST_P(QuicNetworkTransactionTest, TimeoutAfterHandshakeConfirmedThenBroken) { |
| session_params_.mark_quic_broken_when_network_blackholes = true; |
| session_params_.quic_idle_connection_timeout_seconds = 5; |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| // TLP 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 3, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // TLP 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 4, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 5, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 6, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 7, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 8, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 3 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 9, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 10, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| |
| quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket( |
| 11, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, |
| "No recent network activity.")); |
| |
| quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // After that fails, it will be resent via TCP. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Run the QUIC session to completion. |
| quic_task_runner_->RunUntilIdle(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| // Let the transaction proceed which will result in QUIC being marked |
| // as broken and the request falling back to TCP. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| ExpectBrokenAlternateProtocolMapping(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| ASSERT_FALSE(http_data.AllReadDataConsumed()); |
| |
| // Read the response body over TCP. |
| CheckResponseData(&trans, "hello world"); |
| ASSERT_TRUE(http_data.AllWriteDataConsumed()); |
| ASSERT_TRUE(http_data.AllReadDataConsumed()); |
| } |
| |
| // Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC |
| // connection times out, then QUIC will be marked as broken and the request |
| // retried over TCP. |
| TEST_P(QuicNetworkTransactionTest, TimeoutAfterHandshakeConfirmedThenBroken2) { |
| session_params_.quic_idle_connection_timeout_seconds = 5; |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| // TLP 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 3, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // TLP 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 4, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 5, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 6, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 7, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 8, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 3 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 9, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 10, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| |
| quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket( |
| 11, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, |
| "No recent network activity.")); |
| |
| quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // After that fails, it will be resent via TCP. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Run the QUIC session to completion. |
| quic_task_runner_->RunUntilIdle(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| ExpectQuicAlternateProtocolMapping(); |
| |
| // Let the transaction proceed which will result in QUIC being marked |
| // as broken and the request falling back to TCP. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| ASSERT_FALSE(http_data.AllReadDataConsumed()); |
| |
| // Read the response body over TCP. |
| CheckResponseData(&trans, "hello world"); |
| ExpectBrokenAlternateProtocolMapping(); |
| ASSERT_TRUE(http_data.AllWriteDataConsumed()); |
| ASSERT_TRUE(http_data.AllReadDataConsumed()); |
| } |
| |
| // Verify that with mark_quic_broken_when_network_blackholes enabled, if a QUIC |
| // connection times out, then QUIC will be marked as broken but the request |
| // will not be retried over TCP. |
| TEST_P(QuicNetworkTransactionTest, |
| TimeoutAfterHandshakeConfirmedAndHeadersThenBrokenNotRetried) { |
| session_params_.mark_quic_broken_when_network_blackholes = true; |
| session_params_.quic_idle_connection_timeout_seconds = 5; |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| |
| quic_data.AddRead(ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), |
| false, false, GetResponseHeaders("200 OK"))); |
| // quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 1, 1)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckPacket(3, 1, 1, 1, |
| quic::QuicTime::Delta::FromMilliseconds(25))); |
| |
| // TLP 1 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 4, quic::QuicUtils::GetHeadersStreamId(version_), false, |
| false, 0, request_data)); |
| // TLP 2 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 5, quic::QuicUtils::GetHeadersStreamId(version_), false, |
| false, settings_offset, settings_data)); |
| // RTO 1 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 6, quic::QuicUtils::GetHeadersStreamId(version_), false, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 7, quic::QuicUtils::GetHeadersStreamId(version_), false, |
| false, settings_offset, settings_data)); |
| // RTO 2 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 8, quic::QuicUtils::GetHeadersStreamId(version_), false, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 9, quic::QuicUtils::GetHeadersStreamId(version_), false, |
| false, settings_offset, settings_data)); |
| // RTO 3 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 10, quic::QuicUtils::GetHeadersStreamId(version_), false, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 11, quic::QuicUtils::GetHeadersStreamId(version_), false, |
| false, settings_offset, settings_data)); |
| |
| if (GetQuicReloadableFlag( |
| quic_fix_time_of_first_packet_sent_after_receiving)) { |
| quic_data.AddWrite( |
| SYNCHRONOUS, |
| client_maker_.MakeAckAndConnectionClosePacket( |
| 12, false, quic::QuicTime::Delta::FromMilliseconds(4000), 1, 1, 1, |
| quic::QUIC_NETWORK_IDLE_TIMEOUT, "No recent network activity.")); |
| |
| } else { |
| quic_data.AddWrite( |
| SYNCHRONOUS, |
| client_maker_.MakeAckAndConnectionClosePacket( |
| 12, false, quic::QuicTime::Delta::FromMilliseconds(4200), 1, 1, 1, |
| quic::QUIC_NETWORK_IDLE_TIMEOUT, "No recent network activity.")); |
| } |
| |
| quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Run the QUIC session to completion. |
| quic_task_runner_->RunUntilIdle(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| // Let the transaction proceed which will result in QUIC being marked |
| // as broken and the request falling back to TCP. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| ExpectBrokenAlternateProtocolMapping(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| std::string response_data; |
| ASSERT_THAT(ReadTransaction(&trans, &response_data), |
| IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| } |
| |
| // Verify that with mark_quic_broken_when_network_blackholes enabled, if a QUIC |
| // connection RTOs, then QUIC will be marked as broken and the request retried |
| // over TCP. |
| TEST_P(QuicNetworkTransactionTest, |
| TooManyRtosAfterHandshakeConfirmedThenBroken) { |
| session_params_.mark_quic_broken_when_network_blackholes = true; |
| session_params_.quic_connection_options.push_back(quic::k5RTO); |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| // TLP 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 3, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // TLP 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 4, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 5, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 6, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 7, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 8, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 3 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 9, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 10, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 4 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 11, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 12, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| |
| quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket( |
| 13, true, quic::QUIC_TOO_MANY_RTOS, |
| "5 consecutive retransmission timeouts")); |
| |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // After that fails, it will be resent via TCP. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Run the QUIC session to completion. |
| quic_task_runner_->RunUntilIdle(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| // Let the transaction proceed which will result in QUIC being marked |
| // as broken and the request falling back to TCP. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| ExpectBrokenAlternateProtocolMapping(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| ASSERT_FALSE(http_data.AllReadDataConsumed()); |
| |
| // Read the response body over TCP. |
| CheckResponseData(&trans, "hello world"); |
| ASSERT_TRUE(http_data.AllWriteDataConsumed()); |
| ASSERT_TRUE(http_data.AllReadDataConsumed()); |
| } |
| |
| // Verify that if a QUIC connection RTOs, while there are no active streams |
| // QUIC will be marked as broken. |
| TEST_P(QuicNetworkTransactionTest, |
| TooManyRtosAfterHandshakeConfirmedAndStreamResetThenBroken) { |
| session_params_.mark_quic_broken_when_network_blackholes = true; |
| session_params_.quic_connection_options.push_back(quic::k5RTO); |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRstPacket( |
| 3, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| // TLP 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 4, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // TLP 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 5, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 1 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRstPacket( |
| 6, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 7, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // RTO 2 |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 8, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRstPacket( |
| 9, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| // RTO 3 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 10, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 11, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, settings_offset, settings_data)); |
| // RTO 4 |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 12, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| quic_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeDataPacket( |
| 13, quic::QuicUtils::GetHeadersStreamId(version_), true, |
| false, 0, request_data)); |
| // RTO 5 |
| quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeConnectionClosePacket( |
| 14, true, quic::QUIC_TOO_MANY_RTOS, |
| "5 consecutive retransmission timeouts")); |
| |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, |
| session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Now cancel the request. |
| trans.reset(); |
| |
| // Run the QUIC session to completion. |
| quic_task_runner_->RunUntilIdle(); |
| |
| ExpectBrokenAlternateProtocolMapping(); |
| |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC |
| // protocol error occurs after the handshake is confirmed, the request |
| // retried over TCP and the QUIC will be marked as broken. |
| TEST_P(QuicNetworkTransactionTest, |
| ProtocolErrorAfterHandshakeConfirmedThenBroken) { |
| session_params_.quic_idle_connection_timeout_seconds = 5; |
| |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| ConstructInitialSettingsPacket(2, &header_stream_offset)); |
| // Peer sending data from an non-existing stream causes this end to raise |
| // error and close connection. |
| quic_data.AddRead( |
| ASYNC, ConstructServerRstPacket( |
| 1, false, GetNthClientInitiatedBidirectionalStreamId(47), |
| quic::QUIC_STREAM_LAST_ERROR)); |
| std::string quic_error_details = "Data for nonexistent stream"; |
| quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndConnectionClosePacket( |
| 3, quic::QuicTime::Delta::Zero(), 1, 1, 1, |
| quic::QUIC_INVALID_STREAM_ID, quic_error_details)); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // After that fails, it will be resent via TCP. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Run the QUIC session to completion. |
| base::RunLoop().RunUntilIdle(); |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| ExpectQuicAlternateProtocolMapping(); |
| |
| // Let the transaction proceed which will result in QUIC being marked |
| // as broken and the request falling back to TCP. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| ASSERT_FALSE(http_data.AllReadDataConsumed()); |
| |
| // Read the response body over TCP. |
| CheckResponseData(&trans, "hello world"); |
| ExpectBrokenAlternateProtocolMapping(); |
| ASSERT_TRUE(http_data.AllWriteDataConsumed()); |
| ASSERT_TRUE(http_data.AllReadDataConsumed()); |
| } |
| |
| // Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC |
| // request is reset from, then QUIC will be marked as broken and the request |
| // retried over TCP. |
| TEST_P(QuicNetworkTransactionTest, ResetAfterHandshakeConfirmedThenBroken) { |
| // The request will initially go out over QUIC. |
| MockQuicData quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::string request_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeRequestHeadersPacketAndSaveData( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, priority, GetRequestHeaders("GET", "https", "/"), |
| 0, nullptr, &header_stream_offset, &request_data)); |
| |
| std::string settings_data; |
| // quic::QuicStreamOffset settings_offset = header_stream_offset; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| quic_data.AddWrite(SYNCHRONOUS, |
| client_maker_.MakeInitialSettingsPacketAndSaveData( |
| 2, &header_stream_offset, &settings_data)); |
| |
| quic_data.AddRead(ASYNC, |
| ConstructServerRstPacket( |
| 1, false, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_HEADERS_TOO_LARGE)); |
| |
| quic_data.AddRead(ASYNC, OK); |
| quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // After that fails, it will be resent via TCP. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Pump the message loop to get the request started. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| // Run the QUIC session to completion. |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| |
| ExpectQuicAlternateProtocolMapping(); |
| |
| // Let the transaction proceed which will result in QUIC being marked |
| // as broken and the request falling back to TCP. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| ASSERT_TRUE(quic_data.AllWriteDataConsumed()); |
| ASSERT_FALSE(http_data.AllReadDataConsumed()); |
| |
| // Read the response body over TCP. |
| CheckResponseData(&trans, "hello world"); |
| ExpectBrokenAlternateProtocolMapping(); |
| ASSERT_TRUE(http_data.AllWriteDataConsumed()); |
| ASSERT_TRUE(http_data.AllReadDataConsumed()); |
| } |
| |
| // Verify that when an origin has two alt-svc advertisements, one local and one |
| // remote, that when the local is broken the request will go over QUIC via |
| // the remote Alt-Svc. |
| // This is a regression test for crbug/825646. |
| TEST_P(QuicNetworkTransactionTest, RemoteAltSvcWorkingWhileLocalAltSvcBroken) { |
| session_params_.quic_allow_remote_alt_svc = true; |
| |
| GURL origin1 = request_.url; // mail.example.org |
| GURL origin2("https://www.example.org/"); |
| ASSERT_NE(origin1.host(), origin2.host()); |
| |
| scoped_refptr<X509Certificate> cert( |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| ASSERT_TRUE(cert->VerifyNameMatch("www.example.org")); |
| ASSERT_TRUE(cert->VerifyNameMatch("mail.example.org")); |
| |
| ProofVerifyDetailsChromium verify_details; |
| verify_details.cert_verify_result.verified_cert = cert; |
| verify_details.cert_verify_result.is_issued_by_known_root = true; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset request_header_offset(0); |
| quic::QuicStreamOffset response_header_offset(0); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| MockQuicData mock_quic_data2; |
| mock_quic_data2.AddSocketDataToFactory(&socket_factory_); |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| |
| // Set up alternative service for |origin1|. |
| AlternativeService local_alternative(kProtoQUIC, "mail.example.org", 443); |
| AlternativeService remote_alternative(kProtoQUIC, "www.example.org", 443); |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| AlternativeServiceInfoVector alternative_services; |
| alternative_services.push_back( |
| AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( |
| local_alternative, expiration, |
| session_->params().quic_supported_versions)); |
| alternative_services.push_back( |
| AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( |
| remote_alternative, expiration, |
| session_->params().quic_supported_versions)); |
| http_server_properties_.SetAlternativeServices(url::SchemeHostPort(origin1), |
| alternative_services); |
| |
| http_server_properties_.MarkAlternativeServiceBroken(local_alternative); |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| // Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC |
| // request is reset from, then QUIC will be marked as broken and the request |
| // retried over TCP. Then, subsequent requests will go over a new QUIC |
| // connection instead of going back to the broken QUIC connection. |
| // This is a regression tests for crbug/731303. |
| TEST_P(QuicNetworkTransactionTest, |
| ResetPooledAfterHandshakeConfirmedThenBroken) { |
| session_params_.quic_allow_remote_alt_svc = true; |
| |
| GURL origin1 = request_.url; |
| GURL origin2("https://www.example.org/"); |
| ASSERT_NE(origin1.host(), origin2.host()); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset request_header_offset(0); |
| quic::QuicStreamOffset response_header_offset(0); |
| |
| scoped_refptr<X509Certificate> cert( |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| ASSERT_TRUE(cert->VerifyNameMatch("www.example.org")); |
| ASSERT_TRUE(cert->VerifyNameMatch("mail.example.org")); |
| |
| ProofVerifyDetailsChromium verify_details; |
| verify_details.cert_verify_result.verified_cert = cert; |
| verify_details.cert_verify_result.is_issued_by_known_root = true; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset)); |
| // First request. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| |
| // Second request will go over the pooled QUIC connection, but will be |
| // reset by the server. |
| QuicTestPacketMaker client_maker2( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin2.host(), quic::Perspective::IS_CLIENT, |
| client_headers_include_h2_stream_dependency_); |
| QuicTestPacketMaker server_maker2( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin2.host(), quic::Perspective::IS_SERVER, false); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| GetRequestHeaders("GET", "https", "/", &client_maker2), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerRstPacket( |
| 3, false, GetNthClientInitiatedBidirectionalStreamId(1), |
| quic::QUIC_HEADERS_TOO_LARGE)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // After that fails, it will be resent via TCP. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: www.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // Then the next request to the second origin will be sent over TCP. |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| // Set up alternative service for |origin1|. |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| AlternativeService alternative1(kProtoQUIC, origin1.host(), 443); |
| http_server_properties_.SetQuicAlternativeService( |
| url::SchemeHostPort(origin1), alternative1, expiration, |
| supported_versions_); |
| |
| // Set up alternative service for |origin2|. |
| AlternativeService alternative2(kProtoQUIC, origin2.host(), 443); |
| http_server_properties_.SetQuicAlternativeService( |
| url::SchemeHostPort(origin2), alternative2, expiration, |
| supported_versions_); |
| |
| // First request opens connection to |destination1| |
| // with quic::QuicServerId.host() == origin1.host(). |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| // Second request pools to existing connection with same destination, |
| // because certificate matches, even though quic::QuicServerId is different. |
| // After it is reset, it will fail back to QUIC and mark QUIC as broken. |
| request_.url = origin2; |
| SendRequestAndExpectHttpResponse("hello world"); |
| EXPECT_FALSE(http_server_properties_.IsAlternativeServiceBroken(alternative1)) |
| << alternative1.ToString(); |
| EXPECT_TRUE(http_server_properties_.IsAlternativeServiceBroken(alternative2)) |
| << alternative2.ToString(); |
| |
| // The third request should use a new QUIC connection, not the broken |
| // QUIC connection. |
| SendRequestAndExpectHttpResponse("hello world"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, |
| DoNotUseAlternativeServiceQuicUnsupportedVersion) { |
| std::string altsvc_header = base::StringPrintf( |
| "Alt-Svc: quic=\":443\"; v=\"%u\"\r\n\r\n", version_ - 1); |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectHttpResponse("hello world"); |
| } |
| |
| // When multiple alternative services are advertised, HttpStreamFactory should |
| // select the alternative service which uses existing QUIC session if available. |
| // If no existing QUIC session can be used, use the first alternative service |
| // from the list. |
| TEST_P(QuicNetworkTransactionTest, UseExistingAlternativeServiceForQuic) { |
| session_params_.quic_allow_remote_alt_svc = true; |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| quic::QuicStreamOffset request_header_offset = 0; |
| quic::QuicStreamOffset response_header_offset = 0; |
| // First QUIC request data. |
| // Open a session to foo.example.org:443 using the first entry of the |
| // alternative service list. |
| MockQuicData mock_quic_data; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| |
| std::string alt_svc_list = |
| "quic=\"mail.example.org:444\", quic=\"foo.example.org:443\", " |
| "quic=\"bar.example.org:445\""; |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK", alt_svc_list), &response_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| |
| // Second QUIC request data. |
| // Connection pooling, using existing session, no need to include version |
| // as version negotiation has been completed. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| true, GetRequestHeaders("GET", "https", "/"), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| // Check that an existing QUIC connection to an alternative proxy server is |
| // used. |
| TEST_P(QuicNetworkTransactionTest, UseExistingQUICAlternativeProxy) { |
| base::HistogramTester histogram_tester; |
| |
| quic::QuicStreamOffset request_header_offset = 0; |
| quic::QuicStreamOffset response_header_offset = 0; |
| // First QUIC request data. |
| // Open a session to foo.example.org:443 using the first entry of the |
| // alternative service list. |
| MockQuicData mock_quic_data; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "http", "/"), &request_header_offset)); |
| |
| std::string alt_svc_list; |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK", alt_svc_list), &response_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| |
| // Second QUIC request data. |
| // Connection pooling, using existing session, no need to include version |
| // as version negotiation has been completed. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| true, GetRequestHeaders("GET", "http", "/"), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| TestProxyDelegate test_proxy_delegate; |
| |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "HTTPS mail.example.org:443", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| test_proxy_delegate.set_alternative_proxy_server( |
| ProxyServer::FromPacString("QUIC mail.example.org:443")); |
| proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate); |
| |
| request_.url = GURL("http://mail.example.org/"); |
| |
| CreateSession(); |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 443); |
| histogram_tester.ExpectUniqueSample("Net.QuicAlternativeProxy.Usage", |
| 1 /* ALTERNATIVE_PROXY_USAGE_WON_RACE */, |
| 1); |
| |
| SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 443); |
| histogram_tester.ExpectTotalCount("Net.QuicAlternativeProxy.Usage", 2); |
| histogram_tester.ExpectBucketCount("Net.QuicAlternativeProxy.Usage", |
| 0 /* ALTERNATIVE_PROXY_USAGE_NO_RACE */, |
| 1); |
| } |
| |
| // Pool to existing session with matching quic::QuicServerId |
| // even if alternative service destination is different. |
| TEST_P(QuicNetworkTransactionTest, PoolByOrigin) { |
| session_params_.quic_allow_remote_alt_svc = true; |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset request_header_offset(0); |
| quic::QuicStreamOffset response_header_offset(0); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset)); |
| // First request. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| |
| // Second request. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| true, GetRequestHeaders("GET", "https", "/"), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| const char destination1[] = "first.example.com"; |
| const char destination2[] = "second.example.com"; |
| |
| // Set up alternative service entry to destination1. |
| url::SchemeHostPort server(request_.url); |
| AlternativeService alternative_service(kProtoQUIC, destination1, 443); |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| http_server_properties_.SetQuicAlternativeService( |
| server, alternative_service, expiration, supported_versions_); |
| // First request opens connection to |destination1| |
| // with quic::QuicServerId.host() == kDefaultServerHostName. |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| // Set up alternative service entry to a different destination. |
| alternative_service = AlternativeService(kProtoQUIC, destination2, 443); |
| http_server_properties_.SetQuicAlternativeService( |
| server, alternative_service, expiration, supported_versions_); |
| // Second request pools to existing connection with same quic::QuicServerId, |
| // even though alternative service destination is different. |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| // Pool to existing session with matching destination and matching certificate |
| // even if origin is different, and even if the alternative service with |
| // matching destination is not the first one on the list. |
| TEST_P(QuicNetworkTransactionTest, PoolByDestination) { |
| session_params_.quic_allow_remote_alt_svc = true; |
| GURL origin1 = request_.url; |
| GURL origin2("https://www.example.org/"); |
| ASSERT_NE(origin1.host(), origin2.host()); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset request_header_offset(0); |
| quic::QuicStreamOffset response_header_offset(0); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset)); |
| // First request. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| |
| // Second request. |
| QuicTestPacketMaker client_maker2( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin2.host(), quic::Perspective::IS_CLIENT, |
| client_headers_include_h2_stream_dependency_); |
| QuicTestPacketMaker server_maker2( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin2.host(), quic::Perspective::IS_SERVER, false); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| GetRequestHeaders("GET", "https", "/", &client_maker2), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| const char destination1[] = "first.example.com"; |
| const char destination2[] = "second.example.com"; |
| |
| // Set up alternative service for |origin1|. |
| AlternativeService alternative_service1(kProtoQUIC, destination1, 443); |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| http_server_properties_.SetQuicAlternativeService( |
| url::SchemeHostPort(origin1), alternative_service1, expiration, |
| supported_versions_); |
| |
| // Set up multiple alternative service entries for |origin2|, |
| // the first one with a different destination as for |origin1|, |
| // the second one with the same. The second one should be used, |
| // because the request can be pooled to that one. |
| AlternativeService alternative_service2(kProtoQUIC, destination2, 443); |
| AlternativeServiceInfoVector alternative_services; |
| alternative_services.push_back( |
| AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( |
| alternative_service2, expiration, |
| session_->params().quic_supported_versions)); |
| alternative_services.push_back( |
| AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( |
| alternative_service1, expiration, |
| session_->params().quic_supported_versions)); |
| http_server_properties_.SetAlternativeServices(url::SchemeHostPort(origin2), |
| alternative_services); |
| // First request opens connection to |destination1| |
| // with quic::QuicServerId.host() == origin1.host(). |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| // Second request pools to existing connection with same destination, |
| // because certificate matches, even though quic::QuicServerId is different. |
| request_.url = origin2; |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| // Multiple origins have listed the same alternative services. When there's a |
| // existing QUIC session opened by a request to other origin, |
| // if the cert is valid, should select this QUIC session to make the request |
| // if this is also the first existing QUIC session. |
| TEST_P(QuicNetworkTransactionTest, |
| UseSharedExistingAlternativeServiceForQuicWithValidCert) { |
| session_params_.quic_allow_remote_alt_svc = true; |
| // Default cert is valid for *.example.org |
| |
| // HTTP data for request to www.example.org. |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead("Alt-Svc: quic=\":443\"\r\n\r\n"), |
| MockRead("hello world from www.example.org"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // HTTP data for request to mail.example.org. |
| MockRead http_reads2[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead("Alt-Svc: quic=\":444\", quic=\"www.example.org:443\"\r\n\r\n"), |
| MockRead("hello world from mail.example.org"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data2(http_reads2, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data2); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| quic::QuicStreamOffset request_header_offset = 0; |
| quic::QuicStreamOffset response_header_offset = 0; |
| |
| QuicTestPacketMaker client_maker( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, "mail.example.org", quic::Perspective::IS_CLIENT, |
| client_headers_include_h2_stream_dependency_); |
| server_maker_.set_hostname("www.example.org"); |
| client_maker_.set_hostname("www.example.org"); |
| MockQuicData mock_quic_data; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &request_header_offset)); |
| // First QUIC request data. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| quic::QuicString header = ConstructDataHeader(21); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello from mail QUIC!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| // Second QUIC request data. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| GetRequestHeaders("GET", "https", "/", &client_maker), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &request_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &response_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| 0, header + "hello from mail QUIC!")); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 4, 3, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| // Send two HTTP requests, responses set up alt-svc lists for the origins. |
| request_.url = GURL("https://www.example.org/"); |
| SendRequestAndExpectHttpResponse("hello world from www.example.org"); |
| request_.url = GURL("https://mail.example.org/"); |
| SendRequestAndExpectHttpResponse("hello world from mail.example.org"); |
| |
| // Open a QUIC session to mail.example.org:443 when making request |
| // to mail.example.org. |
| request_.url = GURL("https://www.example.org/"); |
| SendRequestAndExpectQuicResponse("hello from mail QUIC!"); |
| |
| // Uses the existing QUIC session when making request to www.example.org. |
| request_.url = GURL("https://mail.example.org/"); |
| SendRequestAndExpectQuicResponse("hello from mail QUIC!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, AlternativeServiceDifferentPort) { |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), |
| MockRead(kQuicAlternativeServiceDifferentPortHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| |
| url::SchemeHostPort http_server("https", kDefaultServerHostName, 443); |
| AlternativeServiceInfoVector alternative_service_info_vector = |
| http_server_properties_.GetAlternativeServiceInfos(http_server); |
| ASSERT_EQ(1u, alternative_service_info_vector.size()); |
| const AlternativeService alternative_service = |
| alternative_service_info_vector[0].alternative_service(); |
| EXPECT_EQ(kProtoQUIC, alternative_service.protocol); |
| EXPECT_EQ(kDefaultServerHostName, alternative_service.host); |
| EXPECT_EQ(137, alternative_service.port); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ConfirmAlternativeService) { |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| AlternativeService alternative_service(kProtoQUIC, |
| HostPortPair::FromURL(request_.url)); |
| http_server_properties_.MarkAlternativeServiceRecentlyBroken( |
| alternative_service); |
| EXPECT_TRUE(http_server_properties_.WasAlternativeServiceRecentlyBroken( |
| alternative_service)); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| mock_quic_data.Resume(); |
| |
| EXPECT_FALSE(http_server_properties_.WasAlternativeServiceRecentlyBroken( |
| alternative_service)); |
| EXPECT_NE(nullptr, |
| http_server_properties_.GetServerNetworkStats( |
| url::SchemeHostPort("https", request_.url.host(), 443))); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceForQuicForHttps) { |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| // TODO(rtenneti): Test QUIC over HTTPS, GetSSLInfo(). |
| SendRequestAndExpectHttpResponse("hello world"); |
| } |
| |
| // Tests that the connection to an HTTPS proxy is raced with an available |
| // alternative proxy server. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyWithRacing) { |
| base::HistogramTester histogram_tester; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "HTTPS mail.example.org:443", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "http", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // There is no need to set up main job, because no attempt will be made to |
| // speak to the proxy over TCP. |
| request_.url = GURL("http://mail.example.org/"); |
| TestProxyDelegate test_proxy_delegate; |
| const HostPortPair host_port_pair("mail.example.org", 443); |
| |
| test_proxy_delegate.set_alternative_proxy_server( |
| ProxyServer::FromPacString("QUIC mail.example.org:443")); |
| proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate); |
| CreateSession(); |
| EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_quic()); |
| |
| // The main job needs to hang in order to guarantee that the alternative |
| // proxy server job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 443); |
| |
| // Verify that the alternative proxy server is not marked as broken. |
| EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_quic()); |
| |
| // Verify that the proxy server is not marked as broken. |
| EXPECT_TRUE(session_->proxy_resolution_service()->proxy_retry_info().empty()); |
| |
| histogram_tester.ExpectUniqueSample("Net.QuicAlternativeProxy.Usage", |
| 1 /* ALTERNATIVE_PROXY_USAGE_WON_RACE */, |
| 1); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, HungAlternativeService) { |
| crypto_client_stream_factory_.set_handshake_mode( |
| MockCryptoClientStream::COLD_START); |
| |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
| |
| SequencedSocketData http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // The QUIC transaction will not be allowed to complete. |
| MockWrite quic_writes[] = {MockWrite(SYNCHRONOUS, ERR_IO_PENDING, 1)}; |
| MockRead quic_reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0), |
| }; |
| SequencedSocketData quic_data(quic_reads, quic_writes); |
| socket_factory_.AddSocketDataProvider(&quic_data); |
| |
| // The HTTP transaction will complete. |
| SequencedSocketData http_data2(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data2); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| |
| // Run the first request. |
| SendRequestAndExpectHttpResponse("hello world"); |
| ASSERT_TRUE(http_data.AllReadDataConsumed()); |
| ASSERT_TRUE(http_data.AllWriteDataConsumed()); |
| |
| // Now run the second request in which the QUIC socket hangs, |
| // and verify the the transaction continues over HTTP. |
| SendRequestAndExpectHttpResponse("hello world"); |
| base::RunLoop().RunUntilIdle(); |
| |
| ASSERT_TRUE(http_data2.AllReadDataConsumed()); |
| ASSERT_TRUE(http_data2.AllWriteDataConsumed()); |
| ASSERT_TRUE(quic_data.AllReadDataConsumed()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ZeroRTTWithHttpRace) { |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| EXPECT_EQ(nullptr, |
| http_server_properties_.GetServerNetworkStats( |
| url::SchemeHostPort("https", request_.url.host(), 443))); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ZeroRTTWithNoHttpRace) { |
| MockQuicData mock_quic_data; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, GetRequestHeaders("GET", "https", "/"))); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ZeroRTTWithProxy) { |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| // Since we are using a proxy, the QUIC job will not succeed. |
| MockWrite http_writes[] = { |
| MockWrite(SYNCHRONOUS, 0, "GET http://mail.example.org/ HTTP/1.1\r\n"), |
| MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
| MockWrite(SYNCHRONOUS, 2, "Proxy-Connection: keep-alive\r\n\r\n")}; |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
| MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
| MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
| |
| StaticSocketDataProvider http_data(http_reads, http_writes); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| request_.url = GURL("http://mail.example.org/"); |
| CreateSession(); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| SendRequestAndExpectHttpResponse("hello world"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ZeroRTTWithConfirmationRequired) { |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| CheckWasQuicResponse(&trans); |
| CheckResponseData(&trans, "hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ZeroRTTWithTooEarlyResponse) { |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset client_header_stream_offset = 0; |
| quic::QuicStreamOffset server_header_stream_offset = 0; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, GetRequestHeaders("GET", "https", "/"), |
| &client_header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("425 TOO_EARLY"), &server_header_stream_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndRstPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, 1, 1, 1)); |
| |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| |
| spdy::SpdySettingsIR settings_frame; |
| settings_frame.AddSetting(spdy::SETTINGS_MAX_HEADER_LIST_SIZE, |
| quic::kDefaultMaxUncompressedHeaderSize); |
| spdy::SpdySerializedFrame spdy_frame( |
| client_maker_.spdy_request_framer()->SerializeFrame(settings_frame)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 3, quic::QuicUtils::GetHeadersStreamId(version_), false, false, |
| client_header_stream_offset, |
| quic::QuicStringPiece(spdy_frame.data(), spdy_frame.size()))); |
| client_header_stream_offset += spdy_frame.size(); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| true, GetRequestHeaders("GET", "https", "/"), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &client_header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &server_header_stream_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket(5, 3, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Confirm the handshake after the 425 Too Early. |
| base::RunLoop().RunUntilIdle(); |
| |
| // The handshake hasn't been confirmed yet, so the retry should not have |
| // succeeded. |
| EXPECT_FALSE(callback.have_result()); |
| |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| CheckWasQuicResponse(&trans); |
| CheckResponseData(&trans, "hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ZeroRTTWithMultipleTooEarlyResponse) { |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset client_header_stream_offset = 0; |
| quic::QuicStreamOffset server_header_stream_offset = 0; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, GetRequestHeaders("GET", "https", "/"), |
| &client_header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("425 TOO_EARLY"), &server_header_stream_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndRstPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, 1, 1, 1)); |
| |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); |
| |
| spdy::SpdySettingsIR settings_frame; |
| settings_frame.AddSetting(spdy::SETTINGS_MAX_HEADER_LIST_SIZE, |
| quic::kDefaultMaxUncompressedHeaderSize); |
| spdy::SpdySerializedFrame spdy_frame( |
| client_maker_.spdy_request_framer()->SerializeFrame(settings_frame)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| client_maker_.MakeDataPacket( |
| 3, quic::QuicUtils::GetHeadersStreamId(version_), false, false, |
| client_header_stream_offset, |
| quic::QuicStringPiece(spdy_frame.data(), spdy_frame.size()))); |
| client_header_stream_offset += spdy_frame.size(); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| true, GetRequestHeaders("GET", "https", "/"), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &client_header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("425 TOO_EARLY"), &server_header_stream_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndRstPacket( |
| 5, GetNthClientInitiatedBidirectionalStreamId(1), |
| quic::QUIC_STREAM_CANCELLED, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| // Confirm the handshake after the 425 Too Early. |
| base::RunLoop().RunUntilIdle(); |
| |
| // The handshake hasn't been confirmed yet, so the retry should not have |
| // succeeded. |
| EXPECT_FALSE(callback.have_result()); |
| |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| const HttpResponseInfo* response = trans.GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| ASSERT_TRUE(response->headers.get() != nullptr); |
| EXPECT_EQ("HTTP/1.1 425 TOO_EARLY", response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_), |
| response->connection_info); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, |
| LogGranularQuicErrorCodeOnQuicProtocolErrorLocal) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| // Read a close connection packet with |
| // quic::QuicErrorCode: quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED from the peer. |
| mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1)); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| |
| NetErrorDetails details; |
| EXPECT_EQ(quic::QUIC_NO_ERROR, details.quic_connection_error); |
| |
| trans.PopulateNetErrorDetails(&details); |
| // Verify the error code logged is what sent by the peer. |
| EXPECT_EQ(quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, |
| details.quic_connection_error); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, |
| LogGranularQuicErrorCodeOnQuicProtocolErrorRemote) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| // Peer sending data from an non-existing stream causes this end to raise |
| // error and close connection. |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerRstPacket( |
| 1, false, GetNthClientInitiatedBidirectionalStreamId(47), |
| quic::QUIC_STREAM_LAST_ERROR)); |
| std::string quic_error_details = "Data for nonexistent stream"; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckAndConnectionClosePacket( |
| 3, quic::QuicTime::Delta::Zero(), 1, 1, 1, |
| quic::QUIC_INVALID_STREAM_ID, quic_error_details)); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| NetErrorDetails details; |
| EXPECT_EQ(quic::QUIC_NO_ERROR, details.quic_connection_error); |
| |
| trans.PopulateNetErrorDetails(&details); |
| EXPECT_EQ(quic::QUIC_INVALID_STREAM_ID, details.quic_connection_error); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, RstSteamErrorHandling) { |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| // Read the response headers, then a RST_STREAM frame. |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerRstPacket( |
| 2, false, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data. |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| // Read the headers. |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| const HttpResponseInfo* response = trans.GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| ASSERT_TRUE(response->headers.get() != nullptr); |
| EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_), |
| response->connection_info); |
| |
| std::string response_data; |
| ASSERT_EQ(ERR_QUIC_PROTOCOL_ERROR, ReadTransaction(&trans, &response_data)); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, RstSteamBeforeHeaders) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerRstPacket( |
| 1, false, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data. |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| // connection to the the server, in this test we require confirmation |
| // before encrypting so the HTTP job will still start. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| // Read the headers. |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocol) { |
| // Alternate-protocol job |
| std::unique_ptr<quic::QuicEncryptedPacket> close( |
| ConstructServerConnectionClosePacket(1)); |
| MockRead quic_reads[] = { |
| MockRead(ASYNC, close->data(), close->length()), |
| MockRead(ASYNC, ERR_IO_PENDING), // No more data to read |
| MockRead(ASYNC, OK), // EOF |
| }; |
| StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&quic_data); |
| |
| // Main job which will succeed even though the alternate job fails. |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| AddQuicAlternateProtocolMapping( |
| MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); |
| SendRequestAndExpectHttpResponse("hello from http"); |
| ExpectBrokenAlternateProtocolMapping(); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocolReadError) { |
| // Alternate-protocol job |
| MockRead quic_reads[] = { |
| MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
| }; |
| StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&quic_data); |
| |
| // Main job which will succeed even though the alternate job fails. |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); |
| SendRequestAndExpectHttpResponse("hello from http"); |
| ExpectBrokenAlternateProtocolMapping(); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, NoBrokenAlternateProtocolIfTcpFails) { |
| // Alternate-protocol job will fail when the session attempts to read. |
| MockRead quic_reads[] = { |
| MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
| }; |
| StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&quic_data); |
| |
| // Main job will also fail. |
| MockRead http_reads[] = { |
| MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
| }; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| http_data.set_connect_data(MockConnect(ASYNC, ERR_SOCKET_NOT_CONNECTED)); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_SOCKET_NOT_CONNECTED)); |
| ExpectQuicAlternateProtocolMapping(); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, DelayTCPOnStartWithQuicSupportOnSameIP) { |
| // Tests that TCP job is delayed and QUIC job does not require confirmation |
| // if QUIC was recently supported on the same IP on start. |
| |
| // Set QUIC support on the last IP address, which is same with the local IP |
| // address. Require confirmation mode will be turned off immediately when |
| // local IP address is sorted out after we configure the UDP socket. |
| http_server_properties_.SetSupportsQuic(true, IPAddress(192, 0, 2, 33)); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| client_maker_.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| // No HTTP data is mocked as TCP job never starts in this case. |
| |
| CreateSession(); |
| // QuicStreamFactory by default requires confirmation on construction. |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| // Stall host resolution so that QUIC job will not succeed synchronously. |
| // Socket will not be configured immediately and QUIC support is not sorted |
| // out, TCP job will still be delayed as server properties indicates QUIC |
| // support on last IP address. |
| host_resolver_.set_synchronous_mode(false); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| EXPECT_THAT(trans.Start(&request_, callback.callback(), net_log_.bound()), |
| IsError(ERR_IO_PENDING)); |
| // Complete host resolution in next message loop so that QUIC job could |
| // proceed. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| CheckWasQuicResponse(&trans); |
| CheckResponseData(&trans, "hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, |
| DelayTCPOnStartWithQuicSupportOnDifferentIP) { |
| // Tests that TCP job is delayed and QUIC job requires confirmation if QUIC |
| // was recently supported on a different IP address on start. |
| |
| // Set QUIC support on the last IP address, which is different with the local |
| // IP address. Require confirmation mode will remain when local IP address is |
| // sorted out after we configure the UDP socket. |
| http_server_properties_.SetSupportsQuic(true, IPAddress(1, 2, 3, 4)); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| // No HTTP data is mocked as TCP job will be delayed and never starts. |
| |
| CreateSession(); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| // Stall host resolution so that QUIC job could not proceed and unblocks TCP. |
| // Socket will not be configured immediately and QUIC support is not sorted |
| // out, TCP job will still be delayed as server properties indicates QUIC |
| // support on last IP address. |
| host_resolver_.set_synchronous_mode(false); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| EXPECT_THAT(trans.Start(&request_, callback.callback(), net_log_.bound()), |
| IsError(ERR_IO_PENDING)); |
| |
| // Complete host resolution in next message loop so that QUIC job could |
| // proceed. |
| base::RunLoop().RunUntilIdle(); |
| // Explicitly confirm the handshake so that QUIC job could succeed. |
| crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| quic::QuicSession::HANDSHAKE_CONFIRMED); |
| EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| |
| CheckWasQuicResponse(&trans); |
| CheckResponseData(&trans, "hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, NetErrorDetailsSetBeforeHandshake) { |
| // Test that NetErrorDetails is correctly populated, even if the |
| // handshake has not yet been confirmed and no stream has been created. |
| |
| // QUIC job will pause. When resumed, it will fail. |
| MockQuicData mock_quic_data; |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // Main job will also fail. |
| MockRead http_reads[] = { |
| MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
| }; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| http_data.set_connect_data(MockConnect(ASYNC, ERR_SOCKET_NOT_CONNECTED)); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| // Require handshake confirmation to ensure that no QUIC streams are |
| // created, and to ensure that the TCP job does not wait for the QUIC |
| // job to fail before it starts. |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| // Allow the TCP job to fail. |
| base::RunLoop().RunUntilIdle(); |
| // Now let the QUIC job fail. |
| mock_quic_data.Resume(); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| ExpectQuicAlternateProtocolMapping(); |
| NetErrorDetails details; |
| trans.PopulateNetErrorDetails(&details); |
| EXPECT_EQ(quic::QUIC_PACKET_READ_ERROR, details.quic_connection_error); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, FailedZeroRttBrokenAlternateProtocol) { |
| // Alternate-protocol job |
| MockRead quic_reads[] = { |
| MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
| }; |
| StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&quic_data); |
| |
| // Second Alternate-protocol job which will race with the TCP job. |
| StaticSocketDataProvider quic_data2(quic_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&quic_data2); |
| |
| // Final job that will proceed when the QUIC job fails. |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| SendRequestAndExpectHttpResponse("hello from http"); |
| |
| ExpectBrokenAlternateProtocolMapping(); |
| |
| EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, DISABLED_HangingZeroRttFallback) { |
| // Alternate-protocol job |
| MockRead quic_reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING), |
| }; |
| StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&quic_data); |
| |
| // Main job that will proceed when the QUIC job fails. |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| |
| SendRequestAndExpectHttpResponse("hello from http"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocolOnConnectFailure) { |
| // Alternate-protocol job will fail before creating a QUIC session. |
| StaticSocketDataProvider quic_data; |
| quic_data.set_connect_data(MockConnect(SYNCHRONOUS, ERR_CONNECTION_FAILED)); |
| socket_factory_.AddSocketDataProvider(&quic_data); |
| |
| // Main job which will succeed even though the alternate job fails. |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); |
| SendRequestAndExpectHttpResponse("hello from http"); |
| |
| ExpectBrokenAlternateProtocolMapping(); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ConnectionCloseDuringConnect) { |
| if (version_ >= quic::QUIC_VERSION_47) { |
| // TODO(nharper): reenable once MakeDummyCHLOPacket() fixed |
| return; |
| } |
| MockQuicData mock_quic_data; |
| mock_quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeDummyCHLOPacket(1)); |
| mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1)); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // When the QUIC connection fails, we will try the request again over HTTP. |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| ""); |
| |
| CreateSession(); |
| // TODO(rch): Check if we need a 0RTT version of ConnectionCloseDuringConnect |
| AddQuicAlternateProtocolMapping( |
| MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); |
| SendRequestAndExpectHttpResponse("hello world"); |
| } |
| |
| // For an alternative proxy that supports QUIC, test that the request is |
| // successfully fetched by the main job when the alternate proxy job encounters |
| // an error. |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxySocketNotConnected) { |
| TestAlternativeProxy(ERR_SOCKET_NOT_CONNECTED); |
| } |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyConnectionFailed) { |
| TestAlternativeProxy(ERR_CONNECTION_FAILED); |
| } |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyConnectionTimedOut) { |
| TestAlternativeProxy(ERR_CONNECTION_TIMED_OUT); |
| } |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyConnectionRefused) { |
| TestAlternativeProxy(ERR_CONNECTION_REFUSED); |
| } |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyQuicHandshakeFailed) { |
| TestAlternativeProxy(ERR_QUIC_HANDSHAKE_FAILED); |
| } |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyQuicProtocolError) { |
| TestAlternativeProxy(ERR_QUIC_PROTOCOL_ERROR); |
| } |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyIOPending) { |
| TestAlternativeProxy(ERR_IO_PENDING); |
| } |
| TEST_P(QuicNetworkTransactionTest, BrokenAlternativeProxyAddressUnreachable) { |
| TestAlternativeProxy(ERR_ADDRESS_UNREACHABLE); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, ConnectionCloseDuringConnectProxy) { |
| MockQuicData mock_quic_data; |
| mock_quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeDummyCHLOPacket(1)); |
| mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, GetRequestHeaders("GET", "https", "/"))); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 1, 1, 1)); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // When the QUIC connection fails, we will try the request again over HTTP. |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| TestProxyDelegate test_proxy_delegate; |
| const HostPortPair host_port_pair("myproxy.org", 443); |
| test_proxy_delegate.set_alternative_proxy_server( |
| ProxyServer::FromPacString("QUIC myproxy.org:443")); |
| EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_quic()); |
| |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "HTTPS myproxy.org:443", TRAFFIC_ANNOTATION_FOR_TESTS); |
| proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate); |
| request_.url = GURL("http://mail.example.org/"); |
| |
| // In order for a new QUIC session to be established via alternate-protocol |
| // without racing an HTTP connection, we need the host resolution to happen |
| // synchronously. |
| host_resolver_.set_synchronous_mode(true); |
| host_resolver_.rules()->AddIPLiteralRule("myproxy.org", "192.168.0.1", ""); |
| |
| CreateSession(); |
| crypto_client_stream_factory_.set_handshake_mode( |
| MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); |
| SendRequestAndExpectHttpResponseFromProxy("hello world", true, 443); |
| EXPECT_THAT(session_->proxy_resolution_service()->proxy_retry_info(), |
| ElementsAre(Key("quic://myproxy.org:443"))); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, SecureResourceOverSecureQuic) { |
| client_maker_.set_hostname("www.example.org"); |
| EXPECT_FALSE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data. |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| request_.url = GURL("https://www.example.org:443"); |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| SendRequestAndExpectQuicResponse("hello!"); |
| EXPECT_TRUE( |
| test_socket_performance_watcher_factory_.rtt_notification_received()); |
| } |
| |
| // TODO(zhongyi): disabled this broken test as it was not testing the correct |
| // code path. Need a fix to re-enable this test, tracking at crbug.com/704596. |
| TEST_P(QuicNetworkTransactionTest, |
| DISABLED_QuicUploadToAlternativeProxyServer) { |
| base::HistogramTester histogram_tester; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "HTTPS mail.example.org:443", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| TestProxyDelegate test_proxy_delegate; |
| |
| test_proxy_delegate.set_alternative_proxy_server( |
| ProxyServer::FromPacString("QUIC mail.example.org:443")); |
| proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate); |
| |
| request_.url = GURL("http://mail.example.org/"); |
| |
| MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
| MockWrite writes[] = {MockWrite(SYNCHRONOUS, ERR_FAILED, 1)}; |
| SequencedSocketData socket_data(reads, writes); |
| socket_factory_.AddSocketDataProvider(&socket_data); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| request_.method = "POST"; |
| ChunkedUploadDataStream upload_data(0); |
| upload_data.AppendData("1", 1, true); |
| |
| request_.upload_data_stream = &upload_data; |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| EXPECT_NE(OK, callback.WaitForResult()); |
| |
| // Verify that the alternative proxy server is not marked as broken. |
| EXPECT_TRUE(test_proxy_delegate.alternative_proxy_server().is_quic()); |
| |
| // Verify that the proxy server is not marked as broken. |
| EXPECT_TRUE(session_->proxy_resolution_service()->proxy_retry_info().empty()); |
| |
| histogram_tester.ExpectUniqueSample("Net.QuicAlternativeProxy.Usage", |
| 1 /* ALTERNATIVE_PROXY_USAGE_WON_RACE */, |
| 1); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, QuicUpload) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
| MockWrite writes[] = {MockWrite(SYNCHRONOUS, ERR_FAILED, 1)}; |
| SequencedSocketData socket_data(reads, writes); |
| socket_factory_.AddSocketDataProvider(&socket_data); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| request_.method = "POST"; |
| ChunkedUploadDataStream upload_data(0); |
| upload_data.AppendData("1", 1, true); |
| |
| request_.upload_data_stream = &upload_data; |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| EXPECT_NE(OK, callback.WaitForResult()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, QuicUploadWriteError) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| ScopedMockNetworkChangeNotifier network_change_notifier; |
| MockNetworkChangeNotifier* mock_ncn = |
| network_change_notifier.mock_network_change_notifier(); |
| mock_ncn->ForceNetworkHandlesSupported(); |
| mock_ncn->SetConnectedNetworksList( |
| {kDefaultNetworkForTests, kNewNetworkForTests}); |
| |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| session_params_.quic_migrate_sessions_on_network_change_v2 = true; |
| |
| MockQuicData socket_data; |
| socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); |
| quic::QuicStreamOffset offset = 0; |
| socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset)); |
| socket_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, false, |
| GetRequestHeaders("POST", "https", "/"), &offset)); |
| socket_data.AddWrite(SYNCHRONOUS, ERR_FAILED); |
| socket_data.AddSocketDataToFactory(&socket_factory_); |
| |
| MockQuicData socket_data2; |
| socket_data2.AddConnect(SYNCHRONOUS, ERR_ADDRESS_INVALID); |
| socket_data2.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| request_.method = "POST"; |
| ChunkedUploadDataStream upload_data(0); |
| |
| request_.upload_data_stream = &upload_data; |
| |
| std::unique_ptr<HttpNetworkTransaction> trans( |
| new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| TestCompletionCallback callback; |
| int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| |
| base::RunLoop().RunUntilIdle(); |
| upload_data.AppendData("1", 1, true); |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_NE(OK, callback.WaitForResult()); |
| trans.reset(); |
| session_.reset(); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, RetryAfterAsyncNoBufferSpace) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData socket_data; |
| quic::QuicStreamOffset offset = 0; |
| socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset)); |
| socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE); |
| socket_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, GetRequestHeaders("GET", "https", "/"), &offset)); |
| socket_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| socket_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| socket_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| socket_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeAckAndConnectionClosePacket( |
| 4, false, quic::QuicTime::Delta::FromMilliseconds(0), 2, |
| 1, 1, quic::QUIC_CONNECTION_CANCELLED, "net error")); |
| |
| socket_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| session_.reset(); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, RetryAfterSynchronousNoBufferSpace) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData socket_data; |
| quic::QuicStreamOffset offset = 0; |
| socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset)); |
| socket_data.AddWrite(SYNCHRONOUS, ERR_NO_BUFFER_SPACE); |
| socket_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, GetRequestHeaders("GET", "https", "/"), &offset)); |
| socket_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| socket_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| socket_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| socket_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeAckAndConnectionClosePacket( |
| 4, false, quic::QuicTime::Delta::FromMilliseconds(0), 2, |
| 1, 1, quic::QUIC_CONNECTION_CANCELLED, "net error")); |
| |
| socket_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| session_.reset(); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, MaxRetriesAfterAsyncNoBufferSpace) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData socket_data; |
| quic::QuicStreamOffset offset = 0; |
| socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset)); |
| for (int i = 0; i < 13; ++i) { // 12 retries then one final failure. |
| socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE); |
| } |
| socket_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetTaskRunner(session_->quic_stream_factory(), |
| quic_task_runner_.get()); |
| |
| quic::QuicTime start = clock_.Now(); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| while (!callback.have_result()) { |
| base::RunLoop().RunUntilIdle(); |
| quic_task_runner_->RunUntilIdle(); |
| } |
| ASSERT_TRUE(callback.have_result()); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
| EXPECT_TRUE(socket_data.AllWriteDataConsumed()); |
| // Backoff should take between 4 - 5 seconds. |
| EXPECT_TRUE(clock_.Now() - start > quic::QuicTime::Delta::FromSeconds(4)); |
| EXPECT_TRUE(clock_.Now() - start < quic::QuicTime::Delta::FromSeconds(5)); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, MaxRetriesAfterSynchronousNoBufferSpace) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData socket_data; |
| quic::QuicStreamOffset offset = 0; |
| socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset)); |
| for (int i = 0; i < 13; ++i) { // 12 retries then one final failure. |
| socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE); |
| } |
| socket_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| // Use a TestTaskRunner to avoid waiting in real time for timeouts. |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetTaskRunner(session_->quic_stream_factory(), |
| quic_task_runner_.get()); |
| |
| quic::QuicTime start = clock_.Now(); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| while (!callback.have_result()) { |
| base::RunLoop().RunUntilIdle(); |
| quic_task_runner_->RunUntilIdle(); |
| } |
| ASSERT_TRUE(callback.have_result()); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
| EXPECT_TRUE(socket_data.AllWriteDataConsumed()); |
| // Backoff should take between 4 - 5 seconds. |
| EXPECT_TRUE(clock_.Now() - start > quic::QuicTime::Delta::FromSeconds(4)); |
| EXPECT_TRUE(clock_.Now() - start < quic::QuicTime::Delta::FromSeconds(5)); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, NoMigrationForMsgTooBig) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| const quic::QuicString error_details = |
| quic::QuicStrCat("Write failed with error: ", ERR_MSG_TOO_BIG, " (", |
| #if defined(STARBOARD) |
| // This reflects the change in quic_connection.cc to |
| // fix the strerror leak. |
| ERR_MSG_TOO_BIG, ")"); |
| #else |
| strerror(ERR_MSG_TOO_BIG), ")"); |
| #endif |
| |
| MockQuicData socket_data; |
| quic::QuicStreamOffset offset = 0; |
| socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); |
| socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1, &offset)); |
| socket_data.AddWrite(SYNCHRONOUS, ERR_MSG_TOO_BIG); |
| // Connection close packet will be sent for MSG_TOO_BIG. |
| socket_data.AddWrite( |
| SYNCHRONOUS, client_maker_.MakeConnectionClosePacket( |
| 3, true, quic::QUIC_PACKET_WRITE_ERROR, error_details)); |
| socket_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| base::RunLoop().RunUntilIdle(); |
| ASSERT_TRUE(callback.have_result()); |
| EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
| EXPECT_TRUE(socket_data.AllWriteDataConsumed()); |
| } |
| |
| // Adds coverage to catch regression such as https://crbug.com/622043 |
| TEST_P(QuicNetworkTransactionTest, QuicServerPush) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| uint64_t client_packet_number = 1; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(client_packet_number++, |
| &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), |
| true, true, GetRequestHeaders("GET", "https", "/"), |
| &header_stream_offset)); |
| quic::QuicStreamOffset server_header_offset = 0; |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerPushPromisePacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), |
| GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| GetRequestHeaders("GET", "https", "/pushed.jpg"), |
| &server_header_offset, &server_maker_)); |
| if (client_headers_include_h2_stream_dependency_ && |
| version_ >= quic::QUIC_VERSION_43) { |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientPriorityPacket( |
| client_packet_number++, false, |
| GetNthServerInitiatedUnidirectionalStreamId(0), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| DEFAULT_PRIORITY, &header_stream_offset)); |
| } |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &server_header_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1, 1)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| false, GetResponseHeaders("200 OK"), &server_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 4, 3, 1)); |
| quic::QuicString header2 = ConstructDataHeader(10); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 5, GetNthServerInitiatedUnidirectionalStreamId(0), false, true, |
| 0, header2 + "and hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndRstPacket( |
| client_packet_number++, |
| GetNthServerInitiatedUnidirectionalStreamId(0), |
| quic::QUIC_RST_ACKNOWLEDGEMENT, 5, 5, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| |
| // PUSH_PROMISE handling in the http layer gets exercised here. |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| request_.url = GURL("https://mail.example.org/pushed.jpg"); |
| SendRequestAndExpectQuicResponse("and hello!"); |
| |
| // Check that the NetLog was filled reasonably. |
| TestNetLogEntry::List entries; |
| net_log_.GetEntries(&entries); |
| EXPECT_LT(0u, entries.size()); |
| |
| // Check that we logged a QUIC_HTTP_STREAM_ADOPTED_PUSH_STREAM |
| int pos = ExpectLogContainsSomewhere( |
| entries, 0, NetLogEventType::QUIC_HTTP_STREAM_ADOPTED_PUSH_STREAM, |
| NetLogEventPhase::NONE); |
| EXPECT_LT(0, pos); |
| } |
| |
| // Regression test for http://crbug.com/719461 in which a promised stream |
| // is closed before the pushed headers arrive, but after the connection |
| // is closed and before the callbacks are executed. |
| TEST_P(QuicNetworkTransactionTest, CancelServerPushAfterConnectionClose) { |
| session_params_.retry_without_alt_svc_on_quic_errors = false; |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| uint64_t client_packet_number = 1; |
| // Initial SETTINGS frame. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(client_packet_number++, |
| &header_stream_offset)); |
| // First request: GET https://mail.example.org/ |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), |
| true, true, GetRequestHeaders("GET", "https", "/"), |
| &header_stream_offset)); |
| quic::QuicStreamOffset server_header_offset = 0; |
| // Server promise for: https://mail.example.org/pushed.jpg |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerPushPromisePacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), |
| GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| GetRequestHeaders("GET", "https", "/pushed.jpg"), |
| &server_header_offset, &server_maker_)); |
| if (client_headers_include_h2_stream_dependency_ && |
| version_ >= quic::QUIC_VERSION_43) { |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientPriorityPacket( |
| client_packet_number++, false, |
| GetNthServerInitiatedUnidirectionalStreamId(0), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| DEFAULT_PRIORITY, &header_stream_offset)); |
| } |
| // Response headers for first request. |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &server_header_offset)); |
| // Client ACKs the response headers. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1, 1)); |
| // Response body for first request. |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| // Write error for the third request. |
| mock_quic_data.AddWrite(SYNCHRONOUS, ERR_FAILED); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| // Send a request which triggers a push promise from the server. |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| // Start a push transaction that will be cancelled after the connection |
| // is closed, but before the callback is executed. |
| request_.url = GURL("https://mail.example.org/pushed.jpg"); |
| auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, |
| session_.get()); |
| TestCompletionCallback callback2; |
| int rv = trans2->Start(&request_, callback2.callback(), net_log_.bound()); |
| EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); |
| base::RunLoop().RunUntilIdle(); |
| |
| // Cause the connection to close on a write error. |
| HttpRequestInfo request3; |
| request3.method = "GET"; |
| request3.url = GURL("https://mail.example.org/"); |
| request3.load_flags = 0; |
| request3.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| HttpNetworkTransaction trans3(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback3; |
| EXPECT_THAT(trans3.Start(&request3, callback3.callback(), net_log_.bound()), |
| IsError(ERR_IO_PENDING)); |
| |
| base::RunLoop().RunUntilIdle(); |
| |
| // When |trans2| is destroyed, the underlying stream will be closed. |
| EXPECT_FALSE(callback2.have_result()); |
| trans2 = nullptr; |
| |
| EXPECT_THAT(callback3.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, QuicForceHolBlocking) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| |
| quic::QuicStreamOffset offset = 0; |
| int write_packet_index = 1; |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket( |
| write_packet_index++, &offset)); |
| |
| quic::QuicString header = ConstructDataHeader(1); |
| if (version_ != quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersAndDataFramesPacket( |
| write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), |
| true, true, DEFAULT_PRIORITY, |
| GetRequestHeaders("POST", "https", "/"), 0, &offset, nullptr, |
| {"1"})); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersAndDataFramesPacket( |
| write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), |
| true, true, DEFAULT_PRIORITY, |
| GetRequestHeaders("POST", "https", "/"), 0, &offset, nullptr, |
| {header, "1"})); |
| } |
| |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| |
| quic::QuicString header2 = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header2 + "hello!")); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(write_packet_index++, 2, 1, 1)); |
| |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| request_.method = "POST"; |
| ChunkedUploadDataStream upload_data(0); |
| upload_data.AppendData("1", 1, true); |
| |
| request_.upload_data_stream = &upload_data; |
| |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| class QuicURLRequestContext : public URLRequestContext { |
| public: |
| QuicURLRequestContext(std::unique_ptr<HttpNetworkSession> session, |
| MockClientSocketFactory* socket_factory) |
| : storage_(this) { |
| socket_factory_ = socket_factory; |
| storage_.set_host_resolver(std::make_unique<MockHostResolver>()); |
| storage_.set_cert_verifier(std::make_unique<MockCertVerifier>()); |
| storage_.set_transport_security_state( |
| std::make_unique<TransportSecurityState>()); |
| storage_.set_proxy_resolution_service( |
| ProxyResolutionService::CreateDirect()); |
| storage_.set_ssl_config_service( |
| std::make_unique<SSLConfigServiceDefaults>()); |
| storage_.set_http_auth_handler_factory( |
| #if defined(COBALT_QUIC46) |
| // m70 code. |
| HttpAuthHandlerFactory::CreateDefault(nullptr)); |
| #else |
| HttpAuthHandlerFactory::CreateDefault()); |
| #endif |
| storage_.set_http_server_properties( |
| std::make_unique<HttpServerPropertiesImpl>()); |
| storage_.set_job_factory(std::make_unique<URLRequestJobFactoryImpl>()); |
| storage_.set_http_network_session(std::move(session)); |
| #ifdef HTTP_CACHE_DISABLED_FOR_STARBOARD |
| storage_.set_http_transaction_factory( |
| std::make_unique<HttpNetworkLayer>(storage_.http_network_session())); |
| #else |
| storage_.set_http_transaction_factory(std::make_unique<HttpCache>( |
| storage_.http_network_session(), HttpCache::DefaultBackend::InMemory(0), |
| false)); |
| #endif |
| } |
| |
| ~QuicURLRequestContext() override { AssertNoURLRequests(); } |
| |
| MockClientSocketFactory& socket_factory() { return *socket_factory_; } |
| |
| private: |
| MockClientSocketFactory* socket_factory_; |
| URLRequestContextStorage storage_; |
| }; |
| |
| TEST_P(QuicNetworkTransactionTest, RawHeaderSizeSuccessfullRequest) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| spdy::SpdyHeaderBlock headers(GetRequestHeaders("GET", "https", "/")); |
| headers["user-agent"] = ""; |
| headers["accept-encoding"] = "gzip, deflate"; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| true, std::move(headers), &header_stream_offset)); |
| |
| quic::QuicStreamOffset expected_raw_header_response_size = 0; |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &expected_raw_header_response_size)); |
| |
| quic::QuicString header = ConstructDataHeader(18); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, "Main Resource Data")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| CreateSession(); |
| |
| TestDelegate delegate; |
| QuicURLRequestContext quic_url_request_context(std::move(session_), |
| &socket_factory_); |
| |
| mock_quic_data.AddSocketDataToFactory( |
| &quic_url_request_context.socket_factory()); |
| TestNetworkDelegate network_delegate; |
| quic_url_request_context.set_network_delegate(&network_delegate); |
| |
| std::unique_ptr<URLRequest> request(quic_url_request_context.CreateRequest( |
| GURL("https://mail.example.org/"), DEFAULT_PRIORITY, &delegate, |
| TRAFFIC_ANNOTATION_FOR_TESTS)); |
| quic_url_request_context.socket_factory().AddSSLSocketDataProvider( |
| &ssl_data_); |
| |
| request->Start(); |
| delegate.RunUntilComplete(); |
| |
| EXPECT_LT(0, request->GetTotalSentBytes()); |
| EXPECT_LT(0, request->GetTotalReceivedBytes()); |
| EXPECT_EQ(network_delegate.total_network_bytes_sent(), |
| request->GetTotalSentBytes()); |
| EXPECT_EQ(network_delegate.total_network_bytes_received(), |
| request->GetTotalReceivedBytes()); |
| EXPECT_EQ(static_cast<int>(expected_raw_header_response_size), |
| request->raw_header_size()); |
| |
| // Pump the message loop to allow all data to be consumed. |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, RawHeaderSizeSuccessfullPushHeadersFirst) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| uint64_t client_packet_number = 1; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(client_packet_number++, |
| &header_stream_offset)); |
| spdy::SpdyHeaderBlock headers(GetRequestHeaders("GET", "https", "/")); |
| headers["user-agent"] = ""; |
| headers["accept-encoding"] = "gzip, deflate"; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), |
| true, true, std::move(headers), &header_stream_offset)); |
| |
| quic::QuicStreamOffset server_header_offset = 0; |
| quic::QuicStreamOffset expected_raw_header_response_size = 0; |
| |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerPushPromisePacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), |
| GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| GetRequestHeaders("GET", "https", "/pushed.jpg"), |
| &server_header_offset, &server_maker_)); |
| |
| if (client_headers_include_h2_stream_dependency_ && |
| version_ >= quic::QUIC_VERSION_43) { |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientPriorityPacket( |
| client_packet_number++, false, |
| GetNthServerInitiatedUnidirectionalStreamId(0), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| DEFAULT_PRIORITY, &header_stream_offset)); |
| } |
| |
| expected_raw_header_response_size = server_header_offset; |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &server_header_offset)); |
| expected_raw_header_response_size = |
| server_header_offset - expected_raw_header_response_size; |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1, 1)); |
| |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| false, GetResponseHeaders("200 OK"), &server_header_offset)); |
| quic::QuicString header = ConstructDataHeader(20); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthServerInitiatedUnidirectionalStreamId(0), false, true, |
| 0, header + "Pushed Resource Data")); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 4, 3, 1)); |
| quic::QuicString header2 = ConstructDataHeader(18); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 5, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header2 + "Main Resource Data")); |
| |
| mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(6)); |
| |
| CreateSession(); |
| |
| TestDelegate delegate; |
| QuicURLRequestContext quic_url_request_context(std::move(session_), |
| &socket_factory_); |
| |
| mock_quic_data.AddSocketDataToFactory( |
| &quic_url_request_context.socket_factory()); |
| TestNetworkDelegate network_delegate; |
| quic_url_request_context.set_network_delegate(&network_delegate); |
| |
| std::unique_ptr<URLRequest> request(quic_url_request_context.CreateRequest( |
| GURL("https://mail.example.org/"), DEFAULT_PRIORITY, &delegate, |
| TRAFFIC_ANNOTATION_FOR_TESTS)); |
| quic_url_request_context.socket_factory().AddSSLSocketDataProvider( |
| &ssl_data_); |
| |
| request->Start(); |
| delegate.RunUntilComplete(); |
| |
| EXPECT_LT(0, request->GetTotalSentBytes()); |
| EXPECT_LT(0, request->GetTotalReceivedBytes()); |
| EXPECT_EQ(network_delegate.total_network_bytes_sent(), |
| request->GetTotalSentBytes()); |
| EXPECT_EQ(network_delegate.total_network_bytes_received(), |
| request->GetTotalReceivedBytes()); |
| EXPECT_EQ(static_cast<int>(expected_raw_header_response_size), |
| request->raw_header_size()); |
| |
| // Pump the message loop to allow all data to be consumed. |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, HostInWhitelist) { |
| session_params_.quic_host_whitelist.insert("mail.example.org"); |
| |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectQuicResponse("hello!"); |
| } |
| |
| TEST_P(QuicNetworkTransactionTest, HostNotInWhitelist) { |
| session_params_.quic_host_whitelist.insert("mail.example.com"); |
| |
| MockRead http_reads[] = { |
| MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| MockRead("hello world"), |
| MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| MockRead(ASYNC, OK)}; |
| |
| StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| socket_factory_.AddSocketDataProvider(&http_data); |
| AddCertificate(&ssl_data_); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| AddHangingNonAlternateProtocolSocketData(); |
| CreateSession(); |
| |
| SendRequestAndExpectHttpResponse("hello world"); |
| SendRequestAndExpectHttpResponse("hello world"); |
| } |
| |
| class QuicNetworkTransactionWithDestinationTest |
| : public PlatformTest, |
| public ::testing::WithParamInterface<PoolingTestParams>, |
| public WithScopedTaskEnvironment { |
| protected: |
| QuicNetworkTransactionWithDestinationTest() |
| : version_(GetParam().version), |
| client_headers_include_h2_stream_dependency_( |
| GetParam().client_headers_include_h2_stream_dependency), |
| supported_versions_(quic::test::SupportedTransportVersions(version_)), |
| destination_type_(GetParam().destination_type), |
| cert_transparency_verifier_(new MultiLogCTVerifier()), |
| ssl_config_service_(new SSLConfigServiceDefaults), |
| proxy_resolution_service_(ProxyResolutionService::CreateDirect()), |
| #if defined(COBALT_QUIC46) |
| // m70 code. |
| auth_handler_factory_( |
| HttpAuthHandlerFactory::CreateDefault(nullptr)), |
| #else |
| auth_handler_factory_(HttpAuthHandlerFactory::CreateDefault()), |
| #endif |
| random_generator_(0), |
| ssl_data_(ASYNC, OK) {} |
| |
| void SetUp() override { |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| base::RunLoop().RunUntilIdle(); |
| |
| HttpNetworkSession::Params session_params; |
| session_params.enable_quic = true; |
| session_params.quic_allow_remote_alt_svc = true; |
| session_params.quic_supported_versions = supported_versions_; |
| session_params.quic_headers_include_h2_stream_dependency = |
| client_headers_include_h2_stream_dependency_; |
| |
| HttpNetworkSession::Context session_context; |
| |
| clock_.AdvanceTime(quic::QuicTime::Delta::FromMilliseconds(20)); |
| session_context.quic_clock = &clock_; |
| |
| crypto_client_stream_factory_.set_handshake_mode( |
| MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| session_context.quic_crypto_client_stream_factory = |
| &crypto_client_stream_factory_; |
| |
| session_context.quic_random = &random_generator_; |
| session_context.client_socket_factory = &socket_factory_; |
| session_context.host_resolver = &host_resolver_; |
| session_context.cert_verifier = &cert_verifier_; |
| session_context.transport_security_state = &transport_security_state_; |
| session_context.cert_transparency_verifier = |
| cert_transparency_verifier_.get(); |
| session_context.ct_policy_enforcer = &ct_policy_enforcer_; |
| session_context.socket_performance_watcher_factory = |
| &test_socket_performance_watcher_factory_; |
| session_context.ssl_config_service = ssl_config_service_.get(); |
| session_context.proxy_resolution_service = proxy_resolution_service_.get(); |
| session_context.http_auth_handler_factory = auth_handler_factory_.get(); |
| session_context.http_server_properties = &http_server_properties_; |
| |
| session_.reset(new HttpNetworkSession(session_params, session_context)); |
| session_->quic_stream_factory()->set_require_confirmation(true); |
| } |
| |
| void TearDown() override { |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| // Empty the current queue. |
| base::RunLoop().RunUntilIdle(); |
| PlatformTest::TearDown(); |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| base::RunLoop().RunUntilIdle(); |
| session_.reset(); |
| } |
| |
| void SetQuicAlternativeService(const std::string& origin) { |
| HostPortPair destination; |
| switch (destination_type_) { |
| case SAME_AS_FIRST: |
| destination = HostPortPair(origin1_, 443); |
| break; |
| case SAME_AS_SECOND: |
| destination = HostPortPair(origin2_, 443); |
| break; |
| case DIFFERENT: |
| destination = HostPortPair(kDifferentHostname, 443); |
| break; |
| } |
| AlternativeService alternative_service(kProtoQUIC, destination); |
| base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| http_server_properties_.SetQuicAlternativeService( |
| url::SchemeHostPort("https", origin, 443), alternative_service, |
| expiration, supported_versions_); |
| } |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientRequestHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| quic::QuicStreamOffset* offset, |
| QuicTestPacketMaker* maker) { |
| return ConstructClientRequestHeadersPacket( |
| packet_number, stream_id, should_include_version, 0, offset, maker); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientRequestHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| quic::QuicStreamId parent_stream_id, |
| quic::QuicStreamOffset* offset, |
| QuicTestPacketMaker* maker) { |
| spdy::SpdyPriority priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| spdy::SpdyHeaderBlock headers( |
| maker->GetRequestHeaders("GET", "https", "/")); |
| return maker->MakeRequestHeadersPacketWithOffsetTracking( |
| packet_number, stream_id, should_include_version, true, priority, |
| std::move(headers), parent_stream_id, offset); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructClientRequestHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| bool should_include_version, |
| QuicTestPacketMaker* maker) { |
| return ConstructClientRequestHeadersPacket( |
| packet_number, stream_id, should_include_version, nullptr, maker); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructServerResponseHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| quic::QuicStreamOffset* offset, |
| QuicTestPacketMaker* maker) { |
| spdy::SpdyHeaderBlock headers(maker->GetResponseHeaders("200 OK")); |
| return maker->MakeResponseHeadersPacketWithOffsetTracking( |
| packet_number, stream_id, false, false, std::move(headers), offset); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> |
| ConstructServerResponseHeadersPacket(uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| QuicTestPacketMaker* maker) { |
| return ConstructServerResponseHeadersPacket(packet_number, stream_id, |
| nullptr, maker); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerDataPacket( |
| uint64_t packet_number, |
| quic::QuicStreamId stream_id, |
| QuicTestPacketMaker* maker) { |
| quic::QuicString header = ""; |
| if (version_ == quic::QUIC_VERSION_99) { |
| quic::HttpEncoder encoder; |
| std::unique_ptr<char[]> buffer; |
| auto header_length = encoder.SerializeDataFrameHeader(5, &buffer); |
| header = quic::QuicString(buffer.get(), header_length); |
| } |
| return maker->MakeDataPacket(packet_number, stream_id, false, true, 0, |
| header + "hello"); |
| } |
| |
| std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckPacket( |
| uint64_t packet_number, |
| uint64_t largest_received, |
| uint64_t smallest_received, |
| uint64_t least_unacked, |
| QuicTestPacketMaker* maker) { |
| return maker->MakeAckPacket(packet_number, largest_received, |
| smallest_received, least_unacked, true); |
| } |
| |
| std::unique_ptr<quic::QuicReceivedPacket> ConstructInitialSettingsPacket( |
| uint64_t packet_number, |
| quic::QuicStreamOffset* offset, |
| QuicTestPacketMaker* maker) { |
| return maker->MakeInitialSettingsPacket(packet_number, offset); |
| } |
| |
| void AddRefusedSocketData() { |
| std::unique_ptr<StaticSocketDataProvider> refused_data( |
| new StaticSocketDataProvider()); |
| MockConnect refused_connect(SYNCHRONOUS, ERR_CONNECTION_REFUSED); |
| refused_data->set_connect_data(refused_connect); |
| socket_factory_.AddSocketDataProvider(refused_data.get()); |
| static_socket_data_provider_vector_.push_back(std::move(refused_data)); |
| } |
| |
| void AddHangingSocketData() { |
| std::unique_ptr<StaticSocketDataProvider> hanging_data( |
| new StaticSocketDataProvider()); |
| MockConnect hanging_connect(SYNCHRONOUS, ERR_IO_PENDING); |
| hanging_data->set_connect_data(hanging_connect); |
| socket_factory_.AddSocketDataProvider(hanging_data.get()); |
| static_socket_data_provider_vector_.push_back(std::move(hanging_data)); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| } |
| |
| bool AllDataConsumed() { |
| for (const auto& socket_data_ptr : static_socket_data_provider_vector_) { |
| if (!socket_data_ptr->AllReadDataConsumed() || |
| !socket_data_ptr->AllWriteDataConsumed()) { |
| return false; |
| } |
| } |
| return true; |
| } |
| |
| void SendRequestAndExpectQuicResponse(const std::string& host) { |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HttpRequestInfo request; |
| std::string url("https://"); |
| url.append(host); |
| request.url = GURL(url); |
| request.load_flags = 0; |
| request.method = "GET"; |
| request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(callback.GetResult(rv), IsOk()); |
| |
| std::string response_data; |
| ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); |
| EXPECT_EQ("hello", response_data); |
| |
| const HttpResponseInfo* response = trans.GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| ASSERT_TRUE(response->headers.get() != nullptr); |
| EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->was_fetched_via_spdy); |
| EXPECT_TRUE(response->was_alpn_negotiated); |
| EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_), |
| response->connection_info); |
| #if defined(COBALT_QUIC46) |
| EXPECT_EQ(443, response->socket_address.port()); |
| #else |
| EXPECT_EQ(443, response->remote_endpoint.port()); |
| #endif |
| } |
| |
| quic::QuicStreamId GetNthClientInitiatedBidirectionalStreamId(int n) { |
| return quic::test::GetNthClientInitiatedBidirectionalStreamId(version_, n); |
| } |
| |
| quic::MockClock clock_; |
| const quic::QuicTransportVersion version_; |
| const bool client_headers_include_h2_stream_dependency_; |
| quic::QuicTransportVersionVector supported_versions_; |
| DestinationType destination_type_; |
| std::string origin1_; |
| std::string origin2_; |
| std::unique_ptr<HttpNetworkSession> session_; |
| MockClientSocketFactory socket_factory_; |
| MockHostResolver host_resolver_; |
| MockCertVerifier cert_verifier_; |
| TransportSecurityState transport_security_state_; |
| std::unique_ptr<CTVerifier> cert_transparency_verifier_; |
| DefaultCTPolicyEnforcer ct_policy_enforcer_; |
| TestSocketPerformanceWatcherFactory test_socket_performance_watcher_factory_; |
| std::unique_ptr<SSLConfigServiceDefaults> ssl_config_service_; |
| std::unique_ptr<ProxyResolutionService> proxy_resolution_service_; |
| std::unique_ptr<HttpAuthHandlerFactory> auth_handler_factory_; |
| quic::test::MockRandom random_generator_; |
| HttpServerPropertiesImpl http_server_properties_; |
| BoundTestNetLog net_log_; |
| MockCryptoClientStreamFactory crypto_client_stream_factory_; |
| std::vector<std::unique_ptr<StaticSocketDataProvider>> |
| static_socket_data_provider_vector_; |
| SSLSocketDataProvider ssl_data_; |
| }; |
| |
| INSTANTIATE_TEST_SUITE_P(VersionIncludeStreamDependencySequence, |
| QuicNetworkTransactionWithDestinationTest, |
| ::testing::ValuesIn(GetPoolingTestParams())); |
| |
| // A single QUIC request fails because the certificate does not match the origin |
| // hostname, regardless of whether it matches the alternative service hostname. |
| TEST_P(QuicNetworkTransactionWithDestinationTest, InvalidCertificate) { |
| if (destination_type_ == DIFFERENT) |
| return; |
| |
| GURL url("https://mail.example.com/"); |
| origin1_ = url.host(); |
| |
| // Not used for requests, but this provides a test case where the certificate |
| // is valid for the hostname of the alternative service. |
| origin2_ = "mail.example.org"; |
| |
| SetQuicAlternativeService(origin1_); |
| |
| scoped_refptr<X509Certificate> cert( |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| ASSERT_FALSE(cert->VerifyNameMatch(origin1_)); |
| ASSERT_TRUE(cert->VerifyNameMatch(origin2_)); |
| |
| ProofVerifyDetailsChromium verify_details; |
| verify_details.cert_verify_result.verified_cert = cert; |
| verify_details.cert_verify_result.is_issued_by_known_root = true; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| |
| MockQuicData mock_quic_data; |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| mock_quic_data.AddRead(ASYNC, 0); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddRefusedSocketData(); |
| |
| HttpRequestInfo request; |
| request.url = url; |
| request.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request, callback.callback(), net_log_.bound()); |
| EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED)); |
| |
| EXPECT_TRUE(AllDataConsumed()); |
| } |
| |
| // First request opens QUIC session to alternative service. Second request |
| // pools to it, because destination matches and certificate is valid, even |
| // though quic::QuicServerId is different. |
| TEST_P(QuicNetworkTransactionWithDestinationTest, PoolIfCertificateValid) { |
| origin1_ = "mail.example.org"; |
| origin2_ = "news.example.org"; |
| |
| SetQuicAlternativeService(origin1_); |
| SetQuicAlternativeService(origin2_); |
| |
| scoped_refptr<X509Certificate> cert( |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| ASSERT_TRUE(cert->VerifyNameMatch(origin1_)); |
| ASSERT_TRUE(cert->VerifyNameMatch(origin2_)); |
| ASSERT_FALSE(cert->VerifyNameMatch(kDifferentHostname)); |
| |
| ProofVerifyDetailsChromium verify_details; |
| verify_details.cert_verify_result.verified_cert = cert; |
| verify_details.cert_verify_result.is_issued_by_known_root = true; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| |
| QuicTestPacketMaker client_maker( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin1_, quic::Perspective::IS_CLIENT, |
| client_headers_include_h2_stream_dependency_); |
| QuicTestPacketMaker server_maker( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin1_, quic::Perspective::IS_SERVER, false); |
| |
| quic::QuicStreamOffset request_header_offset(0); |
| quic::QuicStreamOffset response_header_offset(0); |
| |
| MockQuicData mock_quic_data; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructInitialSettingsPacket(1, &request_header_offset, &client_maker)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| &request_header_offset, &client_maker)); |
| mock_quic_data.AddRead(ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), |
| &response_header_offset, &server_maker)); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckPacket(3, 2, 1, 1, &client_maker)); |
| |
| client_maker.set_hostname(origin2_); |
| server_maker.set_hostname(origin2_); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &request_header_offset, &client_maker)); |
| mock_quic_data.AddRead(ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), |
| &response_header_offset, &server_maker)); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), &server_maker)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckPacket(5, 4, 3, 1, &client_maker)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| AddHangingSocketData(); |
| AddHangingSocketData(); |
| |
| scoped_refptr<TestTaskRunner> quic_task_runner_(new TestTaskRunner(&clock_)); |
| QuicStreamFactoryPeer::SetAlarmFactory( |
| session_->quic_stream_factory(), |
| std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), |
| &clock_)); |
| |
| SendRequestAndExpectQuicResponse(origin1_); |
| SendRequestAndExpectQuicResponse(origin2_); |
| |
| EXPECT_TRUE(AllDataConsumed()); |
| } |
| |
| // First request opens QUIC session to alternative service. Second request does |
| // not pool to it, even though destination matches, because certificate is not |
| // valid. Instead, a new QUIC session is opened to the same destination with a |
| // different quic::QuicServerId. |
| TEST_P(QuicNetworkTransactionWithDestinationTest, |
| DoNotPoolIfCertificateInvalid) { |
| origin1_ = "news.example.org"; |
| origin2_ = "mail.example.com"; |
| |
| SetQuicAlternativeService(origin1_); |
| SetQuicAlternativeService(origin2_); |
| |
| scoped_refptr<X509Certificate> cert1( |
| ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| ASSERT_TRUE(cert1->VerifyNameMatch(origin1_)); |
| ASSERT_FALSE(cert1->VerifyNameMatch(origin2_)); |
| ASSERT_FALSE(cert1->VerifyNameMatch(kDifferentHostname)); |
| |
| scoped_refptr<X509Certificate> cert2( |
| ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); |
| ASSERT_TRUE(cert2->VerifyNameMatch(origin2_)); |
| ASSERT_FALSE(cert2->VerifyNameMatch(kDifferentHostname)); |
| |
| ProofVerifyDetailsChromium verify_details1; |
| verify_details1.cert_verify_result.verified_cert = cert1; |
| verify_details1.cert_verify_result.is_issued_by_known_root = true; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details1); |
| |
| ProofVerifyDetailsChromium verify_details2; |
| verify_details2.cert_verify_result.verified_cert = cert2; |
| verify_details2.cert_verify_result.is_issued_by_known_root = true; |
| crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details2); |
| |
| QuicTestPacketMaker client_maker1( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin1_, quic::Perspective::IS_CLIENT, |
| client_headers_include_h2_stream_dependency_); |
| QuicTestPacketMaker server_maker1( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin1_, quic::Perspective::IS_SERVER, false); |
| |
| MockQuicData mock_quic_data1; |
| quic::QuicStreamOffset header_stream_offset1 = 0; |
| mock_quic_data1.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset1, |
| &client_maker1)); |
| mock_quic_data1.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| &header_stream_offset1, &client_maker1)); |
| mock_quic_data1.AddRead( |
| ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker1)); |
| mock_quic_data1.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker1)); |
| mock_quic_data1.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1, &client_maker1)); |
| mock_quic_data1.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data1.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data1.AddSocketDataToFactory(&socket_factory_); |
| |
| QuicTestPacketMaker client_maker2( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin2_, quic::Perspective::IS_CLIENT, |
| client_headers_include_h2_stream_dependency_); |
| QuicTestPacketMaker server_maker2( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, origin2_, quic::Perspective::IS_SERVER, false); |
| |
| MockQuicData mock_quic_data2; |
| quic::QuicStreamOffset header_stream_offset2 = 0; |
| mock_quic_data2.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset2, |
| &client_maker2)); |
| mock_quic_data2.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| &header_stream_offset2, &client_maker2)); |
| mock_quic_data2.AddRead( |
| ASYNC, |
| ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker2)); |
| mock_quic_data2.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker2)); |
| mock_quic_data2.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(3, 2, 1, 1, &client_maker2)); |
| mock_quic_data2.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data2.AddRead(ASYNC, 0); // EOF |
| |
| mock_quic_data2.AddSocketDataToFactory(&socket_factory_); |
| |
| SendRequestAndExpectQuicResponse(origin1_); |
| SendRequestAndExpectQuicResponse(origin2_); |
| |
| EXPECT_TRUE(AllDataConsumed()); |
| } |
| |
| // crbug.com/705109 - this confirms that matching request with a body |
| // triggers a crash (pre-fix). |
| TEST_P(QuicNetworkTransactionTest, QuicServerPushMatchesRequestWithBody) { |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| uint64_t client_packet_number = 1; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(client_packet_number++, |
| &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), |
| true, true, GetRequestHeaders("GET", "https", "/"), |
| &header_stream_offset)); |
| quic::QuicStreamOffset server_header_offset = 0; |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerPushPromisePacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), |
| GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| GetRequestHeaders("GET", "https", "/pushed.jpg"), |
| &server_header_offset, &server_maker_)); |
| if (client_headers_include_h2_stream_dependency_ && |
| version_ >= quic::QUIC_VERSION_43) { |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientPriorityPacket( |
| client_packet_number++, false, |
| GetNthServerInitiatedUnidirectionalStreamId(0), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| DEFAULT_PRIORITY, &header_stream_offset)); |
| } |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &server_header_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1, 1)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| false, GetResponseHeaders("200 OK"), &server_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 4, 3, 1)); |
| |
| quic::QuicString header2 = ConstructDataHeader(10); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 5, GetNthServerInitiatedUnidirectionalStreamId(0), false, true, |
| 0, header2 + "and hello!")); |
| |
| // Because the matching request has a body, we will see the push |
| // stream get cancelled, and the matching request go out on the |
| // wire. |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndRstPacket( |
| client_packet_number++, |
| GetNthServerInitiatedUnidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, 5, 5, 1)); |
| const char kBody[] = "1"; |
| quic::QuicString header3 = ConstructDataHeader(1); |
| if (version_ != quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersAndDataFramesPacket( |
| client_packet_number++, |
| GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| DEFAULT_PRIORITY, GetRequestHeaders("GET", "https", "/pushed.jpg"), |
| GetNthServerInitiatedUnidirectionalStreamId(0), |
| &header_stream_offset, nullptr, {kBody})); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersAndDataFramesPacket( |
| client_packet_number++, |
| GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| DEFAULT_PRIORITY, GetRequestHeaders("GET", "https", "/pushed.jpg"), |
| GetNthServerInitiatedUnidirectionalStreamId(0), |
| &header_stream_offset, nullptr, {header3, kBody})); |
| } |
| |
| // We see the same response as for the earlier pushed and cancelled |
| // stream. |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 6, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &server_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 7, GetNthClientInitiatedBidirectionalStreamId(1), false, true, |
| 0, header2 + "and hello!")); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 7, 6, 1)); |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| |
| // PUSH_PROMISE handling in the http layer gets exercised here. |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| request_.url = GURL("https://mail.example.org/pushed.jpg"); |
| ChunkedUploadDataStream upload_data(0); |
| upload_data.AppendData("1", 1, true); |
| request_.upload_data_stream = &upload_data; |
| SendRequestAndExpectQuicResponse("and hello!"); |
| } |
| |
| // Regression test for https://crbug.com/797825: If pushed headers describe a |
| // valid URL with empty hostname, then X509Certificate::VerifyHostname() must |
| // not be called (otherwise a DCHECK fails). |
| TEST_P(QuicNetworkTransactionTest, QuicServerPushWithEmptyHostname) { |
| spdy::SpdyHeaderBlock pushed_request_headers; |
| pushed_request_headers[":authority"] = ""; |
| pushed_request_headers[":method"] = "GET"; |
| pushed_request_headers[":path"] = "/"; |
| pushed_request_headers[":scheme"] = "nosuchscheme"; |
| |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| MockQuicData mock_quic_data; |
| |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, true, |
| GetRequestHeaders("GET", "https", "/"), &header_stream_offset)); |
| |
| quic::QuicStreamOffset server_header_offset = 0; |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerPushPromisePacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), |
| GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| std::move(pushed_request_headers), &server_header_offset, |
| &server_maker_)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientRstPacket( |
| 3, GetNthServerInitiatedUnidirectionalStreamId(0), |
| quic::QUIC_INVALID_PROMISE_URL, 0)); |
| |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &server_header_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 2, 1, 1)); |
| |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, GetNthServerInitiatedUnidirectionalStreamId(0), false, |
| false, GetResponseHeaders("200 OK"), &server_header_offset)); |
| quic::QuicString header = ConstructDataHeader(6); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| 0, header + "hello!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(5, 4, 3, 1)); |
| |
| mock_quic_data.AddRead(ASYNC, 0); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| |
| // PUSH_PROMISE handling in the http layer gets exercised here. |
| SendRequestAndExpectQuicResponse("hello!"); |
| |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Cobalt prohibits QUIC proxies. |
| // Chromium m70 does not support QUIC proxies properly, see |
| // https://chromium-review.googlesource.com/c/chromium/src/+/1377709 |
| // and its related bugs for background info. |
| // Cobalt's m70 net + m74 QUIC combo fail the following tests due to missing |
| // net commits including the one listed above. |
| // Even after the Chromium fix, QUIC proxies support is turned off by default. |
| // This setting is configurable through |
| // session_params.enable_quic_proxies_for_https_urls, a QUIC field trial |
| // param(which Cobalt does not support). |
| // These tests should be green after the next rebase. |
| #if !defined(COBALT_QUIC46) |
| // Performs an HTTPS/1.1 request over QUIC proxy tunnel. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyConnectHttpsServer) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| false, ConnectRequestHeaders("mail.example.org:443"), |
| &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| |
| const char get_request[] = |
| "GET / HTTP/1.1\r\n" |
| "Host: mail.example.org\r\n" |
| "Connection: keep-alive\r\n\r\n"; |
| quic::QuicString header = ConstructDataHeader(SbStringGetLength(get_request)); |
| if (version_ != quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndDataPacket( |
| 3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, |
| false, 0, quic::QuicStringPiece(get_request))); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndMultipleDataFramesPacket( |
| 3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, |
| false, 0, {header, quic::QuicString(get_request)})); |
| } |
| |
| const char get_response[] = |
| "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 10\r\n\r\n"; |
| quic::QuicString header2 = ConstructDataHeader(SbStringGetLength(get_response)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| 0, header2 + quic::QuicString(get_response))); |
| quic::QuicString header3 = ConstructDataHeader(10); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, ConstructServerDataPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), false, |
| false, SbStringGetLength(get_response) + header2.length(), |
| header3 + quic::QuicString("0123456789"))); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 3, 2, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRstPacket(5, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, |
| SbStringGetLength(get_request) + header.length())); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| RunTransaction(&trans); |
| CheckWasHttpResponse(&trans); |
| CheckResponsePort(&trans, 70); |
| CheckResponseData(&trans, "0123456789"); |
| EXPECT_TRUE(headers_handler.was_proxied()); |
| EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic()); |
| |
| // Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC |
| // proxy socket to disconnect. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Performs an HTTP/2 request over QUIC proxy tunnel. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyConnectSpdyServer) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| false, ConnectRequestHeaders("mail.example.org:443"), |
| &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| |
| SpdyTestUtil spdy_util; |
| |
| spdy::SpdySerializedFrame get_frame = |
| spdy_util.ConstructSpdyGet("https://mail.example.org/", 1, LOWEST); |
| quic::QuicString header = ConstructDataHeader(get_frame.size()); |
| if (version_ != quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndDataPacket( |
| 3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, |
| false, 0, |
| quic::QuicStringPiece(get_frame.data(), get_frame.size()))); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndMultipleDataFramesPacket( |
| 3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, |
| false, 0, |
| {header, quic::QuicString(get_frame.data(), get_frame.size())})); |
| } |
| spdy::SpdySerializedFrame resp_frame = |
| spdy_util.ConstructSpdyGetReply(nullptr, 0, 1); |
| quic::QuicString header2 = ConstructDataHeader(resp_frame.size()); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, 0, |
| header2 + quic::QuicString(resp_frame.data(), resp_frame.size()))); |
| |
| spdy::SpdySerializedFrame data_frame = |
| spdy_util.ConstructSpdyDataFrame(1, "0123456789", true); |
| quic::QuicString header3 = ConstructDataHeader(resp_frame.size()); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, |
| ConstructServerDataPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| resp_frame.size() + header2.length(), |
| header3 + quic::QuicString(data_frame.data(), data_frame.size()))); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 3, 2, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRstPacket(5, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, |
| get_frame.size() + header.length())); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| SSLSocketDataProvider ssl_data(ASYNC, OK); |
| ssl_data.next_proto = kProtoHTTP2; |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| RunTransaction(&trans); |
| CheckWasSpdyResponse(&trans); |
| CheckResponsePort(&trans, 70); |
| CheckResponseData(&trans, "0123456789"); |
| EXPECT_TRUE(headers_handler.was_proxied()); |
| EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic()); |
| |
| // Causes MockSSLClientSocket to disconproxyconnecthttpnect, which causes the |
| // underlying QUIC proxy socket to disconnect. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Make two HTTP/1.1 requests to the same host over a QUIC proxy tunnel and |
| // check that the proxy socket is reused for the second request. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyConnectReuseTransportSocket) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| int write_packet_index = 1; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_index++, |
| &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), |
| true, false, ConnectRequestHeaders("mail.example.org:443"), |
| &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"))); |
| |
| quic::QuicStreamOffset client_data_offset = 0; |
| quic::QuicStreamOffset server_data_offset = 0; |
| const char get_request_1[] = |
| "GET / HTTP/1.1\r\n" |
| "Host: mail.example.org\r\n" |
| "Connection: keep-alive\r\n\r\n"; |
| quic::QuicString header = ConstructDataHeader(SbStringGetLength(get_request_1)); |
| if (version_ != quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndDataPacket( |
| write_packet_index++, false, |
| GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, false, |
| client_data_offset, quic::QuicStringPiece(get_request_1))); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndMultipleDataFramesPacket( |
| write_packet_index++, false, |
| GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, false, |
| client_data_offset, {header, quic::QuicString(get_request_1)})); |
| } |
| |
| client_data_offset += SbStringGetLength(get_request_1) + header.length(); |
| |
| const char get_response_1[] = |
| "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 10\r\n\r\n"; |
| quic::QuicString header2 = ConstructDataHeader(SbStringGetLength(get_response_1)); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| server_data_offset, header2 + quic::QuicString(get_response_1))); |
| server_data_offset += SbStringGetLength(get_response_1) + header2.length(); |
| |
| quic::QuicString header3 = ConstructDataHeader(10); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, |
| ConstructServerDataPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| server_data_offset, header3 + quic::QuicString("0123456789"))); |
| server_data_offset += 10 + header3.length(); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(write_packet_index++, 3, 2, 1)); |
| |
| const char get_request_2[] = |
| "GET /2 HTTP/1.1\r\n" |
| "Host: mail.example.org\r\n" |
| "Connection: keep-alive\r\n\r\n"; |
| quic::QuicString header4 = ConstructDataHeader(SbStringGetLength(get_request_2)); |
| if (version_ == quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientMultipleDataFramesPacket( |
| write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), |
| false, false, client_data_offset, |
| {header4, quic::QuicString(get_request_2)})); |
| client_data_offset += header4.length() + SbStringGetLength(get_request_2); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientDataPacket(write_packet_index++, |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| false, false, client_data_offset, |
| quic::QuicStringPiece(get_request_2))); |
| client_data_offset += SbStringGetLength(get_request_2); |
| } |
| |
| const char get_response_2[] = |
| "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 7\r\n\r\n"; |
| quic::QuicString header5 = ConstructDataHeader(SbStringGetLength(get_response_2)); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| server_data_offset, header5 + quic::QuicString(get_response_2))); |
| server_data_offset += SbStringGetLength(get_response_2) + header5.length(); |
| |
| quic::QuicString header6 = ConstructDataHeader(7); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, |
| ConstructServerDataPacket( |
| 5, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| server_data_offset, header6 + quic::QuicString("0123456"))); |
| server_data_offset += 7 + header6.length(); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientAckPacket(write_packet_index++, 5, 4, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRstPacket( |
| write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, client_data_offset)); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| HttpNetworkTransaction trans_1(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler_1; |
| trans_1.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler_1))); |
| RunTransaction(&trans_1); |
| CheckWasHttpResponse(&trans_1); |
| CheckResponsePort(&trans_1, 70); |
| CheckResponseData(&trans_1, "0123456789"); |
| EXPECT_TRUE(headers_handler_1.was_proxied()); |
| EXPECT_TRUE(trans_1.GetResponseInfo()->proxy_server.is_quic()); |
| |
| request_.url = GURL("https://mail.example.org/2"); |
| HttpNetworkTransaction trans_2(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler_2; |
| trans_2.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler_2))); |
| RunTransaction(&trans_2); |
| CheckWasHttpResponse(&trans_2); |
| CheckResponsePort(&trans_2, 70); |
| CheckResponseData(&trans_2, "0123456"); |
| EXPECT_TRUE(headers_handler_2.was_proxied()); |
| EXPECT_TRUE(trans_2.GetResponseInfo()->proxy_server.is_quic()); |
| |
| // Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC |
| // proxy socket to disconnect. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Make an HTTP/1.1 request to one host and an HTTP/2 request to a different |
| // host over a QUIC proxy tunnel. Check that the QUIC session to the proxy |
| // server is reused for the second request. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyConnectReuseQuicSession) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset client_header_stream_offset = 0; |
| quic::QuicStreamOffset server_header_stream_offset = 0; |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket( |
| 1, &client_header_stream_offset)); |
| |
| // CONNECT request and response for first request |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| false, ConnectRequestHeaders("mail.example.org:443"), |
| &client_header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &server_header_stream_offset)); |
| |
| // GET request, response, and data over QUIC tunnel for first request |
| const char get_request[] = |
| "GET / HTTP/1.1\r\n" |
| "Host: mail.example.org\r\n" |
| "Connection: keep-alive\r\n\r\n"; |
| quic::QuicString header = ConstructDataHeader(SbStringGetLength(get_request)); |
| if (version_ != quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndDataPacket( |
| 3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, |
| false, 0, quic::QuicStringPiece(get_request))); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndMultipleDataFramesPacket( |
| 3, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, 1, |
| false, 0, {header, quic::QuicString(get_request)})); |
| } |
| |
| const char get_response[] = |
| "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 10\r\n\r\n"; |
| quic::QuicString header2 = ConstructDataHeader(SbStringGetLength(get_response)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| 0, header2 + quic::QuicString(get_response))); |
| quic::QuicString header3 = ConstructDataHeader(10); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, ConstructServerDataPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), false, |
| false, SbStringGetLength(get_response) + header2.length(), |
| header3 + quic::QuicString("0123456789"))); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(4, 3, 2, 1)); |
| |
| // CONNECT request and response for second request |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 5, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| ConnectRequestHeaders("different.example.org:443"), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &client_header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &server_header_stream_offset)); |
| |
| // GET request, response, and data over QUIC tunnel for second request |
| SpdyTestUtil spdy_util; |
| spdy::SpdySerializedFrame get_frame = |
| spdy_util.ConstructSpdyGet("https://different.example.org/", 1, LOWEST); |
| quic::QuicString header4 = ConstructDataHeader(get_frame.size()); |
| if (version_ != quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndDataPacket( |
| 6, false, GetNthClientInitiatedBidirectionalStreamId(1), 4, 4, 1, |
| false, 0, |
| quic::QuicStringPiece(get_frame.data(), get_frame.size()))); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndMultipleDataFramesPacket( |
| 6, false, GetNthClientInitiatedBidirectionalStreamId(1), 4, 4, 1, |
| false, 0, |
| {header4, quic::QuicString(get_frame.data(), get_frame.size())})); |
| } |
| |
| spdy::SpdySerializedFrame resp_frame = |
| spdy_util.ConstructSpdyGetReply(nullptr, 0, 1); |
| quic::QuicString header5 = ConstructDataHeader(resp_frame.size()); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 5, GetNthClientInitiatedBidirectionalStreamId(1), false, false, 0, |
| header5 + quic::QuicString(resp_frame.data(), resp_frame.size()))); |
| |
| spdy::SpdySerializedFrame data_frame = |
| spdy_util.ConstructSpdyDataFrame(1, "0123456", true); |
| quic::QuicString header6 = ConstructDataHeader(data_frame.size()); |
| mock_quic_data.AddRead( |
| ASYNC, |
| ConstructServerDataPacket( |
| 6, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| resp_frame.size() + header5.length(), |
| header6 + quic::QuicString(data_frame.data(), data_frame.size()))); |
| |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(7, 6, 5, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRstPacket(8, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, |
| SbStringGetLength(get_request) + header.length())); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRstPacket(9, GetNthClientInitiatedBidirectionalStreamId(1), |
| quic::QUIC_STREAM_CANCELLED, |
| get_frame.size() + header4.length())); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| SSLSocketDataProvider ssl_data(ASYNC, OK); |
| ssl_data.next_proto = kProtoHTTP2; |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| HttpNetworkTransaction trans_1(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler_1; |
| trans_1.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler_1))); |
| RunTransaction(&trans_1); |
| CheckWasHttpResponse(&trans_1); |
| CheckResponsePort(&trans_1, 70); |
| CheckResponseData(&trans_1, "0123456789"); |
| EXPECT_TRUE(headers_handler_1.was_proxied()); |
| EXPECT_TRUE(trans_1.GetResponseInfo()->proxy_server.is_quic()); |
| |
| request_.url = GURL("https://different.example.org/"); |
| HttpNetworkTransaction trans_2(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler_2; |
| trans_2.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler_2))); |
| RunTransaction(&trans_2); |
| CheckWasSpdyResponse(&trans_2); |
| CheckResponsePort(&trans_2, 70); |
| CheckResponseData(&trans_2, "0123456"); |
| EXPECT_TRUE(headers_handler_2.was_proxied()); |
| EXPECT_TRUE(trans_2.GetResponseInfo()->proxy_server.is_quic()); |
| |
| // Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC |
| // proxy socket to disconnect. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Sends a CONNECT request to a QUIC proxy and receive a 500 response. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyConnectFailure) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| false, ConnectRequestHeaders("mail.example.org:443"), |
| &header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, true, |
| GetResponseHeaders("500"))); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndRstPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, 1, 1, 1)); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_EQ(ERR_IO_PENDING, rv); |
| EXPECT_EQ(ERR_TUNNEL_CONNECTION_FAILED, callback.WaitForResult()); |
| EXPECT_EQ(false, headers_handler.was_proxied()); |
| |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Sends a CONNECT request to a QUIC proxy and get a UDP socket read error. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyQuicConnectionError) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| false, ConnectRequestHeaders("mail.example.org:443"), |
| &header_stream_offset)); |
| mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_EQ(ERR_IO_PENDING, rv); |
| EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); |
| |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Sends an HTTP/1.1 request over QUIC proxy tunnel and gets a bad cert from the |
| // host. Retries request and succeeds. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyConnectBadCertificate) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset client_header_stream_offset = 0; |
| quic::QuicStreamOffset server_header_stream_offset = 0; |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket( |
| 1, &client_header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| false, ConnectRequestHeaders("mail.example.org:443"), |
| &client_header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
| GetResponseHeaders("200 OK"), &server_header_stream_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientAckAndRstPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, 1, 1, 1)); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| false, ConnectRequestHeaders("mail.example.org:443"), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &client_header_stream_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| GetResponseHeaders("200 OK"), &server_header_stream_offset)); |
| |
| const char get_request[] = |
| "GET / HTTP/1.1\r\n" |
| "Host: mail.example.org\r\n" |
| "Connection: keep-alive\r\n\r\n"; |
| quic::QuicString header = ConstructDataHeader(SbStringGetLength(get_request)); |
| if (version_ != quic::QUIC_VERSION_99) { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndDataPacket( |
| 5, false, GetNthClientInitiatedBidirectionalStreamId(1), 2, 2, 1, |
| false, 0, quic::QuicStringPiece(get_request))); |
| } else { |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndMultipleDataFramesPacket( |
| 5, false, GetNthClientInitiatedBidirectionalStreamId(1), 2, 2, 1, |
| false, 0, {header, quic::QuicString(get_request)})); |
| } |
| const char get_response[] = |
| "HTTP/1.1 200 OK\r\n" |
| "Content-Length: 10\r\n\r\n"; |
| quic::QuicString header2 = ConstructDataHeader(SbStringGetLength(get_response)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, |
| 0, header2 + quic::QuicString(get_response))); |
| |
| quic::QuicString header3 = ConstructDataHeader(10); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, ConstructServerDataPacket( |
| 4, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| false, SbStringGetLength(get_response) + header2.length(), |
| header3 + quic::QuicString("0123456789"))); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(6, 4, 3, 1)); |
| mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRstPacket(7, GetNthClientInitiatedBidirectionalStreamId(1), |
| quic::QUIC_STREAM_CANCELLED, |
| SbStringGetLength(get_request) + header.length())); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| SSLSocketDataProvider ssl_data_bad_cert(ASYNC, ERR_CERT_AUTHORITY_INVALID); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data_bad_cert); |
| |
| SSLSocketDataProvider ssl_data(ASYNC, OK); |
| socket_factory_.AddSSLSocketDataProvider(&ssl_data); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_EQ(ERR_IO_PENDING, rv); |
| EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, callback.WaitForResult()); |
| |
| rv = trans.RestartIgnoringLastError(callback.callback()); |
| EXPECT_EQ(ERR_IO_PENDING, rv); |
| EXPECT_EQ(OK, callback.WaitForResult()); |
| |
| CheckWasHttpResponse(&trans); |
| CheckResponsePort(&trans, 70); |
| CheckResponseData(&trans, "0123456789"); |
| EXPECT_EQ(true, headers_handler.was_proxied()); |
| EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic()); |
| |
| // Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC |
| // proxy socket to disconnect. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Checks if a request's specified "user-agent" header shows up correctly in the |
| // CONNECT request to a QUIC proxy. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyUserAgent) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| |
| spdy::SpdyHeaderBlock headers = ConnectRequestHeaders("mail.example.org:443"); |
| headers["user-agent"] = "Chromium Ultra Awesome X Edition"; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, |
| false, std::move(headers), &header_stream_offset)); |
| // Return an error, so the transaction stops here (this test isn't interested |
| // in the rest). |
| mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| request_.extra_headers.SetHeader(HttpRequestHeaders::kUserAgent, |
| "Chromium Ultra Awesome X Edition"); |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_EQ(ERR_IO_PENDING, rv); |
| EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); |
| |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Makes sure the CONNECT request packet for a QUIC proxy contains the correct |
| // HTTP/2 stream dependency and weights given the request priority. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyRequestPriority) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| const RequestPriority request_priority = MEDIUM; |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, false, |
| request_priority, ConnectRequestHeaders("mail.example.org:443"), 0, |
| &header_stream_offset)); |
| // Return an error, so the transaction stops here (this test isn't interested |
| // in the rest). |
| mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| HttpNetworkTransaction trans(request_priority, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_EQ(ERR_IO_PENDING, rv); |
| EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); |
| |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| // Makes sure the CONNECT request packet for a QUIC proxy contains the correct |
| // HTTP/2 stream dependency and weights given the request priority. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyMultipleRequestsError) { |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| const RequestPriority kRequestPriority = MEDIUM; |
| const RequestPriority kRequestPriority2 = LOWEST; |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| mock_quic_data.AddWrite( |
| ASYNC, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ERR_FAILED); |
| // This should never be reached. |
| mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED); |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // Second connection attempt just fails - result doesn't really matter. |
| MockQuicData mock_quic_data2; |
| mock_quic_data2.AddConnect(SYNCHRONOUS, ERR_FAILED); |
| mock_quic_data2.AddSocketDataToFactory(&socket_factory_); |
| |
| int original_max_sockets_per_group = |
| ClientSocketPoolManager::max_sockets_per_group( |
| HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL); |
| ClientSocketPoolManager::set_max_sockets_per_group( |
| HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, 1); |
| int original_max_sockets_per_pool = |
| ClientSocketPoolManager::max_sockets_per_pool( |
| HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL); |
| ClientSocketPoolManager::set_max_sockets_per_pool( |
| HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, 1); |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| HttpNetworkTransaction trans(kRequestPriority, session_.get()); |
| TestCompletionCallback callback; |
| int rv = trans.Start(&request_, callback.callback(), net_log_.bound()); |
| EXPECT_EQ(ERR_IO_PENDING, rv); |
| |
| HttpRequestInfo request2; |
| request2.url = GURL("https://mail.example.org/some/other/path/"); |
| request2.traffic_annotation = |
| net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| HttpNetworkTransaction trans2(kRequestPriority2, session_.get()); |
| TestCompletionCallback callback2; |
| int rv2 = trans2.Start(&request2, callback2.callback(), net_log_.bound()); |
| EXPECT_EQ(ERR_IO_PENDING, rv2); |
| |
| EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| |
| EXPECT_EQ(ERR_FAILED, callback2.WaitForResult()); |
| |
| ClientSocketPoolManager::set_max_sockets_per_pool( |
| HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, |
| original_max_sockets_per_pool); |
| ClientSocketPoolManager::set_max_sockets_per_group( |
| HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, |
| original_max_sockets_per_group); |
| } |
| |
| // Test the request-challenge-retry sequence for basic auth, over a QUIC |
| // connection when setting up a QUIC proxy tunnel. |
| TEST_P(QuicNetworkTransactionTest, QuicProxyAuth) { |
| const base::string16 kBaz(base::ASCIIToUTF16("baz")); |
| const base::string16 kFoo(base::ASCIIToUTF16("foo")); |
| const spdy::SpdyPriority default_priority = |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| |
| std::unique_ptr<QuicTestPacketMaker> client_maker; |
| std::unique_ptr<QuicTestPacketMaker> server_maker; |
| |
| // On the second pass, the body read of the auth challenge is synchronous, so |
| // IsConnectedAndIdle returns false. The socket should still be drained and |
| // reused. See http://crbug.com/544255. |
| for (int i = 0; i < 2; ++i) { |
| client_maker.reset(new QuicTestPacketMaker( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, kDefaultServerHostName, quic::Perspective::IS_CLIENT, |
| client_headers_include_h2_stream_dependency_)); |
| server_maker.reset(new QuicTestPacketMaker( |
| version_, quic::QuicUtils::CreateRandomConnectionId(&random_generator_), |
| &clock_, kDefaultServerHostName, quic::Perspective::IS_SERVER, false)); |
| |
| session_params_.enable_quic = true; |
| session_params_.enable_quic_proxies_for_https_urls = true; |
| proxy_resolution_service_ = |
| ProxyResolutionService::CreateFixedFromPacResult( |
| "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset client_header_stream_offset = 0; |
| quic::QuicStreamOffset server_header_stream_offset = 0; |
| quic::QuicStreamOffset client_data_offset = 0; |
| quic::QuicStreamOffset server_data_offset = 0; |
| |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| client_maker->MakeInitialSettingsPacket( |
| 1, &client_header_stream_offset)); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| client_maker->MakeRequestHeadersPacketWithOffsetTracking( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), true, false, |
| default_priority, |
| client_maker->ConnectRequestHeaders("mail.example.org:443"), 0, |
| &client_header_stream_offset)); |
| |
| spdy::SpdyHeaderBlock headers = |
| server_maker->GetResponseHeaders("407 Proxy Authentication Required"); |
| headers["proxy-authenticate"] = "Basic realm=\"MyRealm1\""; |
| headers["content-length"] = "10"; |
| mock_quic_data.AddRead( |
| ASYNC, server_maker->MakeResponseHeadersPacketWithOffsetTracking( |
| 1, GetNthClientInitiatedBidirectionalStreamId(0), false, |
| false, std::move(headers), &server_header_stream_offset)); |
| |
| if (i == 0) { |
| mock_quic_data.AddRead( |
| ASYNC, server_maker->MakeDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), false, |
| false, server_data_offset, "0123456789")); |
| } else { |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, server_maker->MakeDataPacket( |
| 2, GetNthClientInitiatedBidirectionalStreamId(0), |
| false, false, server_data_offset, "0123456789")); |
| } |
| server_data_offset += 10; |
| |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| client_maker->MakeAckPacket(3, 2, 1, 1, true)); |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| client_maker->MakeRstPacket( |
| 4, false, GetNthClientInitiatedBidirectionalStreamId(0), |
| quic::QUIC_STREAM_CANCELLED, client_data_offset, |
| /*include_stop_sending_if_v99=*/true)); |
| |
| headers = client_maker->ConnectRequestHeaders("mail.example.org:443"); |
| headers["proxy-authorization"] = "Basic Zm9vOmJheg=="; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, client_maker->MakeRequestHeadersPacketWithOffsetTracking( |
| 5, GetNthClientInitiatedBidirectionalStreamId(1), |
| false, false, default_priority, std::move(headers), |
| GetNthClientInitiatedBidirectionalStreamId(0), |
| &client_header_stream_offset)); |
| |
| // Response to wrong password |
| headers = |
| server_maker->GetResponseHeaders("407 Proxy Authentication Required"); |
| headers["proxy-authenticate"] = "Basic realm=\"MyRealm1\""; |
| headers["content-length"] = "10"; |
| mock_quic_data.AddRead( |
| ASYNC, server_maker->MakeResponseHeadersPacketWithOffsetTracking( |
| 3, GetNthClientInitiatedBidirectionalStreamId(1), false, |
| false, std::move(headers), &server_header_stream_offset)); |
| mock_quic_data.AddRead(SYNCHRONOUS, |
| ERR_IO_PENDING); // No more data to read |
| |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| client_maker->MakeAckAndRstPacket( |
| 6, false, GetNthClientInitiatedBidirectionalStreamId(1), |
| quic::QUIC_STREAM_CANCELLED, 3, 3, 1, true)); |
| |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| mock_quic_data.GetSequencedSocketData()->set_busy_before_sync_reads(true); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/"); |
| // Ensure that proxy authentication is attempted even |
| // when the no authentication data flag is set. |
| request_.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; |
| { |
| HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| HeadersHandler headers_handler; |
| trans.SetBeforeHeadersSentCallback( |
| base::BindRepeating(&HeadersHandler::OnBeforeHeadersSent, |
| base::Unretained(&headers_handler))); |
| RunTransaction(&trans); |
| |
| const HttpResponseInfo* response = trans.GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| ASSERT_TRUE(response->headers.get() != nullptr); |
| EXPECT_EQ("HTTP/1.1 407 Proxy Authentication Required", |
| response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->headers->IsKeepAlive()); |
| EXPECT_EQ(407, response->headers->response_code()); |
| EXPECT_EQ(10, response->headers->GetContentLength()); |
| EXPECT_EQ(HttpVersion(1, 1), response->headers->GetHttpVersion()); |
| const AuthChallengeInfo* auth_challenge = response->auth_challenge.get(); |
| ASSERT_TRUE(auth_challenge != nullptr); |
| EXPECT_TRUE(auth_challenge->is_proxy); |
| EXPECT_EQ("https://proxy.example.org:70", |
| auth_challenge->challenger.Serialize()); |
| EXPECT_EQ("MyRealm1", auth_challenge->realm); |
| EXPECT_EQ("basic", auth_challenge->scheme); |
| |
| TestCompletionCallback callback; |
| int rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBaz), |
| callback.callback()); |
| EXPECT_EQ(ERR_IO_PENDING, rv); |
| EXPECT_EQ(OK, callback.WaitForResult()); |
| |
| response = trans.GetResponseInfo(); |
| ASSERT_TRUE(response != nullptr); |
| ASSERT_TRUE(response->headers.get() != nullptr); |
| EXPECT_EQ("HTTP/1.1 407 Proxy Authentication Required", |
| response->headers->GetStatusLine()); |
| EXPECT_TRUE(response->headers->IsKeepAlive()); |
| EXPECT_EQ(407, response->headers->response_code()); |
| EXPECT_EQ(10, response->headers->GetContentLength()); |
| EXPECT_EQ(HttpVersion(1, 1), response->headers->GetHttpVersion()); |
| auth_challenge = response->auth_challenge.get(); |
| ASSERT_TRUE(auth_challenge != nullptr); |
| EXPECT_TRUE(auth_challenge->is_proxy); |
| EXPECT_EQ("https://proxy.example.org:70", |
| auth_challenge->challenger.Serialize()); |
| EXPECT_EQ("MyRealm1", auth_challenge->realm); |
| EXPECT_EQ("basic", auth_challenge->scheme); |
| } |
| // HttpNetworkTransaction is torn down now that it's out of scope, causing |
| // the QUIC stream to be cleaned up (since the proxy socket cannot be |
| // reused because it's not connected). |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| } |
| #endif // COBALT_QUIC46 |
| |
| TEST_P(QuicNetworkTransactionTest, QuicServerPushUpdatesPriority) { |
| // Only run this test if HTTP/2 stream dependency info is sent by client (sent |
| // in HEADERS frames for requests and PRIORITY frames). |
| if (version_ < quic::QUIC_VERSION_43 || |
| !client_headers_include_h2_stream_dependency_) { |
| return; |
| } |
| |
| session_params_.origins_to_force_quic_on.insert( |
| HostPortPair::FromString("mail.example.org:443")); |
| |
| const quic::QuicStreamId client_stream_0 = |
| GetNthClientInitiatedBidirectionalStreamId(0); |
| const quic::QuicStreamId client_stream_1 = |
| GetNthClientInitiatedBidirectionalStreamId(1); |
| const quic::QuicStreamId client_stream_2 = |
| GetNthClientInitiatedBidirectionalStreamId(2); |
| const quic::QuicStreamId push_stream_0 = |
| GetNthServerInitiatedUnidirectionalStreamId(0); |
| const quic::QuicStreamId push_stream_1 = |
| GetNthServerInitiatedUnidirectionalStreamId(1); |
| |
| MockQuicData mock_quic_data; |
| quic::QuicStreamOffset header_stream_offset = 0; |
| quic::QuicStreamOffset server_header_offset = 0; |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, ConstructInitialSettingsPacket(1, &header_stream_offset)); |
| |
| // Client sends "GET" requests for "/0.png", "/1.png", "/2.png". |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 2, client_stream_0, true, true, HIGHEST, |
| GetRequestHeaders("GET", "https", "/0.jpg"), 0, |
| &header_stream_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 3, client_stream_1, true, true, MEDIUM, |
| GetRequestHeaders("GET", "https", "/1.jpg"), |
| client_stream_0, &header_stream_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, |
| ConstructClientRequestHeadersPacket( |
| 4, client_stream_2, true, true, MEDIUM, |
| GetRequestHeaders("GET", "https", "/2.jpg"), |
| client_stream_1, &header_stream_offset)); |
| |
| // Server replies "OK" for the three requests. |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 1, client_stream_0, false, false, GetResponseHeaders("200 OK"), |
| &server_header_offset)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 2, client_stream_1, false, false, GetResponseHeaders("200 OK"), |
| &server_header_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(5, 2, 1, 1)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 3, client_stream_2, false, false, GetResponseHeaders("200 OK"), |
| &server_header_offset)); |
| |
| // Server sends two push promises associated with |client_stream_0|; client |
| // responds with a PRIORITY frame after each to notify server of HTTP/2 stream |
| // dependency info for each push promise stream. |
| mock_quic_data.AddRead(ASYNC, |
| ConstructServerPushPromisePacket( |
| 4, client_stream_0, push_stream_0, false, |
| GetRequestHeaders("GET", "https", "/pushed_0.jpg"), |
| &server_header_offset, &server_maker_)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndPriorityFramesPacket( |
| 6, false, 4, 3, 1, |
| {{push_stream_0, client_stream_2, |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY)}}, |
| &header_stream_offset)); |
| mock_quic_data.AddRead(ASYNC, |
| ConstructServerPushPromisePacket( |
| 5, client_stream_0, push_stream_1, false, |
| GetRequestHeaders("GET", "https", "/pushed_1.jpg"), |
| &server_header_offset, &server_maker_)); |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientPriorityPacket(7, false, push_stream_1, push_stream_0, |
| DEFAULT_PRIORITY, &header_stream_offset)); |
| |
| // Server sends the response headers for the two push promises. |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 6, push_stream_0, false, false, GetResponseHeaders("200 OK"), |
| &server_header_offset)); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(8, 6, 5, 1)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerResponseHeadersPacket( |
| 7, push_stream_1, false, false, GetResponseHeaders("200 OK"), |
| &server_header_offset)); |
| |
| // Request for "pushed_0.jpg" matches |push_stream_0|. |push_stream_0|'s |
| // priority updates to match the request's priority. Client sends PRIORITY |
| // frames to inform server of new HTTP/2 stream dependencies. |
| mock_quic_data.AddWrite( |
| SYNCHRONOUS, |
| ConstructClientAckAndPriorityFramesPacket( |
| 9, false, 7, 7, 1, |
| {{push_stream_1, client_stream_2, |
| ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY)}, |
| {push_stream_0, client_stream_0, |
| ConvertRequestPriorityToQuicPriority(HIGHEST)}}, |
| &header_stream_offset)); |
| |
| // Server sends data for the three requests and the two push promises. |
| quic::QuicString header = ConstructDataHeader(8); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket(8, client_stream_0, false, true, 0, |
| header + "hello 0!")); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, ConstructServerDataPacket(9, client_stream_1, false, true, 0, |
| header + "hello 1!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(10, 9, 8, 1)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket(10, client_stream_2, false, true, 0, |
| header + "hello 2!")); |
| quic::QuicString header2 = ConstructDataHeader(12); |
| mock_quic_data.AddRead( |
| SYNCHRONOUS, ConstructServerDataPacket(11, push_stream_0, false, true, 0, |
| header2 + "and hello 0!")); |
| mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(11, 11, 10, 1)); |
| mock_quic_data.AddRead( |
| ASYNC, ConstructServerDataPacket(12, push_stream_1, false, true, 0, |
| header2 + "and hello 1!")); |
| |
| mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| mock_quic_data.AddRead(ASYNC, 0); // EOF |
| mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| |
| // The non-alternate protocol job needs to hang in order to guarantee that |
| // the alternate-protocol job will "win". |
| AddHangingNonAlternateProtocolSocketData(); |
| |
| CreateSession(); |
| |
| request_.url = GURL("https://mail.example.org/0.jpg"); |
| HttpNetworkTransaction trans_0(HIGHEST, session_.get()); |
| TestCompletionCallback callback_0; |
| EXPECT_EQ(ERR_IO_PENDING, |
| trans_0.Start(&request_, callback_0.callback(), net_log_.bound())); |
| base::RunLoop().RunUntilIdle(); |
| |
| request_.url = GURL("https://mail.example.org/1.jpg"); |
| HttpNetworkTransaction trans_1(MEDIUM, session_.get()); |
| TestCompletionCallback callback_1; |
| EXPECT_EQ(ERR_IO_PENDING, |
| trans_1.Start(&request_, callback_1.callback(), net_log_.bound())); |
| base::RunLoop().RunUntilIdle(); |
| |
| request_.url = GURL("https://mail.example.org/2.jpg"); |
| HttpNetworkTransaction trans_2(MEDIUM, session_.get()); |
| TestCompletionCallback callback_2; |
| EXPECT_EQ(ERR_IO_PENDING, |
| trans_2.Start(&request_, callback_2.callback(), net_log_.bound())); |
| base::RunLoop().RunUntilIdle(); |
| |
| // Client makes request that matches resource pushed in |pushed_stream_0|. |
| request_.url = GURL("https://mail.example.org/pushed_0.jpg"); |
| HttpNetworkTransaction trans_3(HIGHEST, session_.get()); |
| TestCompletionCallback callback_3; |
| EXPECT_EQ(ERR_IO_PENDING, |
| trans_3.Start(&request_, callback_3.callback(), net_log_.bound())); |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_TRUE(callback_0.have_result()); |
| EXPECT_EQ(OK, callback_0.WaitForResult()); |
| EXPECT_TRUE(callback_1.have_result()); |
| EXPECT_EQ(OK, callback_1.WaitForResult()); |
| EXPECT_TRUE(callback_2.have_result()); |
| EXPECT_EQ(OK, callback_2.WaitForResult()); |
| |
| CheckResponseData(&trans_0, "hello 0!"); // Closes stream 5 |
| CheckResponseData(&trans_1, "hello 1!"); // Closes stream 7 |
| CheckResponseData(&trans_2, "hello 2!"); // Closes strema 9 |
| CheckResponseData(&trans_3, "and hello 0!"); // Closes stream 2, sends RST |
| |
| mock_quic_data.Resume(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); |
| EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); |
| } |
| |
| } // namespace test |
| } // namespace net |