blob: b5905e70980020dcc7a2afd8627c2d4fb55eee02 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "quic/core/http/quic_spdy_stream.h"
#include <cstring>
#include <memory>
#include <string>
#include <utility>
#include "absl/base/macros.h"
#include "absl/memory/memory.h"
#include "absl/strings/escaping.h"
#include "absl/strings/str_cat.h"
#include "absl/strings/string_view.h"
#include "quic/core/crypto/null_encrypter.h"
#include "quic/core/http/http_encoder.h"
#include "quic/core/http/quic_spdy_session.h"
#include "quic/core/http/spdy_utils.h"
#include "quic/core/http/web_transport_http3.h"
#include "quic/core/quic_connection.h"
#include "quic/core/quic_simple_buffer_allocator.h"
#include "quic/core/quic_stream_sequencer_buffer.h"
#include "quic/core/quic_utils.h"
#include "quic/core/quic_versions.h"
#include "quic/core/quic_write_blocked_list.h"
#include "quic/platform/api/quic_expect_bug.h"
#include "quic/platform/api/quic_test.h"
#include "quic/test_tools/qpack/qpack_test_utils.h"
#include "quic/test_tools/quic_config_peer.h"
#include "quic/test_tools/quic_connection_peer.h"
#include "quic/test_tools/quic_flow_controller_peer.h"
#include "quic/test_tools/quic_session_peer.h"
#include "quic/test_tools/quic_spdy_session_peer.h"
#include "quic/test_tools/quic_spdy_stream_peer.h"
#include "quic/test_tools/quic_stream_peer.h"
#include "quic/test_tools/quic_test_utils.h"
using spdy::kV3HighestPriority;
using spdy::kV3LowestPriority;
using spdy::SpdyHeaderBlock;
using spdy::SpdyPriority;
using testing::_;
using testing::AnyNumber;
using testing::AtLeast;
using testing::DoAll;
using testing::ElementsAre;
using testing::Invoke;
using testing::InvokeWithoutArgs;
using testing::MatchesRegex;
using testing::Pair;
using testing::Return;
using testing::SaveArg;
using testing::StrictMock;
namespace quic {
namespace test {
namespace {
const bool kShouldProcessData = true;
const char kDataFramePayload[] = "some data";
class TestCryptoStream : public QuicCryptoStream, public QuicCryptoHandshaker {
public:
explicit TestCryptoStream(QuicSession* session)
: QuicCryptoStream(session),
QuicCryptoHandshaker(this, session),
encryption_established_(false),
one_rtt_keys_available_(false),
params_(new QuicCryptoNegotiatedParameters) {
// Simulate a negotiated cipher_suite with a fake value.
params_->cipher_suite = 1;
}
void OnHandshakeMessage(const CryptoHandshakeMessage& /*message*/) override {
encryption_established_ = true;
one_rtt_keys_available_ = true;
QuicErrorCode error;
std::string error_details;
session()->config()->SetInitialStreamFlowControlWindowToSend(
kInitialStreamFlowControlWindowForTest);
session()->config()->SetInitialSessionFlowControlWindowToSend(
kInitialSessionFlowControlWindowForTest);
if (session()->version().UsesTls()) {
if (session()->perspective() == Perspective::IS_CLIENT) {
session()->config()->SetOriginalConnectionIdToSend(
session()->connection()->connection_id());
session()->config()->SetInitialSourceConnectionIdToSend(
session()->connection()->connection_id());
} else {
session()->config()->SetInitialSourceConnectionIdToSend(
session()->connection()->client_connection_id());
}
TransportParameters transport_parameters;
EXPECT_TRUE(
session()->config()->FillTransportParameters(&transport_parameters));
error = session()->config()->ProcessTransportParameters(
transport_parameters, /* is_resumption = */ false, &error_details);
} else {
CryptoHandshakeMessage msg;
session()->config()->ToHandshakeMessage(&msg, transport_version());
error =
session()->config()->ProcessPeerHello(msg, CLIENT, &error_details);
}
EXPECT_THAT(error, IsQuicNoError());
session()->OnNewEncryptionKeyAvailable(
ENCRYPTION_FORWARD_SECURE,
std::make_unique<NullEncrypter>(session()->perspective()));
session()->OnConfigNegotiated();
if (session()->version().UsesTls()) {
session()->OnTlsHandshakeComplete();
} else {
session()->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
}
if (session()->version().UsesTls()) {
// HANDSHAKE_DONE frame.
EXPECT_CALL(*this, HasPendingRetransmission());
}
session()->DiscardOldEncryptionKey(ENCRYPTION_INITIAL);
}
// QuicCryptoStream implementation
ssl_early_data_reason_t EarlyDataReason() const override {
return ssl_early_data_unknown;
}
bool encryption_established() const override {
return encryption_established_;
}
bool one_rtt_keys_available() const override {
return one_rtt_keys_available_;
}
HandshakeState GetHandshakeState() const override {
return one_rtt_keys_available() ? HANDSHAKE_COMPLETE : HANDSHAKE_START;
}
void SetServerApplicationStateForResumption(
std::unique_ptr<ApplicationState> /*application_state*/) override {}
bool KeyUpdateSupportedLocally() const override { return true; }
std::unique_ptr<QuicDecrypter> AdvanceKeysAndCreateCurrentOneRttDecrypter()
override {
return nullptr;
}
std::unique_ptr<QuicEncrypter> CreateCurrentOneRttEncrypter() override {
return nullptr;
}
const QuicCryptoNegotiatedParameters& crypto_negotiated_params()
const override {
return *params_;
}
CryptoMessageParser* crypto_message_parser() override {
return QuicCryptoHandshaker::crypto_message_parser();
}
void OnPacketDecrypted(EncryptionLevel /*level*/) override {}
void OnOneRttPacketAcknowledged() override {}
void OnHandshakePacketSent() override {}
void OnConnectionClosed(QuicErrorCode /*error*/,
ConnectionCloseSource /*source*/) override {}
void OnHandshakeDoneReceived() override {}
void OnNewTokenReceived(absl::string_view /*token*/) override {}
std::string GetAddressToken() const override { return ""; }
bool ValidateAddressToken(absl::string_view /*token*/) const override {
return true;
}
MOCK_METHOD(void, OnCanWrite, (), (override));
bool HasPendingCryptoRetransmission() const override { return false; }
MOCK_METHOD(bool, HasPendingRetransmission, (), (const, override));
bool ExportKeyingMaterial(absl::string_view /*label*/,
absl::string_view /*context*/,
size_t /*result_len*/,
std::string* /*result*/) override {
return false;
}
SSL* GetSsl() const override { return nullptr; }
private:
using QuicCryptoStream::session;
bool encryption_established_;
bool one_rtt_keys_available_;
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> params_;
};
class TestStream : public QuicSpdyStream {
public:
TestStream(QuicStreamId id, QuicSpdySession* session,
bool should_process_data)
: QuicSpdyStream(id, session, BIDIRECTIONAL),
should_process_data_(should_process_data),
headers_payload_length_(0) {}
~TestStream() override = default;
using QuicSpdyStream::set_ack_listener;
using QuicStream::CloseWriteSide;
using QuicStream::WriteOrBufferData;
void OnBodyAvailable() override {
if (!should_process_data_) {
return;
}
char buffer[2048];
struct iovec vec;
vec.iov_base = buffer;
vec.iov_len = ABSL_ARRAYSIZE(buffer);
size_t bytes_read = Readv(&vec, 1);
data_ += std::string(buffer, bytes_read);
}
MOCK_METHOD(void, WriteHeadersMock, (bool fin), ());
size_t WriteHeadersImpl(spdy::SpdyHeaderBlock header_block, bool fin,
QuicReferenceCountedPointer<QuicAckListenerInterface>
/*ack_listener*/) override {
saved_headers_ = std::move(header_block);
WriteHeadersMock(fin);
if (VersionUsesHttp3(transport_version())) {
// In this case, call QuicSpdyStream::WriteHeadersImpl() that does the
// actual work of closing the stream.
return QuicSpdyStream::WriteHeadersImpl(saved_headers_.Clone(), fin,
nullptr);
}
return 0;
}
const std::string& data() const { return data_; }
const spdy::SpdyHeaderBlock& saved_headers() const { return saved_headers_; }
// Expose protected accessor.
const QuicStreamSequencer* sequencer() const {
return QuicStream::sequencer();
}
void OnStreamHeaderList(bool fin, size_t frame_len,
const QuicHeaderList& header_list) override {
headers_payload_length_ = frame_len;
QuicSpdyStream::OnStreamHeaderList(fin, frame_len, header_list);
}
size_t headers_payload_length() const { return headers_payload_length_; }
private:
bool should_process_data_;
spdy::SpdyHeaderBlock saved_headers_;
std::string data_;
size_t headers_payload_length_;
};
class TestSession : public MockQuicSpdySession {
public:
explicit TestSession(QuicConnection* connection)
: MockQuicSpdySession(connection, /*create_mock_crypto_stream=*/false),
crypto_stream_(this) {}
TestCryptoStream* GetMutableCryptoStream() override {
return &crypto_stream_;
}
const TestCryptoStream* GetCryptoStream() const override {
return &crypto_stream_;
}
bool ShouldNegotiateWebTransport() override { return enable_webtransport_; }
void EnableWebTransport() { enable_webtransport_ = true; }
HttpDatagramSupport LocalHttpDatagramSupport() override {
return local_http_datagram_support_;
}
void set_local_http_datagram_support(HttpDatagramSupport value) {
local_http_datagram_support_ = value;
}
private:
bool enable_webtransport_ = false;
HttpDatagramSupport local_http_datagram_support_ = HttpDatagramSupport::kNone;
StrictMock<TestCryptoStream> crypto_stream_;
};
class TestMockUpdateStreamSession : public MockQuicSpdySession {
public:
explicit TestMockUpdateStreamSession(QuicConnection* connection)
: MockQuicSpdySession(connection),
expected_precedence_(
spdy::SpdyStreamPrecedence(QuicStream::kDefaultPriority)) {}
void UpdateStreamPriority(
QuicStreamId id, const spdy::SpdyStreamPrecedence& precedence) override {
EXPECT_EQ(id, expected_stream_->id());
EXPECT_EQ(expected_precedence_, precedence);
EXPECT_EQ(expected_precedence_, expected_stream_->precedence());
}
void SetExpectedStream(QuicSpdyStream* stream) { expected_stream_ = stream; }
void SetExpectedPriority(const spdy::SpdyStreamPrecedence& precedence) {
expected_precedence_ = precedence;
}
private:
QuicSpdyStream* expected_stream_;
spdy::SpdyStreamPrecedence expected_precedence_;
};
class QuicSpdyStreamTest : public QuicTestWithParam<ParsedQuicVersion> {
protected:
QuicSpdyStreamTest() {
headers_[":host"] = "www.google.com";
headers_[":path"] = "/index.hml";
headers_[":scheme"] = "https";
headers_["cookie"] =
"__utma=208381060.1228362404.1372200928.1372200928.1372200928.1; "
"__utmc=160408618; "
"GX=DQAAAOEAAACWJYdewdE9rIrW6qw3PtVi2-d729qaa-74KqOsM1NVQblK4VhX"
"hoALMsy6HOdDad2Sz0flUByv7etmo3mLMidGrBoljqO9hSVA40SLqpG_iuKKSHX"
"RW3Np4bq0F0SDGDNsW0DSmTS9ufMRrlpARJDS7qAI6M3bghqJp4eABKZiRqebHT"
"pMU-RXvTI5D5oCF1vYxYofH_l1Kviuiy3oQ1kS1enqWgbhJ2t61_SNdv-1XJIS0"
"O3YeHLmVCs62O6zp89QwakfAWK9d3IDQvVSJzCQsvxvNIvaZFa567MawWlXg0Rh"
"1zFMi5vzcns38-8_Sns; "
"GA=v*2%2Fmem*57968640*47239936%2Fmem*57968640*47114716%2Fno-nm-"
"yj*15%2Fno-cc-yj*5%2Fpc-ch*133685%2Fpc-s-cr*133947%2Fpc-s-t*1339"
"47%2Fno-nm-yj*4%2Fno-cc-yj*1%2Fceft-as*1%2Fceft-nqas*0%2Fad-ra-c"
"v_p%2Fad-nr-cv_p-f*1%2Fad-v-cv_p*859%2Fad-ns-cv_p-f*1%2Ffn-v-ad%"
"2Fpc-t*250%2Fpc-cm*461%2Fpc-s-cr*722%2Fpc-s-t*722%2Fau_p*4"
"SICAID=AJKiYcHdKgxum7KMXG0ei2t1-W4OD1uW-ecNsCqC0wDuAXiDGIcT_HA2o1"
"3Rs1UKCuBAF9g8rWNOFbxt8PSNSHFuIhOo2t6bJAVpCsMU5Laa6lewuTMYI8MzdQP"
"ARHKyW-koxuhMZHUnGBJAM1gJODe0cATO_KGoX4pbbFxxJ5IicRxOrWK_5rU3cdy6"
"edlR9FsEdH6iujMcHkbE5l18ehJDwTWmBKBzVD87naobhMMrF6VvnDGxQVGp9Ir_b"
"Rgj3RWUoPumQVCxtSOBdX0GlJOEcDTNCzQIm9BSfetog_eP_TfYubKudt5eMsXmN6"
"QnyXHeGeK2UINUzJ-D30AFcpqYgH9_1BvYSpi7fc7_ydBU8TaD8ZRxvtnzXqj0RfG"
"tuHghmv3aD-uzSYJ75XDdzKdizZ86IG6Fbn1XFhYZM-fbHhm3mVEXnyRW4ZuNOLFk"
"Fas6LMcVC6Q8QLlHYbXBpdNFuGbuZGUnav5C-2I_-46lL0NGg3GewxGKGHvHEfoyn"
"EFFlEYHsBQ98rXImL8ySDycdLEFvBPdtctPmWCfTxwmoSMLHU2SCVDhbqMWU5b0yr"
"JBCScs_ejbKaqBDoB7ZGxTvqlrB__2ZmnHHjCr8RgMRtKNtIeuZAo ";
}
~QuicSpdyStreamTest() override = default;
// Return QPACK-encoded header block without using the dynamic table.
std::string EncodeQpackHeaders(
std::vector<std::pair<absl::string_view, absl::string_view>> headers) {
SpdyHeaderBlock header_block;
for (const auto& header_field : headers) {
header_block.AppendValueOrAddHeader(header_field.first,
header_field.second);
}
return EncodeQpackHeaders(header_block);
}
// Return QPACK-encoded header block without using the dynamic table.
std::string EncodeQpackHeaders(const SpdyHeaderBlock& header) {
NoopQpackStreamSenderDelegate encoder_stream_sender_delegate;
auto qpack_encoder = std::make_unique<QpackEncoder>(session_.get());
qpack_encoder->set_qpack_stream_sender_delegate(
&encoder_stream_sender_delegate);
// QpackEncoder does not use the dynamic table by default,
// therefore the value of |stream_id| does not matter.
return qpack_encoder->EncodeHeaderList(/* stream_id = */ 0, header,
nullptr);
}
void Initialize(bool stream_should_process_data) {
InitializeWithPerspective(stream_should_process_data,
Perspective::IS_SERVER);
}
void InitializeWithPerspective(bool stream_should_process_data,
Perspective perspective) {
connection_ = new StrictMock<MockQuicConnection>(
&helper_, &alarm_factory_, perspective, SupportedVersions(GetParam()));
session_ = std::make_unique<StrictMock<TestSession>>(connection_);
EXPECT_CALL(*session_, OnCongestionWindowChange(_)).Times(AnyNumber());
session_->Initialize();
if (connection_->version().SupportsAntiAmplificationLimit()) {
QuicConnectionPeer::SetAddressValidated(connection_);
}
connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
ON_CALL(*session_, WritevData(_, _, _, _, _, _))
.WillByDefault(
Invoke(session_.get(), &MockQuicSpdySession::ConsumeData));
stream_ =
new StrictMock<TestStream>(GetNthClientInitiatedBidirectionalId(0),
session_.get(), stream_should_process_data);
session_->ActivateStream(absl::WrapUnique(stream_));
stream2_ =
new StrictMock<TestStream>(GetNthClientInitiatedBidirectionalId(1),
session_.get(), stream_should_process_data);
session_->ActivateStream(absl::WrapUnique(stream2_));
QuicConfigPeer::SetReceivedInitialSessionFlowControlWindow(
session_->config(), kMinimumFlowControlSendWindow);
QuicConfigPeer::SetReceivedInitialMaxStreamDataBytesUnidirectional(
session_->config(), kMinimumFlowControlSendWindow);
QuicConfigPeer::SetReceivedInitialMaxStreamDataBytesIncomingBidirectional(
session_->config(), kMinimumFlowControlSendWindow);
QuicConfigPeer::SetReceivedInitialMaxStreamDataBytesOutgoingBidirectional(
session_->config(), kMinimumFlowControlSendWindow);
QuicConfigPeer::SetReceivedMaxUnidirectionalStreams(session_->config(), 10);
session_->OnConfigNegotiated();
if (UsesHttp3()) {
// The control stream will write the stream type, a greased frame, and
// SETTINGS frame.
int num_control_stream_writes = 3;
auto send_control_stream =
QuicSpdySessionPeer::GetSendControlStream(session_.get());
EXPECT_CALL(*session_,
WritevData(send_control_stream->id(), _, _, _, _, _))
.Times(num_control_stream_writes);
}
TestCryptoStream* crypto_stream = session_->GetMutableCryptoStream();
EXPECT_CALL(*crypto_stream, HasPendingRetransmission()).Times(AnyNumber());
if (connection_->version().UsesTls() &&
session_->perspective() == Perspective::IS_SERVER) {
// HANDSHAKE_DONE frame.
EXPECT_CALL(*connection_, SendControlFrame(_))
.WillOnce(Invoke(&ClearControlFrame));
}
CryptoHandshakeMessage message;
session_->GetMutableCryptoStream()->OnHandshakeMessage(message);
}
QuicHeaderList ProcessHeaders(bool fin, const SpdyHeaderBlock& headers) {
QuicHeaderList h = AsHeaderList(headers);
stream_->OnStreamHeaderList(fin, h.uncompressed_header_bytes(), h);
return h;
}
QuicStreamId GetNthClientInitiatedBidirectionalId(int n) {
return GetNthClientInitiatedBidirectionalStreamId(
connection_->transport_version(), n);
}
bool UsesHttp3() const {
return VersionUsesHttp3(GetParam().transport_version);
}
// Construct HEADERS frame with QPACK-encoded |headers| without using the
// dynamic table.
std::string HeadersFrame(
std::vector<std::pair<absl::string_view, absl::string_view>> headers) {
return HeadersFrame(EncodeQpackHeaders(headers));
}
// Construct HEADERS frame with QPACK-encoded |headers| without using the
// dynamic table.
std::string HeadersFrame(const SpdyHeaderBlock& headers) {
return HeadersFrame(EncodeQpackHeaders(headers));
}
// Construct HEADERS frame with given payload.
std::string HeadersFrame(absl::string_view payload) {
std::unique_ptr<char[]> headers_buffer;
QuicByteCount headers_frame_header_length =
HttpEncoder::SerializeHeadersFrameHeader(payload.length(),
&headers_buffer);
absl::string_view headers_frame_header(headers_buffer.get(),
headers_frame_header_length);
return absl::StrCat(headers_frame_header, payload);
}
std::string DataFrame(absl::string_view payload) {
QuicBuffer header = HttpEncoder::SerializeDataFrameHeader(
payload.length(), SimpleBufferAllocator::Get());
return absl::StrCat(header.AsStringView(), payload);
}
std::string UnknownFrame(uint64_t frame_type, absl::string_view payload) {
std::string frame;
const size_t length = QuicDataWriter::GetVarInt62Len(frame_type) +
QuicDataWriter::GetVarInt62Len(payload.size()) +
payload.size();
frame.resize(length);
QuicDataWriter writer(length, const_cast<char*>(frame.data()));
writer.WriteVarInt62(frame_type);
writer.WriteStringPieceVarInt62(payload);
// Even though integers can be encoded with different lengths,
// QuicDataWriter is expected to produce an encoding in Write*() of length
// promised in GetVarInt62Len().
QUICHE_DCHECK_EQ(length, writer.length());
return frame;
}
MockQuicConnectionHelper helper_;
MockAlarmFactory alarm_factory_;
MockQuicConnection* connection_;
std::unique_ptr<TestSession> session_;
// Owned by the |session_|.
TestStream* stream_;
TestStream* stream2_;
SpdyHeaderBlock headers_;
};
INSTANTIATE_TEST_SUITE_P(Tests, QuicSpdyStreamTest,
::testing::ValuesIn(AllSupportedVersions()),
::testing::PrintToStringParamName());
TEST_P(QuicSpdyStreamTest, ProcessHeaderList) {
Initialize(kShouldProcessData);
stream_->OnStreamHeadersPriority(
spdy::SpdyStreamPrecedence(kV3HighestPriority));
ProcessHeaders(false, headers_);
EXPECT_EQ("", stream_->data());
EXPECT_FALSE(stream_->header_list().empty());
EXPECT_FALSE(stream_->IsDoneReading());
}
TEST_P(QuicSpdyStreamTest, ProcessTooLargeHeaderList) {
Initialize(kShouldProcessData);
if (!UsesHttp3()) {
QuicHeaderList headers;
stream_->OnStreamHeadersPriority(
spdy::SpdyStreamPrecedence(kV3HighestPriority));
EXPECT_CALL(
*session_,
MaybeSendRstStreamFrame(
stream_->id(),
QuicResetStreamError::FromInternal(QUIC_HEADERS_TOO_LARGE), 0));
stream_->OnStreamHeaderList(false, 1 << 20, headers);
EXPECT_THAT(stream_->stream_error(), IsStreamError(QUIC_HEADERS_TOO_LARGE));
return;
}
// Header list size includes 32 bytes for overhead per header field.
session_->set_max_inbound_header_list_size(40);
std::string headers =
HeadersFrame({std::make_pair("foo", "too long headers")});
QuicStreamFrame frame(stream_->id(), false, 0, headers);
EXPECT_CALL(*session_, MaybeSendStopSendingFrame(
stream_->id(), QuicResetStreamError::FromInternal(
QUIC_HEADERS_TOO_LARGE)));
EXPECT_CALL(
*session_,
MaybeSendRstStreamFrame(
stream_->id(),
QuicResetStreamError::FromInternal(QUIC_HEADERS_TOO_LARGE), 0));
auto qpack_decoder_stream =
QuicSpdySessionPeer::GetQpackDecoderSendStream(session_.get());
// Stream type and stream cancellation.
EXPECT_CALL(*session_,
WritevData(qpack_decoder_stream->id(), _, _, NO_FIN, _, _))
.Times(2);
stream_->OnStreamFrame(frame);
EXPECT_THAT(stream_->stream_error(), IsStreamError(QUIC_HEADERS_TOO_LARGE));
}
TEST_P(QuicSpdyStreamTest, QpackProcessLargeHeaderListDiscountOverhead) {
if (!UsesHttp3()) {
return;
}
// Setting this flag to false causes no per-entry overhead to be included
// in the header size.
SetQuicFlag(FLAGS_quic_header_size_limit_includes_overhead, false);
Initialize(kShouldProcessData);
session_->set_max_inbound_header_list_size(40);
std::string headers =
HeadersFrame({std::make_pair("foo", "too long headers")});
QuicStreamFrame frame(stream_->id(), false, 0, headers);
stream_->OnStreamFrame(frame);
EXPECT_THAT(stream_->stream_error(), IsStreamError(QUIC_STREAM_NO_ERROR));
}
TEST_P(QuicSpdyStreamTest, ProcessHeaderListWithFin) {
Initialize(kShouldProcessData);
size_t total_bytes = 0;
QuicHeaderList headers;
for (auto p : headers_) {
headers.OnHeader(p.first, p.second);
total_bytes += p.first.size() + p.second.size();
}
stream_->OnStreamHeadersPriority(
spdy::SpdyStreamPrecedence(kV3HighestPriority));
stream_->OnStreamHeaderList(true, total_bytes, headers);
EXPECT_EQ("", stream_->data());
EXPECT_FALSE(stream_->header_list().empty());
EXPECT_FALSE(stream_->IsDoneReading());
EXPECT_TRUE(stream_->HasReceivedFinalOffset());
}
// A valid status code should be 3-digit integer. The first digit should be in
// the range of [1, 5]. All the others are invalid.
TEST_P(QuicSpdyStreamTest, ParseHeaderStatusCode) {
Initialize(kShouldProcessData);
int status_code = 0;
// Valid status codes.
headers_[":status"] = "404";
EXPECT_TRUE(stream_->ParseHeaderStatusCode(headers_, &status_code));
EXPECT_EQ(404, status_code);
headers_[":status"] = "100";
EXPECT_TRUE(stream_->ParseHeaderStatusCode(headers_, &status_code));
EXPECT_EQ(100, status_code);
headers_[":status"] = "599";
EXPECT_TRUE(stream_->ParseHeaderStatusCode(headers_, &status_code));
EXPECT_EQ(599, status_code);
// Invalid status codes.
headers_[":status"] = "010";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = "600";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = "200 ok";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = "2000";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = "+200";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = "+20";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = "-10";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = "-100";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
// Leading or trailing spaces are also invalid.
headers_[":status"] = " 200";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = "200 ";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = " 200 ";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
headers_[":status"] = " ";
EXPECT_FALSE(stream_->ParseHeaderStatusCode(headers_, &status_code));
}
TEST_P(QuicSpdyStreamTest, MarkHeadersConsumed) {
Initialize(kShouldProcessData);
std::string body = "this is the body";
QuicHeaderList headers = ProcessHeaders(false, headers_);
EXPECT_EQ(headers, stream_->header_list());
stream_->ConsumeHeaderList();
EXPECT_EQ(QuicHeaderList(), stream_->header_list());
}
TEST_P(QuicSpdyStreamTest, ProcessWrongFramesOnSpdyStream) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
testing::InSequence s;
connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
GoAwayFrame goaway;
goaway.id = 0x1;
std::unique_ptr<char[]> buffer;
QuicByteCount header_length =
HttpEncoder::SerializeGoAwayFrame(goaway, &buffer);
std::string data = std::string(buffer.get(), header_length);
EXPECT_EQ("", stream_->data());
QuicHeaderList headers = ProcessHeaders(false, headers_);
EXPECT_EQ(headers, stream_->header_list());
stream_->ConsumeHeaderList();
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
EXPECT_CALL(*connection_,
CloseConnection(QUIC_HTTP_FRAME_UNEXPECTED_ON_SPDY_STREAM, _, _))
.WillOnce(
(Invoke([this](QuicErrorCode error, const std::string& error_details,
ConnectionCloseBehavior connection_close_behavior) {
connection_->ReallyCloseConnection(error, error_details,
connection_close_behavior);
})));
EXPECT_CALL(*connection_, SendConnectionClosePacket(_, _, _));
EXPECT_CALL(*session_, OnConnectionClosed(_, _))
.WillOnce(Invoke([this](const QuicConnectionCloseFrame& frame,
ConnectionCloseSource source) {
session_->ReallyOnConnectionClosed(frame, source);
}));
EXPECT_CALL(*session_, MaybeSendRstStreamFrame(_, _, _)).Times(2);
stream_->OnStreamFrame(frame);
}
TEST_P(QuicSpdyStreamTest, Http3FrameError) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// PUSH_PROMISE frame with empty payload is considered invalid.
std::string invalid_http3_frame = absl::HexStringToBytes("0500");
QuicStreamFrame stream_frame(stream_->id(), /* fin = */ false,
/* offset = */ 0, invalid_http3_frame);
EXPECT_CALL(*connection_, CloseConnection(QUIC_HTTP_FRAME_ERROR, _, _));
stream_->OnStreamFrame(stream_frame);
}
TEST_P(QuicSpdyStreamTest, UnexpectedHttp3Frame) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// SETTINGS frame with empty payload.
std::string settings = absl::HexStringToBytes("0400");
QuicStreamFrame stream_frame(stream_->id(), /* fin = */ false,
/* offset = */ 0, settings);
EXPECT_CALL(*connection_,
CloseConnection(QUIC_HTTP_FRAME_UNEXPECTED_ON_SPDY_STREAM, _, _));
stream_->OnStreamFrame(stream_frame);
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersAndBody) {
Initialize(kShouldProcessData);
std::string body = "this is the body";
std::string data = UsesHttp3() ? DataFrame(body) : body;
EXPECT_EQ("", stream_->data());
QuicHeaderList headers = ProcessHeaders(false, headers_);
EXPECT_EQ(headers, stream_->header_list());
stream_->ConsumeHeaderList();
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame);
EXPECT_EQ(QuicHeaderList(), stream_->header_list());
EXPECT_EQ(body, stream_->data());
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersAndBodyFragments) {
std::string body = "this is the body";
std::string data = UsesHttp3() ? DataFrame(body) : body;
for (size_t fragment_size = 1; fragment_size < data.size(); ++fragment_size) {
Initialize(kShouldProcessData);
QuicHeaderList headers = ProcessHeaders(false, headers_);
ASSERT_EQ(headers, stream_->header_list());
stream_->ConsumeHeaderList();
for (size_t offset = 0; offset < data.size(); offset += fragment_size) {
size_t remaining_data = data.size() - offset;
absl::string_view fragment(data.data() + offset,
std::min(fragment_size, remaining_data));
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false,
offset, absl::string_view(fragment));
stream_->OnStreamFrame(frame);
}
ASSERT_EQ(body, stream_->data()) << "fragment_size: " << fragment_size;
}
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersAndBodyFragmentsSplit) {
std::string body = "this is the body";
std::string data = UsesHttp3() ? DataFrame(body) : body;
for (size_t split_point = 1; split_point < data.size() - 1; ++split_point) {
Initialize(kShouldProcessData);
QuicHeaderList headers = ProcessHeaders(false, headers_);
ASSERT_EQ(headers, stream_->header_list());
stream_->ConsumeHeaderList();
absl::string_view fragment1(data.data(), split_point);
QuicStreamFrame frame1(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(fragment1));
stream_->OnStreamFrame(frame1);
absl::string_view fragment2(data.data() + split_point,
data.size() - split_point);
QuicStreamFrame frame2(GetNthClientInitiatedBidirectionalId(0), false,
split_point, absl::string_view(fragment2));
stream_->OnStreamFrame(frame2);
ASSERT_EQ(body, stream_->data()) << "split_point: " << split_point;
}
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersAndBodyReadv) {
Initialize(!kShouldProcessData);
std::string body = "this is the body";
std::string data = UsesHttp3() ? DataFrame(body) : body;
ProcessHeaders(false, headers_);
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame);
stream_->ConsumeHeaderList();
char buffer[2048];
ASSERT_LT(data.length(), ABSL_ARRAYSIZE(buffer));
struct iovec vec;
vec.iov_base = buffer;
vec.iov_len = ABSL_ARRAYSIZE(buffer);
size_t bytes_read = stream_->Readv(&vec, 1);
QuicStreamPeer::CloseReadSide(stream_);
EXPECT_EQ(body.length(), bytes_read);
EXPECT_EQ(body, std::string(buffer, bytes_read));
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersAndLargeBodySmallReadv) {
Initialize(kShouldProcessData);
std::string body(12 * 1024, 'a');
std::string data = UsesHttp3() ? DataFrame(body) : body;
ProcessHeaders(false, headers_);
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame);
stream_->ConsumeHeaderList();
char buffer[2048];
char buffer2[2048];
struct iovec vec[2];
vec[0].iov_base = buffer;
vec[0].iov_len = ABSL_ARRAYSIZE(buffer);
vec[1].iov_base = buffer2;
vec[1].iov_len = ABSL_ARRAYSIZE(buffer2);
size_t bytes_read = stream_->Readv(vec, 2);
EXPECT_EQ(2048u * 2, bytes_read);
EXPECT_EQ(body.substr(0, 2048), std::string(buffer, 2048));
EXPECT_EQ(body.substr(2048, 2048), std::string(buffer2, 2048));
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersAndBodyMarkConsumed) {
Initialize(!kShouldProcessData);
std::string body = "this is the body";
std::string data = UsesHttp3() ? DataFrame(body) : body;
ProcessHeaders(false, headers_);
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame);
stream_->ConsumeHeaderList();
struct iovec vec;
EXPECT_EQ(1, stream_->GetReadableRegions(&vec, 1));
EXPECT_EQ(body.length(), vec.iov_len);
EXPECT_EQ(body, std::string(static_cast<char*>(vec.iov_base), vec.iov_len));
stream_->MarkConsumed(body.length());
EXPECT_EQ(data.length(), QuicStreamPeer::bytes_consumed(stream_));
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersAndConsumeMultipleBody) {
Initialize(!kShouldProcessData);
std::string body1 = "this is body 1";
std::string data1 = UsesHttp3() ? DataFrame(body1) : body1;
std::string body2 = "body 2";
std::string data2 = UsesHttp3() ? DataFrame(body2) : body2;
ProcessHeaders(false, headers_);
QuicStreamFrame frame1(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data1));
QuicStreamFrame frame2(GetNthClientInitiatedBidirectionalId(0), false,
data1.length(), absl::string_view(data2));
stream_->OnStreamFrame(frame1);
stream_->OnStreamFrame(frame2);
stream_->ConsumeHeaderList();
stream_->MarkConsumed(body1.length() + body2.length());
EXPECT_EQ(data1.length() + data2.length(),
QuicStreamPeer::bytes_consumed(stream_));
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersAndBodyIncrementalReadv) {
Initialize(!kShouldProcessData);
std::string body = "this is the body";
std::string data = UsesHttp3() ? DataFrame(body) : body;
ProcessHeaders(false, headers_);
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame);
stream_->ConsumeHeaderList();
char buffer[1];
struct iovec vec;
vec.iov_base = buffer;
vec.iov_len = ABSL_ARRAYSIZE(buffer);
for (size_t i = 0; i < body.length(); ++i) {
size_t bytes_read = stream_->Readv(&vec, 1);
ASSERT_EQ(1u, bytes_read);
EXPECT_EQ(body.data()[i], buffer[0]);
}
}
TEST_P(QuicSpdyStreamTest, ProcessHeadersUsingReadvWithMultipleIovecs) {
Initialize(!kShouldProcessData);
std::string body = "this is the body";
std::string data = UsesHttp3() ? DataFrame(body) : body;
ProcessHeaders(false, headers_);
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame);
stream_->ConsumeHeaderList();
char buffer1[1];
char buffer2[1];
struct iovec vec[2];
vec[0].iov_base = buffer1;
vec[0].iov_len = ABSL_ARRAYSIZE(buffer1);
vec[1].iov_base = buffer2;
vec[1].iov_len = ABSL_ARRAYSIZE(buffer2);
for (size_t i = 0; i < body.length(); i += 2) {
size_t bytes_read = stream_->Readv(vec, 2);
ASSERT_EQ(2u, bytes_read) << i;
ASSERT_EQ(body.data()[i], buffer1[0]) << i;
ASSERT_EQ(body.data()[i + 1], buffer2[0]) << i;
}
}
// Tests that we send a BLOCKED frame to the peer when we attempt to write, but
// are flow control blocked.
TEST_P(QuicSpdyStreamTest, StreamFlowControlBlocked) {
Initialize(kShouldProcessData);
testing::InSequence seq;
// Set a small flow control limit.
const uint64_t kWindow = 36;
QuicStreamPeer::SetSendWindowOffset(stream_, kWindow);
EXPECT_EQ(kWindow, QuicStreamPeer::SendWindowOffset(stream_));
// Try to send more data than the flow control limit allows.
const uint64_t kOverflow = 15;
std::string body(kWindow + kOverflow, 'a');
const uint64_t kHeaderLength = UsesHttp3() ? 2 : 0;
if (UsesHttp3()) {
EXPECT_CALL(*session_, WritevData(_, kHeaderLength, _, NO_FIN, _, _));
}
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _))
.WillOnce(Return(QuicConsumedData(kWindow - kHeaderLength, true)));
EXPECT_CALL(*session_, SendBlocked(_));
EXPECT_CALL(*connection_, SendControlFrame(_));
stream_->WriteOrBufferBody(body, false);
// Should have sent as much as possible, resulting in no send window left.
EXPECT_EQ(0u, QuicStreamPeer::SendWindowSize(stream_));
// And we should have queued the overflowed data.
EXPECT_EQ(kOverflow + kHeaderLength, stream_->BufferedDataBytes());
}
// The flow control receive window decreases whenever we add new bytes to the
// sequencer, whether they are consumed immediately or buffered. However we only
// send WINDOW_UPDATE frames based on increasing number of bytes consumed.
TEST_P(QuicSpdyStreamTest, StreamFlowControlNoWindowUpdateIfNotConsumed) {
// Don't process data - it will be buffered instead.
Initialize(!kShouldProcessData);
// Expect no WINDOW_UPDATE frames to be sent.
EXPECT_CALL(*session_, SendWindowUpdate(_, _)).Times(0);
// Set a small flow control receive window.
const uint64_t kWindow = 36;
QuicStreamPeer::SetReceiveWindowOffset(stream_, kWindow);
QuicStreamPeer::SetMaxReceiveWindow(stream_, kWindow);
// Stream receives enough data to fill a fraction of the receive window.
std::string body(kWindow / 3, 'a');
QuicByteCount header_length = 0;
std::string data;
if (UsesHttp3()) {
QuicBuffer header = HttpEncoder::SerializeDataFrameHeader(
body.length(), SimpleBufferAllocator::Get());
data = absl::StrCat(header.AsStringView(), body);
header_length = header.size();
} else {
data = body;
}
ProcessHeaders(false, headers_);
QuicStreamFrame frame1(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame1);
EXPECT_EQ(kWindow - (kWindow / 3) - header_length,
QuicStreamPeer::ReceiveWindowSize(stream_));
// Now receive another frame which results in the receive window being over
// half full. This should all be buffered, decreasing the receive window but
// not sending WINDOW_UPDATE.
QuicStreamFrame frame2(GetNthClientInitiatedBidirectionalId(0), false,
kWindow / 3 + header_length, absl::string_view(data));
stream_->OnStreamFrame(frame2);
EXPECT_EQ(kWindow - (2 * kWindow / 3) - 2 * header_length,
QuicStreamPeer::ReceiveWindowSize(stream_));
}
// Tests that on receipt of data, the stream updates its receive window offset
// appropriately, and sends WINDOW_UPDATE frames when its receive window drops
// too low.
TEST_P(QuicSpdyStreamTest, StreamFlowControlWindowUpdate) {
Initialize(kShouldProcessData);
// Set a small flow control limit.
const uint64_t kWindow = 36;
QuicStreamPeer::SetReceiveWindowOffset(stream_, kWindow);
QuicStreamPeer::SetMaxReceiveWindow(stream_, kWindow);
// Stream receives enough data to fill a fraction of the receive window.
std::string body(kWindow / 3, 'a');
QuicByteCount header_length = 0;
std::string data;
if (UsesHttp3()) {
QuicBuffer header = HttpEncoder::SerializeDataFrameHeader(
body.length(), SimpleBufferAllocator::Get());
data = absl::StrCat(header.AsStringView(), body);
header_length = header.size();
} else {
data = body;
}
ProcessHeaders(false, headers_);
stream_->ConsumeHeaderList();
QuicStreamFrame frame1(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame1);
EXPECT_EQ(kWindow - (kWindow / 3) - header_length,
QuicStreamPeer::ReceiveWindowSize(stream_));
// Now receive another frame which results in the receive window being over
// half full. This will trigger the stream to increase its receive window
// offset and send a WINDOW_UPDATE. The result will be again an available
// window of kWindow bytes.
QuicStreamFrame frame2(GetNthClientInitiatedBidirectionalId(0), false,
kWindow / 3 + header_length, absl::string_view(data));
EXPECT_CALL(*session_, SendWindowUpdate(_, _));
EXPECT_CALL(*connection_, SendControlFrame(_));
stream_->OnStreamFrame(frame2);
EXPECT_EQ(kWindow, QuicStreamPeer::ReceiveWindowSize(stream_));
}
// Tests that on receipt of data, the connection updates its receive window
// offset appropriately, and sends WINDOW_UPDATE frames when its receive window
// drops too low.
TEST_P(QuicSpdyStreamTest, ConnectionFlowControlWindowUpdate) {
Initialize(kShouldProcessData);
// Set a small flow control limit for streams and connection.
const uint64_t kWindow = 36;
QuicStreamPeer::SetReceiveWindowOffset(stream_, kWindow);
QuicStreamPeer::SetMaxReceiveWindow(stream_, kWindow);
QuicStreamPeer::SetReceiveWindowOffset(stream2_, kWindow);
QuicStreamPeer::SetMaxReceiveWindow(stream2_, kWindow);
QuicFlowControllerPeer::SetReceiveWindowOffset(session_->flow_controller(),
kWindow);
QuicFlowControllerPeer::SetMaxReceiveWindow(session_->flow_controller(),
kWindow);
// Supply headers to both streams so that they are happy to receive data.
auto headers = AsHeaderList(headers_);
stream_->OnStreamHeaderList(false, headers.uncompressed_header_bytes(),
headers);
stream_->ConsumeHeaderList();
stream2_->OnStreamHeaderList(false, headers.uncompressed_header_bytes(),
headers);
stream2_->ConsumeHeaderList();
// Each stream gets a quarter window of data. This should not trigger a
// WINDOW_UPDATE for either stream, nor for the connection.
QuicByteCount header_length = 0;
std::string body;
std::string data;
std::string data2;
std::string body2(1, 'a');
if (UsesHttp3()) {
body = std::string(kWindow / 4 - 2, 'a');
QuicBuffer header = HttpEncoder::SerializeDataFrameHeader(
body.length(), SimpleBufferAllocator::Get());
data = absl::StrCat(header.AsStringView(), body);
header_length = header.size();
QuicBuffer header2 = HttpEncoder::SerializeDataFrameHeader(
body.length(), SimpleBufferAllocator::Get());
data2 = absl::StrCat(header2.AsStringView(), body2);
} else {
body = std::string(kWindow / 4, 'a');
data = body;
data2 = body2;
}
QuicStreamFrame frame1(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
stream_->OnStreamFrame(frame1);
QuicStreamFrame frame2(GetNthClientInitiatedBidirectionalId(1), false, 0,
absl::string_view(data));
stream2_->OnStreamFrame(frame2);
// Now receive a further single byte on one stream - again this does not
// trigger a stream WINDOW_UPDATE, but now the connection flow control window
// is over half full and thus a connection WINDOW_UPDATE is sent.
EXPECT_CALL(*session_, SendWindowUpdate(_, _));
EXPECT_CALL(*connection_, SendControlFrame(_));
QuicStreamFrame frame3(GetNthClientInitiatedBidirectionalId(0), false,
body.length() + header_length,
absl::string_view(data2));
stream_->OnStreamFrame(frame3);
}
// Tests that on if the peer sends too much data (i.e. violates the flow control
// protocol), then we terminate the connection.
TEST_P(QuicSpdyStreamTest, StreamFlowControlViolation) {
// Stream should not process data, so that data gets buffered in the
// sequencer, triggering flow control limits.
Initialize(!kShouldProcessData);
// Set a small flow control limit.
const uint64_t kWindow = 50;
QuicStreamPeer::SetReceiveWindowOffset(stream_, kWindow);
ProcessHeaders(false, headers_);
// Receive data to overflow the window, violating flow control.
std::string body(kWindow + 1, 'a');
std::string data = UsesHttp3() ? DataFrame(body) : body;
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
EXPECT_CALL(*connection_,
CloseConnection(QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA, _, _));
stream_->OnStreamFrame(frame);
}
TEST_P(QuicSpdyStreamTest, TestHandlingQuicRstStreamNoError) {
Initialize(kShouldProcessData);
ProcessHeaders(false, headers_);
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AnyNumber());
stream_->OnStreamReset(QuicRstStreamFrame(
kInvalidControlFrameId, stream_->id(), QUIC_STREAM_NO_ERROR, 0));
if (GetQuicReloadableFlag(quic_fix_on_stream_reset) && UsesHttp3()) {
// RESET_STREAM should close the read side but not the write side.
EXPECT_TRUE(stream_->read_side_closed());
EXPECT_FALSE(stream_->write_side_closed());
} else {
EXPECT_TRUE(stream_->write_side_closed());
EXPECT_FALSE(stream_->reading_stopped());
}
}
// Tests that on if the peer sends too much data (i.e. violates the flow control
// protocol), at the connection level (rather than the stream level) then we
// terminate the connection.
TEST_P(QuicSpdyStreamTest, ConnectionFlowControlViolation) {
// Stream should not process data, so that data gets buffered in the
// sequencer, triggering flow control limits.
Initialize(!kShouldProcessData);
// Set a small flow control window on streams, and connection.
const uint64_t kStreamWindow = 50;
const uint64_t kConnectionWindow = 10;
QuicStreamPeer::SetReceiveWindowOffset(stream_, kStreamWindow);
QuicFlowControllerPeer::SetReceiveWindowOffset(session_->flow_controller(),
kConnectionWindow);
ProcessHeaders(false, headers_);
// Send enough data to overflow the connection level flow control window.
std::string body(kConnectionWindow + 1, 'a');
std::string data = UsesHttp3() ? DataFrame(body) : body;
EXPECT_LT(data.size(), kStreamWindow);
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), false, 0,
absl::string_view(data));
EXPECT_CALL(*connection_,
CloseConnection(QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA, _, _));
stream_->OnStreamFrame(frame);
}
// An attempt to write a FIN with no data should not be flow control blocked,
// even if the send window is 0.
TEST_P(QuicSpdyStreamTest, StreamFlowControlFinNotBlocked) {
Initialize(kShouldProcessData);
// Set a flow control limit of zero.
QuicStreamPeer::SetReceiveWindowOffset(stream_, 0);
// Send a frame with a FIN but no data. This should not be blocked.
std::string body = "";
bool fin = true;
EXPECT_CALL(*session_, SendBlocked(GetNthClientInitiatedBidirectionalId(0)))
.Times(0);
EXPECT_CALL(*session_, WritevData(_, 0, _, FIN, _, _));
stream_->WriteOrBufferBody(body, fin);
}
// Test that receiving trailing headers from the peer via OnStreamHeaderList()
// works, and can be read from the stream and consumed.
TEST_P(QuicSpdyStreamTest, ReceivingTrailersViaHeaderList) {
Initialize(kShouldProcessData);
// Receive initial headers.
size_t total_bytes = 0;
QuicHeaderList headers;
for (const auto& p : headers_) {
headers.OnHeader(p.first, p.second);
total_bytes += p.first.size() + p.second.size();
}
stream_->OnStreamHeadersPriority(
spdy::SpdyStreamPrecedence(kV3HighestPriority));
stream_->OnStreamHeaderList(/*fin=*/false, total_bytes, headers);
stream_->ConsumeHeaderList();
// Receive trailing headers.
SpdyHeaderBlock trailers_block;
trailers_block["key1"] = "value1";
trailers_block["key2"] = "value2";
trailers_block["key3"] = "value3";
SpdyHeaderBlock trailers_block_with_final_offset = trailers_block.Clone();
if (!UsesHttp3()) {
// :final-offset pseudo-header is only added if trailers are sent
// on the headers stream.
trailers_block_with_final_offset[kFinalOffsetHeaderKey] = "0";
}
total_bytes = 0;
QuicHeaderList trailers;
for (const auto& p : trailers_block_with_final_offset) {
trailers.OnHeader(p.first, p.second);
total_bytes += p.first.size() + p.second.size();
}
stream_->OnStreamHeaderList(/*fin=*/true, total_bytes, trailers);
// The trailers should be decompressed, and readable from the stream.
EXPECT_TRUE(stream_->trailers_decompressed());
EXPECT_EQ(trailers_block, stream_->received_trailers());
// IsDoneReading() returns false until trailers marked consumed.
EXPECT_FALSE(stream_->IsDoneReading());
stream_->MarkTrailersConsumed();
EXPECT_TRUE(stream_->IsDoneReading());
}
// Test that when receiving trailing headers with an offset before response
// body, stream is closed at the right offset.
TEST_P(QuicSpdyStreamTest, ReceivingTrailersWithOffset) {
// kFinalOffsetHeaderKey is not used when HEADERS are sent on the
// request/response stream.
if (UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// Receive initial headers.
QuicHeaderList headers = ProcessHeaders(false, headers_);
stream_->ConsumeHeaderList();
const std::string body = "this is the body";
std::string data = UsesHttp3() ? DataFrame(body) : body;
// Receive trailing headers.
SpdyHeaderBlock trailers_block;
trailers_block["key1"] = "value1";
trailers_block["key2"] = "value2";
trailers_block["key3"] = "value3";
trailers_block[kFinalOffsetHeaderKey] = absl::StrCat(data.size());
QuicHeaderList trailers = ProcessHeaders(true, trailers_block);
// The trailers should be decompressed, and readable from the stream.
EXPECT_TRUE(stream_->trailers_decompressed());
// The final offset trailer will be consumed by QUIC.
trailers_block.erase(kFinalOffsetHeaderKey);
EXPECT_EQ(trailers_block, stream_->received_trailers());
// Consuming the trailers erases them from the stream.
stream_->MarkTrailersConsumed();
EXPECT_TRUE(stream_->FinishedReadingTrailers());
EXPECT_FALSE(stream_->IsDoneReading());
// Receive and consume body.
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), /*fin=*/false,
0, data);
stream_->OnStreamFrame(frame);
EXPECT_EQ(body, stream_->data());
EXPECT_TRUE(stream_->IsDoneReading());
}
// Test that receiving trailers without a final offset field is an error.
TEST_P(QuicSpdyStreamTest, ReceivingTrailersWithoutOffset) {
// kFinalOffsetHeaderKey is not used when HEADERS are sent on the
// request/response stream.
if (UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// Receive initial headers.
ProcessHeaders(false, headers_);
stream_->ConsumeHeaderList();
// Receive trailing headers, without kFinalOffsetHeaderKey.
SpdyHeaderBlock trailers_block;
trailers_block["key1"] = "value1";
trailers_block["key2"] = "value2";
trailers_block["key3"] = "value3";
auto trailers = AsHeaderList(trailers_block);
// Verify that the trailers block didn't contain a final offset.
EXPECT_EQ("", trailers_block[kFinalOffsetHeaderKey].as_string());
// Receipt of the malformed trailers will close the connection.
EXPECT_CALL(*connection_,
CloseConnection(QUIC_INVALID_HEADERS_STREAM_DATA, _, _))
.Times(1);
stream_->OnStreamHeaderList(/*fin=*/true,
trailers.uncompressed_header_bytes(), trailers);
}
// Test that received Trailers must always have the FIN set.
TEST_P(QuicSpdyStreamTest, ReceivingTrailersWithoutFin) {
// In IETF QUIC, there is no such thing as FIN flag on HTTP/3 frames like the
// HEADERS frame.
if (UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// Receive initial headers.
auto headers = AsHeaderList(headers_);
stream_->OnStreamHeaderList(/*fin=*/false,
headers.uncompressed_header_bytes(), headers);
stream_->ConsumeHeaderList();
// Receive trailing headers with FIN deliberately set to false.
SpdyHeaderBlock trailers_block;
trailers_block["foo"] = "bar";
auto trailers = AsHeaderList(trailers_block);
EXPECT_CALL(*connection_,
CloseConnection(QUIC_INVALID_HEADERS_STREAM_DATA, _, _))
.Times(1);
stream_->OnStreamHeaderList(/*fin=*/false,
trailers.uncompressed_header_bytes(), trailers);
}
TEST_P(QuicSpdyStreamTest, ReceivingTrailersAfterHeadersWithFin) {
// If headers are received with a FIN, no trailers should then arrive.
Initialize(kShouldProcessData);
// If HEADERS frames are sent on the request/response stream, then the
// sequencer will signal an error if any stream data arrives after a FIN,
// so QuicSpdyStream does not need to.
if (UsesHttp3()) {
return;
}
// Receive initial headers with FIN set.
ProcessHeaders(true, headers_);
stream_->ConsumeHeaderList();
// Receive trailing headers after FIN already received.
SpdyHeaderBlock trailers_block;
trailers_block["foo"] = "bar";
EXPECT_CALL(*connection_,
CloseConnection(QUIC_INVALID_HEADERS_STREAM_DATA, _, _))
.Times(1);
ProcessHeaders(true, trailers_block);
}
// If body data are received with a FIN, no trailers should then arrive.
TEST_P(QuicSpdyStreamTest, ReceivingTrailersAfterBodyWithFin) {
// If HEADERS frames are sent on the request/response stream,
// then the sequencer will block them from reaching QuicSpdyStream
// after the stream is closed.
if (UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// Receive initial headers without FIN set.
ProcessHeaders(false, headers_);
stream_->ConsumeHeaderList();
// Receive body data, with FIN.
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), /*fin=*/true,
0, "body");
stream_->OnStreamFrame(frame);
// Receive trailing headers after FIN already received.
SpdyHeaderBlock trailers_block;
trailers_block["foo"] = "bar";
EXPECT_CALL(*connection_,
CloseConnection(QUIC_INVALID_HEADERS_STREAM_DATA, _, _))
.Times(1);
ProcessHeaders(true, trailers_block);
}
TEST_P(QuicSpdyStreamTest, ClosingStreamWithNoTrailers) {
// Verify that a stream receiving headers, body, and no trailers is correctly
// marked as done reading on consumption of headers and body.
Initialize(kShouldProcessData);
// Receive and consume initial headers with FIN not set.
auto h = AsHeaderList(headers_);
stream_->OnStreamHeaderList(/*fin=*/false, h.uncompressed_header_bytes(), h);
stream_->ConsumeHeaderList();
// Receive and consume body with FIN set, and no trailers.
std::string body(1024, 'x');
std::string data = UsesHttp3() ? DataFrame(body) : body;
QuicStreamFrame frame(GetNthClientInitiatedBidirectionalId(0), /*fin=*/true,
0, data);
stream_->OnStreamFrame(frame);
EXPECT_TRUE(stream_->IsDoneReading());
}
// Test that writing trailers will send a FIN, as Trailers are the last thing to
// be sent on a stream.
TEST_P(QuicSpdyStreamTest, WritingTrailersSendsAFin) {
Initialize(kShouldProcessData);
if (UsesHttp3()) {
// In this case, TestStream::WriteHeadersImpl() does not prevent writes.
// Four writes on the request stream: HEADERS frame header and payload both
// for headers and trailers.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _)).Times(4);
}
// Write the initial headers, without a FIN.
EXPECT_CALL(*stream_, WriteHeadersMock(false));
stream_->WriteHeaders(SpdyHeaderBlock(), /*fin=*/false, nullptr);
// Writing trailers implicitly sends a FIN.
SpdyHeaderBlock trailers;
trailers["trailer key"] = "trailer value";
EXPECT_CALL(*stream_, WriteHeadersMock(true));
stream_->WriteTrailers(std::move(trailers), nullptr);
EXPECT_TRUE(stream_->fin_sent());
}
TEST_P(QuicSpdyStreamTest, DoNotSendPriorityUpdateWithDefaultUrgency) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
StrictMock<MockHttp3DebugVisitor> debug_visitor;
session_->set_debug_visitor(&debug_visitor);
// Four writes on the request stream: HEADERS frame header and payload both
// for headers and trailers.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _)).Times(4);
// No PRIORITY_UPDATE frames on the control stream,
// because the stream has default priority.
auto send_control_stream =
QuicSpdySessionPeer::GetSendControlStream(session_.get());
EXPECT_CALL(*session_, WritevData(send_control_stream->id(), _, _, _, _, _))
.Times(0);
// Write the initial headers, without a FIN.
EXPECT_CALL(*stream_, WriteHeadersMock(false));
EXPECT_CALL(debug_visitor, OnHeadersFrameSent(stream_->id(), _));
stream_->WriteHeaders(SpdyHeaderBlock(), /*fin=*/false, nullptr);
// Writing trailers implicitly sends a FIN.
SpdyHeaderBlock trailers;
trailers["trailer key"] = "trailer value";
EXPECT_CALL(*stream_, WriteHeadersMock(true));
EXPECT_CALL(debug_visitor, OnHeadersFrameSent(stream_->id(), _));
stream_->WriteTrailers(std::move(trailers), nullptr);
EXPECT_TRUE(stream_->fin_sent());
}
TEST_P(QuicSpdyStreamTest, ChangePriority) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
StrictMock<MockHttp3DebugVisitor> debug_visitor;
session_->set_debug_visitor(&debug_visitor);
// Two writes on the request stream: HEADERS frame header and payload.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _)).Times(2);
EXPECT_CALL(*stream_, WriteHeadersMock(false));
EXPECT_CALL(debug_visitor, OnHeadersFrameSent(stream_->id(), _));
stream_->WriteHeaders(SpdyHeaderBlock(), /*fin=*/false, nullptr);
// PRIORITY_UPDATE frame on the control stream.
auto send_control_stream =
QuicSpdySessionPeer::GetSendControlStream(session_.get());
EXPECT_CALL(*session_, WritevData(send_control_stream->id(), _, _, _, _, _));
PriorityUpdateFrame priority_update;
priority_update.prioritized_element_id = 0;
priority_update.priority_field_value = "u=0";
EXPECT_CALL(debug_visitor, OnPriorityUpdateFrameSent(priority_update));
stream_->SetPriority(spdy::SpdyStreamPrecedence(kV3HighestPriority));
}
TEST_P(QuicSpdyStreamTest, ChangePriorityBeforeWritingHeaders) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
// PRIORITY_UPDATE frame sent on the control stream as soon as SetPriority()
// is called, before HEADERS frame is sent.
auto send_control_stream =
QuicSpdySessionPeer::GetSendControlStream(session_.get());
EXPECT_CALL(*session_, WritevData(send_control_stream->id(), _, _, _, _, _));
stream_->SetPriority(spdy::SpdyStreamPrecedence(kV3HighestPriority));
testing::Mock::VerifyAndClearExpectations(session_.get());
// Two writes on the request stream: HEADERS frame header and payload.
// PRIORITY_UPDATE frame is not sent this time, because one is already sent.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _)).Times(2);
EXPECT_CALL(*stream_, WriteHeadersMock(true));
stream_->WriteHeaders(SpdyHeaderBlock(), /*fin=*/true, nullptr);
}
// Test that when writing trailers, the trailers that are actually sent to the
// peer contain the final offset field indicating last byte of data.
TEST_P(QuicSpdyStreamTest, WritingTrailersFinalOffset) {
Initialize(kShouldProcessData);
if (UsesHttp3()) {
// In this case, TestStream::WriteHeadersImpl() does not prevent writes.
// HEADERS frame header and payload on the request stream.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _)).Times(2);
}
// Write the initial headers.
EXPECT_CALL(*stream_, WriteHeadersMock(false));
stream_->WriteHeaders(SpdyHeaderBlock(), /*fin=*/false, nullptr);
// Write non-zero body data to force a non-zero final offset.
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AtLeast(1));
std::string body(1024, 'x'); // 1 kB
QuicByteCount header_length = 0;
if (UsesHttp3()) {
header_length = HttpEncoder::SerializeDataFrameHeader(
body.length(), SimpleBufferAllocator::Get())
.size();
}
stream_->WriteOrBufferBody(body, false);
// The final offset field in the trailing headers is populated with the
// number of body bytes written (including queued bytes).
SpdyHeaderBlock trailers;
trailers["trailer key"] = "trailer value";
SpdyHeaderBlock expected_trailers(trailers.Clone());
// :final-offset pseudo-header is only added if trailers are sent
// on the headers stream.
if (!UsesHttp3()) {
expected_trailers[kFinalOffsetHeaderKey] =
absl::StrCat(body.length() + header_length);
}
EXPECT_CALL(*stream_, WriteHeadersMock(true));
stream_->WriteTrailers(std::move(trailers), nullptr);
EXPECT_EQ(expected_trailers, stream_->saved_headers());
}
// Test that if trailers are written after all other data has been written
// (headers and body), that this closes the stream for writing.
TEST_P(QuicSpdyStreamTest, WritingTrailersClosesWriteSide) {
Initialize(kShouldProcessData);
// Expect data being written on the stream. In addition to that, headers are
// also written on the stream in case of IETF QUIC.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _))
.Times(AtLeast(1));
// Write the initial headers.
EXPECT_CALL(*stream_, WriteHeadersMock(false));
stream_->WriteHeaders(SpdyHeaderBlock(), /*fin=*/false, nullptr);
// Write non-zero body data.
const int kBodySize = 1 * 1024; // 1 kB
stream_->WriteOrBufferBody(std::string(kBodySize, 'x'), false);
EXPECT_EQ(0u, stream_->BufferedDataBytes());
// Headers and body have been fully written, there is no queued data. Writing
// trailers marks the end of this stream, and thus the write side is closed.
EXPECT_CALL(*stream_, WriteHeadersMock(true));
stream_->WriteTrailers(SpdyHeaderBlock(), nullptr);
EXPECT_TRUE(stream_->write_side_closed());
}
// Test that the stream is not closed for writing when trailers are sent while
// there are still body bytes queued.
TEST_P(QuicSpdyStreamTest, WritingTrailersWithQueuedBytes) {
// This test exercises sending trailers on the headers stream while data is
// still queued on the response/request stream. In IETF QUIC, data and
// trailers are sent on the same stream, so this test does not apply.
if (UsesHttp3()) {
return;
}
testing::InSequence seq;
Initialize(kShouldProcessData);
// Write the initial headers.
EXPECT_CALL(*stream_, WriteHeadersMock(false));
stream_->WriteHeaders(SpdyHeaderBlock(), /*fin=*/false, nullptr);
// Write non-zero body data, but only consume partially, ensuring queueing.
const int kBodySize = 1 * 1024; // 1 kB
if (UsesHttp3()) {
EXPECT_CALL(*session_, WritevData(_, 3, _, NO_FIN, _, _));
}
EXPECT_CALL(*session_, WritevData(_, kBodySize, _, NO_FIN, _, _))
.WillOnce(Return(QuicConsumedData(kBodySize - 1, false)));
stream_->WriteOrBufferBody(std::string(kBodySize, 'x'), false);
EXPECT_EQ(1u, stream_->BufferedDataBytes());
// Writing trailers will send a FIN, but not close the write side of the
// stream as there are queued bytes.
EXPECT_CALL(*stream_, WriteHeadersMock(true));
stream_->WriteTrailers(SpdyHeaderBlock(), nullptr);
EXPECT_TRUE(stream_->fin_sent());
EXPECT_FALSE(stream_->write_side_closed());
// Writing the queued bytes will close the write side of the stream.
EXPECT_CALL(*session_, WritevData(_, 1, _, NO_FIN, _, _));
stream_->OnCanWrite();
EXPECT_TRUE(stream_->write_side_closed());
}
// Test that it is not possible to write Trailers after a FIN has been sent.
TEST_P(QuicSpdyStreamTest, WritingTrailersAfterFIN) {
// In IETF QUIC, there is no such thing as FIN flag on HTTP/3 frames like the
// HEADERS frame.
if (UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// Write the initial headers, with a FIN.
EXPECT_CALL(*stream_, WriteHeadersMock(true));
stream_->WriteHeaders(SpdyHeaderBlock(), /*fin=*/true, nullptr);
EXPECT_TRUE(stream_->fin_sent());
// Writing Trailers should fail, as the FIN has already been sent.
// populated with the number of body bytes written.
EXPECT_QUIC_BUG(stream_->WriteTrailers(SpdyHeaderBlock(), nullptr),
"Trailers cannot be sent after a FIN");
}
TEST_P(QuicSpdyStreamTest, HeaderStreamNotiferCorrespondingSpdyStream) {
// There is no headers stream if QPACK is used.
if (UsesHttp3()) {
return;
}
const char kHeader1[] = "Header1";
const char kHeader2[] = "Header2";
const char kBody1[] = "Test1";
const char kBody2[] = "Test2";
Initialize(kShouldProcessData);
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AtLeast(1));
testing::InSequence s;
QuicReferenceCountedPointer<MockAckListener> ack_listener1(
new MockAckListener());
QuicReferenceCountedPointer<MockAckListener> ack_listener2(
new MockAckListener());
stream_->set_ack_listener(ack_listener1);
stream2_->set_ack_listener(ack_listener2);
session_->headers_stream()->WriteOrBufferData(kHeader1, false, ack_listener1);
stream_->WriteOrBufferBody(kBody1, true);
session_->headers_stream()->WriteOrBufferData(kHeader2, false, ack_listener2);
stream2_->WriteOrBufferBody(kBody2, false);
QuicStreamFrame frame1(
QuicUtils::GetHeadersStreamId(connection_->transport_version()), false, 0,
kHeader1);
std::string data1 = UsesHttp3() ? DataFrame(kBody1) : kBody1;
QuicStreamFrame frame2(stream_->id(), true, 0, data1);
QuicStreamFrame frame3(
QuicUtils::GetHeadersStreamId(connection_->transport_version()), false, 7,
kHeader2);
std::string data2 = UsesHttp3() ? DataFrame(kBody2) : kBody2;
QuicStreamFrame frame4(stream2_->id(), false, 0, data2);
EXPECT_CALL(*ack_listener1, OnPacketRetransmitted(7));
session_->OnStreamFrameRetransmitted(frame1);
EXPECT_CALL(*ack_listener1, OnPacketAcked(7, _));
EXPECT_TRUE(session_->OnFrameAcked(QuicFrame(frame1), QuicTime::Delta::Zero(),
QuicTime::Zero()));
EXPECT_CALL(*ack_listener1, OnPacketAcked(5, _));
EXPECT_TRUE(session_->OnFrameAcked(QuicFrame(frame2), QuicTime::Delta::Zero(),
QuicTime::Zero()));
EXPECT_CALL(*ack_listener2, OnPacketAcked(7, _));
EXPECT_TRUE(session_->OnFrameAcked(QuicFrame(frame3), QuicTime::Delta::Zero(),
QuicTime::Zero()));
EXPECT_CALL(*ack_listener2, OnPacketAcked(5, _));
EXPECT_TRUE(session_->OnFrameAcked(QuicFrame(frame4), QuicTime::Delta::Zero(),
QuicTime::Zero()));
}
TEST_P(QuicSpdyStreamTest, OnPriorityFrame) {
Initialize(kShouldProcessData);
stream_->OnPriorityFrame(spdy::SpdyStreamPrecedence(kV3HighestPriority));
EXPECT_EQ(spdy::SpdyStreamPrecedence(kV3HighestPriority),
stream_->precedence());
}
TEST_P(QuicSpdyStreamTest, OnPriorityFrameAfterSendingData) {
Initialize(kShouldProcessData);
testing::InSequence seq;
if (UsesHttp3()) {
EXPECT_CALL(*session_, WritevData(_, 2, _, NO_FIN, _, _));
}
EXPECT_CALL(*session_, WritevData(_, 4, _, FIN, _, _));
stream_->WriteOrBufferBody("data", true);
stream_->OnPriorityFrame(spdy::SpdyStreamPrecedence(kV3HighestPriority));
EXPECT_EQ(spdy::SpdyStreamPrecedence(kV3HighestPriority),
stream_->precedence());
}
TEST_P(QuicSpdyStreamTest, SetPriorityBeforeUpdateStreamPriority) {
MockQuicConnection* connection = new StrictMock<MockQuicConnection>(
&helper_, &alarm_factory_, Perspective::IS_SERVER,
SupportedVersions(GetParam()));
std::unique_ptr<TestMockUpdateStreamSession> session(
new StrictMock<TestMockUpdateStreamSession>(connection));
auto stream =
new StrictMock<TestStream>(GetNthClientInitiatedBidirectionalStreamId(
session->transport_version(), 0),
session.get(),
/*should_process_data=*/true);
session->ActivateStream(absl::WrapUnique(stream));
// QuicSpdyStream::SetPriority() should eventually call UpdateStreamPriority()
// on the session. Make sure stream->priority() returns the updated priority
// if called within UpdateStreamPriority(). This expectation is enforced in
// TestMockUpdateStreamSession::UpdateStreamPriority().
session->SetExpectedStream(stream);
session->SetExpectedPriority(spdy::SpdyStreamPrecedence(kV3HighestPriority));
stream->SetPriority(spdy::SpdyStreamPrecedence(kV3HighestPriority));
session->SetExpectedPriority(spdy::SpdyStreamPrecedence(kV3LowestPriority));
stream->SetPriority(spdy::SpdyStreamPrecedence(kV3LowestPriority));
}
TEST_P(QuicSpdyStreamTest, StreamWaitsForAcks) {
Initialize(kShouldProcessData);
QuicReferenceCountedPointer<MockAckListener> mock_ack_listener(
new StrictMock<MockAckListener>);
stream_->set_ack_listener(mock_ack_listener);
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AtLeast(1));
// Stream is not waiting for acks initially.
EXPECT_FALSE(stream_->IsWaitingForAcks());
EXPECT_EQ(0u, QuicStreamPeer::SendBuffer(stream_).size());
// Send kData1.
stream_->WriteOrBufferData("FooAndBar", false, nullptr);
EXPECT_EQ(1u, QuicStreamPeer::SendBuffer(stream_).size());
EXPECT_TRUE(stream_->IsWaitingForAcks());
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(9, _));
QuicByteCount newly_acked_length = 0;
EXPECT_TRUE(stream_->OnStreamFrameAcked(0, 9, false, QuicTime::Delta::Zero(),
QuicTime::Zero(),
&newly_acked_length));
// Stream is not waiting for acks as all sent data is acked.
EXPECT_FALSE(stream_->IsWaitingForAcks());
EXPECT_EQ(0u, QuicStreamPeer::SendBuffer(stream_).size());
// Send kData2.
stream_->WriteOrBufferData("FooAndBar", false, nullptr);
EXPECT_TRUE(stream_->IsWaitingForAcks());
EXPECT_EQ(1u, QuicStreamPeer::SendBuffer(stream_).size());
// Send FIN.
stream_->WriteOrBufferData("", true, nullptr);
// Fin only frame is not stored in send buffer.
EXPECT_EQ(1u, QuicStreamPeer::SendBuffer(stream_).size());
// kData2 is retransmitted.
EXPECT_CALL(*mock_ack_listener, OnPacketRetransmitted(9));
stream_->OnStreamFrameRetransmitted(9, 9, false);
// kData2 is acked.
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(9, _));
EXPECT_TRUE(stream_->OnStreamFrameAcked(9, 9, false, QuicTime::Delta::Zero(),
QuicTime::Zero(),
&newly_acked_length));
// Stream is waiting for acks as FIN is not acked.
EXPECT_TRUE(stream_->IsWaitingForAcks());
EXPECT_EQ(0u, QuicStreamPeer::SendBuffer(stream_).size());
// FIN is acked.
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(0, _));
EXPECT_TRUE(stream_->OnStreamFrameAcked(18, 0, true, QuicTime::Delta::Zero(),
QuicTime::Zero(),
&newly_acked_length));
EXPECT_FALSE(stream_->IsWaitingForAcks());
EXPECT_EQ(0u, QuicStreamPeer::SendBuffer(stream_).size());
}
TEST_P(QuicSpdyStreamTest, StreamDataGetAckedMultipleTimes) {
Initialize(kShouldProcessData);
QuicReferenceCountedPointer<MockAckListener> mock_ack_listener(
new StrictMock<MockAckListener>);
stream_->set_ack_listener(mock_ack_listener);
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AtLeast(1));
// Send [0, 27) and fin.
stream_->WriteOrBufferData("FooAndBar", false, nullptr);
stream_->WriteOrBufferData("FooAndBar", false, nullptr);
stream_->WriteOrBufferData("FooAndBar", true, nullptr);
// Ack [0, 9), [5, 22) and [18, 26)
// Verify [0, 9) 9 bytes are acked.
QuicByteCount newly_acked_length = 0;
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(9, _));
EXPECT_TRUE(stream_->OnStreamFrameAcked(0, 9, false, QuicTime::Delta::Zero(),
QuicTime::Zero(),
&newly_acked_length));
EXPECT_EQ(2u, QuicStreamPeer::SendBuffer(stream_).size());
// Verify [9, 22) 13 bytes are acked.
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(13, _));
EXPECT_TRUE(stream_->OnStreamFrameAcked(5, 17, false, QuicTime::Delta::Zero(),
QuicTime::Zero(),
&newly_acked_length));
EXPECT_EQ(1u, QuicStreamPeer::SendBuffer(stream_).size());
// Verify [22, 26) 4 bytes are acked.
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(4, _));
EXPECT_TRUE(stream_->OnStreamFrameAcked(18, 8, false, QuicTime::Delta::Zero(),
QuicTime::Zero(),
&newly_acked_length));
EXPECT_EQ(1u, QuicStreamPeer::SendBuffer(stream_).size());
EXPECT_TRUE(stream_->IsWaitingForAcks());
// Ack [0, 27).
// Verify [26, 27) 1 byte is acked.
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(1, _));
EXPECT_TRUE(stream_->OnStreamFrameAcked(26, 1, false, QuicTime::Delta::Zero(),
QuicTime::Zero(),
&newly_acked_length));
EXPECT_EQ(0u, QuicStreamPeer::SendBuffer(stream_).size());
EXPECT_TRUE(stream_->IsWaitingForAcks());
// Ack Fin. Verify OnPacketAcked is called.
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(0, _));
EXPECT_TRUE(stream_->OnStreamFrameAcked(27, 0, true, QuicTime::Delta::Zero(),
QuicTime::Zero(),
&newly_acked_length));
EXPECT_EQ(0u, QuicStreamPeer::SendBuffer(stream_).size());
EXPECT_FALSE(stream_->IsWaitingForAcks());
// Ack [10, 27) and fin.
// No new data is acked, verify OnPacketAcked is not called.
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(_, _)).Times(0);
EXPECT_FALSE(
stream_->OnStreamFrameAcked(10, 17, true, QuicTime::Delta::Zero(),
QuicTime::Zero(), &newly_acked_length));
EXPECT_EQ(0u, QuicStreamPeer::SendBuffer(stream_).size());
EXPECT_FALSE(stream_->IsWaitingForAcks());
}
// HTTP/3 only.
TEST_P(QuicSpdyStreamTest, HeadersAckNotReportedWriteOrBufferBody) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
QuicReferenceCountedPointer<MockAckListener> mock_ack_listener(
new StrictMock<MockAckListener>);
stream_->set_ack_listener(mock_ack_listener);
std::string body = "Test1";
std::string body2(100, 'x');
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AtLeast(1));
stream_->WriteOrBufferBody(body, false);
stream_->WriteOrBufferBody(body2, true);
QuicBuffer header = HttpEncoder::SerializeDataFrameHeader(
body.length(), SimpleBufferAllocator::Get());
QuicBuffer header2 = HttpEncoder::SerializeDataFrameHeader(
body2.length(), SimpleBufferAllocator::Get());
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(body.length(), _));
QuicStreamFrame frame(stream_->id(), false, 0,
absl::StrCat(header.AsStringView(), body));
EXPECT_TRUE(session_->OnFrameAcked(QuicFrame(frame), QuicTime::Delta::Zero(),
QuicTime::Zero()));
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(0, _));
QuicStreamFrame frame2(stream_->id(), false, header.size() + body.length(),
header2.AsStringView());
EXPECT_TRUE(session_->OnFrameAcked(QuicFrame(frame2), QuicTime::Delta::Zero(),
QuicTime::Zero()));
EXPECT_CALL(*mock_ack_listener, OnPacketAcked(body2.length(), _));
QuicStreamFrame frame3(stream_->id(), true,
header.size() + body.length() + header2.size(), body2);
EXPECT_TRUE(session_->OnFrameAcked(QuicFrame(frame3), QuicTime::Delta::Zero(),
QuicTime::Zero()));
EXPECT_TRUE(
QuicSpdyStreamPeer::unacked_frame_headers_offsets(stream_).Empty());
}
// HTTP/3 only.
TEST_P(QuicSpdyStreamTest, HeadersAckNotReportedWriteBodySlices) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
QuicReferenceCountedPointer<MockAckListener> mock_ack_listener(
new StrictMock<MockAckListener>);
stream_->set_ack_listener(mock_ack_listener);
std::string body1 = "Test1";
std::string body2(100, 'x');
struct iovec body1_iov = {const_cast<char*>(body1.data()), body1.length()};
struct iovec body2_iov = {const_cast<char*>(body2.data()), body2.length()};
QuicMemSliceStorage storage(&body1_iov, 1,
helper_.GetStreamSendBufferAllocator(), 1024);
QuicMemSliceStorage storage2(&body2_iov, 1,
helper_.GetStreamSendBufferAllocator(), 1024);
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AtLeast(1));
stream_->WriteBodySlices(storage.ToSpan(), false);
stream_->WriteBodySlices(storage2.ToSpan(), true);
std::string data1 = DataFrame(body1);
std::string data2 = DataFrame(body2);
EXPECT_CALL(*mock_ack_listener,
OnPacketAcked(body1.length() + body2.length(), _));
QuicStreamFrame frame(stream_->id(), true, 0, data1 + data2);
EXPECT_TRUE(session_->OnFrameAcked(QuicFrame(frame), QuicTime::Delta::Zero(),
QuicTime::Zero()));
EXPECT_TRUE(
QuicSpdyStreamPeer::unacked_frame_headers_offsets(stream_).Empty());
}
// HTTP/3 only.
TEST_P(QuicSpdyStreamTest, HeaderBytesNotReportedOnRetransmission) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
QuicReferenceCountedPointer<MockAckListener> mock_ack_listener(
new StrictMock<MockAckListener>);
stream_->set_ack_listener(mock_ack_listener);
std::string body1 = "Test1";
std::string body2(100, 'x');
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AtLeast(1));
stream_->WriteOrBufferBody(body1, false);
stream_->WriteOrBufferBody(body2, true);
std::string data1 = DataFrame(body1);
std::string data2 = DataFrame(body2);
EXPECT_CALL(*mock_ack_listener, OnPacketRetransmitted(body1.length()));
QuicStreamFrame frame(stream_->id(), false, 0, data1);
session_->OnStreamFrameRetransmitted(frame);
EXPECT_CALL(*mock_ack_listener, OnPacketRetransmitted(body2.length()));
QuicStreamFrame frame2(stream_->id(), true, data1.length(), data2);
session_->OnStreamFrameRetransmitted(frame2);
EXPECT_FALSE(
QuicSpdyStreamPeer::unacked_frame_headers_offsets(stream_).Empty());
}
TEST_P(QuicSpdyStreamTest, HeadersFrameOnRequestStream) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
std::string headers = HeadersFrame({std::make_pair("foo", "bar")});
std::string data = DataFrame(kDataFramePayload);
std::string trailers =
HeadersFrame({std::make_pair("custom-key", "custom-value")});
std::string stream_frame_payload = absl::StrCat(headers, data, trailers);
QuicStreamFrame frame(stream_->id(), false, 0, stream_frame_payload);
stream_->OnStreamFrame(frame);
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
// QuicSpdyStream only calls OnBodyAvailable()
// after the header list has been consumed.
EXPECT_EQ("", stream_->data());
stream_->ConsumeHeaderList();
EXPECT_EQ(kDataFramePayload, stream_->data());
EXPECT_THAT(stream_->received_trailers(),
ElementsAre(Pair("custom-key", "custom-value")));
}
TEST_P(QuicSpdyStreamTest, ProcessBodyAfterTrailers) {
if (!UsesHttp3()) {
return;
}
Initialize(!kShouldProcessData);
std::string headers = HeadersFrame({std::make_pair("foo", "bar")});
std::string data = DataFrame(kDataFramePayload);
// A header block that will take more than one block of sequencer buffer.
// This ensures that when the trailers are consumed, some buffer buckets will
// be freed.
SpdyHeaderBlock trailers_block;
trailers_block["key1"] = std::string(10000, 'x');
std::string trailers = HeadersFrame(trailers_block);
// Feed all three HTTP/3 frames in a single stream frame.
std::string stream_frame_payload = absl::StrCat(headers, data, trailers);
QuicStreamFrame frame(stream_->id(), false, 0, stream_frame_payload);
stream_->OnStreamFrame(frame);
stream_->ConsumeHeaderList();
stream_->MarkTrailersConsumed();
EXPECT_TRUE(stream_->trailers_decompressed());
EXPECT_EQ(trailers_block, stream_->received_trailers());
EXPECT_TRUE(stream_->HasBytesToRead());
// Consume data.
char buffer[2048];
struct iovec vec;
vec.iov_base = buffer;
vec.iov_len = ABSL_ARRAYSIZE(buffer);
size_t bytes_read = stream_->Readv(&vec, 1);
EXPECT_EQ(kDataFramePayload, absl::string_view(buffer, bytes_read));
EXPECT_FALSE(stream_->HasBytesToRead());
}
// The test stream will receive a stream frame containing malformed headers and
// normal body. Make sure the http decoder stops processing body after the
// connection shuts down.
TEST_P(QuicSpdyStreamTest, MalformedHeadersStopHttpDecoder) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
testing::InSequence s;
connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
// Random bad headers.
std::string headers =
HeadersFrame(absl::HexStringToBytes("00002a94e7036261"));
std::string data = DataFrame(kDataFramePayload);
std::string stream_frame_payload = absl::StrCat(headers, data);
QuicStreamFrame frame(stream_->id(), false, 0, stream_frame_payload);
EXPECT_CALL(
*connection_,
CloseConnection(QUIC_QPACK_DECOMPRESSION_FAILED,
MatchesRegex("Error decoding headers on stream \\d+: "
"Incomplete header block."),
_))
.WillOnce(
(Invoke([this](QuicErrorCode error, const std::string& error_details,
ConnectionCloseBehavior connection_close_behavior) {
connection_->ReallyCloseConnection(error, error_details,
connection_close_behavior);
})));
EXPECT_CALL(*connection_, SendConnectionClosePacket(_, _, _));
EXPECT_CALL(*session_, OnConnectionClosed(_, _))
.WillOnce(Invoke([this](const QuicConnectionCloseFrame& frame,
ConnectionCloseSource source) {
session_->ReallyOnConnectionClosed(frame, source);
}));
EXPECT_CALL(*session_, MaybeSendRstStreamFrame(_, _, _)).Times(2);
stream_->OnStreamFrame(frame);
}
// Regression test for https://crbug.com/1027895: a HEADERS frame triggers an
// error in QuicSpdyStream::OnHeadersFramePayload(). This closes the
// connection, freeing the buffer of QuicStreamSequencer. Therefore
// QuicStreamSequencer::MarkConsumed() must not be called from
// QuicSpdyStream::OnHeadersFramePayload().
TEST_P(QuicSpdyStreamTest, DoNotMarkConsumedAfterQpackDecodingError) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
{
testing::InSequence s;
EXPECT_CALL(
*connection_,
CloseConnection(QUIC_QPACK_DECOMPRESSION_FAILED,
MatchesRegex("Error decoding headers on stream \\d+: "
"Invalid relative index."),
_))
.WillOnce((
Invoke([this](QuicErrorCode error, const std::string& error_details,
ConnectionCloseBehavior connection_close_behavior) {
connection_->ReallyCloseConnection(error, error_details,
connection_close_behavior);
})));
EXPECT_CALL(*connection_, SendConnectionClosePacket(_, _, _));
EXPECT_CALL(*session_, OnConnectionClosed(_, _))
.WillOnce(Invoke([this](const QuicConnectionCloseFrame& frame,
ConnectionCloseSource source) {
session_->ReallyOnConnectionClosed(frame, source);
}));
}
EXPECT_CALL(*session_, MaybeSendRstStreamFrame(stream_->id(), _, _));
EXPECT_CALL(*session_, MaybeSendRstStreamFrame(stream2_->id(), _, _));
// Invalid headers: Required Insert Count is zero, but the header block
// contains a dynamic table reference.
std::string headers = HeadersFrame(absl::HexStringToBytes("000080"));
QuicStreamFrame frame(stream_->id(), false, 0, headers);
stream_->OnStreamFrame(frame);
}
TEST_P(QuicSpdyStreamTest, ImmediateHeaderDecodingWithDynamicTableEntries) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
testing::InSequence s;
session_->qpack_decoder()->OnSetDynamicTableCapacity(1024);
StrictMock<MockHttp3DebugVisitor> debug_visitor;
session_->set_debug_visitor(&debug_visitor);
auto decoder_send_stream =
QuicSpdySessionPeer::GetQpackDecoderSendStream(session_.get());
// Deliver dynamic table entry to decoder.
session_->qpack_decoder()->OnInsertWithoutNameReference("foo", "bar");
// HEADERS frame referencing first dynamic table entry.
std::string encoded_headers = absl::HexStringToBytes("020080");
std::string headers = HeadersFrame(encoded_headers);
EXPECT_CALL(debug_visitor,
OnHeadersFrameReceived(stream_->id(), encoded_headers.length()));
// Decoder stream type.
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 0, _, _, _));
// Header acknowledgement.
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 1, _, _, _));
EXPECT_CALL(debug_visitor, OnHeadersDecoded(stream_->id(), _));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, 0, headers));
// Headers can be decoded immediately.
EXPECT_TRUE(stream_->headers_decompressed());
// Verify headers.
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
stream_->ConsumeHeaderList();
// DATA frame.
std::string data = DataFrame(kDataFramePayload);
EXPECT_CALL(debug_visitor,
OnDataFrameReceived(stream_->id(), strlen(kDataFramePayload)));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, /* offset = */
headers.length(), data));
EXPECT_EQ(kDataFramePayload, stream_->data());
// Deliver second dynamic table entry to decoder.
session_->qpack_decoder()->OnInsertWithoutNameReference("trailing", "foobar");
// Trailing HEADERS frame referencing second dynamic table entry.
std::string encoded_trailers = absl::HexStringToBytes("030080");
std::string trailers = HeadersFrame(encoded_trailers);
EXPECT_CALL(debug_visitor,
OnHeadersFrameReceived(stream_->id(), encoded_trailers.length()));
// Header acknowledgement.
EXPECT_CALL(*session_, WritevData(decoder_send_stream->id(), _, _, _, _, _));
EXPECT_CALL(debug_visitor, OnHeadersDecoded(stream_->id(), _));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), true, /* offset = */
headers.length() + data.length(),
trailers));
// Trailers can be decoded immediately.
EXPECT_TRUE(stream_->trailers_decompressed());
// Verify trailers.
EXPECT_THAT(stream_->received_trailers(),
ElementsAre(Pair("trailing", "foobar")));
stream_->MarkTrailersConsumed();
}
TEST_P(QuicSpdyStreamTest, BlockedHeaderDecoding) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
testing::InSequence s;
session_->qpack_decoder()->OnSetDynamicTableCapacity(1024);
StrictMock<MockHttp3DebugVisitor> debug_visitor;
session_->set_debug_visitor(&debug_visitor);
// HEADERS frame referencing first dynamic table entry.
std::string encoded_headers = absl::HexStringToBytes("020080");
std::string headers = HeadersFrame(encoded_headers);
EXPECT_CALL(debug_visitor,
OnHeadersFrameReceived(stream_->id(), encoded_headers.length()));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, 0, headers));
// Decoding is blocked because dynamic table entry has not been received yet.
EXPECT_FALSE(stream_->headers_decompressed());
auto decoder_send_stream =
QuicSpdySessionPeer::GetQpackDecoderSendStream(session_.get());
// Decoder stream type.
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 0, _, _, _));
// Header acknowledgement.
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 1, _, _, _));
EXPECT_CALL(debug_visitor, OnHeadersDecoded(stream_->id(), _));
// Deliver dynamic table entry to decoder.
session_->qpack_decoder()->OnInsertWithoutNameReference("foo", "bar");
EXPECT_TRUE(stream_->headers_decompressed());
// Verify headers.
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
stream_->ConsumeHeaderList();
// DATA frame.
std::string data = DataFrame(kDataFramePayload);
EXPECT_CALL(debug_visitor,
OnDataFrameReceived(stream_->id(), strlen(kDataFramePayload)));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, /* offset = */
headers.length(), data));
EXPECT_EQ(kDataFramePayload, stream_->data());
// Trailing HEADERS frame referencing second dynamic table entry.
std::string encoded_trailers = absl::HexStringToBytes("030080");
std::string trailers = HeadersFrame(encoded_trailers);
EXPECT_CALL(debug_visitor,
OnHeadersFrameReceived(stream_->id(), encoded_trailers.length()));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), true, /* offset = */
headers.length() + data.length(),
trailers));
// Decoding is blocked because dynamic table entry has not been received yet.
EXPECT_FALSE(stream_->trailers_decompressed());
// Header acknowledgement.
EXPECT_CALL(*session_, WritevData(decoder_send_stream->id(), _, _, _, _, _));
EXPECT_CALL(debug_visitor, OnHeadersDecoded(stream_->id(), _));
// Deliver second dynamic table entry to decoder.
session_->qpack_decoder()->OnInsertWithoutNameReference("trailing", "foobar");
EXPECT_TRUE(stream_->trailers_decompressed());
// Verify trailers.
EXPECT_THAT(stream_->received_trailers(),
ElementsAre(Pair("trailing", "foobar")));
stream_->MarkTrailersConsumed();
}
TEST_P(QuicSpdyStreamTest, AsyncErrorDecodingHeaders) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
session_->qpack_decoder()->OnSetDynamicTableCapacity(1024);
// HEADERS frame only referencing entry with absolute index 0 but with
// Required Insert Count = 2, which is incorrect.
std::string headers = HeadersFrame(absl::HexStringToBytes("030081"));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, 0, headers));
// Even though entire header block is received and every referenced entry is
// available, decoding is blocked until insert count reaches the Required
// Insert Count value advertised in the header block prefix.
EXPECT_FALSE(stream_->headers_decompressed());
EXPECT_CALL(
*connection_,
CloseConnection(QUIC_QPACK_DECOMPRESSION_FAILED,
MatchesRegex("Error decoding headers on stream \\d+: "
"Required Insert Count too large."),
ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET));
// Deliver two dynamic table entries to decoder
// to trigger decoding of header block.
session_->qpack_decoder()->OnInsertWithoutNameReference("foo", "bar");
session_->qpack_decoder()->OnInsertWithoutNameReference("foo", "bar");
}
// Regression test for https://crbug.com/1024263 and for
// https://crbug.com/1025209#c11.
TEST_P(QuicSpdyStreamTest, BlockedHeaderDecodingUnblockedWithBufferedError) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
session_->qpack_decoder()->OnSetDynamicTableCapacity(1024);
// Relative index 2 is invalid because it is larger than or equal to the Base.
std::string headers = HeadersFrame(absl::HexStringToBytes("020082"));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, 0, headers));
// Decoding is blocked.
EXPECT_FALSE(stream_->headers_decompressed());
EXPECT_CALL(
*connection_,
CloseConnection(QUIC_QPACK_DECOMPRESSION_FAILED,
MatchesRegex("Error decoding headers on stream \\d+: "
"Invalid relative index."),
ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET));
// Deliver one dynamic table entry to decoder
// to trigger decoding of header block.
session_->qpack_decoder()->OnInsertWithoutNameReference("foo", "bar");
}
TEST_P(QuicSpdyStreamTest, AsyncErrorDecodingTrailers) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
testing::InSequence s;
session_->qpack_decoder()->OnSetDynamicTableCapacity(1024);
// HEADERS frame referencing first dynamic table entry.
std::string headers = HeadersFrame(absl::HexStringToBytes("020080"));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, 0, headers));
// Decoding is blocked because dynamic table entry has not been received yet.
EXPECT_FALSE(stream_->headers_decompressed());
auto decoder_send_stream =
QuicSpdySessionPeer::GetQpackDecoderSendStream(session_.get());
// Decoder stream type.
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 0, _, _, _));
// Header acknowledgement.
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 1, _, _, _));
// Deliver dynamic table entry to decoder.
session_->qpack_decoder()->OnInsertWithoutNameReference("foo", "bar");
EXPECT_TRUE(stream_->headers_decompressed());
// Verify headers.
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
stream_->ConsumeHeaderList();
// DATA frame.
std::string data = DataFrame(kDataFramePayload);
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, /* offset = */
headers.length(), data));
EXPECT_EQ(kDataFramePayload, stream_->data());
// Trailing HEADERS frame only referencing entry with absolute index 0 but
// with Required Insert Count = 2, which is incorrect.
std::string trailers = HeadersFrame(absl::HexStringToBytes("030081"));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), true, /* offset = */
headers.length() + data.length(),
trailers));
// Even though entire header block is received and every referenced entry is
// available, decoding is blocked until insert count reaches the Required
// Insert Count value advertised in the header block prefix.
EXPECT_FALSE(stream_->trailers_decompressed());
EXPECT_CALL(
*connection_,
CloseConnection(QUIC_QPACK_DECOMPRESSION_FAILED,
MatchesRegex("Error decoding trailers on stream \\d+: "
"Required Insert Count too large."),
ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET));
// Deliver second dynamic table entry to decoder
// to trigger decoding of trailing header block.
session_->qpack_decoder()->OnInsertWithoutNameReference("trailing", "foobar");
}
// Regression test for b/132603592: QPACK decoding unblocked after stream is
// closed.
TEST_P(QuicSpdyStreamTest, HeaderDecodingUnblockedAfterStreamClosed) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
testing::InSequence s;
session_->qpack_decoder()->OnSetDynamicTableCapacity(1024);
StrictMock<MockHttp3DebugVisitor> debug_visitor;
session_->set_debug_visitor(&debug_visitor);
// HEADERS frame referencing first dynamic table entry.
std::string encoded_headers = absl::HexStringToBytes("020080");
std::string headers = HeadersFrame(encoded_headers);
EXPECT_CALL(debug_visitor,
OnHeadersFrameReceived(stream_->id(), encoded_headers.length()));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, 0, headers));
// Decoding is blocked because dynamic table entry has not been received yet.
EXPECT_FALSE(stream_->headers_decompressed());
// Decoder stream type and stream cancellation instruction.
auto decoder_send_stream =
QuicSpdySessionPeer::GetQpackDecoderSendStream(session_.get());
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 0, _, _, _));
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 1, _, _, _));
// Reset stream by this endpoint, for example, due to stream cancellation.
EXPECT_CALL(*session_, MaybeSendStopSendingFrame(
stream_->id(), QuicResetStreamError::FromInternal(
QUIC_STREAM_CANCELLED)));
EXPECT_CALL(
*session_,
MaybeSendRstStreamFrame(
stream_->id(),
QuicResetStreamError::FromInternal(QUIC_STREAM_CANCELLED), _));
stream_->Reset(QUIC_STREAM_CANCELLED);
// Deliver dynamic table entry to decoder.
session_->qpack_decoder()->OnInsertWithoutNameReference("foo", "bar");
EXPECT_FALSE(stream_->headers_decompressed());
}
TEST_P(QuicSpdyStreamTest, HeaderDecodingUnblockedAfterResetReceived) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
testing::InSequence s;
session_->qpack_decoder()->OnSetDynamicTableCapacity(1024);
StrictMock<MockHttp3DebugVisitor> debug_visitor;
session_->set_debug_visitor(&debug_visitor);
// HEADERS frame referencing first dynamic table entry.
std::string encoded_headers = absl::HexStringToBytes("020080");
std::string headers = HeadersFrame(encoded_headers);
EXPECT_CALL(debug_visitor,
OnHeadersFrameReceived(stream_->id(), encoded_headers.length()));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, 0, headers));
// Decoding is blocked because dynamic table entry has not been received yet.
EXPECT_FALSE(stream_->headers_decompressed());
// Decoder stream type and stream cancellation instruction.
auto decoder_send_stream =
QuicSpdySessionPeer::GetQpackDecoderSendStream(session_.get());
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 0, _, _, _));
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 1, _, _, _));
// OnStreamReset() is called when RESET_STREAM frame is received from peer.
stream_->OnStreamReset(QuicRstStreamFrame(
kInvalidControlFrameId, stream_->id(), QUIC_STREAM_CANCELLED, 0));
if (!GetQuicReloadableFlag(quic_abort_qpack_on_stream_reset)) {
// Header acknowledgement.
EXPECT_CALL(*session_,
WritevData(decoder_send_stream->id(), /* write_length = */ 1,
/* offset = */ 2, _, _, _));
EXPECT_CALL(debug_visitor, OnHeadersDecoded(stream_->id(), _));
}
// Deliver dynamic table entry to decoder.
session_->qpack_decoder()->OnInsertWithoutNameReference("foo", "bar");
if (GetQuicReloadableFlag(quic_abort_qpack_on_stream_reset)) {
EXPECT_FALSE(stream_->headers_decompressed());
} else {
// Verify headers.
EXPECT_TRUE(stream_->headers_decompressed());
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
}
}
class QuicSpdyStreamIncrementalConsumptionTest : public QuicSpdyStreamTest {
protected:
QuicSpdyStreamIncrementalConsumptionTest() : offset_(0), consumed_bytes_(0) {}
~QuicSpdyStreamIncrementalConsumptionTest() override = default;
// Create QuicStreamFrame with |payload|
// and pass it to stream_->OnStreamFrame().
void OnStreamFrame(absl::string_view payload) {
QuicStreamFrame frame(stream_->id(), /* fin = */ false, offset_, payload);
stream_->OnStreamFrame(frame);
offset_ += payload.size();
}
// Return number of bytes marked consumed with sequencer
// since last NewlyConsumedBytes() call.
QuicStreamOffset NewlyConsumedBytes() {
QuicStreamOffset previously_consumed_bytes = consumed_bytes_;
consumed_bytes_ = stream_->sequencer()->NumBytesConsumed();
return consumed_bytes_ - previously_consumed_bytes;
}
// Read |size| bytes from the stream.
std::string ReadFromStream(QuicByteCount size) {
std::string buffer;
buffer.resize(size);
struct iovec vec;
vec.iov_base = const_cast<char*>(buffer.data());
vec.iov_len = size;
size_t bytes_read = stream_->Readv(&vec, 1);
EXPECT_EQ(bytes_read, size);
return buffer;
}
private:
QuicStreamOffset offset_;
QuicStreamOffset consumed_bytes_;
};
INSTANTIATE_TEST_SUITE_P(Tests, QuicSpdyStreamIncrementalConsumptionTest,
::testing::ValuesIn(AllSupportedVersions()),
::testing::PrintToStringParamName());
// Test that stream bytes are consumed (by calling
// sequencer()->MarkConsumed()) incrementally, as soon as possible.
TEST_P(QuicSpdyStreamIncrementalConsumptionTest, OnlyKnownFrames) {
if (!UsesHttp3()) {
return;
}
Initialize(!kShouldProcessData);
std::string headers = HeadersFrame({std::make_pair("foo", "bar")});
// All HEADERS frame bytes are consumed even if the frame is not received
// completely.
OnStreamFrame(absl::string_view(headers).substr(0, headers.size() - 1));
EXPECT_EQ(headers.size() - 1, NewlyConsumedBytes());
// The rest of the HEADERS frame is also consumed immediately.
OnStreamFrame(absl::string_view(headers).substr(headers.size() - 1));
EXPECT_EQ(1u, NewlyConsumedBytes());
// Verify headers.
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
stream_->ConsumeHeaderList();
// DATA frame.
absl::string_view data_payload(kDataFramePayload);
std::string data_frame = DataFrame(data_payload);
QuicByteCount data_frame_header_length =
data_frame.size() - data_payload.size();
// DATA frame header is consumed.
// DATA frame payload is not consumed because payload has to be buffered.
OnStreamFrame(data_frame);
EXPECT_EQ(data_frame_header_length, NewlyConsumedBytes());
// Consume all but last byte of data.
EXPECT_EQ(data_payload.substr(0, data_payload.size() - 1),
ReadFromStream(data_payload.size() - 1));
EXPECT_EQ(data_payload.size() - 1, NewlyConsumedBytes());
std::string trailers =
HeadersFrame({std::make_pair("custom-key", "custom-value")});
// No bytes are consumed, because last byte of DATA payload is still buffered.
OnStreamFrame(absl::string_view(trailers).substr(0, trailers.size() - 1));
EXPECT_EQ(0u, NewlyConsumedBytes());
// Reading last byte of DATA payload triggers consumption of all data received
// so far, even though last HEADERS frame has not been received completely.
EXPECT_EQ(data_payload.substr(data_payload.size() - 1), ReadFromStream(1));
EXPECT_EQ(1 + trailers.size() - 1, NewlyConsumedBytes());
// Last byte of trailers is immediately consumed.
OnStreamFrame(absl::string_view(trailers).substr(trailers.size() - 1));
EXPECT_EQ(1u, NewlyConsumedBytes());
// Verify trailers.
EXPECT_THAT(stream_->received_trailers(),
ElementsAre(Pair("custom-key", "custom-value")));
}
TEST_P(QuicSpdyStreamIncrementalConsumptionTest, ReceiveUnknownFrame) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
StrictMock<MockHttp3DebugVisitor> debug_visitor;
session_->set_debug_visitor(&debug_visitor);
EXPECT_CALL(debug_visitor,
OnUnknownFrameReceived(stream_->id(), /* frame_type = */ 0x21,
/* payload_length = */ 3));
std::string unknown_frame = UnknownFrame(0x21, "foo");
OnStreamFrame(unknown_frame);
}
TEST_P(QuicSpdyStreamIncrementalConsumptionTest, UnknownFramesInterleaved) {
if (!UsesHttp3()) {
return;
}
Initialize(!kShouldProcessData);
// Unknown frame of reserved type before HEADERS is consumed immediately.
std::string unknown_frame1 = UnknownFrame(0x21, "foo");
OnStreamFrame(unknown_frame1);
EXPECT_EQ(unknown_frame1.size(), NewlyConsumedBytes());
std::string headers = HeadersFrame({std::make_pair("foo", "bar")});
// All HEADERS frame bytes are consumed even if the frame is not received
// completely.
OnStreamFrame(absl::string_view(headers).substr(0, headers.size() - 1));
EXPECT_EQ(headers.size() - 1, NewlyConsumedBytes());
// The rest of the HEADERS frame is also consumed immediately.
OnStreamFrame(absl::string_view(headers).substr(headers.size() - 1));
EXPECT_EQ(1u, NewlyConsumedBytes());
// Verify headers.
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
stream_->ConsumeHeaderList();
// Frame of unknown, not reserved type between HEADERS and DATA is consumed
// immediately.
std::string unknown_frame2 = UnknownFrame(0x3a, "");
OnStreamFrame(unknown_frame2);
EXPECT_EQ(unknown_frame2.size(), NewlyConsumedBytes());
// DATA frame.
absl::string_view data_payload(kDataFramePayload);
std::string data_frame = DataFrame(data_payload);
QuicByteCount data_frame_header_length =
data_frame.size() - data_payload.size();
// DATA frame header is consumed.
// DATA frame payload is not consumed because payload has to be buffered.
OnStreamFrame(data_frame);
EXPECT_EQ(data_frame_header_length, NewlyConsumedBytes());
// Frame of unknown, not reserved type is not consumed because DATA payload is
// still buffered.
std::string unknown_frame3 = UnknownFrame(0x39, "bar");
OnStreamFrame(unknown_frame3);
EXPECT_EQ(0u, NewlyConsumedBytes());
// Consume all but last byte of data.
EXPECT_EQ(data_payload.substr(0, data_payload.size() - 1),
ReadFromStream(data_payload.size() - 1));
EXPECT_EQ(data_payload.size() - 1, NewlyConsumedBytes());
std::string trailers =
HeadersFrame({std::make_pair("custom-key", "custom-value")});
// No bytes are consumed, because last byte of DATA payload is still buffered.
OnStreamFrame(absl::string_view(trailers).substr(0, trailers.size() - 1));
EXPECT_EQ(0u, NewlyConsumedBytes());
// Reading last byte of DATA payload triggers consumption of all data received
// so far, even though last HEADERS frame has not been received completely.
EXPECT_EQ(data_payload.substr(data_payload.size() - 1), ReadFromStream(1));
EXPECT_EQ(1 + unknown_frame3.size() + trailers.size() - 1,
NewlyConsumedBytes());
// Last byte of trailers is immediately consumed.
OnStreamFrame(absl::string_view(trailers).substr(trailers.size() - 1));
EXPECT_EQ(1u, NewlyConsumedBytes());
// Verify trailers.
EXPECT_THAT(stream_->received_trailers(),
ElementsAre(Pair("custom-key", "custom-value")));
// Unknown frame of reserved type after trailers is consumed immediately.
std::string unknown_frame4 = UnknownFrame(0x40, "");
OnStreamFrame(unknown_frame4);
EXPECT_EQ(unknown_frame4.size(), NewlyConsumedBytes());
}
// Close connection if a DATA frame is received before a HEADERS frame.
TEST_P(QuicSpdyStreamTest, DataBeforeHeaders) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// Closing the connection is mocked out in tests. Instead, simply stop
// reading data at the stream level to prevent QuicSpdyStream from blowing up.
EXPECT_CALL(
*connection_,
CloseConnection(QUIC_HTTP_INVALID_FRAME_SEQUENCE_ON_SPDY_STREAM,
"Unexpected DATA frame received.",
ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET))
.WillOnce(InvokeWithoutArgs([this]() { stream_->StopReading(); }));
std::string data = DataFrame(kDataFramePayload);
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, 0, data));
}
// Close connection if a HEADERS frame is received after the trailing HEADERS.
TEST_P(QuicSpdyStreamTest, TrailersAfterTrailers) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// Receive and consume headers.
std::string headers = HeadersFrame({std::make_pair("foo", "bar")});
QuicStreamOffset offset = 0;
stream_->OnStreamFrame(
QuicStreamFrame(stream_->id(), false, offset, headers));
offset += headers.size();
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
stream_->ConsumeHeaderList();
// Receive data. It is consumed by TestStream.
std::string data = DataFrame(kDataFramePayload);
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, offset, data));
offset += data.size();
EXPECT_EQ(kDataFramePayload, stream_->data());
// Receive and consume trailers.
std::string trailers1 =
HeadersFrame({std::make_pair("custom-key", "custom-value")});
stream_->OnStreamFrame(
QuicStreamFrame(stream_->id(), false, offset, trailers1));
offset += trailers1.size();
EXPECT_TRUE(stream_->trailers_decompressed());
EXPECT_THAT(stream_->received_trailers(),
ElementsAre(Pair("custom-key", "custom-value")));
// Closing the connection is mocked out in tests. Instead, simply stop
// reading data at the stream level to prevent QuicSpdyStream from blowing up.
EXPECT_CALL(
*connection_,
CloseConnection(QUIC_HTTP_INVALID_FRAME_SEQUENCE_ON_SPDY_STREAM,
"HEADERS frame received after trailing HEADERS.",
ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET))
.WillOnce(InvokeWithoutArgs([this]() { stream_->StopReading(); }));
// Receive another HEADERS frame, with no header fields.
std::string trailers2 = HeadersFrame(SpdyHeaderBlock());
stream_->OnStreamFrame(
QuicStreamFrame(stream_->id(), false, offset, trailers2));
}
// Regression test for https://crbug.com/978733.
// Close connection if a DATA frame is received after the trailing HEADERS.
TEST_P(QuicSpdyStreamTest, DataAfterTrailers) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// Receive and consume headers.
std::string headers = HeadersFrame({std::make_pair("foo", "bar")});
QuicStreamOffset offset = 0;
stream_->OnStreamFrame(
QuicStreamFrame(stream_->id(), false, offset, headers));
offset += headers.size();
EXPECT_THAT(stream_->header_list(), ElementsAre(Pair("foo", "bar")));
stream_->ConsumeHeaderList();
// Receive data. It is consumed by TestStream.
std::string data1 = DataFrame(kDataFramePayload);
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, offset, data1));
offset += data1.size();
EXPECT_EQ(kDataFramePayload, stream_->data());
// Receive trailers, with single header field "custom-key: custom-value".
std::string trailers =
HeadersFrame({std::make_pair("custom-key", "custom-value")});
stream_->OnStreamFrame(
QuicStreamFrame(stream_->id(), false, offset, trailers));
offset += trailers.size();
EXPECT_THAT(stream_->received_trailers(),
ElementsAre(Pair("custom-key", "custom-value")));
// Closing the connection is mocked out in tests. Instead, simply stop
// reading data at the stream level to prevent QuicSpdyStream from blowing up.
EXPECT_CALL(
*connection_,
CloseConnection(QUIC_HTTP_INVALID_FRAME_SEQUENCE_ON_SPDY_STREAM,
"Unexpected DATA frame received.",
ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET))
.WillOnce(InvokeWithoutArgs([this]() { stream_->StopReading(); }));
// Receive more data.
std::string data2 = DataFrame("This payload should not be proccessed.");
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), false, offset, data2));
}
// SETTINGS frames are invalid on bidirectional streams. If one is received,
// the connection is closed. No more data should be processed.
TEST_P(QuicSpdyStreamTest, StopProcessingIfConnectionClosed) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
// SETTINGS frame with empty payload.
std::string settings = absl::HexStringToBytes("0400");
// HEADERS frame.
// Since it arrives after a SETTINGS frame, it should never be read.
std::string headers = HeadersFrame({std::make_pair("foo", "bar")});
// Combine the two frames to make sure they are processed in a single
// QuicSpdyStream::OnDataAvailable() call.
std::string frames = absl::StrCat(settings, headers);
EXPECT_EQ(0u, stream_->sequencer()->NumBytesConsumed());
EXPECT_CALL(*connection_,
CloseConnection(QUIC_HTTP_FRAME_UNEXPECTED_ON_SPDY_STREAM, _, _))
.WillOnce(
Invoke(connection_, &MockQuicConnection::ReallyCloseConnection));
EXPECT_CALL(*connection_, SendConnectionClosePacket(_, _, _));
EXPECT_CALL(*session_, OnConnectionClosed(_, _));
stream_->OnStreamFrame(QuicStreamFrame(stream_->id(), /* fin = */ false,
/* offset = */ 0, frames));
EXPECT_EQ(0u, stream_->sequencer()->NumBytesConsumed());
}
// Stream Cancellation instruction is sent on QPACK decoder stream
// when stream is reset.
TEST_P(QuicSpdyStreamTest, StreamCancellationWhenStreamReset) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
auto qpack_decoder_stream =
QuicSpdySessionPeer::GetQpackDecoderSendStream(session_.get());
// Stream type.
EXPECT_CALL(*session_,
WritevData(qpack_decoder_stream->id(), /* write_length = */ 1,
/* offset = */ 0, _, _, _));
// Stream cancellation.
EXPECT_CALL(*session_,
WritevData(qpack_decoder_stream->id(), /* write_length = */ 1,
/* offset = */ 1, _, _, _));
EXPECT_CALL(*session_, MaybeSendStopSendingFrame(
stream_->id(), QuicResetStreamError::FromInternal(
QUIC_STREAM_CANCELLED)));
EXPECT_CALL(
*session_,
MaybeSendRstStreamFrame(
stream_->id(),
QuicResetStreamError::FromInternal(QUIC_STREAM_CANCELLED), _));
stream_->Reset(QUIC_STREAM_CANCELLED);
}
// Stream Cancellation instruction is sent on QPACK decoder stream
// when RESET_STREAM frame is received.
TEST_P(QuicSpdyStreamTest, StreamCancellationOnResetReceived) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
auto qpack_decoder_stream =
QuicSpdySessionPeer::GetQpackDecoderSendStream(session_.get());
// Stream type.
EXPECT_CALL(*session_,
WritevData(qpack_decoder_stream->id(), /* write_length = */ 1,
/* offset = */ 0, _, _, _));
// Stream cancellation.
EXPECT_CALL(*session_,
WritevData(qpack_decoder_stream->id(), /* write_length = */ 1,
/* offset = */ 1, _, _, _));
stream_->OnStreamReset(QuicRstStreamFrame(
kInvalidControlFrameId, stream_->id(), QUIC_STREAM_CANCELLED, 0));
}
TEST_P(QuicSpdyStreamTest, WriteHeadersReturnValue) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
testing::InSequence s;
// Enable QPACK dynamic table.
session_->OnSetting(SETTINGS_QPACK_MAX_TABLE_CAPACITY, 1024);
session_->OnSetting(SETTINGS_QPACK_BLOCKED_STREAMS, 1);
EXPECT_CALL(*stream_, WriteHeadersMock(true));
QpackSendStream* encoder_stream =
QuicSpdySessionPeer::GetQpackEncoderSendStream(session_.get());
EXPECT_CALL(*session_, WritevData(encoder_stream->id(), _, _, _, _, _))
.Times(AnyNumber());
// HEADERS frame header.
EXPECT_CALL(*session_,
WritevData(stream_->id(), _, /* offset = */ 0, _, _, _));
// HEADERS frame payload.
size_t headers_frame_payload_length = 0;
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _))
.WillOnce(
DoAll(SaveArg<1>(&headers_frame_payload_length),
Invoke(session_.get(), &MockQuicSpdySession::ConsumeData)));
SpdyHeaderBlock request_headers;
request_headers["foo"] = "bar";
size_t write_headers_return_value =
stream_->WriteHeaders(std::move(request_headers), /*fin=*/true, nullptr);
EXPECT_TRUE(stream_->fin_sent());
EXPECT_EQ(headers_frame_payload_length, write_headers_return_value);
}
// Regression test for https://crbug.com/1177662.
// RESET_STREAM with QUIC_STREAM_NO_ERROR should not be treated in a special
// way: it should close the read side but not the write side.
TEST_P(QuicSpdyStreamTest, TwoResetStreamFrames) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
EXPECT_CALL(*session_, WritevData(_, _, _, _, _, _)).Times(AnyNumber());
QuicRstStreamFrame rst_frame1(kInvalidControlFrameId, stream_->id(),
QUIC_STREAM_CANCELLED, /* bytes_written = */ 0);
stream_->OnStreamReset(rst_frame1);
EXPECT_TRUE(stream_->read_side_closed());
EXPECT_FALSE(stream_->write_side_closed());
QuicRstStreamFrame rst_frame2(kInvalidControlFrameId, stream_->id(),
QUIC_STREAM_NO_ERROR, /* bytes_written = */ 0);
if (GetQuicReloadableFlag(quic_fix_on_stream_reset)) {
stream_->OnStreamReset(rst_frame2);
EXPECT_TRUE(stream_->read_side_closed());
EXPECT_FALSE(stream_->write_side_closed());
} else {
EXPECT_CALL(
*session_,
MaybeSendRstStreamFrame(
stream_->id(),
QuicResetStreamError::FromInternal(QUIC_RST_ACKNOWLEDGEMENT), _));
EXPECT_QUIC_BUG(
stream_->OnStreamReset(rst_frame2),
"The stream should've already sent RST in response to STOP_SENDING");
}
}
TEST_P(QuicSpdyStreamTest, ProcessOutgoingWebTransportHeadersDatagramDraft00) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
session_->EnableWebTransport();
session_->OnSetting(SETTINGS_ENABLE_CONNECT_PROTOCOL, 1);
QuicSpdySessionPeer::EnableWebTransport(session_.get());
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft00);
EXPECT_CALL(*stream_, WriteHeadersMock(false));
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _))
.Times(AnyNumber());
spdy::SpdyHeaderBlock headers;
headers[":method"] = "CONNECT";
headers[":protocol"] = "webtransport";
headers["datagram-flow-id"] = absl::StrCat(stream_->id());
stream_->WriteHeaders(std::move(headers), /*fin=*/false, nullptr);
ASSERT_TRUE(stream_->web_transport() != nullptr);
EXPECT_EQ(stream_->id(), stream_->web_transport()->id());
}
TEST_P(QuicSpdyStreamTest, ProcessOutgoingWebTransportHeadersDatagramDraft04) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
session_->EnableWebTransport();
session_->OnSetting(SETTINGS_ENABLE_CONNECT_PROTOCOL, 1);
QuicSpdySessionPeer::EnableWebTransport(session_.get());
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft04);
EXPECT_CALL(*stream_, WriteHeadersMock(false));
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _))
.Times(AnyNumber());
spdy::SpdyHeaderBlock headers;
headers[":method"] = "CONNECT";
headers[":protocol"] = "webtransport";
stream_->WriteHeaders(std::move(headers), /*fin=*/false, nullptr);
ASSERT_TRUE(stream_->web_transport() != nullptr);
EXPECT_EQ(stream_->id(), stream_->web_transport()->id());
}
TEST_P(QuicSpdyStreamTest, ProcessIncomingWebTransportHeadersDatagramDraft04) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
session_->EnableWebTransport();
QuicSpdySessionPeer::EnableWebTransport(session_.get());
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft04);
headers_[":method"] = "CONNECT";
headers_[":protocol"] = "webtransport";
stream_->OnStreamHeadersPriority(
spdy::SpdyStreamPrecedence(kV3HighestPriority));
ProcessHeaders(false, headers_);
stream_->OnCapsule(
Capsule::RegisterDatagramNoContext(DatagramFormatType::WEBTRANSPORT));
EXPECT_EQ("", stream_->data());
EXPECT_FALSE(stream_->header_list().empty());
EXPECT_FALSE(stream_->IsDoneReading());
ASSERT_TRUE(stream_->web_transport() != nullptr);
EXPECT_EQ(stream_->id(), stream_->web_transport()->id());
}
TEST_P(QuicSpdyStreamTest, ProcessIncomingWebTransportHeadersDatagramDraft00) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
session_->EnableWebTransport();
QuicSpdySessionPeer::EnableWebTransport(session_.get());
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft00);
headers_[":method"] = "CONNECT";
headers_[":protocol"] = "webtransport";
headers_["datagram-flow-id"] = absl::StrCat(stream_->id());
stream_->OnStreamHeadersPriority(
spdy::SpdyStreamPrecedence(kV3HighestPriority));
ProcessHeaders(false, headers_);
EXPECT_EQ("", stream_->data());
EXPECT_FALSE(stream_->header_list().empty());
EXPECT_FALSE(stream_->IsDoneReading());
ASSERT_TRUE(stream_->web_transport() != nullptr);
EXPECT_EQ(stream_->id(), stream_->web_transport()->id());
}
TEST_P(QuicSpdyStreamTest,
ProcessIncomingWebTransportHeadersWithMismatchedFlowId) {
if (!UsesHttp3()) {
return;
}
// TODO(b/181256914) Remove this test when we deprecate
// draft-ietf-masque-h3-datagram-00 in favor of later drafts.
Initialize(kShouldProcessData);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
session_->EnableWebTransport();
QuicSpdySessionPeer::EnableWebTransport(session_.get());
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft00);
headers_[":method"] = "CONNECT";
headers_[":protocol"] = "webtransport";
headers_["datagram-flow-id"] = "2";
stream_->OnStreamHeadersPriority(
spdy::SpdyStreamPrecedence(kV3HighestPriority));
ProcessHeaders(false, headers_);
EXPECT_EQ("", stream_->data());
EXPECT_FALSE(stream_->header_list().empty());
EXPECT_FALSE(stream_->IsDoneReading());
ASSERT_TRUE(stream_->web_transport() != nullptr);
EXPECT_EQ(stream_->id(), stream_->web_transport()->id());
}
TEST_P(QuicSpdyStreamTest, GetNextDatagramContextIdClient) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
::testing::NiceMock<MockHttp3DatagramRegistrationVisitor> visitor;
stream_->RegisterHttp3DatagramRegistrationVisitor(&visitor);
EXPECT_EQ(stream_->GetNextDatagramContextId(), 0u);
EXPECT_EQ(stream_->GetNextDatagramContextId(), 2u);
EXPECT_EQ(stream_->GetNextDatagramContextId(), 4u);
EXPECT_EQ(stream_->GetNextDatagramContextId(), 6u);
stream_->UnregisterHttp3DatagramRegistrationVisitor();
}
TEST_P(QuicSpdyStreamTest, GetNextDatagramContextIdServer) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_SERVER);
::testing::NiceMock<MockHttp3DatagramRegistrationVisitor> visitor;
stream_->RegisterHttp3DatagramRegistrationVisitor(&visitor);
EXPECT_EQ(stream_->GetNextDatagramContextId(), 1u);
EXPECT_EQ(stream_->GetNextDatagramContextId(), 3u);
EXPECT_EQ(stream_->GetNextDatagramContextId(), 5u);
EXPECT_EQ(stream_->GetNextDatagramContextId(), 7u);
stream_->UnregisterHttp3DatagramRegistrationVisitor();
}
TEST_P(QuicSpdyStreamTest, HttpDatagramRegistrationWithoutContextDraft00) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft00);
session_->RegisterHttp3DatagramFlowId(stream_->id(), stream_->id());
::testing::NiceMock<MockHttp3DatagramRegistrationVisitor>
h3_datagram_registration_visitor;
SavingHttp3DatagramVisitor h3_datagram_visitor;
absl::optional<QuicDatagramContextId> context_id;
absl::string_view format_additional_data;
ASSERT_EQ(QuicDataWriter::GetVarInt62Len(stream_->id()), 1);
std::array<char, 256> datagram;
datagram[0] = stream_->id();
for (size_t i = 1; i < datagram.size(); i++) {
datagram[i] = i;
}
stream_->RegisterHttp3DatagramRegistrationVisitor(
&h3_datagram_registration_visitor);
stream_->RegisterHttp3DatagramContextId(
context_id, DatagramFormatType::UDP_PAYLOAD, format_additional_data,
&h3_datagram_visitor);
session_->OnMessageReceived(
absl::string_view(datagram.data(), datagram.size()));
EXPECT_THAT(h3_datagram_visitor.received_h3_datagrams(),
ElementsAre(SavingHttp3DatagramVisitor::SavedHttp3Datagram{
stream_->id(), context_id,
std::string(&datagram[1], datagram.size() - 1)}));
// Test move.
::testing::NiceMock<MockHttp3DatagramRegistrationVisitor>
h3_datagram_registration_visitor2;
stream_->MoveHttp3DatagramRegistration(&h3_datagram_registration_visitor2);
SavingHttp3DatagramVisitor h3_datagram_visitor2;
stream_->MoveHttp3DatagramContextIdRegistration(context_id,
&h3_datagram_visitor2);
EXPECT_TRUE(h3_datagram_visitor2.received_h3_datagrams().empty());
session_->OnMessageReceived(
absl::string_view(datagram.data(), datagram.size()));
EXPECT_THAT(h3_datagram_visitor2.received_h3_datagrams(),
ElementsAre(SavingHttp3DatagramVisitor::SavedHttp3Datagram{
stream_->id(), context_id,
std::string(&datagram[1], datagram.size() - 1)}));
// Cleanup.
stream_->UnregisterHttp3DatagramContextId(context_id);
stream_->UnregisterHttp3DatagramRegistrationVisitor();
session_->UnregisterHttp3DatagramFlowId(stream_->id());
}
TEST_P(QuicSpdyStreamTest, H3DatagramRegistrationWithoutContextDraft04) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft04);
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft04);
::testing::NiceMock<MockHttp3DatagramRegistrationVisitor>
h3_datagram_registration_visitor;
SavingHttp3DatagramVisitor h3_datagram_visitor;
absl::optional<QuicDatagramContextId> context_id;
absl::string_view format_additional_data;
ASSERT_EQ(QuicDataWriter::GetVarInt62Len(stream_->id()), 1);
std::array<char, 256> datagram;
datagram[0] = stream_->id();
for (size_t i = 1; i < datagram.size(); i++) {
datagram[i] = i;
}
stream_->RegisterHttp3DatagramRegistrationVisitor(
&h3_datagram_registration_visitor);
// Expect us to send a REGISTER_DATAGRAM_NO_CONTEXT capsule.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _))
.Times(AtLeast(1));
stream_->RegisterHttp3DatagramContextId(
context_id, DatagramFormatType::UDP_PAYLOAD, format_additional_data,
&h3_datagram_visitor);
session_->OnMessageReceived(
absl::string_view(datagram.data(), datagram.size()));
EXPECT_THAT(h3_datagram_visitor.received_h3_datagrams(),
ElementsAre(SavingHttp3DatagramVisitor::SavedHttp3Datagram{
stream_->id(), context_id,
std::string(&datagram[1], datagram.size() - 1)}));
// Test move.
::testing::NiceMock<MockHttp3DatagramRegistrationVisitor>
h3_datagram_registration_visitor2;
stream_->MoveHttp3DatagramRegistration(&h3_datagram_registration_visitor2);
SavingHttp3DatagramVisitor h3_datagram_visitor2;
stream_->MoveHttp3DatagramContextIdRegistration(context_id,
&h3_datagram_visitor2);
EXPECT_TRUE(h3_datagram_visitor2.received_h3_datagrams().empty());
session_->OnMessageReceived(
absl::string_view(datagram.data(), datagram.size()));
EXPECT_THAT(h3_datagram_visitor2.received_h3_datagrams(),
ElementsAre(SavingHttp3DatagramVisitor::SavedHttp3Datagram{
stream_->id(), context_id,
std::string(&datagram[1], datagram.size() - 1)}));
// Cleanup.
stream_->UnregisterHttp3DatagramContextId(context_id);
stream_->UnregisterHttp3DatagramRegistrationVisitor();
}
TEST_P(QuicSpdyStreamTest, HttpDatagramRegistrationWithContext) {
if (!UsesHttp3()) {
return;
}
InitializeWithPerspective(kShouldProcessData, Perspective::IS_CLIENT);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft04);
::testing::NiceMock<MockHttp3DatagramRegistrationVisitor>
h3_datagram_registration_visitor;
SavingHttp3DatagramVisitor h3_datagram_visitor;
absl::optional<QuicDatagramContextId> context_id = 42;
absl::string_view format_additional_data;
ASSERT_EQ(QuicDataWriter::GetVarInt62Len(stream_->id()), 1);
std::array<char, 256> datagram;
datagram[0] = stream_->id();
datagram[1] = context_id.value();
for (size_t i = 2; i < datagram.size(); i++) {
datagram[i] = i;
}
stream_->RegisterHttp3DatagramRegistrationVisitor(
&h3_datagram_registration_visitor);
// Expect us to send a REGISTER_DATAGRAM_CONTEXT capsule.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _))
.Times(AtLeast(1));
stream_->RegisterHttp3DatagramContextId(
context_id, DatagramFormatType::UDP_PAYLOAD, format_additional_data,
&h3_datagram_visitor);
session_->OnMessageReceived(
absl::string_view(datagram.data(), datagram.size()));
EXPECT_THAT(h3_datagram_visitor.received_h3_datagrams(),
ElementsAre(SavingHttp3DatagramVisitor::SavedHttp3Datagram{
stream_->id(), context_id,
std::string(&datagram[2], datagram.size() - 2)}));
// Test move.
::testing::NiceMock<MockHttp3DatagramRegistrationVisitor>
h3_datagram_registration_visitor2;
stream_->MoveHttp3DatagramRegistration(&h3_datagram_registration_visitor2);
SavingHttp3DatagramVisitor h3_datagram_visitor2;
stream_->MoveHttp3DatagramContextIdRegistration(context_id,
&h3_datagram_visitor2);
EXPECT_TRUE(h3_datagram_visitor2.received_h3_datagrams().empty());
session_->OnMessageReceived(
absl::string_view(datagram.data(), datagram.size()));
EXPECT_THAT(h3_datagram_visitor2.received_h3_datagrams(),
ElementsAre(SavingHttp3DatagramVisitor::SavedHttp3Datagram{
stream_->id(), context_id,
std::string(&datagram[2], datagram.size() - 2)}));
// Cleanup.
// Expect us to send a CLOSE_DATAGRAM_CONTEXT capsule.
EXPECT_CALL(*session_, WritevData(stream_->id(), _, _, _, _, _))
.Times(AtLeast(1));
stream_->UnregisterHttp3DatagramContextId(context_id);
stream_->UnregisterHttp3DatagramRegistrationVisitor();
session_->UnregisterHttp3DatagramFlowId(stream_->id());
}
TEST_P(QuicSpdyStreamTest, SendHttp3Datagram) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft04);
absl::optional<QuicDatagramContextId> context_id;
std::string h3_datagram_payload = {1, 2, 3, 4, 5, 6};
EXPECT_CALL(*connection_, SendMessage(1, _, false))
.WillOnce(Return(MESSAGE_STATUS_SUCCESS));
EXPECT_EQ(stream_->SendHttp3Datagram(context_id, h3_datagram_payload),
MESSAGE_STATUS_SUCCESS);
}
TEST_P(QuicSpdyStreamTest, GetMaxDatagramSize) {
if (!UsesHttp3()) {
return;
}
Initialize(kShouldProcessData);
session_->set_local_http_datagram_support(HttpDatagramSupport::kDraft00And04);
QuicSpdySessionPeer::SetHttpDatagramSupport(session_.get(),
HttpDatagramSupport::kDraft04);
QuicByteCount size = stream_->GetMaxDatagramSize(absl::nullopt);
QuicByteCount size_with_context =
stream_->GetMaxDatagramSize(/*context_id=*/1);
EXPECT_GT(size, 512u);
EXPECT_EQ(size - 1, size_with_context);
}
} // namespace
} // namespace test
} // namespace quic