blob: 7bac18ec95b84aae7628ab30d217d6b414768a49 [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/tools/quic_simple_server_stream.h"
6
7#include <list>
8#include <memory>
9#include <utility>
10
11#include "net/third_party/quiche/src/quic/core/http/spdy_utils.h"
12#include "net/third_party/quiche/src/quic/core/quic_utils.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050013#include "net/third_party/quiche/src/quic/platform/api/quic_arraysize.h"
14#include "net/third_party/quiche/src/quic/platform/api/quic_expect_bug.h"
15#include "net/third_party/quiche/src/quic/platform/api/quic_ptr_util.h"
16#include "net/third_party/quiche/src/quic/platform/api/quic_socket_address.h"
17#include "net/third_party/quiche/src/quic/platform/api/quic_test.h"
18#include "net/third_party/quiche/src/quic/test_tools/crypto_test_utils.h"
19#include "net/third_party/quiche/src/quic/test_tools/quic_session_peer.h"
20#include "net/third_party/quiche/src/quic/test_tools/quic_spdy_session_peer.h"
21#include "net/third_party/quiche/src/quic/test_tools/quic_stream_peer.h"
22#include "net/third_party/quiche/src/quic/test_tools/quic_test_utils.h"
23#include "net/third_party/quiche/src/quic/tools/quic_backend_response.h"
24#include "net/third_party/quiche/src/quic/tools/quic_memory_cache_backend.h"
25#include "net/third_party/quiche/src/quic/tools/quic_simple_server_session.h"
26
27using testing::_;
28using testing::AnyNumber;
29using testing::InSequence;
30using testing::Invoke;
31using testing::Return;
32using testing::StrictMock;
33using testing::ValuesIn;
34
35namespace quic {
36namespace test {
37
38const size_t kFakeFrameLen = 60;
39const size_t kErrorLength = strlen(QuicSimpleServerStream::kErrorResponseBody);
40const size_t kDataFrameHeaderLength = 2;
41
42class TestStream : public QuicSimpleServerStream {
43 public:
44 TestStream(QuicStreamId stream_id,
45 QuicSpdySession* session,
46 StreamType type,
47 QuicSimpleServerBackend* quic_simple_server_backend)
48 : QuicSimpleServerStream(stream_id,
49 session,
50 type,
51 quic_simple_server_backend) {}
52
53 ~TestStream() override = default;
54
55 MOCK_METHOD1(WriteHeadersMock, void(bool fin));
56
dschinazi17d42422019-06-18 16:35:07 -070057 size_t WriteHeaders(spdy::SpdyHeaderBlock /*header_block*/,
QUICHE teama6ef0a62019-03-07 20:34:33 -050058 bool fin,
59 QuicReferenceCountedPointer<QuicAckListenerInterface>
dschinazi17d42422019-06-18 16:35:07 -070060 /*ack_listener*/) override {
QUICHE teama6ef0a62019-03-07 20:34:33 -050061 WriteHeadersMock(fin);
62 return 0;
63 }
64
65 // Expose protected QuicSimpleServerStream methods.
66 void DoSendResponse() { SendResponse(); }
67 void DoSendErrorResponse() { SendErrorResponse(); }
68
69 spdy::SpdyHeaderBlock* mutable_headers() { return &request_headers_; }
vasilvvc48c8712019-03-11 13:38:16 -070070 void set_body(std::string body) { body_ = std::move(body); }
71 const std::string& body() const { return body_; }
QUICHE teama6ef0a62019-03-07 20:34:33 -050072 int content_length() const { return content_length_; }
73
74 QuicStringPiece GetHeader(QuicStringPiece key) const {
75 auto it = request_headers_.find(key);
76 DCHECK(it != request_headers_.end());
77 return it->second;
78 }
79};
80
81namespace {
82
83class MockQuicSimpleServerSession : public QuicSimpleServerSession {
84 public:
85 const size_t kMaxStreamsForTest = 100;
86
87 MockQuicSimpleServerSession(
88 QuicConnection* connection,
89 MockQuicSessionVisitor* owner,
90 MockQuicCryptoServerStreamHelper* helper,
91 QuicCryptoServerConfig* crypto_config,
92 QuicCompressedCertsCache* compressed_certs_cache,
93 QuicSimpleServerBackend* quic_simple_server_backend)
94 : QuicSimpleServerSession(DefaultQuicConfig(),
95 CurrentSupportedVersions(),
96 connection,
97 owner,
98 helper,
99 crypto_config,
100 compressed_certs_cache,
101 quic_simple_server_backend) {
fkastenholz305e1732019-06-18 05:01:22 -0700102 if (VersionHasIetfQuicFrames(connection->transport_version())) {
fkastenholzd3a1de92019-05-15 07:00:07 -0700103 QuicSessionPeer::SetMaxOpenIncomingUnidirectionalStreams(
104 this, kMaxStreamsForTest);
105 QuicSessionPeer::SetMaxOpenIncomingBidirectionalStreams(
106 this, kMaxStreamsForTest);
107 } else {
108 QuicSessionPeer::SetMaxOpenIncomingStreams(this, kMaxStreamsForTest);
109 QuicSessionPeer::SetMaxOpenOutgoingStreams(this, kMaxStreamsForTest);
110 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500111 ON_CALL(*this, WritevData(_, _, _, _, _))
112 .WillByDefault(Invoke(MockQuicSession::ConsumeData));
113 }
114
115 MockQuicSimpleServerSession(const MockQuicSimpleServerSession&) = delete;
116 MockQuicSimpleServerSession& operator=(const MockQuicSimpleServerSession&) =
117 delete;
118 ~MockQuicSimpleServerSession() override = default;
119
fkastenholz5d880a92019-06-21 09:01:56 -0700120 MOCK_METHOD2(OnConnectionClosed,
121 void(const QuicConnectionCloseFrame& frame,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500122 ConnectionCloseSource source));
123 MOCK_METHOD1(CreateIncomingStream, QuicSpdyStream*(QuicStreamId id));
124 MOCK_METHOD5(WritevData,
125 QuicConsumedData(QuicStream* stream,
126 QuicStreamId id,
127 size_t write_length,
128 QuicStreamOffset offset,
129 StreamSendingState state));
130 MOCK_METHOD4(OnStreamHeaderList,
131 void(QuicStreamId stream_id,
132 bool fin,
133 size_t frame_len,
134 const QuicHeaderList& header_list));
135 MOCK_METHOD2(OnStreamHeadersPriority,
136 void(QuicStreamId stream_id, spdy::SpdyPriority priority));
137 MOCK_METHOD3(SendRstStream,
138 void(QuicStreamId stream_id,
139 QuicRstStreamErrorCode error,
140 QuicStreamOffset bytes_written));
141 MOCK_METHOD1(OnHeadersHeadOfLineBlocking, void(QuicTime::Delta delta));
142 // Matchers cannot be used on non-copyable types like SpdyHeaderBlock.
143 void PromisePushResources(
vasilvvc48c8712019-03-11 13:38:16 -0700144 const std::string& request_url,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500145 const std::list<QuicBackendResponse::ServerPushInfo>& resources,
146 QuicStreamId original_stream_id,
147 const spdy::SpdyHeaderBlock& original_request_headers) override {
148 original_request_headers_ = original_request_headers.Clone();
149 PromisePushResourcesMock(request_url, resources, original_stream_id,
150 original_request_headers);
151 }
152 MOCK_METHOD4(PromisePushResourcesMock,
vasilvvc48c8712019-03-11 13:38:16 -0700153 void(const std::string&,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500154 const std::list<QuicBackendResponse::ServerPushInfo>&,
155 QuicStreamId,
156 const spdy::SpdyHeaderBlock&));
157
158 using QuicSession::ActivateStream;
159
160 MOCK_METHOD1(OnStopSendingReceived, void(const QuicStopSendingFrame& frame));
161
162 spdy::SpdyHeaderBlock original_request_headers_;
163};
164
165class QuicSimpleServerStreamTest : public QuicTestWithParam<ParsedQuicVersion> {
166 public:
167 QuicSimpleServerStreamTest()
168 : connection_(
169 new StrictMock<MockQuicConnection>(&helper_,
170 &alarm_factory_,
171 Perspective::IS_SERVER,
172 SupportedVersions(GetParam()))),
173 crypto_config_(new QuicCryptoServerConfig(
174 QuicCryptoServerConfig::TESTING,
175 QuicRandom::GetInstance(),
176 crypto_test_utils::ProofSourceForTesting(),
nharper6ebe83b2019-06-13 17:43:52 -0700177 KeyExchangeSource::Default())),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500178 compressed_certs_cache_(
179 QuicCompressedCertsCache::kQuicCompressedCertsCacheSize),
180 session_(connection_,
181 &session_owner_,
182 &session_helper_,
183 crypto_config_.get(),
184 &compressed_certs_cache_,
185 &memory_cache_backend_),
186 quic_response_(new QuicBackendResponse),
187 body_("hello world") {
188 connection_->set_visitor(&session_);
189 header_list_.OnHeaderBlockStart();
190 header_list_.OnHeader(":authority", "www.google.com");
191 header_list_.OnHeader(":path", "/");
192 header_list_.OnHeader(":method", "POST");
193 header_list_.OnHeader(":version", "HTTP/1.1");
194 header_list_.OnHeader("content-length", "11");
195
196 header_list_.OnHeaderBlockEnd(128, 128);
197
198 // New streams rely on having the peer's flow control receive window
199 // negotiated in the config.
200 session_.config()->SetInitialStreamFlowControlWindowToSend(
201 kInitialStreamFlowControlWindowForTest);
202 session_.config()->SetInitialSessionFlowControlWindowToSend(
203 kInitialSessionFlowControlWindowForTest);
204 stream_ = new StrictMock<TestStream>(
205 GetNthClientInitiatedBidirectionalStreamId(
206 connection_->transport_version(), 0),
207 &session_, BIDIRECTIONAL, &memory_cache_backend_);
208 // Register stream_ in dynamic_stream_map_ and pass ownership to session_.
209 session_.ActivateStream(QuicWrapUnique(stream_));
210 connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
211 }
212
vasilvvc48c8712019-03-11 13:38:16 -0700213 const std::string& StreamBody() { return stream_->body(); }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500214
vasilvvc48c8712019-03-11 13:38:16 -0700215 std::string StreamHeadersValue(const std::string& key) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500216 return (*stream_->mutable_headers())[key].as_string();
217 }
218
QUICHE teama6ef0a62019-03-07 20:34:33 -0500219 bool HasFrameHeader() const {
220 return VersionHasDataFrameHeader(connection_->transport_version());
221 }
222
223 spdy::SpdyHeaderBlock response_headers_;
224 MockQuicConnectionHelper helper_;
225 MockAlarmFactory alarm_factory_;
226 StrictMock<MockQuicConnection>* connection_;
227 StrictMock<MockQuicSessionVisitor> session_owner_;
228 StrictMock<MockQuicCryptoServerStreamHelper> session_helper_;
229 std::unique_ptr<QuicCryptoServerConfig> crypto_config_;
230 QuicCompressedCertsCache compressed_certs_cache_;
231 QuicMemoryCacheBackend memory_cache_backend_;
232 StrictMock<MockQuicSimpleServerSession> session_;
233 StrictMock<TestStream>* stream_; // Owned by session_.
234 std::unique_ptr<QuicBackendResponse> quic_response_;
vasilvvc48c8712019-03-11 13:38:16 -0700235 std::string body_;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500236 QuicHeaderList header_list_;
237 HttpEncoder encoder_;
238};
239
240INSTANTIATE_TEST_SUITE_P(Tests,
241 QuicSimpleServerStreamTest,
242 ValuesIn(AllSupportedVersions()));
243
244TEST_P(QuicSimpleServerStreamTest, TestFraming) {
245 EXPECT_CALL(session_, WritevData(_, _, _, _, _))
246 .WillRepeatedly(Invoke(MockQuicSession::ConsumeData));
247 stream_->OnStreamHeaderList(false, kFakeFrameLen, header_list_);
248 std::unique_ptr<char[]> buffer;
249 QuicByteCount header_length =
250 encoder_.SerializeDataFrameHeader(body_.length(), &buffer);
vasilvvc48c8712019-03-11 13:38:16 -0700251 std::string header = std::string(buffer.get(), header_length);
252 std::string data = HasFrameHeader() ? header + body_ : body_;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500253 stream_->OnStreamFrame(
254 QuicStreamFrame(stream_->id(), /*fin=*/false, /*offset=*/0, data));
255 EXPECT_EQ("11", StreamHeadersValue("content-length"));
256 EXPECT_EQ("/", StreamHeadersValue(":path"));
257 EXPECT_EQ("POST", StreamHeadersValue(":method"));
258 EXPECT_EQ(body_, StreamBody());
259}
260
261TEST_P(QuicSimpleServerStreamTest, TestFramingOnePacket) {
262 EXPECT_CALL(session_, WritevData(_, _, _, _, _))
263 .WillRepeatedly(Invoke(MockQuicSession::ConsumeData));
264
265 stream_->OnStreamHeaderList(false, kFakeFrameLen, header_list_);
266 std::unique_ptr<char[]> buffer;
267 QuicByteCount header_length =
268 encoder_.SerializeDataFrameHeader(body_.length(), &buffer);
vasilvvc48c8712019-03-11 13:38:16 -0700269 std::string header = std::string(buffer.get(), header_length);
270 std::string data = HasFrameHeader() ? header + body_ : body_;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500271 stream_->OnStreamFrame(
272 QuicStreamFrame(stream_->id(), /*fin=*/false, /*offset=*/0, data));
273 EXPECT_EQ("11", StreamHeadersValue("content-length"));
274 EXPECT_EQ("/", StreamHeadersValue(":path"));
275 EXPECT_EQ("POST", StreamHeadersValue(":method"));
276 EXPECT_EQ(body_, StreamBody());
277}
278
279TEST_P(QuicSimpleServerStreamTest, SendQuicRstStreamNoErrorInStopReading) {
280 EXPECT_CALL(session_, WritevData(_, _, _, _, _))
281 .WillRepeatedly(Invoke(MockQuicSession::ConsumeData));
282
283 EXPECT_FALSE(stream_->fin_received());
284 EXPECT_FALSE(stream_->rst_received());
285
286 stream_->set_fin_sent(true);
287 stream_->CloseWriteSide();
288
289 EXPECT_CALL(session_, SendRstStream(_, QUIC_STREAM_NO_ERROR, _)).Times(1);
290 stream_->StopReading();
291}
292
293TEST_P(QuicSimpleServerStreamTest, TestFramingExtraData) {
nharperf5e68452019-05-29 17:24:18 -0700294 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
295 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
296 // enabled and fix it.
297 return;
298 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500299 InSequence seq;
vasilvvc48c8712019-03-11 13:38:16 -0700300 std::string large_body = "hello world!!!!!!";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500301
302 // We'll automatically write out an error (headers + body)
303 EXPECT_CALL(*stream_, WriteHeadersMock(false));
304 if (HasFrameHeader()) {
305 EXPECT_CALL(session_, WritevData(_, _, kDataFrameHeaderLength, _, NO_FIN));
306 }
307 EXPECT_CALL(session_, WritevData(_, _, kErrorLength, _, FIN));
308
309 EXPECT_CALL(session_, SendRstStream(_, QUIC_STREAM_NO_ERROR, _)).Times(0);
310
311 stream_->OnStreamHeaderList(false, kFakeFrameLen, header_list_);
312 std::unique_ptr<char[]> buffer;
313 QuicByteCount header_length =
314 encoder_.SerializeDataFrameHeader(body_.length(), &buffer);
vasilvvc48c8712019-03-11 13:38:16 -0700315 std::string header = std::string(buffer.get(), header_length);
316 std::string data = HasFrameHeader() ? header + body_ : body_;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500317
318 stream_->OnStreamFrame(
319 QuicStreamFrame(stream_->id(), /*fin=*/false, /*offset=*/0, data));
320 // Content length is still 11. This will register as an error and we won't
321 // accept the bytes.
322 header_length =
323 encoder_.SerializeDataFrameHeader(large_body.length(), &buffer);
vasilvvc48c8712019-03-11 13:38:16 -0700324 header = std::string(buffer.get(), header_length);
325 std::string data2 = HasFrameHeader() ? header + large_body : large_body;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500326 stream_->OnStreamFrame(
327 QuicStreamFrame(stream_->id(), /*fin=*/true, data.size(), data2));
328 EXPECT_EQ("11", StreamHeadersValue("content-length"));
329 EXPECT_EQ("/", StreamHeadersValue(":path"));
330 EXPECT_EQ("POST", StreamHeadersValue(":method"));
331}
332
333TEST_P(QuicSimpleServerStreamTest, SendResponseWithIllegalResponseStatus) {
nharperf5e68452019-05-29 17:24:18 -0700334 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
335 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
336 // enabled and fix it.
337 return;
338 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500339 // Send an illegal response with response status not supported by HTTP/2.
340 spdy::SpdyHeaderBlock* request_headers = stream_->mutable_headers();
341 (*request_headers)[":path"] = "/bar";
342 (*request_headers)[":authority"] = "www.google.com";
343 (*request_headers)[":version"] = "HTTP/1.1";
344 (*request_headers)[":method"] = "GET";
345
346 response_headers_[":version"] = "HTTP/1.1";
347 // HTTP/2 only supports integer responsecode, so "200 OK" is illegal.
348 response_headers_[":status"] = "200 OK";
349 response_headers_["content-length"] = "5";
vasilvvc48c8712019-03-11 13:38:16 -0700350 std::string body = "Yummm";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500351 std::unique_ptr<char[]> buffer;
352 QuicByteCount header_length =
353 encoder_.SerializeDataFrameHeader(body.length(), &buffer);
354
355 memory_cache_backend_.AddResponse("www.google.com", "/bar",
356 std::move(response_headers_), body);
357
358 stream_->set_fin_received(true);
359
360 InSequence s;
361 EXPECT_CALL(*stream_, WriteHeadersMock(false));
362 if (HasFrameHeader()) {
363 EXPECT_CALL(session_, WritevData(_, _, header_length, _, NO_FIN));
364 }
365 EXPECT_CALL(session_, WritevData(_, _, kErrorLength, _, FIN));
366
367 stream_->DoSendResponse();
368 EXPECT_FALSE(QuicStreamPeer::read_side_closed(stream_));
369 EXPECT_TRUE(stream_->write_side_closed());
370}
371
372TEST_P(QuicSimpleServerStreamTest, SendResponseWithIllegalResponseStatus2) {
nharperf5e68452019-05-29 17:24:18 -0700373 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
374 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
375 // enabled and fix it.
376 return;
377 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500378 // Send an illegal response with response status not supported by HTTP/2.
379 spdy::SpdyHeaderBlock* request_headers = stream_->mutable_headers();
380 (*request_headers)[":path"] = "/bar";
381 (*request_headers)[":authority"] = "www.google.com";
382 (*request_headers)[":version"] = "HTTP/1.1";
383 (*request_headers)[":method"] = "GET";
384
385 response_headers_[":version"] = "HTTP/1.1";
386 // HTTP/2 only supports 3-digit-integer, so "+200" is illegal.
387 response_headers_[":status"] = "+200";
388 response_headers_["content-length"] = "5";
vasilvvc48c8712019-03-11 13:38:16 -0700389 std::string body = "Yummm";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500390
391 std::unique_ptr<char[]> buffer;
392 QuicByteCount header_length =
393 encoder_.SerializeDataFrameHeader(body.length(), &buffer);
394
395 memory_cache_backend_.AddResponse("www.google.com", "/bar",
396 std::move(response_headers_), body);
397
398 stream_->set_fin_received(true);
399
400 InSequence s;
401 EXPECT_CALL(*stream_, WriteHeadersMock(false));
402 if (HasFrameHeader()) {
403 EXPECT_CALL(session_, WritevData(_, _, header_length, _, NO_FIN));
404 }
405 EXPECT_CALL(session_, WritevData(_, _, kErrorLength, _, FIN));
406
407 stream_->DoSendResponse();
408 EXPECT_FALSE(QuicStreamPeer::read_side_closed(stream_));
409 EXPECT_TRUE(stream_->write_side_closed());
410}
411
412TEST_P(QuicSimpleServerStreamTest, SendPushResponseWith404Response) {
413 // Create a new promised stream with even id().
414 auto promised_stream = new StrictMock<TestStream>(
415 GetNthServerInitiatedUnidirectionalStreamId(
416 connection_->transport_version(), 0),
417 &session_, WRITE_UNIDIRECTIONAL, &memory_cache_backend_);
418 session_.ActivateStream(QuicWrapUnique(promised_stream));
419
420 // Send a push response with response status 404, which will be regarded as
421 // invalid server push response.
422 spdy::SpdyHeaderBlock* request_headers = promised_stream->mutable_headers();
423 (*request_headers)[":path"] = "/bar";
424 (*request_headers)[":authority"] = "www.google.com";
425 (*request_headers)[":version"] = "HTTP/1.1";
426 (*request_headers)[":method"] = "GET";
427
428 response_headers_[":version"] = "HTTP/1.1";
429 response_headers_[":status"] = "404";
430 response_headers_["content-length"] = "8";
vasilvvc48c8712019-03-11 13:38:16 -0700431 std::string body = "NotFound";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500432
433 memory_cache_backend_.AddResponse("www.google.com", "/bar",
434 std::move(response_headers_), body);
435
436 InSequence s;
437 EXPECT_CALL(session_,
438 SendRstStream(promised_stream->id(), QUIC_STREAM_CANCELLED, 0));
439
440 promised_stream->DoSendResponse();
441}
442
443TEST_P(QuicSimpleServerStreamTest, SendResponseWithValidHeaders) {
nharperf5e68452019-05-29 17:24:18 -0700444 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
445 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
446 // enabled and fix it.
447 return;
448 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500449 // Add a request and response with valid headers.
450 spdy::SpdyHeaderBlock* request_headers = stream_->mutable_headers();
451 (*request_headers)[":path"] = "/bar";
452 (*request_headers)[":authority"] = "www.google.com";
453 (*request_headers)[":version"] = "HTTP/1.1";
454 (*request_headers)[":method"] = "GET";
455
456 response_headers_[":version"] = "HTTP/1.1";
457 response_headers_[":status"] = "200";
458 response_headers_["content-length"] = "5";
vasilvvc48c8712019-03-11 13:38:16 -0700459 std::string body = "Yummm";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500460
461 std::unique_ptr<char[]> buffer;
462 QuicByteCount header_length =
463 encoder_.SerializeDataFrameHeader(body.length(), &buffer);
464
465 memory_cache_backend_.AddResponse("www.google.com", "/bar",
466 std::move(response_headers_), body);
467 stream_->set_fin_received(true);
468
469 InSequence s;
470 EXPECT_CALL(*stream_, WriteHeadersMock(false));
471 if (HasFrameHeader()) {
472 EXPECT_CALL(session_, WritevData(_, _, header_length, _, NO_FIN));
473 }
474 EXPECT_CALL(session_, WritevData(_, _, body.length(), _, FIN));
475
476 stream_->DoSendResponse();
477 EXPECT_FALSE(QuicStreamPeer::read_side_closed(stream_));
478 EXPECT_TRUE(stream_->write_side_closed());
479}
480
481TEST_P(QuicSimpleServerStreamTest, SendResponseWithPushResources) {
nharperf5e68452019-05-29 17:24:18 -0700482 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
483 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
484 // enabled and fix it.
485 return;
486 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500487 // Tests that if a response has push resources to be send, SendResponse() will
488 // call PromisePushResources() to handle these resources.
489
490 // Add a request and response with valid headers into cache.
vasilvvc48c8712019-03-11 13:38:16 -0700491 std::string host = "www.google.com";
492 std::string request_path = "/foo";
493 std::string body = "Yummm";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500494 std::unique_ptr<char[]> buffer;
495 QuicByteCount header_length =
496 encoder_.SerializeDataFrameHeader(body.length(), &buffer);
497 QuicBackendResponse::ServerPushInfo push_info(
498 QuicUrl(host, "/bar"), spdy::SpdyHeaderBlock(),
499 QuicStream::kDefaultPriority, "Push body");
500 std::list<QuicBackendResponse::ServerPushInfo> push_resources;
501 push_resources.push_back(push_info);
502 memory_cache_backend_.AddSimpleResponseWithServerPushResources(
503 host, request_path, 200, body, push_resources);
504
505 spdy::SpdyHeaderBlock* request_headers = stream_->mutable_headers();
506 (*request_headers)[":path"] = request_path;
507 (*request_headers)[":authority"] = host;
508 (*request_headers)[":version"] = "HTTP/1.1";
509 (*request_headers)[":method"] = "GET";
510
511 stream_->set_fin_received(true);
512 InSequence s;
513 EXPECT_CALL(session_, PromisePushResourcesMock(
514 host + request_path, _,
515 GetNthClientInitiatedBidirectionalStreamId(
516 connection_->transport_version(), 0),
517 _));
518 EXPECT_CALL(*stream_, WriteHeadersMock(false));
519 if (HasFrameHeader()) {
520 EXPECT_CALL(session_, WritevData(_, _, header_length, _, NO_FIN));
521 }
522 EXPECT_CALL(session_, WritevData(_, _, body.length(), _, FIN));
523 stream_->DoSendResponse();
524 EXPECT_EQ(*request_headers, session_.original_request_headers_);
525}
526
527TEST_P(QuicSimpleServerStreamTest, PushResponseOnClientInitiatedStream) {
528 // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
529 if (GetParam() != AllSupportedVersions()[0]) {
530 return;
531 }
532
533 // Calling PushResponse() on a client initialted stream is never supposed to
534 // happen.
535 EXPECT_QUIC_BUG(stream_->PushResponse(spdy::SpdyHeaderBlock()),
536 "Client initiated stream"
537 " shouldn't be used as promised stream.");
538}
539
540TEST_P(QuicSimpleServerStreamTest, PushResponseOnServerInitiatedStream) {
nharperf5e68452019-05-29 17:24:18 -0700541 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
542 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
543 // enabled and fix it.
544 return;
545 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500546 // Tests that PushResponse() should take the given headers as request headers
547 // and fetch response from cache, and send it out.
548
549 // Create a stream with even stream id and test against this stream.
550 const QuicStreamId kServerInitiatedStreamId =
551 GetNthServerInitiatedUnidirectionalStreamId(
552 connection_->transport_version(), 0);
553 // Create a server initiated stream and pass it to session_.
554 auto server_initiated_stream =
555 new StrictMock<TestStream>(kServerInitiatedStreamId, &session_,
556 WRITE_UNIDIRECTIONAL, &memory_cache_backend_);
557 session_.ActivateStream(QuicWrapUnique(server_initiated_stream));
558
vasilvvc48c8712019-03-11 13:38:16 -0700559 const std::string kHost = "www.foo.com";
560 const std::string kPath = "/bar";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500561 spdy::SpdyHeaderBlock headers;
562 headers[":path"] = kPath;
563 headers[":authority"] = kHost;
564 headers[":version"] = "HTTP/1.1";
565 headers[":method"] = "GET";
566
567 response_headers_[":version"] = "HTTP/1.1";
568 response_headers_[":status"] = "200";
569 response_headers_["content-length"] = "5";
vasilvvc48c8712019-03-11 13:38:16 -0700570 const std::string kBody = "Hello";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500571 std::unique_ptr<char[]> buffer;
572 QuicByteCount header_length =
573 encoder_.SerializeDataFrameHeader(kBody.length(), &buffer);
574 memory_cache_backend_.AddResponse(kHost, kPath, std::move(response_headers_),
575 kBody);
576
577 // Call PushResponse() should trigger stream to fetch response from cache
578 // and send it back.
579 InSequence s;
580 EXPECT_CALL(*server_initiated_stream, WriteHeadersMock(false));
581
582 if (HasFrameHeader()) {
583 EXPECT_CALL(session_, WritevData(_, kServerInitiatedStreamId, header_length,
584 _, NO_FIN));
585 }
586 EXPECT_CALL(session_,
587 WritevData(_, kServerInitiatedStreamId, kBody.size(), _, FIN));
588 server_initiated_stream->PushResponse(std::move(headers));
589 EXPECT_EQ(kPath, server_initiated_stream->GetHeader(":path"));
590 EXPECT_EQ("GET", server_initiated_stream->GetHeader(":method"));
591}
592
593TEST_P(QuicSimpleServerStreamTest, TestSendErrorResponse) {
nharperf5e68452019-05-29 17:24:18 -0700594 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
595 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
596 // enabled and fix it.
597 return;
598 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500599 EXPECT_CALL(session_, SendRstStream(_, QUIC_STREAM_NO_ERROR, _)).Times(0);
600
601 stream_->set_fin_received(true);
602
603 InSequence s;
604 EXPECT_CALL(*stream_, WriteHeadersMock(false));
605 if (HasFrameHeader()) {
606 EXPECT_CALL(session_, WritevData(_, _, kDataFrameHeaderLength, _, NO_FIN));
607 }
608 EXPECT_CALL(session_, WritevData(_, _, kErrorLength, _, FIN));
609
610 stream_->DoSendErrorResponse();
611 EXPECT_FALSE(QuicStreamPeer::read_side_closed(stream_));
612 EXPECT_TRUE(stream_->write_side_closed());
613}
614
615TEST_P(QuicSimpleServerStreamTest, InvalidMultipleContentLength) {
nharperf5e68452019-05-29 17:24:18 -0700616 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
617 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
618 // enabled and fix it.
619 return;
620 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500621 EXPECT_CALL(session_, SendRstStream(_, QUIC_STREAM_NO_ERROR, _)).Times(0);
622
623 spdy::SpdyHeaderBlock request_headers;
624 // \000 is a way to write the null byte when followed by a literal digit.
625 header_list_.OnHeader("content-length", QuicStringPiece("11\00012", 5));
626
627 EXPECT_CALL(*stream_, WriteHeadersMock(false));
628 EXPECT_CALL(session_, WritevData(_, _, _, _, _))
629 .WillRepeatedly(Invoke(MockQuicSession::ConsumeData));
630 stream_->OnStreamHeaderList(true, kFakeFrameLen, header_list_);
631
632 EXPECT_TRUE(QuicStreamPeer::read_side_closed(stream_));
633 EXPECT_TRUE(stream_->reading_stopped());
634 EXPECT_TRUE(stream_->write_side_closed());
635}
636
637TEST_P(QuicSimpleServerStreamTest, InvalidLeadingNullContentLength) {
nharperf5e68452019-05-29 17:24:18 -0700638 if (GetParam().handshake_protocol == PROTOCOL_TLS1_3) {
639 // TODO(nharper, b/112643533): Figure out why this test fails when TLS is
640 // enabled and fix it.
641 return;
642 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500643 EXPECT_CALL(session_, SendRstStream(_, QUIC_STREAM_NO_ERROR, _)).Times(0);
644
645 spdy::SpdyHeaderBlock request_headers;
646 // \000 is a way to write the null byte when followed by a literal digit.
647 header_list_.OnHeader("content-length", QuicStringPiece("\00012", 3));
648
649 EXPECT_CALL(*stream_, WriteHeadersMock(false));
650 EXPECT_CALL(session_, WritevData(_, _, _, _, _))
651 .WillRepeatedly(Invoke(MockQuicSession::ConsumeData));
652 stream_->OnStreamHeaderList(true, kFakeFrameLen, header_list_);
653
654 EXPECT_TRUE(QuicStreamPeer::read_side_closed(stream_));
655 EXPECT_TRUE(stream_->reading_stopped());
656 EXPECT_TRUE(stream_->write_side_closed());
657}
658
659TEST_P(QuicSimpleServerStreamTest, ValidMultipleContentLength) {
660 spdy::SpdyHeaderBlock request_headers;
661 // \000 is a way to write the null byte when followed by a literal digit.
662 header_list_.OnHeader("content-length", QuicStringPiece("11\00011", 5));
663
664 stream_->OnStreamHeaderList(false, kFakeFrameLen, header_list_);
665
666 EXPECT_EQ(11, stream_->content_length());
667 EXPECT_FALSE(QuicStreamPeer::read_side_closed(stream_));
668 EXPECT_FALSE(stream_->reading_stopped());
669 EXPECT_FALSE(stream_->write_side_closed());
670}
671
672TEST_P(QuicSimpleServerStreamTest,
673 DoNotSendQuicRstStreamNoErrorWithRstReceived) {
674 InSequence s;
675 EXPECT_FALSE(stream_->reading_stopped());
676
677 EXPECT_CALL(session_, SendRstStream(_, QUIC_STREAM_NO_ERROR, _)).Times(0);
678 EXPECT_CALL(session_, SendRstStream(_, QUIC_RST_ACKNOWLEDGEMENT, _)).Times(1);
679 QuicRstStreamFrame rst_frame(kInvalidControlFrameId, stream_->id(),
680 QUIC_STREAM_CANCELLED, 1234);
681 stream_->OnStreamReset(rst_frame);
fkastenholz305e1732019-06-18 05:01:22 -0700682 if (VersionHasIetfQuicFrames(connection_->transport_version())) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500683 // For V99 receiving a RST_STREAM causes a 1-way close; the test requires
684 // a full close. A CloseWriteSide closes the other half of the stream.
685 // Everything should then work properly.
686 stream_->CloseWriteSide();
687 }
688 EXPECT_TRUE(stream_->reading_stopped());
689 EXPECT_TRUE(stream_->write_side_closed());
690}
691
692TEST_P(QuicSimpleServerStreamTest, InvalidHeadersWithFin) {
693 char arr[] = {
694 0x3a, 0x68, 0x6f, 0x73, // :hos
695 0x74, 0x00, 0x00, 0x00, // t...
696 0x00, 0x00, 0x00, 0x00, // ....
697 0x07, 0x3a, 0x6d, 0x65, // .:me
698 0x74, 0x68, 0x6f, 0x64, // thod
699 0x00, 0x00, 0x00, 0x03, // ....
700 0x47, 0x45, 0x54, 0x00, // GET.
701 0x00, 0x00, 0x05, 0x3a, // ...:
702 0x70, 0x61, 0x74, 0x68, // path
703 0x00, 0x00, 0x00, 0x04, // ....
704 0x2f, 0x66, 0x6f, 0x6f, // /foo
705 0x00, 0x00, 0x00, 0x07, // ....
706 0x3a, 0x73, 0x63, 0x68, // :sch
707 0x65, 0x6d, 0x65, 0x00, // eme.
708 0x00, 0x00, 0x00, 0x00, // ....
709 0x00, 0x00, 0x08, 0x3a, // ...:
710 0x76, 0x65, 0x72, 0x73, // vers
711 0x96, 0x6f, 0x6e, 0x00, // <i(69)>on.
712 0x00, 0x00, 0x08, 0x48, // ...H
713 0x54, 0x54, 0x50, 0x2f, // TTP/
714 0x31, 0x2e, 0x31, // 1.1
715 };
716 QuicStringPiece data(arr, QUIC_ARRAYSIZE(arr));
717 QuicStreamFrame frame(stream_->id(), true, 0, data);
718 // Verify that we don't crash when we get a invalid headers in stream frame.
719 stream_->OnStreamFrame(frame);
720}
721
722} // namespace
723} // namespace test
724} // namespace quic