blob: 49032260056f40a7d54fcbbcc7f0852de6e1d580 [file] [log] [blame]
QUICHE teamfd50a402018-12-07 22:54:05 -05001// Copyright 2016 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/http2/http2_structures.h"
6
7// Tests are focused on Http2FrameHeader because it has by far the most
8// methods of any of the structures.
9// Note that EXPECT.*DEATH tests are slow (a fork is probably involved).
10
11// And in case you're wondering, yes, these are ridiculously thorough tests,
12// but believe it or not, I've found stupid bugs this way.
13
14#include <memory>
15#include <ostream>
16#include <sstream>
bnc47904002019-08-16 11:49:48 -070017#include <string>
QUICHE teamfd50a402018-12-07 22:54:05 -050018#include <tuple>
19#include <type_traits>
20#include <vector>
21
22#include "testing/gmock/include/gmock/gmock.h"
23#include "testing/gtest/include/gtest/gtest.h"
24#include "net/third_party/quiche/src/http2/http2_structures_test_util.h"
25#include "net/third_party/quiche/src/http2/platform/api/http2_string_utils.h"
26#include "net/third_party/quiche/src/http2/platform/api/http2_test_helpers.h"
27#include "net/third_party/quiche/src/http2/test_tools/http2_random.h"
28
29using ::testing::AssertionResult;
30using ::testing::AssertionSuccess;
31using ::testing::Combine;
32using ::testing::HasSubstr;
33using ::testing::MatchesRegex;
34using ::testing::Not;
35using ::testing::Values;
36using ::testing::ValuesIn;
37
38namespace http2 {
39namespace test {
40namespace {
41
42template <typename E>
43E IncrementEnum(E e) {
44 using I = typename std::underlying_type<E>::type;
45 return static_cast<E>(1 + static_cast<I>(e));
46}
47
48template <class T>
49AssertionResult VerifyRandomCalls() {
50 T t1;
51 Http2Random seq1;
52 Randomize(&t1, &seq1);
53
54 T t2;
55 Http2Random seq2(seq1.Key());
56 Randomize(&t2, &seq2);
57
58 // The two Randomize calls should have made the same number of calls into
59 // the Http2Random implementations.
60 VERIFY_EQ(seq1.Rand64(), seq2.Rand64());
61
62 // And because Http2Random implementation is returning the same sequence, and
63 // Randomize should have been consistent in applying those results, the two
64 // Ts should have the same value.
65 VERIFY_EQ(t1, t2);
66
67 Randomize(&t2, &seq2);
68 VERIFY_NE(t1, t2);
69
70 Randomize(&t1, &seq1);
71 VERIFY_EQ(t1, t2);
72
73 VERIFY_EQ(seq1.Rand64(), seq2.Rand64());
74
75 return AssertionSuccess();
76}
77
78#if GTEST_HAS_DEATH_TEST && !defined(NDEBUG)
79std::vector<Http2FrameType> ValidFrameTypes() {
80 std::vector<Http2FrameType> valid_types{Http2FrameType::DATA};
81 while (valid_types.back() != Http2FrameType::ALTSVC) {
82 valid_types.push_back(IncrementEnum(valid_types.back()));
83 }
84 return valid_types;
85}
86#endif // GTEST_HAS_DEATH_TEST && !defined(NDEBUG)
87
88TEST(Http2FrameHeaderTest, Constructor) {
89 Http2Random random;
90 uint8_t frame_type = 0;
91 do {
92 // Only the payload length is DCHECK'd in the constructor, so we need to
93 // make sure it is a "uint24".
94 uint32_t payload_length = random.Rand32() & 0xffffff;
95 Http2FrameType type = static_cast<Http2FrameType>(frame_type);
96 uint8_t flags = random.Rand8();
97 uint32_t stream_id = random.Rand32();
98
99 Http2FrameHeader v(payload_length, type, flags, stream_id);
100
101 EXPECT_EQ(payload_length, v.payload_length);
102 EXPECT_EQ(type, v.type);
103 EXPECT_EQ(flags, v.flags);
104 EXPECT_EQ(stream_id, v.stream_id);
105 } while (frame_type++ == 255);
106
107#if GTEST_HAS_DEATH_TEST && !defined(NDEBUG)
108 EXPECT_DEBUG_DEATH(Http2FrameHeader(0x01000000, Http2FrameType::DATA, 0, 1),
109 "payload_length");
110#endif // GTEST_HAS_DEATH_TEST && !defined(NDEBUG)
111}
112
113TEST(Http2FrameHeaderTest, Eq) {
114 Http2Random random;
115 uint32_t payload_length = random.Rand32() & 0xffffff;
116 Http2FrameType type = static_cast<Http2FrameType>(random.Rand8());
117
118 uint8_t flags = random.Rand8();
119 uint32_t stream_id = random.Rand32();
120
121 Http2FrameHeader v(payload_length, type, flags, stream_id);
122
123 EXPECT_EQ(payload_length, v.payload_length);
124 EXPECT_EQ(type, v.type);
125 EXPECT_EQ(flags, v.flags);
126 EXPECT_EQ(stream_id, v.stream_id);
127
128 Http2FrameHeader u(0, type, ~flags, stream_id);
129
130 EXPECT_NE(u, v);
131 EXPECT_NE(v, u);
132 EXPECT_FALSE(u == v);
133 EXPECT_FALSE(v == u);
134 EXPECT_TRUE(u != v);
135 EXPECT_TRUE(v != u);
136
137 u = v;
138
139 EXPECT_EQ(u, v);
140 EXPECT_EQ(v, u);
141 EXPECT_TRUE(u == v);
142 EXPECT_TRUE(v == u);
143 EXPECT_FALSE(u != v);
144 EXPECT_FALSE(v != u);
145
146 EXPECT_TRUE(VerifyRandomCalls<Http2FrameHeader>());
147}
148
149#if GTEST_HAS_DEATH_TEST && !defined(NDEBUG)
150// The tests of the valid frame types include EXPECT_DEBUG_DEATH, which is
151// quite slow, so using value parameterized tests in order to allow sharding.
152class Http2FrameHeaderTypeAndFlagTest
153 : public ::testing::TestWithParam<
154 std::tuple<Http2FrameType, Http2FrameFlag>> {
155 protected:
156 Http2FrameHeaderTypeAndFlagTest()
157 : type_(std::get<0>(GetParam())), flags_(std::get<1>(GetParam())) {
QUICHE team61940b42019-03-07 23:32:27 -0500158 HTTP2_LOG(INFO) << "Frame type: " << type_;
159 HTTP2_LOG(INFO) << "Frame flags: "
160 << Http2FrameFlagsToString(type_, flags_);
QUICHE teamfd50a402018-12-07 22:54:05 -0500161 }
162
163 const Http2FrameType type_;
164 const Http2FrameFlag flags_;
165};
166
167class IsEndStreamTest : public Http2FrameHeaderTypeAndFlagTest {};
QUICHE team61940b42019-03-07 23:32:27 -0500168INSTANTIATE_TEST_SUITE_P(IsEndStream,
169 IsEndStreamTest,
QUICHE team3cab5a92019-01-30 21:10:16 -0500170 Combine(ValuesIn(ValidFrameTypes()),
171 Values(~Http2FrameFlag::END_STREAM, 0xff)));
QUICHE teamfd50a402018-12-07 22:54:05 -0500172TEST_P(IsEndStreamTest, IsEndStream) {
173 const bool is_set =
174 (flags_ & Http2FrameFlag::END_STREAM) == Http2FrameFlag::END_STREAM;
bnc47904002019-08-16 11:49:48 -0700175 std::string flags_string;
QUICHE teamfd50a402018-12-07 22:54:05 -0500176 Http2FrameHeader v(0, type_, flags_, 0);
177 switch (type_) {
178 case Http2FrameType::DATA:
179 case Http2FrameType::HEADERS:
180 EXPECT_EQ(is_set, v.IsEndStream()) << v;
181 flags_string = v.FlagsToString();
182 if (is_set) {
183 EXPECT_THAT(flags_string, MatchesRegex(".*\\|?END_STREAM\\|.*"));
184 } else {
185 EXPECT_THAT(flags_string, Not(HasSubstr("END_STREAM")));
186 }
187 v.RetainFlags(Http2FrameFlag::END_STREAM);
188 EXPECT_EQ(is_set, v.IsEndStream()) << v;
189 {
190 std::stringstream s;
191 s << v;
192 EXPECT_EQ(v.ToString(), s.str());
193 if (is_set) {
194 EXPECT_THAT(s.str(), HasSubstr("flags=END_STREAM,"));
195 } else {
196 EXPECT_THAT(s.str(), HasSubstr("flags=,"));
197 }
198 }
199 break;
200 default:
201 EXPECT_DEBUG_DEATH(v.IsEndStream(), "DATA.*HEADERS") << v;
202 }
203}
204
205class IsACKTest : public Http2FrameHeaderTypeAndFlagTest {};
QUICHE team61940b42019-03-07 23:32:27 -0500206INSTANTIATE_TEST_SUITE_P(IsAck,
207 IsACKTest,
QUICHE team3cab5a92019-01-30 21:10:16 -0500208 Combine(ValuesIn(ValidFrameTypes()),
209 Values(~Http2FrameFlag::ACK, 0xff)));
QUICHE teamfd50a402018-12-07 22:54:05 -0500210TEST_P(IsACKTest, IsAck) {
211 const bool is_set = (flags_ & Http2FrameFlag::ACK) == Http2FrameFlag::ACK;
bnc47904002019-08-16 11:49:48 -0700212 std::string flags_string;
QUICHE teamfd50a402018-12-07 22:54:05 -0500213 Http2FrameHeader v(0, type_, flags_, 0);
214 switch (type_) {
215 case Http2FrameType::SETTINGS:
216 case Http2FrameType::PING:
217 EXPECT_EQ(is_set, v.IsAck()) << v;
218 flags_string = v.FlagsToString();
219 if (is_set) {
220 EXPECT_THAT(flags_string, MatchesRegex(".*\\|?ACK\\|.*"));
221 } else {
222 EXPECT_THAT(flags_string, Not(HasSubstr("ACK")));
223 }
224 v.RetainFlags(Http2FrameFlag::ACK);
225 EXPECT_EQ(is_set, v.IsAck()) << v;
226 {
227 std::stringstream s;
228 s << v;
229 EXPECT_EQ(v.ToString(), s.str());
230 if (is_set) {
231 EXPECT_THAT(s.str(), HasSubstr("flags=ACK,"));
232 } else {
233 EXPECT_THAT(s.str(), HasSubstr("flags=,"));
234 }
235 }
236 break;
237 default:
238 EXPECT_DEBUG_DEATH(v.IsAck(), "SETTINGS.*PING") << v;
239 }
240}
241
242class IsEndHeadersTest : public Http2FrameHeaderTypeAndFlagTest {};
QUICHE team61940b42019-03-07 23:32:27 -0500243INSTANTIATE_TEST_SUITE_P(IsEndHeaders,
244 IsEndHeadersTest,
QUICHE team3cab5a92019-01-30 21:10:16 -0500245 Combine(ValuesIn(ValidFrameTypes()),
246 Values(~Http2FrameFlag::END_HEADERS, 0xff)));
QUICHE teamfd50a402018-12-07 22:54:05 -0500247TEST_P(IsEndHeadersTest, IsEndHeaders) {
248 const bool is_set =
249 (flags_ & Http2FrameFlag::END_HEADERS) == Http2FrameFlag::END_HEADERS;
bnc47904002019-08-16 11:49:48 -0700250 std::string flags_string;
QUICHE teamfd50a402018-12-07 22:54:05 -0500251 Http2FrameHeader v(0, type_, flags_, 0);
252 switch (type_) {
253 case Http2FrameType::HEADERS:
254 case Http2FrameType::PUSH_PROMISE:
255 case Http2FrameType::CONTINUATION:
256 EXPECT_EQ(is_set, v.IsEndHeaders()) << v;
257 flags_string = v.FlagsToString();
258 if (is_set) {
259 EXPECT_THAT(flags_string, MatchesRegex(".*\\|?END_HEADERS\\|.*"));
260 } else {
261 EXPECT_THAT(flags_string, Not(HasSubstr("END_HEADERS")));
262 }
263 v.RetainFlags(Http2FrameFlag::END_HEADERS);
264 EXPECT_EQ(is_set, v.IsEndHeaders()) << v;
265 {
266 std::stringstream s;
267 s << v;
268 EXPECT_EQ(v.ToString(), s.str());
269 if (is_set) {
270 EXPECT_THAT(s.str(), HasSubstr("flags=END_HEADERS,"));
271 } else {
272 EXPECT_THAT(s.str(), HasSubstr("flags=,"));
273 }
274 }
275 break;
276 default:
277 EXPECT_DEBUG_DEATH(v.IsEndHeaders(),
278 "HEADERS.*PUSH_PROMISE.*CONTINUATION")
279 << v;
280 }
281}
282
283class IsPaddedTest : public Http2FrameHeaderTypeAndFlagTest {};
QUICHE team61940b42019-03-07 23:32:27 -0500284INSTANTIATE_TEST_SUITE_P(IsPadded,
285 IsPaddedTest,
QUICHE team3cab5a92019-01-30 21:10:16 -0500286 Combine(ValuesIn(ValidFrameTypes()),
287 Values(~Http2FrameFlag::PADDED, 0xff)));
QUICHE teamfd50a402018-12-07 22:54:05 -0500288TEST_P(IsPaddedTest, IsPadded) {
289 const bool is_set =
290 (flags_ & Http2FrameFlag::PADDED) == Http2FrameFlag::PADDED;
bnc47904002019-08-16 11:49:48 -0700291 std::string flags_string;
QUICHE teamfd50a402018-12-07 22:54:05 -0500292 Http2FrameHeader v(0, type_, flags_, 0);
293 switch (type_) {
294 case Http2FrameType::DATA:
295 case Http2FrameType::HEADERS:
296 case Http2FrameType::PUSH_PROMISE:
297 EXPECT_EQ(is_set, v.IsPadded()) << v;
298 flags_string = v.FlagsToString();
299 if (is_set) {
300 EXPECT_THAT(flags_string, MatchesRegex(".*\\|?PADDED\\|.*"));
301 } else {
302 EXPECT_THAT(flags_string, Not(HasSubstr("PADDED")));
303 }
304 v.RetainFlags(Http2FrameFlag::PADDED);
305 EXPECT_EQ(is_set, v.IsPadded()) << v;
306 {
307 std::stringstream s;
308 s << v;
309 EXPECT_EQ(v.ToString(), s.str());
310 if (is_set) {
311 EXPECT_THAT(s.str(), HasSubstr("flags=PADDED,"));
312 } else {
313 EXPECT_THAT(s.str(), HasSubstr("flags=,"));
314 }
315 }
316 break;
317 default:
318 EXPECT_DEBUG_DEATH(v.IsPadded(), "DATA.*HEADERS.*PUSH_PROMISE") << v;
319 }
320}
321
322class HasPriorityTest : public Http2FrameHeaderTypeAndFlagTest {};
QUICHE team61940b42019-03-07 23:32:27 -0500323INSTANTIATE_TEST_SUITE_P(HasPriority,
324 HasPriorityTest,
QUICHE team3cab5a92019-01-30 21:10:16 -0500325 Combine(ValuesIn(ValidFrameTypes()),
326 Values(~Http2FrameFlag::PRIORITY, 0xff)));
QUICHE teamfd50a402018-12-07 22:54:05 -0500327TEST_P(HasPriorityTest, HasPriority) {
328 const bool is_set =
329 (flags_ & Http2FrameFlag::PRIORITY) == Http2FrameFlag::PRIORITY;
bnc47904002019-08-16 11:49:48 -0700330 std::string flags_string;
QUICHE teamfd50a402018-12-07 22:54:05 -0500331 Http2FrameHeader v(0, type_, flags_, 0);
332 switch (type_) {
333 case Http2FrameType::HEADERS:
334 EXPECT_EQ(is_set, v.HasPriority()) << v;
335 flags_string = v.FlagsToString();
336 if (is_set) {
337 EXPECT_THAT(flags_string, MatchesRegex(".*\\|?PRIORITY\\|.*"));
338 } else {
339 EXPECT_THAT(flags_string, Not(HasSubstr("PRIORITY")));
340 }
341 v.RetainFlags(Http2FrameFlag::PRIORITY);
342 EXPECT_EQ(is_set, v.HasPriority()) << v;
343 {
344 std::stringstream s;
345 s << v;
346 EXPECT_EQ(v.ToString(), s.str());
347 if (is_set) {
348 EXPECT_THAT(s.str(), HasSubstr("flags=PRIORITY,"));
349 } else {
350 EXPECT_THAT(s.str(), HasSubstr("flags=,"));
351 }
352 }
353 break;
354 default:
355 EXPECT_DEBUG_DEATH(v.HasPriority(), "HEADERS") << v;
356 }
357}
358
359TEST(Http2PriorityFieldsTest, Constructor) {
360 Http2Random random;
361 uint32_t stream_dependency = random.Rand32() & StreamIdMask();
362 uint32_t weight = 1 + random.Rand8();
363 bool is_exclusive = random.OneIn(2);
364
365 Http2PriorityFields v(stream_dependency, weight, is_exclusive);
366
367 EXPECT_EQ(stream_dependency, v.stream_dependency);
368 EXPECT_EQ(weight, v.weight);
369 EXPECT_EQ(is_exclusive, v.is_exclusive);
370
371 // The high-bit must not be set on the stream id.
372 EXPECT_DEBUG_DEATH(
373 Http2PriorityFields(stream_dependency | 0x80000000, weight, is_exclusive),
374 "31-bit");
375
376 // The weight must be in the range 1-256.
377 EXPECT_DEBUG_DEATH(Http2PriorityFields(stream_dependency, 0, is_exclusive),
378 "too small");
379 EXPECT_DEBUG_DEATH(
380 Http2PriorityFields(stream_dependency, weight + 256, is_exclusive),
381 "too large");
382
383 EXPECT_TRUE(VerifyRandomCalls<Http2PriorityFields>());
384}
385#endif // GTEST_HAS_DEATH_TEST && !defined(NDEBUG)
386
387TEST(Http2RstStreamFieldsTest, IsSupported) {
388 Http2RstStreamFields v{Http2ErrorCode::HTTP2_NO_ERROR};
389 EXPECT_TRUE(v.IsSupportedErrorCode()) << v;
390
391 Http2RstStreamFields u{static_cast<Http2ErrorCode>(~0)};
392 EXPECT_FALSE(u.IsSupportedErrorCode()) << v;
393
394 EXPECT_TRUE(VerifyRandomCalls<Http2RstStreamFields>());
395}
396
397TEST(Http2SettingFieldsTest, Misc) {
398 Http2Random random;
399 Http2SettingsParameter parameter =
400 static_cast<Http2SettingsParameter>(random.Rand16());
401 uint32_t value = random.Rand32();
402
403 Http2SettingFields v(parameter, value);
404
405 EXPECT_EQ(v, v);
406 EXPECT_EQ(parameter, v.parameter);
407 EXPECT_EQ(value, v.value);
408
409 if (static_cast<uint16_t>(parameter) < 7) {
410 EXPECT_TRUE(v.IsSupportedParameter()) << v;
411 } else {
412 EXPECT_FALSE(v.IsSupportedParameter()) << v;
413 }
414
415 Http2SettingFields u(parameter, ~value);
416 EXPECT_NE(v, u);
417 EXPECT_EQ(v.parameter, u.parameter);
418 EXPECT_NE(v.value, u.value);
419
420 Http2SettingFields w(IncrementEnum(parameter), value);
421 EXPECT_NE(v, w);
422 EXPECT_NE(v.parameter, w.parameter);
423 EXPECT_EQ(v.value, w.value);
424
425 Http2SettingFields x(Http2SettingsParameter::MAX_FRAME_SIZE, 123);
426 std::stringstream s;
427 s << x;
428 EXPECT_EQ("parameter=MAX_FRAME_SIZE, value=123", s.str());
429
430 EXPECT_TRUE(VerifyRandomCalls<Http2SettingFields>());
431}
432
433TEST(Http2PushPromiseTest, Misc) {
434 Http2Random random;
435 uint32_t promised_stream_id = random.Rand32() & StreamIdMask();
436
437 Http2PushPromiseFields v{promised_stream_id};
438 EXPECT_EQ(promised_stream_id, v.promised_stream_id);
439 EXPECT_EQ(v, v);
440
441 std::stringstream s;
442 s << v;
443 EXPECT_EQ(Http2StrCat("promised_stream_id=", promised_stream_id), s.str());
444
445 // High-bit is reserved, but not used, so we can set it.
446 promised_stream_id |= 0x80000000;
447 Http2PushPromiseFields w{promised_stream_id};
448 EXPECT_EQ(w, w);
449 EXPECT_NE(v, w);
450
451 v.promised_stream_id = promised_stream_id;
452 EXPECT_EQ(v, w);
453
454 EXPECT_TRUE(VerifyRandomCalls<Http2PushPromiseFields>());
455}
456
457TEST(Http2PingFieldsTest, Misc) {
458 Http2PingFields v{{'8', ' ', 'b', 'y', 't', 'e', 's', '\0'}};
459 std::stringstream s;
460 s << v;
461 EXPECT_EQ("opaque_bytes=0x3820627974657300", s.str());
462
463 EXPECT_TRUE(VerifyRandomCalls<Http2PingFields>());
464}
465
466TEST(Http2GoAwayFieldsTest, Misc) {
467 Http2Random random;
468 uint32_t last_stream_id = random.Rand32() & StreamIdMask();
469 Http2ErrorCode error_code = static_cast<Http2ErrorCode>(random.Rand32());
470
471 Http2GoAwayFields v(last_stream_id, error_code);
472 EXPECT_EQ(v, v);
473 EXPECT_EQ(last_stream_id, v.last_stream_id);
474 EXPECT_EQ(error_code, v.error_code);
475
476 if (static_cast<uint32_t>(error_code) < 14) {
477 EXPECT_TRUE(v.IsSupportedErrorCode()) << v;
478 } else {
479 EXPECT_FALSE(v.IsSupportedErrorCode()) << v;
480 }
481
482 Http2GoAwayFields u(~last_stream_id, error_code);
483 EXPECT_NE(v, u);
484 EXPECT_NE(v.last_stream_id, u.last_stream_id);
485 EXPECT_EQ(v.error_code, u.error_code);
486
487 EXPECT_TRUE(VerifyRandomCalls<Http2GoAwayFields>());
488}
489
490TEST(Http2WindowUpdateTest, Misc) {
491 Http2Random random;
492 uint32_t window_size_increment = random.Rand32() & UInt31Mask();
493
494 Http2WindowUpdateFields v{window_size_increment};
495 EXPECT_EQ(window_size_increment, v.window_size_increment);
496 EXPECT_EQ(v, v);
497
498 std::stringstream s;
499 s << v;
500 EXPECT_EQ(Http2StrCat("window_size_increment=", window_size_increment),
501 s.str());
502
503 // High-bit is reserved, but not used, so we can set it.
504 window_size_increment |= 0x80000000;
505 Http2WindowUpdateFields w{window_size_increment};
506 EXPECT_EQ(w, w);
507 EXPECT_NE(v, w);
508
509 v.window_size_increment = window_size_increment;
510 EXPECT_EQ(v, w);
511
512 EXPECT_TRUE(VerifyRandomCalls<Http2WindowUpdateFields>());
513}
514
515TEST(Http2AltSvcTest, Misc) {
516 Http2Random random;
517 uint16_t origin_length = random.Rand16();
518
519 Http2AltSvcFields v{origin_length};
520 EXPECT_EQ(origin_length, v.origin_length);
521 EXPECT_EQ(v, v);
522
523 std::stringstream s;
524 s << v;
525 EXPECT_EQ(Http2StrCat("origin_length=", origin_length), s.str());
526
527 Http2AltSvcFields w{++origin_length};
528 EXPECT_EQ(w, w);
529 EXPECT_NE(v, w);
530
531 v.origin_length = w.origin_length;
532 EXPECT_EQ(v, w);
533
534 EXPECT_TRUE(VerifyRandomCalls<Http2AltSvcFields>());
535}
536
537} // namespace
538} // namespace test
539} // namespace http2