[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 5 | #include <memory> |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 6 | #include <ostream> |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 7 | #include <string> |
| 8 | #include <utility> |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 9 | #include <vector> |
| 10 | |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 11 | #include "base/compiler_specific.h" |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 12 | #include "base/macros.h" |
mmenke | 651bae7f | 2015-12-18 21:26:45 | [diff] [blame] | 13 | #include "base/run_loop.h" |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 14 | #include "base/stl_util.h" |
bnc | 8be55ebb | 2015-10-30 14:12:07 | [diff] [blame] | 15 | #include "base/strings/stringprintf.h" |
rtenneti | 5697781 | 2016-01-15 19:26:56 | [diff] [blame] | 16 | #include "net/base/chunked_upload_data_stream.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 17 | #include "net/base/test_completion_callback.h" |
rsleevi | d6de830 | 2016-06-21 01:33:20 | [diff] [blame] | 18 | #include "net/cert/ct_policy_enforcer.h" |
[email protected] | 6e7845ae | 2013-03-29 21:48:11 | [diff] [blame] | 19 | #include "net/cert/mock_cert_verifier.h" |
rtenneti | 052774e | 2015-11-24 21:00:12 | [diff] [blame] | 20 | #include "net/cert/multi_log_ct_verifier.h" |
[email protected] | f2cb3cf | 2013-03-21 01:40:53 | [diff] [blame] | 21 | #include "net/dns/mock_host_resolver.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 22 | #include "net/http/http_auth_handler_factory.h" |
| 23 | #include "net/http/http_network_session.h" |
| 24 | #include "net/http/http_network_transaction.h" |
| 25 | #include "net/http/http_server_properties_impl.h" |
| 26 | #include "net/http/http_stream.h" |
| 27 | #include "net/http/http_stream_factory.h" |
[email protected] | c41737d | 2014-05-14 07:47:19 | [diff] [blame] | 28 | #include "net/http/http_transaction_test_util.h" |
[email protected] | b1c988b | 2013-06-13 06:48:11 | [diff] [blame] | 29 | #include "net/http/transport_security_state.h" |
vishal.b | 62985ca9 | 2015-04-17 08:45:51 | [diff] [blame] | 30 | #include "net/log/test_net_log.h" |
mmenke | 43758e6 | 2015-05-04 21:09:46 | [diff] [blame] | 31 | #include "net/log/test_net_log_entry.h" |
| 32 | #include "net/log/test_net_log_util.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 33 | #include "net/proxy/proxy_config_service_fixed.h" |
| 34 | #include "net/proxy/proxy_resolver.h" |
| 35 | #include "net/proxy/proxy_service.h" |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 36 | #include "net/quic/crypto/proof_verifier_chromium.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 37 | #include "net/quic/crypto/quic_decrypter.h" |
| 38 | #include "net/quic/crypto/quic_encrypter.h" |
| 39 | #include "net/quic/quic_framer.h" |
[email protected] | 24e5bc5 | 2013-09-18 15:36:58 | [diff] [blame] | 40 | #include "net/quic/quic_http_utils.h" |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 41 | #include "net/quic/test_tools/crypto_test_utils.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 42 | #include "net/quic/test_tools/mock_clock.h" |
[email protected] | e8ff2684 | 2013-03-22 21:02:05 | [diff] [blame] | 43 | #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 44 | #include "net/quic/test_tools/mock_random.h" |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 45 | #include "net/quic/test_tools/quic_test_packet_maker.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 46 | #include "net/quic/test_tools/quic_test_utils.h" |
| 47 | #include "net/socket/client_socket_factory.h" |
| 48 | #include "net/socket/mock_client_socket_pool_manager.h" |
tbansal | ca83c00 | 2016-04-28 20:56:28 | [diff] [blame] | 49 | #include "net/socket/socket_performance_watcher.h" |
| 50 | #include "net/socket/socket_performance_watcher_factory.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 51 | #include "net/socket/socket_test_util.h" |
| 52 | #include "net/socket/ssl_client_socket.h" |
| 53 | #include "net/spdy/spdy_frame_builder.h" |
| 54 | #include "net/spdy/spdy_framer.h" |
[email protected] | 536fd0b | 2013-03-14 17:41:57 | [diff] [blame] | 55 | #include "net/ssl/ssl_config_service_defaults.h" |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 56 | #include "net/test/cert_test_util.h" |
rsleevi | a69c79a | 2016-06-22 03:28:43 | [diff] [blame] | 57 | #include "net/test/test_data_directory.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 58 | #include "testing/gtest/include/gtest/gtest.h" |
| 59 | #include "testing/platform_test.h" |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 60 | #include "url/gurl.h" |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 61 | |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 62 | namespace net { |
| 63 | namespace test { |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 64 | |
| 65 | namespace { |
| 66 | |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 67 | enum DestinationType { |
| 68 | // In pooling tests with two requests for different origins to the same |
| 69 | // destination, the destination should be |
| 70 | SAME_AS_FIRST, // the same as the first origin, |
| 71 | SAME_AS_SECOND, // the same as the second origin, or |
| 72 | DIFFERENT, // different from both. |
| 73 | }; |
| 74 | |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 75 | static const char kQuicAlternativeServiceHeader[] = |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 76 | "Alt-Svc: quic=\":443\"\r\n\r\n"; |
rch | f47265dc | 2016-03-21 21:33:12 | [diff] [blame] | 77 | static const char kQuicAlternativeServiceWithProbabilityHeader[] = |
| 78 | "Alt-Svc: quic=\":443\";p=\".5\"\r\n\r\n"; |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 79 | static const char kQuicAlternativeServiceDifferentPortHeader[] = |
| 80 | "Alt-Svc: quic=\":137\"\r\n\r\n"; |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 81 | |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 82 | const char kDefaultServerHostName[] = "mail.example.org"; |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 83 | const char kDifferentHostname[] = "different.example.com"; |
| 84 | |
| 85 | // Run QuicNetworkTransactionWithDestinationTest instances with all value |
| 86 | // combinations of version and destination_type. |
| 87 | struct PoolingTestParams { |
| 88 | friend std::ostream& operator<<(std::ostream& os, |
| 89 | const PoolingTestParams& p) { |
| 90 | os << "{ version: " << QuicVersionToString(p.version) |
| 91 | << ", destination_type: "; |
| 92 | switch (p.destination_type) { |
| 93 | case SAME_AS_FIRST: |
| 94 | os << "SAME_AS_FIRST"; |
| 95 | break; |
| 96 | case SAME_AS_SECOND: |
| 97 | os << "SAME_AS_SECOND"; |
| 98 | break; |
| 99 | case DIFFERENT: |
| 100 | os << "DIFFERENT"; |
| 101 | break; |
| 102 | } |
| 103 | os << " }"; |
| 104 | return os; |
| 105 | } |
| 106 | |
| 107 | QuicVersion version; |
| 108 | DestinationType destination_type; |
| 109 | }; |
| 110 | |
| 111 | std::vector<PoolingTestParams> GetPoolingTestParams() { |
| 112 | std::vector<PoolingTestParams> params; |
| 113 | QuicVersionVector all_supported_versions = QuicSupportedVersions(); |
| 114 | for (const QuicVersion version : all_supported_versions) { |
| 115 | params.push_back(PoolingTestParams{version, SAME_AS_FIRST}); |
| 116 | params.push_back(PoolingTestParams{version, SAME_AS_SECOND}); |
| 117 | params.push_back(PoolingTestParams{version, DIFFERENT}); |
| 118 | } |
| 119 | return params; |
| 120 | } |
bnc | b07c0553 | 2015-05-14 19:07:20 | [diff] [blame] | 121 | |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 122 | } // namespace |
| 123 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 124 | // Helper class to encapsulate MockReads and MockWrites for QUIC. |
| 125 | // Simplify ownership issues and the interaction with the MockSocketFactory. |
| 126 | class MockQuicData { |
| 127 | public: |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 128 | MockQuicData() : packet_number_(0) {} |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 129 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 130 | ~MockQuicData() { STLDeleteElements(&packets_); } |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 131 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 132 | void AddSynchronousRead(std::unique_ptr<QuicEncryptedPacket> packet) { |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 133 | reads_.push_back(MockRead(SYNCHRONOUS, packet->data(), packet->length(), |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 134 | packet_number_++)); |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 135 | packets_.push_back(packet.release()); |
| 136 | } |
| 137 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 138 | void AddRead(std::unique_ptr<QuicEncryptedPacket> packet) { |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 139 | reads_.push_back( |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 140 | MockRead(ASYNC, packet->data(), packet->length(), packet_number_++)); |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 141 | packets_.push_back(packet.release()); |
| 142 | } |
| 143 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 144 | void AddRead(IoMode mode, int rv) { |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 145 | reads_.push_back(MockRead(mode, rv, packet_number_++)); |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 146 | } |
| 147 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 148 | void AddWrite(std::unique_ptr<QuicEncryptedPacket> packet) { |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 149 | writes_.push_back(MockWrite(SYNCHRONOUS, packet->data(), packet->length(), |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 150 | packet_number_++)); |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 151 | packets_.push_back(packet.release()); |
| 152 | } |
| 153 | |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 154 | void AddSocketDataToFactory(MockClientSocketFactory* factory) { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 155 | MockRead* reads = reads_.empty() ? nullptr : &reads_[0]; |
| 156 | MockWrite* writes = writes_.empty() ? nullptr : &writes_[0]; |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 157 | socket_data_.reset( |
| 158 | new SequencedSocketData(reads, reads_.size(), writes, writes_.size())); |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 159 | factory->AddSocketDataProvider(socket_data_.get()); |
| 160 | } |
| 161 | |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 162 | void Resume() { socket_data_->Resume(); } |
rch | b27683c | 2015-07-29 23:53:50 | [diff] [blame] | 163 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 164 | private: |
| 165 | std::vector<QuicEncryptedPacket*> packets_; |
| 166 | std::vector<MockWrite> writes_; |
| 167 | std::vector<MockRead> reads_; |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 168 | size_t packet_number_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 169 | std::unique_ptr<SequencedSocketData> socket_data_; |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 170 | }; |
| 171 | |
ryansturm | 49a8cb1 | 2016-06-15 16:51:09 | [diff] [blame] | 172 | class HeadersHandler { |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 173 | public: |
ryansturm | 49a8cb1 | 2016-06-15 16:51:09 | [diff] [blame] | 174 | HeadersHandler() : was_proxied_(false) {} |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 175 | |
ryansturm | 49a8cb1 | 2016-06-15 16:51:09 | [diff] [blame] | 176 | bool was_proxied() { return was_proxied_; } |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 177 | |
ryansturm | 49a8cb1 | 2016-06-15 16:51:09 | [diff] [blame] | 178 | void OnBeforeHeadersSent(const ProxyInfo& proxy_info, |
| 179 | HttpRequestHeaders* request_headers) { |
| 180 | if (!proxy_info.is_http() && !proxy_info.is_https() && |
| 181 | !proxy_info.is_quic()) { |
| 182 | return; |
| 183 | } |
| 184 | was_proxied_ = true; |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 185 | } |
| 186 | |
| 187 | private: |
ryansturm | 49a8cb1 | 2016-06-15 16:51:09 | [diff] [blame] | 188 | bool was_proxied_; |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 189 | }; |
| 190 | |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 191 | class TestSocketPerformanceWatcher : public SocketPerformanceWatcher { |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 192 | public: |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 193 | explicit TestSocketPerformanceWatcher(bool* rtt_notification_received) |
| 194 | : rtt_notification_received_(rtt_notification_received) {} |
| 195 | ~TestSocketPerformanceWatcher() override {} |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 196 | |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 197 | bool ShouldNotifyUpdatedRTT() const override { return true; } |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 198 | |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 199 | void OnUpdatedRTTAvailable(const base::TimeDelta& rtt) override { |
| 200 | *rtt_notification_received_ = true; |
| 201 | } |
| 202 | |
| 203 | void OnConnectionChanged() override {} |
| 204 | |
| 205 | private: |
| 206 | bool* rtt_notification_received_; |
| 207 | |
| 208 | DISALLOW_COPY_AND_ASSIGN(TestSocketPerformanceWatcher); |
| 209 | }; |
| 210 | |
| 211 | class TestSocketPerformanceWatcherFactory |
| 212 | : public SocketPerformanceWatcherFactory { |
| 213 | public: |
| 214 | TestSocketPerformanceWatcherFactory() |
| 215 | : watcher_count_(0u), rtt_notification_received_(false) {} |
| 216 | ~TestSocketPerformanceWatcherFactory() override {} |
| 217 | |
| 218 | // SocketPerformanceWatcherFactory implementation: |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 219 | std::unique_ptr<SocketPerformanceWatcher> CreateSocketPerformanceWatcher( |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 220 | const Protocol protocol) override { |
| 221 | if (protocol != PROTOCOL_QUIC) { |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 222 | return nullptr; |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 223 | } |
| 224 | ++watcher_count_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 225 | return std::unique_ptr<SocketPerformanceWatcher>( |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 226 | new TestSocketPerformanceWatcher(&rtt_notification_received_)); |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 227 | } |
| 228 | |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 229 | size_t watcher_count() const { return watcher_count_; } |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 230 | |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 231 | bool rtt_notification_received() const { return rtt_notification_received_; } |
| 232 | |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 233 | private: |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 234 | size_t watcher_count_; |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 235 | bool rtt_notification_received_; |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 236 | |
| 237 | DISALLOW_COPY_AND_ASSIGN(TestSocketPerformanceWatcherFactory); |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 238 | }; |
| 239 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 240 | class QuicNetworkTransactionTest |
| 241 | : public PlatformTest, |
[email protected] | 5d03bbd | 2014-03-07 16:19:16 | [diff] [blame] | 242 | public ::testing::WithParamInterface<QuicVersion> { |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 243 | protected: |
[email protected] | 1c04f952 | 2013-02-21 20:32:43 | [diff] [blame] | 244 | QuicNetworkTransactionTest() |
rtenneti | 4b06ae7 | 2014-08-26 03:43:43 | [diff] [blame] | 245 | : clock_(new MockClock), |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 246 | client_maker_(GetParam(), |
| 247 | 0, |
| 248 | clock_, |
| 249 | kDefaultServerHostName, |
| 250 | Perspective::IS_CLIENT), |
| 251 | server_maker_(GetParam(), |
| 252 | 0, |
| 253 | clock_, |
| 254 | kDefaultServerHostName, |
| 255 | Perspective::IS_SERVER), |
rtenneti | 052774e | 2015-11-24 21:00:12 | [diff] [blame] | 256 | cert_transparency_verifier_(new MultiLogCTVerifier()), |
[email protected] | 1c04f952 | 2013-02-21 20:32:43 | [diff] [blame] | 257 | ssl_config_service_(new SSLConfigServiceDefaults), |
| 258 | proxy_service_(ProxyService::CreateDirect()), |
| 259 | auth_handler_factory_( |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 260 | HttpAuthHandlerFactory::CreateDefault(&host_resolver_)), |
[email protected] | 457d695 | 2013-12-13 09:24:58 | [diff] [blame] | 261 | random_generator_(0), |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 262 | ssl_data_(ASYNC, OK) { |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 263 | request_.method = "GET"; |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 264 | std::string url("https://"); |
bnc | b07c0553 | 2015-05-14 19:07:20 | [diff] [blame] | 265 | url.append(kDefaultServerHostName); |
| 266 | request_.url = GURL(url); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 267 | request_.load_flags = 0; |
[email protected] | 98a9d125 | 2014-04-04 00:43:59 | [diff] [blame] | 268 | clock_->AdvanceTime(QuicTime::Delta::FromMilliseconds(20)); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 269 | |
| 270 | scoped_refptr<X509Certificate> cert( |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 271 | ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 272 | verify_details_.cert_verify_result.verified_cert = cert; |
| 273 | verify_details_.cert_verify_result.is_issued_by_known_root = true; |
| 274 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); |
[email protected] | 1c04f952 | 2013-02-21 20:32:43 | [diff] [blame] | 275 | } |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 276 | |
dcheng | 67be2b1f | 2014-10-27 21:47:29 | [diff] [blame] | 277 | void SetUp() override { |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 278 | NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
fdoray | 92e35a7 | 2016-06-10 15:54:55 | [diff] [blame] | 279 | base::RunLoop().RunUntilIdle(); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 280 | } |
| 281 | |
dcheng | 67be2b1f | 2014-10-27 21:47:29 | [diff] [blame] | 282 | void TearDown() override { |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 283 | NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| 284 | // Empty the current queue. |
fdoray | 92e35a7 | 2016-06-10 15:54:55 | [diff] [blame] | 285 | base::RunLoop().RunUntilIdle(); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 286 | PlatformTest::TearDown(); |
| 287 | NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
fdoray | 92e35a7 | 2016-06-10 15:54:55 | [diff] [blame] | 288 | base::RunLoop().RunUntilIdle(); |
bnc | 525e175a | 2016-06-20 12:36:40 | [diff] [blame] | 289 | session_.reset(); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 290 | } |
| 291 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 292 | std::unique_ptr<QuicEncryptedPacket> ConstructClientConnectionClosePacket( |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 293 | QuicPacketNumber num) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 294 | return client_maker_.MakeConnectionClosePacket(num); |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 295 | } |
| 296 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 297 | std::unique_ptr<QuicEncryptedPacket> ConstructServerConnectionClosePacket( |
| 298 | QuicPacketNumber num) { |
| 299 | return server_maker_.MakeConnectionClosePacket(num); |
| 300 | } |
| 301 | |
| 302 | std::unique_ptr<QuicEncryptedPacket> ConstructServerGoAwayPacket( |
zhongyi | 6b5a389 | 2016-03-12 04:46:20 | [diff] [blame] | 303 | QuicPacketNumber num, |
| 304 | QuicErrorCode error_code, |
| 305 | std::string reason_phrase) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 306 | return server_maker_.MakeGoAwayPacket(num, error_code, reason_phrase); |
zhongyi | 6b5a389 | 2016-03-12 04:46:20 | [diff] [blame] | 307 | } |
| 308 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 309 | std::unique_ptr<QuicEncryptedPacket> ConstructClientAckPacket( |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 310 | QuicPacketNumber largest_received, |
| 311 | QuicPacketNumber least_unacked) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 312 | return client_maker_.MakeAckPacket(2, largest_received, least_unacked, |
| 313 | least_unacked, true); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 314 | } |
| 315 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 316 | std::unique_ptr<QuicEncryptedPacket> ConstructClientAckAndRstPacket( |
zhongyi | 6b5a389 | 2016-03-12 04:46:20 | [diff] [blame] | 317 | QuicPacketNumber num, |
| 318 | QuicStreamId stream_id, |
| 319 | QuicRstStreamErrorCode error_code, |
| 320 | QuicPacketNumber largest_received, |
| 321 | QuicPacketNumber ack_least_unacked, |
| 322 | QuicPacketNumber stop_least_unacked) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 323 | return client_maker_.MakeAckAndRstPacket( |
| 324 | num, false, stream_id, error_code, largest_received, ack_least_unacked, |
| 325 | stop_least_unacked, true); |
zhongyi | 6b5a389 | 2016-03-12 04:46:20 | [diff] [blame] | 326 | } |
| 327 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 328 | std::unique_ptr<QuicEncryptedPacket> ConstructClientAckPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 329 | QuicPacketNumber largest_received, |
| 330 | QuicPacketNumber least_unacked, |
| 331 | QuicTestPacketMaker* maker) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 332 | return client_maker_.MakeAckPacket(2, largest_received, least_unacked, |
| 333 | least_unacked, true); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 334 | } |
| 335 | |
ckrasic | 769733c | 2016-06-30 00:42:13 | [diff] [blame] | 336 | std::unique_ptr<QuicEncryptedPacket> ConstructClientAckPacket( |
| 337 | QuicPacketNumber packet_number, |
| 338 | QuicPacketNumber largest_received, |
| 339 | QuicPacketNumber ack_least_unacked, |
| 340 | QuicPacketNumber stop_least_unacked) { |
| 341 | return client_maker_.MakeAckPacket(packet_number, largest_received, |
| 342 | ack_least_unacked, stop_least_unacked, |
| 343 | true); |
| 344 | } |
| 345 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 346 | std::unique_ptr<QuicEncryptedPacket> |
| 347 | ConstructClientAckAndConnectionClosePacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 348 | QuicPacketNumber packet_number, |
| 349 | QuicPacketNumber largest_received, |
| 350 | QuicPacketNumber ack_least_unacked, |
| 351 | QuicPacketNumber stop_least_unacked) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 352 | return client_maker_.MakeAckPacket(packet_number, largest_received, |
| 353 | ack_least_unacked, stop_least_unacked, |
| 354 | true); |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 355 | } |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 356 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 357 | std::unique_ptr<QuicEncryptedPacket> |
| 358 | ConstructClientAckAndConnectionClosePacket( |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 359 | QuicPacketNumber num, |
| 360 | QuicTime::Delta delta_time_largest_observed, |
| 361 | QuicPacketNumber largest_received, |
| 362 | QuicPacketNumber least_unacked, |
| 363 | QuicErrorCode quic_error, |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 364 | const std::string& quic_error_details) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 365 | return client_maker_.MakeAckAndConnectionClosePacket( |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 366 | num, false, delta_time_largest_observed, largest_received, |
| 367 | least_unacked, quic_error, quic_error_details); |
| 368 | } |
| 369 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 370 | std::unique_ptr<QuicEncryptedPacket> ConstructServerRstPacket( |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 371 | QuicPacketNumber num, |
| 372 | bool include_version, |
| 373 | QuicStreamId stream_id, |
| 374 | QuicRstStreamErrorCode error_code) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 375 | return server_maker_.MakeRstPacket(num, include_version, stream_id, |
| 376 | error_code); |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 377 | } |
| 378 | |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 379 | // Uses default QuicTestPacketMaker. |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 380 | SpdyHeaderBlock GetRequestHeaders(const std::string& method, |
| 381 | const std::string& scheme, |
| 382 | const std::string& path) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 383 | return GetRequestHeaders(method, scheme, path, &client_maker_); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 384 | } |
| 385 | |
| 386 | // Uses customized QuicTestPacketMaker. |
| 387 | SpdyHeaderBlock GetRequestHeaders(const std::string& method, |
| 388 | const std::string& scheme, |
| 389 | const std::string& path, |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 390 | QuicTestPacketMaker* maker) { |
| 391 | return maker->GetRequestHeaders(method, scheme, path); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 392 | } |
| 393 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 394 | SpdyHeaderBlock GetResponseHeaders(const std::string& status) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 395 | return server_maker_.GetResponseHeaders(status); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 396 | } |
| 397 | |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 398 | // Appends alt_svc headers in the response headers. |
| 399 | SpdyHeaderBlock GetResponseHeaders(const std::string& status, |
| 400 | const std::string& alt_svc) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 401 | return server_maker_.GetResponseHeaders(status, alt_svc); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 402 | } |
| 403 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 404 | std::unique_ptr<QuicEncryptedPacket> ConstructServerDataPacket( |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 405 | QuicPacketNumber packet_number, |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 406 | QuicStreamId stream_id, |
[email protected] | e8ff2684 | 2013-03-22 21:02:05 | [diff] [blame] | 407 | bool should_include_version, |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 408 | bool fin, |
| 409 | QuicStreamOffset offset, |
| 410 | base::StringPiece data) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 411 | return server_maker_.MakeDataPacket( |
| 412 | packet_number, stream_id, should_include_version, fin, offset, data); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 413 | } |
| 414 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 415 | std::unique_ptr<QuicEncryptedPacket> ConstructClientRequestHeadersPacket( |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 416 | QuicPacketNumber packet_number, |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 417 | QuicStreamId stream_id, |
| 418 | bool should_include_version, |
| 419 | bool fin, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 420 | SpdyHeaderBlock headers, |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 421 | QuicStreamOffset* offset) { |
ianswett | 0888cff | 2015-11-24 17:42:16 | [diff] [blame] | 422 | SpdyPriority priority = |
rtenneti | f4bdb54 | 2015-01-21 14:33:05 | [diff] [blame] | 423 | ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 424 | return client_maker_.MakeRequestHeadersPacketWithOffsetTracking( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 425 | packet_number, stream_id, should_include_version, fin, priority, |
bnc | 94893a7 | 2016-06-30 13:45:25 | [diff] [blame^] | 426 | std::move(headers), offset); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 427 | } |
| 428 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 429 | std::unique_ptr<QuicEncryptedPacket> ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 430 | QuicPacketNumber packet_number, |
| 431 | QuicStreamId stream_id, |
| 432 | bool should_include_version, |
| 433 | bool fin, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 434 | SpdyHeaderBlock headers, |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 435 | QuicStreamOffset* offset, |
| 436 | QuicTestPacketMaker* maker) { |
| 437 | SpdyPriority priority = |
| 438 | ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 439 | return client_maker_.MakeRequestHeadersPacketWithOffsetTracking( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 440 | packet_number, stream_id, should_include_version, fin, priority, |
bnc | 94893a7 | 2016-06-30 13:45:25 | [diff] [blame^] | 441 | std::move(headers), offset); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 442 | } |
| 443 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 444 | std::unique_ptr<QuicEncryptedPacket> ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 445 | QuicPacketNumber packet_number, |
| 446 | QuicStreamId stream_id, |
| 447 | bool should_include_version, |
| 448 | bool fin, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 449 | SpdyHeaderBlock headers) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 450 | return ConstructClientRequestHeadersPacket( |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 451 | packet_number, stream_id, should_include_version, fin, |
| 452 | std::move(headers), nullptr, &client_maker_); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 453 | } |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 454 | std::unique_ptr<QuicEncryptedPacket> ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 455 | QuicPacketNumber packet_number, |
| 456 | QuicStreamId stream_id, |
| 457 | bool should_include_version, |
| 458 | bool fin, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 459 | SpdyHeaderBlock headers, |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 460 | QuicTestPacketMaker* maker) { |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 461 | return ConstructClientRequestHeadersPacket( |
| 462 | packet_number, stream_id, should_include_version, fin, |
| 463 | std::move(headers), nullptr, maker); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 464 | } |
| 465 | |
ckrasic | 769733c | 2016-06-30 00:42:13 | [diff] [blame] | 466 | std::unique_ptr<QuicEncryptedPacket> ConstructServerPushPromisePacket( |
| 467 | QuicPacketNumber packet_number, |
| 468 | QuicStreamId stream_id, |
| 469 | QuicStreamId promised_stream_id, |
| 470 | bool should_include_version, |
| 471 | SpdyHeaderBlock headers, |
| 472 | QuicStreamOffset* offset, |
| 473 | QuicTestPacketMaker* maker) { |
| 474 | return maker->MakePushPromisePacket( |
| 475 | packet_number, stream_id, promised_stream_id, should_include_version, |
| 476 | false, std::move(headers), nullptr, offset); |
| 477 | } |
| 478 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 479 | std::unique_ptr<QuicEncryptedPacket> ConstructServerResponseHeadersPacket( |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 480 | QuicPacketNumber packet_number, |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 481 | QuicStreamId stream_id, |
| 482 | bool should_include_version, |
| 483 | bool fin, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 484 | SpdyHeaderBlock headers) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 485 | return ConstructServerResponseHeadersPacket( |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 486 | packet_number, stream_id, should_include_version, fin, |
| 487 | std::move(headers), nullptr, &server_maker_); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 488 | } |
| 489 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 490 | std::unique_ptr<QuicEncryptedPacket> ConstructServerResponseHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 491 | QuicPacketNumber packet_number, |
| 492 | QuicStreamId stream_id, |
| 493 | bool should_include_version, |
| 494 | bool fin, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 495 | SpdyHeaderBlock headers, |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 496 | QuicTestPacketMaker* maker) { |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 497 | return ConstructServerResponseHeadersPacket( |
| 498 | packet_number, stream_id, should_include_version, fin, |
| 499 | std::move(headers), nullptr, maker); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 500 | } |
| 501 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 502 | std::unique_ptr<QuicEncryptedPacket> ConstructServerResponseHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 503 | QuicPacketNumber packet_number, |
| 504 | QuicStreamId stream_id, |
| 505 | bool should_include_version, |
| 506 | bool fin, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 507 | SpdyHeaderBlock headers, |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 508 | QuicStreamOffset* offset) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 509 | return server_maker_.MakeResponseHeadersPacketWithOffsetTracking( |
bnc | 94893a7 | 2016-06-30 13:45:25 | [diff] [blame^] | 510 | packet_number, stream_id, should_include_version, fin, |
| 511 | std::move(headers), offset); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 512 | } |
| 513 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 514 | std::unique_ptr<QuicEncryptedPacket> ConstructServerResponseHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 515 | QuicPacketNumber packet_number, |
| 516 | QuicStreamId stream_id, |
| 517 | bool should_include_version, |
| 518 | bool fin, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 519 | SpdyHeaderBlock headers, |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 520 | QuicStreamOffset* offset, |
| 521 | QuicTestPacketMaker* maker) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 522 | return server_maker_.MakeResponseHeadersPacketWithOffsetTracking( |
bnc | 94893a7 | 2016-06-30 13:45:25 | [diff] [blame^] | 523 | packet_number, stream_id, should_include_version, fin, |
| 524 | std::move(headers), offset); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 525 | } |
| 526 | |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 527 | void CreateSession() { |
[email protected] | 4dca587c | 2013-03-07 16:54:47 | [diff] [blame] | 528 | params_.enable_quic = true; |
| 529 | params_.quic_clock = clock_; |
| 530 | params_.quic_random = &random_generator_; |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 531 | params_.client_socket_factory = &socket_factory_; |
[email protected] | e8ff2684 | 2013-03-22 21:02:05 | [diff] [blame] | 532 | params_.quic_crypto_client_stream_factory = &crypto_client_stream_factory_; |
[email protected] | 1c04f952 | 2013-02-21 20:32:43 | [diff] [blame] | 533 | params_.host_resolver = &host_resolver_; |
| 534 | params_.cert_verifier = &cert_verifier_; |
[email protected] | b1c988b | 2013-06-13 06:48:11 | [diff] [blame] | 535 | params_.transport_security_state = &transport_security_state_; |
rtenneti | 052774e | 2015-11-24 21:00:12 | [diff] [blame] | 536 | params_.cert_transparency_verifier = cert_transparency_verifier_.get(); |
rsleevi | d6de830 | 2016-06-21 01:33:20 | [diff] [blame] | 537 | params_.ct_policy_enforcer = &ct_policy_enforcer_; |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 538 | params_.socket_performance_watcher_factory = |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 539 | &test_socket_performance_watcher_factory_; |
[email protected] | 1c04f952 | 2013-02-21 20:32:43 | [diff] [blame] | 540 | params_.proxy_service = proxy_service_.get(); |
| 541 | params_.ssl_config_service = ssl_config_service_.get(); |
| 542 | params_.http_auth_handler_factory = auth_handler_factory_.get(); |
bnc | 525e175a | 2016-06-20 12:36:40 | [diff] [blame] | 543 | params_.http_server_properties = &http_server_properties_; |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 544 | params_.quic_supported_versions = SupportedVersions(GetParam()); |
rch | 74da0e1a | 2016-01-14 02:49:32 | [diff] [blame] | 545 | for (const char* host : |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 546 | {kDefaultServerHostName, "www.example.org", "news.example.org", |
| 547 | "bar.example.org", "foo.example.org", "invalid.example.org", |
| 548 | "mail.example.com"}) { |
rch | 74da0e1a | 2016-01-14 02:49:32 | [diff] [blame] | 549 | params_.quic_host_whitelist.insert(host); |
| 550 | } |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 551 | |
mmenke | e65e7af | 2015-10-13 17:16:42 | [diff] [blame] | 552 | session_.reset(new HttpNetworkSession(params_)); |
[email protected] | 11c0587 | 2013-08-20 02:04:12 | [diff] [blame] | 553 | session_->quic_stream_factory()->set_require_confirmation(false); |
rch | 185ebee | 2015-07-14 23:56:22 | [diff] [blame] | 554 | ASSERT_EQ(params_.quic_socket_receive_buffer_size, |
| 555 | session_->quic_stream_factory()->socket_receive_buffer_size()); |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 556 | } |
| 557 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 558 | void CheckWasQuicResponse( |
| 559 | const std::unique_ptr<HttpNetworkTransaction>& trans) { |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 560 | const HttpResponseInfo* response = trans->GetResponseInfo(); |
rtenneti | be63573 | 2014-10-02 22:51:42 | [diff] [blame] | 561 | ASSERT_TRUE(response != nullptr); |
| 562 | ASSERT_TRUE(response->headers.get() != nullptr); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 563 | EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| 564 | EXPECT_TRUE(response->was_fetched_via_spdy); |
| 565 | EXPECT_TRUE(response->was_npn_negotiated); |
| 566 | EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_QUIC1_SPDY3, |
| 567 | response->connection_info); |
| 568 | } |
| 569 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 570 | void CheckResponsePort(const std::unique_ptr<HttpNetworkTransaction>& trans, |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 571 | uint16_t port) { |
bnc | 62a44f02 | 2015-04-02 15:59:41 | [diff] [blame] | 572 | const HttpResponseInfo* response = trans->GetResponseInfo(); |
| 573 | ASSERT_TRUE(response != nullptr); |
| 574 | EXPECT_EQ(port, response->socket_address.port()); |
| 575 | } |
| 576 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 577 | void CheckWasHttpResponse( |
| 578 | const std::unique_ptr<HttpNetworkTransaction>& trans) { |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 579 | const HttpResponseInfo* response = trans->GetResponseInfo(); |
rtenneti | be63573 | 2014-10-02 22:51:42 | [diff] [blame] | 580 | ASSERT_TRUE(response != nullptr); |
| 581 | ASSERT_TRUE(response->headers.get() != nullptr); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 582 | EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| 583 | EXPECT_FALSE(response->was_fetched_via_spdy); |
| 584 | EXPECT_FALSE(response->was_npn_negotiated); |
| 585 | EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP1, |
| 586 | response->connection_info); |
| 587 | } |
| 588 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 589 | void CheckResponseData(const std::unique_ptr<HttpNetworkTransaction>& trans, |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 590 | const std::string& expected) { |
| 591 | std::string response_data; |
bnc | ffc2fdf | 2015-05-14 18:29:49 | [diff] [blame] | 592 | ASSERT_EQ(OK, ReadTransaction(trans.get(), &response_data)); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 593 | EXPECT_EQ(expected, response_data); |
| 594 | } |
| 595 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 596 | void RunTransaction(const std::unique_ptr<HttpNetworkTransaction>& trans) { |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 597 | TestCompletionCallback callback; |
| 598 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 599 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 600 | EXPECT_EQ(OK, callback.WaitForResult()); |
| 601 | } |
| 602 | |
| 603 | void SendRequestAndExpectHttpResponse(const std::string& expected) { |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 604 | std::unique_ptr<HttpNetworkTransaction> trans( |
[email protected] | 9049948 | 2013-06-01 00:39:50 | [diff] [blame] | 605 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
bnc | ffc2fdf | 2015-05-14 18:29:49 | [diff] [blame] | 606 | RunTransaction(trans); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 607 | CheckWasHttpResponse(trans); |
bnc | ffc2fdf | 2015-05-14 18:29:49 | [diff] [blame] | 608 | CheckResponseData(trans, expected); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 609 | } |
| 610 | |
| 611 | void SendRequestAndExpectQuicResponse(const std::string& expected) { |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 612 | SendRequestAndExpectQuicResponseMaybeFromProxy(expected, false, 443); |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 613 | } |
| 614 | |
bnc | 62a44f02 | 2015-04-02 15:59:41 | [diff] [blame] | 615 | void SendRequestAndExpectQuicResponseFromProxyOnPort( |
| 616 | const std::string& expected, |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 617 | uint16_t port) { |
bnc | 62a44f02 | 2015-04-02 15:59:41 | [diff] [blame] | 618 | SendRequestAndExpectQuicResponseMaybeFromProxy(expected, true, port); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 619 | } |
| 620 | |
| 621 | void AddQuicAlternateProtocolMapping( |
| 622 | MockCryptoClientStream::HandshakeMode handshake_mode) { |
| 623 | crypto_client_stream_factory_.set_handshake_mode(handshake_mode); |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 624 | url::SchemeHostPort server(request_.url); |
| 625 | AlternativeService alternative_service(QUIC, server.host(), 443); |
bnc | 7dc7e1b4 | 2015-07-28 14:43:12 | [diff] [blame] | 626 | base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 627 | http_server_properties_.SetAlternativeService(server, alternative_service, |
| 628 | expiration); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 629 | } |
| 630 | |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 631 | void AddQuicRemoteAlternativeServiceMapping( |
| 632 | MockCryptoClientStream::HandshakeMode handshake_mode, |
| 633 | const HostPortPair& alternative) { |
| 634 | crypto_client_stream_factory_.set_handshake_mode(handshake_mode); |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 635 | url::SchemeHostPort server(request_.url); |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 636 | AlternativeService alternative_service(QUIC, alternative.host(), |
| 637 | alternative.port()); |
| 638 | base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 639 | http_server_properties_.SetAlternativeService(server, alternative_service, |
| 640 | expiration); |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 641 | } |
| 642 | |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 643 | void ExpectBrokenAlternateProtocolMapping() { |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 644 | const url::SchemeHostPort server(request_.url); |
bnc | d9b132e | 2015-07-08 05:16:10 | [diff] [blame] | 645 | const AlternativeServiceVector alternative_service_vector = |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 646 | http_server_properties_.GetAlternativeServices(server); |
bnc | d9b132e | 2015-07-08 05:16:10 | [diff] [blame] | 647 | EXPECT_EQ(1u, alternative_service_vector.size()); |
bnc | 6be245c1 | 2015-05-15 11:24:07 | [diff] [blame] | 648 | EXPECT_TRUE(http_server_properties_.IsAlternativeServiceBroken( |
bnc | d9b132e | 2015-07-08 05:16:10 | [diff] [blame] | 649 | alternative_service_vector[0])); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 650 | } |
| 651 | |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 652 | void ExpectQuicAlternateProtocolMapping() { |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 653 | const url::SchemeHostPort server(request_.url); |
bnc | d9b132e | 2015-07-08 05:16:10 | [diff] [blame] | 654 | const AlternativeServiceVector alternative_service_vector = |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 655 | http_server_properties_.GetAlternativeServices(server); |
bnc | d9b132e | 2015-07-08 05:16:10 | [diff] [blame] | 656 | EXPECT_EQ(1u, alternative_service_vector.size()); |
| 657 | EXPECT_EQ(QUIC, alternative_service_vector[0].protocol); |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 658 | } |
| 659 | |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 660 | void AddHangingNonAlternateProtocolSocketData() { |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 661 | std::unique_ptr<StaticSocketDataProvider> hanging_data; |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 662 | hanging_data.reset(new StaticSocketDataProvider()); |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 663 | MockConnect hanging_connect(SYNCHRONOUS, ERR_IO_PENDING); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 664 | hanging_data->set_connect_data(hanging_connect); |
| 665 | hanging_data_.push_back(std::move(hanging_data)); |
| 666 | socket_factory_.AddSocketDataProvider(hanging_data_.back().get()); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 667 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 668 | } |
| 669 | |
rtenneti | 4b06ae7 | 2014-08-26 03:43:43 | [diff] [blame] | 670 | MockClock* clock_; // Owned by QuicStreamFactory after CreateSession. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 671 | QuicTestPacketMaker client_maker_; |
| 672 | QuicTestPacketMaker server_maker_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 673 | std::unique_ptr<HttpNetworkSession> session_; |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 674 | MockClientSocketFactory socket_factory_; |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 675 | ProofVerifyDetailsChromium verify_details_; |
[email protected] | e8ff2684 | 2013-03-22 21:02:05 | [diff] [blame] | 676 | MockCryptoClientStreamFactory crypto_client_stream_factory_; |
[email protected] | 1c04f952 | 2013-02-21 20:32:43 | [diff] [blame] | 677 | MockHostResolver host_resolver_; |
| 678 | MockCertVerifier cert_verifier_; |
[email protected] | b1c988b | 2013-06-13 06:48:11 | [diff] [blame] | 679 | TransportSecurityState transport_security_state_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 680 | std::unique_ptr<CTVerifier> cert_transparency_verifier_; |
rsleevi | d6de830 | 2016-06-21 01:33:20 | [diff] [blame] | 681 | CTPolicyEnforcer ct_policy_enforcer_; |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 682 | TestSocketPerformanceWatcherFactory test_socket_performance_watcher_factory_; |
[email protected] | 1c04f952 | 2013-02-21 20:32:43 | [diff] [blame] | 683 | scoped_refptr<SSLConfigServiceDefaults> ssl_config_service_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 684 | std::unique_ptr<ProxyService> proxy_service_; |
| 685 | std::unique_ptr<HttpAuthHandlerFactory> auth_handler_factory_; |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 686 | MockRandom random_generator_; |
bnc | 6be245c1 | 2015-05-15 11:24:07 | [diff] [blame] | 687 | HttpServerPropertiesImpl http_server_properties_; |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 688 | HttpNetworkSession::Params params_; |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 689 | HttpRequestInfo request_; |
vishal.b | 62985ca9 | 2015-04-17 08:45:51 | [diff] [blame] | 690 | BoundTestNetLog net_log_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 691 | std::vector<std::unique_ptr<StaticSocketDataProvider>> hanging_data_; |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 692 | SSLSocketDataProvider ssl_data_; |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 693 | |
| 694 | private: |
| 695 | void SendRequestAndExpectQuicResponseMaybeFromProxy( |
| 696 | const std::string& expected, |
bnc | 62a44f02 | 2015-04-02 15:59:41 | [diff] [blame] | 697 | bool used_proxy, |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 698 | uint16_t port) { |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 699 | std::unique_ptr<HttpNetworkTransaction> trans( |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 700 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
ryansturm | 49a8cb1 | 2016-06-15 16:51:09 | [diff] [blame] | 701 | HeadersHandler headers_handler; |
| 702 | trans->SetBeforeHeadersSentCallback( |
| 703 | base::Bind(&HeadersHandler::OnBeforeHeadersSent, |
| 704 | base::Unretained(&headers_handler))); |
bnc | ffc2fdf | 2015-05-14 18:29:49 | [diff] [blame] | 705 | RunTransaction(trans); |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 706 | CheckWasQuicResponse(trans); |
bnc | 62a44f02 | 2015-04-02 15:59:41 | [diff] [blame] | 707 | CheckResponsePort(trans, port); |
bnc | ffc2fdf | 2015-05-14 18:29:49 | [diff] [blame] | 708 | CheckResponseData(trans, expected); |
ryansturm | 49a8cb1 | 2016-06-15 16:51:09 | [diff] [blame] | 709 | EXPECT_EQ(used_proxy, headers_handler.was_proxied()); |
tbansal | 7cec381 | 2015-02-05 21:25:12 | [diff] [blame] | 710 | } |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 711 | }; |
| 712 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 713 | INSTANTIATE_TEST_CASE_P(Version, |
| 714 | QuicNetworkTransactionTest, |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 715 | ::testing::ValuesIn(QuicSupportedVersions())); |
| 716 | |
| 717 | TEST_P(QuicNetworkTransactionTest, ForceQuic) { |
rtenneti | 8a2f463 | 2016-03-21 20:26:57 | [diff] [blame] | 718 | params_.origins_to_force_quic_on.insert( |
| 719 | HostPortPair::FromString("mail.example.org:443")); |
[email protected] | 4dca587c | 2013-03-07 16:54:47 | [diff] [blame] | 720 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 721 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 722 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 723 | 1, kClientDataStreamId1, true, true, |
| 724 | GetRequestHeaders("GET", "https", "/"))); |
| 725 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 726 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 727 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 728 | false, true, 0, "hello!")); |
| 729 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 730 | mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
[email protected] | 4dca587c | 2013-03-07 16:54:47 | [diff] [blame] | 731 | |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 732 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
[email protected] | 4dca587c | 2013-03-07 16:54:47 | [diff] [blame] | 733 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 734 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 735 | // the alternate-protocol job will "win". |
| 736 | AddHangingNonAlternateProtocolSocketData(); |
| 737 | |
[email protected] | 4dca587c | 2013-03-07 16:54:47 | [diff] [blame] | 738 | CreateSession(); |
[email protected] | 4dca587c | 2013-03-07 16:54:47 | [diff] [blame] | 739 | |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 740 | EXPECT_FALSE( |
| 741 | test_socket_performance_watcher_factory_.rtt_notification_received()); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 742 | SendRequestAndExpectQuicResponse("hello!"); |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 743 | EXPECT_TRUE( |
| 744 | test_socket_performance_watcher_factory_.rtt_notification_received()); |
[email protected] | 4dca587c | 2013-03-07 16:54:47 | [diff] [blame] | 745 | |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 746 | // Check that the NetLog was filled reasonably. |
mmenke | 43758e6 | 2015-05-04 21:09:46 | [diff] [blame] | 747 | TestNetLogEntry::List entries; |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 748 | net_log_.GetEntries(&entries); |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 749 | EXPECT_LT(0u, entries.size()); |
| 750 | |
| 751 | // Check that we logged a QUIC_SESSION_PACKET_RECEIVED. |
ttuttle | 859dc7a | 2015-04-23 19:42:29 | [diff] [blame] | 752 | int pos = ExpectLogContainsSomewhere( |
| 753 | entries, 0, NetLog::TYPE_QUIC_SESSION_PACKET_RECEIVED, |
| 754 | NetLog::PHASE_NONE); |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 755 | EXPECT_LT(0, pos); |
| 756 | |
rch | fd52721 | 2015-08-25 00:41:26 | [diff] [blame] | 757 | // ... and also a TYPE_QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED. |
ttuttle | 859dc7a | 2015-04-23 19:42:29 | [diff] [blame] | 758 | pos = ExpectLogContainsSomewhere( |
rch | fd52721 | 2015-08-25 00:41:26 | [diff] [blame] | 759 | entries, 0, |
| 760 | NetLog::TYPE_QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED, |
ttuttle | 859dc7a | 2015-04-23 19:42:29 | [diff] [blame] | 761 | NetLog::PHASE_NONE); |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 762 | EXPECT_LT(0, pos); |
| 763 | |
rtenneti | a004d33 | 2015-08-28 06:44:57 | [diff] [blame] | 764 | std::string packet_number; |
| 765 | ASSERT_TRUE(entries[pos].GetStringValue("packet_number", &packet_number)); |
| 766 | EXPECT_EQ("1", packet_number); |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 767 | |
rch | fd52721 | 2015-08-25 00:41:26 | [diff] [blame] | 768 | // ... and also a TYPE_QUIC_SESSION_PACKET_AUTHENTICATED. |
| 769 | pos = ExpectLogContainsSomewhere( |
| 770 | entries, 0, NetLog::TYPE_QUIC_SESSION_PACKET_AUTHENTICATED, |
| 771 | NetLog::PHASE_NONE); |
| 772 | EXPECT_LT(0, pos); |
| 773 | |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 774 | // ... and also a QUIC_SESSION_STREAM_FRAME_RECEIVED. |
ttuttle | 859dc7a | 2015-04-23 19:42:29 | [diff] [blame] | 775 | pos = ExpectLogContainsSomewhere( |
| 776 | entries, 0, NetLog::TYPE_QUIC_SESSION_STREAM_FRAME_RECEIVED, |
| 777 | NetLog::PHASE_NONE); |
[email protected] | 98b20ce | 2013-05-10 05:55:26 | [diff] [blame] | 778 | EXPECT_LT(0, pos); |
| 779 | |
| 780 | int log_stream_id; |
| 781 | ASSERT_TRUE(entries[pos].GetIntegerValue("stream_id", &log_stream_id)); |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 782 | EXPECT_EQ(3, log_stream_id); |
[email protected] | 4dca587c | 2013-03-07 16:54:47 | [diff] [blame] | 783 | } |
| 784 | |
[email protected] | cf3e3cd6 | 2014-02-05 16:16:16 | [diff] [blame] | 785 | TEST_P(QuicNetworkTransactionTest, QuicProxy) { |
tbansal | 9bf2667 | 2016-05-11 18:32:45 | [diff] [blame] | 786 | params_.enable_quic = true; |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 787 | proxy_service_ = |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 788 | ProxyService::CreateFixedFromPacResult("QUIC mail.example.org:70"); |
[email protected] | cf3e3cd6 | 2014-02-05 16:16:16 | [diff] [blame] | 789 | |
[email protected] | cf3e3cd6 | 2014-02-05 16:16:16 | [diff] [blame] | 790 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 791 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 792 | 1, kClientDataStreamId1, true, true, |
| 793 | GetRequestHeaders("GET", "http", "/"))); |
| 794 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 795 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 796 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 797 | false, true, 0, "hello!")); |
| 798 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
rch | b27683c | 2015-07-29 23:53:50 | [diff] [blame] | 799 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 800 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
[email protected] | cf3e3cd6 | 2014-02-05 16:16:16 | [diff] [blame] | 801 | |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 802 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
[email protected] | cf3e3cd6 | 2014-02-05 16:16:16 | [diff] [blame] | 803 | |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 804 | EXPECT_FALSE( |
| 805 | test_socket_performance_watcher_factory_.rtt_notification_received()); |
[email protected] | cf3e3cd6 | 2014-02-05 16:16:16 | [diff] [blame] | 806 | // There is no need to set up an alternate protocol job, because |
| 807 | // no attempt will be made to speak to the proxy over TCP. |
| 808 | |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 809 | request_.url = GURL("http://mail.example.org/"); |
[email protected] | cf3e3cd6 | 2014-02-05 16:16:16 | [diff] [blame] | 810 | CreateSession(); |
| 811 | |
bnc | 62a44f02 | 2015-04-02 15:59:41 | [diff] [blame] | 812 | SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 70); |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 813 | EXPECT_TRUE( |
| 814 | test_socket_performance_watcher_factory_.rtt_notification_received()); |
[email protected] | cf3e3cd6 | 2014-02-05 16:16:16 | [diff] [blame] | 815 | } |
| 816 | |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 817 | // Regression test for https://crbug.com/492458. Test that for an HTTP |
| 818 | // connection through a QUIC proxy, the certificate exhibited by the proxy is |
| 819 | // checked against the proxy hostname, not the origin hostname. |
| 820 | TEST_P(QuicNetworkTransactionTest, QuicProxyWithCert) { |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 821 | const std::string origin_host = "mail.example.com"; |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 822 | const std::string proxy_host = "www.example.org"; |
| 823 | |
tbansal | 9bf2667 | 2016-05-11 18:32:45 | [diff] [blame] | 824 | params_.enable_quic = true; |
rdsmith | 82957ad | 2015-09-16 19:42:03 | [diff] [blame] | 825 | proxy_service_ = |
| 826 | ProxyService::CreateFixedFromPacResult("QUIC " + proxy_host + ":70"); |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 827 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 828 | client_maker_.set_hostname(origin_host); |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 829 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 830 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 831 | 1, kClientDataStreamId1, true, true, |
| 832 | GetRequestHeaders("GET", "http", "/"))); |
| 833 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 834 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 835 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 836 | false, true, 0, "hello!")); |
| 837 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
rch | b27683c | 2015-07-29 23:53:50 | [diff] [blame] | 838 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 839 | mock_quic_data.AddRead(ASYNC, 0); |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 840 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 841 | |
| 842 | scoped_refptr<X509Certificate> cert( |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 843 | ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 844 | ASSERT_TRUE(cert.get()); |
| 845 | // This certificate is valid for the proxy, but not for the origin. |
| 846 | bool common_name_fallback_used; |
| 847 | EXPECT_TRUE(cert->VerifyNameMatch(proxy_host, &common_name_fallback_used)); |
| 848 | EXPECT_FALSE(cert->VerifyNameMatch(origin_host, &common_name_fallback_used)); |
| 849 | ProofVerifyDetailsChromium verify_details; |
| 850 | verify_details.cert_verify_result.verified_cert = cert; |
| 851 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 852 | ProofVerifyDetailsChromium verify_details2; |
| 853 | verify_details2.cert_verify_result.verified_cert = cert; |
| 854 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details2); |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 855 | |
| 856 | request_.url = GURL("http://" + origin_host); |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 857 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 858 | CreateSession(); |
bnc | 313ba9c | 2015-06-11 15:42:31 | [diff] [blame] | 859 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| 860 | SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 70); |
| 861 | } |
| 862 | |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 863 | TEST_P(QuicNetworkTransactionTest, AlternativeServicesDifferentHost) { |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 864 | HostPortPair origin("www.example.org", 443); |
| 865 | HostPortPair alternative("mail.example.org", 443); |
| 866 | |
| 867 | base::FilePath certs_dir = GetTestCertsDirectory(); |
| 868 | scoped_refptr<X509Certificate> cert( |
| 869 | ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| 870 | ASSERT_TRUE(cert.get()); |
| 871 | // TODO(rch): the connection should be "to" the origin, so if the cert is |
| 872 | // valid for the origin but not the alternative, that should work too. |
| 873 | bool common_name_fallback_used; |
| 874 | EXPECT_TRUE(cert->VerifyNameMatch(origin.host(), &common_name_fallback_used)); |
| 875 | EXPECT_TRUE( |
| 876 | cert->VerifyNameMatch(alternative.host(), &common_name_fallback_used)); |
| 877 | ProofVerifyDetailsChromium verify_details; |
| 878 | verify_details.cert_verify_result.verified_cert = cert; |
| 879 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| 880 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 881 | client_maker_.set_hostname(origin.host()); |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 882 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 883 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 884 | 1, kClientDataStreamId1, true, true, |
| 885 | GetRequestHeaders("GET", "https", "/"))); |
| 886 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 887 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 888 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 889 | false, true, 0, "hello!")); |
| 890 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 891 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 892 | mock_quic_data.AddRead(ASYNC, 0); |
| 893 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 894 | |
| 895 | request_.url = GURL("https://" + origin.host()); |
| 896 | AddQuicRemoteAlternativeServiceMapping( |
| 897 | MockCryptoClientStream::CONFIRM_HANDSHAKE, alternative); |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 898 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 899 | CreateSession(); |
rch | be69cb90 | 2016-02-11 01:10:48 | [diff] [blame] | 900 | |
| 901 | SendRequestAndExpectQuicResponse("hello!"); |
| 902 | } |
| 903 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 904 | TEST_P(QuicNetworkTransactionTest, ForceQuicWithErrorConnecting) { |
rtenneti | 8a2f463 | 2016-03-21 20:26:57 | [diff] [blame] | 905 | params_.origins_to_force_quic_on.insert( |
| 906 | HostPortPair::FromString("mail.example.org:443")); |
[email protected] | cebe328 | 2013-05-22 23:49:30 | [diff] [blame] | 907 | |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 908 | MockQuicData mock_quic_data1; |
| 909 | mock_quic_data1.AddRead(ASYNC, ERR_SOCKET_NOT_CONNECTED); |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 910 | |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 911 | MockQuicData mock_quic_data2; |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 912 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 913 | mock_quic_data2.AddRead(ASYNC, ERR_SOCKET_NOT_CONNECTED); |
rch | 6faa4d4 | 2016-01-05 20:48:43 | [diff] [blame] | 914 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 915 | |
| 916 | mock_quic_data1.AddSocketDataToFactory(&socket_factory_); |
| 917 | mock_quic_data2.AddSocketDataToFactory(&socket_factory_); |
[email protected] | cebe328 | 2013-05-22 23:49:30 | [diff] [blame] | 918 | |
| 919 | CreateSession(); |
| 920 | |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 921 | EXPECT_EQ(0U, test_socket_performance_watcher_factory_.watcher_count()); |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 922 | for (size_t i = 0; i < 2; ++i) { |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 923 | std::unique_ptr<HttpNetworkTransaction> trans( |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 924 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 925 | TestCompletionCallback callback; |
| 926 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 927 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 928 | EXPECT_EQ(ERR_CONNECTION_CLOSED, callback.WaitForResult()); |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 929 | EXPECT_EQ(1 + i, test_socket_performance_watcher_factory_.watcher_count()); |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 930 | } |
[email protected] | cebe328 | 2013-05-22 23:49:30 | [diff] [blame] | 931 | } |
| 932 | |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 933 | TEST_P(QuicNetworkTransactionTest, DoNotForceQuicForHttps) { |
| 934 | // Attempt to "force" quic on 443, which will not be honored. |
rtenneti | 8a2f463 | 2016-03-21 20:26:57 | [diff] [blame] | 935 | params_.origins_to_force_quic_on.insert( |
| 936 | HostPortPair::FromString("www.google.com:443")); |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 937 | |
| 938 | MockRead http_reads[] = { |
| 939 | MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), |
| 940 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 941 | MockRead(ASYNC, OK)}; |
| 942 | |
| 943 | StaticSocketDataProvider data(http_reads, arraysize(http_reads), nullptr, 0); |
| 944 | socket_factory_.AddSocketDataProvider(&data); |
| 945 | SSLSocketDataProvider ssl(ASYNC, OK); |
| 946 | socket_factory_.AddSSLSocketDataProvider(&ssl); |
| 947 | |
| 948 | CreateSession(); |
| 949 | |
| 950 | SendRequestAndExpectHttpResponse("hello world"); |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 951 | EXPECT_EQ(0U, test_socket_performance_watcher_factory_.watcher_count()); |
tbansal | c8a94ea | 2015-11-02 23:58:51 | [diff] [blame] | 952 | } |
| 953 | |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 954 | TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceForQuic) { |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 955 | MockRead http_reads[] = { |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 956 | MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| 957 | MockRead("hello world"), |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 958 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 959 | MockRead(ASYNC, OK)}; |
| 960 | |
| 961 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 962 | 0); |
| 963 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 964 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 965 | |
| 966 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 967 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 968 | 1, kClientDataStreamId1, true, true, |
| 969 | GetRequestHeaders("GET", "https", "/"))); |
| 970 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 971 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 972 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 973 | false, true, 0, "hello!")); |
| 974 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 975 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 976 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 977 | |
| 978 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 979 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 980 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 981 | CreateSession(); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 982 | |
| 983 | SendRequestAndExpectHttpResponse("hello world"); |
| 984 | SendRequestAndExpectQuicResponse("hello!"); |
| 985 | } |
| 986 | |
rch | f47265dc | 2016-03-21 21:33:12 | [diff] [blame] | 987 | TEST_P(QuicNetworkTransactionTest, |
| 988 | UseAlternativeServiceWithProbabilityForQuic) { |
| 989 | MockRead http_reads[] = { |
| 990 | MockRead("HTTP/1.1 200 OK\r\n"), |
| 991 | MockRead(kQuicAlternativeServiceWithProbabilityHeader), |
| 992 | MockRead("hello world"), |
| 993 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 994 | MockRead(ASYNC, OK)}; |
| 995 | |
| 996 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 997 | 0); |
| 998 | socket_factory_.AddSocketDataProvider(&http_data); |
| 999 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1000 | |
| 1001 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1002 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1003 | 1, kClientDataStreamId1, true, true, |
| 1004 | GetRequestHeaders("GET", "https", "/"))); |
| 1005 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
rch | f47265dc | 2016-03-21 21:33:12 | [diff] [blame] | 1006 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1007 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1008 | false, true, 0, "hello!")); |
| 1009 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
rch | f47265dc | 2016-03-21 21:33:12 | [diff] [blame] | 1010 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 1011 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
| 1012 | |
| 1013 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1014 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1015 | AddHangingNonAlternateProtocolSocketData(); |
rch | f47265dc | 2016-03-21 21:33:12 | [diff] [blame] | 1016 | CreateSession(); |
| 1017 | |
| 1018 | SendRequestAndExpectHttpResponse("hello world"); |
| 1019 | SendRequestAndExpectQuicResponse("hello!"); |
| 1020 | } |
| 1021 | |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 1022 | TEST_P(QuicNetworkTransactionTest, SetAlternativeServiceWithScheme) { |
| 1023 | MockRead http_reads[] = { |
| 1024 | MockRead("HTTP/1.1 200 OK\r\n"), |
| 1025 | MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"), |
| 1026 | MockRead("hello world"), |
| 1027 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1028 | MockRead(ASYNC, OK)}; |
| 1029 | |
| 1030 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1031 | 0); |
| 1032 | |
| 1033 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1034 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1035 | |
| 1036 | CreateSession(); |
bnc | b2602438 | 2016-06-29 02:39:45 | [diff] [blame] | 1037 | // Send https request, ignore alternative service advertising if response |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 1038 | // header advertises alternative service for mail.example.org. |
bnc | b2602438 | 2016-06-29 02:39:45 | [diff] [blame] | 1039 | request_.url = GURL("https://mail.example.org:443"); |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 1040 | SendRequestAndExpectHttpResponse("hello world"); |
bnc | 525e175a | 2016-06-20 12:36:40 | [diff] [blame] | 1041 | HttpServerProperties* http_server_properties = |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 1042 | session_->http_server_properties(); |
| 1043 | url::SchemeHostPort http_server("http", "mail.example.org", 443); |
| 1044 | url::SchemeHostPort https_server("https", "mail.example.org", 443); |
| 1045 | // Check alternative service is set for the correct origin. |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 1046 | EXPECT_EQ( |
bnc | b2602438 | 2016-06-29 02:39:45 | [diff] [blame] | 1047 | 2u, http_server_properties->GetAlternativeServices(https_server).size()); |
| 1048 | EXPECT_TRUE( |
| 1049 | http_server_properties->GetAlternativeServices(http_server).empty()); |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 1050 | } |
| 1051 | |
| 1052 | TEST_P(QuicNetworkTransactionTest, DoNotGetAltSvcForDifferentOrigin) { |
| 1053 | MockRead http_reads[] = { |
| 1054 | MockRead("HTTP/1.1 200 OK\r\n"), |
| 1055 | MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"), |
| 1056 | MockRead("hello world"), |
| 1057 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1058 | MockRead(ASYNC, OK)}; |
| 1059 | |
| 1060 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1061 | 0); |
| 1062 | |
| 1063 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1064 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1065 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1066 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1067 | |
| 1068 | CreateSession(); |
| 1069 | |
| 1070 | // Send https request and set alternative services if response header |
| 1071 | // advertises alternative service for mail.example.org. |
| 1072 | SendRequestAndExpectHttpResponse("hello world"); |
bnc | 525e175a | 2016-06-20 12:36:40 | [diff] [blame] | 1073 | HttpServerProperties* http_server_properties = |
zhongyi | 3d4a55e7 | 2016-04-22 20:36:46 | [diff] [blame] | 1074 | session_->http_server_properties(); |
| 1075 | |
| 1076 | const url::SchemeHostPort https_server(request_.url); |
| 1077 | // Check alternative service is set. |
| 1078 | AlternativeServiceVector alternative_service_vector = |
| 1079 | http_server_properties->GetAlternativeServices(https_server); |
| 1080 | EXPECT_EQ(2u, alternative_service_vector.size()); |
| 1081 | |
| 1082 | // Send http request to the same origin but with diffrent scheme, should not |
| 1083 | // use QUIC. |
| 1084 | request_.url = GURL("http://mail.example.org:443"); |
| 1085 | SendRequestAndExpectHttpResponse("hello world"); |
| 1086 | } |
| 1087 | |
bnc | 8be55ebb | 2015-10-30 14:12:07 | [diff] [blame] | 1088 | TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceQuicSupportedVersion) { |
| 1089 | std::string altsvc_header = base::StringPrintf( |
| 1090 | "Alt-Svc: quic=\":443\"; v=\"%u\"\r\n\r\n", GetParam()); |
| 1091 | MockRead http_reads[] = { |
| 1092 | MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()), |
| 1093 | MockRead("hello world"), |
| 1094 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1095 | MockRead(ASYNC, OK)}; |
| 1096 | |
| 1097 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1098 | 0); |
| 1099 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1100 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1101 | |
| 1102 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1103 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1104 | 1, kClientDataStreamId1, true, true, |
| 1105 | GetRequestHeaders("GET", "https", "/"))); |
| 1106 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | 8be55ebb | 2015-10-30 14:12:07 | [diff] [blame] | 1107 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1108 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1109 | false, true, 0, "hello!")); |
| 1110 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
bnc | 8be55ebb | 2015-10-30 14:12:07 | [diff] [blame] | 1111 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 1112 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
bnc | 8be55ebb | 2015-10-30 14:12:07 | [diff] [blame] | 1113 | |
| 1114 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1115 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1116 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1117 | CreateSession(); |
bnc | 8be55ebb | 2015-10-30 14:12:07 | [diff] [blame] | 1118 | |
| 1119 | SendRequestAndExpectHttpResponse("hello world"); |
| 1120 | SendRequestAndExpectQuicResponse("hello!"); |
| 1121 | } |
| 1122 | |
zhongyi | 6b5a389 | 2016-03-12 04:46:20 | [diff] [blame] | 1123 | TEST_P(QuicNetworkTransactionTest, GoAwayWithConnectionMigrationOnPortsOnly) { |
| 1124 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1125 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1126 | 1, kClientDataStreamId1, true, true, |
| 1127 | GetRequestHeaders("GET", "https", "/"))); |
| 1128 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
zhongyi | 6b5a389 | 2016-03-12 04:46:20 | [diff] [blame] | 1129 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
| 1130 | // Read a GoAway packet with |
| 1131 | // QuicErrorCode: QUIC_ERROR_MIGRATING_PORT from the peer. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1132 | mock_quic_data.AddRead(ConstructServerGoAwayPacket( |
| 1133 | 2, QUIC_ERROR_MIGRATING_PORT, |
| 1134 | "connection migration with port change only")); |
| 1135 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
| 1136 | mock_quic_data.AddRead(ConstructServerDataPacket(3, kClientDataStreamId1, |
| 1137 | false, true, 0, "hello!")); |
| 1138 | mock_quic_data.AddWrite(ConstructClientAckAndRstPacket( |
zhongyi | 6b5a389 | 2016-03-12 04:46:20 | [diff] [blame] | 1139 | 3, kClientDataStreamId1, QUIC_STREAM_CANCELLED, 3, 3, 1)); |
| 1140 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 1141 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
| 1142 | |
| 1143 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1144 | |
| 1145 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 1146 | // the alternate-protocol job will "win". |
| 1147 | AddHangingNonAlternateProtocolSocketData(); |
| 1148 | |
| 1149 | // In order for a new QUIC session to be established via alternate-protocol |
| 1150 | // without racing an HTTP connection, we need the host resolution to happen |
| 1151 | // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| 1152 | // connection to the the server, in this test we require confirmation |
| 1153 | // before encrypting so the HTTP job will still start. |
| 1154 | host_resolver_.set_synchronous_mode(true); |
| 1155 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| 1156 | ""); |
| 1157 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
| 1158 | AddressList address; |
| 1159 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 1160 | nullptr, net_log_.bound()); |
| 1161 | |
| 1162 | CreateSession(); |
| 1163 | session_->quic_stream_factory()->set_require_confirmation(true); |
| 1164 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1165 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1166 | std::unique_ptr<HttpNetworkTransaction> trans( |
zhongyi | 6b5a389 | 2016-03-12 04:46:20 | [diff] [blame] | 1167 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 1168 | TestCompletionCallback callback; |
| 1169 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 1170 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 1171 | |
| 1172 | crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| 1173 | QuicSession::HANDSHAKE_CONFIRMED); |
| 1174 | EXPECT_EQ(OK, callback.WaitForResult()); |
| 1175 | |
| 1176 | // Check whether this transaction is correctly marked as received a go-away |
| 1177 | // because of migrating port. |
| 1178 | NetErrorDetails details; |
| 1179 | EXPECT_FALSE(details.quic_port_migration_detected); |
| 1180 | trans->PopulateNetErrorDetails(&details); |
| 1181 | EXPECT_TRUE(details.quic_port_migration_detected); |
| 1182 | } |
| 1183 | |
bnc | 8be55ebb | 2015-10-30 14:12:07 | [diff] [blame] | 1184 | TEST_P(QuicNetworkTransactionTest, |
| 1185 | DoNotUseAlternativeServiceQuicUnsupportedVersion) { |
| 1186 | std::string altsvc_header = base::StringPrintf( |
| 1187 | "Alt-Svc: quic=\":443\"; v=\"%u\"\r\n\r\n", GetParam() - 1); |
| 1188 | MockRead http_reads[] = { |
| 1189 | MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()), |
| 1190 | MockRead("hello world"), |
| 1191 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1192 | MockRead(ASYNC, OK)}; |
| 1193 | |
| 1194 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1195 | 0); |
| 1196 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1197 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1198 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1199 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1200 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1201 | CreateSession(); |
bnc | 8be55ebb | 2015-10-30 14:12:07 | [diff] [blame] | 1202 | |
| 1203 | SendRequestAndExpectHttpResponse("hello world"); |
| 1204 | SendRequestAndExpectHttpResponse("hello world"); |
| 1205 | } |
| 1206 | |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1207 | // When multiple alternative services are advertised, |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1208 | // HttpStreamFactoryImpl::RequestStreamInternal() should select the alternative |
| 1209 | // service which uses existing QUIC session if available. If no existing QUIC |
| 1210 | // session can be used, use the first alternative service from the list. |
| 1211 | TEST_P(QuicNetworkTransactionTest, UseExistingAlternativeServiceForQuic) { |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1212 | MockRead http_reads[] = { |
| 1213 | MockRead("HTTP/1.1 200 OK\r\n"), |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1214 | MockRead("Alt-Svc: quic=\"foo.example.org:443\", quic=\":444\"\r\n\r\n"), |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1215 | MockRead("hello world"), |
| 1216 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1217 | MockRead(ASYNC, OK)}; |
| 1218 | |
| 1219 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1220 | 0); |
| 1221 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1222 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1223 | |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1224 | QuicStreamOffset request_header_offset = 0; |
| 1225 | QuicStreamOffset response_header_offset = 0; |
| 1226 | // First QUIC request data. |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1227 | // Open a session to foo.example.org:443 using the first entry of the |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1228 | // alternative service list. |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1229 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1230 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1231 | 1, kClientDataStreamId1, true, true, |
| 1232 | GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| 1233 | |
| 1234 | std::string alt_svc_list = |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1235 | "quic=\"mail.example.org:444\", quic=\"foo.example.org:443\", " |
| 1236 | "quic=\"bar.example.org:445\""; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1237 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1238 | 1, kClientDataStreamId1, false, false, |
| 1239 | GetResponseHeaders("200 OK", alt_svc_list), &response_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1240 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1241 | false, true, 0, "hello!")); |
| 1242 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1243 | |
| 1244 | // Second QUIC request data. |
| 1245 | // Connection pooling, using existing session, no need to include version |
| 1246 | // as version negotiation has been completed. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1247 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1248 | 3, kClientDataStreamId2, false, true, |
| 1249 | GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1250 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1251 | 3, kClientDataStreamId2, false, false, GetResponseHeaders("200 OK"), |
| 1252 | &response_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1253 | mock_quic_data.AddRead(ConstructServerDataPacket(4, kClientDataStreamId2, |
| 1254 | false, true, 0, "hello!")); |
| 1255 | mock_quic_data.AddWrite( |
| 1256 | ConstructClientAckAndConnectionClosePacket(4, 4, 3, 1)); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1257 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 1258 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1259 | |
| 1260 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1261 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1262 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1263 | CreateSession(); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1264 | |
| 1265 | SendRequestAndExpectHttpResponse("hello world"); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1266 | |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1267 | SendRequestAndExpectQuicResponse("hello!"); |
| 1268 | SendRequestAndExpectQuicResponse("hello!"); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1269 | } |
| 1270 | |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1271 | // Pool to existing session with matching QuicServerId |
| 1272 | // even if alternative service destination is different. |
| 1273 | TEST_P(QuicNetworkTransactionTest, PoolByOrigin) { |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1274 | MockQuicData mock_quic_data; |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1275 | QuicStreamOffset request_header_offset(0); |
| 1276 | QuicStreamOffset response_header_offset(0); |
| 1277 | |
| 1278 | // First request. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1279 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1280 | 1, kClientDataStreamId1, true, true, |
| 1281 | GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1282 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1283 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"), |
| 1284 | &response_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1285 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1286 | false, true, 0, "hello!")); |
| 1287 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1288 | |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1289 | // Second request. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1290 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1291 | 3, kClientDataStreamId2, false, true, |
| 1292 | GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1293 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1294 | 3, kClientDataStreamId2, false, false, GetResponseHeaders("200 OK"), |
| 1295 | &response_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1296 | mock_quic_data.AddRead(ConstructServerDataPacket(4, kClientDataStreamId2, |
| 1297 | false, true, 0, "hello!")); |
| 1298 | mock_quic_data.AddWrite( |
| 1299 | ConstructClientAckAndConnectionClosePacket(4, 4, 3, 1)); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1300 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 1301 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
| 1302 | |
| 1303 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1304 | |
| 1305 | AddHangingNonAlternateProtocolSocketData(); |
| 1306 | AddHangingNonAlternateProtocolSocketData(); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1307 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1308 | CreateSession(); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1309 | |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1310 | const char destination1[] = "first.example.com"; |
| 1311 | const char destination2[] = "second.example.com"; |
| 1312 | |
| 1313 | // Set up alternative service entry to destination1. |
| 1314 | url::SchemeHostPort server(request_.url); |
| 1315 | AlternativeService alternative_service(QUIC, destination1, 443); |
| 1316 | base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| 1317 | http_server_properties_.SetAlternativeService(server, alternative_service, |
| 1318 | expiration); |
| 1319 | // First request opens connection to |destination1| |
| 1320 | // with QuicServerId.host() == kDefaultServerHostName. |
| 1321 | SendRequestAndExpectQuicResponse("hello!"); |
| 1322 | |
| 1323 | // Set up alternative service entry to a different destination. |
| 1324 | alternative_service = AlternativeService(QUIC, destination2, 443); |
| 1325 | http_server_properties_.SetAlternativeService(server, alternative_service, |
| 1326 | expiration); |
| 1327 | // Second request pools to existing connection with same QuicServerId, |
| 1328 | // even though alternative service destination is different. |
| 1329 | SendRequestAndExpectQuicResponse("hello!"); |
| 1330 | } |
| 1331 | |
| 1332 | // Pool to existing session with matching destination and matching certificate |
| 1333 | // even if origin is different, and even if the alternative service with |
| 1334 | // matching destination is not the first one on the list. |
| 1335 | TEST_P(QuicNetworkTransactionTest, PoolByDestination) { |
| 1336 | GURL origin1 = request_.url; |
| 1337 | GURL origin2("https://www.example.org/"); |
| 1338 | ASSERT_NE(origin1.host(), origin2.host()); |
| 1339 | |
| 1340 | MockQuicData mock_quic_data; |
| 1341 | QuicStreamOffset request_header_offset(0); |
| 1342 | QuicStreamOffset response_header_offset(0); |
| 1343 | |
| 1344 | // First request. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1345 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1346 | 1, kClientDataStreamId1, true, true, |
| 1347 | GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1348 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1349 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"), |
| 1350 | &response_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1351 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1352 | false, true, 0, "hello!")); |
| 1353 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1354 | |
| 1355 | // Second request. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1356 | QuicTestPacketMaker client_maker2(GetParam(), 0, clock_, origin2.host(), |
| 1357 | Perspective::IS_CLIENT); |
| 1358 | QuicTestPacketMaker server_maker2(GetParam(), 0, clock_, origin2.host(), |
| 1359 | Perspective::IS_SERVER); |
| 1360 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1361 | 3, kClientDataStreamId2, false, true, |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1362 | GetRequestHeaders("GET", "https", "/", &client_maker2), |
| 1363 | &request_header_offset, &client_maker2)); |
| 1364 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1365 | 3, kClientDataStreamId2, false, false, GetResponseHeaders("200 OK"), |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1366 | &response_header_offset, &server_maker2)); |
| 1367 | mock_quic_data.AddRead(ConstructServerDataPacket(4, kClientDataStreamId2, |
| 1368 | false, true, 0, "hello!")); |
| 1369 | mock_quic_data.AddWrite( |
| 1370 | ConstructClientAckAndConnectionClosePacket(4, 4, 3, 1)); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1371 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 1372 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
| 1373 | |
| 1374 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1375 | |
| 1376 | AddHangingNonAlternateProtocolSocketData(); |
| 1377 | AddHangingNonAlternateProtocolSocketData(); |
| 1378 | |
| 1379 | CreateSession(); |
| 1380 | |
| 1381 | const char destination1[] = "first.example.com"; |
| 1382 | const char destination2[] = "second.example.com"; |
| 1383 | |
| 1384 | // Set up alternative service for |origin1|. |
| 1385 | AlternativeService alternative_service1(QUIC, destination1, 443); |
| 1386 | base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| 1387 | http_server_properties_.SetAlternativeService( |
| 1388 | url::SchemeHostPort(origin1), alternative_service1, expiration); |
| 1389 | |
| 1390 | // Set up multiple alternative service entries for |origin2|, |
| 1391 | // the first one with a different destination as for |origin1|, |
| 1392 | // the second one with the same. The second one should be used, |
| 1393 | // because the request can be pooled to that one. |
| 1394 | AlternativeService alternative_service2(QUIC, destination2, 443); |
| 1395 | AlternativeServiceInfoVector alternative_services; |
| 1396 | alternative_services.push_back( |
| 1397 | AlternativeServiceInfo(alternative_service2, expiration)); |
| 1398 | alternative_services.push_back( |
| 1399 | AlternativeServiceInfo(alternative_service1, expiration)); |
| 1400 | http_server_properties_.SetAlternativeServices(url::SchemeHostPort(origin2), |
| 1401 | alternative_services); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1402 | // First request opens connection to |destination1| |
| 1403 | // with QuicServerId.host() == origin1.host(). |
| 1404 | SendRequestAndExpectQuicResponse("hello!"); |
| 1405 | |
| 1406 | // Second request pools to existing connection with same destination, |
| 1407 | // because certificate matches, even though QuicServerId is different. |
| 1408 | request_.url = origin2; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1409 | |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1410 | SendRequestAndExpectQuicResponse("hello!"); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1411 | } |
| 1412 | |
| 1413 | // Multiple origins have listed the same alternative services. When there's a |
| 1414 | // existing QUIC session opened by a request to other origin, |
| 1415 | // if the cert is valid, should select this QUIC session to make the request |
| 1416 | // if this is also the first existing QUIC session. |
| 1417 | TEST_P(QuicNetworkTransactionTest, |
| 1418 | UseSharedExistingAlternativeServiceForQuicWithValidCert) { |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1419 | // Default cert is valid for *.example.org |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1420 | |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1421 | // HTTP data for request to www.example.org. |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1422 | MockRead http_reads[] = { |
| 1423 | MockRead("HTTP/1.1 200 OK\r\n"), |
| 1424 | MockRead("Alt-Svc: quic=\":443\"\r\n\r\n"), |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1425 | MockRead("hello world from www.example.org"), |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1426 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1427 | MockRead(ASYNC, OK)}; |
| 1428 | |
| 1429 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1430 | 0); |
| 1431 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1432 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1433 | |
| 1434 | // HTTP data for request to mail.example.org. |
| 1435 | MockRead http_reads2[] = { |
| 1436 | MockRead("HTTP/1.1 200 OK\r\n"), |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1437 | MockRead("Alt-Svc: quic=\":444\", quic=\"www.example.org:443\"\r\n\r\n"), |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1438 | MockRead("hello world from mail.example.org"), |
| 1439 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1440 | MockRead(ASYNC, OK)}; |
| 1441 | |
| 1442 | StaticSocketDataProvider http_data2(http_reads2, arraysize(http_reads2), |
| 1443 | nullptr, 0); |
| 1444 | socket_factory_.AddSocketDataProvider(&http_data2); |
| 1445 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 1446 | |
| 1447 | QuicStreamOffset request_header_offset = 0; |
| 1448 | QuicStreamOffset response_header_offset = 0; |
| 1449 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1450 | QuicTestPacketMaker client_maker(GetParam(), 0, clock_, "mail.example.org", |
| 1451 | Perspective::IS_CLIENT); |
| 1452 | server_maker_.set_hostname("www.example.org"); |
| 1453 | client_maker_.set_hostname("www.example.org"); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1454 | MockQuicData mock_quic_data; |
| 1455 | |
| 1456 | // First QUIC request data. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1457 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1458 | 1, kClientDataStreamId1, true, true, |
| 1459 | GetRequestHeaders("GET", "https", "/"), &request_header_offset)); |
| 1460 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1461 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1462 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"), |
| 1463 | &response_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1464 | mock_quic_data.AddRead(ConstructServerDataPacket( |
| 1465 | 2, kClientDataStreamId1, false, true, 0, "hello from mail QUIC!")); |
| 1466 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1467 | // Second QUIC request data. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1468 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1469 | 3, kClientDataStreamId2, false, true, |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1470 | GetRequestHeaders("GET", "https", "/", &client_maker), |
| 1471 | &request_header_offset, &client_maker)); |
| 1472 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1473 | 3, kClientDataStreamId2, false, false, GetResponseHeaders("200 OK"), |
| 1474 | &response_header_offset)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1475 | mock_quic_data.AddRead(ConstructServerDataPacket( |
| 1476 | 4, kClientDataStreamId2, false, true, 0, "hello from mail QUIC!")); |
| 1477 | mock_quic_data.AddWrite( |
| 1478 | ConstructClientAckAndConnectionClosePacket(4, 4, 3, 1)); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1479 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 1480 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
| 1481 | |
| 1482 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1483 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1484 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1485 | CreateSession(); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1486 | |
| 1487 | // Send two HTTP requests, responses set up alt-svc lists for the origins. |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1488 | request_.url = GURL("https://www.example.org/"); |
| 1489 | SendRequestAndExpectHttpResponse("hello world from www.example.org"); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1490 | request_.url = GURL("https://mail.example.org/"); |
| 1491 | SendRequestAndExpectHttpResponse("hello world from mail.example.org"); |
| 1492 | |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1493 | // Open a QUIC session to mail.example.org:443 when making request |
| 1494 | // to mail.example.org. |
| 1495 | request_.url = GURL("https://www.example.org/"); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1496 | SendRequestAndExpectQuicResponse("hello from mail QUIC!"); |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1497 | |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1498 | // Uses the existing QUIC session when making request to www.example.org. |
zhongyi | 32569c6 | 2016-01-08 02:54:30 | [diff] [blame] | 1499 | request_.url = GURL("https://mail.example.org/"); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1500 | SendRequestAndExpectQuicResponse("hello from mail QUIC!"); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1501 | } |
| 1502 | |
| 1503 | TEST_P(QuicNetworkTransactionTest, AlternativeServiceDifferentPort) { |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1504 | MockRead http_reads[] = { |
| 1505 | MockRead("HTTP/1.1 200 OK\r\n"), |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1506 | MockRead(kQuicAlternativeServiceDifferentPortHeader), |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1507 | MockRead("hello world"), |
| 1508 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1509 | MockRead(ASYNC, OK)}; |
| 1510 | |
| 1511 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1512 | 0); |
| 1513 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1514 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1515 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1516 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1517 | CreateSession(); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1518 | |
| 1519 | SendRequestAndExpectHttpResponse("hello world"); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 1520 | |
| 1521 | url::SchemeHostPort http_server("https", kDefaultServerHostName, 443); |
| 1522 | AlternativeServiceVector alternative_service_vector = |
| 1523 | http_server_properties_.GetAlternativeServices(http_server); |
| 1524 | ASSERT_EQ(1u, alternative_service_vector.size()); |
| 1525 | const AlternativeService alternative_service = alternative_service_vector[0]; |
| 1526 | EXPECT_EQ(QUIC, alternative_service_vector[0].protocol); |
| 1527 | EXPECT_EQ(kDefaultServerHostName, alternative_service_vector[0].host); |
| 1528 | EXPECT_EQ(137, alternative_service_vector[0].port); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1529 | } |
| 1530 | |
| 1531 | TEST_P(QuicNetworkTransactionTest, ConfirmAlternativeService) { |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1532 | MockRead http_reads[] = { |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1533 | MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| 1534 | MockRead("hello world"), |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1535 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1536 | MockRead(ASYNC, OK)}; |
| 1537 | |
| 1538 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1539 | 0); |
| 1540 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1541 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1542 | |
| 1543 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1544 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1545 | 1, kClientDataStreamId1, true, true, |
| 1546 | GetRequestHeaders("GET", "https", "/"))); |
| 1547 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1548 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1549 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1550 | false, true, 0, "hello!")); |
| 1551 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1552 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 1553 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1554 | |
| 1555 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1556 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1557 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1558 | CreateSession(); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1559 | |
| 1560 | AlternativeService alternative_service(QUIC, |
| 1561 | HostPortPair::FromURL(request_.url)); |
| 1562 | http_server_properties_.MarkAlternativeServiceRecentlyBroken( |
| 1563 | alternative_service); |
| 1564 | EXPECT_TRUE(http_server_properties_.WasAlternativeServiceRecentlyBroken( |
| 1565 | alternative_service)); |
| 1566 | |
| 1567 | SendRequestAndExpectHttpResponse("hello world"); |
| 1568 | SendRequestAndExpectQuicResponse("hello!"); |
| 1569 | |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 1570 | mock_quic_data.Resume(); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1571 | |
| 1572 | EXPECT_FALSE(http_server_properties_.WasAlternativeServiceRecentlyBroken( |
| 1573 | alternative_service)); |
| 1574 | } |
| 1575 | |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1576 | TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceForQuicForHttps) { |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1577 | MockRead http_reads[] = { |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1578 | MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
| 1579 | MockRead("hello world"), |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1580 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 1581 | MockRead(ASYNC, OK)}; |
| 1582 | |
| 1583 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 1584 | 0); |
| 1585 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1586 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1587 | |
| 1588 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1589 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1590 | 1, kClientDataStreamId1, true, true, |
| 1591 | GetRequestHeaders("GET", "https", "/"))); |
| 1592 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1593 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1594 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1595 | false, true, 0, "hello!")); |
| 1596 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1597 | mock_quic_data.AddRead(SYNCHRONOUS, 0); // EOF |
| 1598 | |
| 1599 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1600 | |
| 1601 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1602 | CreateSession(); |
bnc | c958faa | 2015-07-31 18:14:52 | [diff] [blame] | 1603 | |
| 1604 | // TODO(rtenneti): Test QUIC over HTTPS, GetSSLInfo(). |
| 1605 | SendRequestAndExpectHttpResponse("hello world"); |
| 1606 | } |
| 1607 | |
bnc | 1c196c6e | 2016-05-28 13:51:48 | [diff] [blame] | 1608 | TEST_P(QuicNetworkTransactionTest, HungAlternativeService) { |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1609 | crypto_client_stream_factory_.set_handshake_mode( |
| 1610 | MockCryptoClientStream::COLD_START); |
| 1611 | |
| 1612 | MockWrite http_writes[] = { |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1613 | MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1614 | MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1615 | MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1616 | |
| 1617 | MockRead http_reads[] = { |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1618 | MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
bnc | 1c196c6e | 2016-05-28 13:51:48 | [diff] [blame] | 1619 | MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1620 | MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1621 | |
mmenke | 651bae7f | 2015-12-18 21:26:45 | [diff] [blame] | 1622 | SequencedSocketData http_data(http_reads, arraysize(http_reads), http_writes, |
| 1623 | arraysize(http_writes)); |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 1624 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1625 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1626 | |
| 1627 | // The QUIC transaction will not be allowed to complete. |
mmenke | 651bae7f | 2015-12-18 21:26:45 | [diff] [blame] | 1628 | MockWrite quic_writes[] = {MockWrite(SYNCHRONOUS, ERR_IO_PENDING, 1)}; |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1629 | MockRead quic_reads[] = { |
mmenke | 651bae7f | 2015-12-18 21:26:45 | [diff] [blame] | 1630 | MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0), |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1631 | }; |
mmenke | 651bae7f | 2015-12-18 21:26:45 | [diff] [blame] | 1632 | SequencedSocketData quic_data(quic_reads, arraysize(quic_reads), quic_writes, |
| 1633 | arraysize(quic_writes)); |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 1634 | socket_factory_.AddSocketDataProvider(&quic_data); |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1635 | |
| 1636 | // The HTTP transaction will complete. |
mmenke | 651bae7f | 2015-12-18 21:26:45 | [diff] [blame] | 1637 | SequencedSocketData http_data2(http_reads, arraysize(http_reads), http_writes, |
| 1638 | arraysize(http_writes)); |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 1639 | socket_factory_.AddSocketDataProvider(&http_data2); |
| 1640 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1641 | |
bnc | 912a04b | 2016-04-20 14:19:50 | [diff] [blame] | 1642 | CreateSession(); |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1643 | |
| 1644 | // Run the first request. |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1645 | SendRequestAndExpectHttpResponse("hello world"); |
rch | 37de576c | 2015-05-17 20:28:17 | [diff] [blame] | 1646 | ASSERT_TRUE(http_data.AllReadDataConsumed()); |
| 1647 | ASSERT_TRUE(http_data.AllWriteDataConsumed()); |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1648 | |
| 1649 | // Now run the second request in which the QUIC socket hangs, |
| 1650 | // and verify the the transaction continues over HTTP. |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1651 | SendRequestAndExpectHttpResponse("hello world"); |
mmenke | 651bae7f | 2015-12-18 21:26:45 | [diff] [blame] | 1652 | base::RunLoop().RunUntilIdle(); |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1653 | |
rch | 37de576c | 2015-05-17 20:28:17 | [diff] [blame] | 1654 | ASSERT_TRUE(http_data2.AllReadDataConsumed()); |
| 1655 | ASSERT_TRUE(http_data2.AllWriteDataConsumed()); |
mmenke | 651bae7f | 2015-12-18 21:26:45 | [diff] [blame] | 1656 | ASSERT_TRUE(quic_data.AllReadDataConsumed()); |
[email protected] | dda75ab | 2013-06-22 22:43:30 | [diff] [blame] | 1657 | } |
| 1658 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 1659 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithHttpRace) { |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 1660 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1661 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1662 | 1, kClientDataStreamId1, true, true, |
| 1663 | GetRequestHeaders("GET", "https", "/"))); |
| 1664 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 1665 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1666 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1667 | false, true, 0, "hello!")); |
| 1668 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
rch | b27683c | 2015-07-29 23:53:50 | [diff] [blame] | 1669 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 1670 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
[email protected] | 8ba8121 | 2013-05-03 13:11:48 | [diff] [blame] | 1671 | |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 1672 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
[email protected] | 8ba8121 | 2013-05-03 13:11:48 | [diff] [blame] | 1673 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1674 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 1675 | // the alternate-protocol job will "win". |
| 1676 | AddHangingNonAlternateProtocolSocketData(); |
| 1677 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1678 | CreateSession(); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 1679 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1680 | SendRequestAndExpectQuicResponse("hello!"); |
[email protected] | 8ba8121 | 2013-05-03 13:11:48 | [diff] [blame] | 1681 | } |
| 1682 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 1683 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithNoHttpRace) { |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 1684 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1685 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1686 | 1, kClientDataStreamId1, true, true, |
| 1687 | GetRequestHeaders("GET", "https", "/"))); |
| 1688 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 1689 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1690 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1691 | false, true, 0, "hello!")); |
| 1692 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
rch | b27683c | 2015-07-29 23:53:50 | [diff] [blame] | 1693 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 1694 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 1695 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
[email protected] | 3a120a6b | 2013-06-25 01:08:27 | [diff] [blame] | 1696 | |
| 1697 | // In order for a new QUIC session to be established via alternate-protocol |
| 1698 | // without racing an HTTP connection, we need the host resolution to happen |
| 1699 | // synchronously. |
| 1700 | host_resolver_.set_synchronous_mode(true); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1701 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1702 | ""); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1703 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
[email protected] | 3a120a6b | 2013-06-25 01:08:27 | [diff] [blame] | 1704 | AddressList address; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 1705 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 1706 | nullptr, net_log_.bound()); |
[email protected] | 3a120a6b | 2013-06-25 01:08:27 | [diff] [blame] | 1707 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1708 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1709 | CreateSession(); |
[email protected] | 3a120a6b | 2013-06-25 01:08:27 | [diff] [blame] | 1710 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1711 | SendRequestAndExpectQuicResponse("hello!"); |
| 1712 | } |
| 1713 | |
[email protected] | 0fc924b | 2014-03-31 04:34:15 | [diff] [blame] | 1714 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithProxy) { |
rdsmith | 82957ad | 2015-09-16 19:42:03 | [diff] [blame] | 1715 | proxy_service_ = ProxyService::CreateFixedFromPacResult("PROXY myproxy:70"); |
[email protected] | 0fc924b | 2014-03-31 04:34:15 | [diff] [blame] | 1716 | |
| 1717 | // Since we are using a proxy, the QUIC job will not succeed. |
| 1718 | MockWrite http_writes[] = { |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1719 | MockWrite(SYNCHRONOUS, 0, "GET http://mail.example.org/ HTTP/1.1\r\n"), |
| 1720 | MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1721 | MockWrite(SYNCHRONOUS, 2, "Proxy-Connection: keep-alive\r\n\r\n")}; |
[email protected] | 0fc924b | 2014-03-31 04:34:15 | [diff] [blame] | 1722 | |
| 1723 | MockRead http_reads[] = { |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1724 | MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), |
bnc | 1c196c6e | 2016-05-28 13:51:48 | [diff] [blame] | 1725 | MockRead(SYNCHRONOUS, 4, kQuicAlternativeServiceHeader), |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1726 | MockRead(SYNCHRONOUS, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6)}; |
[email protected] | 0fc924b | 2014-03-31 04:34:15 | [diff] [blame] | 1727 | |
| 1728 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), |
| 1729 | http_writes, arraysize(http_writes)); |
| 1730 | socket_factory_.AddSocketDataProvider(&http_data); |
| 1731 | |
| 1732 | // In order for a new QUIC session to be established via alternate-protocol |
| 1733 | // without racing an HTTP connection, we need the host resolution to happen |
| 1734 | // synchronously. |
| 1735 | host_resolver_.set_synchronous_mode(true); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1736 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1737 | ""); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1738 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
[email protected] | 0fc924b | 2014-03-31 04:34:15 | [diff] [blame] | 1739 | AddressList address; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 1740 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 1741 | nullptr, net_log_.bound()); |
[email protected] | 0fc924b | 2014-03-31 04:34:15 | [diff] [blame] | 1742 | |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1743 | request_.url = GURL("http://mail.example.org/"); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1744 | CreateSession(); |
[email protected] | 0fc924b | 2014-03-31 04:34:15 | [diff] [blame] | 1745 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1746 | SendRequestAndExpectHttpResponse("hello world"); |
| 1747 | } |
| 1748 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 1749 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithConfirmationRequired) { |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 1750 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1751 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1752 | 1, kClientDataStreamId1, true, true, |
| 1753 | GetRequestHeaders("GET", "https", "/"))); |
| 1754 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 1755 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1756 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 1757 | false, true, 0, "hello!")); |
| 1758 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 1759 | mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more data to read |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 1760 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
[email protected] | 11c0587 | 2013-08-20 02:04:12 | [diff] [blame] | 1761 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 1762 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 1763 | // the alternate-protocol job will "win". |
| 1764 | AddHangingNonAlternateProtocolSocketData(); |
| 1765 | |
[email protected] | 11c0587 | 2013-08-20 02:04:12 | [diff] [blame] | 1766 | // In order for a new QUIC session to be established via alternate-protocol |
| 1767 | // without racing an HTTP connection, we need the host resolution to happen |
| 1768 | // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| 1769 | // connection to the the server, in this test we require confirmation |
| 1770 | // before encrypting so the HTTP job will still start. |
| 1771 | host_resolver_.set_synchronous_mode(true); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1772 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 1773 | ""); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1774 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
[email protected] | 11c0587 | 2013-08-20 02:04:12 | [diff] [blame] | 1775 | AddressList address; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 1776 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 1777 | nullptr, net_log_.bound()); |
[email protected] | 11c0587 | 2013-08-20 02:04:12 | [diff] [blame] | 1778 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1779 | CreateSession(); |
[email protected] | 11c0587 | 2013-08-20 02:04:12 | [diff] [blame] | 1780 | session_->quic_stream_factory()->set_require_confirmation(true); |
| 1781 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1782 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1783 | std::unique_ptr<HttpNetworkTransaction> trans( |
[email protected] | 11c0587 | 2013-08-20 02:04:12 | [diff] [blame] | 1784 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 1785 | TestCompletionCallback callback; |
| 1786 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 1787 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 1788 | |
| 1789 | crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| 1790 | QuicSession::HANDSHAKE_CONFIRMED); |
| 1791 | EXPECT_EQ(OK, callback.WaitForResult()); |
rch | b27683c | 2015-07-29 23:53:50 | [diff] [blame] | 1792 | |
| 1793 | CheckWasQuicResponse(trans); |
| 1794 | CheckResponseData(trans, "hello!"); |
[email protected] | 11c0587 | 2013-08-20 02:04:12 | [diff] [blame] | 1795 | } |
| 1796 | |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1797 | TEST_P(QuicNetworkTransactionTest, |
| 1798 | LogGranularQuicErrorCodeOnQuicProtocolErrorLocal) { |
| 1799 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1800 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1801 | 1, kClientDataStreamId1, true, true, |
| 1802 | GetRequestHeaders("GET", "https", "/"))); |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1803 | // Read a close connection packet with |
| 1804 | // QuicErrorCode: QUIC_CRYPTO_VERSION_NOT_SUPPORTED from the peer. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1805 | mock_quic_data.AddRead(ConstructServerConnectionClosePacket(1)); |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1806 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1807 | |
| 1808 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 1809 | // the alternate-protocol job will "win". |
| 1810 | AddHangingNonAlternateProtocolSocketData(); |
| 1811 | |
| 1812 | // In order for a new QUIC session to be established via alternate-protocol |
| 1813 | // without racing an HTTP connection, we need the host resolution to happen |
| 1814 | // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| 1815 | // connection to the the server, in this test we require confirmation |
| 1816 | // before encrypting so the HTTP job will still start. |
| 1817 | host_resolver_.set_synchronous_mode(true); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1818 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1819 | ""); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1820 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1821 | AddressList address; |
| 1822 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 1823 | nullptr, net_log_.bound()); |
| 1824 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1825 | CreateSession(); |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1826 | session_->quic_stream_factory()->set_require_confirmation(true); |
| 1827 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1828 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1829 | std::unique_ptr<HttpNetworkTransaction> trans( |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1830 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 1831 | TestCompletionCallback callback; |
| 1832 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 1833 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 1834 | |
| 1835 | crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| 1836 | QuicSession::HANDSHAKE_CONFIRMED); |
| 1837 | EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); |
| 1838 | |
| 1839 | NetErrorDetails details; |
| 1840 | EXPECT_EQ(QUIC_NO_ERROR, details.quic_connection_error); |
| 1841 | |
| 1842 | trans->PopulateNetErrorDetails(&details); |
| 1843 | // Verify the error code logged is what sent by the peer. |
| 1844 | EXPECT_EQ(QUIC_CRYPTO_VERSION_NOT_SUPPORTED, details.quic_connection_error); |
| 1845 | } |
| 1846 | |
| 1847 | TEST_P(QuicNetworkTransactionTest, |
| 1848 | LogGranularQuicErrorCodeOnQuicProtocolErrorRemote) { |
| 1849 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1850 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1851 | 1, kClientDataStreamId1, true, true, |
| 1852 | GetRequestHeaders("GET", "https", "/"))); |
zhongyi | f28b4a3 | 2016-04-25 21:35:21 | [diff] [blame] | 1853 | // Peer sending data from an non-existing stream causes this end to raise |
| 1854 | // error and close connection. |
| 1855 | mock_quic_data.AddRead( |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1856 | ConstructServerRstPacket(1, false, 99, QUIC_STREAM_LAST_ERROR)); |
zhongyi | f28b4a3 | 2016-04-25 21:35:21 | [diff] [blame] | 1857 | std::string quic_error_details = "Data for nonexistent stream"; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1858 | mock_quic_data.AddWrite(ConstructClientAckAndConnectionClosePacket( |
zhongyi | f28b4a3 | 2016-04-25 21:35:21 | [diff] [blame] | 1859 | 2, QuicTime::Delta::Infinite(), 0, 1, QUIC_INVALID_STREAM_ID, |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1860 | quic_error_details)); |
| 1861 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1862 | |
| 1863 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 1864 | // the alternate-protocol job will "win". |
| 1865 | AddHangingNonAlternateProtocolSocketData(); |
| 1866 | |
| 1867 | // In order for a new QUIC session to be established via alternate-protocol |
| 1868 | // without racing an HTTP connection, we need the host resolution to happen |
| 1869 | // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| 1870 | // connection to the the server, in this test we require confirmation |
| 1871 | // before encrypting so the HTTP job will still start. |
| 1872 | host_resolver_.set_synchronous_mode(true); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1873 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1874 | ""); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 1875 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1876 | AddressList address; |
| 1877 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 1878 | nullptr, net_log_.bound()); |
| 1879 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 1880 | CreateSession(); |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1881 | session_->quic_stream_factory()->set_require_confirmation(true); |
| 1882 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1883 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1884 | std::unique_ptr<HttpNetworkTransaction> trans( |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1885 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 1886 | TestCompletionCallback callback; |
| 1887 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 1888 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 1889 | |
| 1890 | crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| 1891 | QuicSession::HANDSHAKE_CONFIRMED); |
| 1892 | EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); |
| 1893 | NetErrorDetails details; |
| 1894 | EXPECT_EQ(QUIC_NO_ERROR, details.quic_connection_error); |
| 1895 | |
| 1896 | trans->PopulateNetErrorDetails(&details); |
zhongyi | f28b4a3 | 2016-04-25 21:35:21 | [diff] [blame] | 1897 | EXPECT_EQ(QUIC_INVALID_STREAM_ID, details.quic_connection_error); |
zhongyi | ca364fbb | 2015-12-12 03:39:12 | [diff] [blame] | 1898 | } |
| 1899 | |
rch | cd5f1c6 | 2016-06-23 02:43:48 | [diff] [blame] | 1900 | TEST_P(QuicNetworkTransactionTest, RstSteamErrorHandling) { |
| 1901 | MockQuicData mock_quic_data; |
| 1902 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1903 | 1, kClientDataStreamId1, true, true, |
| 1904 | GetRequestHeaders("GET", "https", "/"))); |
| 1905 | // Read the response headers, then a RST_STREAM frame. |
| 1906 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
| 1907 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
| 1908 | mock_quic_data.AddRead(ConstructServerRstPacket( |
| 1909 | 2, false, kClientDataStreamId1, QUIC_STREAM_CANCELLED)); |
| 1910 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
| 1911 | mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data. |
| 1912 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1913 | |
| 1914 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 1915 | // the alternate-protocol job will "win". |
| 1916 | AddHangingNonAlternateProtocolSocketData(); |
| 1917 | |
| 1918 | // In order for a new QUIC session to be established via alternate-protocol |
| 1919 | // without racing an HTTP connection, we need the host resolution to happen |
| 1920 | // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| 1921 | // connection to the the server, in this test we require confirmation |
| 1922 | // before encrypting so the HTTP job will still start. |
| 1923 | host_resolver_.set_synchronous_mode(true); |
| 1924 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| 1925 | ""); |
| 1926 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
| 1927 | AddressList address; |
| 1928 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 1929 | nullptr, net_log_.bound()); |
| 1930 | |
| 1931 | CreateSession(); |
| 1932 | session_->quic_stream_factory()->set_require_confirmation(true); |
| 1933 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1934 | |
| 1935 | std::unique_ptr<HttpNetworkTransaction> trans( |
| 1936 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 1937 | TestCompletionCallback callback; |
| 1938 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 1939 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 1940 | |
| 1941 | crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| 1942 | QuicSession::HANDSHAKE_CONFIRMED); |
| 1943 | // Read the headers. |
| 1944 | EXPECT_EQ(OK, callback.WaitForResult()); |
| 1945 | |
| 1946 | const HttpResponseInfo* response = trans->GetResponseInfo(); |
| 1947 | ASSERT_TRUE(response != nullptr); |
| 1948 | ASSERT_TRUE(response->headers.get() != nullptr); |
| 1949 | EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| 1950 | EXPECT_TRUE(response->was_fetched_via_spdy); |
| 1951 | EXPECT_TRUE(response->was_npn_negotiated); |
| 1952 | EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_QUIC1_SPDY3, |
| 1953 | response->connection_info); |
| 1954 | |
| 1955 | std::string response_data; |
| 1956 | ASSERT_EQ(ERR_QUIC_PROTOCOL_ERROR, |
| 1957 | ReadTransaction(trans.get(), &response_data)); |
| 1958 | } |
| 1959 | |
| 1960 | TEST_P(QuicNetworkTransactionTest, RstSteamBeforeHeaders) { |
| 1961 | MockQuicData mock_quic_data; |
| 1962 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 1963 | 1, kClientDataStreamId1, true, true, |
| 1964 | GetRequestHeaders("GET", "https", "/"))); |
| 1965 | mock_quic_data.AddRead(ConstructServerRstPacket( |
| 1966 | 1, false, kClientDataStreamId1, QUIC_STREAM_CANCELLED)); |
| 1967 | mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data. |
| 1968 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1969 | |
| 1970 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 1971 | // the alternate-protocol job will "win". |
| 1972 | AddHangingNonAlternateProtocolSocketData(); |
| 1973 | |
| 1974 | // In order for a new QUIC session to be established via alternate-protocol |
| 1975 | // without racing an HTTP connection, we need the host resolution to happen |
| 1976 | // synchronously. Of course, even though QUIC *could* perform a 0-RTT |
| 1977 | // connection to the the server, in this test we require confirmation |
| 1978 | // before encrypting so the HTTP job will still start. |
| 1979 | host_resolver_.set_synchronous_mode(true); |
| 1980 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
| 1981 | ""); |
| 1982 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
| 1983 | AddressList address; |
| 1984 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 1985 | nullptr, net_log_.bound()); |
| 1986 | |
| 1987 | CreateSession(); |
| 1988 | session_->quic_stream_factory()->set_require_confirmation(true); |
| 1989 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 1990 | |
| 1991 | std::unique_ptr<HttpNetworkTransaction> trans( |
| 1992 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 1993 | TestCompletionCallback callback; |
| 1994 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 1995 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 1996 | |
| 1997 | crypto_client_stream_factory_.last_stream()->SendOnCryptoHandshakeEvent( |
| 1998 | QuicSession::HANDSHAKE_CONFIRMED); |
| 1999 | // Read the headers. |
| 2000 | EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); |
| 2001 | } |
| 2002 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 2003 | TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocol) { |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 2004 | // Alternate-protocol job |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2005 | std::unique_ptr<QuicEncryptedPacket> close( |
| 2006 | ConstructServerConnectionClosePacket(1)); |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 2007 | MockRead quic_reads[] = { |
rch | b27683c | 2015-07-29 23:53:50 | [diff] [blame] | 2008 | MockRead(ASYNC, close->data(), close->length()), |
| 2009 | MockRead(ASYNC, ERR_IO_PENDING), // No more data to read |
| 2010 | MockRead(ASYNC, OK), // EOF |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 2011 | }; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2012 | StaticSocketDataProvider quic_data(quic_reads, arraysize(quic_reads), nullptr, |
| 2013 | 0); |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 2014 | socket_factory_.AddSocketDataProvider(&quic_data); |
| 2015 | |
| 2016 | // Main job which will succeed even though the alternate job fails. |
| 2017 | MockRead http_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2018 | MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| 2019 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 2020 | MockRead(ASYNC, OK)}; |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 2021 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2022 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 2023 | 0); |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 2024 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 2025 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 2026 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 2027 | CreateSession(); |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 2028 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); |
| 2029 | SendRequestAndExpectHttpResponse("hello from http"); |
| 2030 | ExpectBrokenAlternateProtocolMapping(); |
[email protected] | 3316d42 | 2013-05-03 21:45:30 | [diff] [blame] | 2031 | } |
| 2032 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 2033 | TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocolReadError) { |
[email protected] | d03a66d | 2013-05-06 12:55:59 | [diff] [blame] | 2034 | // Alternate-protocol job |
| 2035 | MockRead quic_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2036 | MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
[email protected] | d03a66d | 2013-05-06 12:55:59 | [diff] [blame] | 2037 | }; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2038 | StaticSocketDataProvider quic_data(quic_reads, arraysize(quic_reads), nullptr, |
| 2039 | 0); |
[email protected] | d03a66d | 2013-05-06 12:55:59 | [diff] [blame] | 2040 | socket_factory_.AddSocketDataProvider(&quic_data); |
| 2041 | |
| 2042 | // Main job which will succeed even though the alternate job fails. |
| 2043 | MockRead http_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2044 | MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| 2045 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 2046 | MockRead(ASYNC, OK)}; |
[email protected] | d03a66d | 2013-05-06 12:55:59 | [diff] [blame] | 2047 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2048 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 2049 | 0); |
[email protected] | d03a66d | 2013-05-06 12:55:59 | [diff] [blame] | 2050 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 2051 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | d03a66d | 2013-05-06 12:55:59 | [diff] [blame] | 2052 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 2053 | CreateSession(); |
[email protected] | d03a66d | 2013-05-06 12:55:59 | [diff] [blame] | 2054 | |
[email protected] | aa9b14d | 2013-05-10 23:45:19 | [diff] [blame] | 2055 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); |
| 2056 | SendRequestAndExpectHttpResponse("hello from http"); |
| 2057 | ExpectBrokenAlternateProtocolMapping(); |
[email protected] | d03a66d | 2013-05-06 12:55:59 | [diff] [blame] | 2058 | } |
| 2059 | |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2060 | TEST_P(QuicNetworkTransactionTest, NoBrokenAlternateProtocolIfTcpFails) { |
[email protected] | eb71ab6 | 2014-05-23 07:57:53 | [diff] [blame] | 2061 | // Alternate-protocol job will fail when the session attempts to read. |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2062 | MockRead quic_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2063 | MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2064 | }; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2065 | StaticSocketDataProvider quic_data(quic_reads, arraysize(quic_reads), nullptr, |
| 2066 | 0); |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2067 | socket_factory_.AddSocketDataProvider(&quic_data); |
| 2068 | |
[email protected] | eb71ab6 | 2014-05-23 07:57:53 | [diff] [blame] | 2069 | // Main job will also fail. |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2070 | MockRead http_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2071 | MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2072 | }; |
| 2073 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2074 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 2075 | 0); |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2076 | http_data.set_connect_data(MockConnect(ASYNC, ERR_SOCKET_NOT_CONNECTED)); |
| 2077 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 2078 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2079 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 2080 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 2081 | CreateSession(); |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2082 | |
| 2083 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 2084 | std::unique_ptr<HttpNetworkTransaction> trans( |
[email protected] | 00c159f | 2014-05-21 22:38:16 | [diff] [blame] | 2085 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 2086 | TestCompletionCallback callback; |
| 2087 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 2088 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 2089 | EXPECT_EQ(ERR_SOCKET_NOT_CONNECTED, callback.WaitForResult()); |
| 2090 | ExpectQuicAlternateProtocolMapping(); |
| 2091 | } |
| 2092 | |
[email protected] | 1e96003 | 2013-12-20 19:00:20 | [diff] [blame] | 2093 | TEST_P(QuicNetworkTransactionTest, FailedZeroRttBrokenAlternateProtocol) { |
[email protected] | 77c6c16 | 2013-08-17 02:57:45 | [diff] [blame] | 2094 | // Alternate-protocol job |
| 2095 | MockRead quic_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2096 | MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), |
[email protected] | 77c6c16 | 2013-08-17 02:57:45 | [diff] [blame] | 2097 | }; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2098 | StaticSocketDataProvider quic_data(quic_reads, arraysize(quic_reads), nullptr, |
| 2099 | 0); |
[email protected] | 77c6c16 | 2013-08-17 02:57:45 | [diff] [blame] | 2100 | socket_factory_.AddSocketDataProvider(&quic_data); |
| 2101 | |
[email protected] | c92c1b5 | 2014-05-31 04:16:06 | [diff] [blame] | 2102 | // Second Alternate-protocol job which will race with the TCP job. |
| 2103 | StaticSocketDataProvider quic_data2(quic_reads, arraysize(quic_reads), |
rtenneti | be63573 | 2014-10-02 22:51:42 | [diff] [blame] | 2104 | nullptr, 0); |
[email protected] | c92c1b5 | 2014-05-31 04:16:06 | [diff] [blame] | 2105 | socket_factory_.AddSocketDataProvider(&quic_data2); |
| 2106 | |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 2107 | // Final job that will proceed when the QUIC job fails. |
| 2108 | MockRead http_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2109 | MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| 2110 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 2111 | MockRead(ASYNC, OK)}; |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 2112 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2113 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 2114 | 0); |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 2115 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 2116 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 2117 | |
rtenneti | afccbc06 | 2016-05-16 18:21:14 | [diff] [blame] | 2118 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 2119 | CreateSession(); |
[email protected] | 77c6c16 | 2013-08-17 02:57:45 | [diff] [blame] | 2120 | |
| 2121 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 2122 | |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 2123 | SendRequestAndExpectHttpResponse("hello from http"); |
[email protected] | 77c6c16 | 2013-08-17 02:57:45 | [diff] [blame] | 2124 | |
| 2125 | ExpectBrokenAlternateProtocolMapping(); |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 2126 | |
rch | 37de576c | 2015-05-17 20:28:17 | [diff] [blame] | 2127 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 2128 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
[email protected] | 77c6c16 | 2013-08-17 02:57:45 | [diff] [blame] | 2129 | } |
| 2130 | |
[email protected] | 93b3177 | 2014-06-19 08:03:35 | [diff] [blame] | 2131 | TEST_P(QuicNetworkTransactionTest, DISABLED_HangingZeroRttFallback) { |
[email protected] | 6576844 | 2014-06-06 23:37:03 | [diff] [blame] | 2132 | // Alternate-protocol job |
| 2133 | MockRead quic_reads[] = { |
mmenke | e2401192 | 2015-12-17 22:12:59 | [diff] [blame] | 2134 | MockRead(SYNCHRONOUS, ERR_IO_PENDING), |
[email protected] | 6576844 | 2014-06-06 23:37:03 | [diff] [blame] | 2135 | }; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2136 | StaticSocketDataProvider quic_data(quic_reads, arraysize(quic_reads), nullptr, |
| 2137 | 0); |
[email protected] | 6576844 | 2014-06-06 23:37:03 | [diff] [blame] | 2138 | socket_factory_.AddSocketDataProvider(&quic_data); |
| 2139 | |
| 2140 | // Main job that will proceed when the QUIC job fails. |
| 2141 | MockRead http_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2142 | MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| 2143 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 2144 | MockRead(ASYNC, OK)}; |
[email protected] | 6576844 | 2014-06-06 23:37:03 | [diff] [blame] | 2145 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2146 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 2147 | 0); |
[email protected] | 6576844 | 2014-06-06 23:37:03 | [diff] [blame] | 2148 | socket_factory_.AddSocketDataProvider(&http_data); |
| 2149 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 2150 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 2151 | CreateSession(); |
[email protected] | 6576844 | 2014-06-06 23:37:03 | [diff] [blame] | 2152 | |
| 2153 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 2154 | |
| 2155 | SendRequestAndExpectHttpResponse("hello from http"); |
| 2156 | } |
| 2157 | |
[email protected] | eb71ab6 | 2014-05-23 07:57:53 | [diff] [blame] | 2158 | TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocolOnConnectFailure) { |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 2159 | // Alternate-protocol job will fail before creating a QUIC session. |
rtenneti | be63573 | 2014-10-02 22:51:42 | [diff] [blame] | 2160 | StaticSocketDataProvider quic_data(nullptr, 0, nullptr, 0); |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2161 | quic_data.set_connect_data( |
| 2162 | MockConnect(SYNCHRONOUS, ERR_INTERNET_DISCONNECTED)); |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 2163 | socket_factory_.AddSocketDataProvider(&quic_data); |
| 2164 | |
| 2165 | // Main job which will succeed even though the alternate job fails. |
| 2166 | MockRead http_reads[] = { |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2167 | MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), |
| 2168 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 2169 | MockRead(ASYNC, OK)}; |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 2170 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2171 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 2172 | 0); |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 2173 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 2174 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 2175 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 2176 | CreateSession(); |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 2177 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); |
| 2178 | SendRequestAndExpectHttpResponse("hello from http"); |
[email protected] | eb71ab6 | 2014-05-23 07:57:53 | [diff] [blame] | 2179 | |
| 2180 | ExpectBrokenAlternateProtocolMapping(); |
[email protected] | 4d590c9c | 2014-05-02 05:14:33 | [diff] [blame] | 2181 | } |
| 2182 | |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2183 | TEST_P(QuicNetworkTransactionTest, ConnectionCloseDuringConnect) { |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2184 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2185 | mock_quic_data.AddSynchronousRead(ConstructServerConnectionClosePacket(1)); |
| 2186 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 2187 | 1, kClientDataStreamId1, true, true, |
| 2188 | GetRequestHeaders("GET", "https", "/"))); |
| 2189 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
rch | a5399e0 | 2015-04-21 19:32:04 | [diff] [blame] | 2190 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2191 | |
| 2192 | // When the QUIC connection fails, we will try the request again over HTTP. |
| 2193 | MockRead http_reads[] = { |
bnc | 1c196c6e | 2016-05-28 13:51:48 | [diff] [blame] | 2194 | MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kQuicAlternativeServiceHeader), |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 2195 | MockRead("hello world"), |
| 2196 | MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), |
| 2197 | MockRead(ASYNC, OK)}; |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2198 | |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2199 | StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), nullptr, |
| 2200 | 0); |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2201 | socket_factory_.AddSocketDataProvider(&http_data); |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 2202 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2203 | |
| 2204 | // In order for a new QUIC session to be established via alternate-protocol |
| 2205 | // without racing an HTTP connection, we need the host resolution to happen |
| 2206 | // synchronously. |
| 2207 | host_resolver_.set_synchronous_mode(true); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 2208 | host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", |
rch | f114d98 | 2015-10-21 01:34:56 | [diff] [blame] | 2209 | ""); |
rch | 9ae5b3b | 2016-02-11 00:36:29 | [diff] [blame] | 2210 | HostResolver::RequestInfo info(HostPortPair("mail.example.org", 443)); |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2211 | AddressList address; |
rjshade | d5ced07 | 2015-12-18 19:26:02 | [diff] [blame] | 2212 | host_resolver_.Resolve(info, DEFAULT_PRIORITY, &address, CompletionCallback(), |
| 2213 | nullptr, net_log_.bound()); |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2214 | |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 2215 | CreateSession(); |
[email protected] | 4fee967 | 2014-01-08 14:47:15 | [diff] [blame] | 2216 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); |
| 2217 | SendRequestAndExpectHttpResponse("hello world"); |
| 2218 | } |
| 2219 | |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 2220 | TEST_P(QuicNetworkTransactionTest, SecureResourceOverSecureQuic) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2221 | client_maker_.set_hostname("www.example.org"); |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 2222 | EXPECT_FALSE( |
| 2223 | test_socket_performance_watcher_factory_.rtt_notification_received()); |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 2224 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2225 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 2226 | 1, kClientDataStreamId1, true, true, |
| 2227 | GetRequestHeaders("GET", "https", "/"))); |
| 2228 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 2229 | 1, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"))); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2230 | mock_quic_data.AddRead(ConstructServerDataPacket(2, kClientDataStreamId1, |
| 2231 | false, true, 0, "hello!")); |
| 2232 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 1)); |
rch | b27683c | 2015-07-29 23:53:50 | [diff] [blame] | 2233 | mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // No more read data. |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 2234 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 2235 | |
bnc | b07c0553 | 2015-05-14 19:07:20 | [diff] [blame] | 2236 | request_.url = GURL("https://www.example.org:443"); |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 2237 | AddHangingNonAlternateProtocolSocketData(); |
rch | 3f4b845 | 2016-02-23 16:59:32 | [diff] [blame] | 2238 | CreateSession(); |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 2239 | AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| 2240 | SendRequestAndExpectQuicResponse("hello!"); |
tbansal | 0f56a39a | 2016-04-07 22:03:38 | [diff] [blame] | 2241 | EXPECT_TRUE( |
| 2242 | test_socket_performance_watcher_factory_.rtt_notification_received()); |
bnc | 50883590 | 2015-05-12 20:10:29 | [diff] [blame] | 2243 | } |
| 2244 | |
rtenneti | 5697781 | 2016-01-15 19:26:56 | [diff] [blame] | 2245 | TEST_P(QuicNetworkTransactionTest, QuicUpload) { |
rtenneti | 8a2f463 | 2016-03-21 20:26:57 | [diff] [blame] | 2246 | params_.origins_to_force_quic_on.insert( |
| 2247 | HostPortPair::FromString("mail.example.org:443")); |
rtenneti | 5697781 | 2016-01-15 19:26:56 | [diff] [blame] | 2248 | |
| 2249 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
| 2250 | MockWrite writes[] = {MockWrite(SYNCHRONOUS, ERR_FAILED, 1)}; |
| 2251 | SequencedSocketData socket_data(reads, arraysize(reads), writes, |
| 2252 | arraysize(writes)); |
| 2253 | socket_factory_.AddSocketDataProvider(&socket_data); |
| 2254 | |
rtenneti | b8e80fb | 2016-05-16 00:12:09 | [diff] [blame] | 2255 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 2256 | // the alternate-protocol job will "win". |
| 2257 | AddHangingNonAlternateProtocolSocketData(); |
| 2258 | |
rtenneti | 5697781 | 2016-01-15 19:26:56 | [diff] [blame] | 2259 | CreateSession(); |
| 2260 | request_.method = "POST"; |
| 2261 | ChunkedUploadDataStream upload_data(0); |
| 2262 | upload_data.AppendData("1", 1, true); |
| 2263 | |
| 2264 | request_.upload_data_stream = &upload_data; |
| 2265 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 2266 | std::unique_ptr<HttpNetworkTransaction> trans( |
rtenneti | 5697781 | 2016-01-15 19:26:56 | [diff] [blame] | 2267 | new HttpNetworkTransaction(DEFAULT_PRIORITY, session_.get())); |
| 2268 | TestCompletionCallback callback; |
| 2269 | int rv = trans->Start(&request_, callback.callback(), net_log_.bound()); |
| 2270 | EXPECT_EQ(ERR_IO_PENDING, rv); |
| 2271 | EXPECT_NE(OK, callback.WaitForResult()); |
| 2272 | } |
| 2273 | |
ckrasic | 769733c | 2016-06-30 00:42:13 | [diff] [blame] | 2274 | // Adds coverage to catch regression such as https://crbug.com/622043 |
| 2275 | TEST_P(QuicNetworkTransactionTest, QuicServerPush) { |
| 2276 | params_.origins_to_force_quic_on.insert( |
| 2277 | HostPortPair::FromString("mail.example.org:443")); |
| 2278 | |
| 2279 | MockQuicData mock_quic_data; |
| 2280 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 2281 | 1, kClientDataStreamId1, true, true, |
| 2282 | GetRequestHeaders("GET", "https", "/"))); |
| 2283 | QuicStreamOffset server_header_offset = 0; |
| 2284 | mock_quic_data.AddRead(ConstructServerPushPromisePacket( |
| 2285 | 1, kClientDataStreamId1, kServerDataStreamId1, false, |
| 2286 | GetRequestHeaders("GET", "https", "/pushed.jpg"), &server_header_offset, |
| 2287 | &server_maker_)); |
| 2288 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
| 2289 | 2, kClientDataStreamId1, false, false, GetResponseHeaders("200 OK"), |
| 2290 | &server_header_offset)); |
| 2291 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 2, 1, 1)); |
| 2292 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
| 2293 | 3, kServerDataStreamId1, false, false, GetResponseHeaders("200 OK"), |
| 2294 | &server_header_offset)); |
| 2295 | mock_quic_data.AddRead(ConstructServerDataPacket(4, kClientDataStreamId1, |
| 2296 | false, true, 0, "hello!")); |
| 2297 | mock_quic_data.AddWrite(ConstructClientAckPacket(3, 4, 3, 1)); |
| 2298 | mock_quic_data.AddRead(ConstructServerDataPacket( |
| 2299 | 5, kServerDataStreamId1, false, true, 0, "and hello!")); |
| 2300 | mock_quic_data.AddWrite( |
| 2301 | ConstructClientAckAndRstPacket(4, 4, QUIC_RST_ACKNOWLEDGEMENT, 5, 5, 1)); |
| 2302 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 2303 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
| 2304 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 2305 | |
| 2306 | // The non-alternate protocol job needs to hang in order to guarantee that |
| 2307 | // the alternate-protocol job will "win". |
| 2308 | AddHangingNonAlternateProtocolSocketData(); |
| 2309 | |
| 2310 | CreateSession(); |
| 2311 | |
| 2312 | // PUSH_PROMISE handling in the http layer gets exercised here. |
| 2313 | SendRequestAndExpectQuicResponse("hello!"); |
| 2314 | |
| 2315 | request_.url = GURL("https://mail.example.org/pushed.jpg"); |
| 2316 | SendRequestAndExpectQuicResponse("and hello!"); |
| 2317 | |
| 2318 | // Check that the NetLog was filled reasonably. |
| 2319 | TestNetLogEntry::List entries; |
| 2320 | net_log_.GetEntries(&entries); |
| 2321 | EXPECT_LT(0u, entries.size()); |
| 2322 | |
| 2323 | // Check that we logged a QUIC_HTTP_STREAM_ADOPTED_PUSH_STREAM |
| 2324 | int pos = ExpectLogContainsSomewhere( |
| 2325 | entries, 0, NetLog::TYPE_QUIC_HTTP_STREAM_ADOPTED_PUSH_STREAM, |
| 2326 | NetLog::PHASE_NONE); |
| 2327 | EXPECT_LT(0, pos); |
| 2328 | } |
| 2329 | |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2330 | class QuicNetworkTransactionWithDestinationTest |
| 2331 | : public PlatformTest, |
| 2332 | public ::testing::WithParamInterface<PoolingTestParams> { |
| 2333 | protected: |
| 2334 | QuicNetworkTransactionWithDestinationTest() |
| 2335 | : clock_(new MockClock), |
| 2336 | version_(GetParam().version), |
| 2337 | destination_type_(GetParam().destination_type), |
| 2338 | cert_transparency_verifier_(new MultiLogCTVerifier()), |
| 2339 | ssl_config_service_(new SSLConfigServiceDefaults), |
| 2340 | proxy_service_(ProxyService::CreateDirect()), |
| 2341 | auth_handler_factory_( |
| 2342 | HttpAuthHandlerFactory::CreateDefault(&host_resolver_)), |
| 2343 | random_generator_(0), |
| 2344 | ssl_data_(ASYNC, OK) {} |
| 2345 | |
| 2346 | void SetUp() override { |
| 2347 | NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
fdoray | 92e35a7 | 2016-06-10 15:54:55 | [diff] [blame] | 2348 | base::RunLoop().RunUntilIdle(); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2349 | |
| 2350 | HttpNetworkSession::Params params; |
| 2351 | |
| 2352 | clock_->AdvanceTime(QuicTime::Delta::FromMilliseconds(20)); |
| 2353 | params.quic_clock = clock_; |
| 2354 | |
| 2355 | crypto_client_stream_factory_.set_handshake_mode( |
| 2356 | MockCryptoClientStream::CONFIRM_HANDSHAKE); |
| 2357 | params.quic_crypto_client_stream_factory = &crypto_client_stream_factory_; |
| 2358 | |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2359 | params.enable_quic = true; |
| 2360 | params.quic_random = &random_generator_; |
| 2361 | params.client_socket_factory = &socket_factory_; |
| 2362 | params.host_resolver = &host_resolver_; |
| 2363 | params.cert_verifier = &cert_verifier_; |
| 2364 | params.transport_security_state = &transport_security_state_; |
| 2365 | params.cert_transparency_verifier = cert_transparency_verifier_.get(); |
rsleevi | d6de830 | 2016-06-21 01:33:20 | [diff] [blame] | 2366 | params.ct_policy_enforcer = &ct_policy_enforcer_; |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2367 | params.socket_performance_watcher_factory = |
| 2368 | &test_socket_performance_watcher_factory_; |
| 2369 | params.ssl_config_service = ssl_config_service_.get(); |
| 2370 | params.proxy_service = proxy_service_.get(); |
| 2371 | params.http_auth_handler_factory = auth_handler_factory_.get(); |
bnc | 525e175a | 2016-06-20 12:36:40 | [diff] [blame] | 2372 | params.http_server_properties = &http_server_properties_; |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2373 | params.quic_supported_versions = SupportedVersions(version_); |
| 2374 | params.quic_host_whitelist.insert("news.example.org"); |
| 2375 | params.quic_host_whitelist.insert("mail.example.org"); |
| 2376 | params.quic_host_whitelist.insert("mail.example.com"); |
| 2377 | |
| 2378 | session_.reset(new HttpNetworkSession(params)); |
| 2379 | session_->quic_stream_factory()->set_require_confirmation(true); |
| 2380 | ASSERT_EQ(params.quic_socket_receive_buffer_size, |
| 2381 | session_->quic_stream_factory()->socket_receive_buffer_size()); |
| 2382 | } |
| 2383 | |
| 2384 | void TearDown() override { |
| 2385 | NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| 2386 | // Empty the current queue. |
fdoray | 92e35a7 | 2016-06-10 15:54:55 | [diff] [blame] | 2387 | base::RunLoop().RunUntilIdle(); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2388 | PlatformTest::TearDown(); |
| 2389 | NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
fdoray | 92e35a7 | 2016-06-10 15:54:55 | [diff] [blame] | 2390 | base::RunLoop().RunUntilIdle(); |
bnc | 525e175a | 2016-06-20 12:36:40 | [diff] [blame] | 2391 | session_.reset(); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2392 | } |
| 2393 | |
| 2394 | void SetAlternativeService(const std::string& origin) { |
| 2395 | HostPortPair destination; |
| 2396 | switch (destination_type_) { |
| 2397 | case SAME_AS_FIRST: |
| 2398 | destination = HostPortPair(origin1_, 443); |
| 2399 | break; |
| 2400 | case SAME_AS_SECOND: |
| 2401 | destination = HostPortPair(origin2_, 443); |
| 2402 | break; |
| 2403 | case DIFFERENT: |
| 2404 | destination = HostPortPair(kDifferentHostname, 443); |
| 2405 | break; |
| 2406 | } |
| 2407 | AlternativeService alternative_service(QUIC, destination); |
| 2408 | base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); |
| 2409 | http_server_properties_.SetAlternativeService( |
| 2410 | url::SchemeHostPort("https", origin, 443), alternative_service, |
| 2411 | expiration); |
| 2412 | } |
| 2413 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2414 | std::unique_ptr<QuicEncryptedPacket> ConstructClientRequestHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2415 | QuicPacketNumber packet_number, |
| 2416 | QuicStreamId stream_id, |
| 2417 | bool should_include_version, |
| 2418 | QuicStreamOffset* offset, |
| 2419 | QuicTestPacketMaker* maker) { |
| 2420 | SpdyPriority priority = |
| 2421 | ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); |
| 2422 | SpdyHeaderBlock headers(maker->GetRequestHeaders("GET", "https", "/")); |
| 2423 | return maker->MakeRequestHeadersPacketWithOffsetTracking( |
| 2424 | packet_number, stream_id, should_include_version, true, priority, |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 2425 | std::move(headers), offset); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2426 | } |
| 2427 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2428 | std::unique_ptr<QuicEncryptedPacket> ConstructClientRequestHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2429 | QuicPacketNumber packet_number, |
| 2430 | QuicStreamId stream_id, |
| 2431 | bool should_include_version, |
| 2432 | QuicTestPacketMaker* maker) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2433 | return ConstructClientRequestHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2434 | packet_number, stream_id, should_include_version, nullptr, maker); |
| 2435 | } |
| 2436 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2437 | std::unique_ptr<QuicEncryptedPacket> ConstructServerResponseHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2438 | QuicPacketNumber packet_number, |
| 2439 | QuicStreamId stream_id, |
| 2440 | QuicStreamOffset* offset, |
| 2441 | QuicTestPacketMaker* maker) { |
| 2442 | SpdyHeaderBlock headers(maker->GetResponseHeaders("200 OK")); |
| 2443 | return maker->MakeResponseHeadersPacketWithOffsetTracking( |
bnc | 086b39e1 | 2016-06-24 13:05:26 | [diff] [blame] | 2444 | packet_number, stream_id, false, false, std::move(headers), offset); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2445 | } |
| 2446 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2447 | std::unique_ptr<QuicEncryptedPacket> ConstructServerResponseHeadersPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2448 | QuicPacketNumber packet_number, |
| 2449 | QuicStreamId stream_id, |
| 2450 | QuicTestPacketMaker* maker) { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2451 | return ConstructServerResponseHeadersPacket(packet_number, stream_id, |
| 2452 | nullptr, maker); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2453 | } |
| 2454 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2455 | std::unique_ptr<QuicEncryptedPacket> ConstructServerDataPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2456 | QuicPacketNumber packet_number, |
| 2457 | QuicStreamId stream_id, |
| 2458 | QuicTestPacketMaker* maker) { |
| 2459 | return maker->MakeDataPacket(packet_number, stream_id, false, true, 0, |
| 2460 | "hello"); |
| 2461 | } |
| 2462 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2463 | std::unique_ptr<QuicEncryptedPacket> ConstructClientAckPacket( |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2464 | QuicPacketNumber packet_number, |
| 2465 | QuicPacketNumber largest_received, |
| 2466 | QuicPacketNumber ack_least_unacked, |
| 2467 | QuicPacketNumber stop_least_unacked, |
| 2468 | QuicTestPacketMaker* maker) { |
| 2469 | return maker->MakeAckPacket(packet_number, largest_received, |
| 2470 | ack_least_unacked, stop_least_unacked, true); |
| 2471 | } |
| 2472 | |
| 2473 | void AddRefusedSocketData() { |
| 2474 | std::unique_ptr<StaticSocketDataProvider> refused_data( |
| 2475 | new StaticSocketDataProvider()); |
| 2476 | MockConnect refused_connect(SYNCHRONOUS, ERR_CONNECTION_REFUSED); |
| 2477 | refused_data->set_connect_data(refused_connect); |
| 2478 | socket_factory_.AddSocketDataProvider(refused_data.get()); |
| 2479 | static_socket_data_provider_vector_.push_back(std::move(refused_data)); |
| 2480 | } |
| 2481 | |
| 2482 | void AddHangingSocketData() { |
| 2483 | std::unique_ptr<StaticSocketDataProvider> hanging_data( |
| 2484 | new StaticSocketDataProvider()); |
| 2485 | MockConnect hanging_connect(SYNCHRONOUS, ERR_IO_PENDING); |
| 2486 | hanging_data->set_connect_data(hanging_connect); |
| 2487 | socket_factory_.AddSocketDataProvider(hanging_data.get()); |
| 2488 | static_socket_data_provider_vector_.push_back(std::move(hanging_data)); |
| 2489 | socket_factory_.AddSSLSocketDataProvider(&ssl_data_); |
| 2490 | } |
| 2491 | |
| 2492 | bool AllDataConsumed() { |
| 2493 | for (const auto& socket_data_ptr : static_socket_data_provider_vector_) { |
| 2494 | if (!socket_data_ptr->AllReadDataConsumed() || |
| 2495 | !socket_data_ptr->AllWriteDataConsumed()) { |
| 2496 | return false; |
| 2497 | } |
| 2498 | } |
| 2499 | return true; |
| 2500 | } |
| 2501 | |
| 2502 | void SendRequestAndExpectQuicResponse(const std::string& host) { |
| 2503 | HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| 2504 | HttpRequestInfo request; |
| 2505 | std::string url("https://"); |
| 2506 | url.append(host); |
| 2507 | request.url = GURL(url); |
| 2508 | request.load_flags = 0; |
| 2509 | request.method = "GET"; |
| 2510 | TestCompletionCallback callback; |
| 2511 | int rv = trans.Start(&request, callback.callback(), net_log_.bound()); |
| 2512 | EXPECT_EQ(OK, callback.GetResult(rv)); |
| 2513 | |
| 2514 | std::string response_data; |
| 2515 | ASSERT_EQ(OK, ReadTransaction(&trans, &response_data)); |
| 2516 | EXPECT_EQ("hello", response_data); |
| 2517 | |
| 2518 | const HttpResponseInfo* response = trans.GetResponseInfo(); |
| 2519 | ASSERT_TRUE(response != nullptr); |
| 2520 | ASSERT_TRUE(response->headers.get() != nullptr); |
| 2521 | EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); |
| 2522 | EXPECT_TRUE(response->was_fetched_via_spdy); |
| 2523 | EXPECT_TRUE(response->was_npn_negotiated); |
| 2524 | EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_QUIC1_SPDY3, |
| 2525 | response->connection_info); |
| 2526 | EXPECT_EQ(443, response->socket_address.port()); |
| 2527 | } |
| 2528 | |
| 2529 | MockClock* clock_; |
| 2530 | QuicVersion version_; |
| 2531 | DestinationType destination_type_; |
| 2532 | std::string origin1_; |
| 2533 | std::string origin2_; |
| 2534 | std::unique_ptr<HttpNetworkSession> session_; |
| 2535 | MockClientSocketFactory socket_factory_; |
| 2536 | MockHostResolver host_resolver_; |
| 2537 | MockCertVerifier cert_verifier_; |
| 2538 | TransportSecurityState transport_security_state_; |
| 2539 | std::unique_ptr<CTVerifier> cert_transparency_verifier_; |
rsleevi | d6de830 | 2016-06-21 01:33:20 | [diff] [blame] | 2540 | CTPolicyEnforcer ct_policy_enforcer_; |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2541 | TestSocketPerformanceWatcherFactory test_socket_performance_watcher_factory_; |
| 2542 | scoped_refptr<SSLConfigServiceDefaults> ssl_config_service_; |
| 2543 | std::unique_ptr<ProxyService> proxy_service_; |
| 2544 | std::unique_ptr<HttpAuthHandlerFactory> auth_handler_factory_; |
| 2545 | MockRandom random_generator_; |
| 2546 | HttpServerPropertiesImpl http_server_properties_; |
| 2547 | BoundTestNetLog net_log_; |
| 2548 | MockCryptoClientStreamFactory crypto_client_stream_factory_; |
| 2549 | std::vector<std::unique_ptr<StaticSocketDataProvider>> |
| 2550 | static_socket_data_provider_vector_; |
| 2551 | SSLSocketDataProvider ssl_data_; |
| 2552 | }; |
| 2553 | |
| 2554 | INSTANTIATE_TEST_CASE_P(Version, |
| 2555 | QuicNetworkTransactionWithDestinationTest, |
| 2556 | ::testing::ValuesIn(GetPoolingTestParams())); |
| 2557 | |
| 2558 | // A single QUIC request fails because the certificate does not match the origin |
| 2559 | // hostname, regardless of whether it matches the alternative service hostname. |
| 2560 | TEST_P(QuicNetworkTransactionWithDestinationTest, InvalidCertificate) { |
| 2561 | if (destination_type_ == DIFFERENT) |
| 2562 | return; |
| 2563 | |
| 2564 | GURL url("https://mail.example.com/"); |
| 2565 | origin1_ = url.host(); |
| 2566 | |
| 2567 | // Not used for requests, but this provides a test case where the certificate |
| 2568 | // is valid for the hostname of the alternative service. |
| 2569 | origin2_ = "mail.example.org"; |
| 2570 | |
| 2571 | SetAlternativeService(origin1_); |
| 2572 | |
| 2573 | scoped_refptr<X509Certificate> cert( |
| 2574 | ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| 2575 | bool unused; |
| 2576 | ASSERT_FALSE(cert->VerifyNameMatch(origin1_, &unused)); |
| 2577 | ASSERT_TRUE(cert->VerifyNameMatch(origin2_, &unused)); |
| 2578 | |
| 2579 | ProofVerifyDetailsChromium verify_details; |
| 2580 | verify_details.cert_verify_result.verified_cert = cert; |
| 2581 | verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 2582 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| 2583 | |
| 2584 | MockQuicData mock_quic_data; |
| 2585 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 2586 | mock_quic_data.AddRead(ASYNC, 0); |
| 2587 | |
| 2588 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 2589 | |
| 2590 | AddRefusedSocketData(); |
| 2591 | |
| 2592 | HttpRequestInfo request; |
| 2593 | request.url = url; |
| 2594 | |
| 2595 | HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); |
| 2596 | TestCompletionCallback callback; |
| 2597 | int rv = trans.Start(&request, callback.callback(), net_log_.bound()); |
| 2598 | EXPECT_EQ(ERR_CONNECTION_REFUSED, callback.GetResult(rv)); |
| 2599 | |
| 2600 | EXPECT_TRUE(AllDataConsumed()); |
| 2601 | } |
| 2602 | |
| 2603 | // First request opens QUIC session to alternative service. Second request |
| 2604 | // pools to it, because destination matches and certificate is valid, even |
| 2605 | // though QuicServerId is different. |
| 2606 | TEST_P(QuicNetworkTransactionWithDestinationTest, PoolIfCertificateValid) { |
| 2607 | origin1_ = "mail.example.org"; |
| 2608 | origin2_ = "news.example.org"; |
| 2609 | |
| 2610 | SetAlternativeService(origin1_); |
| 2611 | SetAlternativeService(origin2_); |
| 2612 | |
| 2613 | scoped_refptr<X509Certificate> cert( |
| 2614 | ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| 2615 | bool unused; |
| 2616 | ASSERT_TRUE(cert->VerifyNameMatch(origin1_, &unused)); |
| 2617 | ASSERT_TRUE(cert->VerifyNameMatch(origin2_, &unused)); |
| 2618 | ASSERT_FALSE(cert->VerifyNameMatch(kDifferentHostname, &unused)); |
| 2619 | |
| 2620 | ProofVerifyDetailsChromium verify_details; |
| 2621 | verify_details.cert_verify_result.verified_cert = cert; |
| 2622 | verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 2623 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); |
| 2624 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2625 | QuicTestPacketMaker client_maker1(version_, 0, clock_, origin1_, |
| 2626 | Perspective::IS_CLIENT); |
| 2627 | QuicTestPacketMaker server_maker1(version_, 0, clock_, origin1_, |
| 2628 | Perspective::IS_SERVER); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2629 | |
| 2630 | QuicStreamOffset request_header_offset(0); |
| 2631 | QuicStreamOffset response_header_offset(0); |
| 2632 | |
| 2633 | MockQuicData mock_quic_data; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2634 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 2635 | 1, kClientDataStreamId1, true, &request_header_offset, &client_maker1)); |
| 2636 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
| 2637 | 1, kClientDataStreamId1, &response_header_offset, &server_maker1)); |
| 2638 | mock_quic_data.AddRead( |
| 2639 | ConstructServerDataPacket(2, kClientDataStreamId1, &server_maker1)); |
| 2640 | mock_quic_data.AddWrite(ConstructClientAckPacket(2, 2, 1, 1, &client_maker1)); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2641 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2642 | QuicTestPacketMaker client_maker2(version_, 0, clock_, origin2_, |
| 2643 | Perspective::IS_CLIENT); |
| 2644 | QuicTestPacketMaker server_maker2(version_, 0, clock_, origin2_, |
| 2645 | Perspective::IS_SERVER); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2646 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2647 | mock_quic_data.AddWrite(ConstructClientRequestHeadersPacket( |
| 2648 | 3, kClientDataStreamId2, false, &request_header_offset, &client_maker2)); |
| 2649 | mock_quic_data.AddRead(ConstructServerResponseHeadersPacket( |
| 2650 | 3, kClientDataStreamId2, &response_header_offset, &server_maker2)); |
| 2651 | mock_quic_data.AddRead( |
| 2652 | ConstructServerDataPacket(4, kClientDataStreamId2, &server_maker2)); |
| 2653 | mock_quic_data.AddWrite(ConstructClientAckPacket(4, 4, 3, 1, &client_maker2)); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2654 | mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 2655 | mock_quic_data.AddRead(ASYNC, 0); // EOF |
| 2656 | |
| 2657 | mock_quic_data.AddSocketDataToFactory(&socket_factory_); |
| 2658 | |
| 2659 | AddHangingSocketData(); |
| 2660 | AddHangingSocketData(); |
| 2661 | |
| 2662 | SendRequestAndExpectQuicResponse(origin1_); |
| 2663 | SendRequestAndExpectQuicResponse(origin2_); |
| 2664 | |
| 2665 | EXPECT_TRUE(AllDataConsumed()); |
| 2666 | } |
| 2667 | |
| 2668 | // First request opens QUIC session to alternative service. Second request does |
| 2669 | // not pool to it, even though destination matches, because certificate is not |
| 2670 | // valid. Instead, a new QUIC session is opened to the same destination with a |
| 2671 | // different QuicServerId. |
| 2672 | TEST_P(QuicNetworkTransactionWithDestinationTest, |
| 2673 | DoNotPoolIfCertificateInvalid) { |
| 2674 | origin1_ = "news.example.org"; |
| 2675 | origin2_ = "mail.example.com"; |
| 2676 | |
| 2677 | SetAlternativeService(origin1_); |
| 2678 | SetAlternativeService(origin2_); |
| 2679 | |
| 2680 | scoped_refptr<X509Certificate> cert1( |
| 2681 | ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); |
| 2682 | bool unused; |
| 2683 | ASSERT_TRUE(cert1->VerifyNameMatch(origin1_, &unused)); |
| 2684 | ASSERT_FALSE(cert1->VerifyNameMatch(origin2_, &unused)); |
| 2685 | ASSERT_FALSE(cert1->VerifyNameMatch(kDifferentHostname, &unused)); |
| 2686 | |
| 2687 | scoped_refptr<X509Certificate> cert2( |
| 2688 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); |
| 2689 | ASSERT_TRUE(cert2->VerifyNameMatch(origin2_, &unused)); |
| 2690 | ASSERT_FALSE(cert2->VerifyNameMatch(kDifferentHostname, &unused)); |
| 2691 | |
| 2692 | ProofVerifyDetailsChromium verify_details1; |
| 2693 | verify_details1.cert_verify_result.verified_cert = cert1; |
| 2694 | verify_details1.cert_verify_result.is_issued_by_known_root = true; |
| 2695 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details1); |
| 2696 | |
| 2697 | ProofVerifyDetailsChromium verify_details2; |
| 2698 | verify_details2.cert_verify_result.verified_cert = cert2; |
| 2699 | verify_details2.cert_verify_result.is_issued_by_known_root = true; |
| 2700 | crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details2); |
| 2701 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2702 | QuicTestPacketMaker client_maker1(version_, 0, clock_, origin1_, |
| 2703 | Perspective::IS_CLIENT); |
| 2704 | QuicTestPacketMaker server_maker1(version_, 0, clock_, origin1_, |
| 2705 | Perspective::IS_SERVER); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2706 | |
| 2707 | MockQuicData mock_quic_data1; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2708 | mock_quic_data1.AddWrite(ConstructClientRequestHeadersPacket( |
| 2709 | 1, kClientDataStreamId1, true, &client_maker1)); |
| 2710 | mock_quic_data1.AddRead(ConstructServerResponseHeadersPacket( |
| 2711 | 1, kClientDataStreamId1, &server_maker1)); |
| 2712 | mock_quic_data1.AddRead( |
| 2713 | ConstructServerDataPacket(2, kClientDataStreamId1, &server_maker1)); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2714 | mock_quic_data1.AddWrite( |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2715 | ConstructClientAckPacket(2, 2, 1, 1, &client_maker1)); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2716 | mock_quic_data1.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 2717 | mock_quic_data1.AddRead(ASYNC, 0); // EOF |
| 2718 | |
| 2719 | mock_quic_data1.AddSocketDataToFactory(&socket_factory_); |
| 2720 | |
| 2721 | AddHangingSocketData(); |
| 2722 | |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2723 | QuicTestPacketMaker client_maker2(version_, 0, clock_, origin2_, |
| 2724 | Perspective::IS_CLIENT); |
| 2725 | QuicTestPacketMaker server_maker2(version_, 0, clock_, origin2_, |
| 2726 | Perspective::IS_SERVER); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2727 | |
| 2728 | MockQuicData mock_quic_data2; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2729 | mock_quic_data2.AddWrite(ConstructClientRequestHeadersPacket( |
| 2730 | 1, kClientDataStreamId1, true, &client_maker2)); |
| 2731 | mock_quic_data2.AddRead(ConstructServerResponseHeadersPacket( |
| 2732 | 1, kClientDataStreamId1, &server_maker2)); |
| 2733 | mock_quic_data2.AddRead( |
| 2734 | ConstructServerDataPacket(2, kClientDataStreamId1, &server_maker2)); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2735 | mock_quic_data2.AddWrite( |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 2736 | ConstructClientAckPacket(2, 2, 1, 1, &client_maker2)); |
bnc | 359ed2a | 2016-04-29 20:43:45 | [diff] [blame] | 2737 | mock_quic_data2.AddRead(ASYNC, ERR_IO_PENDING); // No more data to read |
| 2738 | mock_quic_data2.AddRead(ASYNC, 0); // EOF |
| 2739 | |
| 2740 | mock_quic_data2.AddSocketDataToFactory(&socket_factory_); |
| 2741 | |
| 2742 | AddHangingSocketData(); |
| 2743 | |
| 2744 | SendRequestAndExpectQuicResponse(origin1_); |
| 2745 | SendRequestAndExpectQuicResponse(origin2_); |
| 2746 | |
| 2747 | EXPECT_TRUE(AllDataConsumed()); |
| 2748 | } |
| 2749 | |
[email protected] | 61a52778 | 2013-02-21 03:58:00 | [diff] [blame] | 2750 | } // namespace test |
| 2751 | } // namespace net |