[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 5 | #include "net/quic/quic_chromium_client_session.h" |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 6 | |
| 7 | #include <vector> |
| 8 | |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 9 | #include "base/base64.h" |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 10 | #include "base/files/file_path.h" |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 11 | #include "base/memory/ptr_util.h" |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 12 | #include "base/rand_util.h" |
skyostil | 4891b25b | 2015-06-11 11:43:45 | [diff] [blame] | 13 | #include "base/thread_task_runner_handle.h" |
tbansal | fdf5665b | 2015-09-21 22:46:40 | [diff] [blame] | 14 | #include "net/base/socket_performance_watcher.h" |
[email protected] | 8ee611b | 2012-11-20 01:48:12 | [diff] [blame] | 15 | #include "net/base/test_completion_callback.h" |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 16 | #include "net/base/test_data_directory.h" |
| 17 | #include "net/cert/cert_verify_result.h" |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 18 | #include "net/http/transport_security_state.h" |
vishal.b | 62985ca9 | 2015-04-17 08:45:51 | [diff] [blame] | 19 | #include "net/log/test_net_log.h" |
[email protected] | 0bbeb697 | 2013-05-23 04:10:21 | [diff] [blame] | 20 | #include "net/quic/crypto/aes_128_gcm_12_encrypter.h" |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 21 | #include "net/quic/crypto/crypto_protocol.h" |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 22 | #include "net/quic/crypto/proof_verifier_chromium.h" |
[email protected] | 4df6984 | 2013-02-27 06:32:16 | [diff] [blame] | 23 | #include "net/quic/crypto/quic_decrypter.h" |
| 24 | #include "net/quic/crypto/quic_encrypter.h" |
[email protected] | 17bf15c | 2014-03-14 10:08:04 | [diff] [blame] | 25 | #include "net/quic/crypto/quic_server_info.h" |
rch | 16c74d1d | 2016-04-22 06:14:07 | [diff] [blame^] | 26 | #include "net/quic/quic_chromium_alarm_factory.h" |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 27 | #include "net/quic/quic_chromium_connection_helper.h" |
rch | a02807b4 | 2016-01-29 21:56:15 | [diff] [blame] | 28 | #include "net/quic/quic_chromium_packet_reader.h" |
| 29 | #include "net/quic/quic_chromium_packet_writer.h" |
rch | 1f83eaf3 | 2016-01-06 00:27:11 | [diff] [blame] | 30 | #include "net/quic/quic_crypto_client_stream_factory.h" |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 31 | #include "net/quic/quic_flags.h" |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 32 | #include "net/quic/quic_http_utils.h" |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 33 | #include "net/quic/quic_packet_writer.h" |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 34 | #include "net/quic/quic_protocol.h" |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 35 | #include "net/quic/test_tools/crypto_test_utils.h" |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 36 | #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 37 | #include "net/quic/test_tools/quic_chromium_client_session_peer.h" |
rtenneti | b865eb8 | 2015-06-17 20:21:46 | [diff] [blame] | 38 | #include "net/quic/test_tools/quic_spdy_session_peer.h" |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 39 | #include "net/quic/test_tools/quic_test_packet_maker.h" |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 40 | #include "net/quic/test_tools/quic_test_utils.h" |
[email protected] | c58a83ec | 2014-04-20 22:21:50 | [diff] [blame] | 41 | #include "net/quic/test_tools/simple_quic_framer.h" |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 42 | #include "net/socket/socket_test_util.h" |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 43 | #include "net/spdy/spdy_test_utils.h" |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 44 | #include "net/test/cert_test_util.h" |
[email protected] | 18ccfdb | 2013-08-15 00:13:44 | [diff] [blame] | 45 | #include "net/udp/datagram_client_socket.h" |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 46 | |
| 47 | using testing::_; |
| 48 | |
| 49 | namespace net { |
| 50 | namespace test { |
| 51 | namespace { |
| 52 | |
eroman | 36d84e5443 | 2016-03-17 03:23:02 | [diff] [blame] | 53 | const IPEndPoint kIpEndPoint = IPEndPoint(IPAddress::IPv4AllZeros(), 0); |
rch | 1fe2eeb | 2015-10-26 14:45:57 | [diff] [blame] | 54 | const char kServerHostname[] = "test.example.com"; |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 55 | const uint16_t kServerPort = 443; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 56 | const size_t kMaxReadersPerQuicSession = 5; |
| 57 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 58 | class QuicChromiumClientSessionTest |
| 59 | : public ::testing::TestWithParam<QuicVersion> { |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 60 | protected: |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 61 | QuicChromiumClientSessionTest() |
rch | 1fe2eeb | 2015-10-26 14:45:57 | [diff] [blame] | 62 | : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 63 | default_read_(new MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)), |
| 64 | socket_data_( |
| 65 | new SequencedSocketData(default_read_.get(), 1, nullptr, 0)), |
| 66 | random_(0), |
rch | 16c74d1d | 2016-04-22 06:14:07 | [diff] [blame^] | 67 | helper_(&clock_, &random_), |
| 68 | alarm_factory_(base::ThreadTaskRunnerHandle::Get().get(), &clock_), |
xunjieli | c70cc86 | 2016-02-19 15:29:26 | [diff] [blame] | 69 | maker_(GetParam(), 0, &clock_, kServerHostname) { |
| 70 | // Advance the time, because timers do not like uninitialized times. |
| 71 | clock_.AdvanceTime(QuicTime::Delta::FromSeconds(1)); |
| 72 | } |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 73 | |
| 74 | void Initialize() { |
| 75 | socket_factory_.AddSocketDataProvider(socket_data_.get()); |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 76 | std::unique_ptr<DatagramClientSocket> socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 77 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
| 78 | base::Bind(&base::RandInt), |
| 79 | &net_log_, NetLog::Source()); |
| 80 | socket->Connect(kIpEndPoint); |
rch | a02807b4 | 2016-01-29 21:56:15 | [diff] [blame] | 81 | QuicChromiumPacketWriter* writer = |
| 82 | new net::QuicChromiumPacketWriter(socket.get()); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 83 | QuicConnection* connection = new QuicConnection( |
rch | 16c74d1d | 2016-04-22 06:14:07 | [diff] [blame^] | 84 | 0, kIpEndPoint, &helper_, &alarm_factory_, writer, true, |
| 85 | Perspective::IS_CLIENT, SupportedVersions(GetParam())); |
jdorfman | 90d185f3 | 2016-01-15 13:22:47 | [diff] [blame] | 86 | writer->SetConnection(connection); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 87 | session_.reset(new QuicChromiumClientSession( |
| 88 | connection, std::move(socket), |
| 89 | /*stream_factory=*/nullptr, &crypto_client_stream_factory_, &clock_, |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 90 | &transport_security_state_, base::WrapUnique((QuicServerInfo*)nullptr), |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 91 | QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED), |
| 92 | kQuicYieldAfterPacketsRead, |
| 93 | QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), |
| 94 | /*cert_verify_flags=*/0, DefaultQuicConfig(), &crypto_config_, |
ckrasic | 244375a3 | 2016-02-04 21:21:22 | [diff] [blame] | 95 | "CONNECTION_UNKNOWN", base::TimeTicks::Now(), &push_promise_index_, |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 96 | base::ThreadTaskRunnerHandle::Get().get(), |
| 97 | /*socket_performance_watcher=*/nullptr, &net_log_)); |
| 98 | |
| 99 | scoped_refptr<X509Certificate> cert( |
| 100 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); |
| 101 | verify_details_.cert_verify_result.verified_cert = cert; |
| 102 | verify_details_.cert_verify_result.is_issued_by_known_root = true; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 103 | session_->Initialize(); |
| 104 | session_->StartReading(); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 105 | } |
| 106 | |
rtenneti | 85dcfac2 | 2015-03-27 20:22:19 | [diff] [blame] | 107 | void TearDown() override { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 108 | session_->CloseSessionOnError(ERR_ABORTED, QUIC_INTERNAL_ERROR); |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 109 | } |
| 110 | |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 111 | void CompleteCryptoHandshake() { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 112 | ASSERT_EQ(OK, session_->CryptoConnect(false, callback_.callback())); |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 113 | } |
| 114 | |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 115 | QuicPacketWriter* CreateQuicPacketWriter(DatagramClientSocket* socket, |
| 116 | QuicConnection* connection) const { |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 117 | std::unique_ptr<QuicChromiumPacketWriter> writer( |
rch | a02807b4 | 2016-01-29 21:56:15 | [diff] [blame] | 118 | new QuicChromiumPacketWriter(socket)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 119 | writer->SetConnection(connection); |
| 120 | return writer.release(); |
| 121 | } |
| 122 | |
rch | 1fe2eeb | 2015-10-26 14:45:57 | [diff] [blame] | 123 | QuicCryptoClientConfig crypto_config_; |
vishal.b | 62985ca9 | 2015-04-17 08:45:51 | [diff] [blame] | 124 | TestNetLog net_log_; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 125 | BoundTestNetLog bound_net_log_; |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 126 | MockClientSocketFactory socket_factory_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 127 | std::unique_ptr<MockRead> default_read_; |
| 128 | std::unique_ptr<SequencedSocketData> socket_data_; |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 129 | MockClock clock_; |
| 130 | MockRandom random_; |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 131 | QuicChromiumConnectionHelper helper_; |
rch | 16c74d1d | 2016-04-22 06:14:07 | [diff] [blame^] | 132 | QuicChromiumAlarmFactory alarm_factory_; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 133 | TransportSecurityState transport_security_state_; |
| 134 | MockCryptoClientStreamFactory crypto_client_stream_factory_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 135 | std::unique_ptr<QuicChromiumClientSession> session_; |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 136 | QuicConnectionVisitorInterface* visitor_; |
[email protected] | 8ee611b | 2012-11-20 01:48:12 | [diff] [blame] | 137 | TestCompletionCallback callback_; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 138 | QuicTestPacketMaker maker_; |
| 139 | ProofVerifyDetailsChromium verify_details_; |
ckrasic | 244375a3 | 2016-02-04 21:21:22 | [diff] [blame] | 140 | QuicClientPushPromiseIndex push_promise_index_; |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 141 | }; |
| 142 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 143 | INSTANTIATE_TEST_CASE_P(Tests, |
| 144 | QuicChromiumClientSessionTest, |
[email protected] | 4d64079 | 2013-12-18 22:21:08 | [diff] [blame] | 145 | ::testing::ValuesIn(QuicSupportedVersions())); |
| 146 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 147 | TEST_P(QuicChromiumClientSessionTest, CryptoConnect) { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 148 | Initialize(); |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 149 | CompleteCryptoHandshake(); |
[email protected] | 8ee611b | 2012-11-20 01:48:12 | [diff] [blame] | 150 | } |
| 151 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 152 | TEST_P(QuicChromiumClientSessionTest, MaxNumStreams) { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 153 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 154 | std::unique_ptr<QuicEncryptedPacket> client_rst(maker_.MakeRstPacket( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 155 | 1, true, kClientDataStreamId1, QUIC_RST_ACKNOWLEDGEMENT)); |
| 156 | MockWrite writes[] = { |
| 157 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 1)}; |
| 158 | socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, |
| 159 | arraysize(writes))); |
| 160 | |
| 161 | Initialize(); |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 162 | CompleteCryptoHandshake(); |
rtenneti | 9f41c0a | 2016-02-02 23:59:30 | [diff] [blame] | 163 | const size_t kMaxOpenStreams = session_->max_open_outgoing_streams(); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 164 | |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 165 | std::vector<QuicChromiumClientStream*> streams; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 166 | for (size_t i = 0; i < kMaxOpenStreams; i++) { |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 167 | QuicChromiumClientStream* stream = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 168 | session_->CreateOutgoingDynamicStream(kDefaultPriority); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 169 | EXPECT_TRUE(stream); |
[email protected] | f702d57 | 2012-12-04 15:56:20 | [diff] [blame] | 170 | streams.push_back(stream); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 171 | } |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 172 | EXPECT_FALSE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 173 | |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 174 | EXPECT_EQ(kMaxOpenStreams, session_->GetNumOpenOutgoingStreams()); |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 175 | |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 176 | // Close a stream and ensure I can now open a new one. |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 177 | QuicStreamId stream_id = streams[0]->id(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 178 | session_->CloseStream(stream_id); |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 179 | |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 180 | EXPECT_FALSE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 181 | QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 182 | session_->OnRstStream(rst1); |
| 183 | EXPECT_EQ(kMaxOpenStreams - 1, session_->GetNumOpenOutgoingStreams()); |
| 184 | EXPECT_TRUE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 185 | } |
| 186 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 187 | TEST_P(QuicChromiumClientSessionTest, MaxNumStreamsViaRequest) { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 188 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 189 | std::unique_ptr<QuicEncryptedPacket> client_rst(maker_.MakeRstPacket( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 190 | 1, true, kClientDataStreamId1, QUIC_RST_ACKNOWLEDGEMENT)); |
| 191 | MockWrite writes[] = { |
| 192 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 1)}; |
| 193 | socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, |
| 194 | arraysize(writes))); |
| 195 | |
| 196 | Initialize(); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 197 | CompleteCryptoHandshake(); |
rtenneti | 9f41c0a | 2016-02-02 23:59:30 | [diff] [blame] | 198 | const size_t kMaxOpenStreams = session_->max_open_outgoing_streams(); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 199 | |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 200 | std::vector<QuicChromiumClientStream*> streams; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 201 | for (size_t i = 0; i < kMaxOpenStreams; i++) { |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 202 | QuicChromiumClientStream* stream = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 203 | session_->CreateOutgoingDynamicStream(kDefaultPriority); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 204 | EXPECT_TRUE(stream); |
| 205 | streams.push_back(stream); |
| 206 | } |
| 207 | |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 208 | QuicChromiumClientStream* stream; |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 209 | QuicChromiumClientSession::StreamRequest stream_request; |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 210 | TestCompletionCallback callback; |
| 211 | ASSERT_EQ(ERR_IO_PENDING, |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 212 | stream_request.StartRequest(session_->GetWeakPtr(), &stream, |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 213 | callback.callback())); |
| 214 | |
| 215 | // Close a stream and ensure I can now open a new one. |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 216 | QuicStreamId stream_id = streams[0]->id(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 217 | session_->CloseStream(stream_id); |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 218 | QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 219 | session_->OnRstStream(rst1); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 220 | ASSERT_TRUE(callback.have_result()); |
| 221 | EXPECT_EQ(OK, callback.WaitForResult()); |
rtenneti | be63573 | 2014-10-02 22:51:42 | [diff] [blame] | 222 | EXPECT_TRUE(stream != nullptr); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 223 | } |
| 224 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 225 | TEST_P(QuicChromiumClientSessionTest, GoAwayReceived) { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 226 | Initialize(); |
[email protected] | 8ba8121 | 2013-05-03 13:11:48 | [diff] [blame] | 227 | CompleteCryptoHandshake(); |
[email protected] | 9db44391 | 2013-02-25 05:27:03 | [diff] [blame] | 228 | |
| 229 | // After receiving a GoAway, I should no longer be able to create outgoing |
| 230 | // streams. |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 231 | session_->connection()->OnGoAwayFrame( |
rtenneti | 9bd5d4b | 2015-08-21 05:44:52 | [diff] [blame] | 232 | QuicGoAwayFrame(QUIC_PEER_GOING_AWAY, 1u, "Going away.")); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 233 | EXPECT_EQ(nullptr, session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
[email protected] | 9db44391 | 2013-02-25 05:27:03 | [diff] [blame] | 234 | } |
| 235 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 236 | TEST_P(QuicChromiumClientSessionTest, CanPool) { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 237 | Initialize(); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 238 | // Load a cert that is valid for: |
| 239 | // www.example.org |
| 240 | // mail.example.org |
| 241 | // www.example.com |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 242 | |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 243 | ProofVerifyDetailsChromium details; |
| 244 | details.cert_verify_result.verified_cert = |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 245 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
dcheng | 4227c6d | 2014-08-25 23:58:18 | [diff] [blame] | 246 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 247 | |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 248 | CompleteCryptoHandshake(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 249 | session_->OnProofVerifyDetailsAvailable(details); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 250 | |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 251 | EXPECT_TRUE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED)); |
| 252 | EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_ENABLED)); |
| 253 | EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 254 | EXPECT_TRUE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); |
| 255 | EXPECT_FALSE(session_->CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 256 | } |
| 257 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 258 | TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithTlsChannelId) { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 259 | Initialize(); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 260 | // Load a cert that is valid for: |
| 261 | // www.example.org |
| 262 | // mail.example.org |
| 263 | // www.example.com |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 264 | |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 265 | ProofVerifyDetailsChromium details; |
| 266 | details.cert_verify_result.verified_cert = |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 267 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
dcheng | 4227c6d | 2014-08-25 23:58:18 | [diff] [blame] | 268 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 269 | |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 270 | CompleteCryptoHandshake(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 271 | session_->OnProofVerifyDetailsAvailable(details); |
| 272 | QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
| 273 | QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 274 | |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 275 | EXPECT_TRUE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED)); |
| 276 | EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 277 | EXPECT_FALSE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); |
| 278 | EXPECT_FALSE(session_->CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 279 | } |
| 280 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 281 | TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 282 | Initialize(); |
| 283 | |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 284 | uint8_t primary_pin = 1; |
| 285 | uint8_t backup_pin = 2; |
| 286 | uint8_t bad_pin = 3; |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 287 | AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 288 | backup_pin); |
| 289 | |
| 290 | ProofVerifyDetailsChromium details; |
| 291 | details.cert_verify_result.verified_cert = |
| 292 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 293 | details.cert_verify_result.is_issued_by_known_root = true; |
| 294 | details.cert_verify_result.public_key_hashes.push_back( |
| 295 | GetTestHashValue(bad_pin)); |
| 296 | |
dcheng | 4227c6d | 2014-08-25 23:58:18 | [diff] [blame] | 297 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 298 | |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 299 | CompleteCryptoHandshake(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 300 | session_->OnProofVerifyDetailsAvailable(details); |
| 301 | QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
| 302 | QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 303 | |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 304 | EXPECT_FALSE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 305 | } |
| 306 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 307 | TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 308 | Initialize(); |
| 309 | |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 310 | uint8_t primary_pin = 1; |
| 311 | uint8_t backup_pin = 2; |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 312 | AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 313 | backup_pin); |
| 314 | |
| 315 | ProofVerifyDetailsChromium details; |
| 316 | details.cert_verify_result.verified_cert = |
| 317 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 318 | details.cert_verify_result.is_issued_by_known_root = true; |
| 319 | details.cert_verify_result.public_key_hashes.push_back( |
| 320 | GetTestHashValue(primary_pin)); |
| 321 | |
dcheng | 4227c6d | 2014-08-25 23:58:18 | [diff] [blame] | 322 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 323 | |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 324 | CompleteCryptoHandshake(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 325 | session_->OnProofVerifyDetailsAvailable(details); |
| 326 | QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
| 327 | QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 328 | |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 329 | EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 330 | } |
| 331 | |
| 332 | TEST_P(QuicChromiumClientSessionTest, MigrateToSocket) { |
| 333 | Initialize(); |
| 334 | CompleteCryptoHandshake(); |
| 335 | |
| 336 | char data[] = "ABCD"; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 337 | std::unique_ptr<QuicEncryptedPacket> ping( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 338 | maker_.MakePingPacket(1, /*include_version=*/false)); |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 339 | std::unique_ptr<QuicEncryptedPacket> ack_and_data_out( |
| 340 | maker_.MakeAckAndDataPacket(2, false, 5, 1, 1, false, 0, |
| 341 | StringPiece(data))); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 342 | MockRead reads[] = {MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), |
| 343 | MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; |
| 344 | MockWrite writes[] = {MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 2), |
| 345 | MockWrite(SYNCHRONOUS, ack_and_data_out->data(), |
| 346 | ack_and_data_out->length(), 3)}; |
| 347 | StaticSocketDataProvider socket_data(reads, arraysize(reads), writes, |
| 348 | arraysize(writes)); |
| 349 | socket_factory_.AddSocketDataProvider(&socket_data); |
| 350 | |
| 351 | // Create connected socket. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 352 | std::unique_ptr<DatagramClientSocket> new_socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 353 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
| 354 | base::Bind(&base::RandInt), |
| 355 | &net_log_, NetLog::Source()); |
| 356 | EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); |
| 357 | |
| 358 | // Create reader and writer. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 359 | std::unique_ptr<QuicChromiumPacketReader> new_reader( |
| 360 | new QuicChromiumPacketReader(new_socket.get(), &clock_, session_.get(), |
| 361 | kQuicYieldAfterPacketsRead, |
| 362 | QuicTime::Delta::FromMilliseconds( |
| 363 | kQuicYieldAfterDurationMilliseconds), |
| 364 | bound_net_log_.bound())); |
| 365 | std::unique_ptr<QuicPacketWriter> new_writer( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 366 | CreateQuicPacketWriter(new_socket.get(), session_->connection())); |
| 367 | |
| 368 | // Migrate session. |
| 369 | EXPECT_TRUE(session_->MigrateToSocket( |
| 370 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
| 371 | |
| 372 | // Write data to session. |
| 373 | struct iovec iov[1]; |
| 374 | iov[0].iov_base = data; |
| 375 | iov[0].iov_len = 4; |
| 376 | session_->WritevData(5, QuicIOVector(iov, arraysize(iov), 4), 0, false, |
rjshade | d069aaee | 2016-03-11 20:42:17 | [diff] [blame] | 377 | nullptr); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 378 | |
| 379 | EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
| 380 | EXPECT_TRUE(socket_data.AllWriteDataConsumed()); |
| 381 | } |
| 382 | |
| 383 | TEST_P(QuicChromiumClientSessionTest, MigrateToSocketMaxReaders) { |
| 384 | Initialize(); |
| 385 | CompleteCryptoHandshake(); |
| 386 | |
| 387 | for (size_t i = 0; i < kMaxReadersPerQuicSession; ++i) { |
| 388 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 389 | std::unique_ptr<QuicEncryptedPacket> ping_out( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 390 | maker_.MakePingPacket(i + 1, /*include_version=*/true)); |
| 391 | MockWrite writes[] = { |
| 392 | MockWrite(SYNCHRONOUS, ping_out->data(), ping_out->length(), i + 2)}; |
| 393 | StaticSocketDataProvider socket_data(reads, arraysize(reads), writes, |
| 394 | arraysize(writes)); |
| 395 | socket_factory_.AddSocketDataProvider(&socket_data); |
| 396 | |
| 397 | // Create connected socket. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 398 | std::unique_ptr<DatagramClientSocket> new_socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 399 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
| 400 | base::Bind(&base::RandInt), |
| 401 | &net_log_, NetLog::Source()); |
| 402 | EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); |
| 403 | |
| 404 | // Create reader and writer. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 405 | std::unique_ptr<QuicChromiumPacketReader> new_reader( |
rch | a02807b4 | 2016-01-29 21:56:15 | [diff] [blame] | 406 | new QuicChromiumPacketReader(new_socket.get(), &clock_, session_.get(), |
| 407 | kQuicYieldAfterPacketsRead, |
| 408 | QuicTime::Delta::FromMilliseconds( |
| 409 | kQuicYieldAfterDurationMilliseconds), |
| 410 | bound_net_log_.bound())); |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 411 | std::unique_ptr<QuicPacketWriter> new_writer( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 412 | CreateQuicPacketWriter(new_socket.get(), session_->connection())); |
| 413 | |
| 414 | // Migrate session. |
| 415 | if (i < kMaxReadersPerQuicSession - 1) { |
| 416 | EXPECT_TRUE(session_->MigrateToSocket( |
| 417 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
| 418 | EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
| 419 | EXPECT_TRUE(socket_data.AllWriteDataConsumed()); |
| 420 | } else { |
| 421 | // Max readers exceeded. |
| 422 | EXPECT_FALSE(session_->MigrateToSocket( |
| 423 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
| 424 | |
| 425 | EXPECT_FALSE(socket_data.AllReadDataConsumed()); |
| 426 | EXPECT_FALSE(socket_data.AllWriteDataConsumed()); |
| 427 | } |
| 428 | } |
| 429 | } |
| 430 | |
| 431 | TEST_P(QuicChromiumClientSessionTest, MigrateToSocketReadError) { |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 432 | std::unique_ptr<QuicEncryptedPacket> ping( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 433 | maker_.MakePingPacket(1, /*include_version=*/true)); |
| 434 | MockRead old_reads[] = { |
| 435 | MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), |
| 436 | MockRead(ASYNC, ERR_IO_PENDING, 1), // causes reading to pause. |
| 437 | MockRead(ASYNC, ERR_NETWORK_CHANGED, 2)}; |
| 438 | socket_data_.reset( |
| 439 | new SequencedSocketData(old_reads, arraysize(old_reads), nullptr, 0)); |
| 440 | Initialize(); |
| 441 | CompleteCryptoHandshake(); |
| 442 | |
| 443 | MockWrite writes[] = { |
| 444 | MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 1)}; |
| 445 | MockRead new_reads[] = { |
| 446 | MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), |
| 447 | MockRead(ASYNC, ERR_IO_PENDING, 2), // pause reading. |
| 448 | MockRead(ASYNC, ping->data(), ping->length(), 3), |
| 449 | MockRead(ASYNC, ERR_IO_PENDING, 4), // pause reading |
| 450 | MockRead(ASYNC, ERR_NETWORK_CHANGED, 5)}; |
| 451 | SequencedSocketData new_socket_data(new_reads, arraysize(new_reads), writes, |
| 452 | arraysize(writes)); |
| 453 | socket_factory_.AddSocketDataProvider(&new_socket_data); |
| 454 | |
| 455 | // Create connected socket. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 456 | std::unique_ptr<DatagramClientSocket> new_socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 457 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
| 458 | base::Bind(&base::RandInt), |
| 459 | &net_log_, NetLog::Source()); |
| 460 | EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); |
| 461 | |
| 462 | // Create reader and writer. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 463 | std::unique_ptr<QuicChromiumPacketReader> new_reader( |
| 464 | new QuicChromiumPacketReader(new_socket.get(), &clock_, session_.get(), |
| 465 | kQuicYieldAfterPacketsRead, |
| 466 | QuicTime::Delta::FromMilliseconds( |
| 467 | kQuicYieldAfterDurationMilliseconds), |
| 468 | bound_net_log_.bound())); |
| 469 | std::unique_ptr<QuicPacketWriter> new_writer( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 470 | CreateQuicPacketWriter(new_socket.get(), session_->connection())); |
| 471 | |
| 472 | // Store old socket and migrate session. |
| 473 | EXPECT_TRUE(session_->MigrateToSocket( |
| 474 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
| 475 | |
| 476 | // Read error on old socket does not impact session. |
| 477 | EXPECT_TRUE(socket_data_->IsPaused()); |
| 478 | socket_data_->Resume(); |
| 479 | EXPECT_TRUE(session_->connection()->connected()); |
| 480 | EXPECT_TRUE(new_socket_data.IsPaused()); |
| 481 | new_socket_data.Resume(); |
| 482 | |
| 483 | // Read error on new socket causes session close. |
| 484 | EXPECT_TRUE(new_socket_data.IsPaused()); |
| 485 | EXPECT_TRUE(session_->connection()->connected()); |
| 486 | new_socket_data.Resume(); |
| 487 | EXPECT_FALSE(session_->connection()->connected()); |
| 488 | |
| 489 | EXPECT_TRUE(socket_data_->AllReadDataConsumed()); |
| 490 | EXPECT_TRUE(socket_data_->AllWriteDataConsumed()); |
| 491 | EXPECT_TRUE(new_socket_data.AllReadDataConsumed()); |
| 492 | EXPECT_TRUE(new_socket_data.AllWriteDataConsumed()); |
| 493 | } |
| 494 | |
| 495 | TEST_P(QuicChromiumClientSessionTest, MigrateToSocketWriteError) { |
| 496 | Initialize(); |
| 497 | CompleteCryptoHandshake(); |
| 498 | |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 499 | std::unique_ptr<QuicEncryptedPacket> ping( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 500 | maker_.MakePingPacket(1, /*include_version=*/true)); |
| 501 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
| 502 | MockWrite writes[] = {MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 1), |
| 503 | MockWrite(SYNCHRONOUS, ERR_FAILED, 2)}; |
| 504 | SequencedSocketData socket_data(reads, arraysize(reads), writes, |
| 505 | arraysize(writes)); |
| 506 | socket_factory_.AddSocketDataProvider(&socket_data); |
| 507 | |
| 508 | // Create connected socket. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 509 | std::unique_ptr<DatagramClientSocket> new_socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 510 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
| 511 | base::Bind(&base::RandInt), |
| 512 | &net_log_, NetLog::Source()); |
| 513 | EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); |
| 514 | |
| 515 | // Create reader and writer. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 516 | std::unique_ptr<QuicChromiumPacketReader> new_reader( |
| 517 | new QuicChromiumPacketReader(new_socket.get(), &clock_, session_.get(), |
| 518 | kQuicYieldAfterPacketsRead, |
| 519 | QuicTime::Delta::FromMilliseconds( |
| 520 | kQuicYieldAfterDurationMilliseconds), |
| 521 | bound_net_log_.bound())); |
| 522 | std::unique_ptr<QuicPacketWriter> new_writer( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 523 | CreateQuicPacketWriter(new_socket.get(), session_->connection())); |
| 524 | |
| 525 | // Migrate session. |
| 526 | EXPECT_TRUE(session_->MigrateToSocket( |
| 527 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
| 528 | |
| 529 | // Write error on new socket causes session close. |
| 530 | EXPECT_TRUE(session_->connection()->connected()); |
| 531 | session_->connection()->SendPing(); |
| 532 | EXPECT_FALSE(session_->connection()->connected()); |
| 533 | |
| 534 | EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
| 535 | EXPECT_TRUE(socket_data.AllWriteDataConsumed()); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 536 | } |
| 537 | |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 538 | } // namespace |
| 539 | } // namespace test |
| 540 | } // namespace net |