[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
Ryan Hamilton | a3ee93a7 | 2018-08-01 22:03:08 | [diff] [blame] | 5 | #include "net/quic/quic_chromium_client_session.h" |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 6 | |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 7 | #include "base/base64.h" |
Sebastien Marchand | 6d0558fd | 2019-01-25 16:49:37 | [diff] [blame] | 8 | #include "base/bind.h" |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 9 | #include "base/files/file_path.h" |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 10 | #include "base/memory/ptr_util.h" |
jri | 9f30371 | 2016-09-13 01:10:22 | [diff] [blame] | 11 | #include "base/run_loop.h" |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 12 | #include "base/stl_util.h" |
Devlin Cronin | e4bcb40e | 2018-06-05 18:02:47 | [diff] [blame] | 13 | #include "base/test/metrics/histogram_tester.h" |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 14 | #include "base/test/scoped_feature_list.h" |
gab | f767595f | 2016-05-11 18:50:35 | [diff] [blame] | 15 | #include "base/threading/thread_task_runner_handle.h" |
Zhongyi Shi | c16b410 | 2019-02-12 00:37:40 | [diff] [blame] | 16 | #include "base/time/default_tick_clock.h" |
Ryan Hamilton | a3ee93a7 | 2018-08-01 22:03:08 | [diff] [blame] | 17 | #include "build/build_config.h" |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 18 | #include "net/base/features.h" |
| 19 | #include "net/base/network_isolation_key.h" |
[email protected] | 8ee611b | 2012-11-20 01:48:12 | [diff] [blame] | 20 | #include "net/base/test_completion_callback.h" |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 21 | #include "net/cert/cert_verify_result.h" |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 22 | #include "net/http/transport_security_state.h" |
Matt Mueller | 230996f1 | 2018-10-22 19:39:44 | [diff] [blame] | 23 | #include "net/http/transport_security_state_test_util.h" |
mikecirone | f22f981 | 2016-10-04 03:40:19 | [diff] [blame] | 24 | #include "net/log/net_log_source.h" |
vishal.b | 62985ca9 | 2015-04-17 08:45:51 | [diff] [blame] | 25 | #include "net/log/test_net_log.h" |
Victor Vasiliev | 4f6fb89 | 2019-05-31 16:58:31 | [diff] [blame] | 26 | #include "net/quic/address_utils.h" |
Ryan Hamilton | a3ee93a7 | 2018-08-01 22:03:08 | [diff] [blame] | 27 | #include "net/quic/crypto/proof_verifier_chromium.h" |
| 28 | #include "net/quic/mock_crypto_client_stream_factory.h" |
| 29 | #include "net/quic/mock_quic_data.h" |
| 30 | #include "net/quic/quic_chromium_alarm_factory.h" |
| 31 | #include "net/quic/quic_chromium_client_session_peer.h" |
| 32 | #include "net/quic/quic_chromium_connection_helper.h" |
| 33 | #include "net/quic/quic_chromium_packet_reader.h" |
| 34 | #include "net/quic/quic_chromium_packet_writer.h" |
| 35 | #include "net/quic/quic_crypto_client_stream_factory.h" |
| 36 | #include "net/quic/quic_http_utils.h" |
| 37 | #include "net/quic/quic_server_info.h" |
| 38 | #include "net/quic/quic_test_packet_maker.h" |
tfarina | 5dd13c2 | 2016-11-16 12:08:26 | [diff] [blame] | 39 | #include "net/socket/datagram_client_socket.h" |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 40 | #include "net/socket/socket_test_util.h" |
Bence Béky | 94658bf | 2018-05-11 19:22:58 | [diff] [blame] | 41 | #include "net/spdy/spdy_test_util_common.h" |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 42 | #include "net/test/cert_test_util.h" |
robpercival | 214763f | 2016-07-01 23:27:01 | [diff] [blame] | 43 | #include "net/test/gtest_util.h" |
rsleevi | a69c79a | 2016-06-22 03:28:43 | [diff] [blame] | 44 | #include "net/test/test_data_directory.h" |
Bence Béky | 98447b1 | 2018-05-08 03:14:01 | [diff] [blame] | 45 | #include "net/test/test_with_scoped_task_environment.h" |
Victor Vasiliev | 6bb59d2 | 2019-03-08 21:34:51 | [diff] [blame] | 46 | #include "net/third_party/quiche/src/quic/core/crypto/aes_128_gcm_12_encrypter.h" |
| 47 | #include "net/third_party/quiche/src/quic/core/crypto/crypto_protocol.h" |
| 48 | #include "net/third_party/quiche/src/quic/core/crypto/quic_decrypter.h" |
| 49 | #include "net/third_party/quiche/src/quic/core/crypto/quic_encrypter.h" |
| 50 | #include "net/third_party/quiche/src/quic/core/http/quic_client_promised_info.h" |
| 51 | #include "net/third_party/quiche/src/quic/core/quic_connection_id.h" |
| 52 | #include "net/third_party/quiche/src/quic/core/quic_packet_writer.h" |
| 53 | #include "net/third_party/quiche/src/quic/core/quic_utils.h" |
| 54 | #include "net/third_party/quiche/src/quic/core/tls_client_handshaker.h" |
| 55 | #include "net/third_party/quiche/src/quic/platform/api/quic_flags.h" |
| 56 | #include "net/third_party/quiche/src/quic/platform/api/quic_test.h" |
| 57 | #include "net/third_party/quiche/src/quic/test_tools/crypto_test_utils.h" |
| 58 | #include "net/third_party/quiche/src/quic/test_tools/quic_client_promised_info_peer.h" |
| 59 | #include "net/third_party/quiche/src/quic/test_tools/quic_connection_peer.h" |
| 60 | #include "net/third_party/quiche/src/quic/test_tools/quic_session_peer.h" |
| 61 | #include "net/third_party/quiche/src/quic/test_tools/quic_stream_peer.h" |
| 62 | #include "net/third_party/quiche/src/quic/test_tools/quic_test_utils.h" |
| 63 | #include "net/third_party/quiche/src/quic/test_tools/simple_quic_framer.h" |
Victor Vasiliev | 27cc771 | 2019-01-24 11:50:14 | [diff] [blame] | 64 | #include "net/third_party/quiche/src/spdy/core/spdy_test_utils.h" |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 65 | #include "net/traffic_annotation/network_traffic_annotation_test_helper.h" |
robpercival | 214763f | 2016-07-01 23:27:01 | [diff] [blame] | 66 | #include "testing/gmock/include/gmock/gmock.h" |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 67 | |
| 68 | using testing::_; |
| 69 | |
| 70 | namespace net { |
| 71 | namespace test { |
| 72 | namespace { |
| 73 | |
eroman | 36d84e5443 | 2016-03-17 03:23:02 | [diff] [blame] | 74 | const IPEndPoint kIpEndPoint = IPEndPoint(IPAddress::IPv4AllZeros(), 0); |
rch | 1fe2eeb | 2015-10-26 14:45:57 | [diff] [blame] | 75 | const char kServerHostname[] = "test.example.com"; |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 76 | const uint16_t kServerPort = 443; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 77 | const size_t kMaxReadersPerQuicSession = 5; |
| 78 | |
David Benjamin | 3cc5977 | 2019-04-02 07:33:31 | [diff] [blame] | 79 | // A subclass of QuicChromiumClientSession that allows OnPathDegrading to be |
| 80 | // mocked. |
Nick Harper | e45fe4fc | 2017-07-13 00:34:58 | [diff] [blame] | 81 | class TestingQuicChromiumClientSession : public QuicChromiumClientSession { |
| 82 | public: |
| 83 | using QuicChromiumClientSession::QuicChromiumClientSession; |
| 84 | |
Zhongyi Shi | 5068bb0 | 2018-08-03 02:44:09 | [diff] [blame] | 85 | MOCK_METHOD0(OnPathDegrading, void()); |
Nick Harper | e45fe4fc | 2017-07-13 00:34:58 | [diff] [blame] | 86 | }; |
| 87 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 88 | class QuicChromiumClientSessionTest |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 89 | : public ::testing::TestWithParam< |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 90 | std::tuple<quic::ParsedQuicVersion, bool>>, |
Bence Béky | 98447b1 | 2018-05-08 03:14:01 | [diff] [blame] | 91 | public WithScopedTaskEnvironment { |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 92 | public: |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 93 | QuicChromiumClientSessionTest() |
Yixin Wang | 079ad54 | 2018-01-11 04:06:05 | [diff] [blame] | 94 | : version_(std::get<0>(GetParam())), |
| 95 | client_headers_include_h2_stream_dependency_(std::get<1>(GetParam())), |
Nick Harper | a598fc5f | 2019-06-21 08:46:50 | [diff] [blame^] | 96 | crypto_config_( |
| 97 | quic::test::crypto_test_utils::ProofVerifierForTesting()), |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 98 | default_read_(new MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)), |
| 99 | socket_data_( |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 100 | new SequencedSocketData(base::make_span(default_read_.get(), 1), |
| 101 | base::span<MockWrite>())), |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 102 | random_(0), |
rch | 16c74d1d | 2016-04-22 06:14:07 | [diff] [blame] | 103 | helper_(&clock_, &random_), |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 104 | session_key_(kServerHostname, |
| 105 | kServerPort, |
| 106 | PRIVACY_MODE_DISABLED, |
| 107 | SocketTag()), |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 108 | destination_(kServerHostname, kServerPort), |
Yixin Wang | 079ad54 | 2018-01-11 04:06:05 | [diff] [blame] | 109 | client_maker_(version_, |
David Schinazi | c828105 | 2019-01-24 06:14:17 | [diff] [blame] | 110 | quic::QuicUtils::CreateRandomConnectionId(&random_), |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 111 | &clock_, |
| 112 | kServerHostname, |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 113 | quic::Perspective::IS_CLIENT, |
Yixin Wang | 079ad54 | 2018-01-11 04:06:05 | [diff] [blame] | 114 | client_headers_include_h2_stream_dependency_), |
| 115 | server_maker_(version_, |
David Schinazi | c828105 | 2019-01-24 06:14:17 | [diff] [blame] | 116 | quic::QuicUtils::CreateRandomConnectionId(&random_), |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 117 | &clock_, |
| 118 | kServerHostname, |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 119 | quic::Perspective::IS_SERVER, |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 120 | false), |
| 121 | migrate_session_early_v2_(false) { |
Ryan Hamilton | 8380c65 | 2019-06-04 02:25:06 | [diff] [blame] | 122 | SetQuicFlag(FLAGS_quic_supports_tls_handshake, true); |
xunjieli | c70cc86 | 2016-02-19 15:29:26 | [diff] [blame] | 123 | // Advance the time, because timers do not like uninitialized times. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 124 | clock_.AdvanceTime(quic::QuicTime::Delta::FromSeconds(1)); |
xunjieli | c70cc86 | 2016-02-19 15:29:26 | [diff] [blame] | 125 | } |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 126 | |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 127 | void ResetHandleOnError( |
| 128 | std::unique_ptr<QuicChromiumClientSession::Handle>* handle, |
| 129 | int net_error) { |
| 130 | EXPECT_NE(OK, net_error); |
| 131 | handle->reset(); |
| 132 | } |
| 133 | |
| 134 | protected: |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 135 | void Initialize() { |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 136 | if (socket_data_) |
| 137 | socket_factory_.AddSocketDataProvider(socket_data_.get()); |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 138 | std::unique_ptr<DatagramClientSocket> socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 139 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
mikecirone | f22f981 | 2016-10-04 03:40:19 | [diff] [blame] | 140 | &net_log_, NetLogSource()); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 141 | socket->Connect(kIpEndPoint); |
Ryan Hamilton | 9edcf1a | 2017-11-22 05:55:17 | [diff] [blame] | 142 | QuicChromiumPacketWriter* writer = new net::QuicChromiumPacketWriter( |
| 143 | socket.get(), base::ThreadTaskRunnerHandle::Get().get()); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 144 | quic::QuicConnection* connection = new quic::QuicConnection( |
David Schinazi | c828105 | 2019-01-24 06:14:17 | [diff] [blame] | 145 | quic::QuicUtils::CreateRandomConnectionId(&random_), |
Victor Vasiliev | 4f6fb89 | 2019-05-31 16:58:31 | [diff] [blame] | 146 | ToQuicSocketAddress(kIpEndPoint), &helper_, &alarm_factory_, writer, |
| 147 | true, quic::Perspective::IS_CLIENT, |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 148 | quic::test::SupportedVersions(version_)); |
Nick Harper | e45fe4fc | 2017-07-13 00:34:58 | [diff] [blame] | 149 | session_.reset(new TestingQuicChromiumClientSession( |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 150 | connection, std::move(socket), |
| 151 | /*stream_factory=*/nullptr, &crypto_client_stream_factory_, &clock_, |
Nick Harper | 89bc721 | 2018-07-31 19:07:57 | [diff] [blame] | 152 | &transport_security_state_, /*ssl_config_service=*/nullptr, |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 153 | base::WrapUnique(static_cast<QuicServerInfo*>(nullptr)), session_key_, |
Zhongyi Shi | 757fcce | 2018-06-27 05:41:27 | [diff] [blame] | 154 | /*require_confirmation=*/false, migrate_session_early_v2_, |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 155 | /*migrate_session_on_network_change_v2=*/false, |
Zhongyi Shi | d672f754 | 2018-06-08 01:03:26 | [diff] [blame] | 156 | /*defaulet_network=*/NetworkChangeNotifier::kInvalidNetworkHandle, |
Zhongyi Shi | e01f2db | 2019-02-22 19:53:23 | [diff] [blame] | 157 | quic::QuicTime::Delta::FromMilliseconds( |
| 158 | kDefaultRetransmittableOnWireTimeoutMillisecs), |
Zhongyi Shi | 32fe14d4 | 2019-02-28 00:25:36 | [diff] [blame] | 159 | /*migrate_idle_session=*/false, |
Zhongyi Shi | c16b410 | 2019-02-12 00:37:40 | [diff] [blame] | 160 | base::TimeDelta::FromSeconds(kDefaultIdleSessionMigrationPeriodSeconds), |
Zhongyi Shi | 73f23ca87 | 2017-12-13 18:37:13 | [diff] [blame] | 161 | base::TimeDelta::FromSeconds(kMaxTimeOnNonDefaultNetworkSecs), |
Zhongyi Shi | ee76076 | 2018-08-01 00:54:29 | [diff] [blame] | 162 | kMaxMigrationsToNonDefaultNetworkOnWriteError, |
Zhongyi Shi | 8b1e43f | 2017-12-13 20:46:30 | [diff] [blame] | 163 | kMaxMigrationsToNonDefaultNetworkOnPathDegrading, |
Zhongyi Shi | 5f587cc | 2017-11-21 23:24:17 | [diff] [blame] | 164 | kQuicYieldAfterPacketsRead, |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 165 | quic::QuicTime::Delta::FromMilliseconds( |
| 166 | kQuicYieldAfterDurationMilliseconds), |
Zhongyi Shi | dbce7f41 | 2019-02-01 23:16:29 | [diff] [blame] | 167 | /*cert_verify_flags=*/0, /*go_away_on_path_degrading*/ false, |
| 168 | client_headers_include_h2_stream_dependency_, |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 169 | quic::test::DefaultQuicConfig(), &crypto_config_, "CONNECTION_UNKNOWN", |
Yixin Wang | 079ad54 | 2018-01-11 04:06:05 | [diff] [blame] | 170 | base::TimeTicks::Now(), base::TimeTicks::Now(), &push_promise_index_, |
Zhongyi Shi | c16b410 | 2019-02-12 00:37:40 | [diff] [blame] | 171 | &test_push_delegate_, base::DefaultTickClock::GetInstance(), |
| 172 | base::ThreadTaskRunnerHandle::Get().get(), |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 173 | /*socket_performance_watcher=*/nullptr, &net_log_)); |
| 174 | |
| 175 | scoped_refptr<X509Certificate> cert( |
| 176 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); |
| 177 | verify_details_.cert_verify_result.verified_cert = cert; |
| 178 | verify_details_.cert_verify_result.is_issued_by_known_root = true; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 179 | session_->Initialize(); |
| 180 | session_->StartReading(); |
jri | bce3eec | 2016-09-09 05:41:08 | [diff] [blame] | 181 | writer->set_delegate(session_.get()); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 182 | } |
| 183 | |
rtenneti | 85dcfac2 | 2015-03-27 20:22:19 | [diff] [blame] | 184 | void TearDown() override { |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 185 | if (session_) |
Renjie | ba55fae | 2018-09-20 03:05:16 | [diff] [blame] | 186 | session_->CloseSessionOnError( |
| 187 | ERR_ABORTED, quic::QUIC_INTERNAL_ERROR, |
| 188 | quic::ConnectionCloseBehavior::SILENT_CLOSE); |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 189 | } |
| 190 | |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 191 | void CompleteCryptoHandshake() { |
rch | 433bf5f | 2017-02-14 04:10:47 | [diff] [blame] | 192 | ASSERT_THAT(session_->CryptoConnect(callback_.callback()), IsOk()); |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 193 | } |
| 194 | |
jri | ed79618b | 2016-07-02 03:18:52 | [diff] [blame] | 195 | QuicChromiumPacketWriter* CreateQuicChromiumPacketWriter( |
| 196 | DatagramClientSocket* socket, |
| 197 | QuicChromiumClientSession* session) const { |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 198 | std::unique_ptr<QuicChromiumPacketWriter> writer( |
Ryan Hamilton | 9edcf1a | 2017-11-22 05:55:17 | [diff] [blame] | 199 | new QuicChromiumPacketWriter( |
| 200 | socket, base::ThreadTaskRunnerHandle::Get().get())); |
jri | bce3eec | 2016-09-09 05:41:08 | [diff] [blame] | 201 | writer->set_delegate(session); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 202 | return writer.release(); |
| 203 | } |
| 204 | |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 205 | quic::QuicStreamId GetNthClientInitiatedBidirectionalStreamId(int n) { |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 206 | return quic::test::GetNthClientInitiatedBidirectionalStreamId( |
| 207 | version_.transport_version, n); |
ckrasic | bf2f59c | 2017-05-04 23:54:36 | [diff] [blame] | 208 | } |
| 209 | |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 210 | quic::QuicStreamId GetNthServerInitiatedUnidirectionalStreamId(int n) { |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 211 | return quic::test::GetNthServerInitiatedUnidirectionalStreamId( |
| 212 | version_.transport_version, n); |
ckrasic | bf2f59c | 2017-05-04 23:54:36 | [diff] [blame] | 213 | } |
| 214 | |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 215 | size_t GetMaxAllowedOutgoingBidirectionalStreams() { |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 216 | quic::QuicSession* quic_session = |
| 217 | dynamic_cast<quic::QuicSession*>(&*session_); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 218 | if (version_.transport_version != quic::QUIC_VERSION_99) { |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 219 | return quic::test::QuicSessionPeer::GetStreamIdManager(quic_session) |
| 220 | ->max_open_outgoing_streams(); |
| 221 | } |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 222 | // For version99, the count will include both static and dynamic streams. |
| 223 | // These tests are only concerned with dynamic streams (that is, the number |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 224 | // of streams that they can create), so back out the static header stream. |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 225 | return quic::test::QuicSessionPeer::v99_streamid_manager(quic_session) |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 226 | ->max_allowed_outgoing_bidirectional_streams() - |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 227 | 1; |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 228 | } |
| 229 | |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 230 | const quic::ParsedQuicVersion version_; |
Yixin Wang | 079ad54 | 2018-01-11 04:06:05 | [diff] [blame] | 231 | const bool client_headers_include_h2_stream_dependency_; |
Jana Iyengar | f6b13d8 | 2017-09-04 02:09:10 | [diff] [blame] | 232 | QuicFlagSaver flags_; // Save/restore all QUIC flag values. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 233 | quic::QuicCryptoClientConfig crypto_config_; |
vishal.b | 62985ca9 | 2015-04-17 08:45:51 | [diff] [blame] | 234 | TestNetLog net_log_; |
tfarina | 4283411 | 2016-09-22 13:38:20 | [diff] [blame] | 235 | BoundTestNetLog bound_test_net_log_; |
[email protected] | 4d283b3 | 2013-10-17 12:57:27 | [diff] [blame] | 236 | MockClientSocketFactory socket_factory_; |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 237 | std::unique_ptr<MockRead> default_read_; |
| 238 | std::unique_ptr<SequencedSocketData> socket_data_; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 239 | quic::MockClock clock_; |
| 240 | quic::test::MockRandom random_; |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 241 | QuicChromiumConnectionHelper helper_; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 242 | quic::test::MockAlarmFactory alarm_factory_; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 243 | TransportSecurityState transport_security_state_; |
| 244 | MockCryptoClientStreamFactory crypto_client_stream_factory_; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 245 | quic::QuicClientPushPromiseIndex push_promise_index_; |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 246 | QuicSessionKey session_key_; |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 247 | HostPortPair destination_; |
Nick Harper | e45fe4fc | 2017-07-13 00:34:58 | [diff] [blame] | 248 | std::unique_ptr<TestingQuicChromiumClientSession> session_; |
zhongyi | 0009f3e | 2016-11-11 19:47:50 | [diff] [blame] | 249 | TestServerPushDelegate test_push_delegate_; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 250 | quic::QuicConnectionVisitorInterface* visitor_; |
[email protected] | 8ee611b | 2012-11-20 01:48:12 | [diff] [blame] | 251 | TestCompletionCallback callback_; |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 252 | QuicTestPacketMaker client_maker_; |
| 253 | QuicTestPacketMaker server_maker_; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 254 | ProofVerifyDetailsChromium verify_details_; |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 255 | bool migrate_session_early_v2_; |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 256 | }; |
| 257 | |
Victor Costan | e635086f | 2019-01-27 05:20:30 | [diff] [blame] | 258 | INSTANTIATE_TEST_SUITE_P( |
Bence Béky | ce380cb | 2018-04-26 23:39:55 | [diff] [blame] | 259 | VersionIncludeStreamDependencySequence, |
Yixin Wang | 079ad54 | 2018-01-11 04:06:05 | [diff] [blame] | 260 | QuicChromiumClientSessionTest, |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 261 | ::testing::Combine(::testing::ValuesIn(quic::AllSupportedVersions()), |
| 262 | ::testing::Bool())); |
[email protected] | 4d64079 | 2013-12-18 22:21:08 | [diff] [blame] | 263 | |
Carlos IL | 8113338 | 2017-12-06 17:18:45 | [diff] [blame] | 264 | TEST_P(QuicChromiumClientSessionTest, IsFatalErrorNotSetForNonFatalError) { |
| 265 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 266 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 267 | client_maker_.MakeInitialSettingsPacket(1)); |
Carlos IL | 8113338 | 2017-12-06 17:18:45 | [diff] [blame] | 268 | MockWrite writes[] = { |
| 269 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 270 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
Carlos IL | 8113338 | 2017-12-06 17:18:45 | [diff] [blame] | 271 | Initialize(); |
| 272 | |
| 273 | SSLInfo ssl_info; |
| 274 | ProofVerifyDetailsChromium details; |
| 275 | details.cert_verify_result.verified_cert = |
| 276 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 277 | details.cert_verify_result.cert_status = |
| 278 | MapNetErrorToCertStatus(ERR_CERT_DATE_INVALID); |
| 279 | details.is_fatal_cert_error = false; |
| 280 | CompleteCryptoHandshake(); |
| 281 | session_->OnProofVerifyDetailsAvailable(details); |
| 282 | |
| 283 | ASSERT_TRUE(session_->GetSSLInfo(&ssl_info)); |
| 284 | EXPECT_FALSE(ssl_info.is_fatal_cert_error); |
| 285 | } |
| 286 | |
| 287 | TEST_P(QuicChromiumClientSessionTest, IsFatalErrorSetForFatalError) { |
| 288 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 289 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 290 | client_maker_.MakeInitialSettingsPacket(1)); |
Carlos IL | 8113338 | 2017-12-06 17:18:45 | [diff] [blame] | 291 | MockWrite writes[] = { |
| 292 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 293 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
Carlos IL | 8113338 | 2017-12-06 17:18:45 | [diff] [blame] | 294 | Initialize(); |
| 295 | |
| 296 | SSLInfo ssl_info; |
| 297 | ProofVerifyDetailsChromium details; |
| 298 | details.cert_verify_result.verified_cert = |
| 299 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 300 | details.cert_verify_result.cert_status = |
| 301 | MapNetErrorToCertStatus(ERR_CERT_DATE_INVALID); |
| 302 | details.is_fatal_cert_error = true; |
| 303 | CompleteCryptoHandshake(); |
| 304 | session_->OnProofVerifyDetailsAvailable(details); |
| 305 | ASSERT_TRUE(session_->GetSSLInfo(&ssl_info)); |
| 306 | EXPECT_TRUE(ssl_info.is_fatal_cert_error); |
| 307 | } |
| 308 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 309 | TEST_P(QuicChromiumClientSessionTest, CryptoConnect) { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 310 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 311 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 312 | client_maker_.MakeInitialSettingsPacket(1)); |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 313 | MockWrite writes[] = { |
| 314 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 315 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 316 | Initialize(); |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 317 | CompleteCryptoHandshake(); |
[email protected] | 8ee611b | 2012-11-20 01:48:12 | [diff] [blame] | 318 | } |
| 319 | |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 320 | TEST_P(QuicChromiumClientSessionTest, Handle) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 321 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 322 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 323 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 324 | quic_data.AddRead(ASYNC, OK); // EOF |
| 325 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 326 | |
| 327 | Initialize(); |
| 328 | |
| 329 | NetLogWithSource session_net_log = session_->net_log(); |
| 330 | EXPECT_EQ(NetLogSourceType::QUIC_SESSION, session_net_log.source().type); |
| 331 | EXPECT_EQ(&net_log_, session_net_log.net_log()); |
| 332 | |
| 333 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 334 | session_->CreateHandle(destination_); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 335 | EXPECT_TRUE(handle->IsConnected()); |
| 336 | EXPECT_FALSE(handle->IsCryptoHandshakeConfirmed()); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 337 | EXPECT_EQ(version_.transport_version, handle->GetQuicVersion()); |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 338 | EXPECT_EQ(session_key_.server_id(), handle->server_id()); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 339 | EXPECT_EQ(session_net_log.source().type, handle->net_log().source().type); |
| 340 | EXPECT_EQ(session_net_log.source().id, handle->net_log().source().id); |
| 341 | EXPECT_EQ(session_net_log.net_log(), handle->net_log().net_log()); |
| 342 | IPEndPoint address; |
| 343 | EXPECT_EQ(OK, handle->GetPeerAddress(&address)); |
| 344 | EXPECT_EQ(kIpEndPoint, address); |
Bin Wu | ae74d8b | 2019-06-19 23:55:07 | [diff] [blame] | 345 | EXPECT_TRUE(handle->CreatePacketBundler().get() != nullptr); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 346 | |
| 347 | CompleteCryptoHandshake(); |
| 348 | |
| 349 | EXPECT_TRUE(handle->IsCryptoHandshakeConfirmed()); |
| 350 | |
| 351 | // Request a stream and verify that a stream was created. |
| 352 | TestCompletionCallback callback; |
| 353 | ASSERT_EQ(OK, handle->RequestStream(/*requires_confirmation=*/false, |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 354 | callback.callback(), |
| 355 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | 1bcfddf2 | 2017-06-03 00:26:29 | [diff] [blame] | 356 | EXPECT_TRUE(handle->ReleaseStream() != nullptr); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 357 | |
| 358 | quic_data.Resume(); |
| 359 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 360 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 361 | |
| 362 | // Veirfy that the handle works correctly after the session is closed. |
| 363 | EXPECT_FALSE(handle->IsConnected()); |
| 364 | EXPECT_TRUE(handle->IsCryptoHandshakeConfirmed()); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 365 | EXPECT_EQ(version_.transport_version, handle->GetQuicVersion()); |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 366 | EXPECT_EQ(session_key_.server_id(), handle->server_id()); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 367 | EXPECT_EQ(session_net_log.source().type, handle->net_log().source().type); |
| 368 | EXPECT_EQ(session_net_log.source().id, handle->net_log().source().id); |
| 369 | EXPECT_EQ(session_net_log.net_log(), handle->net_log().net_log()); |
| 370 | EXPECT_EQ(ERR_CONNECTION_CLOSED, handle->GetPeerAddress(&address)); |
Bin Wu | ae74d8b | 2019-06-19 23:55:07 | [diff] [blame] | 371 | EXPECT_TRUE(handle->CreatePacketBundler().get() == nullptr); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 372 | { |
| 373 | // Verify that CreateHandle() works even after the session is closed. |
| 374 | std::unique_ptr<QuicChromiumClientSession::Handle> handle2 = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 375 | session_->CreateHandle(destination_); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 376 | EXPECT_FALSE(handle2->IsConnected()); |
| 377 | EXPECT_TRUE(handle2->IsCryptoHandshakeConfirmed()); |
| 378 | ASSERT_EQ(ERR_CONNECTION_CLOSED, |
| 379 | handle2->RequestStream(/*requires_confirmation=*/false, |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 380 | callback.callback(), |
| 381 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 382 | } |
| 383 | |
| 384 | session_.reset(); |
| 385 | |
| 386 | // Veirfy that the handle works correctly after the session is deleted. |
| 387 | EXPECT_FALSE(handle->IsConnected()); |
| 388 | EXPECT_TRUE(handle->IsCryptoHandshakeConfirmed()); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 389 | EXPECT_EQ(version_.transport_version, handle->GetQuicVersion()); |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 390 | EXPECT_EQ(session_key_.server_id(), handle->server_id()); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 391 | EXPECT_EQ(session_net_log.source().type, handle->net_log().source().type); |
| 392 | EXPECT_EQ(session_net_log.source().id, handle->net_log().source().id); |
| 393 | EXPECT_EQ(session_net_log.net_log(), handle->net_log().net_log()); |
| 394 | EXPECT_EQ(ERR_CONNECTION_CLOSED, handle->GetPeerAddress(&address)); |
Bin Wu | ae74d8b | 2019-06-19 23:55:07 | [diff] [blame] | 395 | EXPECT_TRUE(handle->CreatePacketBundler().get() == nullptr); |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 396 | ASSERT_EQ( |
| 397 | ERR_CONNECTION_CLOSED, |
| 398 | handle->RequestStream(/*requires_confirmation=*/false, |
| 399 | callback.callback(), TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 400 | } |
| 401 | |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 402 | TEST_P(QuicChromiumClientSessionTest, StreamRequest) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 403 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 404 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 405 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 406 | quic_data.AddRead(ASYNC, OK); // EOF |
| 407 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 408 | |
| 409 | Initialize(); |
| 410 | CompleteCryptoHandshake(); |
| 411 | |
| 412 | // Request a stream and verify that a stream was created. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 413 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 414 | session_->CreateHandle(destination_); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 415 | TestCompletionCallback callback; |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 416 | ASSERT_EQ(OK, handle->RequestStream(/*requires_confirmation=*/false, |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 417 | callback.callback(), |
| 418 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | 1bcfddf2 | 2017-06-03 00:26:29 | [diff] [blame] | 419 | EXPECT_TRUE(handle->ReleaseStream() != nullptr); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 420 | |
| 421 | quic_data.Resume(); |
| 422 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 423 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 424 | } |
| 425 | |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 426 | TEST_P(QuicChromiumClientSessionTest, ConfirmationRequiredStreamRequest) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 427 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 428 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 429 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 430 | quic_data.AddRead(ASYNC, OK); // EOF |
| 431 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 432 | |
| 433 | Initialize(); |
| 434 | CompleteCryptoHandshake(); |
| 435 | |
| 436 | // Request a stream and verify that a stream was created. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 437 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 438 | session_->CreateHandle(destination_); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 439 | TestCompletionCallback callback; |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 440 | ASSERT_EQ(OK, handle->RequestStream(/*requires_confirmation=*/true, |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 441 | callback.callback(), |
| 442 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | 1bcfddf2 | 2017-06-03 00:26:29 | [diff] [blame] | 443 | EXPECT_TRUE(handle->ReleaseStream() != nullptr); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 444 | |
| 445 | quic_data.Resume(); |
| 446 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 447 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 448 | } |
| 449 | |
| 450 | TEST_P(QuicChromiumClientSessionTest, StreamRequestBeforeConfirmation) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 451 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 452 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 453 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 454 | quic_data.AddRead(ASYNC, OK); // EOF |
| 455 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 456 | |
| 457 | Initialize(); |
| 458 | |
| 459 | // Request a stream and verify that a stream was created. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 460 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 461 | session_->CreateHandle(destination_); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 462 | TestCompletionCallback callback; |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 463 | ASSERT_EQ( |
| 464 | ERR_IO_PENDING, |
| 465 | handle->RequestStream(/*requires_confirmation=*/true, callback.callback(), |
| 466 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 467 | |
| 468 | CompleteCryptoHandshake(); |
| 469 | |
| 470 | EXPECT_THAT(callback.WaitForResult(), IsOk()); |
| 471 | |
rch | 1bcfddf2 | 2017-06-03 00:26:29 | [diff] [blame] | 472 | EXPECT_TRUE(handle->ReleaseStream() != nullptr); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 473 | |
| 474 | quic_data.Resume(); |
| 475 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 476 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 477 | } |
| 478 | |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 479 | TEST_P(QuicChromiumClientSessionTest, CancelStreamRequestBeforeRelease) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 480 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 481 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 482 | quic_data.AddWrite(SYNCHRONOUS, |
| 483 | client_maker_.MakeRstPacket( |
| 484 | 2, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| 485 | quic::QUIC_STREAM_CANCELLED)); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 486 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 487 | quic_data.AddRead(ASYNC, OK); // EOF |
| 488 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 489 | |
| 490 | Initialize(); |
| 491 | CompleteCryptoHandshake(); |
| 492 | |
| 493 | // Request a stream and cancel it without releasing the stream. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 494 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 495 | session_->CreateHandle(destination_); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 496 | TestCompletionCallback callback; |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 497 | ASSERT_EQ(OK, handle->RequestStream(/*requires_confirmation=*/false, |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 498 | callback.callback(), |
| 499 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 500 | handle.reset(); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 501 | |
| 502 | quic_data.Resume(); |
| 503 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 504 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 505 | } |
| 506 | |
| 507 | TEST_P(QuicChromiumClientSessionTest, AsyncStreamRequest) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 508 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 509 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 510 | if (version_.transport_version == quic::QUIC_VERSION_99) { |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 511 | // The open stream limit is set to 50 by |
| 512 | // MockCryptoClientStream::SetConfigNegotiated() so when the 51st stream is |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 513 | // requested, a STREAMS_BLOCKED will be sent, indicating that it's blocked |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 514 | // at the limit of 50. The +1 accounts for the header stream. |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 515 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeStreamsBlockedPacket( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 516 | 2, true, 50 + 1, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 517 | /*unidirectional=*/false)); |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 518 | quic_data.AddWrite( |
| 519 | SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 520 | 3, true, GetNthClientInitiatedBidirectionalStreamId(0), |
Frank Kastenholz | 684ea41 | 2019-02-13 18:48:18 | [diff] [blame] | 521 | quic::QUIC_STREAM_CANCELLED, 0, |
| 522 | /*include_stop_sending_if_v99=*/false)); |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 523 | // After the STREAMS_BLOCKED is sent, receive a MAX_STREAMS to increase |
| 524 | // the limit to 53. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 525 | quic_data.AddRead( |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 526 | ASYNC, server_maker_.MakeMaxStreamsPacket(1, true, 53, |
| 527 | /*unidirectional=*/false)); |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 528 | } else { |
| 529 | quic_data.AddWrite( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 530 | SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 531 | 2, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| 532 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 533 | } |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 534 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 535 | quic_data.AddRead(ASYNC, OK); // EOF |
| 536 | quic_data.AddSocketDataToFactory(&socket_factory_); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 537 | Initialize(); |
| 538 | CompleteCryptoHandshake(); |
| 539 | |
| 540 | // Open the maximum number of streams so that a subsequent request |
| 541 | // can not proceed immediately. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 542 | const size_t kMaxOpenStreams = GetMaxAllowedOutgoingBidirectionalStreams(); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 543 | for (size_t i = 0; i < kMaxOpenStreams; i++) { |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 544 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 545 | } |
| 546 | EXPECT_EQ(kMaxOpenStreams, session_->GetNumOpenOutgoingStreams()); |
| 547 | |
| 548 | // Request a stream and verify that it's pending. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 549 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 550 | session_->CreateHandle(destination_); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 551 | TestCompletionCallback callback; |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 552 | ASSERT_EQ( |
| 553 | ERR_IO_PENDING, |
| 554 | handle->RequestStream(/*requires_confirmation=*/false, |
| 555 | callback.callback(), TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 556 | |
| 557 | // Close a stream and ensure the stream request completes. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 558 | quic::QuicRstStreamFrame rst(quic::kInvalidControlFrameId, |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 559 | GetNthClientInitiatedBidirectionalStreamId(0), |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 560 | quic::QUIC_STREAM_CANCELLED, 0); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 561 | session_->OnRstStream(rst); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 562 | if (version_.transport_version == quic::QUIC_VERSION_99) { |
Frank Kastenholz | 684ea41 | 2019-02-13 18:48:18 | [diff] [blame] | 563 | // For version99, to close the stream completely, we also must receive a |
| 564 | // STOP_SENDING frame: |
| 565 | quic::QuicStopSendingFrame stop_sending( |
| 566 | quic::kInvalidControlFrameId, |
| 567 | GetNthClientInitiatedBidirectionalStreamId(0), |
| 568 | quic::QUIC_STREAM_CANCELLED); |
| 569 | session_->OnStopSendingFrame(stop_sending); |
| 570 | } |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 571 | // Pump the message loop to read the max stream id packet. |
| 572 | base::RunLoop().RunUntilIdle(); |
| 573 | |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 574 | ASSERT_TRUE(callback.have_result()); |
| 575 | EXPECT_THAT(callback.WaitForResult(), IsOk()); |
rch | 1bcfddf2 | 2017-06-03 00:26:29 | [diff] [blame] | 576 | EXPECT_TRUE(handle->ReleaseStream() != nullptr); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 577 | |
| 578 | quic_data.Resume(); |
| 579 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 580 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 581 | } |
| 582 | |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 583 | TEST_P(QuicChromiumClientSessionTest, ClosedWithAsyncStreamRequest) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 584 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 585 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 586 | if (version_.transport_version == quic::QUIC_VERSION_99) { |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 587 | // The open stream limit is set to 50 by |
| 588 | // MockCryptoClientStream::SetConfigNegotiated() so when the 51st stream is |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 589 | // requested, a STREAMS_BLOCKED will be sent, indicating that it's blocked |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 590 | // at the limit of 50. The +1 accounts for the header streams. |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 591 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeStreamsBlockedPacket( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 592 | 2, true, 50 + 1, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 593 | /*unidirectional=*/false)); |
| 594 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeStreamsBlockedPacket( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 595 | 3, true, 50 + 1, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 596 | /*unidirectional=*/false)); |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 597 | } |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 598 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 599 | quic_data.AddRead(ASYNC, OK); // EOF |
| 600 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 601 | |
| 602 | Initialize(); |
| 603 | CompleteCryptoHandshake(); |
| 604 | |
| 605 | // Open the maximum number of streams so that a subsequent request |
| 606 | // can not proceed immediately. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 607 | const size_t kMaxOpenStreams = GetMaxAllowedOutgoingBidirectionalStreams(); |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 608 | for (size_t i = 0; i < kMaxOpenStreams; i++) { |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 609 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 610 | } |
| 611 | EXPECT_EQ(kMaxOpenStreams, session_->GetNumOpenOutgoingStreams()); |
| 612 | |
| 613 | // Request two streams which will both be pending. |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 614 | // In V99 each will generate a max stream id for each attempt. |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 615 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 616 | session_->CreateHandle(destination_); |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 617 | std::unique_ptr<QuicChromiumClientSession::Handle> handle2 = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 618 | session_->CreateHandle(destination_); |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 619 | |
| 620 | ASSERT_EQ(ERR_IO_PENDING, |
| 621 | handle->RequestStream( |
| 622 | /*requires_confirmation=*/false, |
| 623 | base::Bind(&QuicChromiumClientSessionTest::ResetHandleOnError, |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 624 | base::Unretained(this), &handle2), |
| 625 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 626 | |
| 627 | TestCompletionCallback callback2; |
| 628 | ASSERT_EQ(ERR_IO_PENDING, |
| 629 | handle2->RequestStream(/*requires_confirmation=*/false, |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 630 | callback2.callback(), |
| 631 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 632 | |
| 633 | session_->connection()->CloseConnection( |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 634 | quic::QUIC_NETWORK_IDLE_TIMEOUT, "Timed out", |
| 635 | quic::ConnectionCloseBehavior::SILENT_CLOSE); |
Ryan Hamilton | 9883ff6 | 2017-08-01 06:07:05 | [diff] [blame] | 636 | |
| 637 | // Pump the message loop to read the connection close packet. |
| 638 | base::RunLoop().RunUntilIdle(); |
| 639 | EXPECT_FALSE(handle2.get()); |
| 640 | quic_data.Resume(); |
| 641 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 642 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 643 | } |
| 644 | |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 645 | TEST_P(QuicChromiumClientSessionTest, CancelPendingStreamRequest) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 646 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 647 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 648 | if (version_.transport_version == quic::QUIC_VERSION_99) { |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 649 | // The open stream limit is set to 50 by |
| 650 | // MockCryptoClientStream::SetConfigNegotiated() so when the 51st stream is |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 651 | // requested, a STREAMS_BLOCKED will be sent. |
| 652 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeStreamsBlockedPacket( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 653 | 2, true, 51, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 654 | /*unidirectional=*/false)); |
Frank Kastenholz | 684ea41 | 2019-02-13 18:48:18 | [diff] [blame] | 655 | // This node receives the RST_STREAM+STOP_SENDING, it responds |
| 656 | // with only a RST_STREAM. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 657 | quic_data.AddWrite( |
| 658 | SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 659 | 3, true, GetNthClientInitiatedBidirectionalStreamId(0), |
Frank Kastenholz | 684ea41 | 2019-02-13 18:48:18 | [diff] [blame] | 660 | quic::QUIC_STREAM_CANCELLED, 0, |
| 661 | /*include_stop_sending_if_v99=*/false)); |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 662 | } else { |
| 663 | quic_data.AddWrite( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 664 | SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 665 | 2, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| 666 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 667 | } |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 668 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 669 | quic_data.AddRead(ASYNC, OK); // EOF |
| 670 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 671 | |
| 672 | Initialize(); |
| 673 | CompleteCryptoHandshake(); |
| 674 | |
| 675 | // Open the maximum number of streams so that a subsequent request |
| 676 | // can not proceed immediately. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 677 | const size_t kMaxOpenStreams = GetMaxAllowedOutgoingBidirectionalStreams(); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 678 | for (size_t i = 0; i < kMaxOpenStreams; i++) { |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 679 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 680 | } |
| 681 | EXPECT_EQ(kMaxOpenStreams, session_->GetNumOpenOutgoingStreams()); |
| 682 | |
| 683 | // Request a stream and verify that it's pending. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 684 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 685 | session_->CreateHandle(destination_); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 686 | TestCompletionCallback callback; |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 687 | ASSERT_EQ( |
| 688 | ERR_IO_PENDING, |
| 689 | handle->RequestStream(/*requires_confirmation=*/false, |
| 690 | callback.callback(), TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 691 | |
| 692 | // Cancel the pending stream request. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 693 | handle.reset(); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 694 | |
| 695 | // Close a stream and ensure that no new stream is created. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 696 | quic::QuicRstStreamFrame rst(quic::kInvalidControlFrameId, |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 697 | GetNthClientInitiatedBidirectionalStreamId(0), |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 698 | quic::QUIC_STREAM_CANCELLED, 0); |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 699 | session_->OnRstStream(rst); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 700 | if (version_.transport_version == quic::QUIC_VERSION_99) { |
Frank Kastenholz | 684ea41 | 2019-02-13 18:48:18 | [diff] [blame] | 701 | // For version99, we require a STOP_SENDING as well as a RESET_STREAM to |
| 702 | // fully close the stream. |
| 703 | quic::QuicStopSendingFrame stop_sending( |
| 704 | quic::kInvalidControlFrameId, |
| 705 | GetNthClientInitiatedBidirectionalStreamId(0), |
| 706 | quic::QUIC_STREAM_CANCELLED); |
| 707 | session_->OnStopSendingFrame(stop_sending); |
| 708 | } |
rch | 1baa747 | 2017-04-26 05:43:58 | [diff] [blame] | 709 | EXPECT_EQ(kMaxOpenStreams - 1, session_->GetNumOpenOutgoingStreams()); |
| 710 | |
| 711 | quic_data.Resume(); |
| 712 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 713 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 714 | } |
| 715 | |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 716 | TEST_P(QuicChromiumClientSessionTest, ConnectionCloseBeforeStreamRequest) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 717 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 718 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 719 | quic_data.AddRead( |
| 720 | ASYNC, |
| 721 | server_maker_.MakeConnectionClosePacket( |
| 722 | 1, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!")); |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 723 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 724 | |
| 725 | Initialize(); |
| 726 | CompleteCryptoHandshake(); |
| 727 | |
| 728 | // Pump the message loop to read the connection close packet. |
| 729 | base::RunLoop().RunUntilIdle(); |
| 730 | |
| 731 | // Request a stream and verify that it failed. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 732 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 733 | session_->CreateHandle(destination_); |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 734 | TestCompletionCallback callback; |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 735 | ASSERT_EQ( |
| 736 | ERR_CONNECTION_CLOSED, |
| 737 | handle->RequestStream(/*requires_confirmation=*/false, |
| 738 | callback.callback(), TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 739 | |
| 740 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 741 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 742 | } |
| 743 | |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 744 | TEST_P(QuicChromiumClientSessionTest, ConnectionCloseBeforeHandshakeConfirmed) { |
Ryan Hamilton | 8380c65 | 2019-06-04 02:25:06 | [diff] [blame] | 745 | if (version_.handshake_protocol == quic::PROTOCOL_TLS1_3) { |
| 746 | // TODO(nharper, b/112643533): Figure out why this test fails when TLS is |
| 747 | // enabled and fix it. |
| 748 | return; |
| 749 | } |
| 750 | |
David Schinazi | c828105 | 2019-01-24 06:14:17 | [diff] [blame] | 751 | // Force the connection close packet to use long headers with connection ID. |
Ryan Hamilton | 840358c | 2019-03-19 19:00:35 | [diff] [blame] | 752 | server_maker_.SetEncryptionLevel(quic::ENCRYPTION_INITIAL); |
David Schinazi | c828105 | 2019-01-24 06:14:17 | [diff] [blame] | 753 | |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 754 | MockQuicData quic_data(version_); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 755 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 756 | quic_data.AddRead( |
| 757 | ASYNC, |
| 758 | server_maker_.MakeConnectionClosePacket( |
| 759 | 1, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!")); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 760 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 761 | |
| 762 | Initialize(); |
| 763 | |
| 764 | // Request a stream and verify that it's pending. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 765 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 766 | session_->CreateHandle(destination_); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 767 | TestCompletionCallback callback; |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 768 | ASSERT_EQ( |
| 769 | ERR_IO_PENDING, |
| 770 | handle->RequestStream(/*requires_confirmation=*/true, callback.callback(), |
| 771 | TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | d606b6c3 | 2017-05-02 17:32:57 | [diff] [blame] | 772 | |
| 773 | // Close the connection and verify that the StreamRequest completes with |
| 774 | // an error. |
| 775 | quic_data.Resume(); |
| 776 | base::RunLoop().RunUntilIdle(); |
| 777 | |
| 778 | EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_CLOSED)); |
| 779 | |
| 780 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 781 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 782 | } |
| 783 | |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 784 | TEST_P(QuicChromiumClientSessionTest, ConnectionCloseWithPendingStreamRequest) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 785 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 786 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 787 | if (version_.transport_version == quic::QUIC_VERSION_99) { |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 788 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeStreamsBlockedPacket( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 789 | 2, true, 51, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 790 | /*unidirectional=*/false)); |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 791 | } |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 792 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 793 | quic_data.AddRead( |
| 794 | ASYNC, |
| 795 | server_maker_.MakeConnectionClosePacket( |
| 796 | 1, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!")); |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 797 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 798 | |
| 799 | Initialize(); |
| 800 | CompleteCryptoHandshake(); |
| 801 | |
| 802 | // Open the maximum number of streams so that a subsequent request |
| 803 | // can not proceed immediately. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 804 | const size_t kMaxOpenStreams = GetMaxAllowedOutgoingBidirectionalStreams(); |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 805 | for (size_t i = 0; i < kMaxOpenStreams; i++) { |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 806 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 807 | } |
| 808 | EXPECT_EQ(kMaxOpenStreams, session_->GetNumOpenOutgoingStreams()); |
| 809 | |
| 810 | // Request a stream and verify that it's pending. |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 811 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 812 | session_->CreateHandle(destination_); |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 813 | TestCompletionCallback callback; |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 814 | ASSERT_EQ( |
| 815 | ERR_IO_PENDING, |
| 816 | handle->RequestStream(/*requires_confirmation=*/false, |
| 817 | callback.callback(), TRAFFIC_ANNOTATION_FOR_TESTS)); |
rch | 94c26d68 | 2017-04-29 02:49:27 | [diff] [blame] | 818 | |
| 819 | // Close the connection and verify that the StreamRequest completes with |
| 820 | // an error. |
| 821 | quic_data.Resume(); |
| 822 | base::RunLoop().RunUntilIdle(); |
| 823 | |
| 824 | EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_CLOSED)); |
| 825 | |
| 826 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 827 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 828 | } |
| 829 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 830 | TEST_P(QuicChromiumClientSessionTest, MaxNumStreams) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 831 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 832 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 833 | if (version_.transport_version == quic::QUIC_VERSION_99) { |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 834 | // Initial configuration is 50 dynamic streams. Taking into account |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 835 | // the static stream (headers), expect to block on when hitting the limit |
| 836 | // of 51 streams |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 837 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeStreamsBlockedPacket( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 838 | 2, true, 50 + 1, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 839 | /*unidirectional=*/false)); |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 840 | quic_data.AddWrite( |
| 841 | SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 842 | 3, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| 843 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 844 | // For the second CreateOutgoingStream that fails because of hitting the |
| 845 | // stream count limit. |
| 846 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeStreamsBlockedPacket( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 847 | 4, true, 50 + 1, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 848 | /*unidirectional=*/false)); |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 849 | quic_data.AddRead( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 850 | ASYNC, server_maker_.MakeMaxStreamsPacket(1, true, 50 + 2, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 851 | /*unidirectional=*/false)); |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 852 | } else { |
| 853 | quic_data.AddWrite( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 854 | SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 855 | 2, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| 856 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 857 | } |
| 858 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 859 | quic_data.AddRead(ASYNC, OK); // EOF |
| 860 | quic_data.AddSocketDataToFactory(&socket_factory_); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 861 | |
| 862 | Initialize(); |
[email protected] | ed3fc15d | 2013-03-08 18:37:44 | [diff] [blame] | 863 | CompleteCryptoHandshake(); |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 864 | const size_t kMaxOpenStreams = GetMaxAllowedOutgoingBidirectionalStreams(); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 865 | |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 866 | std::vector<QuicChromiumClientStream*> streams; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 867 | for (size_t i = 0; i < kMaxOpenStreams; i++) { |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 868 | QuicChromiumClientStream* stream = |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 869 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 870 | EXPECT_TRUE(stream); |
[email protected] | f702d57 | 2012-12-04 15:56:20 | [diff] [blame] | 871 | streams.push_back(stream); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 872 | } |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 873 | // This stream, the 51st dynamic stream, can not be opened. |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 874 | EXPECT_FALSE( |
| 875 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get())); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 876 | |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 877 | EXPECT_EQ(kMaxOpenStreams, session_->GetNumOpenOutgoingStreams()); |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 878 | |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 879 | // Close a stream and ensure I can now open a new one. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 880 | quic::QuicStreamId stream_id = streams[0]->id(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 881 | session_->CloseStream(stream_id); |
rtenneti | ac06c2f | 2015-11-05 18:12:35 | [diff] [blame] | 882 | |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 883 | // Pump data, bringing in the max-stream-id |
| 884 | base::RunLoop().RunUntilIdle(); |
| 885 | |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 886 | EXPECT_FALSE( |
| 887 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get())); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 888 | quic::QuicRstStreamFrame rst1(quic::kInvalidControlFrameId, stream_id, |
| 889 | quic::QUIC_STREAM_NO_ERROR, 0); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 890 | session_->OnRstStream(rst1); |
| 891 | EXPECT_EQ(kMaxOpenStreams - 1, session_->GetNumOpenOutgoingStreams()); |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 892 | base::RunLoop().RunUntilIdle(); |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 893 | EXPECT_TRUE( |
| 894 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get())); |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 895 | } |
| 896 | |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 897 | TEST_P(QuicChromiumClientSessionTest, PushStreamTimedOutNoResponse) { |
| 898 | base::HistogramTester histogram_tester; |
| 899 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 900 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 901 | client_maker_.MakeInitialSettingsPacket(1)); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 902 | std::unique_ptr<quic::QuicEncryptedPacket> client_rst( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 903 | client_maker_.MakeRstPacket( |
| 904 | 2, true, GetNthServerInitiatedUnidirectionalStreamId(0), |
| 905 | quic::QUIC_PUSH_STREAM_TIMED_OUT)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 906 | MockWrite writes[] = { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 907 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), |
| 908 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 909 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 910 | Initialize(); |
| 911 | |
| 912 | ProofVerifyDetailsChromium details; |
| 913 | details.cert_verify_result.verified_cert = |
| 914 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 915 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 916 | |
| 917 | CompleteCryptoHandshake(); |
| 918 | session_->OnProofVerifyDetailsAvailable(details); |
| 919 | |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 920 | QuicChromiumClientStream* stream = |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 921 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 922 | EXPECT_TRUE(stream); |
| 923 | |
Ryan Hamilton | 0239aac | 2018-05-19 00:03:13 | [diff] [blame] | 924 | spdy::SpdyHeaderBlock promise_headers; |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 925 | promise_headers[":method"] = "GET"; |
| 926 | promise_headers[":authority"] = "www.example.org"; |
| 927 | promise_headers[":scheme"] = "https"; |
| 928 | promise_headers[":path"] = "/pushed.jpg"; |
| 929 | |
| 930 | // Receive a PUSH PROMISE from the server. |
ckrasic | bf2f59c | 2017-05-04 23:54:36 | [diff] [blame] | 931 | EXPECT_TRUE(session_->HandlePromised( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 932 | stream->id(), GetNthServerInitiatedUnidirectionalStreamId(0), |
| 933 | promise_headers)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 934 | |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 935 | quic::QuicClientPromisedInfo* promised = |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 936 | session_->GetPromisedById(GetNthServerInitiatedUnidirectionalStreamId(0)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 937 | EXPECT_TRUE(promised); |
| 938 | // Fire alarm to time out the push stream. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 939 | alarm_factory_.FireAlarm( |
| 940 | quic::test::QuicClientPromisedInfoPeer::GetAlarm(promised)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 941 | EXPECT_FALSE( |
| 942 | session_->GetPromisedByUrl("https://www.example.org/pushed.jpg")); |
| 943 | EXPECT_EQ(0u, |
| 944 | QuicChromiumClientSessionPeer::GetPushedBytesCount(session_.get())); |
| 945 | EXPECT_EQ(0u, QuicChromiumClientSessionPeer::GetPushedAndUnclaimedBytesCount( |
| 946 | session_.get())); |
| 947 | } |
| 948 | |
| 949 | TEST_P(QuicChromiumClientSessionTest, PushStreamTimedOutWithResponse) { |
| 950 | base::HistogramTester histogram_tester; |
| 951 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 952 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 953 | client_maker_.MakeInitialSettingsPacket(1)); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 954 | std::unique_ptr<quic::QuicEncryptedPacket> client_rst( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 955 | client_maker_.MakeRstPacket( |
| 956 | 2, true, GetNthServerInitiatedUnidirectionalStreamId(0), |
| 957 | quic::QUIC_PUSH_STREAM_TIMED_OUT)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 958 | MockWrite writes[] = { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 959 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), |
| 960 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 961 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 962 | Initialize(); |
| 963 | |
| 964 | ProofVerifyDetailsChromium details; |
| 965 | details.cert_verify_result.verified_cert = |
| 966 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 967 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 968 | |
| 969 | CompleteCryptoHandshake(); |
| 970 | session_->OnProofVerifyDetailsAvailable(details); |
| 971 | |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 972 | QuicChromiumClientStream* stream = |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 973 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 974 | EXPECT_TRUE(stream); |
| 975 | |
Ryan Hamilton | 0239aac | 2018-05-19 00:03:13 | [diff] [blame] | 976 | spdy::SpdyHeaderBlock promise_headers; |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 977 | promise_headers[":method"] = "GET"; |
| 978 | promise_headers[":authority"] = "www.example.org"; |
| 979 | promise_headers[":scheme"] = "https"; |
| 980 | promise_headers[":path"] = "/pushed.jpg"; |
| 981 | |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 982 | session_->GetOrCreateStream(GetNthServerInitiatedUnidirectionalStreamId(0)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 983 | // Receive a PUSH PROMISE from the server. |
ckrasic | bf2f59c | 2017-05-04 23:54:36 | [diff] [blame] | 984 | EXPECT_TRUE(session_->HandlePromised( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 985 | stream->id(), GetNthServerInitiatedUnidirectionalStreamId(0), |
| 986 | promise_headers)); |
| 987 | session_->OnInitialHeadersComplete( |
| 988 | GetNthServerInitiatedUnidirectionalStreamId(0), spdy::SpdyHeaderBlock()); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 989 | // Read data on the pushed stream. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 990 | quic::QuicStreamFrame data(GetNthServerInitiatedUnidirectionalStreamId(0), |
| 991 | false, 0, quic::QuicStringPiece("SP")); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 992 | session_->OnStreamFrame(data); |
| 993 | |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 994 | quic::QuicClientPromisedInfo* promised = |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 995 | session_->GetPromisedById(GetNthServerInitiatedUnidirectionalStreamId(0)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 996 | EXPECT_TRUE(promised); |
| 997 | // Fire alarm to time out the push stream. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 998 | alarm_factory_.FireAlarm( |
| 999 | quic::test::QuicClientPromisedInfoPeer::GetAlarm(promised)); |
zhongyi | e34c03566 | 2016-10-19 22:26:02 | [diff] [blame] | 1000 | EXPECT_EQ(2u, |
| 1001 | QuicChromiumClientSessionPeer::GetPushedBytesCount(session_.get())); |
| 1002 | EXPECT_EQ(2u, QuicChromiumClientSessionPeer::GetPushedAndUnclaimedBytesCount( |
| 1003 | session_.get())); |
| 1004 | } |
| 1005 | |
Renjie | 7f5894b | 2019-05-31 03:41:31 | [diff] [blame] | 1006 | // Regression test for crbug.com/968621. |
| 1007 | TEST_P(QuicChromiumClientSessionTest, PendingStreamOnRst) { |
| 1008 | if (!quic::VersionHasStreamType(version_.transport_version)) |
| 1009 | return; |
| 1010 | |
| 1011 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
| 1012 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1013 | client_maker_.MakeInitialSettingsPacket(1)); |
Renjie | 7f5894b | 2019-05-31 03:41:31 | [diff] [blame] | 1014 | std::unique_ptr<quic::QuicEncryptedPacket> client_rst( |
| 1015 | client_maker_.MakeRstPacket( |
| 1016 | 2, true, GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1017 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
| 1018 | |
| 1019 | MockWrite writes[] = { |
| 1020 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), |
| 1021 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; |
| 1022 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
| 1023 | |
| 1024 | Initialize(); |
| 1025 | CompleteCryptoHandshake(); |
| 1026 | |
| 1027 | quic::QuicStreamFrame data(GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1028 | false, 1, quic::QuicStringPiece("SP")); |
| 1029 | session_->OnStreamFrame(data); |
| 1030 | EXPECT_EQ(0u, session_->GetNumOpenIncomingStreams()); |
| 1031 | quic::QuicRstStreamFrame rst(quic::kInvalidControlFrameId, |
| 1032 | GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1033 | quic::QUIC_STREAM_CANCELLED, 0); |
| 1034 | session_->OnRstStream(rst); |
| 1035 | } |
| 1036 | |
Renjie | 82ddaf4 | 2019-06-07 23:40:31 | [diff] [blame] | 1037 | // Regression test for crbug.com/971361. |
| 1038 | TEST_P(QuicChromiumClientSessionTest, ClosePendingStream) { |
| 1039 | if (!quic::VersionHasStreamType(version_.transport_version)) |
| 1040 | return; |
| 1041 | |
| 1042 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
| 1043 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
| 1044 | client_maker_.MakeInitialSettingsPacket(1)); |
| 1045 | std::unique_ptr<quic::QuicEncryptedPacket> client_rst( |
| 1046 | client_maker_.MakeRstPacket( |
| 1047 | 2, true, GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1048 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
| 1049 | |
| 1050 | MockWrite writes[] = { |
| 1051 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), |
| 1052 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; |
| 1053 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
| 1054 | |
| 1055 | Initialize(); |
| 1056 | CompleteCryptoHandshake(); |
| 1057 | |
| 1058 | quic::QuicStreamId id = GetNthServerInitiatedUnidirectionalStreamId(0); |
| 1059 | quic::QuicStreamFrame data(id, false, 1, quic::QuicStringPiece("SP")); |
| 1060 | session_->OnStreamFrame(data); |
| 1061 | EXPECT_EQ(0u, session_->GetNumOpenIncomingStreams()); |
| 1062 | session_->CloseStream(id); |
| 1063 | } |
| 1064 | |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1065 | TEST_P(QuicChromiumClientSessionTest, CancelPushWhenPendingValidation) { |
| 1066 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1067 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1068 | client_maker_.MakeInitialSettingsPacket(1)); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1069 | std::unique_ptr<quic::QuicEncryptedPacket> client_rst( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1070 | client_maker_.MakeRstPacket(2, true, |
| 1071 | GetNthClientInitiatedBidirectionalStreamId(0), |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1072 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1073 | |
| 1074 | MockWrite writes[] = { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1075 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), |
| 1076 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1077 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1078 | Initialize(); |
| 1079 | |
| 1080 | ProofVerifyDetailsChromium details; |
| 1081 | details.cert_verify_result.verified_cert = |
| 1082 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 1083 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 1084 | |
| 1085 | CompleteCryptoHandshake(); |
| 1086 | session_->OnProofVerifyDetailsAvailable(details); |
| 1087 | |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 1088 | QuicChromiumClientStream* stream = |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 1089 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1090 | EXPECT_TRUE(stream); |
| 1091 | |
Ryan Hamilton | 0239aac | 2018-05-19 00:03:13 | [diff] [blame] | 1092 | spdy::SpdyHeaderBlock promise_headers; |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1093 | promise_headers[":method"] = "GET"; |
| 1094 | promise_headers[":authority"] = "www.example.org"; |
| 1095 | promise_headers[":scheme"] = "https"; |
| 1096 | promise_headers[":path"] = "/pushed.jpg"; |
| 1097 | |
| 1098 | // Receive a PUSH PROMISE from the server. |
ckrasic | bf2f59c | 2017-05-04 23:54:36 | [diff] [blame] | 1099 | EXPECT_TRUE(session_->HandlePromised( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1100 | stream->id(), GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1101 | promise_headers)); |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1102 | |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1103 | quic::QuicClientPromisedInfo* promised = |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1104 | session_->GetPromisedById(GetNthServerInitiatedUnidirectionalStreamId(0)); |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1105 | EXPECT_TRUE(promised); |
| 1106 | |
| 1107 | // Initiate rendezvous. |
Ryan Hamilton | 0239aac | 2018-05-19 00:03:13 | [diff] [blame] | 1108 | spdy::SpdyHeaderBlock client_request = promise_headers.Clone(); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1109 | quic::test::TestPushPromiseDelegate delegate(/*match=*/true); |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1110 | promised->HandleClientRequest(client_request, &delegate); |
| 1111 | |
| 1112 | // Cancel the push before receiving the response to the pushed request. |
| 1113 | GURL pushed_url("https://www.example.org/pushed.jpg"); |
zhongyi | 0009f3e | 2016-11-11 19:47:50 | [diff] [blame] | 1114 | test_push_delegate_.CancelPush(pushed_url); |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1115 | EXPECT_TRUE(session_->GetPromisedByUrl(pushed_url.spec())); |
| 1116 | |
| 1117 | // Reset the stream now before tear down. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1118 | session_->CloseStream(GetNthClientInitiatedBidirectionalStreamId(0)); |
zhongyi | 7465c1b | 2016-11-11 01:38:05 | [diff] [blame] | 1119 | } |
| 1120 | |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1121 | TEST_P(QuicChromiumClientSessionTest, CancelPushBeforeReceivingResponse) { |
| 1122 | base::HistogramTester histogram_tester; |
| 1123 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1124 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1125 | client_maker_.MakeInitialSettingsPacket(1)); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1126 | std::unique_ptr<quic::QuicEncryptedPacket> client_rst( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1127 | client_maker_.MakeRstPacket( |
| 1128 | 2, true, GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1129 | quic::QUIC_STREAM_CANCELLED)); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1130 | MockWrite writes[] = { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1131 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), |
| 1132 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1133 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1134 | Initialize(); |
| 1135 | |
| 1136 | ProofVerifyDetailsChromium details; |
| 1137 | details.cert_verify_result.verified_cert = |
| 1138 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 1139 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 1140 | |
| 1141 | CompleteCryptoHandshake(); |
| 1142 | session_->OnProofVerifyDetailsAvailable(details); |
| 1143 | |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 1144 | QuicChromiumClientStream* stream = |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 1145 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1146 | EXPECT_TRUE(stream); |
| 1147 | |
Ryan Hamilton | 0239aac | 2018-05-19 00:03:13 | [diff] [blame] | 1148 | spdy::SpdyHeaderBlock promise_headers; |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1149 | promise_headers[":method"] = "GET"; |
| 1150 | promise_headers[":authority"] = "www.example.org"; |
| 1151 | promise_headers[":scheme"] = "https"; |
| 1152 | promise_headers[":path"] = "/pushed.jpg"; |
| 1153 | |
| 1154 | // Receive a PUSH PROMISE from the server. |
ckrasic | bf2f59c | 2017-05-04 23:54:36 | [diff] [blame] | 1155 | EXPECT_TRUE(session_->HandlePromised( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1156 | stream->id(), GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1157 | promise_headers)); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1158 | |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1159 | quic::QuicClientPromisedInfo* promised = |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1160 | session_->GetPromisedById(GetNthServerInitiatedUnidirectionalStreamId(0)); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1161 | EXPECT_TRUE(promised); |
| 1162 | // Cancel the push before receiving the response to the pushed request. |
| 1163 | GURL pushed_url("https://www.example.org/pushed.jpg"); |
zhongyi | 0009f3e | 2016-11-11 19:47:50 | [diff] [blame] | 1164 | test_push_delegate_.CancelPush(pushed_url); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1165 | |
| 1166 | EXPECT_FALSE(session_->GetPromisedByUrl(pushed_url.spec())); |
| 1167 | EXPECT_EQ(0u, |
| 1168 | QuicChromiumClientSessionPeer::GetPushedBytesCount(session_.get())); |
| 1169 | EXPECT_EQ(0u, QuicChromiumClientSessionPeer::GetPushedAndUnclaimedBytesCount( |
| 1170 | session_.get())); |
| 1171 | } |
| 1172 | |
| 1173 | TEST_P(QuicChromiumClientSessionTest, CancelPushAfterReceivingResponse) { |
| 1174 | base::HistogramTester histogram_tester; |
| 1175 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1176 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1177 | client_maker_.MakeInitialSettingsPacket(1)); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1178 | std::unique_ptr<quic::QuicEncryptedPacket> client_rst( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1179 | client_maker_.MakeRstPacket( |
| 1180 | 2, true, GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1181 | quic::QUIC_STREAM_CANCELLED)); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1182 | MockWrite writes[] = { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1183 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), |
| 1184 | MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1185 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1186 | Initialize(); |
| 1187 | |
| 1188 | ProofVerifyDetailsChromium details; |
| 1189 | details.cert_verify_result.verified_cert = |
| 1190 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 1191 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 1192 | |
| 1193 | CompleteCryptoHandshake(); |
| 1194 | session_->OnProofVerifyDetailsAvailable(details); |
| 1195 | |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 1196 | QuicChromiumClientStream* stream = |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 1197 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1198 | EXPECT_TRUE(stream); |
| 1199 | |
Ryan Hamilton | 0239aac | 2018-05-19 00:03:13 | [diff] [blame] | 1200 | spdy::SpdyHeaderBlock promise_headers; |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1201 | promise_headers[":method"] = "GET"; |
| 1202 | promise_headers[":authority"] = "www.example.org"; |
| 1203 | promise_headers[":scheme"] = "https"; |
| 1204 | promise_headers[":path"] = "/pushed.jpg"; |
| 1205 | |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1206 | session_->GetOrCreateStream(GetNthServerInitiatedUnidirectionalStreamId(0)); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1207 | // Receive a PUSH PROMISE from the server. |
ckrasic | bf2f59c | 2017-05-04 23:54:36 | [diff] [blame] | 1208 | EXPECT_TRUE(session_->HandlePromised( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1209 | stream->id(), GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1210 | promise_headers)); |
| 1211 | session_->OnInitialHeadersComplete( |
| 1212 | GetNthServerInitiatedUnidirectionalStreamId(0), spdy::SpdyHeaderBlock()); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1213 | // Read data on the pushed stream. |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1214 | quic::QuicStreamFrame data(GetNthServerInitiatedUnidirectionalStreamId(0), |
| 1215 | false, 0, quic::QuicStringPiece("SP")); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1216 | session_->OnStreamFrame(data); |
| 1217 | |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1218 | quic::QuicClientPromisedInfo* promised = |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1219 | session_->GetPromisedById(GetNthServerInitiatedUnidirectionalStreamId(0)); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1220 | EXPECT_TRUE(promised); |
| 1221 | // Cancel the push after receiving data on the push stream. |
| 1222 | GURL pushed_url("https://www.example.org/pushed.jpg"); |
zhongyi | 0009f3e | 2016-11-11 19:47:50 | [diff] [blame] | 1223 | test_push_delegate_.CancelPush(pushed_url); |
zhongyi | 18bb2d9 | 2016-10-27 19:38:50 | [diff] [blame] | 1224 | |
| 1225 | EXPECT_FALSE(session_->GetPromisedByUrl(pushed_url.spec())); |
| 1226 | EXPECT_EQ(2u, |
| 1227 | QuicChromiumClientSessionPeer::GetPushedBytesCount(session_.get())); |
| 1228 | EXPECT_EQ(2u, QuicChromiumClientSessionPeer::GetPushedAndUnclaimedBytesCount( |
| 1229 | session_.get())); |
| 1230 | } |
| 1231 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 1232 | TEST_P(QuicChromiumClientSessionTest, MaxNumStreamsViaRequest) { |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 1233 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1234 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Nick Harper | 23290b8 | 2019-05-02 00:02:56 | [diff] [blame] | 1235 | if (version_.transport_version == quic::QUIC_VERSION_99) { |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 1236 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeStreamsBlockedPacket( |
Ryan Hamilton | 4aeec56 | 2019-05-17 21:22:52 | [diff] [blame] | 1237 | 2, true, 51, |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 1238 | /*unidirectional=*/false)); |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1239 | quic_data.AddWrite( |
| 1240 | SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 1241 | 3, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| 1242 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
| 1243 | quic_data.AddRead( |
David Schinazi | cc1bc59 | 2019-04-24 19:40:31 | [diff] [blame] | 1244 | ASYNC, server_maker_.MakeMaxStreamsPacket(1, true, 53, |
| 1245 | /*unidirectional=*/false)); |
Frank Kastenholz | c9b9bea | 2018-12-03 20:13:47 | [diff] [blame] | 1246 | } else { |
| 1247 | quic_data.AddWrite( |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1248 | SYNCHRONOUS, client_maker_.MakeRstPacket( |
| 1249 | 2, true, GetNthClientInitiatedBidirectionalStreamId(0), |
| 1250 | quic::QUIC_RST_ACKNOWLEDGEMENT)); |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 1251 | } |
| 1252 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 1253 | quic_data.AddRead(ASYNC, OK); // EOF |
| 1254 | quic_data.AddSocketDataToFactory(&socket_factory_); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1255 | |
| 1256 | Initialize(); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 1257 | CompleteCryptoHandshake(); |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1258 | const size_t kMaxOpenStreams = GetMaxAllowedOutgoingBidirectionalStreams(); |
rch | 12fef55 | 2016-01-15 16:26:31 | [diff] [blame] | 1259 | std::vector<QuicChromiumClientStream*> streams; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1260 | for (size_t i = 0; i < kMaxOpenStreams; i++) { |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 1261 | QuicChromiumClientStream* stream = |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 1262 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 1263 | EXPECT_TRUE(stream); |
| 1264 | streams.push_back(stream); |
| 1265 | } |
| 1266 | |
rch | f0b18c8a | 2017-05-05 19:31:57 | [diff] [blame] | 1267 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
Ryan Hamilton | 6c2a2a8 | 2017-12-15 02:06:28 | [diff] [blame] | 1268 | session_->CreateHandle(destination_); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 1269 | TestCompletionCallback callback; |
Ramin Halavati | 683bcaa9 | 2018-02-14 08:42:39 | [diff] [blame] | 1270 | ASSERT_EQ( |
| 1271 | ERR_IO_PENDING, |
| 1272 | handle->RequestStream(/*requires_confirmation=*/false, |
| 1273 | callback.callback(), TRAFFIC_ANNOTATION_FOR_TESTS)); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 1274 | |
| 1275 | // Close a stream and ensure I can now open a new one. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1276 | quic::QuicStreamId stream_id = streams[0]->id(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1277 | session_->CloseStream(stream_id); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1278 | quic::QuicRstStreamFrame rst1(quic::kInvalidControlFrameId, stream_id, |
| 1279 | quic::QUIC_STREAM_NO_ERROR, 0); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1280 | session_->OnRstStream(rst1); |
Frank Kastenholz | 878763bf | 2018-11-28 19:14:48 | [diff] [blame] | 1281 | // Pump data, bringing in the max-stream-id |
| 1282 | base::RunLoop().RunUntilIdle(); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 1283 | ASSERT_TRUE(callback.have_result()); |
robpercival | 214763f | 2016-07-01 23:27:01 | [diff] [blame] | 1284 | EXPECT_THAT(callback.WaitForResult(), IsOk()); |
rch | 1bcfddf2 | 2017-06-03 00:26:29 | [diff] [blame] | 1285 | EXPECT_TRUE(handle->ReleaseStream() != nullptr); |
[email protected] | 0b2294d3 | 2013-08-02 00:46:36 | [diff] [blame] | 1286 | } |
| 1287 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 1288 | TEST_P(QuicChromiumClientSessionTest, GoAwayReceived) { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1289 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1290 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1291 | client_maker_.MakeInitialSettingsPacket(1)); |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1292 | MockWrite writes[] = { |
| 1293 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1294 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1295 | Initialize(); |
[email protected] | 8ba8121 | 2013-05-03 13:11:48 | [diff] [blame] | 1296 | CompleteCryptoHandshake(); |
[email protected] | 9db44391 | 2013-02-25 05:27:03 | [diff] [blame] | 1297 | |
| 1298 | // After receiving a GoAway, I should no longer be able to create outgoing |
| 1299 | // streams. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1300 | session_->connection()->OnGoAwayFrame( |
| 1301 | quic::QuicGoAwayFrame(quic::kInvalidControlFrameId, |
| 1302 | quic::QUIC_PEER_GOING_AWAY, 1u, "Going away.")); |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 1303 | EXPECT_EQ(nullptr, QuicChromiumClientSessionPeer::CreateOutgoingStream( |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 1304 | session_.get())); |
[email protected] | 9db44391 | 2013-02-25 05:27:03 | [diff] [blame] | 1305 | } |
| 1306 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 1307 | TEST_P(QuicChromiumClientSessionTest, CanPool) { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1308 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1309 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1310 | client_maker_.MakeInitialSettingsPacket(1)); |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1311 | MockWrite writes[] = { |
| 1312 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1313 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1314 | Initialize(); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 1315 | // Load a cert that is valid for: |
| 1316 | // www.example.org |
| 1317 | // mail.example.org |
| 1318 | // www.example.com |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 1319 | |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 1320 | ProofVerifyDetailsChromium details; |
| 1321 | details.cert_verify_result.verified_cert = |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1322 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
dcheng | 4227c6d | 2014-08-25 23:58:18 | [diff] [blame] | 1323 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 1324 | |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 1325 | CompleteCryptoHandshake(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1326 | session_->OnProofVerifyDetailsAvailable(details); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 1327 | |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 1328 | EXPECT_TRUE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED, |
| 1329 | SocketTag(), NetworkIsolationKey())); |
| 1330 | EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_ENABLED, |
| 1331 | SocketTag(), NetworkIsolationKey())); |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 1332 | #if defined(OS_ANDROID) |
| 1333 | SocketTag tag1(SocketTag::UNSET_UID, 0x12345678); |
| 1334 | SocketTag tag2(getuid(), 0x87654321); |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 1335 | EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED, tag1, |
| 1336 | NetworkIsolationKey())); |
| 1337 | EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED, tag2, |
| 1338 | NetworkIsolationKey())); |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 1339 | #endif |
| 1340 | EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED, |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 1341 | SocketTag(), NetworkIsolationKey())); |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 1342 | EXPECT_TRUE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED, |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 1343 | SocketTag(), NetworkIsolationKey())); |
| 1344 | EXPECT_FALSE(session_->CanPool("mail.google.com", PRIVACY_MODE_DISABLED, |
| 1345 | SocketTag(), NetworkIsolationKey())); |
| 1346 | |
| 1347 | // Check that NetworkIsolationKey is respected when feature is enabled. |
| 1348 | { |
| 1349 | base::test::ScopedFeatureList feature_list; |
| 1350 | feature_list.InitAndDisableFeature( |
| 1351 | features::kPartitionConnectionsByNetworkIsolationKey); |
| 1352 | EXPECT_TRUE(session_->CanPool( |
| 1353 | "mail.example.com", PRIVACY_MODE_DISABLED, SocketTag(), |
| 1354 | NetworkIsolationKey(url::Origin::Create(GURL("http://foo.test/"))))); |
| 1355 | } |
| 1356 | { |
| 1357 | base::test::ScopedFeatureList feature_list; |
| 1358 | feature_list.InitAndEnableFeature( |
| 1359 | features::kPartitionConnectionsByNetworkIsolationKey); |
| 1360 | EXPECT_FALSE(session_->CanPool( |
| 1361 | "mail.example.com", PRIVACY_MODE_DISABLED, SocketTag(), |
| 1362 | NetworkIsolationKey(url::Origin::Create(GURL("http://foo.test/"))))); |
| 1363 | } |
| 1364 | } |
| 1365 | |
| 1366 | // Much as above, but uses a non-empty NetworkIsolationKey. |
| 1367 | TEST_P(QuicChromiumClientSessionTest, CanPoolWithNetworkIsolationKey) { |
| 1368 | base::test::ScopedFeatureList feature_list; |
| 1369 | feature_list.InitAndEnableFeature( |
| 1370 | features::kPartitionConnectionsByNetworkIsolationKey); |
| 1371 | |
| 1372 | const NetworkIsolationKey kNetworkIsolationKey1( |
| 1373 | url::Origin::Create(GURL("http://foo.test/"))); |
| 1374 | const NetworkIsolationKey kNetworkIsolationKey2( |
| 1375 | url::Origin::Create(GURL("http://bar.test/"))); |
| 1376 | |
| 1377 | session_key_ = |
| 1378 | QuicSessionKey(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED, |
| 1379 | SocketTag(), kNetworkIsolationKey1); |
| 1380 | |
| 1381 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
| 1382 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1383 | client_maker_.MakeInitialSettingsPacket(1)); |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 1384 | MockWrite writes[] = { |
| 1385 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
| 1386 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
| 1387 | Initialize(); |
| 1388 | // Load a cert that is valid for: |
| 1389 | // www.example.org |
| 1390 | // mail.example.org |
| 1391 | // www.example.com |
| 1392 | |
| 1393 | ProofVerifyDetailsChromium details; |
| 1394 | details.cert_verify_result.verified_cert = |
| 1395 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 1396 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 1397 | |
| 1398 | CompleteCryptoHandshake(); |
| 1399 | session_->OnProofVerifyDetailsAvailable(details); |
| 1400 | |
| 1401 | EXPECT_TRUE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED, |
| 1402 | SocketTag(), kNetworkIsolationKey1)); |
| 1403 | EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_ENABLED, |
| 1404 | SocketTag(), kNetworkIsolationKey1)); |
| 1405 | #if defined(OS_ANDROID) |
| 1406 | SocketTag tag1(SocketTag::UNSET_UID, 0x12345678); |
| 1407 | SocketTag tag2(getuid(), 0x87654321); |
| 1408 | EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED, tag1, |
| 1409 | kNetworkIsolationKey1)); |
| 1410 | EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED, tag2, |
| 1411 | kNetworkIsolationKey1)); |
| 1412 | #endif |
| 1413 | EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED, |
| 1414 | SocketTag(), kNetworkIsolationKey1)); |
| 1415 | EXPECT_TRUE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED, |
| 1416 | SocketTag(), kNetworkIsolationKey1)); |
| 1417 | EXPECT_FALSE(session_->CanPool("mail.google.com", PRIVACY_MODE_DISABLED, |
| 1418 | SocketTag(), kNetworkIsolationKey1)); |
| 1419 | |
| 1420 | EXPECT_FALSE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED, |
| 1421 | SocketTag(), kNetworkIsolationKey2)); |
| 1422 | EXPECT_FALSE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED, |
| 1423 | SocketTag(), NetworkIsolationKey())); |
[email protected] | f21ec37 | 2014-07-02 07:15:12 | [diff] [blame] | 1424 | } |
| 1425 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 1426 | TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) { |
Matt Mueller | 230996f1 | 2018-10-22 19:39:44 | [diff] [blame] | 1427 | // Configure the TransportSecurityStateSource so that kPreloadedPKPHost will |
| 1428 | // have static PKP pins set. |
| 1429 | ScopedTransportSecurityStateSource scoped_security_state_source; |
| 1430 | |
| 1431 | // |net::test_default::kHSTSSource| defines pins for kPreloadedPKPHost. |
| 1432 | // (This hostname must be in the spdy_pooling.pem SAN.) |
| 1433 | const char kPreloadedPKPHost[] = "www.example.org"; |
| 1434 | // A hostname without any static state. (This hostname isn't in |
| 1435 | // spdy_pooling.pem SAN, but that's okay because the |
| 1436 | // ProofVerifyDetailsChromium are faked.) |
| 1437 | const char kNoPinsHost[] = "no-pkp.example.org"; |
| 1438 | |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1439 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1440 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1441 | client_maker_.MakeInitialSettingsPacket(1)); |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1442 | MockWrite writes[] = { |
| 1443 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1444 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1445 | Initialize(); |
| 1446 | |
Matt Mueller | 230996f1 | 2018-10-22 19:39:44 | [diff] [blame] | 1447 | transport_security_state_.EnableStaticPinsForTesting(); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1448 | |
| 1449 | ProofVerifyDetailsChromium details; |
| 1450 | details.cert_verify_result.verified_cert = |
| 1451 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 1452 | details.cert_verify_result.is_issued_by_known_root = true; |
Matt Mueller | 230996f1 | 2018-10-22 19:39:44 | [diff] [blame] | 1453 | uint8_t bad_pin = 3; |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1454 | details.cert_verify_result.public_key_hashes.push_back( |
| 1455 | GetTestHashValue(bad_pin)); |
| 1456 | |
dcheng | 4227c6d | 2014-08-25 23:58:18 | [diff] [blame] | 1457 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1458 | |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1459 | CompleteCryptoHandshake(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1460 | session_->OnProofVerifyDetailsAvailable(details); |
Matt Mueller | 230996f1 | 2018-10-22 19:39:44 | [diff] [blame] | 1461 | QuicChromiumClientSessionPeer::SetHostname(session_.get(), kNoPinsHost); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1462 | |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 1463 | EXPECT_FALSE(session_->CanPool(kPreloadedPKPHost, PRIVACY_MODE_DISABLED, |
| 1464 | SocketTag(), NetworkIsolationKey())); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1465 | } |
| 1466 | |
ckrasic | 4f9d88d | 2015-07-22 22:23:16 | [diff] [blame] | 1467 | TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) { |
Matt Mueller | 230996f1 | 2018-10-22 19:39:44 | [diff] [blame] | 1468 | ScopedTransportSecurityStateSource scoped_security_state_source; |
| 1469 | |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1470 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1471 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1472 | client_maker_.MakeInitialSettingsPacket(1)); |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1473 | MockWrite writes[] = { |
| 1474 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1475 | socket_data_.reset(new SequencedSocketData(reads, writes)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1476 | Initialize(); |
| 1477 | |
Matt Mueller | 230996f1 | 2018-10-22 19:39:44 | [diff] [blame] | 1478 | transport_security_state_.EnableStaticPinsForTesting(); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1479 | |
| 1480 | ProofVerifyDetailsChromium details; |
| 1481 | details.cert_verify_result.verified_cert = |
| 1482 | ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 1483 | details.cert_verify_result.is_issued_by_known_root = true; |
Matt Mueller | 230996f1 | 2018-10-22 19:39:44 | [diff] [blame] | 1484 | HashValue primary_pin(HASH_VALUE_SHA256); |
| 1485 | EXPECT_TRUE(primary_pin.FromString( |
| 1486 | "sha256/Nn8jk5By4Vkq6BeOVZ7R7AC6XUUBZsWmUbJR1f1Y5FY=")); |
| 1487 | details.cert_verify_result.public_key_hashes.push_back(primary_pin); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1488 | |
dcheng | 4227c6d | 2014-08-25 23:58:18 | [diff] [blame] | 1489 | ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1490 | |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1491 | CompleteCryptoHandshake(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1492 | session_->OnProofVerifyDetailsAvailable(details); |
| 1493 | QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
[email protected] | 5db45220 | 2014-08-19 05:22:15 | [diff] [blame] | 1494 | |
Paul Jensen | 8e3c5d3 | 2018-02-19 17:06:33 | [diff] [blame] | 1495 | EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED, |
Matt Menke | 26e4154 | 2019-06-05 01:09:51 | [diff] [blame] | 1496 | SocketTag(), NetworkIsolationKey())); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1497 | } |
| 1498 | |
| 1499 | TEST_P(QuicChromiumClientSessionTest, MigrateToSocket) { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1500 | MockRead old_reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1501 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1502 | client_maker_.MakeInitialSettingsPacket(1)); |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1503 | MockWrite old_writes[] = { |
| 1504 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1505 | socket_data_.reset(new SequencedSocketData(old_reads, old_writes)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1506 | Initialize(); |
| 1507 | CompleteCryptoHandshake(); |
| 1508 | |
| 1509 | char data[] = "ABCD"; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1510 | std::unique_ptr<quic::QuicEncryptedPacket> client_ping; |
| 1511 | std::unique_ptr<quic::QuicEncryptedPacket> ack_and_data_out; |
| 1512 | client_ping = client_maker_.MakeAckAndPingPacket(2, false, 1, 1, 1); |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1513 | ack_and_data_out = client_maker_.MakeDataPacket( |
Ryan Hamilton | 7505eb9 | 2019-06-08 00:22:17 | [diff] [blame] | 1514 | 3, GetNthClientInitiatedBidirectionalStreamId(0), false, false, |
Fan Yang | 32c5a11 | 2018-12-10 20:06:33 | [diff] [blame] | 1515 | quic::QuicStringPiece(data)); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1516 | std::unique_ptr<quic::QuicEncryptedPacket> server_ping( |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1517 | server_maker_.MakePingPacket(1, /*include_version=*/false)); |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1518 | MockRead reads[] = { |
| 1519 | MockRead(SYNCHRONOUS, server_ping->data(), server_ping->length(), 0), |
| 1520 | MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; |
| 1521 | MockWrite writes[] = { |
| 1522 | MockWrite(SYNCHRONOUS, client_ping->data(), client_ping->length(), 2), |
| 1523 | MockWrite(SYNCHRONOUS, ack_and_data_out->data(), |
| 1524 | ack_and_data_out->length(), 3)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1525 | StaticSocketDataProvider socket_data(reads, writes); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1526 | socket_factory_.AddSocketDataProvider(&socket_data); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1527 | // Create connected socket. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1528 | std::unique_ptr<DatagramClientSocket> new_socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1529 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
mikecirone | f22f981 | 2016-10-04 03:40:19 | [diff] [blame] | 1530 | &net_log_, NetLogSource()); |
robpercival | 214763f | 2016-07-01 23:27:01 | [diff] [blame] | 1531 | EXPECT_THAT(new_socket->Connect(kIpEndPoint), IsOk()); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1532 | |
| 1533 | // Create reader and writer. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1534 | std::unique_ptr<QuicChromiumPacketReader> new_reader( |
| 1535 | new QuicChromiumPacketReader(new_socket.get(), &clock_, session_.get(), |
| 1536 | kQuicYieldAfterPacketsRead, |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1537 | quic::QuicTime::Delta::FromMilliseconds( |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1538 | kQuicYieldAfterDurationMilliseconds), |
tfarina | 4283411 | 2016-09-22 13:38:20 | [diff] [blame] | 1539 | bound_test_net_log_.bound())); |
Zhongyi Shi | d3d5f50 | 2018-08-10 00:22:22 | [diff] [blame] | 1540 | new_reader->StartReading(); |
jri | ed79618b | 2016-07-02 03:18:52 | [diff] [blame] | 1541 | std::unique_ptr<QuicChromiumPacketWriter> new_writer( |
| 1542 | CreateQuicChromiumPacketWriter(new_socket.get(), session_.get())); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1543 | |
| 1544 | // Migrate session. |
jri | 9f30371 | 2016-09-13 01:10:22 | [diff] [blame] | 1545 | EXPECT_TRUE(session_->MigrateToSocket( |
| 1546 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
| 1547 | // Spin message loop to complete migration. |
| 1548 | base::RunLoop().RunUntilIdle(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1549 | |
| 1550 | // Write data to session. |
Ramin Halavati | f7788ea | 2018-02-26 07:02:57 | [diff] [blame] | 1551 | QuicChromiumClientStream* stream = |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 1552 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get()); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1553 | struct iovec iov[1]; |
| 1554 | iov[0].iov_base = data; |
| 1555 | iov[0].iov_len = 4; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1556 | quic::test::QuicStreamPeer::SendBuffer(stream).SaveStreamData(iov, 1, 0, 4); |
| 1557 | quic::test::QuicStreamPeer::SetStreamBytesWritten(4, stream); |
| 1558 | session_->WritevData(stream, stream->id(), 4, 0, quic::NO_FIN); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1559 | |
| 1560 | EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
| 1561 | EXPECT_TRUE(socket_data.AllWriteDataConsumed()); |
| 1562 | } |
| 1563 | |
| 1564 | TEST_P(QuicChromiumClientSessionTest, MigrateToSocketMaxReaders) { |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1565 | MockRead old_reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1566 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1567 | client_maker_.MakeInitialSettingsPacket(1)); |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1568 | MockWrite old_writes[] = { |
| 1569 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1570 | socket_data_.reset(new SequencedSocketData(old_reads, old_writes)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1571 | Initialize(); |
| 1572 | CompleteCryptoHandshake(); |
| 1573 | |
| 1574 | for (size_t i = 0; i < kMaxReadersPerQuicSession; ++i) { |
| 1575 | MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1576 | std::unique_ptr<quic::QuicEncryptedPacket> ping_out( |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1577 | client_maker_.MakePingPacket(i + 2, /*include_version=*/true)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1578 | MockWrite writes[] = { |
| 1579 | MockWrite(SYNCHRONOUS, ping_out->data(), ping_out->length(), i + 2)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1580 | StaticSocketDataProvider socket_data(reads, writes); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1581 | socket_factory_.AddSocketDataProvider(&socket_data); |
| 1582 | |
| 1583 | // Create connected socket. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1584 | std::unique_ptr<DatagramClientSocket> new_socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1585 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
mikecirone | f22f981 | 2016-10-04 03:40:19 | [diff] [blame] | 1586 | &net_log_, NetLogSource()); |
robpercival | 214763f | 2016-07-01 23:27:01 | [diff] [blame] | 1587 | EXPECT_THAT(new_socket->Connect(kIpEndPoint), IsOk()); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1588 | |
| 1589 | // Create reader and writer. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1590 | std::unique_ptr<QuicChromiumPacketReader> new_reader( |
rch | a02807b4 | 2016-01-29 21:56:15 | [diff] [blame] | 1591 | new QuicChromiumPacketReader(new_socket.get(), &clock_, session_.get(), |
| 1592 | kQuicYieldAfterPacketsRead, |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1593 | quic::QuicTime::Delta::FromMilliseconds( |
rch | a02807b4 | 2016-01-29 21:56:15 | [diff] [blame] | 1594 | kQuicYieldAfterDurationMilliseconds), |
tfarina | 4283411 | 2016-09-22 13:38:20 | [diff] [blame] | 1595 | bound_test_net_log_.bound())); |
Zhongyi Shi | d3d5f50 | 2018-08-10 00:22:22 | [diff] [blame] | 1596 | new_reader->StartReading(); |
jri | ed79618b | 2016-07-02 03:18:52 | [diff] [blame] | 1597 | std::unique_ptr<QuicChromiumPacketWriter> new_writer( |
| 1598 | CreateQuicChromiumPacketWriter(new_socket.get(), session_.get())); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1599 | |
| 1600 | // Migrate session. |
| 1601 | if (i < kMaxReadersPerQuicSession - 1) { |
jri | 9f30371 | 2016-09-13 01:10:22 | [diff] [blame] | 1602 | EXPECT_TRUE(session_->MigrateToSocket( |
| 1603 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
| 1604 | // Spin message loop to complete migration. |
| 1605 | base::RunLoop().RunUntilIdle(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1606 | EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
| 1607 | EXPECT_TRUE(socket_data.AllWriteDataConsumed()); |
| 1608 | } else { |
| 1609 | // Max readers exceeded. |
jri | 9f30371 | 2016-09-13 01:10:22 | [diff] [blame] | 1610 | EXPECT_FALSE(session_->MigrateToSocket( |
| 1611 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
Zhongyi Shi | d3d5f50 | 2018-08-10 00:22:22 | [diff] [blame] | 1612 | EXPECT_TRUE(socket_data.AllReadDataConsumed()); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1613 | EXPECT_FALSE(socket_data.AllWriteDataConsumed()); |
| 1614 | } |
| 1615 | } |
| 1616 | } |
| 1617 | |
| 1618 | TEST_P(QuicChromiumClientSessionTest, MigrateToSocketReadError) { |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1619 | std::unique_ptr<quic::QuicEncryptedPacket> settings_packet( |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1620 | client_maker_.MakeInitialSettingsPacket(1)); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1621 | std::unique_ptr<quic::QuicEncryptedPacket> client_ping; |
| 1622 | client_ping = client_maker_.MakeAckAndPingPacket(2, false, 1, 1, 1); |
| 1623 | std::unique_ptr<quic::QuicEncryptedPacket> server_ping( |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1624 | server_maker_.MakePingPacket(1, /*include_version=*/false)); |
fayang | 3bcb8b50 | 2016-12-07 21:44:37 | [diff] [blame] | 1625 | MockWrite old_writes[] = { |
| 1626 | MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 0)}; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1627 | MockRead old_reads[] = { |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1628 | MockRead(ASYNC, ERR_IO_PENDING, 1), // causes reading to pause. |
| 1629 | MockRead(ASYNC, ERR_NETWORK_CHANGED, 2)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1630 | socket_data_.reset(new SequencedSocketData(old_reads, old_writes)); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1631 | Initialize(); |
| 1632 | CompleteCryptoHandshake(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1633 | MockWrite writes[] = { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1634 | MockWrite(SYNCHRONOUS, client_ping->data(), client_ping->length(), 1)}; |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1635 | MockRead new_reads[] = { |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1636 | MockRead(SYNCHRONOUS, server_ping->data(), server_ping->length(), 0), |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1637 | MockRead(ASYNC, ERR_IO_PENDING, 2), // pause reading. |
alyssar | 2adf3ac | 2016-05-03 17:12:58 | [diff] [blame] | 1638 | MockRead(ASYNC, server_ping->data(), server_ping->length(), 3), |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1639 | MockRead(ASYNC, ERR_IO_PENDING, 4), // pause reading |
| 1640 | MockRead(ASYNC, ERR_NETWORK_CHANGED, 5)}; |
Ryan Sleevi | b8d7ea0 | 2018-05-07 20:01:01 | [diff] [blame] | 1641 | SequencedSocketData new_socket_data(new_reads, writes); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1642 | socket_factory_.AddSocketDataProvider(&new_socket_data); |
| 1643 | |
| 1644 | // Create connected socket. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1645 | std::unique_ptr<DatagramClientSocket> new_socket = |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1646 | socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
mikecirone | f22f981 | 2016-10-04 03:40:19 | [diff] [blame] | 1647 | &net_log_, NetLogSource()); |
robpercival | 214763f | 2016-07-01 23:27:01 | [diff] [blame] | 1648 | EXPECT_THAT(new_socket->Connect(kIpEndPoint), IsOk()); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1649 | |
| 1650 | // Create reader and writer. |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1651 | std::unique_ptr<QuicChromiumPacketReader> new_reader( |
| 1652 | new QuicChromiumPacketReader(new_socket.get(), &clock_, session_.get(), |
| 1653 | kQuicYieldAfterPacketsRead, |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1654 | quic::QuicTime::Delta::FromMilliseconds( |
danakj | ad1777e | 2016-04-16 00:56:42 | [diff] [blame] | 1655 | kQuicYieldAfterDurationMilliseconds), |
tfarina | 4283411 | 2016-09-22 13:38:20 | [diff] [blame] | 1656 | bound_test_net_log_.bound())); |
Zhongyi Shi | d3d5f50 | 2018-08-10 00:22:22 | [diff] [blame] | 1657 | new_reader->StartReading(); |
jri | ed79618b | 2016-07-02 03:18:52 | [diff] [blame] | 1658 | std::unique_ptr<QuicChromiumPacketWriter> new_writer( |
| 1659 | CreateQuicChromiumPacketWriter(new_socket.get(), session_.get())); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1660 | |
| 1661 | // Store old socket and migrate session. |
jri | 9f30371 | 2016-09-13 01:10:22 | [diff] [blame] | 1662 | EXPECT_TRUE(session_->MigrateToSocket( |
| 1663 | std::move(new_socket), std::move(new_reader), std::move(new_writer))); |
| 1664 | // Spin message loop to complete migration. |
| 1665 | base::RunLoop().RunUntilIdle(); |
jri | 7e63664 | 2016-01-14 06:57:08 | [diff] [blame] | 1666 | |
| 1667 | // Read error on old socket does not impact session. |
| 1668 | EXPECT_TRUE(socket_data_->IsPaused()); |
| 1669 | socket_data_->Resume(); |
| 1670 | EXPECT_TRUE(session_->connection()->connected()); |
| 1671 | EXPECT_TRUE(new_socket_data.IsPaused()); |
| 1672 | new_socket_data.Resume(); |
| 1673 | |
| 1674 | // Read error on new socket causes session close. |
| 1675 | EXPECT_TRUE(new_socket_data.IsPaused()); |
| 1676 | EXPECT_TRUE(session_->connection()->connected()); |
| 1677 | new_socket_data.Resume(); |
| 1678 | EXPECT_FALSE(session_->connection()->connected()); |
| 1679 | |
| 1680 | EXPECT_TRUE(socket_data_->AllReadDataConsumed()); |
| 1681 | EXPECT_TRUE(socket_data_->AllWriteDataConsumed()); |
| 1682 | EXPECT_TRUE(new_socket_data.AllReadDataConsumed()); |
| 1683 | EXPECT_TRUE(new_socket_data.AllWriteDataConsumed()); |
| 1684 | } |
| 1685 | |
Zhongyi Shi | 5068bb0 | 2018-08-03 02:44:09 | [diff] [blame] | 1686 | TEST_P(QuicChromiumClientSessionTest, DetectPathDegradingDuringHandshake) { |
Ryan Hamilton | 8380c65 | 2019-06-04 02:25:06 | [diff] [blame] | 1687 | if (version_.handshake_protocol == quic::PROTOCOL_TLS1_3) { |
| 1688 | // TODO(nharper, b/112643533): Figure out why this test fails when TLS is |
| 1689 | // enabled and fix it. |
| 1690 | return; |
| 1691 | } |
Zhongyi Shi | 5068bb0 | 2018-08-03 02:44:09 | [diff] [blame] | 1692 | migrate_session_early_v2_ = true; |
| 1693 | |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 1694 | MockQuicData quic_data(version_); |
Zhongyi Shi | 5068bb0 | 2018-08-03 02:44:09 | [diff] [blame] | 1695 | quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); // Hanging read |
| 1696 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeDummyCHLOPacket(1)); |
| 1697 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeDummyCHLOPacket(2)); |
| 1698 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1699 | |
| 1700 | // Set the crypto handshake mode to cold start and send CHLO packets. |
| 1701 | crypto_client_stream_factory_.set_handshake_mode( |
| 1702 | MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); |
| 1703 | Initialize(); |
| 1704 | |
| 1705 | session_->CryptoConnect(callback_.callback()); |
| 1706 | |
| 1707 | // Check retransmission alarm is set after sending the initial CHLO packet. |
| 1708 | quic::QuicAlarm* retransmission_alarm = |
| 1709 | quic::test::QuicConnectionPeer::GetRetransmissionAlarm( |
| 1710 | session_->connection()); |
| 1711 | EXPECT_TRUE(retransmission_alarm->IsSet()); |
| 1712 | quic::QuicTime retransmission_time = retransmission_alarm->deadline(); |
| 1713 | |
| 1714 | // Check path degrading alarm is set after sending the initial CHLO packet. |
| 1715 | quic::QuicAlarm* path_degrading_alarm = |
| 1716 | quic::test::QuicConnectionPeer::GetPathDegradingAlarm( |
| 1717 | session_->connection()); |
| 1718 | EXPECT_TRUE(path_degrading_alarm->IsSet()); |
| 1719 | quic::QuicTime path_degrading_time = path_degrading_alarm->deadline(); |
| 1720 | EXPECT_LE(retransmission_time, path_degrading_time); |
| 1721 | |
| 1722 | // Do not create outgoing stream since encryption is not established. |
| 1723 | std::unique_ptr<QuicChromiumClientSession::Handle> handle = |
| 1724 | session_->CreateHandle(destination_); |
| 1725 | TestCompletionCallback callback; |
| 1726 | EXPECT_TRUE(handle->IsConnected()); |
| 1727 | EXPECT_FALSE(handle->IsCryptoHandshakeConfirmed()); |
| 1728 | EXPECT_EQ( |
| 1729 | ERR_IO_PENDING, |
| 1730 | handle->RequestStream(/*require_handshake_confirmation=*/true, |
| 1731 | callback.callback(), TRAFFIC_ANNOTATION_FOR_TESTS)); |
| 1732 | |
| 1733 | // Fire the retransmission alarm to retransmit the crypto packet. |
| 1734 | quic::QuicTime::Delta delay = retransmission_time - clock_.ApproximateNow(); |
| 1735 | clock_.AdvanceTime(delay); |
| 1736 | alarm_factory_.FireAlarm(retransmission_alarm); |
| 1737 | |
| 1738 | // Fire the path degrading alarm to notify session that path is degrading |
| 1739 | // during crypto handshake. |
| 1740 | delay = path_degrading_time - clock_.ApproximateNow(); |
| 1741 | clock_.AdvanceTime(delay); |
| 1742 | EXPECT_CALL(*session_.get(), OnPathDegrading()); |
| 1743 | alarm_factory_.FireAlarm(path_degrading_alarm); |
| 1744 | |
| 1745 | EXPECT_TRUE(session_->connection()->IsPathDegrading()); |
| 1746 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 1747 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 1748 | } |
| 1749 | |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 1750 | TEST_P(QuicChromiumClientSessionTest, RetransmittableOnWireTimeout) { |
| 1751 | migrate_session_early_v2_ = true; |
| 1752 | |
Ryan Hamilton | abad59e | 2019-06-06 04:02:59 | [diff] [blame] | 1753 | MockQuicData quic_data(version_); |
Ryan Hamilton | 0d65a8c | 2019-06-07 00:46:02 | [diff] [blame] | 1754 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakeInitialSettingsPacket(1)); |
Zhongyi Shi | 32f2fd0 | 2018-04-16 18:23:43 | [diff] [blame] | 1755 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakePingPacket(2, true)); |
| 1756 | quic_data.AddRead(ASYNC, server_maker_.MakeAckPacket(1, 2, 1, 1, false)); |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 1757 | |
Zhongyi Shi | 32f2fd0 | 2018-04-16 18:23:43 | [diff] [blame] | 1758 | quic_data.AddWrite(SYNCHRONOUS, client_maker_.MakePingPacket(3, false)); |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 1759 | quic_data.AddRead(ASYNC, ERR_IO_PENDING); |
| 1760 | quic_data.AddRead(ASYNC, OK); // EOF |
| 1761 | quic_data.AddSocketDataToFactory(&socket_factory_); |
| 1762 | |
| 1763 | Initialize(); |
| 1764 | CompleteCryptoHandshake(); |
| 1765 | |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1766 | EXPECT_EQ(quic::QuicTime::Delta::FromMilliseconds(100), |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 1767 | session_->connection()->retransmittable_on_wire_timeout()); |
| 1768 | |
| 1769 | // Open a stream since the connection only sends PINGs to keep a |
| 1770 | // retransmittable packet on the wire if there's an open stream. |
Fan Yang | 5a3bddf | 2018-10-12 10:05:50 | [diff] [blame] | 1771 | EXPECT_TRUE( |
| 1772 | QuicChromiumClientSessionPeer::CreateOutgoingStream(session_.get())); |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 1773 | |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1774 | quic::QuicAlarm* alarm = |
Zhongyi Shi | 4bd7bf4 | 2018-11-06 21:05:10 | [diff] [blame] | 1775 | quic::test::QuicConnectionPeer::GetPingAlarm(session_->connection()); |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 1776 | EXPECT_FALSE(alarm->IsSet()); |
| 1777 | |
| 1778 | // Send PING, which will be ACKed by the server. After the ACK, there will be |
| 1779 | // no retransmittable packets on the wire, so the alarm should be set. |
| 1780 | session_->SendPing(); |
| 1781 | base::RunLoop().RunUntilIdle(); |
| 1782 | EXPECT_TRUE(alarm->IsSet()); |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1783 | EXPECT_EQ( |
| 1784 | clock_.ApproximateNow() + quic::QuicTime::Delta::FromMilliseconds(100), |
| 1785 | alarm->deadline()); |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 1786 | |
| 1787 | // Advance clock and simulate the alarm firing. This should cause a PING to be |
| 1788 | // sent. |
Ryan Hamilton | 8d9ee76e | 2018-05-29 23:52:52 | [diff] [blame] | 1789 | clock_.AdvanceTime(quic::QuicTime::Delta::FromMilliseconds(100)); |
Yixin Wang | f65c4b6d | 2018-03-08 22:37:40 | [diff] [blame] | 1790 | alarm_factory_.FireAlarm(alarm); |
| 1791 | base::RunLoop().RunUntilIdle(); |
| 1792 | |
| 1793 | quic_data.Resume(); |
| 1794 | EXPECT_TRUE(quic_data.AllReadDataConsumed()); |
| 1795 | EXPECT_TRUE(quic_data.AllWriteDataConsumed()); |
| 1796 | } |
| 1797 | |
[email protected] | dd3fd0e | 2012-11-04 05:14:40 | [diff] [blame] | 1798 | } // namespace |
| 1799 | } // namespace test |
| 1800 | } // namespace net |