| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/spdy/spdy_session.h" |
| |
| #include "base/base64.h" |
| #include "base/bind.h" |
| #include "base/callback.h" |
| #include "base/memory/scoped_ptr.h" |
| #include "base/run_loop.h" |
| #include "base/test/histogram_tester.h" |
| #include "net/base/io_buffer.h" |
| #include "net/base/ip_endpoint.h" |
| #include "net/base/net_log_unittest.h" |
| #include "net/base/request_priority.h" |
| #include "net/base/test_data_directory.h" |
| #include "net/base/test_data_stream.h" |
| #include "net/socket/client_socket_pool_manager.h" |
| #include "net/socket/next_proto.h" |
| #include "net/socket/socket_test_util.h" |
| #include "net/spdy/spdy_http_utils.h" |
| #include "net/spdy/spdy_session_pool.h" |
| #include "net/spdy/spdy_session_test_util.h" |
| #include "net/spdy/spdy_stream.h" |
| #include "net/spdy/spdy_stream_test_util.h" |
| #include "net/spdy/spdy_test_util_common.h" |
| #include "net/spdy/spdy_test_utils.h" |
| #include "net/test/cert_test_util.h" |
| #include "testing/platform_test.h" |
| |
| namespace net { |
| |
| namespace { |
| |
| static const char kTestUrl[] = "http://www.example.org/"; |
| static const char kTestHost[] = "www.example.org"; |
| static const int kTestPort = 80; |
| |
| const char kBodyData[] = "Body data"; |
| const size_t kBodyDataSize = arraysize(kBodyData); |
| const base::StringPiece kBodyDataStringPiece(kBodyData, kBodyDataSize); |
| |
| static base::TimeDelta g_time_delta; |
| base::TimeTicks TheNearFuture() { |
| return base::TimeTicks::Now() + g_time_delta; |
| } |
| |
| } // namespace |
| |
| class SpdySessionTest : public PlatformTest, |
| public ::testing::WithParamInterface<NextProto> { |
| public: |
| // Functions used with RunResumeAfterUnstallTest(). |
| |
| void StallSessionOnly(SpdySession* session, SpdyStream* stream) { |
| StallSessionSend(session); |
| } |
| |
| void StallStreamOnly(SpdySession* session, SpdyStream* stream) { |
| StallStreamSend(stream); |
| } |
| |
| void StallSessionStream(SpdySession* session, SpdyStream* stream) { |
| StallSessionSend(session); |
| StallStreamSend(stream); |
| } |
| |
| void StallStreamSession(SpdySession* session, SpdyStream* stream) { |
| StallStreamSend(stream); |
| StallSessionSend(session); |
| } |
| |
| void UnstallSessionOnly(SpdySession* session, |
| SpdyStream* stream, |
| int32 delta_window_size) { |
| UnstallSessionSend(session, delta_window_size); |
| } |
| |
| void UnstallStreamOnly(SpdySession* session, |
| SpdyStream* stream, |
| int32 delta_window_size) { |
| UnstallStreamSend(stream, delta_window_size); |
| } |
| |
| void UnstallSessionStream(SpdySession* session, |
| SpdyStream* stream, |
| int32 delta_window_size) { |
| UnstallSessionSend(session, delta_window_size); |
| UnstallStreamSend(stream, delta_window_size); |
| } |
| |
| void UnstallStreamSession(SpdySession* session, |
| SpdyStream* stream, |
| int32 delta_window_size) { |
| UnstallStreamSend(stream, delta_window_size); |
| UnstallSessionSend(session, delta_window_size); |
| } |
| |
| protected: |
| SpdySessionTest() |
| : old_max_group_sockets_(ClientSocketPoolManager::max_sockets_per_group( |
| HttpNetworkSession::NORMAL_SOCKET_POOL)), |
| old_max_pool_sockets_(ClientSocketPoolManager::max_sockets_per_pool( |
| HttpNetworkSession::NORMAL_SOCKET_POOL)), |
| spdy_util_(GetParam()), |
| session_deps_(GetParam()), |
| spdy_session_pool_(NULL), |
| test_url_(kTestUrl), |
| test_host_port_pair_(kTestHost, kTestPort), |
| key_(test_host_port_pair_, ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED) { |
| } |
| |
| virtual ~SpdySessionTest() { |
| // Important to restore the per-pool limit first, since the pool limit must |
| // always be greater than group limit, and the tests reduce both limits. |
| ClientSocketPoolManager::set_max_sockets_per_pool( |
| HttpNetworkSession::NORMAL_SOCKET_POOL, old_max_pool_sockets_); |
| ClientSocketPoolManager::set_max_sockets_per_group( |
| HttpNetworkSession::NORMAL_SOCKET_POOL, old_max_group_sockets_); |
| } |
| |
| virtual void SetUp() override { |
| g_time_delta = base::TimeDelta(); |
| } |
| |
| void CreateDeterministicNetworkSession() { |
| http_session_ = |
| SpdySessionDependencies::SpdyCreateSessionDeterministic(&session_deps_); |
| spdy_session_pool_ = http_session_->spdy_session_pool(); |
| } |
| |
| void CreateNetworkSession() { |
| http_session_ = |
| SpdySessionDependencies::SpdyCreateSession(&session_deps_); |
| spdy_session_pool_ = http_session_->spdy_session_pool(); |
| } |
| |
| void StallSessionSend(SpdySession* session) { |
| // Reduce the send window size to 0 to stall. |
| while (session->session_send_window_size_ > 0) { |
| session->DecreaseSendWindowSize( |
| std::min(kMaxSpdyFrameChunkSize, session->session_send_window_size_)); |
| } |
| } |
| |
| void UnstallSessionSend(SpdySession* session, int32 delta_window_size) { |
| session->IncreaseSendWindowSize(delta_window_size); |
| } |
| |
| void StallStreamSend(SpdyStream* stream) { |
| // Reduce the send window size to 0 to stall. |
| while (stream->send_window_size() > 0) { |
| stream->DecreaseSendWindowSize( |
| std::min(kMaxSpdyFrameChunkSize, stream->send_window_size())); |
| } |
| } |
| |
| void UnstallStreamSend(SpdyStream* stream, int32 delta_window_size) { |
| stream->IncreaseSendWindowSize(delta_window_size); |
| } |
| |
| void RunResumeAfterUnstallTest( |
| const base::Callback<void(SpdySession*, SpdyStream*)>& stall_function, |
| const base::Callback<void(SpdySession*, SpdyStream*, int32)>& |
| unstall_function); |
| |
| // Original socket limits. Some tests set these. Safest to always restore |
| // them once each test has been run. |
| int old_max_group_sockets_; |
| int old_max_pool_sockets_; |
| |
| SpdyTestUtil spdy_util_; |
| SpdySessionDependencies session_deps_; |
| scoped_refptr<HttpNetworkSession> http_session_; |
| SpdySessionPool* spdy_session_pool_; |
| GURL test_url_; |
| HostPortPair test_host_port_pair_; |
| SpdySessionKey key_; |
| }; |
| |
| INSTANTIATE_TEST_CASE_P( |
| NextProto, |
| SpdySessionTest, |
| testing::Values(kProtoDeprecatedSPDY2, |
| kProtoSPDY3, kProtoSPDY31, kProtoSPDY4)); |
| |
| // Try to create a SPDY session that will fail during |
| // initialization. Nothing should blow up. |
| TEST_P(SpdySessionTest, InitialReadError) { |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = TryCreateFakeSpdySessionExpectingFailure( |
| spdy_session_pool_, key_, ERR_CONNECTION_CLOSED); |
| EXPECT_TRUE(session); |
| // Flush the read. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(session); |
| } |
| |
| namespace { |
| |
| // A helper class that vends a callback that, when fired, destroys a |
| // given SpdyStreamRequest. |
| class StreamRequestDestroyingCallback : public TestCompletionCallbackBase { |
| public: |
| StreamRequestDestroyingCallback() {} |
| |
| virtual ~StreamRequestDestroyingCallback() {} |
| |
| void SetRequestToDestroy(scoped_ptr<SpdyStreamRequest> request) { |
| request_ = request.Pass(); |
| } |
| |
| CompletionCallback MakeCallback() { |
| return base::Bind(&StreamRequestDestroyingCallback::OnComplete, |
| base::Unretained(this)); |
| } |
| |
| private: |
| void OnComplete(int result) { |
| request_.reset(); |
| SetResult(result); |
| } |
| |
| scoped_ptr<SpdyStreamRequest> request_; |
| }; |
| |
| } // namespace |
| |
| // Request kInitialMaxConcurrentStreams streams. Request two more |
| // streams, but have the callback for one destroy the second stream |
| // request. Close the session. Nothing should blow up. This is a |
| // regression test for http://crbug.com/250841 . |
| TEST_P(SpdySessionTest, PendingStreamCancellingAnother) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockRead reads[] = {MockRead(ASYNC, 0, 0), }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), NULL, 0); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Create the maximum number of concurrent streams. |
| for (size_t i = 0; i < kInitialMaxConcurrentStreams; ++i) { |
| base::WeakPtr<SpdyStream> spdy_stream = CreateStreamSynchronously( |
| SPDY_BIDIRECTIONAL_STREAM, session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream != NULL); |
| } |
| |
| SpdyStreamRequest request1; |
| scoped_ptr<SpdyStreamRequest> request2(new SpdyStreamRequest); |
| |
| StreamRequestDestroyingCallback callback1; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request1.StartRequest(SPDY_BIDIRECTIONAL_STREAM, |
| session, |
| test_url_, |
| MEDIUM, |
| BoundNetLog(), |
| callback1.MakeCallback())); |
| |
| // |callback2| is never called. |
| TestCompletionCallback callback2; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request2->StartRequest(SPDY_BIDIRECTIONAL_STREAM, |
| session, |
| test_url_, |
| MEDIUM, |
| BoundNetLog(), |
| callback2.callback())); |
| |
| callback1.SetRequestToDestroy(request2.Pass()); |
| |
| session->CloseSessionOnError(ERR_ABORTED, "Aborting session"); |
| |
| EXPECT_EQ(ERR_ABORTED, callback1.WaitForResult()); |
| } |
| |
| // A session receiving a GOAWAY frame with no active streams should close. |
| TEST_P(SpdySessionTest, GoAwayWithNoActiveStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway(1)); |
| MockRead reads[] = { |
| CreateMockRead(*goaway, 0), |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_EQ(spdy_util_.spdy_version(), session->GetProtocolVersion()); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Read and process the GOAWAY frame. |
| data.RunFor(1); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // A session receiving a GOAWAY frame immediately with no active |
| // streams should then close. |
| TEST_P(SpdySessionTest, GoAwayImmediatelyWithNoActiveStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway(1)); |
| MockRead reads[] = { |
| CreateMockRead(*goaway, 0, SYNCHRONOUS), |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| data.StopAfter(1); |
| |
| base::WeakPtr<SpdySession> session = |
| TryCreateInsecureSpdySessionExpectingFailure( |
| http_session_, key_, ERR_CONNECTION_CLOSED, BoundNetLog()); |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_FALSE(session); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| } |
| |
| // A session receiving a GOAWAY frame with active streams should close |
| // when the last active stream is closed. |
| TEST_P(SpdySessionTest, GoAwayWithActiveStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway(1)); |
| MockRead reads[] = { |
| CreateMockRead(*goaway, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 3, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| CreateMockWrite(*req2, 1), |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_EQ(spdy_util_.spdy_version(), session->GetProtocolVersion()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate2(spdy_stream2); |
| spdy_stream2->SetDelegate(&delegate2); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| scoped_ptr<SpdyHeaderBlock> headers2(new SpdyHeaderBlock(*headers)); |
| |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| spdy_stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream2->HasUrlFromHeaders()); |
| |
| data.RunFor(2); |
| |
| EXPECT_EQ(1u, spdy_stream1->stream_id()); |
| EXPECT_EQ(3u, spdy_stream2->stream_id()); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Read and process the GOAWAY frame. |
| data.RunFor(1); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| EXPECT_FALSE(session->IsStreamActive(3)); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| EXPECT_TRUE(session->IsStreamActive(1)); |
| |
| EXPECT_TRUE(session->IsGoingAway()); |
| |
| // Should close the session. |
| spdy_stream1->Close(); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Have a session receive two GOAWAY frames, with the last one causing |
| // the last active stream to be closed. The session should then be |
| // closed after the second GOAWAY frame. |
| TEST_P(SpdySessionTest, GoAwayTwice) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> goaway1(spdy_util_.ConstructSpdyGoAway(1)); |
| scoped_ptr<SpdyFrame> goaway2(spdy_util_.ConstructSpdyGoAway(0)); |
| MockRead reads[] = { |
| CreateMockRead(*goaway1, 2), |
| CreateMockRead(*goaway2, 3), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 3, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| CreateMockWrite(*req2, 1), |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_EQ(spdy_util_.spdy_version(), session->GetProtocolVersion()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate2(spdy_stream2); |
| spdy_stream2->SetDelegate(&delegate2); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| scoped_ptr<SpdyHeaderBlock> headers2(new SpdyHeaderBlock(*headers)); |
| |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| spdy_stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream2->HasUrlFromHeaders()); |
| |
| data.RunFor(2); |
| |
| EXPECT_EQ(1u, spdy_stream1->stream_id()); |
| EXPECT_EQ(3u, spdy_stream2->stream_id()); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Read and process the first GOAWAY frame. |
| data.RunFor(1); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| EXPECT_FALSE(session->IsStreamActive(3)); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| EXPECT_TRUE(session->IsStreamActive(1)); |
| EXPECT_TRUE(session->IsGoingAway()); |
| |
| // Read and process the second GOAWAY frame, which should close the |
| // session. |
| data.RunFor(1); |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Have a session with active streams receive a GOAWAY frame and then |
| // close it. It should handle the close properly (i.e., not try to |
| // make itself unavailable in its pool twice). |
| TEST_P(SpdySessionTest, GoAwayWithActiveStreamsThenClose) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway(1)); |
| MockRead reads[] = { |
| CreateMockRead(*goaway, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 3, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| CreateMockWrite(*req2, 1), |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_EQ(spdy_util_.spdy_version(), session->GetProtocolVersion()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate2(spdy_stream2); |
| spdy_stream2->SetDelegate(&delegate2); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| scoped_ptr<SpdyHeaderBlock> headers2(new SpdyHeaderBlock(*headers)); |
| |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| spdy_stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream2->HasUrlFromHeaders()); |
| |
| data.RunFor(2); |
| |
| EXPECT_EQ(1u, spdy_stream1->stream_id()); |
| EXPECT_EQ(3u, spdy_stream2->stream_id()); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Read and process the GOAWAY frame. |
| data.RunFor(1); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| EXPECT_FALSE(session->IsStreamActive(3)); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| EXPECT_TRUE(session->IsStreamActive(1)); |
| EXPECT_TRUE(session->IsGoingAway()); |
| |
| session->CloseSessionOnError(ERR_ABORTED, "Aborting session"); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Process a joint read buffer which causes the session to begin draining, and |
| // then processes a GOAWAY. The session should gracefully drain. Regression test |
| // for crbug.com/379469 |
| TEST_P(SpdySessionTest, GoAwayWhileDraining) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway(1)); |
| scoped_ptr<SpdyFrame> body(spdy_util_.ConstructSpdyBodyFrame(1, true)); |
| size_t joint_size = goaway->size() * 2 + body->size(); |
| |
| // Compose interleaved |goaway| and |body| frames into a single read. |
| scoped_ptr<char[]> buffer(new char[joint_size]); |
| { |
| size_t out = 0; |
| memcpy(&buffer[out], goaway->data(), goaway->size()); |
| out += goaway->size(); |
| memcpy(&buffer[out], body->data(), body->size()); |
| out += body->size(); |
| memcpy(&buffer[out], goaway->data(), goaway->size()); |
| out += goaway->size(); |
| ASSERT_EQ(out, joint_size); |
| } |
| SpdyFrame joint_frames(buffer.get(), joint_size, false); |
| |
| MockRead reads[] = { |
| CreateMockRead(*resp, 1), CreateMockRead(joint_frames, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate(spdy_stream); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream->HasUrlFromHeaders()); |
| |
| data.RunFor(3); |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| // Stream and session closed gracefully. |
| EXPECT_TRUE(delegate.StreamIsClosed()); |
| EXPECT_EQ(OK, delegate.WaitForClose()); |
| EXPECT_EQ(kUploadData, delegate.TakeReceivedData()); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Try to create a stream after receiving a GOAWAY frame. It should |
| // fail. |
| TEST_P(SpdySessionTest, CreateStreamAfterGoAway) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway(1)); |
| MockRead reads[] = { |
| CreateMockRead(*goaway, 1), |
| MockRead(ASYNC, 0, 2) // EOF |
| }; |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_EQ(spdy_util_.spdy_version(), session->GetProtocolVersion()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate(spdy_stream); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream->HasUrlFromHeaders()); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(1u, spdy_stream->stream_id()); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Read and process the GOAWAY frame. |
| data.RunFor(1); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| EXPECT_TRUE(session->IsStreamActive(1)); |
| |
| SpdyStreamRequest stream_request; |
| int rv = stream_request.StartRequest( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, MEDIUM, BoundNetLog(), |
| CompletionCallback()); |
| EXPECT_EQ(ERR_FAILED, rv); |
| |
| // Read and process EOF. |
| data.RunFor(1); |
| |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Receiving a SYN_STREAM frame after a GOAWAY frame should result in |
| // the stream being refused. |
| TEST_P(SpdySessionTest, SynStreamAfterGoAway) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway(1)); |
| scoped_ptr<SpdyFrame> |
| push(spdy_util_.ConstructSpdyPush(NULL, 0, 2, 1, kDefaultURL)); |
| MockRead reads[] = { |
| CreateMockRead(*goaway, 1), |
| CreateMockRead(*push, 2), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> rst( |
| spdy_util_.ConstructSpdyRstStream(2, RST_STREAM_REFUSED_STREAM)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| CreateMockWrite(*rst, 3) |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_EQ(spdy_util_.spdy_version(), session->GetProtocolVersion()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate(spdy_stream); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream->HasUrlFromHeaders()); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(1u, spdy_stream->stream_id()); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Read and process the GOAWAY frame. |
| data.RunFor(1); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| EXPECT_TRUE(session->IsStreamActive(1)); |
| |
| // Read and process the SYN_STREAM frame, the subsequent RST_STREAM, |
| // and EOF. |
| data.RunFor(3); |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // A session observing a network change with active streams should close |
| // when the last active stream is closed. |
| TEST_P(SpdySessionTest, NetworkChangeWithActiveStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 1) // EOF |
| }; |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_EQ(spdy_util_.spdy_version(), session->GetProtocolVersion()); |
| |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, session, |
| GURL(kDefaultURL), MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate(spdy_stream); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(kDefaultURL)); |
| |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream->HasUrlFromHeaders()); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(1u, spdy_stream->stream_id()); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| spdy_session_pool_->OnIPAddressChanged(); |
| |
| // The SpdySessionPool behavior differs based on how the OSs reacts to |
| // network changes; see comment in SpdySessionPool::OnIPAddressChanged(). |
| #if defined(OS_ANDROID) || defined(OS_WIN) || defined(OS_IOS) |
| // For OSs where the TCP connections will close upon relevant network |
| // changes, SpdySessionPool doesn't need to force them to close, so in these |
| // cases verify the session has become unavailable but remains open and the |
| // pre-existing stream is still active. |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| EXPECT_TRUE(session->IsGoingAway()); |
| |
| EXPECT_TRUE(session->IsStreamActive(1)); |
| |
| // Should close the session. |
| spdy_stream->Close(); |
| #endif |
| EXPECT_EQ(NULL, spdy_stream.get()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| TEST_P(SpdySessionTest, ClientPing) { |
| session_deps_.enable_ping = true; |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> read_ping(spdy_util_.ConstructSpdyPing(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(*read_ping, 1), |
| MockRead(ASYNC, 0, 0, 2) // EOF |
| }; |
| scoped_ptr<SpdyFrame> write_ping(spdy_util_.ConstructSpdyPing(1, false)); |
| MockWrite writes[] = { |
| CreateMockWrite(*write_ping, 0), |
| }; |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| test::StreamDelegateSendImmediate delegate(spdy_stream1, NULL); |
| spdy_stream1->SetDelegate(&delegate); |
| |
| base::TimeTicks before_ping_time = base::TimeTicks::Now(); |
| |
| session->set_connection_at_risk_of_loss_time( |
| base::TimeDelta::FromSeconds(-1)); |
| session->set_hung_interval(base::TimeDelta::FromMilliseconds(50)); |
| |
| session->SendPrefacePingIfNoneInFlight(); |
| |
| data.RunFor(2); |
| |
| session->CheckPingStatus(before_ping_time); |
| |
| EXPECT_EQ(0, session->pings_in_flight()); |
| EXPECT_GE(session->next_ping_id(), 1U); |
| EXPECT_FALSE(session->check_ping_status_pending()); |
| EXPECT_GE(session->last_activity_time(), before_ping_time); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, delegate.WaitForClose()); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| TEST_P(SpdySessionTest, ServerPing) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> read_ping(spdy_util_.ConstructSpdyPing(2, false)); |
| MockRead reads[] = { |
| CreateMockRead(*read_ping), |
| MockRead(SYNCHRONOUS, 0, 0) // EOF |
| }; |
| scoped_ptr<SpdyFrame> write_ping(spdy_util_.ConstructSpdyPing(2, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*write_ping), |
| }; |
| StaticSocketDataProvider data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| test::StreamDelegateSendImmediate delegate(spdy_stream1, NULL); |
| spdy_stream1->SetDelegate(&delegate); |
| |
| // Flush the read completion task. |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| EXPECT_TRUE(session == NULL); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| } |
| |
| // Cause a ping to be sent out while producing a write. The write loop |
| // should handle this properly, i.e. another DoWriteLoop task should |
| // not be posted. This is a regression test for |
| // http://crbug.com/261043 . |
| TEST_P(SpdySessionTest, PingAndWriteLoop) { |
| session_deps_.enable_ping = true; |
| session_deps_.time_func = TheNearFuture; |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> write_ping(spdy_util_.ConstructSpdyPing(1, false)); |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| CreateMockWrite(*write_ping, 1), |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 2) // EOF |
| }; |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate(spdy_stream); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| |
| // Shift time so that a ping will be sent out. |
| g_time_delta = base::TimeDelta::FromSeconds(11); |
| |
| data.RunFor(2); |
| |
| session->CloseSessionOnError(ERR_ABORTED, "Aborting"); |
| } |
| |
| TEST_P(SpdySessionTest, StreamIdSpaceExhausted) { |
| const SpdyStreamId kLastStreamId = 0x7fffffff; |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| // Test setup: |stream_hi_water_mark_| and |max_concurrent_streams_| are |
| // fixed to allow for two stream ID assignments, and three concurrent |
| // streams. Four streams are started, and two are activated. Verify the |
| // session goes away, and that the created (but not activated) and |
| // stalled streams are aborted. Also verify the activated streams complete, |
| // at which point the session closes. |
| |
| scoped_ptr<SpdyFrame> req1(spdy_util_.ConstructSpdyGet( |
| NULL, 0, false, kLastStreamId - 2, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, kLastStreamId, MEDIUM, true)); |
| |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), CreateMockWrite(*req2, 1), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp1( |
| spdy_util_.ConstructSpdyGetSynReply(NULL, 0, kLastStreamId - 2)); |
| scoped_ptr<SpdyFrame> resp2( |
| spdy_util_.ConstructSpdyGetSynReply(NULL, 0, kLastStreamId)); |
| |
| scoped_ptr<SpdyFrame> body1( |
| spdy_util_.ConstructSpdyBodyFrame(kLastStreamId - 2, true)); |
| scoped_ptr<SpdyFrame> body2( |
| spdy_util_.ConstructSpdyBodyFrame(kLastStreamId, true)); |
| |
| MockRead reads[] = { |
| CreateMockRead(*resp1, 2), CreateMockRead(*resp2, 3), |
| CreateMockRead(*body1, 4), CreateMockRead(*body2, 5), |
| MockRead(ASYNC, 0, 6) // EOF |
| }; |
| |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Fix stream_hi_water_mark_ to allow for two stream activations. |
| session->stream_hi_water_mark_ = kLastStreamId - 2; |
| // Fix max_concurrent_streams to allow for three stream creations. |
| session->max_concurrent_streams_ = 3; |
| |
| // Create three streams synchronously, and begin a fourth (which is stalled). |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> stream1 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate1(stream1); |
| stream1->SetDelegate(&delegate1); |
| |
| base::WeakPtr<SpdyStream> stream2 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate2(stream2); |
| stream2->SetDelegate(&delegate2); |
| |
| base::WeakPtr<SpdyStream> stream3 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate3(stream3); |
| stream3->SetDelegate(&delegate3); |
| |
| SpdyStreamRequest request4; |
| TestCompletionCallback callback4; |
| EXPECT_EQ(ERR_IO_PENDING, |
| request4.StartRequest(SPDY_REQUEST_RESPONSE_STREAM, |
| session, |
| url, |
| MEDIUM, |
| BoundNetLog(), |
| callback4.callback())); |
| |
| // Streams 1-3 were created. 4th is stalled. No streams are active yet. |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(3u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->pending_create_stream_queue_size(MEDIUM)); |
| |
| // Activate stream 1. One ID remains available. |
| stream1->SendRequestHeaders( |
| scoped_ptr<SpdyHeaderBlock>( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())), |
| NO_MORE_DATA_TO_SEND); |
| data.RunFor(1); |
| |
| EXPECT_EQ(kLastStreamId - 2u, stream1->stream_id()); |
| EXPECT_EQ(1u, session->num_active_streams()); |
| EXPECT_EQ(2u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->pending_create_stream_queue_size(MEDIUM)); |
| |
| // Activate stream 2. ID space is exhausted. |
| stream2->SendRequestHeaders( |
| scoped_ptr<SpdyHeaderBlock>( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())), |
| NO_MORE_DATA_TO_SEND); |
| data.RunFor(1); |
| |
| // Active streams remain active. |
| EXPECT_EQ(kLastStreamId, stream2->stream_id()); |
| EXPECT_EQ(2u, session->num_active_streams()); |
| |
| // Session is going away. Created and stalled streams were aborted. |
| EXPECT_EQ(SpdySession::STATE_GOING_AWAY, session->availability_state_); |
| EXPECT_EQ(ERR_ABORTED, delegate3.WaitForClose()); |
| EXPECT_EQ(ERR_ABORTED, callback4.WaitForResult()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(MEDIUM)); |
| |
| // Read responses on remaining active streams. |
| data.RunFor(4); |
| EXPECT_EQ(OK, delegate1.WaitForClose()); |
| EXPECT_EQ(kUploadData, delegate1.TakeReceivedData()); |
| EXPECT_EQ(OK, delegate2.WaitForClose()); |
| EXPECT_EQ(kUploadData, delegate2.TakeReceivedData()); |
| |
| // Session was destroyed. |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_FALSE(session.get()); |
| } |
| |
| // Verifies that an unstalled pending stream creation racing with a new stream |
| // creation doesn't violate the maximum stream concurrency. Regression test for |
| // crbug.com/373858. |
| TEST_P(SpdySessionTest, UnstallRacesWithStreamCreation) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Fix max_concurrent_streams to allow for one open stream. |
| session->max_concurrent_streams_ = 1; |
| |
| // Create two streams: one synchronously, and one which stalls. |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> stream1 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, MEDIUM, BoundNetLog()); |
| |
| SpdyStreamRequest request2; |
| TestCompletionCallback callback2; |
| EXPECT_EQ(ERR_IO_PENDING, |
| request2.StartRequest(SPDY_REQUEST_RESPONSE_STREAM, |
| session, |
| url, |
| MEDIUM, |
| BoundNetLog(), |
| callback2.callback())); |
| |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->pending_create_stream_queue_size(MEDIUM)); |
| |
| // Cancel the first stream. A callback to unstall the second stream was |
| // posted. Don't run it yet. |
| stream1->Cancel(); |
| |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(MEDIUM)); |
| |
| // Create a third stream prior to the second stream's callback. |
| base::WeakPtr<SpdyStream> stream3 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, MEDIUM, BoundNetLog()); |
| |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(MEDIUM)); |
| |
| // NOW run the message loop. The unstalled stream will re-stall itself. |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->pending_create_stream_queue_size(MEDIUM)); |
| |
| // Cancel the third stream and run the message loop. Verify that the second |
| // stream creation now completes. |
| stream3->Cancel(); |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(MEDIUM)); |
| EXPECT_EQ(OK, callback2.WaitForResult()); |
| } |
| |
| TEST_P(SpdySessionTest, DeleteExpiredPushStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.time_func = TheNearFuture; |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> rst( |
| spdy_util_.ConstructSpdyRstStream(2, RST_STREAM_REFUSED_STREAM)); |
| |
| scoped_ptr<SpdyFrame> push_a(spdy_util_.ConstructSpdyPush( |
| NULL, 0, 2, 1, "http://www.google.com/a.dat")); |
| scoped_ptr<SpdyFrame> push_a_body( |
| spdy_util_.ConstructSpdyBodyFrame(2, false)); |
| scoped_ptr<SpdyFrame> push_b(spdy_util_.ConstructSpdyPush( |
| NULL, 0, 4, 1, "http://www.google.com/b.dat")); |
| MockWrite writes[] = {CreateMockWrite(*req, 0), CreateMockWrite(*rst, 4)}; |
| MockRead reads[] = { |
| CreateMockRead(*push_a, 1), CreateMockRead(*push_a_body, 2), |
| CreateMockRead(*push_b, 3), MockRead(ASYNC, 0, 5), // EOF |
| }; |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Process the principal request, and the first push stream request & body. |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate(spdy_stream); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| |
| data.RunFor(3); |
| |
| // Verify that there is one unclaimed push stream. |
| EXPECT_EQ(1u, session->num_unclaimed_pushed_streams()); |
| SpdySession::PushedStreamMap::iterator iter = |
| session->unclaimed_pushed_streams_.find( |
| GURL("http://www.google.com/a.dat")); |
| EXPECT_TRUE(session->unclaimed_pushed_streams_.end() != iter); |
| |
| if (session->flow_control_state_ == |
| SpdySession::FLOW_CONTROL_STREAM_AND_SESSION) { |
| // Unclaimed push body consumed bytes from the session window. |
| EXPECT_EQ(kSpdySessionInitialWindowSize - kUploadDataSize, |
| session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| } |
| |
| // Shift time to expire the push stream. Read the second SYN_STREAM, |
| // and verify a RST_STREAM was written. |
| g_time_delta = base::TimeDelta::FromSeconds(301); |
| data.RunFor(2); |
| |
| // Verify that the second pushed stream evicted the first pushed stream. |
| EXPECT_EQ(1u, session->num_unclaimed_pushed_streams()); |
| iter = session->unclaimed_pushed_streams_.find( |
| GURL("http://www.google.com/b.dat")); |
| EXPECT_TRUE(session->unclaimed_pushed_streams_.end() != iter); |
| |
| if (session->flow_control_state_ == |
| SpdySession::FLOW_CONTROL_STREAM_AND_SESSION) { |
| // Verify that the session window reclaimed the evicted stream body. |
| EXPECT_EQ(kSpdySessionInitialWindowSize, |
| session->session_recv_window_size_); |
| EXPECT_EQ(kUploadDataSize, session->session_unacked_recv_window_bytes_); |
| } |
| |
| // Read and process EOF. |
| data.RunFor(1); |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| TEST_P(SpdySessionTest, FailedPing) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| scoped_ptr<SpdyFrame> write_ping(spdy_util_.ConstructSpdyPing(1, false)); |
| scoped_ptr<SpdyFrame> goaway( |
| spdy_util_.ConstructSpdyGoAway(0, GOAWAY_PROTOCOL_ERROR, "Failed ping.")); |
| MockWrite writes[] = {CreateMockWrite(*write_ping), CreateMockWrite(*goaway)}; |
| StaticSocketDataProvider data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| test::StreamDelegateSendImmediate delegate(spdy_stream1, NULL); |
| spdy_stream1->SetDelegate(&delegate); |
| |
| session->set_connection_at_risk_of_loss_time(base::TimeDelta::FromSeconds(0)); |
| session->set_hung_interval(base::TimeDelta::FromSeconds(0)); |
| |
| // Send a PING frame. |
| session->WritePingFrame(1, false); |
| EXPECT_LT(0, session->pings_in_flight()); |
| EXPECT_GE(session->next_ping_id(), 1U); |
| EXPECT_TRUE(session->check_ping_status_pending()); |
| |
| // Assert session is not closed. |
| EXPECT_TRUE(session->IsAvailable()); |
| EXPECT_LT(0u, session->num_active_streams() + session->num_created_streams()); |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // We set last time we have received any data in 1 sec less than now. |
| // CheckPingStatus will trigger timeout because hung interval is zero. |
| base::TimeTicks now = base::TimeTicks::Now(); |
| session->last_activity_time_ = now - base::TimeDelta::FromSeconds(1); |
| session->CheckPingStatus(now); |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| EXPECT_TRUE(session == NULL); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| } |
| |
| // Request kInitialMaxConcurrentStreams + 1 streams. Receive a |
| // settings frame increasing the max concurrent streams by 1. Make |
| // sure nothing blows up. This is a regression test for |
| // http://crbug.com/57331 . |
| TEST_P(SpdySessionTest, OnSettings) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| const SpdySettingsIds kSpdySettingsIds = SETTINGS_MAX_CONCURRENT_STREAMS; |
| |
| SettingsMap new_settings; |
| const uint32 max_concurrent_streams = kInitialMaxConcurrentStreams + 1; |
| new_settings[kSpdySettingsIds] = |
| SettingsFlagsAndValue(SETTINGS_FLAG_NONE, max_concurrent_streams); |
| scoped_ptr<SpdyFrame> settings_frame( |
| spdy_util_.ConstructSpdySettings(new_settings)); |
| MockRead reads[] = { |
| CreateMockRead(*settings_frame, 0), |
| MockRead(ASYNC, 0, 1), |
| }; |
| |
| scoped_ptr<SpdyFrame> settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| MockWrite writes[] = { |
| CreateMockWrite(*settings_ack, 2), |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Create the maximum number of concurrent streams. |
| for (size_t i = 0; i < kInitialMaxConcurrentStreams; ++i) { |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream != NULL); |
| } |
| |
| StreamReleaserCallback stream_releaser; |
| SpdyStreamRequest request; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request.StartRequest( |
| SPDY_BIDIRECTIONAL_STREAM, session, test_url_, MEDIUM, |
| BoundNetLog(), |
| stream_releaser.MakeCallback(&request))); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(OK, stream_releaser.WaitForResult()); |
| |
| data.RunFor(1); |
| if (spdy_util_.spdy_version() >= SPDY4) { |
| // Allow the SETTINGS+ACK to write, so the session finishes draining. |
| data.RunFor(1); |
| } |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Start with a persisted value for max concurrent streams. Receive a |
| // settings frame increasing the max concurrent streams by 1 and which |
| // also clears the persisted data. Verify that persisted data is |
| // correct. |
| TEST_P(SpdySessionTest, ClearSettings) { |
| if (spdy_util_.spdy_version() >= SPDY4) { |
| // SPDY4 doesn't include settings persistence, or a CLEAR_SETTINGS flag. |
| // Flag 0x1, CLEAR_SETTINGS in SPDY3, is instead settings ACK in SPDY4. |
| return; |
| } |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| SettingsMap new_settings; |
| const uint32 max_concurrent_streams = kInitialMaxConcurrentStreams + 1; |
| new_settings[SETTINGS_MAX_CONCURRENT_STREAMS] = |
| SettingsFlagsAndValue(SETTINGS_FLAG_NONE, max_concurrent_streams); |
| scoped_ptr<SpdyFrame> settings_frame( |
| spdy_util_.ConstructSpdySettings(new_settings)); |
| uint8 flags = SETTINGS_FLAG_CLEAR_PREVIOUSLY_PERSISTED_SETTINGS; |
| test::SetFrameFlags(settings_frame.get(), flags, spdy_util_.spdy_version()); |
| MockRead reads[] = { |
| CreateMockRead(*settings_frame, 0), |
| MockRead(ASYNC, 0, 1), |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), NULL, 0); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| // Initialize the SpdySetting with the default. |
| spdy_session_pool_->http_server_properties()->SetSpdySetting( |
| test_host_port_pair_, |
| SETTINGS_MAX_CONCURRENT_STREAMS, |
| SETTINGS_FLAG_PLEASE_PERSIST, |
| kInitialMaxConcurrentStreams); |
| |
| EXPECT_FALSE( |
| spdy_session_pool_->http_server_properties()->GetSpdySettings( |
| test_host_port_pair_).empty()); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Create the maximum number of concurrent streams. |
| for (size_t i = 0; i < kInitialMaxConcurrentStreams; ++i) { |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream != NULL); |
| } |
| |
| StreamReleaserCallback stream_releaser; |
| |
| SpdyStreamRequest request; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request.StartRequest( |
| SPDY_BIDIRECTIONAL_STREAM, session, test_url_, MEDIUM, |
| BoundNetLog(), |
| stream_releaser.MakeCallback(&request))); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(OK, stream_releaser.WaitForResult()); |
| |
| // Make sure that persisted data is cleared. |
| EXPECT_TRUE( |
| spdy_session_pool_->http_server_properties()->GetSpdySettings( |
| test_host_port_pair_).empty()); |
| |
| // Make sure session's max_concurrent_streams is correct. |
| EXPECT_EQ(kInitialMaxConcurrentStreams + 1, |
| session->max_concurrent_streams()); |
| |
| data.RunFor(1); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Start with max concurrent streams set to 1. Request two streams. |
| // When the first completes, have the callback close its stream, which |
| // should trigger the second stream creation. Then cancel that one |
| // immediately. Don't crash. This is a regression test for |
| // http://crbug.com/63532 . |
| TEST_P(SpdySessionTest, CancelPendingCreateStream) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| // Initialize the SpdySetting with 1 max concurrent streams. |
| spdy_session_pool_->http_server_properties()->SetSpdySetting( |
| test_host_port_pair_, |
| SETTINGS_MAX_CONCURRENT_STREAMS, |
| SETTINGS_FLAG_PLEASE_PERSIST, |
| 1); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Leave room for only one more stream to be created. |
| for (size_t i = 0; i < kInitialMaxConcurrentStreams - 1; ++i) { |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream != NULL); |
| } |
| |
| // Create 2 more streams. First will succeed. Second will be pending. |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| |
| // Use scoped_ptr to let us invalidate the memory when we want to, to trigger |
| // a valgrind error if the callback is invoked when it's not supposed to be. |
| scoped_ptr<TestCompletionCallback> callback(new TestCompletionCallback); |
| |
| SpdyStreamRequest request; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request.StartRequest( |
| SPDY_BIDIRECTIONAL_STREAM, session, test_url_, MEDIUM, |
| BoundNetLog(), |
| callback->callback())); |
| |
| // Release the first one, this will allow the second to be created. |
| spdy_stream1->Cancel(); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| request.CancelRequest(); |
| callback.reset(); |
| |
| // Should not crash when running the pending callback. |
| base::MessageLoop::current()->RunUntilIdle(); |
| } |
| |
| TEST_P(SpdySessionTest, SendInitialDataOnNewSession) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| |
| SettingsMap settings; |
| const SpdySettingsIds kSpdySettingsIds1 = SETTINGS_MAX_CONCURRENT_STREAMS; |
| const SpdySettingsIds kSpdySettingsIds2 = SETTINGS_INITIAL_WINDOW_SIZE; |
| const uint32 kInitialRecvWindowSize = 10 * 1024 * 1024; |
| settings[kSpdySettingsIds1] = |
| SettingsFlagsAndValue(SETTINGS_FLAG_NONE, kMaxConcurrentPushedStreams); |
| if (spdy_util_.spdy_version() >= SPDY3) { |
| settings[kSpdySettingsIds2] = |
| SettingsFlagsAndValue(SETTINGS_FLAG_NONE, kInitialRecvWindowSize); |
| } |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> settings_frame( |
| spdy_util_.ConstructSpdySettings(settings)); |
| scoped_ptr<SpdyFrame> initial_window_update( |
| spdy_util_.ConstructSpdyWindowUpdate( |
| kSessionFlowControlStreamId, |
| kDefaultInitialRecvWindowSize - kSpdySessionInitialWindowSize)); |
| std::vector<MockWrite> writes; |
| if (GetParam() == kProtoSPDY4) { |
| writes.push_back( |
| MockWrite(ASYNC, |
| kHttp2ConnectionHeaderPrefix, |
| kHttp2ConnectionHeaderPrefixSize)); |
| } |
| writes.push_back(CreateMockWrite(*settings_frame)); |
| if (GetParam() >= kProtoSPDY31) { |
| writes.push_back(CreateMockWrite(*initial_window_update)); |
| }; |
| |
| SettingsMap server_settings; |
| const uint32 initial_max_concurrent_streams = 1; |
| server_settings[SETTINGS_MAX_CONCURRENT_STREAMS] = |
| SettingsFlagsAndValue(SETTINGS_FLAG_PERSISTED, |
| initial_max_concurrent_streams); |
| scoped_ptr<SpdyFrame> server_settings_frame( |
| spdy_util_.ConstructSpdySettings(server_settings)); |
| if (GetParam() <= kProtoSPDY31) { |
| writes.push_back(CreateMockWrite(*server_settings_frame)); |
| } |
| |
| session_deps_.stream_initial_recv_window_size = kInitialRecvWindowSize; |
| |
| StaticSocketDataProvider data(reads, arraysize(reads), |
| vector_as_array(&writes), writes.size()); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| spdy_session_pool_->http_server_properties()->SetSpdySetting( |
| test_host_port_pair_, |
| SETTINGS_MAX_CONCURRENT_STREAMS, |
| SETTINGS_FLAG_PLEASE_PERSIST, |
| initial_max_concurrent_streams); |
| |
| SpdySessionPoolPeer pool_peer(spdy_session_pool_); |
| pool_peer.SetEnableSendingInitialData(true); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(data.at_write_eof()); |
| } |
| |
| TEST_P(SpdySessionTest, ClearSettingsStorageOnIPAddressChanged) { |
| CreateNetworkSession(); |
| |
| base::WeakPtr<HttpServerProperties> test_http_server_properties = |
| spdy_session_pool_->http_server_properties(); |
| SettingsFlagsAndValue flags_and_value1(SETTINGS_FLAG_PLEASE_PERSIST, 2); |
| test_http_server_properties->SetSpdySetting( |
| test_host_port_pair_, |
| SETTINGS_MAX_CONCURRENT_STREAMS, |
| SETTINGS_FLAG_PLEASE_PERSIST, |
| 2); |
| EXPECT_NE(0u, test_http_server_properties->GetSpdySettings( |
| test_host_port_pair_).size()); |
| spdy_session_pool_->OnIPAddressChanged(); |
| EXPECT_EQ(0u, test_http_server_properties->GetSpdySettings( |
| test_host_port_pair_).size()); |
| } |
| |
| TEST_P(SpdySessionTest, Initialize) { |
| CapturingBoundNetLog log; |
| session_deps_.net_log = log.bound().net_log(); |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 0) // EOF |
| }; |
| |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, log.bound()); |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Flush the read completion task. |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| net::CapturingNetLog::CapturedEntryList entries; |
| log.GetEntries(&entries); |
| EXPECT_LT(0u, entries.size()); |
| |
| // Check that we logged TYPE_SPDY_SESSION_INITIALIZED correctly. |
| int pos = net::ExpectLogContainsSomewhere( |
| entries, 0, |
| net::NetLog::TYPE_SPDY_SESSION_INITIALIZED, |
| net::NetLog::PHASE_NONE); |
| EXPECT_LT(0, pos); |
| |
| CapturingNetLog::CapturedEntry entry = entries[pos]; |
| NetLog::Source socket_source; |
| EXPECT_TRUE(NetLog::Source::FromEventParameters(entry.params.get(), |
| &socket_source)); |
| EXPECT_TRUE(socket_source.IsValid()); |
| EXPECT_NE(log.bound().source().id, socket_source.id); |
| } |
| |
| TEST_P(SpdySessionTest, NetLogOnSessionGoaway) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway()); |
| MockRead reads[] = { |
| CreateMockRead(*goaway), |
| MockRead(SYNCHRONOUS, 0, 0) // EOF |
| }; |
| |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| CapturingBoundNetLog log; |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, log.bound()); |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Flush the read completion task. |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| EXPECT_TRUE(session == NULL); |
| |
| // Check that the NetLog was filled reasonably. |
| net::CapturingNetLog::CapturedEntryList entries; |
| log.GetEntries(&entries); |
| EXPECT_LT(0u, entries.size()); |
| |
| // Check that we logged SPDY_SESSION_CLOSE correctly. |
| int pos = net::ExpectLogContainsSomewhere( |
| entries, 0, |
| net::NetLog::TYPE_SPDY_SESSION_CLOSE, |
| net::NetLog::PHASE_NONE); |
| |
| if (pos < static_cast<int>(entries.size())) { |
| CapturingNetLog::CapturedEntry entry = entries[pos]; |
| int error_code = 0; |
| ASSERT_TRUE(entry.GetNetErrorCode(&error_code)); |
| EXPECT_EQ(OK, error_code); |
| } else { |
| ADD_FAILURE(); |
| } |
| } |
| |
| TEST_P(SpdySessionTest, NetLogOnSessionEOF) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, 0, 0) // EOF |
| }; |
| |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| CapturingBoundNetLog log; |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, log.bound()); |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Flush the read completion task. |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| EXPECT_TRUE(session == NULL); |
| |
| // Check that the NetLog was filled reasonably. |
| net::CapturingNetLog::CapturedEntryList entries; |
| log.GetEntries(&entries); |
| EXPECT_LT(0u, entries.size()); |
| |
| // Check that we logged SPDY_SESSION_CLOSE correctly. |
| int pos = |
| net::ExpectLogContainsSomewhere(entries, |
| 0, |
| net::NetLog::TYPE_SPDY_SESSION_CLOSE, |
| net::NetLog::PHASE_NONE); |
| |
| if (pos < static_cast<int>(entries.size())) { |
| CapturingNetLog::CapturedEntry entry = entries[pos]; |
| int error_code = 0; |
| ASSERT_TRUE(entry.GetNetErrorCode(&error_code)); |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, error_code); |
| } else { |
| ADD_FAILURE(); |
| } |
| } |
| |
| TEST_P(SpdySessionTest, SynCompressionHistograms) { |
| session_deps_.enable_compression = true; |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, true, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| }; |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 1) // EOF |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate(spdy_stream); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream->HasUrlFromHeaders()); |
| |
| // Write request headers & capture resulting histogram update. |
| base::HistogramTester histogram_tester; |
| |
| data.RunFor(1); |
| // Regression test of compression performance under the request fixture. |
| switch (spdy_util_.spdy_version()) { |
| case SPDY2: |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdySynStreamCompressionPercentage", 0, 1); |
| break; |
| case SPDY3: |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdySynStreamCompressionPercentage", 30, 1); |
| break; |
| case SPDY4: |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdySynStreamCompressionPercentage", 82, 1); |
| break; |
| case SPDY5: |
| histogram_tester.ExpectBucketCount( |
| "Net.SpdySynStreamCompressionPercentage", 82, 1); |
| break; |
| default: |
| NOTREACHED(); |
| } |
| |
| // Read and process EOF. |
| data.RunFor(1); |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Queue up a low-priority SYN_STREAM followed by a high-priority |
| // one. The high priority one should still send first and receive |
| // first. |
| TEST_P(SpdySessionTest, OutOfOrderSynStreams) { |
| // Construct the request. |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> req_highest( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, HIGHEST, true)); |
| scoped_ptr<SpdyFrame> req_lowest( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 3, LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req_highest, 0), |
| CreateMockWrite(*req_lowest, 1), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp_highest( |
| spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> body_highest( |
| spdy_util_.ConstructSpdyBodyFrame(1, true)); |
| scoped_ptr<SpdyFrame> resp_lowest( |
| spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 3)); |
| scoped_ptr<SpdyFrame> body_lowest( |
| spdy_util_.ConstructSpdyBodyFrame(3, true)); |
| MockRead reads[] = { |
| CreateMockRead(*resp_highest, 2), |
| CreateMockRead(*body_highest, 3), |
| CreateMockRead(*resp_lowest, 4), |
| CreateMockRead(*body_lowest, 5), |
| MockRead(ASYNC, 0, 6) // EOF |
| }; |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kDefaultURL); |
| |
| base::WeakPtr<SpdyStream> spdy_stream_lowest = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream_lowest); |
| EXPECT_EQ(0u, spdy_stream_lowest->stream_id()); |
| test::StreamDelegateDoNothing delegate_lowest(spdy_stream_lowest); |
| spdy_stream_lowest->SetDelegate(&delegate_lowest); |
| |
| base::WeakPtr<SpdyStream> spdy_stream_highest = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, HIGHEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream_highest); |
| EXPECT_EQ(0u, spdy_stream_highest->stream_id()); |
| test::StreamDelegateDoNothing delegate_highest(spdy_stream_highest); |
| spdy_stream_highest->SetDelegate(&delegate_highest); |
| |
| // Queue the lower priority one first. |
| |
| scoped_ptr<SpdyHeaderBlock> headers_lowest( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream_lowest->SendRequestHeaders( |
| headers_lowest.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream_lowest->HasUrlFromHeaders()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers_highest( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream_highest->SendRequestHeaders( |
| headers_highest.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream_highest->HasUrlFromHeaders()); |
| |
| data.RunFor(7); |
| |
| EXPECT_FALSE(spdy_stream_lowest); |
| EXPECT_FALSE(spdy_stream_highest); |
| EXPECT_EQ(3u, delegate_lowest.stream_id()); |
| EXPECT_EQ(1u, delegate_highest.stream_id()); |
| } |
| |
| TEST_P(SpdySessionTest, CancelStream) { |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| // Request 1, at HIGHEST priority, will be cancelled before it writes data. |
| // Request 2, at LOWEST priority, will be a full request and will be id 1. |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req2, 0), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp2(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> body2(spdy_util_.ConstructSpdyBodyFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(*resp2, 1), |
| CreateMockRead(*body2, 2), |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url1, HIGHEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| GURL url2(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url2, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream2.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| test::StreamDelegateDoNothing delegate2(spdy_stream2); |
| spdy_stream2->SetDelegate(&delegate2); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructGetHeaderBlock(url2.spec())); |
| spdy_stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream2->HasUrlFromHeaders()); |
| |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| |
| spdy_stream1->Cancel(); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| EXPECT_EQ(1u, delegate2.stream_id()); |
| |
| spdy_stream2->Cancel(); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| } |
| |
| // Create two streams that are set to re-close themselves on close, |
| // and then close the session. Nothing should blow up. Also a |
| // regression test for http://crbug.com/139518 . |
| TEST_P(SpdySessionTest, CloseSessionWithTwoCreatedSelfClosingStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| // No actual data will be sent. |
| MockWrite writes[] = { |
| MockWrite(ASYNC, 0, 1) // EOF |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 0) // EOF |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, url1, HIGHEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| |
| GURL url2(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, url2, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream2.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| |
| test::ClosingDelegate delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| test::ClosingDelegate delegate2(spdy_stream2); |
| spdy_stream2->SetDelegate(&delegate2); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructGetHeaderBlock(url2.spec())); |
| spdy_stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream2->HasUrlFromHeaders()); |
| |
| // Ensure that the streams have not yet been activated and assigned an id. |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| |
| // Ensure we don't crash while closing the session. |
| session->CloseSessionOnError(ERR_ABORTED, std::string()); |
| |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| |
| EXPECT_TRUE(delegate1.StreamIsClosed()); |
| EXPECT_TRUE(delegate2.StreamIsClosed()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Create two streams that are set to close each other on close, and |
| // then close the session. Nothing should blow up. |
| TEST_P(SpdySessionTest, CloseSessionWithTwoCreatedMutuallyClosingStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| // No actual data will be sent. |
| MockWrite writes[] = { |
| MockWrite(ASYNC, 0, 1) // EOF |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 0) // EOF |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, url1, HIGHEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| |
| GURL url2(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, url2, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream2.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| |
| // Make |spdy_stream1| close |spdy_stream2|. |
| test::ClosingDelegate delegate1(spdy_stream2); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| // Make |spdy_stream2| close |spdy_stream1|. |
| test::ClosingDelegate delegate2(spdy_stream1); |
| spdy_stream2->SetDelegate(&delegate2); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructGetHeaderBlock(url2.spec())); |
| spdy_stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream2->HasUrlFromHeaders()); |
| |
| // Ensure that the streams have not yet been activated and assigned an id. |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| |
| // Ensure we don't crash while closing the session. |
| session->CloseSessionOnError(ERR_ABORTED, std::string()); |
| |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| |
| EXPECT_TRUE(delegate1.StreamIsClosed()); |
| EXPECT_TRUE(delegate2.StreamIsClosed()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Create two streams that are set to re-close themselves on close, |
| // activate them, and then close the session. Nothing should blow up. |
| TEST_P(SpdySessionTest, CloseSessionWithTwoActivatedSelfClosingStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 3, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| CreateMockWrite(*req2, 1), |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 2) // EOF |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url1, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| |
| GURL url2(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url2, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream2.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| |
| test::ClosingDelegate delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| test::ClosingDelegate delegate2(spdy_stream2); |
| spdy_stream2->SetDelegate(&delegate2); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructGetHeaderBlock(url2.spec())); |
| spdy_stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream2->HasUrlFromHeaders()); |
| |
| // Ensure that the streams have not yet been activated and assigned an id. |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| |
| data.RunFor(2); |
| |
| EXPECT_EQ(1u, spdy_stream1->stream_id()); |
| EXPECT_EQ(3u, spdy_stream2->stream_id()); |
| |
| // Ensure we don't crash while closing the session. |
| session->CloseSessionOnError(ERR_ABORTED, std::string()); |
| |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| |
| EXPECT_TRUE(delegate1.StreamIsClosed()); |
| EXPECT_TRUE(delegate2.StreamIsClosed()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Create two streams that are set to close each other on close, |
| // activate them, and then close the session. Nothing should blow up. |
| TEST_P(SpdySessionTest, CloseSessionWithTwoActivatedMutuallyClosingStreams) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 3, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| CreateMockWrite(*req2, 1), |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 2) // EOF |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url1, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| |
| GURL url2(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url2, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream2.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| |
| // Make |spdy_stream1| close |spdy_stream2|. |
| test::ClosingDelegate delegate1(spdy_stream2); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| // Make |spdy_stream2| close |spdy_stream1|. |
| test::ClosingDelegate delegate2(spdy_stream1); |
| spdy_stream2->SetDelegate(&delegate2); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructGetHeaderBlock(url2.spec())); |
| spdy_stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream2->HasUrlFromHeaders()); |
| |
| // Ensure that the streams have not yet been activated and assigned an id. |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| EXPECT_EQ(0u, spdy_stream2->stream_id()); |
| |
| data.RunFor(2); |
| |
| EXPECT_EQ(1u, spdy_stream1->stream_id()); |
| EXPECT_EQ(3u, spdy_stream2->stream_id()); |
| |
| // Ensure we don't crash while closing the session. |
| session->CloseSessionOnError(ERR_ABORTED, std::string()); |
| |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| |
| EXPECT_TRUE(delegate1.StreamIsClosed()); |
| EXPECT_TRUE(delegate2.StreamIsClosed()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Delegate that closes a given session when the stream is closed. |
| class SessionClosingDelegate : public test::StreamDelegateDoNothing { |
| public: |
| SessionClosingDelegate(const base::WeakPtr<SpdyStream>& stream, |
| const base::WeakPtr<SpdySession>& session_to_close) |
| : StreamDelegateDoNothing(stream), |
| session_to_close_(session_to_close) {} |
| |
| virtual ~SessionClosingDelegate() {} |
| |
| virtual void OnClose(int status) override { |
| session_to_close_->CloseSessionOnError(ERR_SPDY_PROTOCOL_ERROR, "Error"); |
| } |
| |
| private: |
| base::WeakPtr<SpdySession> session_to_close_; |
| }; |
| |
| // Close an activated stream that closes its session. Nothing should |
| // blow up. This is a regression test for http://crbug.com/263691 . |
| TEST_P(SpdySessionTest, CloseActivatedStreamThatClosesSession) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| scoped_ptr<SpdyFrame> rst( |
| spdy_util_.ConstructSpdyRstStream(1, RST_STREAM_CANCEL)); |
| scoped_ptr<SpdyFrame> goaway( |
| spdy_util_.ConstructSpdyGoAway(0, GOAWAY_PROTOCOL_ERROR, "Error")); |
| // The GOAWAY has higher-priority than the RST_STREAM, and is written first |
| // despite being queued second. |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), CreateMockWrite(*goaway, 1), |
| CreateMockWrite(*rst, 2), |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 3) // EOF |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream->stream_id()); |
| |
| SessionClosingDelegate delegate(spdy_stream, session); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream->HasUrlFromHeaders()); |
| |
| EXPECT_EQ(0u, spdy_stream->stream_id()); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(1u, spdy_stream->stream_id()); |
| |
| // Ensure we don't crash while closing the stream (which closes the |
| // session). |
| spdy_stream->Cancel(); |
| |
| EXPECT_EQ(NULL, spdy_stream.get()); |
| EXPECT_TRUE(delegate.StreamIsClosed()); |
| |
| data.RunFor(2); // Write the RST_STREAM & GOAWAY. |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| TEST_P(SpdySessionTest, VerifyDomainAuthentication) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| // No actual data will be sent. |
| MockWrite writes[] = { |
| MockWrite(ASYNC, 0, 1) // EOF |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 0) // EOF |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| // Load a cert that is valid for: |
| // www.example.org |
| // mail.example.org |
| // www.example.com |
| base::FilePath certs_dir = GetTestCertsDirectory(); |
| scoped_refptr<X509Certificate> test_cert( |
| ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
| |
| SSLSocketDataProvider ssl(SYNCHRONOUS, OK); |
| ssl.cert = test_cert; |
| session_deps_.deterministic_socket_factory->AddSSLSocketDataProvider(&ssl); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateSecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_TRUE(session->VerifyDomainAuthentication("www.example.org")); |
| EXPECT_TRUE(session->VerifyDomainAuthentication("mail.example.org")); |
| EXPECT_TRUE(session->VerifyDomainAuthentication("mail.example.com")); |
| EXPECT_FALSE(session->VerifyDomainAuthentication("mail.google.com")); |
| } |
| |
| TEST_P(SpdySessionTest, ConnectionPooledWithTlsChannelId) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| // No actual data will be sent. |
| MockWrite writes[] = { |
| MockWrite(ASYNC, 0, 1) // EOF |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 0) // EOF |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| // Load a cert that is valid for: |
| // www.example.org |
| // mail.example.org |
| // www.example.com |
| base::FilePath certs_dir = GetTestCertsDirectory(); |
| scoped_refptr<X509Certificate> test_cert( |
| ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
| |
| SSLSocketDataProvider ssl(SYNCHRONOUS, OK); |
| ssl.channel_id_sent = true; |
| ssl.cert = test_cert; |
| session_deps_.deterministic_socket_factory->AddSSLSocketDataProvider(&ssl); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateSecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| EXPECT_TRUE(session->VerifyDomainAuthentication("www.example.org")); |
| EXPECT_TRUE(session->VerifyDomainAuthentication("mail.example.org")); |
| EXPECT_FALSE(session->VerifyDomainAuthentication("mail.example.com")); |
| EXPECT_FALSE(session->VerifyDomainAuthentication("mail.google.com")); |
| } |
| |
| TEST_P(SpdySessionTest, CloseTwoStalledCreateStream) { |
| // TODO(rtenneti): Define a helper class/methods and move the common code in |
| // this file. |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| SettingsMap new_settings; |
| const SpdySettingsIds kSpdySettingsIds1 = SETTINGS_MAX_CONCURRENT_STREAMS; |
| const uint32 max_concurrent_streams = 1; |
| new_settings[kSpdySettingsIds1] = |
| SettingsFlagsAndValue(SETTINGS_FLAG_NONE, max_concurrent_streams); |
| |
| scoped_ptr<SpdyFrame> settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 3, LOWEST, true)); |
| scoped_ptr<SpdyFrame> req3( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 5, LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*settings_ack, 1), |
| CreateMockWrite(*req1, 2), |
| CreateMockWrite(*req2, 5), |
| CreateMockWrite(*req3, 8), |
| }; |
| |
| // Set up the socket so we read a SETTINGS frame that sets max concurrent |
| // streams to 1. |
| scoped_ptr<SpdyFrame> settings_frame( |
| spdy_util_.ConstructSpdySettings(new_settings)); |
| |
| scoped_ptr<SpdyFrame> resp1(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> body1(spdy_util_.ConstructSpdyBodyFrame(1, true)); |
| |
| scoped_ptr<SpdyFrame> resp2(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 3)); |
| scoped_ptr<SpdyFrame> body2(spdy_util_.ConstructSpdyBodyFrame(3, true)); |
| |
| scoped_ptr<SpdyFrame> resp3(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 5)); |
| scoped_ptr<SpdyFrame> body3(spdy_util_.ConstructSpdyBodyFrame(5, true)); |
| |
| MockRead reads[] = { |
| CreateMockRead(*settings_frame), |
| CreateMockRead(*resp1, 3), |
| CreateMockRead(*body1, 4), |
| CreateMockRead(*resp2, 6), |
| CreateMockRead(*body2, 7), |
| CreateMockRead(*resp3, 9), |
| CreateMockRead(*body3, 10), |
| MockRead(ASYNC, 0, 11) // EOF |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Read the settings frame. |
| data.RunFor(1); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url1, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| TestCompletionCallback callback2; |
| GURL url2(kDefaultURL); |
| SpdyStreamRequest request2; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request2.StartRequest( |
| SPDY_REQUEST_RESPONSE_STREAM, |
| session, url2, LOWEST, BoundNetLog(), callback2.callback())); |
| |
| TestCompletionCallback callback3; |
| GURL url3(kDefaultURL); |
| SpdyStreamRequest request3; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request3.StartRequest( |
| SPDY_REQUEST_RESPONSE_STREAM, |
| session, url3, LOWEST, BoundNetLog(), callback3.callback())); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(2u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Run until 1st stream is activated and then closed. |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| data.RunFor(4); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| EXPECT_EQ(1u, delegate1.stream_id()); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| // Pump loop for SpdySession::ProcessPendingStreamRequests() to |
| // create the 2nd stream. |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| base::WeakPtr<SpdyStream> stream2 = request2.ReleaseStream(); |
| test::StreamDelegateDoNothing delegate2(stream2); |
| stream2->SetDelegate(&delegate2); |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructGetHeaderBlock(url2.spec())); |
| stream2->SendRequestHeaders(headers2.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(stream2->HasUrlFromHeaders()); |
| |
| // Run until 2nd stream is activated and then closed. |
| EXPECT_EQ(0u, delegate2.stream_id()); |
| data.RunFor(3); |
| EXPECT_EQ(NULL, stream2.get()); |
| EXPECT_EQ(3u, delegate2.stream_id()); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| // Pump loop for SpdySession::ProcessPendingStreamRequests() to |
| // create the 3rd stream. |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| base::WeakPtr<SpdyStream> stream3 = request3.ReleaseStream(); |
| test::StreamDelegateDoNothing delegate3(stream3); |
| stream3->SetDelegate(&delegate3); |
| scoped_ptr<SpdyHeaderBlock> headers3( |
| spdy_util_.ConstructGetHeaderBlock(url3.spec())); |
| stream3->SendRequestHeaders(headers3.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(stream3->HasUrlFromHeaders()); |
| |
| // Run until 2nd stream is activated and then closed. |
| EXPECT_EQ(0u, delegate3.stream_id()); |
| data.RunFor(3); |
| EXPECT_EQ(NULL, stream3.get()); |
| EXPECT_EQ(5u, delegate3.stream_id()); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| data.RunFor(1); |
| } |
| |
| TEST_P(SpdySessionTest, CancelTwoStalledCreateStream) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Leave room for only one more stream to be created. |
| for (size_t i = 0; i < kInitialMaxConcurrentStreams - 1; ++i) { |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream != NULL); |
| } |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, url1, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| |
| TestCompletionCallback callback2; |
| GURL url2(kDefaultURL); |
| SpdyStreamRequest request2; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request2.StartRequest( |
| SPDY_BIDIRECTIONAL_STREAM, session, url2, LOWEST, BoundNetLog(), |
| callback2.callback())); |
| |
| TestCompletionCallback callback3; |
| GURL url3(kDefaultURL); |
| SpdyStreamRequest request3; |
| ASSERT_EQ(ERR_IO_PENDING, |
| request3.StartRequest( |
| SPDY_BIDIRECTIONAL_STREAM, session, url3, LOWEST, BoundNetLog(), |
| callback3.callback())); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(kInitialMaxConcurrentStreams, session->num_created_streams()); |
| EXPECT_EQ(2u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| // Cancel the first stream; this will allow the second stream to be created. |
| EXPECT_TRUE(spdy_stream1.get() != NULL); |
| spdy_stream1->Cancel(); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| EXPECT_EQ(OK, callback2.WaitForResult()); |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(kInitialMaxConcurrentStreams, session->num_created_streams()); |
| EXPECT_EQ(1u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| // Cancel the second stream; this will allow the third stream to be created. |
| base::WeakPtr<SpdyStream> spdy_stream2 = request2.ReleaseStream(); |
| spdy_stream2->Cancel(); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| |
| EXPECT_EQ(OK, callback3.WaitForResult()); |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(kInitialMaxConcurrentStreams, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(LOWEST)); |
| |
| // Cancel the third stream. |
| base::WeakPtr<SpdyStream> spdy_stream3 = request3.ReleaseStream(); |
| spdy_stream3->Cancel(); |
| EXPECT_EQ(NULL, spdy_stream3.get()); |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(kInitialMaxConcurrentStreams - 1, session->num_created_streams()); |
| EXPECT_EQ(0u, session->pending_create_stream_queue_size(LOWEST)); |
| } |
| |
| // Test that SpdySession::DoReadLoop reads data from the socket |
| // without yielding. This test makes 32k - 1 bytes of data available |
| // on the socket for reading. It then verifies that it has read all |
| // the available data without yielding. |
| TEST_P(SpdySessionTest, ReadDataWithoutYielding) { |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| BufferedSpdyFramer framer(spdy_util_.spdy_version(), false); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| }; |
| |
| // Build buffer of size kMaxReadBytesWithoutYielding / 4 |
| // (-spdy_data_frame_size). |
| ASSERT_EQ(32 * 1024, kMaxReadBytesWithoutYielding); |
| const int kPayloadSize = |
| kMaxReadBytesWithoutYielding / 4 - framer.GetControlFrameHeaderSize(); |
| TestDataStream test_stream; |
| scoped_refptr<net::IOBuffer> payload(new net::IOBuffer(kPayloadSize)); |
| char* payload_data = payload->data(); |
| test_stream.GetBytes(payload_data, kPayloadSize); |
| |
| scoped_ptr<SpdyFrame> partial_data_frame( |
| framer.CreateDataFrame(1, payload_data, kPayloadSize, DATA_FLAG_NONE)); |
| scoped_ptr<SpdyFrame> finish_data_frame( |
| framer.CreateDataFrame(1, payload_data, kPayloadSize - 1, DATA_FLAG_FIN)); |
| |
| scoped_ptr<SpdyFrame> resp1(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| |
| // Write 1 byte less than kMaxReadBytes to check that DoRead reads up to 32k |
| // bytes. |
| MockRead reads[] = { |
| CreateMockRead(*resp1, 1), |
| CreateMockRead(*partial_data_frame, 2), |
| CreateMockRead(*partial_data_frame, 3, SYNCHRONOUS), |
| CreateMockRead(*partial_data_frame, 4, SYNCHRONOUS), |
| CreateMockRead(*finish_data_frame, 5, SYNCHRONOUS), |
| MockRead(ASYNC, 0, 6) // EOF |
| }; |
| |
| // Create SpdySession and SpdyStream and send the request. |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url1, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| scoped_ptr<SpdyHeaderBlock> headers1( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers1.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Set up the TaskObserver to verify SpdySession::DoReadLoop doesn't |
| // post a task. |
| SpdySessionTestTaskObserver observer("spdy_session.cc", "DoReadLoop"); |
| |
| // Run until 1st read. |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| data.RunFor(2); |
| EXPECT_EQ(1u, delegate1.stream_id()); |
| EXPECT_EQ(0u, observer.executed_count()); |
| |
| // Read all the data and verify SpdySession::DoReadLoop has not |
| // posted a task. |
| data.RunFor(4); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| // Verify task observer's executed_count is zero, which indicates DoRead read |
| // all the available data. |
| EXPECT_EQ(0u, observer.executed_count()); |
| EXPECT_TRUE(data.at_write_eof()); |
| EXPECT_TRUE(data.at_read_eof()); |
| } |
| |
| // Test that SpdySession::DoReadLoop yields while reading the |
| // data. This test makes 32k + 1 bytes of data available on the socket |
| // for reading. It then verifies that DoRead has yielded even though |
| // there is data available for it to read (i.e, socket()->Read didn't |
| // return ERR_IO_PENDING during socket reads). |
| TEST_P(SpdySessionTest, TestYieldingDuringReadData) { |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| BufferedSpdyFramer framer(spdy_util_.spdy_version(), false); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| }; |
| |
| // Build buffer of size kMaxReadBytesWithoutYielding / 4 |
| // (-spdy_data_frame_size). |
| ASSERT_EQ(32 * 1024, kMaxReadBytesWithoutYielding); |
| const int kPayloadSize = |
| kMaxReadBytesWithoutYielding / 4 - framer.GetControlFrameHeaderSize(); |
| TestDataStream test_stream; |
| scoped_refptr<net::IOBuffer> payload(new net::IOBuffer(kPayloadSize)); |
| char* payload_data = payload->data(); |
| test_stream.GetBytes(payload_data, kPayloadSize); |
| |
| scoped_ptr<SpdyFrame> partial_data_frame( |
| framer.CreateDataFrame(1, payload_data, kPayloadSize, DATA_FLAG_NONE)); |
| scoped_ptr<SpdyFrame> finish_data_frame( |
| framer.CreateDataFrame(1, "h", 1, DATA_FLAG_FIN)); |
| |
| scoped_ptr<SpdyFrame> resp1(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| |
| // Write 1 byte more than kMaxReadBytes to check that DoRead yields. |
| MockRead reads[] = { |
| CreateMockRead(*resp1, 1), |
| CreateMockRead(*partial_data_frame, 2), |
| CreateMockRead(*partial_data_frame, 3, SYNCHRONOUS), |
| CreateMockRead(*partial_data_frame, 4, SYNCHRONOUS), |
| CreateMockRead(*partial_data_frame, 5, SYNCHRONOUS), |
| CreateMockRead(*finish_data_frame, 6, SYNCHRONOUS), |
| MockRead(ASYNC, 0, 7) // EOF |
| }; |
| |
| // Create SpdySession and SpdyStream and send the request. |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url1, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| scoped_ptr<SpdyHeaderBlock> headers1( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers1.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Set up the TaskObserver to verify SpdySession::DoReadLoop posts a |
| // task. |
| SpdySessionTestTaskObserver observer("spdy_session.cc", "DoReadLoop"); |
| |
| // Run until 1st read. |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| data.RunFor(2); |
| EXPECT_EQ(1u, delegate1.stream_id()); |
| EXPECT_EQ(0u, observer.executed_count()); |
| |
| // Read all the data and verify SpdySession::DoReadLoop has posted a |
| // task. |
| data.RunFor(6); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| // Verify task observer's executed_count is 1, which indicates DoRead has |
| // posted only one task and thus yielded though there is data available for it |
| // to read. |
| EXPECT_EQ(1u, observer.executed_count()); |
| EXPECT_TRUE(data.at_write_eof()); |
| EXPECT_TRUE(data.at_read_eof()); |
| } |
| |
| // Test that SpdySession::DoReadLoop() tests interactions of yielding |
| // + async, by doing the following MockReads. |
| // |
| // MockRead of SYNCHRONOUS 8K, SYNCHRONOUS 8K, SYNCHRONOUS 8K, SYNCHRONOUS 2K |
| // ASYNC 8K, SYNCHRONOUS 8K, SYNCHRONOUS 8K, SYNCHRONOUS 8K, SYNCHRONOUS 2K. |
| // |
| // The above reads 26K synchronously. Since that is less that 32K, we |
| // will attempt to read again. However, that DoRead() will return |
| // ERR_IO_PENDING (because of async read), so DoReadLoop() will |
| // yield. When we come back, DoRead() will read the results from the |
| // async read, and rest of the data synchronously. |
| TEST_P(SpdySessionTest, TestYieldingDuringAsyncReadData) { |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| BufferedSpdyFramer framer(spdy_util_.spdy_version(), false); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| }; |
| |
| // Build buffer of size kMaxReadBytesWithoutYielding / 4 |
| // (-spdy_data_frame_size). |
| ASSERT_EQ(32 * 1024, kMaxReadBytesWithoutYielding); |
| TestDataStream test_stream; |
| const int kEightKPayloadSize = |
| kMaxReadBytesWithoutYielding / 4 - framer.GetControlFrameHeaderSize(); |
| scoped_refptr<net::IOBuffer> eightk_payload( |
| new net::IOBuffer(kEightKPayloadSize)); |
| char* eightk_payload_data = eightk_payload->data(); |
| test_stream.GetBytes(eightk_payload_data, kEightKPayloadSize); |
| |
| // Build buffer of 2k size. |
| TestDataStream test_stream2; |
| const int kTwoKPayloadSize = kEightKPayloadSize - 6 * 1024; |
| scoped_refptr<net::IOBuffer> twok_payload( |
| new net::IOBuffer(kTwoKPayloadSize)); |
| char* twok_payload_data = twok_payload->data(); |
| test_stream2.GetBytes(twok_payload_data, kTwoKPayloadSize); |
| |
| scoped_ptr<SpdyFrame> eightk_data_frame(framer.CreateDataFrame( |
| 1, eightk_payload_data, kEightKPayloadSize, DATA_FLAG_NONE)); |
| scoped_ptr<SpdyFrame> twok_data_frame(framer.CreateDataFrame( |
| 1, twok_payload_data, kTwoKPayloadSize, DATA_FLAG_NONE)); |
| scoped_ptr<SpdyFrame> finish_data_frame(framer.CreateDataFrame( |
| 1, "h", 1, DATA_FLAG_FIN)); |
| |
| scoped_ptr<SpdyFrame> resp1(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| |
| MockRead reads[] = { |
| CreateMockRead(*resp1, 1), |
| CreateMockRead(*eightk_data_frame, 2), |
| CreateMockRead(*eightk_data_frame, 3, SYNCHRONOUS), |
| CreateMockRead(*eightk_data_frame, 4, SYNCHRONOUS), |
| CreateMockRead(*twok_data_frame, 5, SYNCHRONOUS), |
| CreateMockRead(*eightk_data_frame, 6, ASYNC), |
| CreateMockRead(*eightk_data_frame, 7, SYNCHRONOUS), |
| CreateMockRead(*eightk_data_frame, 8, SYNCHRONOUS), |
| CreateMockRead(*eightk_data_frame, 9, SYNCHRONOUS), |
| CreateMockRead(*twok_data_frame, 10, SYNCHRONOUS), |
| CreateMockRead(*finish_data_frame, 11, SYNCHRONOUS), |
| MockRead(ASYNC, 0, 12) // EOF |
| }; |
| |
| // Create SpdySession and SpdyStream and send the request. |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url1, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| scoped_ptr<SpdyHeaderBlock> headers1( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers1.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Set up the TaskObserver to monitor SpdySession::DoReadLoop |
| // posting of tasks. |
| SpdySessionTestTaskObserver observer("spdy_session.cc", "DoReadLoop"); |
| |
| // Run until 1st read. |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| data.RunFor(2); |
| EXPECT_EQ(1u, delegate1.stream_id()); |
| EXPECT_EQ(0u, observer.executed_count()); |
| |
| // Read all the data and verify SpdySession::DoReadLoop has posted a |
| // task. |
| data.RunFor(12); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| // Verify task observer's executed_count is 1, which indicates DoRead has |
| // posted only one task and thus yielded though there is data available for |
| // it to read. |
| EXPECT_EQ(1u, observer.executed_count()); |
| EXPECT_TRUE(data.at_write_eof()); |
| EXPECT_TRUE(data.at_read_eof()); |
| } |
| |
| // Send a GoAway frame when SpdySession is in DoReadLoop. Make sure |
| // nothing blows up. |
| TEST_P(SpdySessionTest, GoAwayWhileInDoReadLoop) { |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| BufferedSpdyFramer framer(spdy_util_.spdy_version(), false); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp1(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> body1(spdy_util_.ConstructSpdyBodyFrame(1, true)); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway()); |
| |
| MockRead reads[] = { |
| CreateMockRead(*resp1, 1), |
| CreateMockRead(*body1, 2), |
| CreateMockRead(*goaway, 3), |
| }; |
| |
| // Create SpdySession and SpdyStream and send the request. |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url1, MEDIUM, BoundNetLog()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers1( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers1.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Run until 1st read. |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| data.RunFor(1); |
| EXPECT_EQ(1u, spdy_stream1->stream_id()); |
| |
| // Run until GoAway. |
| data.RunFor(3); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| EXPECT_TRUE(data.at_write_eof()); |
| EXPECT_TRUE(data.at_read_eof()); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| // Within this framework, a SpdySession should be initialized with |
| // flow control disabled for protocol version 2, with flow control |
| // enabled only for streams for protocol version 3, and with flow |
| // control enabled for streams and sessions for higher versions. |
| TEST_P(SpdySessionTest, ProtocolNegotiation) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, 0, 0) // EOF |
| }; |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateFakeSpdySession(spdy_session_pool_, key_); |
| |
| EXPECT_EQ(spdy_util_.spdy_version(), |
| session->buffered_spdy_framer_->protocol_version()); |
| if (GetParam() == kProtoDeprecatedSPDY2) { |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_NONE, session->flow_control_state()); |
| EXPECT_EQ(0, session->session_send_window_size_); |
| EXPECT_EQ(0, session->session_recv_window_size_); |
| } else if (GetParam() == kProtoSPDY3) { |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM, session->flow_control_state()); |
| EXPECT_EQ(0, session->session_send_window_size_); |
| EXPECT_EQ(0, session->session_recv_window_size_); |
| } else { |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM_AND_SESSION, |
| session->flow_control_state()); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, |
| session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, |
| session->session_recv_window_size_); |
| } |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| } |
| |
| // Tests the case of a non-SPDY request closing an idle SPDY session when no |
| // pointers to the idle session are currently held. |
| TEST_P(SpdySessionTest, CloseOneIdleConnection) { |
| ClientSocketPoolManager::set_max_sockets_per_group( |
| HttpNetworkSession::NORMAL_SOCKET_POOL, 1); |
| ClientSocketPoolManager::set_max_sockets_per_pool( |
| HttpNetworkSession::NORMAL_SOCKET_POOL, 1); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| |
| TransportClientSocketPool* pool = |
| http_session_->GetTransportSocketPool( |
| HttpNetworkSession::NORMAL_SOCKET_POOL); |
| |
| // Create an idle SPDY session. |
| SpdySessionKey key1(HostPortPair("1.com", 80), ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED); |
| base::WeakPtr<SpdySession> session1 = |
| CreateInsecureSpdySession(http_session_, key1, BoundNetLog()); |
| EXPECT_FALSE(pool->IsStalled()); |
| |
| // Trying to create a new connection should cause the pool to be stalled, and |
| // post a task asynchronously to try and close the session. |
| TestCompletionCallback callback2; |
| HostPortPair host_port2("2.com", 80); |
| scoped_refptr<TransportSocketParams> params2( |
| new TransportSocketParams( |
| host_port2, false, false, OnHostResolutionCallback(), |
| TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DEFAULT)); |
| scoped_ptr<ClientSocketHandle> connection2(new ClientSocketHandle); |
| EXPECT_EQ(ERR_IO_PENDING, |
| connection2->Init(host_port2.ToString(), params2, DEFAULT_PRIORITY, |
| callback2.callback(), pool, BoundNetLog())); |
| EXPECT_TRUE(pool->IsStalled()); |
| |
| // The socket pool should close the connection asynchronously and establish a |
| // new connection. |
| EXPECT_EQ(OK, callback2.WaitForResult()); |
| EXPECT_FALSE(pool->IsStalled()); |
| EXPECT_TRUE(session1 == NULL); |
| } |
| |
| // Tests the case of a non-SPDY request closing an idle SPDY session when no |
| // pointers to the idle session are currently held, in the case the SPDY session |
| // has an alias. |
| TEST_P(SpdySessionTest, CloseOneIdleConnectionWithAlias) { |
| ClientSocketPoolManager::set_max_sockets_per_group( |
| HttpNetworkSession::NORMAL_SOCKET_POOL, 1); |
| ClientSocketPoolManager::set_max_sockets_per_pool( |
| HttpNetworkSession::NORMAL_SOCKET_POOL, 1); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.host_resolver->rules()->AddIPLiteralRule( |
| "1.com", "192.168.0.2", std::string()); |
| session_deps_.host_resolver->rules()->AddIPLiteralRule( |
| "2.com", "192.168.0.2", std::string()); |
| // Not strictly needed. |
| session_deps_.host_resolver->rules()->AddIPLiteralRule( |
| "3.com", "192.168.0.3", std::string()); |
| |
| CreateNetworkSession(); |
| |
| TransportClientSocketPool* pool = |
| http_session_->GetTransportSocketPool( |
| HttpNetworkSession::NORMAL_SOCKET_POOL); |
| |
| // Create an idle SPDY session. |
| SpdySessionKey key1(HostPortPair("1.com", 80), ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED); |
| base::WeakPtr<SpdySession> session1 = |
| CreateInsecureSpdySession(http_session_, key1, BoundNetLog()); |
| EXPECT_FALSE(pool->IsStalled()); |
| |
| // Set up an alias for the idle SPDY session, increasing its ref count to 2. |
| SpdySessionKey key2(HostPortPair("2.com", 80), ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED); |
| HostResolver::RequestInfo info(key2.host_port_pair()); |
| AddressList addresses; |
| // Pre-populate the DNS cache, since a synchronous resolution is required in |
| // order to create the alias. |
| session_deps_.host_resolver->Resolve(info, |
| DEFAULT_PRIORITY, |
| &addresses, |
| CompletionCallback(), |
| NULL, |
| BoundNetLog()); |
| // Get a session for |key2|, which should return the session created earlier. |
| base::WeakPtr<SpdySession> session2 = |
| spdy_session_pool_->FindAvailableSession(key2, BoundNetLog()); |
| ASSERT_EQ(session1.get(), session2.get()); |
| EXPECT_FALSE(pool->IsStalled()); |
| |
| // Trying to create a new connection should cause the pool to be stalled, and |
| // post a task asynchronously to try and close the session. |
| TestCompletionCallback callback3; |
| HostPortPair host_port3("3.com", 80); |
| scoped_refptr<TransportSocketParams> params3( |
| new TransportSocketParams( |
| host_port3, false, false, OnHostResolutionCallback(), |
| TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DEFAULT)); |
| scoped_ptr<ClientSocketHandle> connection3(new ClientSocketHandle); |
| EXPECT_EQ(ERR_IO_PENDING, |
| connection3->Init(host_port3.ToString(), params3, DEFAULT_PRIORITY, |
| callback3.callback(), pool, BoundNetLog())); |
| EXPECT_TRUE(pool->IsStalled()); |
| |
| // The socket pool should close the connection asynchronously and establish a |
| // new connection. |
| EXPECT_EQ(OK, callback3.WaitForResult()); |
| EXPECT_FALSE(pool->IsStalled()); |
| EXPECT_TRUE(session1 == NULL); |
| EXPECT_TRUE(session2 == NULL); |
| } |
| |
| // Tests that when a SPDY session becomes idle, it closes itself if there is |
| // a lower layer pool stalled on the per-pool socket limit. |
| TEST_P(SpdySessionTest, CloseSessionOnIdleWhenPoolStalled) { |
| ClientSocketPoolManager::set_max_sockets_per_group( |
| HttpNetworkSession::NORMAL_SOCKET_POOL, 1); |
| ClientSocketPoolManager::set_max_sockets_per_pool( |
| HttpNetworkSession::NORMAL_SOCKET_POOL, 1); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| scoped_ptr<SpdyFrame> cancel1( |
| spdy_util_.ConstructSpdyRstStream(1, RST_STREAM_CANCEL)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 1), |
| CreateMockWrite(*cancel1, 1), |
| }; |
| StaticSocketDataProvider data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| MockRead http_reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| StaticSocketDataProvider http_data(http_reads, arraysize(http_reads), |
| NULL, 0); |
| http_data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&http_data); |
| |
| |
| CreateNetworkSession(); |
| |
| TransportClientSocketPool* pool = |
| http_session_->GetTransportSocketPool( |
| HttpNetworkSession::NORMAL_SOCKET_POOL); |
| |
| // Create a SPDY session. |
| GURL url1(kDefaultURL); |
| SpdySessionKey key1(HostPortPair(url1.host(), 80), |
| ProxyServer::Direct(), PRIVACY_MODE_DISABLED); |
| base::WeakPtr<SpdySession> session1 = |
| CreateInsecureSpdySession(http_session_, key1, BoundNetLog()); |
| EXPECT_FALSE(pool->IsStalled()); |
| |
| // Create a stream using the session, and send a request. |
| |
| TestCompletionCallback callback1; |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session1, url1, DEFAULT_PRIORITY, |
| BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| scoped_ptr<SpdyHeaderBlock> headers1( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| EXPECT_EQ(ERR_IO_PENDING, |
| spdy_stream1->SendRequestHeaders( |
| headers1.Pass(), NO_MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| // Trying to create a new connection should cause the pool to be stalled, and |
| // post a task asynchronously to try and close the session. |
| TestCompletionCallback callback2; |
| HostPortPair host_port2("2.com", 80); |
| scoped_refptr<TransportSocketParams> params2( |
| new TransportSocketParams( |
| host_port2, false, false, OnHostResolutionCallback(), |
| TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DEFAULT)); |
| scoped_ptr<ClientSocketHandle> connection2(new ClientSocketHandle); |
| EXPECT_EQ(ERR_IO_PENDING, |
| connection2->Init(host_port2.ToString(), params2, DEFAULT_PRIORITY, |
| callback2.callback(), pool, BoundNetLog())); |
| EXPECT_TRUE(pool->IsStalled()); |
| |
| // Running the message loop should cause the socket pool to ask the SPDY |
| // session to close an idle socket, but since the socket is in use, nothing |
| // happens. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(pool->IsStalled()); |
| EXPECT_FALSE(callback2.have_result()); |
| |
| // Cancelling the request should result in the session's socket being |
| // closed, since the pool is stalled. |
| ASSERT_TRUE(spdy_stream1.get()); |
| spdy_stream1->Cancel(); |
| base::RunLoop().RunUntilIdle(); |
| ASSERT_FALSE(pool->IsStalled()); |
| EXPECT_EQ(OK, callback2.WaitForResult()); |
| } |
| |
| // Verify that SpdySessionKey and therefore SpdySession is different when |
| // privacy mode is enabled or disabled. |
| TEST_P(SpdySessionTest, SpdySessionKeyPrivacyMode) { |
| CreateDeterministicNetworkSession(); |
| |
| HostPortPair host_port_pair("www.google.com", 443); |
| SpdySessionKey key_privacy_enabled(host_port_pair, ProxyServer::Direct(), |
| PRIVACY_MODE_ENABLED); |
| SpdySessionKey key_privacy_disabled(host_port_pair, ProxyServer::Direct(), |
| PRIVACY_MODE_DISABLED); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_privacy_enabled)); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_privacy_disabled)); |
| |
| // Add SpdySession with PrivacyMode Enabled to the pool. |
| base::WeakPtr<SpdySession> session_privacy_enabled = |
| CreateFakeSpdySession(spdy_session_pool_, key_privacy_enabled); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_privacy_enabled)); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_privacy_disabled)); |
| |
| // Add SpdySession with PrivacyMode Disabled to the pool. |
| base::WeakPtr<SpdySession> session_privacy_disabled = |
| CreateFakeSpdySession(spdy_session_pool_, key_privacy_disabled); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_privacy_enabled)); |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_privacy_disabled)); |
| |
| session_privacy_enabled->CloseSessionOnError(ERR_ABORTED, std::string()); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_privacy_enabled)); |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_privacy_disabled)); |
| |
| session_privacy_disabled->CloseSessionOnError(ERR_ABORTED, std::string()); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_privacy_enabled)); |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_privacy_disabled)); |
| } |
| |
| // Delegate that creates another stream when its stream is closed. |
| class StreamCreatingDelegate : public test::StreamDelegateDoNothing { |
| public: |
| StreamCreatingDelegate(const base::WeakPtr<SpdyStream>& stream, |
| const base::WeakPtr<SpdySession>& session) |
| : StreamDelegateDoNothing(stream), |
| session_(session) {} |
| |
| virtual ~StreamCreatingDelegate() {} |
| |
| virtual void OnClose(int status) override { |
| GURL url(kDefaultURL); |
| ignore_result( |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session_, url, MEDIUM, BoundNetLog())); |
| } |
| |
| private: |
| const base::WeakPtr<SpdySession> session_; |
| }; |
| |
| // Create another stream in response to a stream being reset. Nothing |
| // should blow up. This is a regression test for |
| // http://crbug.com/263690 . |
| TEST_P(SpdySessionTest, CreateStreamOnStreamReset) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, MEDIUM, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| }; |
| |
| scoped_ptr<SpdyFrame> rst( |
| spdy_util_.ConstructSpdyRstStream(1, RST_STREAM_REFUSED_STREAM)); |
| MockRead reads[] = { |
| CreateMockRead(*rst, 1), |
| MockRead(ASYNC, 0, 2) // EOF |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream->stream_id()); |
| |
| StreamCreatingDelegate delegate(spdy_stream, session); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream->HasUrlFromHeaders()); |
| |
| EXPECT_EQ(0u, spdy_stream->stream_id()); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(1u, spdy_stream->stream_id()); |
| |
| // Cause the stream to be reset, which should cause another stream |
| // to be created. |
| data.RunFor(1); |
| |
| EXPECT_EQ(NULL, spdy_stream.get()); |
| EXPECT_TRUE(delegate.StreamIsClosed()); |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| } |
| |
| // The tests below are only for SPDY/3 and above. |
| |
| TEST_P(SpdySessionTest, UpdateStreamsSendWindowSize) { |
| if (GetParam() < kProtoSPDY3) |
| return; |
| |
| // Set SETTINGS_INITIAL_WINDOW_SIZE to a small number so that WINDOW_UPDATE |
| // gets sent. |
| SettingsMap new_settings; |
| int32 window_size = 1; |
| new_settings[SETTINGS_INITIAL_WINDOW_SIZE] = |
| SettingsFlagsAndValue(SETTINGS_FLAG_NONE, window_size); |
| |
| // Set up the socket so we read a SETTINGS frame that sets |
| // INITIAL_WINDOW_SIZE. |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> settings_frame( |
| spdy_util_.ConstructSpdySettings(new_settings)); |
| MockRead reads[] = { |
| CreateMockRead(*settings_frame, 0), |
| MockRead(ASYNC, 0, 1) // EOF |
| }; |
| |
| scoped_ptr<SpdyFrame> settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| MockWrite writes[] = { |
| CreateMockWrite(*settings_ack, 2), |
| }; |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| base::WeakPtr<SpdyStream> spdy_stream1 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| TestCompletionCallback callback1; |
| EXPECT_NE(spdy_stream1->send_window_size(), window_size); |
| |
| data.RunFor(1); // Process the SETTINGS frame, but not the EOF |
| base::MessageLoop::current()->RunUntilIdle(); |
| EXPECT_EQ(session->stream_initial_send_window_size(), window_size); |
| EXPECT_EQ(spdy_stream1->send_window_size(), window_size); |
| |
| // Release the first one, this will allow the second to be created. |
| spdy_stream1->Cancel(); |
| EXPECT_EQ(NULL, spdy_stream1.get()); |
| |
| base::WeakPtr<SpdyStream> spdy_stream2 = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, test_url_, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream2.get() != NULL); |
| EXPECT_EQ(spdy_stream2->send_window_size(), window_size); |
| spdy_stream2->Cancel(); |
| EXPECT_EQ(NULL, spdy_stream2.get()); |
| } |
| |
| // The tests below are only for SPDY/3.1 and above. |
| |
| // SpdySession::{Increase,Decrease}RecvWindowSize should properly |
| // adjust the session receive window size for SPDY 3.1 and higher. In |
| // addition, SpdySession::IncreaseRecvWindowSize should trigger |
| // sending a WINDOW_UPDATE frame for a large enough delta. |
| TEST_P(SpdySessionTest, AdjustRecvWindowSize) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| const int32 delta_window_size = 100; |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 1) // EOF |
| }; |
| scoped_ptr<SpdyFrame> window_update( |
| spdy_util_.ConstructSpdyWindowUpdate( |
| kSessionFlowControlStreamId, |
| kSpdySessionInitialWindowSize + delta_window_size)); |
| MockWrite writes[] = { |
| CreateMockWrite(*window_update, 0), |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM_AND_SESSION, |
| session->flow_control_state()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| session->IncreaseRecvWindowSize(delta_window_size); |
| EXPECT_EQ(kSpdySessionInitialWindowSize + delta_window_size, |
| session->session_recv_window_size_); |
| EXPECT_EQ(delta_window_size, session->session_unacked_recv_window_bytes_); |
| |
| // Should trigger sending a WINDOW_UPDATE frame. |
| session->IncreaseRecvWindowSize(kSpdySessionInitialWindowSize); |
| EXPECT_EQ(kSpdySessionInitialWindowSize + delta_window_size + |
| kSpdySessionInitialWindowSize, |
| session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(1); |
| |
| // DecreaseRecvWindowSize() expects |in_io_loop_| to be true. |
| session->in_io_loop_ = true; |
| session->DecreaseRecvWindowSize( |
| kSpdySessionInitialWindowSize + delta_window_size + |
| kSpdySessionInitialWindowSize); |
| session->in_io_loop_ = false; |
| EXPECT_EQ(0, session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| } |
| |
| // SpdySession::{Increase,Decrease}SendWindowSize should properly |
| // adjust the session send window size when the "enable_spdy_31" flag |
| // is set. |
| TEST_P(SpdySessionTest, AdjustSendWindowSize) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, 0, 0) // EOF |
| }; |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateFakeSpdySession(spdy_session_pool_, key_); |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM_AND_SESSION, |
| session->flow_control_state()); |
| |
| const int32 delta_window_size = 100; |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| |
| session->IncreaseSendWindowSize(delta_window_size); |
| EXPECT_EQ(kSpdySessionInitialWindowSize + delta_window_size, |
| session->session_send_window_size_); |
| |
| session->DecreaseSendWindowSize(delta_window_size); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| } |
| |
| // Incoming data for an inactive stream should not cause the session |
| // receive window size to decrease, but it should cause the unacked |
| // bytes to increase. |
| TEST_P(SpdySessionTest, SessionFlowControlInactiveStream) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| scoped_ptr<SpdyFrame> resp(spdy_util_.ConstructSpdyBodyFrame(1, false)); |
| MockRead reads[] = { |
| CreateMockRead(*resp, 0), |
| MockRead(ASYNC, 0, 1) // EOF |
| }; |
| DeterministicSocketData data(reads, arraysize(reads), NULL, 0); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM_AND_SESSION, |
| session->flow_control_state()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(kUploadDataSize, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(1); |
| } |
| |
| // A delegate that drops any received data. |
| class DropReceivedDataDelegate : public test::StreamDelegateSendImmediate { |
| public: |
| DropReceivedDataDelegate(const base::WeakPtr<SpdyStream>& stream, |
| base::StringPiece data) |
| : StreamDelegateSendImmediate(stream, data) {} |
| |
| virtual ~DropReceivedDataDelegate() {} |
| |
| // Drop any received data. |
| virtual void OnDataReceived(scoped_ptr<SpdyBuffer> buffer) override {} |
| }; |
| |
| // Send data back and forth but use a delegate that drops its received |
| // data. The receive window should still increase to its original |
| // value, i.e. we shouldn't "leak" receive window bytes. |
| TEST_P(SpdySessionTest, SessionFlowControlNoReceiveLeaks) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| const char kStreamUrl[] = "http://www.google.com/"; |
| |
| const int32 msg_data_size = 100; |
| const std::string msg_data(msg_data_size, 'a'); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 1, msg_data_size, MEDIUM, NULL, 0)); |
| scoped_ptr<SpdyFrame> msg( |
| spdy_util_.ConstructSpdyBodyFrame( |
| 1, msg_data.data(), msg_data_size, false)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| CreateMockWrite(*msg, 2), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> echo( |
| spdy_util_.ConstructSpdyBodyFrame( |
| 1, msg_data.data(), msg_data_size, false)); |
| scoped_ptr<SpdyFrame> window_update( |
| spdy_util_.ConstructSpdyWindowUpdate( |
| kSessionFlowControlStreamId, msg_data_size)); |
| MockRead reads[] = { |
| CreateMockRead(*resp, 1), |
| CreateMockRead(*echo, 3), |
| MockRead(ASYNC, 0, 4) // EOF |
| }; |
| |
| // Create SpdySession and SpdyStream and send the request. |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kStreamUrl); |
| base::WeakPtr<SpdyStream> stream = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(stream.get() != NULL); |
| EXPECT_EQ(0u, stream->stream_id()); |
| |
| DropReceivedDataDelegate delegate(stream, msg_data); |
| stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructPostHeaderBlock(url.spec(), msg_data_size)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream->SendRequestHeaders(headers.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream->HasUrlFromHeaders()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(4); |
| |
| EXPECT_TRUE(data.at_write_eof()); |
| EXPECT_TRUE(data.at_read_eof()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(msg_data_size, session->session_unacked_recv_window_bytes_); |
| |
| stream->Close(); |
| EXPECT_EQ(NULL, stream.get()); |
| |
| EXPECT_EQ(OK, delegate.WaitForClose()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(msg_data_size, session->session_unacked_recv_window_bytes_); |
| } |
| |
| // Send data back and forth but close the stream before its data frame |
| // can be written to the socket. The send window should then increase |
| // to its original value, i.e. we shouldn't "leak" send window bytes. |
| TEST_P(SpdySessionTest, SessionFlowControlNoSendLeaks) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| const char kStreamUrl[] = "http://www.google.com/"; |
| |
| const int32 msg_data_size = 100; |
| const std::string msg_data(msg_data_size, 'a'); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 1, msg_data_size, MEDIUM, NULL, 0)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| MockRead reads[] = { |
| CreateMockRead(*resp, 1), |
| MockRead(ASYNC, 0, 2) // EOF |
| }; |
| |
| // Create SpdySession and SpdyStream and send the request. |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kStreamUrl); |
| base::WeakPtr<SpdyStream> stream = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(stream.get() != NULL); |
| EXPECT_EQ(0u, stream->stream_id()); |
| |
| test::StreamDelegateSendImmediate delegate(stream, msg_data); |
| stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructPostHeaderBlock(url.spec(), msg_data_size)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream->SendRequestHeaders(headers.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream->HasUrlFromHeaders()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| |
| data.RunFor(1); |
| |
| EXPECT_TRUE(data.at_write_eof()); |
| EXPECT_TRUE(data.at_read_eof()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize - msg_data_size, |
| session->session_send_window_size_); |
| |
| // Closing the stream should increase the session's send window. |
| stream->Close(); |
| EXPECT_EQ(NULL, stream.get()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| |
| EXPECT_EQ(OK, delegate.WaitForClose()); |
| } |
| |
| // Send data back and forth; the send and receive windows should |
| // change appropriately. |
| TEST_P(SpdySessionTest, SessionFlowControlEndToEnd) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| const char kStreamUrl[] = "http://www.google.com/"; |
| |
| const int32 msg_data_size = 100; |
| const std::string msg_data(msg_data_size, 'a'); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 1, msg_data_size, MEDIUM, NULL, 0)); |
| scoped_ptr<SpdyFrame> msg( |
| spdy_util_.ConstructSpdyBodyFrame( |
| 1, msg_data.data(), msg_data_size, false)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| CreateMockWrite(*msg, 2), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> echo( |
| spdy_util_.ConstructSpdyBodyFrame( |
| 1, msg_data.data(), msg_data_size, false)); |
| scoped_ptr<SpdyFrame> window_update( |
| spdy_util_.ConstructSpdyWindowUpdate( |
| kSessionFlowControlStreamId, msg_data_size)); |
| MockRead reads[] = { |
| CreateMockRead(*resp, 1), |
| CreateMockRead(*echo, 3), |
| CreateMockRead(*window_update, 4), |
| MockRead(ASYNC, 0, 5) // EOF |
| }; |
| |
| // Create SpdySession and SpdyStream and send the request. |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kStreamUrl); |
| base::WeakPtr<SpdyStream> stream = |
| CreateStreamSynchronously(SPDY_BIDIRECTIONAL_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(stream.get() != NULL); |
| EXPECT_EQ(0u, stream->stream_id()); |
| |
| test::StreamDelegateSendImmediate delegate(stream, msg_data); |
| stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructPostHeaderBlock(url.spec(), msg_data_size)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream->SendRequestHeaders(headers.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream->HasUrlFromHeaders()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize - msg_data_size, |
| session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize - msg_data_size, |
| session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize - msg_data_size, |
| session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize - msg_data_size, |
| session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| data.RunFor(1); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize - msg_data_size, |
| session->session_recv_window_size_); |
| EXPECT_EQ(0, session->session_unacked_recv_window_bytes_); |
| |
| EXPECT_TRUE(data.at_write_eof()); |
| EXPECT_TRUE(data.at_read_eof()); |
| |
| EXPECT_EQ(msg_data, delegate.TakeReceivedData()); |
| |
| // Draining the delegate's read queue should increase the session's |
| // receive window. |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(msg_data_size, session->session_unacked_recv_window_bytes_); |
| |
| stream->Close(); |
| EXPECT_EQ(NULL, stream.get()); |
| |
| EXPECT_EQ(OK, delegate.WaitForClose()); |
| |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_send_window_size_); |
| EXPECT_EQ(kSpdySessionInitialWindowSize, session->session_recv_window_size_); |
| EXPECT_EQ(msg_data_size, session->session_unacked_recv_window_bytes_); |
| } |
| |
| // Given a stall function and an unstall function, runs a test to make |
| // sure that a stream resumes after unstall. |
| void SpdySessionTest::RunResumeAfterUnstallTest( |
| const base::Callback<void(SpdySession*, SpdyStream*)>& stall_function, |
| const base::Callback<void(SpdySession*, SpdyStream*, int32)>& |
| unstall_function) { |
| const char kStreamUrl[] = "http://www.google.com/"; |
| GURL url(kStreamUrl); |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 1, kBodyDataSize, LOWEST, NULL, 0)); |
| scoped_ptr<SpdyFrame> body( |
| spdy_util_.ConstructSpdyBodyFrame(1, kBodyData, kBodyDataSize, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), |
| CreateMockWrite(*body, 1), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp( |
| spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> echo( |
| spdy_util_.ConstructSpdyBodyFrame(1, kBodyData, kBodyDataSize, false)); |
| MockRead reads[] = { |
| CreateMockRead(*resp, 2), |
| MockRead(ASYNC, 0, 0, 3), // EOF |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM_AND_SESSION, |
| session->flow_control_state()); |
| |
| base::WeakPtr<SpdyStream> stream = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(stream.get() != NULL); |
| |
| test::StreamDelegateWithBody delegate(stream, kBodyDataStringPiece); |
| stream->SetDelegate(&delegate); |
| |
| EXPECT_FALSE(stream->HasUrlFromHeaders()); |
| EXPECT_FALSE(stream->send_stalled_by_flow_control()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructPostHeaderBlock(kStreamUrl, kBodyDataSize)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream->SendRequestHeaders(headers.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream->HasUrlFromHeaders()); |
| EXPECT_EQ(kStreamUrl, stream->GetUrlFromHeaders().spec()); |
| |
| stall_function.Run(session.get(), stream.get()); |
| |
| data.RunFor(1); |
| |
| EXPECT_TRUE(stream->send_stalled_by_flow_control()); |
| |
| unstall_function.Run(session.get(), stream.get(), kBodyDataSize); |
| |
| EXPECT_FALSE(stream->send_stalled_by_flow_control()); |
| |
| data.RunFor(3); |
| |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, delegate.WaitForClose()); |
| |
| EXPECT_TRUE(delegate.send_headers_completed()); |
| EXPECT_EQ("200", delegate.GetResponseHeaderValue(":status")); |
| EXPECT_EQ(std::string(), delegate.TakeReceivedData()); |
| EXPECT_TRUE(data.at_write_eof()); |
| } |
| |
| // Run the resume-after-unstall test with all possible stall and |
| // unstall sequences. |
| |
| TEST_P(SpdySessionTest, ResumeAfterUnstallSession) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| RunResumeAfterUnstallTest( |
| base::Bind(&SpdySessionTest::StallSessionOnly, |
| base::Unretained(this)), |
| base::Bind(&SpdySessionTest::UnstallSessionOnly, |
| base::Unretained(this))); |
| } |
| |
| // Equivalent to |
| // SpdyStreamTest.ResumeAfterSendWindowSizeIncrease. |
| TEST_P(SpdySessionTest, ResumeAfterUnstallStream) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| RunResumeAfterUnstallTest( |
| base::Bind(&SpdySessionTest::StallStreamOnly, |
| base::Unretained(this)), |
| base::Bind(&SpdySessionTest::UnstallStreamOnly, |
| base::Unretained(this))); |
| } |
| |
| TEST_P(SpdySessionTest, StallSessionStreamResumeAfterUnstallSessionStream) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| RunResumeAfterUnstallTest( |
| base::Bind(&SpdySessionTest::StallSessionStream, |
| base::Unretained(this)), |
| base::Bind(&SpdySessionTest::UnstallSessionStream, |
| base::Unretained(this))); |
| } |
| |
| TEST_P(SpdySessionTest, StallStreamSessionResumeAfterUnstallSessionStream) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| RunResumeAfterUnstallTest( |
| base::Bind(&SpdySessionTest::StallStreamSession, |
| base::Unretained(this)), |
| base::Bind(&SpdySessionTest::UnstallSessionStream, |
| base::Unretained(this))); |
| } |
| |
| TEST_P(SpdySessionTest, StallStreamSessionResumeAfterUnstallStreamSession) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| RunResumeAfterUnstallTest( |
| base::Bind(&SpdySessionTest::StallStreamSession, |
| base::Unretained(this)), |
| base::Bind(&SpdySessionTest::UnstallStreamSession, |
| base::Unretained(this))); |
| } |
| |
| TEST_P(SpdySessionTest, StallSessionStreamResumeAfterUnstallStreamSession) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| RunResumeAfterUnstallTest( |
| base::Bind(&SpdySessionTest::StallSessionStream, |
| base::Unretained(this)), |
| base::Bind(&SpdySessionTest::UnstallStreamSession, |
| base::Unretained(this))); |
| } |
| |
| // Cause a stall by reducing the flow control send window to 0. The |
| // streams should resume in priority order when that window is then |
| // increased. |
| TEST_P(SpdySessionTest, ResumeByPriorityAfterSendWindowSizeIncrease) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| const char kStreamUrl[] = "http://www.google.com/"; |
| GURL url(kStreamUrl); |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 1, kBodyDataSize, LOWEST, NULL, 0)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 3, kBodyDataSize, MEDIUM, NULL, 0)); |
| scoped_ptr<SpdyFrame> body1( |
| spdy_util_.ConstructSpdyBodyFrame(1, kBodyData, kBodyDataSize, true)); |
| scoped_ptr<SpdyFrame> body2( |
| spdy_util_.ConstructSpdyBodyFrame(3, kBodyData, kBodyDataSize, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| CreateMockWrite(*req2, 1), |
| CreateMockWrite(*body2, 2), |
| CreateMockWrite(*body1, 3), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp1(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> resp2(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 3)); |
| MockRead reads[] = { |
| CreateMockRead(*resp1, 4), |
| CreateMockRead(*resp2, 5), |
| MockRead(ASYNC, 0, 0, 6), // EOF |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM_AND_SESSION, |
| session->flow_control_state()); |
| |
| base::WeakPtr<SpdyStream> stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(stream1.get() != NULL); |
| |
| test::StreamDelegateWithBody delegate1(stream1, kBodyDataStringPiece); |
| stream1->SetDelegate(&delegate1); |
| |
| EXPECT_FALSE(stream1->HasUrlFromHeaders()); |
| |
| base::WeakPtr<SpdyStream> stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, MEDIUM, BoundNetLog()); |
| ASSERT_TRUE(stream2.get() != NULL); |
| |
| test::StreamDelegateWithBody delegate2(stream2, kBodyDataStringPiece); |
| stream2->SetDelegate(&delegate2); |
| |
| EXPECT_FALSE(stream2->HasUrlFromHeaders()); |
| |
| EXPECT_FALSE(stream1->send_stalled_by_flow_control()); |
| EXPECT_FALSE(stream2->send_stalled_by_flow_control()); |
| |
| StallSessionSend(session.get()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers1( |
| spdy_util_.ConstructPostHeaderBlock(kStreamUrl, kBodyDataSize)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream1->SendRequestHeaders(headers1.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream1->HasUrlFromHeaders()); |
| EXPECT_EQ(kStreamUrl, stream1->GetUrlFromHeaders().spec()); |
| |
| data.RunFor(1); |
| EXPECT_EQ(1u, stream1->stream_id()); |
| EXPECT_TRUE(stream1->send_stalled_by_flow_control()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructPostHeaderBlock(kStreamUrl, kBodyDataSize)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream2->SendRequestHeaders(headers2.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream2->HasUrlFromHeaders()); |
| EXPECT_EQ(kStreamUrl, stream2->GetUrlFromHeaders().spec()); |
| |
| data.RunFor(1); |
| EXPECT_EQ(3u, stream2->stream_id()); |
| EXPECT_TRUE(stream2->send_stalled_by_flow_control()); |
| |
| // This should unstall only stream2. |
| UnstallSessionSend(session.get(), kBodyDataSize); |
| |
| EXPECT_TRUE(stream1->send_stalled_by_flow_control()); |
| EXPECT_FALSE(stream2->send_stalled_by_flow_control()); |
| |
| data.RunFor(1); |
| |
| EXPECT_TRUE(stream1->send_stalled_by_flow_control()); |
| EXPECT_FALSE(stream2->send_stalled_by_flow_control()); |
| |
| // This should then unstall stream1. |
| UnstallSessionSend(session.get(), kBodyDataSize); |
| |
| EXPECT_FALSE(stream1->send_stalled_by_flow_control()); |
| EXPECT_FALSE(stream2->send_stalled_by_flow_control()); |
| |
| data.RunFor(4); |
| |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, delegate1.WaitForClose()); |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, delegate2.WaitForClose()); |
| |
| EXPECT_TRUE(delegate1.send_headers_completed()); |
| EXPECT_EQ("200", delegate1.GetResponseHeaderValue(":status")); |
| EXPECT_EQ(std::string(), delegate1.TakeReceivedData()); |
| |
| EXPECT_TRUE(delegate2.send_headers_completed()); |
| EXPECT_EQ("200", delegate2.GetResponseHeaderValue(":status")); |
| EXPECT_EQ(std::string(), delegate2.TakeReceivedData()); |
| |
| EXPECT_TRUE(data.at_write_eof()); |
| } |
| |
| // Delegate that closes a given stream after sending its body. |
| class StreamClosingDelegate : public test::StreamDelegateWithBody { |
| public: |
| StreamClosingDelegate(const base::WeakPtr<SpdyStream>& stream, |
| base::StringPiece data) |
| : StreamDelegateWithBody(stream, data) {} |
| |
| virtual ~StreamClosingDelegate() {} |
| |
| void set_stream_to_close(const base::WeakPtr<SpdyStream>& stream_to_close) { |
| stream_to_close_ = stream_to_close; |
| } |
| |
| virtual void OnDataSent() override { |
| test::StreamDelegateWithBody::OnDataSent(); |
| if (stream_to_close_.get()) { |
| stream_to_close_->Close(); |
| EXPECT_EQ(NULL, stream_to_close_.get()); |
| } |
| } |
| |
| private: |
| base::WeakPtr<SpdyStream> stream_to_close_; |
| }; |
| |
| // Cause a stall by reducing the flow control send window to |
| // 0. Unstalling the session should properly handle deleted streams. |
| TEST_P(SpdySessionTest, SendWindowSizeIncreaseWithDeletedStreams) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| const char kStreamUrl[] = "http://www.google.com/"; |
| GURL url(kStreamUrl); |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 1, kBodyDataSize, LOWEST, NULL, 0)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 3, kBodyDataSize, LOWEST, NULL, 0)); |
| scoped_ptr<SpdyFrame> req3( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 5, kBodyDataSize, LOWEST, NULL, 0)); |
| scoped_ptr<SpdyFrame> body2( |
| spdy_util_.ConstructSpdyBodyFrame(3, kBodyData, kBodyDataSize, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| CreateMockWrite(*req2, 1), |
| CreateMockWrite(*req3, 2), |
| CreateMockWrite(*body2, 3), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp2(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 3)); |
| MockRead reads[] = { |
| CreateMockRead(*resp2, 4), |
| MockRead(ASYNC, 0, 0, 5), // EOF |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM_AND_SESSION, |
| session->flow_control_state()); |
| |
| base::WeakPtr<SpdyStream> stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(stream1.get() != NULL); |
| |
| test::StreamDelegateWithBody delegate1(stream1, kBodyDataStringPiece); |
| stream1->SetDelegate(&delegate1); |
| |
| EXPECT_FALSE(stream1->HasUrlFromHeaders()); |
| |
| base::WeakPtr<SpdyStream> stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(stream2.get() != NULL); |
| |
| StreamClosingDelegate delegate2(stream2, kBodyDataStringPiece); |
| stream2->SetDelegate(&delegate2); |
| |
| EXPECT_FALSE(stream2->HasUrlFromHeaders()); |
| |
| base::WeakPtr<SpdyStream> stream3 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(stream3.get() != NULL); |
| |
| test::StreamDelegateWithBody delegate3(stream3, kBodyDataStringPiece); |
| stream3->SetDelegate(&delegate3); |
| |
| EXPECT_FALSE(stream3->HasUrlFromHeaders()); |
| |
| EXPECT_FALSE(stream1->send_stalled_by_flow_control()); |
| EXPECT_FALSE(stream2->send_stalled_by_flow_control()); |
| EXPECT_FALSE(stream3->send_stalled_by_flow_control()); |
| |
| StallSessionSend(session.get()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers1( |
| spdy_util_.ConstructPostHeaderBlock(kStreamUrl, kBodyDataSize)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream1->SendRequestHeaders(headers1.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream1->HasUrlFromHeaders()); |
| EXPECT_EQ(kStreamUrl, stream1->GetUrlFromHeaders().spec()); |
| |
| data.RunFor(1); |
| EXPECT_EQ(1u, stream1->stream_id()); |
| EXPECT_TRUE(stream1->send_stalled_by_flow_control()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructPostHeaderBlock(kStreamUrl, kBodyDataSize)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream2->SendRequestHeaders(headers2.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream2->HasUrlFromHeaders()); |
| EXPECT_EQ(kStreamUrl, stream2->GetUrlFromHeaders().spec()); |
| |
| data.RunFor(1); |
| EXPECT_EQ(3u, stream2->stream_id()); |
| EXPECT_TRUE(stream2->send_stalled_by_flow_control()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers3( |
| spdy_util_.ConstructPostHeaderBlock(kStreamUrl, kBodyDataSize)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream3->SendRequestHeaders(headers3.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream3->HasUrlFromHeaders()); |
| EXPECT_EQ(kStreamUrl, stream3->GetUrlFromHeaders().spec()); |
| |
| data.RunFor(1); |
| EXPECT_EQ(5u, stream3->stream_id()); |
| EXPECT_TRUE(stream3->send_stalled_by_flow_control()); |
| |
| SpdyStreamId stream_id1 = stream1->stream_id(); |
| SpdyStreamId stream_id2 = stream2->stream_id(); |
| SpdyStreamId stream_id3 = stream3->stream_id(); |
| |
| // Close stream1 preemptively. |
| session->CloseActiveStream(stream_id1, ERR_CONNECTION_CLOSED); |
| EXPECT_EQ(NULL, stream1.get()); |
| |
| EXPECT_FALSE(session->IsStreamActive(stream_id1)); |
| EXPECT_TRUE(session->IsStreamActive(stream_id2)); |
| EXPECT_TRUE(session->IsStreamActive(stream_id3)); |
| |
| // Unstall stream2, which should then close stream3. |
| delegate2.set_stream_to_close(stream3); |
| UnstallSessionSend(session.get(), kBodyDataSize); |
| |
| data.RunFor(1); |
| EXPECT_EQ(NULL, stream3.get()); |
| |
| EXPECT_FALSE(stream2->send_stalled_by_flow_control()); |
| EXPECT_FALSE(session->IsStreamActive(stream_id1)); |
| EXPECT_TRUE(session->IsStreamActive(stream_id2)); |
| EXPECT_FALSE(session->IsStreamActive(stream_id3)); |
| |
| data.RunFor(2); |
| EXPECT_EQ(NULL, stream2.get()); |
| |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, delegate1.WaitForClose()); |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, delegate2.WaitForClose()); |
| EXPECT_EQ(OK, delegate3.WaitForClose()); |
| |
| EXPECT_TRUE(delegate1.send_headers_completed()); |
| EXPECT_EQ(std::string(), delegate1.TakeReceivedData()); |
| |
| EXPECT_TRUE(delegate2.send_headers_completed()); |
| EXPECT_EQ("200", delegate2.GetResponseHeaderValue(":status")); |
| EXPECT_EQ(std::string(), delegate2.TakeReceivedData()); |
| |
| EXPECT_TRUE(delegate3.send_headers_completed()); |
| EXPECT_EQ(std::string(), delegate3.TakeReceivedData()); |
| |
| EXPECT_TRUE(data.at_write_eof()); |
| } |
| |
| // Cause a stall by reducing the flow control send window to |
| // 0. Unstalling the session should properly handle the session itself |
| // being closed. |
| TEST_P(SpdySessionTest, SendWindowSizeIncreaseWithDeletedSession) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| const char kStreamUrl[] = "http://www.google.com/"; |
| GURL url(kStreamUrl); |
| |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| scoped_ptr<SpdyFrame> req1( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 1, kBodyDataSize, LOWEST, NULL, 0)); |
| scoped_ptr<SpdyFrame> req2( |
| spdy_util_.ConstructSpdyPost( |
| kStreamUrl, 3, kBodyDataSize, LOWEST, NULL, 0)); |
| scoped_ptr<SpdyFrame> body1( |
| spdy_util_.ConstructSpdyBodyFrame(1, kBodyData, kBodyDataSize, false)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req1, 0), |
| CreateMockWrite(*req2, 1), |
| }; |
| |
| MockRead reads[] = { |
| MockRead(ASYNC, 0, 0, 2), // EOF |
| }; |
| |
| DeterministicSocketData data(reads, arraysize(reads), |
| writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| EXPECT_EQ(SpdySession::FLOW_CONTROL_STREAM_AND_SESSION, |
| session->flow_control_state()); |
| |
| base::WeakPtr<SpdyStream> stream1 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(stream1.get() != NULL); |
| |
| test::StreamDelegateWithBody delegate1(stream1, kBodyDataStringPiece); |
| stream1->SetDelegate(&delegate1); |
| |
| EXPECT_FALSE(stream1->HasUrlFromHeaders()); |
| |
| base::WeakPtr<SpdyStream> stream2 = |
| CreateStreamSynchronously(SPDY_REQUEST_RESPONSE_STREAM, |
| session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(stream2.get() != NULL); |
| |
| test::StreamDelegateWithBody delegate2(stream2, kBodyDataStringPiece); |
| stream2->SetDelegate(&delegate2); |
| |
| EXPECT_FALSE(stream2->HasUrlFromHeaders()); |
| |
| EXPECT_FALSE(stream1->send_stalled_by_flow_control()); |
| EXPECT_FALSE(stream2->send_stalled_by_flow_control()); |
| |
| StallSessionSend(session.get()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers1( |
| spdy_util_.ConstructPostHeaderBlock(kStreamUrl, kBodyDataSize)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream1->SendRequestHeaders(headers1.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream1->HasUrlFromHeaders()); |
| EXPECT_EQ(kStreamUrl, stream1->GetUrlFromHeaders().spec()); |
| |
| data.RunFor(1); |
| EXPECT_EQ(1u, stream1->stream_id()); |
| EXPECT_TRUE(stream1->send_stalled_by_flow_control()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers2( |
| spdy_util_.ConstructPostHeaderBlock(kStreamUrl, kBodyDataSize)); |
| EXPECT_EQ(ERR_IO_PENDING, |
| stream2->SendRequestHeaders(headers2.Pass(), MORE_DATA_TO_SEND)); |
| EXPECT_TRUE(stream2->HasUrlFromHeaders()); |
| EXPECT_EQ(kStreamUrl, stream2->GetUrlFromHeaders().spec()); |
| |
| data.RunFor(1); |
| EXPECT_EQ(3u, stream2->stream_id()); |
| EXPECT_TRUE(stream2->send_stalled_by_flow_control()); |
| |
| EXPECT_TRUE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| // Unstall stream1. |
| UnstallSessionSend(session.get(), kBodyDataSize); |
| |
| // Close the session (since we can't do it from within the delegate |
| // method, since it's in the stream's loop). |
| session->CloseSessionOnError(ERR_CONNECTION_CLOSED, "Closing session"); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(session == NULL); |
| |
| EXPECT_FALSE(HasSpdySession(spdy_session_pool_, key_)); |
| |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, delegate1.WaitForClose()); |
| EXPECT_EQ(ERR_CONNECTION_CLOSED, delegate2.WaitForClose()); |
| |
| EXPECT_TRUE(delegate1.send_headers_completed()); |
| EXPECT_EQ(std::string(), delegate1.TakeReceivedData()); |
| |
| EXPECT_TRUE(delegate2.send_headers_completed()); |
| EXPECT_EQ(std::string(), delegate2.TakeReceivedData()); |
| |
| EXPECT_TRUE(data.at_write_eof()); |
| } |
| |
| TEST_P(SpdySessionTest, GoAwayOnSessionFlowControlError) { |
| if (GetParam() < kProtoSPDY31) |
| return; |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| scoped_ptr<SpdyFrame> goaway(spdy_util_.ConstructSpdyGoAway( |
| 0, |
| GOAWAY_FLOW_CONTROL_ERROR, |
| "delta_window_size is 6 in DecreaseRecvWindowSize, which is larger than " |
| "the receive window size of 1")); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), CreateMockWrite(*goaway, 3), |
| }; |
| |
| scoped_ptr<SpdyFrame> resp(spdy_util_.ConstructSpdyGetSynReply(NULL, 0, 1)); |
| scoped_ptr<SpdyFrame> body(spdy_util_.ConstructSpdyBodyFrame(1, true)); |
| MockRead reads[] = { |
| CreateMockRead(*resp, 1), CreateMockRead(*body, 2), |
| }; |
| |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream.get() != NULL); |
| test::StreamDelegateDoNothing delegate(spdy_stream); |
| spdy_stream->SetDelegate(&delegate); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url.spec())); |
| spdy_stream->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| |
| data.RunFor(1); // Write request. |
| |
| // Put session on the edge of overflowing it's recv window. |
| session->session_recv_window_size_ = 1; |
| |
| // Read response headers & body. Body overflows the session window, and a |
| // goaway is written. |
| data.RunFor(3); |
| base::MessageLoop::current()->RunUntilIdle(); |
| |
| EXPECT_EQ(ERR_SPDY_FLOW_CONTROL_ERROR, delegate.WaitForClose()); |
| EXPECT_TRUE(session == NULL); |
| } |
| |
| TEST_P(SpdySessionTest, SplitHeaders) { |
| GURL kStreamUrl("http://www.google.com/foo.dat"); |
| SpdyHeaderBlock headers; |
| spdy_util_.AddUrlToHeaderBlock(kStreamUrl.spec(), &headers); |
| headers["alpha"] = "beta"; |
| |
| SpdyHeaderBlock request_headers; |
| SpdyHeaderBlock response_headers; |
| |
| SplitPushedHeadersToRequestAndResponse( |
| headers, spdy_util_.spdy_version(), &request_headers, &response_headers); |
| |
| SpdyHeaderBlock::const_iterator it = response_headers.find("alpha"); |
| std::string alpha_val = |
| (it == response_headers.end()) ? std::string() : it->second; |
| EXPECT_EQ("beta", alpha_val); |
| |
| GURL request_url = |
| GetUrlFromHeaderBlock(request_headers, spdy_util_.spdy_version(), true); |
| EXPECT_EQ(kStreamUrl, request_url); |
| } |
| |
| // Regression. Sorta. Push streams and client streams were sharing a single |
| // limit for a long time. |
| TEST_P(SpdySessionTest, PushedStreamShouldNotCountToClientConcurrencyLimit) { |
| SettingsMap new_settings; |
| new_settings[SETTINGS_MAX_CONCURRENT_STREAMS] = |
| SettingsFlagsAndValue(SETTINGS_FLAG_NONE, 2); |
| scoped_ptr<SpdyFrame> settings_frame( |
| spdy_util_.ConstructSpdySettings(new_settings)); |
| scoped_ptr<SpdyFrame> pushed(spdy_util_.ConstructSpdyPush( |
| NULL, 0, 2, 1, "http://www.google.com/a.dat")); |
| MockRead reads[] = { |
| CreateMockRead(*settings_frame), CreateMockRead(*pushed, 3), |
| MockRead(ASYNC, 0, 4), |
| }; |
| |
| scoped_ptr<SpdyFrame> settings_ack(spdy_util_.ConstructSpdySettingsAck()); |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| MockWrite writes[] = { |
| CreateMockWrite(*settings_ack, 1), CreateMockWrite(*req, 2), |
| }; |
| |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| // Read the settings frame. |
| data.RunFor(1); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url1, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Run until 1st stream is activated. |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| data.RunFor(2); |
| EXPECT_EQ(1u, delegate1.stream_id()); |
| EXPECT_EQ(1u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| // Run until pushed stream is created. |
| data.RunFor(1); |
| EXPECT_EQ(2u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->num_pushed_streams()); |
| EXPECT_EQ(1u, session->num_active_pushed_streams()); |
| |
| // Second stream should not be stalled, although we have 2 active streams, but |
| // one of them is push stream and should not be taken into account when we |
| // create streams on the client. |
| base::WeakPtr<SpdyStream> spdy_stream2 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url1, LOWEST, BoundNetLog()); |
| EXPECT_TRUE(spdy_stream2.get() != NULL); |
| EXPECT_EQ(2u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->num_pushed_streams()); |
| EXPECT_EQ(1u, session->num_active_pushed_streams()); |
| |
| // Read EOF. |
| data.RunFor(1); |
| } |
| |
| TEST_P(SpdySessionTest, RejectPushedStreamExceedingConcurrencyLimit) { |
| scoped_ptr<SpdyFrame> push_a(spdy_util_.ConstructSpdyPush( |
| NULL, 0, 2, 1, "http://www.google.com/a.dat")); |
| scoped_ptr<SpdyFrame> push_b(spdy_util_.ConstructSpdyPush( |
| NULL, 0, 4, 1, "http://www.google.com/b.dat")); |
| MockRead reads[] = { |
| CreateMockRead(*push_a, 1), CreateMockRead(*push_b, 2), |
| MockRead(ASYNC, 0, 4), |
| }; |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| scoped_ptr<SpdyFrame> rst( |
| spdy_util_.ConstructSpdyRstStream(4, RST_STREAM_REFUSED_STREAM)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), CreateMockWrite(*rst, 3), |
| }; |
| |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| session->set_max_concurrent_pushed_streams(1); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url1, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Run until 1st stream is activated. |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| data.RunFor(1); |
| EXPECT_EQ(1u, delegate1.stream_id()); |
| EXPECT_EQ(1u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| // Run until pushed stream is created. |
| data.RunFor(1); |
| EXPECT_EQ(2u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->num_pushed_streams()); |
| EXPECT_EQ(1u, session->num_active_pushed_streams()); |
| |
| // Reset incoming pushed stream. |
| data.RunFor(2); |
| EXPECT_EQ(2u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->num_pushed_streams()); |
| EXPECT_EQ(1u, session->num_active_pushed_streams()); |
| |
| // Read EOF. |
| data.RunFor(1); |
| } |
| |
| TEST_P(SpdySessionTest, IgnoreReservedRemoteStreamsCount) { |
| // Streams in reserved remote state exist only in SPDY4. |
| if (spdy_util_.spdy_version() < SPDY4) |
| return; |
| |
| scoped_ptr<SpdyFrame> push_a(spdy_util_.ConstructSpdyPush( |
| NULL, 0, 2, 1, "http://www.google.com/a.dat")); |
| scoped_ptr<SpdyHeaderBlock> push_headers(new SpdyHeaderBlock); |
| spdy_util_.AddUrlToHeaderBlock("http://www.google.com/b.dat", |
| push_headers.get()); |
| scoped_ptr<SpdyFrame> push_b( |
| spdy_util_.ConstructInitialSpdyPushFrame(push_headers.Pass(), 4, 1)); |
| scoped_ptr<SpdyFrame> headers_b( |
| spdy_util_.ConstructSpdyPushHeaders(4, NULL, 0)); |
| MockRead reads[] = { |
| CreateMockRead(*push_a, 1), CreateMockRead(*push_b, 2), |
| CreateMockRead(*headers_b, 3), MockRead(ASYNC, 0, 5), |
| }; |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| scoped_ptr<SpdyFrame> rst( |
| spdy_util_.ConstructSpdyRstStream(4, RST_STREAM_REFUSED_STREAM)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), CreateMockWrite(*rst, 4), |
| }; |
| |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| session->set_max_concurrent_pushed_streams(1); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url1, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Run until 1st stream is activated. |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| data.RunFor(1); |
| EXPECT_EQ(1u, delegate1.stream_id()); |
| EXPECT_EQ(1u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| // Run until pushed stream is created. |
| data.RunFor(1); |
| EXPECT_EQ(2u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->num_pushed_streams()); |
| EXPECT_EQ(1u, session->num_active_pushed_streams()); |
| |
| // Accept promised stream. It should not count towards pushed stream limit. |
| data.RunFor(1); |
| EXPECT_EQ(3u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(2u, session->num_pushed_streams()); |
| EXPECT_EQ(1u, session->num_active_pushed_streams()); |
| |
| // Reset last pushed stream upon headers reception as it is going to be 2nd, |
| // while we accept only one. |
| data.RunFor(2); |
| EXPECT_EQ(2u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->num_pushed_streams()); |
| EXPECT_EQ(1u, session->num_active_pushed_streams()); |
| |
| // Read EOF. |
| data.RunFor(1); |
| } |
| |
| TEST_P(SpdySessionTest, CancelReservedStreamOnHeadersReceived) { |
| // Streams in reserved remote state exist only in SPDY4. |
| if (spdy_util_.spdy_version() < SPDY4) |
| return; |
| |
| const char kPushedUrl[] = "http://www.google.com/a.dat"; |
| scoped_ptr<SpdyHeaderBlock> push_headers(new SpdyHeaderBlock); |
| spdy_util_.AddUrlToHeaderBlock(kPushedUrl, push_headers.get()); |
| scoped_ptr<SpdyFrame> push_promise( |
| spdy_util_.ConstructInitialSpdyPushFrame(push_headers.Pass(), 2, 1)); |
| scoped_ptr<SpdyFrame> headers_frame( |
| spdy_util_.ConstructSpdyPushHeaders(2, NULL, 0)); |
| MockRead reads[] = { |
| CreateMockRead(*push_promise, 1), CreateMockRead(*headers_frame, 2), |
| MockRead(ASYNC, 0, 4), |
| }; |
| |
| scoped_ptr<SpdyFrame> req( |
| spdy_util_.ConstructSpdyGet(NULL, 0, false, 1, LOWEST, true)); |
| scoped_ptr<SpdyFrame> rst( |
| spdy_util_.ConstructSpdyRstStream(2, RST_STREAM_CANCEL)); |
| MockWrite writes[] = { |
| CreateMockWrite(*req, 0), CreateMockWrite(*rst, 3), |
| }; |
| |
| DeterministicSocketData data( |
| reads, arraysize(reads), writes, arraysize(writes)); |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.deterministic_socket_factory->AddSocketDataProvider(&data); |
| |
| CreateDeterministicNetworkSession(); |
| |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| GURL url1(kDefaultURL); |
| base::WeakPtr<SpdyStream> spdy_stream1 = CreateStreamSynchronously( |
| SPDY_REQUEST_RESPONSE_STREAM, session, url1, LOWEST, BoundNetLog()); |
| ASSERT_TRUE(spdy_stream1.get() != NULL); |
| EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| spdy_stream1->SetDelegate(&delegate1); |
| |
| EXPECT_EQ(0u, session->num_active_streams()); |
| EXPECT_EQ(1u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| scoped_ptr<SpdyHeaderBlock> headers( |
| spdy_util_.ConstructGetHeaderBlock(url1.spec())); |
| spdy_stream1->SendRequestHeaders(headers.Pass(), NO_MORE_DATA_TO_SEND); |
| EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| |
| // Run until 1st stream is activated. |
| EXPECT_EQ(0u, delegate1.stream_id()); |
| data.RunFor(1); |
| EXPECT_EQ(1u, delegate1.stream_id()); |
| EXPECT_EQ(1u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| // Run until pushed stream is created. |
| data.RunFor(1); |
| EXPECT_EQ(2u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(1u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| base::WeakPtr<SpdyStream> pushed_stream; |
| int rv = |
| session->GetPushStream(GURL(kPushedUrl), &pushed_stream, BoundNetLog()); |
| ASSERT_EQ(OK, rv); |
| ASSERT_TRUE(pushed_stream.get() != NULL); |
| test::StreamDelegateCloseOnHeaders delegate2(pushed_stream); |
| pushed_stream->SetDelegate(&delegate2); |
| |
| // Receive headers for pushed stream. Delegate will cancel the stream, ensure |
| // that all our counters are in consistent state. |
| data.RunFor(1); |
| EXPECT_EQ(1u, session->num_active_streams()); |
| EXPECT_EQ(0u, session->num_created_streams()); |
| EXPECT_EQ(0u, session->num_pushed_streams()); |
| EXPECT_EQ(0u, session->num_active_pushed_streams()); |
| |
| // Read EOF. |
| data.RunFor(2); |
| } |
| |
| TEST_P(SpdySessionTest, RejectInvalidUnknownFrames) { |
| session_deps_.host_resolver->set_synchronous_mode(true); |
| |
| MockRead reads[] = { |
| MockRead(SYNCHRONOUS, ERR_IO_PENDING) // Stall forever. |
| }; |
| |
| StaticSocketDataProvider data(reads, arraysize(reads), NULL, 0); |
| |
| MockConnect connect_data(SYNCHRONOUS, OK); |
| data.set_connect_data(connect_data); |
| session_deps_.socket_factory->AddSocketDataProvider(&data); |
| |
| CreateNetworkSession(); |
| base::WeakPtr<SpdySession> session = |
| CreateInsecureSpdySession(http_session_, key_, BoundNetLog()); |
| |
| session->stream_hi_water_mark_ = 5; |
| // Low client (odd) ids are fine. |
| EXPECT_TRUE(session->OnUnknownFrame(3, 0)); |
| // Client id exceeding watermark. |
| EXPECT_FALSE(session->OnUnknownFrame(9, 0)); |
| |
| session->last_accepted_push_stream_id_ = 6; |
| // Low server (even) ids are fine. |
| EXPECT_TRUE(session->OnUnknownFrame(2, 0)); |
| // Server id exceeding last accepted id. |
| EXPECT_FALSE(session->OnUnknownFrame(8, 0)); |
| } |
| |
| TEST(MapFramerErrorToProtocolError, MapsValues) { |
| CHECK_EQ( |
| SPDY_ERROR_INVALID_CONTROL_FRAME, |
| MapFramerErrorToProtocolError(SpdyFramer::SPDY_INVALID_CONTROL_FRAME)); |
| CHECK_EQ( |
| SPDY_ERROR_INVALID_DATA_FRAME_FLAGS, |
| MapFramerErrorToProtocolError(SpdyFramer::SPDY_INVALID_DATA_FRAME_FLAGS)); |
| CHECK_EQ( |
| SPDY_ERROR_GOAWAY_FRAME_CORRUPT, |
| MapFramerErrorToProtocolError(SpdyFramer::SPDY_GOAWAY_FRAME_CORRUPT)); |
| CHECK_EQ(SPDY_ERROR_UNEXPECTED_FRAME, |
| MapFramerErrorToProtocolError(SpdyFramer::SPDY_UNEXPECTED_FRAME)); |
| } |
| |
| TEST(MapFramerErrorToNetError, MapsValue) { |
| CHECK_EQ(ERR_SPDY_PROTOCOL_ERROR, |
| MapFramerErrorToNetError(SpdyFramer::SPDY_INVALID_CONTROL_FRAME)); |
| CHECK_EQ(ERR_SPDY_COMPRESSION_ERROR, |
| MapFramerErrorToNetError(SpdyFramer::SPDY_COMPRESS_FAILURE)); |
| CHECK_EQ(ERR_SPDY_COMPRESSION_ERROR, |
| MapFramerErrorToNetError(SpdyFramer::SPDY_DECOMPRESS_FAILURE)); |
| CHECK_EQ( |
| ERR_SPDY_FRAME_SIZE_ERROR, |
| MapFramerErrorToNetError(SpdyFramer::SPDY_CONTROL_PAYLOAD_TOO_LARGE)); |
| } |
| |
| TEST(MapRstStreamStatusToProtocolError, MapsValues) { |
| CHECK_EQ(STATUS_CODE_PROTOCOL_ERROR, |
| MapRstStreamStatusToProtocolError(RST_STREAM_PROTOCOL_ERROR)); |
| CHECK_EQ(STATUS_CODE_FRAME_SIZE_ERROR, |
| MapRstStreamStatusToProtocolError(RST_STREAM_FRAME_SIZE_ERROR)); |
| CHECK_EQ(STATUS_CODE_ENHANCE_YOUR_CALM, |
| MapRstStreamStatusToProtocolError(RST_STREAM_ENHANCE_YOUR_CALM)); |
| } |
| |
| TEST(MapNetErrorToGoAwayStatus, MapsValue) { |
| CHECK_EQ(GOAWAY_INADEQUATE_SECURITY, |
| MapNetErrorToGoAwayStatus(ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY)); |
| CHECK_EQ(GOAWAY_FLOW_CONTROL_ERROR, |
| MapNetErrorToGoAwayStatus(ERR_SPDY_FLOW_CONTROL_ERROR)); |
| CHECK_EQ(GOAWAY_PROTOCOL_ERROR, |
| MapNetErrorToGoAwayStatus(ERR_SPDY_PROTOCOL_ERROR)); |
| CHECK_EQ(GOAWAY_COMPRESSION_ERROR, |
| MapNetErrorToGoAwayStatus(ERR_SPDY_COMPRESSION_ERROR)); |
| CHECK_EQ(GOAWAY_FRAME_SIZE_ERROR, |
| MapNetErrorToGoAwayStatus(ERR_SPDY_FRAME_SIZE_ERROR)); |
| CHECK_EQ(GOAWAY_PROTOCOL_ERROR, MapNetErrorToGoAwayStatus(ERR_UNEXPECTED)); |
| } |
| |
| TEST(CanPoolTest, CanPool) { |
| // Load a cert that is valid for: |
| // www.example.org |
| // mail.example.org |
| // www.example.com |
| |
| TransportSecurityState tss; |
| SSLInfo ssl_info; |
| ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), |
| "spdy_pooling.pem"); |
| |
| EXPECT_TRUE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "www.example.org")); |
| EXPECT_TRUE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "mail.example.org")); |
| EXPECT_TRUE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "mail.example.com")); |
| EXPECT_FALSE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "mail.google.com")); |
| } |
| |
| TEST(CanPoolTest, CanNotPoolWithCertErrors) { |
| // Load a cert that is valid for: |
| // www.example.org |
| // mail.example.org |
| // www.example.com |
| |
| TransportSecurityState tss; |
| SSLInfo ssl_info; |
| ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), |
| "spdy_pooling.pem"); |
| ssl_info.cert_status = CERT_STATUS_REVOKED; |
| |
| EXPECT_FALSE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "mail.example.org")); |
| } |
| |
| TEST(CanPoolTest, CanNotPoolWithClientCerts) { |
| // Load a cert that is valid for: |
| // www.example.org |
| // mail.example.org |
| // www.example.com |
| |
| TransportSecurityState tss; |
| SSLInfo ssl_info; |
| ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), |
| "spdy_pooling.pem"); |
| ssl_info.client_cert_sent = true; |
| |
| EXPECT_FALSE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "mail.example.org")); |
| } |
| |
| TEST(CanPoolTest, CanNotPoolAcrossETLDsWithChannelID) { |
| // Load a cert that is valid for: |
| // www.example.org |
| // mail.example.org |
| // www.example.com |
| |
| TransportSecurityState tss; |
| SSLInfo ssl_info; |
| ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), |
| "spdy_pooling.pem"); |
| ssl_info.channel_id_sent = true; |
| |
| EXPECT_TRUE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "mail.example.org")); |
| EXPECT_FALSE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "www.example.com")); |
| } |
| |
| TEST(CanPoolTest, CanNotPoolWithBadPins) { |
| uint8 primary_pin = 1; |
| uint8 backup_pin = 2; |
| uint8 bad_pin = 3; |
| TransportSecurityState tss; |
| test::AddPin(&tss, "mail.example.org", primary_pin, backup_pin); |
| |
| SSLInfo ssl_info; |
| ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), |
| "spdy_pooling.pem"); |
| ssl_info.is_issued_by_known_root = true; |
| ssl_info.public_key_hashes.push_back(test::GetTestHashValue(bad_pin)); |
| |
| EXPECT_FALSE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "mail.example.org")); |
| } |
| |
| TEST(CanPoolTest, CanPoolWithAcceptablePins) { |
| uint8 primary_pin = 1; |
| uint8 backup_pin = 2; |
| TransportSecurityState tss; |
| test::AddPin(&tss, "mail.example.org", primary_pin, backup_pin); |
| |
| SSLInfo ssl_info; |
| ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), |
| "spdy_pooling.pem"); |
| ssl_info.is_issued_by_known_root = true; |
| ssl_info.public_key_hashes.push_back(test::GetTestHashValue(primary_pin)); |
| |
| EXPECT_TRUE(SpdySession::CanPool( |
| &tss, ssl_info, "www.example.org", "mail.example.org")); |
| } |
| |
| } // namespace net |