OLD | NEW |
---|---|
(Empty) | |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/websockets/websocket_handshake_handler.h" | |
6 | |
7 #include <string> | |
8 #include <vector> | |
9 | |
10 #include "base/basictypes.h" | |
11 #include "base/string_util.h" | |
12 #include "googleurl/src/gurl.h" | |
13 #include "net/http/http_response_headers.h" | |
14 #include "net/http/http_util.h" | |
15 | |
Yuta Kitamura
2012/08/03 07:31:51
Same here.
Takashi Toyoshima
2012/08/06 13:01:53
Done.
| |
16 #include "testing/gmock/include/gmock/gmock.h" | |
17 #include "testing/gtest/include/gtest/gtest.h" | |
18 #include "testing/platform_test.h" | |
19 | |
20 namespace net { | |
21 | |
22 TEST(WebSocketHandshakeHandlerSpdy3Test, RequestResponse) { | |
23 WebSocketHandshakeRequestHandler request_handler; | |
24 | |
25 static const char kHandshakeRequestMessage[] = | |
26 "GET /demo HTTP/1.1\r\n" | |
27 "Host: example.com\r\n" | |
28 "Upgrade: websocket\r\n" | |
29 "Connection: Upgrade\r\n" | |
30 "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" | |
31 "Origin: http://example.com\r\n" | |
32 "Sec-WebSocket-Protocol: sample\r\n" | |
33 "Sec-WebSocket-Extensions: foo\r\n" | |
34 "Sec-WebSocket-Version: 13\r\n" | |
35 "X-Foo: foo\r\n" | |
36 "\r\n"; | |
37 | |
38 EXPECT_TRUE(request_handler.ParseRequest(kHandshakeRequestMessage, | |
39 strlen(kHandshakeRequestMessage))); | |
40 EXPECT_EQ(13, request_handler.protocol_version()); | |
41 | |
42 GURL url("ws://example.com/demo"); | |
43 std::string challenge; | |
44 SpdyHeaderBlock headers; | |
45 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, | |
46 &headers, | |
47 &challenge, | |
48 kProtoSPDY3)); | |
49 | |
50 EXPECT_EQ(url.path(), headers[":path"]); | |
51 EXPECT_TRUE(headers.find(":upgrade") == headers.end()); | |
52 EXPECT_TRUE(headers.find(":Upgrade") == headers.end()); | |
53 EXPECT_TRUE(headers.find(":connection") == headers.end()); | |
54 EXPECT_TRUE(headers.find(":Connection") == headers.end()); | |
55 EXPECT_TRUE(headers.find(":Sec-WebSocket-Key") == headers.end()); | |
56 EXPECT_TRUE(headers.find(":sec-websocket-key") == headers.end()); | |
57 EXPECT_TRUE(headers.find(":Sec-WebSocket-Version") == headers.end()); | |
58 EXPECT_TRUE(headers.find(":sec-webSocket-version") == headers.end()); | |
59 EXPECT_TRUE(headers.find(":x-foo") == headers.end()); | |
60 EXPECT_EQ("example.com", headers[":host"]); | |
61 EXPECT_EQ("http://example.com", headers[":origin"]); | |
62 EXPECT_EQ("sample", headers[":sec-websocket-protocol"]); | |
63 EXPECT_EQ("foo", headers[":sec-websocket-extensions"]); | |
64 EXPECT_EQ("ws", headers[":scheme"]); | |
65 EXPECT_EQ("WebSocket/13", headers[":version"]); | |
66 EXPECT_EQ("foo", headers["x-foo"]); | |
67 | |
68 const char expected_challenge[] = "dGhlIHNhbXBsZSBub25jZQ=="; | |
Yuta Kitamura
2012/08/03 07:31:51
Same here.
Takashi Toyoshima
2012/08/06 13:01:53
Done.
| |
69 | |
70 EXPECT_EQ(expected_challenge, challenge); | |
71 | |
72 headers.clear(); | |
73 | |
74 headers[":status"] = "101 Switching Protocols"; | |
75 headers[":sec-websocket-protocol"] = "sample"; | |
76 headers[":sec-websocket-extensions"] = "foo"; | |
77 headers["x-bar"] = "bar"; | |
78 | |
79 WebSocketHandshakeResponseHandler response_handler; | |
80 response_handler.set_protocol_version(13); | |
81 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, | |
82 challenge, | |
83 kProtoSPDY3)); | |
84 EXPECT_TRUE(response_handler.HasResponse()); | |
85 | |
86 // Note that order of sec-websocket-* is sensitive with hash_map order. | |
87 static const char kHandshakeResponseExpectedMessage[] = | |
88 "HTTP/1.1 101 Switching Protocols\r\n" | |
89 "Upgrade: websocket\r\n" | |
90 "Connection: Upgrade\r\n" | |
91 "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n" | |
92 "sec-websocket-extensions: foo\r\n" | |
93 "sec-websocket-protocol: sample\r\n" | |
94 "x-bar: bar\r\n" | |
95 "\r\n"; | |
96 | |
97 EXPECT_EQ(kHandshakeResponseExpectedMessage, response_handler.GetResponse()); | |
98 } | |
99 | |
100 TEST(WebSocketHandshakeHandlerSpdy3Test, RequestResponseWithCookies) { | |
101 WebSocketHandshakeRequestHandler request_handler; | |
102 | |
103 // Note that websocket won't use multiple headers in request now. | |
104 static const char kHandshakeRequestMessage[] = | |
105 "GET /demo HTTP/1.1\r\n" | |
106 "Host: example.com\r\n" | |
107 "Upgrade: websocket\r\n" | |
108 "Connection: Upgrade\r\n" | |
109 "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" | |
110 "Origin: http://example.com\r\n" | |
111 "Sec-WebSocket-Protocol: sample\r\n" | |
112 "Sec-WebSocket-Extensions: foo\r\n" | |
113 "Sec-WebSocket-Version: 13\r\n" | |
114 "Cookie: WK-websocket-test=1; WK-websocket-test-httponly=1\r\n" | |
115 "\r\n"; | |
116 | |
117 EXPECT_TRUE(request_handler.ParseRequest(kHandshakeRequestMessage, | |
118 strlen(kHandshakeRequestMessage))); | |
119 EXPECT_EQ(13, request_handler.protocol_version()); | |
120 | |
121 GURL url("ws://example.com/demo"); | |
122 std::string challenge; | |
123 SpdyHeaderBlock headers; | |
124 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, | |
125 &headers, | |
126 &challenge, | |
127 kProtoSPDY3)); | |
128 | |
129 EXPECT_EQ(url.path(), headers[":path"]); | |
130 EXPECT_TRUE(headers.find(":upgrade") == headers.end()); | |
131 EXPECT_TRUE(headers.find(":Upgrade") == headers.end()); | |
132 EXPECT_TRUE(headers.find(":connection") == headers.end()); | |
133 EXPECT_TRUE(headers.find(":Connection") == headers.end()); | |
134 EXPECT_TRUE(headers.find(":Sec-WebSocket-Key") == headers.end()); | |
135 EXPECT_TRUE(headers.find(":sec-websocket-key") == headers.end()); | |
136 EXPECT_TRUE(headers.find(":Sec-WebSocket-Version") == headers.end()); | |
137 EXPECT_TRUE(headers.find(":sec-webSocket-version") == headers.end()); | |
138 EXPECT_TRUE(headers.find(":Cookie") == headers.end()); | |
139 EXPECT_TRUE(headers.find(":cookie") == headers.end()); | |
140 EXPECT_EQ("example.com", headers[":host"]); | |
141 EXPECT_EQ("http://example.com", headers[":origin"]); | |
142 EXPECT_EQ("sample", headers[":sec-websocket-protocol"]); | |
143 EXPECT_EQ("foo", headers[":sec-websocket-extensions"]); | |
144 EXPECT_EQ("ws", headers[":scheme"]); | |
145 EXPECT_EQ("WebSocket/13", headers[":version"]); | |
146 EXPECT_EQ("WK-websocket-test=1; WK-websocket-test-httponly=1", | |
147 headers["cookie"]); | |
148 | |
149 const char expected_challenge[] = "dGhlIHNhbXBsZSBub25jZQ=="; | |
150 | |
151 EXPECT_EQ(expected_challenge, challenge); | |
152 | |
153 headers.clear(); | |
154 | |
155 headers[":status"] = "101 Switching Protocols"; | |
156 headers[":sec-websocket-protocol"] = "sample"; | |
157 headers[":sec-websocket-extensions"] = "foo"; | |
158 std::string cookie = "WK-websocket-test=1"; | |
159 cookie.append(1, '\0'); | |
160 cookie += "WK-websocket-test-httponly=1; HttpOnly"; | |
161 headers["set-cookie"] = cookie; | |
162 | |
163 | |
164 WebSocketHandshakeResponseHandler response_handler; | |
165 response_handler.set_protocol_version(13); | |
166 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, | |
167 challenge, | |
168 kProtoSPDY3)); | |
169 EXPECT_TRUE(response_handler.HasResponse()); | |
170 | |
171 // Note that order of sec-websocket-* is sensitive with hash_map order. | |
172 static const char kHandshakeResponseExpectedMessage[] = | |
173 "HTTP/1.1 101 Switching Protocols\r\n" | |
174 "Upgrade: websocket\r\n" | |
175 "Connection: Upgrade\r\n" | |
176 "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n" | |
177 "sec-websocket-extensions: foo\r\n" | |
178 "sec-websocket-protocol: sample\r\n" | |
179 "set-cookie: WK-websocket-test=1\r\n" | |
180 "set-cookie: WK-websocket-test-httponly=1; HttpOnly\r\n" | |
181 "\r\n"; | |
182 | |
183 EXPECT_EQ(kHandshakeResponseExpectedMessage, response_handler.GetResponse()); | |
184 } | |
185 | |
186 } // namespace net | |
OLD | NEW |