OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/quic_chromium_client_session.h" | 5 #include "net/quic/quic_chromium_client_session.h" |
6 | 6 |
7 #include <vector> | 7 #include <vector> |
8 | 8 |
9 #include "base/base64.h" | 9 #include "base/base64.h" |
10 #include "base/files/file_path.h" | 10 #include "base/files/file_path.h" |
11 #include "base/rand_util.h" | 11 #include "base/rand_util.h" |
12 #include "base/thread_task_runner_handle.h" | 12 #include "base/thread_task_runner_handle.h" |
13 #include "net/base/socket_performance_watcher.h" | 13 #include "net/base/socket_performance_watcher.h" |
14 #include "net/base/test_completion_callback.h" | 14 #include "net/base/test_completion_callback.h" |
15 #include "net/base/test_data_directory.h" | 15 #include "net/base/test_data_directory.h" |
16 #include "net/cert/cert_verify_result.h" | 16 #include "net/cert/cert_verify_result.h" |
17 #include "net/http/transport_security_state.h" | 17 #include "net/http/transport_security_state.h" |
18 #include "net/log/test_net_log.h" | 18 #include "net/log/test_net_log.h" |
19 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h" | 19 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h" |
20 #include "net/quic/crypto/crypto_protocol.h" | 20 #include "net/quic/crypto/crypto_protocol.h" |
21 #include "net/quic/crypto/proof_verifier_chromium.h" | 21 #include "net/quic/crypto/proof_verifier_chromium.h" |
22 #include "net/quic/crypto/quic_decrypter.h" | 22 #include "net/quic/crypto/quic_decrypter.h" |
23 #include "net/quic/crypto/quic_encrypter.h" | 23 #include "net/quic/crypto/quic_encrypter.h" |
24 #include "net/quic/crypto/quic_server_info.h" | 24 #include "net/quic/crypto/quic_server_info.h" |
25 #include "net/quic/quic_connection_helper.h" | |
25 #include "net/quic/quic_crypto_client_stream_factory.h" | 26 #include "net/quic/quic_crypto_client_stream_factory.h" |
27 #include "net/quic/quic_default_packet_writer.h" | |
26 #include "net/quic/quic_flags.h" | 28 #include "net/quic/quic_flags.h" |
29 #include "net/quic/quic_http_utils.h" | |
27 #include "net/quic/quic_packet_reader.h" | 30 #include "net/quic/quic_packet_reader.h" |
31 #include "net/quic/quic_packet_writer.h" | |
28 #include "net/quic/quic_protocol.h" | 32 #include "net/quic/quic_protocol.h" |
29 #include "net/quic/test_tools/crypto_test_utils.h" | 33 #include "net/quic/test_tools/crypto_test_utils.h" |
34 #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" | |
30 #include "net/quic/test_tools/quic_chromium_client_session_peer.h" | 35 #include "net/quic/test_tools/quic_chromium_client_session_peer.h" |
31 #include "net/quic/test_tools/quic_spdy_session_peer.h" | 36 #include "net/quic/test_tools/quic_spdy_session_peer.h" |
37 #include "net/quic/test_tools/quic_test_packet_maker.h" | |
32 #include "net/quic/test_tools/quic_test_utils.h" | 38 #include "net/quic/test_tools/quic_test_utils.h" |
33 #include "net/quic/test_tools/simple_quic_framer.h" | 39 #include "net/quic/test_tools/simple_quic_framer.h" |
34 #include "net/socket/socket_test_util.h" | 40 #include "net/socket/socket_test_util.h" |
35 #include "net/spdy/spdy_test_utils.h" | 41 #include "net/spdy/spdy_test_utils.h" |
36 #include "net/test/cert_test_util.h" | 42 #include "net/test/cert_test_util.h" |
37 #include "net/udp/datagram_client_socket.h" | 43 #include "net/udp/datagram_client_socket.h" |
38 | 44 |
39 using testing::_; | 45 using testing::_; |
40 | 46 |
41 namespace net { | 47 namespace net { |
42 namespace test { | 48 namespace test { |
43 namespace { | 49 namespace { |
44 | 50 |
51 const IPEndPoint kIpEndPoint(IPAddressNumber(kIPv4AddressSize, 0), 0); | |
45 const char kServerHostname[] = "test.example.com"; | 52 const char kServerHostname[] = "test.example.com"; |
46 const uint16_t kServerPort = 443; | 53 const uint16_t kServerPort = 443; |
54 const size_t kMaxReadersPerQuicSession = 5; | |
55 | |
56 class DefaultPacketWriterFactory : public QuicConnection::PacketWriterFactory { | |
57 public: | |
58 explicit DefaultPacketWriterFactory(DatagramClientSocket* socket) | |
59 : socket_(socket) {} | |
60 ~DefaultPacketWriterFactory() override {} | |
61 | |
62 QuicPacketWriter* Create(QuicConnection* connection) const override { | |
63 scoped_ptr<net::QuicDefaultPacketWriter> writer( | |
64 new net::QuicDefaultPacketWriter(socket_)); | |
65 writer->SetConnection(connection); | |
66 return writer.release(); | |
67 } | |
68 | |
69 private: | |
70 DatagramClientSocket* socket_; | |
71 }; | |
47 | 72 |
48 class QuicChromiumClientSessionTest | 73 class QuicChromiumClientSessionTest |
49 : public ::testing::TestWithParam<QuicVersion> { | 74 : public ::testing::TestWithParam<QuicVersion> { |
50 protected: | 75 protected: |
51 QuicChromiumClientSessionTest() | 76 QuicChromiumClientSessionTest() |
52 : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), | 77 : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), |
53 connection_(new PacketSavingConnection(&helper_, | 78 default_read_(new MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)), |
54 Perspective::IS_CLIENT, | 79 socket_data_( |
55 SupportedVersions(GetParam()))), | 80 new SequencedSocketData(default_read_.get(), 1, nullptr, 0)), |
56 session_( | 81 random_(0), |
57 connection_, | 82 helper_(base::ThreadTaskRunnerHandle::Get().get(), &clock_, &random_), |
58 GetSocket(), | 83 maker_(GetParam(), 0, &clock_, kServerHostname) {} |
59 /*stream_factory=*/nullptr, | 84 |
60 QuicCryptoClientStreamFactory::GetDefaultFactory(), | 85 void Initialize() { |
61 &clock_, | 86 socket_factory_.AddSocketDataProvider(socket_data_.get()); |
62 &transport_security_state_, | 87 scoped_ptr<DatagramClientSocket> socket = |
63 make_scoped_ptr((QuicServerInfo*)nullptr), | 88 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
64 QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED), | 89 base::Bind(&base::RandInt), |
65 kQuicYieldAfterPacketsRead, | 90 &net_log_, NetLog::Source()); |
66 QuicTime::Delta::FromMilliseconds( | 91 socket->Connect(kIpEndPoint); |
67 kQuicYieldAfterDurationMilliseconds), | 92 DefaultPacketWriterFactory writer_factory(socket.get()); |
68 /*cert_verify_flags=*/0, | 93 QuicConnection* connection = new QuicConnection( |
69 DefaultQuicConfig(), | 94 0, kIpEndPoint, &helper_, writer_factory, true, Perspective::IS_CLIENT, |
70 &crypto_config_, | 95 SupportedVersions(GetParam())); |
71 "CONNECTION_UNKNOWN", | 96 session_.reset(new QuicChromiumClientSession( |
72 base::TimeTicks::Now(), | 97 connection, std::move(socket), |
73 base::ThreadTaskRunnerHandle::Get().get(), | 98 /*stream_factory=*/nullptr, &crypto_client_stream_factory_, &clock_, |
74 /*socket_performance_watcher=*/nullptr, | 99 &transport_security_state_, make_scoped_ptr((QuicServerInfo*)nullptr), |
75 &net_log_) { | 100 QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED), |
76 session_.Initialize(); | 101 kQuicYieldAfterPacketsRead, |
102 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
103 /*cert_verify_flags=*/0, DefaultQuicConfig(), &crypto_config_, | |
104 "CONNECTION_UNKNOWN", base::TimeTicks::Now(), | |
105 base::ThreadTaskRunnerHandle::Get().get(), | |
106 /*socket_performance_watcher=*/nullptr, &net_log_)); | |
107 | |
108 scoped_refptr<X509Certificate> cert( | |
109 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); | |
110 verify_details_.cert_verify_result.verified_cert = cert; | |
111 verify_details_.cert_verify_result.is_issued_by_known_root = true; | |
77 // Advance the time, because timers do not like uninitialized times. | 112 // Advance the time, because timers do not like uninitialized times. |
78 connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1)); | 113 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(1)); |
114 session_->Initialize(); | |
115 session_->StartReading(); | |
79 } | 116 } |
80 | 117 |
81 void TearDown() override { | 118 void TearDown() override { |
82 session_.CloseSessionOnError(ERR_ABORTED, QUIC_INTERNAL_ERROR); | 119 session_->CloseSessionOnError(ERR_ABORTED, QUIC_INTERNAL_ERROR); |
83 } | |
84 | |
85 scoped_ptr<DatagramClientSocket> GetSocket() { | |
86 socket_factory_.AddSocketDataProvider(&socket_data_); | |
87 return socket_factory_.CreateDatagramClientSocket( | |
88 DatagramSocket::DEFAULT_BIND, base::Bind(&base::RandInt), &net_log_, | |
89 NetLog::Source()); | |
90 } | 120 } |
91 | 121 |
92 void CompleteCryptoHandshake() { | 122 void CompleteCryptoHandshake() { |
93 ASSERT_EQ(ERR_IO_PENDING, | 123 ASSERT_EQ(OK, session_->CryptoConnect(false, callback_.callback())); |
94 session_.CryptoConnect(false, callback_.callback())); | |
95 CryptoTestUtils::FakeServerOptions server_options; | |
96 CryptoTestUtils::HandshakeWithFakeServer( | |
97 &helper_, connection_, session_.GetCryptoStream(), server_options); | |
98 ASSERT_EQ(OK, callback_.WaitForResult()); | |
99 } | 124 } |
100 | 125 |
101 MockConnectionHelper helper_; | 126 QuicPacketWriter* CreateQuicPacketWriter(DatagramClientSocket* socket, |
127 QuicConnection* connection) const { | |
128 scoped_ptr<QuicDefaultPacketWriter> writer( | |
129 new QuicDefaultPacketWriter(socket)); | |
130 writer->SetConnection(connection); | |
131 return writer.release(); | |
132 } | |
133 | |
102 QuicCryptoClientConfig crypto_config_; | 134 QuicCryptoClientConfig crypto_config_; |
103 PacketSavingConnection* connection_; | |
104 TestNetLog net_log_; | 135 TestNetLog net_log_; |
136 BoundTestNetLog bound_net_log_; | |
105 MockClientSocketFactory socket_factory_; | 137 MockClientSocketFactory socket_factory_; |
106 StaticSocketDataProvider socket_data_; | 138 scoped_ptr<MockRead> default_read_; |
107 TransportSecurityState transport_security_state_; | 139 scoped_ptr<SequencedSocketData> socket_data_; |
108 QuicChromiumClientSession session_; | |
109 MockClock clock_; | 140 MockClock clock_; |
110 MockRandom random_; | 141 MockRandom random_; |
142 QuicConnectionHelper helper_; | |
143 scoped_ptr<DefaultPacketWriterFactory> writer_factory_; | |
144 TransportSecurityState transport_security_state_; | |
145 MockCryptoClientStreamFactory crypto_client_stream_factory_; | |
146 scoped_ptr<QuicChromiumClientSession> session_; | |
111 QuicConnectionVisitorInterface* visitor_; | 147 QuicConnectionVisitorInterface* visitor_; |
112 TestCompletionCallback callback_; | 148 TestCompletionCallback callback_; |
149 QuicTestPacketMaker maker_; | |
150 ProofVerifyDetailsChromium verify_details_; | |
113 }; | 151 }; |
114 | 152 |
115 INSTANTIATE_TEST_CASE_P(Tests, | 153 INSTANTIATE_TEST_CASE_P(Tests, |
116 QuicChromiumClientSessionTest, | 154 QuicChromiumClientSessionTest, |
117 ::testing::ValuesIn(QuicSupportedVersions())); | 155 ::testing::ValuesIn(QuicSupportedVersions())); |
118 | 156 |
119 TEST_P(QuicChromiumClientSessionTest, CryptoConnect) { | 157 TEST_P(QuicChromiumClientSessionTest, CryptoConnect) { |
158 Initialize(); | |
120 CompleteCryptoHandshake(); | 159 CompleteCryptoHandshake(); |
121 } | 160 } |
122 | 161 |
123 TEST_P(QuicChromiumClientSessionTest, MaxNumStreams) { | 162 TEST_P(QuicChromiumClientSessionTest, MaxNumStreams) { |
163 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; | |
164 scoped_ptr<QuicEncryptedPacket> client_rst(maker_.MakeRstPacket( | |
165 1, true, kClientDataStreamId1, QUIC_RST_ACKNOWLEDGEMENT)); | |
166 MockWrite writes[] = { | |
167 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 1)}; | |
168 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, | |
169 arraysize(writes))); | |
170 | |
171 Initialize(); | |
124 CompleteCryptoHandshake(); | 172 CompleteCryptoHandshake(); |
173 const size_t kMaxOpenStreams = session_->get_max_open_streams(); | |
125 | 174 |
126 std::vector<QuicReliableClientStream*> streams; | 175 std::vector<QuicReliableClientStream*> streams; |
127 for (size_t i = 0; i < kDefaultMaxStreamsPerConnection; i++) { | 176 for (size_t i = 0; i < kMaxOpenStreams; i++) { |
128 QuicReliableClientStream* stream = | 177 QuicReliableClientStream* stream = |
129 session_.CreateOutgoingDynamicStream(kDefaultPriority); | 178 session_->CreateOutgoingDynamicStream(kDefaultPriority); |
130 EXPECT_TRUE(stream); | 179 EXPECT_TRUE(stream); |
131 streams.push_back(stream); | 180 streams.push_back(stream); |
132 } | 181 } |
133 EXPECT_FALSE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 182 EXPECT_FALSE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
134 | 183 |
135 EXPECT_EQ(kDefaultMaxStreamsPerConnection, | 184 EXPECT_EQ(kMaxOpenStreams, session_->GetNumOpenOutgoingStreams()); |
136 session_.GetNumOpenOutgoingStreams()); | |
137 | 185 |
138 // Close a stream and ensure I can now open a new one. | 186 // Close a stream and ensure I can now open a new one. |
139 QuicStreamId stream_id = streams[0]->id(); | 187 QuicStreamId stream_id = streams[0]->id(); |
140 session_.CloseStream(stream_id); | 188 session_->CloseStream(stream_id); |
141 | 189 |
142 EXPECT_FALSE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 190 EXPECT_FALSE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
143 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); | 191 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); |
144 session_.OnRstStream(rst1); | 192 session_->OnRstStream(rst1); |
145 EXPECT_EQ(kDefaultMaxStreamsPerConnection - 1, | 193 EXPECT_EQ(kMaxOpenStreams - 1, session_->GetNumOpenOutgoingStreams()); |
146 session_.GetNumOpenOutgoingStreams()); | 194 EXPECT_TRUE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
147 EXPECT_TRUE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | |
148 } | 195 } |
149 | 196 |
150 TEST_P(QuicChromiumClientSessionTest, MaxNumStreamsViaRequest) { | 197 TEST_P(QuicChromiumClientSessionTest, MaxNumStreamsViaRequest) { |
198 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; | |
199 scoped_ptr<QuicEncryptedPacket> client_rst(maker_.MakeRstPacket( | |
200 1, true, kClientDataStreamId1, QUIC_RST_ACKNOWLEDGEMENT)); | |
201 MockWrite writes[] = { | |
202 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 1)}; | |
203 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, | |
204 arraysize(writes))); | |
205 | |
206 Initialize(); | |
151 CompleteCryptoHandshake(); | 207 CompleteCryptoHandshake(); |
208 const size_t kMaxOpenStreams = session_->get_max_open_streams(); | |
152 | 209 |
153 std::vector<QuicReliableClientStream*> streams; | 210 std::vector<QuicReliableClientStream*> streams; |
154 for (size_t i = 0; i < kDefaultMaxStreamsPerConnection; i++) { | 211 for (size_t i = 0; i < kMaxOpenStreams; i++) { |
155 QuicReliableClientStream* stream = | 212 QuicReliableClientStream* stream = |
156 session_.CreateOutgoingDynamicStream(kDefaultPriority); | 213 session_->CreateOutgoingDynamicStream(kDefaultPriority); |
157 EXPECT_TRUE(stream); | 214 EXPECT_TRUE(stream); |
158 streams.push_back(stream); | 215 streams.push_back(stream); |
159 } | 216 } |
160 | 217 |
161 QuicReliableClientStream* stream; | 218 QuicReliableClientStream* stream; |
162 QuicChromiumClientSession::StreamRequest stream_request; | 219 QuicChromiumClientSession::StreamRequest stream_request; |
163 TestCompletionCallback callback; | 220 TestCompletionCallback callback; |
164 ASSERT_EQ(ERR_IO_PENDING, | 221 ASSERT_EQ(ERR_IO_PENDING, |
165 stream_request.StartRequest(session_.GetWeakPtr(), &stream, | 222 stream_request.StartRequest(session_->GetWeakPtr(), &stream, |
166 callback.callback())); | 223 callback.callback())); |
167 | 224 |
168 // Close a stream and ensure I can now open a new one. | 225 // Close a stream and ensure I can now open a new one. |
169 QuicStreamId stream_id = streams[0]->id(); | 226 QuicStreamId stream_id = streams[0]->id(); |
170 session_.CloseStream(stream_id); | 227 session_->CloseStream(stream_id); |
171 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); | 228 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); |
172 session_.OnRstStream(rst1); | 229 session_->OnRstStream(rst1); |
173 ASSERT_TRUE(callback.have_result()); | 230 ASSERT_TRUE(callback.have_result()); |
174 EXPECT_EQ(OK, callback.WaitForResult()); | 231 EXPECT_EQ(OK, callback.WaitForResult()); |
175 EXPECT_TRUE(stream != nullptr); | 232 EXPECT_TRUE(stream != nullptr); |
176 } | 233 } |
177 | 234 |
178 TEST_P(QuicChromiumClientSessionTest, GoAwayReceived) { | 235 TEST_P(QuicChromiumClientSessionTest, GoAwayReceived) { |
236 Initialize(); | |
179 CompleteCryptoHandshake(); | 237 CompleteCryptoHandshake(); |
180 | 238 |
181 // After receiving a GoAway, I should no longer be able to create outgoing | 239 // After receiving a GoAway, I should no longer be able to create outgoing |
182 // streams. | 240 // streams. |
183 session_.connection()->OnGoAwayFrame( | 241 session_->connection()->OnGoAwayFrame( |
184 QuicGoAwayFrame(QUIC_PEER_GOING_AWAY, 1u, "Going away.")); | 242 QuicGoAwayFrame(QUIC_PEER_GOING_AWAY, 1u, "Going away.")); |
185 EXPECT_EQ(nullptr, session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 243 EXPECT_EQ(nullptr, session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
186 } | 244 } |
187 | 245 |
188 TEST_P(QuicChromiumClientSessionTest, CanPool) { | 246 TEST_P(QuicChromiumClientSessionTest, CanPool) { |
247 Initialize(); | |
189 // Load a cert that is valid for: | 248 // Load a cert that is valid for: |
190 // www.example.org | 249 // www.example.org |
191 // mail.example.org | 250 // mail.example.org |
192 // www.example.com | 251 // www.example.com |
193 | 252 |
194 ProofVerifyDetailsChromium details; | 253 ProofVerifyDetailsChromium details; |
195 details.cert_verify_result.verified_cert = | 254 details.cert_verify_result.verified_cert = |
196 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 255 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
197 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 256 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
198 | 257 |
199 CompleteCryptoHandshake(); | 258 CompleteCryptoHandshake(); |
200 session_.OnProofVerifyDetailsAvailable(details); | 259 session_->OnProofVerifyDetailsAvailable(details); |
201 | 260 |
202 EXPECT_TRUE(session_.CanPool("www.example.org", PRIVACY_MODE_DISABLED)); | 261 EXPECT_TRUE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED)); |
203 EXPECT_FALSE(session_.CanPool("www.example.org", PRIVACY_MODE_ENABLED)); | 262 EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_ENABLED)); |
204 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 263 EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
205 EXPECT_TRUE(session_.CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); | 264 EXPECT_TRUE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); |
206 EXPECT_FALSE(session_.CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); | 265 EXPECT_FALSE(session_->CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); |
207 } | 266 } |
208 | 267 |
209 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithTlsChannelId) { | 268 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithTlsChannelId) { |
269 Initialize(); | |
210 // Load a cert that is valid for: | 270 // Load a cert that is valid for: |
211 // www.example.org | 271 // www.example.org |
212 // mail.example.org | 272 // mail.example.org |
213 // www.example.com | 273 // www.example.com |
214 | 274 |
215 ProofVerifyDetailsChromium details; | 275 ProofVerifyDetailsChromium details; |
216 details.cert_verify_result.verified_cert = | 276 details.cert_verify_result.verified_cert = |
217 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 277 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
218 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 278 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
219 | 279 |
220 CompleteCryptoHandshake(); | 280 CompleteCryptoHandshake(); |
221 session_.OnProofVerifyDetailsAvailable(details); | 281 session_->OnProofVerifyDetailsAvailable(details); |
222 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 282 QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
223 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 283 QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
224 | 284 |
225 EXPECT_TRUE(session_.CanPool("www.example.org", PRIVACY_MODE_DISABLED)); | 285 EXPECT_TRUE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED)); |
226 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 286 EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
227 EXPECT_FALSE(session_.CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); | 287 EXPECT_FALSE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); |
228 EXPECT_FALSE(session_.CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); | 288 EXPECT_FALSE(session_->CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); |
229 } | 289 } |
230 | 290 |
231 TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) { | 291 TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) { |
292 Initialize(); | |
293 | |
232 uint8_t primary_pin = 1; | 294 uint8_t primary_pin = 1; |
233 uint8_t backup_pin = 2; | 295 uint8_t backup_pin = 2; |
234 uint8_t bad_pin = 3; | 296 uint8_t bad_pin = 3; |
235 AddPin(&transport_security_state_, "mail.example.org", primary_pin, | 297 AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
236 backup_pin); | 298 backup_pin); |
237 | 299 |
238 ProofVerifyDetailsChromium details; | 300 ProofVerifyDetailsChromium details; |
239 details.cert_verify_result.verified_cert = | 301 details.cert_verify_result.verified_cert = |
240 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 302 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
241 details.cert_verify_result.is_issued_by_known_root = true; | 303 details.cert_verify_result.is_issued_by_known_root = true; |
242 details.cert_verify_result.public_key_hashes.push_back( | 304 details.cert_verify_result.public_key_hashes.push_back( |
243 GetTestHashValue(bad_pin)); | 305 GetTestHashValue(bad_pin)); |
244 | 306 |
245 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 307 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
246 | 308 |
247 CompleteCryptoHandshake(); | 309 CompleteCryptoHandshake(); |
248 session_.OnProofVerifyDetailsAvailable(details); | 310 session_->OnProofVerifyDetailsAvailable(details); |
249 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 311 QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
250 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 312 QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
251 | 313 |
252 EXPECT_FALSE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 314 EXPECT_FALSE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
253 } | 315 } |
254 | 316 |
255 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) { | 317 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) { |
318 Initialize(); | |
319 | |
256 uint8_t primary_pin = 1; | 320 uint8_t primary_pin = 1; |
257 uint8_t backup_pin = 2; | 321 uint8_t backup_pin = 2; |
258 AddPin(&transport_security_state_, "mail.example.org", primary_pin, | 322 AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
259 backup_pin); | 323 backup_pin); |
260 | 324 |
261 ProofVerifyDetailsChromium details; | 325 ProofVerifyDetailsChromium details; |
262 details.cert_verify_result.verified_cert = | 326 details.cert_verify_result.verified_cert = |
263 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 327 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
264 details.cert_verify_result.is_issued_by_known_root = true; | 328 details.cert_verify_result.is_issued_by_known_root = true; |
265 details.cert_verify_result.public_key_hashes.push_back( | 329 details.cert_verify_result.public_key_hashes.push_back( |
266 GetTestHashValue(primary_pin)); | 330 GetTestHashValue(primary_pin)); |
267 | 331 |
268 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 332 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
269 | 333 |
270 CompleteCryptoHandshake(); | 334 CompleteCryptoHandshake(); |
271 session_.OnProofVerifyDetailsAvailable(details); | 335 session_->OnProofVerifyDetailsAvailable(details); |
272 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 336 QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
273 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 337 QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
274 | 338 |
275 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 339 EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
340 } | |
341 | |
342 TEST_P(QuicChromiumClientSessionTest, MigrateToSocket) { | |
343 Initialize(); | |
344 CompleteCryptoHandshake(); | |
345 | |
346 char data[] = "ABCD"; | |
347 scoped_ptr<QuicEncryptedPacket> ping( | |
348 maker_.MakePingPacket(1, /*include_version=*/false)); | |
349 scoped_ptr<QuicEncryptedPacket> ack_and_data_out(maker_.MakeAckAndDataPacket( | |
350 2, false, 5, 1, 1, false, 0, StringPiece(data))); | |
351 MockRead reads[] = {MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), | |
352 MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; | |
353 MockWrite writes[] = {MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 2), | |
354 MockWrite(SYNCHRONOUS, ack_and_data_out->data(), | |
355 ack_and_data_out->length(), 3)}; | |
356 StaticSocketDataProvider socket_data(reads, arraysize(reads), writes, | |
357 arraysize(writes)); | |
358 socket_factory_.AddSocketDataProvider(&socket_data); | |
359 | |
360 // Create connected socket. | |
361 scoped_ptr<DatagramClientSocket> new_socket = | |
362 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
363 base::Bind(&base::RandInt), | |
364 &net_log_, NetLog::Source()); | |
365 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
366 | |
367 // Create reader and writer. | |
368 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
369 new_socket.get(), &clock_, session_.get(), kQuicYieldAfterPacketsRead, | |
370 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
371 bound_net_log_.bound())); | |
372 scoped_ptr<QuicPacketWriter> new_writer( | |
373 CreateQuicPacketWriter(new_socket.get(), session_->connection())); | |
374 | |
375 // Migrate session. | |
376 EXPECT_TRUE(session_->MigrateToSocket( | |
377 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
378 | |
379 // Write data to session. | |
380 struct iovec iov[1]; | |
381 iov[0].iov_base = data; | |
382 iov[0].iov_len = 4; | |
383 session_->WritevData(5, QuicIOVector(iov, arraysize(iov), 4), 0, false, | |
384 MAY_FEC_PROTECT, nullptr); | |
385 | |
386 EXPECT_TRUE(socket_data.AllReadDataConsumed()); | |
387 EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | |
388 } | |
389 | |
390 TEST_P(QuicChromiumClientSessionTest, MigrateToSocketMaxReaders) { | |
391 Initialize(); | |
392 CompleteCryptoHandshake(); | |
393 | |
394 for (size_t i = 0; i < kMaxReadersPerQuicSession; ++i) { | |
395 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; | |
396 scoped_ptr<QuicEncryptedPacket> ping_out( | |
397 maker_.MakePingPacket(i + 1, /*include_version=*/true)); | |
398 MockWrite writes[] = { | |
399 MockWrite(SYNCHRONOUS, ping_out->data(), ping_out->length(), i + 2)}; | |
400 StaticSocketDataProvider socket_data(reads, arraysize(reads), writes, | |
401 arraysize(writes)); | |
402 socket_factory_.AddSocketDataProvider(&socket_data); | |
403 | |
404 // Create connected socket. | |
405 scoped_ptr<DatagramClientSocket> new_socket = | |
406 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
407 base::Bind(&base::RandInt), | |
408 &net_log_, NetLog::Source()); | |
409 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
410 | |
411 // Create reader and writer. | |
412 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
413 new_socket.get(), &clock_, session_.get(), kQuicYieldAfterPacketsRead, | |
414 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
415 bound_net_log_.bound())); | |
416 scoped_ptr<QuicPacketWriter> new_writer( | |
417 CreateQuicPacketWriter(new_socket.get(), session_->connection())); | |
418 | |
419 // Migrate session. | |
420 if (i < kMaxReadersPerQuicSession - 1) { | |
421 EXPECT_TRUE(session_->MigrateToSocket( | |
422 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
423 EXPECT_TRUE(socket_data.AllReadDataConsumed()); | |
424 EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | |
425 } else { | |
426 // Max readers exceeded. | |
427 EXPECT_FALSE(session_->MigrateToSocket( | |
428 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
429 | |
430 EXPECT_FALSE(socket_data.AllReadDataConsumed()); | |
431 EXPECT_FALSE(socket_data.AllWriteDataConsumed()); | |
432 } | |
433 } | |
434 } | |
435 | |
436 TEST_P(QuicChromiumClientSessionTest, MigrateToSocketReadError) { | |
437 scoped_ptr<QuicEncryptedPacket> ping( | |
438 maker_.MakePingPacket(1, /*include_version=*/true)); | |
439 MockRead old_reads[] = { | |
440 MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), | |
441 MockRead(ASYNC, ERR_IO_PENDING, 1), // causes reading to pause. | |
442 MockRead(ASYNC, ERR_NETWORK_CHANGED, 2)}; | |
443 socket_data_.reset( | |
444 new SequencedSocketData(old_reads, arraysize(old_reads), nullptr, 0)); | |
445 Initialize(); | |
446 CompleteCryptoHandshake(); | |
447 | |
448 MockWrite writes[] = { | |
449 MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 1)}; | |
450 MockRead new_reads[] = { | |
451 MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), | |
452 MockRead(ASYNC, ERR_IO_PENDING, 2), // pause reading. | |
453 MockRead(ASYNC, ping->data(), ping->length(), 3), | |
454 MockRead(ASYNC, ERR_IO_PENDING, 4), // pause reading | |
455 MockRead(ASYNC, ERR_NETWORK_CHANGED, 5)}; | |
456 SequencedSocketData new_socket_data(new_reads, arraysize(new_reads), writes, | |
457 arraysize(writes)); | |
458 socket_factory_.AddSocketDataProvider(&new_socket_data); | |
459 | |
460 // Create connected socket. | |
461 scoped_ptr<DatagramClientSocket> new_socket = | |
462 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
463 base::Bind(&base::RandInt), | |
464 &net_log_, NetLog::Source()); | |
465 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
466 | |
467 // Create reader and writer. | |
468 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
469 new_socket.get(), &clock_, session_.get(), kQuicYieldAfterPacketsRead, | |
470 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
471 bound_net_log_.bound())); | |
472 scoped_ptr<QuicPacketWriter> new_writer( | |
473 CreateQuicPacketWriter(new_socket.get(), session_->connection())); | |
474 | |
475 // Store old socket and migrate session. | |
Ryan Hamilton
2016/01/12 20:13:00
nit: I'd probably remove "Store old" since I think
Jana
2016/01/12 22:04:33
Ah -- sorry left over comment. Removed.
| |
476 EXPECT_TRUE(session_->MigrateToSocket( | |
477 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
478 | |
479 // Read error on old socket does not impact session. | |
480 EXPECT_TRUE(socket_data_->IsPaused()); | |
481 socket_data_->Resume(); | |
482 EXPECT_TRUE(session_->connection()->connected()); | |
483 EXPECT_TRUE(new_socket_data.IsPaused()); | |
484 new_socket_data.Resume(); | |
485 | |
486 // Read error on new socket causes session close. | |
487 EXPECT_TRUE(new_socket_data.IsPaused()); | |
488 EXPECT_TRUE(session_->connection()->connected()); | |
489 new_socket_data.Resume(); | |
490 EXPECT_FALSE(session_->connection()->connected()); | |
491 | |
492 EXPECT_TRUE(socket_data_->AllReadDataConsumed()); | |
493 EXPECT_TRUE(socket_data_->AllWriteDataConsumed()); | |
494 EXPECT_TRUE(new_socket_data.AllReadDataConsumed()); | |
495 EXPECT_TRUE(new_socket_data.AllWriteDataConsumed()); | |
496 } | |
Ryan Hamilton
2016/01/12 20:13:01
Great test!
I think we also need on which verifie
Jana
2016/01/12 22:04:33
As discussed offline, this is being verified in th
| |
497 | |
498 TEST_P(QuicChromiumClientSessionTest, MigrateToSocketWriteError) { | |
499 Initialize(); | |
500 CompleteCryptoHandshake(); | |
501 | |
502 scoped_ptr<QuicEncryptedPacket> ping( | |
503 maker_.MakePingPacket(1, /*include_version=*/true)); | |
504 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; | |
505 MockWrite writes[] = {MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 1), | |
506 MockWrite(SYNCHRONOUS, ERR_FAILED, 2)}; | |
507 SequencedSocketData socket_data(reads, arraysize(reads), writes, | |
508 arraysize(writes)); | |
509 socket_factory_.AddSocketDataProvider(&socket_data); | |
510 | |
511 // Create connected socket. | |
512 scoped_ptr<DatagramClientSocket> new_socket = | |
513 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
514 base::Bind(&base::RandInt), | |
515 &net_log_, NetLog::Source()); | |
516 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
517 | |
518 // Create reader and writer. | |
519 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
520 new_socket.get(), &clock_, session_.get(), kQuicYieldAfterPacketsRead, | |
521 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
522 bound_net_log_.bound())); | |
523 scoped_ptr<QuicPacketWriter> new_writer( | |
524 CreateQuicPacketWriter(new_socket.get(), session_->connection())); | |
525 | |
526 // Store old socket and migrate session. | |
527 EXPECT_TRUE(session_->MigrateToSocket( | |
528 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
529 | |
530 // Write error on new socket causes session close. | |
531 EXPECT_TRUE(session_->connection()->connected()); | |
532 session_->connection()->SendPing(/*force=*/true); | |
533 EXPECT_FALSE(session_->connection()->connected()); | |
534 | |
535 EXPECT_TRUE(socket_data.AllReadDataConsumed()); | |
536 EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | |
276 } | 537 } |
277 | 538 |
278 } // namespace | 539 } // namespace |
279 } // namespace test | 540 } // namespace test |
280 } // namespace net | 541 } // namespace net |
OLD | NEW |