Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/quic_chromium_client_session.h" | 5 #include "net/quic/quic_chromium_client_session.h" |
| 6 | 6 |
| 7 #include <vector> | 7 #include <vector> |
| 8 | 8 |
| 9 #include "base/base64.h" | 9 #include "base/base64.h" |
| 10 #include "base/files/file_path.h" | 10 #include "base/files/file_path.h" |
| 11 #include "base/rand_util.h" | 11 #include "base/rand_util.h" |
| 12 #include "base/thread_task_runner_handle.h" | 12 #include "base/thread_task_runner_handle.h" |
| 13 #include "net/base/socket_performance_watcher.h" | 13 #include "net/base/socket_performance_watcher.h" |
| 14 #include "net/base/test_completion_callback.h" | 14 #include "net/base/test_completion_callback.h" |
| 15 #include "net/base/test_data_directory.h" | 15 #include "net/base/test_data_directory.h" |
| 16 #include "net/cert/cert_verify_result.h" | 16 #include "net/cert/cert_verify_result.h" |
| 17 #include "net/http/transport_security_state.h" | 17 #include "net/http/transport_security_state.h" |
| 18 #include "net/log/test_net_log.h" | 18 #include "net/log/test_net_log.h" |
| 19 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h" | 19 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h" |
| 20 #include "net/quic/crypto/crypto_protocol.h" | 20 #include "net/quic/crypto/crypto_protocol.h" |
| 21 #include "net/quic/crypto/proof_verifier_chromium.h" | 21 #include "net/quic/crypto/proof_verifier_chromium.h" |
| 22 #include "net/quic/crypto/quic_decrypter.h" | 22 #include "net/quic/crypto/quic_decrypter.h" |
| 23 #include "net/quic/crypto/quic_encrypter.h" | 23 #include "net/quic/crypto/quic_encrypter.h" |
| 24 #include "net/quic/crypto/quic_server_info.h" | 24 #include "net/quic/crypto/quic_server_info.h" |
| 25 #include "net/quic/quic_connection_helper.h" | |
| 25 #include "net/quic/quic_crypto_client_stream_factory.h" | 26 #include "net/quic/quic_crypto_client_stream_factory.h" |
| 27 #include "net/quic/quic_default_packet_writer.h" | |
| 26 #include "net/quic/quic_flags.h" | 28 #include "net/quic/quic_flags.h" |
| 29 #include "net/quic/quic_http_utils.h" | |
| 27 #include "net/quic/quic_packet_reader.h" | 30 #include "net/quic/quic_packet_reader.h" |
| 31 #include "net/quic/quic_packet_writer.h" | |
| 28 #include "net/quic/quic_protocol.h" | 32 #include "net/quic/quic_protocol.h" |
| 29 #include "net/quic/test_tools/crypto_test_utils.h" | 33 #include "net/quic/test_tools/crypto_test_utils.h" |
| 34 #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" | |
| 30 #include "net/quic/test_tools/quic_chromium_client_session_peer.h" | 35 #include "net/quic/test_tools/quic_chromium_client_session_peer.h" |
| 31 #include "net/quic/test_tools/quic_spdy_session_peer.h" | 36 #include "net/quic/test_tools/quic_spdy_session_peer.h" |
| 37 #include "net/quic/test_tools/quic_test_packet_maker.h" | |
| 32 #include "net/quic/test_tools/quic_test_utils.h" | 38 #include "net/quic/test_tools/quic_test_utils.h" |
| 33 #include "net/quic/test_tools/simple_quic_framer.h" | 39 #include "net/quic/test_tools/simple_quic_framer.h" |
| 34 #include "net/socket/socket_test_util.h" | 40 #include "net/socket/socket_test_util.h" |
| 35 #include "net/spdy/spdy_test_utils.h" | 41 #include "net/spdy/spdy_test_utils.h" |
| 36 #include "net/test/cert_test_util.h" | 42 #include "net/test/cert_test_util.h" |
| 37 #include "net/udp/datagram_client_socket.h" | 43 #include "net/udp/datagram_client_socket.h" |
| 38 | 44 |
| 39 using testing::_; | 45 using testing::_; |
| 40 | 46 |
| 41 namespace net { | 47 namespace net { |
| 42 namespace test { | 48 namespace test { |
| 43 namespace { | 49 namespace { |
| 44 | 50 |
| 51 const IPEndPoint kIpEndPoint(IPAddressNumber(kIPv4AddressSize, 0), 0); | |
| 45 const char kServerHostname[] = "test.example.com"; | 52 const char kServerHostname[] = "test.example.com"; |
| 46 const uint16_t kServerPort = 443; | 53 const uint16_t kServerPort = 443; |
| 54 const size_t kMaxReadersPerQuicSession = 5; | |
| 55 | |
| 56 class DefaultPacketWriterFactory : public QuicConnection::PacketWriterFactory { | |
| 57 public: | |
| 58 explicit DefaultPacketWriterFactory(DatagramClientSocket* socket) | |
| 59 : socket_(socket) {} | |
| 60 ~DefaultPacketWriterFactory() override {} | |
| 61 | |
| 62 QuicPacketWriter* Create(QuicConnection* connection) const override { | |
| 63 scoped_ptr<net::QuicDefaultPacketWriter> writer( | |
| 64 new net::QuicDefaultPacketWriter(socket_)); | |
| 65 writer->SetConnection(connection); | |
| 66 return writer.release(); | |
| 67 } | |
| 68 | |
| 69 private: | |
| 70 DatagramClientSocket* socket_; | |
| 71 }; | |
| 47 | 72 |
| 48 class QuicChromiumClientSessionTest | 73 class QuicChromiumClientSessionTest |
| 49 : public ::testing::TestWithParam<QuicVersion> { | 74 : public ::testing::TestWithParam<QuicVersion> { |
| 50 protected: | 75 protected: |
| 51 QuicChromiumClientSessionTest() | 76 QuicChromiumClientSessionTest() |
| 52 : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), | 77 : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), |
| 53 connection_(new PacketSavingConnection(&helper_, | 78 default_read_(new MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)), |
| 54 Perspective::IS_CLIENT, | 79 socket_data_( |
| 55 SupportedVersions(GetParam()))), | 80 new SequencedSocketData(default_read_.get(), 1, nullptr, 0)), |
| 56 session_( | 81 random_(0), |
| 57 connection_, | 82 helper_(base::ThreadTaskRunnerHandle::Get().get(), &clock_, &random_), |
| 58 GetSocket(), | 83 maker_(GetParam(), 0, &clock_, kServerHostname) {} |
| 59 /*stream_factory=*/nullptr, | 84 |
| 60 QuicCryptoClientStreamFactory::GetDefaultFactory(), | 85 void Initialize() { |
| 61 &clock_, | 86 socket_factory_.AddSocketDataProvider(socket_data_.get()); |
| 62 &transport_security_state_, | 87 scoped_ptr<DatagramClientSocket> socket = |
| 63 make_scoped_ptr((QuicServerInfo*)nullptr), | 88 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, |
| 64 QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED), | 89 base::Bind(&base::RandInt), |
| 65 kQuicYieldAfterPacketsRead, | 90 &net_log_, NetLog::Source()); |
| 66 QuicTime::Delta::FromMilliseconds( | 91 socket->Connect(kIpEndPoint); |
| 67 kQuicYieldAfterDurationMilliseconds), | 92 DefaultPacketWriterFactory writer_factory(socket.get()); |
| 68 /*cert_verify_flags=*/0, | 93 QuicConnection* connection = new QuicConnection( |
| 69 DefaultQuicConfig(), | 94 0, kIpEndPoint, &helper_, writer_factory, true, Perspective::IS_CLIENT, |
| 70 &crypto_config_, | 95 SupportedVersions(GetParam())); |
| 71 "CONNECTION_UNKNOWN", | 96 session_.reset(new QuicChromiumClientSession( |
| 72 base::TimeTicks::Now(), | 97 connection, std::move(socket), |
| 73 base::ThreadTaskRunnerHandle::Get().get(), | 98 /*stream_factory=*/nullptr, &crypto_client_stream_factory_, &clock_, |
| 74 /*socket_performance_watcher=*/nullptr, | 99 &transport_security_state_, make_scoped_ptr((QuicServerInfo*)nullptr), |
| 75 &net_log_) { | 100 QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED), |
| 76 session_.Initialize(); | 101 kQuicYieldAfterPacketsRead, |
| 102 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
| 103 /*cert_verify_flags=*/0, DefaultQuicConfig(), &crypto_config_, | |
| 104 "CONNECTION_UNKNOWN", base::TimeTicks::Now(), | |
| 105 base::ThreadTaskRunnerHandle::Get().get(), | |
| 106 /*socket_performance_watcher=*/nullptr, &net_log_)); | |
| 107 | |
| 108 scoped_refptr<X509Certificate> cert( | |
| 109 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); | |
| 110 verify_details_.cert_verify_result.verified_cert = cert; | |
| 111 verify_details_.cert_verify_result.is_issued_by_known_root = true; | |
| 77 // Advance the time, because timers do not like uninitialized times. | 112 // Advance the time, because timers do not like uninitialized times. |
| 78 connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1)); | 113 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(1)); |
| 114 session_->Initialize(); | |
| 115 session_->StartReading(); | |
| 79 } | 116 } |
| 80 | 117 |
| 81 void TearDown() override { | 118 void TearDown() override { |
| 82 session_.CloseSessionOnError(ERR_ABORTED, QUIC_INTERNAL_ERROR); | 119 session_->CloseSessionOnError(ERR_ABORTED, QUIC_INTERNAL_ERROR); |
| 83 } | |
| 84 | |
| 85 scoped_ptr<DatagramClientSocket> GetSocket() { | |
| 86 socket_factory_.AddSocketDataProvider(&socket_data_); | |
| 87 return socket_factory_.CreateDatagramClientSocket( | |
| 88 DatagramSocket::DEFAULT_BIND, base::Bind(&base::RandInt), &net_log_, | |
| 89 NetLog::Source()); | |
| 90 } | 120 } |
| 91 | 121 |
| 92 void CompleteCryptoHandshake() { | 122 void CompleteCryptoHandshake() { |
| 93 ASSERT_EQ(ERR_IO_PENDING, | 123 ASSERT_EQ(OK, session_->CryptoConnect(false, callback_.callback())); |
| 94 session_.CryptoConnect(false, callback_.callback())); | |
| 95 CryptoTestUtils::FakeServerOptions server_options; | |
| 96 CryptoTestUtils::HandshakeWithFakeServer( | |
| 97 &helper_, connection_, session_.GetCryptoStream(), server_options); | |
| 98 ASSERT_EQ(OK, callback_.WaitForResult()); | |
| 99 } | 124 } |
| 100 | 125 |
| 101 MockConnectionHelper helper_; | 126 QuicPacketWriter* CreateQuicPacketWriter(DatagramClientSocket* socket, |
| 127 QuicConnection* connection) const { | |
| 128 scoped_ptr<QuicDefaultPacketWriter> writer( | |
| 129 new QuicDefaultPacketWriter(socket)); | |
| 130 writer->SetConnection(connection); | |
| 131 return writer.release(); | |
| 132 } | |
| 133 | |
| 102 QuicCryptoClientConfig crypto_config_; | 134 QuicCryptoClientConfig crypto_config_; |
| 103 PacketSavingConnection* connection_; | |
| 104 TestNetLog net_log_; | 135 TestNetLog net_log_; |
| 136 BoundTestNetLog bound_net_log_; | |
| 105 MockClientSocketFactory socket_factory_; | 137 MockClientSocketFactory socket_factory_; |
| 106 StaticSocketDataProvider socket_data_; | 138 scoped_ptr<MockRead> default_read_; |
| 107 TransportSecurityState transport_security_state_; | 139 scoped_ptr<SequencedSocketData> socket_data_; |
| 108 QuicChromiumClientSession session_; | |
| 109 MockClock clock_; | 140 MockClock clock_; |
| 110 MockRandom random_; | 141 MockRandom random_; |
| 142 QuicConnectionHelper helper_; | |
| 143 scoped_ptr<DefaultPacketWriterFactory> writer_factory_; | |
| 144 TransportSecurityState transport_security_state_; | |
| 145 MockCryptoClientStreamFactory crypto_client_stream_factory_; | |
| 146 scoped_ptr<QuicChromiumClientSession> session_; | |
| 111 QuicConnectionVisitorInterface* visitor_; | 147 QuicConnectionVisitorInterface* visitor_; |
| 112 TestCompletionCallback callback_; | 148 TestCompletionCallback callback_; |
| 149 QuicTestPacketMaker maker_; | |
| 150 ProofVerifyDetailsChromium verify_details_; | |
| 113 }; | 151 }; |
| 114 | 152 |
| 115 INSTANTIATE_TEST_CASE_P(Tests, | 153 INSTANTIATE_TEST_CASE_P(Tests, |
| 116 QuicChromiumClientSessionTest, | 154 QuicChromiumClientSessionTest, |
| 117 ::testing::ValuesIn(QuicSupportedVersions())); | 155 ::testing::ValuesIn(QuicSupportedVersions())); |
| 118 | 156 |
| 119 TEST_P(QuicChromiumClientSessionTest, CryptoConnect) { | 157 TEST_P(QuicChromiumClientSessionTest, CryptoConnect) { |
| 158 Initialize(); | |
| 120 CompleteCryptoHandshake(); | 159 CompleteCryptoHandshake(); |
| 121 } | 160 } |
| 122 | 161 |
| 123 TEST_P(QuicChromiumClientSessionTest, MaxNumStreams) { | 162 TEST_P(QuicChromiumClientSessionTest, MaxNumStreams) { |
| 163 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; | |
| 164 scoped_ptr<QuicEncryptedPacket> client_rst(maker_.MakeRstPacket( | |
| 165 1, true, kClientDataStreamId1, QUIC_RST_ACKNOWLEDGEMENT)); | |
| 166 MockWrite writes[] = { | |
| 167 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 1)}; | |
| 168 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, | |
| 169 arraysize(writes))); | |
| 170 | |
| 171 Initialize(); | |
| 124 CompleteCryptoHandshake(); | 172 CompleteCryptoHandshake(); |
| 173 const size_t kMaxOpenStreams = session_->get_max_open_streams(); | |
| 125 | 174 |
| 126 std::vector<QuicReliableClientStream*> streams; | 175 std::vector<QuicReliableClientStream*> streams; |
| 127 for (size_t i = 0; i < kDefaultMaxStreamsPerConnection; i++) { | 176 for (size_t i = 0; i < kMaxOpenStreams; i++) { |
| 128 QuicReliableClientStream* stream = | 177 QuicReliableClientStream* stream = |
| 129 session_.CreateOutgoingDynamicStream(kDefaultPriority); | 178 session_->CreateOutgoingDynamicStream(kDefaultPriority); |
| 130 EXPECT_TRUE(stream); | 179 EXPECT_TRUE(stream); |
| 131 streams.push_back(stream); | 180 streams.push_back(stream); |
| 132 } | 181 } |
| 133 EXPECT_FALSE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 182 EXPECT_FALSE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
| 134 | 183 |
| 135 EXPECT_EQ(kDefaultMaxStreamsPerConnection, | 184 EXPECT_EQ(kMaxOpenStreams, session_->GetNumOpenOutgoingStreams()); |
| 136 session_.GetNumOpenOutgoingStreams()); | |
| 137 | 185 |
| 138 // Close a stream and ensure I can now open a new one. | 186 // Close a stream and ensure I can now open a new one. |
| 139 QuicStreamId stream_id = streams[0]->id(); | 187 QuicStreamId stream_id = streams[0]->id(); |
| 140 session_.CloseStream(stream_id); | 188 session_->CloseStream(stream_id); |
| 141 | 189 |
| 142 EXPECT_FALSE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 190 EXPECT_FALSE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
| 143 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); | 191 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); |
| 144 session_.OnRstStream(rst1); | 192 session_->OnRstStream(rst1); |
| 145 EXPECT_EQ(kDefaultMaxStreamsPerConnection - 1, | 193 EXPECT_EQ(kMaxOpenStreams - 1, session_->GetNumOpenOutgoingStreams()); |
| 146 session_.GetNumOpenOutgoingStreams()); | 194 EXPECT_TRUE(session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
| 147 EXPECT_TRUE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | |
| 148 } | 195 } |
| 149 | 196 |
| 150 TEST_P(QuicChromiumClientSessionTest, MaxNumStreamsViaRequest) { | 197 TEST_P(QuicChromiumClientSessionTest, MaxNumStreamsViaRequest) { |
| 198 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; | |
| 199 scoped_ptr<QuicEncryptedPacket> client_rst(maker_.MakeRstPacket( | |
| 200 1, true, kClientDataStreamId1, QUIC_RST_ACKNOWLEDGEMENT)); | |
| 201 MockWrite writes[] = { | |
| 202 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 1)}; | |
| 203 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, | |
| 204 arraysize(writes))); | |
| 205 | |
| 206 Initialize(); | |
| 151 CompleteCryptoHandshake(); | 207 CompleteCryptoHandshake(); |
| 208 const size_t kMaxOpenStreams = session_->get_max_open_streams(); | |
| 152 | 209 |
| 153 std::vector<QuicReliableClientStream*> streams; | 210 std::vector<QuicReliableClientStream*> streams; |
| 154 for (size_t i = 0; i < kDefaultMaxStreamsPerConnection; i++) { | 211 for (size_t i = 0; i < kMaxOpenStreams; i++) { |
| 155 QuicReliableClientStream* stream = | 212 QuicReliableClientStream* stream = |
| 156 session_.CreateOutgoingDynamicStream(kDefaultPriority); | 213 session_->CreateOutgoingDynamicStream(kDefaultPriority); |
| 157 EXPECT_TRUE(stream); | 214 EXPECT_TRUE(stream); |
| 158 streams.push_back(stream); | 215 streams.push_back(stream); |
| 159 } | 216 } |
| 160 | 217 |
| 161 QuicReliableClientStream* stream; | 218 QuicReliableClientStream* stream; |
| 162 QuicChromiumClientSession::StreamRequest stream_request; | 219 QuicChromiumClientSession::StreamRequest stream_request; |
| 163 TestCompletionCallback callback; | 220 TestCompletionCallback callback; |
| 164 ASSERT_EQ(ERR_IO_PENDING, | 221 ASSERT_EQ(ERR_IO_PENDING, |
| 165 stream_request.StartRequest(session_.GetWeakPtr(), &stream, | 222 stream_request.StartRequest(session_->GetWeakPtr(), &stream, |
| 166 callback.callback())); | 223 callback.callback())); |
| 167 | 224 |
| 168 // Close a stream and ensure I can now open a new one. | 225 // Close a stream and ensure I can now open a new one. |
| 169 QuicStreamId stream_id = streams[0]->id(); | 226 QuicStreamId stream_id = streams[0]->id(); |
| 170 session_.CloseStream(stream_id); | 227 session_->CloseStream(stream_id); |
| 171 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); | 228 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); |
| 172 session_.OnRstStream(rst1); | 229 session_->OnRstStream(rst1); |
| 173 ASSERT_TRUE(callback.have_result()); | 230 ASSERT_TRUE(callback.have_result()); |
| 174 EXPECT_EQ(OK, callback.WaitForResult()); | 231 EXPECT_EQ(OK, callback.WaitForResult()); |
| 175 EXPECT_TRUE(stream != nullptr); | 232 EXPECT_TRUE(stream != nullptr); |
| 176 } | 233 } |
| 177 | 234 |
| 178 TEST_P(QuicChromiumClientSessionTest, GoAwayReceived) { | 235 TEST_P(QuicChromiumClientSessionTest, GoAwayReceived) { |
| 236 Initialize(); | |
| 179 CompleteCryptoHandshake(); | 237 CompleteCryptoHandshake(); |
| 180 | 238 |
| 181 // After receiving a GoAway, I should no longer be able to create outgoing | 239 // After receiving a GoAway, I should no longer be able to create outgoing |
| 182 // streams. | 240 // streams. |
| 183 session_.connection()->OnGoAwayFrame( | 241 session_->connection()->OnGoAwayFrame( |
| 184 QuicGoAwayFrame(QUIC_PEER_GOING_AWAY, 1u, "Going away.")); | 242 QuicGoAwayFrame(QUIC_PEER_GOING_AWAY, 1u, "Going away.")); |
| 185 EXPECT_EQ(nullptr, session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 243 EXPECT_EQ(nullptr, session_->CreateOutgoingDynamicStream(kDefaultPriority)); |
| 186 } | 244 } |
| 187 | 245 |
| 188 TEST_P(QuicChromiumClientSessionTest, CanPool) { | 246 TEST_P(QuicChromiumClientSessionTest, CanPool) { |
| 247 Initialize(); | |
| 189 // Load a cert that is valid for: | 248 // Load a cert that is valid for: |
| 190 // www.example.org | 249 // www.example.org |
| 191 // mail.example.org | 250 // mail.example.org |
| 192 // www.example.com | 251 // www.example.com |
| 193 | 252 |
| 194 ProofVerifyDetailsChromium details; | 253 ProofVerifyDetailsChromium details; |
| 195 details.cert_verify_result.verified_cert = | 254 details.cert_verify_result.verified_cert = |
| 196 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 255 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 197 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 256 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 198 | 257 |
| 199 CompleteCryptoHandshake(); | 258 CompleteCryptoHandshake(); |
| 200 session_.OnProofVerifyDetailsAvailable(details); | 259 session_->OnProofVerifyDetailsAvailable(details); |
| 201 | 260 |
| 202 EXPECT_TRUE(session_.CanPool("www.example.org", PRIVACY_MODE_DISABLED)); | 261 EXPECT_TRUE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED)); |
| 203 EXPECT_FALSE(session_.CanPool("www.example.org", PRIVACY_MODE_ENABLED)); | 262 EXPECT_FALSE(session_->CanPool("www.example.org", PRIVACY_MODE_ENABLED)); |
| 204 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 263 EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 205 EXPECT_TRUE(session_.CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); | 264 EXPECT_TRUE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); |
| 206 EXPECT_FALSE(session_.CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); | 265 EXPECT_FALSE(session_->CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); |
| 207 } | 266 } |
| 208 | 267 |
| 209 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithTlsChannelId) { | 268 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithTlsChannelId) { |
| 269 Initialize(); | |
| 210 // Load a cert that is valid for: | 270 // Load a cert that is valid for: |
| 211 // www.example.org | 271 // www.example.org |
| 212 // mail.example.org | 272 // mail.example.org |
| 213 // www.example.com | 273 // www.example.com |
| 214 | 274 |
| 215 ProofVerifyDetailsChromium details; | 275 ProofVerifyDetailsChromium details; |
| 216 details.cert_verify_result.verified_cert = | 276 details.cert_verify_result.verified_cert = |
| 217 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 277 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 218 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 278 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 219 | 279 |
| 220 CompleteCryptoHandshake(); | 280 CompleteCryptoHandshake(); |
| 221 session_.OnProofVerifyDetailsAvailable(details); | 281 session_->OnProofVerifyDetailsAvailable(details); |
| 222 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 282 QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
| 223 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 283 QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
| 224 | 284 |
| 225 EXPECT_TRUE(session_.CanPool("www.example.org", PRIVACY_MODE_DISABLED)); | 285 EXPECT_TRUE(session_->CanPool("www.example.org", PRIVACY_MODE_DISABLED)); |
| 226 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 286 EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 227 EXPECT_FALSE(session_.CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); | 287 EXPECT_FALSE(session_->CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); |
| 228 EXPECT_FALSE(session_.CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); | 288 EXPECT_FALSE(session_->CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); |
| 229 } | 289 } |
| 230 | 290 |
| 231 TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) { | 291 TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) { |
| 292 Initialize(); | |
| 293 | |
| 232 uint8_t primary_pin = 1; | 294 uint8_t primary_pin = 1; |
| 233 uint8_t backup_pin = 2; | 295 uint8_t backup_pin = 2; |
| 234 uint8_t bad_pin = 3; | 296 uint8_t bad_pin = 3; |
| 235 AddPin(&transport_security_state_, "mail.example.org", primary_pin, | 297 AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 236 backup_pin); | 298 backup_pin); |
| 237 | 299 |
| 238 ProofVerifyDetailsChromium details; | 300 ProofVerifyDetailsChromium details; |
| 239 details.cert_verify_result.verified_cert = | 301 details.cert_verify_result.verified_cert = |
| 240 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 302 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 241 details.cert_verify_result.is_issued_by_known_root = true; | 303 details.cert_verify_result.is_issued_by_known_root = true; |
| 242 details.cert_verify_result.public_key_hashes.push_back( | 304 details.cert_verify_result.public_key_hashes.push_back( |
| 243 GetTestHashValue(bad_pin)); | 305 GetTestHashValue(bad_pin)); |
| 244 | 306 |
| 245 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 307 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 246 | 308 |
| 247 CompleteCryptoHandshake(); | 309 CompleteCryptoHandshake(); |
| 248 session_.OnProofVerifyDetailsAvailable(details); | 310 session_->OnProofVerifyDetailsAvailable(details); |
| 249 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 311 QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
| 250 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 312 QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
| 251 | 313 |
| 252 EXPECT_FALSE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 314 EXPECT_FALSE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 253 } | 315 } |
| 254 | 316 |
| 255 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) { | 317 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) { |
| 318 Initialize(); | |
| 319 | |
| 256 uint8_t primary_pin = 1; | 320 uint8_t primary_pin = 1; |
| 257 uint8_t backup_pin = 2; | 321 uint8_t backup_pin = 2; |
| 258 AddPin(&transport_security_state_, "mail.example.org", primary_pin, | 322 AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 259 backup_pin); | 323 backup_pin); |
| 260 | 324 |
| 261 ProofVerifyDetailsChromium details; | 325 ProofVerifyDetailsChromium details; |
| 262 details.cert_verify_result.verified_cert = | 326 details.cert_verify_result.verified_cert = |
| 263 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 327 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 264 details.cert_verify_result.is_issued_by_known_root = true; | 328 details.cert_verify_result.is_issued_by_known_root = true; |
| 265 details.cert_verify_result.public_key_hashes.push_back( | 329 details.cert_verify_result.public_key_hashes.push_back( |
| 266 GetTestHashValue(primary_pin)); | 330 GetTestHashValue(primary_pin)); |
| 267 | 331 |
| 268 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 332 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 269 | 333 |
| 270 CompleteCryptoHandshake(); | 334 CompleteCryptoHandshake(); |
| 271 session_.OnProofVerifyDetailsAvailable(details); | 335 session_->OnProofVerifyDetailsAvailable(details); |
| 272 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 336 QuicChromiumClientSessionPeer::SetHostname(session_.get(), "www.example.org"); |
| 273 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 337 QuicChromiumClientSessionPeer::SetChannelIDSent(session_.get(), true); |
| 274 | 338 |
| 275 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 339 EXPECT_TRUE(session_->CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 340 } | |
| 341 | |
| 342 TEST_P(QuicChromiumClientSessionTest, MigrateToSocket) { | |
| 343 Initialize(); | |
| 344 CompleteCryptoHandshake(); | |
| 345 | |
| 346 char data[] = "ABCD"; | |
| 347 scoped_ptr<QuicEncryptedPacket> ping( | |
| 348 maker_.MakePingPacket(1, /*include_version=*/false)); | |
| 349 scoped_ptr<QuicEncryptedPacket> ack_and_data_out(maker_.MakeAckAndDataPacket( | |
| 350 2, false, 5, 1, 1, false, 0, StringPiece(data))); | |
| 351 MockRead reads[] = {MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), | |
| 352 MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; | |
| 353 MockWrite writes[] = {MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 2), | |
| 354 MockWrite(SYNCHRONOUS, ack_and_data_out->data(), | |
| 355 ack_and_data_out->length(), 3)}; | |
| 356 StaticSocketDataProvider socket_data(reads, arraysize(reads), writes, | |
| 357 arraysize(writes)); | |
| 358 socket_factory_.AddSocketDataProvider(&socket_data); | |
| 359 | |
| 360 // Create connected socket. | |
| 361 scoped_ptr<DatagramClientSocket> new_socket = | |
| 362 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
| 363 base::Bind(&base::RandInt), | |
| 364 &net_log_, NetLog::Source()); | |
| 365 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
| 366 | |
| 367 // Create reader and writer. | |
| 368 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
| 369 new_socket.get(), &clock_, session_.get(), kQuicYieldAfterPacketsRead, | |
| 370 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
| 371 bound_net_log_.bound())); | |
| 372 scoped_ptr<QuicPacketWriter> new_writer( | |
| 373 CreateQuicPacketWriter(new_socket.get(), session_->connection())); | |
| 374 | |
| 375 // Migrate session. | |
| 376 EXPECT_TRUE(session_->MigrateToSocket( | |
| 377 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
| 378 | |
| 379 // Write data to session. | |
| 380 struct iovec iov[1]; | |
| 381 iov[0].iov_base = data; | |
| 382 iov[0].iov_len = 4; | |
| 383 session_->WritevData(5, QuicIOVector(iov, arraysize(iov), 4), 0, false, | |
| 384 MAY_FEC_PROTECT, nullptr); | |
| 385 | |
| 386 EXPECT_TRUE(socket_data.AllReadDataConsumed()); | |
| 387 EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | |
| 388 } | |
| 389 | |
| 390 TEST_P(QuicChromiumClientSessionTest, MigrateToSocketMaxReaders) { | |
| 391 Initialize(); | |
| 392 CompleteCryptoHandshake(); | |
| 393 | |
| 394 for (size_t i = 0; i < kMaxReadersPerQuicSession; ++i) { | |
| 395 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; | |
| 396 scoped_ptr<QuicEncryptedPacket> ping_out( | |
| 397 maker_.MakePingPacket(i + 1, /*include_version=*/true)); | |
| 398 MockWrite writes[] = { | |
| 399 MockWrite(SYNCHRONOUS, ping_out->data(), ping_out->length(), i + 2)}; | |
| 400 StaticSocketDataProvider socket_data(reads, arraysize(reads), writes, | |
| 401 arraysize(writes)); | |
| 402 socket_factory_.AddSocketDataProvider(&socket_data); | |
| 403 | |
| 404 // Create connected socket. | |
| 405 scoped_ptr<DatagramClientSocket> new_socket = | |
| 406 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
| 407 base::Bind(&base::RandInt), | |
| 408 &net_log_, NetLog::Source()); | |
| 409 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
| 410 | |
| 411 // Create reader and writer. | |
| 412 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
| 413 new_socket.get(), &clock_, session_.get(), kQuicYieldAfterPacketsRead, | |
| 414 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
| 415 bound_net_log_.bound())); | |
| 416 scoped_ptr<QuicPacketWriter> new_writer( | |
| 417 CreateQuicPacketWriter(new_socket.get(), session_->connection())); | |
| 418 | |
| 419 // Migrate session. | |
| 420 if (i < kMaxReadersPerQuicSession - 1) { | |
| 421 EXPECT_TRUE(session_->MigrateToSocket( | |
| 422 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
| 423 EXPECT_TRUE(socket_data.AllReadDataConsumed()); | |
| 424 EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | |
| 425 } else { | |
| 426 // Max readers exceeded. | |
| 427 EXPECT_FALSE(session_->MigrateToSocket( | |
| 428 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
| 429 | |
| 430 EXPECT_FALSE(socket_data.AllReadDataConsumed()); | |
| 431 EXPECT_FALSE(socket_data.AllWriteDataConsumed()); | |
| 432 } | |
| 433 } | |
| 434 } | |
| 435 | |
| 436 TEST_P(QuicChromiumClientSessionTest, MigrateToSocketReadError) { | |
| 437 scoped_ptr<QuicEncryptedPacket> ping( | |
| 438 maker_.MakePingPacket(1, /*include_version=*/true)); | |
| 439 MockRead old_reads[] = { | |
| 440 MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), | |
| 441 MockRead(ASYNC, ERR_IO_PENDING, 1), // causes reading to pause. | |
| 442 MockRead(ASYNC, ERR_NETWORK_CHANGED, 2)}; | |
| 443 socket_data_.reset( | |
| 444 new SequencedSocketData(old_reads, arraysize(old_reads), nullptr, 0)); | |
| 445 Initialize(); | |
| 446 CompleteCryptoHandshake(); | |
| 447 | |
| 448 MockWrite writes[] = { | |
| 449 MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 1)}; | |
| 450 MockRead new_reads[] = { | |
| 451 MockRead(SYNCHRONOUS, ping->data(), ping->length(), 0), | |
| 452 MockRead(ASYNC, ERR_IO_PENDING, 2), // pause reading. | |
| 453 MockRead(ASYNC, ping->data(), ping->length(), 3), | |
| 454 MockRead(ASYNC, ERR_IO_PENDING, 4), // pause reading | |
| 455 MockRead(ASYNC, ERR_NETWORK_CHANGED, 5)}; | |
| 456 SequencedSocketData new_socket_data(new_reads, arraysize(new_reads), writes, | |
| 457 arraysize(writes)); | |
| 458 socket_factory_.AddSocketDataProvider(&new_socket_data); | |
| 459 | |
| 460 // Create connected socket. | |
| 461 scoped_ptr<DatagramClientSocket> new_socket = | |
| 462 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
| 463 base::Bind(&base::RandInt), | |
| 464 &net_log_, NetLog::Source()); | |
| 465 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
| 466 | |
| 467 // Create reader and writer. | |
| 468 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
| 469 new_socket.get(), &clock_, session_.get(), kQuicYieldAfterPacketsRead, | |
| 470 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
| 471 bound_net_log_.bound())); | |
| 472 scoped_ptr<QuicPacketWriter> new_writer( | |
| 473 CreateQuicPacketWriter(new_socket.get(), session_->connection())); | |
| 474 | |
| 475 // Store old socket and migrate session. | |
|
Ryan Hamilton
2016/01/12 20:13:00
nit: I'd probably remove "Store old" since I think
Jana
2016/01/12 22:04:33
Ah -- sorry left over comment. Removed.
| |
| 476 EXPECT_TRUE(session_->MigrateToSocket( | |
| 477 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
| 478 | |
| 479 // Read error on old socket does not impact session. | |
| 480 EXPECT_TRUE(socket_data_->IsPaused()); | |
| 481 socket_data_->Resume(); | |
| 482 EXPECT_TRUE(session_->connection()->connected()); | |
| 483 EXPECT_TRUE(new_socket_data.IsPaused()); | |
| 484 new_socket_data.Resume(); | |
| 485 | |
| 486 // Read error on new socket causes session close. | |
| 487 EXPECT_TRUE(new_socket_data.IsPaused()); | |
| 488 EXPECT_TRUE(session_->connection()->connected()); | |
| 489 new_socket_data.Resume(); | |
| 490 EXPECT_FALSE(session_->connection()->connected()); | |
| 491 | |
| 492 EXPECT_TRUE(socket_data_->AllReadDataConsumed()); | |
| 493 EXPECT_TRUE(socket_data_->AllWriteDataConsumed()); | |
| 494 EXPECT_TRUE(new_socket_data.AllReadDataConsumed()); | |
| 495 EXPECT_TRUE(new_socket_data.AllWriteDataConsumed()); | |
| 496 } | |
|
Ryan Hamilton
2016/01/12 20:13:01
Great test!
I think we also need on which verifie
Jana
2016/01/12 22:04:33
As discussed offline, this is being verified in th
| |
| 497 | |
| 498 TEST_P(QuicChromiumClientSessionTest, MigrateToSocketWriteError) { | |
| 499 Initialize(); | |
| 500 CompleteCryptoHandshake(); | |
| 501 | |
| 502 scoped_ptr<QuicEncryptedPacket> ping( | |
| 503 maker_.MakePingPacket(1, /*include_version=*/true)); | |
| 504 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; | |
| 505 MockWrite writes[] = {MockWrite(SYNCHRONOUS, ping->data(), ping->length(), 1), | |
| 506 MockWrite(SYNCHRONOUS, ERR_FAILED, 2)}; | |
| 507 SequencedSocketData socket_data(reads, arraysize(reads), writes, | |
| 508 arraysize(writes)); | |
| 509 socket_factory_.AddSocketDataProvider(&socket_data); | |
| 510 | |
| 511 // Create connected socket. | |
| 512 scoped_ptr<DatagramClientSocket> new_socket = | |
| 513 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
| 514 base::Bind(&base::RandInt), | |
| 515 &net_log_, NetLog::Source()); | |
| 516 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
| 517 | |
| 518 // Create reader and writer. | |
| 519 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
| 520 new_socket.get(), &clock_, session_.get(), kQuicYieldAfterPacketsRead, | |
| 521 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
| 522 bound_net_log_.bound())); | |
| 523 scoped_ptr<QuicPacketWriter> new_writer( | |
| 524 CreateQuicPacketWriter(new_socket.get(), session_->connection())); | |
| 525 | |
| 526 // Store old socket and migrate session. | |
| 527 EXPECT_TRUE(session_->MigrateToSocket( | |
| 528 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
| 529 | |
| 530 // Write error on new socket causes session close. | |
| 531 EXPECT_TRUE(session_->connection()->connected()); | |
| 532 session_->connection()->SendPing(/*force=*/true); | |
| 533 EXPECT_FALSE(session_->connection()->connected()); | |
| 534 | |
| 535 EXPECT_TRUE(socket_data.AllReadDataConsumed()); | |
| 536 EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | |
| 276 } | 537 } |
| 277 | 538 |
| 278 } // namespace | 539 } // namespace |
| 279 } // namespace test | 540 } // namespace test |
| 280 } // namespace net | 541 } // namespace net |
| OLD | NEW |