OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/tools/quic/test_tools/quic_test_client.h" | |
6 | |
7 #include "base/time/time.h" | |
8 #include "net/base/completion_callback.h" | |
9 #include "net/base/net_errors.h" | |
10 #include "net/cert/cert_verify_result.h" | |
11 #include "net/cert/x509_certificate.h" | |
12 #include "net/quic/crypto/proof_verifier.h" | |
13 #include "net/quic/quic_server_id.h" | |
14 #include "net/quic/test_tools/quic_connection_peer.h" | |
15 #include "net/quic/test_tools/quic_session_peer.h" | |
16 #include "net/quic/test_tools/quic_test_utils.h" | |
17 #include "net/quic/test_tools/reliable_quic_stream_peer.h" | |
18 #include "net/tools/balsa/balsa_headers.h" | |
19 #include "net/tools/quic/quic_epoll_connection_helper.h" | |
20 #include "net/tools/quic/quic_packet_writer_wrapper.h" | |
21 #include "net/tools/quic/quic_spdy_client_stream.h" | |
22 #include "net/tools/quic/test_tools/http_message.h" | |
23 #include "net/tools/quic/test_tools/quic_client_peer.h" | |
24 #include "url/gurl.h" | |
25 | |
26 using base::StringPiece; | |
27 using net::QuicServerId; | |
28 using net::test::QuicConnectionPeer; | |
29 using net::test::QuicSessionPeer; | |
30 using net::test::ReliableQuicStreamPeer; | |
31 using std::string; | |
32 using std::vector; | |
33 | |
34 namespace net { | |
35 namespace tools { | |
36 namespace test { | |
37 namespace { | |
38 | |
39 // RecordingProofVerifier accepts any certificate chain and records the common | |
40 // name of the leaf. | |
41 class RecordingProofVerifier : public ProofVerifier { | |
42 public: | |
43 // ProofVerifier interface. | |
44 QuicAsyncStatus VerifyProof(const string& hostname, | |
45 const string& server_config, | |
46 const vector<string>& certs, | |
47 const string& signature, | |
48 const ProofVerifyContext* context, | |
49 string* error_details, | |
50 scoped_ptr<ProofVerifyDetails>* details, | |
51 ProofVerifierCallback* callback) override { | |
52 common_name_.clear(); | |
53 if (certs.empty()) { | |
54 return QUIC_FAILURE; | |
55 } | |
56 | |
57 // Convert certs to X509Certificate. | |
58 vector<StringPiece> cert_pieces(certs.size()); | |
59 for (unsigned i = 0; i < certs.size(); i++) { | |
60 cert_pieces[i] = StringPiece(certs[i]); | |
61 } | |
62 scoped_refptr<net::X509Certificate> cert = | |
63 net::X509Certificate::CreateFromDERCertChain(cert_pieces); | |
64 if (!cert.get()) { | |
65 return QUIC_FAILURE; | |
66 } | |
67 | |
68 common_name_ = cert->subject().GetDisplayName(); | |
69 return QUIC_SUCCESS; | |
70 } | |
71 | |
72 const string& common_name() const { return common_name_; } | |
73 | |
74 private: | |
75 string common_name_; | |
76 }; | |
77 | |
78 } // anonymous namespace | |
79 | |
80 BalsaHeaders* MungeHeaders(const BalsaHeaders* const_headers, | |
81 bool secure) { | |
82 StringPiece uri = const_headers->request_uri(); | |
83 if (uri.empty()) { | |
84 return nullptr; | |
85 } | |
86 if (const_headers->request_method() == "CONNECT") { | |
87 return nullptr; | |
88 } | |
89 BalsaHeaders* headers = new BalsaHeaders; | |
90 headers->CopyFrom(*const_headers); | |
91 if (!uri.starts_with("https://") && | |
92 !uri.starts_with("http://")) { | |
93 // If we have a relative URL, set some defaults. | |
94 string full_uri = secure ? "https://www.google.com" : | |
95 "http://www.google.com"; | |
96 full_uri.append(uri.as_string()); | |
97 headers->SetRequestUri(full_uri); | |
98 } | |
99 return headers; | |
100 } | |
101 | |
102 MockableQuicClient::MockableQuicClient( | |
103 IPEndPoint server_address, | |
104 const QuicServerId& server_id, | |
105 const QuicVersionVector& supported_versions, | |
106 EpollServer* epoll_server) | |
107 : QuicClient(server_address, | |
108 server_id, | |
109 supported_versions, | |
110 epoll_server), | |
111 override_connection_id_(0), | |
112 test_writer_(nullptr) {} | |
113 | |
114 MockableQuicClient::MockableQuicClient( | |
115 IPEndPoint server_address, | |
116 const QuicServerId& server_id, | |
117 const QuicConfig& config, | |
118 const QuicVersionVector& supported_versions, | |
119 EpollServer* epoll_server) | |
120 : QuicClient(server_address, | |
121 server_id, | |
122 supported_versions, | |
123 config, | |
124 epoll_server), | |
125 override_connection_id_(0), | |
126 test_writer_(nullptr) {} | |
127 | |
128 MockableQuicClient::~MockableQuicClient() { | |
129 if (connected()) { | |
130 Disconnect(); | |
131 } | |
132 } | |
133 | |
134 QuicPacketWriter* MockableQuicClient::CreateQuicPacketWriter() { | |
135 QuicPacketWriter* writer = QuicClient::CreateQuicPacketWriter(); | |
136 if (!test_writer_) { | |
137 return writer; | |
138 } | |
139 test_writer_->set_writer(writer); | |
140 return test_writer_; | |
141 } | |
142 | |
143 QuicConnectionId MockableQuicClient::GenerateConnectionId() { | |
144 return override_connection_id_ ? override_connection_id_ | |
145 : QuicClient::GenerateConnectionId(); | |
146 } | |
147 | |
148 // Takes ownership of writer. | |
149 void MockableQuicClient::UseWriter(QuicPacketWriterWrapper* writer) { | |
150 CHECK(test_writer_ == nullptr); | |
151 test_writer_ = writer; | |
152 } | |
153 | |
154 void MockableQuicClient::UseConnectionId(QuicConnectionId connection_id) { | |
155 override_connection_id_ = connection_id; | |
156 } | |
157 | |
158 QuicTestClient::QuicTestClient(IPEndPoint server_address, | |
159 const string& server_hostname, | |
160 bool secure, | |
161 const QuicVersionVector& supported_versions) | |
162 : client_(new MockableQuicClient(server_address, | |
163 QuicServerId(server_hostname, | |
164 server_address.port(), | |
165 secure, | |
166 PRIVACY_MODE_DISABLED), | |
167 supported_versions, | |
168 &epoll_server_)) { | |
169 Initialize(secure); | |
170 } | |
171 | |
172 QuicTestClient::QuicTestClient( | |
173 IPEndPoint server_address, | |
174 const string& server_hostname, | |
175 bool secure, | |
176 const QuicConfig& config, | |
177 const QuicVersionVector& supported_versions) | |
178 : client_( | |
179 new MockableQuicClient(server_address, | |
180 QuicServerId(server_hostname, | |
181 server_address.port(), | |
182 secure, | |
183 PRIVACY_MODE_DISABLED), | |
184 config, | |
185 supported_versions, | |
186 &epoll_server_)) { | |
187 Initialize(secure); | |
188 } | |
189 | |
190 QuicTestClient::QuicTestClient() { | |
191 } | |
192 | |
193 QuicTestClient::~QuicTestClient() { | |
194 if (stream_) { | |
195 stream_->set_visitor(nullptr); | |
196 } | |
197 } | |
198 | |
199 void QuicTestClient::Initialize(bool secure) { | |
200 priority_ = 3; | |
201 connect_attempted_ = false; | |
202 secure_ = secure; | |
203 auto_reconnect_ = false; | |
204 buffer_body_ = true; | |
205 fec_policy_ = FEC_PROTECT_OPTIONAL; | |
206 proof_verifier_ = nullptr; | |
207 ClearPerRequestState(); | |
208 ExpectCertificates(secure_); | |
209 // As chrome will generally do this, we want it to be the default when it's | |
210 // not overridden. | |
211 if (!client_->config()->HasSetBytesForConnectionIdToSend()) { | |
212 client_->config()->SetBytesForConnectionIdToSend(0); | |
213 } | |
214 } | |
215 | |
216 void QuicTestClient::ExpectCertificates(bool on) { | |
217 if (on) { | |
218 proof_verifier_ = new RecordingProofVerifier; | |
219 client_->SetProofVerifier(proof_verifier_); | |
220 } else { | |
221 proof_verifier_ = nullptr; | |
222 client_->SetProofVerifier(nullptr); | |
223 } | |
224 } | |
225 | |
226 void QuicTestClient::SetUserAgentID(const string& user_agent_id) { | |
227 client_->SetUserAgentID(user_agent_id); | |
228 } | |
229 | |
230 ssize_t QuicTestClient::SendRequest(const string& uri) { | |
231 HTTPMessage message(HttpConstants::HTTP_1_1, | |
232 HttpConstants::GET, | |
233 uri); | |
234 return SendMessage(message); | |
235 } | |
236 | |
237 ssize_t QuicTestClient::SendMessage(const HTTPMessage& message) { | |
238 stream_ = nullptr; // Always force creation of a stream for SendMessage. | |
239 | |
240 // If we're not connected, try to find an sni hostname. | |
241 if (!connected()) { | |
242 GURL url(message.headers()->request_uri().as_string()); | |
243 if (!url.host().empty()) { | |
244 client_->set_server_id( | |
245 QuicServerId(url.host(), | |
246 url.EffectiveIntPort(), | |
247 url.SchemeIs("https"), | |
248 PRIVACY_MODE_DISABLED)); | |
249 } | |
250 } | |
251 | |
252 QuicSpdyClientStream* stream = GetOrCreateStream(); | |
253 if (!stream) { return 0; } | |
254 | |
255 scoped_ptr<BalsaHeaders> munged_headers(MungeHeaders(message.headers(), | |
256 secure_)); | |
257 ssize_t ret = GetOrCreateStream()->SendRequest( | |
258 munged_headers.get() ? *munged_headers : *message.headers(), | |
259 message.body(), message.has_complete_message()); | |
260 WaitForWriteToFlush(); | |
261 return ret; | |
262 } | |
263 | |
264 ssize_t QuicTestClient::SendData(string data, bool last_data) { | |
265 return SendData(data, last_data, nullptr); | |
266 } | |
267 | |
268 ssize_t QuicTestClient::SendData(string data, | |
269 bool last_data, | |
270 QuicAckNotifier::DelegateInterface* delegate) { | |
271 QuicSpdyClientStream* stream = GetOrCreateStream(); | |
272 if (!stream) { return 0; } | |
273 GetOrCreateStream()->SendBody(data, last_data, delegate); | |
274 WaitForWriteToFlush(); | |
275 return data.length(); | |
276 } | |
277 | |
278 bool QuicTestClient::response_complete() const { | |
279 return response_complete_; | |
280 } | |
281 | |
282 int QuicTestClient::response_header_size() const { | |
283 return response_header_size_; | |
284 } | |
285 | |
286 int64 QuicTestClient::response_body_size() const { | |
287 return response_body_size_; | |
288 } | |
289 | |
290 bool QuicTestClient::buffer_body() const { | |
291 return buffer_body_; | |
292 } | |
293 | |
294 void QuicTestClient::set_buffer_body(bool buffer_body) { | |
295 buffer_body_ = buffer_body; | |
296 } | |
297 | |
298 bool QuicTestClient::ServerInLameDuckMode() const { | |
299 return false; | |
300 } | |
301 | |
302 const string& QuicTestClient::response_body() { | |
303 return response_; | |
304 } | |
305 | |
306 string QuicTestClient::SendCustomSynchronousRequest( | |
307 const HTTPMessage& message) { | |
308 SendMessage(message); | |
309 WaitForResponse(); | |
310 return response_; | |
311 } | |
312 | |
313 string QuicTestClient::SendSynchronousRequest(const string& uri) { | |
314 if (SendRequest(uri) == 0) { | |
315 DLOG(ERROR) << "Failed the request for uri:" << uri; | |
316 return ""; | |
317 } | |
318 WaitForResponse(); | |
319 return response_; | |
320 } | |
321 | |
322 QuicSpdyClientStream* QuicTestClient::GetOrCreateStream() { | |
323 if (!connect_attempted_ || auto_reconnect_) { | |
324 if (!connected()) { | |
325 Connect(); | |
326 } | |
327 if (!connected()) { | |
328 return nullptr; | |
329 } | |
330 } | |
331 if (!stream_) { | |
332 stream_ = client_->CreateReliableClientStream(); | |
333 if (stream_ == nullptr) { | |
334 return nullptr; | |
335 } | |
336 stream_->set_visitor(this); | |
337 reinterpret_cast<QuicSpdyClientStream*>(stream_)->set_priority(priority_); | |
338 // Set FEC policy on stream. | |
339 ReliableQuicStreamPeer::SetFecPolicy(stream_, fec_policy_); | |
340 } | |
341 | |
342 return stream_; | |
343 } | |
344 | |
345 QuicErrorCode QuicTestClient::connection_error() { | |
346 return client()->session()->error(); | |
347 } | |
348 | |
349 MockableQuicClient* QuicTestClient::client() { return client_.get(); } | |
350 | |
351 const string& QuicTestClient::cert_common_name() const { | |
352 return reinterpret_cast<RecordingProofVerifier*>(proof_verifier_) | |
353 ->common_name(); | |
354 } | |
355 | |
356 QuicTagValueMap QuicTestClient::GetServerConfig() const { | |
357 QuicCryptoClientConfig* config = | |
358 QuicClientPeer::GetCryptoConfig(client_.get()); | |
359 QuicCryptoClientConfig::CachedState* state = | |
360 config->LookupOrCreate(client_->server_id()); | |
361 const CryptoHandshakeMessage* handshake_msg = state->GetServerConfig(); | |
362 if (handshake_msg != nullptr) { | |
363 return handshake_msg->tag_value_map(); | |
364 } else { | |
365 return QuicTagValueMap(); | |
366 } | |
367 } | |
368 | |
369 bool QuicTestClient::connected() const { | |
370 return client_->connected(); | |
371 } | |
372 | |
373 void QuicTestClient::Connect() { | |
374 DCHECK(!connected()); | |
375 if (!connect_attempted_) { | |
376 client_->Initialize(); | |
377 } | |
378 client_->Connect(); | |
379 connect_attempted_ = true; | |
380 } | |
381 | |
382 void QuicTestClient::ResetConnection() { | |
383 Disconnect(); | |
384 Connect(); | |
385 } | |
386 | |
387 void QuicTestClient::Disconnect() { | |
388 client_->Disconnect(); | |
389 connect_attempted_ = false; | |
390 } | |
391 | |
392 IPEndPoint QuicTestClient::LocalSocketAddress() const { | |
393 return client_->client_address(); | |
394 } | |
395 | |
396 void QuicTestClient::ClearPerRequestState() { | |
397 stream_error_ = QUIC_STREAM_NO_ERROR; | |
398 stream_ = nullptr; | |
399 response_ = ""; | |
400 response_complete_ = false; | |
401 response_headers_complete_ = false; | |
402 headers_.Clear(); | |
403 bytes_read_ = 0; | |
404 bytes_written_ = 0; | |
405 response_header_size_ = 0; | |
406 response_body_size_ = 0; | |
407 } | |
408 | |
409 void QuicTestClient::WaitForResponseForMs(int timeout_ms) { | |
410 int64 timeout_us = timeout_ms * base::Time::kMicrosecondsPerMillisecond; | |
411 int64 old_timeout_us = epoll_server()->timeout_in_us(); | |
412 if (timeout_us > 0) { | |
413 epoll_server()->set_timeout_in_us(timeout_us); | |
414 } | |
415 const QuicClock* clock = | |
416 QuicConnectionPeer::GetHelper(client()->session()->connection())-> | |
417 GetClock(); | |
418 QuicTime end_waiting_time = clock->Now().Add( | |
419 QuicTime::Delta::FromMicroseconds(timeout_us)); | |
420 while (stream_ != nullptr && | |
421 !client_->session()->IsClosedStream(stream_->id()) && | |
422 (timeout_us < 0 || clock->Now() < end_waiting_time)) { | |
423 client_->WaitForEvents(); | |
424 } | |
425 if (timeout_us > 0) { | |
426 epoll_server()->set_timeout_in_us(old_timeout_us); | |
427 } | |
428 } | |
429 | |
430 void QuicTestClient::WaitForInitialResponseForMs(int timeout_ms) { | |
431 int64 timeout_us = timeout_ms * base::Time::kMicrosecondsPerMillisecond; | |
432 int64 old_timeout_us = epoll_server()->timeout_in_us(); | |
433 if (timeout_us > 0) { | |
434 epoll_server()->set_timeout_in_us(timeout_us); | |
435 } | |
436 const QuicClock* clock = | |
437 QuicConnectionPeer::GetHelper(client()->session()->connection())-> | |
438 GetClock(); | |
439 QuicTime end_waiting_time = clock->Now().Add( | |
440 QuicTime::Delta::FromMicroseconds(timeout_us)); | |
441 while (stream_ != nullptr && | |
442 !client_->session()->IsClosedStream(stream_->id()) && | |
443 stream_->stream_bytes_read() == 0 && | |
444 (timeout_us < 0 || clock->Now() < end_waiting_time)) { | |
445 client_->WaitForEvents(); | |
446 } | |
447 if (timeout_us > 0) { | |
448 epoll_server()->set_timeout_in_us(old_timeout_us); | |
449 } | |
450 } | |
451 | |
452 ssize_t QuicTestClient::Send(const void *buffer, size_t size) { | |
453 return SendData(string(static_cast<const char*>(buffer), size), false); | |
454 } | |
455 | |
456 bool QuicTestClient::response_headers_complete() const { | |
457 if (stream_ != nullptr) { | |
458 return stream_->headers_decompressed(); | |
459 } else { | |
460 return response_headers_complete_; | |
461 } | |
462 } | |
463 | |
464 const BalsaHeaders* QuicTestClient::response_headers() const { | |
465 if (stream_ != nullptr) { | |
466 return &stream_->headers(); | |
467 } else { | |
468 return &headers_; | |
469 } | |
470 } | |
471 | |
472 int64 QuicTestClient::response_size() const { | |
473 return bytes_read_; | |
474 } | |
475 | |
476 size_t QuicTestClient::bytes_read() const { | |
477 return bytes_read_; | |
478 } | |
479 | |
480 size_t QuicTestClient::bytes_written() const { | |
481 return bytes_written_; | |
482 } | |
483 | |
484 void QuicTestClient::OnClose(QuicDataStream* stream) { | |
485 if (stream_ != stream) { | |
486 return; | |
487 } | |
488 if (buffer_body()) { | |
489 // TODO(fnk): The stream still buffers the whole thing. Fix that. | |
490 response_ = stream_->data(); | |
491 } | |
492 response_complete_ = true; | |
493 response_headers_complete_ = stream_->headers_decompressed(); | |
494 headers_.CopyFrom(stream_->headers()); | |
495 stream_error_ = stream_->stream_error(); | |
496 bytes_read_ = stream_->stream_bytes_read() + stream_->header_bytes_read(); | |
497 bytes_written_ = | |
498 stream_->stream_bytes_written() + stream_->header_bytes_written(); | |
499 response_header_size_ = headers_.GetSizeForWriteBuffer(); | |
500 response_body_size_ = stream_->data().size(); | |
501 stream_ = nullptr; | |
502 } | |
503 | |
504 void QuicTestClient::UseWriter(QuicPacketWriterWrapper* writer) { | |
505 client_->UseWriter(writer); | |
506 } | |
507 | |
508 void QuicTestClient::UseConnectionId(QuicConnectionId connection_id) { | |
509 DCHECK(!connected()); | |
510 client_->UseConnectionId(connection_id); | |
511 } | |
512 | |
513 ssize_t QuicTestClient::SendAndWaitForResponse(const void *buffer, | |
514 size_t size) { | |
515 LOG(DFATAL) << "Not implemented"; | |
516 return 0; | |
517 } | |
518 | |
519 void QuicTestClient::Bind(IPEndPoint* local_address) { | |
520 DLOG(WARNING) << "Bind will be done during connect"; | |
521 } | |
522 | |
523 string QuicTestClient::SerializeMessage(const HTTPMessage& message) { | |
524 LOG(DFATAL) << "Not implemented"; | |
525 return ""; | |
526 } | |
527 | |
528 IPAddressNumber QuicTestClient::bind_to_address() const { | |
529 return client_->bind_to_address(); | |
530 } | |
531 | |
532 void QuicTestClient::set_bind_to_address(IPAddressNumber address) { | |
533 client_->set_bind_to_address(address); | |
534 } | |
535 | |
536 const IPEndPoint& QuicTestClient::address() const { | |
537 LOG(DFATAL) << "Not implemented"; | |
538 return client_->server_address(); | |
539 } | |
540 | |
541 size_t QuicTestClient::requests_sent() const { | |
542 LOG(DFATAL) << "Not implemented"; | |
543 return 0; | |
544 } | |
545 | |
546 void QuicTestClient::WaitForWriteToFlush() { | |
547 while (connected() && client()->session()->HasDataToWrite()) { | |
548 client_->WaitForEvents(); | |
549 } | |
550 } | |
551 | |
552 void QuicTestClient::SetFecPolicy(FecPolicy fec_policy) { | |
553 fec_policy_ = fec_policy; | |
554 // Set policy for headers and crypto streams. | |
555 ReliableQuicStreamPeer::SetFecPolicy( | |
556 QuicSessionPeer::GetHeadersStream(client()->session()), fec_policy); | |
557 ReliableQuicStreamPeer::SetFecPolicy(client()->session()->GetCryptoStream(), | |
558 fec_policy); | |
559 } | |
560 | |
561 } // namespace test | |
562 } // namespace tools | |
563 } // namespace net | |
OLD | NEW |