server_test.go 41 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505
  1. // Copyright 2014 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. // See https://code.google.com/p/go/source/browse/CONTRIBUTORS
  5. // Licensed under the same terms as Go itself:
  6. // https://code.google.com/p/go/source/browse/LICENSE
  7. package http2
  8. import (
  9. "bytes"
  10. "crypto/tls"
  11. "errors"
  12. "fmt"
  13. "io"
  14. "io/ioutil"
  15. "log"
  16. "net"
  17. "net/http"
  18. "net/http/httptest"
  19. "os"
  20. "reflect"
  21. "runtime"
  22. "strconv"
  23. "strings"
  24. "sync"
  25. "sync/atomic"
  26. "testing"
  27. "time"
  28. "github.com/bradfitz/http2/hpack"
  29. )
  30. type serverTester struct {
  31. cc net.Conn // client conn
  32. t *testing.T
  33. ts *httptest.Server
  34. fr *Framer
  35. logBuf *bytes.Buffer
  36. sc *serverConn
  37. }
  38. func newServerTester(t *testing.T, handler http.HandlerFunc) *serverTester {
  39. logBuf := new(bytes.Buffer)
  40. ts := httptest.NewUnstartedServer(handler)
  41. ConfigureServer(ts.Config, &Server{})
  42. ts.TLS = ts.Config.TLSConfig // the httptest.Server has its own copy of this TLS config
  43. ts.Config.ErrorLog = log.New(io.MultiWriter(twriter{t: t}, logBuf), "", log.LstdFlags)
  44. ts.StartTLS()
  45. if VerboseLogs {
  46. t.Logf("Running test server at: %s", ts.URL)
  47. }
  48. var (
  49. mu sync.Mutex
  50. sc *serverConn
  51. )
  52. testHookGetServerConn = func(v *serverConn) {
  53. mu.Lock()
  54. defer mu.Unlock()
  55. sc = v
  56. sc.testHookCh = make(chan func())
  57. }
  58. cc, err := tls.Dial("tcp", ts.Listener.Addr().String(), &tls.Config{
  59. InsecureSkipVerify: true,
  60. NextProtos: []string{npnProto},
  61. })
  62. if err != nil {
  63. t.Fatal(err)
  64. }
  65. log.SetOutput(twriter{t})
  66. mu.Lock()
  67. return &serverTester{
  68. t: t,
  69. ts: ts,
  70. cc: cc,
  71. fr: NewFramer(cc, cc),
  72. logBuf: logBuf,
  73. sc: sc,
  74. }
  75. }
  76. func (st *serverTester) stream(id uint32) *stream {
  77. ch := make(chan *stream, 1)
  78. st.sc.testHookCh <- func() {
  79. ch <- st.sc.streams[id]
  80. }
  81. return <-ch
  82. }
  83. func (st *serverTester) streamState(id uint32) streamState {
  84. ch := make(chan streamState, 1)
  85. st.sc.testHookCh <- func() {
  86. ch <- st.sc.state(id)
  87. }
  88. return <-ch
  89. }
  90. func (st *serverTester) Close() {
  91. st.ts.Close()
  92. st.cc.Close()
  93. log.SetOutput(os.Stderr)
  94. }
  95. // greet initiates the client's HTTP/2 connection into a state where
  96. // frames may be sent.
  97. func (st *serverTester) greet() {
  98. st.writePreface()
  99. st.writeInitialSettings()
  100. st.wantSettings()
  101. st.writeSettingsAck()
  102. st.wantSettingsAck()
  103. }
  104. func (st *serverTester) writePreface() {
  105. n, err := st.cc.Write(clientPreface)
  106. if err != nil {
  107. st.t.Fatalf("Error writing client preface: %v", err)
  108. }
  109. if n != len(clientPreface) {
  110. st.t.Fatalf("Writing client preface, wrote %d bytes; want %d", n, len(clientPreface))
  111. }
  112. }
  113. func (st *serverTester) writeInitialSettings() {
  114. if err := st.fr.WriteSettings(); err != nil {
  115. st.t.Fatalf("Error writing initial SETTINGS frame from client to server: %v", err)
  116. }
  117. }
  118. func (st *serverTester) writeSettingsAck() {
  119. if err := st.fr.WriteSettingsAck(); err != nil {
  120. st.t.Fatalf("Error writing ACK of server's SETTINGS: %v", err)
  121. }
  122. }
  123. func (st *serverTester) writeHeaders(p HeadersFrameParam) {
  124. if err := st.fr.WriteHeaders(p); err != nil {
  125. st.t.Fatalf("Error writing HEADERS: %v", err)
  126. }
  127. }
  128. // bodylessReq1 writes a HEADERS frames with StreamID 1 and EndStream and EndHeaders set.
  129. func (st *serverTester) bodylessReq1(headers ...string) {
  130. st.writeHeaders(HeadersFrameParam{
  131. StreamID: 1, // clients send odd numbers
  132. BlockFragment: encodeHeader(st.t, headers...),
  133. EndStream: true,
  134. EndHeaders: true,
  135. })
  136. }
  137. func (st *serverTester) writeData(streamID uint32, endStream bool, data []byte) {
  138. if err := st.fr.WriteData(streamID, endStream, data); err != nil {
  139. st.t.Fatalf("Error writing DATA: %v", err)
  140. }
  141. }
  142. func (st *serverTester) readFrame() (Frame, error) {
  143. frc := make(chan Frame, 1)
  144. errc := make(chan error, 1)
  145. go func() {
  146. fr, err := st.fr.ReadFrame()
  147. if err != nil {
  148. errc <- err
  149. } else {
  150. frc <- fr
  151. }
  152. }()
  153. t := time.NewTimer(2 * time.Second)
  154. defer t.Stop()
  155. select {
  156. case f := <-frc:
  157. return f, nil
  158. case err := <-errc:
  159. return nil, err
  160. case <-t.C:
  161. return nil, errors.New("timeout waiting for frame")
  162. }
  163. }
  164. func (st *serverTester) wantHeaders() *HeadersFrame {
  165. f, err := st.readFrame()
  166. if err != nil {
  167. st.t.Fatalf("Error while expecting a HEADERS frame: %v", err)
  168. }
  169. hf, ok := f.(*HeadersFrame)
  170. if !ok {
  171. st.t.Fatalf("got a %T; want *HeadersFrame", f)
  172. }
  173. return hf
  174. }
  175. func (st *serverTester) wantData() *DataFrame {
  176. f, err := st.readFrame()
  177. if err != nil {
  178. st.t.Fatalf("Error while expecting a DATA frame: %v", err)
  179. }
  180. df, ok := f.(*DataFrame)
  181. if !ok {
  182. st.t.Fatalf("got a %T; want *DataFrame", f)
  183. }
  184. return df
  185. }
  186. func (st *serverTester) wantSettings() *SettingsFrame {
  187. f, err := st.readFrame()
  188. if err != nil {
  189. st.t.Fatalf("Error while expecting a SETTINGS frame: %v", err)
  190. }
  191. sf, ok := f.(*SettingsFrame)
  192. if !ok {
  193. st.t.Fatalf("got a %T; want *SettingsFrame", f)
  194. }
  195. return sf
  196. }
  197. func (st *serverTester) wantPing() *PingFrame {
  198. f, err := st.readFrame()
  199. if err != nil {
  200. st.t.Fatalf("Error while expecting a PING frame: %v", err)
  201. }
  202. pf, ok := f.(*PingFrame)
  203. if !ok {
  204. st.t.Fatalf("got a %T; want *PingFrame", f)
  205. }
  206. return pf
  207. }
  208. func (st *serverTester) wantGoAway() *GoAwayFrame {
  209. f, err := st.readFrame()
  210. if err != nil {
  211. st.t.Fatalf("Error while expecting a GOAWAY frame: %v", err)
  212. }
  213. gf, ok := f.(*GoAwayFrame)
  214. if !ok {
  215. st.t.Fatalf("got a %T; want *GoAwayFrame", f)
  216. }
  217. return gf
  218. }
  219. func (st *serverTester) wantRSTStream(streamID uint32, errCode ErrCode) {
  220. f, err := st.readFrame()
  221. if err != nil {
  222. st.t.Fatalf("Error while expecting an RSTStream frame: %v", err)
  223. }
  224. rs, ok := f.(*RSTStreamFrame)
  225. if !ok {
  226. st.t.Fatalf("got a %T; want *RSTStreamFrame", f)
  227. }
  228. if rs.FrameHeader.StreamID != streamID {
  229. st.t.Fatalf("RSTStream StreamID = %d; want %d", rs.FrameHeader.StreamID, streamID)
  230. }
  231. if rs.ErrCode != errCode {
  232. st.t.Fatalf("RSTStream ErrCode = %d (%s); want %d (%s)", rs.ErrCode, rs.ErrCode, errCode, errCode)
  233. }
  234. }
  235. func (st *serverTester) wantWindowUpdate(streamID, incr uint32) {
  236. f, err := st.readFrame()
  237. if err != nil {
  238. st.t.Fatalf("Error while expecting an RSTStream frame: %v", err)
  239. }
  240. wu, ok := f.(*WindowUpdateFrame)
  241. if !ok {
  242. st.t.Fatalf("got a %T; want *WindowUpdateFrame", f)
  243. }
  244. if wu.FrameHeader.StreamID != streamID {
  245. st.t.Fatalf("WindowUpdate StreamID = %d; want %d", wu.FrameHeader.StreamID, streamID)
  246. }
  247. if wu.Increment != incr {
  248. st.t.Fatalf("WindowUpdate increment = %d; want %d", wu.Increment, incr)
  249. }
  250. }
  251. func (st *serverTester) wantSettingsAck() {
  252. f, err := st.readFrame()
  253. if err != nil {
  254. st.t.Fatal(err)
  255. }
  256. sf, ok := f.(*SettingsFrame)
  257. if !ok {
  258. st.t.Fatalf("Wanting a settings ACK, received a %T", f)
  259. }
  260. if !sf.Header().Flags.Has(FlagSettingsAck) {
  261. st.t.Fatal("Settings Frame didn't have ACK set")
  262. }
  263. }
  264. func TestServer(t *testing.T) {
  265. gotReq := make(chan bool, 1)
  266. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  267. w.Header().Set("Foo", "Bar")
  268. gotReq <- true
  269. })
  270. defer st.Close()
  271. covers("3.5", `
  272. The server connection preface consists of a potentially empty
  273. SETTINGS frame ([SETTINGS]) that MUST be the first frame the
  274. server sends in the HTTP/2 connection.
  275. `)
  276. st.writePreface()
  277. st.writeInitialSettings()
  278. st.wantSettings().ForeachSetting(func(s Setting) error {
  279. t.Logf("Server sent setting %v = %v", s.ID, s.Val)
  280. return nil
  281. })
  282. st.writeSettingsAck()
  283. st.wantSettingsAck()
  284. st.writeHeaders(HeadersFrameParam{
  285. StreamID: 1, // clients send odd numbers
  286. BlockFragment: encodeHeader(t),
  287. EndStream: true, // no DATA frames
  288. EndHeaders: true,
  289. })
  290. select {
  291. case <-gotReq:
  292. case <-time.After(2 * time.Second):
  293. t.Error("timeout waiting for request")
  294. }
  295. }
  296. func TestServer_Request_Get(t *testing.T) {
  297. testServerRequest(t, func(st *serverTester) {
  298. st.writeHeaders(HeadersFrameParam{
  299. StreamID: 1, // clients send odd numbers
  300. BlockFragment: encodeHeader(t, "foo-bar", "some-value"),
  301. EndStream: true, // no DATA frames
  302. EndHeaders: true,
  303. })
  304. }, func(r *http.Request) {
  305. if r.Method != "GET" {
  306. t.Errorf("Method = %q; want GET", r.Method)
  307. }
  308. if r.URL.Path != "/" {
  309. t.Errorf("URL.Path = %q; want /", r.URL.Path)
  310. }
  311. if r.ContentLength != 0 {
  312. t.Errorf("ContentLength = %v; want 0", r.ContentLength)
  313. }
  314. if r.Close {
  315. t.Error("Close = true; want false")
  316. }
  317. if !strings.Contains(r.RemoteAddr, ":") {
  318. t.Errorf("RemoteAddr = %q; want something with a colon", r.RemoteAddr)
  319. }
  320. if r.Proto != "HTTP/2.0" || r.ProtoMajor != 2 || r.ProtoMinor != 0 {
  321. t.Errorf("Proto = %q Major=%v,Minor=%v; want HTTP/2.0", r.Proto, r.ProtoMajor, r.ProtoMinor)
  322. }
  323. wantHeader := http.Header{
  324. "Foo-Bar": []string{"some-value"},
  325. }
  326. if !reflect.DeepEqual(r.Header, wantHeader) {
  327. t.Errorf("Header = %#v; want %#v", r.Header, wantHeader)
  328. }
  329. if n, err := r.Body.Read([]byte(" ")); err != io.EOF || n != 0 {
  330. t.Errorf("Read = %d, %v; want 0, EOF", n, err)
  331. }
  332. })
  333. }
  334. func TestServer_Request_Get_PathSlashes(t *testing.T) {
  335. testServerRequest(t, func(st *serverTester) {
  336. st.writeHeaders(HeadersFrameParam{
  337. StreamID: 1, // clients send odd numbers
  338. BlockFragment: encodeHeader(t, ":path", "/%2f/"),
  339. EndStream: true, // no DATA frames
  340. EndHeaders: true,
  341. })
  342. }, func(r *http.Request) {
  343. if r.RequestURI != "/%2f/" {
  344. t.Errorf("RequestURI = %q; want /%2f/", r.RequestURI)
  345. }
  346. if r.URL.Path != "///" {
  347. t.Errorf("URL.Path = %q; want ///", r.URL.Path)
  348. }
  349. })
  350. }
  351. // TODO: add a test with EndStream=true on the HEADERS but setting a
  352. // Content-Length anyway. Should we just omit it and force it to
  353. // zero?
  354. func TestServer_Request_Post_NoContentLength_EndStream(t *testing.T) {
  355. testServerRequest(t, func(st *serverTester) {
  356. st.writeHeaders(HeadersFrameParam{
  357. StreamID: 1, // clients send odd numbers
  358. BlockFragment: encodeHeader(t, ":method", "POST"),
  359. EndStream: true,
  360. EndHeaders: true,
  361. })
  362. }, func(r *http.Request) {
  363. if r.Method != "POST" {
  364. t.Errorf("Method = %q; want POST", r.Method)
  365. }
  366. if r.ContentLength != 0 {
  367. t.Errorf("ContentLength = %v; want 0", r.ContentLength)
  368. }
  369. if n, err := r.Body.Read([]byte(" ")); err != io.EOF || n != 0 {
  370. t.Errorf("Read = %d, %v; want 0, EOF", n, err)
  371. }
  372. })
  373. }
  374. func TestServer_Request_Post_Body_ImmediateEOF(t *testing.T) {
  375. testBodyContents(t, -1, "", func(st *serverTester) {
  376. st.writeHeaders(HeadersFrameParam{
  377. StreamID: 1, // clients send odd numbers
  378. BlockFragment: encodeHeader(t, ":method", "POST"),
  379. EndStream: false, // to say DATA frames are coming
  380. EndHeaders: true,
  381. })
  382. st.writeData(1, true, nil) // just kidding. empty body.
  383. })
  384. }
  385. func TestServer_Request_Post_Body_OneData(t *testing.T) {
  386. const content = "Some content"
  387. testBodyContents(t, -1, content, func(st *serverTester) {
  388. st.writeHeaders(HeadersFrameParam{
  389. StreamID: 1, // clients send odd numbers
  390. BlockFragment: encodeHeader(t, ":method", "POST"),
  391. EndStream: false, // to say DATA frames are coming
  392. EndHeaders: true,
  393. })
  394. st.writeData(1, true, []byte(content))
  395. })
  396. }
  397. func TestServer_Request_Post_Body_TwoData(t *testing.T) {
  398. const content = "Some content"
  399. testBodyContents(t, -1, content, func(st *serverTester) {
  400. st.writeHeaders(HeadersFrameParam{
  401. StreamID: 1, // clients send odd numbers
  402. BlockFragment: encodeHeader(t, ":method", "POST"),
  403. EndStream: false, // to say DATA frames are coming
  404. EndHeaders: true,
  405. })
  406. st.writeData(1, false, []byte(content[:5]))
  407. st.writeData(1, true, []byte(content[5:]))
  408. })
  409. }
  410. func TestServer_Request_Post_Body_ContentLength_Correct(t *testing.T) {
  411. const content = "Some content"
  412. testBodyContents(t, int64(len(content)), content, func(st *serverTester) {
  413. st.writeHeaders(HeadersFrameParam{
  414. StreamID: 1, // clients send odd numbers
  415. BlockFragment: encodeHeader(t,
  416. ":method", "POST",
  417. "content-length", strconv.Itoa(len(content)),
  418. ),
  419. EndStream: false, // to say DATA frames are coming
  420. EndHeaders: true,
  421. })
  422. st.writeData(1, true, []byte(content))
  423. })
  424. }
  425. func TestServer_Request_Post_Body_ContentLength_TooLarge(t *testing.T) {
  426. testBodyContentsFail(t, 3, "Request declared a Content-Length of 3 but only wrote 2 bytes",
  427. func(st *serverTester) {
  428. st.writeHeaders(HeadersFrameParam{
  429. StreamID: 1, // clients send odd numbers
  430. BlockFragment: encodeHeader(t,
  431. ":method", "POST",
  432. "content-length", "3",
  433. ),
  434. EndStream: false, // to say DATA frames are coming
  435. EndHeaders: true,
  436. })
  437. st.writeData(1, true, []byte("12"))
  438. })
  439. }
  440. func TestServer_Request_Post_Body_ContentLength_TooSmall(t *testing.T) {
  441. testBodyContentsFail(t, 4, "Sender tried to send more than declared Content-Length of 4 bytes",
  442. func(st *serverTester) {
  443. st.writeHeaders(HeadersFrameParam{
  444. StreamID: 1, // clients send odd numbers
  445. BlockFragment: encodeHeader(t,
  446. ":method", "POST",
  447. "content-length", "4",
  448. ),
  449. EndStream: false, // to say DATA frames are coming
  450. EndHeaders: true,
  451. })
  452. st.writeData(1, true, []byte("12345"))
  453. })
  454. }
  455. func testBodyContents(t *testing.T, wantContentLength int64, wantBody string, write func(st *serverTester)) {
  456. testServerRequest(t, write, func(r *http.Request) {
  457. if r.Method != "POST" {
  458. t.Errorf("Method = %q; want POST", r.Method)
  459. }
  460. if r.ContentLength != wantContentLength {
  461. t.Errorf("ContentLength = %v; want %d", r.ContentLength, wantContentLength)
  462. }
  463. all, err := ioutil.ReadAll(r.Body)
  464. if err != nil {
  465. t.Fatal(err)
  466. }
  467. if string(all) != wantBody {
  468. t.Errorf("Read = %q; want %q", all, wantBody)
  469. }
  470. if err := r.Body.Close(); err != nil {
  471. t.Fatalf("Close: %v", err)
  472. }
  473. })
  474. }
  475. func testBodyContentsFail(t *testing.T, wantContentLength int64, wantReadError string, write func(st *serverTester)) {
  476. testServerRequest(t, write, func(r *http.Request) {
  477. if r.Method != "POST" {
  478. t.Errorf("Method = %q; want POST", r.Method)
  479. }
  480. if r.ContentLength != wantContentLength {
  481. t.Errorf("ContentLength = %v; want %d", r.ContentLength, wantContentLength)
  482. }
  483. all, err := ioutil.ReadAll(r.Body)
  484. if err == nil {
  485. t.Fatalf("expected an error (%q) reading from the body. Successfully read %q instead.",
  486. wantReadError, all)
  487. }
  488. if !strings.Contains(err.Error(), wantReadError) {
  489. t.Fatalf("Body.Read = %v; want substring %q", err, wantReadError)
  490. }
  491. if err := r.Body.Close(); err != nil {
  492. t.Fatalf("Close: %v", err)
  493. }
  494. })
  495. }
  496. // Using a Host header, instead of :authority
  497. func TestServer_Request_Get_Host(t *testing.T) {
  498. const host = "example.com"
  499. testServerRequest(t, func(st *serverTester) {
  500. st.writeHeaders(HeadersFrameParam{
  501. StreamID: 1, // clients send odd numbers
  502. BlockFragment: encodeHeader(t, "host", host),
  503. EndStream: true,
  504. EndHeaders: true,
  505. })
  506. }, func(r *http.Request) {
  507. if r.Host != host {
  508. t.Errorf("Host = %q; want %q", r.Host, host)
  509. }
  510. })
  511. }
  512. // Using an :authority pseudo-header, instead of Host
  513. func TestServer_Request_Get_Authority(t *testing.T) {
  514. const host = "example.com"
  515. testServerRequest(t, func(st *serverTester) {
  516. st.writeHeaders(HeadersFrameParam{
  517. StreamID: 1, // clients send odd numbers
  518. BlockFragment: encodeHeader(t, ":authority", host),
  519. EndStream: true,
  520. EndHeaders: true,
  521. })
  522. }, func(r *http.Request) {
  523. if r.Host != host {
  524. t.Errorf("Host = %q; want %q", r.Host, host)
  525. }
  526. })
  527. }
  528. func TestServer_Request_WithContinuation(t *testing.T) {
  529. wantHeader := http.Header{
  530. "Foo-One": []string{"value-one"},
  531. "Foo-Two": []string{"value-two"},
  532. "Foo-Three": []string{"value-three"},
  533. }
  534. testServerRequest(t, func(st *serverTester) {
  535. fullHeaders := encodeHeader(t,
  536. "foo-one", "value-one",
  537. "foo-two", "value-two",
  538. "foo-three", "value-three",
  539. )
  540. remain := fullHeaders
  541. chunks := 0
  542. for len(remain) > 0 {
  543. const maxChunkSize = 5
  544. chunk := remain
  545. if len(chunk) > maxChunkSize {
  546. chunk = chunk[:maxChunkSize]
  547. }
  548. remain = remain[len(chunk):]
  549. if chunks == 0 {
  550. st.writeHeaders(HeadersFrameParam{
  551. StreamID: 1, // clients send odd numbers
  552. BlockFragment: chunk,
  553. EndStream: true, // no DATA frames
  554. EndHeaders: false, // we'll have continuation frames
  555. })
  556. } else {
  557. err := st.fr.WriteContinuation(1, len(remain) == 0, chunk)
  558. if err != nil {
  559. t.Fatal(err)
  560. }
  561. }
  562. chunks++
  563. }
  564. if chunks < 2 {
  565. t.Fatal("too few chunks")
  566. }
  567. }, func(r *http.Request) {
  568. if !reflect.DeepEqual(r.Header, wantHeader) {
  569. t.Errorf("Header = %#v; want %#v", r.Header, wantHeader)
  570. }
  571. })
  572. }
  573. // Concatenated cookie headers. ("8.1.2.5 Compressing the Cookie Header Field")
  574. func TestServer_Request_CookieConcat(t *testing.T) {
  575. const host = "example.com"
  576. testServerRequest(t, func(st *serverTester) {
  577. st.bodylessReq1(
  578. ":authority", host,
  579. "cookie", "a=b",
  580. "cookie", "c=d",
  581. "cookie", "e=f",
  582. )
  583. }, func(r *http.Request) {
  584. const want = "a=b; c=d; e=f"
  585. if got := r.Header.Get("Cookie"); got != want {
  586. t.Errorf("Cookie = %q; want %q", got, want)
  587. }
  588. })
  589. }
  590. func TestServer_Request_Reject_CapitalHeader(t *testing.T) {
  591. testRejectRequest(t, func(st *serverTester) { st.bodylessReq1("UPPER", "v") })
  592. }
  593. func TestServer_Request_Reject_Pseudo_Missing_method(t *testing.T) {
  594. testRejectRequest(t, func(st *serverTester) { st.bodylessReq1(":method", "") })
  595. }
  596. func TestServer_Request_Reject_Pseudo_ExactlyOne(t *testing.T) {
  597. // 8.1.2.3 Request Pseudo-Header Fields
  598. // "All HTTP/2 requests MUST include exactly one valid value" ...
  599. testRejectRequest(t, func(st *serverTester) { st.bodylessReq1(":method", "GET", ":method", "POST") })
  600. }
  601. func TestServer_Request_Reject_Pseudo_AfterRegular(t *testing.T) {
  602. // 8.1.2.3 Request Pseudo-Header Fields
  603. // "All pseudo-header fields MUST appear in the header block
  604. // before regular header fields. Any request or response that
  605. // contains a pseudo-header field that appears in a header
  606. // block after a regular header field MUST be treated as
  607. // malformed (Section 8.1.2.6)."
  608. testRejectRequest(t, func(st *serverTester) {
  609. var buf bytes.Buffer
  610. enc := hpack.NewEncoder(&buf)
  611. enc.WriteField(hpack.HeaderField{Name: ":method", Value: "GET"})
  612. enc.WriteField(hpack.HeaderField{Name: "regular", Value: "foobar"})
  613. enc.WriteField(hpack.HeaderField{Name: ":path", Value: "/"})
  614. enc.WriteField(hpack.HeaderField{Name: ":scheme", Value: "https"})
  615. st.writeHeaders(HeadersFrameParam{
  616. StreamID: 1, // clients send odd numbers
  617. BlockFragment: buf.Bytes(),
  618. EndStream: true,
  619. EndHeaders: true,
  620. })
  621. })
  622. }
  623. func TestServer_Request_Reject_Pseudo_Missing_path(t *testing.T) {
  624. testRejectRequest(t, func(st *serverTester) { st.bodylessReq1(":path", "") })
  625. }
  626. func TestServer_Request_Reject_Pseudo_Missing_scheme(t *testing.T) {
  627. testRejectRequest(t, func(st *serverTester) { st.bodylessReq1(":scheme", "") })
  628. }
  629. func TestServer_Request_Reject_Pseudo_scheme_invalid(t *testing.T) {
  630. testRejectRequest(t, func(st *serverTester) { st.bodylessReq1(":scheme", "bogus") })
  631. }
  632. func TestServer_Request_Reject_Pseudo_Unknown(t *testing.T) {
  633. testRejectRequest(t, func(st *serverTester) { st.bodylessReq1(":unknown_thing", "") })
  634. }
  635. func testRejectRequest(t *testing.T, send func(*serverTester)) {
  636. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  637. t.Fatal("server request made it to handler; should've been rejected")
  638. })
  639. defer st.Close()
  640. st.greet()
  641. send(st)
  642. st.wantRSTStream(1, ErrCodeProtocol)
  643. }
  644. func TestServer_Ping(t *testing.T) {
  645. st := newServerTester(t, nil)
  646. defer st.Close()
  647. st.greet()
  648. // Server should ignore this one, since it has ACK set.
  649. ackPingData := [8]byte{1, 2, 4, 8, 16, 32, 64, 128}
  650. if err := st.fr.WritePing(true, ackPingData); err != nil {
  651. t.Fatal(err)
  652. }
  653. // But the server should reply to this one, since ACK is false.
  654. pingData := [8]byte{1, 2, 3, 4, 5, 6, 7, 8}
  655. if err := st.fr.WritePing(false, pingData); err != nil {
  656. t.Fatal(err)
  657. }
  658. pf := st.wantPing()
  659. if !pf.Flags.Has(FlagPingAck) {
  660. t.Error("response ping doesn't have ACK set")
  661. }
  662. if pf.Data != pingData {
  663. t.Errorf("response ping has data %q; want %q", pf.Data, pingData)
  664. }
  665. }
  666. func TestServer_RejectsLargeFrames(t *testing.T) {
  667. st := newServerTester(t, nil)
  668. defer st.Close()
  669. st.greet()
  670. // Write too large of a frame (too large by one byte)
  671. // We ignore the return value because it's expected that the server
  672. // will only read the first 9 bytes (the headre) and then disconnect.
  673. st.fr.WriteRawFrame(0xff, 0, 0, make([]byte, defaultMaxReadFrameSize+1))
  674. gf := st.wantGoAway()
  675. if gf.ErrCode != ErrCodeFrameSize {
  676. t.Errorf("GOAWAY err = %v; want %v", gf.ErrCode, ErrCodeFrameSize)
  677. }
  678. }
  679. func TestServer_Handler_Sends_WindowUpdate(t *testing.T) {
  680. puppet := newHandlerPuppet()
  681. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  682. puppet.act(w, r)
  683. })
  684. defer st.Close()
  685. defer puppet.done()
  686. st.greet()
  687. st.writeHeaders(HeadersFrameParam{
  688. StreamID: 1, // clients send odd numbers
  689. BlockFragment: encodeHeader(t, ":method", "POST"),
  690. EndStream: false, // data coming
  691. EndHeaders: true,
  692. })
  693. st.writeData(1, true, []byte("abcdef"))
  694. puppet.do(func(w http.ResponseWriter, r *http.Request) {
  695. buf := make([]byte, 3)
  696. _, err := io.ReadFull(r.Body, buf)
  697. if err != nil {
  698. t.Error(err)
  699. return
  700. }
  701. if string(buf) != "abc" {
  702. t.Errorf("read %q; want abc", buf)
  703. }
  704. })
  705. st.wantWindowUpdate(0, 3)
  706. st.wantWindowUpdate(1, 3)
  707. puppet.do(func(w http.ResponseWriter, r *http.Request) {
  708. buf := make([]byte, 3)
  709. _, err := io.ReadFull(r.Body, buf)
  710. if err != nil {
  711. t.Error(err)
  712. return
  713. }
  714. if string(buf) != "def" {
  715. t.Errorf("read %q; want abc", buf)
  716. }
  717. })
  718. st.wantWindowUpdate(0, 3)
  719. st.wantWindowUpdate(1, 3)
  720. }
  721. func TestServer_Send_GoAway_After_Bogus_WindowUpdate(t *testing.T) {
  722. st := newServerTester(t, nil)
  723. defer st.Close()
  724. st.greet()
  725. if err := st.fr.WriteWindowUpdate(0, 1<<31-1); err != nil {
  726. t.Fatal(err)
  727. }
  728. gf := st.wantGoAway()
  729. if gf.ErrCode != ErrCodeFlowControl {
  730. t.Errorf("GOAWAY err = %v; want %v", gf.ErrCode, ErrCodeFlowControl)
  731. }
  732. if gf.LastStreamID != 0 {
  733. t.Errorf("GOAWAY last stream ID = %v; want %v", gf.LastStreamID, 0)
  734. }
  735. }
  736. func TestServer_Send_RstStream_After_Bogus_WindowUpdate(t *testing.T) {
  737. inHandler := make(chan bool)
  738. blockHandler := make(chan bool)
  739. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  740. inHandler <- true
  741. <-blockHandler
  742. })
  743. defer st.Close()
  744. defer close(blockHandler)
  745. st.greet()
  746. st.writeHeaders(HeadersFrameParam{
  747. StreamID: 1,
  748. BlockFragment: encodeHeader(st.t, ":method", "POST"),
  749. EndStream: false, // keep it open
  750. EndHeaders: true,
  751. })
  752. <-inHandler
  753. // Send a bogus window update:
  754. if err := st.fr.WriteWindowUpdate(1, 1<<31-1); err != nil {
  755. t.Fatal(err)
  756. }
  757. st.wantRSTStream(1, ErrCodeFlowControl)
  758. }
  759. // testServerPostUnblock sends a hanging POST with unsent data to handler,
  760. // then runs fn once in the handler, and verifies that the error returned from
  761. // handler is acceptable. It fails if takes over 5 seconds for handler to exit.
  762. func testServerPostUnblock(t *testing.T,
  763. handler func(http.ResponseWriter, *http.Request) error,
  764. fn func(*serverTester),
  765. checkErr func(error),
  766. otherHeaders ...string) {
  767. inHandler := make(chan bool)
  768. errc := make(chan error, 1)
  769. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  770. inHandler <- true
  771. errc <- handler(w, r)
  772. })
  773. st.greet()
  774. st.writeHeaders(HeadersFrameParam{
  775. StreamID: 1,
  776. BlockFragment: encodeHeader(st.t, append([]string{":method", "POST"}, otherHeaders...)...),
  777. EndStream: false, // keep it open
  778. EndHeaders: true,
  779. })
  780. <-inHandler
  781. fn(st)
  782. select {
  783. case err := <-errc:
  784. if checkErr != nil {
  785. checkErr(err)
  786. }
  787. case <-time.After(5 * time.Second):
  788. t.Fatal("timeout waiting for Handler to return")
  789. }
  790. st.Close()
  791. }
  792. func TestServer_RSTStream_Unblocks_Read(t *testing.T) {
  793. testServerPostUnblock(t,
  794. func(w http.ResponseWriter, r *http.Request) (err error) {
  795. _, err = r.Body.Read(make([]byte, 1))
  796. return
  797. },
  798. func(st *serverTester) {
  799. if err := st.fr.WriteRSTStream(1, ErrCodeCancel); err != nil {
  800. t.Fatal(err)
  801. }
  802. },
  803. func(err error) {
  804. if err == nil {
  805. t.Error("unexpected nil error from Request.Body.Read")
  806. }
  807. },
  808. )
  809. }
  810. func TestServer_DeadConn_Unblocks_Read(t *testing.T) {
  811. testServerPostUnblock(t,
  812. func(w http.ResponseWriter, r *http.Request) (err error) {
  813. _, err = r.Body.Read(make([]byte, 1))
  814. return
  815. },
  816. func(st *serverTester) { st.cc.Close() },
  817. func(err error) {
  818. if err == nil {
  819. t.Error("unexpected nil error from Request.Body.Read")
  820. }
  821. },
  822. )
  823. }
  824. var blockUntilClosed = func(w http.ResponseWriter, r *http.Request) error {
  825. <-w.(http.CloseNotifier).CloseNotify()
  826. return nil
  827. }
  828. func TestServer_CloseNotify_After_RSTStream(t *testing.T) {
  829. testServerPostUnblock(t, blockUntilClosed, func(st *serverTester) {
  830. if err := st.fr.WriteRSTStream(1, ErrCodeCancel); err != nil {
  831. t.Fatal(err)
  832. }
  833. }, nil)
  834. }
  835. func TestServer_CloseNotify_After_ConnClose(t *testing.T) {
  836. testServerPostUnblock(t, blockUntilClosed, func(st *serverTester) { st.cc.Close() }, nil)
  837. }
  838. // that CloseNotify unblocks after a stream error due to the client's
  839. // problem that's unrelated to them explicitly canceling it (which is
  840. // TestServer_CloseNotify_After_RSTStream above)
  841. func TestServer_CloseNotify_After_StreamError(t *testing.T) {
  842. testServerPostUnblock(t, blockUntilClosed, func(st *serverTester) {
  843. // data longer than declared Content-Length => stream error
  844. st.writeData(1, true, []byte("1234"))
  845. }, nil, "content-length", "3")
  846. }
  847. func TestServer_StateTransitions(t *testing.T) {
  848. var st *serverTester
  849. inHandler := make(chan bool)
  850. writeData := make(chan bool)
  851. leaveHandler := make(chan bool)
  852. st = newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  853. inHandler <- true
  854. if st.stream(1) == nil {
  855. t.Errorf("nil stream 1 in handler")
  856. }
  857. if got, want := st.streamState(1), stateOpen; got != want {
  858. t.Errorf("in handler, state is %v; want %v", got, want)
  859. }
  860. writeData <- true
  861. if n, err := r.Body.Read(make([]byte, 1)); n != 0 || err != io.EOF {
  862. t.Errorf("body read = %d, %v; want 0, EOF", n, err)
  863. }
  864. if got, want := st.streamState(1), stateHalfClosedRemote; got != want {
  865. t.Errorf("in handler, state is %v; want %v", got, want)
  866. }
  867. <-leaveHandler
  868. })
  869. st.greet()
  870. if st.stream(1) != nil {
  871. t.Fatal("stream 1 should be empty")
  872. }
  873. if got := st.streamState(1); got != stateIdle {
  874. t.Fatalf("stream 1 should be idle; got %v", got)
  875. }
  876. st.writeHeaders(HeadersFrameParam{
  877. StreamID: 1,
  878. BlockFragment: encodeHeader(st.t, ":method", "POST"),
  879. EndStream: false, // keep it open
  880. EndHeaders: true,
  881. })
  882. <-inHandler
  883. <-writeData
  884. st.writeData(1, true, nil)
  885. leaveHandler <- true
  886. hf := st.wantHeaders()
  887. if !hf.StreamEnded() {
  888. t.Fatal("expected END_STREAM flag")
  889. }
  890. if got, want := st.streamState(1), stateClosed; got != want {
  891. t.Errorf("at end, state is %v; want %v", got, want)
  892. }
  893. if st.stream(1) != nil {
  894. t.Fatal("at end, stream 1 should be gone")
  895. }
  896. }
  897. // TODO: test HEADERS w/o EndHeaders + another HEADERS (should get rejected)
  898. // TODO: test HEADERS w/ EndHeaders + a continuation HEADERS (should get rejected)
  899. // testServerRequest sets up an idle HTTP/2 connection and lets you
  900. // write a single request with writeReq, and then verify that the
  901. // *http.Request is built correctly in checkReq.
  902. func testServerRequest(t *testing.T, writeReq func(*serverTester), checkReq func(*http.Request)) {
  903. gotReq := make(chan bool, 1)
  904. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  905. if r.Body == nil {
  906. t.Fatal("nil Body")
  907. }
  908. checkReq(r)
  909. gotReq <- true
  910. })
  911. defer st.Close()
  912. st.greet()
  913. writeReq(st)
  914. select {
  915. case <-gotReq:
  916. case <-time.After(2 * time.Second):
  917. t.Error("timeout waiting for request")
  918. }
  919. }
  920. func getSlash(st *serverTester) { st.bodylessReq1() }
  921. func TestServer_Response_NoData(t *testing.T) {
  922. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  923. // Nothing.
  924. return nil
  925. }, func(st *serverTester) {
  926. getSlash(st)
  927. hf := st.wantHeaders()
  928. if !hf.StreamEnded() {
  929. t.Fatal("want END_STREAM flag")
  930. }
  931. if !hf.HeadersEnded() {
  932. t.Fatal("want END_HEADERS flag")
  933. }
  934. })
  935. }
  936. func TestServer_Response_NoData_Header_FooBar(t *testing.T) {
  937. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  938. w.Header().Set("Foo-Bar", "some-value")
  939. return nil
  940. }, func(st *serverTester) {
  941. getSlash(st)
  942. hf := st.wantHeaders()
  943. if !hf.StreamEnded() {
  944. t.Fatal("want END_STREAM flag")
  945. }
  946. if !hf.HeadersEnded() {
  947. t.Fatal("want END_HEADERS flag")
  948. }
  949. goth := decodeHeader(t, hf.HeaderBlockFragment())
  950. wanth := [][2]string{
  951. {":status", "200"},
  952. {"foo-bar", "some-value"},
  953. {"content-type", "text/plain; charset=utf-8"},
  954. {"content-length", "0"},
  955. }
  956. if !reflect.DeepEqual(goth, wanth) {
  957. t.Errorf("Got headers %v; want %v", goth, wanth)
  958. }
  959. })
  960. }
  961. func TestServer_Response_Data_Sniff_DoesntOverride(t *testing.T) {
  962. const msg = "<html>this is HTML."
  963. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  964. w.Header().Set("Content-Type", "foo/bar")
  965. io.WriteString(w, msg)
  966. return nil
  967. }, func(st *serverTester) {
  968. getSlash(st)
  969. hf := st.wantHeaders()
  970. if hf.StreamEnded() {
  971. t.Fatal("don't want END_STREAM, expecting data")
  972. }
  973. if !hf.HeadersEnded() {
  974. t.Fatal("want END_HEADERS flag")
  975. }
  976. goth := decodeHeader(t, hf.HeaderBlockFragment())
  977. wanth := [][2]string{
  978. {":status", "200"},
  979. {"content-type", "foo/bar"},
  980. {"content-length", strconv.Itoa(len(msg))},
  981. }
  982. if !reflect.DeepEqual(goth, wanth) {
  983. t.Errorf("Got headers %v; want %v", goth, wanth)
  984. }
  985. df := st.wantData()
  986. if !df.StreamEnded() {
  987. t.Error("expected DATA to have END_STREAM flag")
  988. }
  989. if got := string(df.Data()); got != msg {
  990. t.Errorf("got DATA %q; want %q", got, msg)
  991. }
  992. })
  993. }
  994. func TestServer_Response_TransferEncoding_chunked(t *testing.T) {
  995. const msg = "hi"
  996. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  997. w.Header().Set("Transfer-Encoding", "chunked") // should be stripped
  998. io.WriteString(w, msg)
  999. return nil
  1000. }, func(st *serverTester) {
  1001. getSlash(st)
  1002. hf := st.wantHeaders()
  1003. goth := decodeHeader(t, hf.HeaderBlockFragment())
  1004. wanth := [][2]string{
  1005. {":status", "200"},
  1006. {"content-type", "text/plain; charset=utf-8"},
  1007. {"content-length", strconv.Itoa(len(msg))},
  1008. }
  1009. if !reflect.DeepEqual(goth, wanth) {
  1010. t.Errorf("Got headers %v; want %v", goth, wanth)
  1011. }
  1012. })
  1013. }
  1014. // Header accessed only after the initial write.
  1015. func TestServer_Response_Data_IgnoreHeaderAfterWrite_After(t *testing.T) {
  1016. const msg = "<html>this is HTML."
  1017. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  1018. io.WriteString(w, msg)
  1019. w.Header().Set("foo", "should be ignored")
  1020. return nil
  1021. }, func(st *serverTester) {
  1022. getSlash(st)
  1023. hf := st.wantHeaders()
  1024. if hf.StreamEnded() {
  1025. t.Fatal("unexpected END_STREAM")
  1026. }
  1027. if !hf.HeadersEnded() {
  1028. t.Fatal("want END_HEADERS flag")
  1029. }
  1030. goth := decodeHeader(t, hf.HeaderBlockFragment())
  1031. wanth := [][2]string{
  1032. {":status", "200"},
  1033. {"content-type", "text/html; charset=utf-8"},
  1034. {"content-length", strconv.Itoa(len(msg))},
  1035. }
  1036. if !reflect.DeepEqual(goth, wanth) {
  1037. t.Errorf("Got headers %v; want %v", goth, wanth)
  1038. }
  1039. })
  1040. }
  1041. // Header accessed before the initial write and later mutated.
  1042. func TestServer_Response_Data_IgnoreHeaderAfterWrite_Overwrite(t *testing.T) {
  1043. const msg = "<html>this is HTML."
  1044. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  1045. w.Header().Set("foo", "proper value")
  1046. io.WriteString(w, msg)
  1047. w.Header().Set("foo", "should be ignored")
  1048. return nil
  1049. }, func(st *serverTester) {
  1050. getSlash(st)
  1051. hf := st.wantHeaders()
  1052. if hf.StreamEnded() {
  1053. t.Fatal("unexpected END_STREAM")
  1054. }
  1055. if !hf.HeadersEnded() {
  1056. t.Fatal("want END_HEADERS flag")
  1057. }
  1058. goth := decodeHeader(t, hf.HeaderBlockFragment())
  1059. wanth := [][2]string{
  1060. {":status", "200"},
  1061. {"foo", "proper value"},
  1062. {"content-type", "text/html; charset=utf-8"},
  1063. {"content-length", strconv.Itoa(len(msg))},
  1064. }
  1065. if !reflect.DeepEqual(goth, wanth) {
  1066. t.Errorf("Got headers %v; want %v", goth, wanth)
  1067. }
  1068. })
  1069. }
  1070. func TestServer_Response_Data_SniffLenType(t *testing.T) {
  1071. const msg = "<html>this is HTML."
  1072. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  1073. io.WriteString(w, msg)
  1074. return nil
  1075. }, func(st *serverTester) {
  1076. getSlash(st)
  1077. hf := st.wantHeaders()
  1078. if hf.StreamEnded() {
  1079. t.Fatal("don't want END_STREAM, expecting data")
  1080. }
  1081. if !hf.HeadersEnded() {
  1082. t.Fatal("want END_HEADERS flag")
  1083. }
  1084. goth := decodeHeader(t, hf.HeaderBlockFragment())
  1085. wanth := [][2]string{
  1086. {":status", "200"},
  1087. {"content-type", "text/html; charset=utf-8"},
  1088. {"content-length", strconv.Itoa(len(msg))},
  1089. }
  1090. if !reflect.DeepEqual(goth, wanth) {
  1091. t.Errorf("Got headers %v; want %v", goth, wanth)
  1092. }
  1093. df := st.wantData()
  1094. if !df.StreamEnded() {
  1095. t.Error("expected DATA to have END_STREAM flag")
  1096. }
  1097. if got := string(df.Data()); got != msg {
  1098. t.Errorf("got DATA %q; want %q", got, msg)
  1099. }
  1100. })
  1101. }
  1102. func TestServer_Response_Header_Flush_MidWrite(t *testing.T) {
  1103. const msg = "<html>this is HTML"
  1104. const msg2 = ", and this is the next chunk"
  1105. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  1106. io.WriteString(w, msg)
  1107. w.(http.Flusher).Flush()
  1108. io.WriteString(w, msg2)
  1109. return nil
  1110. }, func(st *serverTester) {
  1111. getSlash(st)
  1112. hf := st.wantHeaders()
  1113. if hf.StreamEnded() {
  1114. t.Fatal("unexpected END_STREAM flag")
  1115. }
  1116. if !hf.HeadersEnded() {
  1117. t.Fatal("want END_HEADERS flag")
  1118. }
  1119. goth := decodeHeader(t, hf.HeaderBlockFragment())
  1120. wanth := [][2]string{
  1121. {":status", "200"},
  1122. {"content-type", "text/html; charset=utf-8"}, // sniffed
  1123. // and no content-length
  1124. }
  1125. if !reflect.DeepEqual(goth, wanth) {
  1126. t.Errorf("Got headers %v; want %v", goth, wanth)
  1127. }
  1128. {
  1129. df := st.wantData()
  1130. if df.StreamEnded() {
  1131. t.Error("unexpected END_STREAM flag")
  1132. }
  1133. if got := string(df.Data()); got != msg {
  1134. t.Errorf("got DATA %q; want %q", got, msg)
  1135. }
  1136. }
  1137. {
  1138. df := st.wantData()
  1139. if !df.StreamEnded() {
  1140. t.Error("wanted END_STREAM flag on last data chunk")
  1141. }
  1142. if got := string(df.Data()); got != msg2 {
  1143. t.Errorf("got DATA %q; want %q", got, msg2)
  1144. }
  1145. }
  1146. })
  1147. }
  1148. func TestServer_Response_LargeWrite(t *testing.T) {
  1149. const size = 1 << 20
  1150. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  1151. n, err := w.Write(bytes.Repeat([]byte("a"), size))
  1152. if err != nil {
  1153. return fmt.Errorf("Write error: %v", err)
  1154. }
  1155. if n != size {
  1156. return fmt.Errorf("wrong size %d from Write", n)
  1157. }
  1158. return nil
  1159. }, func(st *serverTester) {
  1160. getSlash(st) // make the single request
  1161. hf := st.wantHeaders()
  1162. if hf.StreamEnded() {
  1163. t.Fatal("unexpected END_STREAM flag")
  1164. }
  1165. if !hf.HeadersEnded() {
  1166. t.Fatal("want END_HEADERS flag")
  1167. }
  1168. goth := decodeHeader(t, hf.HeaderBlockFragment())
  1169. wanth := [][2]string{
  1170. {":status", "200"},
  1171. {"content-type", "text/plain; charset=utf-8"}, // sniffed
  1172. // and no content-length
  1173. }
  1174. if !reflect.DeepEqual(goth, wanth) {
  1175. t.Errorf("Got headers %v; want %v", goth, wanth)
  1176. }
  1177. var bytes, frames int
  1178. for {
  1179. df := st.wantData()
  1180. bytes += len(df.Data())
  1181. frames++
  1182. // TODO: send WINDOW_UPDATE frames at the server to keep it from stalling
  1183. for _, b := range df.Data() {
  1184. if b != 'a' {
  1185. t.Fatal("non-'a' byte seen in DATA")
  1186. }
  1187. }
  1188. if df.StreamEnded() {
  1189. break
  1190. }
  1191. }
  1192. if bytes != size {
  1193. t.Errorf("Got %d bytes; want %d", bytes, size)
  1194. }
  1195. if want := 257; frames != want {
  1196. t.Errorf("Got %d frames; want %d", frames, size)
  1197. }
  1198. })
  1199. }
  1200. func TestServer_Response_Automatic100Continue(t *testing.T) {
  1201. const msg = "foo"
  1202. const reply = "bar"
  1203. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  1204. if v := r.Header.Get("Expect"); v != "" {
  1205. t.Errorf("Expect header = %q; want empty", v)
  1206. }
  1207. buf := make([]byte, len(msg))
  1208. // This read should trigger the 100-continue being sent.
  1209. if n, err := io.ReadFull(r.Body, buf); err != nil || n != len(msg) || string(buf) != msg {
  1210. return fmt.Errorf("ReadFull = %q, %v; want %q, nil", buf[:n], err, msg)
  1211. }
  1212. _, err := io.WriteString(w, reply)
  1213. return err
  1214. }, func(st *serverTester) {
  1215. st.writeHeaders(HeadersFrameParam{
  1216. StreamID: 1, // clients send odd numbers
  1217. BlockFragment: encodeHeader(st.t, ":method", "POST", "expect", "100-continue"),
  1218. EndStream: false,
  1219. EndHeaders: true,
  1220. })
  1221. hf := st.wantHeaders()
  1222. if hf.StreamEnded() {
  1223. t.Fatal("unexpected END_STREAM flag")
  1224. }
  1225. if !hf.HeadersEnded() {
  1226. t.Fatal("want END_HEADERS flag")
  1227. }
  1228. goth := decodeHeader(t, hf.HeaderBlockFragment())
  1229. wanth := [][2]string{
  1230. {":status", "100"},
  1231. }
  1232. if !reflect.DeepEqual(goth, wanth) {
  1233. t.Fatalf("Got headers %v; want %v", goth, wanth)
  1234. }
  1235. // Okay, they sent status 100, so we can send our
  1236. // gigantic and/or sensitive "foo" payload now.
  1237. st.writeData(1, true, []byte(msg))
  1238. st.wantWindowUpdate(0, uint32(len(msg)))
  1239. st.wantWindowUpdate(1, uint32(len(msg)))
  1240. hf = st.wantHeaders()
  1241. if hf.StreamEnded() {
  1242. t.Fatal("expected data to follow")
  1243. }
  1244. if !hf.HeadersEnded() {
  1245. t.Fatal("want END_HEADERS flag")
  1246. }
  1247. goth = decodeHeader(t, hf.HeaderBlockFragment())
  1248. wanth = [][2]string{
  1249. {":status", "200"},
  1250. {"content-type", "text/plain; charset=utf-8"},
  1251. {"content-length", strconv.Itoa(len(reply))},
  1252. }
  1253. if !reflect.DeepEqual(goth, wanth) {
  1254. t.Errorf("Got headers %v; want %v", goth, wanth)
  1255. }
  1256. df := st.wantData()
  1257. if string(df.Data()) != reply {
  1258. t.Errorf("Client read %q; want %q", df.Data(), reply)
  1259. }
  1260. if !df.StreamEnded() {
  1261. t.Errorf("expect data stream end")
  1262. }
  1263. })
  1264. }
  1265. func TestServer_HandlerWriteErrorOnDisconnect(t *testing.T) {
  1266. errc := make(chan error, 1)
  1267. testServerResponse(t, func(w http.ResponseWriter, r *http.Request) error {
  1268. p := []byte("some data.\n")
  1269. for {
  1270. _, err := w.Write(p)
  1271. if err != nil {
  1272. errc <- err
  1273. return nil
  1274. }
  1275. }
  1276. }, func(st *serverTester) {
  1277. st.writeHeaders(HeadersFrameParam{
  1278. StreamID: 1,
  1279. BlockFragment: encodeHeader(st.t),
  1280. EndStream: false,
  1281. EndHeaders: true,
  1282. })
  1283. hf := st.wantHeaders()
  1284. if hf.StreamEnded() {
  1285. t.Fatal("unexpected END_STREAM flag")
  1286. }
  1287. if !hf.HeadersEnded() {
  1288. t.Fatal("want END_HEADERS flag")
  1289. }
  1290. // Close the connection and wait for the handler to (hopefully) notice.
  1291. st.cc.Close()
  1292. select {
  1293. case <-errc:
  1294. case <-time.After(5 * time.Second):
  1295. t.Error("timeout")
  1296. }
  1297. })
  1298. }
  1299. func decodeHeader(t *testing.T, headerBlock []byte) (pairs [][2]string) {
  1300. d := hpack.NewDecoder(initialHeaderTableSize, func(f hpack.HeaderField) {
  1301. pairs = append(pairs, [2]string{f.Name, f.Value})
  1302. })
  1303. if _, err := d.Write(headerBlock); err != nil {
  1304. t.Fatalf("hpack decoding error: %v", err)
  1305. }
  1306. if err := d.Close(); err != nil {
  1307. t.Fatalf("hpack decoding error: %v", err)
  1308. }
  1309. return
  1310. }
  1311. // testServerResponse sets up an idle HTTP/2 connection and lets you
  1312. // write a single request with writeReq, and then reply to it in some way with the provided handler,
  1313. // and then verify the output with the serverTester again (assuming the handler returns nil)
  1314. func testServerResponse(t *testing.T,
  1315. handler func(http.ResponseWriter, *http.Request) error,
  1316. client func(*serverTester),
  1317. ) {
  1318. errc := make(chan error, 1)
  1319. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  1320. if r.Body == nil {
  1321. t.Fatal("nil Body")
  1322. }
  1323. errc <- handler(w, r)
  1324. })
  1325. defer st.Close()
  1326. donec := make(chan bool)
  1327. go func() {
  1328. defer close(donec)
  1329. st.greet()
  1330. client(st)
  1331. }()
  1332. select {
  1333. case <-donec:
  1334. return
  1335. case <-time.After(5 * time.Second):
  1336. t.Fatal("timeout")
  1337. }
  1338. select {
  1339. case err := <-errc:
  1340. if err != nil {
  1341. t.Fatalf("Error in handler: %v", err)
  1342. }
  1343. case <-time.After(2 * time.Second):
  1344. t.Error("timeout waiting for handler to finish")
  1345. }
  1346. }
  1347. func TestServerWithCurl(t *testing.T) {
  1348. if runtime.GOOS == "darwin" {
  1349. t.Skip("skipping Docker test on Darwin; requires --net which won't work with boot2docker anyway")
  1350. }
  1351. requireCurl(t)
  1352. const msg = "Hello from curl!\n"
  1353. ts := httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  1354. w.Header().Set("Foo", "Bar")
  1355. io.WriteString(w, msg)
  1356. }))
  1357. ConfigureServer(ts.Config, &Server{})
  1358. ts.TLS = ts.Config.TLSConfig // the httptest.Server has its own copy of this TLS config
  1359. ts.StartTLS()
  1360. defer ts.Close()
  1361. var gotConn int32
  1362. testHookOnConn = func() { atomic.StoreInt32(&gotConn, 1) }
  1363. t.Logf("Running test server for curl to hit at: %s", ts.URL)
  1364. container := curl(t, "--silent", "--http2", "--insecure", "-v", ts.URL)
  1365. defer kill(container)
  1366. resc := make(chan interface{}, 1)
  1367. go func() {
  1368. res, err := dockerLogs(container)
  1369. if err != nil {
  1370. resc <- err
  1371. } else {
  1372. resc <- res
  1373. }
  1374. }()
  1375. select {
  1376. case res := <-resc:
  1377. if err, ok := res.(error); ok {
  1378. t.Fatal(err)
  1379. }
  1380. if !strings.Contains(string(res.([]byte)), "< foo:Bar") {
  1381. t.Errorf("didn't see foo:Bar header")
  1382. t.Logf("Got: %s", res)
  1383. }
  1384. if !strings.Contains(string(res.([]byte)), msg) {
  1385. t.Errorf("didn't see %q content", msg)
  1386. t.Logf("Got: %s", res)
  1387. }
  1388. case <-time.After(3 * time.Second):
  1389. t.Errorf("timeout waiting for curl")
  1390. }
  1391. if atomic.LoadInt32(&gotConn) == 0 {
  1392. t.Error("never saw an http2 connection")
  1393. }
  1394. }