transport_test.go 51 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013
  1. // Copyright 2015 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package http2
  5. import (
  6. "bufio"
  7. "bytes"
  8. "crypto/tls"
  9. "errors"
  10. "flag"
  11. "fmt"
  12. "io"
  13. "io/ioutil"
  14. "math/rand"
  15. "net"
  16. "net/http"
  17. "net/url"
  18. "os"
  19. "reflect"
  20. "runtime"
  21. "sort"
  22. "strconv"
  23. "strings"
  24. "sync"
  25. "sync/atomic"
  26. "testing"
  27. "time"
  28. "golang.org/x/net/http2/hpack"
  29. )
  30. var (
  31. extNet = flag.Bool("extnet", false, "do external network tests")
  32. transportHost = flag.String("transporthost", "http2.golang.org", "hostname to use for TestTransport")
  33. insecure = flag.Bool("insecure", false, "insecure TLS dials") // TODO: dead code. remove?
  34. )
  35. var tlsConfigInsecure = &tls.Config{InsecureSkipVerify: true}
  36. func TestTransportExternal(t *testing.T) {
  37. if !*extNet {
  38. t.Skip("skipping external network test")
  39. }
  40. req, _ := http.NewRequest("GET", "https://"+*transportHost+"/", nil)
  41. rt := &Transport{TLSClientConfig: tlsConfigInsecure}
  42. res, err := rt.RoundTrip(req)
  43. if err != nil {
  44. t.Fatalf("%v", err)
  45. }
  46. res.Write(os.Stdout)
  47. }
  48. func startH2cServer(t *testing.T) net.Listener {
  49. h2Server := &Server{}
  50. l := newLocalListener(t)
  51. go func() {
  52. conn, err := l.Accept()
  53. if err != nil {
  54. t.Error(err)
  55. return
  56. }
  57. h2Server.ServeConn(conn, &ServeConnOpts{Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  58. fmt.Fprintf(w, "Hello, %v", r.URL.Path)
  59. })})
  60. }()
  61. return l
  62. }
  63. func TestTransportH2c(t *testing.T) {
  64. l := startH2cServer(t)
  65. defer l.Close()
  66. req, err := http.NewRequest("GET", "http://"+l.Addr().String()+"/foobar", nil)
  67. if err != nil {
  68. t.Fatal(err)
  69. }
  70. tr := &Transport{
  71. AllowHTTP: true,
  72. DialTLS: func(network, addr string, cfg *tls.Config) (net.Conn, error) {
  73. return net.Dial(network, addr)
  74. },
  75. }
  76. res, err := tr.RoundTrip(req)
  77. if err != nil {
  78. t.Fatal(err)
  79. }
  80. if res.ProtoMajor != 2 {
  81. t.Fatal("proto not h2c")
  82. }
  83. body, err := ioutil.ReadAll(res.Body)
  84. if err != nil {
  85. t.Fatal(err)
  86. }
  87. if got, want := string(body), "Hello, /foobar"; got != want {
  88. t.Fatalf("response got %v, want %v", got, want)
  89. }
  90. }
  91. func TestTransport(t *testing.T) {
  92. const body = "sup"
  93. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  94. io.WriteString(w, body)
  95. }, optOnlyServer)
  96. defer st.Close()
  97. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  98. defer tr.CloseIdleConnections()
  99. req, err := http.NewRequest("GET", st.ts.URL, nil)
  100. if err != nil {
  101. t.Fatal(err)
  102. }
  103. res, err := tr.RoundTrip(req)
  104. if err != nil {
  105. t.Fatal(err)
  106. }
  107. defer res.Body.Close()
  108. t.Logf("Got res: %+v", res)
  109. if g, w := res.StatusCode, 200; g != w {
  110. t.Errorf("StatusCode = %v; want %v", g, w)
  111. }
  112. if g, w := res.Status, "200 OK"; g != w {
  113. t.Errorf("Status = %q; want %q", g, w)
  114. }
  115. wantHeader := http.Header{
  116. "Content-Length": []string{"3"},
  117. "Content-Type": []string{"text/plain; charset=utf-8"},
  118. "Date": []string{"XXX"}, // see cleanDate
  119. }
  120. cleanDate(res)
  121. if !reflect.DeepEqual(res.Header, wantHeader) {
  122. t.Errorf("res Header = %v; want %v", res.Header, wantHeader)
  123. }
  124. if res.Request != req {
  125. t.Errorf("Response.Request = %p; want %p", res.Request, req)
  126. }
  127. if res.TLS == nil {
  128. t.Error("Response.TLS = nil; want non-nil")
  129. }
  130. slurp, err := ioutil.ReadAll(res.Body)
  131. if err != nil {
  132. t.Errorf("Body read: %v", err)
  133. } else if string(slurp) != body {
  134. t.Errorf("Body = %q; want %q", slurp, body)
  135. }
  136. }
  137. func onSameConn(t *testing.T, modReq func(*http.Request)) bool {
  138. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  139. io.WriteString(w, r.RemoteAddr)
  140. }, optOnlyServer)
  141. defer st.Close()
  142. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  143. defer tr.CloseIdleConnections()
  144. get := func() string {
  145. req, err := http.NewRequest("GET", st.ts.URL, nil)
  146. if err != nil {
  147. t.Fatal(err)
  148. }
  149. modReq(req)
  150. res, err := tr.RoundTrip(req)
  151. if err != nil {
  152. t.Fatal(err)
  153. }
  154. defer res.Body.Close()
  155. slurp, err := ioutil.ReadAll(res.Body)
  156. if err != nil {
  157. t.Fatalf("Body read: %v", err)
  158. }
  159. addr := strings.TrimSpace(string(slurp))
  160. if addr == "" {
  161. t.Fatalf("didn't get an addr in response")
  162. }
  163. return addr
  164. }
  165. first := get()
  166. second := get()
  167. return first == second
  168. }
  169. func TestTransportReusesConns(t *testing.T) {
  170. if !onSameConn(t, func(*http.Request) {}) {
  171. t.Errorf("first and second responses were on different connections")
  172. }
  173. }
  174. func TestTransportReusesConn_RequestClose(t *testing.T) {
  175. if onSameConn(t, func(r *http.Request) { r.Close = true }) {
  176. t.Errorf("first and second responses were not on different connections")
  177. }
  178. }
  179. func TestTransportReusesConn_ConnClose(t *testing.T) {
  180. if onSameConn(t, func(r *http.Request) { r.Header.Set("Connection", "close") }) {
  181. t.Errorf("first and second responses were not on different connections")
  182. }
  183. }
  184. // Tests that the Transport only keeps one pending dial open per destination address.
  185. // https://golang.org/issue/13397
  186. func TestTransportGroupsPendingDials(t *testing.T) {
  187. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  188. io.WriteString(w, r.RemoteAddr)
  189. }, optOnlyServer)
  190. defer st.Close()
  191. tr := &Transport{
  192. TLSClientConfig: tlsConfigInsecure,
  193. }
  194. defer tr.CloseIdleConnections()
  195. var (
  196. mu sync.Mutex
  197. dials = map[string]int{}
  198. )
  199. var wg sync.WaitGroup
  200. for i := 0; i < 10; i++ {
  201. wg.Add(1)
  202. go func() {
  203. defer wg.Done()
  204. req, err := http.NewRequest("GET", st.ts.URL, nil)
  205. if err != nil {
  206. t.Error(err)
  207. return
  208. }
  209. res, err := tr.RoundTrip(req)
  210. if err != nil {
  211. t.Error(err)
  212. return
  213. }
  214. defer res.Body.Close()
  215. slurp, err := ioutil.ReadAll(res.Body)
  216. if err != nil {
  217. t.Errorf("Body read: %v", err)
  218. }
  219. addr := strings.TrimSpace(string(slurp))
  220. if addr == "" {
  221. t.Errorf("didn't get an addr in response")
  222. }
  223. mu.Lock()
  224. dials[addr]++
  225. mu.Unlock()
  226. }()
  227. }
  228. wg.Wait()
  229. if len(dials) != 1 {
  230. t.Errorf("saw %d dials; want 1: %v", len(dials), dials)
  231. }
  232. tr.CloseIdleConnections()
  233. if err := retry(50, 10*time.Millisecond, func() error {
  234. cp, ok := tr.connPool().(*clientConnPool)
  235. if !ok {
  236. return fmt.Errorf("Conn pool is %T; want *clientConnPool", tr.connPool())
  237. }
  238. cp.mu.Lock()
  239. defer cp.mu.Unlock()
  240. if len(cp.dialing) != 0 {
  241. return fmt.Errorf("dialing map = %v; want empty", cp.dialing)
  242. }
  243. if len(cp.conns) != 0 {
  244. return fmt.Errorf("conns = %v; want empty", cp.conns)
  245. }
  246. if len(cp.keys) != 0 {
  247. return fmt.Errorf("keys = %v; want empty", cp.keys)
  248. }
  249. return nil
  250. }); err != nil {
  251. t.Errorf("State of pool after CloseIdleConnections: %v", err)
  252. }
  253. }
  254. func retry(tries int, delay time.Duration, fn func() error) error {
  255. var err error
  256. for i := 0; i < tries; i++ {
  257. err = fn()
  258. if err == nil {
  259. return nil
  260. }
  261. time.Sleep(delay)
  262. }
  263. return err
  264. }
  265. func TestTransportAbortClosesPipes(t *testing.T) {
  266. shutdown := make(chan struct{})
  267. st := newServerTester(t,
  268. func(w http.ResponseWriter, r *http.Request) {
  269. w.(http.Flusher).Flush()
  270. <-shutdown
  271. },
  272. optOnlyServer,
  273. )
  274. defer st.Close()
  275. defer close(shutdown) // we must shutdown before st.Close() to avoid hanging
  276. done := make(chan struct{})
  277. requestMade := make(chan struct{})
  278. go func() {
  279. defer close(done)
  280. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  281. req, err := http.NewRequest("GET", st.ts.URL, nil)
  282. if err != nil {
  283. t.Fatal(err)
  284. }
  285. res, err := tr.RoundTrip(req)
  286. if err != nil {
  287. t.Fatal(err)
  288. }
  289. defer res.Body.Close()
  290. close(requestMade)
  291. _, err = ioutil.ReadAll(res.Body)
  292. if err == nil {
  293. t.Error("expected error from res.Body.Read")
  294. }
  295. }()
  296. <-requestMade
  297. // Now force the serve loop to end, via closing the connection.
  298. st.closeConn()
  299. // deadlock? that's a bug.
  300. select {
  301. case <-done:
  302. case <-time.After(3 * time.Second):
  303. t.Fatal("timeout")
  304. }
  305. }
  306. // TODO: merge this with TestTransportBody to make TestTransportRequest? This
  307. // could be a table-driven test with extra goodies.
  308. func TestTransportPath(t *testing.T) {
  309. gotc := make(chan *url.URL, 1)
  310. st := newServerTester(t,
  311. func(w http.ResponseWriter, r *http.Request) {
  312. gotc <- r.URL
  313. },
  314. optOnlyServer,
  315. )
  316. defer st.Close()
  317. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  318. defer tr.CloseIdleConnections()
  319. const (
  320. path = "/testpath"
  321. query = "q=1"
  322. )
  323. surl := st.ts.URL + path + "?" + query
  324. req, err := http.NewRequest("POST", surl, nil)
  325. if err != nil {
  326. t.Fatal(err)
  327. }
  328. c := &http.Client{Transport: tr}
  329. res, err := c.Do(req)
  330. if err != nil {
  331. t.Fatal(err)
  332. }
  333. defer res.Body.Close()
  334. got := <-gotc
  335. if got.Path != path {
  336. t.Errorf("Read Path = %q; want %q", got.Path, path)
  337. }
  338. if got.RawQuery != query {
  339. t.Errorf("Read RawQuery = %q; want %q", got.RawQuery, query)
  340. }
  341. }
  342. func randString(n int) string {
  343. rnd := rand.New(rand.NewSource(int64(n)))
  344. b := make([]byte, n)
  345. for i := range b {
  346. b[i] = byte(rnd.Intn(256))
  347. }
  348. return string(b)
  349. }
  350. func TestTransportBody(t *testing.T) {
  351. bodyTests := []struct {
  352. body string
  353. noContentLen bool
  354. }{
  355. {body: "some message"},
  356. {body: "some message", noContentLen: true},
  357. {body: ""},
  358. {body: "", noContentLen: true},
  359. {body: strings.Repeat("a", 1<<20), noContentLen: true},
  360. {body: strings.Repeat("a", 1<<20)},
  361. {body: randString(16<<10 - 1)},
  362. {body: randString(16 << 10)},
  363. {body: randString(16<<10 + 1)},
  364. {body: randString(512<<10 - 1)},
  365. {body: randString(512 << 10)},
  366. {body: randString(512<<10 + 1)},
  367. {body: randString(1<<20 - 1)},
  368. {body: randString(1 << 20)},
  369. {body: randString(1<<20 + 2)},
  370. }
  371. type reqInfo struct {
  372. req *http.Request
  373. slurp []byte
  374. err error
  375. }
  376. gotc := make(chan reqInfo, 1)
  377. st := newServerTester(t,
  378. func(w http.ResponseWriter, r *http.Request) {
  379. slurp, err := ioutil.ReadAll(r.Body)
  380. if err != nil {
  381. gotc <- reqInfo{err: err}
  382. } else {
  383. gotc <- reqInfo{req: r, slurp: slurp}
  384. }
  385. },
  386. optOnlyServer,
  387. )
  388. defer st.Close()
  389. for i, tt := range bodyTests {
  390. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  391. defer tr.CloseIdleConnections()
  392. var body io.Reader = strings.NewReader(tt.body)
  393. if tt.noContentLen {
  394. body = struct{ io.Reader }{body} // just a Reader, hiding concrete type and other methods
  395. }
  396. req, err := http.NewRequest("POST", st.ts.URL, body)
  397. if err != nil {
  398. t.Fatalf("#%d: %v", i, err)
  399. }
  400. c := &http.Client{Transport: tr}
  401. res, err := c.Do(req)
  402. if err != nil {
  403. t.Fatalf("#%d: %v", i, err)
  404. }
  405. defer res.Body.Close()
  406. ri := <-gotc
  407. if ri.err != nil {
  408. t.Errorf("#%d: read error: %v", i, ri.err)
  409. continue
  410. }
  411. if got := string(ri.slurp); got != tt.body {
  412. t.Errorf("#%d: Read body mismatch.\n got: %q (len %d)\nwant: %q (len %d)", i, shortString(got), len(got), shortString(tt.body), len(tt.body))
  413. }
  414. wantLen := int64(len(tt.body))
  415. if tt.noContentLen && tt.body != "" {
  416. wantLen = -1
  417. }
  418. if ri.req.ContentLength != wantLen {
  419. t.Errorf("#%d. handler got ContentLength = %v; want %v", i, ri.req.ContentLength, wantLen)
  420. }
  421. }
  422. }
  423. func shortString(v string) string {
  424. const maxLen = 100
  425. if len(v) <= maxLen {
  426. return v
  427. }
  428. return fmt.Sprintf("%v[...%d bytes omitted...]%v", v[:maxLen/2], len(v)-maxLen, v[len(v)-maxLen/2:])
  429. }
  430. func TestTransportDialTLS(t *testing.T) {
  431. var mu sync.Mutex // guards following
  432. var gotReq, didDial bool
  433. ts := newServerTester(t,
  434. func(w http.ResponseWriter, r *http.Request) {
  435. mu.Lock()
  436. gotReq = true
  437. mu.Unlock()
  438. },
  439. optOnlyServer,
  440. )
  441. defer ts.Close()
  442. tr := &Transport{
  443. DialTLS: func(netw, addr string, cfg *tls.Config) (net.Conn, error) {
  444. mu.Lock()
  445. didDial = true
  446. mu.Unlock()
  447. cfg.InsecureSkipVerify = true
  448. c, err := tls.Dial(netw, addr, cfg)
  449. if err != nil {
  450. return nil, err
  451. }
  452. return c, c.Handshake()
  453. },
  454. }
  455. defer tr.CloseIdleConnections()
  456. client := &http.Client{Transport: tr}
  457. res, err := client.Get(ts.ts.URL)
  458. if err != nil {
  459. t.Fatal(err)
  460. }
  461. res.Body.Close()
  462. mu.Lock()
  463. if !gotReq {
  464. t.Error("didn't get request")
  465. }
  466. if !didDial {
  467. t.Error("didn't use dial hook")
  468. }
  469. }
  470. func TestConfigureTransport(t *testing.T) {
  471. t1 := &http.Transport{}
  472. err := ConfigureTransport(t1)
  473. if err == errTransportVersion {
  474. t.Skip(err)
  475. }
  476. if err != nil {
  477. t.Fatal(err)
  478. }
  479. if got := fmt.Sprintf("%#v", *t1); !strings.Contains(got, `"h2"`) {
  480. // Laziness, to avoid buildtags.
  481. t.Errorf("stringification of HTTP/1 transport didn't contain \"h2\": %v", got)
  482. }
  483. wantNextProtos := []string{"h2", "http/1.1"}
  484. if t1.TLSClientConfig == nil {
  485. t.Errorf("nil t1.TLSClientConfig")
  486. } else if !reflect.DeepEqual(t1.TLSClientConfig.NextProtos, wantNextProtos) {
  487. t.Errorf("TLSClientConfig.NextProtos = %q; want %q", t1.TLSClientConfig.NextProtos, wantNextProtos)
  488. }
  489. if err := ConfigureTransport(t1); err == nil {
  490. t.Error("unexpected success on second call to ConfigureTransport")
  491. }
  492. // And does it work?
  493. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  494. io.WriteString(w, r.Proto)
  495. }, optOnlyServer)
  496. defer st.Close()
  497. t1.TLSClientConfig.InsecureSkipVerify = true
  498. c := &http.Client{Transport: t1}
  499. res, err := c.Get(st.ts.URL)
  500. if err != nil {
  501. t.Fatal(err)
  502. }
  503. slurp, err := ioutil.ReadAll(res.Body)
  504. if err != nil {
  505. t.Fatal(err)
  506. }
  507. if got, want := string(slurp), "HTTP/2.0"; got != want {
  508. t.Errorf("body = %q; want %q", got, want)
  509. }
  510. }
  511. type capitalizeReader struct {
  512. r io.Reader
  513. }
  514. func (cr capitalizeReader) Read(p []byte) (n int, err error) {
  515. n, err = cr.r.Read(p)
  516. for i, b := range p[:n] {
  517. if b >= 'a' && b <= 'z' {
  518. p[i] = b - ('a' - 'A')
  519. }
  520. }
  521. return
  522. }
  523. type flushWriter struct {
  524. w io.Writer
  525. }
  526. func (fw flushWriter) Write(p []byte) (n int, err error) {
  527. n, err = fw.w.Write(p)
  528. if f, ok := fw.w.(http.Flusher); ok {
  529. f.Flush()
  530. }
  531. return
  532. }
  533. type clientTester struct {
  534. t *testing.T
  535. tr *Transport
  536. sc, cc net.Conn // server and client conn
  537. fr *Framer // server's framer
  538. client func() error
  539. server func() error
  540. }
  541. func newClientTester(t *testing.T) *clientTester {
  542. var dialOnce struct {
  543. sync.Mutex
  544. dialed bool
  545. }
  546. ct := &clientTester{
  547. t: t,
  548. }
  549. ct.tr = &Transport{
  550. TLSClientConfig: tlsConfigInsecure,
  551. DialTLS: func(network, addr string, cfg *tls.Config) (net.Conn, error) {
  552. dialOnce.Lock()
  553. defer dialOnce.Unlock()
  554. if dialOnce.dialed {
  555. return nil, errors.New("only one dial allowed in test mode")
  556. }
  557. dialOnce.dialed = true
  558. return ct.cc, nil
  559. },
  560. }
  561. ln := newLocalListener(t)
  562. cc, err := net.Dial("tcp", ln.Addr().String())
  563. if err != nil {
  564. t.Fatal(err)
  565. }
  566. sc, err := ln.Accept()
  567. if err != nil {
  568. t.Fatal(err)
  569. }
  570. ln.Close()
  571. ct.cc = cc
  572. ct.sc = sc
  573. ct.fr = NewFramer(sc, sc)
  574. return ct
  575. }
  576. func newLocalListener(t *testing.T) net.Listener {
  577. ln, err := net.Listen("tcp4", "127.0.0.1:0")
  578. if err == nil {
  579. return ln
  580. }
  581. ln, err = net.Listen("tcp6", "[::1]:0")
  582. if err != nil {
  583. t.Fatal(err)
  584. }
  585. return ln
  586. }
  587. func (ct *clientTester) greet() {
  588. buf := make([]byte, len(ClientPreface))
  589. _, err := io.ReadFull(ct.sc, buf)
  590. if err != nil {
  591. ct.t.Fatalf("reading client preface: %v", err)
  592. }
  593. f, err := ct.fr.ReadFrame()
  594. if err != nil {
  595. ct.t.Fatalf("Reading client settings frame: %v", err)
  596. }
  597. if sf, ok := f.(*SettingsFrame); !ok {
  598. ct.t.Fatalf("Wanted client settings frame; got %v", f)
  599. _ = sf // stash it away?
  600. }
  601. if err := ct.fr.WriteSettings(); err != nil {
  602. ct.t.Fatal(err)
  603. }
  604. if err := ct.fr.WriteSettingsAck(); err != nil {
  605. ct.t.Fatal(err)
  606. }
  607. }
  608. func (ct *clientTester) cleanup() {
  609. ct.tr.CloseIdleConnections()
  610. }
  611. func (ct *clientTester) run() {
  612. errc := make(chan error, 2)
  613. ct.start("client", errc, ct.client)
  614. ct.start("server", errc, ct.server)
  615. defer ct.cleanup()
  616. for i := 0; i < 2; i++ {
  617. if err := <-errc; err != nil {
  618. ct.t.Error(err)
  619. return
  620. }
  621. }
  622. }
  623. func (ct *clientTester) start(which string, errc chan<- error, fn func() error) {
  624. go func() {
  625. finished := false
  626. var err error
  627. defer func() {
  628. if !finished {
  629. err = fmt.Errorf("%s goroutine didn't finish.", which)
  630. } else if err != nil {
  631. err = fmt.Errorf("%s: %v", which, err)
  632. }
  633. errc <- err
  634. }()
  635. err = fn()
  636. finished = true
  637. }()
  638. }
  639. type countingReader struct {
  640. n *int64
  641. }
  642. func (r countingReader) Read(p []byte) (n int, err error) {
  643. for i := range p {
  644. p[i] = byte(i)
  645. }
  646. atomic.AddInt64(r.n, int64(len(p)))
  647. return len(p), err
  648. }
  649. func TestTransportReqBodyAfterResponse_200(t *testing.T) { testTransportReqBodyAfterResponse(t, 200) }
  650. func TestTransportReqBodyAfterResponse_403(t *testing.T) { testTransportReqBodyAfterResponse(t, 403) }
  651. func testTransportReqBodyAfterResponse(t *testing.T, status int) {
  652. const bodySize = 10 << 20
  653. ct := newClientTester(t)
  654. ct.client = func() error {
  655. var n int64 // atomic
  656. req, err := http.NewRequest("PUT", "https://dummy.tld/", io.LimitReader(countingReader{&n}, bodySize))
  657. if err != nil {
  658. return err
  659. }
  660. res, err := ct.tr.RoundTrip(req)
  661. if err != nil {
  662. return fmt.Errorf("RoundTrip: %v", err)
  663. }
  664. defer res.Body.Close()
  665. if res.StatusCode != status {
  666. return fmt.Errorf("status code = %v; want %v", res.StatusCode, status)
  667. }
  668. slurp, err := ioutil.ReadAll(res.Body)
  669. if err != nil {
  670. return fmt.Errorf("Slurp: %v", err)
  671. }
  672. if len(slurp) > 0 {
  673. return fmt.Errorf("unexpected body: %q", slurp)
  674. }
  675. if status == 200 {
  676. if got := atomic.LoadInt64(&n); got != bodySize {
  677. return fmt.Errorf("For 200 response, Transport wrote %d bytes; want %d", got, bodySize)
  678. }
  679. } else {
  680. if got := atomic.LoadInt64(&n); got == 0 || got >= bodySize {
  681. return fmt.Errorf("For %d response, Transport wrote %d bytes; want (0,%d) exclusive", status, got, bodySize)
  682. }
  683. }
  684. return nil
  685. }
  686. ct.server = func() error {
  687. ct.greet()
  688. var buf bytes.Buffer
  689. enc := hpack.NewEncoder(&buf)
  690. var dataRecv int64
  691. var closed bool
  692. for {
  693. f, err := ct.fr.ReadFrame()
  694. if err != nil {
  695. return err
  696. }
  697. //println(fmt.Sprintf("server got frame: %v", f))
  698. switch f := f.(type) {
  699. case *WindowUpdateFrame, *SettingsFrame:
  700. case *HeadersFrame:
  701. if !f.HeadersEnded() {
  702. return fmt.Errorf("headers should have END_HEADERS be ended: %v", f)
  703. }
  704. if f.StreamEnded() {
  705. return fmt.Errorf("headers contains END_STREAM unexpectedly: %v", f)
  706. }
  707. time.Sleep(50 * time.Millisecond) // let client send body
  708. enc.WriteField(hpack.HeaderField{Name: ":status", Value: strconv.Itoa(status)})
  709. ct.fr.WriteHeaders(HeadersFrameParam{
  710. StreamID: f.StreamID,
  711. EndHeaders: true,
  712. EndStream: false,
  713. BlockFragment: buf.Bytes(),
  714. })
  715. case *DataFrame:
  716. dataLen := len(f.Data())
  717. dataRecv += int64(dataLen)
  718. if dataLen > 0 {
  719. if err := ct.fr.WriteWindowUpdate(0, uint32(dataLen)); err != nil {
  720. return err
  721. }
  722. if err := ct.fr.WriteWindowUpdate(f.StreamID, uint32(dataLen)); err != nil {
  723. return err
  724. }
  725. }
  726. if !closed && ((status != 200 && dataRecv > 0) ||
  727. (status == 200 && dataRecv == bodySize)) {
  728. closed = true
  729. if err := ct.fr.WriteData(f.StreamID, true, nil); err != nil {
  730. return err
  731. }
  732. return nil
  733. }
  734. default:
  735. return fmt.Errorf("Unexpected client frame %v", f)
  736. }
  737. }
  738. }
  739. ct.run()
  740. }
  741. // See golang.org/issue/13444
  742. func TestTransportFullDuplex(t *testing.T) {
  743. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  744. w.WriteHeader(200) // redundant but for clarity
  745. w.(http.Flusher).Flush()
  746. io.Copy(flushWriter{w}, capitalizeReader{r.Body})
  747. fmt.Fprintf(w, "bye.\n")
  748. }, optOnlyServer)
  749. defer st.Close()
  750. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  751. defer tr.CloseIdleConnections()
  752. c := &http.Client{Transport: tr}
  753. pr, pw := io.Pipe()
  754. req, err := http.NewRequest("PUT", st.ts.URL, ioutil.NopCloser(pr))
  755. if err != nil {
  756. t.Fatal(err)
  757. }
  758. req.ContentLength = -1
  759. res, err := c.Do(req)
  760. if err != nil {
  761. t.Fatal(err)
  762. }
  763. defer res.Body.Close()
  764. if res.StatusCode != 200 {
  765. t.Fatalf("StatusCode = %v; want %v", res.StatusCode, 200)
  766. }
  767. bs := bufio.NewScanner(res.Body)
  768. want := func(v string) {
  769. if !bs.Scan() {
  770. t.Fatalf("wanted to read %q but Scan() = false, err = %v", v, bs.Err())
  771. }
  772. }
  773. write := func(v string) {
  774. _, err := io.WriteString(pw, v)
  775. if err != nil {
  776. t.Fatalf("pipe write: %v", err)
  777. }
  778. }
  779. write("foo\n")
  780. want("FOO")
  781. write("bar\n")
  782. want("BAR")
  783. pw.Close()
  784. want("bye.")
  785. if err := bs.Err(); err != nil {
  786. t.Fatal(err)
  787. }
  788. }
  789. func TestTransportConnectRequest(t *testing.T) {
  790. gotc := make(chan *http.Request, 1)
  791. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  792. gotc <- r
  793. }, optOnlyServer)
  794. defer st.Close()
  795. u, err := url.Parse(st.ts.URL)
  796. if err != nil {
  797. t.Fatal(err)
  798. }
  799. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  800. defer tr.CloseIdleConnections()
  801. c := &http.Client{Transport: tr}
  802. tests := []struct {
  803. req *http.Request
  804. want string
  805. }{
  806. {
  807. req: &http.Request{
  808. Method: "CONNECT",
  809. Header: http.Header{},
  810. URL: u,
  811. },
  812. want: u.Host,
  813. },
  814. {
  815. req: &http.Request{
  816. Method: "CONNECT",
  817. Header: http.Header{},
  818. URL: u,
  819. Host: "example.com:123",
  820. },
  821. want: "example.com:123",
  822. },
  823. }
  824. for i, tt := range tests {
  825. res, err := c.Do(tt.req)
  826. if err != nil {
  827. t.Errorf("%d. RoundTrip = %v", i, err)
  828. continue
  829. }
  830. res.Body.Close()
  831. req := <-gotc
  832. if req.Method != "CONNECT" {
  833. t.Errorf("method = %q; want CONNECT", req.Method)
  834. }
  835. if req.Host != tt.want {
  836. t.Errorf("Host = %q; want %q", req.Host, tt.want)
  837. }
  838. if req.URL.Host != tt.want {
  839. t.Errorf("URL.Host = %q; want %q", req.URL.Host, tt.want)
  840. }
  841. }
  842. }
  843. type headerType int
  844. const (
  845. noHeader headerType = iota // omitted
  846. oneHeader
  847. splitHeader // broken into continuation on purpose
  848. )
  849. const (
  850. f0 = noHeader
  851. f1 = oneHeader
  852. f2 = splitHeader
  853. d0 = false
  854. d1 = true
  855. )
  856. // Test all 36 combinations of response frame orders:
  857. // (3 ways of 100-continue) * (2 ways of headers) * (2 ways of data) * (3 ways of trailers):func TestTransportResponsePattern_00f0(t *testing.T) { testTransportResponsePattern(h0, h1, false, h0) }
  858. // Generated by http://play.golang.org/p/SScqYKJYXd
  859. func TestTransportResPattern_c0h1d0t0(t *testing.T) { testTransportResPattern(t, f0, f1, d0, f0) }
  860. func TestTransportResPattern_c0h1d0t1(t *testing.T) { testTransportResPattern(t, f0, f1, d0, f1) }
  861. func TestTransportResPattern_c0h1d0t2(t *testing.T) { testTransportResPattern(t, f0, f1, d0, f2) }
  862. func TestTransportResPattern_c0h1d1t0(t *testing.T) { testTransportResPattern(t, f0, f1, d1, f0) }
  863. func TestTransportResPattern_c0h1d1t1(t *testing.T) { testTransportResPattern(t, f0, f1, d1, f1) }
  864. func TestTransportResPattern_c0h1d1t2(t *testing.T) { testTransportResPattern(t, f0, f1, d1, f2) }
  865. func TestTransportResPattern_c0h2d0t0(t *testing.T) { testTransportResPattern(t, f0, f2, d0, f0) }
  866. func TestTransportResPattern_c0h2d0t1(t *testing.T) { testTransportResPattern(t, f0, f2, d0, f1) }
  867. func TestTransportResPattern_c0h2d0t2(t *testing.T) { testTransportResPattern(t, f0, f2, d0, f2) }
  868. func TestTransportResPattern_c0h2d1t0(t *testing.T) { testTransportResPattern(t, f0, f2, d1, f0) }
  869. func TestTransportResPattern_c0h2d1t1(t *testing.T) { testTransportResPattern(t, f0, f2, d1, f1) }
  870. func TestTransportResPattern_c0h2d1t2(t *testing.T) { testTransportResPattern(t, f0, f2, d1, f2) }
  871. func TestTransportResPattern_c1h1d0t0(t *testing.T) { testTransportResPattern(t, f1, f1, d0, f0) }
  872. func TestTransportResPattern_c1h1d0t1(t *testing.T) { testTransportResPattern(t, f1, f1, d0, f1) }
  873. func TestTransportResPattern_c1h1d0t2(t *testing.T) { testTransportResPattern(t, f1, f1, d0, f2) }
  874. func TestTransportResPattern_c1h1d1t0(t *testing.T) { testTransportResPattern(t, f1, f1, d1, f0) }
  875. func TestTransportResPattern_c1h1d1t1(t *testing.T) { testTransportResPattern(t, f1, f1, d1, f1) }
  876. func TestTransportResPattern_c1h1d1t2(t *testing.T) { testTransportResPattern(t, f1, f1, d1, f2) }
  877. func TestTransportResPattern_c1h2d0t0(t *testing.T) { testTransportResPattern(t, f1, f2, d0, f0) }
  878. func TestTransportResPattern_c1h2d0t1(t *testing.T) { testTransportResPattern(t, f1, f2, d0, f1) }
  879. func TestTransportResPattern_c1h2d0t2(t *testing.T) { testTransportResPattern(t, f1, f2, d0, f2) }
  880. func TestTransportResPattern_c1h2d1t0(t *testing.T) { testTransportResPattern(t, f1, f2, d1, f0) }
  881. func TestTransportResPattern_c1h2d1t1(t *testing.T) { testTransportResPattern(t, f1, f2, d1, f1) }
  882. func TestTransportResPattern_c1h2d1t2(t *testing.T) { testTransportResPattern(t, f1, f2, d1, f2) }
  883. func TestTransportResPattern_c2h1d0t0(t *testing.T) { testTransportResPattern(t, f2, f1, d0, f0) }
  884. func TestTransportResPattern_c2h1d0t1(t *testing.T) { testTransportResPattern(t, f2, f1, d0, f1) }
  885. func TestTransportResPattern_c2h1d0t2(t *testing.T) { testTransportResPattern(t, f2, f1, d0, f2) }
  886. func TestTransportResPattern_c2h1d1t0(t *testing.T) { testTransportResPattern(t, f2, f1, d1, f0) }
  887. func TestTransportResPattern_c2h1d1t1(t *testing.T) { testTransportResPattern(t, f2, f1, d1, f1) }
  888. func TestTransportResPattern_c2h1d1t2(t *testing.T) { testTransportResPattern(t, f2, f1, d1, f2) }
  889. func TestTransportResPattern_c2h2d0t0(t *testing.T) { testTransportResPattern(t, f2, f2, d0, f0) }
  890. func TestTransportResPattern_c2h2d0t1(t *testing.T) { testTransportResPattern(t, f2, f2, d0, f1) }
  891. func TestTransportResPattern_c2h2d0t2(t *testing.T) { testTransportResPattern(t, f2, f2, d0, f2) }
  892. func TestTransportResPattern_c2h2d1t0(t *testing.T) { testTransportResPattern(t, f2, f2, d1, f0) }
  893. func TestTransportResPattern_c2h2d1t1(t *testing.T) { testTransportResPattern(t, f2, f2, d1, f1) }
  894. func TestTransportResPattern_c2h2d1t2(t *testing.T) { testTransportResPattern(t, f2, f2, d1, f2) }
  895. func testTransportResPattern(t *testing.T, expect100Continue, resHeader headerType, withData bool, trailers headerType) {
  896. const reqBody = "some request body"
  897. const resBody = "some response body"
  898. if resHeader == noHeader {
  899. // TODO: test 100-continue followed by immediate
  900. // server stream reset, without headers in the middle?
  901. panic("invalid combination")
  902. }
  903. ct := newClientTester(t)
  904. ct.client = func() error {
  905. req, _ := http.NewRequest("POST", "https://dummy.tld/", strings.NewReader(reqBody))
  906. if expect100Continue != noHeader {
  907. req.Header.Set("Expect", "100-continue")
  908. }
  909. res, err := ct.tr.RoundTrip(req)
  910. if err != nil {
  911. return fmt.Errorf("RoundTrip: %v", err)
  912. }
  913. defer res.Body.Close()
  914. if res.StatusCode != 200 {
  915. return fmt.Errorf("status code = %v; want 200", res.StatusCode)
  916. }
  917. slurp, err := ioutil.ReadAll(res.Body)
  918. if err != nil {
  919. return fmt.Errorf("Slurp: %v", err)
  920. }
  921. wantBody := resBody
  922. if !withData {
  923. wantBody = ""
  924. }
  925. if string(slurp) != wantBody {
  926. return fmt.Errorf("body = %q; want %q", slurp, wantBody)
  927. }
  928. if trailers == noHeader {
  929. if len(res.Trailer) > 0 {
  930. t.Errorf("Trailer = %v; want none", res.Trailer)
  931. }
  932. } else {
  933. want := http.Header{"Some-Trailer": {"some-value"}}
  934. if !reflect.DeepEqual(res.Trailer, want) {
  935. t.Errorf("Trailer = %v; want %v", res.Trailer, want)
  936. }
  937. }
  938. return nil
  939. }
  940. ct.server = func() error {
  941. ct.greet()
  942. var buf bytes.Buffer
  943. enc := hpack.NewEncoder(&buf)
  944. for {
  945. f, err := ct.fr.ReadFrame()
  946. if err != nil {
  947. return err
  948. }
  949. switch f := f.(type) {
  950. case *WindowUpdateFrame, *SettingsFrame:
  951. case *DataFrame:
  952. // ignore for now.
  953. case *HeadersFrame:
  954. endStream := false
  955. send := func(mode headerType) {
  956. hbf := buf.Bytes()
  957. switch mode {
  958. case oneHeader:
  959. ct.fr.WriteHeaders(HeadersFrameParam{
  960. StreamID: f.StreamID,
  961. EndHeaders: true,
  962. EndStream: endStream,
  963. BlockFragment: hbf,
  964. })
  965. case splitHeader:
  966. if len(hbf) < 2 {
  967. panic("too small")
  968. }
  969. ct.fr.WriteHeaders(HeadersFrameParam{
  970. StreamID: f.StreamID,
  971. EndHeaders: false,
  972. EndStream: endStream,
  973. BlockFragment: hbf[:1],
  974. })
  975. ct.fr.WriteContinuation(f.StreamID, true, hbf[1:])
  976. default:
  977. panic("bogus mode")
  978. }
  979. }
  980. if expect100Continue != noHeader {
  981. buf.Reset()
  982. enc.WriteField(hpack.HeaderField{Name: ":status", Value: "100"})
  983. send(expect100Continue)
  984. }
  985. // Response headers (1+ frames; 1 or 2 in this test, but never 0)
  986. {
  987. buf.Reset()
  988. enc.WriteField(hpack.HeaderField{Name: ":status", Value: "200"})
  989. enc.WriteField(hpack.HeaderField{Name: "x-foo", Value: "blah"})
  990. enc.WriteField(hpack.HeaderField{Name: "x-bar", Value: "more"})
  991. if trailers != noHeader {
  992. enc.WriteField(hpack.HeaderField{Name: "trailer", Value: "some-trailer"})
  993. }
  994. endStream = withData == false && trailers == noHeader
  995. send(resHeader)
  996. }
  997. if withData {
  998. endStream = trailers == noHeader
  999. ct.fr.WriteData(f.StreamID, endStream, []byte(resBody))
  1000. }
  1001. if trailers != noHeader {
  1002. endStream = true
  1003. buf.Reset()
  1004. enc.WriteField(hpack.HeaderField{Name: "some-trailer", Value: "some-value"})
  1005. send(trailers)
  1006. }
  1007. return nil
  1008. }
  1009. }
  1010. }
  1011. ct.run()
  1012. }
  1013. func TestTransportReceiveUndeclaredTrailer(t *testing.T) {
  1014. ct := newClientTester(t)
  1015. ct.client = func() error {
  1016. req, _ := http.NewRequest("GET", "https://dummy.tld/", nil)
  1017. res, err := ct.tr.RoundTrip(req)
  1018. if err != nil {
  1019. return fmt.Errorf("RoundTrip: %v", err)
  1020. }
  1021. defer res.Body.Close()
  1022. if res.StatusCode != 200 {
  1023. return fmt.Errorf("status code = %v; want 200", res.StatusCode)
  1024. }
  1025. slurp, err := ioutil.ReadAll(res.Body)
  1026. if err != nil {
  1027. return fmt.Errorf("res.Body ReadAll error = %q, %v; want %v", slurp, err, nil)
  1028. }
  1029. if len(slurp) > 0 {
  1030. return fmt.Errorf("body = %q; want nothing", slurp)
  1031. }
  1032. if _, ok := res.Trailer["Some-Trailer"]; !ok {
  1033. return fmt.Errorf("expected Some-Trailer")
  1034. }
  1035. return nil
  1036. }
  1037. ct.server = func() error {
  1038. ct.greet()
  1039. var n int
  1040. var hf *HeadersFrame
  1041. for hf == nil && n < 10 {
  1042. f, err := ct.fr.ReadFrame()
  1043. if err != nil {
  1044. return err
  1045. }
  1046. hf, _ = f.(*HeadersFrame)
  1047. n++
  1048. }
  1049. var buf bytes.Buffer
  1050. enc := hpack.NewEncoder(&buf)
  1051. // send headers without Trailer header
  1052. enc.WriteField(hpack.HeaderField{Name: ":status", Value: "200"})
  1053. ct.fr.WriteHeaders(HeadersFrameParam{
  1054. StreamID: hf.StreamID,
  1055. EndHeaders: true,
  1056. EndStream: false,
  1057. BlockFragment: buf.Bytes(),
  1058. })
  1059. // send trailers
  1060. buf.Reset()
  1061. enc.WriteField(hpack.HeaderField{Name: "some-trailer", Value: "I'm an undeclared Trailer!"})
  1062. ct.fr.WriteHeaders(HeadersFrameParam{
  1063. StreamID: hf.StreamID,
  1064. EndHeaders: true,
  1065. EndStream: true,
  1066. BlockFragment: buf.Bytes(),
  1067. })
  1068. return nil
  1069. }
  1070. ct.run()
  1071. }
  1072. func TestTransportInvalidTrailer_Pseudo1(t *testing.T) {
  1073. testTransportInvalidTrailer_Pseudo(t, oneHeader)
  1074. }
  1075. func TestTransportInvalidTrailer_Pseudo2(t *testing.T) {
  1076. testTransportInvalidTrailer_Pseudo(t, splitHeader)
  1077. }
  1078. func testTransportInvalidTrailer_Pseudo(t *testing.T, trailers headerType) {
  1079. testInvalidTrailer(t, trailers, pseudoHeaderError(":colon"), func(enc *hpack.Encoder) {
  1080. enc.WriteField(hpack.HeaderField{Name: ":colon", Value: "foo"})
  1081. enc.WriteField(hpack.HeaderField{Name: "foo", Value: "bar"})
  1082. })
  1083. }
  1084. func TestTransportInvalidTrailer_Capital1(t *testing.T) {
  1085. testTransportInvalidTrailer_Capital(t, oneHeader)
  1086. }
  1087. func TestTransportInvalidTrailer_Capital2(t *testing.T) {
  1088. testTransportInvalidTrailer_Capital(t, splitHeader)
  1089. }
  1090. func testTransportInvalidTrailer_Capital(t *testing.T, trailers headerType) {
  1091. testInvalidTrailer(t, trailers, headerFieldNameError("Capital"), func(enc *hpack.Encoder) {
  1092. enc.WriteField(hpack.HeaderField{Name: "foo", Value: "bar"})
  1093. enc.WriteField(hpack.HeaderField{Name: "Capital", Value: "bad"})
  1094. })
  1095. }
  1096. func TestTransportInvalidTrailer_EmptyFieldName(t *testing.T) {
  1097. testInvalidTrailer(t, oneHeader, headerFieldNameError(""), func(enc *hpack.Encoder) {
  1098. enc.WriteField(hpack.HeaderField{Name: "", Value: "bad"})
  1099. })
  1100. }
  1101. func TestTransportInvalidTrailer_BinaryFieldValue(t *testing.T) {
  1102. testInvalidTrailer(t, oneHeader, headerFieldValueError("has\nnewline"), func(enc *hpack.Encoder) {
  1103. enc.WriteField(hpack.HeaderField{Name: "x", Value: "has\nnewline"})
  1104. })
  1105. }
  1106. func testInvalidTrailer(t *testing.T, trailers headerType, wantErr error, writeTrailer func(*hpack.Encoder)) {
  1107. ct := newClientTester(t)
  1108. ct.client = func() error {
  1109. req, _ := http.NewRequest("GET", "https://dummy.tld/", nil)
  1110. res, err := ct.tr.RoundTrip(req)
  1111. if err != nil {
  1112. return fmt.Errorf("RoundTrip: %v", err)
  1113. }
  1114. defer res.Body.Close()
  1115. if res.StatusCode != 200 {
  1116. return fmt.Errorf("status code = %v; want 200", res.StatusCode)
  1117. }
  1118. slurp, err := ioutil.ReadAll(res.Body)
  1119. if err != wantErr {
  1120. return fmt.Errorf("res.Body ReadAll error = %q, %#v; want %T of %#v", slurp, err, wantErr, wantErr)
  1121. }
  1122. if len(slurp) > 0 {
  1123. return fmt.Errorf("body = %q; want nothing", slurp)
  1124. }
  1125. return nil
  1126. }
  1127. ct.server = func() error {
  1128. ct.greet()
  1129. var buf bytes.Buffer
  1130. enc := hpack.NewEncoder(&buf)
  1131. for {
  1132. f, err := ct.fr.ReadFrame()
  1133. if err != nil {
  1134. return err
  1135. }
  1136. switch f := f.(type) {
  1137. case *HeadersFrame:
  1138. var endStream bool
  1139. send := func(mode headerType) {
  1140. hbf := buf.Bytes()
  1141. switch mode {
  1142. case oneHeader:
  1143. ct.fr.WriteHeaders(HeadersFrameParam{
  1144. StreamID: f.StreamID,
  1145. EndHeaders: true,
  1146. EndStream: endStream,
  1147. BlockFragment: hbf,
  1148. })
  1149. case splitHeader:
  1150. if len(hbf) < 2 {
  1151. panic("too small")
  1152. }
  1153. ct.fr.WriteHeaders(HeadersFrameParam{
  1154. StreamID: f.StreamID,
  1155. EndHeaders: false,
  1156. EndStream: endStream,
  1157. BlockFragment: hbf[:1],
  1158. })
  1159. ct.fr.WriteContinuation(f.StreamID, true, hbf[1:])
  1160. default:
  1161. panic("bogus mode")
  1162. }
  1163. }
  1164. // Response headers (1+ frames; 1 or 2 in this test, but never 0)
  1165. {
  1166. buf.Reset()
  1167. enc.WriteField(hpack.HeaderField{Name: ":status", Value: "200"})
  1168. enc.WriteField(hpack.HeaderField{Name: "trailer", Value: "declared"})
  1169. endStream = false
  1170. send(oneHeader)
  1171. }
  1172. // Trailers:
  1173. {
  1174. endStream = true
  1175. buf.Reset()
  1176. writeTrailer(enc)
  1177. send(trailers)
  1178. }
  1179. return nil
  1180. }
  1181. }
  1182. }
  1183. ct.run()
  1184. }
  1185. func TestTransportChecksResponseHeaderListSize(t *testing.T) {
  1186. ct := newClientTester(t)
  1187. ct.client = func() error {
  1188. req, _ := http.NewRequest("GET", "https://dummy.tld/", nil)
  1189. res, err := ct.tr.RoundTrip(req)
  1190. if err != errResponseHeaderListSize {
  1191. if res != nil {
  1192. res.Body.Close()
  1193. }
  1194. size := int64(0)
  1195. for k, vv := range res.Header {
  1196. for _, v := range vv {
  1197. size += int64(len(k)) + int64(len(v)) + 32
  1198. }
  1199. }
  1200. return fmt.Errorf("RoundTrip Error = %v (and %d bytes of response headers); want errResponseHeaderListSize", err, size)
  1201. }
  1202. return nil
  1203. }
  1204. ct.server = func() error {
  1205. ct.greet()
  1206. var buf bytes.Buffer
  1207. enc := hpack.NewEncoder(&buf)
  1208. for {
  1209. f, err := ct.fr.ReadFrame()
  1210. if err != nil {
  1211. return err
  1212. }
  1213. switch f := f.(type) {
  1214. case *HeadersFrame:
  1215. enc.WriteField(hpack.HeaderField{Name: ":status", Value: "200"})
  1216. large := strings.Repeat("a", 1<<10)
  1217. for i := 0; i < 5042; i++ {
  1218. enc.WriteField(hpack.HeaderField{Name: large, Value: large})
  1219. }
  1220. if size, want := buf.Len(), 6329; size != want {
  1221. // Note: this number might change if
  1222. // our hpack implementation
  1223. // changes. That's fine. This is
  1224. // just a sanity check that our
  1225. // response can fit in a single
  1226. // header block fragment frame.
  1227. return fmt.Errorf("encoding over 10MB of duplicate keypairs took %d bytes; expected %d", size, want)
  1228. }
  1229. ct.fr.WriteHeaders(HeadersFrameParam{
  1230. StreamID: f.StreamID,
  1231. EndHeaders: true,
  1232. EndStream: true,
  1233. BlockFragment: buf.Bytes(),
  1234. })
  1235. return nil
  1236. }
  1237. }
  1238. }
  1239. ct.run()
  1240. }
  1241. // Test that the the Transport returns a typed error from Response.Body.Read calls
  1242. // when the server sends an error. (here we use a panic, since that should generate
  1243. // a stream error, but others like cancel should be similar)
  1244. func TestTransportBodyReadErrorType(t *testing.T) {
  1245. doPanic := make(chan bool, 1)
  1246. st := newServerTester(t,
  1247. func(w http.ResponseWriter, r *http.Request) {
  1248. w.(http.Flusher).Flush() // force headers out
  1249. <-doPanic
  1250. panic("boom")
  1251. },
  1252. optOnlyServer,
  1253. optQuiet,
  1254. )
  1255. defer st.Close()
  1256. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  1257. defer tr.CloseIdleConnections()
  1258. c := &http.Client{Transport: tr}
  1259. res, err := c.Get(st.ts.URL)
  1260. if err != nil {
  1261. t.Fatal(err)
  1262. }
  1263. defer res.Body.Close()
  1264. doPanic <- true
  1265. buf := make([]byte, 100)
  1266. n, err := res.Body.Read(buf)
  1267. want := StreamError{StreamID: 0x1, Code: 0x2}
  1268. if !reflect.DeepEqual(want, err) {
  1269. t.Errorf("Read = %v, %#v; want error %#v", n, err, want)
  1270. }
  1271. }
  1272. // golang.org/issue/13924
  1273. // This used to fail after many iterations, especially with -race:
  1274. // go test -v -run=TestTransportDoubleCloseOnWriteError -count=500 -race
  1275. func TestTransportDoubleCloseOnWriteError(t *testing.T) {
  1276. var (
  1277. mu sync.Mutex
  1278. conn net.Conn // to close if set
  1279. )
  1280. st := newServerTester(t,
  1281. func(w http.ResponseWriter, r *http.Request) {
  1282. mu.Lock()
  1283. defer mu.Unlock()
  1284. if conn != nil {
  1285. conn.Close()
  1286. }
  1287. },
  1288. optOnlyServer,
  1289. )
  1290. defer st.Close()
  1291. tr := &Transport{
  1292. TLSClientConfig: tlsConfigInsecure,
  1293. DialTLS: func(network, addr string, cfg *tls.Config) (net.Conn, error) {
  1294. tc, err := tls.Dial(network, addr, cfg)
  1295. if err != nil {
  1296. return nil, err
  1297. }
  1298. mu.Lock()
  1299. defer mu.Unlock()
  1300. conn = tc
  1301. return tc, nil
  1302. },
  1303. }
  1304. defer tr.CloseIdleConnections()
  1305. c := &http.Client{Transport: tr}
  1306. c.Get(st.ts.URL)
  1307. }
  1308. // Test that the http1 Transport.DisableKeepAlives option is respected
  1309. // and connections are closed as soon as idle.
  1310. // See golang.org/issue/14008
  1311. func TestTransportDisableKeepAlives(t *testing.T) {
  1312. st := newServerTester(t,
  1313. func(w http.ResponseWriter, r *http.Request) {
  1314. io.WriteString(w, "hi")
  1315. },
  1316. optOnlyServer,
  1317. )
  1318. defer st.Close()
  1319. connClosed := make(chan struct{}) // closed on tls.Conn.Close
  1320. tr := &Transport{
  1321. t1: &http.Transport{
  1322. DisableKeepAlives: true,
  1323. },
  1324. TLSClientConfig: tlsConfigInsecure,
  1325. DialTLS: func(network, addr string, cfg *tls.Config) (net.Conn, error) {
  1326. tc, err := tls.Dial(network, addr, cfg)
  1327. if err != nil {
  1328. return nil, err
  1329. }
  1330. return &noteCloseConn{Conn: tc, closefn: func() { close(connClosed) }}, nil
  1331. },
  1332. }
  1333. c := &http.Client{Transport: tr}
  1334. res, err := c.Get(st.ts.URL)
  1335. if err != nil {
  1336. t.Fatal(err)
  1337. }
  1338. if _, err := ioutil.ReadAll(res.Body); err != nil {
  1339. t.Fatal(err)
  1340. }
  1341. defer res.Body.Close()
  1342. select {
  1343. case <-connClosed:
  1344. case <-time.After(1 * time.Second):
  1345. t.Errorf("timeout")
  1346. }
  1347. }
  1348. // Test concurrent requests with Transport.DisableKeepAlives. We can share connections,
  1349. // but when things are totally idle, it still needs to close.
  1350. func TestTransportDisableKeepAlives_Concurrency(t *testing.T) {
  1351. const D = 25 * time.Millisecond
  1352. st := newServerTester(t,
  1353. func(w http.ResponseWriter, r *http.Request) {
  1354. time.Sleep(D)
  1355. io.WriteString(w, "hi")
  1356. },
  1357. optOnlyServer,
  1358. )
  1359. defer st.Close()
  1360. var dials int32
  1361. var conns sync.WaitGroup
  1362. tr := &Transport{
  1363. t1: &http.Transport{
  1364. DisableKeepAlives: true,
  1365. },
  1366. TLSClientConfig: tlsConfigInsecure,
  1367. DialTLS: func(network, addr string, cfg *tls.Config) (net.Conn, error) {
  1368. tc, err := tls.Dial(network, addr, cfg)
  1369. if err != nil {
  1370. return nil, err
  1371. }
  1372. atomic.AddInt32(&dials, 1)
  1373. conns.Add(1)
  1374. return &noteCloseConn{Conn: tc, closefn: func() { conns.Done() }}, nil
  1375. },
  1376. }
  1377. c := &http.Client{Transport: tr}
  1378. var reqs sync.WaitGroup
  1379. const N = 20
  1380. for i := 0; i < N; i++ {
  1381. reqs.Add(1)
  1382. if i == N-1 {
  1383. // For the final request, try to make all the
  1384. // others close. This isn't verified in the
  1385. // count, other than the Log statement, since
  1386. // it's so timing dependent. This test is
  1387. // really to make sure we don't interrupt a
  1388. // valid request.
  1389. time.Sleep(D * 2)
  1390. }
  1391. go func() {
  1392. defer reqs.Done()
  1393. res, err := c.Get(st.ts.URL)
  1394. if err != nil {
  1395. t.Error(err)
  1396. return
  1397. }
  1398. if _, err := ioutil.ReadAll(res.Body); err != nil {
  1399. t.Error(err)
  1400. return
  1401. }
  1402. res.Body.Close()
  1403. }()
  1404. }
  1405. reqs.Wait()
  1406. conns.Wait()
  1407. t.Logf("did %d dials, %d requests", atomic.LoadInt32(&dials), N)
  1408. }
  1409. type noteCloseConn struct {
  1410. net.Conn
  1411. onceClose sync.Once
  1412. closefn func()
  1413. }
  1414. func (c *noteCloseConn) Close() error {
  1415. c.onceClose.Do(c.closefn)
  1416. return c.Conn.Close()
  1417. }
  1418. func isTimeout(err error) bool {
  1419. switch err := err.(type) {
  1420. case nil:
  1421. return false
  1422. case *url.Error:
  1423. return isTimeout(err.Err)
  1424. case net.Error:
  1425. return err.Timeout()
  1426. }
  1427. return false
  1428. }
  1429. // Test that the http1 Transport.ResponseHeaderTimeout option and cancel is sent.
  1430. func TestTransportResponseHeaderTimeout_NoBody(t *testing.T) {
  1431. testTransportResponseHeaderTimeout(t, false)
  1432. }
  1433. func TestTransportResponseHeaderTimeout_Body(t *testing.T) {
  1434. testTransportResponseHeaderTimeout(t, true)
  1435. }
  1436. func testTransportResponseHeaderTimeout(t *testing.T, body bool) {
  1437. ct := newClientTester(t)
  1438. ct.tr.t1 = &http.Transport{
  1439. ResponseHeaderTimeout: 5 * time.Millisecond,
  1440. }
  1441. ct.client = func() error {
  1442. c := &http.Client{Transport: ct.tr}
  1443. var err error
  1444. var n int64
  1445. const bodySize = 4 << 20
  1446. if body {
  1447. _, err = c.Post("https://dummy.tld/", "text/foo", io.LimitReader(countingReader{&n}, bodySize))
  1448. } else {
  1449. _, err = c.Get("https://dummy.tld/")
  1450. }
  1451. if !isTimeout(err) {
  1452. t.Errorf("client expected timeout error; got %#v", err)
  1453. }
  1454. if body && n != bodySize {
  1455. t.Errorf("only read %d bytes of body; want %d", n, bodySize)
  1456. }
  1457. return nil
  1458. }
  1459. ct.server = func() error {
  1460. ct.greet()
  1461. for {
  1462. f, err := ct.fr.ReadFrame()
  1463. if err != nil {
  1464. t.Logf("ReadFrame: %v", err)
  1465. return nil
  1466. }
  1467. switch f := f.(type) {
  1468. case *DataFrame:
  1469. dataLen := len(f.Data())
  1470. if dataLen > 0 {
  1471. if err := ct.fr.WriteWindowUpdate(0, uint32(dataLen)); err != nil {
  1472. return err
  1473. }
  1474. if err := ct.fr.WriteWindowUpdate(f.StreamID, uint32(dataLen)); err != nil {
  1475. return err
  1476. }
  1477. }
  1478. case *RSTStreamFrame:
  1479. if f.StreamID == 1 && f.ErrCode == ErrCodeCancel {
  1480. return nil
  1481. }
  1482. }
  1483. }
  1484. }
  1485. ct.run()
  1486. }
  1487. func TestTransportDisableCompression(t *testing.T) {
  1488. const body = "sup"
  1489. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  1490. want := http.Header{
  1491. "User-Agent": []string{"Go-http-client/2.0"},
  1492. }
  1493. if !reflect.DeepEqual(r.Header, want) {
  1494. t.Errorf("request headers = %v; want %v", r.Header, want)
  1495. }
  1496. }, optOnlyServer)
  1497. defer st.Close()
  1498. tr := &Transport{
  1499. TLSClientConfig: tlsConfigInsecure,
  1500. t1: &http.Transport{
  1501. DisableCompression: true,
  1502. },
  1503. }
  1504. defer tr.CloseIdleConnections()
  1505. req, err := http.NewRequest("GET", st.ts.URL, nil)
  1506. if err != nil {
  1507. t.Fatal(err)
  1508. }
  1509. res, err := tr.RoundTrip(req)
  1510. if err != nil {
  1511. t.Fatal(err)
  1512. }
  1513. defer res.Body.Close()
  1514. }
  1515. // RFC 7540 section 8.1.2.2
  1516. func TestTransportRejectsConnHeaders(t *testing.T) {
  1517. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  1518. var got []string
  1519. for k := range r.Header {
  1520. got = append(got, k)
  1521. }
  1522. sort.Strings(got)
  1523. w.Header().Set("Got-Header", strings.Join(got, ","))
  1524. }, optOnlyServer)
  1525. defer st.Close()
  1526. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  1527. defer tr.CloseIdleConnections()
  1528. tests := []struct {
  1529. key string
  1530. value []string
  1531. want string
  1532. }{
  1533. {
  1534. key: "Upgrade",
  1535. value: []string{"anything"},
  1536. want: "ERROR: http2: invalid Upgrade request header",
  1537. },
  1538. {
  1539. key: "Connection",
  1540. value: []string{"foo"},
  1541. want: "ERROR: http2: invalid Connection request header",
  1542. },
  1543. {
  1544. key: "Connection",
  1545. value: []string{"close"},
  1546. want: "Accept-Encoding,User-Agent",
  1547. },
  1548. {
  1549. key: "Connection",
  1550. value: []string{"close", "something-else"},
  1551. want: "ERROR: http2: invalid Connection request header",
  1552. },
  1553. {
  1554. key: "Connection",
  1555. value: []string{"keep-alive"},
  1556. want: "Accept-Encoding,User-Agent",
  1557. },
  1558. {
  1559. key: "Proxy-Connection", // just deleted and ignored
  1560. value: []string{"keep-alive"},
  1561. want: "Accept-Encoding,User-Agent",
  1562. },
  1563. {
  1564. key: "Transfer-Encoding",
  1565. value: []string{""},
  1566. want: "Accept-Encoding,User-Agent",
  1567. },
  1568. {
  1569. key: "Transfer-Encoding",
  1570. value: []string{"foo"},
  1571. want: "ERROR: http2: invalid Transfer-Encoding request header",
  1572. },
  1573. {
  1574. key: "Transfer-Encoding",
  1575. value: []string{"chunked"},
  1576. want: "Accept-Encoding,User-Agent",
  1577. },
  1578. {
  1579. key: "Transfer-Encoding",
  1580. value: []string{"chunked", "other"},
  1581. want: "ERROR: http2: invalid Transfer-Encoding request header",
  1582. },
  1583. {
  1584. key: "Content-Length",
  1585. value: []string{"123"},
  1586. want: "Accept-Encoding,User-Agent",
  1587. },
  1588. {
  1589. key: "Keep-Alive",
  1590. value: []string{"doop"},
  1591. want: "Accept-Encoding,User-Agent",
  1592. },
  1593. }
  1594. for _, tt := range tests {
  1595. req, _ := http.NewRequest("GET", st.ts.URL, nil)
  1596. req.Header[tt.key] = tt.value
  1597. res, err := tr.RoundTrip(req)
  1598. var got string
  1599. if err != nil {
  1600. got = fmt.Sprintf("ERROR: %v", err)
  1601. } else {
  1602. got = res.Header.Get("Got-Header")
  1603. res.Body.Close()
  1604. }
  1605. if got != tt.want {
  1606. t.Errorf("For key %q, value %q, got = %q; want %q", tt.key, tt.value, got, tt.want)
  1607. }
  1608. }
  1609. }
  1610. // golang.org/issue/14048
  1611. func TestTransportFailsOnInvalidHeaders(t *testing.T) {
  1612. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  1613. var got []string
  1614. for k := range r.Header {
  1615. got = append(got, k)
  1616. }
  1617. sort.Strings(got)
  1618. w.Header().Set("Got-Header", strings.Join(got, ","))
  1619. }, optOnlyServer)
  1620. defer st.Close()
  1621. tests := [...]struct {
  1622. h http.Header
  1623. wantErr string
  1624. }{
  1625. 0: {
  1626. h: http.Header{"with space": {"foo"}},
  1627. wantErr: `invalid HTTP header name "with space"`,
  1628. },
  1629. 1: {
  1630. h: http.Header{"name": {"Брэд"}},
  1631. wantErr: "", // okay
  1632. },
  1633. 2: {
  1634. h: http.Header{"имя": {"Brad"}},
  1635. wantErr: `invalid HTTP header name "имя"`,
  1636. },
  1637. 3: {
  1638. h: http.Header{"foo": {"foo\x01bar"}},
  1639. wantErr: `invalid HTTP header value "foo\x01bar" for header "foo"`,
  1640. },
  1641. }
  1642. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  1643. defer tr.CloseIdleConnections()
  1644. for i, tt := range tests {
  1645. req, _ := http.NewRequest("GET", st.ts.URL, nil)
  1646. req.Header = tt.h
  1647. res, err := tr.RoundTrip(req)
  1648. var bad bool
  1649. if tt.wantErr == "" {
  1650. if err != nil {
  1651. bad = true
  1652. t.Errorf("case %d: error = %v; want no error", i, err)
  1653. }
  1654. } else {
  1655. if !strings.Contains(fmt.Sprint(err), tt.wantErr) {
  1656. bad = true
  1657. t.Errorf("case %d: error = %v; want error %q", i, err, tt.wantErr)
  1658. }
  1659. }
  1660. if err == nil {
  1661. if bad {
  1662. t.Logf("case %d: server got headers %q", i, res.Header.Get("Got-Header"))
  1663. }
  1664. res.Body.Close()
  1665. }
  1666. }
  1667. }
  1668. // Tests that gzipReader doesn't crash on a second Read call following
  1669. // the first Read call's gzip.NewReader returning an error.
  1670. func TestGzipReader_DoubleReadCrash(t *testing.T) {
  1671. gz := &gzipReader{
  1672. body: ioutil.NopCloser(strings.NewReader("0123456789")),
  1673. }
  1674. var buf [1]byte
  1675. n, err1 := gz.Read(buf[:])
  1676. if n != 0 || !strings.Contains(fmt.Sprint(err1), "invalid header") {
  1677. t.Fatalf("Read = %v, %v; want 0, invalid header", n, err1)
  1678. }
  1679. n, err2 := gz.Read(buf[:])
  1680. if n != 0 || err2 != err1 {
  1681. t.Fatalf("second Read = %v, %v; want 0, %v", n, err2, err1)
  1682. }
  1683. }
  1684. func TestTransportNewTLSConfig(t *testing.T) {
  1685. tests := [...]struct {
  1686. conf *tls.Config
  1687. host string
  1688. want *tls.Config
  1689. }{
  1690. // Normal case.
  1691. 0: {
  1692. conf: nil,
  1693. host: "foo.com",
  1694. want: &tls.Config{
  1695. ServerName: "foo.com",
  1696. NextProtos: []string{NextProtoTLS},
  1697. },
  1698. },
  1699. // User-provided name (bar.com) takes precedence:
  1700. 1: {
  1701. conf: &tls.Config{
  1702. ServerName: "bar.com",
  1703. },
  1704. host: "foo.com",
  1705. want: &tls.Config{
  1706. ServerName: "bar.com",
  1707. NextProtos: []string{NextProtoTLS},
  1708. },
  1709. },
  1710. // NextProto is prepended:
  1711. 2: {
  1712. conf: &tls.Config{
  1713. NextProtos: []string{"foo", "bar"},
  1714. },
  1715. host: "example.com",
  1716. want: &tls.Config{
  1717. ServerName: "example.com",
  1718. NextProtos: []string{NextProtoTLS, "foo", "bar"},
  1719. },
  1720. },
  1721. // NextProto is not duplicated:
  1722. 3: {
  1723. conf: &tls.Config{
  1724. NextProtos: []string{"foo", "bar", NextProtoTLS},
  1725. },
  1726. host: "example.com",
  1727. want: &tls.Config{
  1728. ServerName: "example.com",
  1729. NextProtos: []string{"foo", "bar", NextProtoTLS},
  1730. },
  1731. },
  1732. }
  1733. for i, tt := range tests {
  1734. tr := &Transport{TLSClientConfig: tt.conf}
  1735. got := tr.newTLSConfig(tt.host)
  1736. if !reflect.DeepEqual(got, tt.want) {
  1737. t.Errorf("%d. got %#v; want %#v", i, got, tt.want)
  1738. }
  1739. }
  1740. }
  1741. // The Google GFE responds to HEAD requests with a HEADERS frame
  1742. // without END_STREAM, followed by a 0-length DATA frame with
  1743. // END_STREAM. Make sure we don't get confused by that. (We did.)
  1744. func TestTransportReadHeadResponse(t *testing.T) {
  1745. ct := newClientTester(t)
  1746. clientDone := make(chan struct{})
  1747. ct.client = func() error {
  1748. defer close(clientDone)
  1749. req, _ := http.NewRequest("HEAD", "https://dummy.tld/", nil)
  1750. res, err := ct.tr.RoundTrip(req)
  1751. if err != nil {
  1752. return err
  1753. }
  1754. if res.ContentLength != 123 {
  1755. return fmt.Errorf("Content-Length = %d; want 123", res.ContentLength)
  1756. }
  1757. slurp, err := ioutil.ReadAll(res.Body)
  1758. if err != nil {
  1759. return fmt.Errorf("ReadAll: %v", err)
  1760. }
  1761. if len(slurp) > 0 {
  1762. return fmt.Errorf("Unexpected non-empty ReadAll body: %q", slurp)
  1763. }
  1764. return nil
  1765. }
  1766. ct.server = func() error {
  1767. ct.greet()
  1768. for {
  1769. f, err := ct.fr.ReadFrame()
  1770. if err != nil {
  1771. t.Logf("ReadFrame: %v", err)
  1772. return nil
  1773. }
  1774. hf, ok := f.(*HeadersFrame)
  1775. if !ok {
  1776. continue
  1777. }
  1778. var buf bytes.Buffer
  1779. enc := hpack.NewEncoder(&buf)
  1780. enc.WriteField(hpack.HeaderField{Name: ":status", Value: "200"})
  1781. enc.WriteField(hpack.HeaderField{Name: "content-length", Value: "123"})
  1782. ct.fr.WriteHeaders(HeadersFrameParam{
  1783. StreamID: hf.StreamID,
  1784. EndHeaders: true,
  1785. EndStream: false, // as the GFE does
  1786. BlockFragment: buf.Bytes(),
  1787. })
  1788. ct.fr.WriteData(hf.StreamID, true, nil)
  1789. <-clientDone
  1790. return nil
  1791. }
  1792. }
  1793. ct.run()
  1794. }
  1795. type neverEnding byte
  1796. func (b neverEnding) Read(p []byte) (int, error) {
  1797. for i := range p {
  1798. p[i] = byte(b)
  1799. }
  1800. return len(p), nil
  1801. }
  1802. // golang.org/issue/15425: test that a handler closing the request
  1803. // body doesn't terminate the stream to the peer. (It just stops
  1804. // readability from the handler's side, and eventually the client
  1805. // runs out of flow control tokens)
  1806. func TestTransportHandlerBodyClose(t *testing.T) {
  1807. const bodySize = 10 << 20
  1808. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  1809. r.Body.Close()
  1810. io.Copy(w, io.LimitReader(neverEnding('A'), bodySize))
  1811. }, optOnlyServer)
  1812. defer st.Close()
  1813. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  1814. defer tr.CloseIdleConnections()
  1815. g0 := runtime.NumGoroutine()
  1816. const numReq = 10
  1817. for i := 0; i < numReq; i++ {
  1818. req, err := http.NewRequest("POST", st.ts.URL, struct{ io.Reader }{io.LimitReader(neverEnding('A'), bodySize)})
  1819. if err != nil {
  1820. t.Fatal(err)
  1821. }
  1822. res, err := tr.RoundTrip(req)
  1823. if err != nil {
  1824. t.Fatal(err)
  1825. }
  1826. n, err := io.Copy(ioutil.Discard, res.Body)
  1827. res.Body.Close()
  1828. if n != bodySize || err != nil {
  1829. t.Fatalf("req#%d: Copy = %d, %v; want %d, nil", i, n, err, bodySize)
  1830. }
  1831. }
  1832. tr.CloseIdleConnections()
  1833. gd := runtime.NumGoroutine() - g0
  1834. if gd > numReq/2 {
  1835. t.Errorf("appeared to leak goroutines")
  1836. }
  1837. }
  1838. // https://golang.org/issue/15930
  1839. func TestTransportFlowControl(t *testing.T) {
  1840. const (
  1841. total = 100 << 20 // 100MB
  1842. bufLen = 1 << 16
  1843. )
  1844. var wrote int64 // updated atomically
  1845. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  1846. b := make([]byte, bufLen)
  1847. for wrote < total {
  1848. n, err := w.Write(b)
  1849. atomic.AddInt64(&wrote, int64(n))
  1850. if err != nil {
  1851. t.Errorf("ResponseWriter.Write error: %v", err)
  1852. break
  1853. }
  1854. w.(http.Flusher).Flush()
  1855. }
  1856. }, optOnlyServer)
  1857. tr := &Transport{TLSClientConfig: tlsConfigInsecure}
  1858. defer tr.CloseIdleConnections()
  1859. req, err := http.NewRequest("GET", st.ts.URL, nil)
  1860. if err != nil {
  1861. t.Fatal("NewRequest error:", err)
  1862. }
  1863. resp, err := tr.RoundTrip(req)
  1864. if err != nil {
  1865. t.Fatal("RoundTrip error:", err)
  1866. }
  1867. defer resp.Body.Close()
  1868. var read int64
  1869. b := make([]byte, bufLen)
  1870. for {
  1871. n, err := resp.Body.Read(b)
  1872. if err == io.EOF {
  1873. break
  1874. }
  1875. if err != nil {
  1876. t.Fatal("Read error:", err)
  1877. }
  1878. read += int64(n)
  1879. const max = transportDefaultStreamFlow
  1880. if w := atomic.LoadInt64(&wrote); -max > read-w || read-w > max {
  1881. t.Fatalf("Too much data inflight: server wrote %v bytes but client only received %v", w, read)
  1882. }
  1883. // Let the server get ahead of the client.
  1884. time.Sleep(1 * time.Millisecond)
  1885. }
  1886. }