http2_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569
  1. // Copyright 2014 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. // See https://code.google.com/p/go/source/browse/CONTRIBUTORS
  5. // Licensed under the same terms as Go itself:
  6. // https://code.google.com/p/go/source/browse/LICENSE
  7. package http2
  8. import (
  9. "bytes"
  10. "crypto/tls"
  11. "errors"
  12. "fmt"
  13. "io"
  14. "log"
  15. "net"
  16. "net/http"
  17. "net/http/httptest"
  18. "os"
  19. "os/exec"
  20. "reflect"
  21. "strconv"
  22. "strings"
  23. "sync/atomic"
  24. "testing"
  25. "time"
  26. "github.com/bradfitz/http2/hpack"
  27. )
  28. type serverTester struct {
  29. cc net.Conn // client conn
  30. t *testing.T
  31. ts *httptest.Server
  32. fr *Framer
  33. logBuf *bytes.Buffer
  34. }
  35. func newServerTester(t *testing.T, handler http.HandlerFunc) *serverTester {
  36. logBuf := new(bytes.Buffer)
  37. ts := httptest.NewUnstartedServer(handler)
  38. ConfigureServer(ts.Config, &Server{})
  39. ts.TLS = ts.Config.TLSConfig // the httptest.Server has its own copy of this TLS config
  40. ts.Config.ErrorLog = log.New(io.MultiWriter(twriter{t: t}, logBuf), "", log.LstdFlags)
  41. ts.StartTLS()
  42. t.Logf("Running test server at: %s", ts.URL)
  43. cc, err := tls.Dial("tcp", ts.Listener.Addr().String(), &tls.Config{
  44. InsecureSkipVerify: true,
  45. NextProtos: []string{npnProto},
  46. })
  47. if err != nil {
  48. t.Fatal(err)
  49. }
  50. log.SetOutput(twriter{t})
  51. return &serverTester{
  52. t: t,
  53. ts: ts,
  54. cc: cc,
  55. fr: NewFramer(cc, cc),
  56. logBuf: logBuf,
  57. }
  58. }
  59. func (st *serverTester) Close() {
  60. st.ts.Close()
  61. st.cc.Close()
  62. log.SetOutput(os.Stderr)
  63. }
  64. // greet initiates the client's HTTP/2 connection into a state where
  65. // frames may be sent.
  66. func (st *serverTester) greet() {
  67. st.writePreface()
  68. st.writeInitialSettings()
  69. st.wantSettings()
  70. st.writeSettingsAck()
  71. st.wantSettingsAck()
  72. }
  73. func (st *serverTester) writePreface() {
  74. n, err := st.cc.Write(clientPreface)
  75. if err != nil {
  76. st.t.Fatalf("Error writing client preface: %v", err)
  77. }
  78. if n != len(clientPreface) {
  79. st.t.Fatalf("Writing client preface, wrote %d bytes; want %d", n, len(clientPreface))
  80. }
  81. }
  82. func (st *serverTester) writeInitialSettings() {
  83. if err := st.fr.WriteSettings(); err != nil {
  84. st.t.Fatalf("Error writing initial SETTINGS frame from client to server: %v", err)
  85. }
  86. }
  87. func (st *serverTester) writeSettingsAck() {
  88. if err := st.fr.WriteSettingsAck(); err != nil {
  89. st.t.Fatalf("Error writing ACK of server's SETTINGS: %v", err)
  90. }
  91. }
  92. func (st *serverTester) writeHeaders(p HeadersFrameParam) {
  93. if err := st.fr.WriteHeaders(p); err != nil {
  94. st.t.Fatalf("Error writing HEADERS: %v", err)
  95. }
  96. }
  97. // bodylessReq1 writes a HEADERS frames with StreamID 1 and EndStream and EndHeaders set.
  98. func (st *serverTester) bodylessReq1(headers ...string) {
  99. st.writeHeaders(HeadersFrameParam{
  100. StreamID: 1, // clients send odd numbers
  101. BlockFragment: encodeHeader(st.t, headers...),
  102. EndStream: true,
  103. EndHeaders: true,
  104. })
  105. }
  106. func (st *serverTester) writeData(streamID uint32, endStream bool, data []byte) {
  107. if err := st.fr.WriteData(streamID, endStream, data); err != nil {
  108. st.t.Fatalf("Error writing DATA: %v", err)
  109. }
  110. }
  111. func (st *serverTester) wantSettings() *SettingsFrame {
  112. f, err := st.fr.ReadFrame()
  113. if err != nil {
  114. st.t.Fatalf("Error while expecting a SETTINGS frame: %v", err)
  115. }
  116. sf, ok := f.(*SettingsFrame)
  117. if !ok {
  118. st.t.Fatalf("got a %T; want *SettingsFrame", f)
  119. }
  120. return sf
  121. }
  122. func (st *serverTester) wantRSTStream(streamID uint32, errCode ErrCode) {
  123. f, err := st.fr.ReadFrame()
  124. if err != nil {
  125. st.t.Fatalf("Error while expecting an RSTStream frame: %v", err)
  126. }
  127. rs, ok := f.(*RSTStreamFrame)
  128. if !ok {
  129. st.t.Fatalf("got a %T; want *RSTStream", f)
  130. }
  131. if rs.FrameHeader.StreamID != streamID {
  132. st.t.Fatalf("RSTStream StreamID = %d; want %d", rs.FrameHeader.StreamID, streamID)
  133. }
  134. if rs.ErrCode != uint32(errCode) {
  135. st.t.Fatalf("RSTStream ErrCode = %d (%s); want %d (%s)", rs.ErrCode, rs.ErrCode, errCode, errCode)
  136. }
  137. }
  138. func (st *serverTester) wantSettingsAck() {
  139. f, err := st.fr.ReadFrame()
  140. if err != nil {
  141. st.t.Fatal(err)
  142. }
  143. sf, ok := f.(*SettingsFrame)
  144. if !ok {
  145. st.t.Fatalf("Wanting a settings ACK, received a %T", f)
  146. }
  147. if !sf.Header().Flags.Has(FlagSettingsAck) {
  148. st.t.Fatal("Settings Frame didn't have ACK set")
  149. }
  150. }
  151. func TestServer(t *testing.T) {
  152. gotReq := make(chan bool, 1)
  153. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  154. w.Header().Set("Foo", "Bar")
  155. t.Logf("GOT REQUEST %#v", r)
  156. gotReq <- true
  157. })
  158. defer st.Close()
  159. covers("3.5", `
  160. The server connection preface consists of a potentially empty
  161. SETTINGS frame ([SETTINGS]) that MUST be the first frame the
  162. server sends in the HTTP/2 connection.
  163. `)
  164. st.writePreface()
  165. st.writeInitialSettings()
  166. st.wantSettings().ForeachSetting(func(s Setting) {
  167. t.Logf("Server sent setting %v = %v", s.ID, s.Val)
  168. })
  169. st.writeSettingsAck()
  170. st.wantSettingsAck()
  171. st.writeHeaders(HeadersFrameParam{
  172. StreamID: 1, // clients send odd numbers
  173. BlockFragment: encodeHeader(t),
  174. EndStream: true, // no DATA frames
  175. EndHeaders: true,
  176. })
  177. select {
  178. case <-gotReq:
  179. case <-time.After(2 * time.Second):
  180. t.Error("timeout waiting for request")
  181. }
  182. }
  183. func TestServer_Request_Get(t *testing.T) {
  184. testServerRequest(t, func(st *serverTester) {
  185. st.writeHeaders(HeadersFrameParam{
  186. StreamID: 1, // clients send odd numbers
  187. BlockFragment: encodeHeader(t, "foo-bar", "some-value"),
  188. EndStream: true, // no DATA frames
  189. EndHeaders: true,
  190. })
  191. }, func(r *http.Request) {
  192. if r.Method != "GET" {
  193. t.Errorf("Method = %q; want GET", r.Method)
  194. }
  195. if r.ContentLength != 0 {
  196. t.Errorf("ContentLength = %v; want 0", r.ContentLength)
  197. }
  198. if r.Close {
  199. t.Error("Close = true; want false")
  200. }
  201. if !strings.Contains(r.RemoteAddr, ":") {
  202. t.Errorf("RemoteAddr = %q; want something with a colon", r.RemoteAddr)
  203. }
  204. if r.Proto != "HTTP/2.0" || r.ProtoMajor != 2 || r.ProtoMinor != 0 {
  205. t.Errorf("Proto = %q Major=%v,Minor=%v; want HTTP/2.0", r.Proto, r.ProtoMajor, r.ProtoMinor)
  206. }
  207. wantHeader := http.Header{
  208. "Foo-Bar": []string{"some-value"},
  209. }
  210. if !reflect.DeepEqual(r.Header, wantHeader) {
  211. t.Errorf("Header = %#v; want %#v", r.Header, wantHeader)
  212. }
  213. if n, err := r.Body.Read([]byte(" ")); err != io.EOF || n != 0 {
  214. t.Errorf("Read = %d, %v; want 0, EOF", n, err)
  215. }
  216. })
  217. }
  218. // TODO: add a test with EndStream=true on the HEADERS but setting a
  219. // Content-Length anyway. Should we just omit it and force it to
  220. // zero?
  221. func TestServer_Request_Post_NoContentLength_EndStream(t *testing.T) {
  222. testServerRequest(t, func(st *serverTester) {
  223. st.writeHeaders(HeadersFrameParam{
  224. StreamID: 1, // clients send odd numbers
  225. BlockFragment: encodeHeader(t, ":method", "POST"),
  226. EndStream: true,
  227. EndHeaders: true,
  228. })
  229. }, func(r *http.Request) {
  230. if r.Method != "POST" {
  231. t.Errorf("Method = %q; want POST", r.Method)
  232. }
  233. if r.ContentLength != 0 {
  234. t.Errorf("ContentLength = %v; want 0", r.ContentLength)
  235. }
  236. if n, err := r.Body.Read([]byte(" ")); err != io.EOF || n != 0 {
  237. t.Errorf("Read = %d, %v; want 0, EOF", n, err)
  238. }
  239. })
  240. }
  241. func TestServer_Request_Post_Body(t *testing.T) {
  242. t.Skip("TODO: post bodies not yet implemented")
  243. testServerRequest(t, func(st *serverTester) {
  244. st.writeHeaders(HeadersFrameParam{
  245. StreamID: 1, // clients send odd numbers
  246. BlockFragment: encodeHeader(t, ":method", "POST"),
  247. EndStream: false, // migth be DATA frames
  248. EndHeaders: true,
  249. })
  250. st.writeData(1, true, nil)
  251. }, func(r *http.Request) {
  252. if r.Method != "POST" {
  253. t.Errorf("Method = %q; want POST", r.Method)
  254. }
  255. if r.ContentLength != -1 {
  256. t.Errorf("ContentLength = %v; want -1", r.ContentLength)
  257. }
  258. if n, err := r.Body.Read([]byte(" ")); err != io.EOF || n != 0 {
  259. t.Errorf("Read = %d, %v; want 0, EOF", n, err)
  260. }
  261. })
  262. }
  263. // Using a Host header, instead of :authority
  264. func TestServer_Request_Get_Host(t *testing.T) {
  265. const host = "example.com"
  266. testServerRequest(t, func(st *serverTester) {
  267. st.writeHeaders(HeadersFrameParam{
  268. StreamID: 1, // clients send odd numbers
  269. BlockFragment: encodeHeader(t, "host", host),
  270. EndStream: true,
  271. EndHeaders: true,
  272. })
  273. }, func(r *http.Request) {
  274. if r.Host != host {
  275. t.Errorf("Host = %q; want %q", r.Host, host)
  276. }
  277. })
  278. }
  279. // Using an :authority pseudo-header, instead of Host
  280. func TestServer_Request_Get_Authority(t *testing.T) {
  281. const host = "example.com"
  282. testServerRequest(t, func(st *serverTester) {
  283. st.writeHeaders(HeadersFrameParam{
  284. StreamID: 1, // clients send odd numbers
  285. BlockFragment: encodeHeader(t, ":authority", host),
  286. EndStream: true,
  287. EndHeaders: true,
  288. })
  289. }, func(r *http.Request) {
  290. if r.Host != host {
  291. t.Errorf("Host = %q; want %q", r.Host, host)
  292. }
  293. })
  294. }
  295. func TestServer_Request_WithContinuation(t *testing.T) {
  296. wantHeader := http.Header{
  297. "Foo-One": []string{"value-one"},
  298. "Foo-Two": []string{"value-two"},
  299. "Foo-Three": []string{"value-three"},
  300. }
  301. testServerRequest(t, func(st *serverTester) {
  302. fullHeaders := encodeHeader(t,
  303. "foo-one", "value-one",
  304. "foo-two", "value-two",
  305. "foo-three", "value-three",
  306. )
  307. remain := fullHeaders
  308. chunks := 0
  309. for len(remain) > 0 {
  310. const maxChunkSize = 5
  311. chunk := remain
  312. if len(chunk) > maxChunkSize {
  313. chunk = chunk[:maxChunkSize]
  314. }
  315. remain = remain[len(chunk):]
  316. if chunks == 0 {
  317. st.writeHeaders(HeadersFrameParam{
  318. StreamID: 1, // clients send odd numbers
  319. BlockFragment: chunk,
  320. EndStream: true, // no DATA frames
  321. EndHeaders: false, // we'll have continuation frames
  322. })
  323. } else {
  324. err := st.fr.WriteContinuation(1, len(remain) == 0, chunk)
  325. if err != nil {
  326. t.Fatal(err)
  327. }
  328. }
  329. chunks++
  330. }
  331. if chunks < 2 {
  332. t.Fatal("too few chunks")
  333. }
  334. }, func(r *http.Request) {
  335. if !reflect.DeepEqual(r.Header, wantHeader) {
  336. t.Errorf("Header = %#v; want %#v", r.Header, wantHeader)
  337. }
  338. })
  339. }
  340. // Concatenated cookie headers. ("8.1.2.5 Compressing the Cookie Header Field")
  341. func TestServer_Request_CookieConcat(t *testing.T) {
  342. const host = "example.com"
  343. testServerRequest(t, func(st *serverTester) {
  344. st.bodylessReq1(
  345. ":authority", host,
  346. "cookie", "a=b",
  347. "cookie", "c=d",
  348. "cookie", "e=f",
  349. )
  350. }, func(r *http.Request) {
  351. const want = "a=b; c=d; e=f"
  352. if got := r.Header.Get("Cookie"); got != want {
  353. t.Errorf("Cookie = %q; want %q", got, want)
  354. }
  355. })
  356. }
  357. func TestServer_Request_RejectCapitalHeader(t *testing.T) {
  358. t.Skip("TODO: not handling stream errors properly yet in http2.go: if h2e.IsStreamError stuff")
  359. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  360. t.Fatal("server request made it to handler; should've been rejected")
  361. })
  362. defer st.Close()
  363. st.greet()
  364. st.bodylessReq1("UPPER", "v")
  365. st.wantRSTStream(1, ErrCodeProtocol)
  366. }
  367. // testServerRequest sets up an idle HTTP/2 connection and lets you
  368. // write a single request with writeReq, and then verify that the
  369. // *http.Request is built correctly in checkReq.
  370. func testServerRequest(t *testing.T, writeReq func(*serverTester), checkReq func(*http.Request)) {
  371. gotReq := make(chan bool, 1)
  372. st := newServerTester(t, func(w http.ResponseWriter, r *http.Request) {
  373. if r.Body == nil {
  374. t.Fatal("nil Body")
  375. }
  376. checkReq(r)
  377. gotReq <- true
  378. })
  379. defer st.Close()
  380. st.greet()
  381. writeReq(st)
  382. select {
  383. case <-gotReq:
  384. case <-time.After(2 * time.Second):
  385. t.Error("timeout waiting for request")
  386. }
  387. }
  388. func TestServerWithCurl(t *testing.T) {
  389. requireCurl(t)
  390. ts := httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  391. // TODO: add a bunch of different tests with different
  392. // behavior, as a function of r or a table.
  393. // -- with request body, without.
  394. // -- no interaction with w.
  395. // -- panic
  396. // -- modify Header only, but no writes or writeheader (this test)
  397. // -- WriteHeader only
  398. // -- Write only
  399. // -- WriteString
  400. // -- both
  401. // -- huge headers over a frame size so we get continuation headers.
  402. // Look at net/http's Server tests for inspiration.
  403. w.Header().Set("Foo", "Bar")
  404. }))
  405. ConfigureServer(ts.Config, &Server{})
  406. ts.TLS = ts.Config.TLSConfig // the httptest.Server has its own copy of this TLS config
  407. ts.StartTLS()
  408. defer ts.Close()
  409. var gotConn int32
  410. testHookOnConn = func() { atomic.StoreInt32(&gotConn, 1) }
  411. t.Logf("Running test server for curl to hit at: %s", ts.URL)
  412. container := curl(t, "--silent", "--http2", "--insecure", "-v", ts.URL)
  413. defer kill(container)
  414. resc := make(chan interface{}, 1)
  415. go func() {
  416. res, err := dockerLogs(container)
  417. if err != nil {
  418. resc <- err
  419. } else {
  420. resc <- res
  421. }
  422. }()
  423. select {
  424. case res := <-resc:
  425. if err, ok := res.(error); ok {
  426. t.Fatal(err)
  427. }
  428. if !strings.Contains(string(res.([]byte)), "< foo:Bar") {
  429. t.Errorf("didn't see foo:Bar header")
  430. t.Logf("Got: %s", res)
  431. }
  432. case <-time.After(3 * time.Second):
  433. t.Errorf("timeout waiting for curl")
  434. }
  435. if atomic.LoadInt32(&gotConn) == 0 {
  436. t.Error("never saw an http2 connection")
  437. }
  438. }
  439. func dockerLogs(container string) ([]byte, error) {
  440. out, err := exec.Command("docker", "wait", container).CombinedOutput()
  441. if err != nil {
  442. return out, err
  443. }
  444. exitStatus, err := strconv.Atoi(strings.TrimSpace(string(out)))
  445. if err != nil {
  446. return out, errors.New("unexpected exit status from docker wait")
  447. }
  448. out, err = exec.Command("docker", "logs", container).CombinedOutput()
  449. exec.Command("docker", "rm", container).Run()
  450. if err == nil && exitStatus != 0 {
  451. err = fmt.Errorf("exit status %d", exitStatus)
  452. }
  453. return out, err
  454. }
  455. func kill(container string) {
  456. exec.Command("docker", "kill", container).Run()
  457. exec.Command("docker", "rm", container).Run()
  458. }
  459. // Verify that curl has http2.
  460. func requireCurl(t *testing.T) {
  461. out, err := dockerLogs(curl(t, "--version"))
  462. if err != nil {
  463. t.Skipf("failed to determine curl features; skipping test")
  464. }
  465. if !strings.Contains(string(out), "HTTP2") {
  466. t.Skip("curl doesn't support HTTP2; skipping test")
  467. }
  468. }
  469. func curl(t *testing.T, args ...string) (container string) {
  470. out, err := exec.Command("docker", append([]string{"run", "-d", "--net=host", "gohttp2/curl"}, args...)...).CombinedOutput()
  471. if err != nil {
  472. t.Skipf("Failed to run curl in docker: %v, %s", err, out)
  473. }
  474. return strings.TrimSpace(string(out))
  475. }
  476. type twriter struct {
  477. t testing.TB
  478. }
  479. func (w twriter) Write(p []byte) (n int, err error) {
  480. w.t.Logf("%s", p)
  481. return len(p), nil
  482. }
  483. // encodeHeader encodes headers and returns their HPACK bytes. headers
  484. // must contain an even number of key/value pairs. There may be
  485. // multiple pairs for keys (e.g. "cookie"). The :method, :path, and
  486. // :scheme headers default to GET, / and https.
  487. func encodeHeader(t *testing.T, headers ...string) []byte {
  488. if len(headers)%2 == 1 {
  489. panic("odd number of kv args")
  490. }
  491. keys := []string{":method", ":path", ":scheme"}
  492. vals := map[string][]string{
  493. ":method": {"GET"},
  494. ":path": {"/"},
  495. ":scheme": {"https"},
  496. }
  497. for len(headers) > 0 {
  498. k, v := headers[0], headers[1]
  499. headers = headers[2:]
  500. if _, ok := vals[k]; !ok {
  501. keys = append(keys, k)
  502. }
  503. if strings.HasPrefix(k, ":") {
  504. vals[k] = []string{v}
  505. } else {
  506. vals[k] = append(vals[k], v)
  507. }
  508. }
  509. var buf bytes.Buffer
  510. enc := hpack.NewEncoder(&buf)
  511. for _, k := range keys {
  512. for _, v := range vals[k] {
  513. if err := enc.WriteField(hpack.HeaderField{Name: k, Value: v}); err != nil {
  514. t.Fatalf("HPACK encoding error for %q/%q: %v", k, v, err)
  515. }
  516. }
  517. }
  518. return buf.Bytes()
  519. }