http_network_transaction_unittest.cc 909 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884688568866887688868896890689168926893689468956896689768986899690069016902690369046905690669076908690969106911691269136914691569166917691869196920692169226923692469256926692769286929693069316932693369346935693669376938693969406941694269436944694569466947694869496950695169526953695469556956695769586959696069616962696369646965696669676968696969706971697269736974697569766977697869796980698169826983698469856986698769886989699069916992699369946995699669976998699970007001700270037004700570067007700870097010701170127013701470157016701770187019702070217022702370247025702670277028702970307031703270337034703570367037703870397040704170427043704470457046704770487049705070517052705370547055705670577058705970607061706270637064706570667067706870697070707170727073707470757076707770787079708070817082708370847085708670877088708970907091709270937094709570967097709870997100710171027103710471057106710771087109711071117112711371147115711671177118711971207121712271237124712571267127712871297130713171327133713471357136713771387139714071417142714371447145714671477148714971507151715271537154715571567157715871597160716171627163716471657166716771687169717071717172717371747175717671777178717971807181718271837184718571867187718871897190719171927193719471957196719771987199720072017202720372047205720672077208720972107211721272137214721572167217721872197220722172227223722472257226722772287229723072317232723372347235723672377238723972407241724272437244724572467247724872497250725172527253725472557256725772587259726072617262726372647265726672677268726972707271727272737274727572767277727872797280728172827283728472857286728772887289729072917292729372947295729672977298729973007301730273037304730573067307730873097310731173127313731473157316731773187319732073217322732373247325732673277328732973307331733273337334733573367337733873397340734173427343734473457346734773487349735073517352735373547355735673577358735973607361736273637364736573667367736873697370737173727373737473757376737773787379738073817382738373847385738673877388738973907391739273937394739573967397739873997400740174027403740474057406740774087409741074117412741374147415741674177418741974207421742274237424742574267427742874297430743174327433743474357436743774387439744074417442744374447445744674477448744974507451745274537454745574567457745874597460746174627463746474657466746774687469747074717472747374747475747674777478747974807481748274837484748574867487748874897490749174927493749474957496749774987499750075017502750375047505750675077508750975107511751275137514751575167517751875197520752175227523752475257526752775287529753075317532753375347535753675377538753975407541754275437544754575467547754875497550755175527553755475557556755775587559756075617562756375647565756675677568756975707571757275737574757575767577757875797580758175827583758475857586758775887589759075917592759375947595759675977598759976007601760276037604760576067607760876097610761176127613761476157616761776187619762076217622762376247625762676277628762976307631763276337634763576367637763876397640764176427643764476457646764776487649765076517652765376547655765676577658765976607661766276637664766576667667766876697670767176727673767476757676767776787679768076817682768376847685768676877688768976907691769276937694769576967697769876997700770177027703770477057706770777087709771077117712771377147715771677177718771977207721772277237724772577267727772877297730773177327733773477357736773777387739774077417742774377447745774677477748774977507751775277537754775577567757775877597760776177627763776477657766776777687769777077717772777377747775777677777778777977807781778277837784778577867787778877897790779177927793779477957796779777987799780078017802780378047805780678077808780978107811781278137814781578167817781878197820782178227823782478257826782778287829783078317832783378347835783678377838783978407841784278437844784578467847784878497850785178527853785478557856785778587859786078617862786378647865786678677868786978707871787278737874787578767877787878797880788178827883788478857886788778887889789078917892789378947895789678977898789979007901790279037904790579067907790879097910791179127913791479157916791779187919792079217922792379247925792679277928792979307931793279337934793579367937793879397940794179427943794479457946794779487949795079517952795379547955795679577958795979607961796279637964796579667967796879697970797179727973797479757976797779787979798079817982798379847985798679877988798979907991799279937994799579967997799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808880898090809180928093809480958096809780988099810081018102810381048105810681078108810981108111811281138114811581168117811881198120812181228123812481258126812781288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008201820282038204820582068207820882098210821182128213821482158216821782188219822082218222822382248225822682278228822982308231823282338234823582368237823882398240824182428243824482458246824782488249825082518252825382548255825682578258825982608261826282638264826582668267826882698270827182728273827482758276827782788279828082818282828382848285828682878288828982908291829282938294829582968297829882998300830183028303830483058306830783088309831083118312831383148315831683178318831983208321832283238324832583268327832883298330833183328333833483358336833783388339834083418342834383448345834683478348834983508351835283538354835583568357835883598360836183628363836483658366836783688369837083718372837383748375837683778378837983808381838283838384838583868387838883898390839183928393839483958396839783988399840084018402840384048405840684078408840984108411841284138414841584168417841884198420842184228423842484258426842784288429843084318432843384348435843684378438843984408441844284438444844584468447844884498450845184528453845484558456845784588459846084618462846384648465846684678468846984708471847284738474847584768477847884798480848184828483848484858486848784888489849084918492849384948495849684978498849985008501850285038504850585068507850885098510851185128513851485158516851785188519852085218522852385248525852685278528852985308531853285338534853585368537853885398540854185428543854485458546854785488549855085518552855385548555855685578558855985608561856285638564856585668567856885698570857185728573857485758576857785788579858085818582858385848585858685878588858985908591859285938594859585968597859885998600860186028603860486058606860786088609861086118612861386148615861686178618861986208621862286238624862586268627862886298630863186328633863486358636863786388639864086418642864386448645864686478648864986508651865286538654865586568657865886598660866186628663866486658666866786688669867086718672867386748675867686778678867986808681868286838684868586868687868886898690869186928693869486958696869786988699870087018702870387048705870687078708870987108711871287138714871587168717871887198720872187228723872487258726872787288729873087318732873387348735873687378738873987408741874287438744874587468747874887498750875187528753875487558756875787588759876087618762876387648765876687678768876987708771877287738774877587768777877887798780878187828783878487858786878787888789879087918792879387948795879687978798879988008801880288038804880588068807880888098810881188128813881488158816881788188819882088218822882388248825882688278828882988308831883288338834883588368837883888398840884188428843884488458846884788488849885088518852885388548855885688578858885988608861886288638864886588668867886888698870887188728873887488758876887788788879888088818882888388848885888688878888888988908891889288938894889588968897889888998900890189028903890489058906890789088909891089118912891389148915891689178918891989208921892289238924892589268927892889298930893189328933893489358936893789388939894089418942894389448945894689478948894989508951895289538954895589568957895889598960896189628963896489658966896789688969897089718972897389748975897689778978897989808981898289838984898589868987898889898990899189928993899489958996899789988999900090019002900390049005900690079008900990109011901290139014901590169017901890199020902190229023902490259026902790289029903090319032903390349035903690379038903990409041904290439044904590469047904890499050905190529053905490559056905790589059906090619062906390649065906690679068906990709071907290739074907590769077907890799080908190829083908490859086908790889089909090919092909390949095909690979098909991009101910291039104910591069107910891099110911191129113911491159116911791189119912091219122912391249125912691279128912991309131913291339134913591369137913891399140914191429143914491459146914791489149915091519152915391549155915691579158915991609161916291639164916591669167916891699170917191729173917491759176917791789179918091819182918391849185918691879188918991909191919291939194919591969197919891999200920192029203920492059206920792089209921092119212921392149215921692179218921992209221922292239224922592269227922892299230923192329233923492359236923792389239924092419242924392449245924692479248924992509251925292539254925592569257925892599260926192629263926492659266926792689269927092719272927392749275927692779278927992809281928292839284928592869287928892899290929192929293929492959296929792989299930093019302930393049305930693079308930993109311931293139314931593169317931893199320932193229323932493259326932793289329933093319332933393349335933693379338933993409341934293439344934593469347934893499350935193529353935493559356935793589359936093619362936393649365936693679368936993709371937293739374937593769377937893799380938193829383938493859386938793889389939093919392939393949395939693979398939994009401940294039404940594069407940894099410941194129413941494159416941794189419942094219422942394249425942694279428942994309431943294339434943594369437943894399440944194429443944494459446944794489449945094519452945394549455945694579458945994609461946294639464946594669467946894699470947194729473947494759476947794789479948094819482948394849485948694879488948994909491949294939494949594969497949894999500950195029503950495059506950795089509951095119512951395149515951695179518951995209521952295239524952595269527952895299530953195329533953495359536953795389539954095419542954395449545954695479548954995509551955295539554955595569557955895599560956195629563956495659566956795689569957095719572957395749575957695779578957995809581958295839584958595869587958895899590959195929593959495959596959795989599960096019602960396049605960696079608960996109611961296139614961596169617961896199620962196229623962496259626962796289629963096319632963396349635963696379638963996409641964296439644964596469647964896499650965196529653965496559656965796589659966096619662966396649665966696679668966996709671967296739674967596769677967896799680968196829683968496859686968796889689969096919692969396949695969696979698969997009701970297039704970597069707970897099710971197129713971497159716971797189719972097219722972397249725972697279728972997309731973297339734973597369737973897399740974197429743974497459746974797489749975097519752975397549755975697579758975997609761976297639764976597669767976897699770977197729773977497759776977797789779978097819782978397849785978697879788978997909791979297939794979597969797979897999800980198029803980498059806980798089809981098119812981398149815981698179818981998209821982298239824982598269827982898299830983198329833983498359836983798389839984098419842984398449845984698479848984998509851985298539854985598569857985898599860986198629863986498659866986798689869987098719872987398749875987698779878987998809881988298839884988598869887988898899890989198929893989498959896989798989899990099019902990399049905990699079908990999109911991299139914991599169917991899199920992199229923992499259926992799289929993099319932993399349935993699379938993999409941994299439944994599469947994899499950995199529953995499559956995799589959996099619962996399649965996699679968996999709971997299739974997599769977997899799980998199829983998499859986998799889989999099919992999399949995999699979998999910000100011000210003100041000510006100071000810009100101001110012100131001410015100161001710018100191002010021100221002310024100251002610027100281002910030100311003210033100341003510036100371003810039100401004110042100431004410045100461004710048100491005010051100521005310054100551005610057100581005910060100611006210063100641006510066100671006810069100701007110072100731007410075100761007710078100791008010081100821008310084100851008610087100881008910090100911009210093100941009510096100971009810099101001010110102101031010410105101061010710108101091011010111101121011310114101151011610117101181011910120101211012210123101241012510126101271012810129101301013110132101331013410135101361013710138101391014010141101421014310144101451014610147101481014910150101511015210153101541015510156101571015810159101601016110162101631016410165101661016710168101691017010171101721017310174101751017610177101781017910180101811018210183101841018510186101871018810189101901019110192101931019410195101961019710198101991020010201102021020310204102051020610207102081020910210102111021210213102141021510216102171021810219102201022110222102231022410225102261022710228102291023010231102321023310234102351023610237102381023910240102411024210243102441024510246102471024810249102501025110252102531025410255102561025710258102591026010261102621026310264102651026610267102681026910270102711027210273102741027510276102771027810279102801028110282102831028410285102861028710288102891029010291102921029310294102951029610297102981029910300103011030210303103041030510306103071030810309103101031110312103131031410315103161031710318103191032010321103221032310324103251032610327103281032910330103311033210333103341033510336103371033810339103401034110342103431034410345103461034710348103491035010351103521035310354103551035610357103581035910360103611036210363103641036510366103671036810369103701037110372103731037410375103761037710378103791038010381103821038310384103851038610387103881038910390103911039210393103941039510396103971039810399104001040110402104031040410405104061040710408104091041010411104121041310414104151041610417104181041910420104211042210423104241042510426104271042810429104301043110432104331043410435104361043710438104391044010441104421044310444104451044610447104481044910450104511045210453104541045510456104571045810459104601046110462104631046410465104661046710468104691047010471104721047310474104751047610477104781047910480104811048210483104841048510486104871048810489104901049110492104931049410495104961049710498104991050010501105021050310504105051050610507105081050910510105111051210513105141051510516105171051810519105201052110522105231052410525105261052710528105291053010531105321053310534105351053610537105381053910540105411054210543105441054510546105471054810549105501055110552105531055410555105561055710558105591056010561105621056310564105651056610567105681056910570105711057210573105741057510576105771057810579105801058110582105831058410585105861058710588105891059010591105921059310594105951059610597105981059910600106011060210603106041060510606106071060810609106101061110612106131061410615106161061710618106191062010621106221062310624106251062610627106281062910630106311063210633106341063510636106371063810639106401064110642106431064410645106461064710648106491065010651106521065310654106551065610657106581065910660106611066210663106641066510666106671066810669106701067110672106731067410675106761067710678106791068010681106821068310684106851068610687106881068910690106911069210693106941069510696106971069810699107001070110702107031070410705107061070710708107091071010711107121071310714107151071610717107181071910720107211072210723107241072510726107271072810729107301073110732107331073410735107361073710738107391074010741107421074310744107451074610747107481074910750107511075210753107541075510756107571075810759107601076110762107631076410765107661076710768107691077010771107721077310774107751077610777107781077910780107811078210783107841078510786107871078810789107901079110792107931079410795107961079710798107991080010801108021080310804108051080610807108081080910810108111081210813108141081510816108171081810819108201082110822108231082410825108261082710828108291083010831108321083310834108351083610837108381083910840108411084210843108441084510846108471084810849108501085110852108531085410855108561085710858108591086010861108621086310864108651086610867108681086910870108711087210873108741087510876108771087810879108801088110882108831088410885108861088710888108891089010891108921089310894108951089610897108981089910900109011090210903109041090510906109071090810909109101091110912109131091410915109161091710918109191092010921109221092310924109251092610927109281092910930109311093210933109341093510936109371093810939109401094110942109431094410945109461094710948109491095010951109521095310954109551095610957109581095910960109611096210963109641096510966109671096810969109701097110972109731097410975109761097710978109791098010981109821098310984109851098610987109881098910990109911099210993109941099510996109971099810999110001100111002110031100411005110061100711008110091101011011110121101311014110151101611017110181101911020110211102211023110241102511026110271102811029110301103111032110331103411035110361103711038110391104011041110421104311044110451104611047110481104911050110511105211053110541105511056110571105811059110601106111062110631106411065110661106711068110691107011071110721107311074110751107611077110781107911080110811108211083110841108511086110871108811089110901109111092110931109411095110961109711098110991110011101111021110311104111051110611107111081110911110111111111211113111141111511116111171111811119111201112111122111231112411125111261112711128111291113011131111321113311134111351113611137111381113911140111411114211143111441114511146111471114811149111501115111152111531115411155111561115711158111591116011161111621116311164111651116611167111681116911170111711117211173111741117511176111771117811179111801118111182111831118411185111861118711188111891119011191111921119311194111951119611197111981119911200112011120211203112041120511206112071120811209112101121111212112131121411215112161121711218112191122011221112221122311224112251122611227112281122911230112311123211233112341123511236112371123811239112401124111242112431124411245112461124711248112491125011251112521125311254112551125611257112581125911260112611126211263112641126511266112671126811269112701127111272112731127411275112761127711278112791128011281112821128311284112851128611287112881128911290112911129211293112941129511296112971129811299113001130111302113031130411305113061130711308113091131011311113121131311314113151131611317113181131911320113211132211323113241132511326113271132811329113301133111332113331133411335113361133711338113391134011341113421134311344113451134611347113481134911350113511135211353113541135511356113571135811359113601136111362113631136411365113661136711368113691137011371113721137311374113751137611377113781137911380113811138211383113841138511386113871138811389113901139111392113931139411395113961139711398113991140011401114021140311404114051140611407114081140911410114111141211413114141141511416114171141811419114201142111422114231142411425114261142711428114291143011431114321143311434114351143611437114381143911440114411144211443114441144511446114471144811449114501145111452114531145411455114561145711458114591146011461114621146311464114651146611467114681146911470114711147211473114741147511476114771147811479114801148111482114831148411485114861148711488114891149011491114921149311494114951149611497114981149911500115011150211503115041150511506115071150811509115101151111512115131151411515115161151711518115191152011521115221152311524115251152611527115281152911530115311153211533115341153511536115371153811539115401154111542115431154411545115461154711548115491155011551115521155311554115551155611557115581155911560115611156211563115641156511566115671156811569115701157111572115731157411575115761157711578115791158011581115821158311584115851158611587115881158911590115911159211593115941159511596115971159811599116001160111602116031160411605116061160711608116091161011611116121161311614116151161611617116181161911620116211162211623116241162511626116271162811629116301163111632116331163411635116361163711638116391164011641116421164311644116451164611647116481164911650116511165211653116541165511656116571165811659116601166111662116631166411665116661166711668116691167011671116721167311674116751167611677116781167911680116811168211683116841168511686116871168811689116901169111692116931169411695116961169711698116991170011701117021170311704117051170611707117081170911710117111171211713117141171511716117171171811719117201172111722117231172411725117261172711728117291173011731117321173311734117351173611737117381173911740117411174211743117441174511746117471174811749117501175111752117531175411755117561175711758117591176011761117621176311764117651176611767117681176911770117711177211773117741177511776117771177811779117801178111782117831178411785117861178711788117891179011791117921179311794117951179611797117981179911800118011180211803118041180511806118071180811809118101181111812118131181411815118161181711818118191182011821118221182311824118251182611827118281182911830118311183211833118341183511836118371183811839118401184111842118431184411845118461184711848118491185011851118521185311854118551185611857118581185911860118611186211863118641186511866118671186811869118701187111872118731187411875118761187711878118791188011881118821188311884118851188611887118881188911890118911189211893118941189511896118971189811899119001190111902119031190411905119061190711908119091191011911119121191311914119151191611917119181191911920119211192211923119241192511926119271192811929119301193111932119331193411935119361193711938119391194011941119421194311944119451194611947119481194911950119511195211953119541195511956119571195811959119601196111962119631196411965119661196711968119691197011971119721197311974119751197611977119781197911980119811198211983119841198511986119871198811989119901199111992119931199411995119961199711998119991200012001120021200312004120051200612007120081200912010120111201212013120141201512016120171201812019120201202112022120231202412025120261202712028120291203012031120321203312034120351203612037120381203912040120411204212043120441204512046120471204812049120501205112052120531205412055120561205712058120591206012061120621206312064120651206612067120681206912070120711207212073120741207512076120771207812079120801208112082120831208412085120861208712088120891209012091120921209312094120951209612097120981209912100121011210212103121041210512106121071210812109121101211112112121131211412115121161211712118121191212012121121221212312124121251212612127121281212912130121311213212133121341213512136121371213812139121401214112142121431214412145121461214712148121491215012151121521215312154121551215612157121581215912160121611216212163121641216512166121671216812169121701217112172121731217412175121761217712178121791218012181121821218312184121851218612187121881218912190121911219212193121941219512196121971219812199122001220112202122031220412205122061220712208122091221012211122121221312214122151221612217122181221912220122211222212223122241222512226122271222812229122301223112232122331223412235122361223712238122391224012241122421224312244122451224612247122481224912250122511225212253122541225512256122571225812259122601226112262122631226412265122661226712268122691227012271122721227312274122751227612277122781227912280122811228212283122841228512286122871228812289122901229112292122931229412295122961229712298122991230012301123021230312304123051230612307123081230912310123111231212313123141231512316123171231812319123201232112322123231232412325123261232712328123291233012331123321233312334123351233612337123381233912340123411234212343123441234512346123471234812349123501235112352123531235412355123561235712358123591236012361123621236312364123651236612367123681236912370123711237212373123741237512376123771237812379123801238112382123831238412385123861238712388123891239012391123921239312394123951239612397123981239912400124011240212403124041240512406124071240812409124101241112412124131241412415124161241712418124191242012421124221242312424124251242612427124281242912430124311243212433124341243512436124371243812439124401244112442124431244412445124461244712448124491245012451124521245312454124551245612457124581245912460124611246212463124641246512466124671246812469124701247112472124731247412475124761247712478124791248012481124821248312484124851248612487124881248912490124911249212493124941249512496124971249812499125001250112502125031250412505125061250712508125091251012511125121251312514125151251612517125181251912520125211252212523125241252512526125271252812529125301253112532125331253412535125361253712538125391254012541125421254312544125451254612547125481254912550125511255212553125541255512556125571255812559125601256112562125631256412565125661256712568125691257012571125721257312574125751257612577125781257912580125811258212583125841258512586125871258812589125901259112592125931259412595125961259712598125991260012601126021260312604126051260612607126081260912610126111261212613126141261512616126171261812619126201262112622126231262412625126261262712628126291263012631126321263312634126351263612637126381263912640126411264212643126441264512646126471264812649126501265112652126531265412655126561265712658126591266012661126621266312664126651266612667126681266912670126711267212673126741267512676126771267812679126801268112682126831268412685126861268712688126891269012691126921269312694126951269612697126981269912700127011270212703127041270512706127071270812709127101271112712127131271412715127161271712718127191272012721127221272312724127251272612727127281272912730127311273212733127341273512736127371273812739127401274112742127431274412745127461274712748127491275012751127521275312754127551275612757127581275912760127611276212763127641276512766127671276812769127701277112772127731277412775127761277712778127791278012781127821278312784127851278612787127881278912790127911279212793127941279512796127971279812799128001280112802128031280412805128061280712808128091281012811128121281312814128151281612817128181281912820128211282212823128241282512826128271282812829128301283112832128331283412835128361283712838128391284012841128421284312844128451284612847128481284912850128511285212853128541285512856128571285812859128601286112862128631286412865128661286712868128691287012871128721287312874128751287612877128781287912880128811288212883128841288512886128871288812889128901289112892128931289412895128961289712898128991290012901129021290312904129051290612907129081290912910129111291212913129141291512916129171291812919129201292112922129231292412925129261292712928129291293012931129321293312934129351293612937129381293912940129411294212943129441294512946129471294812949129501295112952129531295412955129561295712958129591296012961129621296312964129651296612967129681296912970129711297212973129741297512976129771297812979129801298112982129831298412985129861298712988129891299012991129921299312994129951299612997129981299913000130011300213003130041300513006130071300813009130101301113012130131301413015130161301713018130191302013021130221302313024130251302613027130281302913030130311303213033130341303513036130371303813039130401304113042130431304413045130461304713048130491305013051130521305313054130551305613057130581305913060130611306213063130641306513066130671306813069130701307113072130731307413075130761307713078130791308013081130821308313084130851308613087130881308913090130911309213093130941309513096130971309813099131001310113102131031310413105131061310713108131091311013111131121311313114131151311613117131181311913120131211312213123131241312513126131271312813129131301313113132131331313413135131361313713138131391314013141131421314313144131451314613147131481314913150131511315213153131541315513156131571315813159131601316113162131631316413165131661316713168131691317013171131721317313174131751317613177131781317913180131811318213183131841318513186131871318813189131901319113192131931319413195131961319713198131991320013201132021320313204132051320613207132081320913210132111321213213132141321513216132171321813219132201322113222132231322413225132261322713228132291323013231132321323313234132351323613237132381323913240132411324213243132441324513246132471324813249132501325113252132531325413255132561325713258132591326013261132621326313264132651326613267132681326913270132711327213273132741327513276132771327813279132801328113282132831328413285132861328713288132891329013291132921329313294132951329613297132981329913300133011330213303133041330513306133071330813309133101331113312133131331413315133161331713318133191332013321133221332313324133251332613327133281332913330133311333213333133341333513336133371333813339133401334113342133431334413345133461334713348133491335013351133521335313354133551335613357133581335913360133611336213363133641336513366133671336813369133701337113372133731337413375133761337713378133791338013381133821338313384133851338613387133881338913390133911339213393133941339513396133971339813399134001340113402134031340413405134061340713408134091341013411134121341313414134151341613417134181341913420134211342213423134241342513426134271342813429134301343113432134331343413435134361343713438134391344013441134421344313444134451344613447134481344913450134511345213453134541345513456134571345813459134601346113462134631346413465134661346713468134691347013471134721347313474134751347613477134781347913480134811348213483134841348513486134871348813489134901349113492134931349413495134961349713498134991350013501135021350313504135051350613507135081350913510135111351213513135141351513516135171351813519135201352113522135231352413525135261352713528135291353013531135321353313534135351353613537135381353913540135411354213543135441354513546135471354813549135501355113552135531355413555135561355713558135591356013561135621356313564135651356613567135681356913570135711357213573135741357513576135771357813579135801358113582135831358413585135861358713588135891359013591135921359313594135951359613597135981359913600136011360213603136041360513606136071360813609136101361113612136131361413615136161361713618136191362013621136221362313624136251362613627136281362913630136311363213633136341363513636136371363813639136401364113642136431364413645136461364713648136491365013651136521365313654136551365613657136581365913660136611366213663136641366513666136671366813669136701367113672136731367413675136761367713678136791368013681136821368313684136851368613687136881368913690136911369213693136941369513696136971369813699137001370113702137031370413705137061370713708137091371013711137121371313714137151371613717137181371913720137211372213723137241372513726137271372813729137301373113732137331373413735137361373713738137391374013741137421374313744137451374613747137481374913750137511375213753137541375513756137571375813759137601376113762137631376413765137661376713768137691377013771137721377313774137751377613777137781377913780137811378213783137841378513786137871378813789137901379113792137931379413795137961379713798137991380013801138021380313804138051380613807138081380913810138111381213813138141381513816138171381813819138201382113822138231382413825138261382713828138291383013831138321383313834138351383613837138381383913840138411384213843138441384513846138471384813849138501385113852138531385413855138561385713858138591386013861138621386313864138651386613867138681386913870138711387213873138741387513876138771387813879138801388113882138831388413885138861388713888138891389013891138921389313894138951389613897138981389913900139011390213903139041390513906139071390813909139101391113912139131391413915139161391713918139191392013921139221392313924139251392613927139281392913930139311393213933139341393513936139371393813939139401394113942139431394413945139461394713948139491395013951139521395313954139551395613957139581395913960139611396213963139641396513966139671396813969139701397113972139731397413975139761397713978139791398013981139821398313984139851398613987139881398913990139911399213993139941399513996139971399813999140001400114002140031400414005140061400714008140091401014011140121401314014140151401614017140181401914020140211402214023140241402514026140271402814029140301403114032140331403414035140361403714038140391404014041140421404314044140451404614047140481404914050140511405214053140541405514056140571405814059140601406114062140631406414065140661406714068140691407014071140721407314074140751407614077140781407914080140811408214083140841408514086140871408814089140901409114092140931409414095140961409714098140991410014101141021410314104141051410614107141081410914110141111411214113141141411514116141171411814119141201412114122141231412414125141261412714128141291413014131141321413314134141351413614137141381413914140141411414214143141441414514146141471414814149141501415114152141531415414155141561415714158141591416014161141621416314164141651416614167141681416914170141711417214173141741417514176141771417814179141801418114182141831418414185141861418714188141891419014191141921419314194141951419614197141981419914200142011420214203142041420514206142071420814209142101421114212142131421414215142161421714218142191422014221142221422314224142251422614227142281422914230142311423214233142341423514236142371423814239142401424114242142431424414245142461424714248142491425014251142521425314254142551425614257142581425914260142611426214263142641426514266142671426814269142701427114272142731427414275142761427714278142791428014281142821428314284142851428614287142881428914290142911429214293142941429514296142971429814299143001430114302143031430414305143061430714308143091431014311143121431314314143151431614317143181431914320143211432214323143241432514326143271432814329143301433114332143331433414335143361433714338143391434014341143421434314344143451434614347143481434914350143511435214353143541435514356143571435814359143601436114362143631436414365143661436714368143691437014371143721437314374143751437614377143781437914380143811438214383143841438514386143871438814389143901439114392143931439414395143961439714398143991440014401144021440314404144051440614407144081440914410144111441214413144141441514416144171441814419144201442114422144231442414425144261442714428144291443014431144321443314434144351443614437144381443914440144411444214443144441444514446144471444814449144501445114452144531445414455144561445714458144591446014461144621446314464144651446614467144681446914470144711447214473144741447514476144771447814479144801448114482144831448414485144861448714488144891449014491144921449314494144951449614497144981449914500145011450214503145041450514506145071450814509145101451114512145131451414515145161451714518145191452014521145221452314524145251452614527145281452914530145311453214533145341453514536145371453814539145401454114542145431454414545145461454714548145491455014551145521455314554145551455614557145581455914560145611456214563145641456514566145671456814569145701457114572145731457414575145761457714578145791458014581145821458314584145851458614587145881458914590145911459214593145941459514596145971459814599146001460114602146031460414605146061460714608146091461014611146121461314614146151461614617146181461914620146211462214623146241462514626146271462814629146301463114632146331463414635146361463714638146391464014641146421464314644146451464614647146481464914650146511465214653146541465514656146571465814659146601466114662146631466414665146661466714668146691467014671146721467314674146751467614677146781467914680146811468214683146841468514686146871468814689146901469114692146931469414695146961469714698146991470014701147021470314704147051470614707147081470914710147111471214713147141471514716147171471814719147201472114722147231472414725147261472714728147291473014731147321473314734147351473614737147381473914740147411474214743147441474514746147471474814749147501475114752147531475414755147561475714758147591476014761147621476314764147651476614767147681476914770147711477214773147741477514776147771477814779147801478114782147831478414785147861478714788147891479014791147921479314794147951479614797147981479914800148011480214803148041480514806148071480814809148101481114812148131481414815148161481714818148191482014821148221482314824148251482614827148281482914830148311483214833148341483514836148371483814839148401484114842148431484414845148461484714848148491485014851148521485314854148551485614857148581485914860148611486214863148641486514866148671486814869148701487114872148731487414875148761487714878148791488014881148821488314884148851488614887148881488914890148911489214893148941489514896148971489814899149001490114902149031490414905149061490714908149091491014911149121491314914149151491614917149181491914920149211492214923149241492514926149271492814929149301493114932149331493414935149361493714938149391494014941149421494314944149451494614947149481494914950149511495214953149541495514956149571495814959149601496114962149631496414965149661496714968149691497014971149721497314974149751497614977149781497914980149811498214983149841498514986149871498814989149901499114992149931499414995149961499714998149991500015001150021500315004150051500615007150081500915010150111501215013150141501515016150171501815019150201502115022150231502415025150261502715028150291503015031150321503315034150351503615037150381503915040150411504215043150441504515046150471504815049150501505115052150531505415055150561505715058150591506015061150621506315064150651506615067150681506915070150711507215073150741507515076150771507815079150801508115082150831508415085150861508715088150891509015091150921509315094150951509615097150981509915100151011510215103151041510515106151071510815109151101511115112151131511415115151161511715118151191512015121151221512315124151251512615127151281512915130151311513215133151341513515136151371513815139151401514115142151431514415145151461514715148151491515015151151521515315154151551515615157151581515915160151611516215163151641516515166151671516815169151701517115172151731517415175151761517715178151791518015181151821518315184151851518615187151881518915190151911519215193151941519515196151971519815199152001520115202152031520415205152061520715208152091521015211152121521315214152151521615217152181521915220152211522215223152241522515226152271522815229152301523115232152331523415235152361523715238152391524015241152421524315244152451524615247152481524915250152511525215253152541525515256152571525815259152601526115262152631526415265152661526715268152691527015271152721527315274152751527615277152781527915280152811528215283152841528515286152871528815289152901529115292152931529415295152961529715298152991530015301153021530315304153051530615307153081530915310153111531215313153141531515316153171531815319153201532115322153231532415325153261532715328153291533015331153321533315334153351533615337153381533915340153411534215343153441534515346153471534815349153501535115352153531535415355153561535715358153591536015361153621536315364153651536615367153681536915370153711537215373153741537515376153771537815379153801538115382153831538415385153861538715388153891539015391153921539315394153951539615397153981539915400154011540215403154041540515406154071540815409154101541115412154131541415415154161541715418154191542015421154221542315424154251542615427154281542915430154311543215433154341543515436154371543815439154401544115442154431544415445154461544715448154491545015451154521545315454154551545615457154581545915460154611546215463154641546515466154671546815469154701547115472154731547415475154761547715478154791548015481154821548315484154851548615487154881548915490154911549215493154941549515496154971549815499155001550115502155031550415505155061550715508155091551015511155121551315514155151551615517155181551915520155211552215523155241552515526155271552815529155301553115532155331553415535155361553715538155391554015541155421554315544155451554615547155481554915550155511555215553155541555515556155571555815559155601556115562155631556415565155661556715568155691557015571155721557315574155751557615577155781557915580155811558215583155841558515586155871558815589155901559115592155931559415595155961559715598155991560015601156021560315604156051560615607156081560915610156111561215613156141561515616156171561815619156201562115622156231562415625156261562715628156291563015631156321563315634156351563615637156381563915640156411564215643156441564515646156471564815649156501565115652156531565415655156561565715658156591566015661156621566315664156651566615667156681566915670156711567215673156741567515676156771567815679156801568115682156831568415685156861568715688156891569015691156921569315694156951569615697156981569915700157011570215703157041570515706157071570815709157101571115712157131571415715157161571715718157191572015721157221572315724157251572615727157281572915730157311573215733157341573515736157371573815739157401574115742157431574415745157461574715748157491575015751157521575315754157551575615757157581575915760157611576215763157641576515766157671576815769157701577115772157731577415775157761577715778157791578015781157821578315784157851578615787157881578915790157911579215793157941579515796157971579815799158001580115802158031580415805158061580715808158091581015811158121581315814158151581615817158181581915820158211582215823158241582515826158271582815829158301583115832158331583415835158361583715838158391584015841158421584315844158451584615847158481584915850158511585215853158541585515856158571585815859158601586115862158631586415865158661586715868158691587015871158721587315874158751587615877158781587915880158811588215883158841588515886158871588815889158901589115892158931589415895158961589715898158991590015901159021590315904159051590615907159081590915910159111591215913159141591515916159171591815919159201592115922159231592415925159261592715928159291593015931159321593315934159351593615937159381593915940159411594215943159441594515946159471594815949159501595115952159531595415955159561595715958159591596015961159621596315964159651596615967159681596915970159711597215973159741597515976159771597815979159801598115982159831598415985159861598715988159891599015991159921599315994159951599615997159981599916000160011600216003160041600516006160071600816009160101601116012160131601416015160161601716018160191602016021160221602316024160251602616027160281602916030160311603216033160341603516036160371603816039160401604116042160431604416045160461604716048160491605016051160521605316054160551605616057160581605916060160611606216063160641606516066160671606816069160701607116072160731607416075160761607716078160791608016081160821608316084160851608616087160881608916090160911609216093160941609516096160971609816099161001610116102161031610416105161061610716108161091611016111161121611316114161151611616117161181611916120161211612216123161241612516126161271612816129161301613116132161331613416135161361613716138161391614016141161421614316144161451614616147161481614916150161511615216153161541615516156161571615816159161601616116162161631616416165161661616716168161691617016171161721617316174161751617616177161781617916180161811618216183161841618516186161871618816189161901619116192161931619416195161961619716198161991620016201162021620316204162051620616207162081620916210162111621216213162141621516216162171621816219162201622116222162231622416225162261622716228162291623016231162321623316234162351623616237162381623916240162411624216243162441624516246162471624816249162501625116252162531625416255162561625716258162591626016261162621626316264162651626616267162681626916270162711627216273162741627516276162771627816279162801628116282162831628416285162861628716288162891629016291162921629316294162951629616297162981629916300163011630216303163041630516306163071630816309163101631116312163131631416315163161631716318163191632016321163221632316324163251632616327163281632916330163311633216333163341633516336163371633816339163401634116342163431634416345163461634716348163491635016351163521635316354163551635616357163581635916360163611636216363163641636516366163671636816369163701637116372163731637416375163761637716378163791638016381163821638316384163851638616387163881638916390163911639216393163941639516396163971639816399164001640116402164031640416405164061640716408164091641016411164121641316414164151641616417164181641916420164211642216423164241642516426164271642816429164301643116432164331643416435164361643716438164391644016441164421644316444164451644616447164481644916450164511645216453164541645516456164571645816459164601646116462164631646416465164661646716468164691647016471164721647316474164751647616477164781647916480164811648216483164841648516486164871648816489164901649116492164931649416495164961649716498164991650016501165021650316504165051650616507165081650916510165111651216513165141651516516165171651816519165201652116522165231652416525165261652716528165291653016531165321653316534165351653616537165381653916540165411654216543165441654516546165471654816549165501655116552165531655416555165561655716558165591656016561165621656316564165651656616567165681656916570165711657216573165741657516576165771657816579165801658116582165831658416585165861658716588165891659016591165921659316594165951659616597165981659916600166011660216603166041660516606166071660816609166101661116612166131661416615166161661716618166191662016621166221662316624166251662616627166281662916630166311663216633166341663516636166371663816639166401664116642166431664416645166461664716648166491665016651166521665316654166551665616657166581665916660166611666216663166641666516666166671666816669166701667116672166731667416675166761667716678166791668016681166821668316684166851668616687166881668916690166911669216693166941669516696166971669816699167001670116702167031670416705167061670716708167091671016711167121671316714167151671616717167181671916720167211672216723167241672516726167271672816729167301673116732167331673416735167361673716738167391674016741167421674316744167451674616747167481674916750167511675216753167541675516756167571675816759167601676116762167631676416765167661676716768167691677016771167721677316774167751677616777167781677916780167811678216783167841678516786167871678816789167901679116792167931679416795167961679716798167991680016801168021680316804168051680616807168081680916810168111681216813168141681516816168171681816819168201682116822168231682416825168261682716828168291683016831168321683316834168351683616837168381683916840168411684216843168441684516846168471684816849168501685116852168531685416855168561685716858168591686016861168621686316864168651686616867168681686916870168711687216873168741687516876168771687816879168801688116882168831688416885168861688716888168891689016891168921689316894168951689616897168981689916900169011690216903169041690516906169071690816909169101691116912169131691416915169161691716918169191692016921169221692316924169251692616927169281692916930169311693216933169341693516936169371693816939169401694116942169431694416945169461694716948169491695016951169521695316954169551695616957169581695916960169611696216963169641696516966169671696816969169701697116972169731697416975169761697716978169791698016981169821698316984169851698616987169881698916990169911699216993169941699516996169971699816999170001700117002170031700417005170061700717008170091701017011170121701317014170151701617017170181701917020170211702217023170241702517026170271702817029170301703117032170331703417035170361703717038170391704017041170421704317044170451704617047170481704917050170511705217053170541705517056170571705817059170601706117062170631706417065170661706717068170691707017071170721707317074170751707617077170781707917080170811708217083170841708517086170871708817089170901709117092170931709417095170961709717098170991710017101171021710317104171051710617107171081710917110171111711217113171141711517116171171711817119171201712117122171231712417125171261712717128171291713017131171321713317134171351713617137171381713917140171411714217143171441714517146171471714817149171501715117152171531715417155171561715717158171591716017161171621716317164171651716617167171681716917170171711717217173171741717517176171771717817179171801718117182171831718417185171861718717188171891719017191171921719317194171951719617197171981719917200172011720217203172041720517206172071720817209172101721117212172131721417215172161721717218172191722017221172221722317224172251722617227172281722917230172311723217233172341723517236172371723817239172401724117242172431724417245172461724717248172491725017251172521725317254172551725617257172581725917260172611726217263172641726517266172671726817269172701727117272172731727417275172761727717278172791728017281172821728317284172851728617287172881728917290172911729217293172941729517296172971729817299173001730117302173031730417305173061730717308173091731017311173121731317314173151731617317173181731917320173211732217323173241732517326173271732817329173301733117332173331733417335173361733717338173391734017341173421734317344173451734617347173481734917350173511735217353173541735517356173571735817359173601736117362173631736417365173661736717368173691737017371173721737317374173751737617377173781737917380173811738217383173841738517386173871738817389173901739117392173931739417395173961739717398173991740017401174021740317404174051740617407174081740917410174111741217413174141741517416174171741817419174201742117422174231742417425174261742717428174291743017431174321743317434174351743617437174381743917440174411744217443174441744517446174471744817449174501745117452174531745417455174561745717458174591746017461174621746317464174651746617467174681746917470174711747217473174741747517476174771747817479174801748117482174831748417485174861748717488174891749017491174921749317494174951749617497174981749917500175011750217503175041750517506175071750817509175101751117512175131751417515175161751717518175191752017521175221752317524175251752617527175281752917530175311753217533175341753517536175371753817539175401754117542175431754417545175461754717548175491755017551175521755317554175551755617557175581755917560175611756217563175641756517566175671756817569175701757117572175731757417575175761757717578175791758017581175821758317584175851758617587175881758917590175911759217593175941759517596175971759817599176001760117602176031760417605176061760717608176091761017611176121761317614176151761617617176181761917620176211762217623176241762517626176271762817629176301763117632176331763417635176361763717638176391764017641176421764317644176451764617647176481764917650176511765217653176541765517656176571765817659176601766117662176631766417665176661766717668176691767017671176721767317674176751767617677176781767917680176811768217683176841768517686176871768817689176901769117692176931769417695176961769717698176991770017701177021770317704177051770617707177081770917710177111771217713177141771517716177171771817719177201772117722177231772417725177261772717728177291773017731177321773317734177351773617737177381773917740177411774217743177441774517746177471774817749177501775117752177531775417755177561775717758177591776017761177621776317764177651776617767177681776917770177711777217773177741777517776177771777817779177801778117782177831778417785177861778717788177891779017791177921779317794177951779617797177981779917800178011780217803178041780517806178071780817809178101781117812178131781417815178161781717818178191782017821178221782317824178251782617827178281782917830178311783217833178341783517836178371783817839178401784117842178431784417845178461784717848178491785017851178521785317854178551785617857178581785917860178611786217863178641786517866178671786817869178701787117872178731787417875178761787717878178791788017881178821788317884178851788617887178881788917890178911789217893178941789517896178971789817899179001790117902179031790417905179061790717908179091791017911179121791317914179151791617917179181791917920179211792217923179241792517926179271792817929179301793117932179331793417935179361793717938179391794017941179421794317944179451794617947179481794917950179511795217953179541795517956179571795817959179601796117962179631796417965179661796717968179691797017971179721797317974179751797617977179781797917980179811798217983179841798517986179871798817989179901799117992179931799417995179961799717998179991800018001180021800318004180051800618007180081800918010180111801218013180141801518016180171801818019180201802118022180231802418025180261802718028180291803018031180321803318034180351803618037180381803918040180411804218043180441804518046180471804818049180501805118052180531805418055180561805718058180591806018061180621806318064180651806618067180681806918070180711807218073180741807518076180771807818079180801808118082180831808418085180861808718088180891809018091180921809318094180951809618097180981809918100181011810218103181041810518106181071810818109181101811118112181131811418115181161811718118181191812018121181221812318124181251812618127181281812918130181311813218133181341813518136181371813818139181401814118142181431814418145181461814718148181491815018151181521815318154181551815618157181581815918160181611816218163181641816518166181671816818169181701817118172181731817418175181761817718178181791818018181181821818318184181851818618187181881818918190181911819218193181941819518196181971819818199182001820118202182031820418205182061820718208182091821018211182121821318214182151821618217182181821918220182211822218223182241822518226182271822818229182301823118232182331823418235182361823718238182391824018241182421824318244182451824618247182481824918250182511825218253182541825518256182571825818259182601826118262182631826418265182661826718268182691827018271182721827318274182751827618277182781827918280182811828218283182841828518286182871828818289182901829118292182931829418295182961829718298182991830018301183021830318304183051830618307183081830918310183111831218313183141831518316183171831818319183201832118322183231832418325183261832718328183291833018331183321833318334183351833618337183381833918340183411834218343183441834518346183471834818349183501835118352183531835418355183561835718358183591836018361183621836318364183651836618367183681836918370183711837218373183741837518376183771837818379183801838118382183831838418385183861838718388183891839018391183921839318394183951839618397183981839918400184011840218403184041840518406184071840818409184101841118412184131841418415184161841718418184191842018421184221842318424184251842618427184281842918430184311843218433184341843518436184371843818439184401844118442184431844418445184461844718448184491845018451184521845318454184551845618457184581845918460184611846218463184641846518466184671846818469184701847118472184731847418475184761847718478184791848018481184821848318484184851848618487184881848918490184911849218493184941849518496184971849818499185001850118502185031850418505185061850718508185091851018511185121851318514185151851618517185181851918520185211852218523185241852518526185271852818529185301853118532185331853418535185361853718538185391854018541185421854318544185451854618547185481854918550185511855218553185541855518556185571855818559185601856118562185631856418565185661856718568185691857018571185721857318574185751857618577185781857918580185811858218583185841858518586185871858818589185901859118592185931859418595185961859718598185991860018601186021860318604186051860618607186081860918610186111861218613186141861518616186171861818619186201862118622186231862418625186261862718628186291863018631186321863318634186351863618637186381863918640186411864218643186441864518646186471864818649186501865118652186531865418655186561865718658186591866018661186621866318664186651866618667186681866918670186711867218673186741867518676186771867818679186801868118682186831868418685186861868718688186891869018691186921869318694186951869618697186981869918700187011870218703187041870518706187071870818709187101871118712187131871418715187161871718718187191872018721187221872318724187251872618727187281872918730187311873218733187341873518736187371873818739187401874118742187431874418745187461874718748187491875018751187521875318754187551875618757187581875918760187611876218763187641876518766187671876818769187701877118772187731877418775187761877718778187791878018781187821878318784187851878618787187881878918790187911879218793187941879518796187971879818799188001880118802188031880418805188061880718808188091881018811188121881318814188151881618817188181881918820188211882218823188241882518826188271882818829188301883118832188331883418835188361883718838188391884018841188421884318844188451884618847188481884918850188511885218853188541885518856188571885818859188601886118862188631886418865188661886718868188691887018871188721887318874188751887618877188781887918880188811888218883188841888518886188871888818889188901889118892188931889418895188961889718898188991890018901189021890318904189051890618907189081890918910189111891218913189141891518916189171891818919189201892118922189231892418925189261892718928189291893018931189321893318934189351893618937189381893918940189411894218943189441894518946189471894818949189501895118952189531895418955189561895718958189591896018961189621896318964189651896618967189681896918970189711897218973189741897518976189771897818979189801898118982189831898418985189861898718988189891899018991189921899318994189951899618997189981899919000190011900219003190041900519006190071900819009190101901119012190131901419015190161901719018190191902019021190221902319024190251902619027190281902919030190311903219033190341903519036190371903819039190401904119042190431904419045190461904719048190491905019051190521905319054190551905619057190581905919060190611906219063190641906519066190671906819069190701907119072190731907419075190761907719078190791908019081190821908319084190851908619087190881908919090190911909219093190941909519096190971909819099191001910119102191031910419105191061910719108191091911019111191121911319114191151911619117191181911919120191211912219123191241912519126191271912819129191301913119132191331913419135191361913719138191391914019141191421914319144191451914619147191481914919150191511915219153191541915519156191571915819159191601916119162191631916419165191661916719168191691917019171191721917319174191751917619177191781917919180191811918219183191841918519186191871918819189191901919119192191931919419195191961919719198191991920019201192021920319204192051920619207192081920919210192111921219213192141921519216192171921819219192201922119222192231922419225192261922719228192291923019231192321923319234192351923619237192381923919240192411924219243192441924519246192471924819249192501925119252192531925419255192561925719258192591926019261192621926319264192651926619267192681926919270192711927219273192741927519276192771927819279192801928119282192831928419285192861928719288192891929019291192921929319294192951929619297192981929919300193011930219303193041930519306193071930819309193101931119312193131931419315193161931719318193191932019321193221932319324193251932619327193281932919330193311933219333193341933519336193371933819339193401934119342193431934419345193461934719348193491935019351193521935319354193551935619357193581935919360193611936219363193641936519366193671936819369193701937119372193731937419375193761937719378193791938019381193821938319384193851938619387193881938919390193911939219393193941939519396193971939819399194001940119402194031940419405194061940719408194091941019411194121941319414194151941619417194181941919420194211942219423194241942519426194271942819429194301943119432194331943419435194361943719438194391944019441194421944319444194451944619447194481944919450194511945219453194541945519456194571945819459194601946119462194631946419465194661946719468194691947019471194721947319474194751947619477194781947919480194811948219483194841948519486194871948819489194901949119492194931949419495194961949719498194991950019501195021950319504195051950619507195081950919510195111951219513195141951519516195171951819519195201952119522195231952419525195261952719528195291953019531195321953319534195351953619537195381953919540195411954219543195441954519546195471954819549195501955119552195531955419555195561955719558195591956019561195621956319564195651956619567195681956919570195711957219573195741957519576195771957819579195801958119582195831958419585195861958719588195891959019591195921959319594195951959619597195981959919600196011960219603196041960519606196071960819609196101961119612196131961419615196161961719618196191962019621196221962319624196251962619627196281962919630196311963219633196341963519636196371963819639196401964119642196431964419645196461964719648196491965019651196521965319654196551965619657196581965919660196611966219663196641966519666196671966819669196701967119672196731967419675196761967719678196791968019681196821968319684196851968619687196881968919690196911969219693196941969519696196971969819699197001970119702197031970419705197061970719708197091971019711197121971319714197151971619717197181971919720197211972219723197241972519726197271972819729197301973119732197331973419735197361973719738197391974019741197421974319744197451974619747197481974919750197511975219753197541975519756197571975819759197601976119762197631976419765197661976719768197691977019771197721977319774197751977619777197781977919780197811978219783197841978519786197871978819789197901979119792197931979419795197961979719798197991980019801198021980319804198051980619807198081980919810198111981219813198141981519816198171981819819198201982119822198231982419825198261982719828198291983019831198321983319834198351983619837198381983919840198411984219843198441984519846198471984819849198501985119852198531985419855198561985719858198591986019861198621986319864198651986619867198681986919870198711987219873198741987519876198771987819879198801988119882198831988419885198861988719888198891989019891198921989319894198951989619897198981989919900199011990219903199041990519906199071990819909199101991119912199131991419915199161991719918199191992019921199221992319924199251992619927199281992919930199311993219933199341993519936199371993819939199401994119942199431994419945199461994719948199491995019951199521995319954199551995619957199581995919960199611996219963199641996519966199671996819969199701997119972199731997419975199761997719978199791998019981199821998319984199851998619987199881998919990199911999219993199941999519996199971999819999200002000120002200032000420005200062000720008200092001020011200122001320014200152001620017200182001920020200212002220023200242002520026200272002820029200302003120032200332003420035200362003720038200392004020041200422004320044200452004620047200482004920050200512005220053200542005520056200572005820059200602006120062200632006420065200662006720068200692007020071200722007320074200752007620077200782007920080200812008220083200842008520086200872008820089200902009120092200932009420095200962009720098200992010020101201022010320104201052010620107201082010920110201112011220113201142011520116201172011820119201202012120122201232012420125201262012720128201292013020131201322013320134201352013620137201382013920140201412014220143201442014520146201472014820149201502015120152201532015420155201562015720158201592016020161201622016320164201652016620167201682016920170201712017220173201742017520176201772017820179201802018120182201832018420185201862018720188201892019020191201922019320194201952019620197201982019920200202012020220203202042020520206202072020820209202102021120212202132021420215202162021720218202192022020221202222022320224202252022620227202282022920230202312023220233202342023520236202372023820239202402024120242202432024420245202462024720248202492025020251202522025320254202552025620257202582025920260202612026220263202642026520266202672026820269202702027120272202732027420275202762027720278202792028020281202822028320284202852028620287202882028920290202912029220293202942029520296202972029820299203002030120302203032030420305203062030720308203092031020311203122031320314203152031620317203182031920320203212032220323203242032520326203272032820329203302033120332203332033420335203362033720338203392034020341203422034320344203452034620347203482034920350203512035220353203542035520356203572035820359203602036120362203632036420365203662036720368203692037020371203722037320374203752037620377203782037920380203812038220383203842038520386203872038820389203902039120392203932039420395203962039720398203992040020401204022040320404204052040620407204082040920410204112041220413204142041520416204172041820419204202042120422204232042420425204262042720428204292043020431204322043320434204352043620437204382043920440204412044220443204442044520446204472044820449204502045120452204532045420455204562045720458204592046020461204622046320464204652046620467204682046920470204712047220473204742047520476204772047820479204802048120482204832048420485204862048720488204892049020491204922049320494204952049620497204982049920500205012050220503205042050520506205072050820509205102051120512205132051420515205162051720518205192052020521205222052320524205252052620527205282052920530205312053220533205342053520536205372053820539205402054120542205432054420545205462054720548205492055020551205522055320554205552055620557205582055920560205612056220563205642056520566205672056820569205702057120572205732057420575205762057720578205792058020581205822058320584205852058620587205882058920590205912059220593205942059520596205972059820599206002060120602206032060420605206062060720608206092061020611206122061320614206152061620617206182061920620206212062220623206242062520626206272062820629206302063120632206332063420635206362063720638206392064020641206422064320644206452064620647206482064920650206512065220653206542065520656206572065820659206602066120662206632066420665206662066720668206692067020671206722067320674206752067620677206782067920680206812068220683206842068520686206872068820689206902069120692206932069420695206962069720698206992070020701207022070320704207052070620707207082070920710207112071220713207142071520716207172071820719207202072120722207232072420725207262072720728207292073020731207322073320734207352073620737207382073920740207412074220743207442074520746207472074820749207502075120752207532075420755207562075720758207592076020761207622076320764207652076620767207682076920770207712077220773207742077520776207772077820779207802078120782207832078420785207862078720788207892079020791207922079320794207952079620797207982079920800208012080220803208042080520806208072080820809208102081120812208132081420815208162081720818208192082020821208222082320824208252082620827208282082920830208312083220833208342083520836208372083820839208402084120842208432084420845208462084720848208492085020851208522085320854208552085620857208582085920860208612086220863208642086520866208672086820869208702087120872208732087420875208762087720878208792088020881208822088320884208852088620887208882088920890208912089220893208942089520896208972089820899209002090120902209032090420905209062090720908209092091020911209122091320914209152091620917209182091920920209212092220923209242092520926209272092820929209302093120932209332093420935209362093720938209392094020941209422094320944209452094620947209482094920950209512095220953209542095520956209572095820959209602096120962209632096420965209662096720968209692097020971209722097320974209752097620977209782097920980209812098220983209842098520986209872098820989209902099120992209932099420995209962099720998209992100021001210022100321004210052100621007210082100921010210112101221013210142101521016210172101821019210202102121022210232102421025210262102721028210292103021031210322103321034210352103621037210382103921040210412104221043210442104521046210472104821049210502105121052210532105421055210562105721058210592106021061210622106321064210652106621067210682106921070210712107221073210742107521076210772107821079210802108121082210832108421085210862108721088210892109021091210922109321094210952109621097210982109921100211012110221103211042110521106211072110821109211102111121112211132111421115211162111721118211192112021121211222112321124211252112621127211282112921130211312113221133211342113521136211372113821139211402114121142211432114421145211462114721148211492115021151211522115321154211552115621157211582115921160211612116221163211642116521166211672116821169211702117121172211732117421175211762117721178211792118021181211822118321184211852118621187211882118921190211912119221193211942119521196211972119821199212002120121202212032120421205212062120721208212092121021211212122121321214212152121621217212182121921220212212122221223212242122521226212272122821229212302123121232212332123421235212362123721238212392124021241212422124321244212452124621247212482124921250212512125221253212542125521256212572125821259212602126121262212632126421265212662126721268212692127021271212722127321274212752127621277212782127921280212812128221283212842128521286212872128821289212902129121292212932129421295212962129721298212992130021301213022130321304213052130621307213082130921310213112131221313213142131521316213172131821319213202132121322213232132421325213262132721328213292133021331213322133321334213352133621337213382133921340213412134221343213442134521346213472134821349213502135121352213532135421355213562135721358213592136021361213622136321364213652136621367213682136921370213712137221373213742137521376213772137821379213802138121382213832138421385213862138721388213892139021391213922139321394213952139621397213982139921400214012140221403214042140521406214072140821409214102141121412214132141421415214162141721418214192142021421214222142321424214252142621427214282142921430214312143221433214342143521436214372143821439214402144121442214432144421445214462144721448214492145021451214522145321454214552145621457214582145921460214612146221463214642146521466214672146821469214702147121472214732147421475214762147721478214792148021481214822148321484214852148621487214882148921490214912149221493214942149521496214972149821499215002150121502215032150421505215062150721508215092151021511215122151321514215152151621517215182151921520215212152221523215242152521526215272152821529215302153121532215332153421535215362153721538215392154021541215422154321544215452154621547215482154921550215512155221553215542155521556215572155821559215602156121562215632156421565215662156721568215692157021571215722157321574215752157621577215782157921580215812158221583215842158521586215872158821589215902159121592215932159421595215962159721598215992160021601216022160321604216052160621607216082160921610216112161221613216142161521616216172161821619216202162121622216232162421625216262162721628216292163021631216322163321634216352163621637216382163921640216412164221643216442164521646216472164821649216502165121652216532165421655216562165721658216592166021661216622166321664216652166621667216682166921670216712167221673216742167521676216772167821679216802168121682216832168421685216862168721688216892169021691216922169321694216952169621697216982169921700217012170221703217042170521706217072170821709217102171121712217132171421715217162171721718217192172021721217222172321724217252172621727217282172921730217312173221733217342173521736217372173821739217402174121742217432174421745217462174721748217492175021751217522175321754217552175621757217582175921760217612176221763217642176521766217672176821769217702177121772217732177421775217762177721778217792178021781217822178321784217852178621787217882178921790217912179221793217942179521796217972179821799218002180121802218032180421805218062180721808218092181021811218122181321814218152181621817218182181921820218212182221823218242182521826218272182821829218302183121832218332183421835218362183721838218392184021841218422184321844218452184621847218482184921850218512185221853218542185521856218572185821859218602186121862218632186421865218662186721868218692187021871218722187321874218752187621877218782187921880218812188221883218842188521886218872188821889218902189121892218932189421895218962189721898218992190021901219022190321904219052190621907219082190921910219112191221913219142191521916219172191821919219202192121922219232192421925219262192721928219292193021931219322193321934219352193621937219382193921940219412194221943219442194521946219472194821949219502195121952219532195421955219562195721958219592196021961219622196321964219652196621967219682196921970219712197221973219742197521976219772197821979219802198121982219832198421985219862198721988219892199021991219922199321994219952199621997219982199922000220012200222003220042200522006220072200822009220102201122012220132201422015220162201722018220192202022021220222202322024220252202622027220282202922030220312203222033220342203522036220372203822039220402204122042220432204422045220462204722048220492205022051220522205322054220552205622057220582205922060220612206222063220642206522066220672206822069220702207122072220732207422075220762207722078220792208022081220822208322084220852208622087220882208922090220912209222093220942209522096220972209822099221002210122102221032210422105221062210722108221092211022111221122211322114221152211622117221182211922120221212212222123221242212522126221272212822129221302213122132221332213422135221362213722138221392214022141221422214322144221452214622147221482214922150221512215222153221542215522156221572215822159221602216122162221632216422165221662216722168221692217022171221722217322174221752217622177221782217922180221812218222183221842218522186221872218822189221902219122192221932219422195221962219722198221992220022201222022220322204222052220622207222082220922210222112221222213222142221522216222172221822219222202222122222222232222422225222262222722228222292223022231222322223322234222352223622237222382223922240222412224222243222442224522246222472224822249222502225122252222532225422255222562225722258222592226022261222622226322264222652226622267222682226922270222712227222273222742227522276222772227822279222802228122282222832228422285222862228722288222892229022291222922229322294222952229622297222982229922300223012230222303223042230522306223072230822309223102231122312223132231422315223162231722318223192232022321223222232322324223252232622327223282232922330223312233222333223342233522336223372233822339223402234122342223432234422345223462234722348223492235022351223522235322354223552235622357223582235922360223612236222363223642236522366223672236822369223702237122372223732237422375223762237722378223792238022381223822238322384223852238622387223882238922390223912239222393223942239522396223972239822399224002240122402224032240422405224062240722408224092241022411224122241322414224152241622417224182241922420224212242222423224242242522426224272242822429224302243122432224332243422435224362243722438224392244022441224422244322444224452244622447224482244922450224512245222453224542245522456224572245822459224602246122462224632246422465224662246722468224692247022471224722247322474224752247622477224782247922480224812248222483224842248522486224872248822489224902249122492224932249422495224962249722498224992250022501225022250322504225052250622507225082250922510225112251222513225142251522516225172251822519225202252122522225232252422525225262252722528225292253022531225322253322534225352253622537225382253922540225412254222543225442254522546225472254822549225502255122552225532255422555225562255722558225592256022561225622256322564225652256622567225682256922570225712257222573225742257522576225772257822579225802258122582225832258422585225862258722588225892259022591225922259322594225952259622597225982259922600226012260222603226042260522606226072260822609226102261122612226132261422615226162261722618226192262022621226222262322624226252262622627226282262922630226312263222633226342263522636226372263822639226402264122642226432264422645226462264722648226492265022651226522265322654226552265622657226582265922660226612266222663226642266522666226672266822669226702267122672226732267422675226762267722678226792268022681226822268322684226852268622687226882268922690226912269222693226942269522696226972269822699227002270122702227032270422705227062270722708227092271022711227122271322714227152271622717227182271922720227212272222723227242272522726227272272822729227302273122732227332273422735227362273722738227392274022741227422274322744227452274622747227482274922750227512275222753227542275522756227572275822759227602276122762227632276422765227662276722768227692277022771227722277322774227752277622777227782277922780227812278222783227842278522786227872278822789227902279122792227932279422795227962279722798227992280022801228022280322804228052280622807228082280922810228112281222813228142281522816228172281822819228202282122822228232282422825228262282722828228292283022831228322283322834228352283622837228382283922840228412284222843228442284522846228472284822849228502285122852228532285422855228562285722858228592286022861228622286322864228652286622867228682286922870228712287222873228742287522876228772287822879228802288122882228832288422885228862288722888228892289022891228922289322894228952289622897228982289922900229012290222903229042290522906229072290822909229102291122912229132291422915229162291722918229192292022921229222292322924229252292622927229282292922930229312293222933229342293522936229372293822939229402294122942229432294422945229462294722948229492295022951229522295322954229552295622957229582295922960229612296222963229642296522966229672296822969229702297122972229732297422975229762297722978229792298022981229822298322984229852298622987229882298922990229912299222993229942299522996229972299822999230002300123002230032300423005230062300723008230092301023011230122301323014230152301623017230182301923020230212302223023230242302523026230272302823029230302303123032230332303423035230362303723038230392304023041230422304323044230452304623047230482304923050230512305223053230542305523056230572305823059230602306123062230632306423065230662306723068230692307023071230722307323074230752307623077230782307923080230812308223083230842308523086230872308823089230902309123092230932309423095230962309723098230992310023101231022310323104231052310623107231082310923110231112311223113231142311523116231172311823119231202312123122231232312423125231262312723128231292313023131231322313323134231352313623137231382313923140231412314223143231442314523146231472314823149231502315123152231532315423155231562315723158231592316023161231622316323164231652316623167231682316923170231712317223173231742317523176231772317823179231802318123182231832318423185231862318723188231892319023191231922319323194231952319623197231982319923200232012320223203232042320523206232072320823209232102321123212232132321423215232162321723218232192322023221232222322323224232252322623227232282322923230232312323223233232342323523236232372323823239232402324123242232432324423245232462324723248232492325023251232522325323254232552325623257232582325923260232612326223263232642326523266232672326823269232702327123272232732327423275232762327723278232792328023281232822328323284232852328623287232882328923290232912329223293232942329523296232972329823299233002330123302233032330423305233062330723308233092331023311233122331323314233152331623317233182331923320233212332223323233242332523326233272332823329233302333123332233332333423335233362333723338233392334023341233422334323344233452334623347233482334923350233512335223353233542335523356233572335823359233602336123362233632336423365233662336723368233692337023371233722337323374233752337623377233782337923380233812338223383233842338523386233872338823389233902339123392233932339423395233962339723398233992340023401234022340323404234052340623407234082340923410234112341223413234142341523416234172341823419234202342123422234232342423425234262342723428234292343023431234322343323434234352343623437234382343923440234412344223443234442344523446234472344823449234502345123452234532345423455234562345723458234592346023461234622346323464234652346623467234682346923470234712347223473234742347523476234772347823479234802348123482234832348423485234862348723488234892349023491234922349323494234952349623497234982349923500235012350223503235042350523506235072350823509235102351123512235132351423515235162351723518235192352023521235222352323524235252352623527235282352923530235312353223533235342353523536235372353823539235402354123542235432354423545235462354723548235492355023551235522355323554235552355623557235582355923560235612356223563235642356523566235672356823569235702357123572235732357423575235762357723578235792358023581235822358323584235852358623587235882358923590235912359223593235942359523596235972359823599236002360123602236032360423605236062360723608236092361023611236122361323614236152361623617236182361923620236212362223623236242362523626236272362823629236302363123632236332363423635236362363723638236392364023641236422364323644236452364623647236482364923650236512365223653236542365523656236572365823659236602366123662236632366423665236662366723668236692367023671236722367323674236752367623677236782367923680236812368223683236842368523686236872368823689236902369123692236932369423695236962369723698236992370023701237022370323704237052370623707237082370923710237112371223713237142371523716237172371823719237202372123722237232372423725237262372723728237292373023731237322373323734237352373623737237382373923740237412374223743237442374523746237472374823749237502375123752237532375423755237562375723758237592376023761237622376323764237652376623767237682376923770237712377223773237742377523776237772377823779237802378123782237832378423785237862378723788237892379023791237922379323794237952379623797237982379923800238012380223803238042380523806238072380823809238102381123812238132381423815238162381723818238192382023821238222382323824238252382623827238282382923830238312383223833238342383523836238372383823839238402384123842238432384423845238462384723848238492385023851238522385323854238552385623857238582385923860238612386223863238642386523866238672386823869238702387123872238732387423875238762387723878238792388023881238822388323884238852388623887238882388923890238912389223893238942389523896238972389823899239002390123902239032390423905239062390723908239092391023911239122391323914
  1. // Copyright 2013 The Chromium Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style license that can be
  3. // found in the LICENSE file.
  4. #include "net/http/http_network_transaction.h"
  5. #include <math.h> // ceil
  6. #include <stdarg.h>
  7. #include <stdint.h>
  8. #include <limits>
  9. #include <memory>
  10. #include <set>
  11. #include <string>
  12. #include <utility>
  13. #include <vector>
  14. #include "base/bind.h"
  15. #include "base/compiler_specific.h"
  16. #include "base/files/file_path.h"
  17. #include "base/files/file_util.h"
  18. #include "base/json/json_writer.h"
  19. #include "base/logging.h"
  20. #include "base/memory/ptr_util.h"
  21. #include "base/memory/raw_ptr.h"
  22. #include "base/memory/weak_ptr.h"
  23. #include "base/run_loop.h"
  24. #include "base/strings/string_piece.h"
  25. #include "base/strings/string_util.h"
  26. #include "base/strings/stringprintf.h"
  27. #include "base/strings/utf_string_conversions.h"
  28. #include "base/test/metrics/histogram_tester.h"
  29. #include "base/test/scoped_feature_list.h"
  30. #include "base/test/simple_test_clock.h"
  31. #include "base/test/simple_test_tick_clock.h"
  32. #include "base/test/task_environment.h"
  33. #include "base/test/test_file_util.h"
  34. #include "base/threading/thread_task_runner_handle.h"
  35. #include "base/time/time.h"
  36. #include "build/build_config.h"
  37. #include "net/base/auth.h"
  38. #include "net/base/chunked_upload_data_stream.h"
  39. #include "net/base/completion_once_callback.h"
  40. #include "net/base/elements_upload_data_stream.h"
  41. #include "net/base/features.h"
  42. #include "net/base/host_port_pair.h"
  43. #include "net/base/ip_address.h"
  44. #include "net/base/ip_endpoint.h"
  45. #include "net/base/load_timing_info.h"
  46. #include "net/base/load_timing_info_test_util.h"
  47. #include "net/base/net_errors.h"
  48. #include "net/base/privacy_mode.h"
  49. #include "net/base/proxy_delegate.h"
  50. #include "net/base/proxy_server.h"
  51. #include "net/base/proxy_string_util.h"
  52. #include "net/base/request_priority.h"
  53. #include "net/base/schemeful_site.h"
  54. #include "net/base/test_completion_callback.h"
  55. #include "net/base/test_proxy_delegate.h"
  56. #include "net/base/upload_bytes_element_reader.h"
  57. #include "net/base/upload_file_element_reader.h"
  58. #include "net/cert/cert_status_flags.h"
  59. #include "net/cert/mock_cert_verifier.h"
  60. #include "net/dns/mock_host_resolver.h"
  61. #include "net/dns/public/secure_dns_policy.h"
  62. #include "net/http/http_auth_challenge_tokenizer.h"
  63. #include "net/http/http_auth_handler_digest.h"
  64. #include "net/http/http_auth_handler_mock.h"
  65. #include "net/http/http_auth_handler_ntlm.h"
  66. #include "net/http/http_auth_ntlm_mechanism.h"
  67. #include "net/http/http_auth_scheme.h"
  68. #include "net/http/http_basic_stream.h"
  69. #include "net/http/http_network_session.h"
  70. #include "net/http/http_network_session_peer.h"
  71. #include "net/http/http_proxy_connect_job.h"
  72. #include "net/http/http_request_headers.h"
  73. #include "net/http/http_response_info.h"
  74. #include "net/http/http_server_properties.h"
  75. #include "net/http/http_stream.h"
  76. #include "net/http/http_stream_factory.h"
  77. #include "net/http/http_transaction_test_util.h"
  78. #include "net/log/net_log.h"
  79. #include "net/log/net_log_event_type.h"
  80. #include "net/log/net_log_source.h"
  81. #include "net/log/test_net_log.h"
  82. #include "net/log/test_net_log_util.h"
  83. #include "net/proxy_resolution/configured_proxy_resolution_service.h"
  84. #include "net/proxy_resolution/mock_proxy_resolver.h"
  85. #include "net/proxy_resolution/proxy_config_service_fixed.h"
  86. #include "net/proxy_resolution/proxy_info.h"
  87. #include "net/proxy_resolution/proxy_resolver.h"
  88. #include "net/proxy_resolution/proxy_resolver_factory.h"
  89. #include "net/socket/client_socket_factory.h"
  90. #include "net/socket/client_socket_pool.h"
  91. #include "net/socket/client_socket_pool_manager.h"
  92. #include "net/socket/connect_job.h"
  93. #include "net/socket/connection_attempts.h"
  94. #include "net/socket/mock_client_socket_pool_manager.h"
  95. #include "net/socket/next_proto.h"
  96. #include "net/socket/socket_tag.h"
  97. #include "net/socket/socket_test_util.h"
  98. #include "net/socket/socks_connect_job.h"
  99. #include "net/socket/ssl_client_socket.h"
  100. #include "net/spdy/spdy_session.h"
  101. #include "net/spdy/spdy_session_pool.h"
  102. #include "net/spdy/spdy_test_util_common.h"
  103. #include "net/ssl/client_cert_identity_test_util.h"
  104. #include "net/ssl/ssl_cert_request_info.h"
  105. #include "net/ssl/ssl_config.h"
  106. #include "net/ssl/ssl_config_service.h"
  107. #include "net/ssl/ssl_info.h"
  108. #include "net/ssl/ssl_private_key.h"
  109. #include "net/ssl/test_ssl_config_service.h"
  110. #include "net/test/cert_test_util.h"
  111. #include "net/test/gtest_util.h"
  112. #include "net/test/test_data_directory.h"
  113. #include "net/test/test_with_task_environment.h"
  114. #include "net/third_party/quiche/src/quiche/spdy/core/spdy_framer.h"
  115. #include "net/traffic_annotation/network_traffic_annotation_test_helper.h"
  116. #include "net/url_request/static_http_user_agent_settings.h"
  117. #include "net/websockets/websocket_handshake_stream_base.h"
  118. #include "net/websockets/websocket_test_util.h"
  119. #include "testing/gmock/include/gmock/gmock.h"
  120. #include "testing/gtest/include/gtest/gtest.h"
  121. #include "testing/platform_test.h"
  122. #include "third_party/abseil-cpp/absl/types/optional.h"
  123. #include "url/gurl.h"
  124. #include "url/scheme_host_port.h"
  125. #include "url/url_constants.h"
  126. #if defined(NTLM_PORTABLE)
  127. #include "base/base64.h"
  128. #include "net/ntlm/ntlm_test_data.h"
  129. #endif
  130. #if BUILDFLAG(ENABLE_REPORTING)
  131. #include "net/network_error_logging/network_error_logging_service.h"
  132. #include "net/network_error_logging/network_error_logging_test_util.h"
  133. #include "net/reporting/reporting_cache.h"
  134. #include "net/reporting/reporting_endpoint.h"
  135. #include "net/reporting/reporting_header_parser.h"
  136. #include "net/reporting/reporting_service.h"
  137. #include "net/reporting/reporting_test_util.h"
  138. #endif // BUILDFLAG(ENABLE_REPORTING)
  139. using net::test::IsError;
  140. using net::test::IsOk;
  141. using base::ASCIIToUTF16;
  142. using testing::AnyOf;
  143. using testing::ElementsAre;
  144. using testing::IsEmpty;
  145. //-----------------------------------------------------------------------------
  146. namespace net {
  147. namespace {
  148. const std::u16string kBar(u"bar");
  149. const std::u16string kBar2(u"bar2");
  150. const std::u16string kBar3(u"bar3");
  151. const std::u16string kBaz(u"baz");
  152. const std::u16string kFirst(u"first");
  153. const std::u16string kFoo(u"foo");
  154. const std::u16string kFoo2(u"foo2");
  155. const std::u16string kFoo3(u"foo3");
  156. const std::u16string kFou(u"fou");
  157. const std::u16string kSecond(u"second");
  158. const std::u16string kWrongPassword(u"wrongpassword");
  159. const char kAlternativeServiceHttpHeader[] =
  160. "Alt-Svc: h2=\"mail.example.org:443\"\r\n";
  161. int GetIdleSocketCountInTransportSocketPool(HttpNetworkSession* session) {
  162. return session
  163. ->GetSocketPool(HttpNetworkSession::NORMAL_SOCKET_POOL,
  164. ProxyServer::Direct())
  165. ->IdleSocketCount();
  166. }
  167. bool IsTransportSocketPoolStalled(HttpNetworkSession* session) {
  168. return session
  169. ->GetSocketPool(HttpNetworkSession::NORMAL_SOCKET_POOL,
  170. ProxyServer::Direct())
  171. ->IsStalled();
  172. }
  173. // Takes in a Value created from a NetLogHttpResponseParameter, and returns
  174. // a JSONified list of headers as a single string. Uses single quotes instead
  175. // of double quotes for easier comparison.
  176. std::string GetHeaders(const base::Value& params) {
  177. if (!params.is_dict())
  178. return "";
  179. const base::Value::List* header_list = params.GetDict().FindList("headers");
  180. if (!header_list)
  181. return "";
  182. std::string headers;
  183. base::JSONWriter::Write(*header_list, &headers);
  184. base::ReplaceChars(headers, "\"", "'", &headers);
  185. return headers;
  186. }
  187. // Tests LoadTimingInfo in the case a socket is reused and no PAC script is
  188. // used.
  189. void TestLoadTimingReused(const LoadTimingInfo& load_timing_info) {
  190. EXPECT_TRUE(load_timing_info.socket_reused);
  191. EXPECT_NE(NetLogSource::kInvalidId, load_timing_info.socket_log_id);
  192. EXPECT_TRUE(load_timing_info.proxy_resolve_start.is_null());
  193. EXPECT_TRUE(load_timing_info.proxy_resolve_end.is_null());
  194. ExpectConnectTimingHasNoTimes(load_timing_info.connect_timing);
  195. EXPECT_FALSE(load_timing_info.send_start.is_null());
  196. EXPECT_LE(load_timing_info.send_start, load_timing_info.send_end);
  197. // Set at a higher level.
  198. EXPECT_TRUE(load_timing_info.request_start_time.is_null());
  199. EXPECT_TRUE(load_timing_info.request_start.is_null());
  200. EXPECT_TRUE(load_timing_info.receive_headers_end.is_null());
  201. }
  202. // Tests LoadTimingInfo in the case a new socket is used and no PAC script is
  203. // used.
  204. void TestLoadTimingNotReused(const LoadTimingInfo& load_timing_info,
  205. int connect_timing_flags) {
  206. EXPECT_FALSE(load_timing_info.socket_reused);
  207. EXPECT_NE(NetLogSource::kInvalidId, load_timing_info.socket_log_id);
  208. EXPECT_TRUE(load_timing_info.proxy_resolve_start.is_null());
  209. EXPECT_TRUE(load_timing_info.proxy_resolve_end.is_null());
  210. ExpectConnectTimingHasTimes(load_timing_info.connect_timing,
  211. connect_timing_flags);
  212. EXPECT_LE(load_timing_info.connect_timing.connect_end,
  213. load_timing_info.send_start);
  214. EXPECT_LE(load_timing_info.send_start, load_timing_info.send_end);
  215. // Set at a higher level.
  216. EXPECT_TRUE(load_timing_info.request_start_time.is_null());
  217. EXPECT_TRUE(load_timing_info.request_start.is_null());
  218. EXPECT_TRUE(load_timing_info.receive_headers_end.is_null());
  219. }
  220. // Tests LoadTimingInfo in the case a socket is reused and a PAC script is
  221. // used.
  222. void TestLoadTimingReusedWithPac(const LoadTimingInfo& load_timing_info) {
  223. EXPECT_TRUE(load_timing_info.socket_reused);
  224. EXPECT_NE(NetLogSource::kInvalidId, load_timing_info.socket_log_id);
  225. ExpectConnectTimingHasNoTimes(load_timing_info.connect_timing);
  226. EXPECT_FALSE(load_timing_info.proxy_resolve_start.is_null());
  227. EXPECT_LE(load_timing_info.proxy_resolve_start,
  228. load_timing_info.proxy_resolve_end);
  229. EXPECT_LE(load_timing_info.proxy_resolve_end,
  230. load_timing_info.send_start);
  231. EXPECT_LE(load_timing_info.send_start, load_timing_info.send_end);
  232. // Set at a higher level.
  233. EXPECT_TRUE(load_timing_info.request_start_time.is_null());
  234. EXPECT_TRUE(load_timing_info.request_start.is_null());
  235. EXPECT_TRUE(load_timing_info.receive_headers_end.is_null());
  236. }
  237. // Tests LoadTimingInfo in the case a new socket is used and a PAC script is
  238. // used.
  239. void TestLoadTimingNotReusedWithPac(const LoadTimingInfo& load_timing_info,
  240. int connect_timing_flags) {
  241. EXPECT_FALSE(load_timing_info.socket_reused);
  242. EXPECT_NE(NetLogSource::kInvalidId, load_timing_info.socket_log_id);
  243. EXPECT_FALSE(load_timing_info.proxy_resolve_start.is_null());
  244. EXPECT_LE(load_timing_info.proxy_resolve_start,
  245. load_timing_info.proxy_resolve_end);
  246. EXPECT_LE(load_timing_info.proxy_resolve_end,
  247. load_timing_info.connect_timing.connect_start);
  248. ExpectConnectTimingHasTimes(load_timing_info.connect_timing,
  249. connect_timing_flags);
  250. EXPECT_LE(load_timing_info.connect_timing.connect_end,
  251. load_timing_info.send_start);
  252. EXPECT_LE(load_timing_info.send_start, load_timing_info.send_end);
  253. // Set at a higher level.
  254. EXPECT_TRUE(load_timing_info.request_start_time.is_null());
  255. EXPECT_TRUE(load_timing_info.request_start.is_null());
  256. EXPECT_TRUE(load_timing_info.receive_headers_end.is_null());
  257. }
  258. // ProxyResolver that records URLs passed to it, and that can be told what
  259. // result to return.
  260. class CapturingProxyResolver : public ProxyResolver {
  261. public:
  262. struct LookupInfo {
  263. GURL url;
  264. NetworkIsolationKey network_isolation_key;
  265. };
  266. CapturingProxyResolver()
  267. : proxy_server_(ProxyServer::SCHEME_HTTP, HostPortPair("myproxy", 80)) {}
  268. CapturingProxyResolver(const CapturingProxyResolver&) = delete;
  269. CapturingProxyResolver& operator=(const CapturingProxyResolver&) = delete;
  270. ~CapturingProxyResolver() override = default;
  271. int GetProxyForURL(const GURL& url,
  272. const NetworkIsolationKey& network_isolation_key,
  273. ProxyInfo* results,
  274. CompletionOnceCallback callback,
  275. std::unique_ptr<Request>* request,
  276. const NetLogWithSource& net_log) override {
  277. results->UseProxyServer(proxy_server_);
  278. lookup_info_.push_back(LookupInfo{url, network_isolation_key});
  279. return OK;
  280. }
  281. // Sets whether the resolver should use direct connections, instead of a
  282. // proxy.
  283. void set_proxy_server(ProxyServer proxy_server) {
  284. proxy_server_ = proxy_server;
  285. }
  286. const std::vector<LookupInfo>& lookup_info() const { return lookup_info_; }
  287. private:
  288. std::vector<LookupInfo> lookup_info_;
  289. ProxyServer proxy_server_;
  290. };
  291. class CapturingProxyResolverFactory : public ProxyResolverFactory {
  292. public:
  293. explicit CapturingProxyResolverFactory(CapturingProxyResolver* resolver)
  294. : ProxyResolverFactory(false), resolver_(resolver) {}
  295. int CreateProxyResolver(const scoped_refptr<PacFileData>& pac_script,
  296. std::unique_ptr<ProxyResolver>* resolver,
  297. CompletionOnceCallback callback,
  298. std::unique_ptr<Request>* request) override {
  299. *resolver = std::make_unique<ForwardingProxyResolver>(resolver_);
  300. return OK;
  301. }
  302. private:
  303. raw_ptr<ProxyResolver> resolver_;
  304. };
  305. std::unique_ptr<HttpNetworkSession> CreateSession(
  306. SpdySessionDependencies* session_deps) {
  307. return SpdySessionDependencies::SpdyCreateSession(session_deps);
  308. }
  309. class FailingProxyResolverFactory : public ProxyResolverFactory {
  310. public:
  311. FailingProxyResolverFactory() : ProxyResolverFactory(false) {}
  312. // ProxyResolverFactory override.
  313. int CreateProxyResolver(const scoped_refptr<PacFileData>& script_data,
  314. std::unique_ptr<ProxyResolver>* result,
  315. CompletionOnceCallback callback,
  316. std::unique_ptr<Request>* request) override {
  317. return ERR_PAC_SCRIPT_FAILED;
  318. }
  319. };
  320. class SingleProxyDelegate : public ProxyDelegate {
  321. public:
  322. void set_proxy(const ProxyServer& proxy_server) {
  323. proxy_server_ = proxy_server;
  324. }
  325. // ProxyDelegate implementation:
  326. void OnResolveProxy(const GURL& url,
  327. const std::string& method,
  328. const ProxyRetryInfoMap& proxy_retry_info,
  329. ProxyInfo* result) override {
  330. if (proxy_server_.is_valid())
  331. result->UseProxyServer(proxy_server_);
  332. }
  333. void OnFallback(const ProxyServer& bad_proxy, int net_error) override {}
  334. void OnBeforeTunnelRequest(const ProxyServer& proxy_server,
  335. HttpRequestHeaders* extra_headers) override {}
  336. Error OnTunnelHeadersReceived(
  337. const ProxyServer& proxy_server,
  338. const HttpResponseHeaders& response_headers) override {
  339. return OK;
  340. }
  341. private:
  342. ProxyServer proxy_server_;
  343. };
  344. // A default minimal HttpRequestInfo for use in tests, targeting HTTP.
  345. HttpRequestInfo DefaultRequestInfo() {
  346. HttpRequestInfo info;
  347. info.method = "GET";
  348. info.url = GURL("http://foo.test");
  349. info.traffic_annotation =
  350. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  351. return info;
  352. }
  353. // The default info for transports to the embedded HTTP server.
  354. TransportInfo EmbeddedHttpServerTransportInfo() {
  355. TransportInfo info;
  356. info.endpoint = IPEndPoint(IPAddress::IPv4Localhost(), 80);
  357. return info;
  358. }
  359. } // namespace
  360. class HttpNetworkTransactionTest : public PlatformTest,
  361. public WithTaskEnvironment {
  362. public:
  363. ~HttpNetworkTransactionTest() override {
  364. // Important to restore the per-pool limit first, since the pool limit must
  365. // always be greater than group limit, and the tests reduce both limits.
  366. ClientSocketPoolManager::set_max_sockets_per_pool(
  367. HttpNetworkSession::NORMAL_SOCKET_POOL, old_max_pool_sockets_);
  368. ClientSocketPoolManager::set_max_sockets_per_group(
  369. HttpNetworkSession::NORMAL_SOCKET_POOL, old_max_group_sockets_);
  370. }
  371. protected:
  372. HttpNetworkTransactionTest()
  373. : WithTaskEnvironment(base::test::TaskEnvironment::TimeSource::MOCK_TIME),
  374. dummy_connect_job_params_(
  375. nullptr /* client_socket_factory */,
  376. nullptr /* host_resolver */,
  377. nullptr /* http_auth_cache */,
  378. nullptr /* http_auth_handler_factory */,
  379. nullptr /* spdy_session_pool */,
  380. nullptr /* quic_supported_versions */,
  381. nullptr /* quic_stream_factory */,
  382. nullptr /* proxy_delegate */,
  383. nullptr /* http_user_agent_settings */,
  384. nullptr /* ssl_client_context */,
  385. nullptr /* socket_performance_watcher_factory */,
  386. nullptr /* network_quality_estimator */,
  387. nullptr /* net_log */,
  388. nullptr /* websocket_endpoint_lock_manager */),
  389. ssl_(ASYNC, OK),
  390. old_max_group_sockets_(ClientSocketPoolManager::max_sockets_per_group(
  391. HttpNetworkSession::NORMAL_SOCKET_POOL)),
  392. old_max_pool_sockets_(ClientSocketPoolManager::max_sockets_per_pool(
  393. HttpNetworkSession::NORMAL_SOCKET_POOL)) {
  394. session_deps_.enable_http2_alternative_service = true;
  395. }
  396. struct SimpleGetHelperResult {
  397. int rv;
  398. std::string status_line;
  399. std::string response_data;
  400. int64_t total_received_bytes;
  401. int64_t total_sent_bytes;
  402. LoadTimingInfo load_timing_info;
  403. ConnectionAttempts connection_attempts;
  404. IPEndPoint remote_endpoint_after_start;
  405. };
  406. void SetUp() override {
  407. NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
  408. base::RunLoop().RunUntilIdle();
  409. // Set an initial delay to ensure that the first call to TimeTicks::Now()
  410. // before incrementing the counter does not return a null value.
  411. FastForwardBy(base::Seconds(1));
  412. }
  413. void TearDown() override {
  414. NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
  415. base::RunLoop().RunUntilIdle();
  416. // Empty the current queue.
  417. base::RunLoop().RunUntilIdle();
  418. PlatformTest::TearDown();
  419. NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests();
  420. base::RunLoop().RunUntilIdle();
  421. }
  422. void Check100ResponseTiming(bool use_spdy);
  423. // Either |write_failure| specifies a write failure or |read_failure|
  424. // specifies a read failure when using a reused socket. In either case, the
  425. // failure should cause the network transaction to resend the request, and the
  426. // other argument should be NULL.
  427. void KeepAliveConnectionResendRequestTest(const MockWrite* write_failure,
  428. const MockRead* read_failure);
  429. // Either |write_failure| specifies a write failure or |read_failure|
  430. // specifies a read failure when using a reused socket. In either case, the
  431. // failure should cause the network transaction to resend the request, and the
  432. // other argument should be NULL.
  433. void PreconnectErrorResendRequestTest(const MockWrite* write_failure,
  434. const MockRead* read_failure,
  435. bool use_spdy,
  436. bool upload = false);
  437. SimpleGetHelperResult SimpleGetHelperForData(
  438. base::span<StaticSocketDataProvider*> providers) {
  439. SimpleGetHelperResult out;
  440. HttpRequestInfo request;
  441. request.method = "GET";
  442. request.url = GURL("http://www.example.org/");
  443. request.traffic_annotation =
  444. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  445. RecordingNetLogObserver net_log_observer;
  446. NetLogWithSource net_log_with_source =
  447. NetLogWithSource::Make(NetLogSourceType::NONE);
  448. session_deps_.net_log = NetLog::Get();
  449. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  450. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  451. for (auto* provider : providers) {
  452. session_deps_.socket_factory->AddSocketDataProvider(provider);
  453. }
  454. TestCompletionCallback callback;
  455. EXPECT_TRUE(net_log_with_source.IsCapturing());
  456. int rv = trans.Start(&request, callback.callback(), net_log_with_source);
  457. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  458. out.rv = callback.WaitForResult();
  459. out.total_received_bytes = trans.GetTotalReceivedBytes();
  460. out.total_sent_bytes = trans.GetTotalSentBytes();
  461. // Even in the failure cases that use this function, connections are always
  462. // successfully established before the error.
  463. EXPECT_TRUE(trans.GetLoadTimingInfo(&out.load_timing_info));
  464. TestLoadTimingNotReused(out.load_timing_info, CONNECT_TIMING_HAS_DNS_TIMES);
  465. if (out.rv != OK)
  466. return out;
  467. const HttpResponseInfo* response = trans.GetResponseInfo();
  468. // Can't use ASSERT_* inside helper functions like this, so
  469. // return an error.
  470. if (!response || !response->headers) {
  471. out.rv = ERR_UNEXPECTED;
  472. return out;
  473. }
  474. out.status_line = response->headers->GetStatusLine();
  475. EXPECT_EQ("127.0.0.1", response->remote_endpoint.ToStringWithoutPort());
  476. EXPECT_EQ(80, response->remote_endpoint.port());
  477. bool got_endpoint =
  478. trans.GetRemoteEndpoint(&out.remote_endpoint_after_start);
  479. EXPECT_EQ(got_endpoint,
  480. out.remote_endpoint_after_start.address().size() > 0);
  481. rv = ReadTransaction(&trans, &out.response_data);
  482. EXPECT_THAT(rv, IsOk());
  483. auto entries = net_log_observer.GetEntries();
  484. size_t pos = ExpectLogContainsSomewhere(
  485. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST_HEADERS,
  486. NetLogEventPhase::NONE);
  487. ExpectLogContainsSomewhere(
  488. entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_RESPONSE_HEADERS,
  489. NetLogEventPhase::NONE);
  490. EXPECT_EQ("GET / HTTP/1.1\r\n",
  491. GetStringValueFromParams(entries[pos], "line"));
  492. EXPECT_EQ("['Host: www.example.org','Connection: keep-alive']",
  493. GetHeaders(entries[pos].params));
  494. out.total_received_bytes = trans.GetTotalReceivedBytes();
  495. // The total number of sent bytes should not have changed.
  496. EXPECT_EQ(out.total_sent_bytes, trans.GetTotalSentBytes());
  497. out.connection_attempts = trans.GetConnectionAttempts();
  498. return out;
  499. }
  500. SimpleGetHelperResult SimpleGetHelper(base::span<const MockRead> data_reads) {
  501. MockWrite data_writes[] = {
  502. MockWrite("GET / HTTP/1.1\r\n"
  503. "Host: www.example.org\r\n"
  504. "Connection: keep-alive\r\n\r\n"),
  505. };
  506. StaticSocketDataProvider reads(data_reads, data_writes);
  507. StaticSocketDataProvider* data[] = {&reads};
  508. SimpleGetHelperResult out = SimpleGetHelperForData(data);
  509. EXPECT_EQ(CountWriteBytes(data_writes), out.total_sent_bytes);
  510. return out;
  511. }
  512. void AddSSLSocketData() {
  513. ssl_.next_proto = kProtoHTTP2;
  514. ssl_.ssl_info.cert =
  515. ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem");
  516. ASSERT_TRUE(ssl_.ssl_info.cert);
  517. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_);
  518. }
  519. void ConnectStatusHelperWithExpectedStatus(const MockRead& status,
  520. int expected_status);
  521. void ConnectStatusHelper(const MockRead& status);
  522. void CheckErrorIsPassedBack(int error, IoMode mode);
  523. base::RepeatingClosure FastForwardByCallback(base::TimeDelta delta) {
  524. return base::BindRepeating(&HttpNetworkTransactionTest::FastForwardBy,
  525. base::Unretained(this), delta);
  526. }
  527. const CommonConnectJobParams dummy_connect_job_params_;
  528. const net::NetworkIsolationKey kNetworkIsolationKey =
  529. NetworkIsolationKey(SchemefulSite(GURL("https://foo.test/")),
  530. SchemefulSite(GURL("https://bar.test/")));
  531. // These clocks are defined here, even though they're only used in the
  532. // Reporting tests below, since they need to be destroyed after
  533. // |session_deps_|.
  534. base::SimpleTestClock clock_;
  535. base::SimpleTestTickClock tick_clock_;
  536. SpdyTestUtil spdy_util_;
  537. SpdySessionDependencies session_deps_;
  538. SSLSocketDataProvider ssl_;
  539. // Original socket limits. Some tests set these. Safest to always restore
  540. // them once each test has been run.
  541. int old_max_group_sockets_;
  542. int old_max_pool_sockets_;
  543. };
  544. namespace {
  545. // Fill |str| with a long header list that consumes >= |size| bytes.
  546. void FillLargeHeadersString(std::string* str, int size) {
  547. const char row[] =
  548. "SomeHeaderName: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\r\n";
  549. const int sizeof_row = strlen(row);
  550. const int num_rows = static_cast<int>(
  551. ceil(static_cast<float>(size) / sizeof_row));
  552. const int sizeof_data = num_rows * sizeof_row;
  553. DCHECK(sizeof_data >= size);
  554. str->reserve(sizeof_data);
  555. for (int i = 0; i < num_rows; ++i)
  556. str->append(row, sizeof_row);
  557. }
  558. #if defined(NTLM_PORTABLE)
  559. uint64_t MockGetMSTime() {
  560. // Tue, 23 May 2017 20:13:07 +0000
  561. return 131400439870000000;
  562. }
  563. // Alternative functions that eliminate randomness and dependency on the local
  564. // host name so that the generated NTLM messages are reproducible.
  565. void MockGenerateRandom(uint8_t* output, size_t n) {
  566. // This is set to 0xaa because the client challenge for testing in
  567. // [MS-NLMP] Section 4.2.1 is 8 bytes of 0xaa.
  568. memset(output, 0xaa, n);
  569. }
  570. std::string MockGetHostName() {
  571. return ntlm::test::kHostnameAscii;
  572. }
  573. #endif // defined(NTLM_PORTABLE)
  574. class CaptureGroupIdTransportSocketPool : public TransportClientSocketPool {
  575. public:
  576. explicit CaptureGroupIdTransportSocketPool(
  577. const CommonConnectJobParams* common_connect_job_params)
  578. : TransportClientSocketPool(0,
  579. 0,
  580. base::TimeDelta(),
  581. ProxyServer::Direct(),
  582. false /* is_for_websockets */,
  583. common_connect_job_params) {}
  584. const ClientSocketPool::GroupId& last_group_id_received() const {
  585. return last_group_id_;
  586. }
  587. bool socket_requested() const { return socket_requested_; }
  588. int RequestSocket(
  589. const ClientSocketPool::GroupId& group_id,
  590. scoped_refptr<ClientSocketPool::SocketParams> socket_params,
  591. const absl::optional<NetworkTrafficAnnotationTag>& proxy_annotation_tag,
  592. RequestPriority priority,
  593. const SocketTag& socket_tag,
  594. ClientSocketPool::RespectLimits respect_limits,
  595. ClientSocketHandle* handle,
  596. CompletionOnceCallback callback,
  597. const ClientSocketPool::ProxyAuthCallback& proxy_auth_callback,
  598. const NetLogWithSource& net_log) override {
  599. last_group_id_ = group_id;
  600. socket_requested_ = true;
  601. return ERR_IO_PENDING;
  602. }
  603. void CancelRequest(const ClientSocketPool::GroupId& group_id,
  604. ClientSocketHandle* handle,
  605. bool cancel_connect_job) override {}
  606. void ReleaseSocket(const ClientSocketPool::GroupId& group_id,
  607. std::unique_ptr<StreamSocket> socket,
  608. int64_t generation) override {}
  609. void CloseIdleSockets(const char* net_log_reason_utf8) override {}
  610. void CloseIdleSocketsInGroup(const ClientSocketPool::GroupId& group_id,
  611. const char* net_log_reason_utf8) override {}
  612. int IdleSocketCount() const override { return 0; }
  613. size_t IdleSocketCountInGroup(
  614. const ClientSocketPool::GroupId& group_id) const override {
  615. return 0;
  616. }
  617. LoadState GetLoadState(const ClientSocketPool::GroupId& group_id,
  618. const ClientSocketHandle* handle) const override {
  619. return LOAD_STATE_IDLE;
  620. }
  621. private:
  622. ClientSocketPool::GroupId last_group_id_;
  623. bool socket_requested_ = false;
  624. };
  625. //-----------------------------------------------------------------------------
  626. // Helper functions for validating that AuthChallengeInfo's are correctly
  627. // configured for common cases.
  628. bool CheckBasicServerAuth(
  629. const absl::optional<AuthChallengeInfo>& auth_challenge) {
  630. if (!auth_challenge)
  631. return false;
  632. EXPECT_FALSE(auth_challenge->is_proxy);
  633. EXPECT_EQ("http://www.example.org", auth_challenge->challenger.Serialize());
  634. EXPECT_EQ("MyRealm1", auth_challenge->realm);
  635. EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme);
  636. return true;
  637. }
  638. bool CheckBasicSecureServerAuth(
  639. const absl::optional<AuthChallengeInfo>& auth_challenge) {
  640. if (!auth_challenge)
  641. return false;
  642. EXPECT_FALSE(auth_challenge->is_proxy);
  643. EXPECT_EQ("https://www.example.org", auth_challenge->challenger.Serialize());
  644. EXPECT_EQ("MyRealm1", auth_challenge->realm);
  645. EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme);
  646. return true;
  647. }
  648. bool CheckBasicProxyAuth(
  649. const absl::optional<AuthChallengeInfo>& auth_challenge) {
  650. if (!auth_challenge)
  651. return false;
  652. EXPECT_TRUE(auth_challenge->is_proxy);
  653. EXPECT_EQ("http://myproxy:70", auth_challenge->challenger.Serialize());
  654. EXPECT_EQ("MyRealm1", auth_challenge->realm);
  655. EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme);
  656. return true;
  657. }
  658. bool CheckBasicSecureProxyAuth(
  659. const absl::optional<AuthChallengeInfo>& auth_challenge) {
  660. if (!auth_challenge)
  661. return false;
  662. EXPECT_TRUE(auth_challenge->is_proxy);
  663. EXPECT_EQ("https://myproxy:70", auth_challenge->challenger.Serialize());
  664. EXPECT_EQ("MyRealm1", auth_challenge->realm);
  665. EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme);
  666. return true;
  667. }
  668. bool CheckDigestServerAuth(
  669. const absl::optional<AuthChallengeInfo>& auth_challenge) {
  670. if (!auth_challenge)
  671. return false;
  672. EXPECT_FALSE(auth_challenge->is_proxy);
  673. EXPECT_EQ("http://www.example.org", auth_challenge->challenger.Serialize());
  674. EXPECT_EQ("digestive", auth_challenge->realm);
  675. EXPECT_EQ(kDigestAuthScheme, auth_challenge->scheme);
  676. return true;
  677. }
  678. #if defined(NTLM_PORTABLE)
  679. bool CheckNTLMServerAuth(
  680. const absl::optional<AuthChallengeInfo>& auth_challenge) {
  681. if (!auth_challenge)
  682. return false;
  683. EXPECT_FALSE(auth_challenge->is_proxy);
  684. EXPECT_EQ("https://server", auth_challenge->challenger.Serialize());
  685. EXPECT_EQ(std::string(), auth_challenge->realm);
  686. EXPECT_EQ(kNtlmAuthScheme, auth_challenge->scheme);
  687. return true;
  688. }
  689. bool CheckNTLMProxyAuth(
  690. const absl::optional<AuthChallengeInfo>& auth_challenge) {
  691. if (!auth_challenge)
  692. return false;
  693. EXPECT_TRUE(auth_challenge->is_proxy);
  694. EXPECT_EQ("http://server", auth_challenge->challenger.Serialize());
  695. EXPECT_EQ(std::string(), auth_challenge->realm);
  696. EXPECT_EQ(kNtlmAuthScheme, auth_challenge->scheme);
  697. return true;
  698. }
  699. #endif // defined(NTLM_PORTABLE)
  700. } // namespace
  701. TEST_F(HttpNetworkTransactionTest, Basic) {
  702. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  703. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  704. }
  705. TEST_F(HttpNetworkTransactionTest, SimpleGET) {
  706. MockRead data_reads[] = {
  707. MockRead("HTTP/1.0 200 OK\r\n\r\n"),
  708. MockRead("hello world"),
  709. MockRead(SYNCHRONOUS, OK),
  710. };
  711. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  712. EXPECT_THAT(out.rv, IsOk());
  713. EXPECT_EQ("HTTP/1.0 200 OK", out.status_line);
  714. EXPECT_EQ("hello world", out.response_data);
  715. int64_t reads_size = CountReadBytes(data_reads);
  716. EXPECT_EQ(reads_size, out.total_received_bytes);
  717. EXPECT_EQ(0u, out.connection_attempts.size());
  718. EXPECT_FALSE(out.remote_endpoint_after_start.address().empty());
  719. }
  720. // Response with no status line.
  721. TEST_F(HttpNetworkTransactionTest, SimpleGETNoHeaders) {
  722. MockRead data_reads[] = {
  723. MockRead("hello world"),
  724. MockRead(SYNCHRONOUS, OK),
  725. };
  726. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  727. EXPECT_THAT(out.rv, IsOk());
  728. EXPECT_EQ("HTTP/0.9 200 OK", out.status_line);
  729. EXPECT_EQ("hello world", out.response_data);
  730. int64_t reads_size = CountReadBytes(data_reads);
  731. EXPECT_EQ(reads_size, out.total_received_bytes);
  732. }
  733. // Response with no status line, and a weird port. Should fail by default.
  734. TEST_F(HttpNetworkTransactionTest, SimpleGETNoHeadersWeirdPort) {
  735. MockRead data_reads[] = {
  736. MockRead("hello world"), MockRead(SYNCHRONOUS, OK),
  737. };
  738. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  739. session_deps_.socket_factory->AddSocketDataProvider(&data);
  740. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  741. HttpRequestInfo request;
  742. auto trans =
  743. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  744. request.method = "GET";
  745. request.url = GURL("http://www.example.com:2000/");
  746. request.traffic_annotation =
  747. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  748. TestCompletionCallback callback;
  749. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  750. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_INVALID_HTTP_RESPONSE));
  751. }
  752. // Tests that request info can be destroyed after the headers phase is complete.
  753. TEST_F(HttpNetworkTransactionTest, SimpleGETNoReadDestroyRequestInfo) {
  754. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  755. auto trans =
  756. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  757. MockRead data_reads[] = {
  758. MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Connection: keep-alive\r\n"),
  759. MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, 0),
  760. };
  761. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  762. session_deps_.socket_factory->AddSocketDataProvider(&data);
  763. TestCompletionCallback callback;
  764. {
  765. auto request = std::make_unique<HttpRequestInfo>();
  766. request->method = "GET";
  767. request->url = GURL("http://www.example.org/");
  768. request->traffic_annotation =
  769. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  770. int rv =
  771. trans->Start(request.get(), callback.callback(), NetLogWithSource());
  772. EXPECT_THAT(callback.GetResult(rv), IsOk());
  773. } // Let request info be destroyed.
  774. trans.reset();
  775. }
  776. // Test that a failure in resolving the hostname is retrievable.
  777. TEST_F(HttpNetworkTransactionTest, SimpleGETHostResolutionFailure) {
  778. HttpRequestInfo request;
  779. request.method = "GET";
  780. request.url = GURL("http://www.example.org/");
  781. request.traffic_annotation =
  782. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  783. auto resolver = std::make_unique<MockHostResolver>();
  784. resolver->rules()->AddSimulatedTimeoutFailure("www.example.org");
  785. session_deps_.net_log = net::NetLog::Get();
  786. session_deps_.host_resolver = std::move(resolver);
  787. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  788. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  789. TestCompletionCallback callback;
  790. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  791. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  792. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_NAME_NOT_RESOLVED));
  793. const HttpResponseInfo* response = trans.GetResponseInfo();
  794. ASSERT_TRUE(response);
  795. EXPECT_THAT(response->resolve_error_info.error, IsError(ERR_DNS_TIMED_OUT));
  796. }
  797. // This test verifies that if the transaction fails before even connecting to a
  798. // remote endpoint, the ConnectedCallback is never called.
  799. TEST_F(HttpNetworkTransactionTest, ConnectedCallbackNeverCalled) {
  800. auto resolver = std::make_unique<MockHostResolver>();
  801. resolver->rules()->AddSimulatedTimeoutFailure("bar.test");
  802. session_deps_.host_resolver = std::move(resolver);
  803. ConnectedHandler connected_handler;
  804. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  805. auto request = DefaultRequestInfo();
  806. request.url = GURL("http://bar.test");
  807. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  808. transaction.SetConnectedCallback(connected_handler.Callback());
  809. TestCompletionCallback callback;
  810. transaction.Start(&request, callback.callback(), NetLogWithSource());
  811. callback.WaitForResult();
  812. EXPECT_THAT(connected_handler.transports(), IsEmpty());
  813. }
  814. // This test verifies that if the ConnectedCallback returns an error, the
  815. // entire transaction fails with that error.
  816. TEST_F(HttpNetworkTransactionTest, ConnectedCallbackFailure) {
  817. // The exact error code does not matter, as long as it is the same one
  818. // returned by the transaction overall.
  819. ConnectedHandler connected_handler;
  820. connected_handler.set_result(ERR_NOT_IMPLEMENTED);
  821. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  822. auto request = DefaultRequestInfo();
  823. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  824. transaction.SetConnectedCallback(connected_handler.Callback());
  825. // We never get to writing any data, but we still need a socket.
  826. StaticSocketDataProvider data;
  827. session_deps_.socket_factory->AddSocketDataProvider(&data);
  828. TestCompletionCallback callback;
  829. EXPECT_THAT(
  830. transaction.Start(&request, callback.callback(), NetLogWithSource()),
  831. IsError(ERR_IO_PENDING));
  832. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_NOT_IMPLEMENTED));
  833. EXPECT_THAT(connected_handler.transports(),
  834. ElementsAre(EmbeddedHttpServerTransportInfo()));
  835. }
  836. // This test verifies that if the ConnectedCallback returns an error, the
  837. // underlying socket is not closed and can be reused by the next transaction.
  838. TEST_F(HttpNetworkTransactionTest, ConnectedCallbackFailureAllowsSocketReuse) {
  839. ConnectedHandler connected_handler;
  840. connected_handler.set_result(ERR_NOT_IMPLEMENTED);
  841. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  842. auto request = DefaultRequestInfo();
  843. // A single socket should be opened and used for both transactions. Data
  844. // providers are matched to sockets at most once.
  845. MockRead data_reads[] = {
  846. MockRead("HTTP/1.0 200 OK\r\n"),
  847. MockRead("X-Test-Header: foo\r\n\r\n"),
  848. MockRead(SYNCHRONOUS, OK),
  849. };
  850. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  851. session_deps_.socket_factory->AddSocketDataProvider(&data);
  852. {
  853. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  854. transaction.SetConnectedCallback(connected_handler.Callback());
  855. TestCompletionCallback callback;
  856. EXPECT_THAT(
  857. transaction.Start(&request, callback.callback(), NetLogWithSource()),
  858. IsError(ERR_IO_PENDING));
  859. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_NOT_IMPLEMENTED));
  860. }
  861. // The data provider should still be linked to a socket.
  862. EXPECT_TRUE(data.socket());
  863. auto* socket = data.socket();
  864. {
  865. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  866. TestCompletionCallback callback;
  867. EXPECT_THAT(
  868. transaction.Start(&request, callback.callback(), NetLogWithSource()),
  869. IsError(ERR_IO_PENDING));
  870. EXPECT_THAT(callback.WaitForResult(), IsOk());
  871. EXPECT_TRUE(transaction.GetResponseInfo()->headers->HasHeaderValue(
  872. "X-Test-Header", "foo"));
  873. // Still linked to the same socket.
  874. EXPECT_EQ(data.socket(), socket);
  875. }
  876. }
  877. // This test verifies that the ConnectedCallback is called once in the case of
  878. // simple requests.
  879. TEST_F(HttpNetworkTransactionTest, ConnectedCallbackCalledOnce) {
  880. MockRead data_reads[] = {
  881. MockRead("HTTP/1.0 200 OK\r\n"),
  882. MockRead(SYNCHRONOUS, OK),
  883. };
  884. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  885. session_deps_.socket_factory->AddSocketDataProvider(&data);
  886. ConnectedHandler connected_handler;
  887. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  888. auto request = DefaultRequestInfo();
  889. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  890. transaction.SetConnectedCallback(connected_handler.Callback());
  891. TestCompletionCallback callback;
  892. EXPECT_THAT(
  893. transaction.Start(&request, callback.callback(), NetLogWithSource()),
  894. IsError(ERR_IO_PENDING));
  895. EXPECT_THAT(callback.WaitForResult(), IsOk());
  896. EXPECT_THAT(connected_handler.transports(),
  897. ElementsAre(EmbeddedHttpServerTransportInfo()));
  898. }
  899. // This test verifies that the ConnectedCallback is called once more per
  900. // authentication challenge.
  901. TEST_F(HttpNetworkTransactionTest, ConnectedCallbackCalledOnEachAuthChallenge) {
  902. ConnectedHandler connected_handler;
  903. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  904. auto request = DefaultRequestInfo();
  905. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  906. transaction.SetConnectedCallback(connected_handler.Callback());
  907. // First request receives an auth challenge.
  908. MockRead data_reads1[] = {
  909. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  910. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n\r\n"),
  911. MockRead(SYNCHRONOUS, ERR_FAILED),
  912. };
  913. StaticSocketDataProvider data1(data_reads1, base::span<MockWrite>());
  914. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  915. // Second request is allowed through.
  916. MockRead data_reads2[] = {
  917. MockRead("HTTP/1.0 200 OK\r\n\r\n"),
  918. MockRead(SYNCHRONOUS, OK),
  919. };
  920. StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>());
  921. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  922. // First request, connects once.
  923. TestCompletionCallback callback1;
  924. EXPECT_THAT(
  925. transaction.Start(&request, callback1.callback(), NetLogWithSource()),
  926. IsError(ERR_IO_PENDING));
  927. EXPECT_THAT(callback1.WaitForResult(), IsOk());
  928. EXPECT_THAT(connected_handler.transports(),
  929. ElementsAre(EmbeddedHttpServerTransportInfo()));
  930. // Second request, connects again.
  931. TestCompletionCallback callback2;
  932. EXPECT_THAT(transaction.RestartWithAuth(AuthCredentials(kFoo, kBar),
  933. callback2.callback()),
  934. IsError(ERR_IO_PENDING));
  935. EXPECT_THAT(callback2.WaitForResult(), IsOk());
  936. EXPECT_THAT(connected_handler.transports(),
  937. ElementsAre(EmbeddedHttpServerTransportInfo(),
  938. EmbeddedHttpServerTransportInfo()));
  939. }
  940. // This test verifies that the ConnectedCallback is called once more per retry.
  941. TEST_F(HttpNetworkTransactionTest, ConnectedCallbackCalledOnEachRetry) {
  942. ConnectedHandler connected_handler;
  943. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  944. auto request = DefaultRequestInfo();
  945. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  946. transaction.SetConnectedCallback(connected_handler.Callback());
  947. // First request receives a retryable error.
  948. MockRead data_reads1[] = {
  949. MockRead(SYNCHRONOUS, ERR_HTTP2_SERVER_REFUSED_STREAM),
  950. };
  951. StaticSocketDataProvider data1(data_reads1, base::span<MockWrite>());
  952. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  953. // Second request is allowed through.
  954. MockRead data_reads2[] = {
  955. MockRead("HTTP/1.0 200 OK\r\n\r\n"),
  956. MockRead(SYNCHRONOUS, OK),
  957. };
  958. StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>());
  959. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  960. TestCompletionCallback callback1;
  961. EXPECT_THAT(
  962. transaction.Start(&request, callback1.callback(), NetLogWithSource()),
  963. IsError(ERR_IO_PENDING));
  964. EXPECT_THAT(callback1.WaitForResult(), IsOk());
  965. EXPECT_THAT(connected_handler.transports(),
  966. ElementsAre(EmbeddedHttpServerTransportInfo(),
  967. EmbeddedHttpServerTransportInfo()));
  968. }
  969. TEST_F(HttpNetworkTransactionTest, ConnectedCallbackCalledAsync) {
  970. MockRead data_reads[] = {
  971. MockRead("HTTP/1.0 200 OK\r\n"),
  972. MockRead(SYNCHRONOUS, OK),
  973. };
  974. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  975. session_deps_.socket_factory->AddSocketDataProvider(&data);
  976. ConnectedHandler connected_handler;
  977. connected_handler.set_run_callback(true);
  978. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  979. auto request = DefaultRequestInfo();
  980. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  981. transaction.SetConnectedCallback(connected_handler.Callback());
  982. TestCompletionCallback callback;
  983. EXPECT_THAT(
  984. transaction.Start(&request, callback.callback(), NetLogWithSource()),
  985. IsError(ERR_IO_PENDING));
  986. EXPECT_THAT(callback.WaitForResult(), IsOk());
  987. EXPECT_THAT(connected_handler.transports(),
  988. ElementsAre(EmbeddedHttpServerTransportInfo()));
  989. }
  990. TEST_F(HttpNetworkTransactionTest, ConnectedCallbackCalledAsyncError) {
  991. MockRead data_reads[] = {
  992. MockRead("HTTP/1.0 200 OK\r\n"),
  993. MockRead(SYNCHRONOUS, OK),
  994. };
  995. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  996. session_deps_.socket_factory->AddSocketDataProvider(&data);
  997. ConnectedHandler connected_handler;
  998. connected_handler.set_run_callback(true);
  999. connected_handler.set_result(ERR_FAILED);
  1000. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  1001. auto request = DefaultRequestInfo();
  1002. HttpNetworkTransaction transaction(DEFAULT_PRIORITY, session.get());
  1003. transaction.SetConnectedCallback(connected_handler.Callback());
  1004. TestCompletionCallback callback;
  1005. EXPECT_THAT(
  1006. transaction.Start(&request, callback.callback(), NetLogWithSource()),
  1007. IsError(ERR_IO_PENDING));
  1008. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_FAILED));
  1009. EXPECT_THAT(connected_handler.transports(),
  1010. ElementsAre(EmbeddedHttpServerTransportInfo()));
  1011. }
  1012. // Allow up to 4 bytes of junk to precede status line.
  1013. TEST_F(HttpNetworkTransactionTest, StatusLineJunk3Bytes) {
  1014. MockRead data_reads[] = {
  1015. MockRead("xxxHTTP/1.0 404 Not Found\nServer: blah\n\nDATA"),
  1016. MockRead(SYNCHRONOUS, OK),
  1017. };
  1018. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1019. EXPECT_THAT(out.rv, IsOk());
  1020. EXPECT_EQ("HTTP/1.0 404 Not Found", out.status_line);
  1021. EXPECT_EQ("DATA", out.response_data);
  1022. int64_t reads_size = CountReadBytes(data_reads);
  1023. EXPECT_EQ(reads_size, out.total_received_bytes);
  1024. }
  1025. // Allow up to 4 bytes of junk to precede status line.
  1026. TEST_F(HttpNetworkTransactionTest, StatusLineJunk4Bytes) {
  1027. MockRead data_reads[] = {
  1028. MockRead("\n\nQJHTTP/1.0 404 Not Found\nServer: blah\n\nDATA"),
  1029. MockRead(SYNCHRONOUS, OK),
  1030. };
  1031. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1032. EXPECT_THAT(out.rv, IsOk());
  1033. EXPECT_EQ("HTTP/1.0 404 Not Found", out.status_line);
  1034. EXPECT_EQ("DATA", out.response_data);
  1035. int64_t reads_size = CountReadBytes(data_reads);
  1036. EXPECT_EQ(reads_size, out.total_received_bytes);
  1037. }
  1038. // Beyond 4 bytes of slop and it should fail to find a status line.
  1039. TEST_F(HttpNetworkTransactionTest, StatusLineJunk5Bytes) {
  1040. MockRead data_reads[] = {
  1041. MockRead("xxxxxHTTP/1.1 404 Not Found\nServer: blah"),
  1042. MockRead(SYNCHRONOUS, OK),
  1043. };
  1044. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1045. EXPECT_THAT(out.rv, IsOk());
  1046. EXPECT_EQ("HTTP/0.9 200 OK", out.status_line);
  1047. EXPECT_EQ("xxxxxHTTP/1.1 404 Not Found\nServer: blah", out.response_data);
  1048. int64_t reads_size = CountReadBytes(data_reads);
  1049. EXPECT_EQ(reads_size, out.total_received_bytes);
  1050. }
  1051. // Same as StatusLineJunk4Bytes, except the read chunks are smaller.
  1052. TEST_F(HttpNetworkTransactionTest, StatusLineJunk4Bytes_Slow) {
  1053. MockRead data_reads[] = {
  1054. MockRead("\n"),
  1055. MockRead("\n"),
  1056. MockRead("Q"),
  1057. MockRead("J"),
  1058. MockRead("HTTP/1.0 404 Not Found\nServer: blah\n\nDATA"),
  1059. MockRead(SYNCHRONOUS, OK),
  1060. };
  1061. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1062. EXPECT_THAT(out.rv, IsOk());
  1063. EXPECT_EQ("HTTP/1.0 404 Not Found", out.status_line);
  1064. EXPECT_EQ("DATA", out.response_data);
  1065. int64_t reads_size = CountReadBytes(data_reads);
  1066. EXPECT_EQ(reads_size, out.total_received_bytes);
  1067. }
  1068. // Close the connection before enough bytes to have a status line.
  1069. TEST_F(HttpNetworkTransactionTest, StatusLinePartial) {
  1070. MockRead data_reads[] = {
  1071. MockRead("HTT"),
  1072. MockRead(SYNCHRONOUS, OK),
  1073. };
  1074. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1075. EXPECT_THAT(out.rv, IsOk());
  1076. EXPECT_EQ("HTTP/0.9 200 OK", out.status_line);
  1077. EXPECT_EQ("HTT", out.response_data);
  1078. int64_t reads_size = CountReadBytes(data_reads);
  1079. EXPECT_EQ(reads_size, out.total_received_bytes);
  1080. }
  1081. // Simulate a 204 response, lacking a Content-Length header, sent over a
  1082. // persistent connection. The response should still terminate since a 204
  1083. // cannot have a response body.
  1084. TEST_F(HttpNetworkTransactionTest, StopsReading204) {
  1085. char junk[] = "junk";
  1086. MockRead data_reads[] = {
  1087. MockRead("HTTP/1.1 204 No Content\r\n\r\n"),
  1088. MockRead(junk), // Should not be read!!
  1089. MockRead(SYNCHRONOUS, OK),
  1090. };
  1091. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1092. EXPECT_THAT(out.rv, IsOk());
  1093. EXPECT_EQ("HTTP/1.1 204 No Content", out.status_line);
  1094. EXPECT_EQ("", out.response_data);
  1095. int64_t reads_size = CountReadBytes(data_reads);
  1096. int64_t response_size = reads_size - strlen(junk);
  1097. EXPECT_EQ(response_size, out.total_received_bytes);
  1098. }
  1099. // A simple request using chunked encoding with some extra data after.
  1100. TEST_F(HttpNetworkTransactionTest, ChunkedEncoding) {
  1101. std::string final_chunk = "0\r\n\r\n";
  1102. std::string extra_data = "HTTP/1.1 200 OK\r\n";
  1103. std::string last_read = final_chunk + extra_data;
  1104. MockRead data_reads[] = {
  1105. MockRead("HTTP/1.1 200 OK\r\nTransfer-Encoding: chunked\r\n\r\n"),
  1106. MockRead("5\r\nHello\r\n"),
  1107. MockRead("1\r\n"),
  1108. MockRead(" \r\n"),
  1109. MockRead("5\r\nworld\r\n"),
  1110. MockRead(last_read.data()),
  1111. MockRead(SYNCHRONOUS, OK),
  1112. };
  1113. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1114. EXPECT_THAT(out.rv, IsOk());
  1115. EXPECT_EQ("HTTP/1.1 200 OK", out.status_line);
  1116. EXPECT_EQ("Hello world", out.response_data);
  1117. int64_t reads_size = CountReadBytes(data_reads);
  1118. int64_t response_size = reads_size - extra_data.size();
  1119. EXPECT_EQ(response_size, out.total_received_bytes);
  1120. }
  1121. // Next tests deal with http://crbug.com/56344.
  1122. TEST_F(HttpNetworkTransactionTest,
  1123. MultipleContentLengthHeadersNoTransferEncoding) {
  1124. MockRead data_reads[] = {
  1125. MockRead("HTTP/1.1 200 OK\r\n"),
  1126. MockRead("Content-Length: 10\r\n"),
  1127. MockRead("Content-Length: 5\r\n\r\n"),
  1128. };
  1129. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1130. EXPECT_THAT(out.rv, IsError(ERR_RESPONSE_HEADERS_MULTIPLE_CONTENT_LENGTH));
  1131. }
  1132. TEST_F(HttpNetworkTransactionTest,
  1133. DuplicateContentLengthHeadersNoTransferEncoding) {
  1134. MockRead data_reads[] = {
  1135. MockRead("HTTP/1.1 200 OK\r\n"),
  1136. MockRead("Content-Length: 5\r\n"),
  1137. MockRead("Content-Length: 5\r\n\r\n"),
  1138. MockRead("Hello"),
  1139. };
  1140. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1141. EXPECT_THAT(out.rv, IsOk());
  1142. EXPECT_EQ("HTTP/1.1 200 OK", out.status_line);
  1143. EXPECT_EQ("Hello", out.response_data);
  1144. }
  1145. TEST_F(HttpNetworkTransactionTest,
  1146. ComplexContentLengthHeadersNoTransferEncoding) {
  1147. // More than 2 dupes.
  1148. {
  1149. MockRead data_reads[] = {
  1150. MockRead("HTTP/1.1 200 OK\r\n"),
  1151. MockRead("Content-Length: 5\r\n"),
  1152. MockRead("Content-Length: 5\r\n"),
  1153. MockRead("Content-Length: 5\r\n\r\n"),
  1154. MockRead("Hello"),
  1155. };
  1156. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1157. EXPECT_THAT(out.rv, IsOk());
  1158. EXPECT_EQ("HTTP/1.1 200 OK", out.status_line);
  1159. EXPECT_EQ("Hello", out.response_data);
  1160. }
  1161. // HTTP/1.0
  1162. {
  1163. MockRead data_reads[] = {
  1164. MockRead("HTTP/1.0 200 OK\r\n"),
  1165. MockRead("Content-Length: 5\r\n"),
  1166. MockRead("Content-Length: 5\r\n"),
  1167. MockRead("Content-Length: 5\r\n\r\n"),
  1168. MockRead("Hello"),
  1169. };
  1170. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1171. EXPECT_THAT(out.rv, IsOk());
  1172. EXPECT_EQ("HTTP/1.0 200 OK", out.status_line);
  1173. EXPECT_EQ("Hello", out.response_data);
  1174. }
  1175. // 2 dupes and one mismatched.
  1176. {
  1177. MockRead data_reads[] = {
  1178. MockRead("HTTP/1.1 200 OK\r\n"),
  1179. MockRead("Content-Length: 10\r\n"),
  1180. MockRead("Content-Length: 10\r\n"),
  1181. MockRead("Content-Length: 5\r\n\r\n"),
  1182. };
  1183. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1184. EXPECT_THAT(out.rv, IsError(ERR_RESPONSE_HEADERS_MULTIPLE_CONTENT_LENGTH));
  1185. }
  1186. }
  1187. TEST_F(HttpNetworkTransactionTest,
  1188. MultipleContentLengthHeadersTransferEncoding) {
  1189. MockRead data_reads[] = {
  1190. MockRead("HTTP/1.1 200 OK\r\n"),
  1191. MockRead("Content-Length: 666\r\n"),
  1192. MockRead("Content-Length: 1337\r\n"),
  1193. MockRead("Transfer-Encoding: chunked\r\n\r\n"),
  1194. MockRead("5\r\nHello\r\n"),
  1195. MockRead("1\r\n"),
  1196. MockRead(" \r\n"),
  1197. MockRead("5\r\nworld\r\n"),
  1198. MockRead("0\r\n\r\nHTTP/1.1 200 OK\r\n"),
  1199. MockRead(SYNCHRONOUS, OK),
  1200. };
  1201. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1202. EXPECT_THAT(out.rv, IsOk());
  1203. EXPECT_EQ("HTTP/1.1 200 OK", out.status_line);
  1204. EXPECT_EQ("Hello world", out.response_data);
  1205. }
  1206. // Next tests deal with http://crbug.com/98895.
  1207. // Checks that a single Content-Disposition header results in no error.
  1208. TEST_F(HttpNetworkTransactionTest, SingleContentDispositionHeader) {
  1209. MockRead data_reads[] = {
  1210. MockRead("HTTP/1.1 200 OK\r\n"),
  1211. MockRead("Content-Disposition: attachment;filename=\"salutations.txt\"r\n"),
  1212. MockRead("Content-Length: 5\r\n\r\n"),
  1213. MockRead("Hello"),
  1214. };
  1215. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1216. EXPECT_THAT(out.rv, IsOk());
  1217. EXPECT_EQ("HTTP/1.1 200 OK", out.status_line);
  1218. EXPECT_EQ("Hello", out.response_data);
  1219. }
  1220. // Checks that two identical Content-Disposition headers result in no error.
  1221. TEST_F(HttpNetworkTransactionTest, TwoIdenticalContentDispositionHeaders) {
  1222. MockRead data_reads[] = {
  1223. MockRead("HTTP/1.1 200 OK\r\n"),
  1224. MockRead("Content-Disposition: attachment;filename=\"greetings.txt\"r\n"),
  1225. MockRead("Content-Disposition: attachment;filename=\"greetings.txt\"r\n"),
  1226. MockRead("Content-Length: 5\r\n\r\n"),
  1227. MockRead("Hello"),
  1228. };
  1229. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1230. EXPECT_THAT(out.rv, IsOk());
  1231. EXPECT_EQ("HTTP/1.1 200 OK", out.status_line);
  1232. EXPECT_EQ("Hello", out.response_data);
  1233. }
  1234. // Checks that two distinct Content-Disposition headers result in an error.
  1235. TEST_F(HttpNetworkTransactionTest, TwoDistinctContentDispositionHeaders) {
  1236. MockRead data_reads[] = {
  1237. MockRead("HTTP/1.1 200 OK\r\n"),
  1238. MockRead("Content-Disposition: attachment;filename=\"greetings.txt\"r\n"),
  1239. MockRead("Content-Disposition: attachment;filename=\"hi.txt\"r\n"),
  1240. MockRead("Content-Length: 5\r\n\r\n"),
  1241. MockRead("Hello"),
  1242. };
  1243. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1244. EXPECT_THAT(out.rv,
  1245. IsError(ERR_RESPONSE_HEADERS_MULTIPLE_CONTENT_DISPOSITION));
  1246. }
  1247. // Checks that two identical Location headers result in no error.
  1248. // Also tests Location header behavior.
  1249. TEST_F(HttpNetworkTransactionTest, TwoIdenticalLocationHeaders) {
  1250. MockRead data_reads[] = {
  1251. MockRead("HTTP/1.1 302 Redirect\r\n"),
  1252. MockRead("Location: http://good.com/\r\n"),
  1253. MockRead("Location: http://good.com/\r\n"),
  1254. MockRead("Content-Length: 0\r\n\r\n"),
  1255. MockRead(SYNCHRONOUS, OK),
  1256. };
  1257. HttpRequestInfo request;
  1258. request.method = "GET";
  1259. request.url = GURL("http://redirect.com/");
  1260. request.traffic_annotation =
  1261. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1262. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1263. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1264. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  1265. session_deps_.socket_factory->AddSocketDataProvider(&data);
  1266. TestCompletionCallback callback;
  1267. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1268. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1269. EXPECT_THAT(callback.WaitForResult(), IsOk());
  1270. const HttpResponseInfo* response = trans.GetResponseInfo();
  1271. ASSERT_TRUE(response);
  1272. ASSERT_TRUE(response->headers);
  1273. EXPECT_EQ("HTTP/1.1 302 Redirect", response->headers->GetStatusLine());
  1274. std::string url;
  1275. EXPECT_TRUE(response->headers->IsRedirect(&url));
  1276. EXPECT_EQ("http://good.com/", url);
  1277. EXPECT_TRUE(response->proxy_server.is_direct());
  1278. }
  1279. // Checks that two distinct Location headers result in an error.
  1280. TEST_F(HttpNetworkTransactionTest, TwoDistinctLocationHeaders) {
  1281. MockRead data_reads[] = {
  1282. MockRead("HTTP/1.1 302 Redirect\r\n"),
  1283. MockRead("Location: http://good.com/\r\n"),
  1284. MockRead("Location: http://evil.com/\r\n"),
  1285. MockRead("Content-Length: 0\r\n\r\n"),
  1286. MockRead(SYNCHRONOUS, OK),
  1287. };
  1288. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  1289. EXPECT_THAT(out.rv, IsError(ERR_RESPONSE_HEADERS_MULTIPLE_LOCATION));
  1290. }
  1291. // Do a request using the HEAD method. Verify that we don't try to read the
  1292. // message body (since HEAD has none).
  1293. TEST_F(HttpNetworkTransactionTest, Head) {
  1294. HttpRequestInfo request;
  1295. request.method = "HEAD";
  1296. request.url = GURL("http://www.example.org/");
  1297. request.traffic_annotation =
  1298. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1299. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1300. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1301. ConnectedHandler connected_handler;
  1302. trans.SetConnectedCallback(connected_handler.Callback());
  1303. MockWrite data_writes1[] = {
  1304. MockWrite("HEAD / HTTP/1.1\r\n"
  1305. "Host: www.example.org\r\n"
  1306. "Connection: keep-alive\r\n\r\n"),
  1307. };
  1308. MockRead data_reads1[] = {
  1309. MockRead("HTTP/1.1 404 Not Found\r\n"), MockRead("Server: Blah\r\n"),
  1310. MockRead("Content-Length: 1234\r\n\r\n"),
  1311. // No response body because the test stops reading here.
  1312. MockRead(SYNCHRONOUS, ERR_UNEXPECTED),
  1313. };
  1314. StaticSocketDataProvider data1(data_reads1, data_writes1);
  1315. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  1316. TestCompletionCallback callback1;
  1317. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  1318. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1319. rv = callback1.WaitForResult();
  1320. EXPECT_THAT(rv, IsOk());
  1321. const HttpResponseInfo* response = trans.GetResponseInfo();
  1322. ASSERT_TRUE(response);
  1323. // Check that the headers got parsed.
  1324. EXPECT_TRUE(response->headers);
  1325. EXPECT_EQ(1234, response->headers->GetContentLength());
  1326. EXPECT_EQ("HTTP/1.1 404 Not Found", response->headers->GetStatusLine());
  1327. EXPECT_TRUE(response->proxy_server.is_direct());
  1328. EXPECT_THAT(connected_handler.transports(),
  1329. ElementsAre(EmbeddedHttpServerTransportInfo()));
  1330. std::string server_header;
  1331. size_t iter = 0;
  1332. bool has_server_header = response->headers->EnumerateHeader(
  1333. &iter, "Server", &server_header);
  1334. EXPECT_TRUE(has_server_header);
  1335. EXPECT_EQ("Blah", server_header);
  1336. // Reading should give EOF right away, since there is no message body
  1337. // (despite non-zero content-length).
  1338. std::string response_data;
  1339. rv = ReadTransaction(&trans, &response_data);
  1340. EXPECT_THAT(rv, IsOk());
  1341. EXPECT_EQ("", response_data);
  1342. }
  1343. TEST_F(HttpNetworkTransactionTest, ReuseConnection) {
  1344. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1345. MockRead data_reads[] = {
  1346. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  1347. MockRead("hello"),
  1348. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  1349. MockRead("world"),
  1350. MockRead(SYNCHRONOUS, OK),
  1351. };
  1352. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  1353. session_deps_.socket_factory->AddSocketDataProvider(&data);
  1354. const char* const kExpectedResponseData[] = {
  1355. "hello", "world"
  1356. };
  1357. for (const auto* expected_response_data : kExpectedResponseData) {
  1358. HttpRequestInfo request;
  1359. request.method = "GET";
  1360. request.url = GURL("http://www.example.org/");
  1361. request.traffic_annotation =
  1362. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1363. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1364. TestCompletionCallback callback;
  1365. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1366. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1367. rv = callback.WaitForResult();
  1368. EXPECT_THAT(rv, IsOk());
  1369. const HttpResponseInfo* response = trans.GetResponseInfo();
  1370. ASSERT_TRUE(response);
  1371. EXPECT_TRUE(response->headers);
  1372. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  1373. EXPECT_TRUE(response->proxy_server.is_direct());
  1374. std::string response_data;
  1375. rv = ReadTransaction(&trans, &response_data);
  1376. EXPECT_THAT(rv, IsOk());
  1377. EXPECT_EQ(expected_response_data, response_data);
  1378. }
  1379. }
  1380. TEST_F(HttpNetworkTransactionTest, Ignores100) {
  1381. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  1382. element_readers.push_back(
  1383. std::make_unique<UploadBytesElementReader>("foo", 3));
  1384. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  1385. HttpRequestInfo request;
  1386. request.method = "POST";
  1387. request.url = GURL("http://www.foo.com/");
  1388. request.upload_data_stream = &upload_data_stream;
  1389. request.traffic_annotation =
  1390. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1391. // Check the upload progress returned before initialization is correct.
  1392. UploadProgress progress = request.upload_data_stream->GetUploadProgress();
  1393. EXPECT_EQ(0u, progress.size());
  1394. EXPECT_EQ(0u, progress.position());
  1395. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1396. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1397. MockRead data_reads[] = {
  1398. MockRead("HTTP/1.0 100 Continue\r\n\r\n"),
  1399. MockRead("HTTP/1.0 200 OK\r\n\r\n"),
  1400. MockRead("hello world"),
  1401. MockRead(SYNCHRONOUS, OK),
  1402. };
  1403. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  1404. session_deps_.socket_factory->AddSocketDataProvider(&data);
  1405. TestCompletionCallback callback;
  1406. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1407. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1408. rv = callback.WaitForResult();
  1409. EXPECT_THAT(rv, IsOk());
  1410. const HttpResponseInfo* response = trans.GetResponseInfo();
  1411. ASSERT_TRUE(response);
  1412. EXPECT_TRUE(response->headers);
  1413. EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine());
  1414. std::string response_data;
  1415. rv = ReadTransaction(&trans, &response_data);
  1416. EXPECT_THAT(rv, IsOk());
  1417. EXPECT_EQ("hello world", response_data);
  1418. }
  1419. // This test is almost the same as Ignores100 above, but the response contains
  1420. // a 102 instead of a 100. Also, instead of HTTP/1.0 the response is
  1421. // HTTP/1.1 and the two status headers are read in one read.
  1422. TEST_F(HttpNetworkTransactionTest, Ignores1xx) {
  1423. HttpRequestInfo request;
  1424. request.method = "GET";
  1425. request.url = GURL("http://www.foo.com/");
  1426. request.traffic_annotation =
  1427. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1428. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1429. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1430. MockRead data_reads[] = {
  1431. MockRead("HTTP/1.1 102 Unspecified status code\r\n\r\n"
  1432. "HTTP/1.1 200 OK\r\n\r\n"),
  1433. MockRead("hello world"),
  1434. MockRead(SYNCHRONOUS, OK),
  1435. };
  1436. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  1437. session_deps_.socket_factory->AddSocketDataProvider(&data);
  1438. TestCompletionCallback callback;
  1439. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1440. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1441. rv = callback.WaitForResult();
  1442. EXPECT_THAT(rv, IsOk());
  1443. const HttpResponseInfo* response = trans.GetResponseInfo();
  1444. ASSERT_TRUE(response);
  1445. EXPECT_TRUE(response->headers);
  1446. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  1447. std::string response_data;
  1448. rv = ReadTransaction(&trans, &response_data);
  1449. EXPECT_THAT(rv, IsOk());
  1450. EXPECT_EQ("hello world", response_data);
  1451. }
  1452. TEST_F(HttpNetworkTransactionTest, LoadTimingMeasuresTimeToFirstByteForHttp) {
  1453. static const base::TimeDelta kDelayAfterFirstByte = base::Milliseconds(10);
  1454. HttpRequestInfo request;
  1455. request.method = "GET";
  1456. request.url = GURL("http://www.foo.com/");
  1457. request.traffic_annotation =
  1458. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1459. std::vector<MockWrite> data_writes = {
  1460. MockWrite(ASYNC, 0,
  1461. "GET / HTTP/1.1\r\n"
  1462. "Host: www.foo.com\r\n"
  1463. "Connection: keep-alive\r\n\r\n"),
  1464. };
  1465. std::vector<MockRead> data_reads = {
  1466. // Write one byte of the status line, followed by a pause.
  1467. MockRead(ASYNC, 1, "H"),
  1468. MockRead(ASYNC, ERR_IO_PENDING, 2),
  1469. MockRead(ASYNC, 3, "TTP/1.1 200 OK\r\n\r\n"),
  1470. MockRead(ASYNC, 4, "hello world"),
  1471. MockRead(SYNCHRONOUS, OK, 5),
  1472. };
  1473. SequencedSocketData data(data_reads, data_writes);
  1474. session_deps_.socket_factory->AddSocketDataProvider(&data);
  1475. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1476. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1477. TestCompletionCallback callback;
  1478. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1479. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1480. data.RunUntilPaused();
  1481. ASSERT_TRUE(data.IsPaused());
  1482. FastForwardBy(kDelayAfterFirstByte);
  1483. data.Resume();
  1484. rv = callback.WaitForResult();
  1485. EXPECT_THAT(rv, IsOk());
  1486. const HttpResponseInfo* response = trans.GetResponseInfo();
  1487. ASSERT_TRUE(response);
  1488. EXPECT_TRUE(response->headers);
  1489. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  1490. LoadTimingInfo load_timing_info;
  1491. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  1492. EXPECT_FALSE(load_timing_info.receive_headers_start.is_null());
  1493. EXPECT_FALSE(load_timing_info.connect_timing.connect_end.is_null());
  1494. // Ensure we didn't include the delay in the TTFB time.
  1495. EXPECT_EQ(load_timing_info.receive_headers_start,
  1496. load_timing_info.connect_timing.connect_end);
  1497. // Ensure that the mock clock advanced at all.
  1498. EXPECT_EQ(base::TimeTicks::Now() - load_timing_info.receive_headers_start,
  1499. kDelayAfterFirstByte);
  1500. std::string response_data;
  1501. rv = ReadTransaction(&trans, &response_data);
  1502. EXPECT_THAT(rv, IsOk());
  1503. EXPECT_EQ("hello world", response_data);
  1504. }
  1505. // Tests that the time-to-first-byte reported in a transaction's load timing
  1506. // info uses the first response, even if 1XX/informational.
  1507. void HttpNetworkTransactionTest::Check100ResponseTiming(bool use_spdy) {
  1508. static const base::TimeDelta kDelayAfter100Response = base::Milliseconds(10);
  1509. HttpRequestInfo request;
  1510. request.method = "GET";
  1511. request.url = GURL("https://www.foo.com/");
  1512. request.traffic_annotation =
  1513. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1514. SSLSocketDataProvider ssl(ASYNC, OK);
  1515. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  1516. std::vector<MockWrite> data_writes;
  1517. std::vector<MockRead> data_reads;
  1518. spdy::SpdySerializedFrame spdy_req(
  1519. spdy_util_.ConstructSpdyGet(request.url.spec().c_str(), 1, LOWEST));
  1520. spdy::Http2HeaderBlock spdy_resp1_headers;
  1521. spdy_resp1_headers[spdy::kHttp2StatusHeader] = "100";
  1522. spdy::SpdySerializedFrame spdy_resp1(
  1523. spdy_util_.ConstructSpdyReply(1, spdy_resp1_headers.Clone()));
  1524. spdy::SpdySerializedFrame spdy_resp2(
  1525. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  1526. spdy::SpdySerializedFrame spdy_data(
  1527. spdy_util_.ConstructSpdyDataFrame(1, "hello world", true));
  1528. if (use_spdy) {
  1529. ssl.next_proto = kProtoHTTP2;
  1530. data_writes = {CreateMockWrite(spdy_req, 0)};
  1531. data_reads = {
  1532. CreateMockRead(spdy_resp1, 1), MockRead(ASYNC, ERR_IO_PENDING, 2),
  1533. CreateMockRead(spdy_resp2, 3), CreateMockRead(spdy_data, 4),
  1534. MockRead(SYNCHRONOUS, OK, 5),
  1535. };
  1536. } else {
  1537. data_writes = {
  1538. MockWrite(ASYNC, 0,
  1539. "GET / HTTP/1.1\r\n"
  1540. "Host: www.foo.com\r\n"
  1541. "Connection: keep-alive\r\n\r\n"),
  1542. };
  1543. data_reads = {
  1544. MockRead(ASYNC, 1, "HTTP/1.1 100 Continue\r\n\r\n"),
  1545. MockRead(ASYNC, ERR_IO_PENDING, 2),
  1546. MockRead(ASYNC, 3, "HTTP/1.1 200 OK\r\n\r\n"),
  1547. MockRead(ASYNC, 4, "hello world"),
  1548. MockRead(SYNCHRONOUS, OK, 5),
  1549. };
  1550. }
  1551. SequencedSocketData data(data_reads, data_writes);
  1552. session_deps_.socket_factory->AddSocketDataProvider(&data);
  1553. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1554. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1555. TestCompletionCallback callback;
  1556. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1557. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1558. data.RunUntilPaused();
  1559. // We should now have parsed the 100 response and hit ERR_IO_PENDING. Insert
  1560. // the delay before parsing the 200 response.
  1561. ASSERT_TRUE(data.IsPaused());
  1562. FastForwardBy(kDelayAfter100Response);
  1563. data.Resume();
  1564. rv = callback.WaitForResult();
  1565. EXPECT_THAT(rv, IsOk());
  1566. const HttpResponseInfo* response = trans.GetResponseInfo();
  1567. ASSERT_TRUE(response);
  1568. LoadTimingInfo load_timing_info;
  1569. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  1570. EXPECT_FALSE(load_timing_info.receive_headers_start.is_null());
  1571. EXPECT_FALSE(load_timing_info.connect_timing.connect_end.is_null());
  1572. // Ensure we didn't include the delay in the TTFB time.
  1573. EXPECT_EQ(load_timing_info.receive_headers_start,
  1574. load_timing_info.connect_timing.connect_end);
  1575. // Ensure that the mock clock advanced at all.
  1576. EXPECT_EQ(base::TimeTicks::Now() - load_timing_info.receive_headers_start,
  1577. kDelayAfter100Response);
  1578. std::string response_data;
  1579. rv = ReadTransaction(&trans, &response_data);
  1580. EXPECT_THAT(rv, IsOk());
  1581. EXPECT_EQ("hello world", response_data);
  1582. }
  1583. TEST_F(HttpNetworkTransactionTest, MeasuresTimeToFirst100ResponseForHttp) {
  1584. Check100ResponseTiming(false /* use_spdy */);
  1585. }
  1586. TEST_F(HttpNetworkTransactionTest, MeasuresTimeToFirst100ResponseForSpdy) {
  1587. Check100ResponseTiming(true /* use_spdy */);
  1588. }
  1589. TEST_F(HttpNetworkTransactionTest, Incomplete100ThenEOF) {
  1590. HttpRequestInfo request;
  1591. request.method = "POST";
  1592. request.url = GURL("http://www.foo.com/");
  1593. request.traffic_annotation =
  1594. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1595. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1596. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1597. MockRead data_reads[] = {
  1598. MockRead(SYNCHRONOUS, "HTTP/1.0 100 Continue\r\n"),
  1599. MockRead(ASYNC, 0),
  1600. };
  1601. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  1602. session_deps_.socket_factory->AddSocketDataProvider(&data);
  1603. TestCompletionCallback callback;
  1604. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1605. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1606. rv = callback.WaitForResult();
  1607. EXPECT_THAT(rv, IsOk());
  1608. std::string response_data;
  1609. rv = ReadTransaction(&trans, &response_data);
  1610. EXPECT_THAT(rv, IsOk());
  1611. EXPECT_EQ("", response_data);
  1612. }
  1613. TEST_F(HttpNetworkTransactionTest, EmptyResponse) {
  1614. HttpRequestInfo request;
  1615. request.method = "POST";
  1616. request.url = GURL("http://www.foo.com/");
  1617. request.traffic_annotation =
  1618. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1619. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1620. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1621. MockRead data_reads[] = {
  1622. MockRead(ASYNC, 0),
  1623. };
  1624. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  1625. session_deps_.socket_factory->AddSocketDataProvider(&data);
  1626. TestCompletionCallback callback;
  1627. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1628. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1629. rv = callback.WaitForResult();
  1630. EXPECT_THAT(rv, IsError(ERR_EMPTY_RESPONSE));
  1631. }
  1632. void HttpNetworkTransactionTest::KeepAliveConnectionResendRequestTest(
  1633. const MockWrite* write_failure,
  1634. const MockRead* read_failure) {
  1635. HttpRequestInfo request;
  1636. request.method = "GET";
  1637. request.url = GURL("http://www.foo.com/");
  1638. request.traffic_annotation =
  1639. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1640. session_deps_.net_log = net::NetLog::Get();
  1641. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1642. // Written data for successfully sending both requests.
  1643. MockWrite data1_writes[] = {
  1644. MockWrite("GET / HTTP/1.1\r\n"
  1645. "Host: www.foo.com\r\n"
  1646. "Connection: keep-alive\r\n\r\n"),
  1647. MockWrite("GET / HTTP/1.1\r\n"
  1648. "Host: www.foo.com\r\n"
  1649. "Connection: keep-alive\r\n\r\n")
  1650. };
  1651. // Read results for the first request.
  1652. MockRead data1_reads[] = {
  1653. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  1654. MockRead("hello"),
  1655. MockRead(ASYNC, OK),
  1656. };
  1657. if (write_failure) {
  1658. ASSERT_FALSE(read_failure);
  1659. data1_writes[1] = *write_failure;
  1660. } else {
  1661. ASSERT_TRUE(read_failure);
  1662. data1_reads[2] = *read_failure;
  1663. }
  1664. StaticSocketDataProvider data1(data1_reads, data1_writes);
  1665. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  1666. MockRead data2_reads[] = {
  1667. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  1668. MockRead("world"),
  1669. MockRead(ASYNC, OK),
  1670. };
  1671. StaticSocketDataProvider data2(data2_reads, base::span<MockWrite>());
  1672. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  1673. const char* const kExpectedResponseData[] = {
  1674. "hello", "world"
  1675. };
  1676. uint32_t first_socket_log_id = NetLogSource::kInvalidId;
  1677. for (int i = 0; i < 2; ++i) {
  1678. TestCompletionCallback callback;
  1679. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1680. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1681. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1682. rv = callback.WaitForResult();
  1683. EXPECT_THAT(rv, IsOk());
  1684. LoadTimingInfo load_timing_info;
  1685. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  1686. TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_DNS_TIMES);
  1687. if (i == 0) {
  1688. first_socket_log_id = load_timing_info.socket_log_id;
  1689. } else {
  1690. // The second request should be using a new socket.
  1691. EXPECT_NE(first_socket_log_id, load_timing_info.socket_log_id);
  1692. }
  1693. const HttpResponseInfo* response = trans.GetResponseInfo();
  1694. ASSERT_TRUE(response);
  1695. EXPECT_TRUE(response->headers);
  1696. EXPECT_TRUE(response->proxy_server.is_direct());
  1697. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  1698. std::string response_data;
  1699. rv = ReadTransaction(&trans, &response_data);
  1700. EXPECT_THAT(rv, IsOk());
  1701. EXPECT_EQ(kExpectedResponseData[i], response_data);
  1702. }
  1703. }
  1704. void HttpNetworkTransactionTest::PreconnectErrorResendRequestTest(
  1705. const MockWrite* write_failure,
  1706. const MockRead* read_failure,
  1707. bool use_spdy,
  1708. bool chunked_upload) {
  1709. SpdyTestUtil spdy_util;
  1710. HttpRequestInfo request;
  1711. request.method = "GET";
  1712. request.url = GURL("https://www.foo.com/");
  1713. request.traffic_annotation =
  1714. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1715. const char upload_data[] = "foobar";
  1716. ChunkedUploadDataStream upload_data_stream(0);
  1717. if (chunked_upload) {
  1718. request.method = "POST";
  1719. upload_data_stream.AppendData(upload_data, std::size(upload_data) - 1,
  1720. true);
  1721. request.upload_data_stream = &upload_data_stream;
  1722. }
  1723. session_deps_.net_log = net::NetLog::Get();
  1724. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1725. SSLSocketDataProvider ssl1(ASYNC, OK);
  1726. SSLSocketDataProvider ssl2(ASYNC, OK);
  1727. if (use_spdy) {
  1728. ssl1.next_proto = kProtoHTTP2;
  1729. ssl2.next_proto = kProtoHTTP2;
  1730. }
  1731. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  1732. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  1733. // SPDY versions of the request and response.
  1734. spdy::Http2HeaderBlock spdy_post_header_block;
  1735. spdy_post_header_block[spdy::kHttp2MethodHeader] = "POST";
  1736. spdy_util.AddUrlToHeaderBlock(request.url.spec(), &spdy_post_header_block);
  1737. spdy::SpdySerializedFrame spdy_request(
  1738. chunked_upload
  1739. ? spdy_util.ConstructSpdyHeaders(1, std::move(spdy_post_header_block),
  1740. DEFAULT_PRIORITY, false)
  1741. : spdy_util.ConstructSpdyGet(request.url.spec().c_str(), 1,
  1742. DEFAULT_PRIORITY));
  1743. spdy::SpdySerializedFrame spdy_request_body(
  1744. spdy_util.ConstructSpdyDataFrame(1, "foobar", true));
  1745. spdy::SpdySerializedFrame spdy_response(
  1746. spdy_util.ConstructSpdyGetReply(nullptr, 0, 1));
  1747. spdy::SpdySerializedFrame spdy_data(
  1748. spdy_util.ConstructSpdyDataFrame(1, "hello", true));
  1749. // HTTP/1.1 versions of the request and response.
  1750. const std::string http_request =
  1751. std::string(chunked_upload ? "POST" : "GET") +
  1752. " / HTTP/1.1\r\n"
  1753. "Host: www.foo.com\r\n"
  1754. "Connection: keep-alive\r\n" +
  1755. (chunked_upload ? "Transfer-Encoding: chunked\r\n\r\n" : "\r\n");
  1756. const char* kHttpRequest = http_request.c_str();
  1757. const char kHttpResponse[] = "HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n";
  1758. const char kHttpData[] = "hello";
  1759. std::vector<MockRead> data1_reads;
  1760. std::vector<MockWrite> data1_writes;
  1761. if (write_failure) {
  1762. ASSERT_FALSE(read_failure);
  1763. data1_writes.push_back(*write_failure);
  1764. data1_reads.emplace_back(ASYNC, OK);
  1765. } else {
  1766. ASSERT_TRUE(read_failure);
  1767. if (use_spdy) {
  1768. data1_writes.push_back(CreateMockWrite(spdy_request));
  1769. if (chunked_upload)
  1770. data1_writes.push_back(CreateMockWrite(spdy_request_body));
  1771. } else {
  1772. data1_writes.emplace_back(kHttpRequest);
  1773. if (chunked_upload) {
  1774. data1_writes.emplace_back("6\r\nfoobar\r\n");
  1775. data1_writes.emplace_back("0\r\n\r\n");
  1776. }
  1777. }
  1778. data1_reads.push_back(*read_failure);
  1779. }
  1780. StaticSocketDataProvider data1(data1_reads, data1_writes);
  1781. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  1782. std::vector<MockRead> data2_reads;
  1783. std::vector<MockWrite> data2_writes;
  1784. if (use_spdy) {
  1785. int seq = 0;
  1786. data2_writes.push_back(CreateMockWrite(spdy_request, seq++, ASYNC));
  1787. if (chunked_upload)
  1788. data2_writes.push_back(CreateMockWrite(spdy_request_body, seq++, ASYNC));
  1789. data2_reads.push_back(CreateMockRead(spdy_response, seq++, ASYNC));
  1790. data2_reads.push_back(CreateMockRead(spdy_data, seq++, ASYNC));
  1791. data2_reads.emplace_back(ASYNC, OK, seq++);
  1792. } else {
  1793. int seq = 0;
  1794. data2_writes.emplace_back(ASYNC, kHttpRequest, strlen(kHttpRequest), seq++);
  1795. if (chunked_upload) {
  1796. data2_writes.emplace_back(ASYNC, "6\r\nfoobar\r\n", 11, seq++);
  1797. data2_writes.emplace_back(ASYNC, "0\r\n\r\n", 5, seq++);
  1798. }
  1799. data2_reads.emplace_back(ASYNC, kHttpResponse, strlen(kHttpResponse),
  1800. seq++);
  1801. data2_reads.emplace_back(ASYNC, kHttpData, strlen(kHttpData), seq++);
  1802. data2_reads.emplace_back(ASYNC, OK, seq++);
  1803. }
  1804. SequencedSocketData data2(data2_reads, data2_writes);
  1805. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  1806. // Preconnect a socket.
  1807. session->http_stream_factory()->PreconnectStreams(1, request);
  1808. // Wait for the preconnect to complete.
  1809. // TODO(davidben): Some way to wait for an idle socket count might be handy.
  1810. base::RunLoop().RunUntilIdle();
  1811. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  1812. // Make the request.
  1813. TestCompletionCallback callback;
  1814. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1815. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1816. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1817. rv = callback.WaitForResult();
  1818. EXPECT_THAT(rv, IsOk());
  1819. LoadTimingInfo load_timing_info;
  1820. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  1821. TestLoadTimingNotReused(
  1822. load_timing_info,
  1823. CONNECT_TIMING_HAS_DNS_TIMES|CONNECT_TIMING_HAS_SSL_TIMES);
  1824. const HttpResponseInfo* response = trans.GetResponseInfo();
  1825. ASSERT_TRUE(response);
  1826. EXPECT_TRUE(response->headers);
  1827. if (response->was_fetched_via_spdy) {
  1828. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  1829. } else {
  1830. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  1831. }
  1832. std::string response_data;
  1833. rv = ReadTransaction(&trans, &response_data);
  1834. EXPECT_THAT(rv, IsOk());
  1835. EXPECT_EQ(kHttpData, response_data);
  1836. }
  1837. // Test that we do not retry indefinitely when a server sends an error like
  1838. // ERR_HTTP2_PING_FAILED, ERR_HTTP2_SERVER_REFUSED_STREAM,
  1839. // ERR_QUIC_HANDSHAKE_FAILED or ERR_QUIC_PROTOCOL_ERROR.
  1840. TEST_F(HttpNetworkTransactionTest, FiniteRetriesOnIOError) {
  1841. HttpRequestInfo request;
  1842. request.method = "GET";
  1843. request.url = GURL("https://www.foo.com/");
  1844. request.traffic_annotation =
  1845. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1846. // Check whether we give up after the third try.
  1847. // Construct an HTTP2 request and a "Go away" response.
  1848. spdy::SpdySerializedFrame spdy_request(spdy_util_.ConstructSpdyGet(
  1849. request.url.spec().c_str(), 1, DEFAULT_PRIORITY));
  1850. spdy::SpdySerializedFrame spdy_response_go_away(
  1851. spdy_util_.ConstructSpdyGoAway(0));
  1852. MockRead data_read1[] = {CreateMockRead(spdy_response_go_away)};
  1853. MockWrite data_write[] = {CreateMockWrite(spdy_request, 0)};
  1854. // Three go away responses.
  1855. StaticSocketDataProvider data1(data_read1, data_write);
  1856. StaticSocketDataProvider data2(data_read1, data_write);
  1857. StaticSocketDataProvider data3(data_read1, data_write);
  1858. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  1859. AddSSLSocketData();
  1860. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  1861. AddSSLSocketData();
  1862. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  1863. AddSSLSocketData();
  1864. TestCompletionCallback callback;
  1865. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1866. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1867. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1868. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1869. rv = callback.WaitForResult();
  1870. EXPECT_THAT(rv, IsError(ERR_HTTP2_SERVER_REFUSED_STREAM));
  1871. }
  1872. TEST_F(HttpNetworkTransactionTest, RetryTwiceOnIOError) {
  1873. HttpRequestInfo request;
  1874. request.method = "GET";
  1875. request.url = GURL("https://www.foo.com/");
  1876. request.traffic_annotation =
  1877. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  1878. // Check whether we try atleast thrice before giving up.
  1879. // Construct an HTTP2 request and a "Go away" response.
  1880. spdy::SpdySerializedFrame spdy_request(spdy_util_.ConstructSpdyGet(
  1881. request.url.spec().c_str(), 1, DEFAULT_PRIORITY));
  1882. spdy::SpdySerializedFrame spdy_response_go_away(
  1883. spdy_util_.ConstructSpdyGoAway(0));
  1884. MockRead data_read1[] = {CreateMockRead(spdy_response_go_away)};
  1885. MockWrite data_write[] = {CreateMockWrite(spdy_request, 0)};
  1886. // Construct a non error HTTP2 response.
  1887. spdy::SpdySerializedFrame spdy_response_no_error(
  1888. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  1889. spdy::SpdySerializedFrame spdy_data(
  1890. spdy_util_.ConstructSpdyDataFrame(1, true));
  1891. MockRead data_read2[] = {CreateMockRead(spdy_response_no_error, 1),
  1892. CreateMockRead(spdy_data, 2)};
  1893. // Two error responses.
  1894. StaticSocketDataProvider data1(data_read1, data_write);
  1895. StaticSocketDataProvider data2(data_read1, data_write);
  1896. // Followed by a success response.
  1897. SequencedSocketData data3(data_read2, data_write);
  1898. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  1899. AddSSLSocketData();
  1900. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  1901. AddSSLSocketData();
  1902. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  1903. AddSSLSocketData();
  1904. TestCompletionCallback callback;
  1905. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  1906. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  1907. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  1908. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  1909. rv = callback.WaitForResult();
  1910. EXPECT_THAT(rv, IsOk());
  1911. }
  1912. TEST_F(HttpNetworkTransactionTest, KeepAliveConnectionNotConnectedOnWrite) {
  1913. MockWrite write_failure(ASYNC, ERR_SOCKET_NOT_CONNECTED);
  1914. KeepAliveConnectionResendRequestTest(&write_failure, nullptr);
  1915. }
  1916. TEST_F(HttpNetworkTransactionTest, KeepAliveConnectionReset) {
  1917. MockRead read_failure(ASYNC, ERR_CONNECTION_RESET);
  1918. KeepAliveConnectionResendRequestTest(nullptr, &read_failure);
  1919. }
  1920. TEST_F(HttpNetworkTransactionTest, KeepAliveConnectionEOF) {
  1921. MockRead read_failure(SYNCHRONOUS, OK); // EOF
  1922. KeepAliveConnectionResendRequestTest(nullptr, &read_failure);
  1923. }
  1924. // Make sure that on a 408 response (Request Timeout), the request is retried,
  1925. // if the socket was a reused keep alive socket.
  1926. TEST_F(HttpNetworkTransactionTest, KeepAlive408) {
  1927. MockRead read_failure(SYNCHRONOUS,
  1928. "HTTP/1.1 408 Request Timeout\r\n"
  1929. "Connection: Keep-Alive\r\n"
  1930. "Content-Length: 6\r\n\r\n"
  1931. "Pickle");
  1932. KeepAliveConnectionResendRequestTest(nullptr, &read_failure);
  1933. }
  1934. TEST_F(HttpNetworkTransactionTest, PreconnectErrorNotConnectedOnWrite) {
  1935. MockWrite write_failure(ASYNC, ERR_SOCKET_NOT_CONNECTED);
  1936. PreconnectErrorResendRequestTest(&write_failure, nullptr,
  1937. false /* use_spdy */);
  1938. PreconnectErrorResendRequestTest(
  1939. &write_failure, nullptr, false /* use_spdy */, true /* chunked_upload */);
  1940. }
  1941. TEST_F(HttpNetworkTransactionTest, PreconnectErrorReset) {
  1942. MockRead read_failure(ASYNC, ERR_CONNECTION_RESET);
  1943. PreconnectErrorResendRequestTest(nullptr, &read_failure,
  1944. false /* use_spdy */);
  1945. PreconnectErrorResendRequestTest(nullptr, &read_failure, false /* use_spdy */,
  1946. true /* chunked_upload */);
  1947. }
  1948. TEST_F(HttpNetworkTransactionTest, PreconnectErrorEOF) {
  1949. MockRead read_failure(SYNCHRONOUS, OK); // EOF
  1950. PreconnectErrorResendRequestTest(nullptr, &read_failure,
  1951. false /* use_spdy */);
  1952. PreconnectErrorResendRequestTest(nullptr, &read_failure, false /* use_spdy */,
  1953. true /* chunked_upload */);
  1954. }
  1955. TEST_F(HttpNetworkTransactionTest, PreconnectErrorAsyncEOF) {
  1956. MockRead read_failure(ASYNC, OK); // EOF
  1957. PreconnectErrorResendRequestTest(nullptr, &read_failure,
  1958. false /* use_spdy */);
  1959. PreconnectErrorResendRequestTest(nullptr, &read_failure, false /* use_spdy */,
  1960. true /* chunked_upload */);
  1961. }
  1962. // Make sure that on a 408 response (Request Timeout), the request is retried,
  1963. // if the socket was a preconnected (UNUSED_IDLE) socket.
  1964. TEST_F(HttpNetworkTransactionTest, RetryOnIdle408) {
  1965. MockRead read_failure(SYNCHRONOUS,
  1966. "HTTP/1.1 408 Request Timeout\r\n"
  1967. "Connection: Keep-Alive\r\n"
  1968. "Content-Length: 6\r\n\r\n"
  1969. "Pickle");
  1970. KeepAliveConnectionResendRequestTest(nullptr, &read_failure);
  1971. PreconnectErrorResendRequestTest(nullptr, &read_failure,
  1972. false /* use_spdy */);
  1973. PreconnectErrorResendRequestTest(nullptr, &read_failure, false /* use_spdy */,
  1974. true /* chunked_upload */);
  1975. }
  1976. TEST_F(HttpNetworkTransactionTest, SpdyPreconnectErrorNotConnectedOnWrite) {
  1977. MockWrite write_failure(ASYNC, ERR_SOCKET_NOT_CONNECTED);
  1978. PreconnectErrorResendRequestTest(&write_failure, nullptr,
  1979. true /* use_spdy */);
  1980. PreconnectErrorResendRequestTest(&write_failure, nullptr, true /* use_spdy */,
  1981. true /* chunked_upload */);
  1982. }
  1983. TEST_F(HttpNetworkTransactionTest, SpdyPreconnectErrorReset) {
  1984. MockRead read_failure(ASYNC, ERR_CONNECTION_RESET);
  1985. PreconnectErrorResendRequestTest(nullptr, &read_failure, true /* use_spdy */);
  1986. PreconnectErrorResendRequestTest(nullptr, &read_failure, true /* use_spdy */,
  1987. true /* chunked_upload */);
  1988. }
  1989. TEST_F(HttpNetworkTransactionTest, SpdyPreconnectErrorEOF) {
  1990. MockRead read_failure(SYNCHRONOUS, OK); // EOF
  1991. PreconnectErrorResendRequestTest(nullptr, &read_failure, true /* use_spdy */);
  1992. PreconnectErrorResendRequestTest(nullptr, &read_failure, true /* use_spdy */,
  1993. true /* chunked_upload */);
  1994. }
  1995. TEST_F(HttpNetworkTransactionTest, SpdyPreconnectErrorAsyncEOF) {
  1996. MockRead read_failure(ASYNC, OK); // EOF
  1997. PreconnectErrorResendRequestTest(nullptr, &read_failure, true /* use_spdy */);
  1998. PreconnectErrorResendRequestTest(nullptr, &read_failure, true /* use_spdy */,
  1999. true /* chunked_upload */);
  2000. }
  2001. TEST_F(HttpNetworkTransactionTest, NonKeepAliveConnectionReset) {
  2002. HttpRequestInfo request;
  2003. request.method = "GET";
  2004. request.url = GURL("http://www.example.org/");
  2005. request.traffic_annotation =
  2006. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2007. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2008. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2009. MockRead data_reads[] = {
  2010. MockRead(ASYNC, ERR_CONNECTION_RESET),
  2011. MockRead("HTTP/1.0 200 OK\r\n\r\n"), // Should not be used
  2012. MockRead("hello world"),
  2013. MockRead(SYNCHRONOUS, OK),
  2014. };
  2015. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  2016. session_deps_.socket_factory->AddSocketDataProvider(&data);
  2017. TestCompletionCallback callback;
  2018. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  2019. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2020. rv = callback.WaitForResult();
  2021. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  2022. IPEndPoint endpoint;
  2023. EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint));
  2024. EXPECT_LT(0u, endpoint.address().size());
  2025. }
  2026. // What do various browsers do when the server closes a non-keepalive
  2027. // connection without sending any response header or body?
  2028. //
  2029. // IE7: error page
  2030. // Safari 3.1.2 (Windows): error page
  2031. // Firefox 3.0.1: blank page
  2032. // Opera 9.52: after five attempts, blank page
  2033. // Us with WinHTTP: error page (ERR_INVALID_RESPONSE)
  2034. // Us: error page (EMPTY_RESPONSE)
  2035. TEST_F(HttpNetworkTransactionTest, NonKeepAliveConnectionEOF) {
  2036. MockRead data_reads[] = {
  2037. MockRead(SYNCHRONOUS, OK), // EOF
  2038. MockRead("HTTP/1.0 200 OK\r\n\r\n"), // Should not be used
  2039. MockRead("hello world"),
  2040. MockRead(SYNCHRONOUS, OK),
  2041. };
  2042. SimpleGetHelperResult out = SimpleGetHelper(data_reads);
  2043. EXPECT_THAT(out.rv, IsError(ERR_EMPTY_RESPONSE));
  2044. }
  2045. // Next 2 cases (KeepAliveEarlyClose and KeepAliveEarlyClose2) are regression
  2046. // tests. There was a bug causing HttpNetworkTransaction to hang in the
  2047. // destructor in such situations.
  2048. // See http://crbug.com/154712 and http://crbug.com/156609.
  2049. TEST_F(HttpNetworkTransactionTest, KeepAliveEarlyClose) {
  2050. HttpRequestInfo request;
  2051. request.method = "GET";
  2052. request.url = GURL("http://www.example.org/");
  2053. request.traffic_annotation =
  2054. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2055. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2056. auto trans =
  2057. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2058. MockRead data_reads[] = {
  2059. MockRead("HTTP/1.0 200 OK\r\n"),
  2060. MockRead("Connection: keep-alive\r\n"),
  2061. MockRead("Content-Length: 100\r\n\r\n"),
  2062. MockRead("hello"),
  2063. MockRead(SYNCHRONOUS, 0),
  2064. };
  2065. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  2066. session_deps_.socket_factory->AddSocketDataProvider(&data);
  2067. TestCompletionCallback callback;
  2068. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  2069. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2070. rv = callback.WaitForResult();
  2071. EXPECT_THAT(rv, IsOk());
  2072. scoped_refptr<IOBufferWithSize> io_buf =
  2073. base::MakeRefCounted<IOBufferWithSize>(100);
  2074. rv = trans->Read(io_buf.get(), io_buf->size(), callback.callback());
  2075. if (rv == ERR_IO_PENDING)
  2076. rv = callback.WaitForResult();
  2077. EXPECT_EQ(5, rv);
  2078. rv = trans->Read(io_buf.get(), io_buf->size(), callback.callback());
  2079. EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH));
  2080. trans.reset();
  2081. base::RunLoop().RunUntilIdle();
  2082. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  2083. }
  2084. TEST_F(HttpNetworkTransactionTest, KeepAliveEarlyClose2) {
  2085. HttpRequestInfo request;
  2086. request.method = "GET";
  2087. request.url = GURL("http://www.example.org/");
  2088. request.traffic_annotation =
  2089. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2090. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2091. auto trans =
  2092. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2093. MockRead data_reads[] = {
  2094. MockRead("HTTP/1.0 200 OK\r\n"),
  2095. MockRead("Connection: keep-alive\r\n"),
  2096. MockRead("Content-Length: 100\r\n\r\n"),
  2097. MockRead(SYNCHRONOUS, 0),
  2098. };
  2099. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  2100. session_deps_.socket_factory->AddSocketDataProvider(&data);
  2101. TestCompletionCallback callback;
  2102. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  2103. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2104. rv = callback.WaitForResult();
  2105. EXPECT_THAT(rv, IsOk());
  2106. scoped_refptr<IOBufferWithSize> io_buf(
  2107. base::MakeRefCounted<IOBufferWithSize>(100));
  2108. rv = trans->Read(io_buf.get(), io_buf->size(), callback.callback());
  2109. if (rv == ERR_IO_PENDING)
  2110. rv = callback.WaitForResult();
  2111. EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH));
  2112. trans.reset();
  2113. base::RunLoop().RunUntilIdle();
  2114. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  2115. }
  2116. // Test that we correctly reuse a keep-alive connection after not explicitly
  2117. // reading the body.
  2118. TEST_F(HttpNetworkTransactionTest, KeepAliveAfterUnreadBody) {
  2119. HttpRequestInfo request;
  2120. request.method = "GET";
  2121. request.url = GURL("http://www.foo.com/");
  2122. request.traffic_annotation =
  2123. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2124. session_deps_.net_log = net::NetLog::Get();
  2125. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2126. const char* request_data =
  2127. "GET / HTTP/1.1\r\n"
  2128. "Host: www.foo.com\r\n"
  2129. "Connection: keep-alive\r\n\r\n";
  2130. MockWrite data_writes[] = {
  2131. MockWrite(ASYNC, 0, request_data), MockWrite(ASYNC, 2, request_data),
  2132. MockWrite(ASYNC, 4, request_data), MockWrite(ASYNC, 6, request_data),
  2133. MockWrite(ASYNC, 8, request_data), MockWrite(ASYNC, 10, request_data),
  2134. MockWrite(ASYNC, 12, request_data), MockWrite(ASYNC, 14, request_data),
  2135. MockWrite(ASYNC, 17, request_data), MockWrite(ASYNC, 20, request_data),
  2136. };
  2137. // Note that because all these reads happen in the same
  2138. // StaticSocketDataProvider, it shows that the same socket is being reused for
  2139. // all transactions.
  2140. MockRead data_reads[] = {
  2141. MockRead(ASYNC, 1, "HTTP/1.1 204 No Content\r\n\r\n"),
  2142. MockRead(ASYNC, 3, "HTTP/1.1 205 Reset Content\r\n\r\n"),
  2143. MockRead(ASYNC, 5, "HTTP/1.1 304 Not Modified\r\n\r\n"),
  2144. MockRead(ASYNC, 7,
  2145. "HTTP/1.1 302 Found\r\n"
  2146. "Content-Length: 0\r\n\r\n"),
  2147. MockRead(ASYNC, 9,
  2148. "HTTP/1.1 302 Found\r\n"
  2149. "Content-Length: 5\r\n\r\n"
  2150. "hello"),
  2151. MockRead(ASYNC, 11,
  2152. "HTTP/1.1 301 Moved Permanently\r\n"
  2153. "Content-Length: 0\r\n\r\n"),
  2154. MockRead(ASYNC, 13,
  2155. "HTTP/1.1 301 Moved Permanently\r\n"
  2156. "Content-Length: 5\r\n\r\n"
  2157. "hello"),
  2158. // In the next two rounds, IsConnectedAndIdle returns false, due to
  2159. // the set_busy_before_sync_reads(true) call, while the
  2160. // HttpNetworkTransaction is being shut down, but the socket is still
  2161. // reuseable. See http://crbug.com/544255.
  2162. MockRead(ASYNC, 15,
  2163. "HTTP/1.1 200 Hunky-Dory\r\n"
  2164. "Content-Length: 5\r\n\r\n"),
  2165. MockRead(SYNCHRONOUS, 16, "hello"),
  2166. MockRead(ASYNC, 18,
  2167. "HTTP/1.1 200 Hunky-Dory\r\n"
  2168. "Content-Length: 5\r\n\r\n"
  2169. "he"),
  2170. MockRead(SYNCHRONOUS, 19, "llo"),
  2171. // The body of the final request is actually read.
  2172. MockRead(ASYNC, 21, "HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  2173. MockRead(ASYNC, 22, "hello"),
  2174. };
  2175. SequencedSocketData data(data_reads, data_writes);
  2176. data.set_busy_before_sync_reads(true);
  2177. session_deps_.socket_factory->AddSocketDataProvider(&data);
  2178. const int kNumUnreadBodies = std::size(data_writes) - 1;
  2179. std::string response_lines[kNumUnreadBodies];
  2180. uint32_t first_socket_log_id = NetLogSource::kInvalidId;
  2181. for (size_t i = 0; i < kNumUnreadBodies; ++i) {
  2182. TestCompletionCallback callback;
  2183. auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
  2184. session.get());
  2185. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  2186. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2187. LoadTimingInfo load_timing_info;
  2188. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  2189. if (i == 0) {
  2190. TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_DNS_TIMES);
  2191. first_socket_log_id = load_timing_info.socket_log_id;
  2192. } else {
  2193. TestLoadTimingReused(load_timing_info);
  2194. EXPECT_EQ(first_socket_log_id, load_timing_info.socket_log_id);
  2195. }
  2196. const HttpResponseInfo* response = trans->GetResponseInfo();
  2197. ASSERT_TRUE(response);
  2198. ASSERT_TRUE(response->headers);
  2199. response_lines[i] = response->headers->GetStatusLine();
  2200. // Delete the transaction without reading the response bodies. Then spin
  2201. // the message loop, so the response bodies are drained.
  2202. trans.reset();
  2203. base::RunLoop().RunUntilIdle();
  2204. }
  2205. const char* const kStatusLines[] = {
  2206. "HTTP/1.1 204 No Content",
  2207. "HTTP/1.1 205 Reset Content",
  2208. "HTTP/1.1 304 Not Modified",
  2209. "HTTP/1.1 302 Found",
  2210. "HTTP/1.1 302 Found",
  2211. "HTTP/1.1 301 Moved Permanently",
  2212. "HTTP/1.1 301 Moved Permanently",
  2213. "HTTP/1.1 200 Hunky-Dory",
  2214. "HTTP/1.1 200 Hunky-Dory",
  2215. };
  2216. static_assert(kNumUnreadBodies == std::size(kStatusLines),
  2217. "forgot to update kStatusLines");
  2218. for (int i = 0; i < kNumUnreadBodies; ++i)
  2219. EXPECT_EQ(kStatusLines[i], response_lines[i]);
  2220. TestCompletionCallback callback;
  2221. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2222. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  2223. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2224. const HttpResponseInfo* response = trans.GetResponseInfo();
  2225. ASSERT_TRUE(response);
  2226. ASSERT_TRUE(response->headers);
  2227. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  2228. std::string response_data;
  2229. rv = ReadTransaction(&trans, &response_data);
  2230. EXPECT_THAT(rv, IsOk());
  2231. EXPECT_EQ("hello", response_data);
  2232. }
  2233. // Sockets that receive extra data after a response is complete should not be
  2234. // reused.
  2235. TEST_F(HttpNetworkTransactionTest, KeepAliveWithUnusedData1) {
  2236. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2237. MockWrite data_writes1[] = {
  2238. MockWrite("HEAD / HTTP/1.1\r\n"
  2239. "Host: www.borked.com\r\n"
  2240. "Connection: keep-alive\r\n\r\n"),
  2241. };
  2242. MockRead data_reads1[] = {
  2243. MockRead("HTTP/1.1 200 OK\r\n"
  2244. "Connection: keep-alive\r\n"
  2245. "Content-Length: 22\r\n\r\n"
  2246. "This server is borked."),
  2247. };
  2248. MockWrite data_writes2[] = {
  2249. MockWrite("GET /foo HTTP/1.1\r\n"
  2250. "Host: www.borked.com\r\n"
  2251. "Connection: keep-alive\r\n\r\n"),
  2252. };
  2253. MockRead data_reads2[] = {
  2254. MockRead("HTTP/1.1 200 OK\r\n"
  2255. "Content-Length: 3\r\n\r\n"
  2256. "foo"),
  2257. };
  2258. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2259. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2260. StaticSocketDataProvider data2(data_reads2, data_writes2);
  2261. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  2262. TestCompletionCallback callback;
  2263. HttpRequestInfo request1;
  2264. request1.method = "HEAD";
  2265. request1.url = GURL("http://www.borked.com/");
  2266. request1.traffic_annotation =
  2267. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2268. auto trans1 =
  2269. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2270. int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  2271. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2272. const HttpResponseInfo* response1 = trans1->GetResponseInfo();
  2273. ASSERT_TRUE(response1);
  2274. ASSERT_TRUE(response1->headers);
  2275. EXPECT_EQ(200, response1->headers->response_code());
  2276. EXPECT_TRUE(response1->headers->IsKeepAlive());
  2277. std::string response_data1;
  2278. EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk());
  2279. EXPECT_EQ("", response_data1);
  2280. // Deleting the transaction attempts to release the socket back into the
  2281. // socket pool.
  2282. trans1.reset();
  2283. HttpRequestInfo request2;
  2284. request2.method = "GET";
  2285. request2.url = GURL("http://www.borked.com/foo");
  2286. request2.traffic_annotation =
  2287. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2288. auto trans2 =
  2289. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2290. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  2291. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2292. const HttpResponseInfo* response2 = trans2->GetResponseInfo();
  2293. ASSERT_TRUE(response2);
  2294. ASSERT_TRUE(response2->headers);
  2295. EXPECT_EQ(200, response2->headers->response_code());
  2296. std::string response_data2;
  2297. EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk());
  2298. EXPECT_EQ("foo", response_data2);
  2299. }
  2300. TEST_F(HttpNetworkTransactionTest, KeepAliveWithUnusedData2) {
  2301. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2302. MockWrite data_writes1[] = {
  2303. MockWrite("GET / HTTP/1.1\r\n"
  2304. "Host: www.borked.com\r\n"
  2305. "Connection: keep-alive\r\n\r\n"),
  2306. };
  2307. MockRead data_reads1[] = {
  2308. MockRead("HTTP/1.1 200 OK\r\n"
  2309. "Connection: keep-alive\r\n"
  2310. "Content-Length: 22\r\n\r\n"
  2311. "This server is borked."
  2312. "Bonus data!"),
  2313. };
  2314. MockWrite data_writes2[] = {
  2315. MockWrite("GET /foo HTTP/1.1\r\n"
  2316. "Host: www.borked.com\r\n"
  2317. "Connection: keep-alive\r\n\r\n"),
  2318. };
  2319. MockRead data_reads2[] = {
  2320. MockRead("HTTP/1.1 200 OK\r\n"
  2321. "Content-Length: 3\r\n\r\n"
  2322. "foo"),
  2323. };
  2324. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2325. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2326. StaticSocketDataProvider data2(data_reads2, data_writes2);
  2327. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  2328. TestCompletionCallback callback;
  2329. HttpRequestInfo request1;
  2330. request1.method = "GET";
  2331. request1.url = GURL("http://www.borked.com/");
  2332. request1.traffic_annotation =
  2333. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2334. auto trans1 =
  2335. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2336. int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  2337. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2338. const HttpResponseInfo* response1 = trans1->GetResponseInfo();
  2339. ASSERT_TRUE(response1);
  2340. ASSERT_TRUE(response1->headers);
  2341. EXPECT_EQ(200, response1->headers->response_code());
  2342. EXPECT_TRUE(response1->headers->IsKeepAlive());
  2343. std::string response_data1;
  2344. EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk());
  2345. EXPECT_EQ("This server is borked.", response_data1);
  2346. // Deleting the transaction attempts to release the socket back into the
  2347. // socket pool.
  2348. trans1.reset();
  2349. HttpRequestInfo request2;
  2350. request2.method = "GET";
  2351. request2.url = GURL("http://www.borked.com/foo");
  2352. request2.traffic_annotation =
  2353. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2354. auto trans2 =
  2355. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2356. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  2357. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2358. const HttpResponseInfo* response2 = trans2->GetResponseInfo();
  2359. ASSERT_TRUE(response2);
  2360. ASSERT_TRUE(response2->headers);
  2361. EXPECT_EQ(200, response2->headers->response_code());
  2362. std::string response_data2;
  2363. EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk());
  2364. EXPECT_EQ("foo", response_data2);
  2365. }
  2366. TEST_F(HttpNetworkTransactionTest, KeepAliveWithUnusedData3) {
  2367. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2368. MockWrite data_writes1[] = {
  2369. MockWrite("GET / HTTP/1.1\r\n"
  2370. "Host: www.borked.com\r\n"
  2371. "Connection: keep-alive\r\n\r\n"),
  2372. };
  2373. MockRead data_reads1[] = {
  2374. MockRead("HTTP/1.1 200 OK\r\n"
  2375. "Connection: keep-alive\r\n"
  2376. "Transfer-Encoding: chunked\r\n\r\n"),
  2377. MockRead("16\r\nThis server is borked.\r\n"),
  2378. MockRead("0\r\n\r\nBonus data!"),
  2379. };
  2380. MockWrite data_writes2[] = {
  2381. MockWrite("GET /foo HTTP/1.1\r\n"
  2382. "Host: www.borked.com\r\n"
  2383. "Connection: keep-alive\r\n\r\n"),
  2384. };
  2385. MockRead data_reads2[] = {
  2386. MockRead("HTTP/1.1 200 OK\r\n"
  2387. "Content-Length: 3\r\n\r\n"
  2388. "foo"),
  2389. };
  2390. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2391. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2392. StaticSocketDataProvider data2(data_reads2, data_writes2);
  2393. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  2394. TestCompletionCallback callback;
  2395. HttpRequestInfo request1;
  2396. request1.method = "GET";
  2397. request1.url = GURL("http://www.borked.com/");
  2398. request1.traffic_annotation =
  2399. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2400. auto trans1 =
  2401. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2402. int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  2403. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2404. const HttpResponseInfo* response1 = trans1->GetResponseInfo();
  2405. ASSERT_TRUE(response1);
  2406. ASSERT_TRUE(response1->headers);
  2407. EXPECT_EQ(200, response1->headers->response_code());
  2408. EXPECT_TRUE(response1->headers->IsKeepAlive());
  2409. std::string response_data1;
  2410. EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk());
  2411. EXPECT_EQ("This server is borked.", response_data1);
  2412. // Deleting the transaction attempts to release the socket back into the
  2413. // socket pool.
  2414. trans1.reset();
  2415. HttpRequestInfo request2;
  2416. request2.method = "GET";
  2417. request2.url = GURL("http://www.borked.com/foo");
  2418. request2.traffic_annotation =
  2419. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2420. auto trans2 =
  2421. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2422. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  2423. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2424. const HttpResponseInfo* response2 = trans2->GetResponseInfo();
  2425. ASSERT_TRUE(response2);
  2426. ASSERT_TRUE(response2->headers);
  2427. EXPECT_EQ(200, response2->headers->response_code());
  2428. std::string response_data2;
  2429. EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk());
  2430. EXPECT_EQ("foo", response_data2);
  2431. }
  2432. // This is a little different from the others - it tests the case that the
  2433. // HttpStreamParser doesn't know if there's extra data on a socket or not when
  2434. // the HttpNetworkTransaction is torn down, because the response body hasn't
  2435. // been read from yet, but the request goes through the HttpResponseBodyDrainer.
  2436. TEST_F(HttpNetworkTransactionTest, KeepAliveWithUnusedData4) {
  2437. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2438. MockWrite data_writes1[] = {
  2439. MockWrite("GET / HTTP/1.1\r\n"
  2440. "Host: www.borked.com\r\n"
  2441. "Connection: keep-alive\r\n\r\n"),
  2442. };
  2443. MockRead data_reads1[] = {
  2444. MockRead("HTTP/1.1 200 OK\r\n"
  2445. "Connection: keep-alive\r\n"
  2446. "Transfer-Encoding: chunked\r\n\r\n"),
  2447. MockRead("16\r\nThis server is borked.\r\n"),
  2448. MockRead("0\r\n\r\nBonus data!"),
  2449. };
  2450. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2451. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2452. TestCompletionCallback callback;
  2453. HttpRequestInfo request1;
  2454. request1.method = "GET";
  2455. request1.url = GURL("http://www.borked.com/");
  2456. request1.traffic_annotation =
  2457. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2458. auto trans =
  2459. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  2460. int rv = trans->Start(&request1, callback.callback(), NetLogWithSource());
  2461. EXPECT_THAT(callback.GetResult(rv), IsOk());
  2462. const HttpResponseInfo* response1 = trans->GetResponseInfo();
  2463. ASSERT_TRUE(response1);
  2464. ASSERT_TRUE(response1->headers);
  2465. EXPECT_EQ(200, response1->headers->response_code());
  2466. EXPECT_TRUE(response1->headers->IsKeepAlive());
  2467. // Deleting the transaction creates an HttpResponseBodyDrainer to read the
  2468. // response body.
  2469. trans.reset();
  2470. // Let the HttpResponseBodyDrainer drain the socket. It should determine the
  2471. // socket can't be reused, rather than returning it to the socket pool.
  2472. base::RunLoop().RunUntilIdle();
  2473. // There should be no idle sockets in the pool.
  2474. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  2475. }
  2476. // Test the request-challenge-retry sequence for basic auth.
  2477. // (basic auth is the easiest to mock, because it has no randomness).
  2478. TEST_F(HttpNetworkTransactionTest, BasicAuth) {
  2479. HttpRequestInfo request;
  2480. request.method = "GET";
  2481. request.url = GURL("http://www.example.org/");
  2482. request.traffic_annotation =
  2483. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2484. session_deps_.net_log = net::NetLog::Get();
  2485. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2486. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2487. MockWrite data_writes1[] = {
  2488. MockWrite(
  2489. "GET / HTTP/1.1\r\n"
  2490. "Host: www.example.org\r\n"
  2491. "Connection: keep-alive\r\n\r\n"),
  2492. };
  2493. MockRead data_reads1[] = {
  2494. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  2495. // Give a couple authenticate options (only the middle one is actually
  2496. // supported).
  2497. MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed.
  2498. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  2499. MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"),
  2500. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2501. // Large content-length -- won't matter, as connection will be reset.
  2502. MockRead("Content-Length: 10000\r\n\r\n"),
  2503. MockRead(SYNCHRONOUS, ERR_FAILED),
  2504. };
  2505. // After calling trans->RestartWithAuth(), this is the request we should
  2506. // be issuing -- the final header line contains the credentials.
  2507. MockWrite data_writes2[] = {
  2508. MockWrite(
  2509. "GET / HTTP/1.1\r\n"
  2510. "Host: www.example.org\r\n"
  2511. "Connection: keep-alive\r\n"
  2512. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  2513. };
  2514. // Lastly, the server responds with the actual content.
  2515. MockRead data_reads2[] = {
  2516. MockRead("HTTP/1.0 200 OK\r\n"),
  2517. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2518. MockRead("Content-Length: 100\r\n\r\n"),
  2519. MockRead(SYNCHRONOUS, OK),
  2520. };
  2521. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2522. StaticSocketDataProvider data2(data_reads2, data_writes2);
  2523. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2524. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  2525. TestCompletionCallback callback1;
  2526. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  2527. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2528. rv = callback1.WaitForResult();
  2529. EXPECT_THAT(rv, IsOk());
  2530. LoadTimingInfo load_timing_info1;
  2531. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info1));
  2532. TestLoadTimingNotReused(load_timing_info1, CONNECT_TIMING_HAS_DNS_TIMES);
  2533. int64_t writes_size1 = CountWriteBytes(data_writes1);
  2534. EXPECT_EQ(writes_size1, trans.GetTotalSentBytes());
  2535. int64_t reads_size1 = CountReadBytes(data_reads1);
  2536. EXPECT_EQ(reads_size1, trans.GetTotalReceivedBytes());
  2537. const HttpResponseInfo* response = trans.GetResponseInfo();
  2538. ASSERT_TRUE(response);
  2539. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  2540. TestCompletionCallback callback2;
  2541. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  2542. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2543. rv = callback2.WaitForResult();
  2544. EXPECT_THAT(rv, IsOk());
  2545. LoadTimingInfo load_timing_info2;
  2546. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info2));
  2547. TestLoadTimingNotReused(load_timing_info2, CONNECT_TIMING_HAS_DNS_TIMES);
  2548. // The load timing after restart should have a new socket ID, and times after
  2549. // those of the first load timing.
  2550. EXPECT_LE(load_timing_info1.receive_headers_end,
  2551. load_timing_info2.connect_timing.connect_start);
  2552. EXPECT_NE(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id);
  2553. int64_t writes_size2 = CountWriteBytes(data_writes2);
  2554. EXPECT_EQ(writes_size1 + writes_size2, trans.GetTotalSentBytes());
  2555. int64_t reads_size2 = CountReadBytes(data_reads2);
  2556. EXPECT_EQ(reads_size1 + reads_size2, trans.GetTotalReceivedBytes());
  2557. response = trans.GetResponseInfo();
  2558. ASSERT_TRUE(response);
  2559. EXPECT_FALSE(response->auth_challenge.has_value());
  2560. EXPECT_EQ(100, response->headers->GetContentLength());
  2561. }
  2562. // Test the request-challenge-retry sequence for basic auth.
  2563. // (basic auth is the easiest to mock, because it has no randomness).
  2564. TEST_F(HttpNetworkTransactionTest, BasicAuthWithAddressChange) {
  2565. HttpRequestInfo request;
  2566. request.method = "GET";
  2567. request.url = GURL("http://www.example.org/");
  2568. request.traffic_annotation =
  2569. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2570. auto resolver = std::make_unique<MockHostResolver>();
  2571. auto* resolver_ptr = resolver.get();
  2572. session_deps_.net_log = net::NetLog::Get();
  2573. session_deps_.host_resolver = std::move(resolver);
  2574. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  2575. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2576. resolver_ptr->rules()->ClearRules();
  2577. resolver_ptr->rules()->AddRule("www.example.org", "127.0.0.1");
  2578. MockWrite data_writes1[] = {
  2579. MockWrite("GET / HTTP/1.1\r\n"
  2580. "Host: www.example.org\r\n"
  2581. "Connection: keep-alive\r\n\r\n"),
  2582. };
  2583. MockRead data_reads1[] = {
  2584. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  2585. // Give a couple authenticate options (only the middle one is actually
  2586. // supported).
  2587. MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed.
  2588. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  2589. MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"),
  2590. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2591. // Large content-length -- won't matter, as connection will be reset.
  2592. MockRead("Content-Length: 10000\r\n\r\n"),
  2593. MockRead(SYNCHRONOUS, ERR_FAILED),
  2594. };
  2595. // After calling trans->RestartWithAuth(), this is the request we should
  2596. // be issuing -- the final header line contains the credentials.
  2597. MockWrite data_writes2[] = {
  2598. MockWrite("GET / HTTP/1.1\r\n"
  2599. "Host: www.example.org\r\n"
  2600. "Connection: keep-alive\r\n"
  2601. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  2602. };
  2603. // Lastly, the server responds with the actual content.
  2604. MockRead data_reads2[] = {
  2605. MockRead("HTTP/1.0 200 OK\r\n"),
  2606. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2607. MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK),
  2608. };
  2609. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2610. StaticSocketDataProvider data2(data_reads2, data_writes2);
  2611. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2612. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  2613. TestCompletionCallback callback1;
  2614. EXPECT_EQ(OK, callback1.GetResult(trans.Start(&request, callback1.callback(),
  2615. NetLogWithSource())));
  2616. LoadTimingInfo load_timing_info1;
  2617. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info1));
  2618. TestLoadTimingNotReused(load_timing_info1, CONNECT_TIMING_HAS_DNS_TIMES);
  2619. int64_t writes_size1 = CountWriteBytes(data_writes1);
  2620. EXPECT_EQ(writes_size1, trans.GetTotalSentBytes());
  2621. int64_t reads_size1 = CountReadBytes(data_reads1);
  2622. EXPECT_EQ(reads_size1, trans.GetTotalReceivedBytes());
  2623. const HttpResponseInfo* response = trans.GetResponseInfo();
  2624. ASSERT_TRUE(response);
  2625. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  2626. IPEndPoint endpoint;
  2627. EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint));
  2628. ASSERT_FALSE(endpoint.address().empty());
  2629. EXPECT_EQ("127.0.0.1:80", endpoint.ToString());
  2630. resolver_ptr->rules()->ClearRules();
  2631. resolver_ptr->rules()->AddRule("www.example.org", "127.0.0.2");
  2632. TestCompletionCallback callback2;
  2633. EXPECT_EQ(OK, callback2.GetResult(trans.RestartWithAuth(
  2634. AuthCredentials(kFoo, kBar), callback2.callback())));
  2635. LoadTimingInfo load_timing_info2;
  2636. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info2));
  2637. TestLoadTimingNotReused(load_timing_info2, CONNECT_TIMING_HAS_DNS_TIMES);
  2638. // The load timing after restart should have a new socket ID, and times after
  2639. // those of the first load timing.
  2640. EXPECT_LE(load_timing_info1.receive_headers_end,
  2641. load_timing_info2.connect_timing.connect_start);
  2642. EXPECT_NE(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id);
  2643. int64_t writes_size2 = CountWriteBytes(data_writes2);
  2644. EXPECT_EQ(writes_size1 + writes_size2, trans.GetTotalSentBytes());
  2645. int64_t reads_size2 = CountReadBytes(data_reads2);
  2646. EXPECT_EQ(reads_size1 + reads_size2, trans.GetTotalReceivedBytes());
  2647. response = trans.GetResponseInfo();
  2648. ASSERT_TRUE(response);
  2649. EXPECT_FALSE(response->auth_challenge.has_value());
  2650. EXPECT_EQ(100, response->headers->GetContentLength());
  2651. EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint));
  2652. ASSERT_FALSE(endpoint.address().empty());
  2653. EXPECT_EQ("127.0.0.2:80", endpoint.ToString());
  2654. }
  2655. // Test that, if the server requests auth indefinitely, HttpNetworkTransaction
  2656. // will eventually give up.
  2657. TEST_F(HttpNetworkTransactionTest, BasicAuthForever) {
  2658. HttpRequestInfo request;
  2659. request.method = "GET";
  2660. request.url = GURL("http://www.example.org/");
  2661. request.traffic_annotation =
  2662. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2663. session_deps_.net_log = net::NetLog::Get();
  2664. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2665. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2666. MockWrite data_writes[] = {
  2667. MockWrite("GET / HTTP/1.1\r\n"
  2668. "Host: www.example.org\r\n"
  2669. "Connection: keep-alive\r\n\r\n"),
  2670. };
  2671. MockRead data_reads[] = {
  2672. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  2673. // Give a couple authenticate options (only the middle one is actually
  2674. // supported).
  2675. MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed.
  2676. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  2677. MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"),
  2678. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2679. // Large content-length -- won't matter, as connection will be reset.
  2680. MockRead("Content-Length: 10000\r\n\r\n"),
  2681. MockRead(SYNCHRONOUS, ERR_FAILED),
  2682. };
  2683. // After calling trans->RestartWithAuth(), this is the request we should
  2684. // be issuing -- the final header line contains the credentials.
  2685. MockWrite data_writes_restart[] = {
  2686. MockWrite("GET / HTTP/1.1\r\n"
  2687. "Host: www.example.org\r\n"
  2688. "Connection: keep-alive\r\n"
  2689. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  2690. };
  2691. StaticSocketDataProvider data(data_reads, data_writes);
  2692. session_deps_.socket_factory->AddSocketDataProvider(&data);
  2693. TestCompletionCallback callback;
  2694. int rv = callback.GetResult(
  2695. trans.Start(&request, callback.callback(), NetLogWithSource()));
  2696. std::vector<std::unique_ptr<StaticSocketDataProvider>> data_restarts;
  2697. for (int i = 0; i < 32; i++) {
  2698. // Check the previous response was a 401.
  2699. EXPECT_THAT(rv, IsOk());
  2700. const HttpResponseInfo* response = trans.GetResponseInfo();
  2701. ASSERT_TRUE(response);
  2702. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  2703. data_restarts.push_back(std::make_unique<StaticSocketDataProvider>(
  2704. data_reads, data_writes_restart));
  2705. session_deps_.socket_factory->AddSocketDataProvider(
  2706. data_restarts.back().get());
  2707. rv = callback.GetResult(trans.RestartWithAuth(AuthCredentials(kFoo, kBar),
  2708. callback.callback()));
  2709. }
  2710. // After too many tries, the transaction should have given up.
  2711. EXPECT_THAT(rv, IsError(ERR_TOO_MANY_RETRIES));
  2712. }
  2713. TEST_F(HttpNetworkTransactionTest, DoNotSendAuth) {
  2714. HttpRequestInfo request;
  2715. request.method = "GET";
  2716. request.url = GURL("http://www.example.org/");
  2717. request.privacy_mode = PRIVACY_MODE_ENABLED;
  2718. request.traffic_annotation =
  2719. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2720. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2721. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2722. MockWrite data_writes[] = {
  2723. MockWrite(
  2724. "GET / HTTP/1.1\r\n"
  2725. "Host: www.example.org\r\n"
  2726. "Connection: keep-alive\r\n\r\n"),
  2727. };
  2728. MockRead data_reads[] = {
  2729. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  2730. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  2731. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2732. // Large content-length -- won't matter, as connection will be reset.
  2733. MockRead("Content-Length: 10000\r\n\r\n"),
  2734. MockRead(SYNCHRONOUS, ERR_FAILED),
  2735. };
  2736. StaticSocketDataProvider data(data_reads, data_writes);
  2737. session_deps_.socket_factory->AddSocketDataProvider(&data);
  2738. TestCompletionCallback callback;
  2739. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  2740. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2741. rv = callback.WaitForResult();
  2742. EXPECT_EQ(0, rv);
  2743. int64_t writes_size = CountWriteBytes(data_writes);
  2744. EXPECT_EQ(writes_size, trans.GetTotalSentBytes());
  2745. int64_t reads_size = CountReadBytes(data_reads);
  2746. EXPECT_EQ(reads_size, trans.GetTotalReceivedBytes());
  2747. const HttpResponseInfo* response = trans.GetResponseInfo();
  2748. ASSERT_TRUE(response);
  2749. EXPECT_FALSE(response->auth_challenge.has_value());
  2750. }
  2751. // Test the request-challenge-retry sequence for basic auth, over a keep-alive
  2752. // connection.
  2753. TEST_F(HttpNetworkTransactionTest, BasicAuthKeepAlive) {
  2754. // On the second pass, the body read of the auth challenge is synchronous, so
  2755. // IsConnectedAndIdle returns false. The socket should still be drained and
  2756. // reused. See http://crbug.com/544255.
  2757. for (int i = 0; i < 2; ++i) {
  2758. HttpRequestInfo request;
  2759. request.method = "GET";
  2760. request.url = GURL("http://www.example.org/");
  2761. request.traffic_annotation =
  2762. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2763. session_deps_.net_log = net::NetLog::Get();
  2764. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2765. MockWrite data_writes[] = {
  2766. MockWrite(ASYNC, 0,
  2767. "GET / HTTP/1.1\r\n"
  2768. "Host: www.example.org\r\n"
  2769. "Connection: keep-alive\r\n\r\n"),
  2770. // After calling trans.RestartWithAuth(), this is the request we should
  2771. // be issuing -- the final header line contains the credentials.
  2772. MockWrite(ASYNC, 6,
  2773. "GET / HTTP/1.1\r\n"
  2774. "Host: www.example.org\r\n"
  2775. "Connection: keep-alive\r\n"
  2776. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  2777. };
  2778. MockRead data_reads[] = {
  2779. MockRead(ASYNC, 1, "HTTP/1.1 401 Unauthorized\r\n"),
  2780. MockRead(ASYNC, 2, "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  2781. MockRead(ASYNC, 3, "Content-Type: text/html; charset=iso-8859-1\r\n"),
  2782. MockRead(ASYNC, 4, "Content-Length: 14\r\n\r\n"),
  2783. MockRead(i == 0 ? ASYNC : SYNCHRONOUS, 5, "Unauthorized\r\n"),
  2784. // Lastly, the server responds with the actual content.
  2785. MockRead(ASYNC, 7, "HTTP/1.1 200 OK\r\n"),
  2786. MockRead(ASYNC, 8, "Content-Type: text/html; charset=iso-8859-1\r\n"),
  2787. MockRead(ASYNC, 9, "Content-Length: 5\r\n\r\n"),
  2788. MockRead(ASYNC, 10, "Hello"),
  2789. };
  2790. SequencedSocketData data(data_reads, data_writes);
  2791. data.set_busy_before_sync_reads(true);
  2792. session_deps_.socket_factory->AddSocketDataProvider(&data);
  2793. TestCompletionCallback callback1;
  2794. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2795. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  2796. ASSERT_THAT(callback1.GetResult(rv), IsOk());
  2797. LoadTimingInfo load_timing_info1;
  2798. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info1));
  2799. TestLoadTimingNotReused(load_timing_info1, CONNECT_TIMING_HAS_DNS_TIMES);
  2800. const HttpResponseInfo* response = trans.GetResponseInfo();
  2801. ASSERT_TRUE(response);
  2802. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  2803. TestCompletionCallback callback2;
  2804. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar),
  2805. callback2.callback());
  2806. ASSERT_THAT(callback2.GetResult(rv), IsOk());
  2807. LoadTimingInfo load_timing_info2;
  2808. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info2));
  2809. TestLoadTimingReused(load_timing_info2);
  2810. // The load timing after restart should have the same socket ID, and times
  2811. // those of the first load timing.
  2812. EXPECT_LE(load_timing_info1.receive_headers_end,
  2813. load_timing_info2.send_start);
  2814. EXPECT_EQ(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id);
  2815. response = trans.GetResponseInfo();
  2816. ASSERT_TRUE(response);
  2817. EXPECT_FALSE(response->auth_challenge.has_value());
  2818. EXPECT_EQ(5, response->headers->GetContentLength());
  2819. std::string response_data;
  2820. EXPECT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  2821. int64_t writes_size = CountWriteBytes(data_writes);
  2822. EXPECT_EQ(writes_size, trans.GetTotalSentBytes());
  2823. int64_t reads_size = CountReadBytes(data_reads);
  2824. EXPECT_EQ(reads_size, trans.GetTotalReceivedBytes());
  2825. }
  2826. }
  2827. // Test the request-challenge-retry sequence for basic auth, over a keep-alive
  2828. // connection and with no response body to drain.
  2829. TEST_F(HttpNetworkTransactionTest, BasicAuthKeepAliveNoBody) {
  2830. HttpRequestInfo request;
  2831. request.method = "GET";
  2832. request.url = GURL("http://www.example.org/");
  2833. request.traffic_annotation =
  2834. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2835. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2836. MockWrite data_writes1[] = {
  2837. MockWrite("GET / HTTP/1.1\r\n"
  2838. "Host: www.example.org\r\n"
  2839. "Connection: keep-alive\r\n\r\n"),
  2840. // After calling trans.RestartWithAuth(), this is the request we should
  2841. // be issuing -- the final header line contains the credentials.
  2842. MockWrite("GET / HTTP/1.1\r\n"
  2843. "Host: www.example.org\r\n"
  2844. "Connection: keep-alive\r\n"
  2845. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  2846. };
  2847. MockRead data_reads1[] = {
  2848. MockRead("HTTP/1.1 401 Unauthorized\r\n"),
  2849. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  2850. MockRead("Content-Length: 0\r\n\r\n"), // No response body.
  2851. // Lastly, the server responds with the actual content.
  2852. MockRead("HTTP/1.1 200 OK\r\n"),
  2853. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2854. MockRead("Content-Length: 5\r\n\r\n"),
  2855. MockRead("hello"),
  2856. };
  2857. // An incorrect reconnect would cause this to be read.
  2858. MockRead data_reads2[] = {
  2859. MockRead(SYNCHRONOUS, ERR_FAILED),
  2860. };
  2861. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2862. StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>());
  2863. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2864. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  2865. TestCompletionCallback callback1;
  2866. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2867. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  2868. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2869. rv = callback1.WaitForResult();
  2870. EXPECT_THAT(rv, IsOk());
  2871. const HttpResponseInfo* response = trans.GetResponseInfo();
  2872. ASSERT_TRUE(response);
  2873. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  2874. TestCompletionCallback callback2;
  2875. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  2876. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2877. rv = callback2.WaitForResult();
  2878. EXPECT_THAT(rv, IsOk());
  2879. response = trans.GetResponseInfo();
  2880. ASSERT_TRUE(response);
  2881. EXPECT_FALSE(response->auth_challenge.has_value());
  2882. EXPECT_EQ(5, response->headers->GetContentLength());
  2883. }
  2884. // Test the request-challenge-retry sequence for basic auth, over a keep-alive
  2885. // connection and with a large response body to drain.
  2886. TEST_F(HttpNetworkTransactionTest, BasicAuthKeepAliveLargeBody) {
  2887. HttpRequestInfo request;
  2888. request.method = "GET";
  2889. request.url = GURL("http://www.example.org/");
  2890. request.traffic_annotation =
  2891. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2892. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2893. MockWrite data_writes1[] = {
  2894. MockWrite("GET / HTTP/1.1\r\n"
  2895. "Host: www.example.org\r\n"
  2896. "Connection: keep-alive\r\n\r\n"),
  2897. // After calling trans.RestartWithAuth(), this is the request we should
  2898. // be issuing -- the final header line contains the credentials.
  2899. MockWrite("GET / HTTP/1.1\r\n"
  2900. "Host: www.example.org\r\n"
  2901. "Connection: keep-alive\r\n"
  2902. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  2903. };
  2904. // Respond with 5 kb of response body.
  2905. std::string large_body_string("Unauthorized");
  2906. large_body_string.append(5 * 1024, ' ');
  2907. large_body_string.append("\r\n");
  2908. MockRead data_reads1[] = {
  2909. MockRead("HTTP/1.1 401 Unauthorized\r\n"),
  2910. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  2911. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2912. // 5134 = 12 + 5 * 1024 + 2
  2913. MockRead("Content-Length: 5134\r\n\r\n"),
  2914. MockRead(ASYNC, large_body_string.data(), large_body_string.size()),
  2915. // Lastly, the server responds with the actual content.
  2916. MockRead("HTTP/1.1 200 OK\r\n"),
  2917. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2918. MockRead("Content-Length: 5\r\n\r\n"),
  2919. MockRead("hello"),
  2920. };
  2921. // An incorrect reconnect would cause this to be read.
  2922. MockRead data_reads2[] = {
  2923. MockRead(SYNCHRONOUS, ERR_FAILED),
  2924. };
  2925. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2926. StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>());
  2927. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2928. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  2929. TestCompletionCallback callback1;
  2930. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  2931. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  2932. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2933. rv = callback1.WaitForResult();
  2934. EXPECT_THAT(rv, IsOk());
  2935. const HttpResponseInfo* response = trans.GetResponseInfo();
  2936. ASSERT_TRUE(response);
  2937. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  2938. TestCompletionCallback callback2;
  2939. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  2940. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  2941. rv = callback2.WaitForResult();
  2942. EXPECT_THAT(rv, IsOk());
  2943. response = trans.GetResponseInfo();
  2944. ASSERT_TRUE(response);
  2945. EXPECT_FALSE(response->auth_challenge.has_value());
  2946. EXPECT_EQ(5, response->headers->GetContentLength());
  2947. }
  2948. // Test the request-challenge-retry sequence for basic auth, over a keep-alive
  2949. // connection, but the server gets impatient and closes the connection.
  2950. TEST_F(HttpNetworkTransactionTest, BasicAuthKeepAliveImpatientServer) {
  2951. HttpRequestInfo request;
  2952. request.method = "GET";
  2953. request.url = GURL("http://www.example.org/");
  2954. request.traffic_annotation =
  2955. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  2956. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  2957. MockWrite data_writes1[] = {
  2958. MockWrite(
  2959. "GET / HTTP/1.1\r\n"
  2960. "Host: www.example.org\r\n"
  2961. "Connection: keep-alive\r\n\r\n"),
  2962. // This simulates the seemingly successful write to a closed connection
  2963. // if the bug is not fixed.
  2964. MockWrite(
  2965. "GET / HTTP/1.1\r\n"
  2966. "Host: www.example.org\r\n"
  2967. "Connection: keep-alive\r\n"
  2968. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  2969. };
  2970. MockRead data_reads1[] = {
  2971. MockRead("HTTP/1.1 401 Unauthorized\r\n"),
  2972. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  2973. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2974. MockRead("Content-Length: 14\r\n\r\n"),
  2975. // Tell MockTCPClientSocket to simulate the server closing the connection.
  2976. MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
  2977. MockRead("Unauthorized\r\n"),
  2978. MockRead(SYNCHRONOUS, OK), // The server closes the connection.
  2979. };
  2980. // After calling trans.RestartWithAuth(), this is the request we should
  2981. // be issuing -- the final header line contains the credentials.
  2982. MockWrite data_writes2[] = {
  2983. MockWrite(
  2984. "GET / HTTP/1.1\r\n"
  2985. "Host: www.example.org\r\n"
  2986. "Connection: keep-alive\r\n"
  2987. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  2988. };
  2989. // Lastly, the server responds with the actual content.
  2990. MockRead data_reads2[] = {
  2991. MockRead("HTTP/1.1 200 OK\r\n"),
  2992. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  2993. MockRead("Content-Length: 5\r\n\r\n"),
  2994. MockRead("hello"),
  2995. };
  2996. StaticSocketDataProvider data1(data_reads1, data_writes1);
  2997. StaticSocketDataProvider data2(data_reads2, data_writes2);
  2998. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  2999. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  3000. TestCompletionCallback callback1;
  3001. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  3002. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  3003. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  3004. rv = callback1.WaitForResult();
  3005. EXPECT_THAT(rv, IsOk());
  3006. const HttpResponseInfo* response = trans.GetResponseInfo();
  3007. ASSERT_TRUE(response);
  3008. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  3009. TestCompletionCallback callback2;
  3010. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  3011. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  3012. rv = callback2.WaitForResult();
  3013. EXPECT_THAT(rv, IsOk());
  3014. response = trans.GetResponseInfo();
  3015. ASSERT_TRUE(response);
  3016. EXPECT_FALSE(response->auth_challenge.has_value());
  3017. EXPECT_EQ(5, response->headers->GetContentLength());
  3018. }
  3019. // Test the request-challenge-retry sequence for basic auth, over a connection
  3020. // that requires a restart when setting up an SSL tunnel.
  3021. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyNoKeepAliveHttp10) {
  3022. HttpRequestInfo request;
  3023. request.method = "GET";
  3024. request.url = GURL("https://www.example.org/");
  3025. // when the no authentication data flag is set.
  3026. request.privacy_mode = PRIVACY_MODE_ENABLED;
  3027. request.traffic_annotation =
  3028. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3029. // Configure against proxy server "myproxy:70".
  3030. session_deps_.proxy_resolution_service =
  3031. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  3032. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3033. RecordingNetLogObserver net_log_observer;
  3034. NetLogWithSource net_log_with_source =
  3035. NetLogWithSource::Make(NetLogSourceType::NONE);
  3036. session_deps_.net_log = NetLog::Get();
  3037. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  3038. // Since we have proxy, should try to establish tunnel.
  3039. MockWrite data_writes1[] = {
  3040. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  3041. "Host: www.example.org:443\r\n"
  3042. "Proxy-Connection: keep-alive\r\n\r\n"),
  3043. };
  3044. // The proxy responds to the connect with a 407, using a non-persistent
  3045. // connection.
  3046. MockRead data_reads1[] = {
  3047. // No credentials.
  3048. MockRead("HTTP/1.0 407 Proxy Authentication Required\r\n"),
  3049. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n\r\n"),
  3050. };
  3051. // Since the first connection couldn't be reused, need to establish another
  3052. // once given credentials.
  3053. MockWrite data_writes2[] = {
  3054. // After calling trans->RestartWithAuth(), this is the request we should
  3055. // be issuing -- the final header line contains the credentials.
  3056. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  3057. "Host: www.example.org:443\r\n"
  3058. "Proxy-Connection: keep-alive\r\n"
  3059. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  3060. MockWrite("GET / HTTP/1.1\r\n"
  3061. "Host: www.example.org\r\n"
  3062. "Connection: keep-alive\r\n\r\n"),
  3063. };
  3064. MockRead data_reads2[] = {
  3065. MockRead("HTTP/1.0 200 Connection Established\r\n\r\n"),
  3066. MockRead("HTTP/1.1 200 OK\r\n"),
  3067. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  3068. MockRead("Content-Length: 5\r\n\r\n"),
  3069. MockRead(SYNCHRONOUS, "hello"),
  3070. };
  3071. StaticSocketDataProvider data1(data_reads1, data_writes1);
  3072. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  3073. StaticSocketDataProvider data2(data_reads2, data_writes2);
  3074. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  3075. SSLSocketDataProvider ssl(ASYNC, OK);
  3076. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  3077. TestCompletionCallback callback1;
  3078. ConnectedHandler connected_handler;
  3079. auto trans =
  3080. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  3081. trans->SetConnectedCallback(connected_handler.Callback());
  3082. int rv = trans->Start(&request, callback1.callback(), net_log_with_source);
  3083. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  3084. rv = callback1.WaitForResult();
  3085. EXPECT_THAT(rv, IsOk());
  3086. auto entries = net_log_observer.GetEntries();
  3087. size_t pos = ExpectLogContainsSomewhere(
  3088. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  3089. NetLogEventPhase::NONE);
  3090. ExpectLogContainsSomewhere(
  3091. entries, pos,
  3092. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  3093. NetLogEventPhase::NONE);
  3094. // TODO(crbug.com/986744): Fix handling of OnConnected() when proxy
  3095. // authentication is required. We should notify the callback that a connection
  3096. // was established, even though the stream might not be ready for us to send
  3097. // data through it.
  3098. EXPECT_THAT(connected_handler.transports(), IsEmpty());
  3099. const HttpResponseInfo* response = trans->GetResponseInfo();
  3100. ASSERT_TRUE(response);
  3101. EXPECT_FALSE(response->headers->IsKeepAlive());
  3102. ASSERT_TRUE(response->headers);
  3103. EXPECT_EQ(407, response->headers->response_code());
  3104. EXPECT_TRUE(HttpVersion(1, 0) == response->headers->GetHttpVersion());
  3105. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3106. LoadTimingInfo load_timing_info;
  3107. // CONNECT requests and responses are handled at the connect job level, so
  3108. // the transaction does not yet have a connection.
  3109. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info));
  3110. TestCompletionCallback callback2;
  3111. rv =
  3112. trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  3113. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  3114. rv = callback2.WaitForResult();
  3115. EXPECT_THAT(rv, IsOk());
  3116. response = trans->GetResponseInfo();
  3117. ASSERT_TRUE(response);
  3118. EXPECT_TRUE(response->headers->IsKeepAlive());
  3119. EXPECT_EQ(200, response->headers->response_code());
  3120. EXPECT_EQ(5, response->headers->GetContentLength());
  3121. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  3122. TransportInfo expected_transport;
  3123. expected_transport.type = TransportType::kProxied;
  3124. expected_transport.endpoint = IPEndPoint(IPAddress::IPv4Localhost(), 70);
  3125. EXPECT_THAT(connected_handler.transports(), ElementsAre(expected_transport));
  3126. // Check that credentials were successfully cached, with the right target.
  3127. HttpAuthCache::Entry* entry = session->http_auth_cache()->Lookup(
  3128. url::SchemeHostPort(url::SchemeHostPort(GURL("http://myproxy:70"))),
  3129. HttpAuth::AUTH_PROXY, "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC,
  3130. NetworkIsolationKey());
  3131. ASSERT_TRUE(entry);
  3132. ASSERT_EQ(kFoo, entry->credentials().username());
  3133. ASSERT_EQ(kBar, entry->credentials().password());
  3134. // The password prompt info should not be set.
  3135. EXPECT_FALSE(response->auth_challenge.has_value());
  3136. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  3137. TestLoadTimingNotReusedWithPac(load_timing_info,
  3138. CONNECT_TIMING_HAS_SSL_TIMES);
  3139. trans.reset();
  3140. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  3141. }
  3142. // Test the request-challenge-retry sequence for basic auth, over a connection
  3143. // that requires a restart when setting up an SSL tunnel.
  3144. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyNoKeepAliveHttp11) {
  3145. HttpRequestInfo request;
  3146. request.method = "GET";
  3147. request.url = GURL("https://www.example.org/");
  3148. // when the no authentication data flag is set.
  3149. request.privacy_mode = PRIVACY_MODE_ENABLED;
  3150. request.traffic_annotation =
  3151. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3152. // Configure against proxy server "myproxy:70".
  3153. session_deps_.proxy_resolution_service =
  3154. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  3155. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3156. RecordingNetLogObserver net_log_observer;
  3157. session_deps_.net_log = NetLog::Get();
  3158. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  3159. // Since we have proxy, should try to establish tunnel.
  3160. MockWrite data_writes1[] = {
  3161. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  3162. "Host: www.example.org:443\r\n"
  3163. "Proxy-Connection: keep-alive\r\n\r\n"),
  3164. };
  3165. // The proxy responds to the connect with a 407, using a non-persistent
  3166. // connection.
  3167. MockRead data_reads1[] = {
  3168. // No credentials.
  3169. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  3170. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  3171. MockRead("Proxy-Connection: close\r\n\r\n"),
  3172. };
  3173. MockWrite data_writes2[] = {
  3174. // After calling trans->RestartWithAuth(), this is the request we should
  3175. // be issuing -- the final header line contains the credentials.
  3176. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  3177. "Host: www.example.org:443\r\n"
  3178. "Proxy-Connection: keep-alive\r\n"
  3179. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  3180. MockWrite("GET / HTTP/1.1\r\n"
  3181. "Host: www.example.org\r\n"
  3182. "Connection: keep-alive\r\n\r\n"),
  3183. };
  3184. MockRead data_reads2[] = {
  3185. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  3186. MockRead("HTTP/1.1 200 OK\r\n"),
  3187. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  3188. MockRead("Content-Length: 5\r\n\r\n"),
  3189. MockRead(SYNCHRONOUS, "hello"),
  3190. };
  3191. StaticSocketDataProvider data1(data_reads1, data_writes1);
  3192. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  3193. StaticSocketDataProvider data2(data_reads2, data_writes2);
  3194. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  3195. SSLSocketDataProvider ssl(ASYNC, OK);
  3196. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  3197. ConnectedHandler connected_handler;
  3198. TestCompletionCallback callback1;
  3199. auto trans =
  3200. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  3201. trans->SetConnectedCallback(connected_handler.Callback());
  3202. int rv = trans->Start(&request, callback1.callback(),
  3203. NetLogWithSource::Make(NetLogSourceType::NONE));
  3204. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  3205. rv = callback1.WaitForResult();
  3206. EXPECT_THAT(rv, IsOk());
  3207. auto entries = net_log_observer.GetEntries();
  3208. size_t pos = ExpectLogContainsSomewhere(
  3209. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  3210. NetLogEventPhase::NONE);
  3211. ExpectLogContainsSomewhere(
  3212. entries, pos,
  3213. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  3214. NetLogEventPhase::NONE);
  3215. const HttpResponseInfo* response = trans->GetResponseInfo();
  3216. ASSERT_TRUE(response);
  3217. EXPECT_FALSE(response->headers->IsKeepAlive());
  3218. ASSERT_TRUE(response->headers);
  3219. EXPECT_EQ(407, response->headers->response_code());
  3220. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  3221. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3222. EXPECT_EQ(PacResultElementToProxyServer("PROXY myproxy:70"),
  3223. response->proxy_server);
  3224. // TODO(crbug.com/986744): Fix handling of OnConnected() when proxy
  3225. // authentication is required. We should notify the callback that a connection
  3226. // was established, even though the stream might not be ready for us to send
  3227. // data through it.
  3228. EXPECT_THAT(connected_handler.transports(), IsEmpty());
  3229. LoadTimingInfo load_timing_info;
  3230. // CONNECT requests and responses are handled at the connect job level, so
  3231. // the transaction does not yet have a connection.
  3232. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info));
  3233. TestCompletionCallback callback2;
  3234. rv = trans->RestartWithAuth(
  3235. AuthCredentials(kFoo, kBar), callback2.callback());
  3236. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  3237. rv = callback2.WaitForResult();
  3238. EXPECT_THAT(rv, IsOk());
  3239. response = trans->GetResponseInfo();
  3240. ASSERT_TRUE(response);
  3241. EXPECT_TRUE(response->headers->IsKeepAlive());
  3242. EXPECT_EQ(200, response->headers->response_code());
  3243. EXPECT_EQ(5, response->headers->GetContentLength());
  3244. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  3245. EXPECT_EQ(PacResultElementToProxyServer("PROXY myproxy:70"),
  3246. response->proxy_server);
  3247. TransportInfo expected_transport;
  3248. expected_transport.type = TransportType::kProxied;
  3249. expected_transport.endpoint = IPEndPoint(IPAddress::IPv4Localhost(), 70);
  3250. EXPECT_THAT(connected_handler.transports(), ElementsAre(expected_transport));
  3251. // The password prompt info should not be set.
  3252. EXPECT_FALSE(response->auth_challenge.has_value());
  3253. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  3254. TestLoadTimingNotReusedWithPac(load_timing_info,
  3255. CONNECT_TIMING_HAS_SSL_TIMES);
  3256. trans.reset();
  3257. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  3258. }
  3259. // Test the request-challenge-retry sequence for basic auth, over a keep-alive
  3260. // proxy connection with HTTP/1.0 responses, when setting up an SSL tunnel.
  3261. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyKeepAliveHttp10) {
  3262. // On the second pass, the body read of the auth challenge is synchronous, so
  3263. // IsConnectedAndIdle returns false. The socket should still be drained and
  3264. // reused. See http://crbug.com/544255.
  3265. for (int i = 0; i < 2; ++i) {
  3266. HttpRequestInfo request;
  3267. request.method = "GET";
  3268. request.url = GURL("https://www.example.org/");
  3269. // Ensure that proxy authentication is attempted even
  3270. // when the no authentication data flag is set.
  3271. request.privacy_mode = PRIVACY_MODE_ENABLED;
  3272. request.traffic_annotation =
  3273. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3274. // Configure against proxy server "myproxy:70".
  3275. session_deps_.proxy_resolution_service =
  3276. ConfiguredProxyResolutionService::CreateFixedForTest(
  3277. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3278. RecordingNetLogObserver net_log_observer;
  3279. session_deps_.net_log = NetLog::Get();
  3280. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  3281. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  3282. // Since we have proxy, should try to establish tunnel.
  3283. MockWrite data_writes1[] = {
  3284. MockWrite(ASYNC, 0,
  3285. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  3286. "Host: www.example.org:443\r\n"
  3287. "Proxy-Connection: keep-alive\r\n\r\n"),
  3288. // After calling trans.RestartWithAuth(), this is the request we should
  3289. // be issuing -- the final header line contains the credentials.
  3290. MockWrite(ASYNC, 3,
  3291. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  3292. "Host: www.example.org:443\r\n"
  3293. "Proxy-Connection: keep-alive\r\n"
  3294. "Proxy-Authorization: Basic Zm9vOmJheg==\r\n\r\n"),
  3295. };
  3296. // The proxy responds to the connect with a 407, using a persistent
  3297. // connection. (Since it's HTTP/1.0, keep-alive has to be explicit.)
  3298. MockRead data_reads1[] = {
  3299. // No credentials.
  3300. MockRead(ASYNC, 1,
  3301. "HTTP/1.0 407 Proxy Authentication Required\r\n"
  3302. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3303. "Proxy-Connection: keep-alive\r\n"
  3304. "Content-Length: 10\r\n\r\n"),
  3305. MockRead(i == 0 ? ASYNC : SYNCHRONOUS, 2, "0123456789"),
  3306. // Wrong credentials (wrong password).
  3307. MockRead(ASYNC, 4,
  3308. "HTTP/1.0 407 Proxy Authentication Required\r\n"
  3309. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3310. "Proxy-Connection: keep-alive\r\n"
  3311. "Content-Length: 10\r\n\r\n"),
  3312. // No response body because the test stops reading here.
  3313. MockRead(SYNCHRONOUS, ERR_UNEXPECTED, 5),
  3314. };
  3315. SequencedSocketData data1(data_reads1, data_writes1);
  3316. data1.set_busy_before_sync_reads(true);
  3317. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  3318. TestCompletionCallback callback1;
  3319. int rv = trans.Start(&request, callback1.callback(),
  3320. NetLogWithSource::Make(NetLogSourceType::NONE));
  3321. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  3322. auto entries = net_log_observer.GetEntries();
  3323. size_t pos = ExpectLogContainsSomewhere(
  3324. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  3325. NetLogEventPhase::NONE);
  3326. ExpectLogContainsSomewhere(
  3327. entries, pos,
  3328. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  3329. NetLogEventPhase::NONE);
  3330. const HttpResponseInfo* response = trans.GetResponseInfo();
  3331. ASSERT_TRUE(response);
  3332. ASSERT_TRUE(response->headers);
  3333. EXPECT_TRUE(response->headers->IsKeepAlive());
  3334. EXPECT_EQ(407, response->headers->response_code());
  3335. EXPECT_EQ(10, response->headers->GetContentLength());
  3336. EXPECT_TRUE(HttpVersion(1, 0) == response->headers->GetHttpVersion());
  3337. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3338. TestCompletionCallback callback2;
  3339. // Wrong password (should be "bar").
  3340. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBaz),
  3341. callback2.callback());
  3342. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  3343. response = trans.GetResponseInfo();
  3344. ASSERT_TRUE(response);
  3345. ASSERT_TRUE(response->headers);
  3346. EXPECT_TRUE(response->headers->IsKeepAlive());
  3347. EXPECT_EQ(407, response->headers->response_code());
  3348. EXPECT_EQ(10, response->headers->GetContentLength());
  3349. EXPECT_TRUE(HttpVersion(1, 0) == response->headers->GetHttpVersion());
  3350. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3351. // Flush the idle socket before the NetLog and HttpNetworkTransaction go
  3352. // out of scope.
  3353. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  3354. }
  3355. }
  3356. // Test the request-challenge-retry sequence for basic auth, over a keep-alive
  3357. // proxy connection with HTTP/1.1 responses, when setting up an SSL tunnel.
  3358. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyKeepAliveHttp11) {
  3359. // On the second pass, the body read of the auth challenge is synchronous, so
  3360. // IsConnectedAndIdle returns false. The socket should still be drained and
  3361. // reused. See http://crbug.com/544255.
  3362. for (int i = 0; i < 2; ++i) {
  3363. HttpRequestInfo request;
  3364. request.method = "GET";
  3365. request.url = GURL("https://www.example.org/");
  3366. // Ensure that proxy authentication is attempted even
  3367. // when the no authentication data flag is set.
  3368. request.privacy_mode = PRIVACY_MODE_ENABLED;
  3369. request.traffic_annotation =
  3370. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3371. // Configure against proxy server "myproxy:70".
  3372. session_deps_.proxy_resolution_service =
  3373. ConfiguredProxyResolutionService::CreateFixedForTest(
  3374. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3375. RecordingNetLogObserver net_log_observer;
  3376. session_deps_.net_log = NetLog::Get();
  3377. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  3378. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  3379. // Since we have proxy, should try to establish tunnel.
  3380. MockWrite data_writes1[] = {
  3381. MockWrite(ASYNC, 0,
  3382. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  3383. "Host: www.example.org:443\r\n"
  3384. "Proxy-Connection: keep-alive\r\n\r\n"),
  3385. // After calling trans.RestartWithAuth(), this is the request we should
  3386. // be issuing -- the final header line contains the credentials.
  3387. MockWrite(ASYNC, 3,
  3388. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  3389. "Host: www.example.org:443\r\n"
  3390. "Proxy-Connection: keep-alive\r\n"
  3391. "Proxy-Authorization: Basic Zm9vOmJheg==\r\n\r\n"),
  3392. };
  3393. // The proxy responds to the connect with a 407, using a persistent
  3394. // connection. (Since it's HTTP/1.0, keep-alive has to be explicit.)
  3395. MockRead data_reads1[] = {
  3396. // No credentials.
  3397. MockRead(ASYNC, 1,
  3398. "HTTP/1.1 407 Proxy Authentication Required\r\n"
  3399. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3400. "Content-Length: 10\r\n\r\n"),
  3401. MockRead(i == 0 ? ASYNC : SYNCHRONOUS, 2, "0123456789"),
  3402. // Wrong credentials (wrong password).
  3403. MockRead(ASYNC, 4,
  3404. "HTTP/1.1 407 Proxy Authentication Required\r\n"
  3405. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3406. "Content-Length: 10\r\n\r\n"),
  3407. // No response body because the test stops reading here.
  3408. MockRead(SYNCHRONOUS, ERR_UNEXPECTED, 5),
  3409. };
  3410. SequencedSocketData data1(data_reads1, data_writes1);
  3411. data1.set_busy_before_sync_reads(true);
  3412. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  3413. TestCompletionCallback callback1;
  3414. int rv = trans.Start(&request, callback1.callback(),
  3415. NetLogWithSource::Make(NetLogSourceType::NONE));
  3416. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  3417. auto entries = net_log_observer.GetEntries();
  3418. size_t pos = ExpectLogContainsSomewhere(
  3419. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  3420. NetLogEventPhase::NONE);
  3421. ExpectLogContainsSomewhere(
  3422. entries, pos,
  3423. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  3424. NetLogEventPhase::NONE);
  3425. const HttpResponseInfo* response = trans.GetResponseInfo();
  3426. ASSERT_TRUE(response);
  3427. ASSERT_TRUE(response->headers);
  3428. EXPECT_TRUE(response->headers->IsKeepAlive());
  3429. EXPECT_EQ(407, response->headers->response_code());
  3430. EXPECT_EQ(10, response->headers->GetContentLength());
  3431. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  3432. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3433. EXPECT_FALSE(response->did_use_http_auth);
  3434. EXPECT_EQ(PacResultElementToProxyServer("PROXY myproxy:70"),
  3435. response->proxy_server);
  3436. TestCompletionCallback callback2;
  3437. // Wrong password (should be "bar").
  3438. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBaz),
  3439. callback2.callback());
  3440. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  3441. response = trans.GetResponseInfo();
  3442. ASSERT_TRUE(response);
  3443. ASSERT_TRUE(response->headers);
  3444. EXPECT_TRUE(response->headers->IsKeepAlive());
  3445. EXPECT_EQ(407, response->headers->response_code());
  3446. EXPECT_EQ(10, response->headers->GetContentLength());
  3447. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  3448. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3449. EXPECT_TRUE(response->did_use_http_auth);
  3450. EXPECT_EQ(PacResultElementToProxyServer("PROXY myproxy:70"),
  3451. response->proxy_server);
  3452. // Flush the idle socket before the NetLog and HttpNetworkTransaction go
  3453. // out of scope.
  3454. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  3455. }
  3456. }
  3457. // Test the request-challenge-retry sequence for basic auth, over a keep-alive
  3458. // proxy connection with HTTP/1.1 responses, when setting up an SSL tunnel, in
  3459. // the case the server sends extra data on the original socket, so it can't be
  3460. // reused.
  3461. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyKeepAliveExtraData) {
  3462. HttpRequestInfo request;
  3463. request.method = "GET";
  3464. request.url = GURL("https://www.example.org/");
  3465. // when the no authentication data flag is set.
  3466. request.privacy_mode = PRIVACY_MODE_ENABLED;
  3467. request.traffic_annotation =
  3468. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3469. // Configure against proxy server "myproxy:70".
  3470. session_deps_.proxy_resolution_service =
  3471. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  3472. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3473. RecordingNetLogObserver net_log_observer;
  3474. session_deps_.net_log = NetLog::Get();
  3475. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  3476. // Since we have proxy, should try to establish tunnel.
  3477. MockWrite data_writes1[] = {
  3478. MockWrite(ASYNC, 0,
  3479. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  3480. "Host: www.example.org:443\r\n"
  3481. "Proxy-Connection: keep-alive\r\n\r\n"),
  3482. };
  3483. // The proxy responds to the connect with a 407, using a persistent, but sends
  3484. // extra data, so the socket cannot be reused.
  3485. MockRead data_reads1[] = {
  3486. // No credentials.
  3487. MockRead(ASYNC, 1,
  3488. "HTTP/1.1 407 Proxy Authentication Required\r\n"
  3489. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3490. "Content-Length: 10\r\n\r\n"),
  3491. MockRead(SYNCHRONOUS, 2, "0123456789"),
  3492. MockRead(SYNCHRONOUS, 3, "I'm broken!"),
  3493. };
  3494. MockWrite data_writes2[] = {
  3495. // After calling trans->RestartWithAuth(), this is the request we should
  3496. // be issuing -- the final header line contains the credentials.
  3497. MockWrite(ASYNC, 0,
  3498. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  3499. "Host: www.example.org:443\r\n"
  3500. "Proxy-Connection: keep-alive\r\n"
  3501. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  3502. MockWrite(ASYNC, 2,
  3503. "GET / HTTP/1.1\r\n"
  3504. "Host: www.example.org\r\n"
  3505. "Connection: keep-alive\r\n\r\n"),
  3506. };
  3507. MockRead data_reads2[] = {
  3508. MockRead(ASYNC, 1, "HTTP/1.1 200 Connection Established\r\n\r\n"),
  3509. MockRead(ASYNC, 3,
  3510. "HTTP/1.1 200 OK\r\n"
  3511. "Content-Type: text/html; charset=iso-8859-1\r\n"
  3512. "Content-Length: 5\r\n\r\n"),
  3513. // No response body because the test stops reading here.
  3514. MockRead(SYNCHRONOUS, ERR_UNEXPECTED, 4),
  3515. };
  3516. SequencedSocketData data1(data_reads1, data_writes1);
  3517. data1.set_busy_before_sync_reads(true);
  3518. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  3519. SequencedSocketData data2(data_reads2, data_writes2);
  3520. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  3521. SSLSocketDataProvider ssl(ASYNC, OK);
  3522. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  3523. TestCompletionCallback callback1;
  3524. auto trans =
  3525. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  3526. int rv = trans->Start(&request, callback1.callback(),
  3527. NetLogWithSource::Make(NetLogSourceType::NONE));
  3528. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  3529. auto entries = net_log_observer.GetEntries();
  3530. size_t pos = ExpectLogContainsSomewhere(
  3531. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  3532. NetLogEventPhase::NONE);
  3533. ExpectLogContainsSomewhere(
  3534. entries, pos,
  3535. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  3536. NetLogEventPhase::NONE);
  3537. const HttpResponseInfo* response = trans->GetResponseInfo();
  3538. ASSERT_TRUE(response);
  3539. ASSERT_TRUE(response->headers);
  3540. EXPECT_TRUE(response->headers->IsKeepAlive());
  3541. EXPECT_EQ(407, response->headers->response_code());
  3542. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  3543. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3544. LoadTimingInfo load_timing_info;
  3545. // CONNECT requests and responses are handled at the connect job level, so
  3546. // the transaction does not yet have a connection.
  3547. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info));
  3548. TestCompletionCallback callback2;
  3549. rv =
  3550. trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  3551. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  3552. EXPECT_TRUE(response->headers->IsKeepAlive());
  3553. EXPECT_EQ(200, response->headers->response_code());
  3554. EXPECT_EQ(5, response->headers->GetContentLength());
  3555. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  3556. // The password prompt info should not be set.
  3557. EXPECT_FALSE(response->auth_challenge.has_value());
  3558. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  3559. TestLoadTimingNotReusedWithPac(load_timing_info,
  3560. CONNECT_TIMING_HAS_SSL_TIMES);
  3561. trans.reset();
  3562. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  3563. }
  3564. // Test the case a proxy closes a socket while the challenge body is being
  3565. // drained.
  3566. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyKeepAliveHangupDuringBody) {
  3567. HttpRequestInfo request;
  3568. request.method = "GET";
  3569. request.url = GURL("https://www.example.org/");
  3570. // Ensure that proxy authentication is attempted even
  3571. // when the no authentication data flag is set.
  3572. request.privacy_mode = PRIVACY_MODE_ENABLED;
  3573. request.traffic_annotation =
  3574. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3575. // Configure against proxy server "myproxy:70".
  3576. session_deps_.proxy_resolution_service =
  3577. ConfiguredProxyResolutionService::CreateFixedForTest(
  3578. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3579. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  3580. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  3581. // Since we have proxy, should try to establish tunnel.
  3582. MockWrite data_writes1[] = {
  3583. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  3584. "Host: www.example.org:443\r\n"
  3585. "Proxy-Connection: keep-alive\r\n\r\n"),
  3586. };
  3587. // The proxy responds to the connect with a 407, using a persistent
  3588. // connection.
  3589. MockRead data_reads1[] = {
  3590. // No credentials.
  3591. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  3592. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  3593. MockRead("Content-Length: 10\r\n\r\n"), MockRead("spam!"),
  3594. // Server hands up in the middle of the body.
  3595. MockRead(ASYNC, ERR_CONNECTION_CLOSED),
  3596. };
  3597. MockWrite data_writes2[] = {
  3598. // After calling trans.RestartWithAuth(), this is the request we should
  3599. // be issuing -- the final header line contains the credentials.
  3600. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  3601. "Host: www.example.org:443\r\n"
  3602. "Proxy-Connection: keep-alive\r\n"
  3603. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  3604. MockWrite("GET / HTTP/1.1\r\n"
  3605. "Host: www.example.org\r\n"
  3606. "Connection: keep-alive\r\n\r\n"),
  3607. };
  3608. MockRead data_reads2[] = {
  3609. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  3610. MockRead("HTTP/1.1 200 OK\r\n"),
  3611. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  3612. MockRead("Content-Length: 5\r\n\r\n"),
  3613. MockRead(SYNCHRONOUS, "hello"),
  3614. };
  3615. StaticSocketDataProvider data1(data_reads1, data_writes1);
  3616. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  3617. StaticSocketDataProvider data2(data_reads2, data_writes2);
  3618. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  3619. SSLSocketDataProvider ssl(ASYNC, OK);
  3620. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  3621. TestCompletionCallback callback;
  3622. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  3623. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3624. const HttpResponseInfo* response = trans.GetResponseInfo();
  3625. ASSERT_TRUE(response);
  3626. ASSERT_TRUE(response->headers);
  3627. EXPECT_TRUE(response->headers->IsKeepAlive());
  3628. EXPECT_EQ(407, response->headers->response_code());
  3629. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3630. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback());
  3631. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3632. response = trans.GetResponseInfo();
  3633. ASSERT_TRUE(response);
  3634. ASSERT_TRUE(response->headers);
  3635. EXPECT_TRUE(response->headers->IsKeepAlive());
  3636. EXPECT_EQ(200, response->headers->response_code());
  3637. std::string body;
  3638. EXPECT_THAT(ReadTransaction(&trans, &body), IsOk());
  3639. EXPECT_EQ("hello", body);
  3640. }
  3641. // Test that we don't read the response body when we fail to establish a tunnel,
  3642. // even if the user cancels the proxy's auth attempt.
  3643. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyCancelTunnel) {
  3644. HttpRequestInfo request;
  3645. request.method = "GET";
  3646. request.url = GURL("https://www.example.org/");
  3647. request.traffic_annotation =
  3648. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3649. // Configure against proxy server "myproxy:70".
  3650. session_deps_.proxy_resolution_service =
  3651. ConfiguredProxyResolutionService::CreateFixedForTest(
  3652. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3653. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  3654. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  3655. // Since we have proxy, should try to establish tunnel.
  3656. MockWrite data_writes[] = {
  3657. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  3658. "Host: www.example.org:443\r\n"
  3659. "Proxy-Connection: keep-alive\r\n\r\n"),
  3660. };
  3661. // The proxy responds to the connect with a 407.
  3662. MockRead data_reads[] = {
  3663. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  3664. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  3665. MockRead("Content-Length: 10\r\n\r\n"),
  3666. MockRead("0123456789"),
  3667. MockRead(SYNCHRONOUS, ERR_UNEXPECTED),
  3668. };
  3669. StaticSocketDataProvider data(data_reads, data_writes);
  3670. session_deps_.socket_factory->AddSocketDataProvider(&data);
  3671. TestCompletionCallback callback;
  3672. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  3673. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  3674. rv = callback.WaitForResult();
  3675. EXPECT_THAT(rv, IsOk());
  3676. const HttpResponseInfo* response = trans.GetResponseInfo();
  3677. ASSERT_TRUE(response);
  3678. ASSERT_TRUE(response->headers);
  3679. EXPECT_TRUE(response->headers->IsKeepAlive());
  3680. EXPECT_EQ(407, response->headers->response_code());
  3681. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  3682. std::string response_data;
  3683. rv = ReadTransaction(&trans, &response_data);
  3684. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  3685. // Flush the idle socket before the HttpNetworkTransaction goes out of scope.
  3686. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  3687. }
  3688. // Test the no-tunnel HTTP auth case where proxy and server origins and realms
  3689. // are the same, but the user/passwords are different. Serves to verify
  3690. // credentials are correctly separated based on HttpAuth::Target.
  3691. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyMatchesServerAuthNoTunnel) {
  3692. HttpRequestInfo request;
  3693. request.method = "GET";
  3694. request.url = GURL("http://myproxy:70/");
  3695. request.traffic_annotation =
  3696. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3697. // Proxy matches request URL.
  3698. session_deps_.proxy_resolution_service =
  3699. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  3700. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3701. NetLogWithSource net_log_with_source =
  3702. NetLogWithSource::Make(NetLogSourceType::NONE);
  3703. session_deps_.net_log = NetLog::Get();
  3704. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  3705. MockWrite data_writes[] = {
  3706. // Initial request gets a proxy auth challenge.
  3707. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3708. "Host: myproxy:70\r\n"
  3709. "Proxy-Connection: keep-alive\r\n\r\n"),
  3710. // Retry with proxy auth credentials, which will result in a server auth
  3711. // challenge.
  3712. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3713. "Host: myproxy:70\r\n"
  3714. "Proxy-Connection: keep-alive\r\n"
  3715. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  3716. // Retry with proxy and server auth credentials, which gets a response.
  3717. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3718. "Host: myproxy:70\r\n"
  3719. "Proxy-Connection: keep-alive\r\n"
  3720. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n"
  3721. "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"),
  3722. // A second request should preemptively send the correct proxy and server
  3723. // auth headers.
  3724. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3725. "Host: myproxy:70\r\n"
  3726. "Proxy-Connection: keep-alive\r\n"
  3727. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n"
  3728. "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"),
  3729. };
  3730. MockRead data_reads[] = {
  3731. // Proxy auth challenge.
  3732. MockRead("HTTP/1.0 407 Proxy Authentication Required\r\n"
  3733. "Proxy-Connection: keep-alive\r\n"
  3734. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3735. "Content-Length: 0\r\n\r\n"),
  3736. // Server auth challenge.
  3737. MockRead("HTTP/1.0 401 Authentication Required\r\n"
  3738. "Proxy-Connection: keep-alive\r\n"
  3739. "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3740. "Content-Length: 0\r\n\r\n"),
  3741. // Response.
  3742. MockRead("HTTP/1.1 200 OK\r\n"
  3743. "Proxy-Connection: keep-alive\r\n"
  3744. "Content-Length: 5\r\n\r\n"
  3745. "hello"),
  3746. // Response to second request.
  3747. MockRead("HTTP/1.1 200 OK\r\n"
  3748. "Proxy-Connection: keep-alive\r\n"
  3749. "Content-Length: 2\r\n\r\n"
  3750. "hi"),
  3751. };
  3752. StaticSocketDataProvider data(data_reads, data_writes);
  3753. session_deps_.socket_factory->AddSocketDataProvider(&data);
  3754. TestCompletionCallback callback;
  3755. auto trans =
  3756. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  3757. int rv = trans->Start(&request, callback.callback(), net_log_with_source);
  3758. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3759. const HttpResponseInfo* response = trans->GetResponseInfo();
  3760. ASSERT_TRUE(response);
  3761. ASSERT_TRUE(response->headers);
  3762. EXPECT_EQ(407, response->headers->response_code());
  3763. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3764. rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback());
  3765. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3766. response = trans->GetResponseInfo();
  3767. ASSERT_TRUE(response);
  3768. EXPECT_EQ(401, response->headers->response_code());
  3769. EXPECT_FALSE(response->auth_challenge->is_proxy);
  3770. EXPECT_EQ("http://myproxy:70",
  3771. response->auth_challenge->challenger.Serialize());
  3772. EXPECT_EQ("MyRealm1", response->auth_challenge->realm);
  3773. EXPECT_EQ(kBasicAuthScheme, response->auth_challenge->scheme);
  3774. rv = trans->RestartWithAuth(AuthCredentials(kFoo2, kBar2),
  3775. callback.callback());
  3776. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3777. response = trans->GetResponseInfo();
  3778. ASSERT_TRUE(response);
  3779. EXPECT_EQ(200, response->headers->response_code());
  3780. // The password prompt info should not be set.
  3781. EXPECT_FALSE(response->auth_challenge.has_value());
  3782. std::string response_data;
  3783. EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  3784. EXPECT_EQ("hello", response_data);
  3785. // Check that the credentials were cached correctly.
  3786. HttpAuthCache::Entry* entry = session->http_auth_cache()->Lookup(
  3787. url::SchemeHostPort(url::SchemeHostPort(GURL("http://myproxy:70"))),
  3788. HttpAuth::AUTH_PROXY, "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC,
  3789. NetworkIsolationKey());
  3790. ASSERT_TRUE(entry);
  3791. ASSERT_EQ(kFoo, entry->credentials().username());
  3792. ASSERT_EQ(kBar, entry->credentials().password());
  3793. entry = session->http_auth_cache()->Lookup(
  3794. url::SchemeHostPort(url::SchemeHostPort(GURL("http://myproxy:70"))),
  3795. HttpAuth::AUTH_SERVER, "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC,
  3796. NetworkIsolationKey());
  3797. ASSERT_TRUE(entry);
  3798. ASSERT_EQ(kFoo2, entry->credentials().username());
  3799. ASSERT_EQ(kBar2, entry->credentials().password());
  3800. // Make another request, which should automatically send the correct proxy and
  3801. // server auth credentials and get another response.
  3802. trans =
  3803. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  3804. rv = trans->Start(&request, callback.callback(), net_log_with_source);
  3805. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3806. response = trans->GetResponseInfo();
  3807. ASSERT_TRUE(response);
  3808. EXPECT_EQ(200, response->headers->response_code());
  3809. // The password prompt info should not be set.
  3810. EXPECT_FALSE(response->auth_challenge.has_value());
  3811. EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  3812. EXPECT_EQ("hi", response_data);
  3813. trans.reset();
  3814. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  3815. }
  3816. // Test the no-tunnel HTTP auth case where proxy and server origins and realms
  3817. // are the same, but the user/passwords are different, and with different
  3818. // NetworkIsolationKeys. Sends one request with a NIK, response to both proxy
  3819. // and auth challenges, sends another request with another NIK, expecting only
  3820. // the proxy credentials to be cached, and thus sees only a server auth
  3821. // challenge. Then sends a request with the original NIK, expecting cached proxy
  3822. // and auth credentials that match the ones used in the first request.
  3823. //
  3824. // Serves to verify credentials are correctly separated based on
  3825. // HttpAuth::Target and NetworkIsolationKeys, but NetworkIsolationKey only
  3826. // affects server credentials, not proxy credentials.
  3827. TEST_F(HttpNetworkTransactionTest,
  3828. BasicAuthProxyMatchesServerAuthWithNetworkIsolationKeyNoTunnel) {
  3829. const SchemefulSite kSite1(GURL("https://foo.test/"));
  3830. const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1);
  3831. const SchemefulSite kSite2(GURL("https://bar.test/"));
  3832. const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2);
  3833. // This test would need to use a single socket without this option enabled.
  3834. // Best to use this option when it would affect a test, as it will eventually
  3835. // become the default behavior.
  3836. base::test::ScopedFeatureList feature_list;
  3837. feature_list.InitAndEnableFeature(
  3838. features::kPartitionConnectionsByNetworkIsolationKey);
  3839. // Proxy matches request URL.
  3840. session_deps_.proxy_resolution_service =
  3841. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  3842. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  3843. NetLogWithSource net_log_with_source =
  3844. NetLogWithSource::Make(NetLogSourceType::NONE);
  3845. session_deps_.net_log = NetLog::Get();
  3846. session_deps_.key_auth_cache_server_entries_by_network_isolation_key = true;
  3847. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  3848. MockWrite data_writes[] = {
  3849. // Initial request gets a proxy auth challenge.
  3850. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3851. "Host: myproxy:70\r\n"
  3852. "Proxy-Connection: keep-alive\r\n\r\n"),
  3853. // Retry with proxy auth credentials, which will result in a server auth
  3854. // challenge.
  3855. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3856. "Host: myproxy:70\r\n"
  3857. "Proxy-Connection: keep-alive\r\n"
  3858. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  3859. // Retry with proxy and server auth credentials, which gets a response.
  3860. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3861. "Host: myproxy:70\r\n"
  3862. "Proxy-Connection: keep-alive\r\n"
  3863. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n"
  3864. "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"),
  3865. // Another request to the same server and using the same NIK should
  3866. // preemptively send the correct cached proxy and server
  3867. // auth headers.
  3868. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3869. "Host: myproxy:70\r\n"
  3870. "Proxy-Connection: keep-alive\r\n"
  3871. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n"
  3872. "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"),
  3873. };
  3874. MockRead data_reads[] = {
  3875. // Proxy auth challenge.
  3876. MockRead("HTTP/1.0 407 Proxy Authentication Required\r\n"
  3877. "Proxy-Connection: keep-alive\r\n"
  3878. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3879. "Content-Length: 0\r\n\r\n"),
  3880. // Server auth challenge.
  3881. MockRead("HTTP/1.0 401 Authentication Required\r\n"
  3882. "Proxy-Connection: keep-alive\r\n"
  3883. "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3884. "Content-Length: 0\r\n\r\n"),
  3885. // Response.
  3886. MockRead("HTTP/1.1 200 OK\r\n"
  3887. "Proxy-Connection: keep-alive\r\n"
  3888. "Content-Length: 5\r\n\r\n"
  3889. "hello"),
  3890. // Response to second request.
  3891. MockRead("HTTP/1.1 200 OK\r\n"
  3892. "Proxy-Connection: keep-alive\r\n"
  3893. "Content-Length: 2\r\n\r\n"
  3894. "hi"),
  3895. };
  3896. StaticSocketDataProvider data(data_reads, data_writes);
  3897. session_deps_.socket_factory->AddSocketDataProvider(&data);
  3898. MockWrite data_writes2[] = {
  3899. // Initial request using a different NetworkIsolationKey includes the
  3900. // cached proxy credentials, but not server credentials.
  3901. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3902. "Host: myproxy:70\r\n"
  3903. "Proxy-Connection: keep-alive\r\n"
  3904. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  3905. // Retry with proxy and new server auth credentials, which gets a
  3906. // response.
  3907. MockWrite("GET http://myproxy:70/ HTTP/1.1\r\n"
  3908. "Host: myproxy:70\r\n"
  3909. "Proxy-Connection: keep-alive\r\n"
  3910. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n"
  3911. "Authorization: Basic Zm9vMzpiYXIz\r\n\r\n"),
  3912. };
  3913. MockRead data_reads2[] = {
  3914. // Server auth challenge.
  3915. MockRead("HTTP/1.0 401 Authentication Required\r\n"
  3916. "Proxy-Connection: keep-alive\r\n"
  3917. "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  3918. "Content-Length: 0\r\n\r\n"),
  3919. // Response.
  3920. MockRead("HTTP/1.1 200 OK\r\n"
  3921. "Proxy-Connection: keep-alive\r\n"
  3922. "Content-Length: 9\r\n\r\n"
  3923. "greetings"),
  3924. };
  3925. StaticSocketDataProvider data2(data_reads2, data_writes2);
  3926. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  3927. TestCompletionCallback callback;
  3928. HttpRequestInfo request;
  3929. request.method = "GET";
  3930. request.url = GURL("http://myproxy:70/");
  3931. request.traffic_annotation =
  3932. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  3933. request.network_isolation_key = kNetworkIsolationKey1;
  3934. auto trans =
  3935. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  3936. int rv = trans->Start(&request, callback.callback(), net_log_with_source);
  3937. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3938. const HttpResponseInfo* response = trans->GetResponseInfo();
  3939. ASSERT_TRUE(response);
  3940. ASSERT_TRUE(response->headers);
  3941. EXPECT_EQ(407, response->headers->response_code());
  3942. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  3943. rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback());
  3944. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3945. response = trans->GetResponseInfo();
  3946. ASSERT_TRUE(response);
  3947. EXPECT_EQ(401, response->headers->response_code());
  3948. EXPECT_FALSE(response->auth_challenge->is_proxy);
  3949. EXPECT_EQ("http://myproxy:70",
  3950. response->auth_challenge->challenger.Serialize());
  3951. EXPECT_EQ("MyRealm1", response->auth_challenge->realm);
  3952. EXPECT_EQ(kBasicAuthScheme, response->auth_challenge->scheme);
  3953. rv = trans->RestartWithAuth(AuthCredentials(kFoo2, kBar2),
  3954. callback.callback());
  3955. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3956. response = trans->GetResponseInfo();
  3957. ASSERT_TRUE(response);
  3958. EXPECT_EQ(200, response->headers->response_code());
  3959. // The password prompt info should not be set.
  3960. EXPECT_FALSE(response->auth_challenge.has_value());
  3961. std::string response_data;
  3962. EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  3963. EXPECT_EQ("hello", response_data);
  3964. // Check that the proxy credentials were cached correctly. The should be
  3965. // accessible with any NetworkIsolationKey.
  3966. HttpAuthCache::Entry* entry = session->http_auth_cache()->Lookup(
  3967. url::SchemeHostPort(url::SchemeHostPort(GURL("http://myproxy:70"))),
  3968. HttpAuth::AUTH_PROXY, "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC,
  3969. kNetworkIsolationKey1);
  3970. ASSERT_TRUE(entry);
  3971. ASSERT_EQ(kFoo, entry->credentials().username());
  3972. ASSERT_EQ(kBar, entry->credentials().password());
  3973. EXPECT_EQ(entry, session->http_auth_cache()->Lookup(
  3974. url::SchemeHostPort(GURL("http://myproxy:70")),
  3975. HttpAuth::AUTH_PROXY, "MyRealm1",
  3976. HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey2));
  3977. // Check that the server credentials were cached correctly. The should be
  3978. // accessible with only kNetworkIsolationKey1.
  3979. entry = session->http_auth_cache()->Lookup(
  3980. url::SchemeHostPort(GURL("http://myproxy:70")), HttpAuth::AUTH_SERVER,
  3981. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey1);
  3982. ASSERT_TRUE(entry);
  3983. ASSERT_EQ(kFoo2, entry->credentials().username());
  3984. ASSERT_EQ(kBar2, entry->credentials().password());
  3985. // Looking up the server entry with another NetworkIsolationKey should fail.
  3986. EXPECT_FALSE(session->http_auth_cache()->Lookup(
  3987. url::SchemeHostPort(GURL("http://myproxy:70")), HttpAuth::AUTH_SERVER,
  3988. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey2));
  3989. // Make another request with a different NetworkIsolationKey. It should use
  3990. // another socket, reuse the cached proxy credentials, but result in a server
  3991. // auth challenge.
  3992. request.network_isolation_key = kNetworkIsolationKey2;
  3993. trans =
  3994. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  3995. rv = trans->Start(&request, callback.callback(), net_log_with_source);
  3996. EXPECT_THAT(callback.GetResult(rv), IsOk());
  3997. response = trans->GetResponseInfo();
  3998. ASSERT_TRUE(response);
  3999. EXPECT_EQ(401, response->headers->response_code());
  4000. EXPECT_FALSE(response->auth_challenge->is_proxy);
  4001. EXPECT_EQ("http://myproxy:70",
  4002. response->auth_challenge->challenger.Serialize());
  4003. EXPECT_EQ("MyRealm1", response->auth_challenge->realm);
  4004. EXPECT_EQ(kBasicAuthScheme, response->auth_challenge->scheme);
  4005. rv = trans->RestartWithAuth(AuthCredentials(kFoo3, kBar3),
  4006. callback.callback());
  4007. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4008. response = trans->GetResponseInfo();
  4009. ASSERT_TRUE(response);
  4010. EXPECT_EQ(200, response->headers->response_code());
  4011. // The password prompt info should not be set.
  4012. EXPECT_FALSE(response->auth_challenge.has_value());
  4013. EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  4014. EXPECT_EQ("greetings", response_data);
  4015. // Check that the proxy credentials are still cached.
  4016. entry = session->http_auth_cache()->Lookup(
  4017. url::SchemeHostPort(GURL("http://myproxy:70")), HttpAuth::AUTH_PROXY,
  4018. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey1);
  4019. ASSERT_TRUE(entry);
  4020. ASSERT_EQ(kFoo, entry->credentials().username());
  4021. ASSERT_EQ(kBar, entry->credentials().password());
  4022. EXPECT_EQ(entry, session->http_auth_cache()->Lookup(
  4023. url::SchemeHostPort(GURL("http://myproxy:70")),
  4024. HttpAuth::AUTH_PROXY, "MyRealm1",
  4025. HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey2));
  4026. // Check that the correct server credentials are cached for each
  4027. // NetworkIsolationKey.
  4028. entry = session->http_auth_cache()->Lookup(
  4029. url::SchemeHostPort(GURL("http://myproxy:70")), HttpAuth::AUTH_SERVER,
  4030. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey1);
  4031. ASSERT_TRUE(entry);
  4032. ASSERT_EQ(kFoo2, entry->credentials().username());
  4033. ASSERT_EQ(kBar2, entry->credentials().password());
  4034. entry = session->http_auth_cache()->Lookup(
  4035. url::SchemeHostPort(GURL("http://myproxy:70")), HttpAuth::AUTH_SERVER,
  4036. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey2);
  4037. ASSERT_TRUE(entry);
  4038. ASSERT_EQ(kFoo3, entry->credentials().username());
  4039. ASSERT_EQ(kBar3, entry->credentials().password());
  4040. // Make a request with the original NetworkIsolationKey. It should reuse the
  4041. // first socket, and the proxy credentials sent on the first socket.
  4042. request.network_isolation_key = kNetworkIsolationKey1;
  4043. trans =
  4044. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4045. rv = trans->Start(&request, callback.callback(), net_log_with_source);
  4046. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4047. response = trans->GetResponseInfo();
  4048. ASSERT_TRUE(response);
  4049. EXPECT_EQ(200, response->headers->response_code());
  4050. // The password prompt info should not be set.
  4051. EXPECT_FALSE(response->auth_challenge.has_value());
  4052. EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  4053. EXPECT_EQ("hi", response_data);
  4054. trans.reset();
  4055. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  4056. }
  4057. // Much like the test above, but uses tunnelled connections.
  4058. TEST_F(HttpNetworkTransactionTest,
  4059. BasicAuthProxyMatchesServerAuthWithNetworkIsolationKeyWithTunnel) {
  4060. const SchemefulSite kSite1(GURL("https://foo.test/"));
  4061. const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1);
  4062. const SchemefulSite kSite2(GURL("https://bar.test/"));
  4063. const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2);
  4064. // This test would need to use a single socket without this option enabled.
  4065. // Best to use this option when it would affect a test, as it will eventually
  4066. // become the default behavior.
  4067. base::test::ScopedFeatureList feature_list;
  4068. feature_list.InitAndEnableFeature(
  4069. features::kPartitionConnectionsByNetworkIsolationKey);
  4070. // Proxy matches request URL.
  4071. session_deps_.proxy_resolution_service =
  4072. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  4073. "HTTPS myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  4074. NetLogWithSource net_log_with_source =
  4075. NetLogWithSource::Make(NetLogSourceType::NONE);
  4076. session_deps_.net_log = NetLog::Get();
  4077. session_deps_.key_auth_cache_server_entries_by_network_isolation_key = true;
  4078. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  4079. MockWrite data_writes[] = {
  4080. // Initial tunnel request gets a proxy auth challenge.
  4081. MockWrite("CONNECT myproxy:70 HTTP/1.1\r\n"
  4082. "Host: myproxy:70\r\n"
  4083. "Proxy-Connection: keep-alive\r\n\r\n"),
  4084. // Retry with proxy auth credentials, which will result in establishing a
  4085. // tunnel.
  4086. MockWrite("CONNECT myproxy:70 HTTP/1.1\r\n"
  4087. "Host: myproxy:70\r\n"
  4088. "Proxy-Connection: keep-alive\r\n"
  4089. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  4090. // Request over the tunnel, which gets a server auth challenge.
  4091. MockWrite("GET / HTTP/1.1\r\n"
  4092. "Host: myproxy:70\r\n"
  4093. "Connection: keep-alive\r\n\r\n"),
  4094. // Retry with server auth credentials, which gets a response.
  4095. MockWrite("GET / HTTP/1.1\r\n"
  4096. "Host: myproxy:70\r\n"
  4097. "Connection: keep-alive\r\n"
  4098. "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"),
  4099. // Another request to the same server and using the same NIK should
  4100. // preemptively send the correct cached server
  4101. // auth header. Since a tunnel was already established, the proxy headers
  4102. // won't be sent again except when establishing another tunnel.
  4103. MockWrite("GET / HTTP/1.1\r\n"
  4104. "Host: myproxy:70\r\n"
  4105. "Connection: keep-alive\r\n"
  4106. "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"),
  4107. };
  4108. MockRead data_reads[] = {
  4109. // Proxy auth challenge.
  4110. MockRead("HTTP/1.0 407 Proxy Authentication Required\r\n"
  4111. "Proxy-Connection: keep-alive\r\n"
  4112. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  4113. "Content-Length: 0\r\n\r\n"),
  4114. // Tunnel success
  4115. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  4116. // Server auth challenge.
  4117. MockRead("HTTP/1.0 401 Authentication Required\r\n"
  4118. "Connection: keep-alive\r\n"
  4119. "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  4120. "Content-Length: 0\r\n\r\n"),
  4121. // Response.
  4122. MockRead("HTTP/1.1 200 OK\r\n"
  4123. "Connection: keep-alive\r\n"
  4124. "Content-Length: 5\r\n\r\n"
  4125. "hello"),
  4126. // Response to second request.
  4127. MockRead("HTTP/1.1 200 OK\r\n"
  4128. "Connection: keep-alive\r\n"
  4129. "Content-Length: 2\r\n\r\n"
  4130. "hi"),
  4131. };
  4132. StaticSocketDataProvider data(data_reads, data_writes);
  4133. session_deps_.socket_factory->AddSocketDataProvider(&data);
  4134. // One for the proxy connection, one of the server connection.
  4135. SSLSocketDataProvider ssl(ASYNC, OK);
  4136. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  4137. SSLSocketDataProvider ssl2(ASYNC, OK);
  4138. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  4139. MockWrite data_writes2[] = {
  4140. // Initial request using a different NetworkIsolationKey includes the
  4141. // cached proxy credentials when establishing a tunnel.
  4142. MockWrite("CONNECT myproxy:70 HTTP/1.1\r\n"
  4143. "Host: myproxy:70\r\n"
  4144. "Proxy-Connection: keep-alive\r\n"
  4145. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  4146. // Request over the tunnel, which gets a server auth challenge. Cached
  4147. // credentials cannot be used, since the NIK is different.
  4148. MockWrite("GET / HTTP/1.1\r\n"
  4149. "Host: myproxy:70\r\n"
  4150. "Connection: keep-alive\r\n\r\n"),
  4151. // Retry with server auth credentials, which gets a response.
  4152. MockWrite("GET / HTTP/1.1\r\n"
  4153. "Host: myproxy:70\r\n"
  4154. "Connection: keep-alive\r\n"
  4155. "Authorization: Basic Zm9vMzpiYXIz\r\n\r\n"),
  4156. };
  4157. MockRead data_reads2[] = {
  4158. // Tunnel success
  4159. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  4160. // Server auth challenge.
  4161. MockRead("HTTP/1.0 401 Authentication Required\r\n"
  4162. "Connection: keep-alive\r\n"
  4163. "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  4164. "Content-Length: 0\r\n\r\n"),
  4165. // Response.
  4166. MockRead("HTTP/1.1 200 OK\r\n"
  4167. "Connection: keep-alive\r\n"
  4168. "Content-Length: 9\r\n\r\n"
  4169. "greetings"),
  4170. };
  4171. StaticSocketDataProvider data2(data_reads2, data_writes2);
  4172. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  4173. // One for the proxy connection, one of the server connection.
  4174. SSLSocketDataProvider ssl3(ASYNC, OK);
  4175. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3);
  4176. SSLSocketDataProvider ssl4(ASYNC, OK);
  4177. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl4);
  4178. TestCompletionCallback callback;
  4179. HttpRequestInfo request;
  4180. request.method = "GET";
  4181. request.url = GURL("https://myproxy:70/");
  4182. request.traffic_annotation =
  4183. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4184. request.network_isolation_key = kNetworkIsolationKey1;
  4185. auto trans =
  4186. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4187. int rv = trans->Start(&request, callback.callback(), net_log_with_source);
  4188. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4189. const HttpResponseInfo* response = trans->GetResponseInfo();
  4190. ASSERT_TRUE(response);
  4191. ASSERT_TRUE(response->headers);
  4192. EXPECT_EQ(407, response->headers->response_code());
  4193. EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge));
  4194. rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback());
  4195. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4196. response = trans->GetResponseInfo();
  4197. ASSERT_TRUE(response);
  4198. EXPECT_EQ(401, response->headers->response_code());
  4199. EXPECT_FALSE(response->auth_challenge->is_proxy);
  4200. EXPECT_EQ("https://myproxy:70",
  4201. response->auth_challenge->challenger.Serialize());
  4202. EXPECT_EQ("MyRealm1", response->auth_challenge->realm);
  4203. EXPECT_EQ(kBasicAuthScheme, response->auth_challenge->scheme);
  4204. rv = trans->RestartWithAuth(AuthCredentials(kFoo2, kBar2),
  4205. callback.callback());
  4206. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4207. response = trans->GetResponseInfo();
  4208. ASSERT_TRUE(response);
  4209. EXPECT_EQ(200, response->headers->response_code());
  4210. // The password prompt info should not be set.
  4211. EXPECT_FALSE(response->auth_challenge.has_value());
  4212. std::string response_data;
  4213. EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  4214. EXPECT_EQ("hello", response_data);
  4215. // Check that the proxy credentials were cached correctly. The should be
  4216. // accessible with any NetworkIsolationKey.
  4217. HttpAuthCache::Entry* entry = session->http_auth_cache()->Lookup(
  4218. url::SchemeHostPort(url::SchemeHostPort(GURL("https://myproxy:70"))),
  4219. HttpAuth::AUTH_PROXY, "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC,
  4220. kNetworkIsolationKey1);
  4221. ASSERT_TRUE(entry);
  4222. ASSERT_EQ(kFoo, entry->credentials().username());
  4223. ASSERT_EQ(kBar, entry->credentials().password());
  4224. EXPECT_EQ(entry, session->http_auth_cache()->Lookup(
  4225. url::SchemeHostPort(GURL("https://myproxy:70")),
  4226. HttpAuth::AUTH_PROXY, "MyRealm1",
  4227. HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey2));
  4228. // Check that the server credentials were cached correctly. The should be
  4229. // accessible with only kNetworkIsolationKey1.
  4230. entry = session->http_auth_cache()->Lookup(
  4231. url::SchemeHostPort(GURL("https://myproxy:70")), HttpAuth::AUTH_SERVER,
  4232. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey1);
  4233. ASSERT_TRUE(entry);
  4234. ASSERT_EQ(kFoo2, entry->credentials().username());
  4235. ASSERT_EQ(kBar2, entry->credentials().password());
  4236. // Looking up the server entry with another NetworkIsolationKey should fail.
  4237. EXPECT_FALSE(session->http_auth_cache()->Lookup(
  4238. url::SchemeHostPort(GURL("https://myproxy:70")), HttpAuth::AUTH_SERVER,
  4239. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey2));
  4240. // Make another request with a different NetworkIsolationKey. It should use
  4241. // another socket, reuse the cached proxy credentials, but result in a server
  4242. // auth challenge.
  4243. request.network_isolation_key = kNetworkIsolationKey2;
  4244. trans =
  4245. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4246. rv = trans->Start(&request, callback.callback(), net_log_with_source);
  4247. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4248. response = trans->GetResponseInfo();
  4249. ASSERT_TRUE(response);
  4250. EXPECT_EQ(401, response->headers->response_code());
  4251. EXPECT_FALSE(response->auth_challenge->is_proxy);
  4252. EXPECT_EQ("https://myproxy:70",
  4253. response->auth_challenge->challenger.Serialize());
  4254. EXPECT_EQ("MyRealm1", response->auth_challenge->realm);
  4255. EXPECT_EQ(kBasicAuthScheme, response->auth_challenge->scheme);
  4256. rv = trans->RestartWithAuth(AuthCredentials(kFoo3, kBar3),
  4257. callback.callback());
  4258. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4259. response = trans->GetResponseInfo();
  4260. ASSERT_TRUE(response);
  4261. EXPECT_EQ(200, response->headers->response_code());
  4262. // The password prompt info should not be set.
  4263. EXPECT_FALSE(response->auth_challenge.has_value());
  4264. EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  4265. EXPECT_EQ("greetings", response_data);
  4266. // Check that the proxy credentials are still cached.
  4267. entry = session->http_auth_cache()->Lookup(
  4268. url::SchemeHostPort(GURL("https://myproxy:70")), HttpAuth::AUTH_PROXY,
  4269. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey1);
  4270. ASSERT_TRUE(entry);
  4271. ASSERT_EQ(kFoo, entry->credentials().username());
  4272. ASSERT_EQ(kBar, entry->credentials().password());
  4273. EXPECT_EQ(entry, session->http_auth_cache()->Lookup(
  4274. url::SchemeHostPort(GURL("https://myproxy:70")),
  4275. HttpAuth::AUTH_PROXY, "MyRealm1",
  4276. HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey2));
  4277. // Check that the correct server credentials are cached for each
  4278. // NetworkIsolationKey.
  4279. entry = session->http_auth_cache()->Lookup(
  4280. url::SchemeHostPort(GURL("https://myproxy:70")), HttpAuth::AUTH_SERVER,
  4281. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey1);
  4282. ASSERT_TRUE(entry);
  4283. ASSERT_EQ(kFoo2, entry->credentials().username());
  4284. ASSERT_EQ(kBar2, entry->credentials().password());
  4285. entry = session->http_auth_cache()->Lookup(
  4286. url::SchemeHostPort(GURL("https://myproxy:70")), HttpAuth::AUTH_SERVER,
  4287. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, kNetworkIsolationKey2);
  4288. ASSERT_TRUE(entry);
  4289. ASSERT_EQ(kFoo3, entry->credentials().username());
  4290. ASSERT_EQ(kBar3, entry->credentials().password());
  4291. // Make a request with the original NetworkIsolationKey. It should reuse the
  4292. // first socket, and the proxy credentials sent on the first socket.
  4293. request.network_isolation_key = kNetworkIsolationKey1;
  4294. trans =
  4295. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4296. rv = trans->Start(&request, callback.callback(), net_log_with_source);
  4297. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4298. response = trans->GetResponseInfo();
  4299. ASSERT_TRUE(response);
  4300. EXPECT_EQ(200, response->headers->response_code());
  4301. // The password prompt info should not be set.
  4302. EXPECT_FALSE(response->auth_challenge.has_value());
  4303. EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  4304. EXPECT_EQ("hi", response_data);
  4305. trans.reset();
  4306. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  4307. }
  4308. // Test that we don't pass extraneous headers from the proxy's response to the
  4309. // caller when the proxy responds to CONNECT with 407.
  4310. TEST_F(HttpNetworkTransactionTest, SanitizeProxyAuthHeaders) {
  4311. HttpRequestInfo request;
  4312. request.method = "GET";
  4313. request.url = GURL("https://www.example.org/");
  4314. request.traffic_annotation =
  4315. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4316. // Configure against proxy server "myproxy:70".
  4317. session_deps_.proxy_resolution_service =
  4318. ConfiguredProxyResolutionService::CreateFixedForTest(
  4319. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  4320. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  4321. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  4322. // Since we have proxy, should try to establish tunnel.
  4323. MockWrite data_writes[] = {
  4324. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4325. "Host: www.example.org:443\r\n"
  4326. "Proxy-Connection: keep-alive\r\n\r\n"),
  4327. };
  4328. // The proxy responds to the connect with a 407.
  4329. MockRead data_reads[] = {
  4330. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  4331. MockRead("X-Foo: bar\r\n"),
  4332. MockRead("Set-Cookie: foo=bar\r\n"),
  4333. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  4334. MockRead("Content-Length: 10\r\n\r\n"),
  4335. MockRead(SYNCHRONOUS, ERR_UNEXPECTED),
  4336. };
  4337. StaticSocketDataProvider data(data_reads, data_writes);
  4338. session_deps_.socket_factory->AddSocketDataProvider(&data);
  4339. TestCompletionCallback callback;
  4340. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  4341. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  4342. rv = callback.WaitForResult();
  4343. EXPECT_THAT(rv, IsOk());
  4344. const HttpResponseInfo* response = trans.GetResponseInfo();
  4345. ASSERT_TRUE(response);
  4346. ASSERT_TRUE(response->headers);
  4347. EXPECT_TRUE(response->headers->IsKeepAlive());
  4348. EXPECT_EQ(407, response->headers->response_code());
  4349. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  4350. EXPECT_FALSE(response->headers->HasHeader("X-Foo"));
  4351. EXPECT_FALSE(response->headers->HasHeader("Set-Cookie"));
  4352. std::string response_data;
  4353. rv = ReadTransaction(&trans, &response_data);
  4354. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  4355. // Flush the idle socket before the HttpNetworkTransaction goes out of scope.
  4356. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  4357. }
  4358. // Test when a server (non-proxy) returns a 407 (proxy-authenticate).
  4359. // The request should fail with ERR_UNEXPECTED_PROXY_AUTH.
  4360. TEST_F(HttpNetworkTransactionTest, UnexpectedProxyAuth) {
  4361. HttpRequestInfo request;
  4362. request.method = "GET";
  4363. request.url = GURL("http://www.example.org/");
  4364. request.traffic_annotation =
  4365. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4366. // We are using a DIRECT connection (i.e. no proxy) for this session.
  4367. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  4368. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  4369. MockWrite data_writes1[] = {
  4370. MockWrite(
  4371. "GET / HTTP/1.1\r\n"
  4372. "Host: www.example.org\r\n"
  4373. "Connection: keep-alive\r\n\r\n"),
  4374. };
  4375. MockRead data_reads1[] = {
  4376. MockRead("HTTP/1.0 407 Proxy Auth required\r\n"),
  4377. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  4378. // Large content-length -- won't matter, as connection will be reset.
  4379. MockRead("Content-Length: 10000\r\n\r\n"),
  4380. MockRead(SYNCHRONOUS, ERR_FAILED),
  4381. };
  4382. StaticSocketDataProvider data1(data_reads1, data_writes1);
  4383. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  4384. TestCompletionCallback callback;
  4385. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  4386. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  4387. rv = callback.WaitForResult();
  4388. EXPECT_THAT(rv, IsError(ERR_UNEXPECTED_PROXY_AUTH));
  4389. }
  4390. // Tests when an HTTPS server (non-proxy) returns a 407 (proxy-authentication)
  4391. // through a non-authenticating proxy. The request should fail with
  4392. // ERR_UNEXPECTED_PROXY_AUTH.
  4393. // Note that it is impossible to detect if an HTTP server returns a 407 through
  4394. // a non-authenticating proxy - there is nothing to indicate whether the
  4395. // response came from the proxy or the server, so it is treated as if the proxy
  4396. // issued the challenge.
  4397. TEST_F(HttpNetworkTransactionTest, HttpsServerRequestsProxyAuthThroughProxy) {
  4398. HttpRequestInfo request;
  4399. request.method = "GET";
  4400. request.url = GURL("https://www.example.org/");
  4401. request.traffic_annotation =
  4402. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4403. session_deps_.proxy_resolution_service =
  4404. ConfiguredProxyResolutionService::CreateFixedForTest(
  4405. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  4406. RecordingNetLogObserver net_log_observer;
  4407. session_deps_.net_log = NetLog::Get();
  4408. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  4409. // Since we have proxy, should try to establish tunnel.
  4410. MockWrite data_writes1[] = {
  4411. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4412. "Host: www.example.org:443\r\n"
  4413. "Proxy-Connection: keep-alive\r\n\r\n"),
  4414. MockWrite("GET / HTTP/1.1\r\n"
  4415. "Host: www.example.org\r\n"
  4416. "Connection: keep-alive\r\n\r\n"),
  4417. };
  4418. MockRead data_reads1[] = {
  4419. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  4420. MockRead("HTTP/1.1 407 Unauthorized\r\n"),
  4421. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  4422. MockRead("\r\n"),
  4423. MockRead(SYNCHRONOUS, OK),
  4424. };
  4425. StaticSocketDataProvider data1(data_reads1, data_writes1);
  4426. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  4427. SSLSocketDataProvider ssl(ASYNC, OK);
  4428. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  4429. TestCompletionCallback callback1;
  4430. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  4431. int rv = trans.Start(&request, callback1.callback(),
  4432. NetLogWithSource::Make(NetLogSourceType::NONE));
  4433. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  4434. rv = callback1.WaitForResult();
  4435. EXPECT_THAT(rv, IsError(ERR_UNEXPECTED_PROXY_AUTH));
  4436. auto entries = net_log_observer.GetEntries();
  4437. size_t pos = ExpectLogContainsSomewhere(
  4438. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  4439. NetLogEventPhase::NONE);
  4440. ExpectLogContainsSomewhere(
  4441. entries, pos,
  4442. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  4443. NetLogEventPhase::NONE);
  4444. }
  4445. // Test a proxy auth scheme that allows default credentials and a proxy server
  4446. // that uses non-persistent connections.
  4447. TEST_F(HttpNetworkTransactionTest,
  4448. AuthAllowsDefaultCredentialsTunnelConnectionClose) {
  4449. HttpRequestInfo request;
  4450. request.method = "GET";
  4451. request.url = GURL("https://www.example.org/");
  4452. request.traffic_annotation =
  4453. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4454. // Configure against proxy server "myproxy:70".
  4455. session_deps_.proxy_resolution_service =
  4456. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  4457. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  4458. auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>();
  4459. auth_handler_factory->set_do_init_from_challenge(true);
  4460. auto mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4461. mock_handler->set_allows_default_credentials(true);
  4462. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4463. HttpAuth::AUTH_PROXY);
  4464. session_deps_.http_auth_handler_factory = std::move(auth_handler_factory);
  4465. // Add NetLog just so can verify load timing information gets a NetLog ID.
  4466. session_deps_.net_log = NetLog::Get();
  4467. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  4468. // Since we have proxy, should try to establish tunnel.
  4469. MockWrite data_writes1[] = {
  4470. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4471. "Host: www.example.org:443\r\n"
  4472. "Proxy-Connection: keep-alive\r\n\r\n"),
  4473. };
  4474. // The proxy responds to the connect with a 407, using a non-persistent
  4475. // connection.
  4476. MockRead data_reads1[] = {
  4477. // No credentials.
  4478. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  4479. MockRead("Proxy-Authenticate: Mock\r\n"),
  4480. MockRead("Proxy-Connection: close\r\n\r\n"),
  4481. };
  4482. // Since the first connection couldn't be reused, need to establish another
  4483. // once given credentials.
  4484. MockWrite data_writes2[] = {
  4485. // After calling trans->RestartWithAuth(), this is the request we should
  4486. // be issuing -- the final header line contains the credentials.
  4487. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4488. "Host: www.example.org:443\r\n"
  4489. "Proxy-Connection: keep-alive\r\n"
  4490. "Proxy-Authorization: auth_token\r\n\r\n"),
  4491. MockWrite("GET / HTTP/1.1\r\n"
  4492. "Host: www.example.org\r\n"
  4493. "Connection: keep-alive\r\n\r\n"),
  4494. };
  4495. MockRead data_reads2[] = {
  4496. MockRead("HTTP/1.0 200 Connection Established\r\n\r\n"),
  4497. MockRead("HTTP/1.1 200 OK\r\n"),
  4498. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  4499. MockRead("Content-Length: 5\r\n\r\n"),
  4500. MockRead(SYNCHRONOUS, "hello"),
  4501. };
  4502. StaticSocketDataProvider data1(data_reads1, data_writes1);
  4503. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  4504. StaticSocketDataProvider data2(data_reads2, data_writes2);
  4505. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  4506. SSLSocketDataProvider ssl(ASYNC, OK);
  4507. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  4508. auto trans =
  4509. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4510. TestCompletionCallback callback;
  4511. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  4512. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4513. const HttpResponseInfo* response = trans->GetResponseInfo();
  4514. ASSERT_TRUE(response);
  4515. ASSERT_TRUE(response->headers);
  4516. EXPECT_FALSE(response->headers->IsKeepAlive());
  4517. EXPECT_EQ(407, response->headers->response_code());
  4518. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  4519. EXPECT_TRUE(trans->IsReadyToRestartForAuth());
  4520. EXPECT_FALSE(response->auth_challenge.has_value());
  4521. LoadTimingInfo load_timing_info;
  4522. // CONNECT requests and responses are handled at the connect job level, so
  4523. // the transaction does not yet have a connection.
  4524. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info));
  4525. rv = trans->RestartWithAuth(AuthCredentials(), callback.callback());
  4526. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4527. response = trans->GetResponseInfo();
  4528. ASSERT_TRUE(response);
  4529. ASSERT_TRUE(response->headers);
  4530. EXPECT_TRUE(response->headers->IsKeepAlive());
  4531. EXPECT_EQ(200, response->headers->response_code());
  4532. EXPECT_EQ(5, response->headers->GetContentLength());
  4533. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  4534. // The password prompt info should not be set.
  4535. EXPECT_FALSE(response->auth_challenge.has_value());
  4536. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  4537. TestLoadTimingNotReusedWithPac(load_timing_info,
  4538. CONNECT_TIMING_HAS_SSL_TIMES);
  4539. trans.reset();
  4540. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  4541. }
  4542. // Test a proxy auth scheme that allows default credentials and a proxy server
  4543. // that hangs up when credentials are initially sent.
  4544. TEST_F(HttpNetworkTransactionTest,
  4545. AuthAllowsDefaultCredentialsTunnelServerClosesConnection) {
  4546. HttpRequestInfo request;
  4547. request.method = "GET";
  4548. request.url = GURL("https://www.example.org/");
  4549. request.traffic_annotation =
  4550. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4551. // Configure against proxy server "myproxy:70".
  4552. session_deps_.proxy_resolution_service =
  4553. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  4554. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  4555. auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>();
  4556. auth_handler_factory->set_do_init_from_challenge(true);
  4557. auto mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4558. mock_handler->set_allows_default_credentials(true);
  4559. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4560. HttpAuth::AUTH_PROXY);
  4561. session_deps_.http_auth_handler_factory = std::move(auth_handler_factory);
  4562. // Add NetLog just so can verify load timing information gets a NetLog ID.
  4563. session_deps_.net_log = NetLog::Get();
  4564. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  4565. // Should try to establish tunnel.
  4566. MockWrite data_writes1[] = {
  4567. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4568. "Host: www.example.org:443\r\n"
  4569. "Proxy-Connection: keep-alive\r\n\r\n"),
  4570. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4571. "Host: www.example.org:443\r\n"
  4572. "Proxy-Connection: keep-alive\r\n"
  4573. "Proxy-Authorization: auth_token\r\n\r\n"),
  4574. };
  4575. // The proxy responds to the connect with a 407, using a non-persistent
  4576. // connection.
  4577. MockRead data_reads1[] = {
  4578. // No credentials.
  4579. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  4580. MockRead("Proxy-Authenticate: Mock\r\n\r\n"),
  4581. MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED),
  4582. };
  4583. // Since the first connection was closed, need to establish another once given
  4584. // credentials.
  4585. MockWrite data_writes2[] = {
  4586. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4587. "Host: www.example.org:443\r\n"
  4588. "Proxy-Connection: keep-alive\r\n"
  4589. "Proxy-Authorization: auth_token\r\n\r\n"),
  4590. MockWrite("GET / HTTP/1.1\r\n"
  4591. "Host: www.example.org\r\n"
  4592. "Connection: keep-alive\r\n\r\n"),
  4593. };
  4594. MockRead data_reads2[] = {
  4595. MockRead("HTTP/1.0 200 Connection Established\r\n\r\n"),
  4596. MockRead("HTTP/1.1 200 OK\r\n"),
  4597. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  4598. MockRead("Content-Length: 5\r\n\r\n"),
  4599. MockRead(SYNCHRONOUS, "hello"),
  4600. };
  4601. StaticSocketDataProvider data1(data_reads1, data_writes1);
  4602. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  4603. StaticSocketDataProvider data2(data_reads2, data_writes2);
  4604. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  4605. SSLSocketDataProvider ssl(ASYNC, OK);
  4606. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  4607. auto trans =
  4608. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4609. TestCompletionCallback callback;
  4610. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  4611. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4612. const HttpResponseInfo* response = trans->GetResponseInfo();
  4613. ASSERT_TRUE(response);
  4614. ASSERT_TRUE(response->headers);
  4615. EXPECT_TRUE(response->headers->IsKeepAlive());
  4616. EXPECT_EQ(407, response->headers->response_code());
  4617. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  4618. EXPECT_TRUE(trans->IsReadyToRestartForAuth());
  4619. EXPECT_FALSE(response->auth_challenge.has_value());
  4620. LoadTimingInfo load_timing_info;
  4621. // CONNECT requests and responses are handled at the connect job level, so
  4622. // the transaction does not yet have a connection.
  4623. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info));
  4624. rv = trans->RestartWithAuth(AuthCredentials(), callback.callback());
  4625. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4626. response = trans->GetResponseInfo();
  4627. ASSERT_TRUE(response);
  4628. ASSERT_TRUE(response->headers);
  4629. EXPECT_TRUE(response->headers->IsKeepAlive());
  4630. EXPECT_EQ(200, response->headers->response_code());
  4631. EXPECT_EQ(5, response->headers->GetContentLength());
  4632. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  4633. // The password prompt info should not be set.
  4634. EXPECT_FALSE(response->auth_challenge.has_value());
  4635. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  4636. TestLoadTimingNotReusedWithPac(load_timing_info,
  4637. CONNECT_TIMING_HAS_SSL_TIMES);
  4638. trans.reset();
  4639. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  4640. }
  4641. // Test a proxy auth scheme that allows default credentials and a proxy server
  4642. // that hangs up when credentials are initially sent, and hangs up again when
  4643. // they are retried.
  4644. TEST_F(HttpNetworkTransactionTest,
  4645. AuthAllowsDefaultCredentialsTunnelServerClosesConnectionTwice) {
  4646. HttpRequestInfo request;
  4647. request.method = "GET";
  4648. request.url = GURL("https://www.example.org/");
  4649. request.traffic_annotation =
  4650. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4651. // Configure against proxy server "myproxy:70".
  4652. session_deps_.proxy_resolution_service =
  4653. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  4654. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  4655. auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>();
  4656. auth_handler_factory->set_do_init_from_challenge(true);
  4657. auto mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4658. mock_handler->set_allows_default_credentials(true);
  4659. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4660. HttpAuth::AUTH_PROXY);
  4661. session_deps_.http_auth_handler_factory = std::move(auth_handler_factory);
  4662. // Add NetLog just so can verify load timing information gets a NetLog ID.
  4663. session_deps_.net_log = NetLog::Get();
  4664. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  4665. // Should try to establish tunnel.
  4666. MockWrite data_writes1[] = {
  4667. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4668. "Host: www.example.org:443\r\n"
  4669. "Proxy-Connection: keep-alive\r\n\r\n"),
  4670. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4671. "Host: www.example.org:443\r\n"
  4672. "Proxy-Connection: keep-alive\r\n"
  4673. "Proxy-Authorization: auth_token\r\n\r\n"),
  4674. };
  4675. // The proxy responds to the connect with a 407, and then hangs up after the
  4676. // second request is sent.
  4677. MockRead data_reads1[] = {
  4678. // No credentials.
  4679. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  4680. MockRead("Content-Length: 0\r\n"),
  4681. MockRead("Proxy-Connection: keep-alive\r\n"),
  4682. MockRead("Proxy-Authenticate: Mock\r\n\r\n"),
  4683. MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED),
  4684. };
  4685. // HttpNetworkTransaction sees a reused connection that was closed with
  4686. // ERR_CONNECTION_CLOSED, realized it might have been a race, so retries the
  4687. // request.
  4688. MockWrite data_writes2[] = {
  4689. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4690. "Host: www.example.org:443\r\n"
  4691. "Proxy-Connection: keep-alive\r\n\r\n"),
  4692. };
  4693. // The proxy, having had more than enough of us, just hangs up.
  4694. MockRead data_reads2[] = {
  4695. // No credentials.
  4696. MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED),
  4697. };
  4698. StaticSocketDataProvider data1(data_reads1, data_writes1);
  4699. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  4700. StaticSocketDataProvider data2(data_reads2, data_writes2);
  4701. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  4702. auto trans =
  4703. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4704. TestCompletionCallback callback;
  4705. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  4706. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4707. const HttpResponseInfo* response = trans->GetResponseInfo();
  4708. ASSERT_TRUE(response);
  4709. ASSERT_TRUE(response->headers);
  4710. EXPECT_TRUE(response->headers->IsKeepAlive());
  4711. EXPECT_EQ(407, response->headers->response_code());
  4712. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  4713. EXPECT_TRUE(trans->IsReadyToRestartForAuth());
  4714. EXPECT_FALSE(response->auth_challenge.has_value());
  4715. LoadTimingInfo load_timing_info;
  4716. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info));
  4717. rv = trans->RestartWithAuth(AuthCredentials(), callback.callback());
  4718. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_EMPTY_RESPONSE));
  4719. trans.reset();
  4720. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  4721. }
  4722. // This test exercises an odd edge case where the proxy closes the connection
  4723. // after the authentication handshake is complete. Presumably this technique is
  4724. // used in lieu of returning a 403 or 5xx status code when the authentication
  4725. // succeeds, but the user is not authorized to connect to the destination
  4726. // server. There's no standard for what a proxy should do to indicate a blocked
  4727. // site.
  4728. TEST_F(HttpNetworkTransactionTest,
  4729. AuthAllowsDefaultCredentialsTunnelConnectionClosesBeforeBody) {
  4730. HttpRequestInfo request;
  4731. request.method = "GET";
  4732. request.url = GURL("https://www.example.org/");
  4733. request.traffic_annotation =
  4734. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4735. // Configure against proxy server "myproxy:70".
  4736. session_deps_.proxy_resolution_service =
  4737. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  4738. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  4739. auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>();
  4740. auth_handler_factory->set_do_init_from_challenge(true);
  4741. // Create two mock AuthHandlers. This is because the transaction gets retried
  4742. // after the first ERR_CONNECTION_CLOSED since it's ambiguous whether there
  4743. // was a real network error.
  4744. //
  4745. // The handlers support both default and explicit credentials. The retry
  4746. // mentioned above should be able to reuse the default identity. Thus there
  4747. // should never be a need to prompt for explicit credentials.
  4748. auto mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4749. mock_handler->set_allows_default_credentials(true);
  4750. mock_handler->set_allows_explicit_credentials(true);
  4751. mock_handler->set_connection_based(true);
  4752. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4753. HttpAuth::AUTH_PROXY);
  4754. mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4755. mock_handler->set_allows_default_credentials(true);
  4756. mock_handler->set_allows_explicit_credentials(true);
  4757. mock_handler->set_connection_based(true);
  4758. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4759. HttpAuth::AUTH_PROXY);
  4760. session_deps_.http_auth_handler_factory = std::move(auth_handler_factory);
  4761. session_deps_.net_log = NetLog::Get();
  4762. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  4763. // Data for both sockets.
  4764. //
  4765. // Writes are for the tunnel establishment attempts and the
  4766. // authentication handshake.
  4767. MockWrite data_writes1[] = {
  4768. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4769. "Host: www.example.org:443\r\n"
  4770. "Proxy-Connection: keep-alive\r\n\r\n"),
  4771. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4772. "Host: www.example.org:443\r\n"
  4773. "Proxy-Connection: keep-alive\r\n"
  4774. "Proxy-Authorization: auth_token\r\n\r\n"),
  4775. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4776. "Host: www.example.org:443\r\n"
  4777. "Proxy-Connection: keep-alive\r\n"
  4778. "Proxy-Authorization: auth_token\r\n\r\n"),
  4779. };
  4780. // The server side of the authentication handshake. Note that the response to
  4781. // the final CONNECT request is ERR_CONNECTION_CLOSED.
  4782. MockRead data_reads1[] = {
  4783. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  4784. MockRead("Content-Length: 0\r\n"),
  4785. MockRead("Proxy-Connection: keep-alive\r\n"),
  4786. MockRead("Proxy-Authenticate: Mock\r\n\r\n"),
  4787. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  4788. MockRead("Content-Length: 0\r\n"),
  4789. MockRead("Proxy-Connection: keep-alive\r\n"),
  4790. MockRead("Proxy-Authenticate: Mock foo\r\n\r\n"),
  4791. MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED),
  4792. };
  4793. StaticSocketDataProvider data1(data_reads1, data_writes1);
  4794. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  4795. // The second socket is for the reconnection attempt. Data is identical to the
  4796. // first attempt.
  4797. StaticSocketDataProvider data2(data_reads1, data_writes1);
  4798. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  4799. auto trans =
  4800. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4801. TestCompletionCallback callback;
  4802. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  4803. // Two rounds per handshake. After one retry, the error is propagated up the
  4804. // stack.
  4805. for (int i = 0; i < 4; ++i) {
  4806. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4807. const HttpResponseInfo* response = trans->GetResponseInfo();
  4808. ASSERT_TRUE(response);
  4809. ASSERT_TRUE(response->headers);
  4810. EXPECT_EQ(407, response->headers->response_code());
  4811. ASSERT_TRUE(trans->IsReadyToRestartForAuth());
  4812. rv = trans->RestartWithAuth(AuthCredentials(), callback.callback());
  4813. }
  4814. // One shall be the number thou shalt retry, and the number of the retrying
  4815. // shall be one. Two shalt thou not retry, neither retry thou zero, excepting
  4816. // that thou then proceed to one. Three is right out. Once the number one,
  4817. // being the first number, be reached, then lobbest thou thy
  4818. // ERR_CONNECTION_CLOSED towards they network transaction, who shall snuff it.
  4819. EXPECT_EQ(ERR_CONNECTION_CLOSED, callback.GetResult(rv));
  4820. trans.reset();
  4821. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  4822. }
  4823. // Test a proxy auth scheme that allows default credentials and a proxy server
  4824. // that hangs up when credentials are initially sent, and sends a challenge
  4825. // again they are retried.
  4826. TEST_F(HttpNetworkTransactionTest,
  4827. AuthAllowsDefaultCredentialsTunnelServerChallengesTwice) {
  4828. HttpRequestInfo request;
  4829. request.method = "GET";
  4830. request.url = GURL("https://www.example.org/");
  4831. request.traffic_annotation =
  4832. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4833. // Configure against proxy server "myproxy:70".
  4834. session_deps_.proxy_resolution_service =
  4835. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  4836. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  4837. auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>();
  4838. auth_handler_factory->set_do_init_from_challenge(true);
  4839. auto mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4840. mock_handler->set_allows_default_credentials(true);
  4841. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4842. HttpAuth::AUTH_PROXY);
  4843. // Add another handler for the second challenge. It supports default
  4844. // credentials, but they shouldn't be used, since they were already tried.
  4845. mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4846. mock_handler->set_allows_default_credentials(true);
  4847. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4848. HttpAuth::AUTH_PROXY);
  4849. session_deps_.http_auth_handler_factory = std::move(auth_handler_factory);
  4850. // Add NetLog just so can verify load timing information gets a NetLog ID.
  4851. session_deps_.net_log = NetLog::Get();
  4852. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  4853. // Should try to establish tunnel.
  4854. MockWrite data_writes1[] = {
  4855. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4856. "Host: www.example.org:443\r\n"
  4857. "Proxy-Connection: keep-alive\r\n\r\n"),
  4858. };
  4859. // The proxy responds to the connect with a 407, using a non-persistent
  4860. // connection.
  4861. MockRead data_reads1[] = {
  4862. // No credentials.
  4863. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  4864. MockRead("Proxy-Authenticate: Mock\r\n"),
  4865. MockRead("Proxy-Connection: close\r\n\r\n"),
  4866. };
  4867. // Since the first connection was closed, need to establish another once given
  4868. // credentials.
  4869. MockWrite data_writes2[] = {
  4870. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  4871. "Host: www.example.org:443\r\n"
  4872. "Proxy-Connection: keep-alive\r\n"
  4873. "Proxy-Authorization: auth_token\r\n\r\n"),
  4874. };
  4875. MockRead data_reads2[] = {
  4876. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  4877. MockRead("Proxy-Authenticate: Mock\r\n"),
  4878. MockRead("Proxy-Connection: close\r\n\r\n"),
  4879. };
  4880. StaticSocketDataProvider data1(data_reads1, data_writes1);
  4881. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  4882. StaticSocketDataProvider data2(data_reads2, data_writes2);
  4883. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  4884. SSLSocketDataProvider ssl(ASYNC, OK);
  4885. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  4886. auto trans =
  4887. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4888. TestCompletionCallback callback;
  4889. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  4890. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4891. const HttpResponseInfo* response = trans->GetResponseInfo();
  4892. ASSERT_TRUE(response);
  4893. ASSERT_TRUE(response->headers);
  4894. EXPECT_EQ(407, response->headers->response_code());
  4895. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  4896. EXPECT_TRUE(trans->IsReadyToRestartForAuth());
  4897. EXPECT_FALSE(response->auth_challenge.has_value());
  4898. LoadTimingInfo load_timing_info;
  4899. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info));
  4900. rv = trans->RestartWithAuth(AuthCredentials(), callback.callback());
  4901. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4902. response = trans->GetResponseInfo();
  4903. ASSERT_TRUE(response);
  4904. ASSERT_TRUE(response->headers);
  4905. EXPECT_EQ(407, response->headers->response_code());
  4906. EXPECT_FALSE(trans->IsReadyToRestartForAuth());
  4907. EXPECT_TRUE(response->auth_challenge.has_value());
  4908. trans.reset();
  4909. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  4910. }
  4911. // A more nuanced test than GenerateAuthToken test which asserts that
  4912. // ERR_INVALID_AUTH_CREDENTIALS does not cause the auth scheme to be
  4913. // unnecessarily invalidated, and that if the server co-operates, the
  4914. // authentication handshake can continue with the same scheme but with a
  4915. // different identity.
  4916. TEST_F(HttpNetworkTransactionTest, NonPermanentGenerateAuthTokenError) {
  4917. HttpRequestInfo request;
  4918. request.method = "GET";
  4919. request.url = GURL("http://www.example.org/");
  4920. request.traffic_annotation =
  4921. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  4922. auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>();
  4923. auth_handler_factory->set_do_init_from_challenge(true);
  4924. // First handler. Uses default credentials, but barfs at generate auth token.
  4925. auto mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4926. mock_handler->set_allows_default_credentials(true);
  4927. mock_handler->set_allows_explicit_credentials(true);
  4928. mock_handler->set_connection_based(true);
  4929. mock_handler->SetGenerateExpectation(true, ERR_INVALID_AUTH_CREDENTIALS);
  4930. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4931. HttpAuth::AUTH_SERVER);
  4932. // Add another handler for the second challenge. It supports default
  4933. // credentials, but they shouldn't be used, since they were already tried.
  4934. mock_handler = std::make_unique<HttpAuthHandlerMock>();
  4935. mock_handler->set_allows_default_credentials(true);
  4936. mock_handler->set_allows_explicit_credentials(true);
  4937. mock_handler->set_connection_based(true);
  4938. auth_handler_factory->AddMockHandler(std::move(mock_handler),
  4939. HttpAuth::AUTH_SERVER);
  4940. session_deps_.http_auth_handler_factory = std::move(auth_handler_factory);
  4941. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  4942. MockWrite data_writes1[] = {
  4943. MockWrite("GET / HTTP/1.1\r\n"
  4944. "Host: www.example.org\r\n"
  4945. "Connection: keep-alive\r\n\r\n"),
  4946. };
  4947. MockRead data_reads1[] = {
  4948. MockRead("HTTP/1.1 401 Authentication Required\r\n"
  4949. "WWW-Authenticate: Mock\r\n"
  4950. "Connection: keep-alive\r\n\r\n"),
  4951. };
  4952. // Identical to data_writes1[]. The AuthHandler encounters a
  4953. // ERR_INVALID_AUTH_CREDENTIALS during the GenerateAuthToken stage, so the
  4954. // transaction procceds without an authorization header.
  4955. MockWrite data_writes2[] = {
  4956. MockWrite("GET / HTTP/1.1\r\n"
  4957. "Host: www.example.org\r\n"
  4958. "Connection: keep-alive\r\n\r\n"),
  4959. };
  4960. MockRead data_reads2[] = {
  4961. MockRead("HTTP/1.1 401 Authentication Required\r\n"
  4962. "WWW-Authenticate: Mock\r\n"
  4963. "Connection: keep-alive\r\n\r\n"),
  4964. };
  4965. MockWrite data_writes3[] = {
  4966. MockWrite("GET / HTTP/1.1\r\n"
  4967. "Host: www.example.org\r\n"
  4968. "Connection: keep-alive\r\n"
  4969. "Authorization: auth_token\r\n\r\n"),
  4970. };
  4971. MockRead data_reads3[] = {
  4972. MockRead("HTTP/1.1 200 OK\r\n"
  4973. "Content-Length: 5\r\n"
  4974. "Content-Type: text/plain\r\n"
  4975. "Connection: keep-alive\r\n\r\n"
  4976. "Hello"),
  4977. };
  4978. StaticSocketDataProvider data1(data_reads1, data_writes1);
  4979. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  4980. StaticSocketDataProvider data2(data_reads2, data_writes2);
  4981. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  4982. StaticSocketDataProvider data3(data_reads3, data_writes3);
  4983. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  4984. auto trans =
  4985. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  4986. TestCompletionCallback callback;
  4987. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  4988. EXPECT_THAT(callback.GetResult(rv), IsOk());
  4989. const HttpResponseInfo* response = trans->GetResponseInfo();
  4990. ASSERT_TRUE(response);
  4991. ASSERT_TRUE(response->headers);
  4992. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  4993. // The following three tests assert that an authentication challenge was
  4994. // received and that the stack is ready to respond to the challenge using
  4995. // ambient credentials.
  4996. EXPECT_EQ(401, response->headers->response_code());
  4997. EXPECT_TRUE(trans->IsReadyToRestartForAuth());
  4998. EXPECT_FALSE(response->auth_challenge.has_value());
  4999. rv = trans->RestartWithAuth(AuthCredentials(), callback.callback());
  5000. EXPECT_THAT(callback.GetResult(rv), IsOk());
  5001. response = trans->GetResponseInfo();
  5002. ASSERT_TRUE(response);
  5003. ASSERT_TRUE(response->headers);
  5004. // The following three tests assert that an authentication challenge was
  5005. // received and that the stack needs explicit credentials before it is ready
  5006. // to respond to the challenge.
  5007. EXPECT_EQ(401, response->headers->response_code());
  5008. EXPECT_FALSE(trans->IsReadyToRestartForAuth());
  5009. EXPECT_TRUE(response->auth_challenge.has_value());
  5010. rv = trans->RestartWithAuth(AuthCredentials(), callback.callback());
  5011. EXPECT_THAT(callback.GetResult(rv), IsOk());
  5012. response = trans->GetResponseInfo();
  5013. ASSERT_TRUE(response);
  5014. ASSERT_TRUE(response->headers);
  5015. EXPECT_EQ(200, response->headers->response_code());
  5016. trans.reset();
  5017. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  5018. }
  5019. // Proxy resolver that returns a proxy with the same host and port for different
  5020. // schemes, based on the path of the URL being requests.
  5021. class SameProxyWithDifferentSchemesProxyResolver : public ProxyResolver {
  5022. public:
  5023. SameProxyWithDifferentSchemesProxyResolver() = default;
  5024. SameProxyWithDifferentSchemesProxyResolver(
  5025. const SameProxyWithDifferentSchemesProxyResolver&) = delete;
  5026. SameProxyWithDifferentSchemesProxyResolver& operator=(
  5027. const SameProxyWithDifferentSchemesProxyResolver&) = delete;
  5028. ~SameProxyWithDifferentSchemesProxyResolver() override = default;
  5029. static constexpr uint16_t kProxyPort = 10000;
  5030. static HostPortPair ProxyHostPortPair() {
  5031. return HostPortPair("proxy.test", kProxyPort);
  5032. }
  5033. static std::string ProxyHostPortPairAsString() {
  5034. return ProxyHostPortPair().ToString();
  5035. }
  5036. // ProxyResolver implementation.
  5037. int GetProxyForURL(const GURL& url,
  5038. const NetworkIsolationKey& network_isolation_key,
  5039. ProxyInfo* results,
  5040. CompletionOnceCallback callback,
  5041. std::unique_ptr<Request>* request,
  5042. const NetLogWithSource& /*net_log*/) override {
  5043. *results = ProxyInfo();
  5044. results->set_traffic_annotation(
  5045. MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS));
  5046. if (url.path() == "/socks4") {
  5047. results->UsePacString("SOCKS " + ProxyHostPortPairAsString());
  5048. return OK;
  5049. }
  5050. if (url.path() == "/socks5") {
  5051. results->UsePacString("SOCKS5 " + ProxyHostPortPairAsString());
  5052. return OK;
  5053. }
  5054. if (url.path() == "/http") {
  5055. results->UsePacString("PROXY " + ProxyHostPortPairAsString());
  5056. return OK;
  5057. }
  5058. if (url.path() == "/https") {
  5059. results->UsePacString("HTTPS " + ProxyHostPortPairAsString());
  5060. return OK;
  5061. }
  5062. NOTREACHED();
  5063. return ERR_NOT_IMPLEMENTED;
  5064. }
  5065. };
  5066. class SameProxyWithDifferentSchemesProxyResolverFactory
  5067. : public ProxyResolverFactory {
  5068. public:
  5069. SameProxyWithDifferentSchemesProxyResolverFactory()
  5070. : ProxyResolverFactory(false) {}
  5071. SameProxyWithDifferentSchemesProxyResolverFactory(
  5072. const SameProxyWithDifferentSchemesProxyResolverFactory&) = delete;
  5073. SameProxyWithDifferentSchemesProxyResolverFactory& operator=(
  5074. const SameProxyWithDifferentSchemesProxyResolverFactory&) = delete;
  5075. int CreateProxyResolver(const scoped_refptr<PacFileData>& pac_script,
  5076. std::unique_ptr<ProxyResolver>* resolver,
  5077. CompletionOnceCallback callback,
  5078. std::unique_ptr<Request>* request) override {
  5079. *resolver = std::make_unique<SameProxyWithDifferentSchemesProxyResolver>();
  5080. return OK;
  5081. }
  5082. };
  5083. // Check that when different proxy schemes are all applied to a proxy at the
  5084. // same address, the connections are not grouped together. i.e., a request to
  5085. // foo.com using proxy.com as an HTTPS proxy won't use the same socket as a
  5086. // request to foo.com using proxy.com as an HTTP proxy.
  5087. TEST_F(HttpNetworkTransactionTest, SameDestinationForDifferentProxyTypes) {
  5088. session_deps_.proxy_resolution_service =
  5089. std::make_unique<ConfiguredProxyResolutionService>(
  5090. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  5091. ProxyConfig::CreateAutoDetect(), TRAFFIC_ANNOTATION_FOR_TESTS)),
  5092. std::make_unique<SameProxyWithDifferentSchemesProxyResolverFactory>(),
  5093. nullptr, /*quick_check_enabled=*/true);
  5094. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  5095. MockWrite socks_writes[] = {
  5096. MockWrite(SYNCHRONOUS, kSOCKS4OkRequestLocalHostPort80,
  5097. kSOCKS4OkRequestLocalHostPort80Length),
  5098. MockWrite(SYNCHRONOUS,
  5099. "GET /socks4 HTTP/1.1\r\n"
  5100. "Host: test\r\n"
  5101. "Connection: keep-alive\r\n\r\n"),
  5102. };
  5103. MockRead socks_reads[] = {
  5104. MockRead(SYNCHRONOUS, kSOCKS4OkReply, kSOCKS4OkReplyLength),
  5105. MockRead("HTTP/1.0 200 OK\r\n"
  5106. "Connection: keep-alive\r\n"
  5107. "Content-Length: 15\r\n\r\n"
  5108. "SOCKS4 Response"),
  5109. };
  5110. StaticSocketDataProvider socks_data(socks_reads, socks_writes);
  5111. session_deps_.socket_factory->AddSocketDataProvider(&socks_data);
  5112. const char kSOCKS5Request[] = {
  5113. 0x05, // Version
  5114. 0x01, // Command (CONNECT)
  5115. 0x00, // Reserved
  5116. 0x03, // Address type (DOMAINNAME)
  5117. 0x04, // Length of domain (4)
  5118. 't', 'e', 's', 't', // Domain string
  5119. 0x00, 0x50, // 16-bit port (80)
  5120. };
  5121. MockWrite socks5_writes[] = {
  5122. MockWrite(ASYNC, kSOCKS5GreetRequest, kSOCKS5GreetRequestLength),
  5123. MockWrite(ASYNC, kSOCKS5Request, std::size(kSOCKS5Request)),
  5124. MockWrite(SYNCHRONOUS,
  5125. "GET /socks5 HTTP/1.1\r\n"
  5126. "Host: test\r\n"
  5127. "Connection: keep-alive\r\n\r\n"),
  5128. };
  5129. MockRead socks5_reads[] = {
  5130. MockRead(ASYNC, kSOCKS5GreetResponse, kSOCKS5GreetResponseLength),
  5131. MockRead(ASYNC, kSOCKS5OkResponse, kSOCKS5OkResponseLength),
  5132. MockRead("HTTP/1.0 200 OK\r\n"
  5133. "Connection: keep-alive\r\n"
  5134. "Content-Length: 15\r\n\r\n"
  5135. "SOCKS5 Response"),
  5136. };
  5137. StaticSocketDataProvider socks5_data(socks5_reads, socks5_writes);
  5138. session_deps_.socket_factory->AddSocketDataProvider(&socks5_data);
  5139. MockWrite http_writes[] = {
  5140. MockWrite(SYNCHRONOUS,
  5141. "GET http://test/http HTTP/1.1\r\n"
  5142. "Host: test\r\n"
  5143. "Proxy-Connection: keep-alive\r\n\r\n"),
  5144. };
  5145. MockRead http_reads[] = {
  5146. MockRead("HTTP/1.1 200 OK\r\n"
  5147. "Proxy-Connection: keep-alive\r\n"
  5148. "Content-Length: 13\r\n\r\n"
  5149. "HTTP Response"),
  5150. };
  5151. StaticSocketDataProvider http_data(http_reads, http_writes);
  5152. session_deps_.socket_factory->AddSocketDataProvider(&http_data);
  5153. MockWrite https_writes[] = {
  5154. MockWrite(SYNCHRONOUS,
  5155. "GET http://test/https HTTP/1.1\r\n"
  5156. "Host: test\r\n"
  5157. "Proxy-Connection: keep-alive\r\n\r\n"),
  5158. };
  5159. MockRead https_reads[] = {
  5160. MockRead("HTTP/1.1 200 OK\r\n"
  5161. "Proxy-Connection: keep-alive\r\n"
  5162. "Content-Length: 14\r\n\r\n"
  5163. "HTTPS Response"),
  5164. };
  5165. StaticSocketDataProvider https_data(https_reads, https_writes);
  5166. session_deps_.socket_factory->AddSocketDataProvider(&https_data);
  5167. SSLSocketDataProvider ssl(SYNCHRONOUS, OK);
  5168. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5169. SSLSocketDataProvider ssl2(SYNCHRONOUS, OK);
  5170. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  5171. struct TestCase {
  5172. GURL url;
  5173. std::string expected_response;
  5174. // How many idle sockets there should be in the SOCKS 4/5 proxy socket pools
  5175. // after the test.
  5176. int expected_idle_socks4_sockets;
  5177. int expected_idle_socks5_sockets;
  5178. // How many idle sockets there should be in the HTTP/HTTPS proxy socket
  5179. // pools after the test.
  5180. int expected_idle_http_sockets;
  5181. int expected_idle_https_sockets;
  5182. } const kTestCases[] = {
  5183. {GURL("http://test/socks4"), "SOCKS4 Response", 1, 0, 0, 0},
  5184. {GURL("http://test/socks5"), "SOCKS5 Response", 1, 1, 0, 0},
  5185. {GURL("http://test/http"), "HTTP Response", 1, 1, 1, 0},
  5186. {GURL("http://test/https"), "HTTPS Response", 1, 1, 1, 1},
  5187. };
  5188. for (const auto& test_case : kTestCases) {
  5189. SCOPED_TRACE(test_case.url);
  5190. HttpRequestInfo request;
  5191. request.method = "GET";
  5192. request.url = test_case.url;
  5193. request.traffic_annotation =
  5194. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5195. ConnectedHandler connected_handler;
  5196. auto transaction = std::make_unique<HttpNetworkTransaction>(
  5197. DEFAULT_PRIORITY, session.get());
  5198. transaction->SetConnectedCallback(connected_handler.Callback());
  5199. TestCompletionCallback callback;
  5200. int rv =
  5201. transaction->Start(&request, callback.callback(), NetLogWithSource());
  5202. EXPECT_THAT(callback.GetResult(rv), IsOk());
  5203. const HttpResponseInfo* response = transaction->GetResponseInfo();
  5204. ASSERT_TRUE(response);
  5205. ASSERT_TRUE(response->headers);
  5206. EXPECT_EQ(200, response->headers->response_code());
  5207. std::string response_data;
  5208. EXPECT_THAT(ReadTransaction(transaction.get(), &response_data), IsOk());
  5209. EXPECT_EQ(test_case.expected_response, response_data);
  5210. TransportInfo expected_transport;
  5211. expected_transport.type = TransportType::kProxied;
  5212. expected_transport.endpoint =
  5213. IPEndPoint(IPAddress::IPv4Localhost(),
  5214. SameProxyWithDifferentSchemesProxyResolver::kProxyPort);
  5215. EXPECT_THAT(connected_handler.transports(),
  5216. ElementsAre(expected_transport));
  5217. // Return the socket to the socket pool, so can make sure it's not used for
  5218. // the next requests.
  5219. transaction.reset();
  5220. base::RunLoop().RunUntilIdle();
  5221. // Check the number of idle sockets in the pool, to make sure that used
  5222. // sockets are indeed being returned to the socket pool. If each request
  5223. // doesn't return an idle socket to the pool, the test would incorrectly
  5224. // pass.
  5225. EXPECT_EQ(test_case.expected_idle_socks4_sockets,
  5226. session
  5227. ->GetSocketPool(
  5228. HttpNetworkSession::NORMAL_SOCKET_POOL,
  5229. ProxyServer(ProxyServer::SCHEME_SOCKS4,
  5230. SameProxyWithDifferentSchemesProxyResolver::
  5231. ProxyHostPortPair()))
  5232. ->IdleSocketCount());
  5233. EXPECT_EQ(test_case.expected_idle_socks5_sockets,
  5234. session
  5235. ->GetSocketPool(
  5236. HttpNetworkSession::NORMAL_SOCKET_POOL,
  5237. ProxyServer(ProxyServer::SCHEME_SOCKS5,
  5238. SameProxyWithDifferentSchemesProxyResolver::
  5239. ProxyHostPortPair()))
  5240. ->IdleSocketCount());
  5241. EXPECT_EQ(test_case.expected_idle_http_sockets,
  5242. session
  5243. ->GetSocketPool(
  5244. HttpNetworkSession::NORMAL_SOCKET_POOL,
  5245. ProxyServer(ProxyServer::SCHEME_HTTP,
  5246. SameProxyWithDifferentSchemesProxyResolver::
  5247. ProxyHostPortPair()))
  5248. ->IdleSocketCount());
  5249. EXPECT_EQ(test_case.expected_idle_https_sockets,
  5250. session
  5251. ->GetSocketPool(
  5252. HttpNetworkSession::NORMAL_SOCKET_POOL,
  5253. ProxyServer(ProxyServer::SCHEME_HTTPS,
  5254. SameProxyWithDifferentSchemesProxyResolver::
  5255. ProxyHostPortPair()))
  5256. ->IdleSocketCount());
  5257. }
  5258. }
  5259. // Test the load timing for HTTPS requests with an HTTP proxy.
  5260. TEST_F(HttpNetworkTransactionTest, HttpProxyLoadTimingNoPacTwoRequests) {
  5261. HttpRequestInfo request1;
  5262. request1.method = "GET";
  5263. request1.url = GURL("https://www.example.org/1");
  5264. request1.traffic_annotation =
  5265. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5266. HttpRequestInfo request2;
  5267. request2.method = "GET";
  5268. request2.url = GURL("https://www.example.org/2");
  5269. request2.traffic_annotation =
  5270. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5271. // Configure against proxy server "myproxy:70".
  5272. session_deps_.proxy_resolution_service =
  5273. ConfiguredProxyResolutionService::CreateFixedForTest(
  5274. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5275. NetLogWithSource net_log_with_source =
  5276. NetLogWithSource::Make(NetLogSourceType::NONE);
  5277. session_deps_.net_log = NetLog::Get();
  5278. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5279. // Since we have proxy, should try to establish tunnel.
  5280. MockWrite data_writes1[] = {
  5281. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  5282. "Host: www.example.org:443\r\n"
  5283. "Proxy-Connection: keep-alive\r\n\r\n"),
  5284. MockWrite("GET /1 HTTP/1.1\r\n"
  5285. "Host: www.example.org\r\n"
  5286. "Connection: keep-alive\r\n\r\n"),
  5287. MockWrite("GET /2 HTTP/1.1\r\n"
  5288. "Host: www.example.org\r\n"
  5289. "Connection: keep-alive\r\n\r\n"),
  5290. };
  5291. // The proxy responds to the connect with a 407, using a persistent
  5292. // connection.
  5293. MockRead data_reads1[] = {
  5294. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  5295. MockRead("HTTP/1.1 200 OK\r\n"),
  5296. MockRead("Content-Length: 1\r\n\r\n"),
  5297. MockRead(SYNCHRONOUS, "1"),
  5298. MockRead("HTTP/1.1 200 OK\r\n"),
  5299. MockRead("Content-Length: 2\r\n\r\n"),
  5300. MockRead(SYNCHRONOUS, "22"),
  5301. };
  5302. StaticSocketDataProvider data1(data_reads1, data_writes1);
  5303. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  5304. SSLSocketDataProvider ssl(ASYNC, OK);
  5305. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5306. TestCompletionCallback callback1;
  5307. auto trans1 =
  5308. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  5309. int rv = trans1->Start(&request1, callback1.callback(), net_log_with_source);
  5310. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5311. rv = callback1.WaitForResult();
  5312. EXPECT_THAT(rv, IsOk());
  5313. const HttpResponseInfo* response1 = trans1->GetResponseInfo();
  5314. ASSERT_TRUE(response1);
  5315. EXPECT_TRUE(response1->proxy_server.is_http());
  5316. ASSERT_TRUE(response1->headers);
  5317. EXPECT_EQ(1, response1->headers->GetContentLength());
  5318. LoadTimingInfo load_timing_info1;
  5319. EXPECT_TRUE(trans1->GetLoadTimingInfo(&load_timing_info1));
  5320. TestLoadTimingNotReused(load_timing_info1, CONNECT_TIMING_HAS_SSL_TIMES);
  5321. trans1.reset();
  5322. TestCompletionCallback callback2;
  5323. auto trans2 =
  5324. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  5325. rv = trans2->Start(&request2, callback2.callback(), net_log_with_source);
  5326. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5327. rv = callback2.WaitForResult();
  5328. EXPECT_THAT(rv, IsOk());
  5329. const HttpResponseInfo* response2 = trans2->GetResponseInfo();
  5330. ASSERT_TRUE(response2);
  5331. EXPECT_TRUE(response2->proxy_server.is_http());
  5332. ASSERT_TRUE(response2->headers);
  5333. EXPECT_EQ(2, response2->headers->GetContentLength());
  5334. LoadTimingInfo load_timing_info2;
  5335. EXPECT_TRUE(trans2->GetLoadTimingInfo(&load_timing_info2));
  5336. TestLoadTimingReused(load_timing_info2);
  5337. EXPECT_EQ(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id);
  5338. trans2.reset();
  5339. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  5340. }
  5341. // Test the load timing for HTTPS requests with an HTTP proxy and a PAC script.
  5342. TEST_F(HttpNetworkTransactionTest, HttpProxyLoadTimingWithPacTwoRequests) {
  5343. HttpRequestInfo request1;
  5344. request1.method = "GET";
  5345. request1.url = GURL("https://www.example.org/1");
  5346. request1.traffic_annotation =
  5347. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5348. HttpRequestInfo request2;
  5349. request2.method = "GET";
  5350. request2.url = GURL("https://www.example.org/2");
  5351. request2.traffic_annotation =
  5352. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5353. // Configure against proxy server "myproxy:70".
  5354. session_deps_.proxy_resolution_service =
  5355. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  5356. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5357. NetLogWithSource net_log_with_source =
  5358. NetLogWithSource::Make(NetLogSourceType::NONE);
  5359. session_deps_.net_log = NetLog::Get();
  5360. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5361. // Since we have proxy, should try to establish tunnel.
  5362. MockWrite data_writes1[] = {
  5363. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  5364. "Host: www.example.org:443\r\n"
  5365. "Proxy-Connection: keep-alive\r\n\r\n"),
  5366. MockWrite("GET /1 HTTP/1.1\r\n"
  5367. "Host: www.example.org\r\n"
  5368. "Connection: keep-alive\r\n\r\n"),
  5369. MockWrite("GET /2 HTTP/1.1\r\n"
  5370. "Host: www.example.org\r\n"
  5371. "Connection: keep-alive\r\n\r\n"),
  5372. };
  5373. // The proxy responds to the connect with a 407, using a persistent
  5374. // connection.
  5375. MockRead data_reads1[] = {
  5376. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  5377. MockRead("HTTP/1.1 200 OK\r\n"),
  5378. MockRead("Content-Length: 1\r\n\r\n"),
  5379. MockRead(SYNCHRONOUS, "1"),
  5380. MockRead("HTTP/1.1 200 OK\r\n"),
  5381. MockRead("Content-Length: 2\r\n\r\n"),
  5382. MockRead(SYNCHRONOUS, "22"),
  5383. };
  5384. StaticSocketDataProvider data1(data_reads1, data_writes1);
  5385. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  5386. SSLSocketDataProvider ssl(ASYNC, OK);
  5387. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5388. TestCompletionCallback callback1;
  5389. auto trans1 =
  5390. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  5391. int rv = trans1->Start(&request1, callback1.callback(), net_log_with_source);
  5392. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5393. rv = callback1.WaitForResult();
  5394. EXPECT_THAT(rv, IsOk());
  5395. const HttpResponseInfo* response1 = trans1->GetResponseInfo();
  5396. ASSERT_TRUE(response1);
  5397. ASSERT_TRUE(response1->headers);
  5398. EXPECT_EQ(1, response1->headers->GetContentLength());
  5399. LoadTimingInfo load_timing_info1;
  5400. EXPECT_TRUE(trans1->GetLoadTimingInfo(&load_timing_info1));
  5401. TestLoadTimingNotReusedWithPac(load_timing_info1,
  5402. CONNECT_TIMING_HAS_SSL_TIMES);
  5403. trans1.reset();
  5404. TestCompletionCallback callback2;
  5405. auto trans2 =
  5406. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  5407. rv = trans2->Start(&request2, callback2.callback(), net_log_with_source);
  5408. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5409. rv = callback2.WaitForResult();
  5410. EXPECT_THAT(rv, IsOk());
  5411. const HttpResponseInfo* response2 = trans2->GetResponseInfo();
  5412. ASSERT_TRUE(response2);
  5413. ASSERT_TRUE(response2->headers);
  5414. EXPECT_EQ(2, response2->headers->GetContentLength());
  5415. LoadTimingInfo load_timing_info2;
  5416. EXPECT_TRUE(trans2->GetLoadTimingInfo(&load_timing_info2));
  5417. TestLoadTimingReusedWithPac(load_timing_info2);
  5418. EXPECT_EQ(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id);
  5419. trans2.reset();
  5420. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  5421. }
  5422. // Make sure that NetworkIsolationKeys are passed down to the proxy layer.
  5423. TEST_F(HttpNetworkTransactionTest, ProxyResolvedWithNetworkIsolationKey) {
  5424. const SchemefulSite kSite(GURL("https://foo.test/"));
  5425. ProxyConfig proxy_config;
  5426. proxy_config.set_auto_detect(true);
  5427. proxy_config.set_pac_url(GURL("http://fooproxyurl"));
  5428. CapturingProxyResolver capturing_proxy_resolver;
  5429. capturing_proxy_resolver.set_proxy_server(ProxyServer::Direct());
  5430. session_deps_.proxy_resolution_service =
  5431. std::make_unique<ConfiguredProxyResolutionService>(
  5432. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  5433. proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)),
  5434. std::make_unique<CapturingProxyResolverFactory>(
  5435. &capturing_proxy_resolver),
  5436. nullptr, /*quick_check_enabled=*/true);
  5437. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5438. // No need to continue with the network request - proxy resolution occurs
  5439. // before establishing a data.
  5440. StaticSocketDataProvider data{base::span<MockRead>(),
  5441. base::span<MockWrite>()};
  5442. data.set_connect_data(MockConnect(SYNCHRONOUS, ERR_FAILED));
  5443. session_deps_.socket_factory->AddSocketDataProvider(&data);
  5444. // Run first request until an auth challenge is observed.
  5445. HttpRequestInfo request;
  5446. request.method = "GET";
  5447. request.url = GURL("http://foo.test/");
  5448. request.traffic_annotation =
  5449. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5450. HttpNetworkTransaction trans(LOWEST, session.get());
  5451. TestCompletionCallback callback;
  5452. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  5453. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_FAILED));
  5454. }
  5455. // Test that a failure in resolving the proxy hostname is retrievable.
  5456. TEST_F(HttpNetworkTransactionTest, ProxyHostResolutionFailure) {
  5457. HttpRequestInfo request;
  5458. request.method = "GET";
  5459. request.url = GURL("http://www.example.org/");
  5460. request.traffic_annotation =
  5461. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5462. // Configure against https proxy server "proxy:70".
  5463. session_deps_.proxy_resolution_service =
  5464. ConfiguredProxyResolutionService::CreateFixedForTest(
  5465. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5466. auto resolver = std::make_unique<MockHostResolver>();
  5467. resolver->rules()->AddSimulatedTimeoutFailure("proxy");
  5468. session_deps_.net_log = net::NetLog::Get();
  5469. session_deps_.host_resolver = std::move(resolver);
  5470. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  5471. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  5472. TestCompletionCallback callback;
  5473. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  5474. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5475. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_PROXY_CONNECTION_FAILED));
  5476. const HttpResponseInfo* response = trans.GetResponseInfo();
  5477. ASSERT_TRUE(response);
  5478. EXPECT_THAT(response->resolve_error_info.error, IsError(ERR_DNS_TIMED_OUT));
  5479. }
  5480. // Test a simple get through an HTTPS Proxy.
  5481. TEST_F(HttpNetworkTransactionTest, HttpsProxyGet) {
  5482. HttpRequestInfo request;
  5483. request.method = "GET";
  5484. request.url = GURL("http://www.example.org/");
  5485. request.traffic_annotation =
  5486. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5487. // Configure against https proxy server "proxy:70".
  5488. session_deps_.proxy_resolution_service =
  5489. ConfiguredProxyResolutionService::CreateFixedForTest(
  5490. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5491. session_deps_.net_log = NetLog::Get();
  5492. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5493. // Since we have proxy, should use full url
  5494. MockWrite data_writes1[] = {
  5495. MockWrite(
  5496. "GET http://www.example.org/ HTTP/1.1\r\n"
  5497. "Host: www.example.org\r\n"
  5498. "Proxy-Connection: keep-alive\r\n\r\n"),
  5499. };
  5500. MockRead data_reads1[] = {
  5501. MockRead("HTTP/1.1 200 OK\r\n"),
  5502. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  5503. MockRead("Content-Length: 100\r\n\r\n"),
  5504. MockRead(SYNCHRONOUS, OK),
  5505. };
  5506. StaticSocketDataProvider data1(data_reads1, data_writes1);
  5507. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  5508. SSLSocketDataProvider ssl(ASYNC, OK);
  5509. ssl.ssl_info.cert =
  5510. ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
  5511. ASSERT_TRUE(ssl.ssl_info.cert);
  5512. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5513. ConnectedHandler connected_handler;
  5514. TestCompletionCallback callback1;
  5515. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  5516. trans.SetConnectedCallback(connected_handler.Callback());
  5517. int rv = trans.Start(&request, callback1.callback(),
  5518. NetLogWithSource::Make(NetLogSourceType::NONE));
  5519. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5520. rv = callback1.WaitForResult();
  5521. EXPECT_THAT(rv, IsOk());
  5522. LoadTimingInfo load_timing_info;
  5523. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  5524. TestLoadTimingNotReused(load_timing_info,
  5525. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  5526. const HttpResponseInfo* response = trans.GetResponseInfo();
  5527. ASSERT_TRUE(response);
  5528. EXPECT_TRUE(response->proxy_server.is_https());
  5529. EXPECT_TRUE(response->headers->IsKeepAlive());
  5530. EXPECT_EQ(200, response->headers->response_code());
  5531. EXPECT_EQ(100, response->headers->GetContentLength());
  5532. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  5533. // DNS aliases should be empty when using a proxy.
  5534. EXPECT_TRUE(response->dns_aliases.empty());
  5535. TransportInfo expected_transport;
  5536. expected_transport.type = TransportType::kProxied;
  5537. expected_transport.endpoint = IPEndPoint(IPAddress::IPv4Localhost(), 70);
  5538. EXPECT_THAT(connected_handler.transports(), ElementsAre(expected_transport));
  5539. // The password prompt info should not be set.
  5540. EXPECT_FALSE(response->auth_challenge.has_value());
  5541. // Although we use an HTTPS proxy, the `SSLInfo` from that connection should
  5542. // not be reported as a property of the origin.
  5543. EXPECT_FALSE(response->ssl_info.cert);
  5544. }
  5545. // Test a SPDY get through an HTTPS Proxy.
  5546. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyGet) {
  5547. HttpRequestInfo request;
  5548. request.method = "GET";
  5549. request.url = GURL("http://www.example.org/");
  5550. request.traffic_annotation =
  5551. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5552. // Configure against https proxy server "proxy:70".
  5553. session_deps_.proxy_resolution_service =
  5554. ConfiguredProxyResolutionService::CreateFixedForTest(
  5555. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5556. session_deps_.net_log = NetLog::Get();
  5557. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5558. // fetch http://www.example.org/ via SPDY
  5559. spdy::SpdySerializedFrame req(
  5560. spdy_util_.ConstructSpdyGet("http://www.example.org/", 1, LOWEST));
  5561. MockWrite spdy_writes[] = {CreateMockWrite(req, 0)};
  5562. spdy::SpdySerializedFrame resp(
  5563. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  5564. spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true));
  5565. MockRead spdy_reads[] = {
  5566. CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3),
  5567. };
  5568. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  5569. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  5570. SSLSocketDataProvider ssl(ASYNC, OK);
  5571. ssl.ssl_info.cert =
  5572. ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
  5573. ASSERT_TRUE(ssl.ssl_info.cert);
  5574. ssl.next_proto = kProtoHTTP2;
  5575. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5576. ConnectedHandler connected_handler;
  5577. TestCompletionCallback callback1;
  5578. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  5579. trans.SetConnectedCallback(connected_handler.Callback());
  5580. int rv = trans.Start(&request, callback1.callback(),
  5581. NetLogWithSource::Make(NetLogSourceType::NONE));
  5582. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5583. rv = callback1.WaitForResult();
  5584. EXPECT_THAT(rv, IsOk());
  5585. LoadTimingInfo load_timing_info;
  5586. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  5587. TestLoadTimingNotReused(load_timing_info,
  5588. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  5589. const HttpResponseInfo* response = trans.GetResponseInfo();
  5590. ASSERT_TRUE(response);
  5591. EXPECT_TRUE(response->proxy_server.is_https());
  5592. ASSERT_TRUE(response->headers);
  5593. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  5594. // DNS aliases should be empty when using a proxy.
  5595. EXPECT_TRUE(response->dns_aliases.empty());
  5596. TransportInfo expected_transport;
  5597. expected_transport.type = TransportType::kProxied;
  5598. expected_transport.endpoint = IPEndPoint(IPAddress::IPv4Localhost(), 70);
  5599. EXPECT_THAT(connected_handler.transports(), ElementsAre(expected_transport));
  5600. std::string response_data;
  5601. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  5602. EXPECT_EQ(kUploadData, response_data);
  5603. // Although we use an HTTPS proxy, the `SSLInfo` from that connection should
  5604. // not be reported as a property of the origin.
  5605. EXPECT_FALSE(response->ssl_info.cert);
  5606. }
  5607. // Verifies that a session which races and wins against the owning transaction
  5608. // (completing prior to host resolution), doesn't fail the transaction.
  5609. // Regression test for crbug.com/334413.
  5610. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyGetWithSessionRace) {
  5611. HttpRequestInfo request;
  5612. request.method = "GET";
  5613. request.url = GURL("http://www.example.org/");
  5614. request.traffic_annotation =
  5615. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5616. // Configure SPDY proxy server "proxy:70".
  5617. session_deps_.proxy_resolution_service =
  5618. ConfiguredProxyResolutionService::CreateFixedForTest(
  5619. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5620. NetLogWithSource net_log_with_source =
  5621. NetLogWithSource::Make(NetLogSourceType::NONE);
  5622. session_deps_.net_log = NetLog::Get();
  5623. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5624. // Fetch http://www.example.org/ through the SPDY proxy.
  5625. spdy::SpdySerializedFrame req(
  5626. spdy_util_.ConstructSpdyGet("http://www.example.org/", 1, LOWEST));
  5627. MockWrite spdy_writes[] = {CreateMockWrite(req, 0)};
  5628. spdy::SpdySerializedFrame resp(
  5629. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  5630. spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true));
  5631. MockRead spdy_reads[] = {
  5632. CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3),
  5633. };
  5634. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  5635. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  5636. SSLSocketDataProvider ssl(ASYNC, OK);
  5637. ssl.next_proto = kProtoHTTP2;
  5638. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5639. TestCompletionCallback callback1;
  5640. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  5641. // Stall the hostname resolution begun by the transaction.
  5642. session_deps_.host_resolver->set_ondemand_mode(true);
  5643. int rv = trans.Start(&request, callback1.callback(), net_log_with_source);
  5644. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5645. // Race a session to the proxy, which completes first.
  5646. session_deps_.host_resolver->set_ondemand_mode(false);
  5647. SpdySessionKey key(HostPortPair("proxy", 70), ProxyServer::Direct(),
  5648. PRIVACY_MODE_DISABLED,
  5649. SpdySessionKey::IsProxySession::kTrue, SocketTag(),
  5650. NetworkIsolationKey(), SecureDnsPolicy::kAllow);
  5651. base::WeakPtr<SpdySession> spdy_session =
  5652. CreateSpdySession(session.get(), key, net_log_with_source);
  5653. // Unstall the resolution begun by the transaction.
  5654. session_deps_.host_resolver->set_ondemand_mode(true);
  5655. session_deps_.host_resolver->ResolveAllPending();
  5656. EXPECT_FALSE(callback1.have_result());
  5657. rv = callback1.WaitForResult();
  5658. EXPECT_THAT(rv, IsOk());
  5659. const HttpResponseInfo* response = trans.GetResponseInfo();
  5660. ASSERT_TRUE(response);
  5661. ASSERT_TRUE(response->headers);
  5662. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  5663. std::string response_data;
  5664. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  5665. EXPECT_EQ(kUploadData, response_data);
  5666. }
  5667. // Test a SPDY get through an HTTPS Proxy.
  5668. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyGetWithProxyAuth) {
  5669. HttpRequestInfo request;
  5670. request.method = "GET";
  5671. request.url = GURL("http://www.example.org/");
  5672. request.traffic_annotation =
  5673. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5674. // Configure against https proxy server "myproxy:70".
  5675. session_deps_.proxy_resolution_service =
  5676. ConfiguredProxyResolutionService::CreateFixedForTest(
  5677. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5678. session_deps_.net_log = NetLog::Get();
  5679. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5680. // The first request will be a bare GET, the second request will be a
  5681. // GET with a Proxy-Authorization header.
  5682. spdy_util_.set_default_url(request.url);
  5683. spdy::SpdySerializedFrame req_get(
  5684. spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST));
  5685. spdy_util_.UpdateWithStreamDestruction(1);
  5686. const char* const kExtraAuthorizationHeaders[] = {
  5687. "proxy-authorization", "Basic Zm9vOmJhcg=="
  5688. };
  5689. spdy::SpdySerializedFrame req_get_authorization(spdy_util_.ConstructSpdyGet(
  5690. kExtraAuthorizationHeaders, std::size(kExtraAuthorizationHeaders) / 2, 3,
  5691. LOWEST));
  5692. MockWrite spdy_writes[] = {
  5693. CreateMockWrite(req_get, 0), CreateMockWrite(req_get_authorization, 3),
  5694. };
  5695. // The first response is a 407 proxy authentication challenge, and the second
  5696. // response will be a 200 response since the second request includes a valid
  5697. // Authorization header.
  5698. const char* const kExtraAuthenticationHeaders[] = {
  5699. "proxy-authenticate", "Basic realm=\"MyRealm1\""
  5700. };
  5701. spdy::SpdySerializedFrame resp_authentication(
  5702. spdy_util_.ConstructSpdyReplyError(
  5703. "407", kExtraAuthenticationHeaders,
  5704. std::size(kExtraAuthenticationHeaders) / 2, 1));
  5705. spdy::SpdySerializedFrame body_authentication(
  5706. spdy_util_.ConstructSpdyDataFrame(1, true));
  5707. spdy::SpdySerializedFrame resp_data(
  5708. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  5709. spdy::SpdySerializedFrame body_data(
  5710. spdy_util_.ConstructSpdyDataFrame(3, true));
  5711. MockRead spdy_reads[] = {
  5712. CreateMockRead(resp_authentication, 1),
  5713. CreateMockRead(body_authentication, 2, SYNCHRONOUS),
  5714. CreateMockRead(resp_data, 4),
  5715. CreateMockRead(body_data, 5),
  5716. MockRead(ASYNC, 0, 6),
  5717. };
  5718. SequencedSocketData data(spdy_reads, spdy_writes);
  5719. session_deps_.socket_factory->AddSocketDataProvider(&data);
  5720. SSLSocketDataProvider ssl(ASYNC, OK);
  5721. ssl.next_proto = kProtoHTTP2;
  5722. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5723. TestCompletionCallback callback1;
  5724. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  5725. int rv = trans.Start(&request, callback1.callback(),
  5726. NetLogWithSource::Make(NetLogSourceType::NONE));
  5727. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5728. rv = callback1.WaitForResult();
  5729. EXPECT_THAT(rv, IsOk());
  5730. const HttpResponseInfo* const response = trans.GetResponseInfo();
  5731. ASSERT_TRUE(response);
  5732. ASSERT_TRUE(response->headers);
  5733. EXPECT_EQ(407, response->headers->response_code());
  5734. EXPECT_TRUE(response->was_fetched_via_spdy);
  5735. EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge));
  5736. TestCompletionCallback callback2;
  5737. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  5738. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5739. rv = callback2.WaitForResult();
  5740. EXPECT_THAT(rv, IsOk());
  5741. const HttpResponseInfo* const response_restart = trans.GetResponseInfo();
  5742. ASSERT_TRUE(response_restart);
  5743. ASSERT_TRUE(response_restart->headers);
  5744. EXPECT_EQ(200, response_restart->headers->response_code());
  5745. // The password prompt info should not be set.
  5746. EXPECT_FALSE(response_restart->auth_challenge.has_value());
  5747. }
  5748. // Test a SPDY CONNECT through an HTTPS Proxy to an HTTPS (non-SPDY) Server.
  5749. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyConnectHttps) {
  5750. HttpRequestInfo request;
  5751. request.method = "GET";
  5752. request.url = GURL("https://www.example.org/");
  5753. request.traffic_annotation =
  5754. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5755. // Configure against https proxy server "proxy:70".
  5756. session_deps_.proxy_resolution_service =
  5757. ConfiguredProxyResolutionService::CreateFixedForTest(
  5758. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5759. session_deps_.net_log = NetLog::Get();
  5760. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5761. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  5762. // CONNECT to www.example.org:443 via SPDY
  5763. spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect(
  5764. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  5765. HostPortPair("www.example.org", 443)));
  5766. // fetch https://www.example.org/ via HTTP
  5767. const char get[] =
  5768. "GET / HTTP/1.1\r\n"
  5769. "Host: www.example.org\r\n"
  5770. "Connection: keep-alive\r\n\r\n";
  5771. spdy::SpdySerializedFrame wrapped_get(
  5772. spdy_util_.ConstructSpdyDataFrame(1, get, false));
  5773. spdy::SpdySerializedFrame conn_resp(
  5774. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  5775. const char resp[] = "HTTP/1.1 200 OK\r\n"
  5776. "Content-Length: 10\r\n\r\n";
  5777. spdy::SpdySerializedFrame wrapped_get_resp(
  5778. spdy_util_.ConstructSpdyDataFrame(1, resp, false));
  5779. spdy::SpdySerializedFrame wrapped_body(
  5780. spdy_util_.ConstructSpdyDataFrame(1, "1234567890", false));
  5781. spdy::SpdySerializedFrame window_update(
  5782. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp.size()));
  5783. MockWrite spdy_writes[] = {
  5784. CreateMockWrite(connect, 0), CreateMockWrite(wrapped_get, 2),
  5785. CreateMockWrite(window_update, 6),
  5786. };
  5787. MockRead spdy_reads[] = {
  5788. CreateMockRead(conn_resp, 1, ASYNC),
  5789. CreateMockRead(wrapped_get_resp, 3, ASYNC),
  5790. CreateMockRead(wrapped_body, 4, ASYNC),
  5791. CreateMockRead(wrapped_body, 5, ASYNC),
  5792. MockRead(ASYNC, 0, 7),
  5793. };
  5794. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  5795. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  5796. SSLSocketDataProvider ssl(ASYNC, OK);
  5797. ssl.next_proto = kProtoHTTP2;
  5798. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5799. SSLSocketDataProvider ssl2(ASYNC, OK);
  5800. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  5801. TestCompletionCallback callback1;
  5802. int rv = trans.Start(&request, callback1.callback(),
  5803. NetLogWithSource::Make(NetLogSourceType::NONE));
  5804. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5805. rv = callback1.WaitForResult();
  5806. ASSERT_THAT(rv, IsOk());
  5807. LoadTimingInfo load_timing_info;
  5808. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  5809. TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES);
  5810. const HttpResponseInfo* response = trans.GetResponseInfo();
  5811. ASSERT_TRUE(response);
  5812. ASSERT_TRUE(response->headers);
  5813. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  5814. std::string response_data;
  5815. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  5816. EXPECT_EQ("1234567890", response_data);
  5817. }
  5818. // Test a SPDY CONNECT through an HTTPS Proxy to a SPDY server.
  5819. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyConnectSpdy) {
  5820. SpdyTestUtil spdy_util_wrapped;
  5821. HttpRequestInfo request;
  5822. request.method = "GET";
  5823. request.url = GURL("https://www.example.org/");
  5824. request.traffic_annotation =
  5825. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5826. // Configure against https proxy server "proxy:70".
  5827. session_deps_.proxy_resolution_service =
  5828. ConfiguredProxyResolutionService::CreateFixedForTest(
  5829. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5830. session_deps_.net_log = NetLog::Get();
  5831. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5832. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  5833. // CONNECT to www.example.org:443 via SPDY
  5834. spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect(
  5835. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  5836. HostPortPair("www.example.org", 443)));
  5837. // fetch https://www.example.org/ via SPDY
  5838. const char kMyUrl[] = "https://www.example.org/";
  5839. spdy::SpdySerializedFrame get(
  5840. spdy_util_wrapped.ConstructSpdyGet(kMyUrl, 1, LOWEST));
  5841. spdy::SpdySerializedFrame wrapped_get(
  5842. spdy_util_.ConstructWrappedSpdyFrame(get, 1));
  5843. spdy::SpdySerializedFrame conn_resp(
  5844. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  5845. spdy::SpdySerializedFrame get_resp(
  5846. spdy_util_wrapped.ConstructSpdyGetReply(nullptr, 0, 1));
  5847. spdy::SpdySerializedFrame wrapped_get_resp(
  5848. spdy_util_.ConstructWrappedSpdyFrame(get_resp, 1));
  5849. spdy::SpdySerializedFrame body(
  5850. spdy_util_wrapped.ConstructSpdyDataFrame(1, true));
  5851. spdy::SpdySerializedFrame wrapped_body(
  5852. spdy_util_.ConstructWrappedSpdyFrame(body, 1));
  5853. spdy::SpdySerializedFrame window_update_get_resp(
  5854. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp.size()));
  5855. spdy::SpdySerializedFrame window_update_body(
  5856. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_body.size()));
  5857. MockWrite spdy_writes[] = {
  5858. CreateMockWrite(connect, 0), CreateMockWrite(wrapped_get, 2),
  5859. CreateMockWrite(window_update_get_resp, 6),
  5860. CreateMockWrite(window_update_body, 7),
  5861. };
  5862. MockRead spdy_reads[] = {
  5863. CreateMockRead(conn_resp, 1, ASYNC),
  5864. MockRead(ASYNC, ERR_IO_PENDING, 3),
  5865. CreateMockRead(wrapped_get_resp, 4, ASYNC),
  5866. CreateMockRead(wrapped_body, 5, ASYNC),
  5867. MockRead(ASYNC, 0, 8),
  5868. };
  5869. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  5870. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  5871. SSLSocketDataProvider ssl(ASYNC, OK);
  5872. ssl.next_proto = kProtoHTTP2;
  5873. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5874. SSLSocketDataProvider ssl2(ASYNC, OK);
  5875. ssl2.next_proto = kProtoHTTP2;
  5876. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  5877. TestCompletionCallback callback1;
  5878. int rv = trans.Start(&request, callback1.callback(),
  5879. NetLogWithSource::Make(NetLogSourceType::NONE));
  5880. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5881. // Allow the SpdyProxyClientSocket's write callback to complete.
  5882. base::RunLoop().RunUntilIdle();
  5883. // Now allow the read of the response to complete.
  5884. spdy_data.Resume();
  5885. rv = callback1.WaitForResult();
  5886. EXPECT_THAT(rv, IsOk());
  5887. LoadTimingInfo load_timing_info;
  5888. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  5889. TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES);
  5890. const HttpResponseInfo* response = trans.GetResponseInfo();
  5891. ASSERT_TRUE(response);
  5892. ASSERT_TRUE(response->headers);
  5893. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  5894. std::string response_data;
  5895. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  5896. EXPECT_EQ(kUploadData, response_data);
  5897. }
  5898. // Test a SPDY CONNECT failure through an HTTPS Proxy.
  5899. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyConnectFailure) {
  5900. HttpRequestInfo request;
  5901. request.method = "GET";
  5902. request.url = GURL("https://www.example.org/");
  5903. request.traffic_annotation =
  5904. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  5905. // Configure against https proxy server "proxy:70".
  5906. session_deps_.proxy_resolution_service =
  5907. ConfiguredProxyResolutionService::CreateFixedForTest(
  5908. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  5909. session_deps_.net_log = NetLog::Get();
  5910. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5911. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  5912. // CONNECT to www.example.org:443 via SPDY
  5913. spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect(
  5914. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  5915. HostPortPair("www.example.org", 443)));
  5916. spdy::SpdySerializedFrame get(
  5917. spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL));
  5918. MockWrite spdy_writes[] = {
  5919. CreateMockWrite(connect, 0), CreateMockWrite(get, 2),
  5920. };
  5921. spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyReplyError(1));
  5922. spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true));
  5923. MockRead spdy_reads[] = {
  5924. CreateMockRead(resp, 1, ASYNC), MockRead(ASYNC, 0, 3),
  5925. };
  5926. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  5927. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  5928. SSLSocketDataProvider ssl(ASYNC, OK);
  5929. ssl.next_proto = kProtoHTTP2;
  5930. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  5931. SSLSocketDataProvider ssl2(ASYNC, OK);
  5932. ssl2.next_proto = kProtoHTTP2;
  5933. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  5934. TestCompletionCallback callback1;
  5935. int rv = trans.Start(&request, callback1.callback(),
  5936. NetLogWithSource::Make(NetLogSourceType::NONE));
  5937. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  5938. rv = callback1.WaitForResult();
  5939. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  5940. // TODO(juliatuttle): Anything else to check here?
  5941. }
  5942. // Test the case where a proxied H2 session doesn't exist when an auth challenge
  5943. // is observed, but does exist by the time auth credentials are provided. In
  5944. // this case, auth and SSL are fully negotated on the second request, but then
  5945. // the socket is discarded to use the shared session.
  5946. TEST_F(HttpNetworkTransactionTest, ProxiedH2SessionAppearsDuringAuth) {
  5947. ProxyConfig proxy_config;
  5948. proxy_config.set_auto_detect(true);
  5949. proxy_config.set_pac_url(GURL("http://fooproxyurl"));
  5950. CapturingProxyResolver capturing_proxy_resolver;
  5951. capturing_proxy_resolver.set_proxy_server(
  5952. ProxyServer(ProxyServer::SCHEME_HTTP, HostPortPair("myproxy", 70)));
  5953. session_deps_.proxy_resolution_service =
  5954. std::make_unique<ConfiguredProxyResolutionService>(
  5955. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  5956. proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)),
  5957. std::make_unique<CapturingProxyResolverFactory>(
  5958. &capturing_proxy_resolver),
  5959. nullptr, /*quick_check_enabled=*/true);
  5960. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  5961. const char kMyUrl[] = "https://www.example.org/";
  5962. spdy::SpdySerializedFrame get(spdy_util_.ConstructSpdyGet(kMyUrl, 1, LOWEST));
  5963. spdy::SpdySerializedFrame get_resp(
  5964. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  5965. spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true));
  5966. spdy_util_.UpdateWithStreamDestruction(1);
  5967. spdy::SpdySerializedFrame get2(
  5968. spdy_util_.ConstructSpdyGet(kMyUrl, 3, LOWEST));
  5969. spdy::SpdySerializedFrame get_resp2(
  5970. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  5971. spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true));
  5972. MockWrite auth_challenge_writes[] = {
  5973. MockWrite(ASYNC, 0,
  5974. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  5975. "Host: www.example.org:443\r\n"
  5976. "Proxy-Connection: keep-alive\r\n\r\n"),
  5977. MockWrite(ASYNC, 2,
  5978. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  5979. "Host: www.example.org:443\r\n"
  5980. "Proxy-Connection: keep-alive\r\n\r\n"),
  5981. };
  5982. MockRead auth_challenge_reads[] = {
  5983. MockRead(ASYNC, 1,
  5984. "HTTP/1.1 407 Authentication Required\r\n"
  5985. "Content-Length: 0\r\n"
  5986. "Proxy-Connection: close\r\n"
  5987. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n\r\n"),
  5988. };
  5989. MockWrite spdy_writes[] = {
  5990. MockWrite(ASYNC, 0,
  5991. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  5992. "Host: www.example.org:443\r\n"
  5993. "Proxy-Connection: keep-alive\r\n"
  5994. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  5995. CreateMockWrite(get, 2),
  5996. CreateMockWrite(get2, 5),
  5997. };
  5998. MockRead spdy_reads[] = {
  5999. MockRead(ASYNC, 1, "HTTP/1.1 200 OK\r\n\r\n"),
  6000. CreateMockRead(get_resp, 3, ASYNC),
  6001. CreateMockRead(body, 4, ASYNC),
  6002. CreateMockRead(get_resp2, 6, ASYNC),
  6003. CreateMockRead(body2, 7, ASYNC),
  6004. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 8),
  6005. };
  6006. MockWrite auth_response_writes_discarded_socket[] = {
  6007. MockWrite(ASYNC, 0,
  6008. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  6009. "Host: www.example.org:443\r\n"
  6010. "Proxy-Connection: keep-alive\r\n"
  6011. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  6012. };
  6013. MockRead auth_response_reads_discarded_socket[] = {
  6014. MockRead(ASYNC, 1, "HTTP/1.1 200 OK\r\n\r\n"),
  6015. };
  6016. SequencedSocketData auth_challenge1(auth_challenge_reads,
  6017. auth_challenge_writes);
  6018. session_deps_.socket_factory->AddSocketDataProvider(&auth_challenge1);
  6019. SequencedSocketData auth_challenge2(auth_challenge_reads,
  6020. auth_challenge_writes);
  6021. session_deps_.socket_factory->AddSocketDataProvider(&auth_challenge2);
  6022. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  6023. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  6024. SequencedSocketData auth_response_discarded_socket(
  6025. auth_response_reads_discarded_socket,
  6026. auth_response_writes_discarded_socket);
  6027. session_deps_.socket_factory->AddSocketDataProvider(
  6028. &auth_response_discarded_socket);
  6029. SSLSocketDataProvider ssl(ASYNC, OK);
  6030. ssl.next_proto = kProtoHTTP2;
  6031. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  6032. SSLSocketDataProvider ssl2(ASYNC, OK);
  6033. ssl2.next_proto = kProtoHTTP2;
  6034. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  6035. TestCompletionCallback callback;
  6036. std::string response_data;
  6037. // Run first request until an auth challenge is observed.
  6038. HttpRequestInfo request1;
  6039. request1.method = "GET";
  6040. request1.url = GURL(kMyUrl);
  6041. request1.traffic_annotation =
  6042. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6043. HttpNetworkTransaction trans1(LOWEST, session.get());
  6044. int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource());
  6045. EXPECT_THAT(callback.GetResult(rv), IsOk());
  6046. const HttpResponseInfo* response = trans1.GetResponseInfo();
  6047. ASSERT_TRUE(response);
  6048. ASSERT_TRUE(response->headers);
  6049. EXPECT_EQ(407, response->headers->response_code());
  6050. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6051. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  6052. // Run second request until an auth challenge is observed.
  6053. HttpRequestInfo request2;
  6054. request2.method = "GET";
  6055. request2.url = GURL(kMyUrl);
  6056. request2.traffic_annotation =
  6057. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6058. HttpNetworkTransaction trans2(LOWEST, session.get());
  6059. rv = trans2.Start(&request2, callback.callback(), NetLogWithSource());
  6060. EXPECT_THAT(callback.GetResult(rv), IsOk());
  6061. response = trans2.GetResponseInfo();
  6062. ASSERT_TRUE(response);
  6063. ASSERT_TRUE(response->headers);
  6064. EXPECT_EQ(407, response->headers->response_code());
  6065. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6066. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  6067. // Now provide credentials for the first request, and wait for it to complete.
  6068. rv = trans1.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback());
  6069. rv = callback.GetResult(rv);
  6070. EXPECT_THAT(rv, IsOk());
  6071. response = trans1.GetResponseInfo();
  6072. ASSERT_TRUE(response);
  6073. ASSERT_TRUE(response->headers);
  6074. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  6075. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  6076. EXPECT_EQ(kUploadData, response_data);
  6077. // Now provide credentials for the second request. It should notice the
  6078. // existing session, and reuse it.
  6079. rv = trans2.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback());
  6080. EXPECT_THAT(callback.GetResult(rv), IsOk());
  6081. response = trans2.GetResponseInfo();
  6082. ASSERT_TRUE(response);
  6083. ASSERT_TRUE(response->headers);
  6084. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  6085. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  6086. EXPECT_EQ(kUploadData, response_data);
  6087. }
  6088. // Test load timing in the case of two HTTPS (non-SPDY) requests through a SPDY
  6089. // HTTPS Proxy to different servers.
  6090. TEST_F(HttpNetworkTransactionTest,
  6091. HttpsProxySpdyConnectHttpsLoadTimingTwoRequestsTwoServers) {
  6092. // Configure against https proxy server "proxy:70".
  6093. session_deps_.proxy_resolution_service =
  6094. ConfiguredProxyResolutionService::CreateFixedForTest(
  6095. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  6096. session_deps_.net_log = NetLog::Get();
  6097. std::unique_ptr<HttpNetworkSession> session(
  6098. SpdySessionDependencies::SpdyCreateSession(&session_deps_));
  6099. HttpRequestInfo request1;
  6100. request1.method = "GET";
  6101. request1.url = GURL("https://www.example.org/");
  6102. request1.load_flags = 0;
  6103. request1.traffic_annotation =
  6104. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6105. HttpRequestInfo request2;
  6106. request2.method = "GET";
  6107. request2.url = GURL("https://mail.example.org/");
  6108. request2.load_flags = 0;
  6109. request2.traffic_annotation =
  6110. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6111. // CONNECT to www.example.org:443 via SPDY.
  6112. spdy::SpdySerializedFrame connect1(spdy_util_.ConstructSpdyConnect(
  6113. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  6114. HostPortPair("www.example.org", 443)));
  6115. spdy::SpdySerializedFrame conn_resp1(
  6116. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  6117. // Fetch https://www.example.org/ via HTTP.
  6118. const char get1[] =
  6119. "GET / HTTP/1.1\r\n"
  6120. "Host: www.example.org\r\n"
  6121. "Connection: keep-alive\r\n\r\n";
  6122. spdy::SpdySerializedFrame wrapped_get1(
  6123. spdy_util_.ConstructSpdyDataFrame(1, get1, false));
  6124. const char resp1[] = "HTTP/1.1 200 OK\r\n"
  6125. "Content-Length: 1\r\n\r\n";
  6126. spdy::SpdySerializedFrame wrapped_get_resp1(
  6127. spdy_util_.ConstructSpdyDataFrame(1, resp1, false));
  6128. spdy::SpdySerializedFrame wrapped_body1(
  6129. spdy_util_.ConstructSpdyDataFrame(1, "1", false));
  6130. spdy::SpdySerializedFrame window_update(
  6131. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp1.size()));
  6132. // CONNECT to mail.example.org:443 via SPDY.
  6133. spdy::Http2HeaderBlock connect2_block;
  6134. connect2_block[spdy::kHttp2MethodHeader] = "CONNECT";
  6135. connect2_block[spdy::kHttp2AuthorityHeader] = "mail.example.org:443";
  6136. spdy::SpdySerializedFrame connect2(spdy_util_.ConstructSpdyHeaders(
  6137. 3, std::move(connect2_block), HttpProxyConnectJob::kH2QuicTunnelPriority,
  6138. false));
  6139. spdy::SpdySerializedFrame conn_resp2(
  6140. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  6141. // Fetch https://mail.example.org/ via HTTP.
  6142. const char get2[] =
  6143. "GET / HTTP/1.1\r\n"
  6144. "Host: mail.example.org\r\n"
  6145. "Connection: keep-alive\r\n\r\n";
  6146. spdy::SpdySerializedFrame wrapped_get2(
  6147. spdy_util_.ConstructSpdyDataFrame(3, get2, false));
  6148. const char resp2[] = "HTTP/1.1 200 OK\r\n"
  6149. "Content-Length: 2\r\n\r\n";
  6150. spdy::SpdySerializedFrame wrapped_get_resp2(
  6151. spdy_util_.ConstructSpdyDataFrame(3, resp2, false));
  6152. spdy::SpdySerializedFrame wrapped_body2(
  6153. spdy_util_.ConstructSpdyDataFrame(3, "22", false));
  6154. MockWrite spdy_writes[] = {
  6155. CreateMockWrite(connect1, 0), CreateMockWrite(wrapped_get1, 2),
  6156. CreateMockWrite(connect2, 5), CreateMockWrite(wrapped_get2, 7),
  6157. };
  6158. MockRead spdy_reads[] = {
  6159. CreateMockRead(conn_resp1, 1, ASYNC),
  6160. CreateMockRead(wrapped_get_resp1, 3, ASYNC),
  6161. CreateMockRead(wrapped_body1, 4, ASYNC),
  6162. CreateMockRead(conn_resp2, 6, ASYNC),
  6163. CreateMockRead(wrapped_get_resp2, 8, ASYNC),
  6164. CreateMockRead(wrapped_body2, 9, ASYNC),
  6165. MockRead(ASYNC, 0, 10),
  6166. };
  6167. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  6168. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  6169. SSLSocketDataProvider ssl(ASYNC, OK);
  6170. ssl.next_proto = kProtoHTTP2;
  6171. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  6172. SSLSocketDataProvider ssl2(ASYNC, OK);
  6173. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  6174. SSLSocketDataProvider ssl3(ASYNC, OK);
  6175. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3);
  6176. TestCompletionCallback callback;
  6177. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  6178. int rv = trans.Start(&request1, callback.callback(), NetLogWithSource());
  6179. EXPECT_THAT(callback.GetResult(rv), IsOk());
  6180. LoadTimingInfo load_timing_info;
  6181. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  6182. TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES);
  6183. const HttpResponseInfo* response = trans.GetResponseInfo();
  6184. ASSERT_TRUE(response);
  6185. ASSERT_TRUE(response->headers);
  6186. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  6187. std::string response_data;
  6188. scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(256);
  6189. rv = trans.Read(buf.get(), 256, callback.callback());
  6190. EXPECT_EQ(1, callback.GetResult(rv));
  6191. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  6192. rv = trans2.Start(&request2, callback.callback(), NetLogWithSource());
  6193. EXPECT_THAT(callback.GetResult(rv), IsOk());
  6194. LoadTimingInfo load_timing_info2;
  6195. EXPECT_TRUE(trans2.GetLoadTimingInfo(&load_timing_info2));
  6196. // Even though the SPDY connection is reused, a new tunnelled connection has
  6197. // to be created, so the socket's load timing looks like a fresh connection.
  6198. TestLoadTimingNotReused(load_timing_info2, CONNECT_TIMING_HAS_SSL_TIMES);
  6199. // The requests should have different IDs, since they each are using their own
  6200. // separate stream.
  6201. EXPECT_NE(load_timing_info.socket_log_id, load_timing_info2.socket_log_id);
  6202. rv = trans2.Read(buf.get(), 256, callback.callback());
  6203. EXPECT_EQ(2, callback.GetResult(rv));
  6204. }
  6205. // Test load timing in the case of two HTTPS (non-SPDY) requests through a SPDY
  6206. // HTTPS Proxy to the same server.
  6207. TEST_F(HttpNetworkTransactionTest,
  6208. HttpsProxySpdyConnectHttpsLoadTimingTwoRequestsSameServer) {
  6209. // Configure against https proxy server "proxy:70".
  6210. session_deps_.proxy_resolution_service =
  6211. ConfiguredProxyResolutionService::CreateFixedForTest(
  6212. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  6213. session_deps_.net_log = NetLog::Get();
  6214. std::unique_ptr<HttpNetworkSession> session(
  6215. SpdySessionDependencies::SpdyCreateSession(&session_deps_));
  6216. HttpRequestInfo request1;
  6217. request1.method = "GET";
  6218. request1.url = GURL("https://www.example.org/");
  6219. request1.load_flags = 0;
  6220. request1.traffic_annotation =
  6221. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6222. HttpRequestInfo request2;
  6223. request2.method = "GET";
  6224. request2.url = GURL("https://www.example.org/2");
  6225. request2.load_flags = 0;
  6226. request2.traffic_annotation =
  6227. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6228. // CONNECT to www.example.org:443 via SPDY.
  6229. spdy::SpdySerializedFrame connect1(spdy_util_.ConstructSpdyConnect(
  6230. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  6231. HostPortPair("www.example.org", 443)));
  6232. spdy::SpdySerializedFrame conn_resp1(
  6233. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  6234. // Fetch https://www.example.org/ via HTTP.
  6235. const char get1[] =
  6236. "GET / HTTP/1.1\r\n"
  6237. "Host: www.example.org\r\n"
  6238. "Connection: keep-alive\r\n\r\n";
  6239. spdy::SpdySerializedFrame wrapped_get1(
  6240. spdy_util_.ConstructSpdyDataFrame(1, get1, false));
  6241. const char resp1[] = "HTTP/1.1 200 OK\r\n"
  6242. "Content-Length: 1\r\n\r\n";
  6243. spdy::SpdySerializedFrame wrapped_get_resp1(
  6244. spdy_util_.ConstructSpdyDataFrame(1, resp1, false));
  6245. spdy::SpdySerializedFrame wrapped_body1(
  6246. spdy_util_.ConstructSpdyDataFrame(1, "1", false));
  6247. spdy::SpdySerializedFrame window_update(
  6248. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp1.size()));
  6249. // Fetch https://www.example.org/2 via HTTP.
  6250. const char get2[] =
  6251. "GET /2 HTTP/1.1\r\n"
  6252. "Host: www.example.org\r\n"
  6253. "Connection: keep-alive\r\n\r\n";
  6254. spdy::SpdySerializedFrame wrapped_get2(
  6255. spdy_util_.ConstructSpdyDataFrame(1, get2, false));
  6256. const char resp2[] = "HTTP/1.1 200 OK\r\n"
  6257. "Content-Length: 2\r\n\r\n";
  6258. spdy::SpdySerializedFrame wrapped_get_resp2(
  6259. spdy_util_.ConstructSpdyDataFrame(1, resp2, false));
  6260. spdy::SpdySerializedFrame wrapped_body2(
  6261. spdy_util_.ConstructSpdyDataFrame(1, "22", false));
  6262. MockWrite spdy_writes[] = {
  6263. CreateMockWrite(connect1, 0), CreateMockWrite(wrapped_get1, 2),
  6264. CreateMockWrite(wrapped_get2, 5),
  6265. };
  6266. MockRead spdy_reads[] = {
  6267. CreateMockRead(conn_resp1, 1, ASYNC),
  6268. CreateMockRead(wrapped_get_resp1, 3, ASYNC),
  6269. CreateMockRead(wrapped_body1, 4, SYNCHRONOUS),
  6270. CreateMockRead(wrapped_get_resp2, 6, ASYNC),
  6271. CreateMockRead(wrapped_body2, 7, SYNCHRONOUS),
  6272. MockRead(ASYNC, 0, 8),
  6273. };
  6274. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  6275. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  6276. SSLSocketDataProvider ssl(ASYNC, OK);
  6277. ssl.next_proto = kProtoHTTP2;
  6278. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  6279. SSLSocketDataProvider ssl2(ASYNC, OK);
  6280. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  6281. TestCompletionCallback callback;
  6282. auto trans =
  6283. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  6284. int rv = trans->Start(&request1, callback.callback(), NetLogWithSource());
  6285. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6286. rv = callback.WaitForResult();
  6287. EXPECT_THAT(rv, IsOk());
  6288. LoadTimingInfo load_timing_info;
  6289. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  6290. TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES);
  6291. const HttpResponseInfo* response = trans->GetResponseInfo();
  6292. ASSERT_TRUE(response);
  6293. ASSERT_TRUE(response->headers);
  6294. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  6295. std::string response_data;
  6296. scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(256);
  6297. EXPECT_EQ(1, trans->Read(buf.get(), 256, callback.callback()));
  6298. trans.reset();
  6299. auto trans2 =
  6300. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  6301. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  6302. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6303. rv = callback.WaitForResult();
  6304. EXPECT_THAT(rv, IsOk());
  6305. LoadTimingInfo load_timing_info2;
  6306. EXPECT_TRUE(trans2->GetLoadTimingInfo(&load_timing_info2));
  6307. TestLoadTimingReused(load_timing_info2);
  6308. // The requests should have the same ID.
  6309. EXPECT_EQ(load_timing_info.socket_log_id, load_timing_info2.socket_log_id);
  6310. EXPECT_EQ(2, trans2->Read(buf.get(), 256, callback.callback()));
  6311. }
  6312. // Test load timing in the case of of two HTTP requests through a SPDY HTTPS
  6313. // Proxy to different servers.
  6314. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyLoadTimingTwoHttpRequests) {
  6315. // Configure against https proxy server "proxy:70".
  6316. session_deps_.proxy_resolution_service =
  6317. ConfiguredProxyResolutionService::CreateFixedForTest(
  6318. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  6319. session_deps_.net_log = NetLog::Get();
  6320. std::unique_ptr<HttpNetworkSession> session(
  6321. SpdySessionDependencies::SpdyCreateSession(&session_deps_));
  6322. HttpRequestInfo request1;
  6323. request1.method = "GET";
  6324. request1.url = GURL("http://www.example.org/");
  6325. request1.load_flags = 0;
  6326. request1.traffic_annotation =
  6327. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6328. HttpRequestInfo request2;
  6329. request2.method = "GET";
  6330. request2.url = GURL("http://mail.example.org/");
  6331. request2.load_flags = 0;
  6332. request2.traffic_annotation =
  6333. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6334. // http://www.example.org/
  6335. spdy::Http2HeaderBlock headers(
  6336. spdy_util_.ConstructGetHeaderBlockForProxy("http://www.example.org/"));
  6337. spdy::SpdySerializedFrame get1(
  6338. spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true));
  6339. spdy::SpdySerializedFrame get_resp1(
  6340. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  6341. spdy::SpdySerializedFrame body1(
  6342. spdy_util_.ConstructSpdyDataFrame(1, "1", true));
  6343. spdy_util_.UpdateWithStreamDestruction(1);
  6344. // http://mail.example.org/
  6345. spdy::Http2HeaderBlock headers2(
  6346. spdy_util_.ConstructGetHeaderBlockForProxy("http://mail.example.org/"));
  6347. spdy::SpdySerializedFrame get2(
  6348. spdy_util_.ConstructSpdyHeaders(3, std::move(headers2), LOWEST, true));
  6349. spdy::SpdySerializedFrame get_resp2(
  6350. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  6351. spdy::SpdySerializedFrame body2(
  6352. spdy_util_.ConstructSpdyDataFrame(3, "22", true));
  6353. MockWrite spdy_writes[] = {
  6354. CreateMockWrite(get1, 0), CreateMockWrite(get2, 3),
  6355. };
  6356. MockRead spdy_reads[] = {
  6357. CreateMockRead(get_resp1, 1, ASYNC),
  6358. CreateMockRead(body1, 2, ASYNC),
  6359. CreateMockRead(get_resp2, 4, ASYNC),
  6360. CreateMockRead(body2, 5, ASYNC),
  6361. MockRead(ASYNC, 0, 6),
  6362. };
  6363. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  6364. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  6365. SSLSocketDataProvider ssl(ASYNC, OK);
  6366. ssl.next_proto = kProtoHTTP2;
  6367. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  6368. TestCompletionCallback callback;
  6369. auto trans =
  6370. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  6371. int rv = trans->Start(&request1, callback.callback(), NetLogWithSource());
  6372. EXPECT_THAT(callback.GetResult(rv), IsOk());
  6373. LoadTimingInfo load_timing_info;
  6374. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  6375. TestLoadTimingNotReused(load_timing_info,
  6376. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  6377. const HttpResponseInfo* response = trans->GetResponseInfo();
  6378. ASSERT_TRUE(response);
  6379. ASSERT_TRUE(response->headers);
  6380. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  6381. std::string response_data;
  6382. scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(256);
  6383. rv = trans->Read(buf.get(), 256, callback.callback());
  6384. EXPECT_EQ(1, callback.GetResult(rv));
  6385. // Delete the first request, so the second one can reuse the socket.
  6386. trans.reset();
  6387. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  6388. rv = trans2.Start(&request2, callback.callback(), NetLogWithSource());
  6389. EXPECT_THAT(callback.GetResult(rv), IsOk());
  6390. LoadTimingInfo load_timing_info2;
  6391. EXPECT_TRUE(trans2.GetLoadTimingInfo(&load_timing_info2));
  6392. TestLoadTimingReused(load_timing_info2);
  6393. // The requests should have the same ID.
  6394. EXPECT_EQ(load_timing_info.socket_log_id, load_timing_info2.socket_log_id);
  6395. rv = trans2.Read(buf.get(), 256, callback.callback());
  6396. EXPECT_EQ(2, callback.GetResult(rv));
  6397. }
  6398. // Test that an HTTP/2 CONNECT through an HTTPS Proxy to a HTTP/2 server and a
  6399. // direct (non-proxied) request to the proxy server are not pooled, as that
  6400. // would break socket pool isolation.
  6401. TEST_F(HttpNetworkTransactionTest, SpdyProxyIsolation1) {
  6402. ProxyConfig proxy_config;
  6403. proxy_config.set_auto_detect(true);
  6404. proxy_config.set_pac_url(GURL("http://fooproxyurl"));
  6405. CapturingProxyResolver capturing_proxy_resolver;
  6406. session_deps_.proxy_resolution_service =
  6407. std::make_unique<ConfiguredProxyResolutionService>(
  6408. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  6409. proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)),
  6410. std::make_unique<CapturingProxyResolverFactory>(
  6411. &capturing_proxy_resolver),
  6412. nullptr, /*quick_check_enabled=*/true);
  6413. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  6414. SpdyTestUtil spdy_util1;
  6415. // CONNECT to www.example.org:443 via HTTP/2.
  6416. spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect(
  6417. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  6418. HostPortPair("www.example.org", 443)));
  6419. // fetch https://www.example.org/ via HTTP/2.
  6420. const char kMyUrl[] = "https://www.example.org/";
  6421. spdy::SpdySerializedFrame get(spdy_util1.ConstructSpdyGet(kMyUrl, 1, LOWEST));
  6422. spdy::SpdySerializedFrame wrapped_get(
  6423. spdy_util_.ConstructWrappedSpdyFrame(get, 1));
  6424. spdy::SpdySerializedFrame conn_resp(
  6425. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  6426. spdy::SpdySerializedFrame get_resp(
  6427. spdy_util1.ConstructSpdyGetReply(nullptr, 0, 1));
  6428. spdy::SpdySerializedFrame wrapped_get_resp(
  6429. spdy_util_.ConstructWrappedSpdyFrame(get_resp, 1));
  6430. spdy::SpdySerializedFrame body(spdy_util1.ConstructSpdyDataFrame(1, true));
  6431. spdy::SpdySerializedFrame wrapped_body(
  6432. spdy_util_.ConstructWrappedSpdyFrame(body, 1));
  6433. spdy::SpdySerializedFrame window_update_get_resp(
  6434. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp.size()));
  6435. spdy::SpdySerializedFrame window_update_body(
  6436. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_body.size()));
  6437. MockWrite spdy_writes1[] = {
  6438. CreateMockWrite(connect, 0),
  6439. CreateMockWrite(wrapped_get, 2),
  6440. CreateMockWrite(window_update_get_resp, 6),
  6441. CreateMockWrite(window_update_body, 7),
  6442. };
  6443. MockRead spdy_reads1[] = {
  6444. CreateMockRead(conn_resp, 1, ASYNC),
  6445. MockRead(ASYNC, ERR_IO_PENDING, 3),
  6446. CreateMockRead(wrapped_get_resp, 4, ASYNC),
  6447. CreateMockRead(wrapped_body, 5, ASYNC),
  6448. MockRead(ASYNC, 0, 8),
  6449. };
  6450. SequencedSocketData spdy_data1(spdy_reads1, spdy_writes1);
  6451. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data1);
  6452. // Fetch https://proxy:70/ via HTTP/2. Needs a new SpdyTestUtil, since it uses
  6453. // a new pipe.
  6454. SpdyTestUtil spdy_util2;
  6455. spdy::SpdySerializedFrame req(
  6456. spdy_util2.ConstructSpdyGet("https://proxy:70/", 1, LOWEST));
  6457. MockWrite spdy_writes2[] = {CreateMockWrite(req, 0)};
  6458. spdy::SpdySerializedFrame resp(
  6459. spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1));
  6460. spdy::SpdySerializedFrame data(spdy_util2.ConstructSpdyDataFrame(1, true));
  6461. MockRead spdy_reads2[] = {
  6462. CreateMockRead(resp, 1),
  6463. CreateMockRead(data, 2),
  6464. MockRead(ASYNC, 0, 3),
  6465. };
  6466. SequencedSocketData spdy_data2(spdy_reads2, spdy_writes2);
  6467. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data2);
  6468. SSLSocketDataProvider ssl(ASYNC, OK);
  6469. ssl.next_proto = kProtoHTTP2;
  6470. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  6471. SSLSocketDataProvider ssl2(ASYNC, OK);
  6472. ssl2.next_proto = kProtoHTTP2;
  6473. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  6474. SSLSocketDataProvider ssl3(ASYNC, OK);
  6475. ssl3.next_proto = kProtoHTTP2;
  6476. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3);
  6477. TestCompletionCallback callback;
  6478. std::string response_data;
  6479. // Make a request using proxy:70 as a HTTP/2 proxy.
  6480. capturing_proxy_resolver.set_proxy_server(
  6481. ProxyServer(ProxyServer::SCHEME_HTTPS, HostPortPair("proxy", 70)));
  6482. HttpRequestInfo request1;
  6483. request1.method = "GET";
  6484. request1.url = GURL("https://www.example.org/");
  6485. request1.traffic_annotation =
  6486. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6487. HttpNetworkTransaction trans1(LOWEST, session.get());
  6488. int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource());
  6489. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6490. // Allow the SpdyProxyClientSocket's write callback to complete.
  6491. base::RunLoop().RunUntilIdle();
  6492. // Now allow the read of the response to complete.
  6493. spdy_data1.Resume();
  6494. rv = callback.WaitForResult();
  6495. EXPECT_THAT(rv, IsOk());
  6496. const HttpResponseInfo* response = trans1.GetResponseInfo();
  6497. ASSERT_TRUE(response);
  6498. ASSERT_TRUE(response->headers);
  6499. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  6500. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  6501. EXPECT_EQ(kUploadData, response_data);
  6502. RunUntilIdle();
  6503. // Make a direct HTTP/2 request to proxy:70.
  6504. capturing_proxy_resolver.set_proxy_server(ProxyServer::Direct());
  6505. HttpRequestInfo request2;
  6506. request2.method = "GET";
  6507. request2.url = GURL("https://proxy:70/");
  6508. request2.traffic_annotation =
  6509. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6510. HttpNetworkTransaction trans2(LOWEST, session.get());
  6511. EXPECT_THAT(callback.GetResult(trans2.Start(&request2, callback.callback(),
  6512. NetLogWithSource())),
  6513. IsOk());
  6514. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  6515. }
  6516. // Same as above, but reverse request order, since the code to check for an
  6517. // existing session is different for tunnels and direct connections.
  6518. TEST_F(HttpNetworkTransactionTest, SpdyProxyIsolation2) {
  6519. // Configure against https proxy server "myproxy:80".
  6520. ProxyConfig proxy_config;
  6521. proxy_config.set_auto_detect(true);
  6522. proxy_config.set_pac_url(GURL("http://fooproxyurl"));
  6523. CapturingProxyResolver capturing_proxy_resolver;
  6524. session_deps_.proxy_resolution_service =
  6525. std::make_unique<ConfiguredProxyResolutionService>(
  6526. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  6527. proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)),
  6528. std::make_unique<CapturingProxyResolverFactory>(
  6529. &capturing_proxy_resolver),
  6530. nullptr, /*quick_check_enabled=*/true);
  6531. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  6532. // Fetch https://proxy:70/ via HTTP/2.
  6533. SpdyTestUtil spdy_util1;
  6534. spdy::SpdySerializedFrame req(
  6535. spdy_util1.ConstructSpdyGet("https://proxy:70/", 1, LOWEST));
  6536. MockWrite spdy_writes1[] = {CreateMockWrite(req, 0)};
  6537. spdy::SpdySerializedFrame resp(
  6538. spdy_util1.ConstructSpdyGetReply(nullptr, 0, 1));
  6539. spdy::SpdySerializedFrame data(spdy_util1.ConstructSpdyDataFrame(1, true));
  6540. MockRead spdy_reads1[] = {
  6541. CreateMockRead(resp, 1),
  6542. CreateMockRead(data, 2),
  6543. MockRead(ASYNC, 0, 3),
  6544. };
  6545. SequencedSocketData spdy_data1(spdy_reads1, spdy_writes1);
  6546. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data1);
  6547. SpdyTestUtil spdy_util2;
  6548. // CONNECT to www.example.org:443 via HTTP/2.
  6549. spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect(
  6550. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  6551. HostPortPair("www.example.org", 443)));
  6552. // fetch https://www.example.org/ via HTTP/2.
  6553. const char kMyUrl[] = "https://www.example.org/";
  6554. spdy::SpdySerializedFrame get(spdy_util2.ConstructSpdyGet(kMyUrl, 1, LOWEST));
  6555. spdy::SpdySerializedFrame wrapped_get(
  6556. spdy_util_.ConstructWrappedSpdyFrame(get, 1));
  6557. spdy::SpdySerializedFrame conn_resp(
  6558. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  6559. spdy::SpdySerializedFrame get_resp(
  6560. spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1));
  6561. spdy::SpdySerializedFrame wrapped_get_resp(
  6562. spdy_util_.ConstructWrappedSpdyFrame(get_resp, 1));
  6563. spdy::SpdySerializedFrame body(spdy_util2.ConstructSpdyDataFrame(1, true));
  6564. spdy::SpdySerializedFrame wrapped_body(
  6565. spdy_util_.ConstructWrappedSpdyFrame(body, 1));
  6566. spdy::SpdySerializedFrame window_update_get_resp(
  6567. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp.size()));
  6568. spdy::SpdySerializedFrame window_update_body(
  6569. spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_body.size()));
  6570. MockWrite spdy_writes2[] = {
  6571. CreateMockWrite(connect, 0),
  6572. CreateMockWrite(wrapped_get, 2),
  6573. CreateMockWrite(window_update_get_resp, 6),
  6574. CreateMockWrite(window_update_body, 7),
  6575. };
  6576. MockRead spdy_reads2[] = {
  6577. CreateMockRead(conn_resp, 1, ASYNC),
  6578. MockRead(ASYNC, ERR_IO_PENDING, 3),
  6579. CreateMockRead(wrapped_get_resp, 4, ASYNC),
  6580. CreateMockRead(wrapped_body, 5, ASYNC),
  6581. MockRead(ASYNC, 0, 8),
  6582. };
  6583. SequencedSocketData spdy_data2(spdy_reads2, spdy_writes2);
  6584. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data2);
  6585. SSLSocketDataProvider ssl(ASYNC, OK);
  6586. ssl.next_proto = kProtoHTTP2;
  6587. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  6588. SSLSocketDataProvider ssl2(ASYNC, OK);
  6589. ssl2.next_proto = kProtoHTTP2;
  6590. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  6591. SSLSocketDataProvider ssl3(ASYNC, OK);
  6592. ssl3.next_proto = kProtoHTTP2;
  6593. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3);
  6594. TestCompletionCallback callback;
  6595. std::string response_data;
  6596. // Make a direct HTTP/2 request to proxy:70.
  6597. capturing_proxy_resolver.set_proxy_server(ProxyServer::Direct());
  6598. HttpRequestInfo request1;
  6599. request1.method = "GET";
  6600. request1.url = GURL("https://proxy:70/");
  6601. request1.traffic_annotation =
  6602. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6603. HttpNetworkTransaction trans1(LOWEST, session.get());
  6604. EXPECT_THAT(callback.GetResult(trans1.Start(&request1, callback.callback(),
  6605. NetLogWithSource())),
  6606. IsOk());
  6607. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  6608. RunUntilIdle();
  6609. // Make a request using proxy:70 as a HTTP/2 proxy.
  6610. capturing_proxy_resolver.set_proxy_server(
  6611. ProxyServer(ProxyServer::SCHEME_HTTPS, HostPortPair("proxy", 70)));
  6612. HttpRequestInfo request2;
  6613. request2.method = "GET";
  6614. request2.url = GURL("https://www.example.org/");
  6615. request2.traffic_annotation =
  6616. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6617. HttpNetworkTransaction trans2(LOWEST, session.get());
  6618. int rv = trans2.Start(&request2, callback.callback(), NetLogWithSource());
  6619. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6620. // Allow the SpdyProxyClientSocket's write callback to complete.
  6621. base::RunLoop().RunUntilIdle();
  6622. // Now allow the read of the response to complete.
  6623. spdy_data2.Resume();
  6624. rv = callback.WaitForResult();
  6625. EXPECT_THAT(rv, IsOk());
  6626. const HttpResponseInfo* response2 = trans2.GetResponseInfo();
  6627. ASSERT_TRUE(response2);
  6628. ASSERT_TRUE(response2->headers);
  6629. EXPECT_EQ("HTTP/1.1 200", response2->headers->GetStatusLine());
  6630. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  6631. EXPECT_EQ(kUploadData, response_data);
  6632. }
  6633. // Test the challenge-response-retry sequence through an HTTPS Proxy
  6634. TEST_F(HttpNetworkTransactionTest, HttpsProxyAuthRetry) {
  6635. HttpRequestInfo request;
  6636. request.method = "GET";
  6637. request.url = GURL("http://www.example.org/");
  6638. // when the no authentication data flag is set.
  6639. request.privacy_mode = PRIVACY_MODE_ENABLED;
  6640. request.traffic_annotation =
  6641. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6642. // Configure against https proxy server "myproxy:70".
  6643. session_deps_.proxy_resolution_service =
  6644. ConfiguredProxyResolutionService::CreateFixedForTest(
  6645. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  6646. session_deps_.net_log = NetLog::Get();
  6647. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  6648. // Since we have proxy, should use full url
  6649. MockWrite data_writes1[] = {
  6650. MockWrite("GET http://www.example.org/ HTTP/1.1\r\n"
  6651. "Host: www.example.org\r\n"
  6652. "Proxy-Connection: keep-alive\r\n\r\n"),
  6653. // After calling trans.RestartWithAuth(), this is the request we should
  6654. // be issuing -- the final header line contains the credentials.
  6655. MockWrite("GET http://www.example.org/ HTTP/1.1\r\n"
  6656. "Host: www.example.org\r\n"
  6657. "Proxy-Connection: keep-alive\r\n"
  6658. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  6659. };
  6660. // The proxy responds to the GET with a 407, using a persistent
  6661. // connection.
  6662. MockRead data_reads1[] = {
  6663. // No credentials.
  6664. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  6665. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  6666. MockRead("Proxy-Connection: keep-alive\r\n"),
  6667. MockRead("Content-Length: 0\r\n\r\n"),
  6668. MockRead("HTTP/1.1 200 OK\r\n"),
  6669. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  6670. MockRead("Content-Length: 100\r\n\r\n"),
  6671. MockRead(SYNCHRONOUS, OK),
  6672. };
  6673. StaticSocketDataProvider data1(data_reads1, data_writes1);
  6674. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  6675. SSLSocketDataProvider ssl(ASYNC, OK);
  6676. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  6677. TestCompletionCallback callback1;
  6678. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  6679. int rv = trans.Start(&request, callback1.callback(),
  6680. NetLogWithSource::Make(NetLogSourceType::NONE));
  6681. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6682. rv = callback1.WaitForResult();
  6683. EXPECT_THAT(rv, IsOk());
  6684. LoadTimingInfo load_timing_info;
  6685. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  6686. TestLoadTimingNotReused(load_timing_info,
  6687. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  6688. const HttpResponseInfo* response = trans.GetResponseInfo();
  6689. ASSERT_TRUE(response);
  6690. ASSERT_TRUE(response->headers);
  6691. EXPECT_EQ(407, response->headers->response_code());
  6692. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6693. EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge));
  6694. EXPECT_FALSE(response->did_use_http_auth);
  6695. EXPECT_EQ(PacResultElementToProxyServer("HTTPS myproxy:70"),
  6696. response->proxy_server);
  6697. TestCompletionCallback callback2;
  6698. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  6699. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6700. rv = callback2.WaitForResult();
  6701. EXPECT_THAT(rv, IsOk());
  6702. load_timing_info = LoadTimingInfo();
  6703. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  6704. // Retrying with HTTP AUTH is considered to be reusing a socket.
  6705. TestLoadTimingReused(load_timing_info);
  6706. response = trans.GetResponseInfo();
  6707. ASSERT_TRUE(response);
  6708. EXPECT_TRUE(response->headers->IsKeepAlive());
  6709. EXPECT_EQ(200, response->headers->response_code());
  6710. EXPECT_EQ(100, response->headers->GetContentLength());
  6711. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6712. EXPECT_TRUE(response->did_use_http_auth);
  6713. EXPECT_EQ(PacResultElementToProxyServer("HTTPS myproxy:70"),
  6714. response->proxy_server);
  6715. // The password prompt info should not be set.
  6716. EXPECT_FALSE(response->auth_challenge.has_value());
  6717. }
  6718. // Test the challenge-response-retry sequence through an HTTPS Proxy over a
  6719. // connection that requires a restart.
  6720. TEST_F(HttpNetworkTransactionTest, HttpsProxyAuthRetryNoKeepAlive) {
  6721. HttpRequestInfo request;
  6722. request.method = "GET";
  6723. request.url = GURL("http://www.example.org/");
  6724. // when the no authentication data flag is set.
  6725. request.privacy_mode = PRIVACY_MODE_ENABLED;
  6726. request.traffic_annotation =
  6727. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6728. // Configure against https proxy server "myproxy:70".
  6729. session_deps_.proxy_resolution_service =
  6730. ConfiguredProxyResolutionService::CreateFixedForTest(
  6731. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  6732. session_deps_.net_log = NetLog::Get();
  6733. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  6734. // Since we have proxy, should use full url
  6735. MockWrite data_writes1[] = {
  6736. MockWrite("GET http://www.example.org/ HTTP/1.1\r\n"
  6737. "Host: www.example.org\r\n"
  6738. "Proxy-Connection: keep-alive\r\n\r\n"),
  6739. };
  6740. // The proxy responds to the GET with a 407, using a non-persistent
  6741. // connection.
  6742. MockRead data_reads1[] = {
  6743. // No credentials.
  6744. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  6745. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  6746. MockRead("Proxy-Connection: close\r\n"),
  6747. MockRead("Content-Length: 0\r\n\r\n"),
  6748. };
  6749. MockWrite data_writes2[] = {
  6750. // After calling trans.RestartWithAuth(), this is the request we should
  6751. // be issuing -- the final header line contains the credentials.
  6752. MockWrite("GET http://www.example.org/ HTTP/1.1\r\n"
  6753. "Host: www.example.org\r\n"
  6754. "Proxy-Connection: keep-alive\r\n"
  6755. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  6756. };
  6757. MockRead data_reads2[] = {
  6758. MockRead("HTTP/1.1 200 OK\r\n"),
  6759. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  6760. MockRead("Content-Length: 100\r\n\r\n"),
  6761. MockRead(SYNCHRONOUS, OK),
  6762. };
  6763. StaticSocketDataProvider data1(data_reads1, data_writes1);
  6764. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  6765. StaticSocketDataProvider data2(data_reads2, data_writes2);
  6766. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  6767. // One per each proxy connection.
  6768. SSLSocketDataProvider ssl1(ASYNC, OK);
  6769. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  6770. SSLSocketDataProvider ssl2(ASYNC, OK);
  6771. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  6772. TestCompletionCallback callback1;
  6773. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  6774. int rv = trans.Start(&request, callback1.callback(),
  6775. NetLogWithSource::Make(NetLogSourceType::NONE));
  6776. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6777. rv = callback1.WaitForResult();
  6778. EXPECT_THAT(rv, IsOk());
  6779. LoadTimingInfo load_timing_info;
  6780. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  6781. TestLoadTimingNotReused(load_timing_info,
  6782. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  6783. const HttpResponseInfo* response = trans.GetResponseInfo();
  6784. ASSERT_TRUE(response);
  6785. ASSERT_TRUE(response->headers);
  6786. EXPECT_EQ(407, response->headers->response_code());
  6787. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6788. EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge));
  6789. EXPECT_FALSE(response->did_use_http_auth);
  6790. EXPECT_EQ(PacResultElementToProxyServer("HTTPS myproxy:70"),
  6791. response->proxy_server);
  6792. TestCompletionCallback callback2;
  6793. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  6794. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6795. rv = callback2.WaitForResult();
  6796. EXPECT_THAT(rv, IsOk());
  6797. load_timing_info = LoadTimingInfo();
  6798. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  6799. TestLoadTimingNotReused(load_timing_info,
  6800. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  6801. response = trans.GetResponseInfo();
  6802. ASSERT_TRUE(response);
  6803. EXPECT_TRUE(response->headers->IsKeepAlive());
  6804. EXPECT_EQ(200, response->headers->response_code());
  6805. EXPECT_EQ(100, response->headers->GetContentLength());
  6806. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6807. EXPECT_TRUE(response->did_use_http_auth);
  6808. EXPECT_EQ(PacResultElementToProxyServer("HTTPS myproxy:70"),
  6809. response->proxy_server);
  6810. // The password prompt info should not be set.
  6811. EXPECT_FALSE(response->auth_challenge.has_value());
  6812. }
  6813. // Test the challenge-response-retry sequence through an HTTPS Proxy over a
  6814. // connection that requires a restart, with a proxy change occurring over the
  6815. // restart.
  6816. TEST_F(HttpNetworkTransactionTest, HttpsProxyAuthRetryNoKeepAliveChangeProxy) {
  6817. const auto proxy1 = PacResultElementToProxyServer("HTTPS myproxy:70");
  6818. const auto proxy2 = PacResultElementToProxyServer("HTTPS myproxy2:70");
  6819. auto proxy_delegate = std::make_unique<SingleProxyDelegate>();
  6820. proxy_delegate->set_proxy(proxy1);
  6821. HttpRequestInfo request;
  6822. request.method = "GET";
  6823. request.url = GURL("http://www.example.org/");
  6824. // when the no authentication data flag is set.
  6825. request.privacy_mode = PRIVACY_MODE_ENABLED;
  6826. request.traffic_annotation =
  6827. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6828. // Configure against https proxy server "myproxy:70".
  6829. session_deps_.proxy_resolution_service =
  6830. ConfiguredProxyResolutionService::CreateFixedForTest(
  6831. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  6832. session_deps_.proxy_resolution_service->SetProxyDelegate(
  6833. proxy_delegate.get());
  6834. session_deps_.net_log = NetLog::Get();
  6835. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  6836. // Since we have proxy, should use full url
  6837. MockWrite data_writes1[] = {
  6838. MockWrite("GET http://www.example.org/ HTTP/1.1\r\n"
  6839. "Host: www.example.org\r\n"
  6840. "Proxy-Connection: keep-alive\r\n\r\n"),
  6841. };
  6842. // The proxy responds to the GET with a 407, using a non-persistent
  6843. // connection.
  6844. MockRead data_reads1[] = {
  6845. // No credentials.
  6846. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  6847. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  6848. MockRead("Proxy-Connection: close\r\n"),
  6849. MockRead("Content-Length: 0\r\n\r\n"),
  6850. };
  6851. MockWrite data_writes2[] = {
  6852. // After calling trans.RestartWithAuth(), this is the request we should
  6853. // be issuing -- the final header line contains the credentials.
  6854. MockWrite("GET http://www.example.org/ HTTP/1.1\r\n"
  6855. "Host: www.example.org\r\n"
  6856. "Proxy-Connection: keep-alive\r\n"
  6857. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  6858. };
  6859. MockRead data_reads2[] = {
  6860. MockRead("HTTP/1.1 200 OK\r\n"),
  6861. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  6862. MockRead("Content-Length: 100\r\n\r\n"),
  6863. MockRead(SYNCHRONOUS, OK),
  6864. };
  6865. StaticSocketDataProvider data1(data_reads1, data_writes1);
  6866. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  6867. StaticSocketDataProvider data2(data_reads2, data_writes2);
  6868. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  6869. // One per each proxy connection.
  6870. SSLSocketDataProvider ssl1(ASYNC, OK);
  6871. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  6872. SSLSocketDataProvider ssl2(ASYNC, OK);
  6873. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  6874. TestCompletionCallback callback1;
  6875. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  6876. int rv = trans.Start(&request, callback1.callback(),
  6877. NetLogWithSource::Make(NetLogSourceType::NONE));
  6878. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6879. rv = callback1.WaitForResult();
  6880. EXPECT_THAT(rv, IsOk());
  6881. LoadTimingInfo load_timing_info;
  6882. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  6883. TestLoadTimingNotReused(load_timing_info,
  6884. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  6885. const HttpResponseInfo* response = trans.GetResponseInfo();
  6886. ASSERT_TRUE(response);
  6887. ASSERT_TRUE(response->headers);
  6888. EXPECT_EQ(407, response->headers->response_code());
  6889. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6890. EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge));
  6891. EXPECT_FALSE(response->did_use_http_auth);
  6892. EXPECT_EQ(proxy1, response->proxy_server);
  6893. TestCompletionCallback callback2;
  6894. // Configure against https proxy server "myproxy2:70".
  6895. proxy_delegate->set_proxy(proxy2);
  6896. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  6897. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6898. rv = callback2.WaitForResult();
  6899. EXPECT_THAT(rv, IsOk());
  6900. load_timing_info = LoadTimingInfo();
  6901. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  6902. TestLoadTimingNotReused(load_timing_info,
  6903. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  6904. response = trans.GetResponseInfo();
  6905. ASSERT_TRUE(response);
  6906. EXPECT_TRUE(response->headers->IsKeepAlive());
  6907. EXPECT_EQ(200, response->headers->response_code());
  6908. EXPECT_EQ(100, response->headers->GetContentLength());
  6909. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6910. EXPECT_TRUE(response->did_use_http_auth);
  6911. EXPECT_EQ(proxy2, response->proxy_server);
  6912. // The password prompt info should not be set.
  6913. EXPECT_FALSE(response->auth_challenge.has_value());
  6914. }
  6915. // Test the challenge-response-retry sequence through an HTTPS Proxy over a
  6916. // connection that requires a restart, with a change to a direct connection
  6917. // occurring over the restart.
  6918. TEST_F(HttpNetworkTransactionTest,
  6919. HttpsProxyAuthRetryNoKeepAliveChangeToDirect) {
  6920. const auto proxy = PacResultElementToProxyServer("HTTPS myproxy:70");
  6921. const auto direct = ProxyServer::Direct();
  6922. auto proxy_delegate = std::make_unique<SingleProxyDelegate>();
  6923. proxy_delegate->set_proxy(proxy);
  6924. HttpRequestInfo request;
  6925. request.method = "GET";
  6926. request.url = GURL("http://www.example.org/");
  6927. // when the no authentication data flag is set.
  6928. request.privacy_mode = PRIVACY_MODE_ENABLED;
  6929. request.traffic_annotation =
  6930. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  6931. // Configure against https proxy server "myproxy:70".
  6932. session_deps_.proxy_resolution_service =
  6933. ConfiguredProxyResolutionService::CreateFixedForTest(
  6934. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  6935. session_deps_.proxy_resolution_service->SetProxyDelegate(
  6936. proxy_delegate.get());
  6937. session_deps_.net_log = NetLog::Get();
  6938. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  6939. // Since we have proxy, should use full url
  6940. MockWrite data_writes1[] = {
  6941. MockWrite("GET http://www.example.org/ HTTP/1.1\r\n"
  6942. "Host: www.example.org\r\n"
  6943. "Proxy-Connection: keep-alive\r\n\r\n"),
  6944. };
  6945. // The proxy responds to the GET with a 407, using a non-persistent
  6946. // connection.
  6947. MockRead data_reads1[] = {
  6948. // No credentials.
  6949. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  6950. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  6951. MockRead("Proxy-Connection: close\r\n"),
  6952. MockRead("Content-Length: 0\r\n\r\n"),
  6953. };
  6954. MockWrite data_writes2[] = {
  6955. // After calling trans.RestartWithAuth(), this is the request we should
  6956. // be issuing.
  6957. MockWrite("GET / HTTP/1.1\r\n"
  6958. "Host: www.example.org\r\n"
  6959. "Connection: keep-alive\r\n\r\n"),
  6960. };
  6961. MockRead data_reads2[] = {
  6962. MockRead("HTTP/1.1 200 OK\r\n"),
  6963. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  6964. MockRead("Content-Length: 100\r\n\r\n"),
  6965. MockRead(SYNCHRONOUS, OK),
  6966. };
  6967. StaticSocketDataProvider data1(data_reads1, data_writes1);
  6968. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  6969. StaticSocketDataProvider data2(data_reads2, data_writes2);
  6970. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  6971. // One per each connection.
  6972. SSLSocketDataProvider ssl1(ASYNC, OK);
  6973. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  6974. SSLSocketDataProvider ssl2(ASYNC, OK);
  6975. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  6976. TestCompletionCallback callback1;
  6977. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  6978. int rv = trans.Start(&request, callback1.callback(),
  6979. NetLogWithSource::Make(NetLogSourceType::NONE));
  6980. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  6981. rv = callback1.WaitForResult();
  6982. EXPECT_THAT(rv, IsOk());
  6983. LoadTimingInfo load_timing_info;
  6984. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  6985. TestLoadTimingNotReused(load_timing_info,
  6986. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  6987. const HttpResponseInfo* response = trans.GetResponseInfo();
  6988. ASSERT_TRUE(response);
  6989. ASSERT_TRUE(response->headers);
  6990. EXPECT_EQ(407, response->headers->response_code());
  6991. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  6992. EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge));
  6993. EXPECT_FALSE(response->did_use_http_auth);
  6994. EXPECT_EQ(proxy, response->proxy_server);
  6995. TestCompletionCallback callback2;
  6996. // Configure to use a direct connection.
  6997. proxy_delegate->set_proxy(direct);
  6998. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  6999. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7000. rv = callback2.WaitForResult();
  7001. EXPECT_THAT(rv, IsOk());
  7002. load_timing_info = LoadTimingInfo();
  7003. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  7004. TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_DNS_TIMES);
  7005. response = trans.GetResponseInfo();
  7006. ASSERT_TRUE(response);
  7007. EXPECT_TRUE(response->headers->IsKeepAlive());
  7008. EXPECT_EQ(200, response->headers->response_code());
  7009. EXPECT_EQ(100, response->headers->GetContentLength());
  7010. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  7011. EXPECT_FALSE(response->did_use_http_auth);
  7012. EXPECT_EQ(direct, response->proxy_server);
  7013. // The password prompt info should not be set.
  7014. EXPECT_FALSE(response->auth_challenge.has_value());
  7015. }
  7016. void HttpNetworkTransactionTest::ConnectStatusHelperWithExpectedStatus(
  7017. const MockRead& status, int expected_status) {
  7018. HttpRequestInfo request;
  7019. request.method = "GET";
  7020. request.url = GURL("https://www.example.org/");
  7021. request.traffic_annotation =
  7022. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  7023. // Configure against proxy server "myproxy:70".
  7024. session_deps_.proxy_resolution_service =
  7025. ConfiguredProxyResolutionService::CreateFixedForTest(
  7026. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  7027. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  7028. // Since we have proxy, should try to establish tunnel.
  7029. MockWrite data_writes[] = {
  7030. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  7031. "Host: www.example.org:443\r\n"
  7032. "Proxy-Connection: keep-alive\r\n\r\n"),
  7033. };
  7034. MockRead data_reads[] = {
  7035. status, MockRead("Content-Length: 10\r\n\r\n"),
  7036. // No response body because the test stops reading here.
  7037. MockRead(SYNCHRONOUS, ERR_UNEXPECTED),
  7038. };
  7039. StaticSocketDataProvider data(data_reads, data_writes);
  7040. session_deps_.socket_factory->AddSocketDataProvider(&data);
  7041. TestCompletionCallback callback;
  7042. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  7043. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  7044. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7045. rv = callback.WaitForResult();
  7046. EXPECT_EQ(expected_status, rv);
  7047. }
  7048. void HttpNetworkTransactionTest::ConnectStatusHelper(
  7049. const MockRead& status) {
  7050. ConnectStatusHelperWithExpectedStatus(
  7051. status, ERR_TUNNEL_CONNECTION_FAILED);
  7052. }
  7053. TEST_F(HttpNetworkTransactionTest, ConnectStatus100) {
  7054. ConnectStatusHelper(MockRead("HTTP/1.1 100 Continue\r\n"));
  7055. }
  7056. TEST_F(HttpNetworkTransactionTest, ConnectStatus101) {
  7057. ConnectStatusHelper(MockRead("HTTP/1.1 101 Switching Protocols\r\n"));
  7058. }
  7059. TEST_F(HttpNetworkTransactionTest, ConnectStatus201) {
  7060. ConnectStatusHelper(MockRead("HTTP/1.1 201 Created\r\n"));
  7061. }
  7062. TEST_F(HttpNetworkTransactionTest, ConnectStatus202) {
  7063. ConnectStatusHelper(MockRead("HTTP/1.1 202 Accepted\r\n"));
  7064. }
  7065. TEST_F(HttpNetworkTransactionTest, ConnectStatus203) {
  7066. ConnectStatusHelper(
  7067. MockRead("HTTP/1.1 203 Non-Authoritative Information\r\n"));
  7068. }
  7069. TEST_F(HttpNetworkTransactionTest, ConnectStatus204) {
  7070. ConnectStatusHelper(MockRead("HTTP/1.1 204 No Content\r\n"));
  7071. }
  7072. TEST_F(HttpNetworkTransactionTest, ConnectStatus205) {
  7073. ConnectStatusHelper(MockRead("HTTP/1.1 205 Reset Content\r\n"));
  7074. }
  7075. TEST_F(HttpNetworkTransactionTest, ConnectStatus206) {
  7076. ConnectStatusHelper(MockRead("HTTP/1.1 206 Partial Content\r\n"));
  7077. }
  7078. TEST_F(HttpNetworkTransactionTest, ConnectStatus300) {
  7079. ConnectStatusHelper(MockRead("HTTP/1.1 300 Multiple Choices\r\n"));
  7080. }
  7081. TEST_F(HttpNetworkTransactionTest, ConnectStatus301) {
  7082. ConnectStatusHelper(MockRead("HTTP/1.1 301 Moved Permanently\r\n"));
  7083. }
  7084. TEST_F(HttpNetworkTransactionTest, ConnectStatus302) {
  7085. ConnectStatusHelper(MockRead("HTTP/1.1 302 Found\r\n"));
  7086. }
  7087. TEST_F(HttpNetworkTransactionTest, ConnectStatus303) {
  7088. ConnectStatusHelper(MockRead("HTTP/1.1 303 See Other\r\n"));
  7089. }
  7090. TEST_F(HttpNetworkTransactionTest, ConnectStatus304) {
  7091. ConnectStatusHelper(MockRead("HTTP/1.1 304 Not Modified\r\n"));
  7092. }
  7093. TEST_F(HttpNetworkTransactionTest, ConnectStatus305) {
  7094. ConnectStatusHelper(MockRead("HTTP/1.1 305 Use Proxy\r\n"));
  7095. }
  7096. TEST_F(HttpNetworkTransactionTest, ConnectStatus306) {
  7097. ConnectStatusHelper(MockRead("HTTP/1.1 306\r\n"));
  7098. }
  7099. TEST_F(HttpNetworkTransactionTest, ConnectStatus307) {
  7100. ConnectStatusHelper(MockRead("HTTP/1.1 307 Temporary Redirect\r\n"));
  7101. }
  7102. TEST_F(HttpNetworkTransactionTest, ConnectStatus308) {
  7103. ConnectStatusHelper(MockRead("HTTP/1.1 308 Permanent Redirect\r\n"));
  7104. }
  7105. TEST_F(HttpNetworkTransactionTest, ConnectStatus400) {
  7106. ConnectStatusHelper(MockRead("HTTP/1.1 400 Bad Request\r\n"));
  7107. }
  7108. TEST_F(HttpNetworkTransactionTest, ConnectStatus401) {
  7109. ConnectStatusHelper(MockRead("HTTP/1.1 401 Unauthorized\r\n"));
  7110. }
  7111. TEST_F(HttpNetworkTransactionTest, ConnectStatus402) {
  7112. ConnectStatusHelper(MockRead("HTTP/1.1 402 Payment Required\r\n"));
  7113. }
  7114. TEST_F(HttpNetworkTransactionTest, ConnectStatus403) {
  7115. ConnectStatusHelper(MockRead("HTTP/1.1 403 Forbidden\r\n"));
  7116. }
  7117. TEST_F(HttpNetworkTransactionTest, ConnectStatus404) {
  7118. ConnectStatusHelper(MockRead("HTTP/1.1 404 Not Found\r\n"));
  7119. }
  7120. TEST_F(HttpNetworkTransactionTest, ConnectStatus405) {
  7121. ConnectStatusHelper(MockRead("HTTP/1.1 405 Method Not Allowed\r\n"));
  7122. }
  7123. TEST_F(HttpNetworkTransactionTest, ConnectStatus406) {
  7124. ConnectStatusHelper(MockRead("HTTP/1.1 406 Not Acceptable\r\n"));
  7125. }
  7126. TEST_F(HttpNetworkTransactionTest, ConnectStatus407) {
  7127. ConnectStatusHelperWithExpectedStatus(
  7128. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  7129. ERR_PROXY_AUTH_UNSUPPORTED);
  7130. }
  7131. TEST_F(HttpNetworkTransactionTest, ConnectStatus408) {
  7132. ConnectStatusHelper(MockRead("HTTP/1.1 408 Request Timeout\r\n"));
  7133. }
  7134. TEST_F(HttpNetworkTransactionTest, ConnectStatus409) {
  7135. ConnectStatusHelper(MockRead("HTTP/1.1 409 Conflict\r\n"));
  7136. }
  7137. TEST_F(HttpNetworkTransactionTest, ConnectStatus410) {
  7138. ConnectStatusHelper(MockRead("HTTP/1.1 410 Gone\r\n"));
  7139. }
  7140. TEST_F(HttpNetworkTransactionTest, ConnectStatus411) {
  7141. ConnectStatusHelper(MockRead("HTTP/1.1 411 Length Required\r\n"));
  7142. }
  7143. TEST_F(HttpNetworkTransactionTest, ConnectStatus412) {
  7144. ConnectStatusHelper(MockRead("HTTP/1.1 412 Precondition Failed\r\n"));
  7145. }
  7146. TEST_F(HttpNetworkTransactionTest, ConnectStatus413) {
  7147. ConnectStatusHelper(MockRead("HTTP/1.1 413 Request Entity Too Large\r\n"));
  7148. }
  7149. TEST_F(HttpNetworkTransactionTest, ConnectStatus414) {
  7150. ConnectStatusHelper(MockRead("HTTP/1.1 414 Request-URI Too Long\r\n"));
  7151. }
  7152. TEST_F(HttpNetworkTransactionTest, ConnectStatus415) {
  7153. ConnectStatusHelper(MockRead("HTTP/1.1 415 Unsupported Media Type\r\n"));
  7154. }
  7155. TEST_F(HttpNetworkTransactionTest, ConnectStatus416) {
  7156. ConnectStatusHelper(
  7157. MockRead("HTTP/1.1 416 Requested Range Not Satisfiable\r\n"));
  7158. }
  7159. TEST_F(HttpNetworkTransactionTest, ConnectStatus417) {
  7160. ConnectStatusHelper(MockRead("HTTP/1.1 417 Expectation Failed\r\n"));
  7161. }
  7162. TEST_F(HttpNetworkTransactionTest, ConnectStatus500) {
  7163. ConnectStatusHelper(MockRead("HTTP/1.1 500 Internal Server Error\r\n"));
  7164. }
  7165. TEST_F(HttpNetworkTransactionTest, ConnectStatus501) {
  7166. ConnectStatusHelper(MockRead("HTTP/1.1 501 Not Implemented\r\n"));
  7167. }
  7168. TEST_F(HttpNetworkTransactionTest, ConnectStatus502) {
  7169. ConnectStatusHelper(MockRead("HTTP/1.1 502 Bad Gateway\r\n"));
  7170. }
  7171. TEST_F(HttpNetworkTransactionTest, ConnectStatus503) {
  7172. ConnectStatusHelper(MockRead("HTTP/1.1 503 Service Unavailable\r\n"));
  7173. }
  7174. TEST_F(HttpNetworkTransactionTest, ConnectStatus504) {
  7175. ConnectStatusHelper(MockRead("HTTP/1.1 504 Gateway Timeout\r\n"));
  7176. }
  7177. TEST_F(HttpNetworkTransactionTest, ConnectStatus505) {
  7178. ConnectStatusHelper(MockRead("HTTP/1.1 505 HTTP Version Not Supported\r\n"));
  7179. }
  7180. // Test the flow when both the proxy server AND origin server require
  7181. // authentication. Again, this uses basic auth for both since that is
  7182. // the simplest to mock.
  7183. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyThenServer) {
  7184. HttpRequestInfo request;
  7185. request.method = "GET";
  7186. request.url = GURL("http://www.example.org/");
  7187. request.traffic_annotation =
  7188. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  7189. // Configure against proxy server "myproxy:70".
  7190. session_deps_.proxy_resolution_service =
  7191. ConfiguredProxyResolutionService::CreateFixedForTest(
  7192. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  7193. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  7194. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  7195. MockWrite data_writes1[] = {
  7196. MockWrite(
  7197. "GET http://www.example.org/ HTTP/1.1\r\n"
  7198. "Host: www.example.org\r\n"
  7199. "Proxy-Connection: keep-alive\r\n\r\n"),
  7200. };
  7201. MockRead data_reads1[] = {
  7202. MockRead("HTTP/1.0 407 Unauthorized\r\n"),
  7203. // Give a couple authenticate options (only the middle one is actually
  7204. // supported).
  7205. MockRead("Proxy-Authenticate: Basic invalid\r\n"), // Malformed.
  7206. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  7207. MockRead("Proxy-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"),
  7208. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  7209. // Large content-length -- won't matter, as connection will be reset.
  7210. MockRead("Content-Length: 10000\r\n\r\n"),
  7211. MockRead(SYNCHRONOUS, ERR_FAILED),
  7212. };
  7213. // After calling trans.RestartWithAuth() the first time, this is the
  7214. // request we should be issuing -- the final header line contains the
  7215. // proxy's credentials.
  7216. MockWrite data_writes2[] = {
  7217. MockWrite(
  7218. "GET http://www.example.org/ HTTP/1.1\r\n"
  7219. "Host: www.example.org\r\n"
  7220. "Proxy-Connection: keep-alive\r\n"
  7221. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  7222. };
  7223. // Now the proxy server lets the request pass through to origin server.
  7224. // The origin server responds with a 401.
  7225. MockRead data_reads2[] = {
  7226. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  7227. // Note: We are using the same realm-name as the proxy server. This is
  7228. // completely valid, as realms are unique across hosts.
  7229. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  7230. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  7231. MockRead("Content-Length: 2000\r\n\r\n"),
  7232. MockRead(SYNCHRONOUS, ERR_FAILED), // Won't be reached.
  7233. };
  7234. // After calling trans.RestartWithAuth() the second time, we should send
  7235. // the credentials for both the proxy and origin server.
  7236. MockWrite data_writes3[] = {
  7237. MockWrite(
  7238. "GET http://www.example.org/ HTTP/1.1\r\n"
  7239. "Host: www.example.org\r\n"
  7240. "Proxy-Connection: keep-alive\r\n"
  7241. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n"
  7242. "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"),
  7243. };
  7244. // Lastly we get the desired content.
  7245. MockRead data_reads3[] = {
  7246. MockRead("HTTP/1.0 200 OK\r\n"),
  7247. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  7248. MockRead("Content-Length: 100\r\n\r\n"),
  7249. MockRead(SYNCHRONOUS, OK),
  7250. };
  7251. StaticSocketDataProvider data1(data_reads1, data_writes1);
  7252. StaticSocketDataProvider data2(data_reads2, data_writes2);
  7253. StaticSocketDataProvider data3(data_reads3, data_writes3);
  7254. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  7255. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  7256. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  7257. TestCompletionCallback callback1;
  7258. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  7259. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7260. rv = callback1.WaitForResult();
  7261. EXPECT_THAT(rv, IsOk());
  7262. const HttpResponseInfo* response = trans.GetResponseInfo();
  7263. ASSERT_TRUE(response);
  7264. EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge));
  7265. TestCompletionCallback callback2;
  7266. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  7267. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7268. rv = callback2.WaitForResult();
  7269. EXPECT_THAT(rv, IsOk());
  7270. response = trans.GetResponseInfo();
  7271. ASSERT_TRUE(response);
  7272. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  7273. TestCompletionCallback callback3;
  7274. rv = trans.RestartWithAuth(AuthCredentials(kFoo2, kBar2),
  7275. callback3.callback());
  7276. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7277. rv = callback3.WaitForResult();
  7278. EXPECT_THAT(rv, IsOk());
  7279. response = trans.GetResponseInfo();
  7280. EXPECT_FALSE(response->auth_challenge.has_value());
  7281. EXPECT_EQ(100, response->headers->GetContentLength());
  7282. }
  7283. // For the NTLM implementation using SSPI, we skip the NTLM tests since we
  7284. // can't hook into its internals to cause it to generate predictable NTLM
  7285. // authorization headers.
  7286. #if defined(NTLM_PORTABLE)
  7287. // The NTLM authentication unit tests are based on known test data from the
  7288. // [MS-NLMP] Specification [1]. These tests are primarily of the authentication
  7289. // flow rather than the implementation of the NTLM protocol. See net/ntlm
  7290. // for the implementation and testing of the protocol.
  7291. //
  7292. // [1] https://msdn.microsoft.com/en-us/library/cc236621.aspx
  7293. // Enter the correct password and authenticate successfully.
  7294. TEST_F(HttpNetworkTransactionTest, NTLMAuthV2) {
  7295. HttpRequestInfo request;
  7296. request.method = "GET";
  7297. request.url = GURL("https://server/kids/login.aspx");
  7298. request.traffic_annotation =
  7299. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  7300. // Ensure load is not disrupted by flags which suppress behaviour specific
  7301. // to other auth schemes.
  7302. request.load_flags = LOAD_DO_NOT_USE_EMBEDDED_IDENTITY;
  7303. HttpAuthNtlmMechanism::ScopedProcSetter proc_setter(
  7304. MockGetMSTime, MockGenerateRandom, MockGetHostName);
  7305. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  7306. // Generate the NTLM messages based on known test data.
  7307. std::string negotiate_msg;
  7308. std::string challenge_msg;
  7309. std::string authenticate_msg;
  7310. base::Base64Encode(
  7311. base::StringPiece(
  7312. reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg),
  7313. std::size(ntlm::test::kExpectedNegotiateMsg)),
  7314. &negotiate_msg);
  7315. base::Base64Encode(
  7316. base::StringPiece(
  7317. reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2),
  7318. std::size(ntlm::test::kChallengeMsgFromSpecV2)),
  7319. &challenge_msg);
  7320. base::Base64Encode(
  7321. base::StringPiece(
  7322. reinterpret_cast<const char*>(
  7323. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2),
  7324. std::size(
  7325. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)),
  7326. &authenticate_msg);
  7327. MockWrite data_writes1[] = {
  7328. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7329. "Host: server\r\n"
  7330. "Connection: keep-alive\r\n\r\n"),
  7331. };
  7332. MockRead data_reads1[] = {
  7333. MockRead("HTTP/1.1 401 Access Denied\r\n"),
  7334. // Negotiate and NTLM are often requested together. However, we only want
  7335. // to test NTLM. Since Negotiate is preferred over NTLM, we have to skip
  7336. // the header that requests Negotiate for this test.
  7337. MockRead("WWW-Authenticate: NTLM\r\n"),
  7338. MockRead("Connection: close\r\n"),
  7339. MockRead("Content-Length: 42\r\n"),
  7340. MockRead("Content-Type: text/html\r\n\r\n"),
  7341. // Missing content -- won't matter, as connection will be reset.
  7342. };
  7343. MockWrite data_writes2[] = {
  7344. // After restarting with a null identity, this is the
  7345. // request we should be issuing -- the final header line contains a Type
  7346. // 1 message.
  7347. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7348. "Host: server\r\n"
  7349. "Connection: keep-alive\r\n"
  7350. "Authorization: NTLM "),
  7351. MockWrite(negotiate_msg.c_str()), MockWrite("\r\n\r\n"),
  7352. // After calling trans.RestartWithAuth(), we should send a Type 3 message
  7353. // (using correct credentials). The second request continues on the
  7354. // same connection.
  7355. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7356. "Host: server\r\n"
  7357. "Connection: keep-alive\r\n"
  7358. "Authorization: NTLM "),
  7359. MockWrite(authenticate_msg.c_str()), MockWrite("\r\n\r\n"),
  7360. };
  7361. MockRead data_reads2[] = {
  7362. // The origin server responds with a Type 2 message.
  7363. MockRead("HTTP/1.1 401 Access Denied\r\n"),
  7364. MockRead("WWW-Authenticate: NTLM "), MockRead(challenge_msg.c_str()),
  7365. MockRead("\r\n"), MockRead("Content-Length: 42\r\n"),
  7366. MockRead("Content-Type: text/html\r\n\r\n"),
  7367. MockRead("You are not authorized to view this page\r\n"),
  7368. // Lastly we get the desired content.
  7369. MockRead("HTTP/1.1 200 OK\r\n"),
  7370. MockRead("Content-Type: text/html; charset=utf-8\r\n"),
  7371. MockRead("Content-Length: 14\r\n\r\n"), MockRead("Please Login\r\n"),
  7372. };
  7373. StaticSocketDataProvider data1(data_reads1, data_writes1);
  7374. StaticSocketDataProvider data2(data_reads2, data_writes2);
  7375. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  7376. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  7377. SSLSocketDataProvider ssl1(ASYNC, OK);
  7378. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  7379. SSLSocketDataProvider ssl2(ASYNC, OK);
  7380. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  7381. TestCompletionCallback callback1;
  7382. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  7383. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  7384. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7385. rv = callback1.WaitForResult();
  7386. EXPECT_THAT(rv, IsOk());
  7387. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  7388. const HttpResponseInfo* response = trans.GetResponseInfo();
  7389. ASSERT_TRUE(response);
  7390. EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge));
  7391. TestCompletionCallback callback2;
  7392. rv = trans.RestartWithAuth(
  7393. AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword),
  7394. callback2.callback());
  7395. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7396. rv = callback2.WaitForResult();
  7397. EXPECT_THAT(rv, IsOk());
  7398. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  7399. response = trans.GetResponseInfo();
  7400. ASSERT_TRUE(response);
  7401. EXPECT_FALSE(response->auth_challenge.has_value());
  7402. TestCompletionCallback callback3;
  7403. rv = trans.RestartWithAuth(AuthCredentials(), callback3.callback());
  7404. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7405. rv = callback3.WaitForResult();
  7406. EXPECT_THAT(rv, IsOk());
  7407. response = trans.GetResponseInfo();
  7408. ASSERT_TRUE(response);
  7409. EXPECT_FALSE(response->auth_challenge.has_value());
  7410. EXPECT_EQ(14, response->headers->GetContentLength());
  7411. std::string response_data;
  7412. rv = ReadTransaction(&trans, &response_data);
  7413. EXPECT_THAT(rv, IsOk());
  7414. EXPECT_EQ("Please Login\r\n", response_data);
  7415. EXPECT_TRUE(data1.AllReadDataConsumed());
  7416. EXPECT_TRUE(data1.AllWriteDataConsumed());
  7417. EXPECT_TRUE(data2.AllReadDataConsumed());
  7418. EXPECT_TRUE(data2.AllWriteDataConsumed());
  7419. }
  7420. // Enter a wrong password, and then the correct one.
  7421. TEST_F(HttpNetworkTransactionTest, NTLMAuthV2WrongThenRightPassword) {
  7422. HttpRequestInfo request;
  7423. request.method = "GET";
  7424. request.url = GURL("https://server/kids/login.aspx");
  7425. request.traffic_annotation =
  7426. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  7427. HttpAuthNtlmMechanism::ScopedProcSetter proc_setter(
  7428. MockGetMSTime, MockGenerateRandom, MockGetHostName);
  7429. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  7430. // Generate the NTLM messages based on known test data.
  7431. std::string negotiate_msg;
  7432. std::string challenge_msg;
  7433. std::string authenticate_msg;
  7434. base::Base64Encode(
  7435. base::StringPiece(
  7436. reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg),
  7437. std::size(ntlm::test::kExpectedNegotiateMsg)),
  7438. &negotiate_msg);
  7439. base::Base64Encode(
  7440. base::StringPiece(
  7441. reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2),
  7442. std::size(ntlm::test::kChallengeMsgFromSpecV2)),
  7443. &challenge_msg);
  7444. base::Base64Encode(
  7445. base::StringPiece(
  7446. reinterpret_cast<const char*>(
  7447. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2),
  7448. std::size(
  7449. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)),
  7450. &authenticate_msg);
  7451. // The authenticate message when |kWrongPassword| is sent.
  7452. std::string wrong_password_authenticate_msg(
  7453. "TlRMTVNTUAADAAAAGAAYAFgAAACKAIoAcAAAAAwADAD6AAAACAAIAAYBAAAQABAADgEAAAAA"
  7454. "AABYAAAAA4IIAAAAAAAAAAAAAPknEYqtJQtusopDRSfYzAAAAAAAAAAAAAAAAAAAAAAAAAAA"
  7455. "AAAAAOtVz38osnFdRRggUQHUJ3EBAQAAAAAAAIALyP0A1NIBqqqqqqqqqqoAAAAAAgAMAEQA"
  7456. "bwBtAGEAaQBuAAEADABTAGUAcgB2AGUAcgAGAAQAAgAAAAoAEAAAAAAAAAAAAAAAAAAAAAAA"
  7457. "CQAWAEgAVABUAFAALwBzAGUAcgB2AGUAcgAAAAAAAAAAAEQAbwBtAGEAaQBuAFUAcwBlAHIA"
  7458. "QwBPAE0AUABVAFQARQBSAA==");
  7459. // Sanity check that it's the same length as the correct authenticate message
  7460. // and that it's different.
  7461. ASSERT_EQ(authenticate_msg.length(),
  7462. wrong_password_authenticate_msg.length());
  7463. ASSERT_NE(authenticate_msg, wrong_password_authenticate_msg);
  7464. MockWrite data_writes1[] = {
  7465. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7466. "Host: server\r\n"
  7467. "Connection: keep-alive\r\n\r\n"),
  7468. };
  7469. MockRead data_reads1[] = {
  7470. MockRead("HTTP/1.1 401 Access Denied\r\n"),
  7471. // Negotiate and NTLM are often requested together. However, we only want
  7472. // to test NTLM. Since Negotiate is preferred over NTLM, we have to skip
  7473. // the header that requests Negotiate for this test.
  7474. MockRead("WWW-Authenticate: NTLM\r\n"),
  7475. MockRead("Connection: close\r\n"),
  7476. MockRead("Content-Length: 42\r\n"),
  7477. MockRead("Content-Type: text/html\r\n\r\n"),
  7478. // Missing content -- won't matter, as connection will be reset.
  7479. };
  7480. MockWrite data_writes2[] = {
  7481. // After restarting with a null identity, this is the
  7482. // request we should be issuing -- the final header line contains a Type
  7483. // 1 message.
  7484. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7485. "Host: server\r\n"
  7486. "Connection: keep-alive\r\n"
  7487. "Authorization: NTLM "),
  7488. MockWrite(negotiate_msg.c_str()), MockWrite("\r\n\r\n"),
  7489. // After calling trans.RestartWithAuth(), we should send a Type 3 message
  7490. // (using incorrect credentials). The second request continues on the
  7491. // same connection.
  7492. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7493. "Host: server\r\n"
  7494. "Connection: keep-alive\r\n"
  7495. "Authorization: NTLM "),
  7496. MockWrite(wrong_password_authenticate_msg.c_str()), MockWrite("\r\n\r\n"),
  7497. };
  7498. MockRead data_reads2[] = {
  7499. // The origin server responds with a Type 2 message.
  7500. MockRead("HTTP/1.1 401 Access Denied\r\n"),
  7501. MockRead("WWW-Authenticate: NTLM "), MockRead(challenge_msg.c_str()),
  7502. MockRead("\r\n"), MockRead("Content-Length: 42\r\n"),
  7503. MockRead("Content-Type: text/html\r\n\r\n"),
  7504. MockRead("You are not authorized to view this page\r\n"),
  7505. // Wrong password.
  7506. MockRead("HTTP/1.1 401 Access Denied\r\n"),
  7507. MockRead("WWW-Authenticate: NTLM\r\n"), MockRead("Connection: close\r\n"),
  7508. MockRead("Content-Length: 42\r\n"),
  7509. MockRead("Content-Type: text/html\r\n\r\n"),
  7510. // Missing content -- won't matter, as connection will be reset.
  7511. };
  7512. MockWrite data_writes3[] = {
  7513. // After restarting with a null identity, this is the
  7514. // request we should be issuing -- the final header line contains a Type
  7515. // 1 message.
  7516. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7517. "Host: server\r\n"
  7518. "Connection: keep-alive\r\n"
  7519. "Authorization: NTLM "),
  7520. MockWrite(negotiate_msg.c_str()), MockWrite("\r\n\r\n"),
  7521. // After calling trans.RestartWithAuth(), we should send a Type 3 message
  7522. // (the credentials for the origin server). The second request continues
  7523. // on the same connection.
  7524. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7525. "Host: server\r\n"
  7526. "Connection: keep-alive\r\n"
  7527. "Authorization: NTLM "),
  7528. MockWrite(authenticate_msg.c_str()), MockWrite("\r\n\r\n"),
  7529. };
  7530. MockRead data_reads3[] = {
  7531. // The origin server responds with a Type 2 message.
  7532. MockRead("HTTP/1.1 401 Access Denied\r\n"),
  7533. MockRead("WWW-Authenticate: NTLM "), MockRead(challenge_msg.c_str()),
  7534. MockRead("\r\n"), MockRead("Content-Length: 42\r\n"),
  7535. MockRead("Content-Type: text/html\r\n\r\n"),
  7536. MockRead("You are not authorized to view this page\r\n"),
  7537. // Lastly we get the desired content.
  7538. MockRead("HTTP/1.1 200 OK\r\n"),
  7539. MockRead("Content-Type: text/html; charset=utf-8\r\n"),
  7540. MockRead("Content-Length: 14\r\n\r\n"), MockRead("Please Login\r\n"),
  7541. };
  7542. StaticSocketDataProvider data1(data_reads1, data_writes1);
  7543. StaticSocketDataProvider data2(data_reads2, data_writes2);
  7544. StaticSocketDataProvider data3(data_reads3, data_writes3);
  7545. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  7546. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  7547. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  7548. SSLSocketDataProvider ssl1(ASYNC, OK);
  7549. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  7550. SSLSocketDataProvider ssl2(ASYNC, OK);
  7551. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  7552. SSLSocketDataProvider ssl3(ASYNC, OK);
  7553. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3);
  7554. TestCompletionCallback callback1;
  7555. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  7556. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  7557. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7558. rv = callback1.WaitForResult();
  7559. EXPECT_THAT(rv, IsOk());
  7560. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  7561. const HttpResponseInfo* response = trans.GetResponseInfo();
  7562. ASSERT_TRUE(response);
  7563. EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge));
  7564. TestCompletionCallback callback2;
  7565. // Enter the wrong password.
  7566. rv = trans.RestartWithAuth(
  7567. AuthCredentials(ntlm::test::kDomainUserCombined, kWrongPassword),
  7568. callback2.callback());
  7569. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7570. rv = callback2.WaitForResult();
  7571. EXPECT_THAT(rv, IsOk());
  7572. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  7573. TestCompletionCallback callback3;
  7574. rv = trans.RestartWithAuth(AuthCredentials(), callback3.callback());
  7575. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7576. rv = callback3.WaitForResult();
  7577. EXPECT_THAT(rv, IsOk());
  7578. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  7579. response = trans.GetResponseInfo();
  7580. ASSERT_TRUE(response);
  7581. EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge));
  7582. TestCompletionCallback callback4;
  7583. // Now enter the right password.
  7584. rv = trans.RestartWithAuth(
  7585. AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword),
  7586. callback4.callback());
  7587. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7588. rv = callback4.WaitForResult();
  7589. EXPECT_THAT(rv, IsOk());
  7590. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  7591. TestCompletionCallback callback5;
  7592. // One more roundtrip
  7593. rv = trans.RestartWithAuth(AuthCredentials(), callback5.callback());
  7594. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7595. rv = callback5.WaitForResult();
  7596. EXPECT_THAT(rv, IsOk());
  7597. response = trans.GetResponseInfo();
  7598. EXPECT_FALSE(response->auth_challenge.has_value());
  7599. EXPECT_EQ(14, response->headers->GetContentLength());
  7600. std::string response_data;
  7601. rv = ReadTransaction(&trans, &response_data);
  7602. EXPECT_THAT(rv, IsOk());
  7603. EXPECT_EQ("Please Login\r\n", response_data);
  7604. EXPECT_TRUE(data1.AllReadDataConsumed());
  7605. EXPECT_TRUE(data1.AllWriteDataConsumed());
  7606. EXPECT_TRUE(data2.AllReadDataConsumed());
  7607. EXPECT_TRUE(data2.AllWriteDataConsumed());
  7608. EXPECT_TRUE(data3.AllReadDataConsumed());
  7609. EXPECT_TRUE(data3.AllWriteDataConsumed());
  7610. }
  7611. // Server requests NTLM authentication, which is not supported over HTTP/2.
  7612. // Subsequent request with authorization header should be sent over HTTP/1.1.
  7613. TEST_F(HttpNetworkTransactionTest, NTLMOverHttp2) {
  7614. HttpAuthNtlmMechanism::ScopedProcSetter proc_setter(
  7615. MockGetMSTime, MockGenerateRandom, MockGetHostName);
  7616. const char* kUrl = "https://server/kids/login.aspx";
  7617. HttpRequestInfo request;
  7618. request.method = "GET";
  7619. request.url = GURL(kUrl);
  7620. request.traffic_annotation =
  7621. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  7622. // First request without credentials.
  7623. spdy::Http2HeaderBlock request_headers0(
  7624. spdy_util_.ConstructGetHeaderBlock(kUrl));
  7625. spdy::SpdySerializedFrame request0(spdy_util_.ConstructSpdyHeaders(
  7626. 1, std::move(request_headers0), LOWEST, true));
  7627. spdy::Http2HeaderBlock response_headers0;
  7628. response_headers0[spdy::kHttp2StatusHeader] = "401";
  7629. response_headers0["www-authenticate"] = "NTLM";
  7630. spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyResponseHeaders(
  7631. 1, std::move(response_headers0), true));
  7632. // Stream 1 is closed.
  7633. spdy_util_.UpdateWithStreamDestruction(1);
  7634. // Generate the NTLM messages based on known test data.
  7635. std::string negotiate_msg;
  7636. std::string challenge_msg;
  7637. std::string authenticate_msg;
  7638. base::Base64Encode(
  7639. base::StringPiece(
  7640. reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg),
  7641. std::size(ntlm::test::kExpectedNegotiateMsg)),
  7642. &negotiate_msg);
  7643. base::Base64Encode(
  7644. base::StringPiece(
  7645. reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2),
  7646. std::size(ntlm::test::kChallengeMsgFromSpecV2)),
  7647. &challenge_msg);
  7648. base::Base64Encode(
  7649. base::StringPiece(
  7650. reinterpret_cast<const char*>(
  7651. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2),
  7652. std::size(
  7653. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)),
  7654. &authenticate_msg);
  7655. MockWrite writes0[] = {CreateMockWrite(request0, 0)};
  7656. MockRead reads0[] = {CreateMockRead(resp, 1),
  7657. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 2)};
  7658. // Retry yet again using HTTP/1.1.
  7659. MockWrite writes1[] = {
  7660. // After restarting with a null identity, this is the
  7661. // request we should be issuing -- the final header line contains a Type
  7662. // 1 message.
  7663. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7664. "Host: server\r\n"
  7665. "Connection: keep-alive\r\n"
  7666. "Authorization: NTLM "),
  7667. MockWrite(negotiate_msg.c_str()), MockWrite("\r\n\r\n"),
  7668. // After calling trans.RestartWithAuth(), we should send a Type 3 message
  7669. // (the credentials for the origin server). The second request continues
  7670. // on the same connection.
  7671. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n"
  7672. "Host: server\r\n"
  7673. "Connection: keep-alive\r\n"
  7674. "Authorization: NTLM "),
  7675. MockWrite(authenticate_msg.c_str()), MockWrite("\r\n\r\n"),
  7676. };
  7677. MockRead reads1[] = {
  7678. // The origin server responds with a Type 2 message.
  7679. MockRead("HTTP/1.1 401 Access Denied\r\n"),
  7680. MockRead("WWW-Authenticate: NTLM "), MockRead(challenge_msg.c_str()),
  7681. MockRead("\r\n"), MockRead("Content-Length: 42\r\n"),
  7682. MockRead("Content-Type: text/html\r\n\r\n"),
  7683. MockRead("You are not authorized to view this page\r\n"),
  7684. // Lastly we get the desired content.
  7685. MockRead("HTTP/1.1 200 OK\r\n"),
  7686. MockRead("Content-Type: text/html; charset=utf-8\r\n"),
  7687. MockRead("Content-Length: 14\r\n\r\n"), MockRead("Please Login\r\n"),
  7688. };
  7689. SequencedSocketData data0(reads0, writes0);
  7690. StaticSocketDataProvider data1(reads1, writes1);
  7691. session_deps_.socket_factory->AddSocketDataProvider(&data0);
  7692. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  7693. SSLSocketDataProvider ssl0(ASYNC, OK);
  7694. ssl0.next_proto = kProtoHTTP2;
  7695. ssl0.next_protos_expected_in_ssl_config =
  7696. NextProtoVector{kProtoHTTP2, kProtoHTTP11};
  7697. SSLSocketDataProvider ssl1(ASYNC, OK);
  7698. // When creating the second connection, only HTTP/1.1 should be allowed.
  7699. ssl1.next_protos_expected_in_ssl_config = NextProtoVector{kProtoHTTP11};
  7700. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl0);
  7701. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  7702. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  7703. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  7704. TestCompletionCallback callback1;
  7705. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  7706. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7707. rv = callback1.WaitForResult();
  7708. EXPECT_THAT(rv, IsOk());
  7709. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  7710. const HttpResponseInfo* response = trans.GetResponseInfo();
  7711. ASSERT_TRUE(response);
  7712. EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge));
  7713. TestCompletionCallback callback2;
  7714. rv = trans.RestartWithAuth(
  7715. AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword),
  7716. callback2.callback());
  7717. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7718. rv = callback2.WaitForResult();
  7719. EXPECT_THAT(rv, IsOk());
  7720. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  7721. response = trans.GetResponseInfo();
  7722. ASSERT_TRUE(response);
  7723. EXPECT_FALSE(response->auth_challenge.has_value());
  7724. TestCompletionCallback callback3;
  7725. rv = trans.RestartWithAuth(AuthCredentials(), callback3.callback());
  7726. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  7727. rv = callback3.WaitForResult();
  7728. EXPECT_THAT(rv, IsOk());
  7729. response = trans.GetResponseInfo();
  7730. ASSERT_TRUE(response);
  7731. EXPECT_FALSE(response->auth_challenge.has_value());
  7732. EXPECT_EQ(14, response->headers->GetContentLength());
  7733. std::string response_data;
  7734. rv = ReadTransaction(&trans, &response_data);
  7735. EXPECT_THAT(rv, IsOk());
  7736. EXPECT_EQ("Please Login\r\n", response_data);
  7737. EXPECT_TRUE(data0.AllReadDataConsumed());
  7738. EXPECT_TRUE(data0.AllWriteDataConsumed());
  7739. EXPECT_TRUE(data1.AllReadDataConsumed());
  7740. EXPECT_TRUE(data1.AllWriteDataConsumed());
  7741. }
  7742. #if BUILDFLAG(ENABLE_WEBSOCKETS)
  7743. // Variant of above test using WebSockets.
  7744. TEST_F(HttpNetworkTransactionTest, NTLMOverHttp2WithWebsockets) {
  7745. const GURL kInitialUrl("https://server/");
  7746. const GURL kWebSocketUrl("wss://server/");
  7747. HttpAuthNtlmMechanism::ScopedProcSetter proc_setter(
  7748. MockGetMSTime, MockGenerateRandom, MockGetHostName);
  7749. // Initial request establishes an H2 connection, which will then be reused for
  7750. // WebSockets. This is needed since WebSockets will reuse H2 connections, but
  7751. // it won't create a new one.
  7752. spdy::Http2HeaderBlock initial_request_headers(
  7753. spdy_util_.ConstructGetHeaderBlock(kInitialUrl.spec()));
  7754. spdy::SpdySerializedFrame initial_request(spdy_util_.ConstructSpdyHeaders(
  7755. 1, std::move(initial_request_headers), DEFAULT_PRIORITY, true));
  7756. spdy::SpdySerializedFrame settings_ack(spdy_util_.ConstructSpdySettingsAck());
  7757. // Settings frame, indicating WebSockets is supported.
  7758. spdy::SettingsMap settings;
  7759. settings[spdy::SETTINGS_ENABLE_CONNECT_PROTOCOL] = 1;
  7760. spdy::SpdySerializedFrame settings_frame(
  7761. spdy_util_.ConstructSpdySettings(settings));
  7762. // Response headers for first request. Body is never received, but that
  7763. // shouldn't matter for the purposes of this test.
  7764. spdy::SpdySerializedFrame initial_response(
  7765. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  7766. // First WebSocket request, which has no credentials.
  7767. spdy::Http2HeaderBlock websocket_request_headers;
  7768. websocket_request_headers[spdy::kHttp2MethodHeader] = "CONNECT";
  7769. websocket_request_headers[spdy::kHttp2AuthorityHeader] = "server";
  7770. websocket_request_headers[spdy::kHttp2SchemeHeader] = "https";
  7771. websocket_request_headers[spdy::kHttp2PathHeader] = "/";
  7772. websocket_request_headers[spdy::kHttp2ProtocolHeader] = "websocket";
  7773. websocket_request_headers["origin"] = "http://server";
  7774. websocket_request_headers["sec-websocket-version"] = "13";
  7775. websocket_request_headers["sec-websocket-extensions"] =
  7776. "permessage-deflate; client_max_window_bits";
  7777. spdy::SpdySerializedFrame websocket_request(spdy_util_.ConstructSpdyHeaders(
  7778. 3, std::move(websocket_request_headers), MEDIUM, false));
  7779. // Auth challenge to WebSocket request.
  7780. spdy::Http2HeaderBlock auth_challenge_headers;
  7781. auth_challenge_headers[spdy::kHttp2StatusHeader] = "401";
  7782. auth_challenge_headers["www-authenticate"] = "NTLM";
  7783. spdy::SpdySerializedFrame websocket_auth_challenge(
  7784. spdy_util_.ConstructSpdyResponseHeaders(
  7785. 3, std::move(auth_challenge_headers), true));
  7786. MockWrite writes0[] = {CreateMockWrite(initial_request, 0),
  7787. CreateMockWrite(settings_ack, 2),
  7788. CreateMockWrite(websocket_request, 4),
  7789. MockWrite(SYNCHRONOUS, ERR_IO_PENDING, 7)};
  7790. MockRead reads0[] = {CreateMockRead(settings_frame, 1),
  7791. CreateMockRead(initial_response, 3),
  7792. CreateMockRead(websocket_auth_challenge, 5),
  7793. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6)};
  7794. // Generate the NTLM messages based on known test data.
  7795. std::string negotiate_msg;
  7796. std::string challenge_msg;
  7797. std::string authenticate_msg;
  7798. base::Base64Encode(
  7799. base::StringPiece(
  7800. reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg),
  7801. std::size(ntlm::test::kExpectedNegotiateMsg)),
  7802. &negotiate_msg);
  7803. base::Base64Encode(
  7804. base::StringPiece(
  7805. reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2),
  7806. std::size(ntlm::test::kChallengeMsgFromSpecV2)),
  7807. &challenge_msg);
  7808. base::Base64Encode(
  7809. base::StringPiece(
  7810. reinterpret_cast<const char*>(
  7811. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2),
  7812. std::size(
  7813. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)),
  7814. &authenticate_msg);
  7815. // Retry yet again using HTTP/1.1.
  7816. MockWrite writes1[] = {
  7817. // After restarting with a null identity, this is the
  7818. // request we should be issuing -- the final header line contains a Type
  7819. // 1 message.
  7820. MockWrite("GET / HTTP/1.1\r\n"
  7821. "Host: server\r\n"
  7822. "Connection: Upgrade\r\n"
  7823. "Authorization: NTLM "),
  7824. MockWrite(negotiate_msg.c_str()),
  7825. MockWrite("\r\n"),
  7826. MockWrite("Origin: http://server\r\n"
  7827. "Sec-WebSocket-Version: 13\r\n"
  7828. "Upgrade: websocket\r\n"
  7829. "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
  7830. "Sec-WebSocket-Extensions: permessage-deflate; "
  7831. "client_max_window_bits\r\n\r\n"),
  7832. // After calling trans.RestartWithAuth(), we should send a Type 3 message
  7833. // (the credentials for the origin server). The second request continues
  7834. // on the same connection.
  7835. MockWrite("GET / HTTP/1.1\r\n"
  7836. "Host: server\r\n"
  7837. "Connection: Upgrade\r\n"
  7838. "Authorization: NTLM "),
  7839. MockWrite(authenticate_msg.c_str()),
  7840. MockWrite("\r\n"),
  7841. MockWrite("Origin: http://server\r\n"
  7842. "Sec-WebSocket-Version: 13\r\n"
  7843. "Upgrade: websocket\r\n"
  7844. "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
  7845. "Sec-WebSocket-Extensions: permessage-deflate; "
  7846. "client_max_window_bits\r\n\r\n"),
  7847. };
  7848. MockRead reads1[] = {
  7849. // The origin server responds with a Type 2 message.
  7850. MockRead("HTTP/1.1 401 Access Denied\r\n"),
  7851. MockRead("WWW-Authenticate: NTLM "),
  7852. MockRead(challenge_msg.c_str()),
  7853. MockRead("\r\n"),
  7854. MockRead("Content-Length: 42\r\n"),
  7855. MockRead("Content-Type: text/html\r\n\r\n"),
  7856. MockRead("You are not authorized to view this page\r\n"),
  7857. // Lastly we get the desired content.
  7858. MockRead("HTTP/1.1 101 Switching Protocols\r\n"
  7859. "Upgrade: websocket\r\n"
  7860. "Connection: Upgrade\r\n"
  7861. "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n"),
  7862. };
  7863. SequencedSocketData data0(reads0, writes0);
  7864. session_deps_.socket_factory->AddSocketDataProvider(&data0);
  7865. SSLSocketDataProvider ssl0(ASYNC, OK);
  7866. ssl0.next_proto = kProtoHTTP2;
  7867. ssl0.next_protos_expected_in_ssl_config =
  7868. NextProtoVector{kProtoHTTP2, kProtoHTTP11};
  7869. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl0);
  7870. StaticSocketDataProvider data1(reads1, writes1);
  7871. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  7872. SSLSocketDataProvider ssl1(ASYNC, OK);
  7873. // When creating the second connection, only HTTP/1.1 should be allowed.
  7874. ssl1.next_protos_expected_in_ssl_config = NextProtoVector{kProtoHTTP11};
  7875. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  7876. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  7877. HttpRequestInfo initial_request_info;
  7878. initial_request_info.method = "GET";
  7879. initial_request_info.url = kInitialUrl;
  7880. initial_request_info.traffic_annotation =
  7881. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  7882. HttpNetworkTransaction initial_trans(DEFAULT_PRIORITY, session.get());
  7883. TestCompletionCallback initial_callback;
  7884. int rv = initial_trans.Start(&initial_request_info,
  7885. initial_callback.callback(), NetLogWithSource());
  7886. EXPECT_THAT(initial_callback.GetResult(rv), IsOk());
  7887. EXPECT_FALSE(session->http_server_properties()->RequiresHTTP11(
  7888. url::SchemeHostPort(kInitialUrl), NetworkIsolationKey()));
  7889. HttpRequestInfo websocket_request_info;
  7890. websocket_request_info.method = "GET";
  7891. websocket_request_info.url = kWebSocketUrl;
  7892. websocket_request_info.traffic_annotation =
  7893. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  7894. EXPECT_TRUE(HostPortPair::FromURL(initial_request_info.url)
  7895. .Equals(HostPortPair::FromURL(websocket_request_info.url)));
  7896. websocket_request_info.extra_headers.SetHeader("Origin", "http://server");
  7897. websocket_request_info.extra_headers.SetHeader("Sec-WebSocket-Version", "13");
  7898. // The following two headers must be removed by WebSocketHttp2HandshakeStream.
  7899. websocket_request_info.extra_headers.SetHeader("Connection", "Upgrade");
  7900. websocket_request_info.extra_headers.SetHeader("Upgrade", "websocket");
  7901. TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper;
  7902. HttpNetworkTransaction websocket_trans(MEDIUM, session.get());
  7903. websocket_trans.SetWebSocketHandshakeStreamCreateHelper(
  7904. &websocket_stream_create_helper);
  7905. TestCompletionCallback websocket_callback;
  7906. rv = websocket_trans.Start(&websocket_request_info,
  7907. websocket_callback.callback(), NetLogWithSource());
  7908. EXPECT_THAT(websocket_callback.GetResult(rv), IsOk());
  7909. EXPECT_FALSE(websocket_trans.IsReadyToRestartForAuth());
  7910. const HttpResponseInfo* response = websocket_trans.GetResponseInfo();
  7911. ASSERT_TRUE(response);
  7912. EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge));
  7913. rv = websocket_trans.RestartWithAuth(
  7914. AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword),
  7915. websocket_callback.callback());
  7916. EXPECT_THAT(websocket_callback.GetResult(rv), IsOk());
  7917. EXPECT_TRUE(websocket_trans.IsReadyToRestartForAuth());
  7918. response = websocket_trans.GetResponseInfo();
  7919. ASSERT_TRUE(response);
  7920. EXPECT_FALSE(response->auth_challenge.has_value());
  7921. rv = websocket_trans.RestartWithAuth(AuthCredentials(),
  7922. websocket_callback.callback());
  7923. EXPECT_THAT(websocket_callback.GetResult(rv), IsOk());
  7924. // The server should have been marked as requiring HTTP/1.1. The important
  7925. // part here is that the scheme that requires HTTP/1.1 should be HTTPS, not
  7926. // WSS.
  7927. EXPECT_TRUE(session->http_server_properties()->RequiresHTTP11(
  7928. url::SchemeHostPort(kInitialUrl), NetworkIsolationKey()));
  7929. }
  7930. #endif // BUILDFLAG(ENABLE_WEBSOCKETS)
  7931. // Test that, if we have an NTLM proxy and the origin resets the connection, we
  7932. // do no retry forever as a result of TLS retries. This is a regression test for
  7933. // https://crbug.com/823387. The version interference probe has since been
  7934. // removed, but we now have a legacy crypto fallback. (If that fallback is
  7935. // removed, this test should be kept but with the expectations tweaked, in case
  7936. // future fallbacks are added.)
  7937. TEST_F(HttpNetworkTransactionTest, NTLMProxyTLSHandshakeReset) {
  7938. // The NTLM test data expects the proxy to be named 'server'. The origin is
  7939. // https://origin/.
  7940. session_deps_.proxy_resolution_service =
  7941. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  7942. "PROXY server", TRAFFIC_ANNOTATION_FOR_TESTS);
  7943. SSLContextConfig config;
  7944. session_deps_.ssl_config_service =
  7945. std::make_unique<TestSSLConfigService>(config);
  7946. HttpRequestInfo request;
  7947. request.method = "GET";
  7948. request.url = GURL("https://origin/");
  7949. request.traffic_annotation =
  7950. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  7951. // Ensure load is not disrupted by flags which suppress behaviour specific
  7952. // to other auth schemes.
  7953. request.load_flags = LOAD_DO_NOT_USE_EMBEDDED_IDENTITY;
  7954. HttpAuthNtlmMechanism::ScopedProcSetter proc_setter(
  7955. MockGetMSTime, MockGenerateRandom, MockGetHostName);
  7956. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  7957. // Generate the NTLM messages based on known test data.
  7958. std::string negotiate_msg;
  7959. std::string challenge_msg;
  7960. std::string authenticate_msg;
  7961. base::Base64Encode(
  7962. base::StringPiece(
  7963. reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg),
  7964. std::size(ntlm::test::kExpectedNegotiateMsg)),
  7965. &negotiate_msg);
  7966. base::Base64Encode(
  7967. base::StringPiece(
  7968. reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2),
  7969. std::size(ntlm::test::kChallengeMsgFromSpecV2)),
  7970. &challenge_msg);
  7971. base::Base64Encode(
  7972. base::StringPiece(
  7973. reinterpret_cast<const char*>(
  7974. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2),
  7975. std::size(
  7976. ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)),
  7977. &authenticate_msg);
  7978. MockWrite data_writes[] = {
  7979. // The initial CONNECT request.
  7980. MockWrite("CONNECT origin:443 HTTP/1.1\r\n"
  7981. "Host: origin:443\r\n"
  7982. "Proxy-Connection: keep-alive\r\n\r\n"),
  7983. // After restarting with an identity.
  7984. MockWrite("CONNECT origin:443 HTTP/1.1\r\n"
  7985. "Host: origin:443\r\n"
  7986. "Proxy-Connection: keep-alive\r\n"
  7987. "Proxy-Authorization: NTLM "),
  7988. MockWrite(negotiate_msg.c_str()),
  7989. // End headers.
  7990. MockWrite("\r\n\r\n"),
  7991. // The second restart.
  7992. MockWrite("CONNECT origin:443 HTTP/1.1\r\n"
  7993. "Host: origin:443\r\n"
  7994. "Proxy-Connection: keep-alive\r\n"
  7995. "Proxy-Authorization: NTLM "),
  7996. MockWrite(authenticate_msg.c_str()),
  7997. // End headers.
  7998. MockWrite("\r\n\r\n"),
  7999. };
  8000. MockRead data_reads[] = {
  8001. // The initial NTLM response.
  8002. MockRead("HTTP/1.1 407 Access Denied\r\n"
  8003. "Content-Length: 0\r\n"
  8004. "Proxy-Authenticate: NTLM\r\n\r\n"),
  8005. // The NTLM challenge message.
  8006. MockRead("HTTP/1.1 407 Access Denied\r\n"
  8007. "Content-Length: 0\r\n"
  8008. "Proxy-Authenticate: NTLM "),
  8009. MockRead(challenge_msg.c_str()),
  8010. // End headers.
  8011. MockRead("\r\n\r\n"),
  8012. // Finally the tunnel is established.
  8013. MockRead("HTTP/1.1 200 Connected\r\n\r\n"),
  8014. };
  8015. StaticSocketDataProvider data(data_reads, data_writes);
  8016. SSLSocketDataProvider data_ssl(ASYNC, ERR_CONNECTION_RESET);
  8017. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8018. session_deps_.socket_factory->AddSSLSocketDataProvider(&data_ssl);
  8019. StaticSocketDataProvider data2(data_reads, data_writes);
  8020. SSLSocketDataProvider data2_ssl(ASYNC, ERR_CONNECTION_RESET);
  8021. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  8022. session_deps_.socket_factory->AddSSLSocketDataProvider(&data2_ssl);
  8023. // Start the transaction. The proxy responds with an NTLM authentication
  8024. // request.
  8025. TestCompletionCallback callback;
  8026. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8027. int rv = callback.GetResult(
  8028. trans.Start(&request, callback.callback(), NetLogWithSource()));
  8029. EXPECT_THAT(rv, IsOk());
  8030. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  8031. const HttpResponseInfo* response = trans.GetResponseInfo();
  8032. ASSERT_TRUE(response);
  8033. EXPECT_TRUE(CheckNTLMProxyAuth(response->auth_challenge));
  8034. // Configure credentials and restart. The proxy responds with the challenge
  8035. // message.
  8036. rv = callback.GetResult(trans.RestartWithAuth(
  8037. AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword),
  8038. callback.callback()));
  8039. EXPECT_THAT(rv, IsOk());
  8040. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  8041. response = trans.GetResponseInfo();
  8042. ASSERT_TRUE(response);
  8043. EXPECT_FALSE(response->auth_challenge.has_value());
  8044. // Restart once more. The tunnel will be established and the the SSL handshake
  8045. // will reset. The fallback will then kick in and restart the process. The
  8046. // proxy responds with another NTLM authentiation request, but we don't need
  8047. // to provide credentials as the cached ones work.
  8048. rv = callback.GetResult(
  8049. trans.RestartWithAuth(AuthCredentials(), callback.callback()));
  8050. EXPECT_THAT(rv, IsOk());
  8051. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  8052. response = trans.GetResponseInfo();
  8053. ASSERT_TRUE(response);
  8054. EXPECT_FALSE(response->auth_challenge.has_value());
  8055. // The proxy responds with the NTLM challenge message.
  8056. rv = callback.GetResult(
  8057. trans.RestartWithAuth(AuthCredentials(), callback.callback()));
  8058. EXPECT_THAT(rv, IsOk());
  8059. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  8060. response = trans.GetResponseInfo();
  8061. ASSERT_TRUE(response);
  8062. EXPECT_FALSE(response->auth_challenge.has_value());
  8063. // Send the NTLM authenticate message. The tunnel is established and the
  8064. // handshake resets again. We should not retry again.
  8065. rv = callback.GetResult(
  8066. trans.RestartWithAuth(AuthCredentials(), callback.callback()));
  8067. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  8068. }
  8069. #endif // NTLM_PORTABLE
  8070. // Test reading a server response which has only headers, and no body.
  8071. // After some maximum number of bytes is consumed, the transaction should
  8072. // fail with ERR_RESPONSE_HEADERS_TOO_BIG.
  8073. TEST_F(HttpNetworkTransactionTest, LargeHeadersNoBody) {
  8074. HttpRequestInfo request;
  8075. request.method = "GET";
  8076. request.url = GURL("http://www.example.org/");
  8077. request.traffic_annotation =
  8078. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8079. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8080. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8081. // Respond with 300 kb of headers (we should fail after 256 kb).
  8082. std::string large_headers_string;
  8083. FillLargeHeadersString(&large_headers_string, 300 * 1024);
  8084. MockRead data_reads[] = {
  8085. MockRead("HTTP/1.0 200 OK\r\n"),
  8086. MockRead(ASYNC, large_headers_string.data(), large_headers_string.size()),
  8087. MockRead("\r\nBODY"),
  8088. MockRead(SYNCHRONOUS, OK),
  8089. };
  8090. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  8091. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8092. TestCompletionCallback callback;
  8093. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  8094. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8095. rv = callback.WaitForResult();
  8096. EXPECT_THAT(rv, IsError(ERR_RESPONSE_HEADERS_TOO_BIG));
  8097. }
  8098. // Make sure that we don't try to reuse a TCPClientSocket when failing to
  8099. // establish tunnel.
  8100. // http://code.google.com/p/chromium/issues/detail?id=3772
  8101. TEST_F(HttpNetworkTransactionTest, DontRecycleTransportSocketForSSLTunnel) {
  8102. HttpRequestInfo request;
  8103. request.method = "GET";
  8104. request.url = GURL("https://www.example.org/");
  8105. request.traffic_annotation =
  8106. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8107. // Configure against proxy server "myproxy:70".
  8108. session_deps_.proxy_resolution_service =
  8109. ConfiguredProxyResolutionService::CreateFixedForTest(
  8110. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  8111. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8112. auto trans =
  8113. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  8114. // Since we have proxy, should try to establish tunnel.
  8115. MockWrite data_writes1[] = {
  8116. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  8117. "Host: www.example.org:443\r\n"
  8118. "Proxy-Connection: keep-alive\r\n\r\n"),
  8119. };
  8120. // The proxy responds to the connect with a 404, using a persistent
  8121. // connection. Usually a proxy would return 501 (not implemented),
  8122. // or 200 (tunnel established).
  8123. MockRead data_reads1[] = {
  8124. MockRead("HTTP/1.1 404 Not Found\r\n"),
  8125. MockRead("Content-Length: 10\r\n\r\n"),
  8126. MockRead(SYNCHRONOUS, ERR_UNEXPECTED),
  8127. };
  8128. StaticSocketDataProvider data1(data_reads1, data_writes1);
  8129. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  8130. TestCompletionCallback callback1;
  8131. int rv = trans->Start(&request, callback1.callback(), NetLogWithSource());
  8132. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8133. rv = callback1.WaitForResult();
  8134. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  8135. // Empty the current queue. This is necessary because idle sockets are
  8136. // added to the connection pool asynchronously with a PostTask.
  8137. base::RunLoop().RunUntilIdle();
  8138. // We now check to make sure the TCPClientSocket was not added back to
  8139. // the pool.
  8140. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8141. trans.reset();
  8142. base::RunLoop().RunUntilIdle();
  8143. // Make sure that the socket didn't get recycled after calling the destructor.
  8144. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8145. }
  8146. // Make sure that we recycle a socket after reading all of the response body.
  8147. TEST_F(HttpNetworkTransactionTest, RecycleSocket) {
  8148. HttpRequestInfo request;
  8149. request.method = "GET";
  8150. request.url = GURL("http://www.example.org/");
  8151. request.traffic_annotation =
  8152. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8153. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8154. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8155. MockRead data_reads[] = {
  8156. // A part of the response body is received with the response headers.
  8157. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 11\r\n\r\nhel"),
  8158. // The rest of the response body is received in two parts.
  8159. MockRead("lo"),
  8160. MockRead(" world"),
  8161. MockRead("junk"), // Should not be read!!
  8162. MockRead(SYNCHRONOUS, OK),
  8163. };
  8164. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  8165. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8166. TestCompletionCallback callback;
  8167. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  8168. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8169. rv = callback.WaitForResult();
  8170. EXPECT_THAT(rv, IsOk());
  8171. const HttpResponseInfo* response = trans.GetResponseInfo();
  8172. ASSERT_TRUE(response);
  8173. EXPECT_TRUE(response->headers);
  8174. std::string status_line = response->headers->GetStatusLine();
  8175. EXPECT_EQ("HTTP/1.1 200 OK", status_line);
  8176. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8177. std::string response_data;
  8178. rv = ReadTransaction(&trans, &response_data);
  8179. EXPECT_THAT(rv, IsOk());
  8180. EXPECT_EQ("hello world", response_data);
  8181. // Empty the current queue. This is necessary because idle sockets are
  8182. // added to the connection pool asynchronously with a PostTask.
  8183. base::RunLoop().RunUntilIdle();
  8184. // We now check to make sure the socket was added back to the pool.
  8185. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8186. }
  8187. // Make sure that we recycle a SSL socket after reading all of the response
  8188. // body.
  8189. TEST_F(HttpNetworkTransactionTest, RecycleSSLSocket) {
  8190. HttpRequestInfo request;
  8191. request.method = "GET";
  8192. request.url = GURL("https://www.example.org/");
  8193. request.traffic_annotation =
  8194. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8195. MockWrite data_writes[] = {
  8196. MockWrite(
  8197. "GET / HTTP/1.1\r\n"
  8198. "Host: www.example.org\r\n"
  8199. "Connection: keep-alive\r\n\r\n"),
  8200. };
  8201. MockRead data_reads[] = {
  8202. MockRead("HTTP/1.1 200 OK\r\n"),
  8203. MockRead("Content-Length: 11\r\n\r\n"),
  8204. MockRead("hello world"),
  8205. MockRead(SYNCHRONOUS, OK),
  8206. };
  8207. SSLSocketDataProvider ssl(ASYNC, OK);
  8208. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  8209. StaticSocketDataProvider data(data_reads, data_writes);
  8210. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8211. TestCompletionCallback callback;
  8212. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8213. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8214. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  8215. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8216. EXPECT_THAT(callback.WaitForResult(), IsOk());
  8217. const HttpResponseInfo* response = trans.GetResponseInfo();
  8218. ASSERT_TRUE(response);
  8219. ASSERT_TRUE(response->headers);
  8220. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  8221. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8222. std::string response_data;
  8223. rv = ReadTransaction(&trans, &response_data);
  8224. EXPECT_THAT(rv, IsOk());
  8225. EXPECT_EQ("hello world", response_data);
  8226. // Empty the current queue. This is necessary because idle sockets are
  8227. // added to the connection pool asynchronously with a PostTask.
  8228. base::RunLoop().RunUntilIdle();
  8229. // We now check to make sure the socket was added back to the pool.
  8230. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8231. }
  8232. // Grab a SSL socket, use it, and put it back into the pool. Then, reuse it
  8233. // from the pool and make sure that we recover okay.
  8234. TEST_F(HttpNetworkTransactionTest, RecycleDeadSSLSocket) {
  8235. HttpRequestInfo request;
  8236. request.method = "GET";
  8237. request.url = GURL("https://www.example.org/");
  8238. request.traffic_annotation =
  8239. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8240. MockWrite data_writes[] = {
  8241. MockWrite(
  8242. "GET / HTTP/1.1\r\n"
  8243. "Host: www.example.org\r\n"
  8244. "Connection: keep-alive\r\n\r\n"),
  8245. MockWrite(
  8246. "GET / HTTP/1.1\r\n"
  8247. "Host: www.example.org\r\n"
  8248. "Connection: keep-alive\r\n\r\n"),
  8249. };
  8250. MockRead data_reads[] = {
  8251. MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 11\r\n\r\n"),
  8252. MockRead("hello world"), MockRead(ASYNC, ERR_CONNECTION_CLOSED)};
  8253. SSLSocketDataProvider ssl(ASYNC, OK);
  8254. SSLSocketDataProvider ssl2(ASYNC, OK);
  8255. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  8256. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  8257. StaticSocketDataProvider data(data_reads, data_writes);
  8258. StaticSocketDataProvider data2(data_reads, data_writes);
  8259. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8260. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  8261. TestCompletionCallback callback;
  8262. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8263. auto trans =
  8264. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  8265. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  8266. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8267. EXPECT_THAT(callback.WaitForResult(), IsOk());
  8268. const HttpResponseInfo* response = trans->GetResponseInfo();
  8269. ASSERT_TRUE(response);
  8270. ASSERT_TRUE(response->headers);
  8271. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  8272. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8273. std::string response_data;
  8274. rv = ReadTransaction(trans.get(), &response_data);
  8275. EXPECT_THAT(rv, IsOk());
  8276. EXPECT_EQ("hello world", response_data);
  8277. // Empty the current queue. This is necessary because idle sockets are
  8278. // added to the connection pool asynchronously with a PostTask.
  8279. base::RunLoop().RunUntilIdle();
  8280. // We now check to make sure the socket was added back to the pool.
  8281. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8282. // Now start the second transaction, which should reuse the previous socket.
  8283. trans =
  8284. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  8285. rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  8286. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8287. EXPECT_THAT(callback.WaitForResult(), IsOk());
  8288. response = trans->GetResponseInfo();
  8289. ASSERT_TRUE(response);
  8290. ASSERT_TRUE(response->headers);
  8291. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  8292. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8293. rv = ReadTransaction(trans.get(), &response_data);
  8294. EXPECT_THAT(rv, IsOk());
  8295. EXPECT_EQ("hello world", response_data);
  8296. // Empty the current queue. This is necessary because idle sockets are
  8297. // added to the connection pool asynchronously with a PostTask.
  8298. base::RunLoop().RunUntilIdle();
  8299. // We now check to make sure the socket was added back to the pool.
  8300. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8301. }
  8302. TEST_F(HttpNetworkTransactionTest, CloseConnectionOnDestruction) {
  8303. enum class TestCase {
  8304. kReadHeaders,
  8305. kReadPartOfBodyRead,
  8306. kReadAllOfBody,
  8307. };
  8308. for (auto test_case : {TestCase::kReadHeaders, TestCase::kReadPartOfBodyRead,
  8309. TestCase::kReadAllOfBody}) {
  8310. SCOPED_TRACE(testing::Message()
  8311. << "Test case: " << static_cast<int>(test_case));
  8312. for (bool close_connection : {false, true}) {
  8313. if (test_case != TestCase::kReadAllOfBody || close_connection == false)
  8314. continue;
  8315. SCOPED_TRACE(testing::Message()
  8316. << "Close connection: " << close_connection);
  8317. HttpRequestInfo request;
  8318. request.method = "GET";
  8319. request.url = GURL("http://foo.test/");
  8320. request.traffic_annotation =
  8321. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8322. std::unique_ptr<HttpNetworkSession> session(
  8323. CreateSession(&session_deps_));
  8324. std::unique_ptr<HttpNetworkTransaction> trans =
  8325. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
  8326. session.get());
  8327. MockRead data_reads[] = {
  8328. // A part of the response body is received with the response headers.
  8329. MockRead("HTTP/1.1 200 OK\r\n"
  8330. "Content-Length: 11\r\n\r\n"
  8331. "hello world"),
  8332. MockRead(SYNCHRONOUS, OK),
  8333. };
  8334. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  8335. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8336. TestCompletionCallback callback;
  8337. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  8338. EXPECT_THAT(callback.GetResult(rv), IsOk());
  8339. const HttpResponseInfo* response = trans->GetResponseInfo();
  8340. ASSERT_TRUE(response);
  8341. EXPECT_TRUE(response->headers);
  8342. std::string status_line = response->headers->GetStatusLine();
  8343. EXPECT_EQ("HTTP/1.1 200 OK", status_line);
  8344. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8345. std::string response_data;
  8346. switch (test_case) {
  8347. case TestCase::kReadHeaders: {
  8348. // Already read the headers, nothing else to do.
  8349. break;
  8350. }
  8351. case TestCase::kReadPartOfBodyRead: {
  8352. scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(5);
  8353. rv = trans->Read(buf.get(), 5, callback.callback());
  8354. ASSERT_EQ(5, callback.GetResult(rv));
  8355. response_data.assign(buf->data(), 5);
  8356. EXPECT_EQ("hello", response_data);
  8357. break;
  8358. }
  8359. case TestCase::kReadAllOfBody: {
  8360. rv = ReadTransaction(trans.get(), &response_data);
  8361. EXPECT_THAT(rv, IsOk());
  8362. EXPECT_EQ("hello world", response_data);
  8363. break;
  8364. }
  8365. }
  8366. if (close_connection)
  8367. trans->CloseConnectionOnDestruction();
  8368. trans.reset();
  8369. // Wait for the socket to be drained and added to the socket pool or
  8370. // destroyed.
  8371. base::RunLoop().RunUntilIdle();
  8372. // In the case all the body was read, the socket will have been released
  8373. // before the CloseConnectionOnDestruction() call, so will not be
  8374. // destroyed.
  8375. if (close_connection && test_case != TestCase::kReadAllOfBody) {
  8376. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8377. } else {
  8378. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8379. }
  8380. }
  8381. }
  8382. }
  8383. // Grab a socket, use it, and put it back into the pool. Then, make
  8384. // low memory notification and ensure the socket pool is flushed.
  8385. TEST_F(HttpNetworkTransactionTest, FlushSocketPoolOnLowMemoryNotifications) {
  8386. HttpRequestInfo request;
  8387. request.method = "GET";
  8388. request.url = GURL("http://www.example.org/");
  8389. request.load_flags = 0;
  8390. request.traffic_annotation =
  8391. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8392. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8393. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8394. MockRead data_reads[] = {
  8395. // A part of the response body is received with the response headers.
  8396. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 11\r\n\r\nhel"),
  8397. // The rest of the response body is received in two parts.
  8398. MockRead("lo"), MockRead(" world"),
  8399. MockRead("junk"), // Should not be read!!
  8400. MockRead(SYNCHRONOUS, OK),
  8401. };
  8402. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  8403. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8404. TestCompletionCallback callback;
  8405. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  8406. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8407. EXPECT_THAT(callback.GetResult(rv), IsOk());
  8408. const HttpResponseInfo* response = trans.GetResponseInfo();
  8409. ASSERT_TRUE(response);
  8410. EXPECT_TRUE(response->headers);
  8411. std::string status_line = response->headers->GetStatusLine();
  8412. EXPECT_EQ("HTTP/1.1 200 OK", status_line);
  8413. // Make memory critical notification and ensure the transaction still has been
  8414. // operating right.
  8415. base::MemoryPressureListener::NotifyMemoryPressure(
  8416. base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL);
  8417. base::RunLoop().RunUntilIdle();
  8418. // Socket should not be flushed as long as it is not idle.
  8419. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8420. std::string response_data;
  8421. rv = ReadTransaction(&trans, &response_data);
  8422. EXPECT_THAT(rv, IsOk());
  8423. EXPECT_EQ("hello world", response_data);
  8424. // Empty the current queue. This is necessary because idle sockets are
  8425. // added to the connection pool asynchronously with a PostTask.
  8426. base::RunLoop().RunUntilIdle();
  8427. // We now check to make sure the socket was added back to the pool.
  8428. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8429. // Idle sockets should be flushed now.
  8430. base::MemoryPressureListener::NotifyMemoryPressure(
  8431. base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL);
  8432. base::RunLoop().RunUntilIdle();
  8433. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8434. }
  8435. // Disable idle socket closing on memory pressure.
  8436. // Grab a socket, use it, and put it back into the pool. Then, make
  8437. // low memory notification and ensure the socket pool is NOT flushed.
  8438. TEST_F(HttpNetworkTransactionTest, NoFlushSocketPoolOnLowMemoryNotifications) {
  8439. HttpRequestInfo request;
  8440. request.method = "GET";
  8441. request.url = GURL("http://www.example.org/");
  8442. request.load_flags = 0;
  8443. request.traffic_annotation =
  8444. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8445. // Disable idle socket closing on memory pressure.
  8446. session_deps_.disable_idle_sockets_close_on_memory_pressure = true;
  8447. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8448. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8449. MockRead data_reads[] = {
  8450. // A part of the response body is received with the response headers.
  8451. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 11\r\n\r\nhel"),
  8452. // The rest of the response body is received in two parts.
  8453. MockRead("lo"), MockRead(" world"),
  8454. MockRead("junk"), // Should not be read!!
  8455. MockRead(SYNCHRONOUS, OK),
  8456. };
  8457. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  8458. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8459. TestCompletionCallback callback;
  8460. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  8461. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8462. EXPECT_THAT(callback.GetResult(rv), IsOk());
  8463. const HttpResponseInfo* response = trans.GetResponseInfo();
  8464. ASSERT_TRUE(response);
  8465. EXPECT_TRUE(response->headers);
  8466. std::string status_line = response->headers->GetStatusLine();
  8467. EXPECT_EQ("HTTP/1.1 200 OK", status_line);
  8468. // Make memory critical notification and ensure the transaction still has been
  8469. // operating right.
  8470. base::MemoryPressureListener::NotifyMemoryPressure(
  8471. base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL);
  8472. base::RunLoop().RunUntilIdle();
  8473. // Socket should not be flushed as long as it is not idle.
  8474. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8475. std::string response_data;
  8476. rv = ReadTransaction(&trans, &response_data);
  8477. EXPECT_THAT(rv, IsOk());
  8478. EXPECT_EQ("hello world", response_data);
  8479. // Empty the current queue. This is necessary because idle sockets are
  8480. // added to the connection pool asynchronously with a PostTask.
  8481. base::RunLoop().RunUntilIdle();
  8482. // We now check to make sure the socket was added back to the pool.
  8483. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8484. // Idle sockets should NOT be flushed on moderate memory pressure.
  8485. base::MemoryPressureListener::NotifyMemoryPressure(
  8486. base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_MODERATE);
  8487. base::RunLoop().RunUntilIdle();
  8488. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8489. // Idle sockets should NOT be flushed on critical memory pressure.
  8490. base::MemoryPressureListener::NotifyMemoryPressure(
  8491. base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL);
  8492. base::RunLoop().RunUntilIdle();
  8493. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8494. }
  8495. // Grab an SSL socket, use it, and put it back into the pool. Then, make
  8496. // low memory notification and ensure the socket pool is flushed.
  8497. TEST_F(HttpNetworkTransactionTest, FlushSSLSocketPoolOnLowMemoryNotifications) {
  8498. HttpRequestInfo request;
  8499. request.method = "GET";
  8500. request.url = GURL("https://www.example.org/");
  8501. request.load_flags = 0;
  8502. request.traffic_annotation =
  8503. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8504. MockWrite data_writes[] = {
  8505. MockWrite("GET / HTTP/1.1\r\n"
  8506. "Host: www.example.org\r\n"
  8507. "Connection: keep-alive\r\n\r\n"),
  8508. };
  8509. MockRead data_reads[] = {
  8510. MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 11\r\n\r\n"),
  8511. MockRead("hello world"), MockRead(ASYNC, ERR_CONNECTION_CLOSED)};
  8512. SSLSocketDataProvider ssl(ASYNC, OK);
  8513. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  8514. StaticSocketDataProvider data(data_reads, data_writes);
  8515. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8516. TestCompletionCallback callback;
  8517. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8518. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8519. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8520. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  8521. EXPECT_THAT(callback.GetResult(rv), IsOk());
  8522. const HttpResponseInfo* response = trans.GetResponseInfo();
  8523. ASSERT_TRUE(response);
  8524. ASSERT_TRUE(response->headers);
  8525. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  8526. // Make memory critical notification and ensure the transaction still has been
  8527. // operating right.
  8528. base::MemoryPressureListener::NotifyMemoryPressure(
  8529. base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL);
  8530. base::RunLoop().RunUntilIdle();
  8531. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8532. std::string response_data;
  8533. rv = ReadTransaction(&trans, &response_data);
  8534. EXPECT_THAT(rv, IsOk());
  8535. EXPECT_EQ("hello world", response_data);
  8536. // Empty the current queue. This is necessary because idle sockets are
  8537. // added to the connection pool asynchronously with a PostTask.
  8538. base::RunLoop().RunUntilIdle();
  8539. // We now check to make sure the socket was added back to the pool.
  8540. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8541. // Make memory notification once again and ensure idle socket is closed.
  8542. base::MemoryPressureListener::NotifyMemoryPressure(
  8543. base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL);
  8544. base::RunLoop().RunUntilIdle();
  8545. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8546. }
  8547. // Make sure that we recycle a socket after a zero-length response.
  8548. // http://crbug.com/9880
  8549. TEST_F(HttpNetworkTransactionTest, RecycleSocketAfterZeroContentLength) {
  8550. HttpRequestInfo request;
  8551. request.method = "GET";
  8552. request.url = GURL(
  8553. "http://www.example.org/csi?v=3&s=web&action=&"
  8554. "tran=undefined&ei=mAXcSeegAo-SMurloeUN&"
  8555. "e=17259,18167,19592,19773,19981,20133,20173,20233&"
  8556. "rt=prt.2642,ol.2649,xjs.2951");
  8557. request.traffic_annotation =
  8558. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8559. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8560. MockRead data_reads[] = {
  8561. MockRead("HTTP/1.1 204 No Content\r\n"
  8562. "Content-Length: 0\r\n"
  8563. "Content-Type: text/html\r\n\r\n"),
  8564. MockRead("junk"), // Should not be read!!
  8565. MockRead(SYNCHRONOUS, OK),
  8566. };
  8567. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  8568. session_deps_.socket_factory->AddSocketDataProvider(&data);
  8569. // Transaction must be created after the MockReads, so it's destroyed before
  8570. // them.
  8571. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8572. TestCompletionCallback callback;
  8573. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  8574. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8575. rv = callback.WaitForResult();
  8576. EXPECT_THAT(rv, IsOk());
  8577. const HttpResponseInfo* response = trans.GetResponseInfo();
  8578. ASSERT_TRUE(response);
  8579. EXPECT_TRUE(response->headers);
  8580. std::string status_line = response->headers->GetStatusLine();
  8581. EXPECT_EQ("HTTP/1.1 204 No Content", status_line);
  8582. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  8583. std::string response_data;
  8584. rv = ReadTransaction(&trans, &response_data);
  8585. EXPECT_THAT(rv, IsOk());
  8586. EXPECT_EQ("", response_data);
  8587. // Empty the current queue. This is necessary because idle sockets are
  8588. // added to the connection pool asynchronously with a PostTask.
  8589. base::RunLoop().RunUntilIdle();
  8590. // We now check to make sure the socket was added back to the pool.
  8591. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  8592. }
  8593. TEST_F(HttpNetworkTransactionTest, ResendRequestOnWriteBodyError) {
  8594. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  8595. element_readers.push_back(
  8596. std::make_unique<UploadBytesElementReader>("foo", 3));
  8597. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  8598. HttpRequestInfo request[2];
  8599. // Transaction 1: a GET request that succeeds. The socket is recycled
  8600. // after use.
  8601. request[0].method = "GET";
  8602. request[0].url = GURL("http://www.google.com/");
  8603. request[0].load_flags = 0;
  8604. request[0].traffic_annotation =
  8605. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8606. // Transaction 2: a POST request. Reuses the socket kept alive from
  8607. // transaction 1. The first attempts fails when writing the POST data.
  8608. // This causes the transaction to retry with a new socket. The second
  8609. // attempt succeeds.
  8610. request[1].method = "POST";
  8611. request[1].url = GURL("http://www.google.com/login.cgi");
  8612. request[1].upload_data_stream = &upload_data_stream;
  8613. request[1].load_flags = 0;
  8614. request[1].traffic_annotation =
  8615. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8616. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8617. // The first socket is used for transaction 1 and the first attempt of
  8618. // transaction 2.
  8619. // The response of transaction 1.
  8620. MockRead data_reads1[] = {
  8621. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 11\r\n\r\n"),
  8622. MockRead("hello world"),
  8623. MockRead(SYNCHRONOUS, OK),
  8624. };
  8625. // The mock write results of transaction 1 and the first attempt of
  8626. // transaction 2.
  8627. MockWrite data_writes1[] = {
  8628. MockWrite(SYNCHRONOUS, 64), // GET
  8629. MockWrite(SYNCHRONOUS, 93), // POST
  8630. MockWrite(SYNCHRONOUS, ERR_CONNECTION_ABORTED), // POST data
  8631. };
  8632. StaticSocketDataProvider data1(data_reads1, data_writes1);
  8633. // The second socket is used for the second attempt of transaction 2.
  8634. // The response of transaction 2.
  8635. MockRead data_reads2[] = {
  8636. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 7\r\n\r\n"),
  8637. MockRead("welcome"),
  8638. MockRead(SYNCHRONOUS, OK),
  8639. };
  8640. // The mock write results of the second attempt of transaction 2.
  8641. MockWrite data_writes2[] = {
  8642. MockWrite(SYNCHRONOUS, 93), // POST
  8643. MockWrite(SYNCHRONOUS, 3), // POST data
  8644. };
  8645. StaticSocketDataProvider data2(data_reads2, data_writes2);
  8646. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  8647. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  8648. const char* const kExpectedResponseData[] = {
  8649. "hello world", "welcome"
  8650. };
  8651. for (int i = 0; i < 2; ++i) {
  8652. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8653. TestCompletionCallback callback;
  8654. int rv = trans.Start(&request[i], callback.callback(), NetLogWithSource());
  8655. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8656. rv = callback.WaitForResult();
  8657. EXPECT_THAT(rv, IsOk());
  8658. const HttpResponseInfo* response = trans.GetResponseInfo();
  8659. ASSERT_TRUE(response);
  8660. EXPECT_TRUE(response->headers);
  8661. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  8662. std::string response_data;
  8663. rv = ReadTransaction(&trans, &response_data);
  8664. EXPECT_THAT(rv, IsOk());
  8665. EXPECT_EQ(kExpectedResponseData[i], response_data);
  8666. }
  8667. }
  8668. // Test the request-challenge-retry sequence for basic auth when there is
  8669. // an identity in the URL. The request should be sent as normal, but when
  8670. // it fails the identity from the URL is used to answer the challenge.
  8671. TEST_F(HttpNetworkTransactionTest, AuthIdentityInURL) {
  8672. HttpRequestInfo request;
  8673. request.method = "GET";
  8674. request.url = GURL("http://foo:b@r@www.example.org/");
  8675. request.load_flags = LOAD_NORMAL;
  8676. request.traffic_annotation =
  8677. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8678. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8679. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8680. // The password contains an escaped character -- for this test to pass it
  8681. // will need to be unescaped by HttpNetworkTransaction.
  8682. EXPECT_EQ("b%40r", request.url.password());
  8683. MockWrite data_writes1[] = {
  8684. MockWrite(
  8685. "GET / HTTP/1.1\r\n"
  8686. "Host: www.example.org\r\n"
  8687. "Connection: keep-alive\r\n\r\n"),
  8688. };
  8689. MockRead data_reads1[] = {
  8690. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  8691. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  8692. MockRead("Content-Length: 10\r\n\r\n"),
  8693. MockRead(SYNCHRONOUS, ERR_FAILED),
  8694. };
  8695. // After the challenge above, the transaction will be restarted using the
  8696. // identity from the url (foo, b@r) to answer the challenge.
  8697. MockWrite data_writes2[] = {
  8698. MockWrite(
  8699. "GET / HTTP/1.1\r\n"
  8700. "Host: www.example.org\r\n"
  8701. "Connection: keep-alive\r\n"
  8702. "Authorization: Basic Zm9vOmJAcg==\r\n\r\n"),
  8703. };
  8704. MockRead data_reads2[] = {
  8705. MockRead("HTTP/1.0 200 OK\r\n"),
  8706. MockRead("Content-Length: 100\r\n\r\n"),
  8707. MockRead(SYNCHRONOUS, OK),
  8708. };
  8709. StaticSocketDataProvider data1(data_reads1, data_writes1);
  8710. StaticSocketDataProvider data2(data_reads2, data_writes2);
  8711. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  8712. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  8713. TestCompletionCallback callback1;
  8714. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  8715. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8716. rv = callback1.WaitForResult();
  8717. EXPECT_THAT(rv, IsOk());
  8718. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  8719. TestCompletionCallback callback2;
  8720. rv = trans.RestartWithAuth(AuthCredentials(), callback2.callback());
  8721. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8722. rv = callback2.WaitForResult();
  8723. EXPECT_THAT(rv, IsOk());
  8724. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  8725. const HttpResponseInfo* response = trans.GetResponseInfo();
  8726. ASSERT_TRUE(response);
  8727. // There is no challenge info, since the identity in URL worked.
  8728. EXPECT_FALSE(response->auth_challenge.has_value());
  8729. EXPECT_EQ(100, response->headers->GetContentLength());
  8730. // Empty the current queue.
  8731. base::RunLoop().RunUntilIdle();
  8732. }
  8733. // Test the request-challenge-retry sequence for basic auth when there is an
  8734. // incorrect identity in the URL. The identity from the URL should be used only
  8735. // once.
  8736. TEST_F(HttpNetworkTransactionTest, WrongAuthIdentityInURL) {
  8737. HttpRequestInfo request;
  8738. request.method = "GET";
  8739. // Note: the URL has a username:password in it. The password "baz" is
  8740. // wrong (should be "bar").
  8741. request.url = GURL("http://foo:baz@www.example.org/");
  8742. request.load_flags = LOAD_NORMAL;
  8743. request.traffic_annotation =
  8744. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8745. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8746. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8747. MockWrite data_writes1[] = {
  8748. MockWrite(
  8749. "GET / HTTP/1.1\r\n"
  8750. "Host: www.example.org\r\n"
  8751. "Connection: keep-alive\r\n\r\n"),
  8752. };
  8753. MockRead data_reads1[] = {
  8754. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  8755. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  8756. MockRead("Content-Length: 10\r\n\r\n"),
  8757. MockRead(SYNCHRONOUS, ERR_FAILED),
  8758. };
  8759. // After the challenge above, the transaction will be restarted using the
  8760. // identity from the url (foo, baz) to answer the challenge.
  8761. MockWrite data_writes2[] = {
  8762. MockWrite(
  8763. "GET / HTTP/1.1\r\n"
  8764. "Host: www.example.org\r\n"
  8765. "Connection: keep-alive\r\n"
  8766. "Authorization: Basic Zm9vOmJheg==\r\n\r\n"),
  8767. };
  8768. MockRead data_reads2[] = {
  8769. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  8770. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  8771. MockRead("Content-Length: 10\r\n\r\n"),
  8772. MockRead(SYNCHRONOUS, ERR_FAILED),
  8773. };
  8774. // After the challenge above, the transaction will be restarted using the
  8775. // identity supplied by the user (foo, bar) to answer the challenge.
  8776. MockWrite data_writes3[] = {
  8777. MockWrite(
  8778. "GET / HTTP/1.1\r\n"
  8779. "Host: www.example.org\r\n"
  8780. "Connection: keep-alive\r\n"
  8781. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  8782. };
  8783. MockRead data_reads3[] = {
  8784. MockRead("HTTP/1.0 200 OK\r\n"),
  8785. MockRead("Content-Length: 100\r\n\r\n"),
  8786. MockRead(SYNCHRONOUS, OK),
  8787. };
  8788. StaticSocketDataProvider data1(data_reads1, data_writes1);
  8789. StaticSocketDataProvider data2(data_reads2, data_writes2);
  8790. StaticSocketDataProvider data3(data_reads3, data_writes3);
  8791. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  8792. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  8793. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  8794. TestCompletionCallback callback1;
  8795. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  8796. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8797. rv = callback1.WaitForResult();
  8798. EXPECT_THAT(rv, IsOk());
  8799. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  8800. TestCompletionCallback callback2;
  8801. rv = trans.RestartWithAuth(AuthCredentials(), callback2.callback());
  8802. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8803. rv = callback2.WaitForResult();
  8804. EXPECT_THAT(rv, IsOk());
  8805. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  8806. const HttpResponseInfo* response = trans.GetResponseInfo();
  8807. ASSERT_TRUE(response);
  8808. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  8809. TestCompletionCallback callback3;
  8810. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback3.callback());
  8811. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8812. rv = callback3.WaitForResult();
  8813. EXPECT_THAT(rv, IsOk());
  8814. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  8815. response = trans.GetResponseInfo();
  8816. ASSERT_TRUE(response);
  8817. // There is no challenge info, since the identity worked.
  8818. EXPECT_FALSE(response->auth_challenge.has_value());
  8819. EXPECT_EQ(100, response->headers->GetContentLength());
  8820. // Empty the current queue.
  8821. base::RunLoop().RunUntilIdle();
  8822. }
  8823. // Test the request-challenge-retry sequence for basic auth when there is a
  8824. // correct identity in the URL, but its use is being suppressed. The identity
  8825. // from the URL should never be used.
  8826. TEST_F(HttpNetworkTransactionTest, AuthIdentityInURLSuppressed) {
  8827. HttpRequestInfo request;
  8828. request.method = "GET";
  8829. request.url = GURL("http://foo:bar@www.example.org/");
  8830. request.load_flags = LOAD_DO_NOT_USE_EMBEDDED_IDENTITY;
  8831. request.traffic_annotation =
  8832. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8833. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8834. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8835. MockWrite data_writes1[] = {
  8836. MockWrite(
  8837. "GET / HTTP/1.1\r\n"
  8838. "Host: www.example.org\r\n"
  8839. "Connection: keep-alive\r\n\r\n"),
  8840. };
  8841. MockRead data_reads1[] = {
  8842. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  8843. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  8844. MockRead("Content-Length: 10\r\n\r\n"),
  8845. MockRead(SYNCHRONOUS, ERR_FAILED),
  8846. };
  8847. // After the challenge above, the transaction will be restarted using the
  8848. // identity supplied by the user, not the one in the URL, to answer the
  8849. // challenge.
  8850. MockWrite data_writes3[] = {
  8851. MockWrite(
  8852. "GET / HTTP/1.1\r\n"
  8853. "Host: www.example.org\r\n"
  8854. "Connection: keep-alive\r\n"
  8855. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  8856. };
  8857. MockRead data_reads3[] = {
  8858. MockRead("HTTP/1.0 200 OK\r\n"),
  8859. MockRead("Content-Length: 100\r\n\r\n"),
  8860. MockRead(SYNCHRONOUS, OK),
  8861. };
  8862. StaticSocketDataProvider data1(data_reads1, data_writes1);
  8863. StaticSocketDataProvider data3(data_reads3, data_writes3);
  8864. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  8865. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  8866. TestCompletionCallback callback1;
  8867. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  8868. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8869. rv = callback1.WaitForResult();
  8870. EXPECT_THAT(rv, IsOk());
  8871. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  8872. const HttpResponseInfo* response = trans.GetResponseInfo();
  8873. ASSERT_TRUE(response);
  8874. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  8875. TestCompletionCallback callback3;
  8876. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback3.callback());
  8877. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8878. rv = callback3.WaitForResult();
  8879. EXPECT_THAT(rv, IsOk());
  8880. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  8881. response = trans.GetResponseInfo();
  8882. ASSERT_TRUE(response);
  8883. // There is no challenge info, since the identity worked.
  8884. EXPECT_FALSE(response->auth_challenge.has_value());
  8885. EXPECT_EQ(100, response->headers->GetContentLength());
  8886. // Empty the current queue.
  8887. base::RunLoop().RunUntilIdle();
  8888. }
  8889. // Test that previously tried username/passwords for a realm get re-used.
  8890. TEST_F(HttpNetworkTransactionTest, BasicAuthCacheAndPreauth) {
  8891. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  8892. // Transaction 1: authenticate (foo, bar) on MyRealm1
  8893. {
  8894. HttpRequestInfo request;
  8895. request.method = "GET";
  8896. request.url = GURL("http://www.example.org/x/y/z");
  8897. request.traffic_annotation =
  8898. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8899. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8900. MockWrite data_writes1[] = {
  8901. MockWrite(
  8902. "GET /x/y/z HTTP/1.1\r\n"
  8903. "Host: www.example.org\r\n"
  8904. "Connection: keep-alive\r\n\r\n"),
  8905. };
  8906. MockRead data_reads1[] = {
  8907. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  8908. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  8909. MockRead("Content-Length: 10000\r\n\r\n"),
  8910. MockRead(SYNCHRONOUS, ERR_FAILED),
  8911. };
  8912. // Resend with authorization (username=foo, password=bar)
  8913. MockWrite data_writes2[] = {
  8914. MockWrite(
  8915. "GET /x/y/z HTTP/1.1\r\n"
  8916. "Host: www.example.org\r\n"
  8917. "Connection: keep-alive\r\n"
  8918. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  8919. };
  8920. // Sever accepts the authorization.
  8921. MockRead data_reads2[] = {
  8922. MockRead("HTTP/1.0 200 OK\r\n"),
  8923. MockRead("Content-Length: 100\r\n\r\n"),
  8924. MockRead(SYNCHRONOUS, OK),
  8925. };
  8926. StaticSocketDataProvider data1(data_reads1, data_writes1);
  8927. StaticSocketDataProvider data2(data_reads2, data_writes2);
  8928. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  8929. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  8930. TestCompletionCallback callback1;
  8931. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  8932. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8933. rv = callback1.WaitForResult();
  8934. EXPECT_THAT(rv, IsOk());
  8935. const HttpResponseInfo* response = trans.GetResponseInfo();
  8936. ASSERT_TRUE(response);
  8937. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  8938. TestCompletionCallback callback2;
  8939. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar),
  8940. callback2.callback());
  8941. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8942. rv = callback2.WaitForResult();
  8943. EXPECT_THAT(rv, IsOk());
  8944. response = trans.GetResponseInfo();
  8945. ASSERT_TRUE(response);
  8946. EXPECT_FALSE(response->auth_challenge.has_value());
  8947. EXPECT_EQ(100, response->headers->GetContentLength());
  8948. }
  8949. // ------------------------------------------------------------------------
  8950. // Transaction 2: authenticate (foo2, bar2) on MyRealm2
  8951. {
  8952. HttpRequestInfo request;
  8953. request.method = "GET";
  8954. // Note that Transaction 1 was at /x/y/z, so this is in the same
  8955. // protection space as MyRealm1.
  8956. request.url = GURL("http://www.example.org/x/y/a/b");
  8957. request.traffic_annotation =
  8958. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  8959. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  8960. MockWrite data_writes1[] = {
  8961. MockWrite(
  8962. "GET /x/y/a/b HTTP/1.1\r\n"
  8963. "Host: www.example.org\r\n"
  8964. "Connection: keep-alive\r\n"
  8965. // Send preemptive authorization for MyRealm1
  8966. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  8967. };
  8968. // The server didn't like the preemptive authorization, and
  8969. // challenges us for a different realm (MyRealm2).
  8970. MockRead data_reads1[] = {
  8971. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  8972. MockRead("WWW-Authenticate: Basic realm=\"MyRealm2\"\r\n"),
  8973. MockRead("Content-Length: 10000\r\n\r\n"),
  8974. MockRead(SYNCHRONOUS, ERR_FAILED),
  8975. };
  8976. // Resend with authorization for MyRealm2 (username=foo2, password=bar2)
  8977. MockWrite data_writes2[] = {
  8978. MockWrite(
  8979. "GET /x/y/a/b HTTP/1.1\r\n"
  8980. "Host: www.example.org\r\n"
  8981. "Connection: keep-alive\r\n"
  8982. "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"),
  8983. };
  8984. // Sever accepts the authorization.
  8985. MockRead data_reads2[] = {
  8986. MockRead("HTTP/1.0 200 OK\r\n"),
  8987. MockRead("Content-Length: 100\r\n\r\n"),
  8988. MockRead(SYNCHRONOUS, OK),
  8989. };
  8990. StaticSocketDataProvider data1(data_reads1, data_writes1);
  8991. StaticSocketDataProvider data2(data_reads2, data_writes2);
  8992. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  8993. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  8994. TestCompletionCallback callback1;
  8995. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  8996. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  8997. rv = callback1.WaitForResult();
  8998. EXPECT_THAT(rv, IsOk());
  8999. const HttpResponseInfo* response = trans.GetResponseInfo();
  9000. ASSERT_TRUE(response);
  9001. ASSERT_TRUE(response->auth_challenge);
  9002. EXPECT_FALSE(response->auth_challenge->is_proxy);
  9003. EXPECT_EQ("http://www.example.org",
  9004. response->auth_challenge->challenger.Serialize());
  9005. EXPECT_EQ("MyRealm2", response->auth_challenge->realm);
  9006. EXPECT_EQ(kBasicAuthScheme, response->auth_challenge->scheme);
  9007. TestCompletionCallback callback2;
  9008. rv = trans.RestartWithAuth(AuthCredentials(kFoo2, kBar2),
  9009. callback2.callback());
  9010. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9011. rv = callback2.WaitForResult();
  9012. EXPECT_THAT(rv, IsOk());
  9013. response = trans.GetResponseInfo();
  9014. ASSERT_TRUE(response);
  9015. EXPECT_FALSE(response->auth_challenge.has_value());
  9016. EXPECT_EQ(100, response->headers->GetContentLength());
  9017. }
  9018. // ------------------------------------------------------------------------
  9019. // Transaction 3: Resend a request in MyRealm's protection space --
  9020. // succeed with preemptive authorization.
  9021. {
  9022. HttpRequestInfo request;
  9023. request.method = "GET";
  9024. request.url = GURL("http://www.example.org/x/y/z2");
  9025. request.traffic_annotation =
  9026. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9027. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9028. MockWrite data_writes1[] = {
  9029. MockWrite(
  9030. "GET /x/y/z2 HTTP/1.1\r\n"
  9031. "Host: www.example.org\r\n"
  9032. "Connection: keep-alive\r\n"
  9033. // The authorization for MyRealm1 gets sent preemptively
  9034. // (since the url is in the same protection space)
  9035. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  9036. };
  9037. // Sever accepts the preemptive authorization
  9038. MockRead data_reads1[] = {
  9039. MockRead("HTTP/1.0 200 OK\r\n"),
  9040. MockRead("Content-Length: 100\r\n\r\n"),
  9041. MockRead(SYNCHRONOUS, OK),
  9042. };
  9043. StaticSocketDataProvider data1(data_reads1, data_writes1);
  9044. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  9045. TestCompletionCallback callback1;
  9046. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  9047. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9048. rv = callback1.WaitForResult();
  9049. EXPECT_THAT(rv, IsOk());
  9050. const HttpResponseInfo* response = trans.GetResponseInfo();
  9051. ASSERT_TRUE(response);
  9052. EXPECT_FALSE(response->auth_challenge.has_value());
  9053. EXPECT_EQ(100, response->headers->GetContentLength());
  9054. }
  9055. // ------------------------------------------------------------------------
  9056. // Transaction 4: request another URL in MyRealm (however the
  9057. // url is not known to belong to the protection space, so no pre-auth).
  9058. {
  9059. HttpRequestInfo request;
  9060. request.method = "GET";
  9061. request.url = GURL("http://www.example.org/x/1");
  9062. request.traffic_annotation =
  9063. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9064. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9065. MockWrite data_writes1[] = {
  9066. MockWrite(
  9067. "GET /x/1 HTTP/1.1\r\n"
  9068. "Host: www.example.org\r\n"
  9069. "Connection: keep-alive\r\n\r\n"),
  9070. };
  9071. MockRead data_reads1[] = {
  9072. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  9073. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  9074. MockRead("Content-Length: 10000\r\n\r\n"),
  9075. MockRead(SYNCHRONOUS, ERR_FAILED),
  9076. };
  9077. // Resend with authorization from MyRealm's cache.
  9078. MockWrite data_writes2[] = {
  9079. MockWrite(
  9080. "GET /x/1 HTTP/1.1\r\n"
  9081. "Host: www.example.org\r\n"
  9082. "Connection: keep-alive\r\n"
  9083. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  9084. };
  9085. // Sever accepts the authorization.
  9086. MockRead data_reads2[] = {
  9087. MockRead("HTTP/1.0 200 OK\r\n"),
  9088. MockRead("Content-Length: 100\r\n\r\n"),
  9089. MockRead(SYNCHRONOUS, OK),
  9090. };
  9091. StaticSocketDataProvider data1(data_reads1, data_writes1);
  9092. StaticSocketDataProvider data2(data_reads2, data_writes2);
  9093. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  9094. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  9095. TestCompletionCallback callback1;
  9096. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  9097. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9098. rv = callback1.WaitForResult();
  9099. EXPECT_THAT(rv, IsOk());
  9100. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  9101. TestCompletionCallback callback2;
  9102. rv = trans.RestartWithAuth(AuthCredentials(), callback2.callback());
  9103. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9104. rv = callback2.WaitForResult();
  9105. EXPECT_THAT(rv, IsOk());
  9106. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  9107. const HttpResponseInfo* response = trans.GetResponseInfo();
  9108. ASSERT_TRUE(response);
  9109. EXPECT_FALSE(response->auth_challenge.has_value());
  9110. EXPECT_EQ(100, response->headers->GetContentLength());
  9111. }
  9112. // ------------------------------------------------------------------------
  9113. // Transaction 5: request a URL in MyRealm, but the server rejects the
  9114. // cached identity. Should invalidate and re-prompt.
  9115. {
  9116. HttpRequestInfo request;
  9117. request.method = "GET";
  9118. request.url = GURL("http://www.example.org/p/q/t");
  9119. request.traffic_annotation =
  9120. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9121. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9122. MockWrite data_writes1[] = {
  9123. MockWrite(
  9124. "GET /p/q/t HTTP/1.1\r\n"
  9125. "Host: www.example.org\r\n"
  9126. "Connection: keep-alive\r\n\r\n"),
  9127. };
  9128. MockRead data_reads1[] = {
  9129. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  9130. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  9131. MockRead("Content-Length: 10000\r\n\r\n"),
  9132. MockRead(SYNCHRONOUS, ERR_FAILED),
  9133. };
  9134. // Resend with authorization from cache for MyRealm.
  9135. MockWrite data_writes2[] = {
  9136. MockWrite(
  9137. "GET /p/q/t HTTP/1.1\r\n"
  9138. "Host: www.example.org\r\n"
  9139. "Connection: keep-alive\r\n"
  9140. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  9141. };
  9142. // Sever rejects the authorization.
  9143. MockRead data_reads2[] = {
  9144. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  9145. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  9146. MockRead("Content-Length: 10000\r\n\r\n"),
  9147. MockRead(SYNCHRONOUS, ERR_FAILED),
  9148. };
  9149. // At this point we should prompt for new credentials for MyRealm.
  9150. // Restart with username=foo3, password=foo4.
  9151. MockWrite data_writes3[] = {
  9152. MockWrite(
  9153. "GET /p/q/t HTTP/1.1\r\n"
  9154. "Host: www.example.org\r\n"
  9155. "Connection: keep-alive\r\n"
  9156. "Authorization: Basic Zm9vMzpiYXIz\r\n\r\n"),
  9157. };
  9158. // Sever accepts the authorization.
  9159. MockRead data_reads3[] = {
  9160. MockRead("HTTP/1.0 200 OK\r\n"),
  9161. MockRead("Content-Length: 100\r\n\r\n"),
  9162. MockRead(SYNCHRONOUS, OK),
  9163. };
  9164. StaticSocketDataProvider data1(data_reads1, data_writes1);
  9165. StaticSocketDataProvider data2(data_reads2, data_writes2);
  9166. StaticSocketDataProvider data3(data_reads3, data_writes3);
  9167. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  9168. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  9169. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  9170. TestCompletionCallback callback1;
  9171. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  9172. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9173. rv = callback1.WaitForResult();
  9174. EXPECT_THAT(rv, IsOk());
  9175. EXPECT_TRUE(trans.IsReadyToRestartForAuth());
  9176. TestCompletionCallback callback2;
  9177. rv = trans.RestartWithAuth(AuthCredentials(), callback2.callback());
  9178. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9179. rv = callback2.WaitForResult();
  9180. EXPECT_THAT(rv, IsOk());
  9181. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  9182. const HttpResponseInfo* response = trans.GetResponseInfo();
  9183. ASSERT_TRUE(response);
  9184. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  9185. TestCompletionCallback callback3;
  9186. rv = trans.RestartWithAuth(AuthCredentials(kFoo3, kBar3),
  9187. callback3.callback());
  9188. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9189. rv = callback3.WaitForResult();
  9190. EXPECT_THAT(rv, IsOk());
  9191. response = trans.GetResponseInfo();
  9192. ASSERT_TRUE(response);
  9193. EXPECT_FALSE(response->auth_challenge.has_value());
  9194. EXPECT_EQ(100, response->headers->GetContentLength());
  9195. }
  9196. }
  9197. // Tests that nonce count increments when multiple auth attempts
  9198. // are started with the same nonce.
  9199. TEST_F(HttpNetworkTransactionTest, DigestPreAuthNonceCount) {
  9200. auto digest_factory = std::make_unique<HttpAuthHandlerDigest::Factory>();
  9201. auto nonce_generator =
  9202. std::make_unique<HttpAuthHandlerDigest::FixedNonceGenerator>(
  9203. "0123456789abcdef");
  9204. digest_factory->set_nonce_generator(std::move(nonce_generator));
  9205. session_deps_.http_auth_handler_factory = std::move(digest_factory);
  9206. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9207. // Transaction 1: authenticate (foo, bar) on MyRealm1
  9208. {
  9209. HttpRequestInfo request;
  9210. request.method = "GET";
  9211. request.url = GURL("http://www.example.org/x/y/z");
  9212. request.traffic_annotation =
  9213. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9214. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9215. MockWrite data_writes1[] = {
  9216. MockWrite(
  9217. "GET /x/y/z HTTP/1.1\r\n"
  9218. "Host: www.example.org\r\n"
  9219. "Connection: keep-alive\r\n\r\n"),
  9220. };
  9221. MockRead data_reads1[] = {
  9222. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  9223. MockRead("WWW-Authenticate: Digest realm=\"digestive\", nonce=\"OU812\", "
  9224. "algorithm=MD5, qop=\"auth\"\r\n\r\n"),
  9225. MockRead(SYNCHRONOUS, OK),
  9226. };
  9227. // Resend with authorization (username=foo, password=bar)
  9228. MockWrite data_writes2[] = {
  9229. MockWrite(
  9230. "GET /x/y/z HTTP/1.1\r\n"
  9231. "Host: www.example.org\r\n"
  9232. "Connection: keep-alive\r\n"
  9233. "Authorization: Digest username=\"foo\", realm=\"digestive\", "
  9234. "nonce=\"OU812\", uri=\"/x/y/z\", algorithm=MD5, "
  9235. "response=\"03ffbcd30add722589c1de345d7a927f\", qop=auth, "
  9236. "nc=00000001, cnonce=\"0123456789abcdef\"\r\n\r\n"),
  9237. };
  9238. // Sever accepts the authorization.
  9239. MockRead data_reads2[] = {
  9240. MockRead("HTTP/1.0 200 OK\r\n"),
  9241. MockRead(SYNCHRONOUS, OK),
  9242. };
  9243. StaticSocketDataProvider data1(data_reads1, data_writes1);
  9244. StaticSocketDataProvider data2(data_reads2, data_writes2);
  9245. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  9246. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  9247. TestCompletionCallback callback1;
  9248. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  9249. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9250. rv = callback1.WaitForResult();
  9251. EXPECT_THAT(rv, IsOk());
  9252. const HttpResponseInfo* response = trans.GetResponseInfo();
  9253. ASSERT_TRUE(response);
  9254. EXPECT_TRUE(CheckDigestServerAuth(response->auth_challenge));
  9255. TestCompletionCallback callback2;
  9256. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar),
  9257. callback2.callback());
  9258. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9259. rv = callback2.WaitForResult();
  9260. EXPECT_THAT(rv, IsOk());
  9261. response = trans.GetResponseInfo();
  9262. ASSERT_TRUE(response);
  9263. EXPECT_FALSE(response->auth_challenge.has_value());
  9264. }
  9265. // ------------------------------------------------------------------------
  9266. // Transaction 2: Request another resource in digestive's protection space.
  9267. // This will preemptively add an Authorization header which should have an
  9268. // "nc" value of 2 (as compared to 1 in the first use.
  9269. {
  9270. HttpRequestInfo request;
  9271. request.method = "GET";
  9272. // Note that Transaction 1 was at /x/y/z, so this is in the same
  9273. // protection space as digest.
  9274. request.url = GURL("http://www.example.org/x/y/a/b");
  9275. request.traffic_annotation =
  9276. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9277. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9278. MockWrite data_writes1[] = {
  9279. MockWrite(
  9280. "GET /x/y/a/b HTTP/1.1\r\n"
  9281. "Host: www.example.org\r\n"
  9282. "Connection: keep-alive\r\n"
  9283. "Authorization: Digest username=\"foo\", realm=\"digestive\", "
  9284. "nonce=\"OU812\", uri=\"/x/y/a/b\", algorithm=MD5, "
  9285. "response=\"d6f9a2c07d1c5df7b89379dca1269b35\", qop=auth, "
  9286. "nc=00000002, cnonce=\"0123456789abcdef\"\r\n\r\n"),
  9287. };
  9288. // Sever accepts the authorization.
  9289. MockRead data_reads1[] = {
  9290. MockRead("HTTP/1.0 200 OK\r\n"),
  9291. MockRead("Content-Length: 100\r\n\r\n"),
  9292. MockRead(SYNCHRONOUS, OK),
  9293. };
  9294. StaticSocketDataProvider data1(data_reads1, data_writes1);
  9295. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  9296. TestCompletionCallback callback1;
  9297. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  9298. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9299. rv = callback1.WaitForResult();
  9300. EXPECT_THAT(rv, IsOk());
  9301. const HttpResponseInfo* response = trans.GetResponseInfo();
  9302. ASSERT_TRUE(response);
  9303. EXPECT_FALSE(response->auth_challenge.has_value());
  9304. }
  9305. }
  9306. // Test the ResetStateForRestart() private method.
  9307. TEST_F(HttpNetworkTransactionTest, ResetStateForRestart) {
  9308. // Create a transaction (the dependencies aren't important).
  9309. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9310. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9311. // Setup some state (which we expect ResetStateForRestart() will clear).
  9312. trans.read_buf_ = base::MakeRefCounted<IOBuffer>(15);
  9313. trans.read_buf_len_ = 15;
  9314. trans.request_headers_.SetHeader("Authorization", "NTLM");
  9315. // Setup state in response_
  9316. HttpResponseInfo* response = &trans.response_;
  9317. response->auth_challenge = absl::nullopt;
  9318. response->ssl_info.cert_status = static_cast<CertStatus>(-1); // Nonsensical.
  9319. response->response_time = base::Time::Now();
  9320. response->was_cached = true; // (Wouldn't ever actually be true...)
  9321. // Cause the above state to be reset.
  9322. trans.ResetStateForRestart();
  9323. // Verify that the state that needed to be reset, has been reset.
  9324. EXPECT_FALSE(trans.read_buf_);
  9325. EXPECT_EQ(0, trans.read_buf_len_);
  9326. EXPECT_TRUE(trans.request_headers_.IsEmpty());
  9327. EXPECT_FALSE(response->auth_challenge.has_value());
  9328. EXPECT_FALSE(response->headers);
  9329. EXPECT_FALSE(response->was_cached);
  9330. EXPECT_EQ(0U, response->ssl_info.cert_status);
  9331. }
  9332. // Test HTTPS connections to a site with a bad certificate
  9333. TEST_F(HttpNetworkTransactionTest, HTTPSBadCertificate) {
  9334. HttpRequestInfo request;
  9335. request.method = "GET";
  9336. request.url = GURL("https://www.example.org/");
  9337. request.traffic_annotation =
  9338. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9339. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9340. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9341. MockWrite data_writes[] = {
  9342. MockWrite(
  9343. "GET / HTTP/1.1\r\n"
  9344. "Host: www.example.org\r\n"
  9345. "Connection: keep-alive\r\n\r\n"),
  9346. };
  9347. MockRead data_reads[] = {
  9348. MockRead("HTTP/1.0 200 OK\r\n"),
  9349. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  9350. MockRead("Content-Length: 100\r\n\r\n"),
  9351. MockRead(SYNCHRONOUS, OK),
  9352. };
  9353. StaticSocketDataProvider ssl_bad_certificate;
  9354. StaticSocketDataProvider data(data_reads, data_writes);
  9355. SSLSocketDataProvider ssl_bad(ASYNC, ERR_CERT_AUTHORITY_INVALID);
  9356. SSLSocketDataProvider ssl(ASYNC, OK);
  9357. session_deps_.socket_factory->AddSocketDataProvider(&ssl_bad_certificate);
  9358. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9359. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_bad);
  9360. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  9361. TestCompletionCallback callback;
  9362. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9363. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9364. rv = callback.WaitForResult();
  9365. EXPECT_THAT(rv, IsError(ERR_CERT_AUTHORITY_INVALID));
  9366. rv = trans.RestartIgnoringLastError(callback.callback());
  9367. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9368. rv = callback.WaitForResult();
  9369. EXPECT_THAT(rv, IsOk());
  9370. const HttpResponseInfo* response = trans.GetResponseInfo();
  9371. ASSERT_TRUE(response);
  9372. EXPECT_EQ(100, response->headers->GetContentLength());
  9373. }
  9374. // Test HTTPS connections to a site with a bad certificate, going through a
  9375. // proxy
  9376. TEST_F(HttpNetworkTransactionTest, HTTPSBadCertificateViaProxy) {
  9377. session_deps_.proxy_resolution_service =
  9378. ConfiguredProxyResolutionService::CreateFixedForTest(
  9379. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9380. HttpRequestInfo request;
  9381. request.method = "GET";
  9382. request.url = GURL("https://www.example.org/");
  9383. request.traffic_annotation =
  9384. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9385. MockWrite proxy_writes[] = {
  9386. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  9387. "Host: www.example.org:443\r\n"
  9388. "Proxy-Connection: keep-alive\r\n\r\n"),
  9389. };
  9390. MockRead proxy_reads[] = {
  9391. MockRead("HTTP/1.0 200 Connected\r\n\r\n"),
  9392. MockRead(SYNCHRONOUS, OK)
  9393. };
  9394. MockWrite data_writes[] = {
  9395. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  9396. "Host: www.example.org:443\r\n"
  9397. "Proxy-Connection: keep-alive\r\n\r\n"),
  9398. MockWrite("GET / HTTP/1.1\r\n"
  9399. "Host: www.example.org\r\n"
  9400. "Connection: keep-alive\r\n\r\n"),
  9401. };
  9402. MockRead data_reads[] = {
  9403. MockRead("HTTP/1.0 200 Connected\r\n\r\n"),
  9404. MockRead("HTTP/1.0 200 OK\r\n"),
  9405. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  9406. MockRead("Content-Length: 100\r\n\r\n"),
  9407. MockRead(SYNCHRONOUS, OK),
  9408. };
  9409. StaticSocketDataProvider ssl_bad_certificate(proxy_reads, proxy_writes);
  9410. StaticSocketDataProvider data(data_reads, data_writes);
  9411. SSLSocketDataProvider ssl_bad(ASYNC, ERR_CERT_AUTHORITY_INVALID);
  9412. SSLSocketDataProvider ssl(ASYNC, OK);
  9413. session_deps_.socket_factory->AddSocketDataProvider(&ssl_bad_certificate);
  9414. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9415. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_bad);
  9416. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  9417. TestCompletionCallback callback;
  9418. for (int i = 0; i < 2; i++) {
  9419. session_deps_.socket_factory->ResetNextMockIndexes();
  9420. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9421. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9422. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9423. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9424. rv = callback.WaitForResult();
  9425. EXPECT_THAT(rv, IsError(ERR_CERT_AUTHORITY_INVALID));
  9426. rv = trans.RestartIgnoringLastError(callback.callback());
  9427. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9428. rv = callback.WaitForResult();
  9429. EXPECT_THAT(rv, IsOk());
  9430. const HttpResponseInfo* response = trans.GetResponseInfo();
  9431. ASSERT_TRUE(response);
  9432. EXPECT_EQ(100, response->headers->GetContentLength());
  9433. }
  9434. }
  9435. // Test HTTPS connections to a site, going through an HTTPS proxy
  9436. TEST_F(HttpNetworkTransactionTest, HTTPSViaHttpsProxy) {
  9437. session_deps_.proxy_resolution_service =
  9438. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  9439. "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9440. session_deps_.net_log = net::NetLog::Get();
  9441. HttpRequestInfo request;
  9442. request.method = "GET";
  9443. request.url = GURL("https://www.example.org/");
  9444. request.traffic_annotation =
  9445. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9446. MockWrite data_writes[] = {
  9447. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  9448. "Host: www.example.org:443\r\n"
  9449. "Proxy-Connection: keep-alive\r\n\r\n"),
  9450. MockWrite("GET / HTTP/1.1\r\n"
  9451. "Host: www.example.org\r\n"
  9452. "Connection: keep-alive\r\n\r\n"),
  9453. };
  9454. MockRead data_reads[] = {
  9455. MockRead("HTTP/1.0 200 Connected\r\n\r\n"),
  9456. MockRead("HTTP/1.1 200 OK\r\n"),
  9457. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  9458. MockRead("Content-Length: 100\r\n\r\n"),
  9459. MockRead(SYNCHRONOUS, OK),
  9460. };
  9461. StaticSocketDataProvider data(data_reads, data_writes);
  9462. SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy
  9463. SSLSocketDataProvider tunnel_ssl(ASYNC, OK); // SSL through the tunnel
  9464. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9465. session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl);
  9466. session_deps_.socket_factory->AddSSLSocketDataProvider(&tunnel_ssl);
  9467. TestCompletionCallback callback;
  9468. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9469. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9470. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9471. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9472. rv = callback.WaitForResult();
  9473. EXPECT_THAT(rv, IsOk());
  9474. const HttpResponseInfo* response = trans.GetResponseInfo();
  9475. ASSERT_TRUE(response);
  9476. EXPECT_TRUE(response->proxy_server.is_https());
  9477. EXPECT_TRUE(response->headers->IsKeepAlive());
  9478. EXPECT_EQ(200, response->headers->response_code());
  9479. EXPECT_EQ(100, response->headers->GetContentLength());
  9480. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  9481. LoadTimingInfo load_timing_info;
  9482. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  9483. TestLoadTimingNotReusedWithPac(load_timing_info,
  9484. CONNECT_TIMING_HAS_SSL_TIMES);
  9485. }
  9486. // Test that an HTTPS Proxy cannot redirect a CONNECT request for main frames.
  9487. TEST_F(HttpNetworkTransactionTest, RedirectOfHttpsConnectViaHttpsProxy) {
  9488. session_deps_.proxy_resolution_service =
  9489. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  9490. "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9491. session_deps_.net_log = net::NetLog::Get();
  9492. const base::TimeDelta kTimeIncrement = base::Seconds(4);
  9493. session_deps_.host_resolver->set_ondemand_mode(true);
  9494. HttpRequestInfo request;
  9495. request.load_flags = LOAD_MAIN_FRAME_DEPRECATED;
  9496. request.method = "GET";
  9497. request.url = GURL("https://www.example.org/");
  9498. request.traffic_annotation =
  9499. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9500. MockWrite data_writes[] = {
  9501. MockWrite(ASYNC, 0,
  9502. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  9503. "Host: www.example.org:443\r\n"
  9504. "Proxy-Connection: keep-alive\r\n\r\n"),
  9505. };
  9506. MockRead data_reads[] = {
  9507. // Pause on first read.
  9508. MockRead(ASYNC, ERR_IO_PENDING, 1),
  9509. MockRead(ASYNC, 2, "HTTP/1.1 302 Redirect\r\n"),
  9510. MockRead(ASYNC, 3, "Location: http://login.example.com/\r\n"),
  9511. MockRead(ASYNC, 4, "Content-Length: 0\r\n\r\n"),
  9512. };
  9513. SequencedSocketData data(MockConnect(ASYNC, OK), data_reads, data_writes);
  9514. SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy
  9515. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9516. session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl);
  9517. TestCompletionCallback callback;
  9518. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9519. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9520. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9521. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9522. EXPECT_TRUE(session_deps_.host_resolver->has_pending_requests());
  9523. // Host resolution takes |kTimeIncrement|.
  9524. FastForwardBy(kTimeIncrement);
  9525. // Resolving the current request with |ResolveNow| will cause the pending
  9526. // request to instantly complete, and the async connect will start as well.
  9527. session_deps_.host_resolver->ResolveOnlyRequestNow();
  9528. // Connecting takes |kTimeIncrement|.
  9529. FastForwardBy(kTimeIncrement);
  9530. data.RunUntilPaused();
  9531. // The server takes |kTimeIncrement| to respond.
  9532. FastForwardBy(kTimeIncrement);
  9533. data.Resume();
  9534. rv = callback.WaitForResult();
  9535. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  9536. }
  9537. // Test that an HTTPS Proxy cannot redirect a CONNECT request for subresources.
  9538. TEST_F(HttpNetworkTransactionTest,
  9539. RedirectOfHttpsConnectSubresourceViaHttpsProxy) {
  9540. base::HistogramTester histograms;
  9541. session_deps_.proxy_resolution_service =
  9542. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  9543. "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9544. session_deps_.net_log = net::NetLog::Get();
  9545. HttpRequestInfo request;
  9546. request.method = "GET";
  9547. request.url = GURL("https://www.example.org/");
  9548. request.traffic_annotation =
  9549. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9550. MockWrite data_writes[] = {
  9551. MockWrite(ASYNC, 0,
  9552. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  9553. "Host: www.example.org:443\r\n"
  9554. "Proxy-Connection: keep-alive\r\n\r\n"),
  9555. };
  9556. MockRead data_reads[] = {
  9557. MockRead(ASYNC, 1, "HTTP/1.1 302 Redirect\r\n"),
  9558. MockRead(ASYNC, 2, "Location: http://login.example.com/\r\n"),
  9559. MockRead(ASYNC, 3, "Content-Length: 0\r\n\r\n"),
  9560. };
  9561. SequencedSocketData data(MockConnect(ASYNC, OK), data_reads, data_writes);
  9562. SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy
  9563. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9564. session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl);
  9565. TestCompletionCallback callback;
  9566. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9567. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9568. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9569. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9570. rv = callback.WaitForResult();
  9571. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  9572. }
  9573. // Test that an HTTPS Proxy which was auto-detected cannot redirect a CONNECT
  9574. // request for main frames.
  9575. TEST_F(HttpNetworkTransactionTest,
  9576. RedirectOfHttpsConnectViaAutoDetectedHttpsProxy) {
  9577. base::HistogramTester histograms;
  9578. session_deps_.proxy_resolution_service = ConfiguredProxyResolutionService::
  9579. CreateFixedFromAutoDetectedPacResultForTest("HTTPS proxy:70",
  9580. TRAFFIC_ANNOTATION_FOR_TESTS);
  9581. session_deps_.net_log = net::NetLog::Get();
  9582. HttpRequestInfo request;
  9583. request.load_flags = LOAD_MAIN_FRAME_DEPRECATED;
  9584. request.method = "GET";
  9585. request.url = GURL("https://www.example.org/");
  9586. request.traffic_annotation =
  9587. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9588. MockWrite data_writes[] = {
  9589. MockWrite(ASYNC, 0,
  9590. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  9591. "Host: www.example.org:443\r\n"
  9592. "Proxy-Connection: keep-alive\r\n\r\n"),
  9593. };
  9594. MockRead data_reads[] = {
  9595. MockRead(ASYNC, 1, "HTTP/1.1 302 Redirect\r\n"),
  9596. MockRead(ASYNC, 2, "Location: http://login.example.com/\r\n"),
  9597. MockRead(ASYNC, 3, "Content-Length: 0\r\n\r\n"),
  9598. };
  9599. SequencedSocketData data(MockConnect(ASYNC, OK), data_reads, data_writes);
  9600. SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy
  9601. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9602. session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl);
  9603. TestCompletionCallback callback;
  9604. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9605. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9606. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9607. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9608. rv = callback.WaitForResult();
  9609. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  9610. }
  9611. // Tests that an HTTPS (SPDY) Proxy's cannot redirect a CONNECT request for main
  9612. // frames.
  9613. TEST_F(HttpNetworkTransactionTest, RedirectOfHttpsConnectViaSpdyProxy) {
  9614. base::HistogramTester histograms;
  9615. session_deps_.proxy_resolution_service =
  9616. ConfiguredProxyResolutionService::CreateFixedForTest(
  9617. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9618. session_deps_.net_log = net::NetLog::Get();
  9619. const base::TimeDelta kTimeIncrement = base::Seconds(4);
  9620. session_deps_.host_resolver->set_ondemand_mode(true);
  9621. HttpRequestInfo request;
  9622. request.method = "GET";
  9623. request.load_flags = LOAD_MAIN_FRAME_DEPRECATED;
  9624. request.url = GURL("https://www.example.org/");
  9625. request.traffic_annotation =
  9626. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9627. spdy::SpdySerializedFrame conn(spdy_util_.ConstructSpdyConnect(
  9628. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  9629. HostPortPair("www.example.org", 443)));
  9630. spdy::SpdySerializedFrame goaway(
  9631. spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL));
  9632. MockWrite data_writes[] = {
  9633. CreateMockWrite(conn, 0, SYNCHRONOUS),
  9634. CreateMockWrite(goaway, 3, SYNCHRONOUS),
  9635. };
  9636. static const char* const kExtraHeaders[] = {
  9637. "location",
  9638. "http://login.example.com/",
  9639. };
  9640. spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyReplyError(
  9641. "302", kExtraHeaders, std::size(kExtraHeaders) / 2, 1));
  9642. MockRead data_reads[] = {
  9643. // Pause on first read.
  9644. MockRead(ASYNC, ERR_IO_PENDING, 1), CreateMockRead(resp, 2),
  9645. MockRead(ASYNC, 0, 4), // EOF
  9646. };
  9647. SequencedSocketData data(MockConnect(ASYNC, OK), data_reads, data_writes);
  9648. SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy
  9649. proxy_ssl.next_proto = kProtoHTTP2;
  9650. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9651. session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl);
  9652. TestCompletionCallback callback;
  9653. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9654. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9655. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9656. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9657. EXPECT_TRUE(session_deps_.host_resolver->has_pending_requests());
  9658. // Host resolution takes |kTimeIncrement|.
  9659. FastForwardBy(kTimeIncrement);
  9660. // Resolving the current request with |ResolveNow| will cause the pending
  9661. // request to instantly complete, and the async connect will start as well.
  9662. session_deps_.host_resolver->ResolveOnlyRequestNow();
  9663. // Connecting takes |kTimeIncrement|.
  9664. FastForwardBy(kTimeIncrement);
  9665. data.RunUntilPaused();
  9666. FastForwardBy(kTimeIncrement);
  9667. data.Resume();
  9668. rv = callback.WaitForResult();
  9669. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  9670. }
  9671. // Test that an HTTPS proxy's response to a CONNECT request is filtered.
  9672. TEST_F(HttpNetworkTransactionTest, ErrorResponseToHttpsConnectViaHttpsProxy) {
  9673. session_deps_.proxy_resolution_service =
  9674. ConfiguredProxyResolutionService::CreateFixedForTest(
  9675. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9676. HttpRequestInfo request;
  9677. request.method = "GET";
  9678. request.url = GURL("https://www.example.org/");
  9679. request.traffic_annotation =
  9680. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9681. MockWrite data_writes[] = {
  9682. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  9683. "Host: www.example.org:443\r\n"
  9684. "Proxy-Connection: keep-alive\r\n\r\n"),
  9685. };
  9686. MockRead data_reads[] = {
  9687. MockRead("HTTP/1.1 404 Not Found\r\n"),
  9688. MockRead("Content-Length: 23\r\n\r\n"),
  9689. MockRead("The host does not exist"),
  9690. MockRead(SYNCHRONOUS, OK),
  9691. };
  9692. StaticSocketDataProvider data(data_reads, data_writes);
  9693. SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy
  9694. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9695. session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl);
  9696. TestCompletionCallback callback;
  9697. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9698. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9699. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9700. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9701. rv = callback.WaitForResult();
  9702. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  9703. // TODO(juliatuttle): Anything else to check here?
  9704. }
  9705. // Test that a SPDY proxy's response to a CONNECT request is filtered.
  9706. TEST_F(HttpNetworkTransactionTest, ErrorResponseToHttpsConnectViaSpdyProxy) {
  9707. session_deps_.proxy_resolution_service =
  9708. ConfiguredProxyResolutionService::CreateFixedForTest(
  9709. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9710. HttpRequestInfo request;
  9711. request.method = "GET";
  9712. request.url = GURL("https://www.example.org/");
  9713. request.traffic_annotation =
  9714. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9715. spdy::SpdySerializedFrame conn(spdy_util_.ConstructSpdyConnect(
  9716. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  9717. HostPortPair("www.example.org", 443)));
  9718. spdy::SpdySerializedFrame rst(
  9719. spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL));
  9720. MockWrite data_writes[] = {
  9721. CreateMockWrite(conn, 0), CreateMockWrite(rst, 3),
  9722. };
  9723. static const char* const kExtraHeaders[] = {
  9724. "location",
  9725. "http://login.example.com/",
  9726. };
  9727. spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyReplyError(
  9728. "404", kExtraHeaders, std::size(kExtraHeaders) / 2, 1));
  9729. spdy::SpdySerializedFrame body(
  9730. spdy_util_.ConstructSpdyDataFrame(1, "The host does not exist", true));
  9731. MockRead data_reads[] = {
  9732. CreateMockRead(resp, 1), CreateMockRead(body, 2),
  9733. MockRead(ASYNC, 0, 4), // EOF
  9734. };
  9735. SequencedSocketData data(data_reads, data_writes);
  9736. SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy
  9737. proxy_ssl.next_proto = kProtoHTTP2;
  9738. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9739. session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl);
  9740. TestCompletionCallback callback;
  9741. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9742. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9743. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9744. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9745. rv = callback.WaitForResult();
  9746. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  9747. // TODO(juliatuttle): Anything else to check here?
  9748. }
  9749. // Test the request-challenge-retry sequence for basic auth, through
  9750. // a SPDY proxy over a single SPDY session.
  9751. TEST_F(HttpNetworkTransactionTest, BasicAuthSpdyProxy) {
  9752. HttpRequestInfo request;
  9753. request.method = "GET";
  9754. request.url = GURL("https://www.example.org/");
  9755. // when the no authentication data flag is set.
  9756. request.privacy_mode = PRIVACY_MODE_ENABLED;
  9757. request.traffic_annotation =
  9758. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9759. // Configure against https proxy server "myproxy:70".
  9760. session_deps_.proxy_resolution_service =
  9761. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  9762. "HTTPS myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9763. RecordingNetLogObserver net_log_observer;
  9764. session_deps_.net_log = NetLog::Get();
  9765. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9766. // Since we have proxy, should try to establish tunnel.
  9767. spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyConnect(
  9768. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  9769. HostPortPair("www.example.org", 443)));
  9770. spdy::SpdySerializedFrame rst(
  9771. spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL));
  9772. spdy_util_.UpdateWithStreamDestruction(1);
  9773. // After calling trans.RestartWithAuth(), this is the request we should
  9774. // be issuing -- the final header line contains the credentials.
  9775. const char* const kAuthCredentials[] = {
  9776. "proxy-authorization", "Basic Zm9vOmJhcg==",
  9777. };
  9778. spdy::SpdySerializedFrame connect2(spdy_util_.ConstructSpdyConnect(
  9779. kAuthCredentials, std::size(kAuthCredentials) / 2, 3,
  9780. HttpProxyConnectJob::kH2QuicTunnelPriority,
  9781. HostPortPair("www.example.org", 443)));
  9782. // fetch https://www.example.org/ via HTTP
  9783. const char get[] =
  9784. "GET / HTTP/1.1\r\n"
  9785. "Host: www.example.org\r\n"
  9786. "Connection: keep-alive\r\n\r\n";
  9787. spdy::SpdySerializedFrame wrapped_get(
  9788. spdy_util_.ConstructSpdyDataFrame(3, get, false));
  9789. MockWrite spdy_writes[] = {
  9790. CreateMockWrite(req, 0, ASYNC), CreateMockWrite(rst, 2, ASYNC),
  9791. CreateMockWrite(connect2, 3), CreateMockWrite(wrapped_get, 5),
  9792. };
  9793. // The proxy responds to the connect with a 407, using a persistent
  9794. // connection.
  9795. const char kAuthStatus[] = "407";
  9796. const char* const kAuthChallenge[] = {
  9797. "proxy-authenticate", "Basic realm=\"MyRealm1\"",
  9798. };
  9799. spdy::SpdySerializedFrame conn_auth_resp(spdy_util_.ConstructSpdyReplyError(
  9800. kAuthStatus, kAuthChallenge, std::size(kAuthChallenge) / 2, 1));
  9801. spdy::SpdySerializedFrame conn_resp(
  9802. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  9803. const char resp[] = "HTTP/1.1 200 OK\r\n"
  9804. "Content-Length: 5\r\n\r\n";
  9805. spdy::SpdySerializedFrame wrapped_get_resp(
  9806. spdy_util_.ConstructSpdyDataFrame(3, resp, false));
  9807. spdy::SpdySerializedFrame wrapped_body(
  9808. spdy_util_.ConstructSpdyDataFrame(3, "hello", false));
  9809. MockRead spdy_reads[] = {
  9810. CreateMockRead(conn_auth_resp, 1, ASYNC),
  9811. CreateMockRead(conn_resp, 4, ASYNC),
  9812. CreateMockRead(wrapped_get_resp, 6, ASYNC),
  9813. CreateMockRead(wrapped_body, 7, ASYNC),
  9814. MockRead(ASYNC, OK, 8), // EOF. May or may not be read.
  9815. };
  9816. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  9817. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  9818. // Negotiate SPDY to the proxy
  9819. SSLSocketDataProvider proxy(ASYNC, OK);
  9820. proxy.next_proto = kProtoHTTP2;
  9821. session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy);
  9822. // Vanilla SSL to the server
  9823. SSLSocketDataProvider server(ASYNC, OK);
  9824. session_deps_.socket_factory->AddSSLSocketDataProvider(&server);
  9825. TestCompletionCallback callback1;
  9826. auto trans =
  9827. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  9828. int rv = trans->Start(&request, callback1.callback(),
  9829. NetLogWithSource::Make(NetLogSourceType::NONE));
  9830. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9831. rv = callback1.WaitForResult();
  9832. EXPECT_THAT(rv, IsOk());
  9833. auto entries = net_log_observer.GetEntries();
  9834. size_t pos = ExpectLogContainsSomewhere(
  9835. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  9836. NetLogEventPhase::NONE);
  9837. ExpectLogContainsSomewhere(
  9838. entries, pos,
  9839. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  9840. NetLogEventPhase::NONE);
  9841. const HttpResponseInfo* response = trans->GetResponseInfo();
  9842. ASSERT_TRUE(response);
  9843. ASSERT_TRUE(response->headers);
  9844. EXPECT_EQ(407, response->headers->response_code());
  9845. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  9846. EXPECT_TRUE(response->auth_challenge.has_value());
  9847. EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge));
  9848. TestCompletionCallback callback2;
  9849. rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar),
  9850. callback2.callback());
  9851. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9852. rv = callback2.WaitForResult();
  9853. EXPECT_THAT(rv, IsOk());
  9854. response = trans->GetResponseInfo();
  9855. ASSERT_TRUE(response);
  9856. EXPECT_TRUE(response->headers->IsKeepAlive());
  9857. EXPECT_EQ(200, response->headers->response_code());
  9858. EXPECT_EQ(5, response->headers->GetContentLength());
  9859. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  9860. // The password prompt info should not be set.
  9861. EXPECT_FALSE(response->auth_challenge.has_value());
  9862. LoadTimingInfo load_timing_info;
  9863. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  9864. TestLoadTimingNotReusedWithPac(load_timing_info,
  9865. CONNECT_TIMING_HAS_SSL_TIMES);
  9866. trans.reset();
  9867. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  9868. }
  9869. // Test HTTPS connections to a site with a bad certificate, going through an
  9870. // HTTPS proxy
  9871. TEST_F(HttpNetworkTransactionTest, HTTPSBadCertificateViaHttpsProxy) {
  9872. session_deps_.proxy_resolution_service =
  9873. ConfiguredProxyResolutionService::CreateFixedForTest(
  9874. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9875. HttpRequestInfo request;
  9876. request.method = "GET";
  9877. request.url = GURL("https://www.example.org/");
  9878. request.traffic_annotation =
  9879. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9880. // Attempt to fetch the URL from a server with a bad cert
  9881. MockWrite bad_cert_writes[] = {
  9882. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  9883. "Host: www.example.org:443\r\n"
  9884. "Proxy-Connection: keep-alive\r\n\r\n"),
  9885. };
  9886. MockRead bad_cert_reads[] = {
  9887. MockRead("HTTP/1.0 200 Connected\r\n\r\n"),
  9888. MockRead(SYNCHRONOUS, OK)
  9889. };
  9890. // Attempt to fetch the URL with a good cert
  9891. MockWrite good_data_writes[] = {
  9892. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  9893. "Host: www.example.org:443\r\n"
  9894. "Proxy-Connection: keep-alive\r\n\r\n"),
  9895. MockWrite("GET / HTTP/1.1\r\n"
  9896. "Host: www.example.org\r\n"
  9897. "Connection: keep-alive\r\n\r\n"),
  9898. };
  9899. MockRead good_cert_reads[] = {
  9900. MockRead("HTTP/1.0 200 Connected\r\n\r\n"),
  9901. MockRead("HTTP/1.0 200 OK\r\n"),
  9902. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  9903. MockRead("Content-Length: 100\r\n\r\n"),
  9904. MockRead(SYNCHRONOUS, OK),
  9905. };
  9906. StaticSocketDataProvider ssl_bad_certificate(bad_cert_reads, bad_cert_writes);
  9907. StaticSocketDataProvider data(good_cert_reads, good_data_writes);
  9908. SSLSocketDataProvider ssl_bad(ASYNC, ERR_CERT_AUTHORITY_INVALID);
  9909. SSLSocketDataProvider ssl(ASYNC, OK);
  9910. // SSL to the proxy, then CONNECT request, then SSL with bad certificate
  9911. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  9912. session_deps_.socket_factory->AddSocketDataProvider(&ssl_bad_certificate);
  9913. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_bad);
  9914. // SSL to the proxy, then CONNECT request, then valid SSL certificate
  9915. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  9916. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9917. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  9918. TestCompletionCallback callback;
  9919. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9920. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9921. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9922. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9923. rv = callback.WaitForResult();
  9924. EXPECT_THAT(rv, IsError(ERR_CERT_AUTHORITY_INVALID));
  9925. rv = trans.RestartIgnoringLastError(callback.callback());
  9926. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9927. rv = callback.WaitForResult();
  9928. EXPECT_THAT(rv, IsOk());
  9929. const HttpResponseInfo* response = trans.GetResponseInfo();
  9930. ASSERT_TRUE(response);
  9931. EXPECT_EQ(100, response->headers->GetContentLength());
  9932. }
  9933. TEST_F(HttpNetworkTransactionTest, BuildRequest_UserAgent) {
  9934. HttpRequestInfo request;
  9935. request.method = "GET";
  9936. request.url = GURL("http://www.example.org/");
  9937. request.extra_headers.SetHeader(HttpRequestHeaders::kUserAgent,
  9938. "Chromium Ultra Awesome X Edition");
  9939. request.traffic_annotation =
  9940. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9941. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9942. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9943. MockWrite data_writes[] = {
  9944. MockWrite(
  9945. "GET / HTTP/1.1\r\n"
  9946. "Host: www.example.org\r\n"
  9947. "Connection: keep-alive\r\n"
  9948. "User-Agent: Chromium Ultra Awesome X Edition\r\n\r\n"),
  9949. };
  9950. // Lastly, the server responds with the actual content.
  9951. MockRead data_reads[] = {
  9952. MockRead("HTTP/1.0 200 OK\r\n"),
  9953. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  9954. MockRead("Content-Length: 100\r\n\r\n"),
  9955. MockRead(SYNCHRONOUS, OK),
  9956. };
  9957. StaticSocketDataProvider data(data_reads, data_writes);
  9958. session_deps_.socket_factory->AddSocketDataProvider(&data);
  9959. TestCompletionCallback callback;
  9960. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  9961. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  9962. rv = callback.WaitForResult();
  9963. EXPECT_THAT(rv, IsOk());
  9964. }
  9965. TEST_F(HttpNetworkTransactionTest, BuildRequest_UserAgentOverTunnel) {
  9966. // Test user agent values, used both for the request header of the original
  9967. // request, and the value returned by the HttpUserAgentSettings. nullptr means
  9968. // no request header / no HttpUserAgentSettings object.
  9969. const char* kTestUserAgents[] = {nullptr, "", "Foopy"};
  9970. for (const char* setting_user_agent : kTestUserAgents) {
  9971. if (!setting_user_agent) {
  9972. session_deps_.http_user_agent_settings.reset();
  9973. } else {
  9974. session_deps_.http_user_agent_settings =
  9975. std::make_unique<StaticHttpUserAgentSettings>(
  9976. std::string() /* accept-language */, setting_user_agent);
  9977. }
  9978. session_deps_.proxy_resolution_service =
  9979. ConfiguredProxyResolutionService::CreateFixedForTest(
  9980. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  9981. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  9982. for (const char* request_user_agent : kTestUserAgents) {
  9983. HttpRequestInfo request;
  9984. request.method = "GET";
  9985. request.url = GURL("https://www.example.org/");
  9986. if (request_user_agent) {
  9987. request.extra_headers.SetHeader(HttpRequestHeaders::kUserAgent,
  9988. request_user_agent);
  9989. }
  9990. request.traffic_annotation =
  9991. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  9992. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  9993. std::string expected_request;
  9994. if (!setting_user_agent || strlen(setting_user_agent) == 0) {
  9995. expected_request =
  9996. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  9997. "Host: www.example.org:443\r\n"
  9998. "Proxy-Connection: keep-alive\r\n\r\n";
  9999. } else {
  10000. expected_request = base::StringPrintf(
  10001. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  10002. "Host: www.example.org:443\r\n"
  10003. "Proxy-Connection: keep-alive\r\n"
  10004. "User-Agent: %s\r\n\r\n",
  10005. setting_user_agent);
  10006. }
  10007. MockWrite data_writes[] = {
  10008. MockWrite(expected_request.c_str()),
  10009. };
  10010. MockRead data_reads[] = {
  10011. // Return an error, so the transaction stops here (this test isn't
  10012. // interested in the rest).
  10013. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  10014. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  10015. MockRead("Proxy-Connection: close\r\n\r\n"),
  10016. };
  10017. StaticSocketDataProvider data(data_reads, data_writes);
  10018. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10019. TestCompletionCallback callback;
  10020. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10021. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10022. rv = callback.WaitForResult();
  10023. EXPECT_THAT(rv, IsOk());
  10024. }
  10025. }
  10026. }
  10027. TEST_F(HttpNetworkTransactionTest, BuildRequest_Referer) {
  10028. HttpRequestInfo request;
  10029. request.method = "GET";
  10030. request.url = GURL("http://www.example.org/");
  10031. request.extra_headers.SetHeader(HttpRequestHeaders::kReferer,
  10032. "http://the.previous.site.com/");
  10033. request.traffic_annotation =
  10034. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10035. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10036. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10037. MockWrite data_writes[] = {
  10038. MockWrite(
  10039. "GET / HTTP/1.1\r\n"
  10040. "Host: www.example.org\r\n"
  10041. "Connection: keep-alive\r\n"
  10042. "Referer: http://the.previous.site.com/\r\n\r\n"),
  10043. };
  10044. // Lastly, the server responds with the actual content.
  10045. MockRead data_reads[] = {
  10046. MockRead("HTTP/1.0 200 OK\r\n"),
  10047. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10048. MockRead("Content-Length: 100\r\n\r\n"),
  10049. MockRead(SYNCHRONOUS, OK),
  10050. };
  10051. StaticSocketDataProvider data(data_reads, data_writes);
  10052. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10053. TestCompletionCallback callback;
  10054. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10055. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10056. rv = callback.WaitForResult();
  10057. EXPECT_THAT(rv, IsOk());
  10058. }
  10059. TEST_F(HttpNetworkTransactionTest, BuildRequest_PostContentLengthZero) {
  10060. HttpRequestInfo request;
  10061. request.method = "POST";
  10062. request.url = GURL("http://www.example.org/");
  10063. request.traffic_annotation =
  10064. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10065. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10066. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10067. MockWrite data_writes[] = {
  10068. MockWrite(
  10069. "POST / HTTP/1.1\r\n"
  10070. "Host: www.example.org\r\n"
  10071. "Connection: keep-alive\r\n"
  10072. "Content-Length: 0\r\n\r\n"),
  10073. };
  10074. // Lastly, the server responds with the actual content.
  10075. MockRead data_reads[] = {
  10076. MockRead("HTTP/1.0 200 OK\r\n"),
  10077. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10078. MockRead("Content-Length: 100\r\n\r\n"),
  10079. MockRead(SYNCHRONOUS, OK),
  10080. };
  10081. StaticSocketDataProvider data(data_reads, data_writes);
  10082. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10083. TestCompletionCallback callback;
  10084. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10085. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10086. rv = callback.WaitForResult();
  10087. EXPECT_THAT(rv, IsOk());
  10088. }
  10089. TEST_F(HttpNetworkTransactionTest, BuildRequest_PutContentLengthZero) {
  10090. HttpRequestInfo request;
  10091. request.method = "PUT";
  10092. request.url = GURL("http://www.example.org/");
  10093. request.traffic_annotation =
  10094. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10095. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10096. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10097. MockWrite data_writes[] = {
  10098. MockWrite(
  10099. "PUT / HTTP/1.1\r\n"
  10100. "Host: www.example.org\r\n"
  10101. "Connection: keep-alive\r\n"
  10102. "Content-Length: 0\r\n\r\n"),
  10103. };
  10104. // Lastly, the server responds with the actual content.
  10105. MockRead data_reads[] = {
  10106. MockRead("HTTP/1.0 200 OK\r\n"),
  10107. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10108. MockRead("Content-Length: 100\r\n\r\n"),
  10109. MockRead(SYNCHRONOUS, OK),
  10110. };
  10111. StaticSocketDataProvider data(data_reads, data_writes);
  10112. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10113. TestCompletionCallback callback;
  10114. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10115. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10116. rv = callback.WaitForResult();
  10117. EXPECT_THAT(rv, IsOk());
  10118. }
  10119. TEST_F(HttpNetworkTransactionTest, BuildRequest_HeadContentLengthZero) {
  10120. HttpRequestInfo request;
  10121. request.method = "HEAD";
  10122. request.url = GURL("http://www.example.org/");
  10123. request.traffic_annotation =
  10124. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10125. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10126. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10127. MockWrite data_writes[] = {
  10128. MockWrite("HEAD / HTTP/1.1\r\n"
  10129. "Host: www.example.org\r\n"
  10130. "Connection: keep-alive\r\n\r\n"),
  10131. };
  10132. // Lastly, the server responds with the actual content.
  10133. MockRead data_reads[] = {
  10134. MockRead("HTTP/1.0 200 OK\r\n"),
  10135. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10136. MockRead("Content-Length: 100\r\n\r\n"),
  10137. MockRead(SYNCHRONOUS, OK),
  10138. };
  10139. StaticSocketDataProvider data(data_reads, data_writes);
  10140. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10141. TestCompletionCallback callback;
  10142. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10143. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10144. rv = callback.WaitForResult();
  10145. EXPECT_THAT(rv, IsOk());
  10146. }
  10147. TEST_F(HttpNetworkTransactionTest, BuildRequest_CacheControlNoCache) {
  10148. HttpRequestInfo request;
  10149. request.method = "GET";
  10150. request.url = GURL("http://www.example.org/");
  10151. request.load_flags = LOAD_BYPASS_CACHE;
  10152. request.traffic_annotation =
  10153. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10154. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10155. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10156. MockWrite data_writes[] = {
  10157. MockWrite(
  10158. "GET / HTTP/1.1\r\n"
  10159. "Host: www.example.org\r\n"
  10160. "Connection: keep-alive\r\n"
  10161. "Pragma: no-cache\r\n"
  10162. "Cache-Control: no-cache\r\n\r\n"),
  10163. };
  10164. // Lastly, the server responds with the actual content.
  10165. MockRead data_reads[] = {
  10166. MockRead("HTTP/1.0 200 OK\r\n"),
  10167. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10168. MockRead("Content-Length: 100\r\n\r\n"),
  10169. MockRead(SYNCHRONOUS, OK),
  10170. };
  10171. StaticSocketDataProvider data(data_reads, data_writes);
  10172. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10173. TestCompletionCallback callback;
  10174. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10175. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10176. rv = callback.WaitForResult();
  10177. EXPECT_THAT(rv, IsOk());
  10178. }
  10179. TEST_F(HttpNetworkTransactionTest, BuildRequest_CacheControlValidateCache) {
  10180. HttpRequestInfo request;
  10181. request.method = "GET";
  10182. request.url = GURL("http://www.example.org/");
  10183. request.load_flags = LOAD_VALIDATE_CACHE;
  10184. request.traffic_annotation =
  10185. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10186. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10187. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10188. MockWrite data_writes[] = {
  10189. MockWrite(
  10190. "GET / HTTP/1.1\r\n"
  10191. "Host: www.example.org\r\n"
  10192. "Connection: keep-alive\r\n"
  10193. "Cache-Control: max-age=0\r\n\r\n"),
  10194. };
  10195. // Lastly, the server responds with the actual content.
  10196. MockRead data_reads[] = {
  10197. MockRead("HTTP/1.0 200 OK\r\n"),
  10198. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10199. MockRead("Content-Length: 100\r\n\r\n"),
  10200. MockRead(SYNCHRONOUS, OK),
  10201. };
  10202. StaticSocketDataProvider data(data_reads, data_writes);
  10203. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10204. TestCompletionCallback callback;
  10205. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10206. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10207. rv = callback.WaitForResult();
  10208. EXPECT_THAT(rv, IsOk());
  10209. }
  10210. TEST_F(HttpNetworkTransactionTest, BuildRequest_ExtraHeaders) {
  10211. HttpRequestInfo request;
  10212. request.method = "GET";
  10213. request.url = GURL("http://www.example.org/");
  10214. request.extra_headers.SetHeader("FooHeader", "Bar");
  10215. request.traffic_annotation =
  10216. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10217. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10218. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10219. MockWrite data_writes[] = {
  10220. MockWrite(
  10221. "GET / HTTP/1.1\r\n"
  10222. "Host: www.example.org\r\n"
  10223. "Connection: keep-alive\r\n"
  10224. "FooHeader: Bar\r\n\r\n"),
  10225. };
  10226. // Lastly, the server responds with the actual content.
  10227. MockRead data_reads[] = {
  10228. MockRead("HTTP/1.0 200 OK\r\n"),
  10229. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10230. MockRead("Content-Length: 100\r\n\r\n"),
  10231. MockRead(SYNCHRONOUS, OK),
  10232. };
  10233. StaticSocketDataProvider data(data_reads, data_writes);
  10234. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10235. TestCompletionCallback callback;
  10236. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10237. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10238. rv = callback.WaitForResult();
  10239. EXPECT_THAT(rv, IsOk());
  10240. }
  10241. TEST_F(HttpNetworkTransactionTest, BuildRequest_ExtraHeadersStripped) {
  10242. HttpRequestInfo request;
  10243. request.method = "GET";
  10244. request.url = GURL("http://www.example.org/");
  10245. request.extra_headers.SetHeader("referer", "www.foo.com");
  10246. request.extra_headers.SetHeader("hEllo", "Kitty");
  10247. request.extra_headers.SetHeader("FoO", "bar");
  10248. request.traffic_annotation =
  10249. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10250. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10251. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10252. MockWrite data_writes[] = {
  10253. MockWrite(
  10254. "GET / HTTP/1.1\r\n"
  10255. "Host: www.example.org\r\n"
  10256. "Connection: keep-alive\r\n"
  10257. "referer: www.foo.com\r\n"
  10258. "hEllo: Kitty\r\n"
  10259. "FoO: bar\r\n\r\n"),
  10260. };
  10261. // Lastly, the server responds with the actual content.
  10262. MockRead data_reads[] = {
  10263. MockRead("HTTP/1.0 200 OK\r\n"),
  10264. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10265. MockRead("Content-Length: 100\r\n\r\n"),
  10266. MockRead(SYNCHRONOUS, OK),
  10267. };
  10268. StaticSocketDataProvider data(data_reads, data_writes);
  10269. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10270. TestCompletionCallback callback;
  10271. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10272. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10273. rv = callback.WaitForResult();
  10274. EXPECT_THAT(rv, IsOk());
  10275. }
  10276. TEST_F(HttpNetworkTransactionTest, SOCKS4_HTTP_GET) {
  10277. HttpRequestInfo request;
  10278. request.method = "GET";
  10279. request.url = GURL("http://www.example.org/");
  10280. request.traffic_annotation =
  10281. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10282. session_deps_.proxy_resolution_service =
  10283. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  10284. "SOCKS myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS);
  10285. session_deps_.net_log = net::NetLog::Get();
  10286. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10287. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10288. char write_buffer[] = { 0x04, 0x01, 0x00, 0x50, 127, 0, 0, 1, 0 };
  10289. char read_buffer[] = { 0x00, 0x5A, 0x00, 0x00, 0, 0, 0, 0 };
  10290. MockWrite data_writes[] = {
  10291. MockWrite(ASYNC, write_buffer, std::size(write_buffer)),
  10292. MockWrite("GET / HTTP/1.1\r\n"
  10293. "Host: www.example.org\r\n"
  10294. "Connection: keep-alive\r\n\r\n")};
  10295. MockRead data_reads[] = {
  10296. MockRead(ASYNC, read_buffer, std::size(read_buffer)),
  10297. MockRead("HTTP/1.0 200 OK\r\n"),
  10298. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"),
  10299. MockRead("Payload"), MockRead(SYNCHRONOUS, OK)};
  10300. StaticSocketDataProvider data(data_reads, data_writes);
  10301. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10302. TestCompletionCallback callback;
  10303. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10304. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10305. rv = callback.WaitForResult();
  10306. EXPECT_THAT(rv, IsOk());
  10307. const HttpResponseInfo* response = trans.GetResponseInfo();
  10308. ASSERT_TRUE(response);
  10309. EXPECT_EQ(ProxyServer::SCHEME_SOCKS4, response->proxy_server.scheme());
  10310. LoadTimingInfo load_timing_info;
  10311. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  10312. TestLoadTimingNotReusedWithPac(load_timing_info,
  10313. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  10314. std::string response_text;
  10315. rv = ReadTransaction(&trans, &response_text);
  10316. EXPECT_THAT(rv, IsOk());
  10317. EXPECT_EQ("Payload", response_text);
  10318. }
  10319. TEST_F(HttpNetworkTransactionTest, SOCKS4_SSL_GET) {
  10320. HttpRequestInfo request;
  10321. request.method = "GET";
  10322. request.url = GURL("https://www.example.org/");
  10323. request.traffic_annotation =
  10324. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10325. session_deps_.proxy_resolution_service =
  10326. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  10327. "SOCKS myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS);
  10328. session_deps_.net_log = net::NetLog::Get();
  10329. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10330. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10331. unsigned char write_buffer[] = { 0x04, 0x01, 0x01, 0xBB, 127, 0, 0, 1, 0 };
  10332. unsigned char read_buffer[] = { 0x00, 0x5A, 0x00, 0x00, 0, 0, 0, 0 };
  10333. MockWrite data_writes[] = {
  10334. MockWrite(ASYNC, reinterpret_cast<char*>(write_buffer),
  10335. std::size(write_buffer)),
  10336. MockWrite("GET / HTTP/1.1\r\n"
  10337. "Host: www.example.org\r\n"
  10338. "Connection: keep-alive\r\n\r\n")};
  10339. MockRead data_reads[] = {
  10340. MockRead(ASYNC, reinterpret_cast<char*>(read_buffer),
  10341. std::size(read_buffer)),
  10342. MockRead("HTTP/1.0 200 OK\r\n"),
  10343. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"),
  10344. MockRead("Payload"), MockRead(SYNCHRONOUS, OK)};
  10345. StaticSocketDataProvider data(data_reads, data_writes);
  10346. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10347. SSLSocketDataProvider ssl(ASYNC, OK);
  10348. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  10349. TestCompletionCallback callback;
  10350. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10351. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10352. rv = callback.WaitForResult();
  10353. EXPECT_THAT(rv, IsOk());
  10354. LoadTimingInfo load_timing_info;
  10355. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  10356. TestLoadTimingNotReusedWithPac(load_timing_info,
  10357. CONNECT_TIMING_HAS_SSL_TIMES);
  10358. const HttpResponseInfo* response = trans.GetResponseInfo();
  10359. ASSERT_TRUE(response);
  10360. EXPECT_EQ(ProxyServer::SCHEME_SOCKS4, response->proxy_server.scheme());
  10361. std::string response_text;
  10362. rv = ReadTransaction(&trans, &response_text);
  10363. EXPECT_THAT(rv, IsOk());
  10364. EXPECT_EQ("Payload", response_text);
  10365. }
  10366. TEST_F(HttpNetworkTransactionTest, SOCKS4_HTTP_GET_no_PAC) {
  10367. HttpRequestInfo request;
  10368. request.method = "GET";
  10369. request.url = GURL("http://www.example.org/");
  10370. request.traffic_annotation =
  10371. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10372. session_deps_.proxy_resolution_service =
  10373. ConfiguredProxyResolutionService::CreateFixedForTest(
  10374. "socks4://myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS);
  10375. session_deps_.net_log = net::NetLog::Get();
  10376. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10377. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10378. char write_buffer[] = { 0x04, 0x01, 0x00, 0x50, 127, 0, 0, 1, 0 };
  10379. char read_buffer[] = { 0x00, 0x5A, 0x00, 0x00, 0, 0, 0, 0 };
  10380. MockWrite data_writes[] = {
  10381. MockWrite(ASYNC, write_buffer, std::size(write_buffer)),
  10382. MockWrite("GET / HTTP/1.1\r\n"
  10383. "Host: www.example.org\r\n"
  10384. "Connection: keep-alive\r\n\r\n")};
  10385. MockRead data_reads[] = {
  10386. MockRead(ASYNC, read_buffer, std::size(read_buffer)),
  10387. MockRead("HTTP/1.0 200 OK\r\n"),
  10388. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"),
  10389. MockRead("Payload"), MockRead(SYNCHRONOUS, OK)};
  10390. StaticSocketDataProvider data(data_reads, data_writes);
  10391. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10392. TestCompletionCallback callback;
  10393. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10394. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10395. rv = callback.WaitForResult();
  10396. EXPECT_THAT(rv, IsOk());
  10397. const HttpResponseInfo* response = trans.GetResponseInfo();
  10398. ASSERT_TRUE(response);
  10399. LoadTimingInfo load_timing_info;
  10400. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  10401. TestLoadTimingNotReused(load_timing_info,
  10402. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  10403. std::string response_text;
  10404. rv = ReadTransaction(&trans, &response_text);
  10405. EXPECT_THAT(rv, IsOk());
  10406. EXPECT_EQ("Payload", response_text);
  10407. }
  10408. TEST_F(HttpNetworkTransactionTest, SOCKS5_HTTP_GET) {
  10409. HttpRequestInfo request;
  10410. request.method = "GET";
  10411. request.url = GURL("http://www.example.org/");
  10412. request.traffic_annotation =
  10413. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10414. session_deps_.proxy_resolution_service =
  10415. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  10416. "SOCKS5 myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS);
  10417. session_deps_.net_log = net::NetLog::Get();
  10418. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10419. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10420. const char kSOCKS5ExampleOkRequest[] = {
  10421. 0x05, // Version
  10422. 0x01, // Command (CONNECT)
  10423. 0x00, // Reserved.
  10424. 0x03, // Address type (DOMAINNAME).
  10425. 0x0F, // Length of domain (15)
  10426. 'w', 'w', 'w', '.', 'e', 'x',
  10427. 'a', 'm', 'p', 'l', 'e', // Domain string
  10428. '.', 'o', 'r', 'g', 0x00, 0x50, // 16-bit port (80)
  10429. };
  10430. MockWrite data_writes[] = {
  10431. MockWrite(ASYNC, kSOCKS5GreetRequest, kSOCKS5GreetRequestLength),
  10432. MockWrite(ASYNC, kSOCKS5ExampleOkRequest,
  10433. std::size(kSOCKS5ExampleOkRequest)),
  10434. MockWrite("GET / HTTP/1.1\r\n"
  10435. "Host: www.example.org\r\n"
  10436. "Connection: keep-alive\r\n\r\n")};
  10437. MockRead data_reads[] = {
  10438. MockRead(ASYNC, kSOCKS5GreetResponse, kSOCKS5GreetResponseLength),
  10439. MockRead(ASYNC, kSOCKS5OkResponse, kSOCKS5OkResponseLength),
  10440. MockRead("HTTP/1.0 200 OK\r\n"),
  10441. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"),
  10442. MockRead("Payload"),
  10443. MockRead(SYNCHRONOUS, OK)};
  10444. StaticSocketDataProvider data(data_reads, data_writes);
  10445. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10446. TestCompletionCallback callback;
  10447. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10448. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10449. rv = callback.WaitForResult();
  10450. EXPECT_THAT(rv, IsOk());
  10451. const HttpResponseInfo* response = trans.GetResponseInfo();
  10452. ASSERT_TRUE(response);
  10453. EXPECT_EQ(ProxyServer::SCHEME_SOCKS5, response->proxy_server.scheme());
  10454. LoadTimingInfo load_timing_info;
  10455. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  10456. TestLoadTimingNotReusedWithPac(load_timing_info,
  10457. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  10458. std::string response_text;
  10459. rv = ReadTransaction(&trans, &response_text);
  10460. EXPECT_THAT(rv, IsOk());
  10461. EXPECT_EQ("Payload", response_text);
  10462. }
  10463. TEST_F(HttpNetworkTransactionTest, SOCKS5_SSL_GET) {
  10464. HttpRequestInfo request;
  10465. request.method = "GET";
  10466. request.url = GURL("https://www.example.org/");
  10467. request.traffic_annotation =
  10468. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10469. session_deps_.proxy_resolution_service =
  10470. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  10471. "SOCKS5 myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS);
  10472. session_deps_.net_log = net::NetLog::Get();
  10473. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10474. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10475. const unsigned char kSOCKS5ExampleOkRequest[] = {
  10476. 0x05, // Version
  10477. 0x01, // Command (CONNECT)
  10478. 0x00, // Reserved.
  10479. 0x03, // Address type (DOMAINNAME).
  10480. 0x0F, // Length of domain (15)
  10481. 'w', 'w', 'w', '.', 'e', 'x',
  10482. 'a', 'm', 'p', 'l', 'e', // Domain string
  10483. '.', 'o', 'r', 'g', 0x01, 0xBB, // 16-bit port (443)
  10484. };
  10485. const char kSOCKS5SslOkResponse[] = {0x05, 0x00, 0x00, 0x01, 0,
  10486. 0, 0, 0, 0x00, 0x00};
  10487. MockWrite data_writes[] = {
  10488. MockWrite(ASYNC, kSOCKS5GreetRequest, kSOCKS5GreetRequestLength),
  10489. MockWrite(ASYNC, reinterpret_cast<const char*>(kSOCKS5ExampleOkRequest),
  10490. std::size(kSOCKS5ExampleOkRequest)),
  10491. MockWrite("GET / HTTP/1.1\r\n"
  10492. "Host: www.example.org\r\n"
  10493. "Connection: keep-alive\r\n\r\n")};
  10494. MockRead data_reads[] = {
  10495. MockRead(ASYNC, kSOCKS5GreetResponse, kSOCKS5GreetResponseLength),
  10496. MockRead(ASYNC, kSOCKS5SslOkResponse, std::size(kSOCKS5SslOkResponse)),
  10497. MockRead("HTTP/1.0 200 OK\r\n"),
  10498. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"),
  10499. MockRead("Payload"),
  10500. MockRead(SYNCHRONOUS, OK)};
  10501. StaticSocketDataProvider data(data_reads, data_writes);
  10502. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10503. SSLSocketDataProvider ssl(ASYNC, OK);
  10504. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  10505. TestCompletionCallback callback;
  10506. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10507. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10508. rv = callback.WaitForResult();
  10509. EXPECT_THAT(rv, IsOk());
  10510. const HttpResponseInfo* response = trans.GetResponseInfo();
  10511. ASSERT_TRUE(response);
  10512. EXPECT_EQ(ProxyServer::SCHEME_SOCKS5, response->proxy_server.scheme());
  10513. LoadTimingInfo load_timing_info;
  10514. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  10515. TestLoadTimingNotReusedWithPac(load_timing_info,
  10516. CONNECT_TIMING_HAS_SSL_TIMES);
  10517. std::string response_text;
  10518. rv = ReadTransaction(&trans, &response_text);
  10519. EXPECT_THAT(rv, IsOk());
  10520. EXPECT_EQ("Payload", response_text);
  10521. }
  10522. namespace {
  10523. // Tests that for connection endpoints the group ids are correctly set.
  10524. struct GroupIdTest {
  10525. std::string proxy_server;
  10526. std::string url;
  10527. ClientSocketPool::GroupId expected_group_id;
  10528. bool ssl;
  10529. };
  10530. std::unique_ptr<HttpNetworkSession> SetupSessionForGroupIdTests(
  10531. SpdySessionDependencies* session_deps_) {
  10532. std::unique_ptr<HttpNetworkSession> session(CreateSession(session_deps_));
  10533. HttpServerProperties* http_server_properties =
  10534. session->http_server_properties();
  10535. AlternativeService alternative_service(kProtoHTTP2, "", 444);
  10536. base::Time expiration = base::Time::Now() + base::Days(1);
  10537. http_server_properties->SetHttp2AlternativeService(
  10538. url::SchemeHostPort("https", "host.with.alternate", 443),
  10539. NetworkIsolationKey(), alternative_service, expiration);
  10540. return session;
  10541. }
  10542. int GroupIdTransactionHelper(const std::string& url,
  10543. HttpNetworkSession* session) {
  10544. HttpRequestInfo request;
  10545. request.method = "GET";
  10546. request.url = GURL(url);
  10547. request.traffic_annotation =
  10548. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10549. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session);
  10550. TestCompletionCallback callback;
  10551. // We do not complete this request, the dtor will clean the transaction up.
  10552. return trans.Start(&request, callback.callback(), NetLogWithSource());
  10553. }
  10554. } // namespace
  10555. TEST_F(HttpNetworkTransactionTest, GroupIdForDirectConnections) {
  10556. const GroupIdTest tests[] = {
  10557. {
  10558. "", // unused
  10559. "http://www.example.org/direct",
  10560. ClientSocketPool::GroupId(
  10561. url::SchemeHostPort(url::kHttpScheme, "www.example.org", 80),
  10562. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10563. SecureDnsPolicy::kAllow),
  10564. false,
  10565. },
  10566. {
  10567. "", // unused
  10568. "http://[2001:1418:13:1::25]/direct",
  10569. ClientSocketPool::GroupId(
  10570. url::SchemeHostPort(url::kHttpScheme, "[2001:1418:13:1::25]", 80),
  10571. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10572. SecureDnsPolicy::kAllow),
  10573. false,
  10574. },
  10575. // SSL Tests
  10576. {
  10577. "", // unused
  10578. "https://www.example.org/direct_ssl",
  10579. ClientSocketPool::GroupId(
  10580. url::SchemeHostPort(url::kHttpsScheme, "www.example.org", 443),
  10581. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10582. SecureDnsPolicy::kAllow),
  10583. true,
  10584. },
  10585. {
  10586. "", // unused
  10587. "https://[2001:1418:13:1::25]/direct",
  10588. ClientSocketPool::GroupId(
  10589. url::SchemeHostPort(url::kHttpsScheme, "[2001:1418:13:1::25]",
  10590. 443),
  10591. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10592. SecureDnsPolicy::kAllow),
  10593. true,
  10594. },
  10595. {
  10596. "", // unused
  10597. "https://host.with.alternate/direct",
  10598. ClientSocketPool::GroupId(
  10599. url::SchemeHostPort(url::kHttpsScheme, "host.with.alternate",
  10600. 443),
  10601. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10602. SecureDnsPolicy::kAllow),
  10603. true,
  10604. },
  10605. };
  10606. for (const auto& test : tests) {
  10607. session_deps_.proxy_resolution_service =
  10608. ConfiguredProxyResolutionService::CreateFixedForTest(
  10609. test.proxy_server, TRAFFIC_ANNOTATION_FOR_TESTS);
  10610. std::unique_ptr<HttpNetworkSession> session(
  10611. SetupSessionForGroupIdTests(&session_deps_));
  10612. HttpNetworkSessionPeer peer(session.get());
  10613. auto transport_conn_pool =
  10614. std::make_unique<CaptureGroupIdTransportSocketPool>(
  10615. &dummy_connect_job_params_);
  10616. auto* transport_conn_pool_ptr = transport_conn_pool.get();
  10617. auto mock_pool_manager = std::make_unique<MockClientSocketPoolManager>();
  10618. mock_pool_manager->SetSocketPool(ProxyServer::Direct(),
  10619. std::move(transport_conn_pool));
  10620. peer.SetClientSocketPoolManager(std::move(mock_pool_manager));
  10621. EXPECT_EQ(ERR_IO_PENDING,
  10622. GroupIdTransactionHelper(test.url, session.get()));
  10623. EXPECT_EQ(test.expected_group_id,
  10624. transport_conn_pool_ptr->last_group_id_received());
  10625. EXPECT_TRUE(transport_conn_pool_ptr->socket_requested());
  10626. }
  10627. }
  10628. TEST_F(HttpNetworkTransactionTest, GroupIdForHTTPProxyConnections) {
  10629. const GroupIdTest tests[] = {
  10630. {
  10631. "http_proxy",
  10632. "http://www.example.org/http_proxy_normal",
  10633. ClientSocketPool::GroupId(
  10634. url::SchemeHostPort(url::kHttpScheme, "www.example.org", 80),
  10635. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10636. SecureDnsPolicy::kAllow),
  10637. false,
  10638. },
  10639. // SSL Tests
  10640. {
  10641. "http_proxy",
  10642. "https://www.example.org/http_connect_ssl",
  10643. ClientSocketPool::GroupId(
  10644. url::SchemeHostPort(url::kHttpsScheme, "www.example.org", 443),
  10645. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10646. SecureDnsPolicy::kAllow),
  10647. true,
  10648. },
  10649. {
  10650. "http_proxy",
  10651. "https://host.with.alternate/direct",
  10652. ClientSocketPool::GroupId(
  10653. url::SchemeHostPort(url::kHttpsScheme, "host.with.alternate",
  10654. 443),
  10655. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10656. SecureDnsPolicy::kAllow),
  10657. true,
  10658. },
  10659. };
  10660. for (const auto& test : tests) {
  10661. session_deps_.proxy_resolution_service =
  10662. ConfiguredProxyResolutionService::CreateFixedForTest(
  10663. test.proxy_server, TRAFFIC_ANNOTATION_FOR_TESTS);
  10664. std::unique_ptr<HttpNetworkSession> session(
  10665. SetupSessionForGroupIdTests(&session_deps_));
  10666. HttpNetworkSessionPeer peer(session.get());
  10667. ProxyServer proxy_server(ProxyServer::SCHEME_HTTP,
  10668. HostPortPair("http_proxy", 80));
  10669. auto http_proxy_pool = std::make_unique<CaptureGroupIdTransportSocketPool>(
  10670. &dummy_connect_job_params_);
  10671. auto* http_proxy_pool_ptr = http_proxy_pool.get();
  10672. auto mock_pool_manager = std::make_unique<MockClientSocketPoolManager>();
  10673. mock_pool_manager->SetSocketPool(proxy_server, std::move(http_proxy_pool));
  10674. peer.SetClientSocketPoolManager(std::move(mock_pool_manager));
  10675. EXPECT_EQ(ERR_IO_PENDING,
  10676. GroupIdTransactionHelper(test.url, session.get()));
  10677. EXPECT_EQ(test.expected_group_id,
  10678. http_proxy_pool_ptr->last_group_id_received());
  10679. }
  10680. }
  10681. TEST_F(HttpNetworkTransactionTest, GroupIdForSOCKSConnections) {
  10682. const GroupIdTest tests[] = {
  10683. {
  10684. "socks4://socks_proxy:1080",
  10685. "http://www.example.org/socks4_direct",
  10686. ClientSocketPool::GroupId(
  10687. url::SchemeHostPort(url::kHttpScheme, "www.example.org", 80),
  10688. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10689. SecureDnsPolicy::kAllow),
  10690. false,
  10691. },
  10692. {
  10693. "socks5://socks_proxy:1080",
  10694. "http://www.example.org/socks5_direct",
  10695. ClientSocketPool::GroupId(
  10696. url::SchemeHostPort(url::kHttpScheme, "www.example.org", 80),
  10697. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10698. SecureDnsPolicy::kAllow),
  10699. false,
  10700. },
  10701. // SSL Tests
  10702. {
  10703. "socks4://socks_proxy:1080",
  10704. "https://www.example.org/socks4_ssl",
  10705. ClientSocketPool::GroupId(
  10706. url::SchemeHostPort(url::kHttpsScheme, "www.example.org", 443),
  10707. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10708. SecureDnsPolicy::kAllow),
  10709. true,
  10710. },
  10711. {
  10712. "socks5://socks_proxy:1080",
  10713. "https://www.example.org/socks5_ssl",
  10714. ClientSocketPool::GroupId(
  10715. url::SchemeHostPort(url::kHttpsScheme, "www.example.org", 443),
  10716. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10717. SecureDnsPolicy::kAllow),
  10718. true,
  10719. },
  10720. {
  10721. "socks4://socks_proxy:1080",
  10722. "https://host.with.alternate/direct",
  10723. ClientSocketPool::GroupId(
  10724. url::SchemeHostPort(url::kHttpsScheme, "host.with.alternate",
  10725. 443),
  10726. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  10727. SecureDnsPolicy::kAllow),
  10728. true,
  10729. },
  10730. };
  10731. for (const auto& test : tests) {
  10732. session_deps_.proxy_resolution_service =
  10733. ConfiguredProxyResolutionService::CreateFixedForTest(
  10734. test.proxy_server, TRAFFIC_ANNOTATION_FOR_TESTS);
  10735. std::unique_ptr<HttpNetworkSession> session(
  10736. SetupSessionForGroupIdTests(&session_deps_));
  10737. HttpNetworkSessionPeer peer(session.get());
  10738. ProxyServer proxy_server(
  10739. ProxyUriToProxyServer(test.proxy_server, ProxyServer::SCHEME_HTTP));
  10740. ASSERT_TRUE(proxy_server.is_valid());
  10741. auto socks_conn_pool = std::make_unique<CaptureGroupIdTransportSocketPool>(
  10742. &dummy_connect_job_params_);
  10743. auto* socks_conn_pool_ptr = socks_conn_pool.get();
  10744. auto mock_pool_manager = std::make_unique<MockClientSocketPoolManager>();
  10745. mock_pool_manager->SetSocketPool(proxy_server, std::move(socks_conn_pool));
  10746. peer.SetClientSocketPoolManager(std::move(mock_pool_manager));
  10747. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10748. EXPECT_EQ(ERR_IO_PENDING,
  10749. GroupIdTransactionHelper(test.url, session.get()));
  10750. EXPECT_EQ(test.expected_group_id,
  10751. socks_conn_pool_ptr->last_group_id_received());
  10752. }
  10753. }
  10754. TEST_F(HttpNetworkTransactionTest, ReconsiderProxyAfterFailedConnection) {
  10755. HttpRequestInfo request;
  10756. request.method = "GET";
  10757. request.url = GURL("http://www.example.org/");
  10758. request.traffic_annotation =
  10759. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10760. session_deps_.proxy_resolution_service =
  10761. ConfiguredProxyResolutionService::CreateFixedForTest(
  10762. "myproxy:70;foobar:80", TRAFFIC_ANNOTATION_FOR_TESTS);
  10763. // This simulates failure resolving all hostnames; that means we will fail
  10764. // connecting to both proxies (myproxy:70 and foobar:80).
  10765. session_deps_.host_resolver->rules()->AddSimulatedFailure("*");
  10766. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10767. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10768. TestCompletionCallback callback;
  10769. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10770. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10771. rv = callback.WaitForResult();
  10772. EXPECT_THAT(rv, IsError(ERR_PROXY_CONNECTION_FAILED));
  10773. }
  10774. // Make sure we can handle an error when writing the request.
  10775. TEST_F(HttpNetworkTransactionTest, RequestWriteError) {
  10776. HttpRequestInfo request;
  10777. request.method = "GET";
  10778. request.url = GURL("http://www.foo.com/");
  10779. request.traffic_annotation =
  10780. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10781. MockWrite write_failure[] = {
  10782. MockWrite(ASYNC, ERR_CONNECTION_RESET),
  10783. };
  10784. StaticSocketDataProvider data(base::span<MockRead>(), write_failure);
  10785. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10786. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10787. TestCompletionCallback callback;
  10788. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10789. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10790. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10791. rv = callback.WaitForResult();
  10792. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  10793. IPEndPoint endpoint;
  10794. EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint));
  10795. EXPECT_LT(0u, endpoint.address().size());
  10796. }
  10797. // Check that a connection closed after the start of the headers finishes ok.
  10798. TEST_F(HttpNetworkTransactionTest, ConnectionClosedAfterStartOfHeaders) {
  10799. HttpRequestInfo request;
  10800. request.method = "GET";
  10801. request.url = GURL("http://www.foo.com/");
  10802. request.traffic_annotation =
  10803. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10804. MockRead data_reads[] = {
  10805. MockRead("HTTP/1."),
  10806. MockRead(SYNCHRONOUS, OK),
  10807. };
  10808. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  10809. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10810. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10811. TestCompletionCallback callback;
  10812. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10813. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10814. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10815. rv = callback.WaitForResult();
  10816. EXPECT_THAT(rv, IsOk());
  10817. const HttpResponseInfo* response = trans.GetResponseInfo();
  10818. ASSERT_TRUE(response);
  10819. EXPECT_TRUE(response->headers);
  10820. EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine());
  10821. std::string response_data;
  10822. rv = ReadTransaction(&trans, &response_data);
  10823. EXPECT_THAT(rv, IsOk());
  10824. EXPECT_EQ("", response_data);
  10825. IPEndPoint endpoint;
  10826. EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint));
  10827. EXPECT_LT(0u, endpoint.address().size());
  10828. }
  10829. // Make sure that a dropped connection while draining the body for auth
  10830. // restart does the right thing.
  10831. TEST_F(HttpNetworkTransactionTest, DrainResetOK) {
  10832. HttpRequestInfo request;
  10833. request.method = "GET";
  10834. request.url = GURL("http://www.example.org/");
  10835. request.traffic_annotation =
  10836. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10837. MockWrite data_writes1[] = {
  10838. MockWrite(
  10839. "GET / HTTP/1.1\r\n"
  10840. "Host: www.example.org\r\n"
  10841. "Connection: keep-alive\r\n\r\n"),
  10842. };
  10843. MockRead data_reads1[] = {
  10844. MockRead("HTTP/1.1 401 Unauthorized\r\n"),
  10845. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  10846. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10847. MockRead("Content-Length: 14\r\n\r\n"),
  10848. MockRead("Unauth"),
  10849. MockRead(ASYNC, ERR_CONNECTION_RESET),
  10850. };
  10851. StaticSocketDataProvider data1(data_reads1, data_writes1);
  10852. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  10853. // After calling trans.RestartWithAuth(), this is the request we should
  10854. // be issuing -- the final header line contains the credentials.
  10855. MockWrite data_writes2[] = {
  10856. MockWrite(
  10857. "GET / HTTP/1.1\r\n"
  10858. "Host: www.example.org\r\n"
  10859. "Connection: keep-alive\r\n"
  10860. "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  10861. };
  10862. // Lastly, the server responds with the actual content.
  10863. MockRead data_reads2[] = {
  10864. MockRead("HTTP/1.1 200 OK\r\n"),
  10865. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  10866. MockRead("Content-Length: 100\r\n\r\n"),
  10867. MockRead(SYNCHRONOUS, OK),
  10868. };
  10869. StaticSocketDataProvider data2(data_reads2, data_writes2);
  10870. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  10871. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10872. TestCompletionCallback callback1;
  10873. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10874. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  10875. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10876. rv = callback1.WaitForResult();
  10877. EXPECT_THAT(rv, IsOk());
  10878. const HttpResponseInfo* response = trans.GetResponseInfo();
  10879. ASSERT_TRUE(response);
  10880. EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge));
  10881. TestCompletionCallback callback2;
  10882. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  10883. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10884. rv = callback2.WaitForResult();
  10885. EXPECT_THAT(rv, IsOk());
  10886. response = trans.GetResponseInfo();
  10887. ASSERT_TRUE(response);
  10888. EXPECT_FALSE(response->auth_challenge.has_value());
  10889. EXPECT_EQ(100, response->headers->GetContentLength());
  10890. }
  10891. // Test HTTPS connections going through a proxy that sends extra data.
  10892. TEST_F(HttpNetworkTransactionTest, HTTPSViaProxyWithExtraData) {
  10893. session_deps_.proxy_resolution_service =
  10894. ConfiguredProxyResolutionService::CreateFixedForTest(
  10895. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  10896. HttpRequestInfo request;
  10897. request.method = "GET";
  10898. request.url = GURL("https://www.example.org/");
  10899. request.traffic_annotation =
  10900. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10901. MockRead proxy_reads[] = {
  10902. MockRead("HTTP/1.0 200 Connected\r\n\r\nExtra data"),
  10903. MockRead(SYNCHRONOUS, OK)
  10904. };
  10905. StaticSocketDataProvider data(proxy_reads, base::span<MockWrite>());
  10906. SSLSocketDataProvider ssl(ASYNC, OK);
  10907. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10908. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  10909. TestCompletionCallback callback;
  10910. session_deps_.socket_factory->ResetNextMockIndexes();
  10911. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10912. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10913. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10914. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10915. rv = callback.WaitForResult();
  10916. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  10917. }
  10918. TEST_F(HttpNetworkTransactionTest, LargeContentLengthThenClose) {
  10919. HttpRequestInfo request;
  10920. request.method = "GET";
  10921. request.url = GURL("http://www.example.org/");
  10922. request.traffic_annotation =
  10923. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10924. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10925. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10926. MockRead data_reads[] = {
  10927. MockRead("HTTP/1.0 200 OK\r\nContent-Length:6719476739\r\n\r\n"),
  10928. MockRead(SYNCHRONOUS, OK),
  10929. };
  10930. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  10931. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10932. TestCompletionCallback callback;
  10933. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10934. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10935. EXPECT_THAT(callback.WaitForResult(), IsOk());
  10936. const HttpResponseInfo* response = trans.GetResponseInfo();
  10937. ASSERT_TRUE(response);
  10938. EXPECT_TRUE(response->headers);
  10939. EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine());
  10940. std::string response_data;
  10941. rv = ReadTransaction(&trans, &response_data);
  10942. EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH));
  10943. }
  10944. TEST_F(HttpNetworkTransactionTest, UploadFileSmallerThanLength) {
  10945. base::FilePath temp_file_path;
  10946. ASSERT_TRUE(base::CreateTemporaryFile(&temp_file_path));
  10947. const uint64_t kFakeSize = 100000; // file is actually blank
  10948. UploadFileElementReader::ScopedOverridingContentLengthForTests
  10949. overriding_content_length(kFakeSize);
  10950. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  10951. element_readers.push_back(std::make_unique<UploadFileElementReader>(
  10952. base::ThreadTaskRunnerHandle::Get().get(), temp_file_path, 0,
  10953. std::numeric_limits<uint64_t>::max(), base::Time()));
  10954. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  10955. HttpRequestInfo request;
  10956. request.method = "POST";
  10957. request.url = GURL("http://www.example.org/upload");
  10958. request.upload_data_stream = &upload_data_stream;
  10959. request.traffic_annotation =
  10960. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10961. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  10962. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  10963. MockRead data_reads[] = {
  10964. MockRead("HTTP/1.0 200 OK\r\n\r\n"),
  10965. MockRead("hello world"),
  10966. MockRead(SYNCHRONOUS, OK),
  10967. };
  10968. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  10969. session_deps_.socket_factory->AddSocketDataProvider(&data);
  10970. TestCompletionCallback callback;
  10971. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  10972. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  10973. rv = callback.WaitForResult();
  10974. EXPECT_THAT(rv, IsError(ERR_UPLOAD_FILE_CHANGED));
  10975. const HttpResponseInfo* response = trans.GetResponseInfo();
  10976. ASSERT_TRUE(response);
  10977. EXPECT_FALSE(response->headers);
  10978. base::DeleteFile(temp_file_path);
  10979. }
  10980. TEST_F(HttpNetworkTransactionTest, UploadUnreadableFile) {
  10981. base::FilePath temp_file;
  10982. ASSERT_TRUE(base::CreateTemporaryFile(&temp_file));
  10983. std::string temp_file_content("Unreadable file.");
  10984. ASSERT_EQ(static_cast<int>(temp_file_content.length()),
  10985. base::WriteFile(temp_file, temp_file_content.c_str(),
  10986. temp_file_content.length()));
  10987. ASSERT_TRUE(base::MakeFileUnreadable(temp_file));
  10988. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  10989. element_readers.push_back(std::make_unique<UploadFileElementReader>(
  10990. base::ThreadTaskRunnerHandle::Get().get(), temp_file, 0,
  10991. std::numeric_limits<uint64_t>::max(), base::Time()));
  10992. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  10993. HttpRequestInfo request;
  10994. request.method = "POST";
  10995. request.url = GURL("http://www.example.org/upload");
  10996. request.upload_data_stream = &upload_data_stream;
  10997. request.traffic_annotation =
  10998. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  10999. // If we try to upload an unreadable file, the transaction should fail.
  11000. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11001. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11002. StaticSocketDataProvider data;
  11003. session_deps_.socket_factory->AddSocketDataProvider(&data);
  11004. TestCompletionCallback callback;
  11005. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11006. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11007. rv = callback.WaitForResult();
  11008. EXPECT_THAT(rv, IsError(ERR_ACCESS_DENIED));
  11009. base::DeleteFile(temp_file);
  11010. }
  11011. TEST_F(HttpNetworkTransactionTest, CancelDuringInitRequestBody) {
  11012. class FakeUploadElementReader : public UploadElementReader {
  11013. public:
  11014. FakeUploadElementReader() = default;
  11015. ~FakeUploadElementReader() override = default;
  11016. CompletionOnceCallback TakeCallback() { return std::move(callback_); }
  11017. // UploadElementReader overrides:
  11018. int Init(CompletionOnceCallback callback) override {
  11019. callback_ = std::move(callback);
  11020. return ERR_IO_PENDING;
  11021. }
  11022. uint64_t GetContentLength() const override { return 0; }
  11023. uint64_t BytesRemaining() const override { return 0; }
  11024. int Read(IOBuffer* buf,
  11025. int buf_length,
  11026. CompletionOnceCallback callback) override {
  11027. return ERR_FAILED;
  11028. }
  11029. private:
  11030. CompletionOnceCallback callback_;
  11031. };
  11032. auto fake_reader = std::make_unique<FakeUploadElementReader>();
  11033. auto* fake_reader_ptr = fake_reader.get();
  11034. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  11035. element_readers.push_back(std::move(fake_reader));
  11036. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  11037. HttpRequestInfo request;
  11038. request.method = "POST";
  11039. request.url = GURL("http://www.example.org/upload");
  11040. request.upload_data_stream = &upload_data_stream;
  11041. request.traffic_annotation =
  11042. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11043. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11044. auto trans =
  11045. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  11046. StaticSocketDataProvider data;
  11047. session_deps_.socket_factory->AddSocketDataProvider(&data);
  11048. TestCompletionCallback callback;
  11049. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  11050. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11051. base::RunLoop().RunUntilIdle();
  11052. // Transaction is pending on request body initialization.
  11053. CompletionOnceCallback init_callback = fake_reader_ptr->TakeCallback();
  11054. ASSERT_FALSE(init_callback.is_null());
  11055. // Return Init()'s result after the transaction gets destroyed.
  11056. trans.reset();
  11057. std::move(init_callback).Run(OK); // Should not crash.
  11058. }
  11059. // Tests that changes to Auth realms are treated like auth rejections.
  11060. TEST_F(HttpNetworkTransactionTest, ChangeAuthRealms) {
  11061. HttpRequestInfo request;
  11062. request.method = "GET";
  11063. request.url = GURL("http://www.example.org/");
  11064. request.traffic_annotation =
  11065. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11066. // First transaction will request a resource and receive a Basic challenge
  11067. // with realm="first_realm".
  11068. MockWrite data_writes1[] = {
  11069. MockWrite(
  11070. "GET / HTTP/1.1\r\n"
  11071. "Host: www.example.org\r\n"
  11072. "Connection: keep-alive\r\n"
  11073. "\r\n"),
  11074. };
  11075. MockRead data_reads1[] = {
  11076. MockRead("HTTP/1.1 401 Unauthorized\r\n"
  11077. "WWW-Authenticate: Basic realm=\"first_realm\"\r\n"
  11078. "\r\n"),
  11079. };
  11080. // After calling trans.RestartWithAuth(), provide an Authentication header
  11081. // for first_realm. The server will reject and provide a challenge with
  11082. // second_realm.
  11083. MockWrite data_writes2[] = {
  11084. MockWrite(
  11085. "GET / HTTP/1.1\r\n"
  11086. "Host: www.example.org\r\n"
  11087. "Connection: keep-alive\r\n"
  11088. "Authorization: Basic Zmlyc3Q6YmF6\r\n"
  11089. "\r\n"),
  11090. };
  11091. MockRead data_reads2[] = {
  11092. MockRead("HTTP/1.1 401 Unauthorized\r\n"
  11093. "WWW-Authenticate: Basic realm=\"second_realm\"\r\n"
  11094. "\r\n"),
  11095. };
  11096. // This again fails, and goes back to first_realm. Make sure that the
  11097. // entry is removed from cache.
  11098. MockWrite data_writes3[] = {
  11099. MockWrite(
  11100. "GET / HTTP/1.1\r\n"
  11101. "Host: www.example.org\r\n"
  11102. "Connection: keep-alive\r\n"
  11103. "Authorization: Basic c2Vjb25kOmZvdQ==\r\n"
  11104. "\r\n"),
  11105. };
  11106. MockRead data_reads3[] = {
  11107. MockRead("HTTP/1.1 401 Unauthorized\r\n"
  11108. "WWW-Authenticate: Basic realm=\"first_realm\"\r\n"
  11109. "\r\n"),
  11110. };
  11111. // Try one last time (with the correct password) and get the resource.
  11112. MockWrite data_writes4[] = {
  11113. MockWrite(
  11114. "GET / HTTP/1.1\r\n"
  11115. "Host: www.example.org\r\n"
  11116. "Connection: keep-alive\r\n"
  11117. "Authorization: Basic Zmlyc3Q6YmFy\r\n"
  11118. "\r\n"),
  11119. };
  11120. MockRead data_reads4[] = {
  11121. MockRead("HTTP/1.1 200 OK\r\n"
  11122. "Content-Type: text/html; charset=iso-8859-1\r\n"
  11123. "Content-Length: 5\r\n"
  11124. "\r\n"
  11125. "hello"),
  11126. };
  11127. StaticSocketDataProvider data1(data_reads1, data_writes1);
  11128. StaticSocketDataProvider data2(data_reads2, data_writes2);
  11129. StaticSocketDataProvider data3(data_reads3, data_writes3);
  11130. StaticSocketDataProvider data4(data_reads4, data_writes4);
  11131. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  11132. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  11133. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  11134. session_deps_.socket_factory->AddSocketDataProvider(&data4);
  11135. TestCompletionCallback callback1;
  11136. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11137. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11138. // Issue the first request with Authorize headers. There should be a
  11139. // password prompt for first_realm waiting to be filled in after the
  11140. // transaction completes.
  11141. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  11142. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11143. rv = callback1.WaitForResult();
  11144. EXPECT_THAT(rv, IsOk());
  11145. const HttpResponseInfo* response = trans.GetResponseInfo();
  11146. ASSERT_TRUE(response);
  11147. absl::optional<AuthChallengeInfo> challenge = response->auth_challenge;
  11148. ASSERT_TRUE(challenge);
  11149. EXPECT_FALSE(challenge->is_proxy);
  11150. EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize());
  11151. EXPECT_EQ("first_realm", challenge->realm);
  11152. EXPECT_EQ(kBasicAuthScheme, challenge->scheme);
  11153. // Issue the second request with an incorrect password. There should be a
  11154. // password prompt for second_realm waiting to be filled in after the
  11155. // transaction completes.
  11156. TestCompletionCallback callback2;
  11157. rv = trans.RestartWithAuth(AuthCredentials(kFirst, kBaz),
  11158. callback2.callback());
  11159. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11160. rv = callback2.WaitForResult();
  11161. EXPECT_THAT(rv, IsOk());
  11162. response = trans.GetResponseInfo();
  11163. ASSERT_TRUE(response);
  11164. challenge = response->auth_challenge;
  11165. ASSERT_TRUE(challenge);
  11166. EXPECT_FALSE(challenge->is_proxy);
  11167. EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize());
  11168. EXPECT_EQ("second_realm", challenge->realm);
  11169. EXPECT_EQ(kBasicAuthScheme, challenge->scheme);
  11170. // Issue the third request with another incorrect password. There should be
  11171. // a password prompt for first_realm waiting to be filled in. If the password
  11172. // prompt is not present, it indicates that the HttpAuthCacheEntry for
  11173. // first_realm was not correctly removed.
  11174. TestCompletionCallback callback3;
  11175. rv = trans.RestartWithAuth(AuthCredentials(kSecond, kFou),
  11176. callback3.callback());
  11177. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11178. rv = callback3.WaitForResult();
  11179. EXPECT_THAT(rv, IsOk());
  11180. response = trans.GetResponseInfo();
  11181. ASSERT_TRUE(response);
  11182. challenge = response->auth_challenge;
  11183. ASSERT_TRUE(challenge);
  11184. EXPECT_FALSE(challenge->is_proxy);
  11185. EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize());
  11186. EXPECT_EQ("first_realm", challenge->realm);
  11187. EXPECT_EQ(kBasicAuthScheme, challenge->scheme);
  11188. // Issue the fourth request with the correct password and username.
  11189. TestCompletionCallback callback4;
  11190. rv = trans.RestartWithAuth(AuthCredentials(kFirst, kBar),
  11191. callback4.callback());
  11192. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11193. rv = callback4.WaitForResult();
  11194. EXPECT_THAT(rv, IsOk());
  11195. response = trans.GetResponseInfo();
  11196. ASSERT_TRUE(response);
  11197. EXPECT_FALSE(response->auth_challenge.has_value());
  11198. }
  11199. // Regression test for https://crbug.com/754395.
  11200. TEST_F(HttpNetworkTransactionTest, IgnoreAltSvcWithInvalidCert) {
  11201. MockRead data_reads[] = {
  11202. MockRead("HTTP/1.1 200 OK\r\n"),
  11203. MockRead(kAlternativeServiceHttpHeader),
  11204. MockRead("\r\n"),
  11205. MockRead("hello world"),
  11206. MockRead(SYNCHRONOUS, OK),
  11207. };
  11208. HttpRequestInfo request;
  11209. request.method = "GET";
  11210. request.url = GURL("https://www.example.org/");
  11211. request.traffic_annotation =
  11212. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11213. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  11214. session_deps_.socket_factory->AddSocketDataProvider(&data);
  11215. SSLSocketDataProvider ssl(ASYNC, OK);
  11216. ssl.ssl_info.cert =
  11217. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  11218. ASSERT_TRUE(ssl.ssl_info.cert);
  11219. ssl.ssl_info.cert_status = CERT_STATUS_COMMON_NAME_INVALID;
  11220. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11221. TestCompletionCallback callback;
  11222. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11223. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11224. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11225. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11226. url::SchemeHostPort test_server(request.url);
  11227. HttpServerProperties* http_server_properties =
  11228. session->http_server_properties();
  11229. EXPECT_TRUE(
  11230. http_server_properties
  11231. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11232. .empty());
  11233. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11234. const HttpResponseInfo* response = trans.GetResponseInfo();
  11235. ASSERT_TRUE(response);
  11236. ASSERT_TRUE(response->headers);
  11237. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  11238. EXPECT_FALSE(response->was_fetched_via_spdy);
  11239. EXPECT_FALSE(response->was_alpn_negotiated);
  11240. std::string response_data;
  11241. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  11242. EXPECT_EQ("hello world", response_data);
  11243. EXPECT_TRUE(
  11244. http_server_properties
  11245. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11246. .empty());
  11247. }
  11248. TEST_F(HttpNetworkTransactionTest, HonorAlternativeServiceHeader) {
  11249. MockRead data_reads[] = {
  11250. MockRead("HTTP/1.1 200 OK\r\n"),
  11251. MockRead(kAlternativeServiceHttpHeader),
  11252. MockRead("\r\n"),
  11253. MockRead("hello world"),
  11254. MockRead(SYNCHRONOUS, OK),
  11255. };
  11256. HttpRequestInfo request;
  11257. request.method = "GET";
  11258. request.url = GURL("https://www.example.org/");
  11259. request.traffic_annotation =
  11260. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11261. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  11262. session_deps_.socket_factory->AddSocketDataProvider(&data);
  11263. SSLSocketDataProvider ssl(ASYNC, OK);
  11264. ssl.ssl_info.cert =
  11265. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  11266. ASSERT_TRUE(ssl.ssl_info.cert);
  11267. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11268. TestCompletionCallback callback;
  11269. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11270. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11271. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11272. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11273. url::SchemeHostPort test_server(request.url);
  11274. HttpServerProperties* http_server_properties =
  11275. session->http_server_properties();
  11276. EXPECT_TRUE(
  11277. http_server_properties
  11278. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11279. .empty());
  11280. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11281. const HttpResponseInfo* response = trans.GetResponseInfo();
  11282. ASSERT_TRUE(response);
  11283. ASSERT_TRUE(response->headers);
  11284. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  11285. EXPECT_FALSE(response->was_fetched_via_spdy);
  11286. EXPECT_FALSE(response->was_alpn_negotiated);
  11287. std::string response_data;
  11288. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  11289. EXPECT_EQ("hello world", response_data);
  11290. AlternativeServiceInfoVector alternative_service_info_vector =
  11291. http_server_properties->GetAlternativeServiceInfos(test_server,
  11292. NetworkIsolationKey());
  11293. ASSERT_EQ(1u, alternative_service_info_vector.size());
  11294. AlternativeService alternative_service(kProtoHTTP2, "mail.example.org", 443);
  11295. EXPECT_EQ(alternative_service,
  11296. alternative_service_info_vector[0].alternative_service());
  11297. }
  11298. TEST_F(HttpNetworkTransactionTest,
  11299. HonorAlternativeServiceHeaderWithNetworkIsolationKey) {
  11300. base::test::ScopedFeatureList feature_list;
  11301. feature_list.InitWithFeatures(
  11302. // enabled_features
  11303. {features::kPartitionHttpServerPropertiesByNetworkIsolationKey,
  11304. // Need to partition connections by NetworkIsolationKey for
  11305. // SpdySessionKeys to include NetworkIsolationKeys.
  11306. features::kPartitionConnectionsByNetworkIsolationKey},
  11307. // disabled_features
  11308. {});
  11309. // Since HttpServerProperties caches the feature value, have to create a new
  11310. // one.
  11311. session_deps_.http_server_properties =
  11312. std::make_unique<HttpServerProperties>();
  11313. const SchemefulSite kSite1(GURL("https://foo.test/"));
  11314. const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1);
  11315. const SchemefulSite kSite2(GURL("https://bar.test/"));
  11316. const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2);
  11317. MockRead data_reads[] = {
  11318. MockRead("HTTP/1.1 200 OK\r\n"),
  11319. MockRead(kAlternativeServiceHttpHeader),
  11320. MockRead("\r\n"),
  11321. MockRead("hello world"),
  11322. MockRead(SYNCHRONOUS, OK),
  11323. };
  11324. HttpRequestInfo request;
  11325. request.method = "GET";
  11326. request.url = GURL("https://www.example.org/");
  11327. request.traffic_annotation =
  11328. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11329. request.network_isolation_key = kNetworkIsolationKey1;
  11330. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  11331. session_deps_.socket_factory->AddSocketDataProvider(&data);
  11332. SSLSocketDataProvider ssl(ASYNC, OK);
  11333. ssl.ssl_info.cert =
  11334. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  11335. ASSERT_TRUE(ssl.ssl_info.cert);
  11336. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11337. TestCompletionCallback callback;
  11338. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11339. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11340. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11341. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11342. url::SchemeHostPort test_server(request.url);
  11343. HttpServerProperties* http_server_properties =
  11344. session->http_server_properties();
  11345. EXPECT_TRUE(
  11346. http_server_properties
  11347. ->GetAlternativeServiceInfos(test_server, kNetworkIsolationKey1)
  11348. .empty());
  11349. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11350. const HttpResponseInfo* response = trans.GetResponseInfo();
  11351. ASSERT_TRUE(response);
  11352. ASSERT_TRUE(response->headers);
  11353. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  11354. EXPECT_FALSE(response->was_fetched_via_spdy);
  11355. EXPECT_FALSE(response->was_alpn_negotiated);
  11356. std::string response_data;
  11357. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  11358. EXPECT_EQ("hello world", response_data);
  11359. AlternativeServiceInfoVector alternative_service_info_vector =
  11360. http_server_properties->GetAlternativeServiceInfos(test_server,
  11361. kNetworkIsolationKey1);
  11362. ASSERT_EQ(1u, alternative_service_info_vector.size());
  11363. AlternativeService alternative_service(kProtoHTTP2, "mail.example.org", 443);
  11364. EXPECT_EQ(alternative_service,
  11365. alternative_service_info_vector[0].alternative_service());
  11366. // Make sure the alternative service information is only associated with
  11367. // kNetworkIsolationKey1.
  11368. EXPECT_TRUE(
  11369. http_server_properties
  11370. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11371. .empty());
  11372. EXPECT_TRUE(
  11373. http_server_properties
  11374. ->GetAlternativeServiceInfos(test_server, kNetworkIsolationKey2)
  11375. .empty());
  11376. }
  11377. // Regression test for https://crbug.com/615497.
  11378. TEST_F(HttpNetworkTransactionTest,
  11379. DoNotParseAlternativeServiceHeaderOnInsecureRequest) {
  11380. MockRead data_reads[] = {
  11381. MockRead("HTTP/1.1 200 OK\r\n"),
  11382. MockRead(kAlternativeServiceHttpHeader),
  11383. MockRead("\r\n"),
  11384. MockRead("hello world"),
  11385. MockRead(SYNCHRONOUS, OK),
  11386. };
  11387. HttpRequestInfo request;
  11388. request.method = "GET";
  11389. request.url = GURL("http://www.example.org/");
  11390. request.load_flags = 0;
  11391. request.traffic_annotation =
  11392. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11393. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  11394. session_deps_.socket_factory->AddSocketDataProvider(&data);
  11395. TestCompletionCallback callback;
  11396. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11397. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11398. url::SchemeHostPort test_server(request.url);
  11399. HttpServerProperties* http_server_properties =
  11400. session->http_server_properties();
  11401. EXPECT_TRUE(
  11402. http_server_properties
  11403. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11404. .empty());
  11405. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11406. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11407. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11408. const HttpResponseInfo* response = trans.GetResponseInfo();
  11409. ASSERT_TRUE(response);
  11410. ASSERT_TRUE(response->headers);
  11411. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  11412. EXPECT_FALSE(response->was_fetched_via_spdy);
  11413. EXPECT_FALSE(response->was_alpn_negotiated);
  11414. std::string response_data;
  11415. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  11416. EXPECT_EQ("hello world", response_data);
  11417. EXPECT_TRUE(
  11418. http_server_properties
  11419. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11420. .empty());
  11421. }
  11422. // HTTP/2 Alternative Services should be disabled by default.
  11423. // TODO(bnc): Remove when https://crbug.com/615413 is fixed.
  11424. TEST_F(HttpNetworkTransactionTest,
  11425. DisableHTTP2AlternativeServicesWithDifferentHost) {
  11426. session_deps_.enable_http2_alternative_service = false;
  11427. HttpRequestInfo request;
  11428. request.method = "GET";
  11429. request.url = GURL("https://www.example.org/");
  11430. request.load_flags = 0;
  11431. request.traffic_annotation =
  11432. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11433. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  11434. StaticSocketDataProvider first_data;
  11435. first_data.set_connect_data(mock_connect);
  11436. session_deps_.socket_factory->AddSocketDataProvider(&first_data);
  11437. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  11438. ssl_http11.next_proto = kProtoHTTP11;
  11439. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  11440. MockRead data_reads[] = {
  11441. MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"),
  11442. MockRead(ASYNC, OK),
  11443. };
  11444. StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>());
  11445. session_deps_.socket_factory->AddSocketDataProvider(&second_data);
  11446. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11447. HttpServerProperties* http_server_properties =
  11448. session->http_server_properties();
  11449. AlternativeService alternative_service(kProtoHTTP2, "different.example.org",
  11450. 444);
  11451. base::Time expiration = base::Time::Now() + base::Days(1);
  11452. http_server_properties->SetHttp2AlternativeService(
  11453. url::SchemeHostPort(request.url), NetworkIsolationKey(),
  11454. alternative_service, expiration);
  11455. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11456. TestCompletionCallback callback;
  11457. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11458. // Alternative service is not used, request fails.
  11459. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED));
  11460. }
  11461. // Regression test for https://crbug.com/615497:
  11462. // Alternative Services should be disabled for http origin.
  11463. TEST_F(HttpNetworkTransactionTest,
  11464. DisableAlternativeServicesForInsecureOrigin) {
  11465. HttpRequestInfo request;
  11466. request.method = "GET";
  11467. request.url = GURL("http://www.example.org/");
  11468. request.load_flags = 0;
  11469. request.traffic_annotation =
  11470. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11471. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  11472. StaticSocketDataProvider first_data;
  11473. first_data.set_connect_data(mock_connect);
  11474. session_deps_.socket_factory->AddSocketDataProvider(&first_data);
  11475. MockRead data_reads[] = {
  11476. MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"),
  11477. MockRead(ASYNC, OK),
  11478. };
  11479. StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>());
  11480. session_deps_.socket_factory->AddSocketDataProvider(&second_data);
  11481. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11482. HttpServerProperties* http_server_properties =
  11483. session->http_server_properties();
  11484. AlternativeService alternative_service(kProtoHTTP2, "", 444);
  11485. base::Time expiration = base::Time::Now() + base::Days(1);
  11486. http_server_properties->SetHttp2AlternativeService(
  11487. url::SchemeHostPort(request.url), NetworkIsolationKey(),
  11488. alternative_service, expiration);
  11489. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11490. TestCompletionCallback callback;
  11491. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11492. // Alternative service is not used, request fails.
  11493. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED));
  11494. }
  11495. TEST_F(HttpNetworkTransactionTest, ClearAlternativeServices) {
  11496. // Set an alternative service for origin.
  11497. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11498. HttpServerProperties* http_server_properties =
  11499. session->http_server_properties();
  11500. url::SchemeHostPort test_server("https", "www.example.org", 443);
  11501. AlternativeService alternative_service(kProtoQUIC, "", 80);
  11502. base::Time expiration = base::Time::Now() + base::Days(1);
  11503. http_server_properties->SetQuicAlternativeService(
  11504. test_server, NetworkIsolationKey(), alternative_service, expiration,
  11505. session->context().quic_context->params()->supported_versions);
  11506. EXPECT_EQ(1u,
  11507. http_server_properties
  11508. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11509. .size());
  11510. // Send a clear header.
  11511. MockRead data_reads[] = {
  11512. MockRead("HTTP/1.1 200 OK\r\n"),
  11513. MockRead("Alt-Svc: clear\r\n"),
  11514. MockRead("\r\n"),
  11515. MockRead("hello world"),
  11516. MockRead(SYNCHRONOUS, OK),
  11517. };
  11518. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  11519. session_deps_.socket_factory->AddSocketDataProvider(&data);
  11520. SSLSocketDataProvider ssl(ASYNC, OK);
  11521. ssl.ssl_info.cert =
  11522. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  11523. ASSERT_TRUE(ssl.ssl_info.cert);
  11524. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11525. HttpRequestInfo request;
  11526. request.method = "GET";
  11527. request.url = GURL("https://www.example.org/");
  11528. request.traffic_annotation =
  11529. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11530. TestCompletionCallback callback;
  11531. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11532. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11533. EXPECT_THAT(callback.GetResult(rv), IsOk());
  11534. const HttpResponseInfo* response = trans.GetResponseInfo();
  11535. ASSERT_TRUE(response);
  11536. ASSERT_TRUE(response->headers);
  11537. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  11538. EXPECT_FALSE(response->was_fetched_via_spdy);
  11539. EXPECT_FALSE(response->was_alpn_negotiated);
  11540. std::string response_data;
  11541. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  11542. EXPECT_EQ("hello world", response_data);
  11543. EXPECT_TRUE(
  11544. http_server_properties
  11545. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11546. .empty());
  11547. }
  11548. TEST_F(HttpNetworkTransactionTest, HonorMultipleAlternativeServiceHeaders) {
  11549. MockRead data_reads[] = {
  11550. MockRead("HTTP/1.1 200 OK\r\n"),
  11551. MockRead("Alt-Svc: h2=\"www.example.com:443\","),
  11552. MockRead("h2=\":1234\"\r\n\r\n"),
  11553. MockRead("hello world"),
  11554. MockRead(SYNCHRONOUS, OK),
  11555. };
  11556. HttpRequestInfo request;
  11557. request.method = "GET";
  11558. request.url = GURL("https://www.example.org/");
  11559. request.traffic_annotation =
  11560. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11561. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  11562. session_deps_.socket_factory->AddSocketDataProvider(&data);
  11563. SSLSocketDataProvider ssl(ASYNC, OK);
  11564. ssl.ssl_info.cert =
  11565. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  11566. ASSERT_TRUE(ssl.ssl_info.cert);
  11567. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11568. TestCompletionCallback callback;
  11569. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11570. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11571. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11572. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11573. url::SchemeHostPort test_server("https", "www.example.org", 443);
  11574. HttpServerProperties* http_server_properties =
  11575. session->http_server_properties();
  11576. EXPECT_TRUE(
  11577. http_server_properties
  11578. ->GetAlternativeServiceInfos(test_server, NetworkIsolationKey())
  11579. .empty());
  11580. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11581. const HttpResponseInfo* response = trans.GetResponseInfo();
  11582. ASSERT_TRUE(response);
  11583. ASSERT_TRUE(response->headers);
  11584. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  11585. EXPECT_FALSE(response->was_fetched_via_spdy);
  11586. EXPECT_FALSE(response->was_alpn_negotiated);
  11587. std::string response_data;
  11588. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  11589. EXPECT_EQ("hello world", response_data);
  11590. AlternativeServiceInfoVector alternative_service_info_vector =
  11591. http_server_properties->GetAlternativeServiceInfos(test_server,
  11592. NetworkIsolationKey());
  11593. ASSERT_EQ(2u, alternative_service_info_vector.size());
  11594. AlternativeService alternative_service(kProtoHTTP2, "www.example.com", 443);
  11595. EXPECT_EQ(alternative_service,
  11596. alternative_service_info_vector[0].alternative_service());
  11597. AlternativeService alternative_service_2(kProtoHTTP2, "www.example.org",
  11598. 1234);
  11599. EXPECT_EQ(alternative_service_2,
  11600. alternative_service_info_vector[1].alternative_service());
  11601. }
  11602. TEST_F(HttpNetworkTransactionTest, IdentifyQuicBroken) {
  11603. url::SchemeHostPort server("https", "origin.example.org", 443);
  11604. HostPortPair alternative("alternative.example.org", 443);
  11605. std::string origin_url = "https://origin.example.org:443";
  11606. std::string alternative_url = "https://alternative.example.org:443";
  11607. // Negotiate HTTP/1.1 with alternative.example.org.
  11608. SSLSocketDataProvider ssl(ASYNC, OK);
  11609. ssl.next_proto = kProtoHTTP11;
  11610. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11611. // HTTP/1.1 data for request.
  11612. MockWrite http_writes[] = {
  11613. MockWrite("GET / HTTP/1.1\r\n"
  11614. "Host: alternative.example.org\r\n"
  11615. "Connection: keep-alive\r\n\r\n"),
  11616. };
  11617. MockRead http_reads[] = {
  11618. MockRead("HTTP/1.1 200 OK\r\n"
  11619. "Content-Type: text/html; charset=iso-8859-1\r\n"
  11620. "Content-Length: 40\r\n\r\n"
  11621. "first HTTP/1.1 response from alternative"),
  11622. };
  11623. StaticSocketDataProvider http_data(http_reads, http_writes);
  11624. session_deps_.socket_factory->AddSocketDataProvider(&http_data);
  11625. StaticSocketDataProvider data_refused;
  11626. data_refused.set_connect_data(MockConnect(ASYNC, ERR_CONNECTION_REFUSED));
  11627. session_deps_.socket_factory->AddSocketDataProvider(&data_refused);
  11628. // Set up a QUIC alternative service for server.
  11629. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11630. HttpServerProperties* http_server_properties =
  11631. session->http_server_properties();
  11632. AlternativeService alternative_service(kProtoQUIC, alternative);
  11633. base::Time expiration = base::Time::Now() + base::Days(1);
  11634. http_server_properties->SetQuicAlternativeService(
  11635. server, NetworkIsolationKey(), alternative_service, expiration,
  11636. DefaultSupportedQuicVersions());
  11637. // Mark the QUIC alternative service as broken.
  11638. http_server_properties->MarkAlternativeServiceBroken(alternative_service,
  11639. NetworkIsolationKey());
  11640. HttpRequestInfo request;
  11641. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11642. request.method = "GET";
  11643. request.url = GURL(origin_url);
  11644. request.traffic_annotation =
  11645. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11646. TestCompletionCallback callback;
  11647. NetErrorDetails details;
  11648. EXPECT_FALSE(details.quic_broken);
  11649. trans.Start(&request, callback.callback(), NetLogWithSource());
  11650. trans.PopulateNetErrorDetails(&details);
  11651. EXPECT_TRUE(details.quic_broken);
  11652. }
  11653. TEST_F(HttpNetworkTransactionTest, IdentifyQuicNotBroken) {
  11654. url::SchemeHostPort server("https", "origin.example.org", 443);
  11655. HostPortPair alternative1("alternative1.example.org", 443);
  11656. HostPortPair alternative2("alternative2.example.org", 443);
  11657. std::string origin_url = "https://origin.example.org:443";
  11658. std::string alternative_url1 = "https://alternative1.example.org:443";
  11659. std::string alternative_url2 = "https://alternative2.example.org:443";
  11660. // Negotiate HTTP/1.1 with alternative1.example.org.
  11661. SSLSocketDataProvider ssl(ASYNC, OK);
  11662. ssl.next_proto = kProtoHTTP11;
  11663. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11664. // HTTP/1.1 data for request.
  11665. MockWrite http_writes[] = {
  11666. MockWrite("GET / HTTP/1.1\r\n"
  11667. "Host: alternative1.example.org\r\n"
  11668. "Connection: keep-alive\r\n\r\n"),
  11669. };
  11670. MockRead http_reads[] = {
  11671. MockRead("HTTP/1.1 200 OK\r\n"
  11672. "Content-Type: text/html; charset=iso-8859-1\r\n"
  11673. "Content-Length: 40\r\n\r\n"
  11674. "first HTTP/1.1 response from alternative1"),
  11675. };
  11676. StaticSocketDataProvider http_data(http_reads, http_writes);
  11677. session_deps_.socket_factory->AddSocketDataProvider(&http_data);
  11678. StaticSocketDataProvider data_refused;
  11679. data_refused.set_connect_data(MockConnect(ASYNC, ERR_CONNECTION_REFUSED));
  11680. session_deps_.socket_factory->AddSocketDataProvider(&data_refused);
  11681. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11682. HttpServerProperties* http_server_properties =
  11683. session->http_server_properties();
  11684. // Set up two QUIC alternative services for server.
  11685. AlternativeServiceInfoVector alternative_service_info_vector;
  11686. base::Time expiration = base::Time::Now() + base::Days(1);
  11687. AlternativeService alternative_service1(kProtoQUIC, alternative1);
  11688. alternative_service_info_vector.push_back(
  11689. AlternativeServiceInfo::CreateQuicAlternativeServiceInfo(
  11690. alternative_service1, expiration,
  11691. session->context().quic_context->params()->supported_versions));
  11692. AlternativeService alternative_service2(kProtoQUIC, alternative2);
  11693. alternative_service_info_vector.push_back(
  11694. AlternativeServiceInfo::CreateQuicAlternativeServiceInfo(
  11695. alternative_service2, expiration,
  11696. session->context().quic_context->params()->supported_versions));
  11697. http_server_properties->SetAlternativeServices(
  11698. server, NetworkIsolationKey(), alternative_service_info_vector);
  11699. // Mark one of the QUIC alternative service as broken.
  11700. http_server_properties->MarkAlternativeServiceBroken(alternative_service1,
  11701. NetworkIsolationKey());
  11702. EXPECT_EQ(2u, http_server_properties
  11703. ->GetAlternativeServiceInfos(server, NetworkIsolationKey())
  11704. .size());
  11705. HttpRequestInfo request;
  11706. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11707. request.method = "GET";
  11708. request.url = GURL(origin_url);
  11709. request.traffic_annotation =
  11710. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11711. TestCompletionCallback callback;
  11712. NetErrorDetails details;
  11713. EXPECT_FALSE(details.quic_broken);
  11714. trans.Start(&request, callback.callback(), NetLogWithSource());
  11715. trans.PopulateNetErrorDetails(&details);
  11716. EXPECT_FALSE(details.quic_broken);
  11717. }
  11718. TEST_F(HttpNetworkTransactionTest, MarkBrokenAlternateProtocolAndFallback) {
  11719. HttpRequestInfo request;
  11720. request.method = "GET";
  11721. request.url = GURL("https://www.example.org/");
  11722. request.traffic_annotation =
  11723. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11724. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  11725. StaticSocketDataProvider first_data;
  11726. first_data.set_connect_data(mock_connect);
  11727. session_deps_.socket_factory->AddSocketDataProvider(&first_data);
  11728. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  11729. ssl_http11.next_proto = kProtoHTTP11;
  11730. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  11731. MockRead data_reads[] = {
  11732. MockRead("HTTP/1.1 200 OK\r\n\r\n"),
  11733. MockRead("hello world"),
  11734. MockRead(ASYNC, OK),
  11735. };
  11736. StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>());
  11737. session_deps_.socket_factory->AddSocketDataProvider(&second_data);
  11738. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11739. HttpServerProperties* http_server_properties =
  11740. session->http_server_properties();
  11741. const url::SchemeHostPort server(request.url);
  11742. // Port must be < 1024, or the header will be ignored (since initial port was
  11743. // port 80 (another restricted port).
  11744. // Port is ignored by MockConnect anyway.
  11745. const AlternativeService alternative_service(kProtoHTTP2, "www.example.org",
  11746. 666);
  11747. base::Time expiration = base::Time::Now() + base::Days(1);
  11748. http_server_properties->SetHttp2AlternativeService(
  11749. server, NetworkIsolationKey(), alternative_service, expiration);
  11750. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11751. TestCompletionCallback callback;
  11752. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  11753. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11754. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11755. const HttpResponseInfo* response = trans.GetResponseInfo();
  11756. ASSERT_TRUE(response);
  11757. ASSERT_TRUE(response->headers);
  11758. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  11759. std::string response_data;
  11760. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  11761. EXPECT_EQ("hello world", response_data);
  11762. const AlternativeServiceInfoVector alternative_service_info_vector =
  11763. http_server_properties->GetAlternativeServiceInfos(server,
  11764. NetworkIsolationKey());
  11765. ASSERT_EQ(1u, alternative_service_info_vector.size());
  11766. EXPECT_EQ(alternative_service,
  11767. alternative_service_info_vector[0].alternative_service());
  11768. EXPECT_TRUE(http_server_properties->IsAlternativeServiceBroken(
  11769. alternative_service, NetworkIsolationKey()));
  11770. }
  11771. // Ensure that we are not allowed to redirect traffic via an alternate protocol
  11772. // to an unrestricted (port >= 1024) when the original traffic was on a
  11773. // restricted port (port < 1024). Ensure that we can redirect in all other
  11774. // cases.
  11775. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortRestrictedBlocked) {
  11776. HttpRequestInfo restricted_port_request;
  11777. restricted_port_request.method = "GET";
  11778. restricted_port_request.url = GURL("https://www.example.org:1023/");
  11779. restricted_port_request.load_flags = 0;
  11780. restricted_port_request.traffic_annotation =
  11781. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11782. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  11783. StaticSocketDataProvider first_data;
  11784. first_data.set_connect_data(mock_connect);
  11785. session_deps_.socket_factory->AddSocketDataProvider(&first_data);
  11786. MockRead data_reads[] = {
  11787. MockRead("HTTP/1.1 200 OK\r\n\r\n"),
  11788. MockRead("hello world"),
  11789. MockRead(ASYNC, OK),
  11790. };
  11791. StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>());
  11792. session_deps_.socket_factory->AddSocketDataProvider(&second_data);
  11793. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  11794. ssl_http11.next_proto = kProtoHTTP11;
  11795. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  11796. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11797. HttpServerProperties* http_server_properties =
  11798. session->http_server_properties();
  11799. const int kUnrestrictedAlternatePort = 1024;
  11800. AlternativeService alternative_service(kProtoHTTP2, "www.example.org",
  11801. kUnrestrictedAlternatePort);
  11802. base::Time expiration = base::Time::Now() + base::Days(1);
  11803. http_server_properties->SetHttp2AlternativeService(
  11804. url::SchemeHostPort(restricted_port_request.url), NetworkIsolationKey(),
  11805. alternative_service, expiration);
  11806. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11807. TestCompletionCallback callback;
  11808. int rv = trans.Start(&restricted_port_request, callback.callback(),
  11809. NetLogWithSource());
  11810. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11811. // Invalid change to unrestricted port should fail.
  11812. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_REFUSED));
  11813. }
  11814. // Ensure that we are allowed to redirect traffic via an alternate protocol to
  11815. // an unrestricted (port >= 1024) when the original traffic was on a restricted
  11816. // port (port < 1024) if we set |enable_user_alternate_protocol_ports|.
  11817. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortRestrictedPermitted) {
  11818. session_deps_.enable_user_alternate_protocol_ports = true;
  11819. HttpRequestInfo restricted_port_request;
  11820. restricted_port_request.method = "GET";
  11821. restricted_port_request.url = GURL("https://www.example.org:1023/");
  11822. restricted_port_request.load_flags = 0;
  11823. restricted_port_request.traffic_annotation =
  11824. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11825. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  11826. StaticSocketDataProvider first_data;
  11827. first_data.set_connect_data(mock_connect);
  11828. session_deps_.socket_factory->AddSocketDataProvider(&first_data);
  11829. MockRead data_reads[] = {
  11830. MockRead("HTTP/1.1 200 OK\r\n\r\n"),
  11831. MockRead("hello world"),
  11832. MockRead(ASYNC, OK),
  11833. };
  11834. StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>());
  11835. session_deps_.socket_factory->AddSocketDataProvider(&second_data);
  11836. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  11837. ssl_http11.next_proto = kProtoHTTP11;
  11838. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  11839. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11840. HttpServerProperties* http_server_properties =
  11841. session->http_server_properties();
  11842. const int kUnrestrictedAlternatePort = 1024;
  11843. AlternativeService alternative_service(kProtoHTTP2, "www.example.org",
  11844. kUnrestrictedAlternatePort);
  11845. base::Time expiration = base::Time::Now() + base::Days(1);
  11846. http_server_properties->SetHttp2AlternativeService(
  11847. url::SchemeHostPort(restricted_port_request.url), NetworkIsolationKey(),
  11848. alternative_service, expiration);
  11849. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11850. TestCompletionCallback callback;
  11851. EXPECT_EQ(ERR_IO_PENDING,
  11852. trans.Start(&restricted_port_request, callback.callback(),
  11853. NetLogWithSource()));
  11854. // Change to unrestricted port should succeed.
  11855. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11856. }
  11857. // Ensure that we are not allowed to redirect traffic via an alternate protocol
  11858. // to an unrestricted (port >= 1024) when the original traffic was on a
  11859. // restricted port (port < 1024). Ensure that we can redirect in all other
  11860. // cases.
  11861. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortRestrictedAllowed) {
  11862. HttpRequestInfo restricted_port_request;
  11863. restricted_port_request.method = "GET";
  11864. restricted_port_request.url = GURL("https://www.example.org:1023/");
  11865. restricted_port_request.load_flags = 0;
  11866. restricted_port_request.traffic_annotation =
  11867. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11868. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  11869. StaticSocketDataProvider first_data;
  11870. first_data.set_connect_data(mock_connect);
  11871. session_deps_.socket_factory->AddSocketDataProvider(&first_data);
  11872. MockRead data_reads[] = {
  11873. MockRead("HTTP/1.1 200 OK\r\n\r\n"),
  11874. MockRead("hello world"),
  11875. MockRead(ASYNC, OK),
  11876. };
  11877. StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>());
  11878. session_deps_.socket_factory->AddSocketDataProvider(&second_data);
  11879. SSLSocketDataProvider ssl(ASYNC, OK);
  11880. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11881. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11882. HttpServerProperties* http_server_properties =
  11883. session->http_server_properties();
  11884. const int kRestrictedAlternatePort = 80;
  11885. AlternativeService alternative_service(kProtoHTTP2, "www.example.org",
  11886. kRestrictedAlternatePort);
  11887. base::Time expiration = base::Time::Now() + base::Days(1);
  11888. http_server_properties->SetHttp2AlternativeService(
  11889. url::SchemeHostPort(restricted_port_request.url), NetworkIsolationKey(),
  11890. alternative_service, expiration);
  11891. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11892. TestCompletionCallback callback;
  11893. int rv = trans.Start(&restricted_port_request, callback.callback(),
  11894. NetLogWithSource());
  11895. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11896. // Valid change to restricted port should pass.
  11897. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11898. }
  11899. // Ensure that we are not allowed to redirect traffic via an alternate protocol
  11900. // to an unrestricted (port >= 1024) when the original traffic was on a
  11901. // restricted port (port < 1024). Ensure that we can redirect in all other
  11902. // cases.
  11903. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortUnrestrictedAllowed1) {
  11904. HttpRequestInfo unrestricted_port_request;
  11905. unrestricted_port_request.method = "GET";
  11906. unrestricted_port_request.url = GURL("https://www.example.org:1024/");
  11907. unrestricted_port_request.load_flags = 0;
  11908. unrestricted_port_request.traffic_annotation =
  11909. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11910. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  11911. StaticSocketDataProvider first_data;
  11912. first_data.set_connect_data(mock_connect);
  11913. session_deps_.socket_factory->AddSocketDataProvider(&first_data);
  11914. MockRead data_reads[] = {
  11915. MockRead("HTTP/1.1 200 OK\r\n\r\n"),
  11916. MockRead("hello world"),
  11917. MockRead(ASYNC, OK),
  11918. };
  11919. StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>());
  11920. session_deps_.socket_factory->AddSocketDataProvider(&second_data);
  11921. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  11922. ssl_http11.next_proto = kProtoHTTP11;
  11923. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  11924. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11925. HttpServerProperties* http_server_properties =
  11926. session->http_server_properties();
  11927. const int kRestrictedAlternatePort = 80;
  11928. AlternativeService alternative_service(kProtoHTTP2, "www.example.org",
  11929. kRestrictedAlternatePort);
  11930. base::Time expiration = base::Time::Now() + base::Days(1);
  11931. http_server_properties->SetHttp2AlternativeService(
  11932. url::SchemeHostPort(unrestricted_port_request.url), NetworkIsolationKey(),
  11933. alternative_service, expiration);
  11934. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11935. TestCompletionCallback callback;
  11936. int rv = trans.Start(&unrestricted_port_request, callback.callback(),
  11937. NetLogWithSource());
  11938. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11939. // Valid change to restricted port should pass.
  11940. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11941. }
  11942. // Ensure that we are not allowed to redirect traffic via an alternate protocol
  11943. // to an unrestricted (port >= 1024) when the original traffic was on a
  11944. // restricted port (port < 1024). Ensure that we can redirect in all other
  11945. // cases.
  11946. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortUnrestrictedAllowed2) {
  11947. HttpRequestInfo unrestricted_port_request;
  11948. unrestricted_port_request.method = "GET";
  11949. unrestricted_port_request.url = GURL("https://www.example.org:1024/");
  11950. unrestricted_port_request.load_flags = 0;
  11951. unrestricted_port_request.traffic_annotation =
  11952. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11953. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  11954. StaticSocketDataProvider first_data;
  11955. first_data.set_connect_data(mock_connect);
  11956. session_deps_.socket_factory->AddSocketDataProvider(&first_data);
  11957. MockRead data_reads[] = {
  11958. MockRead("HTTP/1.1 200 OK\r\n\r\n"),
  11959. MockRead("hello world"),
  11960. MockRead(ASYNC, OK),
  11961. };
  11962. StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>());
  11963. session_deps_.socket_factory->AddSocketDataProvider(&second_data);
  11964. SSLSocketDataProvider ssl(ASYNC, OK);
  11965. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  11966. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  11967. HttpServerProperties* http_server_properties =
  11968. session->http_server_properties();
  11969. const int kUnrestrictedAlternatePort = 1025;
  11970. AlternativeService alternative_service(kProtoHTTP2, "www.example.org",
  11971. kUnrestrictedAlternatePort);
  11972. base::Time expiration = base::Time::Now() + base::Days(1);
  11973. http_server_properties->SetHttp2AlternativeService(
  11974. url::SchemeHostPort(unrestricted_port_request.url), NetworkIsolationKey(),
  11975. alternative_service, expiration);
  11976. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  11977. TestCompletionCallback callback;
  11978. int rv = trans.Start(&unrestricted_port_request, callback.callback(),
  11979. NetLogWithSource());
  11980. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  11981. // Valid change to an unrestricted port should pass.
  11982. EXPECT_THAT(callback.WaitForResult(), IsOk());
  11983. }
  11984. // Ensure that we are not allowed to redirect traffic via an alternate protocol
  11985. // to an unsafe port, and that we resume the second HttpStreamFactory::Job once
  11986. // the alternate protocol request fails.
  11987. TEST_F(HttpNetworkTransactionTest, AlternateProtocolUnsafeBlocked) {
  11988. HttpRequestInfo request;
  11989. request.method = "GET";
  11990. request.url = GURL("http://www.example.org/");
  11991. request.traffic_annotation =
  11992. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  11993. // The alternate protocol request will error out before we attempt to connect,
  11994. // so only the standard HTTP request will try to connect.
  11995. MockRead data_reads[] = {
  11996. MockRead("HTTP/1.1 200 OK\r\n\r\n"),
  11997. MockRead("hello world"),
  11998. MockRead(ASYNC, OK),
  11999. };
  12000. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  12001. session_deps_.socket_factory->AddSocketDataProvider(&data);
  12002. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  12003. HttpServerProperties* http_server_properties =
  12004. session->http_server_properties();
  12005. const int kUnsafePort = 7;
  12006. AlternativeService alternative_service(kProtoHTTP2, "www.example.org",
  12007. kUnsafePort);
  12008. base::Time expiration = base::Time::Now() + base::Days(1);
  12009. http_server_properties->SetHttp2AlternativeService(
  12010. url::SchemeHostPort(request.url), NetworkIsolationKey(),
  12011. alternative_service, expiration);
  12012. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  12013. TestCompletionCallback callback;
  12014. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  12015. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12016. // The HTTP request should succeed.
  12017. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12018. const HttpResponseInfo* response = trans.GetResponseInfo();
  12019. ASSERT_TRUE(response);
  12020. ASSERT_TRUE(response->headers);
  12021. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  12022. std::string response_data;
  12023. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  12024. EXPECT_EQ("hello world", response_data);
  12025. }
  12026. TEST_F(HttpNetworkTransactionTest, UseAlternateProtocolForNpnSpdy) {
  12027. HttpRequestInfo request;
  12028. request.method = "GET";
  12029. request.url = GURL("https://www.example.org/");
  12030. request.traffic_annotation =
  12031. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  12032. MockRead data_reads[] = {
  12033. MockRead("HTTP/1.1 200 OK\r\n"),
  12034. MockRead(kAlternativeServiceHttpHeader),
  12035. MockRead("\r\n"),
  12036. MockRead("hello world"),
  12037. MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
  12038. MockRead(ASYNC, OK)};
  12039. StaticSocketDataProvider first_transaction(data_reads,
  12040. base::span<MockWrite>());
  12041. session_deps_.socket_factory->AddSocketDataProvider(&first_transaction);
  12042. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  12043. ssl_http11.next_proto = kProtoHTTP11;
  12044. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  12045. AddSSLSocketData();
  12046. spdy::SpdySerializedFrame req(
  12047. spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST));
  12048. MockWrite spdy_writes[] = {CreateMockWrite(req, 0)};
  12049. spdy::SpdySerializedFrame resp(
  12050. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  12051. spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true));
  12052. MockRead spdy_reads[] = {
  12053. CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3),
  12054. };
  12055. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  12056. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  12057. MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING);
  12058. StaticSocketDataProvider hanging_non_alternate_protocol_socket;
  12059. hanging_non_alternate_protocol_socket.set_connect_data(
  12060. never_finishing_connect);
  12061. session_deps_.socket_factory->AddSocketDataProvider(
  12062. &hanging_non_alternate_protocol_socket);
  12063. TestCompletionCallback callback;
  12064. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  12065. auto trans =
  12066. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  12067. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  12068. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12069. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12070. const HttpResponseInfo* response = trans->GetResponseInfo();
  12071. ASSERT_TRUE(response);
  12072. ASSERT_TRUE(response->headers);
  12073. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  12074. std::string response_data;
  12075. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  12076. EXPECT_EQ("hello world", response_data);
  12077. trans =
  12078. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  12079. rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  12080. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12081. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12082. response = trans->GetResponseInfo();
  12083. ASSERT_TRUE(response);
  12084. ASSERT_TRUE(response->headers);
  12085. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  12086. EXPECT_TRUE(response->was_fetched_via_spdy);
  12087. EXPECT_TRUE(response->was_alpn_negotiated);
  12088. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  12089. EXPECT_EQ("hello!", response_data);
  12090. }
  12091. TEST_F(HttpNetworkTransactionTest, AlternateProtocolWithSpdyLateBinding) {
  12092. HttpRequestInfo request;
  12093. request.method = "GET";
  12094. request.url = GURL("https://www.example.org/");
  12095. request.traffic_annotation =
  12096. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  12097. // First transaction receives Alt-Svc header over HTTP/1.1.
  12098. MockRead data_reads[] = {
  12099. MockRead("HTTP/1.1 200 OK\r\n"),
  12100. MockRead(kAlternativeServiceHttpHeader),
  12101. MockRead("\r\n"),
  12102. MockRead("hello world"),
  12103. MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
  12104. MockRead(ASYNC, OK),
  12105. };
  12106. StaticSocketDataProvider http11_data(data_reads, base::span<MockWrite>());
  12107. session_deps_.socket_factory->AddSocketDataProvider(&http11_data);
  12108. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  12109. ssl_http11.ssl_info.cert =
  12110. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  12111. ASSERT_TRUE(ssl_http11.ssl_info.cert);
  12112. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  12113. // Second transaction starts an alternative and a non-alternative Job.
  12114. // Both sockets hang.
  12115. MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING);
  12116. StaticSocketDataProvider hanging_socket1;
  12117. hanging_socket1.set_connect_data(never_finishing_connect);
  12118. session_deps_.socket_factory->AddSocketDataProvider(&hanging_socket1);
  12119. StaticSocketDataProvider hanging_socket2;
  12120. hanging_socket2.set_connect_data(never_finishing_connect);
  12121. session_deps_.socket_factory->AddSocketDataProvider(&hanging_socket2);
  12122. // Third transaction starts an alternative and a non-alternative job.
  12123. // The non-alternative job hangs, but the alternative one succeeds.
  12124. // The second transaction, still pending, binds to this socket.
  12125. spdy::SpdySerializedFrame req1(
  12126. spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST));
  12127. spdy::SpdySerializedFrame req2(
  12128. spdy_util_.ConstructSpdyGet("https://www.example.org/", 3, LOWEST));
  12129. MockWrite spdy_writes[] = {
  12130. CreateMockWrite(req1, 0), CreateMockWrite(req2, 1),
  12131. };
  12132. spdy::SpdySerializedFrame resp1(
  12133. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  12134. spdy::SpdySerializedFrame data1(spdy_util_.ConstructSpdyDataFrame(1, true));
  12135. spdy::SpdySerializedFrame resp2(
  12136. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  12137. spdy::SpdySerializedFrame data2(spdy_util_.ConstructSpdyDataFrame(3, true));
  12138. MockRead spdy_reads[] = {
  12139. CreateMockRead(resp1, 2), CreateMockRead(data1, 3),
  12140. CreateMockRead(resp2, 4), CreateMockRead(data2, 5),
  12141. MockRead(ASYNC, 0, 6),
  12142. };
  12143. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  12144. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  12145. AddSSLSocketData();
  12146. StaticSocketDataProvider hanging_socket3;
  12147. hanging_socket3.set_connect_data(never_finishing_connect);
  12148. session_deps_.socket_factory->AddSocketDataProvider(&hanging_socket3);
  12149. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  12150. TestCompletionCallback callback1;
  12151. HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get());
  12152. int rv = trans1.Start(&request, callback1.callback(), NetLogWithSource());
  12153. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12154. EXPECT_THAT(callback1.WaitForResult(), IsOk());
  12155. const HttpResponseInfo* response = trans1.GetResponseInfo();
  12156. ASSERT_TRUE(response);
  12157. ASSERT_TRUE(response->headers);
  12158. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  12159. std::string response_data;
  12160. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  12161. EXPECT_EQ("hello world", response_data);
  12162. TestCompletionCallback callback2;
  12163. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  12164. rv = trans2.Start(&request, callback2.callback(), NetLogWithSource());
  12165. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12166. TestCompletionCallback callback3;
  12167. HttpNetworkTransaction trans3(DEFAULT_PRIORITY, session.get());
  12168. rv = trans3.Start(&request, callback3.callback(), NetLogWithSource());
  12169. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12170. EXPECT_THAT(callback2.WaitForResult(), IsOk());
  12171. EXPECT_THAT(callback3.WaitForResult(), IsOk());
  12172. response = trans2.GetResponseInfo();
  12173. ASSERT_TRUE(response);
  12174. ASSERT_TRUE(response->headers);
  12175. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  12176. EXPECT_TRUE(response->was_fetched_via_spdy);
  12177. EXPECT_TRUE(response->was_alpn_negotiated);
  12178. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  12179. EXPECT_EQ("hello!", response_data);
  12180. response = trans3.GetResponseInfo();
  12181. ASSERT_TRUE(response);
  12182. ASSERT_TRUE(response->headers);
  12183. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  12184. EXPECT_TRUE(response->was_fetched_via_spdy);
  12185. EXPECT_TRUE(response->was_alpn_negotiated);
  12186. ASSERT_THAT(ReadTransaction(&trans3, &response_data), IsOk());
  12187. EXPECT_EQ("hello!", response_data);
  12188. }
  12189. TEST_F(HttpNetworkTransactionTest, StallAlternativeServiceForNpnSpdy) {
  12190. session_deps_.host_resolver->set_synchronous_mode(true);
  12191. HttpRequestInfo request;
  12192. request.method = "GET";
  12193. request.url = GURL("https://www.example.org/");
  12194. request.traffic_annotation =
  12195. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  12196. MockRead data_reads[] = {
  12197. MockRead("HTTP/1.1 200 OK\r\n"),
  12198. MockRead(kAlternativeServiceHttpHeader),
  12199. MockRead("\r\n"),
  12200. MockRead("hello world"),
  12201. MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
  12202. MockRead(ASYNC, OK),
  12203. };
  12204. StaticSocketDataProvider first_transaction(data_reads,
  12205. base::span<MockWrite>());
  12206. session_deps_.socket_factory->AddSocketDataProvider(&first_transaction);
  12207. SSLSocketDataProvider ssl(ASYNC, OK);
  12208. ssl.ssl_info.cert =
  12209. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  12210. ASSERT_TRUE(ssl.ssl_info.cert);
  12211. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  12212. MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING);
  12213. StaticSocketDataProvider hanging_alternate_protocol_socket;
  12214. hanging_alternate_protocol_socket.set_connect_data(
  12215. never_finishing_connect);
  12216. session_deps_.socket_factory->AddSocketDataProvider(
  12217. &hanging_alternate_protocol_socket);
  12218. // 2nd request is just a copy of the first one, over HTTP/1.1 again.
  12219. StaticSocketDataProvider second_transaction(data_reads,
  12220. base::span<MockWrite>());
  12221. session_deps_.socket_factory->AddSocketDataProvider(&second_transaction);
  12222. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  12223. TestCompletionCallback callback;
  12224. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  12225. auto trans =
  12226. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  12227. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  12228. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12229. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12230. const HttpResponseInfo* response = trans->GetResponseInfo();
  12231. ASSERT_TRUE(response);
  12232. ASSERT_TRUE(response->headers);
  12233. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  12234. std::string response_data;
  12235. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  12236. EXPECT_EQ("hello world", response_data);
  12237. trans =
  12238. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  12239. rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  12240. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12241. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12242. response = trans->GetResponseInfo();
  12243. ASSERT_TRUE(response);
  12244. ASSERT_TRUE(response->headers);
  12245. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  12246. EXPECT_FALSE(response->was_fetched_via_spdy);
  12247. EXPECT_FALSE(response->was_alpn_negotiated);
  12248. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  12249. EXPECT_EQ("hello world", response_data);
  12250. }
  12251. // Test that proxy is resolved using the origin url,
  12252. // regardless of the alternative server.
  12253. TEST_F(HttpNetworkTransactionTest, UseOriginNotAlternativeForProxy) {
  12254. // Configure proxy to bypass www.example.org, which is the origin URL.
  12255. ProxyConfig proxy_config;
  12256. proxy_config.proxy_rules().ParseFromString("myproxy:70");
  12257. proxy_config.proxy_rules().bypass_rules.AddRuleFromString("www.example.org");
  12258. auto proxy_config_service = std::make_unique<ProxyConfigServiceFixed>(
  12259. ProxyConfigWithAnnotation(proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS));
  12260. CapturingProxyResolver capturing_proxy_resolver;
  12261. auto proxy_resolver_factory = std::make_unique<CapturingProxyResolverFactory>(
  12262. &capturing_proxy_resolver);
  12263. session_deps_.proxy_resolution_service =
  12264. std::make_unique<ConfiguredProxyResolutionService>(
  12265. std::move(proxy_config_service), std::move(proxy_resolver_factory),
  12266. net::NetLog::Get(), /*quick_check_enabled=*/true);
  12267. session_deps_.net_log = net::NetLog::Get();
  12268. // Configure alternative service with a hostname that is not bypassed by the
  12269. // proxy.
  12270. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  12271. HttpServerProperties* http_server_properties =
  12272. session->http_server_properties();
  12273. url::SchemeHostPort server("https", "www.example.org", 443);
  12274. HostPortPair alternative("www.example.com", 443);
  12275. AlternativeService alternative_service(kProtoHTTP2, alternative);
  12276. base::Time expiration = base::Time::Now() + base::Days(1);
  12277. http_server_properties->SetHttp2AlternativeService(
  12278. server, NetworkIsolationKey(), alternative_service, expiration);
  12279. // Non-alternative job should hang.
  12280. MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING);
  12281. StaticSocketDataProvider hanging_alternate_protocol_socket;
  12282. hanging_alternate_protocol_socket.set_connect_data(never_finishing_connect);
  12283. session_deps_.socket_factory->AddSocketDataProvider(
  12284. &hanging_alternate_protocol_socket);
  12285. AddSSLSocketData();
  12286. HttpRequestInfo request;
  12287. request.method = "GET";
  12288. request.url = GURL("https://www.example.org/");
  12289. request.load_flags = 0;
  12290. request.traffic_annotation =
  12291. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  12292. spdy::SpdySerializedFrame req(
  12293. spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST));
  12294. MockWrite spdy_writes[] = {CreateMockWrite(req, 0)};
  12295. spdy::SpdySerializedFrame resp(
  12296. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  12297. spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true));
  12298. MockRead spdy_reads[] = {
  12299. CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3),
  12300. };
  12301. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  12302. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  12303. TestCompletionCallback callback;
  12304. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  12305. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  12306. EXPECT_THAT(callback.GetResult(rv), IsOk());
  12307. const HttpResponseInfo* response = trans.GetResponseInfo();
  12308. ASSERT_TRUE(response);
  12309. ASSERT_TRUE(response->headers);
  12310. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  12311. EXPECT_TRUE(response->was_fetched_via_spdy);
  12312. EXPECT_TRUE(response->was_alpn_negotiated);
  12313. std::string response_data;
  12314. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  12315. EXPECT_EQ("hello!", response_data);
  12316. // Origin host bypasses proxy, no resolution should have happened.
  12317. ASSERT_TRUE(capturing_proxy_resolver.lookup_info().empty());
  12318. }
  12319. TEST_F(HttpNetworkTransactionTest, UseAlternativeServiceForTunneledNpnSpdy) {
  12320. ProxyConfig proxy_config;
  12321. proxy_config.set_auto_detect(true);
  12322. proxy_config.set_pac_url(GURL("http://fooproxyurl"));
  12323. CapturingProxyResolver capturing_proxy_resolver;
  12324. session_deps_.proxy_resolution_service =
  12325. std::make_unique<ConfiguredProxyResolutionService>(
  12326. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  12327. proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)),
  12328. std::make_unique<CapturingProxyResolverFactory>(
  12329. &capturing_proxy_resolver),
  12330. nullptr, /*quick_check_enabled=*/true);
  12331. session_deps_.net_log = net::NetLog::Get();
  12332. HttpRequestInfo request;
  12333. request.method = "GET";
  12334. request.url = GURL("https://www.example.org/");
  12335. request.traffic_annotation =
  12336. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  12337. MockRead data_reads[] = {
  12338. MockRead("HTTP/1.1 200 OK\r\n"),
  12339. MockRead(kAlternativeServiceHttpHeader),
  12340. MockRead("\r\n"),
  12341. MockRead("hello world"),
  12342. MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
  12343. MockRead(ASYNC, OK),
  12344. };
  12345. StaticSocketDataProvider first_transaction(data_reads,
  12346. base::span<MockWrite>());
  12347. session_deps_.socket_factory->AddSocketDataProvider(&first_transaction);
  12348. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  12349. ssl_http11.next_proto = kProtoHTTP11;
  12350. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  12351. AddSSLSocketData();
  12352. spdy::SpdySerializedFrame req(
  12353. spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST));
  12354. MockWrite spdy_writes[] = {
  12355. MockWrite(ASYNC, 0,
  12356. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  12357. "Host: www.example.org:443\r\n"
  12358. "Proxy-Connection: keep-alive\r\n\r\n"),
  12359. CreateMockWrite(req, 2),
  12360. };
  12361. const char kCONNECTResponse[] = "HTTP/1.1 200 Connected\r\n\r\n";
  12362. spdy::SpdySerializedFrame resp(
  12363. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  12364. spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true));
  12365. MockRead spdy_reads[] = {
  12366. MockRead(ASYNC, 1, kCONNECTResponse), CreateMockRead(resp, 3),
  12367. CreateMockRead(data, 4), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 5),
  12368. };
  12369. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  12370. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  12371. MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING);
  12372. StaticSocketDataProvider hanging_non_alternate_protocol_socket;
  12373. hanging_non_alternate_protocol_socket.set_connect_data(
  12374. never_finishing_connect);
  12375. session_deps_.socket_factory->AddSocketDataProvider(
  12376. &hanging_non_alternate_protocol_socket);
  12377. TestCompletionCallback callback;
  12378. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  12379. auto trans =
  12380. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  12381. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  12382. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12383. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12384. const HttpResponseInfo* response = trans->GetResponseInfo();
  12385. ASSERT_TRUE(response);
  12386. ASSERT_TRUE(response->headers);
  12387. EXPECT_EQ("HTTP/0.9 200 OK", response->headers->GetStatusLine());
  12388. EXPECT_FALSE(response->was_fetched_via_spdy);
  12389. EXPECT_TRUE(response->was_alpn_negotiated);
  12390. std::string response_data;
  12391. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  12392. EXPECT_EQ("hello world", response_data);
  12393. trans =
  12394. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  12395. rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  12396. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12397. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12398. response = trans->GetResponseInfo();
  12399. ASSERT_TRUE(response);
  12400. ASSERT_TRUE(response->headers);
  12401. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  12402. EXPECT_TRUE(response->was_fetched_via_spdy);
  12403. EXPECT_TRUE(response->was_alpn_negotiated);
  12404. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  12405. EXPECT_EQ("hello!", response_data);
  12406. ASSERT_EQ(2u, capturing_proxy_resolver.lookup_info().size());
  12407. EXPECT_EQ("https://www.example.org/",
  12408. capturing_proxy_resolver.lookup_info()[0].url.spec());
  12409. EXPECT_EQ("https://www.example.org/",
  12410. capturing_proxy_resolver.lookup_info()[1].url.spec());
  12411. LoadTimingInfo load_timing_info;
  12412. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  12413. TestLoadTimingNotReusedWithPac(load_timing_info,
  12414. CONNECT_TIMING_HAS_SSL_TIMES);
  12415. }
  12416. TEST_F(HttpNetworkTransactionTest,
  12417. UseAlternativeServiceForNpnSpdyWithExistingSpdySession) {
  12418. HttpRequestInfo request;
  12419. request.method = "GET";
  12420. request.url = GURL("https://www.example.org/");
  12421. request.traffic_annotation =
  12422. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  12423. MockRead data_reads[] = {
  12424. MockRead("HTTP/1.1 200 OK\r\n"),
  12425. MockRead(kAlternativeServiceHttpHeader),
  12426. MockRead("\r\n"),
  12427. MockRead("hello world"),
  12428. MockRead(ASYNC, OK),
  12429. };
  12430. StaticSocketDataProvider first_transaction(data_reads,
  12431. base::span<MockWrite>());
  12432. session_deps_.socket_factory->AddSocketDataProvider(&first_transaction);
  12433. SSLSocketDataProvider ssl_http11(ASYNC, OK);
  12434. ssl_http11.next_proto = kProtoHTTP11;
  12435. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11);
  12436. AddSSLSocketData();
  12437. spdy::SpdySerializedFrame req(
  12438. spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST));
  12439. MockWrite spdy_writes[] = {CreateMockWrite(req, 0)};
  12440. spdy::SpdySerializedFrame resp(
  12441. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  12442. spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true));
  12443. MockRead spdy_reads[] = {
  12444. CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3),
  12445. };
  12446. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  12447. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  12448. TestCompletionCallback callback;
  12449. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  12450. auto trans =
  12451. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  12452. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  12453. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12454. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12455. const HttpResponseInfo* response = trans->GetResponseInfo();
  12456. ASSERT_TRUE(response);
  12457. ASSERT_TRUE(response->headers);
  12458. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  12459. std::string response_data;
  12460. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  12461. EXPECT_EQ("hello world", response_data);
  12462. // Set up an initial SpdySession in the pool to reuse.
  12463. HostPortPair host_port_pair("www.example.org", 443);
  12464. SpdySessionKey key(host_port_pair, ProxyServer::Direct(),
  12465. PRIVACY_MODE_DISABLED,
  12466. SpdySessionKey::IsProxySession::kFalse, SocketTag(),
  12467. NetworkIsolationKey(), SecureDnsPolicy::kAllow);
  12468. base::WeakPtr<SpdySession> spdy_session =
  12469. CreateSpdySession(session.get(), key, NetLogWithSource());
  12470. trans =
  12471. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  12472. rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  12473. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  12474. EXPECT_THAT(callback.WaitForResult(), IsOk());
  12475. response = trans->GetResponseInfo();
  12476. ASSERT_TRUE(response);
  12477. ASSERT_TRUE(response->headers);
  12478. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  12479. EXPECT_TRUE(response->was_fetched_via_spdy);
  12480. EXPECT_TRUE(response->was_alpn_negotiated);
  12481. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  12482. EXPECT_EQ("hello!", response_data);
  12483. }
  12484. // GenerateAuthToken is a mighty big test.
  12485. // It tests all permutation of GenerateAuthToken behavior:
  12486. // - Synchronous and Asynchronous completion.
  12487. // - OK or error on completion.
  12488. // - Direct connection, non-authenticating proxy, and authenticating proxy.
  12489. // - HTTP or HTTPS backend (to include proxy tunneling).
  12490. // - Non-authenticating and authenticating backend.
  12491. //
  12492. // In all, there are 44 reasonable permuations (for example, if there are
  12493. // problems generating an auth token for an authenticating proxy, we don't
  12494. // need to test all permutations of the backend server).
  12495. //
  12496. // The test proceeds by going over each of the configuration cases, and
  12497. // potentially running up to three rounds in each of the tests. The TestConfig
  12498. // specifies both the configuration for the test as well as the expectations
  12499. // for the results.
  12500. TEST_F(HttpNetworkTransactionTest, GenerateAuthToken) {
  12501. static const char kServer[] = "http://www.example.com";
  12502. static const char kSecureServer[] = "https://www.example.com";
  12503. static const char kProxy[] = "myproxy:70";
  12504. enum AuthTiming {
  12505. AUTH_NONE,
  12506. AUTH_SYNC,
  12507. AUTH_ASYNC,
  12508. };
  12509. const MockWrite kGet(
  12510. "GET / HTTP/1.1\r\n"
  12511. "Host: www.example.com\r\n"
  12512. "Connection: keep-alive\r\n\r\n");
  12513. const MockWrite kGetProxy(
  12514. "GET http://www.example.com/ HTTP/1.1\r\n"
  12515. "Host: www.example.com\r\n"
  12516. "Proxy-Connection: keep-alive\r\n\r\n");
  12517. const MockWrite kGetAuth(
  12518. "GET / HTTP/1.1\r\n"
  12519. "Host: www.example.com\r\n"
  12520. "Connection: keep-alive\r\n"
  12521. "Authorization: auth_token\r\n\r\n");
  12522. const MockWrite kGetProxyAuth(
  12523. "GET http://www.example.com/ HTTP/1.1\r\n"
  12524. "Host: www.example.com\r\n"
  12525. "Proxy-Connection: keep-alive\r\n"
  12526. "Proxy-Authorization: auth_token\r\n\r\n");
  12527. const MockWrite kGetAuthThroughProxy(
  12528. "GET http://www.example.com/ HTTP/1.1\r\n"
  12529. "Host: www.example.com\r\n"
  12530. "Proxy-Connection: keep-alive\r\n"
  12531. "Authorization: auth_token\r\n\r\n");
  12532. const MockWrite kGetAuthWithProxyAuth(
  12533. "GET http://www.example.com/ HTTP/1.1\r\n"
  12534. "Host: www.example.com\r\n"
  12535. "Proxy-Connection: keep-alive\r\n"
  12536. "Proxy-Authorization: auth_token\r\n"
  12537. "Authorization: auth_token\r\n\r\n");
  12538. const MockWrite kConnect(
  12539. "CONNECT www.example.com:443 HTTP/1.1\r\n"
  12540. "Host: www.example.com:443\r\n"
  12541. "Proxy-Connection: keep-alive\r\n\r\n");
  12542. const MockWrite kConnectProxyAuth(
  12543. "CONNECT www.example.com:443 HTTP/1.1\r\n"
  12544. "Host: www.example.com:443\r\n"
  12545. "Proxy-Connection: keep-alive\r\n"
  12546. "Proxy-Authorization: auth_token\r\n\r\n");
  12547. const MockRead kSuccess(
  12548. "HTTP/1.1 200 OK\r\n"
  12549. "Content-Type: text/html; charset=iso-8859-1\r\n"
  12550. "Content-Length: 3\r\n\r\n"
  12551. "Yes");
  12552. const MockRead kFailure(
  12553. "Should not be called.");
  12554. const MockRead kServerChallenge(
  12555. "HTTP/1.1 401 Unauthorized\r\n"
  12556. "WWW-Authenticate: Mock realm=server\r\n"
  12557. "Content-Type: text/html; charset=iso-8859-1\r\n"
  12558. "Content-Length: 14\r\n\r\n"
  12559. "Unauthorized\r\n");
  12560. const MockRead kProxyChallenge(
  12561. "HTTP/1.1 407 Unauthorized\r\n"
  12562. "Proxy-Authenticate: Mock realm=proxy\r\n"
  12563. "Proxy-Connection: close\r\n"
  12564. "Content-Type: text/html; charset=iso-8859-1\r\n"
  12565. "Content-Length: 14\r\n\r\n"
  12566. "Unauthorized\r\n");
  12567. const MockRead kProxyConnected(
  12568. "HTTP/1.1 200 Connection Established\r\n\r\n");
  12569. // NOTE(cbentzel): I wanted TestReadWriteRound to be a simple struct with
  12570. // no constructors, but the C++ compiler on Windows warns about
  12571. // unspecified data in compound literals. So, moved to using constructors,
  12572. // and TestRound's created with the default constructor should not be used.
  12573. struct TestRound {
  12574. TestRound()
  12575. : expected_rv(ERR_UNEXPECTED),
  12576. extra_write(nullptr),
  12577. extra_read(nullptr) {}
  12578. TestRound(const MockWrite& write_arg,
  12579. const MockRead& read_arg,
  12580. int expected_rv_arg)
  12581. : write(write_arg),
  12582. read(read_arg),
  12583. expected_rv(expected_rv_arg),
  12584. extra_write(nullptr),
  12585. extra_read(nullptr) {}
  12586. TestRound(const MockWrite& write_arg, const MockRead& read_arg,
  12587. int expected_rv_arg, const MockWrite* extra_write_arg,
  12588. const MockRead* extra_read_arg)
  12589. : write(write_arg),
  12590. read(read_arg),
  12591. expected_rv(expected_rv_arg),
  12592. extra_write(extra_write_arg),
  12593. extra_read(extra_read_arg) {
  12594. }
  12595. MockWrite write;
  12596. MockRead read;
  12597. int expected_rv;
  12598. raw_ptr<const MockWrite> extra_write;
  12599. raw_ptr<const MockRead> extra_read;
  12600. };
  12601. static const int kNoSSL = 500;
  12602. struct TestConfig {
  12603. int line_number;
  12604. const char* const proxy_url;
  12605. AuthTiming proxy_auth_timing;
  12606. int first_generate_proxy_token_rv;
  12607. const char* const server_url;
  12608. AuthTiming server_auth_timing;
  12609. int first_generate_server_token_rv;
  12610. int num_auth_rounds;
  12611. int first_ssl_round;
  12612. TestRound rounds[4];
  12613. } test_configs[] = {
  12614. // Non-authenticating HTTP server with a direct connection.
  12615. {__LINE__,
  12616. nullptr,
  12617. AUTH_NONE,
  12618. OK,
  12619. kServer,
  12620. AUTH_NONE,
  12621. OK,
  12622. 1,
  12623. kNoSSL,
  12624. {TestRound(kGet, kSuccess, OK)}},
  12625. // Authenticating HTTP server with a direct connection.
  12626. {__LINE__,
  12627. nullptr,
  12628. AUTH_NONE,
  12629. OK,
  12630. kServer,
  12631. AUTH_SYNC,
  12632. OK,
  12633. 2,
  12634. kNoSSL,
  12635. {TestRound(kGet, kServerChallenge, OK),
  12636. TestRound(kGetAuth, kSuccess, OK)}},
  12637. {__LINE__,
  12638. nullptr,
  12639. AUTH_NONE,
  12640. OK,
  12641. kServer,
  12642. AUTH_SYNC,
  12643. ERR_INVALID_AUTH_CREDENTIALS,
  12644. 3,
  12645. kNoSSL,
  12646. {TestRound(kGet, kServerChallenge, OK),
  12647. TestRound(kGet, kServerChallenge, OK),
  12648. TestRound(kGetAuth, kSuccess, OK)}},
  12649. {__LINE__,
  12650. nullptr,
  12651. AUTH_NONE,
  12652. OK,
  12653. kServer,
  12654. AUTH_SYNC,
  12655. ERR_UNSUPPORTED_AUTH_SCHEME,
  12656. 2,
  12657. kNoSSL,
  12658. {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kSuccess, OK)}},
  12659. {__LINE__,
  12660. nullptr,
  12661. AUTH_NONE,
  12662. OK,
  12663. kServer,
  12664. AUTH_SYNC,
  12665. ERR_UNDOCUMENTED_SECURITY_LIBRARY_STATUS,
  12666. 2,
  12667. kNoSSL,
  12668. {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kSuccess, OK)}},
  12669. {__LINE__,
  12670. kProxy,
  12671. AUTH_SYNC,
  12672. ERR_FAILED,
  12673. kServer,
  12674. AUTH_NONE,
  12675. OK,
  12676. 2,
  12677. kNoSSL,
  12678. {TestRound(kGetProxy, kProxyChallenge, OK),
  12679. TestRound(kGetProxy, kFailure, ERR_FAILED)}},
  12680. {__LINE__,
  12681. kProxy,
  12682. AUTH_ASYNC,
  12683. ERR_FAILED,
  12684. kServer,
  12685. AUTH_NONE,
  12686. OK,
  12687. 2,
  12688. kNoSSL,
  12689. {TestRound(kGetProxy, kProxyChallenge, OK),
  12690. TestRound(kGetProxy, kFailure, ERR_FAILED)}},
  12691. {__LINE__,
  12692. nullptr,
  12693. AUTH_NONE,
  12694. OK,
  12695. kServer,
  12696. AUTH_SYNC,
  12697. ERR_FAILED,
  12698. 2,
  12699. kNoSSL,
  12700. {TestRound(kGet, kServerChallenge, OK),
  12701. TestRound(kGet, kFailure, ERR_FAILED)}},
  12702. {__LINE__,
  12703. nullptr,
  12704. AUTH_NONE,
  12705. OK,
  12706. kServer,
  12707. AUTH_ASYNC,
  12708. ERR_FAILED,
  12709. 2,
  12710. kNoSSL,
  12711. {TestRound(kGet, kServerChallenge, OK),
  12712. TestRound(kGet, kFailure, ERR_FAILED)}},
  12713. {__LINE__,
  12714. nullptr,
  12715. AUTH_NONE,
  12716. OK,
  12717. kServer,
  12718. AUTH_ASYNC,
  12719. OK,
  12720. 2,
  12721. kNoSSL,
  12722. {TestRound(kGet, kServerChallenge, OK),
  12723. TestRound(kGetAuth, kSuccess, OK)}},
  12724. {__LINE__,
  12725. nullptr,
  12726. AUTH_NONE,
  12727. OK,
  12728. kServer,
  12729. AUTH_ASYNC,
  12730. ERR_INVALID_AUTH_CREDENTIALS,
  12731. 3,
  12732. kNoSSL,
  12733. {TestRound(kGet, kServerChallenge, OK),
  12734. // The second round uses a HttpAuthHandlerMock that always succeeds.
  12735. TestRound(kGet, kServerChallenge, OK),
  12736. TestRound(kGetAuth, kSuccess, OK)}},
  12737. // Non-authenticating HTTP server through a non-authenticating proxy.
  12738. {__LINE__,
  12739. kProxy,
  12740. AUTH_NONE,
  12741. OK,
  12742. kServer,
  12743. AUTH_NONE,
  12744. OK,
  12745. 1,
  12746. kNoSSL,
  12747. {TestRound(kGetProxy, kSuccess, OK)}},
  12748. // Authenticating HTTP server through a non-authenticating proxy.
  12749. {__LINE__,
  12750. kProxy,
  12751. AUTH_NONE,
  12752. OK,
  12753. kServer,
  12754. AUTH_SYNC,
  12755. OK,
  12756. 2,
  12757. kNoSSL,
  12758. {TestRound(kGetProxy, kServerChallenge, OK),
  12759. TestRound(kGetAuthThroughProxy, kSuccess, OK)}},
  12760. {__LINE__,
  12761. kProxy,
  12762. AUTH_NONE,
  12763. OK,
  12764. kServer,
  12765. AUTH_SYNC,
  12766. ERR_INVALID_AUTH_CREDENTIALS,
  12767. 3,
  12768. kNoSSL,
  12769. {TestRound(kGetProxy, kServerChallenge, OK),
  12770. TestRound(kGetProxy, kServerChallenge, OK),
  12771. TestRound(kGetAuthThroughProxy, kSuccess, OK)}},
  12772. {__LINE__,
  12773. kProxy,
  12774. AUTH_NONE,
  12775. OK,
  12776. kServer,
  12777. AUTH_ASYNC,
  12778. OK,
  12779. 2,
  12780. kNoSSL,
  12781. {TestRound(kGetProxy, kServerChallenge, OK),
  12782. TestRound(kGetAuthThroughProxy, kSuccess, OK)}},
  12783. {__LINE__,
  12784. kProxy,
  12785. AUTH_NONE,
  12786. OK,
  12787. kServer,
  12788. AUTH_ASYNC,
  12789. ERR_INVALID_AUTH_CREDENTIALS,
  12790. 2,
  12791. kNoSSL,
  12792. {TestRound(kGetProxy, kServerChallenge, OK),
  12793. TestRound(kGetProxy, kSuccess, OK)}},
  12794. // Non-authenticating HTTP server through an authenticating proxy.
  12795. {__LINE__,
  12796. kProxy,
  12797. AUTH_SYNC,
  12798. OK,
  12799. kServer,
  12800. AUTH_NONE,
  12801. OK,
  12802. 2,
  12803. kNoSSL,
  12804. {TestRound(kGetProxy, kProxyChallenge, OK),
  12805. TestRound(kGetProxyAuth, kSuccess, OK)}},
  12806. {__LINE__,
  12807. kProxy,
  12808. AUTH_SYNC,
  12809. ERR_INVALID_AUTH_CREDENTIALS,
  12810. kServer,
  12811. AUTH_NONE,
  12812. OK,
  12813. 2,
  12814. kNoSSL,
  12815. {TestRound(kGetProxy, kProxyChallenge, OK),
  12816. TestRound(kGetProxy, kSuccess, OK)}},
  12817. {__LINE__,
  12818. kProxy,
  12819. AUTH_ASYNC,
  12820. OK,
  12821. kServer,
  12822. AUTH_NONE,
  12823. OK,
  12824. 2,
  12825. kNoSSL,
  12826. {TestRound(kGetProxy, kProxyChallenge, OK),
  12827. TestRound(kGetProxyAuth, kSuccess, OK)}},
  12828. {__LINE__,
  12829. kProxy,
  12830. AUTH_ASYNC,
  12831. ERR_INVALID_AUTH_CREDENTIALS,
  12832. kServer,
  12833. AUTH_NONE,
  12834. OK,
  12835. 2,
  12836. kNoSSL,
  12837. {TestRound(kGetProxy, kProxyChallenge, OK),
  12838. TestRound(kGetProxy, kSuccess, OK)}},
  12839. {__LINE__,
  12840. kProxy,
  12841. AUTH_ASYNC,
  12842. ERR_INVALID_AUTH_CREDENTIALS,
  12843. kServer,
  12844. AUTH_NONE,
  12845. OK,
  12846. 3,
  12847. kNoSSL,
  12848. {TestRound(kGetProxy, kProxyChallenge, OK),
  12849. TestRound(kGetProxy, kProxyChallenge, OK),
  12850. TestRound(kGetProxyAuth, kSuccess, OK)}},
  12851. // Authenticating HTTP server through an authenticating proxy.
  12852. {__LINE__,
  12853. kProxy,
  12854. AUTH_SYNC,
  12855. OK,
  12856. kServer,
  12857. AUTH_SYNC,
  12858. OK,
  12859. 3,
  12860. kNoSSL,
  12861. {TestRound(kGetProxy, kProxyChallenge, OK),
  12862. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12863. TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}},
  12864. {__LINE__,
  12865. kProxy,
  12866. AUTH_SYNC,
  12867. OK,
  12868. kServer,
  12869. AUTH_SYNC,
  12870. ERR_INVALID_AUTH_CREDENTIALS,
  12871. 3,
  12872. kNoSSL,
  12873. {TestRound(kGetProxy, kProxyChallenge, OK),
  12874. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12875. TestRound(kGetProxyAuth, kSuccess, OK)}},
  12876. {__LINE__,
  12877. kProxy,
  12878. AUTH_ASYNC,
  12879. OK,
  12880. kServer,
  12881. AUTH_SYNC,
  12882. OK,
  12883. 3,
  12884. kNoSSL,
  12885. {TestRound(kGetProxy, kProxyChallenge, OK),
  12886. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12887. TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}},
  12888. {__LINE__,
  12889. kProxy,
  12890. AUTH_ASYNC,
  12891. OK,
  12892. kServer,
  12893. AUTH_SYNC,
  12894. ERR_INVALID_AUTH_CREDENTIALS,
  12895. 3,
  12896. kNoSSL,
  12897. {TestRound(kGetProxy, kProxyChallenge, OK),
  12898. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12899. TestRound(kGetProxyAuth, kSuccess, OK)}},
  12900. {__LINE__,
  12901. kProxy,
  12902. AUTH_SYNC,
  12903. OK,
  12904. kServer,
  12905. AUTH_ASYNC,
  12906. OK,
  12907. 3,
  12908. kNoSSL,
  12909. {TestRound(kGetProxy, kProxyChallenge, OK),
  12910. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12911. TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}},
  12912. {__LINE__,
  12913. kProxy,
  12914. AUTH_SYNC,
  12915. ERR_INVALID_AUTH_CREDENTIALS,
  12916. kServer,
  12917. AUTH_ASYNC,
  12918. OK,
  12919. 4,
  12920. kNoSSL,
  12921. {TestRound(kGetProxy, kProxyChallenge, OK),
  12922. TestRound(kGetProxy, kProxyChallenge, OK),
  12923. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12924. TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}},
  12925. {__LINE__,
  12926. kProxy,
  12927. AUTH_SYNC,
  12928. OK,
  12929. kServer,
  12930. AUTH_ASYNC,
  12931. ERR_INVALID_AUTH_CREDENTIALS,
  12932. 3,
  12933. kNoSSL,
  12934. {TestRound(kGetProxy, kProxyChallenge, OK),
  12935. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12936. TestRound(kGetProxyAuth, kSuccess, OK)}},
  12937. {__LINE__,
  12938. kProxy,
  12939. AUTH_ASYNC,
  12940. OK,
  12941. kServer,
  12942. AUTH_ASYNC,
  12943. OK,
  12944. 3,
  12945. kNoSSL,
  12946. {TestRound(kGetProxy, kProxyChallenge, OK),
  12947. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12948. TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}},
  12949. {__LINE__,
  12950. kProxy,
  12951. AUTH_ASYNC,
  12952. OK,
  12953. kServer,
  12954. AUTH_ASYNC,
  12955. ERR_INVALID_AUTH_CREDENTIALS,
  12956. 3,
  12957. kNoSSL,
  12958. {TestRound(kGetProxy, kProxyChallenge, OK),
  12959. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12960. TestRound(kGetProxyAuth, kSuccess, OK)}},
  12961. {__LINE__,
  12962. kProxy,
  12963. AUTH_ASYNC,
  12964. ERR_INVALID_AUTH_CREDENTIALS,
  12965. kServer,
  12966. AUTH_ASYNC,
  12967. ERR_INVALID_AUTH_CREDENTIALS,
  12968. 4,
  12969. kNoSSL,
  12970. {TestRound(kGetProxy, kProxyChallenge, OK),
  12971. TestRound(kGetProxy, kProxyChallenge, OK),
  12972. TestRound(kGetProxyAuth, kServerChallenge, OK),
  12973. TestRound(kGetProxyAuth, kSuccess, OK)}},
  12974. // Non-authenticating HTTPS server with a direct connection.
  12975. {__LINE__,
  12976. nullptr,
  12977. AUTH_NONE,
  12978. OK,
  12979. kSecureServer,
  12980. AUTH_NONE,
  12981. OK,
  12982. 1,
  12983. 0,
  12984. {TestRound(kGet, kSuccess, OK)}},
  12985. // Authenticating HTTPS server with a direct connection.
  12986. {__LINE__,
  12987. nullptr,
  12988. AUTH_NONE,
  12989. OK,
  12990. kSecureServer,
  12991. AUTH_SYNC,
  12992. OK,
  12993. 2,
  12994. 0,
  12995. {TestRound(kGet, kServerChallenge, OK),
  12996. TestRound(kGetAuth, kSuccess, OK)}},
  12997. {__LINE__,
  12998. nullptr,
  12999. AUTH_NONE,
  13000. OK,
  13001. kSecureServer,
  13002. AUTH_SYNC,
  13003. ERR_INVALID_AUTH_CREDENTIALS,
  13004. 2,
  13005. 0,
  13006. {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kSuccess, OK)}},
  13007. {__LINE__,
  13008. nullptr,
  13009. AUTH_NONE,
  13010. OK,
  13011. kSecureServer,
  13012. AUTH_ASYNC,
  13013. OK,
  13014. 2,
  13015. 0,
  13016. {TestRound(kGet, kServerChallenge, OK),
  13017. TestRound(kGetAuth, kSuccess, OK)}},
  13018. {__LINE__,
  13019. nullptr,
  13020. AUTH_NONE,
  13021. OK,
  13022. kSecureServer,
  13023. AUTH_ASYNC,
  13024. ERR_INVALID_AUTH_CREDENTIALS,
  13025. 2,
  13026. 0,
  13027. {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kSuccess, OK)}},
  13028. // Non-authenticating HTTPS server with a non-authenticating proxy.
  13029. {__LINE__,
  13030. kProxy,
  13031. AUTH_NONE,
  13032. OK,
  13033. kSecureServer,
  13034. AUTH_NONE,
  13035. OK,
  13036. 1,
  13037. 0,
  13038. {TestRound(kConnect, kProxyConnected, OK, &kGet, &kSuccess)}},
  13039. // Authenticating HTTPS server through a non-authenticating proxy.
  13040. {__LINE__,
  13041. kProxy,
  13042. AUTH_NONE,
  13043. OK,
  13044. kSecureServer,
  13045. AUTH_SYNC,
  13046. OK,
  13047. 2,
  13048. 0,
  13049. {TestRound(kConnect, kProxyConnected, OK, &kGet, &kServerChallenge),
  13050. TestRound(kGetAuth, kSuccess, OK)}},
  13051. {__LINE__,
  13052. kProxy,
  13053. AUTH_NONE,
  13054. OK,
  13055. kSecureServer,
  13056. AUTH_SYNC,
  13057. ERR_INVALID_AUTH_CREDENTIALS,
  13058. 2,
  13059. 0,
  13060. {TestRound(kConnect, kProxyConnected, OK, &kGet, &kServerChallenge),
  13061. TestRound(kGet, kSuccess, OK)}},
  13062. {__LINE__,
  13063. kProxy,
  13064. AUTH_NONE,
  13065. OK,
  13066. kSecureServer,
  13067. AUTH_ASYNC,
  13068. OK,
  13069. 2,
  13070. 0,
  13071. {TestRound(kConnect, kProxyConnected, OK, &kGet, &kServerChallenge),
  13072. TestRound(kGetAuth, kSuccess, OK)}},
  13073. {__LINE__,
  13074. kProxy,
  13075. AUTH_NONE,
  13076. OK,
  13077. kSecureServer,
  13078. AUTH_ASYNC,
  13079. ERR_INVALID_AUTH_CREDENTIALS,
  13080. 2,
  13081. 0,
  13082. {TestRound(kConnect, kProxyConnected, OK, &kGet, &kServerChallenge),
  13083. TestRound(kGet, kSuccess, OK)}},
  13084. // Non-Authenticating HTTPS server through an authenticating proxy.
  13085. {__LINE__,
  13086. kProxy,
  13087. AUTH_SYNC,
  13088. OK,
  13089. kSecureServer,
  13090. AUTH_NONE,
  13091. OK,
  13092. 2,
  13093. 1,
  13094. {TestRound(kConnect, kProxyChallenge, OK),
  13095. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kSuccess)}},
  13096. {__LINE__,
  13097. kProxy,
  13098. AUTH_SYNC,
  13099. ERR_INVALID_AUTH_CREDENTIALS,
  13100. kSecureServer,
  13101. AUTH_NONE,
  13102. OK,
  13103. 2,
  13104. kNoSSL,
  13105. {TestRound(kConnect, kProxyChallenge, OK),
  13106. TestRound(kConnect, kProxyConnected, OK, &kGet, &kSuccess)}},
  13107. {__LINE__,
  13108. kProxy,
  13109. AUTH_SYNC,
  13110. ERR_UNSUPPORTED_AUTH_SCHEME,
  13111. kSecureServer,
  13112. AUTH_NONE,
  13113. OK,
  13114. 2,
  13115. kNoSSL,
  13116. {TestRound(kConnect, kProxyChallenge, OK),
  13117. TestRound(kConnect, kProxyConnected, OK, &kGet, &kSuccess)}},
  13118. {__LINE__,
  13119. kProxy,
  13120. AUTH_SYNC,
  13121. ERR_UNEXPECTED,
  13122. kSecureServer,
  13123. AUTH_NONE,
  13124. OK,
  13125. 2,
  13126. kNoSSL,
  13127. {TestRound(kConnect, kProxyChallenge, OK),
  13128. TestRound(kConnect, kProxyConnected, ERR_UNEXPECTED)}},
  13129. {__LINE__,
  13130. kProxy,
  13131. AUTH_ASYNC,
  13132. OK,
  13133. kSecureServer,
  13134. AUTH_NONE,
  13135. OK,
  13136. 2,
  13137. 1,
  13138. {TestRound(kConnect, kProxyChallenge, OK),
  13139. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kSuccess)}},
  13140. {__LINE__,
  13141. kProxy,
  13142. AUTH_ASYNC,
  13143. ERR_INVALID_AUTH_CREDENTIALS,
  13144. kSecureServer,
  13145. AUTH_NONE,
  13146. OK,
  13147. 2,
  13148. kNoSSL,
  13149. {TestRound(kConnect, kProxyChallenge, OK),
  13150. TestRound(kConnect, kProxyConnected, OK, &kGet, &kSuccess)}},
  13151. // Authenticating HTTPS server through an authenticating proxy.
  13152. {__LINE__,
  13153. kProxy,
  13154. AUTH_SYNC,
  13155. OK,
  13156. kSecureServer,
  13157. AUTH_SYNC,
  13158. OK,
  13159. 3,
  13160. 1,
  13161. {TestRound(kConnect, kProxyChallenge, OK),
  13162. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13163. &kServerChallenge),
  13164. TestRound(kGetAuth, kSuccess, OK)}},
  13165. {__LINE__,
  13166. kProxy,
  13167. AUTH_SYNC,
  13168. OK,
  13169. kSecureServer,
  13170. AUTH_SYNC,
  13171. ERR_INVALID_AUTH_CREDENTIALS,
  13172. 3,
  13173. 1,
  13174. {TestRound(kConnect, kProxyChallenge, OK),
  13175. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13176. &kServerChallenge),
  13177. TestRound(kGet, kSuccess, OK)}},
  13178. {__LINE__,
  13179. kProxy,
  13180. AUTH_ASYNC,
  13181. OK,
  13182. kSecureServer,
  13183. AUTH_SYNC,
  13184. OK,
  13185. 3,
  13186. 1,
  13187. {TestRound(kConnect, kProxyChallenge, OK),
  13188. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13189. &kServerChallenge),
  13190. TestRound(kGetAuth, kSuccess, OK)}},
  13191. {__LINE__,
  13192. kProxy,
  13193. AUTH_ASYNC,
  13194. OK,
  13195. kSecureServer,
  13196. AUTH_SYNC,
  13197. ERR_INVALID_AUTH_CREDENTIALS,
  13198. 3,
  13199. 1,
  13200. {TestRound(kConnect, kProxyChallenge, OK),
  13201. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13202. &kServerChallenge),
  13203. TestRound(kGet, kSuccess, OK)}},
  13204. {__LINE__,
  13205. kProxy,
  13206. AUTH_SYNC,
  13207. OK,
  13208. kSecureServer,
  13209. AUTH_ASYNC,
  13210. OK,
  13211. 3,
  13212. 1,
  13213. {TestRound(kConnect, kProxyChallenge, OK),
  13214. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13215. &kServerChallenge),
  13216. TestRound(kGetAuth, kSuccess, OK)}},
  13217. {__LINE__,
  13218. kProxy,
  13219. AUTH_SYNC,
  13220. OK,
  13221. kSecureServer,
  13222. AUTH_ASYNC,
  13223. ERR_INVALID_AUTH_CREDENTIALS,
  13224. 3,
  13225. 1,
  13226. {TestRound(kConnect, kProxyChallenge, OK),
  13227. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13228. &kServerChallenge),
  13229. TestRound(kGet, kSuccess, OK)}},
  13230. {__LINE__,
  13231. kProxy,
  13232. AUTH_ASYNC,
  13233. OK,
  13234. kSecureServer,
  13235. AUTH_ASYNC,
  13236. OK,
  13237. 3,
  13238. 1,
  13239. {TestRound(kConnect, kProxyChallenge, OK),
  13240. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13241. &kServerChallenge),
  13242. TestRound(kGetAuth, kSuccess, OK)}},
  13243. {__LINE__,
  13244. kProxy,
  13245. AUTH_ASYNC,
  13246. OK,
  13247. kSecureServer,
  13248. AUTH_ASYNC,
  13249. ERR_INVALID_AUTH_CREDENTIALS,
  13250. 3,
  13251. 1,
  13252. {TestRound(kConnect, kProxyChallenge, OK),
  13253. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13254. &kServerChallenge),
  13255. TestRound(kGet, kSuccess, OK)}},
  13256. {__LINE__,
  13257. kProxy,
  13258. AUTH_ASYNC,
  13259. ERR_INVALID_AUTH_CREDENTIALS,
  13260. kSecureServer,
  13261. AUTH_ASYNC,
  13262. ERR_INVALID_AUTH_CREDENTIALS,
  13263. 4,
  13264. 2,
  13265. {TestRound(kConnect, kProxyChallenge, OK),
  13266. TestRound(kConnect, kProxyChallenge, OK),
  13267. TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet,
  13268. &kServerChallenge),
  13269. TestRound(kGet, kSuccess, OK)}},
  13270. };
  13271. for (const auto& test_config : test_configs) {
  13272. SCOPED_TRACE(::testing::Message() << "Test config at "
  13273. << test_config.line_number);
  13274. auto auth_factory = std::make_unique<HttpAuthHandlerMock::Factory>();
  13275. auto* auth_factory_ptr = auth_factory.get();
  13276. session_deps_.http_auth_handler_factory = std::move(auth_factory);
  13277. SSLInfo empty_ssl_info;
  13278. // Set up authentication handlers as necessary.
  13279. if (test_config.proxy_auth_timing != AUTH_NONE) {
  13280. for (int n = 0; n < 3; n++) {
  13281. auto auth_handler = std::make_unique<HttpAuthHandlerMock>();
  13282. std::string auth_challenge = "Mock realm=proxy";
  13283. url::SchemeHostPort scheme_host_port(GURL(test_config.proxy_url));
  13284. HttpAuthChallengeTokenizer tokenizer(auth_challenge.begin(),
  13285. auth_challenge.end());
  13286. auth_handler->InitFromChallenge(&tokenizer, HttpAuth::AUTH_PROXY,
  13287. empty_ssl_info, NetworkIsolationKey(),
  13288. scheme_host_port, NetLogWithSource());
  13289. auth_handler->SetGenerateExpectation(
  13290. test_config.proxy_auth_timing == AUTH_ASYNC,
  13291. n == 0 ? test_config.first_generate_proxy_token_rv : OK);
  13292. auth_factory_ptr->AddMockHandler(std::move(auth_handler),
  13293. HttpAuth::AUTH_PROXY);
  13294. }
  13295. }
  13296. if (test_config.server_auth_timing != AUTH_NONE) {
  13297. auto auth_handler = std::make_unique<HttpAuthHandlerMock>();
  13298. std::string auth_challenge = "Mock realm=server";
  13299. url::SchemeHostPort scheme_host_port(GURL(test_config.server_url));
  13300. HttpAuthChallengeTokenizer tokenizer(auth_challenge.begin(),
  13301. auth_challenge.end());
  13302. auth_handler->InitFromChallenge(&tokenizer, HttpAuth::AUTH_SERVER,
  13303. empty_ssl_info, NetworkIsolationKey(),
  13304. scheme_host_port, NetLogWithSource());
  13305. auth_handler->SetGenerateExpectation(
  13306. test_config.server_auth_timing == AUTH_ASYNC,
  13307. test_config.first_generate_server_token_rv);
  13308. auth_factory_ptr->AddMockHandler(std::move(auth_handler),
  13309. HttpAuth::AUTH_SERVER);
  13310. // The second handler always succeeds. It should only be used where there
  13311. // are multiple auth sessions for server auth in the same network
  13312. // transaction using the same auth scheme.
  13313. std::unique_ptr<HttpAuthHandlerMock> second_handler =
  13314. std::make_unique<HttpAuthHandlerMock>();
  13315. second_handler->InitFromChallenge(&tokenizer, HttpAuth::AUTH_SERVER,
  13316. empty_ssl_info, NetworkIsolationKey(),
  13317. scheme_host_port, NetLogWithSource());
  13318. second_handler->SetGenerateExpectation(true, OK);
  13319. auth_factory_ptr->AddMockHandler(std::move(second_handler),
  13320. HttpAuth::AUTH_SERVER);
  13321. }
  13322. if (test_config.proxy_url) {
  13323. session_deps_.proxy_resolution_service =
  13324. ConfiguredProxyResolutionService::CreateFixedForTest(
  13325. test_config.proxy_url, TRAFFIC_ANNOTATION_FOR_TESTS);
  13326. } else {
  13327. session_deps_.proxy_resolution_service =
  13328. ConfiguredProxyResolutionService::CreateDirect();
  13329. }
  13330. HttpRequestInfo request;
  13331. request.method = "GET";
  13332. request.url = GURL(test_config.server_url);
  13333. request.traffic_annotation =
  13334. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13335. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13336. SSLSocketDataProvider ssl_socket_data_provider(SYNCHRONOUS, OK);
  13337. std::vector<std::vector<MockRead>> mock_reads(1);
  13338. std::vector<std::vector<MockWrite>> mock_writes(1);
  13339. for (int round = 0; round < test_config.num_auth_rounds; ++round) {
  13340. SCOPED_TRACE(round);
  13341. const TestRound& read_write_round = test_config.rounds[round];
  13342. // Set up expected reads and writes.
  13343. mock_reads.back().push_back(read_write_round.read);
  13344. mock_writes.back().push_back(read_write_round.write);
  13345. // kProxyChallenge uses Proxy-Connection: close which means that the
  13346. // socket is closed and a new one will be created for the next request.
  13347. if (read_write_round.read.data == kProxyChallenge.data) {
  13348. mock_reads.emplace_back();
  13349. mock_writes.emplace_back();
  13350. }
  13351. if (read_write_round.extra_read) {
  13352. mock_reads.back().push_back(*read_write_round.extra_read);
  13353. }
  13354. if (read_write_round.extra_write) {
  13355. mock_writes.back().push_back(*read_write_round.extra_write);
  13356. }
  13357. // Add an SSL sequence if necessary.
  13358. if (round >= test_config.first_ssl_round)
  13359. session_deps_.socket_factory->AddSSLSocketDataProvider(
  13360. &ssl_socket_data_provider);
  13361. }
  13362. std::vector<std::unique_ptr<StaticSocketDataProvider>> data_providers;
  13363. for (size_t i = 0; i < mock_reads.size(); ++i) {
  13364. data_providers.push_back(std::make_unique<StaticSocketDataProvider>(
  13365. mock_reads[i], mock_writes[i]));
  13366. session_deps_.socket_factory->AddSocketDataProvider(
  13367. data_providers.back().get());
  13368. }
  13369. // Transaction must be created after DataProviders, so it's destroyed before
  13370. // they are as well.
  13371. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13372. for (int round = 0; round < test_config.num_auth_rounds; ++round) {
  13373. SCOPED_TRACE(round);
  13374. const TestRound& read_write_round = test_config.rounds[round];
  13375. // Start or restart the transaction.
  13376. TestCompletionCallback callback;
  13377. int rv;
  13378. if (round == 0) {
  13379. rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  13380. } else {
  13381. rv = trans.RestartWithAuth(
  13382. AuthCredentials(kFoo, kBar), callback.callback());
  13383. }
  13384. if (rv == ERR_IO_PENDING)
  13385. rv = callback.WaitForResult();
  13386. // Compare results with expected data.
  13387. EXPECT_THAT(rv, IsError(read_write_round.expected_rv));
  13388. const HttpResponseInfo* response = trans.GetResponseInfo();
  13389. if (read_write_round.expected_rv != OK) {
  13390. EXPECT_EQ(round + 1, test_config.num_auth_rounds);
  13391. continue;
  13392. }
  13393. if (round + 1 < test_config.num_auth_rounds) {
  13394. EXPECT_TRUE(response->auth_challenge.has_value());
  13395. } else {
  13396. EXPECT_FALSE(response->auth_challenge.has_value());
  13397. EXPECT_FALSE(trans.IsReadyToRestartForAuth());
  13398. }
  13399. }
  13400. }
  13401. }
  13402. TEST_F(HttpNetworkTransactionTest, MultiRoundAuth) {
  13403. // Do multi-round authentication and make sure it works correctly.
  13404. auto auth_factory = std::make_unique<HttpAuthHandlerMock::Factory>();
  13405. auto* auth_factory_ptr = auth_factory.get();
  13406. session_deps_.http_auth_handler_factory = std::move(auth_factory);
  13407. session_deps_.proxy_resolution_service =
  13408. ConfiguredProxyResolutionService::CreateDirect();
  13409. session_deps_.host_resolver->rules()->AddRule("www.example.com", "10.0.0.1");
  13410. auto auth_handler = std::make_unique<HttpAuthHandlerMock>();
  13411. auto* auth_handler_ptr = auth_handler.get();
  13412. auth_handler->set_connection_based(true);
  13413. std::string auth_challenge = "Mock realm=server";
  13414. GURL url("http://www.example.com");
  13415. HttpAuthChallengeTokenizer tokenizer(auth_challenge.begin(),
  13416. auth_challenge.end());
  13417. SSLInfo empty_ssl_info;
  13418. auth_handler->InitFromChallenge(&tokenizer, HttpAuth::AUTH_SERVER,
  13419. empty_ssl_info, NetworkIsolationKey(),
  13420. url::SchemeHostPort(url), NetLogWithSource());
  13421. auth_factory_ptr->AddMockHandler(std::move(auth_handler),
  13422. HttpAuth::AUTH_SERVER);
  13423. int rv = OK;
  13424. const HttpResponseInfo* response = nullptr;
  13425. HttpRequestInfo request;
  13426. request.method = "GET";
  13427. request.url = url;
  13428. request.traffic_annotation =
  13429. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13430. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13431. // Use a TCP Socket Pool with only one connection per group. This is used
  13432. // to validate that the TCP socket is not released to the pool between
  13433. // each round of multi-round authentication.
  13434. HttpNetworkSessionPeer session_peer(session.get());
  13435. CommonConnectJobParams common_connect_job_params(
  13436. session->CreateCommonConnectJobParams());
  13437. auto transport_pool = std::make_unique<TransportClientSocketPool>(
  13438. 50, // Max sockets for pool
  13439. 1, // Max sockets per group
  13440. base::Seconds(10), // unused_idle_socket_timeout
  13441. ProxyServer::Direct(), false, // is_for_websockets
  13442. &common_connect_job_params);
  13443. auto* transport_pool_ptr = transport_pool.get();
  13444. auto mock_pool_manager = std::make_unique<MockClientSocketPoolManager>();
  13445. mock_pool_manager->SetSocketPool(ProxyServer::Direct(),
  13446. std::move(transport_pool));
  13447. session_peer.SetClientSocketPoolManager(std::move(mock_pool_manager));
  13448. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13449. TestCompletionCallback callback;
  13450. const MockWrite kGet(
  13451. "GET / HTTP/1.1\r\n"
  13452. "Host: www.example.com\r\n"
  13453. "Connection: keep-alive\r\n\r\n");
  13454. const MockWrite kGetAuth(
  13455. "GET / HTTP/1.1\r\n"
  13456. "Host: www.example.com\r\n"
  13457. "Connection: keep-alive\r\n"
  13458. "Authorization: auth_token\r\n\r\n");
  13459. const MockRead kServerChallenge(
  13460. "HTTP/1.1 401 Unauthorized\r\n"
  13461. "WWW-Authenticate: Mock realm=server\r\n"
  13462. "Content-Type: text/html; charset=iso-8859-1\r\n"
  13463. "Content-Length: 14\r\n\r\n"
  13464. "Unauthorized\r\n");
  13465. const MockRead kSuccess(
  13466. "HTTP/1.1 200 OK\r\n"
  13467. "Content-Type: text/html; charset=iso-8859-1\r\n"
  13468. "Content-Length: 3\r\n\r\n"
  13469. "Yes");
  13470. MockWrite writes[] = {
  13471. // First round
  13472. kGet,
  13473. // Second round
  13474. kGetAuth,
  13475. // Third round
  13476. kGetAuth,
  13477. // Fourth round
  13478. kGetAuth,
  13479. // Competing request
  13480. kGet,
  13481. };
  13482. MockRead reads[] = {
  13483. // First round
  13484. kServerChallenge,
  13485. // Second round
  13486. kServerChallenge,
  13487. // Third round
  13488. kServerChallenge,
  13489. // Fourth round
  13490. kSuccess,
  13491. // Competing response
  13492. kSuccess,
  13493. };
  13494. StaticSocketDataProvider data_provider(reads, writes);
  13495. session_deps_.socket_factory->AddSocketDataProvider(&data_provider);
  13496. const ClientSocketPool::GroupId kSocketGroup(
  13497. url::SchemeHostPort(url::kHttpScheme, "www.example.com", 80),
  13498. PrivacyMode::PRIVACY_MODE_DISABLED, NetworkIsolationKey(),
  13499. SecureDnsPolicy::kAllow);
  13500. // First round of authentication.
  13501. auth_handler_ptr->SetGenerateExpectation(false, OK);
  13502. rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  13503. if (rv == ERR_IO_PENDING)
  13504. rv = callback.WaitForResult();
  13505. EXPECT_THAT(rv, IsOk());
  13506. response = trans.GetResponseInfo();
  13507. ASSERT_TRUE(response);
  13508. EXPECT_TRUE(response->auth_challenge.has_value());
  13509. EXPECT_EQ(0u, transport_pool_ptr->IdleSocketCountInGroup(kSocketGroup));
  13510. EXPECT_EQ(HttpAuthHandlerMock::State::WAIT_FOR_GENERATE_AUTH_TOKEN,
  13511. auth_handler_ptr->state());
  13512. // In between rounds, another request comes in for the same domain.
  13513. // It should not be able to grab the TCP socket that trans has already
  13514. // claimed.
  13515. HttpNetworkTransaction trans_compete(DEFAULT_PRIORITY, session.get());
  13516. TestCompletionCallback callback_compete;
  13517. rv = trans_compete.Start(&request, callback_compete.callback(),
  13518. NetLogWithSource());
  13519. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13520. // callback_compete.WaitForResult at this point would stall forever,
  13521. // since the HttpNetworkTransaction does not release the request back to
  13522. // the pool until after authentication completes.
  13523. // Second round of authentication.
  13524. auth_handler_ptr->SetGenerateExpectation(false, OK);
  13525. rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback());
  13526. if (rv == ERR_IO_PENDING)
  13527. rv = callback.WaitForResult();
  13528. EXPECT_THAT(rv, IsOk());
  13529. response = trans.GetResponseInfo();
  13530. ASSERT_TRUE(response);
  13531. EXPECT_FALSE(response->auth_challenge.has_value());
  13532. EXPECT_EQ(0u, transport_pool_ptr->IdleSocketCountInGroup(kSocketGroup));
  13533. EXPECT_EQ(HttpAuthHandlerMock::State::WAIT_FOR_GENERATE_AUTH_TOKEN,
  13534. auth_handler_ptr->state());
  13535. // Third round of authentication.
  13536. auth_handler_ptr->SetGenerateExpectation(false, OK);
  13537. rv = trans.RestartWithAuth(AuthCredentials(), callback.callback());
  13538. if (rv == ERR_IO_PENDING)
  13539. rv = callback.WaitForResult();
  13540. EXPECT_THAT(rv, IsOk());
  13541. response = trans.GetResponseInfo();
  13542. ASSERT_TRUE(response);
  13543. EXPECT_FALSE(response->auth_challenge.has_value());
  13544. EXPECT_EQ(0u, transport_pool_ptr->IdleSocketCountInGroup(kSocketGroup));
  13545. EXPECT_EQ(HttpAuthHandlerMock::State::WAIT_FOR_GENERATE_AUTH_TOKEN,
  13546. auth_handler_ptr->state());
  13547. // Fourth round of authentication, which completes successfully.
  13548. auth_handler_ptr->SetGenerateExpectation(false, OK);
  13549. rv = trans.RestartWithAuth(AuthCredentials(), callback.callback());
  13550. if (rv == ERR_IO_PENDING)
  13551. rv = callback.WaitForResult();
  13552. EXPECT_THAT(rv, IsOk());
  13553. response = trans.GetResponseInfo();
  13554. ASSERT_TRUE(response);
  13555. EXPECT_FALSE(response->auth_challenge.has_value());
  13556. EXPECT_EQ(0u, transport_pool_ptr->IdleSocketCountInGroup(kSocketGroup));
  13557. // In WAIT_FOR_CHALLENGE, although in reality the auth handler is done. A real
  13558. // auth handler should transition to a DONE state in concert with the remote
  13559. // server. But that's not something we can test here with a mock handler.
  13560. EXPECT_EQ(HttpAuthHandlerMock::State::WAIT_FOR_CHALLENGE,
  13561. auth_handler_ptr->state());
  13562. // Read the body since the fourth round was successful. This will also
  13563. // release the socket back to the pool.
  13564. scoped_refptr<IOBufferWithSize> io_buf =
  13565. base::MakeRefCounted<IOBufferWithSize>(50);
  13566. rv = trans.Read(io_buf.get(), io_buf->size(), callback.callback());
  13567. if (rv == ERR_IO_PENDING)
  13568. rv = callback.WaitForResult();
  13569. EXPECT_EQ(3, rv);
  13570. rv = trans.Read(io_buf.get(), io_buf->size(), callback.callback());
  13571. EXPECT_EQ(0, rv);
  13572. // There are still 0 idle sockets, since the trans_compete transaction
  13573. // will be handed it immediately after trans releases it to the group.
  13574. EXPECT_EQ(0u, transport_pool_ptr->IdleSocketCountInGroup(kSocketGroup));
  13575. // The competing request can now finish. Wait for the headers and then
  13576. // read the body.
  13577. rv = callback_compete.WaitForResult();
  13578. EXPECT_THAT(rv, IsOk());
  13579. rv = trans_compete.Read(io_buf.get(), io_buf->size(), callback.callback());
  13580. if (rv == ERR_IO_PENDING)
  13581. rv = callback.WaitForResult();
  13582. EXPECT_EQ(3, rv);
  13583. rv = trans_compete.Read(io_buf.get(), io_buf->size(), callback.callback());
  13584. EXPECT_EQ(0, rv);
  13585. // Finally, the socket is released to the group.
  13586. EXPECT_EQ(1u, transport_pool_ptr->IdleSocketCountInGroup(kSocketGroup));
  13587. }
  13588. // This tests the case that a request is issued via http instead of spdy after
  13589. // npn is negotiated.
  13590. TEST_F(HttpNetworkTransactionTest, NpnWithHttpOverSSL) {
  13591. HttpRequestInfo request;
  13592. request.method = "GET";
  13593. request.url = GURL("https://www.example.org/");
  13594. request.traffic_annotation =
  13595. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13596. MockWrite data_writes[] = {
  13597. MockWrite(
  13598. "GET / HTTP/1.1\r\n"
  13599. "Host: www.example.org\r\n"
  13600. "Connection: keep-alive\r\n\r\n"),
  13601. };
  13602. MockRead data_reads[] = {
  13603. MockRead("HTTP/1.1 200 OK\r\n"),
  13604. MockRead(kAlternativeServiceHttpHeader),
  13605. MockRead("\r\n"),
  13606. MockRead("hello world"),
  13607. MockRead(SYNCHRONOUS, OK),
  13608. };
  13609. SSLSocketDataProvider ssl(ASYNC, OK);
  13610. ssl.next_proto = kProtoHTTP11;
  13611. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  13612. StaticSocketDataProvider data(data_reads, data_writes);
  13613. session_deps_.socket_factory->AddSocketDataProvider(&data);
  13614. TestCompletionCallback callback;
  13615. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13616. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13617. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  13618. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13619. EXPECT_THAT(callback.WaitForResult(), IsOk());
  13620. const HttpResponseInfo* response = trans.GetResponseInfo();
  13621. ASSERT_TRUE(response);
  13622. ASSERT_TRUE(response->headers);
  13623. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  13624. std::string response_data;
  13625. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  13626. EXPECT_EQ("hello world", response_data);
  13627. EXPECT_FALSE(response->was_fetched_via_spdy);
  13628. EXPECT_TRUE(response->was_alpn_negotiated);
  13629. }
  13630. // Simulate the SSL handshake completing with a ALPN negotiation followed by an
  13631. // immediate server closing of the socket.
  13632. // Regression test for https://crbug.com/46369.
  13633. TEST_F(HttpNetworkTransactionTest, SpdyPostALPNServerHangup) {
  13634. HttpRequestInfo request;
  13635. request.method = "GET";
  13636. request.url = GURL("https://www.example.org/");
  13637. request.traffic_annotation =
  13638. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13639. SSLSocketDataProvider ssl(ASYNC, OK);
  13640. ssl.next_proto = kProtoHTTP2;
  13641. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  13642. spdy::SpdySerializedFrame req(
  13643. spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST));
  13644. MockWrite spdy_writes[] = {CreateMockWrite(req, 1)};
  13645. MockRead spdy_reads[] = {
  13646. MockRead(SYNCHRONOUS, 0, 0) // Not async - return 0 immediately.
  13647. };
  13648. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  13649. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  13650. TestCompletionCallback callback;
  13651. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13652. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13653. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  13654. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13655. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_CLOSED));
  13656. }
  13657. // A subclass of HttpAuthHandlerMock that records the request URL when
  13658. // it gets it. This is needed since the auth handler may get destroyed
  13659. // before we get a chance to query it.
  13660. class UrlRecordingHttpAuthHandlerMock : public HttpAuthHandlerMock {
  13661. public:
  13662. explicit UrlRecordingHttpAuthHandlerMock(GURL* url) : url_(url) {}
  13663. ~UrlRecordingHttpAuthHandlerMock() override = default;
  13664. protected:
  13665. int GenerateAuthTokenImpl(const AuthCredentials* credentials,
  13666. const HttpRequestInfo* request,
  13667. CompletionOnceCallback callback,
  13668. std::string* auth_token) override {
  13669. *url_ = request->url;
  13670. return HttpAuthHandlerMock::GenerateAuthTokenImpl(
  13671. credentials, request, std::move(callback), auth_token);
  13672. }
  13673. private:
  13674. raw_ptr<GURL> url_;
  13675. };
  13676. // Test that if we cancel the transaction as the connection is completing, that
  13677. // everything tears down correctly.
  13678. TEST_F(HttpNetworkTransactionTest, SimpleCancel) {
  13679. // Setup everything about the connection to complete synchronously, so that
  13680. // after calling HttpNetworkTransaction::Start, the only thing we're waiting
  13681. // for is the callback from the HttpStreamRequest.
  13682. // Then cancel the transaction.
  13683. // Verify that we don't crash.
  13684. MockConnect mock_connect(SYNCHRONOUS, OK);
  13685. MockRead data_reads[] = {
  13686. MockRead(SYNCHRONOUS, "HTTP/1.0 200 OK\r\n\r\n"),
  13687. MockRead(SYNCHRONOUS, "hello world"),
  13688. MockRead(SYNCHRONOUS, OK),
  13689. };
  13690. HttpRequestInfo request;
  13691. request.method = "GET";
  13692. request.url = GURL("http://www.example.org/");
  13693. request.traffic_annotation =
  13694. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13695. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13696. auto trans =
  13697. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  13698. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  13699. data.set_connect_data(mock_connect);
  13700. session_deps_.socket_factory->AddSocketDataProvider(&data);
  13701. TestCompletionCallback callback;
  13702. int rv = trans->Start(&request, callback.callback(),
  13703. NetLogWithSource::Make(NetLogSourceType::NONE));
  13704. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13705. trans.reset(); // Cancel the transaction here.
  13706. base::RunLoop().RunUntilIdle();
  13707. }
  13708. // Test that if a transaction is cancelled after receiving the headers, the
  13709. // stream is drained properly and added back to the socket pool. The main
  13710. // purpose of this test is to make sure that an HttpStreamParser can be read
  13711. // from after the HttpNetworkTransaction and the objects it owns have been
  13712. // deleted.
  13713. // See http://crbug.com/368418
  13714. TEST_F(HttpNetworkTransactionTest, CancelAfterHeaders) {
  13715. MockRead data_reads[] = {
  13716. MockRead(ASYNC, "HTTP/1.1 200 OK\r\n"),
  13717. MockRead(ASYNC, "Content-Length: 2\r\n"),
  13718. MockRead(ASYNC, "Connection: Keep-Alive\r\n\r\n"),
  13719. MockRead(ASYNC, "1"),
  13720. // 2 async reads are necessary to trigger a ReadResponseBody call after the
  13721. // HttpNetworkTransaction has been deleted.
  13722. MockRead(ASYNC, "2"),
  13723. MockRead(SYNCHRONOUS, ERR_IO_PENDING), // Should never read this.
  13724. };
  13725. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  13726. session_deps_.socket_factory->AddSocketDataProvider(&data);
  13727. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13728. {
  13729. HttpRequestInfo request;
  13730. request.method = "GET";
  13731. request.url = GURL("http://www.example.org/");
  13732. request.traffic_annotation =
  13733. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13734. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13735. TestCompletionCallback callback;
  13736. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  13737. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13738. callback.WaitForResult();
  13739. const HttpResponseInfo* response = trans.GetResponseInfo();
  13740. ASSERT_TRUE(response);
  13741. EXPECT_TRUE(response->headers);
  13742. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  13743. // The transaction and HttpRequestInfo are deleted.
  13744. }
  13745. // Let the HttpResponseBodyDrainer drain the socket.
  13746. base::RunLoop().RunUntilIdle();
  13747. // Socket should now be idle, waiting to be reused.
  13748. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  13749. }
  13750. // Test a basic GET request through a proxy.
  13751. TEST_F(HttpNetworkTransactionTest, ProxyGet) {
  13752. session_deps_.proxy_resolution_service =
  13753. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  13754. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  13755. session_deps_.net_log = NetLog::Get();
  13756. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13757. HttpRequestInfo request;
  13758. request.method = "GET";
  13759. request.url = GURL("http://www.example.org/");
  13760. request.traffic_annotation =
  13761. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13762. MockWrite data_writes1[] = {
  13763. MockWrite(
  13764. "GET http://www.example.org/ HTTP/1.1\r\n"
  13765. "Host: www.example.org\r\n"
  13766. "Proxy-Connection: keep-alive\r\n\r\n"),
  13767. };
  13768. MockRead data_reads1[] = {
  13769. MockRead("HTTP/1.1 200 OK\r\n"),
  13770. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  13771. MockRead("Content-Length: 100\r\n\r\n"),
  13772. MockRead(SYNCHRONOUS, OK),
  13773. };
  13774. StaticSocketDataProvider data1(data_reads1, data_writes1);
  13775. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  13776. TestCompletionCallback callback1;
  13777. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13778. ConnectedHandler connected_handler;
  13779. trans.SetConnectedCallback(connected_handler.Callback());
  13780. int rv = trans.Start(&request, callback1.callback(),
  13781. NetLogWithSource::Make(NetLogSourceType::NONE));
  13782. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13783. rv = callback1.WaitForResult();
  13784. EXPECT_THAT(rv, IsOk());
  13785. const HttpResponseInfo* response = trans.GetResponseInfo();
  13786. ASSERT_TRUE(response);
  13787. EXPECT_TRUE(response->headers->IsKeepAlive());
  13788. EXPECT_EQ(200, response->headers->response_code());
  13789. EXPECT_EQ(100, response->headers->GetContentLength());
  13790. EXPECT_TRUE(response->was_fetched_via_proxy);
  13791. EXPECT_EQ(ProxyServer(ProxyServer::SCHEME_HTTP,
  13792. HostPortPair::FromString("myproxy:70")),
  13793. response->proxy_server);
  13794. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  13795. TransportInfo expected_transport;
  13796. expected_transport.type = TransportType::kProxied;
  13797. expected_transport.endpoint = IPEndPoint(IPAddress::IPv4Localhost(), 70);
  13798. EXPECT_THAT(connected_handler.transports(), ElementsAre(expected_transport));
  13799. LoadTimingInfo load_timing_info;
  13800. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  13801. TestLoadTimingNotReusedWithPac(load_timing_info,
  13802. CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY);
  13803. }
  13804. // Test a basic HTTPS GET request through a proxy.
  13805. TEST_F(HttpNetworkTransactionTest, ProxyTunnelGet) {
  13806. session_deps_.proxy_resolution_service =
  13807. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  13808. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  13809. RecordingNetLogObserver net_log_observer;
  13810. session_deps_.net_log = NetLog::Get();
  13811. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13812. HttpRequestInfo request;
  13813. request.method = "GET";
  13814. request.url = GURL("https://www.example.org/");
  13815. request.traffic_annotation =
  13816. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13817. // Since we have proxy, should try to establish tunnel.
  13818. MockWrite data_writes1[] = {
  13819. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  13820. "Host: www.example.org:443\r\n"
  13821. "Proxy-Connection: keep-alive\r\n\r\n"),
  13822. MockWrite("GET / HTTP/1.1\r\n"
  13823. "Host: www.example.org\r\n"
  13824. "Connection: keep-alive\r\n\r\n"),
  13825. };
  13826. MockRead data_reads1[] = {
  13827. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  13828. MockRead("HTTP/1.1 200 OK\r\n"),
  13829. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  13830. MockRead("Content-Length: 100\r\n\r\n"),
  13831. MockRead(SYNCHRONOUS, OK),
  13832. };
  13833. StaticSocketDataProvider data1(data_reads1, data_writes1);
  13834. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  13835. SSLSocketDataProvider ssl(ASYNC, OK);
  13836. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  13837. TestCompletionCallback callback1;
  13838. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13839. ConnectedHandler connected_handler;
  13840. trans.SetConnectedCallback(connected_handler.Callback());
  13841. int rv = trans.Start(&request, callback1.callback(),
  13842. NetLogWithSource::Make(NetLogSourceType::NONE));
  13843. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13844. rv = callback1.WaitForResult();
  13845. EXPECT_THAT(rv, IsOk());
  13846. auto entries = net_log_observer.GetEntries();
  13847. size_t pos = ExpectLogContainsSomewhere(
  13848. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  13849. NetLogEventPhase::NONE);
  13850. ExpectLogContainsSomewhere(
  13851. entries, pos,
  13852. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  13853. NetLogEventPhase::NONE);
  13854. const HttpResponseInfo* response = trans.GetResponseInfo();
  13855. ASSERT_TRUE(response);
  13856. EXPECT_TRUE(response->headers->IsKeepAlive());
  13857. EXPECT_EQ(200, response->headers->response_code());
  13858. EXPECT_EQ(100, response->headers->GetContentLength());
  13859. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  13860. EXPECT_TRUE(response->was_fetched_via_proxy);
  13861. EXPECT_EQ(ProxyServer(ProxyServer::SCHEME_HTTP,
  13862. HostPortPair::FromString("myproxy:70")),
  13863. response->proxy_server);
  13864. TransportInfo expected_transport;
  13865. expected_transport.type = TransportType::kProxied;
  13866. expected_transport.endpoint = IPEndPoint(IPAddress::IPv4Localhost(), 70);
  13867. EXPECT_THAT(connected_handler.transports(), ElementsAre(expected_transport));
  13868. LoadTimingInfo load_timing_info;
  13869. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  13870. TestLoadTimingNotReusedWithPac(load_timing_info,
  13871. CONNECT_TIMING_HAS_SSL_TIMES);
  13872. }
  13873. // Test a basic HTTPS GET request through a proxy, connecting to an IPv6
  13874. // literal host.
  13875. TEST_F(HttpNetworkTransactionTest, ProxyTunnelGetIPv6) {
  13876. session_deps_.proxy_resolution_service =
  13877. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  13878. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  13879. RecordingNetLogObserver net_log_observer;
  13880. session_deps_.net_log = NetLog::Get();
  13881. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13882. HttpRequestInfo request;
  13883. request.method = "GET";
  13884. request.url = GURL("https://[::2]:443/");
  13885. request.traffic_annotation =
  13886. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13887. // Since we have proxy, should try to establish tunnel.
  13888. MockWrite data_writes1[] = {
  13889. MockWrite("CONNECT [::2]:443 HTTP/1.1\r\n"
  13890. "Host: [::2]:443\r\n"
  13891. "Proxy-Connection: keep-alive\r\n\r\n"),
  13892. MockWrite("GET / HTTP/1.1\r\n"
  13893. "Host: [::2]\r\n"
  13894. "Connection: keep-alive\r\n\r\n"),
  13895. };
  13896. MockRead data_reads1[] = {
  13897. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  13898. MockRead("HTTP/1.1 200 OK\r\n"),
  13899. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  13900. MockRead("Content-Length: 100\r\n\r\n"),
  13901. MockRead(SYNCHRONOUS, OK),
  13902. };
  13903. StaticSocketDataProvider data1(data_reads1, data_writes1);
  13904. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  13905. SSLSocketDataProvider ssl(ASYNC, OK);
  13906. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  13907. TestCompletionCallback callback1;
  13908. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13909. int rv = trans.Start(&request, callback1.callback(),
  13910. NetLogWithSource::Make(NetLogSourceType::NONE));
  13911. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13912. rv = callback1.WaitForResult();
  13913. EXPECT_THAT(rv, IsOk());
  13914. auto entries = net_log_observer.GetEntries();
  13915. size_t pos = ExpectLogContainsSomewhere(
  13916. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  13917. NetLogEventPhase::NONE);
  13918. ExpectLogContainsSomewhere(
  13919. entries, pos,
  13920. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  13921. NetLogEventPhase::NONE);
  13922. const HttpResponseInfo* response = trans.GetResponseInfo();
  13923. ASSERT_TRUE(response);
  13924. EXPECT_TRUE(response->headers->IsKeepAlive());
  13925. EXPECT_EQ(200, response->headers->response_code());
  13926. EXPECT_EQ(100, response->headers->GetContentLength());
  13927. EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
  13928. EXPECT_TRUE(response->was_fetched_via_proxy);
  13929. EXPECT_EQ(ProxyServer(ProxyServer::SCHEME_HTTP,
  13930. HostPortPair::FromString("myproxy:70")),
  13931. response->proxy_server);
  13932. LoadTimingInfo load_timing_info;
  13933. EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info));
  13934. TestLoadTimingNotReusedWithPac(load_timing_info,
  13935. CONNECT_TIMING_HAS_SSL_TIMES);
  13936. }
  13937. // Test a basic HTTPS GET request through a proxy, but the server hangs up
  13938. // while establishing the tunnel.
  13939. TEST_F(HttpNetworkTransactionTest, ProxyTunnelGetHangup) {
  13940. session_deps_.proxy_resolution_service =
  13941. ConfiguredProxyResolutionService::CreateFixedForTest(
  13942. "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  13943. RecordingNetLogObserver net_log_observer;
  13944. session_deps_.net_log = NetLog::Get();
  13945. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  13946. HttpRequestInfo request;
  13947. request.method = "GET";
  13948. request.url = GURL("https://www.example.org/");
  13949. request.traffic_annotation =
  13950. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  13951. // Since we have proxy, should try to establish tunnel.
  13952. MockWrite data_writes1[] = {
  13953. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  13954. "Host: www.example.org:443\r\n"
  13955. "Proxy-Connection: keep-alive\r\n\r\n"),
  13956. MockWrite("GET / HTTP/1.1\r\n"
  13957. "Host: www.example.org\r\n"
  13958. "Connection: keep-alive\r\n\r\n"),
  13959. };
  13960. MockRead data_reads1[] = {
  13961. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  13962. MockRead(ASYNC, 0, 0), // EOF
  13963. };
  13964. StaticSocketDataProvider data1(data_reads1, data_writes1);
  13965. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  13966. SSLSocketDataProvider ssl(ASYNC, OK);
  13967. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  13968. TestCompletionCallback callback1;
  13969. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  13970. int rv = trans.Start(&request, callback1.callback(),
  13971. NetLogWithSource::Make(NetLogSourceType::NONE));
  13972. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  13973. rv = callback1.WaitForResult();
  13974. EXPECT_THAT(rv, IsError(ERR_EMPTY_RESPONSE));
  13975. auto entries = net_log_observer.GetEntries();
  13976. size_t pos = ExpectLogContainsSomewhere(
  13977. entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS,
  13978. NetLogEventPhase::NONE);
  13979. ExpectLogContainsSomewhere(
  13980. entries, pos,
  13981. NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS,
  13982. NetLogEventPhase::NONE);
  13983. }
  13984. // Test for crbug.com/55424.
  13985. TEST_F(HttpNetworkTransactionTest, PreconnectWithExistingSpdySession) {
  13986. spdy::SpdySerializedFrame req(
  13987. spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST));
  13988. MockWrite spdy_writes[] = {CreateMockWrite(req, 0)};
  13989. spdy::SpdySerializedFrame resp(
  13990. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  13991. spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true));
  13992. MockRead spdy_reads[] = {
  13993. CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3),
  13994. };
  13995. SequencedSocketData spdy_data(spdy_reads, spdy_writes);
  13996. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  13997. SSLSocketDataProvider ssl(ASYNC, OK);
  13998. ssl.next_proto = kProtoHTTP2;
  13999. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  14000. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14001. // Set up an initial SpdySession in the pool to reuse.
  14002. HostPortPair host_port_pair("www.example.org", 443);
  14003. SpdySessionKey key(host_port_pair, ProxyServer::Direct(),
  14004. PRIVACY_MODE_DISABLED,
  14005. SpdySessionKey::IsProxySession::kFalse, SocketTag(),
  14006. NetworkIsolationKey(), SecureDnsPolicy::kAllow);
  14007. base::WeakPtr<SpdySession> spdy_session =
  14008. CreateSpdySession(session.get(), key, NetLogWithSource());
  14009. HttpRequestInfo request;
  14010. request.method = "GET";
  14011. request.url = GURL("https://www.example.org/");
  14012. request.traffic_annotation =
  14013. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14014. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  14015. TestCompletionCallback callback;
  14016. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  14017. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14018. EXPECT_THAT(callback.WaitForResult(), IsOk());
  14019. }
  14020. // Given a net error, cause that error to be returned from the first Write()
  14021. // call and verify that the HttpNetworkTransaction fails with that error.
  14022. void HttpNetworkTransactionTest::CheckErrorIsPassedBack(
  14023. int error, IoMode mode) {
  14024. HttpRequestInfo request_info;
  14025. request_info.url = GURL("https://www.example.com/");
  14026. request_info.method = "GET";
  14027. request_info.load_flags = LOAD_NORMAL;
  14028. request_info.traffic_annotation =
  14029. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14030. SSLSocketDataProvider ssl_data(mode, OK);
  14031. MockWrite data_writes[] = {
  14032. MockWrite(mode, error),
  14033. };
  14034. StaticSocketDataProvider data(base::span<MockRead>(), data_writes);
  14035. session_deps_.socket_factory->AddSocketDataProvider(&data);
  14036. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data);
  14037. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14038. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  14039. TestCompletionCallback callback;
  14040. int rv = trans.Start(&request_info, callback.callback(), NetLogWithSource());
  14041. if (rv == ERR_IO_PENDING)
  14042. rv = callback.WaitForResult();
  14043. ASSERT_EQ(error, rv);
  14044. }
  14045. TEST_F(HttpNetworkTransactionTest, SSLWriteCertError) {
  14046. // Just check a grab bag of cert errors.
  14047. static const int kErrors[] = {
  14048. ERR_CERT_COMMON_NAME_INVALID,
  14049. ERR_CERT_AUTHORITY_INVALID,
  14050. ERR_CERT_DATE_INVALID,
  14051. };
  14052. for (int error : kErrors) {
  14053. CheckErrorIsPassedBack(error, ASYNC);
  14054. CheckErrorIsPassedBack(error, SYNCHRONOUS);
  14055. }
  14056. }
  14057. // Ensure that a client certificate is removed from the SSL client auth
  14058. // cache when:
  14059. // 1) No proxy is involved.
  14060. // 2) TLS False Start is disabled.
  14061. // 3) The initial TLS handshake requests a client certificate.
  14062. // 4) The client supplies an invalid/unacceptable certificate.
  14063. TEST_F(HttpNetworkTransactionTest, ClientAuthCertCache_Direct_NoFalseStart) {
  14064. HttpRequestInfo request_info;
  14065. request_info.url = GURL("https://www.example.com/");
  14066. request_info.method = "GET";
  14067. request_info.load_flags = LOAD_NORMAL;
  14068. request_info.traffic_annotation =
  14069. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14070. auto cert_request = base::MakeRefCounted<SSLCertRequestInfo>();
  14071. cert_request->host_and_port = HostPortPair("www.example.com", 443);
  14072. // [ssl_]data1 contains the data for the first SSL handshake. When a
  14073. // CertificateRequest is received for the first time, the handshake will
  14074. // be aborted to allow the caller to provide a certificate.
  14075. SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  14076. ssl_data1.cert_request_info = cert_request.get();
  14077. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1);
  14078. StaticSocketDataProvider data1;
  14079. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  14080. // [ssl_]data2 contains the data for the second SSL handshake. When TLS
  14081. // False Start is not being used, the result of the SSL handshake will be
  14082. // returned as part of the SSLClientSocket::Connect() call. This test
  14083. // matches the result of a server sending a handshake_failure alert,
  14084. // rather than a Finished message, because it requires a client
  14085. // certificate and none was supplied.
  14086. SSLSocketDataProvider ssl_data2(ASYNC, ERR_SSL_PROTOCOL_ERROR);
  14087. ssl_data2.cert_request_info = cert_request.get();
  14088. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data2);
  14089. StaticSocketDataProvider data2;
  14090. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  14091. // [ssl_]data3 contains the data for the third SSL handshake. When a
  14092. // connection to a server fails during an SSL handshake,
  14093. // HttpNetworkTransaction will attempt to fallback with legacy cryptography
  14094. // enabled on some errors. This is transparent to the caller
  14095. // of the HttpNetworkTransaction. Because this test failure is due to
  14096. // requiring a client certificate, this fallback handshake should also
  14097. // fail.
  14098. SSLSocketDataProvider ssl_data3(ASYNC, ERR_SSL_PROTOCOL_ERROR);
  14099. ssl_data3.expected_disable_legacy_crypto = false;
  14100. ssl_data3.cert_request_info = cert_request.get();
  14101. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data3);
  14102. StaticSocketDataProvider data3;
  14103. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  14104. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14105. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  14106. // Begin the SSL handshake with the peer. This consumes ssl_data1.
  14107. TestCompletionCallback callback;
  14108. int rv = trans.Start(&request_info, callback.callback(), NetLogWithSource());
  14109. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  14110. // Complete the SSL handshake, which should abort due to requiring a
  14111. // client certificate.
  14112. rv = callback.WaitForResult();
  14113. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  14114. // Indicate that no certificate should be supplied. From the perspective
  14115. // of SSLClientCertCache, NULL is just as meaningful as a real
  14116. // certificate, so this is the same as supply a
  14117. // legitimate-but-unacceptable certificate.
  14118. rv = trans.RestartWithCertificate(nullptr, nullptr, callback.callback());
  14119. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  14120. // Ensure the certificate was added to the client auth cache before
  14121. // allowing the connection to continue restarting.
  14122. scoped_refptr<X509Certificate> client_cert;
  14123. scoped_refptr<SSLPrivateKey> client_private_key;
  14124. ASSERT_TRUE(session->ssl_client_context()->GetClientCertificate(
  14125. HostPortPair("www.example.com", 443), &client_cert, &client_private_key));
  14126. ASSERT_FALSE(client_cert);
  14127. // Restart the handshake. This will consume ssl_data2, which fails, and
  14128. // then consume ssl_data3 and ssl_data4, both of which should also fail.
  14129. // The result code is checked against what ssl_data4 should return.
  14130. rv = callback.WaitForResult();
  14131. ASSERT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR));
  14132. // Ensure that the client certificate is removed from the cache on a
  14133. // handshake failure.
  14134. ASSERT_FALSE(session->ssl_client_context()->GetClientCertificate(
  14135. HostPortPair("www.example.com", 443), &client_cert, &client_private_key));
  14136. }
  14137. // Ensure that a client certificate is removed from the SSL client auth
  14138. // cache when:
  14139. // 1) No proxy is involved.
  14140. // 2) TLS False Start is enabled.
  14141. // 3) The initial TLS handshake requests a client certificate.
  14142. // 4) The client supplies an invalid/unacceptable certificate.
  14143. TEST_F(HttpNetworkTransactionTest, ClientAuthCertCache_Direct_FalseStart) {
  14144. HttpRequestInfo request_info;
  14145. request_info.url = GURL("https://www.example.com/");
  14146. request_info.method = "GET";
  14147. request_info.load_flags = LOAD_NORMAL;
  14148. request_info.traffic_annotation =
  14149. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14150. auto cert_request = base::MakeRefCounted<SSLCertRequestInfo>();
  14151. cert_request->host_and_port = HostPortPair("www.example.com", 443);
  14152. // When TLS False Start is used, SSLClientSocket::Connect() calls will
  14153. // return successfully after reading up to the peer's Certificate message.
  14154. // This is to allow the caller to call SSLClientSocket::Write(), which can
  14155. // enqueue application data to be sent in the same packet as the
  14156. // ChangeCipherSpec and Finished messages.
  14157. // The actual handshake will be finished when SSLClientSocket::Read() is
  14158. // called, which expects to process the peer's ChangeCipherSpec and
  14159. // Finished messages. If there was an error negotiating with the peer,
  14160. // such as due to the peer requiring a client certificate when none was
  14161. // supplied, the alert sent by the peer won't be processed until Read() is
  14162. // called.
  14163. // Like the non-False Start case, when a client certificate is requested by
  14164. // the peer, the handshake is aborted during the Connect() call.
  14165. // [ssl_]data1 represents the initial SSL handshake with the peer.
  14166. SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  14167. ssl_data1.cert_request_info = cert_request.get();
  14168. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1);
  14169. StaticSocketDataProvider data1;
  14170. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  14171. // When a client certificate is supplied, Connect() will not be aborted
  14172. // when the peer requests the certificate. Instead, the handshake will
  14173. // artificially succeed, allowing the caller to write the HTTP request to
  14174. // the socket. The handshake messages are not processed until Read() is
  14175. // called, which then detects that the handshake was aborted, due to the
  14176. // peer sending a handshake_failure because it requires a client
  14177. // certificate.
  14178. SSLSocketDataProvider ssl_data2(ASYNC, OK);
  14179. ssl_data2.cert_request_info = cert_request.get();
  14180. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data2);
  14181. MockRead data2_reads[] = {
  14182. MockRead(ASYNC /* async */, ERR_SSL_PROTOCOL_ERROR),
  14183. };
  14184. StaticSocketDataProvider data2(data2_reads, base::span<MockWrite>());
  14185. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  14186. // As described in ClientAuthCertCache_Direct_NoFalseStart, [ssl_]data3 is
  14187. // the data for the SSL handshake once the TLSv1.1 connection falls back to
  14188. // TLSv1. It has the same behaviour as [ssl_]data2.
  14189. SSLSocketDataProvider ssl_data3(ASYNC, OK);
  14190. ssl_data3.cert_request_info = cert_request.get();
  14191. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data3);
  14192. StaticSocketDataProvider data3(data2_reads, base::span<MockWrite>());
  14193. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  14194. // [ssl_]data4 is the data for the SSL handshake once the TLSv1 connection
  14195. // falls back to SSLv3. It has the same behaviour as [ssl_]data2.
  14196. SSLSocketDataProvider ssl_data4(ASYNC, OK);
  14197. ssl_data4.cert_request_info = cert_request.get();
  14198. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data4);
  14199. StaticSocketDataProvider data4(data2_reads, base::span<MockWrite>());
  14200. session_deps_.socket_factory->AddSocketDataProvider(&data4);
  14201. // Need one more if TLSv1.2 is enabled.
  14202. SSLSocketDataProvider ssl_data5(ASYNC, OK);
  14203. ssl_data5.cert_request_info = cert_request.get();
  14204. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data5);
  14205. StaticSocketDataProvider data5(data2_reads, base::span<MockWrite>());
  14206. session_deps_.socket_factory->AddSocketDataProvider(&data5);
  14207. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14208. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  14209. // Begin the initial SSL handshake.
  14210. TestCompletionCallback callback;
  14211. int rv = trans.Start(&request_info, callback.callback(), NetLogWithSource());
  14212. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  14213. // Complete the SSL handshake, which should abort due to requiring a
  14214. // client certificate.
  14215. rv = callback.WaitForResult();
  14216. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  14217. // Indicate that no certificate should be supplied. From the perspective
  14218. // of SSLClientCertCache, NULL is just as meaningful as a real
  14219. // certificate, so this is the same as supply a
  14220. // legitimate-but-unacceptable certificate.
  14221. rv = trans.RestartWithCertificate(nullptr, nullptr, callback.callback());
  14222. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  14223. // Ensure the certificate was added to the client auth cache before
  14224. // allowing the connection to continue restarting.
  14225. scoped_refptr<X509Certificate> client_cert;
  14226. scoped_refptr<SSLPrivateKey> client_private_key;
  14227. ASSERT_TRUE(session->ssl_client_context()->GetClientCertificate(
  14228. HostPortPair("www.example.com", 443), &client_cert, &client_private_key));
  14229. ASSERT_FALSE(client_cert);
  14230. // Restart the handshake. This will consume ssl_data2, which fails, and
  14231. // then consume ssl_data3 and ssl_data4, both of which should also fail.
  14232. // The result code is checked against what ssl_data4 should return.
  14233. rv = callback.WaitForResult();
  14234. ASSERT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR));
  14235. // Ensure that the client certificate is removed from the cache on a
  14236. // handshake failure.
  14237. ASSERT_FALSE(session->ssl_client_context()->GetClientCertificate(
  14238. HostPortPair("www.example.com", 443), &client_cert, &client_private_key));
  14239. }
  14240. // Ensure that a client certificate is removed from the SSL client auth
  14241. // cache when:
  14242. // 1) An HTTPS proxy is involved.
  14243. // 3) The HTTPS proxy requests a client certificate.
  14244. // 4) The client supplies an invalid/unacceptable certificate for the
  14245. // proxy.
  14246. TEST_F(HttpNetworkTransactionTest, ClientAuthCertCache_Proxy_Fail) {
  14247. session_deps_.proxy_resolution_service =
  14248. ConfiguredProxyResolutionService::CreateFixedForTest(
  14249. "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  14250. session_deps_.net_log = NetLog::Get();
  14251. auto cert_request = base::MakeRefCounted<SSLCertRequestInfo>();
  14252. cert_request->host_and_port = HostPortPair("proxy", 70);
  14253. // Repeat the test for connecting to an HTTPS endpoint, then for connecting to
  14254. // an HTTP endpoint.
  14255. HttpRequestInfo requests[2];
  14256. requests[0].url = GURL("https://www.example.com/");
  14257. requests[0].method = "GET";
  14258. requests[0].load_flags = LOAD_NORMAL;
  14259. requests[0].traffic_annotation =
  14260. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14261. // HTTPS requests are tunneled.
  14262. MockWrite https_writes[] = {
  14263. MockWrite("CONNECT www.example.com:443 HTTP/1.1\r\n"
  14264. "Host: www.example.com:443\r\n"
  14265. "Proxy-Connection: keep-alive\r\n\r\n"),
  14266. };
  14267. requests[1].url = GURL("http://www.example.com/");
  14268. requests[1].method = "GET";
  14269. requests[1].load_flags = LOAD_NORMAL;
  14270. requests[1].traffic_annotation =
  14271. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14272. // HTTP requests are not.
  14273. MockWrite http_writes[] = {
  14274. MockWrite("GET http://www.example.com/ HTTP/1.1\r\n"
  14275. "Host: www.example.com\r\n"
  14276. "Proxy-Connection: keep-alive\r\n\r\n"),
  14277. };
  14278. // When the server rejects the client certificate, it will close the
  14279. // connection. In TLS 1.2, this is signaled out of Connect(). In TLS 1.3 (or
  14280. // TLS 1.2 with False Start), the error is returned out of the first Read().
  14281. for (bool reject_in_connect : {true, false}) {
  14282. SCOPED_TRACE(reject_in_connect);
  14283. // Client certificate errors are typically signaled with
  14284. // ERR_BAD_SSL_CLIENT_AUTH_CERT, but sometimes the server gives an arbitrary
  14285. // protocol error.
  14286. for (Error reject_error :
  14287. {ERR_SSL_PROTOCOL_ERROR, ERR_BAD_SSL_CLIENT_AUTH_CERT}) {
  14288. SCOPED_TRACE(reject_error);
  14289. // Tunneled and non-tunneled requests are handled differently. Test both.
  14290. for (const HttpRequestInfo& request : requests) {
  14291. SCOPED_TRACE(request.url);
  14292. session_deps_.socket_factory =
  14293. std::make_unique<MockClientSocketFactory>();
  14294. // See ClientAuthCertCache_Direct_NoFalseStart for the explanation of
  14295. // [ssl_]data[1-3].
  14296. SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  14297. ssl_data1.cert_request_info = cert_request.get();
  14298. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1);
  14299. StaticSocketDataProvider data1;
  14300. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  14301. absl::optional<SSLSocketDataProvider> ssl_data2;
  14302. absl::optional<StaticSocketDataProvider> data2;
  14303. MockRead error_in_read[] = {MockRead(ASYNC, reject_error)};
  14304. if (reject_in_connect) {
  14305. ssl_data2.emplace(ASYNC, reject_error);
  14306. // There are no reads or writes.
  14307. data2.emplace();
  14308. } else {
  14309. ssl_data2.emplace(ASYNC, OK);
  14310. // We will get one Write() in before observing the error in Read().
  14311. if (request.url.SchemeIsCryptographic()) {
  14312. data2.emplace(error_in_read, https_writes);
  14313. } else {
  14314. data2.emplace(error_in_read, http_writes);
  14315. }
  14316. }
  14317. ssl_data2->cert_request_info = cert_request.get();
  14318. session_deps_.socket_factory->AddSSLSocketDataProvider(
  14319. &ssl_data2.value());
  14320. session_deps_.socket_factory->AddSocketDataProvider(&data2.value());
  14321. // If the handshake returns ERR_SSL_PROTOCOL_ERROR, we attempt to
  14322. // connect twice.
  14323. absl::optional<SSLSocketDataProvider> ssl_data3;
  14324. absl::optional<StaticSocketDataProvider> data3;
  14325. if (reject_in_connect && reject_error == ERR_SSL_PROTOCOL_ERROR) {
  14326. ssl_data3.emplace(ASYNC, reject_error);
  14327. data3.emplace(); // There are no reads or writes.
  14328. ssl_data3->cert_request_info = cert_request.get();
  14329. session_deps_.socket_factory->AddSSLSocketDataProvider(
  14330. &ssl_data3.value());
  14331. session_deps_.socket_factory->AddSocketDataProvider(&data3.value());
  14332. }
  14333. std::unique_ptr<HttpNetworkSession> session =
  14334. CreateSession(&session_deps_);
  14335. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  14336. // Begin the SSL handshake with the proxy.
  14337. TestCompletionCallback callback;
  14338. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  14339. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  14340. // Complete the SSL handshake, which should abort due to requiring a
  14341. // client certificate.
  14342. rv = callback.WaitForResult();
  14343. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  14344. // Indicate that no certificate should be supplied. From the
  14345. // perspective of SSLClientCertCache, NULL is just as meaningful as a
  14346. // real certificate, so this is the same as supply a
  14347. // legitimate-but-unacceptable certificate.
  14348. rv =
  14349. trans.RestartWithCertificate(nullptr, nullptr, callback.callback());
  14350. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  14351. // Ensure the certificate was added to the client auth cache before
  14352. // allowing the connection to continue restarting.
  14353. scoped_refptr<X509Certificate> client_cert;
  14354. scoped_refptr<SSLPrivateKey> client_private_key;
  14355. ASSERT_TRUE(session->ssl_client_context()->GetClientCertificate(
  14356. HostPortPair("proxy", 70), &client_cert, &client_private_key));
  14357. ASSERT_FALSE(client_cert);
  14358. // Ensure the certificate was NOT cached for the endpoint. This only
  14359. // applies to HTTPS requests, but is fine to check for HTTP requests.
  14360. ASSERT_FALSE(session->ssl_client_context()->GetClientCertificate(
  14361. HostPortPair("www.example.com", 443), &client_cert,
  14362. &client_private_key));
  14363. // Restart the handshake. This will consume ssl_data2. The result code
  14364. // is checked against what ssl_data2 should return.
  14365. rv = callback.WaitForResult();
  14366. ASSERT_THAT(rv, AnyOf(IsError(ERR_PROXY_CONNECTION_FAILED),
  14367. IsError(reject_error)));
  14368. // Now that the new handshake has failed, ensure that the client
  14369. // certificate was removed from the client auth cache.
  14370. ASSERT_FALSE(session->ssl_client_context()->GetClientCertificate(
  14371. HostPortPair("proxy", 70), &client_cert, &client_private_key));
  14372. ASSERT_FALSE(session->ssl_client_context()->GetClientCertificate(
  14373. HostPortPair("www.example.com", 443), &client_cert,
  14374. &client_private_key));
  14375. }
  14376. }
  14377. }
  14378. }
  14379. // Test that HttpNetworkTransaction correctly handles (mocked) certificate
  14380. // requests during a TLS renegotiation.
  14381. TEST_F(HttpNetworkTransactionTest, CertificateRequestInRenego) {
  14382. HttpRequestInfo request_info;
  14383. request_info.url = GURL("https://www.example.com/");
  14384. request_info.method = "GET";
  14385. request_info.load_flags = LOAD_NORMAL;
  14386. request_info.traffic_annotation =
  14387. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14388. auto cert_request = base::MakeRefCounted<SSLCertRequestInfo>();
  14389. cert_request->host_and_port = HostPortPair("www.example.com", 443);
  14390. std::unique_ptr<FakeClientCertIdentity> identity =
  14391. FakeClientCertIdentity::CreateFromCertAndKeyFiles(
  14392. GetTestCertsDirectory(), "client_1.pem", "client_1.pk8");
  14393. ASSERT_TRUE(identity);
  14394. // The first connection's handshake succeeds, but we get
  14395. // ERR_SSL_CLIENT_AUTH_CERT_NEEDED instead of an HTTP response.
  14396. SSLSocketDataProvider ssl_data1(ASYNC, OK);
  14397. ssl_data1.cert_request_info = cert_request.get();
  14398. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1);
  14399. MockWrite data1_writes[] = {
  14400. MockWrite("GET / HTTP/1.1\r\n"
  14401. "Host: www.example.com\r\n"
  14402. "Connection: keep-alive\r\n\r\n"),
  14403. };
  14404. MockRead data1_reads[] = {
  14405. MockRead(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED),
  14406. };
  14407. StaticSocketDataProvider data1(data1_reads, data1_writes);
  14408. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  14409. // After supplying with certificate, we restart the request from the top,
  14410. // which succeeds this time.
  14411. SSLSocketDataProvider ssl_data2(ASYNC, OK);
  14412. ssl_data2.expected_send_client_cert = true;
  14413. ssl_data2.expected_client_cert = identity->certificate();
  14414. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data2);
  14415. MockWrite data2_writes[] = {
  14416. MockWrite("GET / HTTP/1.1\r\n"
  14417. "Host: www.example.com\r\n"
  14418. "Connection: keep-alive\r\n\r\n"),
  14419. };
  14420. MockRead data2_reads[] = {
  14421. MockRead("HTTP/1.1 200 OK\r\n"
  14422. "Content-Length: 0\r\n\r\n"),
  14423. };
  14424. StaticSocketDataProvider data2(data2_reads, data2_writes);
  14425. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  14426. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  14427. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  14428. TestCompletionCallback callback;
  14429. int rv = callback.GetResult(
  14430. trans.Start(&request_info, callback.callback(), NetLogWithSource()));
  14431. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  14432. rv = trans.RestartWithCertificate(identity->certificate(),
  14433. identity->ssl_private_key(),
  14434. callback.callback());
  14435. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  14436. // Ensure the certificate was added to the client auth cache
  14437. // allowing the connection to continue restarting.
  14438. scoped_refptr<X509Certificate> client_cert;
  14439. scoped_refptr<SSLPrivateKey> client_private_key;
  14440. ASSERT_TRUE(session->ssl_client_context()->GetClientCertificate(
  14441. HostPortPair("www.example.com", 443), &client_cert, &client_private_key));
  14442. EXPECT_TRUE(client_cert->EqualsIncludingChain(identity->certificate()));
  14443. // Complete the handshake. The request now succeeds.
  14444. rv = callback.WaitForResult();
  14445. ASSERT_THAT(rv, IsError(OK));
  14446. EXPECT_EQ(200, trans.GetResponseInfo()->headers->response_code());
  14447. // The client certificate remains in the cache.
  14448. ASSERT_TRUE(session->ssl_client_context()->GetClientCertificate(
  14449. HostPortPair("www.example.com", 443), &client_cert, &client_private_key));
  14450. EXPECT_TRUE(client_cert->EqualsIncludingChain(identity->certificate()));
  14451. }
  14452. TEST_F(HttpNetworkTransactionTest, UseIPConnectionPooling) {
  14453. // Set up a special HttpNetworkSession with a MockCachingHostResolver.
  14454. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>();
  14455. session_deps_.host_resolver->rules()->AddRule("www.example.org", "1.2.3.4");
  14456. session_deps_.host_resolver->rules()->AddRule("mail.example.com", "1.2.3.4");
  14457. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14458. AddSSLSocketData();
  14459. spdy::SpdySerializedFrame host1_req(
  14460. spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST));
  14461. spdy_util_.UpdateWithStreamDestruction(1);
  14462. spdy::SpdySerializedFrame host2_req(
  14463. spdy_util_.ConstructSpdyGet("https://mail.example.com", 3, LOWEST));
  14464. MockWrite spdy_writes[] = {
  14465. CreateMockWrite(host1_req, 0), CreateMockWrite(host2_req, 3),
  14466. };
  14467. spdy::SpdySerializedFrame host1_resp(
  14468. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  14469. spdy::SpdySerializedFrame host1_resp_body(
  14470. spdy_util_.ConstructSpdyDataFrame(1, true));
  14471. spdy::SpdySerializedFrame host2_resp(
  14472. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  14473. spdy::SpdySerializedFrame host2_resp_body(
  14474. spdy_util_.ConstructSpdyDataFrame(3, true));
  14475. MockRead spdy_reads[] = {
  14476. CreateMockRead(host1_resp, 1), CreateMockRead(host1_resp_body, 2),
  14477. CreateMockRead(host2_resp, 4), CreateMockRead(host2_resp_body, 5),
  14478. MockRead(ASYNC, 0, 6),
  14479. };
  14480. IPEndPoint peer_addr(IPAddress::IPv4Localhost(), 443);
  14481. MockConnect connect(ASYNC, OK, peer_addr);
  14482. SequencedSocketData spdy_data(connect, spdy_reads, spdy_writes);
  14483. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  14484. TestCompletionCallback callback;
  14485. HttpRequestInfo request1;
  14486. request1.method = "GET";
  14487. request1.url = GURL("https://www.example.org/");
  14488. request1.load_flags = 0;
  14489. request1.traffic_annotation =
  14490. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14491. HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get());
  14492. int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource());
  14493. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14494. EXPECT_THAT(callback.WaitForResult(), IsOk());
  14495. const HttpResponseInfo* response = trans1.GetResponseInfo();
  14496. ASSERT_TRUE(response);
  14497. ASSERT_TRUE(response->headers);
  14498. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14499. std::string response_data;
  14500. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  14501. EXPECT_EQ("hello!", response_data);
  14502. // Preload mail.example.com into HostCache.
  14503. rv = session_deps_.host_resolver->LoadIntoCache(
  14504. HostPortPair("mail.example.com", 443), NetworkIsolationKey(),
  14505. absl::nullopt);
  14506. EXPECT_THAT(rv, IsOk());
  14507. HttpRequestInfo request2;
  14508. request2.method = "GET";
  14509. request2.url = GURL("https://mail.example.com/");
  14510. request2.load_flags = 0;
  14511. request2.traffic_annotation =
  14512. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14513. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  14514. rv = trans2.Start(&request2, callback.callback(), NetLogWithSource());
  14515. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14516. EXPECT_THAT(callback.WaitForResult(), IsOk());
  14517. response = trans2.GetResponseInfo();
  14518. ASSERT_TRUE(response);
  14519. ASSERT_TRUE(response->headers);
  14520. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14521. EXPECT_TRUE(response->was_fetched_via_spdy);
  14522. EXPECT_TRUE(response->was_alpn_negotiated);
  14523. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  14524. EXPECT_EQ("hello!", response_data);
  14525. }
  14526. TEST_F(HttpNetworkTransactionTest, UseIPConnectionPoolingAfterResolution) {
  14527. // Set up a special HttpNetworkSession with a MockCachingHostResolver.
  14528. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>();
  14529. session_deps_.host_resolver->rules()->AddRule("www.example.org", "1.2.3.4");
  14530. session_deps_.host_resolver->rules()->AddRule("mail.example.com", "1.2.3.4");
  14531. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14532. AddSSLSocketData();
  14533. spdy::SpdySerializedFrame host1_req(
  14534. spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST));
  14535. spdy_util_.UpdateWithStreamDestruction(1);
  14536. spdy::SpdySerializedFrame host2_req(
  14537. spdy_util_.ConstructSpdyGet("https://mail.example.com", 3, LOWEST));
  14538. MockWrite spdy_writes[] = {
  14539. CreateMockWrite(host1_req, 0), CreateMockWrite(host2_req, 3),
  14540. };
  14541. spdy::SpdySerializedFrame host1_resp(
  14542. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  14543. spdy::SpdySerializedFrame host1_resp_body(
  14544. spdy_util_.ConstructSpdyDataFrame(1, true));
  14545. spdy::SpdySerializedFrame host2_resp(
  14546. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  14547. spdy::SpdySerializedFrame host2_resp_body(
  14548. spdy_util_.ConstructSpdyDataFrame(3, true));
  14549. MockRead spdy_reads[] = {
  14550. CreateMockRead(host1_resp, 1), CreateMockRead(host1_resp_body, 2),
  14551. CreateMockRead(host2_resp, 4), CreateMockRead(host2_resp_body, 5),
  14552. MockRead(ASYNC, 0, 6),
  14553. };
  14554. IPEndPoint peer_addr(IPAddress::IPv4Localhost(), 443);
  14555. MockConnect connect(ASYNC, OK, peer_addr);
  14556. SequencedSocketData spdy_data(connect, spdy_reads, spdy_writes);
  14557. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  14558. TestCompletionCallback callback;
  14559. HttpRequestInfo request1;
  14560. request1.method = "GET";
  14561. request1.url = GURL("https://www.example.org/");
  14562. request1.load_flags = 0;
  14563. request1.traffic_annotation =
  14564. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14565. HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get());
  14566. int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource());
  14567. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14568. EXPECT_THAT(callback.WaitForResult(), IsOk());
  14569. const HttpResponseInfo* response = trans1.GetResponseInfo();
  14570. ASSERT_TRUE(response);
  14571. ASSERT_TRUE(response->headers);
  14572. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14573. std::string response_data;
  14574. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  14575. EXPECT_EQ("hello!", response_data);
  14576. HttpRequestInfo request2;
  14577. request2.method = "GET";
  14578. request2.url = GURL("https://mail.example.com/");
  14579. request2.load_flags = 0;
  14580. request2.traffic_annotation =
  14581. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14582. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  14583. rv = trans2.Start(&request2, callback.callback(), NetLogWithSource());
  14584. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14585. EXPECT_THAT(callback.WaitForResult(), IsOk());
  14586. response = trans2.GetResponseInfo();
  14587. ASSERT_TRUE(response);
  14588. ASSERT_TRUE(response->headers);
  14589. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14590. EXPECT_TRUE(response->was_fetched_via_spdy);
  14591. EXPECT_TRUE(response->was_alpn_negotiated);
  14592. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  14593. EXPECT_EQ("hello!", response_data);
  14594. }
  14595. // Regression test for https://crbug.com/546991.
  14596. // The server might not be able to serve an IP pooled request, and might send a
  14597. // 421 Misdirected Request response status to indicate this.
  14598. // HttpNetworkTransaction should reset the request and retry without IP pooling.
  14599. TEST_F(HttpNetworkTransactionTest, RetryWithoutConnectionPooling) {
  14600. // Two hosts resolve to the same IP address.
  14601. const std::string ip_addr = "1.2.3.4";
  14602. IPAddress ip;
  14603. ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr));
  14604. IPEndPoint peer_addr = IPEndPoint(ip, 443);
  14605. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>();
  14606. session_deps_.host_resolver->rules()->AddRule("www.example.org", ip_addr);
  14607. session_deps_.host_resolver->rules()->AddRule("mail.example.org", ip_addr);
  14608. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14609. // Two requests on the first connection.
  14610. spdy::SpdySerializedFrame req1(
  14611. spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST));
  14612. spdy_util_.UpdateWithStreamDestruction(1);
  14613. spdy::SpdySerializedFrame req2(
  14614. spdy_util_.ConstructSpdyGet("https://mail.example.org", 3, LOWEST));
  14615. spdy::SpdySerializedFrame rst(
  14616. spdy_util_.ConstructSpdyRstStream(3, spdy::ERROR_CODE_CANCEL));
  14617. MockWrite writes1[] = {
  14618. CreateMockWrite(req1, 0), CreateMockWrite(req2, 3),
  14619. CreateMockWrite(rst, 6),
  14620. };
  14621. // The first one succeeds, the second gets error 421 Misdirected Request.
  14622. spdy::SpdySerializedFrame resp1(
  14623. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  14624. spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true));
  14625. spdy::Http2HeaderBlock response_headers;
  14626. response_headers[spdy::kHttp2StatusHeader] = "421";
  14627. spdy::SpdySerializedFrame resp2(
  14628. spdy_util_.ConstructSpdyReply(3, std::move(response_headers)));
  14629. MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2),
  14630. CreateMockRead(resp2, 4), MockRead(ASYNC, 0, 5)};
  14631. MockConnect connect1(ASYNC, OK, peer_addr);
  14632. SequencedSocketData data1(connect1, reads1, writes1);
  14633. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  14634. AddSSLSocketData();
  14635. // Retry the second request on a second connection.
  14636. SpdyTestUtil spdy_util2;
  14637. spdy::SpdySerializedFrame req3(
  14638. spdy_util2.ConstructSpdyGet("https://mail.example.org", 1, LOWEST));
  14639. MockWrite writes2[] = {
  14640. CreateMockWrite(req3, 0),
  14641. };
  14642. spdy::SpdySerializedFrame resp3(
  14643. spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1));
  14644. spdy::SpdySerializedFrame body3(spdy_util2.ConstructSpdyDataFrame(1, true));
  14645. MockRead reads2[] = {CreateMockRead(resp3, 1), CreateMockRead(body3, 2),
  14646. MockRead(ASYNC, 0, 3)};
  14647. MockConnect connect2(ASYNC, OK, peer_addr);
  14648. SequencedSocketData data2(connect2, reads2, writes2);
  14649. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  14650. AddSSLSocketData();
  14651. // Preload mail.example.org into HostCache.
  14652. int rv = session_deps_.host_resolver->LoadIntoCache(
  14653. HostPortPair("mail.example.org", 443), NetworkIsolationKey(),
  14654. absl::nullopt);
  14655. EXPECT_THAT(rv, IsOk());
  14656. HttpRequestInfo request1;
  14657. request1.method = "GET";
  14658. request1.url = GURL("https://www.example.org/");
  14659. request1.load_flags = 0;
  14660. request1.traffic_annotation =
  14661. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14662. HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get());
  14663. TestCompletionCallback callback;
  14664. rv = trans1.Start(&request1, callback.callback(), NetLogWithSource());
  14665. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14666. rv = callback.WaitForResult();
  14667. EXPECT_THAT(rv, IsOk());
  14668. const HttpResponseInfo* response = trans1.GetResponseInfo();
  14669. ASSERT_TRUE(response);
  14670. ASSERT_TRUE(response->headers);
  14671. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14672. EXPECT_TRUE(response->was_fetched_via_spdy);
  14673. EXPECT_TRUE(response->was_alpn_negotiated);
  14674. std::string response_data;
  14675. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  14676. EXPECT_EQ("hello!", response_data);
  14677. HttpRequestInfo request2;
  14678. request2.method = "GET";
  14679. request2.url = GURL("https://mail.example.org/");
  14680. request2.load_flags = 0;
  14681. request2.traffic_annotation =
  14682. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14683. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  14684. RecordingNetLogObserver net_log_observer;
  14685. rv = trans2.Start(&request2, callback.callback(),
  14686. NetLogWithSource::Make(NetLogSourceType::NONE));
  14687. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14688. rv = callback.WaitForResult();
  14689. EXPECT_THAT(rv, IsOk());
  14690. response = trans2.GetResponseInfo();
  14691. ASSERT_TRUE(response);
  14692. ASSERT_TRUE(response->headers);
  14693. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14694. EXPECT_TRUE(response->was_fetched_via_spdy);
  14695. EXPECT_TRUE(response->was_alpn_negotiated);
  14696. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  14697. EXPECT_EQ("hello!", response_data);
  14698. auto entries = net_log_observer.GetEntries();
  14699. ExpectLogContainsSomewhere(
  14700. entries, 0, NetLogEventType::HTTP_TRANSACTION_RESTART_MISDIRECTED_REQUEST,
  14701. NetLogEventPhase::NONE);
  14702. }
  14703. // Test that HTTP 421 responses are properly returned to the caller if received
  14704. // on the retry as well. HttpNetworkTransaction should not infinite loop or lose
  14705. // portions of the response.
  14706. TEST_F(HttpNetworkTransactionTest, ReturnHTTP421OnRetry) {
  14707. // Two hosts resolve to the same IP address.
  14708. const std::string ip_addr = "1.2.3.4";
  14709. IPAddress ip;
  14710. ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr));
  14711. IPEndPoint peer_addr = IPEndPoint(ip, 443);
  14712. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>();
  14713. session_deps_.host_resolver->rules()->AddRule("www.example.org", ip_addr);
  14714. session_deps_.host_resolver->rules()->AddRule("mail.example.org", ip_addr);
  14715. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14716. // Two requests on the first connection.
  14717. spdy::SpdySerializedFrame req1(
  14718. spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST));
  14719. spdy_util_.UpdateWithStreamDestruction(1);
  14720. spdy::SpdySerializedFrame req2(
  14721. spdy_util_.ConstructSpdyGet("https://mail.example.org", 3, LOWEST));
  14722. spdy::SpdySerializedFrame rst(
  14723. spdy_util_.ConstructSpdyRstStream(3, spdy::ERROR_CODE_CANCEL));
  14724. MockWrite writes1[] = {
  14725. CreateMockWrite(req1, 0), CreateMockWrite(req2, 3),
  14726. CreateMockWrite(rst, 6),
  14727. };
  14728. // The first one succeeds, the second gets error 421 Misdirected Request.
  14729. spdy::SpdySerializedFrame resp1(
  14730. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  14731. spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true));
  14732. spdy::Http2HeaderBlock response_headers;
  14733. response_headers[spdy::kHttp2StatusHeader] = "421";
  14734. spdy::SpdySerializedFrame resp2(
  14735. spdy_util_.ConstructSpdyReply(3, response_headers.Clone()));
  14736. MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2),
  14737. CreateMockRead(resp2, 4), MockRead(ASYNC, 0, 5)};
  14738. MockConnect connect1(ASYNC, OK, peer_addr);
  14739. SequencedSocketData data1(connect1, reads1, writes1);
  14740. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  14741. AddSSLSocketData();
  14742. // Retry the second request on a second connection. It returns 421 Misdirected
  14743. // Retry again.
  14744. SpdyTestUtil spdy_util2;
  14745. spdy::SpdySerializedFrame req3(
  14746. spdy_util2.ConstructSpdyGet("https://mail.example.org", 1, LOWEST));
  14747. MockWrite writes2[] = {
  14748. CreateMockWrite(req3, 0),
  14749. };
  14750. spdy::SpdySerializedFrame resp3(
  14751. spdy_util2.ConstructSpdyReply(1, std::move(response_headers)));
  14752. spdy::SpdySerializedFrame body3(spdy_util2.ConstructSpdyDataFrame(1, true));
  14753. MockRead reads2[] = {CreateMockRead(resp3, 1), CreateMockRead(body3, 2),
  14754. MockRead(ASYNC, 0, 3)};
  14755. MockConnect connect2(ASYNC, OK, peer_addr);
  14756. SequencedSocketData data2(connect2, reads2, writes2);
  14757. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  14758. AddSSLSocketData();
  14759. // Preload mail.example.org into HostCache.
  14760. int rv = session_deps_.host_resolver->LoadIntoCache(
  14761. HostPortPair("mail.example.org", 443), NetworkIsolationKey(),
  14762. absl::nullopt);
  14763. EXPECT_THAT(rv, IsOk());
  14764. HttpRequestInfo request1;
  14765. request1.method = "GET";
  14766. request1.url = GURL("https://www.example.org/");
  14767. request1.load_flags = 0;
  14768. request1.traffic_annotation =
  14769. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14770. HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get());
  14771. TestCompletionCallback callback;
  14772. rv = trans1.Start(&request1, callback.callback(), NetLogWithSource());
  14773. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14774. rv = callback.WaitForResult();
  14775. EXPECT_THAT(rv, IsOk());
  14776. const HttpResponseInfo* response = trans1.GetResponseInfo();
  14777. ASSERT_TRUE(response);
  14778. ASSERT_TRUE(response->headers);
  14779. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14780. EXPECT_TRUE(response->was_fetched_via_spdy);
  14781. EXPECT_TRUE(response->was_alpn_negotiated);
  14782. std::string response_data;
  14783. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  14784. EXPECT_EQ("hello!", response_data);
  14785. HttpRequestInfo request2;
  14786. request2.method = "GET";
  14787. request2.url = GURL("https://mail.example.org/");
  14788. request2.load_flags = 0;
  14789. request2.traffic_annotation =
  14790. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14791. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  14792. rv = trans2.Start(&request2, callback.callback(),
  14793. NetLogWithSource::Make(NetLogSourceType::NONE));
  14794. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14795. rv = callback.WaitForResult();
  14796. EXPECT_THAT(rv, IsOk());
  14797. // After a retry, the 421 Misdirected Request is reported back up to the
  14798. // caller.
  14799. response = trans2.GetResponseInfo();
  14800. ASSERT_TRUE(response);
  14801. ASSERT_TRUE(response->headers);
  14802. EXPECT_EQ("HTTP/1.1 421", response->headers->GetStatusLine());
  14803. EXPECT_TRUE(response->was_fetched_via_spdy);
  14804. EXPECT_TRUE(response->was_alpn_negotiated);
  14805. EXPECT_TRUE(response->ssl_info.cert);
  14806. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  14807. EXPECT_EQ("hello!", response_data);
  14808. }
  14809. TEST_F(HttpNetworkTransactionTest,
  14810. Response421WithStreamingBodyWithNonNullSource) {
  14811. const std::string ip_addr = "1.2.3.4";
  14812. IPAddress ip;
  14813. ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr));
  14814. IPEndPoint peer_addr = IPEndPoint(ip, 443);
  14815. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>();
  14816. session_deps_.host_resolver->rules()->AddRule("www.example.org", ip_addr);
  14817. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14818. const std::string request_body = "hello";
  14819. spdy::SpdySerializedFrame req1 = spdy_util_.ConstructChunkedSpdyPost({}, 0);
  14820. spdy::SpdySerializedFrame req1_body =
  14821. spdy_util_.ConstructSpdyDataFrame(1, request_body, /*fin=*/true);
  14822. spdy::SpdySerializedFrame rst =
  14823. spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL);
  14824. MockWrite writes1[] = {
  14825. CreateMockWrite(req1, 0),
  14826. CreateMockWrite(req1_body, 1),
  14827. CreateMockWrite(rst, 4),
  14828. };
  14829. spdy::Http2HeaderBlock response_headers;
  14830. response_headers[spdy::kHttp2StatusHeader] = "421";
  14831. spdy::SpdySerializedFrame resp1 =
  14832. spdy_util_.ConstructSpdyReply(1, std::move(response_headers));
  14833. MockRead reads1[] = {CreateMockRead(resp1, 2), MockRead(ASYNC, 0, 3)};
  14834. MockConnect connect1(ASYNC, OK, peer_addr);
  14835. SequencedSocketData data1(connect1, reads1, writes1);
  14836. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  14837. AddSSLSocketData();
  14838. SpdyTestUtil spdy_util2;
  14839. spdy::SpdySerializedFrame req2 = spdy_util2.ConstructChunkedSpdyPost({}, 0);
  14840. spdy::SpdySerializedFrame req2_body =
  14841. spdy_util2.ConstructSpdyDataFrame(1, request_body, /*fin=*/true);
  14842. MockWrite writes2[] = {
  14843. CreateMockWrite(req2, 0),
  14844. CreateMockWrite(req2_body, 1),
  14845. };
  14846. spdy::Http2HeaderBlock resp2_headers;
  14847. resp2_headers[spdy::kHttp2StatusHeader] = "200";
  14848. spdy::SpdySerializedFrame resp2 =
  14849. spdy_util2.ConstructSpdyReply(1, std::move(resp2_headers));
  14850. spdy::SpdySerializedFrame resp2_body(
  14851. spdy_util2.ConstructSpdyDataFrame(1, true));
  14852. MockRead reads2[] = {CreateMockRead(resp2, 2), CreateMockRead(resp2_body, 3),
  14853. MockRead(ASYNC, 0, 4)};
  14854. MockConnect connect2(ASYNC, OK, peer_addr);
  14855. SequencedSocketData data2(connect2, reads2, writes2);
  14856. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  14857. AddSSLSocketData();
  14858. TestCompletionCallback callback;
  14859. HttpRequestInfo request;
  14860. ChunkedUploadDataStream upload_data_stream(0, /*has_null_source=*/false);
  14861. upload_data_stream.AppendData(request_body.data(), request_body.size(),
  14862. /*is_done=*/true);
  14863. request.method = "POST";
  14864. request.url = GURL("https://www.example.org");
  14865. request.load_flags = 0;
  14866. request.traffic_annotation =
  14867. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14868. request.upload_data_stream = &upload_data_stream;
  14869. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  14870. int rv = trans.Start(&request, callback.callback(),
  14871. NetLogWithSource::Make(NetLogSourceType::NONE));
  14872. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14873. rv = callback.WaitForResult();
  14874. EXPECT_THAT(rv, IsOk());
  14875. const HttpResponseInfo* response = trans.GetResponseInfo();
  14876. std::string response_data;
  14877. ASSERT_TRUE(response);
  14878. ASSERT_TRUE(response->headers);
  14879. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14880. EXPECT_TRUE(response->was_fetched_via_spdy);
  14881. EXPECT_TRUE(response->was_alpn_negotiated);
  14882. EXPECT_TRUE(response->ssl_info.cert);
  14883. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  14884. EXPECT_EQ("hello!", response_data);
  14885. }
  14886. TEST_F(HttpNetworkTransactionTest, Response421WithStreamingBodyWithNullSource) {
  14887. const std::string ip_addr = "1.2.3.4";
  14888. IPAddress ip;
  14889. ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr));
  14890. IPEndPoint peer_addr = IPEndPoint(ip, 443);
  14891. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>();
  14892. session_deps_.host_resolver->rules()->AddRule("www.example.org", ip_addr);
  14893. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14894. const std::string request_body = "hello";
  14895. spdy::SpdySerializedFrame req1 = spdy_util_.ConstructChunkedSpdyPost({}, 0);
  14896. spdy::SpdySerializedFrame req1_body =
  14897. spdy_util_.ConstructSpdyDataFrame(1, request_body, /*fin=*/true);
  14898. spdy::SpdySerializedFrame rst =
  14899. spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL);
  14900. MockWrite writes1[] = {
  14901. CreateMockWrite(req1, 0),
  14902. CreateMockWrite(req1_body, 1),
  14903. CreateMockWrite(rst, 5),
  14904. };
  14905. spdy::Http2HeaderBlock response_headers;
  14906. response_headers[spdy::kHttp2StatusHeader] = "421";
  14907. spdy::SpdySerializedFrame resp1 =
  14908. spdy_util_.ConstructSpdyReply(1, std::move(response_headers));
  14909. spdy::SpdySerializedFrame resp1_body(
  14910. spdy_util_.ConstructSpdyDataFrame(1, true));
  14911. MockRead reads1[] = {CreateMockRead(resp1, 2), CreateMockRead(resp1_body, 3),
  14912. MockRead(ASYNC, 0, 4)};
  14913. MockConnect connect1(ASYNC, OK, peer_addr);
  14914. SequencedSocketData data1(connect1, reads1, writes1);
  14915. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  14916. AddSSLSocketData();
  14917. TestCompletionCallback callback;
  14918. HttpRequestInfo request;
  14919. ChunkedUploadDataStream upload_data_stream(0, /*has_null_source=*/true);
  14920. upload_data_stream.AppendData(request_body.data(), request_body.size(),
  14921. /*is_done=*/true);
  14922. request.method = "POST";
  14923. request.url = GURL("https://www.example.org");
  14924. request.load_flags = 0;
  14925. request.traffic_annotation =
  14926. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14927. request.upload_data_stream = &upload_data_stream;
  14928. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  14929. int rv = trans.Start(&request, callback.callback(),
  14930. NetLogWithSource::Make(NetLogSourceType::NONE));
  14931. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14932. rv = callback.WaitForResult();
  14933. EXPECT_THAT(rv, IsOk());
  14934. const HttpResponseInfo* response = trans.GetResponseInfo();
  14935. std::string response_data;
  14936. ASSERT_TRUE(response);
  14937. ASSERT_TRUE(response->headers);
  14938. EXPECT_EQ("HTTP/1.1 421", response->headers->GetStatusLine());
  14939. EXPECT_TRUE(response->was_fetched_via_spdy);
  14940. EXPECT_TRUE(response->was_alpn_negotiated);
  14941. EXPECT_TRUE(response->ssl_info.cert);
  14942. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  14943. EXPECT_EQ("hello!", response_data);
  14944. }
  14945. TEST_F(HttpNetworkTransactionTest,
  14946. UseIPConnectionPoolingWithHostCacheExpiration) {
  14947. // Set up HostResolver to invalidate cached entries after 1 cached resolve.
  14948. session_deps_.host_resolver =
  14949. std::make_unique<MockCachingHostResolver>(1 /* cache_invalidation_num */);
  14950. session_deps_.host_resolver->rules()->AddRule("www.example.org", "1.2.3.4");
  14951. session_deps_.host_resolver->rules()->AddRule("mail.example.com", "1.2.3.4");
  14952. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  14953. AddSSLSocketData();
  14954. spdy::SpdySerializedFrame host1_req(
  14955. spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST));
  14956. spdy_util_.UpdateWithStreamDestruction(1);
  14957. spdy::SpdySerializedFrame host2_req(
  14958. spdy_util_.ConstructSpdyGet("https://mail.example.com", 3, LOWEST));
  14959. MockWrite spdy_writes[] = {
  14960. CreateMockWrite(host1_req, 0), CreateMockWrite(host2_req, 3),
  14961. };
  14962. spdy::SpdySerializedFrame host1_resp(
  14963. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  14964. spdy::SpdySerializedFrame host1_resp_body(
  14965. spdy_util_.ConstructSpdyDataFrame(1, true));
  14966. spdy::SpdySerializedFrame host2_resp(
  14967. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  14968. spdy::SpdySerializedFrame host2_resp_body(
  14969. spdy_util_.ConstructSpdyDataFrame(3, true));
  14970. MockRead spdy_reads[] = {
  14971. CreateMockRead(host1_resp, 1), CreateMockRead(host1_resp_body, 2),
  14972. CreateMockRead(host2_resp, 4), CreateMockRead(host2_resp_body, 5),
  14973. MockRead(ASYNC, 0, 6),
  14974. };
  14975. IPEndPoint peer_addr(IPAddress::IPv4Localhost(), 443);
  14976. MockConnect connect(ASYNC, OK, peer_addr);
  14977. SequencedSocketData spdy_data(connect, spdy_reads, spdy_writes);
  14978. session_deps_.socket_factory->AddSocketDataProvider(&spdy_data);
  14979. TestCompletionCallback callback;
  14980. HttpRequestInfo request1;
  14981. request1.method = "GET";
  14982. request1.url = GURL("https://www.example.org/");
  14983. request1.load_flags = 0;
  14984. request1.traffic_annotation =
  14985. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  14986. HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get());
  14987. int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource());
  14988. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  14989. EXPECT_THAT(callback.WaitForResult(), IsOk());
  14990. const HttpResponseInfo* response = trans1.GetResponseInfo();
  14991. ASSERT_TRUE(response);
  14992. ASSERT_TRUE(response->headers);
  14993. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  14994. std::string response_data;
  14995. ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk());
  14996. EXPECT_EQ("hello!", response_data);
  14997. // Preload cache entries into HostCache.
  14998. rv = session_deps_.host_resolver->LoadIntoCache(
  14999. HostPortPair("mail.example.com", 443), NetworkIsolationKey(),
  15000. absl::nullopt);
  15001. EXPECT_THAT(rv, IsOk());
  15002. HttpRequestInfo request2;
  15003. request2.method = "GET";
  15004. request2.url = GURL("https://mail.example.com/");
  15005. request2.load_flags = 0;
  15006. request2.traffic_annotation =
  15007. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15008. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  15009. rv = trans2.Start(&request2, callback.callback(), NetLogWithSource());
  15010. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15011. EXPECT_THAT(callback.WaitForResult(), IsOk());
  15012. response = trans2.GetResponseInfo();
  15013. ASSERT_TRUE(response);
  15014. ASSERT_TRUE(response->headers);
  15015. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  15016. EXPECT_TRUE(response->was_fetched_via_spdy);
  15017. EXPECT_TRUE(response->was_alpn_negotiated);
  15018. ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk());
  15019. EXPECT_EQ("hello!", response_data);
  15020. }
  15021. TEST_F(HttpNetworkTransactionTest, DoNotUseSpdySessionForHttp) {
  15022. const std::string https_url = "https://www.example.org:8080/";
  15023. const std::string http_url = "http://www.example.org:8080/";
  15024. // SPDY GET for HTTPS URL
  15025. spdy::SpdySerializedFrame req1(
  15026. spdy_util_.ConstructSpdyGet(https_url.c_str(), 1, LOWEST));
  15027. MockWrite writes1[] = {
  15028. CreateMockWrite(req1, 0),
  15029. };
  15030. spdy::SpdySerializedFrame resp1(
  15031. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  15032. spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true));
  15033. MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2),
  15034. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3)};
  15035. SequencedSocketData data1(reads1, writes1);
  15036. MockConnect connect_data1(ASYNC, OK);
  15037. data1.set_connect_data(connect_data1);
  15038. // HTTP GET for the HTTP URL
  15039. MockWrite writes2[] = {
  15040. MockWrite(ASYNC, 0,
  15041. "GET / HTTP/1.1\r\n"
  15042. "Host: www.example.org:8080\r\n"
  15043. "Connection: keep-alive\r\n\r\n"),
  15044. };
  15045. MockRead reads2[] = {
  15046. MockRead(ASYNC, 1, "HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  15047. MockRead(ASYNC, 2, "hello"),
  15048. MockRead(ASYNC, OK, 3),
  15049. };
  15050. SequencedSocketData data2(reads2, writes2);
  15051. SSLSocketDataProvider ssl(ASYNC, OK);
  15052. ssl.next_proto = kProtoHTTP2;
  15053. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  15054. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  15055. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  15056. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15057. // Start the first transaction to set up the SpdySession
  15058. HttpRequestInfo request1;
  15059. request1.method = "GET";
  15060. request1.url = GURL(https_url);
  15061. request1.load_flags = 0;
  15062. request1.traffic_annotation =
  15063. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15064. HttpNetworkTransaction trans1(LOWEST, session.get());
  15065. TestCompletionCallback callback1;
  15066. EXPECT_EQ(ERR_IO_PENDING,
  15067. trans1.Start(&request1, callback1.callback(), NetLogWithSource()));
  15068. base::RunLoop().RunUntilIdle();
  15069. EXPECT_THAT(callback1.WaitForResult(), IsOk());
  15070. EXPECT_TRUE(trans1.GetResponseInfo()->was_fetched_via_spdy);
  15071. // Now, start the HTTP request
  15072. HttpRequestInfo request2;
  15073. request2.method = "GET";
  15074. request2.url = GURL(http_url);
  15075. request2.load_flags = 0;
  15076. request2.traffic_annotation =
  15077. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15078. HttpNetworkTransaction trans2(MEDIUM, session.get());
  15079. TestCompletionCallback callback2;
  15080. EXPECT_EQ(ERR_IO_PENDING,
  15081. trans2.Start(&request2, callback2.callback(), NetLogWithSource()));
  15082. base::RunLoop().RunUntilIdle();
  15083. EXPECT_THAT(callback2.WaitForResult(), IsOk());
  15084. EXPECT_FALSE(trans2.GetResponseInfo()->was_fetched_via_spdy);
  15085. }
  15086. // Alternative service requires HTTP/2 (or SPDY), but HTTP/1.1 is negotiated
  15087. // with the alternative server. That connection should not be used.
  15088. TEST_F(HttpNetworkTransactionTest, AlternativeServiceNotOnHttp11) {
  15089. url::SchemeHostPort server("https", "www.example.org", 443);
  15090. HostPortPair alternative("www.example.org", 444);
  15091. // Negotiate HTTP/1.1 with alternative.
  15092. SSLSocketDataProvider ssl(ASYNC, OK);
  15093. ssl.next_proto = kProtoHTTP11;
  15094. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  15095. // No data should be read from the alternative, because HTTP/1.1 is
  15096. // negotiated.
  15097. StaticSocketDataProvider data;
  15098. session_deps_.socket_factory->AddSocketDataProvider(&data);
  15099. // This test documents that an alternate Job should not be used if HTTP/1.1 is
  15100. // negotiated. In order to test this, a failed connection to the server is
  15101. // mocked. This way the request relies on the alternate Job.
  15102. StaticSocketDataProvider data_refused;
  15103. data_refused.set_connect_data(MockConnect(ASYNC, ERR_CONNECTION_REFUSED));
  15104. session_deps_.socket_factory->AddSocketDataProvider(&data_refused);
  15105. // Set up alternative service for server.
  15106. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15107. HttpServerProperties* http_server_properties =
  15108. session->http_server_properties();
  15109. AlternativeService alternative_service(kProtoHTTP2, alternative);
  15110. base::Time expiration = base::Time::Now() + base::Days(1);
  15111. http_server_properties->SetHttp2AlternativeService(
  15112. server, NetworkIsolationKey(), alternative_service, expiration);
  15113. HttpRequestInfo request;
  15114. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  15115. request.method = "GET";
  15116. request.url = GURL("https://www.example.org:443");
  15117. request.traffic_annotation =
  15118. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15119. TestCompletionCallback callback;
  15120. // HTTP/2 (or SPDY) is required for alternative service, if HTTP/1.1 is
  15121. // negotiated, the alternate Job should fail with ERR_ALPN_NEGOTIATION_FAILED.
  15122. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  15123. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_ALPN_NEGOTIATION_FAILED));
  15124. }
  15125. // A request to a server with an alternative service fires two Jobs: one to the
  15126. // server, and an alternate one to the alternative server. If the former
  15127. // succeeds, the request should succeed, even if the latter fails because
  15128. // HTTP/1.1 is negotiated which is insufficient for alternative service.
  15129. TEST_F(HttpNetworkTransactionTest, FailedAlternativeServiceIsNotUserVisible) {
  15130. url::SchemeHostPort server("https", "www.example.org", 443);
  15131. HostPortPair alternative("www.example.org", 444);
  15132. // Negotiate HTTP/1.1 with alternative.
  15133. SSLSocketDataProvider alternative_ssl(ASYNC, OK);
  15134. alternative_ssl.next_proto = kProtoHTTP11;
  15135. session_deps_.socket_factory->AddSSLSocketDataProvider(&alternative_ssl);
  15136. // No data should be read from the alternative, because HTTP/1.1 is
  15137. // negotiated.
  15138. StaticSocketDataProvider data;
  15139. session_deps_.socket_factory->AddSocketDataProvider(&data);
  15140. // Negotiate HTTP/1.1 with server.
  15141. SSLSocketDataProvider origin_ssl(ASYNC, OK);
  15142. origin_ssl.next_proto = kProtoHTTP11;
  15143. session_deps_.socket_factory->AddSSLSocketDataProvider(&origin_ssl);
  15144. MockWrite http_writes[] = {
  15145. MockWrite("GET / HTTP/1.1\r\n"
  15146. "Host: www.example.org\r\n"
  15147. "Connection: keep-alive\r\n\r\n"),
  15148. MockWrite("GET /second HTTP/1.1\r\n"
  15149. "Host: www.example.org\r\n"
  15150. "Connection: keep-alive\r\n\r\n"),
  15151. };
  15152. MockRead http_reads[] = {
  15153. MockRead("HTTP/1.1 200 OK\r\n"),
  15154. MockRead("Content-Type: text/html\r\n"),
  15155. MockRead("Content-Length: 6\r\n\r\n"),
  15156. MockRead("foobar"),
  15157. MockRead("HTTP/1.1 200 OK\r\n"),
  15158. MockRead("Content-Type: text/html\r\n"),
  15159. MockRead("Content-Length: 7\r\n\r\n"),
  15160. MockRead("another"),
  15161. };
  15162. StaticSocketDataProvider http_data(http_reads, http_writes);
  15163. session_deps_.socket_factory->AddSocketDataProvider(&http_data);
  15164. // Set up alternative service for server.
  15165. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15166. HttpServerProperties* http_server_properties =
  15167. session->http_server_properties();
  15168. AlternativeService alternative_service(kProtoHTTP2, alternative);
  15169. base::Time expiration = base::Time::Now() + base::Days(1);
  15170. http_server_properties->SetHttp2AlternativeService(
  15171. server, NetworkIsolationKey(), alternative_service, expiration);
  15172. HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get());
  15173. HttpRequestInfo request1;
  15174. request1.method = "GET";
  15175. request1.url = GURL("https://www.example.org:443");
  15176. request1.load_flags = 0;
  15177. request1.traffic_annotation =
  15178. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15179. TestCompletionCallback callback1;
  15180. int rv = trans1.Start(&request1, callback1.callback(), NetLogWithSource());
  15181. rv = callback1.GetResult(rv);
  15182. EXPECT_THAT(rv, IsOk());
  15183. const HttpResponseInfo* response1 = trans1.GetResponseInfo();
  15184. ASSERT_TRUE(response1);
  15185. ASSERT_TRUE(response1->headers);
  15186. EXPECT_EQ("HTTP/1.1 200 OK", response1->headers->GetStatusLine());
  15187. std::string response_data1;
  15188. ASSERT_THAT(ReadTransaction(&trans1, &response_data1), IsOk());
  15189. EXPECT_EQ("foobar", response_data1);
  15190. // Alternative should be marked as broken, because HTTP/1.1 is not sufficient
  15191. // for alternative service.
  15192. EXPECT_TRUE(http_server_properties->IsAlternativeServiceBroken(
  15193. alternative_service, NetworkIsolationKey()));
  15194. // Since |alternative_service| is broken, a second transaction to server
  15195. // should not start an alternate Job. It should pool to existing connection
  15196. // to server.
  15197. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  15198. HttpRequestInfo request2;
  15199. request2.method = "GET";
  15200. request2.url = GURL("https://www.example.org:443/second");
  15201. request2.load_flags = 0;
  15202. request2.traffic_annotation =
  15203. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15204. TestCompletionCallback callback2;
  15205. rv = trans2.Start(&request2, callback2.callback(), NetLogWithSource());
  15206. rv = callback2.GetResult(rv);
  15207. EXPECT_THAT(rv, IsOk());
  15208. const HttpResponseInfo* response2 = trans2.GetResponseInfo();
  15209. ASSERT_TRUE(response2);
  15210. ASSERT_TRUE(response2->headers);
  15211. EXPECT_EQ("HTTP/1.1 200 OK", response2->headers->GetStatusLine());
  15212. std::string response_data2;
  15213. ASSERT_THAT(ReadTransaction(&trans2, &response_data2), IsOk());
  15214. EXPECT_EQ("another", response_data2);
  15215. }
  15216. // Alternative service requires HTTP/2 (or SPDY), but there is already a
  15217. // HTTP/1.1 socket open to the alternative server. That socket should not be
  15218. // used.
  15219. TEST_F(HttpNetworkTransactionTest, AlternativeServiceShouldNotPoolToHttp11) {
  15220. url::SchemeHostPort server("https", "origin.example.org", 443);
  15221. HostPortPair alternative("alternative.example.org", 443);
  15222. std::string origin_url = "https://origin.example.org:443";
  15223. std::string alternative_url = "https://alternative.example.org:443";
  15224. // Negotiate HTTP/1.1 with alternative.example.org.
  15225. SSLSocketDataProvider ssl(ASYNC, OK);
  15226. ssl.next_proto = kProtoHTTP11;
  15227. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  15228. // HTTP/1.1 data for |request1| and |request2|.
  15229. MockWrite http_writes[] = {
  15230. MockWrite(
  15231. "GET / HTTP/1.1\r\n"
  15232. "Host: alternative.example.org\r\n"
  15233. "Connection: keep-alive\r\n\r\n"),
  15234. MockWrite(
  15235. "GET / HTTP/1.1\r\n"
  15236. "Host: alternative.example.org\r\n"
  15237. "Connection: keep-alive\r\n\r\n"),
  15238. };
  15239. MockRead http_reads[] = {
  15240. MockRead(
  15241. "HTTP/1.1 200 OK\r\n"
  15242. "Content-Type: text/html; charset=iso-8859-1\r\n"
  15243. "Content-Length: 40\r\n\r\n"
  15244. "first HTTP/1.1 response from alternative"),
  15245. MockRead(
  15246. "HTTP/1.1 200 OK\r\n"
  15247. "Content-Type: text/html; charset=iso-8859-1\r\n"
  15248. "Content-Length: 41\r\n\r\n"
  15249. "second HTTP/1.1 response from alternative"),
  15250. };
  15251. StaticSocketDataProvider http_data(http_reads, http_writes);
  15252. session_deps_.socket_factory->AddSocketDataProvider(&http_data);
  15253. // This test documents that an alternate Job should not pool to an already
  15254. // existing HTTP/1.1 connection. In order to test this, a failed connection
  15255. // to the server is mocked. This way |request2| relies on the alternate Job.
  15256. StaticSocketDataProvider data_refused;
  15257. data_refused.set_connect_data(MockConnect(ASYNC, ERR_CONNECTION_REFUSED));
  15258. session_deps_.socket_factory->AddSocketDataProvider(&data_refused);
  15259. // Set up alternative service for server.
  15260. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15261. HttpServerProperties* http_server_properties =
  15262. session->http_server_properties();
  15263. AlternativeService alternative_service(kProtoHTTP2, alternative);
  15264. base::Time expiration = base::Time::Now() + base::Days(1);
  15265. http_server_properties->SetHttp2AlternativeService(
  15266. server, NetworkIsolationKey(), alternative_service, expiration);
  15267. // First transaction to alternative to open an HTTP/1.1 socket.
  15268. HttpRequestInfo request1;
  15269. HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get());
  15270. request1.method = "GET";
  15271. request1.url = GURL(alternative_url);
  15272. request1.load_flags = 0;
  15273. request1.traffic_annotation =
  15274. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15275. TestCompletionCallback callback1;
  15276. int rv = trans1.Start(&request1, callback1.callback(), NetLogWithSource());
  15277. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  15278. const HttpResponseInfo* response1 = trans1.GetResponseInfo();
  15279. ASSERT_TRUE(response1);
  15280. ASSERT_TRUE(response1->headers);
  15281. EXPECT_EQ("HTTP/1.1 200 OK", response1->headers->GetStatusLine());
  15282. EXPECT_TRUE(response1->was_alpn_negotiated);
  15283. EXPECT_FALSE(response1->was_fetched_via_spdy);
  15284. std::string response_data1;
  15285. ASSERT_THAT(ReadTransaction(&trans1, &response_data1), IsOk());
  15286. EXPECT_EQ("first HTTP/1.1 response from alternative", response_data1);
  15287. // Request for origin.example.org, which has an alternative service. This
  15288. // will start two Jobs: the alternative looks for connections to pool to,
  15289. // finds one which is HTTP/1.1, and should ignore it, and should not try to
  15290. // open other connections to alternative server. The Job to server fails, so
  15291. // this request fails.
  15292. HttpRequestInfo request2;
  15293. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  15294. request2.method = "GET";
  15295. request2.url = GURL(origin_url);
  15296. request2.load_flags = 0;
  15297. request2.traffic_annotation =
  15298. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15299. TestCompletionCallback callback2;
  15300. rv = trans2.Start(&request2, callback2.callback(), NetLogWithSource());
  15301. EXPECT_THAT(callback2.GetResult(rv), IsError(ERR_CONNECTION_REFUSED));
  15302. // Another transaction to alternative. This is to test that the HTTP/1.1
  15303. // socket is still open and in the pool.
  15304. HttpRequestInfo request3;
  15305. HttpNetworkTransaction trans3(DEFAULT_PRIORITY, session.get());
  15306. request3.method = "GET";
  15307. request3.url = GURL(alternative_url);
  15308. request3.load_flags = 0;
  15309. request3.traffic_annotation =
  15310. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15311. TestCompletionCallback callback3;
  15312. rv = trans3.Start(&request3, callback3.callback(), NetLogWithSource());
  15313. EXPECT_THAT(callback3.GetResult(rv), IsOk());
  15314. const HttpResponseInfo* response3 = trans3.GetResponseInfo();
  15315. ASSERT_TRUE(response3);
  15316. ASSERT_TRUE(response3->headers);
  15317. EXPECT_EQ("HTTP/1.1 200 OK", response3->headers->GetStatusLine());
  15318. EXPECT_TRUE(response3->was_alpn_negotiated);
  15319. EXPECT_FALSE(response3->was_fetched_via_spdy);
  15320. std::string response_data3;
  15321. ASSERT_THAT(ReadTransaction(&trans3, &response_data3), IsOk());
  15322. EXPECT_EQ("second HTTP/1.1 response from alternative", response_data3);
  15323. }
  15324. TEST_F(HttpNetworkTransactionTest, DoNotUseSpdySessionForHttpOverTunnel) {
  15325. const std::string https_url = "https://www.example.org:8080/";
  15326. const std::string http_url = "http://www.example.org:8080/";
  15327. // Separate SPDY util instance for naked and wrapped requests.
  15328. SpdyTestUtil spdy_util_wrapped;
  15329. // SPDY GET for HTTPS URL (through CONNECT tunnel)
  15330. const HostPortPair host_port_pair("www.example.org", 8080);
  15331. spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect(
  15332. nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority,
  15333. host_port_pair));
  15334. spdy::SpdySerializedFrame req1(
  15335. spdy_util_wrapped.ConstructSpdyGet(https_url.c_str(), 1, LOWEST));
  15336. spdy::SpdySerializedFrame wrapped_req1(
  15337. spdy_util_.ConstructWrappedSpdyFrame(req1, 1));
  15338. // SPDY GET for HTTP URL (through the proxy, but not the tunnel).
  15339. spdy::Http2HeaderBlock req2_block;
  15340. req2_block[spdy::kHttp2MethodHeader] = "GET";
  15341. req2_block[spdy::kHttp2AuthorityHeader] = "www.example.org:8080";
  15342. req2_block[spdy::kHttp2SchemeHeader] = "http";
  15343. req2_block[spdy::kHttp2PathHeader] = "/";
  15344. spdy::SpdySerializedFrame req2(
  15345. spdy_util_.ConstructSpdyHeaders(3, std::move(req2_block), MEDIUM, true));
  15346. MockWrite writes1[] = {
  15347. CreateMockWrite(connect, 0), CreateMockWrite(wrapped_req1, 2),
  15348. CreateMockWrite(req2, 6),
  15349. };
  15350. spdy::SpdySerializedFrame conn_resp(
  15351. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  15352. spdy::SpdySerializedFrame resp1(
  15353. spdy_util_wrapped.ConstructSpdyGetReply(nullptr, 0, 1));
  15354. spdy::SpdySerializedFrame body1(
  15355. spdy_util_wrapped.ConstructSpdyDataFrame(1, true));
  15356. spdy::SpdySerializedFrame wrapped_resp1(
  15357. spdy_util_wrapped.ConstructWrappedSpdyFrame(resp1, 1));
  15358. spdy::SpdySerializedFrame wrapped_body1(
  15359. spdy_util_wrapped.ConstructWrappedSpdyFrame(body1, 1));
  15360. spdy::SpdySerializedFrame resp2(
  15361. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3));
  15362. spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true));
  15363. MockRead reads1[] = {
  15364. CreateMockRead(conn_resp, 1),
  15365. MockRead(ASYNC, ERR_IO_PENDING, 3),
  15366. CreateMockRead(wrapped_resp1, 4),
  15367. CreateMockRead(wrapped_body1, 5),
  15368. MockRead(ASYNC, ERR_IO_PENDING, 7),
  15369. CreateMockRead(resp2, 8),
  15370. CreateMockRead(body2, 9),
  15371. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 10),
  15372. };
  15373. SequencedSocketData data1(reads1, writes1);
  15374. MockConnect connect_data1(ASYNC, OK);
  15375. data1.set_connect_data(connect_data1);
  15376. session_deps_.proxy_resolution_service =
  15377. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  15378. "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  15379. session_deps_.net_log = net::NetLog::Get();
  15380. SSLSocketDataProvider ssl1(ASYNC, OK); // to the proxy
  15381. ssl1.next_proto = kProtoHTTP2;
  15382. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  15383. SSLSocketDataProvider ssl2(ASYNC, OK); // to the server
  15384. ssl2.next_proto = kProtoHTTP2;
  15385. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  15386. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  15387. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  15388. // Start the first transaction to set up the SpdySession
  15389. HttpRequestInfo request1;
  15390. request1.method = "GET";
  15391. request1.url = GURL(https_url);
  15392. request1.load_flags = 0;
  15393. request1.traffic_annotation =
  15394. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15395. HttpNetworkTransaction trans1(LOWEST, session.get());
  15396. TestCompletionCallback callback1;
  15397. int rv = trans1.Start(&request1, callback1.callback(), NetLogWithSource());
  15398. // This pause is a hack to avoid running into https://crbug.com/497228.
  15399. data1.RunUntilPaused();
  15400. base::RunLoop().RunUntilIdle();
  15401. data1.Resume();
  15402. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  15403. EXPECT_TRUE(trans1.GetResponseInfo()->was_fetched_via_spdy);
  15404. LoadTimingInfo load_timing_info1;
  15405. EXPECT_TRUE(trans1.GetLoadTimingInfo(&load_timing_info1));
  15406. TestLoadTimingNotReusedWithPac(load_timing_info1,
  15407. CONNECT_TIMING_HAS_SSL_TIMES);
  15408. // Now, start the HTTP request.
  15409. HttpRequestInfo request2;
  15410. request2.method = "GET";
  15411. request2.url = GURL(http_url);
  15412. request2.load_flags = 0;
  15413. request2.traffic_annotation =
  15414. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15415. HttpNetworkTransaction trans2(MEDIUM, session.get());
  15416. TestCompletionCallback callback2;
  15417. rv = trans2.Start(&request2, callback2.callback(), NetLogWithSource());
  15418. // This pause is a hack to avoid running into https://crbug.com/497228.
  15419. data1.RunUntilPaused();
  15420. base::RunLoop().RunUntilIdle();
  15421. data1.Resume();
  15422. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  15423. EXPECT_TRUE(trans2.GetResponseInfo()->was_fetched_via_spdy);
  15424. LoadTimingInfo load_timing_info2;
  15425. EXPECT_TRUE(trans2.GetLoadTimingInfo(&load_timing_info2));
  15426. // The established SPDY sessions is considered reused by the HTTP request.
  15427. TestLoadTimingReusedWithPac(load_timing_info2);
  15428. // HTTP requests over a SPDY session should have a different connection
  15429. // socket_log_id than requests over a tunnel.
  15430. EXPECT_NE(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id);
  15431. }
  15432. // Test that in the case where we have a SPDY session to a SPDY proxy
  15433. // that we do not pool other origins that resolve to the same IP when
  15434. // the certificate does not match the new origin.
  15435. // http://crbug.com/134690
  15436. TEST_F(HttpNetworkTransactionTest, DoNotUseSpdySessionIfCertDoesNotMatch) {
  15437. const std::string url1 = "http://www.example.org/";
  15438. const std::string url2 = "https://news.example.org/";
  15439. const std::string ip_addr = "1.2.3.4";
  15440. // Second SpdyTestUtil instance for the second socket.
  15441. SpdyTestUtil spdy_util_secure;
  15442. // SPDY GET for HTTP URL (through SPDY proxy)
  15443. spdy::Http2HeaderBlock headers(
  15444. spdy_util_.ConstructGetHeaderBlockForProxy("http://www.example.org/"));
  15445. spdy::SpdySerializedFrame req1(
  15446. spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true));
  15447. MockWrite writes1[] = {
  15448. CreateMockWrite(req1, 0),
  15449. };
  15450. spdy::SpdySerializedFrame resp1(
  15451. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  15452. spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true));
  15453. MockRead reads1[] = {
  15454. MockRead(ASYNC, ERR_IO_PENDING, 1), CreateMockRead(resp1, 2),
  15455. CreateMockRead(body1, 3), MockRead(ASYNC, OK, 4), // EOF
  15456. };
  15457. SequencedSocketData data1(reads1, writes1);
  15458. IPAddress ip;
  15459. ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr));
  15460. IPEndPoint peer_addr = IPEndPoint(ip, 443);
  15461. MockConnect connect_data1(ASYNC, OK, peer_addr);
  15462. data1.set_connect_data(connect_data1);
  15463. // SPDY GET for HTTPS URL (direct)
  15464. spdy::SpdySerializedFrame req2(
  15465. spdy_util_secure.ConstructSpdyGet(url2.c_str(), 1, MEDIUM));
  15466. MockWrite writes2[] = {
  15467. CreateMockWrite(req2, 0),
  15468. };
  15469. spdy::SpdySerializedFrame resp2(
  15470. spdy_util_secure.ConstructSpdyGetReply(nullptr, 0, 1));
  15471. spdy::SpdySerializedFrame body2(
  15472. spdy_util_secure.ConstructSpdyDataFrame(1, true));
  15473. MockRead reads2[] = {CreateMockRead(resp2, 1), CreateMockRead(body2, 2),
  15474. MockRead(ASYNC, OK, 3)};
  15475. SequencedSocketData data2(reads2, writes2);
  15476. MockConnect connect_data2(ASYNC, OK);
  15477. data2.set_connect_data(connect_data2);
  15478. // Set up a proxy config that sends HTTP requests to a proxy, and
  15479. // all others direct.
  15480. ProxyConfig proxy_config;
  15481. proxy_config.proxy_rules().ParseFromString("http=https://proxy:443");
  15482. session_deps_.proxy_resolution_service =
  15483. std::make_unique<ConfiguredProxyResolutionService>(
  15484. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  15485. proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)),
  15486. nullptr, nullptr, /*quick_check_enabled=*/true);
  15487. SSLSocketDataProvider ssl1(ASYNC, OK); // to the proxy
  15488. ssl1.next_proto = kProtoHTTP2;
  15489. // Load a valid cert. Note, that this does not need to
  15490. // be valid for proxy because the MockSSLClientSocket does
  15491. // not actually verify it. But SpdySession will use this
  15492. // to see if it is valid for the new origin
  15493. ssl1.ssl_info.cert =
  15494. ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
  15495. ASSERT_TRUE(ssl1.ssl_info.cert);
  15496. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  15497. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  15498. SSLSocketDataProvider ssl2(ASYNC, OK); // to the server
  15499. ssl2.next_proto = kProtoHTTP2;
  15500. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  15501. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  15502. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>();
  15503. session_deps_.host_resolver->rules()->AddRule("news.example.org", ip_addr);
  15504. session_deps_.host_resolver->rules()->AddRule("proxy", ip_addr);
  15505. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  15506. // Start the first transaction to set up the SpdySession
  15507. HttpRequestInfo request1;
  15508. request1.method = "GET";
  15509. request1.url = GURL(url1);
  15510. request1.load_flags = 0;
  15511. request1.traffic_annotation =
  15512. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15513. HttpNetworkTransaction trans1(LOWEST, session.get());
  15514. TestCompletionCallback callback1;
  15515. ASSERT_EQ(ERR_IO_PENDING,
  15516. trans1.Start(&request1, callback1.callback(), NetLogWithSource()));
  15517. // This pause is a hack to avoid running into https://crbug.com/497228.
  15518. data1.RunUntilPaused();
  15519. base::RunLoop().RunUntilIdle();
  15520. data1.Resume();
  15521. EXPECT_THAT(callback1.WaitForResult(), IsOk());
  15522. EXPECT_TRUE(trans1.GetResponseInfo()->was_fetched_via_spdy);
  15523. // Now, start the HTTP request
  15524. HttpRequestInfo request2;
  15525. request2.method = "GET";
  15526. request2.url = GURL(url2);
  15527. request2.load_flags = 0;
  15528. request2.traffic_annotation =
  15529. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15530. HttpNetworkTransaction trans2(MEDIUM, session.get());
  15531. TestCompletionCallback callback2;
  15532. EXPECT_EQ(ERR_IO_PENDING,
  15533. trans2.Start(&request2, callback2.callback(), NetLogWithSource()));
  15534. base::RunLoop().RunUntilIdle();
  15535. ASSERT_TRUE(callback2.have_result());
  15536. EXPECT_THAT(callback2.WaitForResult(), IsOk());
  15537. EXPECT_TRUE(trans2.GetResponseInfo()->was_fetched_via_spdy);
  15538. }
  15539. // Test to verify that a failed socket read (due to an ERR_CONNECTION_CLOSED
  15540. // error) in SPDY session, removes the socket from pool and closes the SPDY
  15541. // session. Verify that new url's from the same HttpNetworkSession (and a new
  15542. // SpdySession) do work. http://crbug.com/224701
  15543. TEST_F(HttpNetworkTransactionTest, ErrorSocketNotConnected) {
  15544. const std::string https_url = "https://www.example.org/";
  15545. MockRead reads1[] = {
  15546. MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED, 0)
  15547. };
  15548. SequencedSocketData data1(reads1, base::span<MockWrite>());
  15549. spdy::SpdySerializedFrame req2(
  15550. spdy_util_.ConstructSpdyGet(https_url.c_str(), 1, MEDIUM));
  15551. MockWrite writes2[] = {
  15552. CreateMockWrite(req2, 0),
  15553. };
  15554. spdy::SpdySerializedFrame resp2(
  15555. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  15556. spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(1, true));
  15557. MockRead reads2[] = {
  15558. CreateMockRead(resp2, 1), CreateMockRead(body2, 2),
  15559. MockRead(ASYNC, OK, 3) // EOF
  15560. };
  15561. SequencedSocketData data2(reads2, writes2);
  15562. SSLSocketDataProvider ssl1(ASYNC, OK);
  15563. ssl1.next_proto = kProtoHTTP2;
  15564. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  15565. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  15566. SSLSocketDataProvider ssl2(ASYNC, OK);
  15567. ssl2.next_proto = kProtoHTTP2;
  15568. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  15569. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  15570. std::unique_ptr<HttpNetworkSession> session(
  15571. SpdySessionDependencies::SpdyCreateSession(&session_deps_));
  15572. // Start the first transaction to set up the SpdySession and verify that
  15573. // connection was closed.
  15574. HttpRequestInfo request1;
  15575. request1.method = "GET";
  15576. request1.url = GURL(https_url);
  15577. request1.load_flags = 0;
  15578. request1.traffic_annotation =
  15579. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15580. HttpNetworkTransaction trans1(MEDIUM, session.get());
  15581. TestCompletionCallback callback1;
  15582. EXPECT_EQ(ERR_IO_PENDING,
  15583. trans1.Start(&request1, callback1.callback(), NetLogWithSource()));
  15584. EXPECT_THAT(callback1.WaitForResult(), IsError(ERR_CONNECTION_CLOSED));
  15585. // Now, start the second request and make sure it succeeds.
  15586. HttpRequestInfo request2;
  15587. request2.method = "GET";
  15588. request2.url = GURL(https_url);
  15589. request2.load_flags = 0;
  15590. request2.traffic_annotation =
  15591. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15592. HttpNetworkTransaction trans2(MEDIUM, session.get());
  15593. TestCompletionCallback callback2;
  15594. EXPECT_EQ(ERR_IO_PENDING,
  15595. trans2.Start(&request2, callback2.callback(), NetLogWithSource()));
  15596. ASSERT_THAT(callback2.WaitForResult(), IsOk());
  15597. EXPECT_TRUE(trans2.GetResponseInfo()->was_fetched_via_spdy);
  15598. }
  15599. TEST_F(HttpNetworkTransactionTest, CloseIdleSpdySessionToOpenNewOne) {
  15600. ClientSocketPoolManager::set_max_sockets_per_group(
  15601. HttpNetworkSession::NORMAL_SOCKET_POOL, 1);
  15602. ClientSocketPoolManager::set_max_sockets_per_pool(
  15603. HttpNetworkSession::NORMAL_SOCKET_POOL, 1);
  15604. // Use two different hosts with different IPs so they don't get pooled.
  15605. session_deps_.host_resolver->rules()->AddRule("www.a.com", "10.0.0.1");
  15606. session_deps_.host_resolver->rules()->AddRule("www.b.com", "10.0.0.2");
  15607. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15608. SSLSocketDataProvider ssl1(ASYNC, OK);
  15609. ssl1.next_proto = kProtoHTTP2;
  15610. SSLSocketDataProvider ssl2(ASYNC, OK);
  15611. ssl2.next_proto = kProtoHTTP2;
  15612. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  15613. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  15614. spdy::SpdySerializedFrame host1_req(
  15615. spdy_util_.ConstructSpdyGet("https://www.a.com", 1, DEFAULT_PRIORITY));
  15616. MockWrite spdy1_writes[] = {
  15617. CreateMockWrite(host1_req, 0),
  15618. };
  15619. spdy::SpdySerializedFrame host1_resp(
  15620. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  15621. spdy::SpdySerializedFrame host1_resp_body(
  15622. spdy_util_.ConstructSpdyDataFrame(1, true));
  15623. MockRead spdy1_reads[] = {
  15624. CreateMockRead(host1_resp, 1), CreateMockRead(host1_resp_body, 2),
  15625. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3),
  15626. };
  15627. // Use a separate test instance for the separate SpdySession that will be
  15628. // created.
  15629. SpdyTestUtil spdy_util_2;
  15630. SequencedSocketData spdy1_data(spdy1_reads, spdy1_writes);
  15631. session_deps_.socket_factory->AddSocketDataProvider(&spdy1_data);
  15632. spdy::SpdySerializedFrame host2_req(
  15633. spdy_util_2.ConstructSpdyGet("https://www.b.com", 1, DEFAULT_PRIORITY));
  15634. MockWrite spdy2_writes[] = {
  15635. CreateMockWrite(host2_req, 0),
  15636. };
  15637. spdy::SpdySerializedFrame host2_resp(
  15638. spdy_util_2.ConstructSpdyGetReply(nullptr, 0, 1));
  15639. spdy::SpdySerializedFrame host2_resp_body(
  15640. spdy_util_2.ConstructSpdyDataFrame(1, true));
  15641. MockRead spdy2_reads[] = {
  15642. CreateMockRead(host2_resp, 1), CreateMockRead(host2_resp_body, 2),
  15643. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3),
  15644. };
  15645. SequencedSocketData spdy2_data(spdy2_reads, spdy2_writes);
  15646. session_deps_.socket_factory->AddSocketDataProvider(&spdy2_data);
  15647. MockWrite http_write[] = {
  15648. MockWrite("GET / HTTP/1.1\r\n"
  15649. "Host: www.a.com\r\n"
  15650. "Connection: keep-alive\r\n\r\n"),
  15651. };
  15652. MockRead http_read[] = {
  15653. MockRead("HTTP/1.1 200 OK\r\n"),
  15654. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  15655. MockRead("Content-Length: 6\r\n\r\n"),
  15656. MockRead("hello!"),
  15657. };
  15658. StaticSocketDataProvider http_data(http_read, http_write);
  15659. session_deps_.socket_factory->AddSocketDataProvider(&http_data);
  15660. HostPortPair host_port_pair_a("www.a.com", 443);
  15661. SpdySessionKey spdy_session_key_a(
  15662. host_port_pair_a, ProxyServer::Direct(), PRIVACY_MODE_DISABLED,
  15663. SpdySessionKey::IsProxySession::kFalse, SocketTag(),
  15664. NetworkIsolationKey(), SecureDnsPolicy::kAllow);
  15665. EXPECT_FALSE(
  15666. HasSpdySession(session->spdy_session_pool(), spdy_session_key_a));
  15667. TestCompletionCallback callback;
  15668. HttpRequestInfo request1;
  15669. request1.method = "GET";
  15670. request1.url = GURL("https://www.a.com/");
  15671. request1.load_flags = 0;
  15672. request1.traffic_annotation =
  15673. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15674. auto trans =
  15675. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  15676. int rv = trans->Start(&request1, callback.callback(), NetLogWithSource());
  15677. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15678. EXPECT_THAT(callback.WaitForResult(), IsOk());
  15679. const HttpResponseInfo* response = trans->GetResponseInfo();
  15680. ASSERT_TRUE(response);
  15681. ASSERT_TRUE(response->headers);
  15682. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  15683. EXPECT_TRUE(response->was_fetched_via_spdy);
  15684. EXPECT_TRUE(response->was_alpn_negotiated);
  15685. std::string response_data;
  15686. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  15687. EXPECT_EQ("hello!", response_data);
  15688. trans.reset();
  15689. EXPECT_TRUE(
  15690. HasSpdySession(session->spdy_session_pool(), spdy_session_key_a));
  15691. HostPortPair host_port_pair_b("www.b.com", 443);
  15692. SpdySessionKey spdy_session_key_b(
  15693. host_port_pair_b, ProxyServer::Direct(), PRIVACY_MODE_DISABLED,
  15694. SpdySessionKey::IsProxySession::kFalse, SocketTag(),
  15695. NetworkIsolationKey(), SecureDnsPolicy::kAllow);
  15696. EXPECT_FALSE(
  15697. HasSpdySession(session->spdy_session_pool(), spdy_session_key_b));
  15698. HttpRequestInfo request2;
  15699. request2.method = "GET";
  15700. request2.url = GURL("https://www.b.com/");
  15701. request2.load_flags = 0;
  15702. request2.traffic_annotation =
  15703. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15704. trans =
  15705. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  15706. rv = trans->Start(&request2, callback.callback(), NetLogWithSource());
  15707. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15708. EXPECT_THAT(callback.WaitForResult(), IsOk());
  15709. response = trans->GetResponseInfo();
  15710. ASSERT_TRUE(response);
  15711. ASSERT_TRUE(response->headers);
  15712. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  15713. EXPECT_TRUE(response->was_fetched_via_spdy);
  15714. EXPECT_TRUE(response->was_alpn_negotiated);
  15715. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  15716. EXPECT_EQ("hello!", response_data);
  15717. EXPECT_FALSE(
  15718. HasSpdySession(session->spdy_session_pool(), spdy_session_key_a));
  15719. EXPECT_TRUE(
  15720. HasSpdySession(session->spdy_session_pool(), spdy_session_key_b));
  15721. HostPortPair host_port_pair_a1("www.a.com", 80);
  15722. SpdySessionKey spdy_session_key_a1(
  15723. host_port_pair_a1, ProxyServer::Direct(), PRIVACY_MODE_DISABLED,
  15724. SpdySessionKey::IsProxySession::kFalse, SocketTag(),
  15725. NetworkIsolationKey(), SecureDnsPolicy::kAllow);
  15726. EXPECT_FALSE(
  15727. HasSpdySession(session->spdy_session_pool(), spdy_session_key_a1));
  15728. HttpRequestInfo request3;
  15729. request3.method = "GET";
  15730. request3.url = GURL("http://www.a.com/");
  15731. request3.load_flags = 0;
  15732. request3.traffic_annotation =
  15733. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15734. trans =
  15735. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  15736. rv = trans->Start(&request3, callback.callback(), NetLogWithSource());
  15737. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15738. EXPECT_THAT(callback.WaitForResult(), IsOk());
  15739. response = trans->GetResponseInfo();
  15740. ASSERT_TRUE(response);
  15741. ASSERT_TRUE(response->headers);
  15742. EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine());
  15743. EXPECT_FALSE(response->was_fetched_via_spdy);
  15744. EXPECT_FALSE(response->was_alpn_negotiated);
  15745. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  15746. EXPECT_EQ("hello!", response_data);
  15747. EXPECT_FALSE(
  15748. HasSpdySession(session->spdy_session_pool(), spdy_session_key_a));
  15749. EXPECT_FALSE(
  15750. HasSpdySession(session->spdy_session_pool(), spdy_session_key_b));
  15751. }
  15752. TEST_F(HttpNetworkTransactionTest, HttpSyncConnectError) {
  15753. HttpRequestInfo request;
  15754. request.method = "GET";
  15755. request.url = GURL("http://www.example.org/");
  15756. request.traffic_annotation =
  15757. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15758. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15759. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  15760. MockConnect mock_connect(SYNCHRONOUS, ERR_NAME_NOT_RESOLVED);
  15761. StaticSocketDataProvider data;
  15762. data.set_connect_data(mock_connect);
  15763. session_deps_.socket_factory->AddSocketDataProvider(&data);
  15764. TestCompletionCallback callback;
  15765. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  15766. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15767. rv = callback.WaitForResult();
  15768. EXPECT_THAT(rv, IsError(ERR_NAME_NOT_RESOLVED));
  15769. ConnectionAttempts attempts = trans.GetConnectionAttempts();
  15770. ASSERT_EQ(1u, attempts.size());
  15771. EXPECT_THAT(attempts[0].result, IsError(ERR_NAME_NOT_RESOLVED));
  15772. IPEndPoint endpoint;
  15773. EXPECT_FALSE(trans.GetRemoteEndpoint(&endpoint));
  15774. EXPECT_TRUE(endpoint.address().empty());
  15775. }
  15776. TEST_F(HttpNetworkTransactionTest, HttpAsyncConnectError) {
  15777. HttpRequestInfo request;
  15778. request.method = "GET";
  15779. request.url = GURL("http://www.example.org/");
  15780. request.traffic_annotation =
  15781. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15782. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15783. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  15784. MockConnect mock_connect(ASYNC, ERR_NAME_NOT_RESOLVED);
  15785. StaticSocketDataProvider data;
  15786. data.set_connect_data(mock_connect);
  15787. session_deps_.socket_factory->AddSocketDataProvider(&data);
  15788. TestCompletionCallback callback;
  15789. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  15790. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15791. rv = callback.WaitForResult();
  15792. EXPECT_THAT(rv, IsError(ERR_NAME_NOT_RESOLVED));
  15793. ConnectionAttempts attempts = trans.GetConnectionAttempts();
  15794. ASSERT_EQ(1u, attempts.size());
  15795. EXPECT_THAT(attempts[0].result, IsError(ERR_NAME_NOT_RESOLVED));
  15796. IPEndPoint endpoint;
  15797. EXPECT_FALSE(trans.GetRemoteEndpoint(&endpoint));
  15798. EXPECT_TRUE(endpoint.address().empty());
  15799. }
  15800. TEST_F(HttpNetworkTransactionTest, HttpSyncWriteError) {
  15801. HttpRequestInfo request;
  15802. request.method = "GET";
  15803. request.url = GURL("http://www.example.org/");
  15804. request.traffic_annotation =
  15805. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15806. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15807. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  15808. MockWrite data_writes[] = {
  15809. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  15810. };
  15811. MockRead data_reads[] = {
  15812. MockRead(SYNCHRONOUS, ERR_UNEXPECTED), // Should not be reached.
  15813. };
  15814. StaticSocketDataProvider data(data_reads, data_writes);
  15815. session_deps_.socket_factory->AddSocketDataProvider(&data);
  15816. TestCompletionCallback callback;
  15817. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  15818. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15819. rv = callback.WaitForResult();
  15820. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  15821. }
  15822. TEST_F(HttpNetworkTransactionTest, HttpAsyncWriteError) {
  15823. HttpRequestInfo request;
  15824. request.method = "GET";
  15825. request.url = GURL("http://www.example.org/");
  15826. request.traffic_annotation =
  15827. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15828. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15829. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  15830. MockWrite data_writes[] = {
  15831. MockWrite(ASYNC, ERR_CONNECTION_RESET),
  15832. };
  15833. MockRead data_reads[] = {
  15834. MockRead(SYNCHRONOUS, ERR_UNEXPECTED), // Should not be reached.
  15835. };
  15836. StaticSocketDataProvider data(data_reads, data_writes);
  15837. session_deps_.socket_factory->AddSocketDataProvider(&data);
  15838. TestCompletionCallback callback;
  15839. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  15840. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15841. rv = callback.WaitForResult();
  15842. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  15843. }
  15844. TEST_F(HttpNetworkTransactionTest, HttpSyncReadError) {
  15845. HttpRequestInfo request;
  15846. request.method = "GET";
  15847. request.url = GURL("http://www.example.org/");
  15848. request.traffic_annotation =
  15849. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15850. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15851. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  15852. MockWrite data_writes[] = {
  15853. MockWrite(
  15854. "GET / HTTP/1.1\r\n"
  15855. "Host: www.example.org\r\n"
  15856. "Connection: keep-alive\r\n\r\n"),
  15857. };
  15858. MockRead data_reads[] = {
  15859. MockRead(SYNCHRONOUS, ERR_CONNECTION_RESET),
  15860. };
  15861. StaticSocketDataProvider data(data_reads, data_writes);
  15862. session_deps_.socket_factory->AddSocketDataProvider(&data);
  15863. TestCompletionCallback callback;
  15864. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  15865. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15866. rv = callback.WaitForResult();
  15867. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  15868. }
  15869. TEST_F(HttpNetworkTransactionTest, HttpAsyncReadError) {
  15870. HttpRequestInfo request;
  15871. request.method = "GET";
  15872. request.url = GURL("http://www.example.org/");
  15873. request.traffic_annotation =
  15874. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15875. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15876. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  15877. MockWrite data_writes[] = {
  15878. MockWrite(
  15879. "GET / HTTP/1.1\r\n"
  15880. "Host: www.example.org\r\n"
  15881. "Connection: keep-alive\r\n\r\n"),
  15882. };
  15883. MockRead data_reads[] = {
  15884. MockRead(ASYNC, ERR_CONNECTION_RESET),
  15885. };
  15886. StaticSocketDataProvider data(data_reads, data_writes);
  15887. session_deps_.socket_factory->AddSocketDataProvider(&data);
  15888. TestCompletionCallback callback;
  15889. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  15890. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  15891. rv = callback.WaitForResult();
  15892. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  15893. }
  15894. // Tests that when a used socket is returned to the SSL socket pool, it's closed
  15895. // if the transport socket pool is stalled on the global socket limit.
  15896. TEST_F(HttpNetworkTransactionTest, CloseSSLSocketOnIdleForHttpRequest) {
  15897. ClientSocketPoolManager::set_max_sockets_per_group(
  15898. HttpNetworkSession::NORMAL_SOCKET_POOL, 1);
  15899. ClientSocketPoolManager::set_max_sockets_per_pool(
  15900. HttpNetworkSession::NORMAL_SOCKET_POOL, 1);
  15901. // Set up SSL request.
  15902. HttpRequestInfo ssl_request;
  15903. ssl_request.method = "GET";
  15904. ssl_request.url = GURL("https://www.example.org/");
  15905. ssl_request.traffic_annotation =
  15906. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15907. MockWrite ssl_writes[] = {
  15908. MockWrite(
  15909. "GET / HTTP/1.1\r\n"
  15910. "Host: www.example.org\r\n"
  15911. "Connection: keep-alive\r\n\r\n"),
  15912. };
  15913. MockRead ssl_reads[] = {
  15914. MockRead("HTTP/1.1 200 OK\r\n"),
  15915. MockRead("Content-Length: 11\r\n\r\n"),
  15916. MockRead("hello world"),
  15917. MockRead(SYNCHRONOUS, OK),
  15918. };
  15919. StaticSocketDataProvider ssl_data(ssl_reads, ssl_writes);
  15920. session_deps_.socket_factory->AddSocketDataProvider(&ssl_data);
  15921. SSLSocketDataProvider ssl(ASYNC, OK);
  15922. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  15923. // Set up HTTP request.
  15924. HttpRequestInfo http_request;
  15925. http_request.method = "GET";
  15926. http_request.url = GURL("http://www.example.org/");
  15927. http_request.traffic_annotation =
  15928. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15929. MockWrite http_writes[] = {
  15930. MockWrite(
  15931. "GET / HTTP/1.1\r\n"
  15932. "Host: www.example.org\r\n"
  15933. "Connection: keep-alive\r\n\r\n"),
  15934. };
  15935. MockRead http_reads[] = {
  15936. MockRead("HTTP/1.1 200 OK\r\n"),
  15937. MockRead("Content-Length: 7\r\n\r\n"),
  15938. MockRead("falafel"),
  15939. MockRead(SYNCHRONOUS, OK),
  15940. };
  15941. StaticSocketDataProvider http_data(http_reads, http_writes);
  15942. session_deps_.socket_factory->AddSocketDataProvider(&http_data);
  15943. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  15944. // Start the SSL request.
  15945. TestCompletionCallback ssl_callback;
  15946. HttpNetworkTransaction ssl_trans(DEFAULT_PRIORITY, session.get());
  15947. ASSERT_EQ(ERR_IO_PENDING,
  15948. ssl_trans.Start(&ssl_request, ssl_callback.callback(),
  15949. NetLogWithSource()));
  15950. // Start the HTTP request. Pool should stall.
  15951. TestCompletionCallback http_callback;
  15952. HttpNetworkTransaction http_trans(DEFAULT_PRIORITY, session.get());
  15953. ASSERT_EQ(ERR_IO_PENDING,
  15954. http_trans.Start(&http_request, http_callback.callback(),
  15955. NetLogWithSource()));
  15956. EXPECT_TRUE(IsTransportSocketPoolStalled(session.get()));
  15957. // Wait for response from SSL request.
  15958. ASSERT_THAT(ssl_callback.WaitForResult(), IsOk());
  15959. std::string response_data;
  15960. ASSERT_THAT(ReadTransaction(&ssl_trans, &response_data), IsOk());
  15961. EXPECT_EQ("hello world", response_data);
  15962. // The SSL socket should automatically be closed, so the HTTP request can
  15963. // start.
  15964. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  15965. ASSERT_FALSE(IsTransportSocketPoolStalled(session.get()));
  15966. // The HTTP request can now complete.
  15967. ASSERT_THAT(http_callback.WaitForResult(), IsOk());
  15968. ASSERT_THAT(ReadTransaction(&http_trans, &response_data), IsOk());
  15969. EXPECT_EQ("falafel", response_data);
  15970. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  15971. }
  15972. // Tests that when a SSL connection is established but there's no corresponding
  15973. // request that needs it, the new socket is closed if the transport socket pool
  15974. // is stalled on the global socket limit.
  15975. TEST_F(HttpNetworkTransactionTest, CloseSSLSocketOnIdleForHttpRequest2) {
  15976. ClientSocketPoolManager::set_max_sockets_per_group(
  15977. HttpNetworkSession::NORMAL_SOCKET_POOL, 1);
  15978. ClientSocketPoolManager::set_max_sockets_per_pool(
  15979. HttpNetworkSession::NORMAL_SOCKET_POOL, 1);
  15980. // Set up an ssl request.
  15981. HttpRequestInfo ssl_request;
  15982. ssl_request.method = "GET";
  15983. ssl_request.url = GURL("https://www.foopy.com/");
  15984. ssl_request.traffic_annotation =
  15985. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15986. // No data will be sent on the SSL socket.
  15987. StaticSocketDataProvider ssl_data;
  15988. session_deps_.socket_factory->AddSocketDataProvider(&ssl_data);
  15989. SSLSocketDataProvider ssl(ASYNC, OK);
  15990. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  15991. // Set up HTTP request.
  15992. HttpRequestInfo http_request;
  15993. http_request.method = "GET";
  15994. http_request.url = GURL("http://www.example.org/");
  15995. http_request.traffic_annotation =
  15996. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  15997. MockWrite http_writes[] = {
  15998. MockWrite(
  15999. "GET / HTTP/1.1\r\n"
  16000. "Host: www.example.org\r\n"
  16001. "Connection: keep-alive\r\n\r\n"),
  16002. };
  16003. MockRead http_reads[] = {
  16004. MockRead("HTTP/1.1 200 OK\r\n"),
  16005. MockRead("Content-Length: 7\r\n\r\n"),
  16006. MockRead("falafel"),
  16007. MockRead(SYNCHRONOUS, OK),
  16008. };
  16009. StaticSocketDataProvider http_data(http_reads, http_writes);
  16010. session_deps_.socket_factory->AddSocketDataProvider(&http_data);
  16011. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16012. // Preconnect an SSL socket. A preconnect is needed because connect jobs are
  16013. // cancelled when a normal transaction is cancelled.
  16014. HttpStreamFactory* http_stream_factory = session->http_stream_factory();
  16015. http_stream_factory->PreconnectStreams(1, ssl_request);
  16016. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get()));
  16017. // Start the HTTP request. Pool should stall.
  16018. TestCompletionCallback http_callback;
  16019. HttpNetworkTransaction http_trans(DEFAULT_PRIORITY, session.get());
  16020. ASSERT_EQ(ERR_IO_PENDING,
  16021. http_trans.Start(&http_request, http_callback.callback(),
  16022. NetLogWithSource()));
  16023. EXPECT_TRUE(IsTransportSocketPoolStalled(session.get()));
  16024. // The SSL connection will automatically be closed once the connection is
  16025. // established, to let the HTTP request start.
  16026. ASSERT_THAT(http_callback.WaitForResult(), IsOk());
  16027. std::string response_data;
  16028. ASSERT_THAT(ReadTransaction(&http_trans, &response_data), IsOk());
  16029. EXPECT_EQ("falafel", response_data);
  16030. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get()));
  16031. }
  16032. TEST_F(HttpNetworkTransactionTest, PostReadsErrorResponseAfterReset) {
  16033. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16034. element_readers.push_back(
  16035. std::make_unique<UploadBytesElementReader>("foo", 3));
  16036. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16037. HttpRequestInfo request;
  16038. request.method = "POST";
  16039. request.url = GURL("http://www.foo.com/");
  16040. request.upload_data_stream = &upload_data_stream;
  16041. request.traffic_annotation =
  16042. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16043. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16044. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16045. // Send headers successfully, but get an error while sending the body.
  16046. MockWrite data_writes[] = {
  16047. MockWrite("POST / HTTP/1.1\r\n"
  16048. "Host: www.foo.com\r\n"
  16049. "Connection: keep-alive\r\n"
  16050. "Content-Length: 3\r\n\r\n"),
  16051. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16052. };
  16053. MockRead data_reads[] = {
  16054. MockRead("HTTP/1.0 400 Not OK\r\n\r\n"),
  16055. MockRead("hello world"),
  16056. MockRead(SYNCHRONOUS, OK),
  16057. };
  16058. StaticSocketDataProvider data(data_reads, data_writes);
  16059. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16060. TestCompletionCallback callback;
  16061. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16062. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16063. rv = callback.WaitForResult();
  16064. EXPECT_THAT(rv, IsOk());
  16065. const HttpResponseInfo* response = trans.GetResponseInfo();
  16066. ASSERT_TRUE(response);
  16067. EXPECT_TRUE(response->headers);
  16068. EXPECT_EQ("HTTP/1.0 400 Not OK", response->headers->GetStatusLine());
  16069. std::string response_data;
  16070. rv = ReadTransaction(&trans, &response_data);
  16071. EXPECT_THAT(rv, IsOk());
  16072. EXPECT_EQ("hello world", response_data);
  16073. }
  16074. // This test makes sure the retry logic doesn't trigger when reading an error
  16075. // response from a server that rejected a POST with a CONNECTION_RESET.
  16076. TEST_F(HttpNetworkTransactionTest,
  16077. PostReadsErrorResponseAfterResetOnReusedSocket) {
  16078. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16079. MockWrite data_writes[] = {
  16080. MockWrite("GET / HTTP/1.1\r\n"
  16081. "Host: www.foo.com\r\n"
  16082. "Connection: keep-alive\r\n\r\n"),
  16083. MockWrite("POST / HTTP/1.1\r\n"
  16084. "Host: www.foo.com\r\n"
  16085. "Connection: keep-alive\r\n"
  16086. "Content-Length: 3\r\n\r\n"),
  16087. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16088. };
  16089. MockRead data_reads[] = {
  16090. MockRead("HTTP/1.1 200 Peachy\r\n"
  16091. "Content-Length: 14\r\n\r\n"),
  16092. MockRead("first response"),
  16093. MockRead("HTTP/1.1 400 Not OK\r\n"
  16094. "Content-Length: 15\r\n\r\n"),
  16095. MockRead("second response"),
  16096. MockRead(SYNCHRONOUS, OK),
  16097. };
  16098. StaticSocketDataProvider data(data_reads, data_writes);
  16099. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16100. TestCompletionCallback callback;
  16101. HttpRequestInfo request1;
  16102. request1.method = "GET";
  16103. request1.url = GURL("http://www.foo.com/");
  16104. request1.load_flags = 0;
  16105. request1.traffic_annotation =
  16106. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16107. auto trans1 =
  16108. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  16109. int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  16110. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16111. rv = callback.WaitForResult();
  16112. EXPECT_THAT(rv, IsOk());
  16113. const HttpResponseInfo* response1 = trans1->GetResponseInfo();
  16114. ASSERT_TRUE(response1);
  16115. EXPECT_TRUE(response1->headers);
  16116. EXPECT_EQ("HTTP/1.1 200 Peachy", response1->headers->GetStatusLine());
  16117. std::string response_data1;
  16118. rv = ReadTransaction(trans1.get(), &response_data1);
  16119. EXPECT_THAT(rv, IsOk());
  16120. EXPECT_EQ("first response", response_data1);
  16121. // Delete the transaction to release the socket back into the socket pool.
  16122. trans1.reset();
  16123. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16124. element_readers.push_back(
  16125. std::make_unique<UploadBytesElementReader>("foo", 3));
  16126. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16127. HttpRequestInfo request2;
  16128. request2.method = "POST";
  16129. request2.url = GURL("http://www.foo.com/");
  16130. request2.upload_data_stream = &upload_data_stream;
  16131. request2.load_flags = 0;
  16132. request2.traffic_annotation =
  16133. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16134. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get());
  16135. rv = trans2.Start(&request2, callback.callback(), NetLogWithSource());
  16136. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16137. rv = callback.WaitForResult();
  16138. EXPECT_THAT(rv, IsOk());
  16139. const HttpResponseInfo* response2 = trans2.GetResponseInfo();
  16140. ASSERT_TRUE(response2);
  16141. EXPECT_TRUE(response2->headers);
  16142. EXPECT_EQ("HTTP/1.1 400 Not OK", response2->headers->GetStatusLine());
  16143. std::string response_data2;
  16144. rv = ReadTransaction(&trans2, &response_data2);
  16145. EXPECT_THAT(rv, IsOk());
  16146. EXPECT_EQ("second response", response_data2);
  16147. }
  16148. TEST_F(HttpNetworkTransactionTest,
  16149. PostReadsErrorResponseAfterResetPartialBodySent) {
  16150. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16151. element_readers.push_back(
  16152. std::make_unique<UploadBytesElementReader>("foo", 3));
  16153. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16154. HttpRequestInfo request;
  16155. request.method = "POST";
  16156. request.url = GURL("http://www.foo.com/");
  16157. request.upload_data_stream = &upload_data_stream;
  16158. request.traffic_annotation =
  16159. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16160. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16161. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16162. // Send headers successfully, but get an error while sending the body.
  16163. MockWrite data_writes[] = {
  16164. MockWrite("POST / HTTP/1.1\r\n"
  16165. "Host: www.foo.com\r\n"
  16166. "Connection: keep-alive\r\n"
  16167. "Content-Length: 3\r\n\r\n"
  16168. "fo"),
  16169. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16170. };
  16171. MockRead data_reads[] = {
  16172. MockRead("HTTP/1.0 400 Not OK\r\n\r\n"),
  16173. MockRead("hello world"),
  16174. MockRead(SYNCHRONOUS, OK),
  16175. };
  16176. StaticSocketDataProvider data(data_reads, data_writes);
  16177. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16178. TestCompletionCallback callback;
  16179. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16180. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16181. rv = callback.WaitForResult();
  16182. EXPECT_THAT(rv, IsOk());
  16183. const HttpResponseInfo* response = trans.GetResponseInfo();
  16184. ASSERT_TRUE(response);
  16185. EXPECT_TRUE(response->headers);
  16186. EXPECT_EQ("HTTP/1.0 400 Not OK", response->headers->GetStatusLine());
  16187. std::string response_data;
  16188. rv = ReadTransaction(&trans, &response_data);
  16189. EXPECT_THAT(rv, IsOk());
  16190. EXPECT_EQ("hello world", response_data);
  16191. }
  16192. // This tests the more common case than the previous test, where headers and
  16193. // body are not merged into a single request.
  16194. TEST_F(HttpNetworkTransactionTest, ChunkedPostReadsErrorResponseAfterReset) {
  16195. ChunkedUploadDataStream upload_data_stream(0);
  16196. HttpRequestInfo request;
  16197. request.method = "POST";
  16198. request.url = GURL("http://www.foo.com/");
  16199. request.upload_data_stream = &upload_data_stream;
  16200. request.traffic_annotation =
  16201. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16202. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16203. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16204. // Send headers successfully, but get an error while sending the body.
  16205. MockWrite data_writes[] = {
  16206. MockWrite("POST / HTTP/1.1\r\n"
  16207. "Host: www.foo.com\r\n"
  16208. "Connection: keep-alive\r\n"
  16209. "Transfer-Encoding: chunked\r\n\r\n"),
  16210. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16211. };
  16212. MockRead data_reads[] = {
  16213. MockRead("HTTP/1.0 400 Not OK\r\n\r\n"),
  16214. MockRead("hello world"),
  16215. MockRead(SYNCHRONOUS, OK),
  16216. };
  16217. StaticSocketDataProvider data(data_reads, data_writes);
  16218. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16219. TestCompletionCallback callback;
  16220. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16221. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16222. // Make sure the headers are sent before adding a chunk. This ensures that
  16223. // they can't be merged with the body in a single send. Not currently
  16224. // necessary since a chunked body is never merged with headers, but this makes
  16225. // the test more future proof.
  16226. base::RunLoop().RunUntilIdle();
  16227. upload_data_stream.AppendData("last chunk", 10, true);
  16228. rv = callback.WaitForResult();
  16229. EXPECT_THAT(rv, IsOk());
  16230. const HttpResponseInfo* response = trans.GetResponseInfo();
  16231. ASSERT_TRUE(response);
  16232. EXPECT_TRUE(response->headers);
  16233. EXPECT_EQ("HTTP/1.0 400 Not OK", response->headers->GetStatusLine());
  16234. std::string response_data;
  16235. rv = ReadTransaction(&trans, &response_data);
  16236. EXPECT_THAT(rv, IsOk());
  16237. EXPECT_EQ("hello world", response_data);
  16238. }
  16239. TEST_F(HttpNetworkTransactionTest, PostReadsErrorResponseAfterResetAnd100) {
  16240. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16241. element_readers.push_back(
  16242. std::make_unique<UploadBytesElementReader>("foo", 3));
  16243. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16244. HttpRequestInfo request;
  16245. request.method = "POST";
  16246. request.url = GURL("http://www.foo.com/");
  16247. request.upload_data_stream = &upload_data_stream;
  16248. request.traffic_annotation =
  16249. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16250. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16251. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16252. MockWrite data_writes[] = {
  16253. MockWrite("POST / HTTP/1.1\r\n"
  16254. "Host: www.foo.com\r\n"
  16255. "Connection: keep-alive\r\n"
  16256. "Content-Length: 3\r\n\r\n"),
  16257. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16258. };
  16259. MockRead data_reads[] = {
  16260. MockRead("HTTP/1.0 100 Continue\r\n\r\n"),
  16261. MockRead("HTTP/1.0 400 Not OK\r\n\r\n"),
  16262. MockRead("hello world"),
  16263. MockRead(SYNCHRONOUS, OK),
  16264. };
  16265. StaticSocketDataProvider data(data_reads, data_writes);
  16266. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16267. TestCompletionCallback callback;
  16268. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16269. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16270. rv = callback.WaitForResult();
  16271. EXPECT_THAT(rv, IsOk());
  16272. const HttpResponseInfo* response = trans.GetResponseInfo();
  16273. ASSERT_TRUE(response);
  16274. EXPECT_TRUE(response->headers);
  16275. EXPECT_EQ("HTTP/1.0 400 Not OK", response->headers->GetStatusLine());
  16276. std::string response_data;
  16277. rv = ReadTransaction(&trans, &response_data);
  16278. EXPECT_THAT(rv, IsOk());
  16279. EXPECT_EQ("hello world", response_data);
  16280. }
  16281. TEST_F(HttpNetworkTransactionTest, PostIgnoresNonErrorResponseAfterReset) {
  16282. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16283. element_readers.push_back(
  16284. std::make_unique<UploadBytesElementReader>("foo", 3));
  16285. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16286. HttpRequestInfo request;
  16287. request.method = "POST";
  16288. request.url = GURL("http://www.foo.com/");
  16289. request.upload_data_stream = &upload_data_stream;
  16290. request.traffic_annotation =
  16291. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16292. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16293. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16294. // Send headers successfully, but get an error while sending the body.
  16295. MockWrite data_writes[] = {
  16296. MockWrite("POST / HTTP/1.1\r\n"
  16297. "Host: www.foo.com\r\n"
  16298. "Connection: keep-alive\r\n"
  16299. "Content-Length: 3\r\n\r\n"),
  16300. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16301. };
  16302. MockRead data_reads[] = {
  16303. MockRead("HTTP/1.0 200 Just Dandy\r\n\r\n"),
  16304. MockRead("hello world"),
  16305. MockRead(SYNCHRONOUS, OK),
  16306. };
  16307. StaticSocketDataProvider data(data_reads, data_writes);
  16308. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16309. TestCompletionCallback callback;
  16310. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16311. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16312. rv = callback.WaitForResult();
  16313. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  16314. }
  16315. TEST_F(HttpNetworkTransactionTest,
  16316. PostIgnoresNonErrorResponseAfterResetAnd100) {
  16317. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16318. element_readers.push_back(
  16319. std::make_unique<UploadBytesElementReader>("foo", 3));
  16320. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16321. HttpRequestInfo request;
  16322. request.method = "POST";
  16323. request.url = GURL("http://www.foo.com/");
  16324. request.upload_data_stream = &upload_data_stream;
  16325. request.traffic_annotation =
  16326. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16327. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16328. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16329. // Send headers successfully, but get an error while sending the body.
  16330. MockWrite data_writes[] = {
  16331. MockWrite("POST / HTTP/1.1\r\n"
  16332. "Host: www.foo.com\r\n"
  16333. "Connection: keep-alive\r\n"
  16334. "Content-Length: 3\r\n\r\n"),
  16335. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16336. };
  16337. MockRead data_reads[] = {
  16338. MockRead("HTTP/1.0 100 Continue\r\n\r\n"),
  16339. MockRead("HTTP/1.0 302 Redirect\r\n"),
  16340. MockRead("Location: http://somewhere-else.com/\r\n"),
  16341. MockRead("Content-Length: 0\r\n\r\n"),
  16342. MockRead(SYNCHRONOUS, OK),
  16343. };
  16344. StaticSocketDataProvider data(data_reads, data_writes);
  16345. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16346. TestCompletionCallback callback;
  16347. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16348. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16349. rv = callback.WaitForResult();
  16350. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  16351. }
  16352. TEST_F(HttpNetworkTransactionTest, PostIgnoresHttp09ResponseAfterReset) {
  16353. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16354. element_readers.push_back(
  16355. std::make_unique<UploadBytesElementReader>("foo", 3));
  16356. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16357. HttpRequestInfo request;
  16358. request.method = "POST";
  16359. request.url = GURL("http://www.foo.com/");
  16360. request.upload_data_stream = &upload_data_stream;
  16361. request.traffic_annotation =
  16362. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16363. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16364. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16365. // Send headers successfully, but get an error while sending the body.
  16366. MockWrite data_writes[] = {
  16367. MockWrite("POST / HTTP/1.1\r\n"
  16368. "Host: www.foo.com\r\n"
  16369. "Connection: keep-alive\r\n"
  16370. "Content-Length: 3\r\n\r\n"),
  16371. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16372. };
  16373. MockRead data_reads[] = {
  16374. MockRead("HTTP 0.9 rocks!"),
  16375. MockRead(SYNCHRONOUS, OK),
  16376. };
  16377. StaticSocketDataProvider data(data_reads, data_writes);
  16378. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16379. TestCompletionCallback callback;
  16380. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16381. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16382. rv = callback.WaitForResult();
  16383. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  16384. }
  16385. TEST_F(HttpNetworkTransactionTest, PostIgnoresPartial400HeadersAfterReset) {
  16386. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16387. element_readers.push_back(
  16388. std::make_unique<UploadBytesElementReader>("foo", 3));
  16389. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16390. HttpRequestInfo request;
  16391. request.method = "POST";
  16392. request.url = GURL("http://www.foo.com/");
  16393. request.upload_data_stream = &upload_data_stream;
  16394. request.traffic_annotation =
  16395. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16396. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16397. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16398. // Send headers successfully, but get an error while sending the body.
  16399. MockWrite data_writes[] = {
  16400. MockWrite("POST / HTTP/1.1\r\n"
  16401. "Host: www.foo.com\r\n"
  16402. "Connection: keep-alive\r\n"
  16403. "Content-Length: 3\r\n\r\n"),
  16404. MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET),
  16405. };
  16406. MockRead data_reads[] = {
  16407. MockRead("HTTP/1.0 400 Not a Full Response\r\n"),
  16408. MockRead(SYNCHRONOUS, OK),
  16409. };
  16410. StaticSocketDataProvider data(data_reads, data_writes);
  16411. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16412. TestCompletionCallback callback;
  16413. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16414. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16415. rv = callback.WaitForResult();
  16416. EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
  16417. }
  16418. #if BUILDFLAG(ENABLE_WEBSOCKETS)
  16419. namespace {
  16420. void AddWebSocketHeaders(HttpRequestHeaders* headers) {
  16421. headers->SetHeader("Connection", "Upgrade");
  16422. headers->SetHeader("Upgrade", "websocket");
  16423. headers->SetHeader("Origin", "http://www.example.org");
  16424. headers->SetHeader("Sec-WebSocket-Version", "13");
  16425. }
  16426. } // namespace
  16427. TEST_F(HttpNetworkTransactionTest, CreateWebSocketHandshakeStream) {
  16428. for (bool secure : {true, false}) {
  16429. MockWrite data_writes[] = {
  16430. MockWrite("GET / HTTP/1.1\r\n"
  16431. "Host: www.example.org\r\n"
  16432. "Connection: Upgrade\r\n"
  16433. "Upgrade: websocket\r\n"
  16434. "Origin: http://www.example.org\r\n"
  16435. "Sec-WebSocket-Version: 13\r\n"
  16436. "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
  16437. "Sec-WebSocket-Extensions: permessage-deflate; "
  16438. "client_max_window_bits\r\n\r\n")};
  16439. MockRead data_reads[] = {
  16440. MockRead("HTTP/1.1 101 Switching Protocols\r\n"
  16441. "Upgrade: websocket\r\n"
  16442. "Connection: Upgrade\r\n"
  16443. "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")};
  16444. StaticSocketDataProvider data(data_reads, data_writes);
  16445. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16446. SSLSocketDataProvider ssl(ASYNC, OK);
  16447. if (secure)
  16448. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  16449. HttpRequestInfo request;
  16450. request.method = "GET";
  16451. request.url =
  16452. GURL(secure ? "ws://www.example.org/" : "wss://www.example.org/");
  16453. AddWebSocketHeaders(&request.extra_headers);
  16454. request.traffic_annotation =
  16455. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16456. TestWebSocketHandshakeStreamCreateHelper
  16457. websocket_handshake_stream_create_helper;
  16458. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16459. HttpNetworkTransaction trans(LOW, session.get());
  16460. trans.SetWebSocketHandshakeStreamCreateHelper(
  16461. &websocket_handshake_stream_create_helper);
  16462. TestCompletionCallback callback;
  16463. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16464. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16465. const HttpStreamRequest* stream_request = trans.stream_request_.get();
  16466. ASSERT_TRUE(stream_request);
  16467. EXPECT_EQ(&websocket_handshake_stream_create_helper,
  16468. stream_request->websocket_handshake_stream_create_helper());
  16469. rv = callback.WaitForResult();
  16470. EXPECT_THAT(rv, IsOk());
  16471. EXPECT_TRUE(data.AllReadDataConsumed());
  16472. EXPECT_TRUE(data.AllWriteDataConsumed());
  16473. }
  16474. }
  16475. // Verify that proxy headers are not sent to the destination server when
  16476. // establishing a tunnel for a secure WebSocket connection.
  16477. TEST_F(HttpNetworkTransactionTest, ProxyHeadersNotSentOverWssTunnel) {
  16478. HttpRequestInfo request;
  16479. request.method = "GET";
  16480. request.url = GURL("wss://www.example.org/");
  16481. request.traffic_annotation =
  16482. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16483. AddWebSocketHeaders(&request.extra_headers);
  16484. // Configure against proxy server "myproxy:70".
  16485. session_deps_.proxy_resolution_service =
  16486. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  16487. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  16488. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16489. // Since a proxy is configured, try to establish a tunnel.
  16490. MockWrite data_writes[] = {
  16491. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  16492. "Host: www.example.org:443\r\n"
  16493. "Proxy-Connection: keep-alive\r\n\r\n"),
  16494. // After calling trans->RestartWithAuth(), this is the request we should
  16495. // be issuing -- the final header line contains the credentials.
  16496. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  16497. "Host: www.example.org:443\r\n"
  16498. "Proxy-Connection: keep-alive\r\n"
  16499. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  16500. MockWrite("GET / HTTP/1.1\r\n"
  16501. "Host: www.example.org\r\n"
  16502. "Connection: Upgrade\r\n"
  16503. "Upgrade: websocket\r\n"
  16504. "Origin: http://www.example.org\r\n"
  16505. "Sec-WebSocket-Version: 13\r\n"
  16506. "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
  16507. "Sec-WebSocket-Extensions: permessage-deflate; "
  16508. "client_max_window_bits\r\n\r\n")};
  16509. // The proxy responds to the connect with a 407, using a persistent
  16510. // connection.
  16511. MockRead data_reads[] = {
  16512. // No credentials.
  16513. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"
  16514. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  16515. "Content-Length: 0\r\n"
  16516. "Proxy-Connection: keep-alive\r\n\r\n"),
  16517. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  16518. MockRead("HTTP/1.1 101 Switching Protocols\r\n"
  16519. "Upgrade: websocket\r\n"
  16520. "Connection: Upgrade\r\n"
  16521. "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")};
  16522. StaticSocketDataProvider data(data_reads, data_writes);
  16523. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16524. SSLSocketDataProvider ssl(ASYNC, OK);
  16525. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  16526. TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper;
  16527. auto trans =
  16528. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  16529. trans->SetWebSocketHandshakeStreamCreateHelper(
  16530. &websocket_stream_create_helper);
  16531. {
  16532. TestCompletionCallback callback;
  16533. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  16534. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16535. rv = callback.WaitForResult();
  16536. EXPECT_THAT(rv, IsOk());
  16537. }
  16538. const HttpResponseInfo* response = trans->GetResponseInfo();
  16539. ASSERT_TRUE(response);
  16540. ASSERT_TRUE(response->headers);
  16541. EXPECT_EQ(407, response->headers->response_code());
  16542. {
  16543. TestCompletionCallback callback;
  16544. int rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar),
  16545. callback.callback());
  16546. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16547. rv = callback.WaitForResult();
  16548. EXPECT_THAT(rv, IsOk());
  16549. }
  16550. response = trans->GetResponseInfo();
  16551. ASSERT_TRUE(response);
  16552. ASSERT_TRUE(response->headers);
  16553. EXPECT_EQ(101, response->headers->response_code());
  16554. trans.reset();
  16555. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  16556. }
  16557. // Verify that proxy headers are not sent to the destination server when
  16558. // establishing a tunnel for an insecure WebSocket connection.
  16559. // This requires the authentication info to be injected into the auth cache
  16560. // due to crbug.com/395064
  16561. // TODO(ricea): Change to use a 407 response once issue 395064 is fixed.
  16562. TEST_F(HttpNetworkTransactionTest, ProxyHeadersNotSentOverWsTunnel) {
  16563. HttpRequestInfo request;
  16564. request.method = "GET";
  16565. request.url = GURL("ws://www.example.org/");
  16566. request.traffic_annotation =
  16567. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16568. AddWebSocketHeaders(&request.extra_headers);
  16569. // Configure against proxy server "myproxy:70".
  16570. session_deps_.proxy_resolution_service =
  16571. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  16572. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  16573. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16574. MockWrite data_writes[] = {
  16575. // Try to establish a tunnel for the WebSocket connection, with
  16576. // credentials. Because WebSockets have a separate set of socket pools,
  16577. // they cannot and will not use the same TCP/IP connection as the
  16578. // preflight HTTP request.
  16579. MockWrite("CONNECT www.example.org:80 HTTP/1.1\r\n"
  16580. "Host: www.example.org:80\r\n"
  16581. "Proxy-Connection: keep-alive\r\n"
  16582. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  16583. MockWrite("GET / HTTP/1.1\r\n"
  16584. "Host: www.example.org\r\n"
  16585. "Connection: Upgrade\r\n"
  16586. "Upgrade: websocket\r\n"
  16587. "Origin: http://www.example.org\r\n"
  16588. "Sec-WebSocket-Version: 13\r\n"
  16589. "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
  16590. "Sec-WebSocket-Extensions: permessage-deflate; "
  16591. "client_max_window_bits\r\n\r\n")};
  16592. MockRead data_reads[] = {
  16593. // HTTP CONNECT with credentials.
  16594. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  16595. // WebSocket connection established inside tunnel.
  16596. MockRead("HTTP/1.1 101 Switching Protocols\r\n"
  16597. "Upgrade: websocket\r\n"
  16598. "Connection: Upgrade\r\n"
  16599. "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")};
  16600. StaticSocketDataProvider data(data_reads, data_writes);
  16601. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16602. session->http_auth_cache()->Add(
  16603. url::SchemeHostPort(GURL("http://myproxy:70/")), HttpAuth::AUTH_PROXY,
  16604. "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, NetworkIsolationKey(),
  16605. "Basic realm=MyRealm1", AuthCredentials(kFoo, kBar), "/");
  16606. TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper;
  16607. auto trans =
  16608. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  16609. trans->SetWebSocketHandshakeStreamCreateHelper(
  16610. &websocket_stream_create_helper);
  16611. TestCompletionCallback callback;
  16612. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  16613. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16614. rv = callback.WaitForResult();
  16615. EXPECT_THAT(rv, IsOk());
  16616. const HttpResponseInfo* response = trans->GetResponseInfo();
  16617. ASSERT_TRUE(response);
  16618. ASSERT_TRUE(response->headers);
  16619. EXPECT_EQ(101, response->headers->response_code());
  16620. trans.reset();
  16621. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  16622. }
  16623. // WebSockets over QUIC is not supported, including over QUIC proxies.
  16624. TEST_F(HttpNetworkTransactionTest, WebSocketNotSentOverQuicProxy) {
  16625. for (bool secure : {true, false}) {
  16626. SCOPED_TRACE(secure);
  16627. session_deps_.proxy_resolution_service =
  16628. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  16629. "QUIC myproxy.org:443", TRAFFIC_ANNOTATION_FOR_TESTS);
  16630. session_deps_.enable_quic = true;
  16631. HttpRequestInfo request;
  16632. request.url =
  16633. GURL(secure ? "ws://www.example.org/" : "wss://www.example.org/");
  16634. AddWebSocketHeaders(&request.extra_headers);
  16635. request.traffic_annotation =
  16636. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16637. TestWebSocketHandshakeStreamCreateHelper
  16638. websocket_handshake_stream_create_helper;
  16639. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16640. HttpNetworkTransaction trans(LOW, session.get());
  16641. trans.SetWebSocketHandshakeStreamCreateHelper(
  16642. &websocket_handshake_stream_create_helper);
  16643. TestCompletionCallback callback;
  16644. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16645. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16646. rv = callback.WaitForResult();
  16647. EXPECT_THAT(rv, IsError(ERR_NO_SUPPORTED_PROXIES));
  16648. }
  16649. }
  16650. #endif // BUILDFLAG(ENABLE_WEBSOCKETS)
  16651. TEST_F(HttpNetworkTransactionTest, TotalNetworkBytesPost) {
  16652. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16653. element_readers.push_back(
  16654. std::make_unique<UploadBytesElementReader>("foo", 3));
  16655. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16656. HttpRequestInfo request;
  16657. request.method = "POST";
  16658. request.url = GURL("http://www.foo.com/");
  16659. request.upload_data_stream = &upload_data_stream;
  16660. request.traffic_annotation =
  16661. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16662. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16663. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16664. MockWrite data_writes[] = {
  16665. MockWrite("POST / HTTP/1.1\r\n"
  16666. "Host: www.foo.com\r\n"
  16667. "Connection: keep-alive\r\n"
  16668. "Content-Length: 3\r\n\r\n"),
  16669. MockWrite("foo"),
  16670. };
  16671. MockRead data_reads[] = {
  16672. MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"),
  16673. MockRead(SYNCHRONOUS, OK),
  16674. };
  16675. StaticSocketDataProvider data(data_reads, data_writes);
  16676. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16677. TestCompletionCallback callback;
  16678. EXPECT_EQ(ERR_IO_PENDING,
  16679. trans.Start(&request, callback.callback(), NetLogWithSource()));
  16680. EXPECT_THAT(callback.WaitForResult(), IsOk());
  16681. std::string response_data;
  16682. EXPECT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  16683. EXPECT_EQ(CountWriteBytes(data_writes), trans.GetTotalSentBytes());
  16684. EXPECT_EQ(CountReadBytes(data_reads), trans.GetTotalReceivedBytes());
  16685. }
  16686. TEST_F(HttpNetworkTransactionTest, TotalNetworkBytesPost100Continue) {
  16687. std::vector<std::unique_ptr<UploadElementReader>> element_readers;
  16688. element_readers.push_back(
  16689. std::make_unique<UploadBytesElementReader>("foo", 3));
  16690. ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0);
  16691. HttpRequestInfo request;
  16692. request.method = "POST";
  16693. request.url = GURL("http://www.foo.com/");
  16694. request.upload_data_stream = &upload_data_stream;
  16695. request.traffic_annotation =
  16696. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16697. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16698. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16699. MockWrite data_writes[] = {
  16700. MockWrite("POST / HTTP/1.1\r\n"
  16701. "Host: www.foo.com\r\n"
  16702. "Connection: keep-alive\r\n"
  16703. "Content-Length: 3\r\n\r\n"),
  16704. MockWrite("foo"),
  16705. };
  16706. MockRead data_reads[] = {
  16707. MockRead("HTTP/1.1 100 Continue\r\n\r\n"),
  16708. MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"),
  16709. MockRead(SYNCHRONOUS, OK),
  16710. };
  16711. StaticSocketDataProvider data(data_reads, data_writes);
  16712. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16713. TestCompletionCallback callback;
  16714. EXPECT_EQ(ERR_IO_PENDING,
  16715. trans.Start(&request, callback.callback(), NetLogWithSource()));
  16716. EXPECT_THAT(callback.WaitForResult(), IsOk());
  16717. std::string response_data;
  16718. EXPECT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  16719. EXPECT_EQ(CountWriteBytes(data_writes), trans.GetTotalSentBytes());
  16720. EXPECT_EQ(CountReadBytes(data_reads), trans.GetTotalReceivedBytes());
  16721. }
  16722. TEST_F(HttpNetworkTransactionTest, TotalNetworkBytesChunkedPost) {
  16723. ChunkedUploadDataStream upload_data_stream(0);
  16724. HttpRequestInfo request;
  16725. request.method = "POST";
  16726. request.url = GURL("http://www.foo.com/");
  16727. request.upload_data_stream = &upload_data_stream;
  16728. request.traffic_annotation =
  16729. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16730. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16731. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16732. // Send headers successfully, but get an error while sending the body.
  16733. MockWrite data_writes[] = {
  16734. MockWrite("POST / HTTP/1.1\r\n"
  16735. "Host: www.foo.com\r\n"
  16736. "Connection: keep-alive\r\n"
  16737. "Transfer-Encoding: chunked\r\n\r\n"),
  16738. MockWrite("1\r\nf\r\n"), MockWrite("2\r\noo\r\n"), MockWrite("0\r\n\r\n"),
  16739. };
  16740. MockRead data_reads[] = {
  16741. MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"),
  16742. MockRead(SYNCHRONOUS, OK),
  16743. };
  16744. StaticSocketDataProvider data(data_reads, data_writes);
  16745. session_deps_.socket_factory->AddSocketDataProvider(&data);
  16746. TestCompletionCallback callback;
  16747. EXPECT_EQ(ERR_IO_PENDING,
  16748. trans.Start(&request, callback.callback(), NetLogWithSource()));
  16749. base::RunLoop().RunUntilIdle();
  16750. upload_data_stream.AppendData("f", 1, false);
  16751. base::RunLoop().RunUntilIdle();
  16752. upload_data_stream.AppendData("oo", 2, true);
  16753. EXPECT_THAT(callback.WaitForResult(), IsOk());
  16754. std::string response_data;
  16755. EXPECT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  16756. EXPECT_EQ(CountWriteBytes(data_writes), trans.GetTotalSentBytes());
  16757. EXPECT_EQ(CountReadBytes(data_reads), trans.GetTotalReceivedBytes());
  16758. }
  16759. void CheckContentEncodingMatching(SpdySessionDependencies* session_deps,
  16760. const std::string& accept_encoding,
  16761. const std::string& content_encoding,
  16762. const std::string& location,
  16763. bool should_match) {
  16764. HttpRequestInfo request;
  16765. request.method = "GET";
  16766. request.url = GURL("http://www.foo.com/");
  16767. request.extra_headers.SetHeader(HttpRequestHeaders::kAcceptEncoding,
  16768. accept_encoding);
  16769. request.traffic_annotation =
  16770. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16771. std::unique_ptr<HttpNetworkSession> session(CreateSession(session_deps));
  16772. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16773. // Send headers successfully, but get an error while sending the body.
  16774. MockWrite data_writes[] = {
  16775. MockWrite("GET / HTTP/1.1\r\n"
  16776. "Host: www.foo.com\r\n"
  16777. "Connection: keep-alive\r\n"
  16778. "Accept-Encoding: "),
  16779. MockWrite(accept_encoding.data()), MockWrite("\r\n\r\n"),
  16780. };
  16781. std::string response_code = "200 OK";
  16782. std::string extra;
  16783. if (!location.empty()) {
  16784. response_code = "301 Redirect\r\nLocation: ";
  16785. response_code.append(location);
  16786. }
  16787. MockRead data_reads[] = {
  16788. MockRead("HTTP/1.0 "),
  16789. MockRead(response_code.data()),
  16790. MockRead("\r\nContent-Encoding: "),
  16791. MockRead(content_encoding.data()),
  16792. MockRead("\r\n\r\n"),
  16793. MockRead(SYNCHRONOUS, OK),
  16794. };
  16795. StaticSocketDataProvider data(data_reads, data_writes);
  16796. session_deps->socket_factory->AddSocketDataProvider(&data);
  16797. TestCompletionCallback callback;
  16798. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16799. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16800. rv = callback.WaitForResult();
  16801. if (should_match) {
  16802. EXPECT_THAT(rv, IsOk());
  16803. } else {
  16804. EXPECT_THAT(rv, IsError(ERR_CONTENT_DECODING_FAILED));
  16805. }
  16806. }
  16807. TEST_F(HttpNetworkTransactionTest, MatchContentEncoding1) {
  16808. CheckContentEncodingMatching(&session_deps_, "gzip,sdch", "br", "", false);
  16809. }
  16810. TEST_F(HttpNetworkTransactionTest, MatchContentEncoding2) {
  16811. CheckContentEncodingMatching(&session_deps_, "identity;q=1, *;q=0", "", "",
  16812. true);
  16813. }
  16814. TEST_F(HttpNetworkTransactionTest, MatchContentEncoding3) {
  16815. CheckContentEncodingMatching(&session_deps_, "identity;q=1, *;q=0", "gzip",
  16816. "", false);
  16817. }
  16818. TEST_F(HttpNetworkTransactionTest, MatchContentEncoding4) {
  16819. CheckContentEncodingMatching(&session_deps_, "identity;q=1, *;q=0", "gzip",
  16820. "www.foo.com/other", true);
  16821. }
  16822. TEST_F(HttpNetworkTransactionTest, ProxyResolutionFailsSync) {
  16823. ProxyConfig proxy_config;
  16824. proxy_config.set_pac_url(GURL("http://fooproxyurl"));
  16825. proxy_config.set_pac_mandatory(true);
  16826. MockAsyncProxyResolver resolver;
  16827. session_deps_.proxy_resolution_service =
  16828. std::make_unique<ConfiguredProxyResolutionService>(
  16829. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  16830. proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)),
  16831. std::make_unique<FailingProxyResolverFactory>(), nullptr,
  16832. /*quick_check_enabled=*/true);
  16833. HttpRequestInfo request;
  16834. request.method = "GET";
  16835. request.url = GURL("http://www.example.org/");
  16836. request.traffic_annotation =
  16837. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16838. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16839. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16840. TestCompletionCallback callback;
  16841. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16842. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16843. EXPECT_THAT(callback.WaitForResult(),
  16844. IsError(ERR_MANDATORY_PROXY_CONFIGURATION_FAILED));
  16845. }
  16846. TEST_F(HttpNetworkTransactionTest, ProxyResolutionFailsAsync) {
  16847. ProxyConfig proxy_config;
  16848. proxy_config.set_pac_url(GURL("http://fooproxyurl"));
  16849. proxy_config.set_pac_mandatory(true);
  16850. auto proxy_resolver_factory =
  16851. std::make_unique<MockAsyncProxyResolverFactory>(false);
  16852. auto* proxy_resolver_factory_ptr = proxy_resolver_factory.get();
  16853. MockAsyncProxyResolver resolver;
  16854. session_deps_.proxy_resolution_service =
  16855. std::make_unique<ConfiguredProxyResolutionService>(
  16856. std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation(
  16857. proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)),
  16858. std::move(proxy_resolver_factory), nullptr,
  16859. /*quick_check_enabled=*/true);
  16860. HttpRequestInfo request;
  16861. request.method = "GET";
  16862. request.url = GURL("http://www.example.org/");
  16863. request.traffic_annotation =
  16864. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16865. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16866. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16867. TestCompletionCallback callback;
  16868. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16869. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16870. proxy_resolver_factory_ptr->pending_requests()[0]->CompleteNowWithForwarder(
  16871. ERR_FAILED, &resolver);
  16872. EXPECT_THAT(callback.WaitForResult(),
  16873. IsError(ERR_MANDATORY_PROXY_CONFIGURATION_FAILED));
  16874. }
  16875. TEST_F(HttpNetworkTransactionTest, NoSupportedProxies) {
  16876. session_deps_.proxy_resolution_service =
  16877. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  16878. "QUIC myproxy.org:443", TRAFFIC_ANNOTATION_FOR_TESTS);
  16879. session_deps_.enable_quic = false;
  16880. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  16881. HttpRequestInfo request;
  16882. request.method = "GET";
  16883. request.url = GURL("http://www.example.org/");
  16884. request.traffic_annotation =
  16885. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16886. TestCompletionCallback callback;
  16887. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16888. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16889. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  16890. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_NO_SUPPORTED_PROXIES));
  16891. }
  16892. //-----------------------------------------------------------------------------
  16893. // Reporting tests
  16894. #if BUILDFLAG(ENABLE_REPORTING)
  16895. class HttpNetworkTransactionReportingTest
  16896. : public HttpNetworkTransactionTest,
  16897. public ::testing::WithParamInterface<bool> {
  16898. protected:
  16899. HttpNetworkTransactionReportingTest() {
  16900. std::vector<base::Feature> required_features = {
  16901. features::kPartitionNelAndReportingByNetworkIsolationKey};
  16902. if (UseDocumentReporting()) {
  16903. required_features.push_back(features::kDocumentReporting);
  16904. }
  16905. feature_list_.InitWithFeatures(required_features, {});
  16906. }
  16907. void SetUp() override {
  16908. HttpNetworkTransactionTest::SetUp();
  16909. auto test_reporting_context = std::make_unique<TestReportingContext>(
  16910. &clock_, &tick_clock_, ReportingPolicy());
  16911. test_reporting_context_ = test_reporting_context.get();
  16912. session_deps_.reporting_service =
  16913. ReportingService::CreateForTesting(std::move(test_reporting_context));
  16914. }
  16915. TestReportingContext* reporting_context() const {
  16916. return test_reporting_context_;
  16917. }
  16918. void clear_reporting_service() {
  16919. session_deps_.reporting_service.reset();
  16920. test_reporting_context_ = nullptr;
  16921. }
  16922. // Makes an HTTPS request that should install a valid Reporting policy
  16923. // using Report-To header.
  16924. void RequestPolicy(CertStatus cert_status = 0) {
  16925. HttpRequestInfo request;
  16926. request.method = "GET";
  16927. request.url = GURL(url_);
  16928. request.traffic_annotation =
  16929. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  16930. request.network_isolation_key = kNetworkIsolationKey;
  16931. MockWrite data_writes[] = {
  16932. MockWrite("GET / HTTP/1.1\r\n"
  16933. "Host: www.example.org\r\n"
  16934. "Connection: keep-alive\r\n\r\n"),
  16935. };
  16936. MockRead reporting_header;
  16937. reporting_header = MockRead(
  16938. "Report-To: {\"group\": \"nel\", \"max_age\": 86400, "
  16939. "\"endpoints\": [{\"url\": "
  16940. "\"https://www.example.org/upload/\"}]}\r\n");
  16941. MockRead data_reads[] = {
  16942. MockRead("HTTP/1.0 200 OK\r\n"),
  16943. std::move(reporting_header),
  16944. MockRead("\r\n"),
  16945. MockRead("hello world"),
  16946. MockRead(SYNCHRONOUS, OK),
  16947. };
  16948. StaticSocketDataProvider reads(data_reads, data_writes);
  16949. session_deps_.socket_factory->AddSocketDataProvider(&reads);
  16950. SSLSocketDataProvider ssl(ASYNC, OK);
  16951. if (request.url.SchemeIsCryptographic()) {
  16952. ssl.ssl_info.cert =
  16953. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  16954. ASSERT_TRUE(ssl.ssl_info.cert);
  16955. ssl.ssl_info.cert_status = cert_status;
  16956. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  16957. }
  16958. TestCompletionCallback callback;
  16959. auto session = CreateSession(&session_deps_);
  16960. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  16961. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  16962. EXPECT_THAT(callback.GetResult(rv), IsOk());
  16963. }
  16964. protected:
  16965. bool UseDocumentReporting() const { return GetParam(); }
  16966. std::string url_ = "https://www.example.org/";
  16967. private:
  16968. base::test::ScopedFeatureList feature_list_;
  16969. raw_ptr<TestReportingContext> test_reporting_context_;
  16970. };
  16971. TEST_P(HttpNetworkTransactionReportingTest,
  16972. DontProcessReportToHeaderNoService) {
  16973. clear_reporting_service();
  16974. RequestPolicy();
  16975. // No crash.
  16976. }
  16977. TEST_P(HttpNetworkTransactionReportingTest, DontProcessReportToHeaderHttp) {
  16978. url_ = "http://www.example.org/";
  16979. RequestPolicy();
  16980. EXPECT_EQ(0u, reporting_context()->cache()->GetEndpointCount());
  16981. }
  16982. TEST_P(HttpNetworkTransactionReportingTest, ProcessReportToHeaderHttps) {
  16983. RequestPolicy();
  16984. ASSERT_EQ(1u, reporting_context()->cache()->GetEndpointCount());
  16985. const ReportingEndpoint endpoint =
  16986. reporting_context()->cache()->GetEndpointForTesting(
  16987. ReportingEndpointGroupKey(
  16988. kNetworkIsolationKey,
  16989. url::Origin::Create(GURL("https://www.example.org/")), "nel"),
  16990. GURL("https://www.example.org/upload/"));
  16991. EXPECT_TRUE(endpoint);
  16992. }
  16993. TEST_P(HttpNetworkTransactionReportingTest,
  16994. DontProcessReportToHeaderInvalidHttps) {
  16995. CertStatus cert_status = CERT_STATUS_COMMON_NAME_INVALID;
  16996. RequestPolicy(cert_status);
  16997. EXPECT_EQ(0u, reporting_context()->cache()->GetEndpointCount());
  16998. }
  16999. INSTANTIATE_TEST_SUITE_P(All,
  17000. HttpNetworkTransactionReportingTest,
  17001. ::testing::Bool());
  17002. #endif // BUILDFLAG(ENABLE_REPORTING)
  17003. //-----------------------------------------------------------------------------
  17004. // Network Error Logging tests
  17005. #if BUILDFLAG(ENABLE_REPORTING)
  17006. namespace {
  17007. const char kUserAgent[] = "Mozilla/1.0";
  17008. const char kReferrer[] = "https://www.referrer.org/";
  17009. } // namespace
  17010. class HttpNetworkTransactionNetworkErrorLoggingTest
  17011. : public HttpNetworkTransactionTest {
  17012. protected:
  17013. void SetUp() override {
  17014. HttpNetworkTransactionTest::SetUp();
  17015. auto network_error_logging_service =
  17016. std::make_unique<TestNetworkErrorLoggingService>();
  17017. test_network_error_logging_service_ = network_error_logging_service.get();
  17018. session_deps_.network_error_logging_service =
  17019. std::move(network_error_logging_service);
  17020. extra_headers_.SetHeader("User-Agent", kUserAgent);
  17021. extra_headers_.SetHeader("Referer", kReferrer);
  17022. request_.method = "GET";
  17023. request_.url = GURL(url_);
  17024. request_.network_isolation_key = kNetworkIsolationKey;
  17025. request_.extra_headers = extra_headers_;
  17026. request_.reporting_upload_depth = reporting_upload_depth_;
  17027. request_.traffic_annotation =
  17028. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  17029. }
  17030. TestNetworkErrorLoggingService* network_error_logging_service() const {
  17031. return test_network_error_logging_service_;
  17032. }
  17033. void clear_network_error_logging_service() {
  17034. session_deps_.network_error_logging_service.reset();
  17035. test_network_error_logging_service_ = nullptr;
  17036. }
  17037. // Makes an HTTPS request that should install a valid NEL policy.
  17038. void RequestPolicy(CertStatus cert_status = 0) {
  17039. std::string extra_header_string = extra_headers_.ToString();
  17040. MockWrite data_writes[] = {
  17041. MockWrite("GET / HTTP/1.1\r\n"
  17042. "Host: www.example.org\r\n"
  17043. "Connection: keep-alive\r\n"),
  17044. MockWrite(ASYNC, extra_header_string.data(),
  17045. extra_header_string.size()),
  17046. };
  17047. MockRead data_reads[] = {
  17048. MockRead("HTTP/1.0 200 OK\r\n"),
  17049. MockRead("NEL: {\"report_to\": \"nel\", \"max_age\": 86400}\r\n"),
  17050. MockRead("\r\n"),
  17051. MockRead("hello world"),
  17052. MockRead(SYNCHRONOUS, OK),
  17053. };
  17054. StaticSocketDataProvider reads(data_reads, data_writes);
  17055. session_deps_.socket_factory->AddSocketDataProvider(&reads);
  17056. SSLSocketDataProvider ssl(ASYNC, OK);
  17057. if (request_.url.SchemeIsCryptographic()) {
  17058. ssl.ssl_info.cert =
  17059. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  17060. ASSERT_TRUE(ssl.ssl_info.cert);
  17061. ssl.ssl_info.cert_status = cert_status;
  17062. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  17063. }
  17064. TestCompletionCallback callback;
  17065. auto session = CreateSession(&session_deps_);
  17066. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  17067. int rv = trans.Start(&request_, callback.callback(), NetLogWithSource());
  17068. EXPECT_THAT(callback.GetResult(rv), IsOk());
  17069. std::string response_data;
  17070. ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk());
  17071. EXPECT_EQ("hello world", response_data);
  17072. }
  17073. void CheckReport(size_t index,
  17074. int status_code,
  17075. int error_type,
  17076. IPAddress server_ip = IPAddress::IPv4Localhost()) {
  17077. ASSERT_LT(index, network_error_logging_service()->errors().size());
  17078. const NetworkErrorLoggingService::RequestDetails& error =
  17079. network_error_logging_service()->errors()[index];
  17080. EXPECT_EQ(url_, error.uri);
  17081. EXPECT_EQ(kNetworkIsolationKey, error.network_isolation_key);
  17082. EXPECT_EQ(kReferrer, error.referrer);
  17083. EXPECT_EQ(kUserAgent, error.user_agent);
  17084. EXPECT_EQ(server_ip, error.server_ip);
  17085. EXPECT_EQ("http/1.1", error.protocol);
  17086. EXPECT_EQ("GET", error.method);
  17087. EXPECT_EQ(status_code, error.status_code);
  17088. EXPECT_EQ(error_type, error.type);
  17089. EXPECT_EQ(0, error.reporting_upload_depth);
  17090. }
  17091. protected:
  17092. std::string url_ = "https://www.example.org/";
  17093. CertStatus cert_status_ = 0;
  17094. HttpRequestInfo request_;
  17095. HttpRequestHeaders extra_headers_;
  17096. int reporting_upload_depth_ = 0;
  17097. private:
  17098. raw_ptr<TestNetworkErrorLoggingService> test_network_error_logging_service_;
  17099. };
  17100. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17101. DontProcessNelHeaderNoService) {
  17102. clear_network_error_logging_service();
  17103. RequestPolicy();
  17104. // No crash.
  17105. }
  17106. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17107. DontProcessNelHeaderHttp) {
  17108. url_ = "http://www.example.org/";
  17109. request_.url = GURL(url_);
  17110. RequestPolicy();
  17111. EXPECT_EQ(0u, network_error_logging_service()->headers().size());
  17112. }
  17113. // Don't set NEL policies received on a proxied connection.
  17114. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17115. DontProcessNelHeaderProxy) {
  17116. session_deps_.proxy_resolution_service =
  17117. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  17118. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  17119. session_deps_.net_log = NetLog::Get();
  17120. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17121. HttpRequestInfo request;
  17122. request.method = "GET";
  17123. request.url = GURL("https://www.example.org/");
  17124. request.traffic_annotation =
  17125. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  17126. // Since we have proxy, should try to establish tunnel.
  17127. MockWrite data_writes1[] = {
  17128. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  17129. "Host: www.example.org:443\r\n"
  17130. "Proxy-Connection: keep-alive\r\n\r\n"),
  17131. MockWrite("GET / HTTP/1.1\r\n"
  17132. "Host: www.example.org\r\n"
  17133. "Connection: keep-alive\r\n\r\n"),
  17134. };
  17135. MockRead data_reads1[] = {
  17136. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  17137. MockRead("HTTP/1.1 200 OK\r\n"),
  17138. MockRead("NEL: {\"report_to\": \"nel\", \"max_age\": 86400}\r\n"),
  17139. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  17140. MockRead("Content-Length: 100\r\n\r\n"),
  17141. MockRead(SYNCHRONOUS, OK),
  17142. };
  17143. StaticSocketDataProvider data1(data_reads1, data_writes1);
  17144. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  17145. SSLSocketDataProvider ssl(ASYNC, OK);
  17146. ssl.ssl_info.cert =
  17147. ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem");
  17148. ASSERT_TRUE(ssl.ssl_info.cert);
  17149. ssl.ssl_info.cert_status = 0;
  17150. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  17151. TestCompletionCallback callback1;
  17152. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  17153. int rv = trans.Start(&request, callback1.callback(),
  17154. NetLogWithSource::Make(NetLogSourceType::NONE));
  17155. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  17156. rv = callback1.WaitForResult();
  17157. EXPECT_THAT(rv, IsOk());
  17158. const HttpResponseInfo* response = trans.GetResponseInfo();
  17159. ASSERT_TRUE(response);
  17160. EXPECT_EQ(200, response->headers->response_code());
  17161. EXPECT_TRUE(response->was_fetched_via_proxy);
  17162. // No NEL header was set.
  17163. EXPECT_EQ(0u, network_error_logging_service()->headers().size());
  17164. }
  17165. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, ProcessNelHeaderHttps) {
  17166. RequestPolicy();
  17167. ASSERT_EQ(1u, network_error_logging_service()->headers().size());
  17168. const auto& header = network_error_logging_service()->headers()[0];
  17169. EXPECT_EQ(kNetworkIsolationKey, header.network_isolation_key);
  17170. EXPECT_EQ(url::Origin::Create(GURL("https://www.example.org/")),
  17171. header.origin);
  17172. EXPECT_EQ(IPAddress::IPv4Localhost(), header.received_ip_address);
  17173. EXPECT_EQ("{\"report_to\": \"nel\", \"max_age\": 86400}", header.value);
  17174. }
  17175. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17176. DontProcessNelHeaderInvalidHttps) {
  17177. CertStatus cert_status = CERT_STATUS_COMMON_NAME_INVALID;
  17178. RequestPolicy(cert_status);
  17179. EXPECT_EQ(0u, network_error_logging_service()->headers().size());
  17180. }
  17181. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportSuccess) {
  17182. RequestPolicy();
  17183. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17184. CheckReport(0 /* index */, 200 /* status_code */, OK);
  17185. }
  17186. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17187. CreateReportDNSErrorAfterStartSync) {
  17188. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17189. auto trans =
  17190. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17191. session_deps_.host_resolver->set_synchronous_mode(true);
  17192. session_deps_.host_resolver->rules()->AddRule(GURL(url_).host(),
  17193. ERR_NAME_NOT_RESOLVED);
  17194. TestCompletionCallback callback;
  17195. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17196. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_NAME_NOT_RESOLVED));
  17197. trans.reset();
  17198. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17199. CheckReport(0 /* index */, 0 /* status_code */, ERR_NAME_NOT_RESOLVED,
  17200. IPAddress() /* server_ip */);
  17201. }
  17202. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17203. CreateReportDNSErrorAfterStartAsync) {
  17204. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17205. auto trans =
  17206. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17207. session_deps_.host_resolver->set_synchronous_mode(false);
  17208. session_deps_.host_resolver->rules()->AddRule(GURL(url_).host(),
  17209. ERR_NAME_NOT_RESOLVED);
  17210. TestCompletionCallback callback;
  17211. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17212. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_NAME_NOT_RESOLVED));
  17213. trans.reset();
  17214. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17215. CheckReport(0 /* index */, 0 /* status_code */, ERR_NAME_NOT_RESOLVED,
  17216. IPAddress() /* server_ip */);
  17217. }
  17218. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17219. CreateReportErrorAfterStart) {
  17220. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17221. auto trans =
  17222. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17223. MockConnect mock_connect(SYNCHRONOUS, ERR_CONNECTION_REFUSED);
  17224. StaticSocketDataProvider data;
  17225. data.set_connect_data(mock_connect);
  17226. session_deps_.socket_factory->AddSocketDataProvider(&data);
  17227. TestCompletionCallback callback;
  17228. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17229. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED));
  17230. trans.reset();
  17231. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17232. CheckReport(0 /* index */, 0 /* status_code */, ERR_CONNECTION_REFUSED,
  17233. IPAddress::IPv4Localhost() /* server_ip */);
  17234. }
  17235. // Same as above except the error is ASYNC
  17236. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17237. CreateReportErrorAfterStartAsync) {
  17238. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17239. auto trans =
  17240. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17241. MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED);
  17242. StaticSocketDataProvider data;
  17243. data.set_connect_data(mock_connect);
  17244. session_deps_.socket_factory->AddSocketDataProvider(&data);
  17245. TestCompletionCallback callback;
  17246. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17247. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED));
  17248. trans.reset();
  17249. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17250. CheckReport(0 /* index */, 0 /* status_code */, ERR_CONNECTION_REFUSED,
  17251. IPAddress::IPv4Localhost() /* server_ip */);
  17252. }
  17253. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17254. CreateReportReadBodyError) {
  17255. std::string extra_header_string = extra_headers_.ToString();
  17256. MockWrite data_writes[] = {
  17257. MockWrite("GET / HTTP/1.1\r\n"
  17258. "Host: www.example.org\r\n"
  17259. "Connection: keep-alive\r\n"),
  17260. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17261. };
  17262. MockRead data_reads[] = {
  17263. MockRead("HTTP/1.0 200 OK\r\n"),
  17264. MockRead("Content-Length: 100\r\n\r\n"), // wrong content length
  17265. MockRead("hello world"),
  17266. MockRead(SYNCHRONOUS, OK),
  17267. };
  17268. StaticSocketDataProvider reads(data_reads, data_writes);
  17269. session_deps_.socket_factory->AddSocketDataProvider(&reads);
  17270. SSLSocketDataProvider ssl(ASYNC, OK);
  17271. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  17272. // Log start time
  17273. base::TimeTicks start_time = base::TimeTicks::Now();
  17274. TestCompletionCallback callback;
  17275. auto session = CreateSession(&session_deps_);
  17276. auto trans =
  17277. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17278. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17279. EXPECT_THAT(callback.GetResult(rv), IsOk());
  17280. const HttpResponseInfo* response = trans->GetResponseInfo();
  17281. ASSERT_TRUE(response);
  17282. EXPECT_TRUE(response->headers);
  17283. EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine());
  17284. std::string response_data;
  17285. rv = ReadTransaction(trans.get(), &response_data);
  17286. EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH));
  17287. trans.reset();
  17288. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17289. CheckReport(0 /* index */, 200 /* status_code */,
  17290. ERR_CONTENT_LENGTH_MISMATCH);
  17291. const NetworkErrorLoggingService::RequestDetails& error =
  17292. network_error_logging_service()->errors()[0];
  17293. EXPECT_LE(error.elapsed_time, base::TimeTicks::Now() - start_time);
  17294. }
  17295. // Same as above except the final read is ASYNC.
  17296. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17297. CreateReportReadBodyErrorAsync) {
  17298. std::string extra_header_string = extra_headers_.ToString();
  17299. MockWrite data_writes[] = {
  17300. MockWrite("GET / HTTP/1.1\r\n"
  17301. "Host: www.example.org\r\n"
  17302. "Connection: keep-alive\r\n"),
  17303. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17304. };
  17305. MockRead data_reads[] = {
  17306. MockRead("HTTP/1.0 200 OK\r\n"),
  17307. MockRead("Content-Length: 100\r\n\r\n"), // wrong content length
  17308. MockRead("hello world"),
  17309. MockRead(ASYNC, OK),
  17310. };
  17311. StaticSocketDataProvider reads(data_reads, data_writes);
  17312. session_deps_.socket_factory->AddSocketDataProvider(&reads);
  17313. SSLSocketDataProvider ssl(ASYNC, OK);
  17314. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  17315. // Log start time
  17316. base::TimeTicks start_time = base::TimeTicks::Now();
  17317. TestCompletionCallback callback;
  17318. auto session = CreateSession(&session_deps_);
  17319. auto trans =
  17320. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17321. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17322. EXPECT_THAT(callback.GetResult(rv), IsOk());
  17323. const HttpResponseInfo* response = trans->GetResponseInfo();
  17324. ASSERT_TRUE(response);
  17325. EXPECT_TRUE(response->headers);
  17326. EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine());
  17327. std::string response_data;
  17328. rv = ReadTransaction(trans.get(), &response_data);
  17329. EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH));
  17330. trans.reset();
  17331. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17332. CheckReport(0 /* index */, 200 /* status_code */,
  17333. ERR_CONTENT_LENGTH_MISMATCH);
  17334. const NetworkErrorLoggingService::RequestDetails& error =
  17335. network_error_logging_service()->errors()[0];
  17336. EXPECT_LE(error.elapsed_time, base::TimeTicks::Now() - start_time);
  17337. }
  17338. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17339. CreateReportRestartWithAuth) {
  17340. std::string extra_header_string = extra_headers_.ToString();
  17341. static const base::TimeDelta kSleepDuration = base::Milliseconds(10);
  17342. MockWrite data_writes1[] = {
  17343. MockWrite("GET / HTTP/1.1\r\n"
  17344. "Host: www.example.org\r\n"
  17345. "Connection: keep-alive\r\n"),
  17346. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17347. };
  17348. MockRead data_reads1[] = {
  17349. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  17350. // Give a couple authenticate options (only the middle one is actually
  17351. // supported).
  17352. MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed.
  17353. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  17354. MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"),
  17355. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  17356. // Large content-length -- won't matter, as connection will be reset.
  17357. MockRead("Content-Length: 10000\r\n\r\n"),
  17358. MockRead(SYNCHRONOUS, ERR_FAILED),
  17359. };
  17360. // After calling trans->RestartWithAuth(), this is the request we should
  17361. // be issuing -- the final header line contains the credentials.
  17362. MockWrite data_writes2[] = {
  17363. MockWrite("GET / HTTP/1.1\r\n"
  17364. "Host: www.example.org\r\n"
  17365. "Connection: keep-alive\r\n"
  17366. "Authorization: Basic Zm9vOmJhcg==\r\n"),
  17367. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17368. };
  17369. // Lastly, the server responds with the actual content.
  17370. MockRead data_reads2[] = {
  17371. MockRead("HTTP/1.0 200 OK\r\n\r\n"),
  17372. MockRead("hello world"),
  17373. MockRead(SYNCHRONOUS, OK),
  17374. };
  17375. StaticSocketDataProvider data1(data_reads1, data_writes1);
  17376. StaticSocketDataProvider data2(data_reads2, data_writes2);
  17377. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  17378. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  17379. SSLSocketDataProvider ssl1(ASYNC, OK);
  17380. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  17381. SSLSocketDataProvider ssl2(ASYNC, OK);
  17382. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  17383. base::TimeTicks start_time = base::TimeTicks::Now();
  17384. base::TimeTicks restart_time;
  17385. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17386. auto trans =
  17387. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17388. TestCompletionCallback callback1;
  17389. int rv = trans->Start(&request_, callback1.callback(), NetLogWithSource());
  17390. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  17391. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17392. TestCompletionCallback callback2;
  17393. // Wait 10 ms then restart with auth
  17394. FastForwardBy(kSleepDuration);
  17395. restart_time = base::TimeTicks::Now();
  17396. rv =
  17397. trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  17398. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  17399. std::string response_data;
  17400. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  17401. EXPECT_EQ("hello world", response_data);
  17402. trans.reset();
  17403. // One 401 report for the auth challenge, then a 200 report for the successful
  17404. // retry. Note that we don't report the error draining the body, as the first
  17405. // request already generated a report for the auth challenge.
  17406. ASSERT_EQ(2u, network_error_logging_service()->errors().size());
  17407. // Check error report contents
  17408. CheckReport(0 /* index */, 401 /* status_code */, OK);
  17409. CheckReport(1 /* index */, 200 /* status_code */, OK);
  17410. const NetworkErrorLoggingService::RequestDetails& error1 =
  17411. network_error_logging_service()->errors()[0];
  17412. const NetworkErrorLoggingService::RequestDetails& error2 =
  17413. network_error_logging_service()->errors()[1];
  17414. // Sanity-check elapsed time values
  17415. EXPECT_EQ(error1.elapsed_time, restart_time - start_time - kSleepDuration);
  17416. // Check that the start time is refreshed when restarting with auth.
  17417. EXPECT_EQ(error2.elapsed_time, base::TimeTicks::Now() - restart_time);
  17418. }
  17419. // Same as above, except draining the body before restarting fails
  17420. // asynchronously.
  17421. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17422. CreateReportRestartWithAuthAsync) {
  17423. std::string extra_header_string = extra_headers_.ToString();
  17424. static const base::TimeDelta kSleepDuration = base::Milliseconds(10);
  17425. MockWrite data_writes1[] = {
  17426. MockWrite("GET / HTTP/1.1\r\n"
  17427. "Host: www.example.org\r\n"
  17428. "Connection: keep-alive\r\n"),
  17429. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17430. };
  17431. MockRead data_reads1[] = {
  17432. MockRead("HTTP/1.0 401 Unauthorized\r\n"),
  17433. // Give a couple authenticate options (only the middle one is actually
  17434. // supported).
  17435. MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed.
  17436. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  17437. MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"),
  17438. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  17439. // Large content-length -- won't matter, as connection will be reset.
  17440. MockRead("Content-Length: 10000\r\n\r\n"),
  17441. MockRead(ASYNC, ERR_FAILED),
  17442. };
  17443. // After calling trans->RestartWithAuth(), this is the request we should
  17444. // be issuing -- the final header line contains the credentials.
  17445. MockWrite data_writes2[] = {
  17446. MockWrite("GET / HTTP/1.1\r\n"
  17447. "Host: www.example.org\r\n"
  17448. "Connection: keep-alive\r\n"
  17449. "Authorization: Basic Zm9vOmJhcg==\r\n"),
  17450. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17451. };
  17452. // Lastly, the server responds with the actual content.
  17453. MockRead data_reads2[] = {
  17454. MockRead("HTTP/1.0 200 OK\r\n\r\n"),
  17455. MockRead("hello world"),
  17456. MockRead(SYNCHRONOUS, OK),
  17457. };
  17458. StaticSocketDataProvider data1(data_reads1, data_writes1);
  17459. StaticSocketDataProvider data2(data_reads2, data_writes2);
  17460. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  17461. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  17462. SSLSocketDataProvider ssl1(ASYNC, OK);
  17463. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  17464. SSLSocketDataProvider ssl2(ASYNC, OK);
  17465. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  17466. base::TimeTicks start_time = base::TimeTicks::Now();
  17467. base::TimeTicks restart_time;
  17468. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17469. auto trans =
  17470. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17471. TestCompletionCallback callback1;
  17472. int rv = trans->Start(&request_, callback1.callback(), NetLogWithSource());
  17473. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  17474. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17475. TestCompletionCallback callback2;
  17476. // Wait 10 ms then restart with auth
  17477. FastForwardBy(kSleepDuration);
  17478. restart_time = base::TimeTicks::Now();
  17479. rv =
  17480. trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  17481. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  17482. std::string response_data;
  17483. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  17484. EXPECT_EQ("hello world", response_data);
  17485. trans.reset();
  17486. // One 401 report for the auth challenge, then a 200 report for the successful
  17487. // retry. Note that we don't report the error draining the body, as the first
  17488. // request already generated a report for the auth challenge.
  17489. ASSERT_EQ(2u, network_error_logging_service()->errors().size());
  17490. // Check error report contents
  17491. CheckReport(0 /* index */, 401 /* status_code */, OK);
  17492. CheckReport(1 /* index */, 200 /* status_code */, OK);
  17493. const NetworkErrorLoggingService::RequestDetails& error1 =
  17494. network_error_logging_service()->errors()[0];
  17495. const NetworkErrorLoggingService::RequestDetails& error2 =
  17496. network_error_logging_service()->errors()[1];
  17497. // Sanity-check elapsed time values
  17498. EXPECT_EQ(error1.elapsed_time, restart_time - start_time - kSleepDuration);
  17499. // Check that the start time is refreshed when restarting with auth.
  17500. EXPECT_EQ(error2.elapsed_time, base::TimeTicks::Now() - restart_time);
  17501. }
  17502. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17503. CreateReportRetryKeepAliveConnectionReset) {
  17504. std::string extra_header_string = extra_headers_.ToString();
  17505. MockWrite data_writes1[] = {
  17506. MockWrite("GET / HTTP/1.1\r\n"
  17507. "Host: www.example.org\r\n"
  17508. "Connection: keep-alive\r\n"),
  17509. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17510. MockWrite("GET / HTTP/1.1\r\n"
  17511. "Host: www.example.org\r\n"
  17512. "Connection: keep-alive\r\n"),
  17513. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17514. };
  17515. MockRead data_reads1[] = {
  17516. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  17517. MockRead("hello"),
  17518. // Connection is reset
  17519. MockRead(ASYNC, ERR_CONNECTION_RESET),
  17520. };
  17521. // Successful retry
  17522. MockRead data_reads2[] = {
  17523. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  17524. MockRead("world"),
  17525. MockRead(ASYNC, OK),
  17526. };
  17527. StaticSocketDataProvider data1(data_reads1, data_writes1);
  17528. StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>());
  17529. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  17530. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  17531. SSLSocketDataProvider ssl1(ASYNC, OK);
  17532. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  17533. SSLSocketDataProvider ssl2(ASYNC, OK);
  17534. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  17535. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17536. auto trans1 =
  17537. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17538. TestCompletionCallback callback1;
  17539. int rv = trans1->Start(&request_, callback1.callback(), NetLogWithSource());
  17540. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  17541. std::string response_data;
  17542. ASSERT_THAT(ReadTransaction(trans1.get(), &response_data), IsOk());
  17543. EXPECT_EQ("hello", response_data);
  17544. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17545. auto trans2 =
  17546. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17547. TestCompletionCallback callback2;
  17548. rv = trans2->Start(&request_, callback2.callback(), NetLogWithSource());
  17549. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  17550. ASSERT_THAT(ReadTransaction(trans2.get(), &response_data), IsOk());
  17551. EXPECT_EQ("world", response_data);
  17552. trans1.reset();
  17553. trans2.reset();
  17554. // One OK report from first request, then a ERR_CONNECTION_RESET report from
  17555. // the second request, then an OK report from the successful retry.
  17556. ASSERT_EQ(3u, network_error_logging_service()->errors().size());
  17557. // Check error report contents
  17558. CheckReport(0 /* index */, 200 /* status_code */, OK);
  17559. CheckReport(1 /* index */, 0 /* status_code */, ERR_CONNECTION_RESET);
  17560. CheckReport(2 /* index */, 200 /* status_code */, OK);
  17561. }
  17562. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17563. CreateReportRetryKeepAlive408) {
  17564. std::string extra_header_string = extra_headers_.ToString();
  17565. MockWrite data_writes1[] = {
  17566. MockWrite("GET / HTTP/1.1\r\n"
  17567. "Host: www.example.org\r\n"
  17568. "Connection: keep-alive\r\n"),
  17569. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17570. MockWrite("GET / HTTP/1.1\r\n"
  17571. "Host: www.example.org\r\n"
  17572. "Connection: keep-alive\r\n"),
  17573. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17574. };
  17575. MockRead data_reads1[] = {
  17576. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  17577. MockRead("hello"),
  17578. // 408 Request Timeout
  17579. MockRead(SYNCHRONOUS,
  17580. "HTTP/1.1 408 Request Timeout\r\n"
  17581. "Connection: Keep-Alive\r\n"
  17582. "Content-Length: 6\r\n\r\n"
  17583. "Pickle"),
  17584. };
  17585. // Successful retry
  17586. MockRead data_reads2[] = {
  17587. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"),
  17588. MockRead("world"),
  17589. MockRead(ASYNC, OK),
  17590. };
  17591. StaticSocketDataProvider data1(data_reads1, data_writes1);
  17592. StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>());
  17593. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  17594. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  17595. SSLSocketDataProvider ssl1(ASYNC, OK);
  17596. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  17597. SSLSocketDataProvider ssl2(ASYNC, OK);
  17598. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  17599. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17600. auto trans1 =
  17601. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17602. TestCompletionCallback callback1;
  17603. int rv = trans1->Start(&request_, callback1.callback(), NetLogWithSource());
  17604. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  17605. std::string response_data;
  17606. ASSERT_THAT(ReadTransaction(trans1.get(), &response_data), IsOk());
  17607. EXPECT_EQ("hello", response_data);
  17608. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17609. auto trans2 =
  17610. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17611. TestCompletionCallback callback2;
  17612. rv = trans2->Start(&request_, callback2.callback(), NetLogWithSource());
  17613. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  17614. ASSERT_THAT(ReadTransaction(trans2.get(), &response_data), IsOk());
  17615. EXPECT_EQ("world", response_data);
  17616. trans1.reset();
  17617. trans2.reset();
  17618. // One 200 report from first request, then a 408 report from
  17619. // the second request, then a 200 report from the successful retry.
  17620. ASSERT_EQ(3u, network_error_logging_service()->errors().size());
  17621. // Check error report contents
  17622. CheckReport(0 /* index */, 200 /* status_code */, OK);
  17623. CheckReport(1 /* index */, 408 /* status_code */, OK);
  17624. CheckReport(2 /* index */, 200 /* status_code */, OK);
  17625. }
  17626. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17627. CreateReportRetry421WithoutConnectionPooling) {
  17628. // Two hosts resolve to the same IP address.
  17629. const std::string ip_addr = "1.2.3.4";
  17630. IPAddress ip;
  17631. ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr));
  17632. IPEndPoint peer_addr = IPEndPoint(ip, 443);
  17633. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>();
  17634. session_deps_.host_resolver->rules()->AddRule("www.example.org", ip_addr);
  17635. session_deps_.host_resolver->rules()->AddRule("mail.example.org", ip_addr);
  17636. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17637. // Two requests on the first connection.
  17638. spdy::SpdySerializedFrame req1(
  17639. spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST));
  17640. spdy_util_.UpdateWithStreamDestruction(1);
  17641. spdy::SpdySerializedFrame req2(
  17642. spdy_util_.ConstructSpdyGet("https://mail.example.org", 3, LOWEST));
  17643. spdy::SpdySerializedFrame rst(
  17644. spdy_util_.ConstructSpdyRstStream(3, spdy::ERROR_CODE_CANCEL));
  17645. MockWrite writes1[] = {
  17646. CreateMockWrite(req1, 0),
  17647. CreateMockWrite(req2, 3),
  17648. CreateMockWrite(rst, 6),
  17649. };
  17650. // The first one succeeds, the second gets error 421 Misdirected Request.
  17651. spdy::SpdySerializedFrame resp1(
  17652. spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1));
  17653. spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true));
  17654. spdy::Http2HeaderBlock response_headers;
  17655. response_headers[spdy::kHttp2StatusHeader] = "421";
  17656. spdy::SpdySerializedFrame resp2(
  17657. spdy_util_.ConstructSpdyReply(3, std::move(response_headers)));
  17658. MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2),
  17659. CreateMockRead(resp2, 4), MockRead(ASYNC, 0, 5)};
  17660. MockConnect connect1(ASYNC, OK, peer_addr);
  17661. SequencedSocketData data1(connect1, reads1, writes1);
  17662. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  17663. AddSSLSocketData();
  17664. // Retry the second request on a second connection.
  17665. SpdyTestUtil spdy_util2;
  17666. spdy::SpdySerializedFrame req3(
  17667. spdy_util2.ConstructSpdyGet("https://mail.example.org", 1, LOWEST));
  17668. MockWrite writes2[] = {
  17669. CreateMockWrite(req3, 0),
  17670. };
  17671. spdy::SpdySerializedFrame resp3(
  17672. spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1));
  17673. spdy::SpdySerializedFrame body3(spdy_util2.ConstructSpdyDataFrame(1, true));
  17674. MockRead reads2[] = {CreateMockRead(resp3, 1), CreateMockRead(body3, 2),
  17675. MockRead(ASYNC, 0, 3)};
  17676. MockConnect connect2(ASYNC, OK, peer_addr);
  17677. SequencedSocketData data2(connect2, reads2, writes2);
  17678. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  17679. AddSSLSocketData();
  17680. // Preload mail.example.org into HostCache.
  17681. int rv = session_deps_.host_resolver->LoadIntoCache(
  17682. HostPortPair("mail.example.org", 443), NetworkIsolationKey(),
  17683. absl::nullopt);
  17684. EXPECT_THAT(rv, IsOk());
  17685. HttpRequestInfo request1;
  17686. request1.method = "GET";
  17687. request1.url = GURL("https://www.example.org/");
  17688. request1.load_flags = 0;
  17689. request1.traffic_annotation =
  17690. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  17691. auto trans1 =
  17692. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17693. TestCompletionCallback callback;
  17694. rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  17695. EXPECT_THAT(callback.GetResult(rv), IsOk());
  17696. const HttpResponseInfo* response = trans1->GetResponseInfo();
  17697. ASSERT_TRUE(response);
  17698. ASSERT_TRUE(response->headers);
  17699. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  17700. EXPECT_TRUE(response->was_fetched_via_spdy);
  17701. EXPECT_TRUE(response->was_alpn_negotiated);
  17702. std::string response_data;
  17703. ASSERT_THAT(ReadTransaction(trans1.get(), &response_data), IsOk());
  17704. EXPECT_EQ("hello!", response_data);
  17705. trans1.reset();
  17706. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17707. HttpRequestInfo request2;
  17708. request2.method = "GET";
  17709. request2.url = GURL("https://mail.example.org/");
  17710. request2.load_flags = 0;
  17711. request2.traffic_annotation =
  17712. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  17713. auto trans2 =
  17714. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17715. rv = trans2->Start(&request2, callback.callback(),
  17716. NetLogWithSource::Make(NetLogSourceType::NONE));
  17717. EXPECT_THAT(callback.GetResult(rv), IsOk());
  17718. response = trans2->GetResponseInfo();
  17719. ASSERT_TRUE(response);
  17720. ASSERT_TRUE(response->headers);
  17721. EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine());
  17722. EXPECT_TRUE(response->was_fetched_via_spdy);
  17723. EXPECT_TRUE(response->was_alpn_negotiated);
  17724. ASSERT_THAT(ReadTransaction(trans2.get(), &response_data), IsOk());
  17725. EXPECT_EQ("hello!", response_data);
  17726. trans2.reset();
  17727. // One 200 report from the first request, then a 421 report from the
  17728. // second request, then a 200 report from the successful retry.
  17729. ASSERT_EQ(3u, network_error_logging_service()->errors().size());
  17730. // Check error report contents
  17731. const NetworkErrorLoggingService::RequestDetails& error1 =
  17732. network_error_logging_service()->errors()[0];
  17733. EXPECT_EQ(GURL("https://www.example.org/"), error1.uri);
  17734. EXPECT_TRUE(error1.referrer.is_empty());
  17735. EXPECT_EQ("", error1.user_agent);
  17736. EXPECT_EQ(ip, error1.server_ip);
  17737. EXPECT_EQ("h2", error1.protocol);
  17738. EXPECT_EQ("GET", error1.method);
  17739. EXPECT_EQ(200, error1.status_code);
  17740. EXPECT_EQ(OK, error1.type);
  17741. EXPECT_EQ(0, error1.reporting_upload_depth);
  17742. const NetworkErrorLoggingService::RequestDetails& error2 =
  17743. network_error_logging_service()->errors()[1];
  17744. EXPECT_EQ(GURL("https://mail.example.org/"), error2.uri);
  17745. EXPECT_TRUE(error2.referrer.is_empty());
  17746. EXPECT_EQ("", error2.user_agent);
  17747. EXPECT_EQ(ip, error2.server_ip);
  17748. EXPECT_EQ("h2", error2.protocol);
  17749. EXPECT_EQ("GET", error2.method);
  17750. EXPECT_EQ(421, error2.status_code);
  17751. EXPECT_EQ(OK, error2.type);
  17752. EXPECT_EQ(0, error2.reporting_upload_depth);
  17753. const NetworkErrorLoggingService::RequestDetails& error3 =
  17754. network_error_logging_service()->errors()[2];
  17755. EXPECT_EQ(GURL("https://mail.example.org/"), error3.uri);
  17756. EXPECT_TRUE(error3.referrer.is_empty());
  17757. EXPECT_EQ("", error3.user_agent);
  17758. EXPECT_EQ(ip, error3.server_ip);
  17759. EXPECT_EQ("h2", error3.protocol);
  17760. EXPECT_EQ("GET", error3.method);
  17761. EXPECT_EQ(200, error3.status_code);
  17762. EXPECT_EQ(OK, error3.type);
  17763. EXPECT_EQ(0, error3.reporting_upload_depth);
  17764. }
  17765. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17766. CreateReportCancelAfterStart) {
  17767. StaticSocketDataProvider data;
  17768. data.set_connect_data(MockConnect(SYNCHRONOUS, ERR_IO_PENDING));
  17769. session_deps_.socket_factory->AddSocketDataProvider(&data);
  17770. TestCompletionCallback callback;
  17771. auto session = CreateSession(&session_deps_);
  17772. auto trans =
  17773. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17774. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17775. EXPECT_EQ(rv, ERR_IO_PENDING);
  17776. // Cancel after start.
  17777. trans.reset();
  17778. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17779. CheckReport(0 /* index */, 0 /* status_code */, ERR_ABORTED,
  17780. IPAddress() /* server_ip */);
  17781. }
  17782. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17783. CreateReportCancelBeforeReadingBody) {
  17784. std::string extra_header_string = extra_headers_.ToString();
  17785. MockWrite data_writes[] = {
  17786. MockWrite("GET / HTTP/1.1\r\n"
  17787. "Host: www.example.org\r\n"
  17788. "Connection: keep-alive\r\n"),
  17789. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17790. };
  17791. MockRead data_reads[] = {
  17792. MockRead("HTTP/1.0 200 OK\r\n"),
  17793. MockRead("Content-Length: 100\r\n\r\n"), // Body is never read.
  17794. };
  17795. StaticSocketDataProvider data(data_reads, data_writes);
  17796. session_deps_.socket_factory->AddSocketDataProvider(&data);
  17797. SSLSocketDataProvider ssl(ASYNC, OK);
  17798. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  17799. TestCompletionCallback callback;
  17800. auto session = CreateSession(&session_deps_);
  17801. auto trans =
  17802. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17803. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17804. EXPECT_THAT(callback.GetResult(rv), IsOk());
  17805. const HttpResponseInfo* response = trans->GetResponseInfo();
  17806. ASSERT_TRUE(response);
  17807. EXPECT_TRUE(response->headers);
  17808. EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine());
  17809. // Cancel before reading the body.
  17810. trans.reset();
  17811. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17812. CheckReport(0 /* index */, 200 /* status_code */, ERR_ABORTED);
  17813. }
  17814. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontCreateReportHttp) {
  17815. RequestPolicy();
  17816. EXPECT_EQ(1u, network_error_logging_service()->headers().size());
  17817. EXPECT_EQ(1u, network_error_logging_service()->errors().size());
  17818. // Make HTTP request
  17819. std::string extra_header_string = extra_headers_.ToString();
  17820. MockRead data_reads[] = {
  17821. MockRead("HTTP/1.0 200 OK\r\n\r\n"),
  17822. MockRead("hello world"),
  17823. MockRead(SYNCHRONOUS, OK),
  17824. };
  17825. MockWrite data_writes[] = {
  17826. MockWrite("GET / HTTP/1.1\r\n"
  17827. "Host: www.example.org\r\n"
  17828. "Connection: keep-alive\r\n"),
  17829. MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()),
  17830. };
  17831. StaticSocketDataProvider data(data_reads, data_writes);
  17832. session_deps_.socket_factory->AddSocketDataProvider(&data);
  17833. // Insecure url
  17834. url_ = "http://www.example.org/";
  17835. request_.url = GURL(url_);
  17836. TestCompletionCallback callback;
  17837. auto session = CreateSession(&session_deps_);
  17838. auto trans =
  17839. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17840. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17841. EXPECT_THAT(callback.GetResult(rv), IsOk());
  17842. std::string response_data;
  17843. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  17844. EXPECT_EQ("hello world", response_data);
  17845. // Insecure request does not generate a report
  17846. EXPECT_EQ(1u, network_error_logging_service()->errors().size());
  17847. }
  17848. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17849. DontCreateReportHttpError) {
  17850. RequestPolicy();
  17851. EXPECT_EQ(1u, network_error_logging_service()->headers().size());
  17852. EXPECT_EQ(1u, network_error_logging_service()->errors().size());
  17853. // Make HTTP request that fails
  17854. MockRead data_reads[] = {
  17855. MockRead("hello world"),
  17856. MockRead(SYNCHRONOUS, OK),
  17857. };
  17858. StaticSocketDataProvider data(data_reads, base::span<MockWrite>());
  17859. session_deps_.socket_factory->AddSocketDataProvider(&data);
  17860. url_ = "http://www.originwithoutpolicy.com:2000/";
  17861. request_.url = GURL(url_);
  17862. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17863. auto trans =
  17864. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17865. TestCompletionCallback callback;
  17866. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17867. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_INVALID_HTTP_RESPONSE));
  17868. // Insecure request does not generate a report, regardless of existence of a
  17869. // policy for the origin.
  17870. EXPECT_EQ(1u, network_error_logging_service()->errors().size());
  17871. }
  17872. // Don't report on proxy auth challenges, don't report if connecting through a
  17873. // proxy.
  17874. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontCreateReportProxy) {
  17875. HttpRequestInfo request;
  17876. request.method = "GET";
  17877. request.url = GURL("https://www.example.org/");
  17878. request.traffic_annotation =
  17879. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  17880. // Configure against proxy server "myproxy:70".
  17881. session_deps_.proxy_resolution_service =
  17882. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  17883. "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  17884. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17885. // Since we have proxy, should try to establish tunnel.
  17886. MockWrite data_writes1[] = {
  17887. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  17888. "Host: www.example.org:443\r\n"
  17889. "Proxy-Connection: keep-alive\r\n\r\n"),
  17890. };
  17891. // The proxy responds to the connect with a 407, using a non-persistent
  17892. // connection.
  17893. MockRead data_reads1[] = {
  17894. // No credentials.
  17895. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"),
  17896. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"),
  17897. MockRead("Proxy-Connection: close\r\n\r\n"),
  17898. };
  17899. MockWrite data_writes2[] = {
  17900. // After calling trans->RestartWithAuth(), this is the request we should
  17901. // be issuing -- the final header line contains the credentials.
  17902. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n"
  17903. "Host: www.example.org:443\r\n"
  17904. "Proxy-Connection: keep-alive\r\n"
  17905. "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"),
  17906. MockWrite("GET / HTTP/1.1\r\n"
  17907. "Host: www.example.org\r\n"
  17908. "Connection: keep-alive\r\n\r\n"),
  17909. };
  17910. MockRead data_reads2[] = {
  17911. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  17912. MockRead("HTTP/1.1 200 OK\r\n"),
  17913. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  17914. MockRead("Content-Length: 5\r\n\r\n"),
  17915. MockRead(SYNCHRONOUS, "hello"),
  17916. };
  17917. StaticSocketDataProvider data1(data_reads1, data_writes1);
  17918. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  17919. StaticSocketDataProvider data2(data_reads2, data_writes2);
  17920. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  17921. SSLSocketDataProvider ssl(ASYNC, OK);
  17922. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  17923. TestCompletionCallback callback1;
  17924. auto trans =
  17925. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17926. int rv = trans->Start(&request, callback1.callback(), NetLogWithSource());
  17927. EXPECT_THAT(callback1.GetResult(rv), IsOk());
  17928. const HttpResponseInfo* response = trans->GetResponseInfo();
  17929. EXPECT_EQ(407, response->headers->response_code());
  17930. std::string response_data;
  17931. rv = ReadTransaction(trans.get(), &response_data);
  17932. EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED));
  17933. // No NEL report is generated for the 407.
  17934. EXPECT_EQ(0u, network_error_logging_service()->errors().size());
  17935. TestCompletionCallback callback2;
  17936. rv =
  17937. trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback());
  17938. EXPECT_THAT(callback2.GetResult(rv), IsOk());
  17939. response = trans->GetResponseInfo();
  17940. EXPECT_EQ(200, response->headers->response_code());
  17941. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  17942. EXPECT_EQ("hello", response_data);
  17943. trans.reset();
  17944. // No NEL report is generated because we are behind a proxy.
  17945. EXPECT_EQ(0u, network_error_logging_service()->errors().size());
  17946. }
  17947. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest,
  17948. ReportContainsUploadDepth) {
  17949. reporting_upload_depth_ = 7;
  17950. request_.reporting_upload_depth = reporting_upload_depth_;
  17951. RequestPolicy();
  17952. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17953. const NetworkErrorLoggingService::RequestDetails& error =
  17954. network_error_logging_service()->errors()[0];
  17955. EXPECT_EQ(7, error.reporting_upload_depth);
  17956. }
  17957. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, ReportElapsedTime) {
  17958. std::string extra_header_string = extra_headers_.ToString();
  17959. static const base::TimeDelta kSleepDuration = base::Milliseconds(10);
  17960. std::vector<MockWrite> data_writes = {
  17961. MockWrite(ASYNC, 0,
  17962. "GET / HTTP/1.1\r\n"
  17963. "Host: www.example.org\r\n"
  17964. "Connection: keep-alive\r\n"),
  17965. MockWrite(ASYNC, 1, extra_header_string.data()),
  17966. };
  17967. std::vector<MockRead> data_reads = {
  17968. // Write one byte of the status line, followed by a pause.
  17969. MockRead(ASYNC, 2, "H"),
  17970. MockRead(ASYNC, ERR_IO_PENDING, 3),
  17971. MockRead(ASYNC, 4, "TTP/1.1 200 OK\r\n\r\n"),
  17972. MockRead(ASYNC, 5, "hello world"),
  17973. MockRead(SYNCHRONOUS, OK, 6),
  17974. };
  17975. SequencedSocketData data(data_reads, data_writes);
  17976. session_deps_.socket_factory->AddSocketDataProvider(&data);
  17977. SSLSocketDataProvider ssl(ASYNC, OK);
  17978. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  17979. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  17980. auto trans =
  17981. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  17982. TestCompletionCallback callback;
  17983. int rv = trans->Start(&request_, callback.callback(), NetLogWithSource());
  17984. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  17985. data.RunUntilPaused();
  17986. ASSERT_TRUE(data.IsPaused());
  17987. FastForwardBy(kSleepDuration);
  17988. data.Resume();
  17989. EXPECT_THAT(callback.GetResult(rv), IsOk());
  17990. std::string response_data;
  17991. ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk());
  17992. EXPECT_EQ("hello world", response_data);
  17993. trans.reset();
  17994. ASSERT_EQ(1u, network_error_logging_service()->errors().size());
  17995. CheckReport(0 /* index */, 200 /* status_code */, OK);
  17996. const NetworkErrorLoggingService::RequestDetails& error =
  17997. network_error_logging_service()->errors()[0];
  17998. // Sanity-check elapsed time in error report
  17999. EXPECT_EQ(kSleepDuration, error.elapsed_time);
  18000. }
  18001. #endif // BUILDFLAG(ENABLE_REPORTING)
  18002. TEST_F(HttpNetworkTransactionTest, AlwaysFailRequestToCache) {
  18003. HttpRequestInfo request;
  18004. request.method = "GET";
  18005. request.url = GURL("http://example.org/");
  18006. request.load_flags = LOAD_ONLY_FROM_CACHE;
  18007. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18008. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  18009. TestCompletionCallback callback1;
  18010. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource());
  18011. EXPECT_THAT(rv, IsError(ERR_CACHE_MISS));
  18012. }
  18013. TEST_F(HttpNetworkTransactionTest, ZeroRTTDoesntConfirm) {
  18014. static const base::TimeDelta kDelay = base::Milliseconds(10);
  18015. HttpRequestInfo request;
  18016. request.method = "GET";
  18017. request.url = GURL("https://www.example.org/");
  18018. request.traffic_annotation =
  18019. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18020. MockWrite data_writes[] = {
  18021. MockWrite("GET / HTTP/1.1\r\n"
  18022. "Host: www.example.org\r\n"
  18023. "Connection: keep-alive\r\n\r\n"),
  18024. };
  18025. MockRead data_reads[] = {
  18026. MockRead("HTTP/1.1 200 OK\r\n"),
  18027. MockRead("Content-Length: 1\r\n\r\n"),
  18028. MockRead(SYNCHRONOUS, "1"),
  18029. };
  18030. StaticSocketDataProvider data(data_reads, data_writes);
  18031. session_deps_.socket_factory->AddSocketDataProvider(&data);
  18032. SSLSocketDataProvider ssl(SYNCHRONOUS, OK);
  18033. ssl.connect_callback = FastForwardByCallback(kDelay);
  18034. ssl.confirm = MockConfirm(SYNCHRONOUS, OK);
  18035. ssl.confirm_callback = FastForwardByCallback(kDelay);
  18036. session_deps_.enable_early_data = true;
  18037. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  18038. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18039. TestCompletionCallback callback;
  18040. auto trans =
  18041. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18042. base::TimeTicks start_time = base::TimeTicks::Now();
  18043. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  18044. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  18045. rv = callback.WaitForResult();
  18046. EXPECT_THAT(rv, IsOk());
  18047. const HttpResponseInfo* response = trans->GetResponseInfo();
  18048. ASSERT_TRUE(response);
  18049. ASSERT_TRUE(response->headers);
  18050. EXPECT_EQ(200, response->headers->response_code());
  18051. EXPECT_EQ(1, response->headers->GetContentLength());
  18052. // Check that ConfirmHandshake wasn't called.
  18053. ASSERT_FALSE(ssl.ConfirmDataConsumed());
  18054. ASSERT_TRUE(ssl.WriteBeforeConfirm());
  18055. // The handshake time should include the time it took to run Connect(), but
  18056. // not ConfirmHandshake().
  18057. LoadTimingInfo load_timing_info;
  18058. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  18059. EXPECT_EQ(load_timing_info.connect_timing.connect_start, start_time);
  18060. EXPECT_EQ(load_timing_info.connect_timing.ssl_start, start_time);
  18061. EXPECT_EQ(load_timing_info.connect_timing.ssl_end, start_time + kDelay);
  18062. EXPECT_EQ(load_timing_info.connect_timing.connect_end, start_time + kDelay);
  18063. trans.reset();
  18064. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  18065. }
  18066. TEST_F(HttpNetworkTransactionTest, ZeroRTTSyncConfirmSyncWrite) {
  18067. static const base::TimeDelta kDelay = base::Milliseconds(10);
  18068. HttpRequestInfo request;
  18069. request.method = "POST";
  18070. request.url = GURL("https://www.example.org/");
  18071. request.traffic_annotation =
  18072. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18073. MockWrite data_writes[] = {
  18074. MockWrite(SYNCHRONOUS,
  18075. "POST / HTTP/1.1\r\n"
  18076. "Host: www.example.org\r\n"
  18077. "Connection: keep-alive\r\n"
  18078. "Content-Length: 0\r\n\r\n"),
  18079. };
  18080. MockRead data_reads[] = {
  18081. MockRead("HTTP/1.1 200 OK\r\n"),
  18082. MockRead("Content-Length: 1\r\n\r\n"),
  18083. MockRead(SYNCHRONOUS, "1"),
  18084. };
  18085. StaticSocketDataProvider data(data_reads, data_writes);
  18086. session_deps_.socket_factory->AddSocketDataProvider(&data);
  18087. SSLSocketDataProvider ssl(SYNCHRONOUS, OK);
  18088. ssl.connect_callback = FastForwardByCallback(kDelay);
  18089. ssl.confirm = MockConfirm(SYNCHRONOUS, OK);
  18090. ssl.confirm_callback = FastForwardByCallback(kDelay);
  18091. session_deps_.enable_early_data = true;
  18092. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  18093. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18094. TestCompletionCallback callback;
  18095. auto trans =
  18096. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18097. base::TimeTicks start_time = base::TimeTicks::Now();
  18098. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  18099. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  18100. rv = callback.WaitForResult();
  18101. EXPECT_THAT(rv, IsOk());
  18102. const HttpResponseInfo* response = trans->GetResponseInfo();
  18103. ASSERT_TRUE(response);
  18104. ASSERT_TRUE(response->headers);
  18105. EXPECT_EQ(200, response->headers->response_code());
  18106. EXPECT_EQ(1, response->headers->GetContentLength());
  18107. // Check that the Write didn't get called before ConfirmHandshake completed.
  18108. ASSERT_FALSE(ssl.WriteBeforeConfirm());
  18109. // The handshake time should include the time it took to run Connect(), but
  18110. // not ConfirmHandshake(). If ConfirmHandshake() returns synchronously, we
  18111. // assume the connection did not negotiate 0-RTT or the handshake was already
  18112. // confirmed.
  18113. LoadTimingInfo load_timing_info;
  18114. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  18115. EXPECT_EQ(load_timing_info.connect_timing.connect_start, start_time);
  18116. EXPECT_EQ(load_timing_info.connect_timing.ssl_start, start_time);
  18117. EXPECT_EQ(load_timing_info.connect_timing.ssl_end, start_time + kDelay);
  18118. EXPECT_EQ(load_timing_info.connect_timing.connect_end, start_time + kDelay);
  18119. trans.reset();
  18120. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  18121. }
  18122. TEST_F(HttpNetworkTransactionTest, ZeroRTTSyncConfirmAsyncWrite) {
  18123. HttpRequestInfo request;
  18124. request.method = "POST";
  18125. request.url = GURL("https://www.example.org/");
  18126. request.traffic_annotation =
  18127. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18128. MockWrite data_writes[] = {
  18129. MockWrite(ASYNC,
  18130. "POST / HTTP/1.1\r\n"
  18131. "Host: www.example.org\r\n"
  18132. "Connection: keep-alive\r\n"
  18133. "Content-Length: 0\r\n\r\n"),
  18134. };
  18135. MockRead data_reads[] = {
  18136. MockRead("HTTP/1.1 200 OK\r\n"),
  18137. MockRead("Content-Length: 1\r\n\r\n"),
  18138. MockRead(SYNCHRONOUS, "1"),
  18139. };
  18140. StaticSocketDataProvider data(data_reads, data_writes);
  18141. session_deps_.socket_factory->AddSocketDataProvider(&data);
  18142. SSLSocketDataProvider ssl(SYNCHRONOUS, OK);
  18143. ssl.confirm = MockConfirm(SYNCHRONOUS, OK);
  18144. session_deps_.enable_early_data = true;
  18145. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  18146. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18147. TestCompletionCallback callback;
  18148. auto trans =
  18149. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18150. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  18151. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  18152. rv = callback.WaitForResult();
  18153. EXPECT_THAT(rv, IsOk());
  18154. const HttpResponseInfo* response = trans->GetResponseInfo();
  18155. ASSERT_TRUE(response);
  18156. ASSERT_TRUE(response->headers);
  18157. EXPECT_EQ(200, response->headers->response_code());
  18158. EXPECT_EQ(1, response->headers->GetContentLength());
  18159. // Check that the Write didn't get called before ConfirmHandshake completed.
  18160. ASSERT_FALSE(ssl.WriteBeforeConfirm());
  18161. trans.reset();
  18162. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  18163. }
  18164. TEST_F(HttpNetworkTransactionTest, ZeroRTTAsyncConfirmSyncWrite) {
  18165. static const base::TimeDelta kDelay = base::Milliseconds(10);
  18166. HttpRequestInfo request;
  18167. request.method = "POST";
  18168. request.url = GURL("https://www.example.org/");
  18169. request.traffic_annotation =
  18170. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18171. MockWrite data_writes[] = {
  18172. MockWrite(SYNCHRONOUS,
  18173. "POST / HTTP/1.1\r\n"
  18174. "Host: www.example.org\r\n"
  18175. "Connection: keep-alive\r\n"
  18176. "Content-Length: 0\r\n\r\n"),
  18177. };
  18178. MockRead data_reads[] = {
  18179. MockRead("HTTP/1.1 200 OK\r\n"),
  18180. MockRead("Content-Length: 1\r\n\r\n"),
  18181. MockRead(SYNCHRONOUS, "1"),
  18182. };
  18183. StaticSocketDataProvider data(data_reads, data_writes);
  18184. session_deps_.socket_factory->AddSocketDataProvider(&data);
  18185. SSLSocketDataProvider ssl(SYNCHRONOUS, OK);
  18186. ssl.connect_callback = FastForwardByCallback(kDelay);
  18187. ssl.confirm = MockConfirm(ASYNC, OK);
  18188. ssl.confirm_callback = FastForwardByCallback(kDelay);
  18189. session_deps_.enable_early_data = true;
  18190. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  18191. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18192. TestCompletionCallback callback;
  18193. auto trans =
  18194. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18195. base::TimeTicks start_time = base::TimeTicks::Now();
  18196. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  18197. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  18198. rv = callback.WaitForResult();
  18199. EXPECT_THAT(rv, IsOk());
  18200. const HttpResponseInfo* response = trans->GetResponseInfo();
  18201. ASSERT_TRUE(response);
  18202. ASSERT_TRUE(response->headers);
  18203. EXPECT_EQ(200, response->headers->response_code());
  18204. EXPECT_EQ(1, response->headers->GetContentLength());
  18205. // Check that the Write didn't get called before ConfirmHandshake completed.
  18206. ASSERT_FALSE(ssl.WriteBeforeConfirm());
  18207. // The handshake time should include the time it took to run Connect() and
  18208. // ConfirmHandshake().
  18209. LoadTimingInfo load_timing_info;
  18210. EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info));
  18211. EXPECT_EQ(load_timing_info.connect_timing.connect_start, start_time);
  18212. EXPECT_EQ(load_timing_info.connect_timing.ssl_start, start_time);
  18213. EXPECT_EQ(load_timing_info.connect_timing.ssl_end, start_time + 2 * kDelay);
  18214. EXPECT_EQ(load_timing_info.connect_timing.connect_end,
  18215. start_time + 2 * kDelay);
  18216. trans.reset();
  18217. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  18218. }
  18219. TEST_F(HttpNetworkTransactionTest, ZeroRTTAsyncConfirmAsyncWrite) {
  18220. HttpRequestInfo request;
  18221. request.method = "POST";
  18222. request.url = GURL("https://www.example.org/");
  18223. request.traffic_annotation =
  18224. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18225. MockWrite data_writes[] = {
  18226. MockWrite(ASYNC,
  18227. "POST / HTTP/1.1\r\n"
  18228. "Host: www.example.org\r\n"
  18229. "Connection: keep-alive\r\n"
  18230. "Content-Length: 0\r\n\r\n"),
  18231. };
  18232. MockRead data_reads[] = {
  18233. MockRead("HTTP/1.1 200 OK\r\n"),
  18234. MockRead("Content-Length: 1\r\n\r\n"),
  18235. MockRead(SYNCHRONOUS, "1"),
  18236. };
  18237. StaticSocketDataProvider data(data_reads, data_writes);
  18238. session_deps_.socket_factory->AddSocketDataProvider(&data);
  18239. SSLSocketDataProvider ssl(SYNCHRONOUS, OK);
  18240. ssl.confirm = MockConfirm(ASYNC, OK);
  18241. session_deps_.enable_early_data = true;
  18242. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  18243. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18244. TestCompletionCallback callback;
  18245. auto trans =
  18246. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18247. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  18248. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  18249. rv = callback.WaitForResult();
  18250. EXPECT_THAT(rv, IsOk());
  18251. const HttpResponseInfo* response = trans->GetResponseInfo();
  18252. ASSERT_TRUE(response);
  18253. ASSERT_TRUE(response->headers);
  18254. EXPECT_EQ(200, response->headers->response_code());
  18255. EXPECT_EQ(1, response->headers->GetContentLength());
  18256. // Check that the Write didn't get called before ConfirmHandshake completed.
  18257. ASSERT_FALSE(ssl.WriteBeforeConfirm());
  18258. trans.reset();
  18259. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  18260. }
  18261. // 0-RTT rejects are handled at HttpNetworkTransaction.
  18262. TEST_F(HttpNetworkTransactionTest, ZeroRTTReject) {
  18263. enum class RejectType {
  18264. kRead,
  18265. kWrite,
  18266. kConfirm,
  18267. };
  18268. for (RejectType type :
  18269. {RejectType::kRead, RejectType::kWrite, RejectType::kConfirm}) {
  18270. SCOPED_TRACE(static_cast<int>(type));
  18271. for (Error reject_error :
  18272. {ERR_EARLY_DATA_REJECTED, ERR_WRONG_VERSION_ON_EARLY_DATA}) {
  18273. SCOPED_TRACE(reject_error);
  18274. session_deps_.socket_factory =
  18275. std::make_unique<MockClientSocketFactory>();
  18276. HttpRequestInfo request;
  18277. request.method = type == RejectType::kConfirm ? "POST" : "GET";
  18278. request.url = GURL("https://www.example.org/");
  18279. request.traffic_annotation =
  18280. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18281. // The first request fails.
  18282. std::vector<MockWrite> data1_writes;
  18283. std::vector<MockRead> data1_reads;
  18284. SSLSocketDataProvider ssl1(SYNCHRONOUS, OK);
  18285. switch (type) {
  18286. case RejectType::kRead:
  18287. data1_writes.emplace_back(
  18288. "GET / HTTP/1.1\r\n"
  18289. "Host: www.example.org\r\n"
  18290. "Connection: keep-alive\r\n\r\n");
  18291. data1_reads.emplace_back(ASYNC, reject_error);
  18292. // Cause ConfirmHandshake to hang (it should not be called).
  18293. ssl1.confirm = MockConfirm(SYNCHRONOUS, ERR_IO_PENDING);
  18294. break;
  18295. case RejectType::kWrite:
  18296. data1_writes.emplace_back(ASYNC, reject_error);
  18297. // Cause ConfirmHandshake to hang (it should not be called).
  18298. ssl1.confirm = MockConfirm(SYNCHRONOUS, ERR_IO_PENDING);
  18299. break;
  18300. case RejectType::kConfirm:
  18301. // The request never gets far enough to read or write.
  18302. ssl1.confirm = MockConfirm(ASYNC, reject_error);
  18303. break;
  18304. }
  18305. StaticSocketDataProvider data1(data1_reads, data1_writes);
  18306. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  18307. session_deps_.enable_early_data = true;
  18308. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  18309. // The retry succeeds.
  18310. //
  18311. // TODO(https://crbug.com/950705): If |reject_error| is
  18312. // ERR_EARLY_DATA_REJECTED, the retry should happen over the same socket.
  18313. MockWrite data2_writes[] = {
  18314. request.method == "POST"
  18315. ? MockWrite("POST / HTTP/1.1\r\n"
  18316. "Host: www.example.org\r\n"
  18317. "Connection: keep-alive\r\n"
  18318. "Content-Length: 0\r\n\r\n")
  18319. : MockWrite("GET / HTTP/1.1\r\n"
  18320. "Host: www.example.org\r\n"
  18321. "Connection: keep-alive\r\n\r\n"),
  18322. };
  18323. MockRead data2_reads[] = {
  18324. MockRead("HTTP/1.1 200 OK\r\n"),
  18325. MockRead("Content-Length: 1\r\n\r\n"),
  18326. MockRead(SYNCHRONOUS, "1"),
  18327. };
  18328. StaticSocketDataProvider data2(data2_reads, data2_writes);
  18329. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  18330. SSLSocketDataProvider ssl2(SYNCHRONOUS, OK);
  18331. ssl2.confirm = MockConfirm(ASYNC, OK);
  18332. session_deps_.enable_early_data = true;
  18333. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  18334. std::unique_ptr<HttpNetworkSession> session(
  18335. CreateSession(&session_deps_));
  18336. TestCompletionCallback callback;
  18337. auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
  18338. session.get());
  18339. EXPECT_THAT(callback.GetResult(trans->Start(&request, callback.callback(),
  18340. NetLogWithSource())),
  18341. IsOk());
  18342. const HttpResponseInfo* response = trans->GetResponseInfo();
  18343. ASSERT_TRUE(response);
  18344. ASSERT_TRUE(response->headers);
  18345. EXPECT_EQ(200, response->headers->response_code());
  18346. EXPECT_EQ(1, response->headers->GetContentLength());
  18347. }
  18348. }
  18349. }
  18350. TEST_F(HttpNetworkTransactionTest, ZeroRTTConfirmErrorSync) {
  18351. HttpRequestInfo request;
  18352. request.method = "POST";
  18353. request.url = GURL("https://www.example.org/");
  18354. request.traffic_annotation =
  18355. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18356. MockWrite data_writes[] = {
  18357. MockWrite("POST / HTTP/1.1\r\n"
  18358. "Host: www.example.org\r\n"
  18359. "Connection: keep-alive\r\n"
  18360. "Content-Length: 0\r\n\r\n"),
  18361. };
  18362. MockRead data_reads[] = {
  18363. MockRead("HTTP/1.1 200 OK\r\n"),
  18364. MockRead("Content-Length: 1\r\n\r\n"),
  18365. MockRead(SYNCHRONOUS, "1"),
  18366. };
  18367. StaticSocketDataProvider data(data_reads, data_writes);
  18368. session_deps_.socket_factory->AddSocketDataProvider(&data);
  18369. SSLSocketDataProvider ssl(SYNCHRONOUS, OK);
  18370. ssl.confirm = MockConfirm(SYNCHRONOUS, ERR_SSL_PROTOCOL_ERROR);
  18371. session_deps_.enable_early_data = true;
  18372. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  18373. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18374. TestCompletionCallback callback;
  18375. auto trans =
  18376. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18377. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  18378. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  18379. rv = callback.WaitForResult();
  18380. EXPECT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR));
  18381. // Check that the Write didn't get called before ConfirmHandshake completed.
  18382. ASSERT_FALSE(ssl.WriteBeforeConfirm());
  18383. trans.reset();
  18384. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  18385. }
  18386. TEST_F(HttpNetworkTransactionTest, ZeroRTTConfirmErrorAsync) {
  18387. HttpRequestInfo request;
  18388. request.method = "POST";
  18389. request.url = GURL("https://www.example.org/");
  18390. request.traffic_annotation =
  18391. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18392. MockWrite data_writes[] = {
  18393. MockWrite("POST / HTTP/1.1\r\n"
  18394. "Host: www.example.org\r\n"
  18395. "Connection: keep-alive\r\n"
  18396. "Content-Length: 0\r\n\r\n"),
  18397. };
  18398. MockRead data_reads[] = {
  18399. MockRead("HTTP/1.1 200 OK\r\n"),
  18400. MockRead("Content-Length: 1\r\n\r\n"),
  18401. MockRead(SYNCHRONOUS, "1"),
  18402. };
  18403. StaticSocketDataProvider data(data_reads, data_writes);
  18404. session_deps_.socket_factory->AddSocketDataProvider(&data);
  18405. SSLSocketDataProvider ssl(SYNCHRONOUS, OK);
  18406. ssl.confirm = MockConfirm(ASYNC, ERR_SSL_PROTOCOL_ERROR);
  18407. session_deps_.enable_early_data = true;
  18408. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl);
  18409. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18410. TestCompletionCallback callback;
  18411. auto trans =
  18412. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18413. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  18414. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  18415. rv = callback.WaitForResult();
  18416. EXPECT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR));
  18417. // Check that the Write didn't get called before ConfirmHandshake completed.
  18418. ASSERT_FALSE(ssl.WriteBeforeConfirm());
  18419. trans.reset();
  18420. session->CloseAllConnections(ERR_FAILED, "Very good reason");
  18421. }
  18422. // Test the proxy and origin server each requesting both TLS client certificates
  18423. // and HTTP auth. This is a regression test for https://crbug.com/946406.
  18424. TEST_F(HttpNetworkTransactionTest, AuthEverything) {
  18425. // Note these hosts must match the CheckBasic*Auth() functions.
  18426. session_deps_.proxy_resolution_service =
  18427. ConfiguredProxyResolutionService::CreateFixedForTest(
  18428. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  18429. auto cert_request_info_proxy = base::MakeRefCounted<SSLCertRequestInfo>();
  18430. cert_request_info_proxy->host_and_port = HostPortPair("myproxy", 70);
  18431. std::unique_ptr<FakeClientCertIdentity> identity_proxy =
  18432. FakeClientCertIdentity::CreateFromCertAndKeyFiles(
  18433. GetTestCertsDirectory(), "client_1.pem", "client_1.pk8");
  18434. ASSERT_TRUE(identity_proxy);
  18435. auto cert_request_info_origin = base::MakeRefCounted<SSLCertRequestInfo>();
  18436. cert_request_info_origin->host_and_port =
  18437. HostPortPair("www.example.org", 443);
  18438. std::unique_ptr<FakeClientCertIdentity> identity_origin =
  18439. FakeClientCertIdentity::CreateFromCertAndKeyFiles(
  18440. GetTestCertsDirectory(), "client_2.pem", "client_2.pk8");
  18441. ASSERT_TRUE(identity_origin);
  18442. HttpRequestInfo request;
  18443. request.method = "GET";
  18444. request.url = GURL("https://www.example.org/");
  18445. request.traffic_annotation =
  18446. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18447. // First, the client connects to the proxy, which requests a client
  18448. // certificate.
  18449. SSLSocketDataProvider ssl_proxy1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  18450. ssl_proxy1.cert_request_info = cert_request_info_proxy.get();
  18451. ssl_proxy1.expected_send_client_cert = false;
  18452. StaticSocketDataProvider data1;
  18453. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  18454. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy1);
  18455. // The client responds with a certificate on a new connection. The handshake
  18456. // succeeds.
  18457. SSLSocketDataProvider ssl_proxy2(ASYNC, OK);
  18458. ssl_proxy2.expected_send_client_cert = true;
  18459. ssl_proxy2.expected_client_cert = identity_proxy->certificate();
  18460. // The client attempts an HTTP CONNECT, but the proxy requests basic auth.
  18461. std::vector<MockWrite> mock_writes2;
  18462. std::vector<MockRead> mock_reads2;
  18463. mock_writes2.emplace_back(
  18464. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18465. "Host: www.example.org:443\r\n"
  18466. "Proxy-Connection: keep-alive\r\n\r\n");
  18467. mock_reads2.emplace_back(
  18468. "HTTP/1.1 407 Proxy Authentication Required\r\n"
  18469. "Content-Length: 0\r\n"
  18470. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n\r\n");
  18471. // The client retries with credentials.
  18472. mock_writes2.emplace_back(
  18473. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18474. "Host: www.example.org:443\r\n"
  18475. "Proxy-Connection: keep-alive\r\n"
  18476. // Authenticate as proxyuser:proxypass.
  18477. "Proxy-Authorization: Basic cHJveHl1c2VyOnByb3h5cGFzcw==\r\n\r\n");
  18478. mock_reads2.emplace_back("HTTP/1.1 200 Connection Established\r\n\r\n");
  18479. // The origin requests client certificates.
  18480. SSLSocketDataProvider ssl_origin2(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  18481. ssl_origin2.cert_request_info = cert_request_info_origin.get();
  18482. StaticSocketDataProvider data2(mock_reads2, mock_writes2);
  18483. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  18484. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy2);
  18485. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin2);
  18486. // The client responds to the origin client certificate request on a new
  18487. // connection.
  18488. SSLSocketDataProvider ssl_proxy3(ASYNC, OK);
  18489. ssl_proxy3.expected_send_client_cert = true;
  18490. ssl_proxy3.expected_client_cert = identity_proxy->certificate();
  18491. std::vector<MockWrite> mock_writes3;
  18492. std::vector<MockRead> mock_reads3;
  18493. mock_writes3.emplace_back(
  18494. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18495. "Host: www.example.org:443\r\n"
  18496. "Proxy-Connection: keep-alive\r\n"
  18497. // Authenticate as proxyuser:proxypass.
  18498. "Proxy-Authorization: Basic cHJveHl1c2VyOnByb3h5cGFzcw==\r\n\r\n");
  18499. mock_reads3.emplace_back("HTTP/1.1 200 Connection Established\r\n\r\n");
  18500. SSLSocketDataProvider ssl_origin3(ASYNC, OK);
  18501. ssl_origin3.expected_send_client_cert = true;
  18502. ssl_origin3.expected_client_cert = identity_origin->certificate();
  18503. // The client sends the origin HTTP request, which results in another HTTP
  18504. // auth request.
  18505. mock_writes3.emplace_back(
  18506. "GET / HTTP/1.1\r\n"
  18507. "Host: www.example.org\r\n"
  18508. "Connection: keep-alive\r\n\r\n");
  18509. mock_reads3.emplace_back(
  18510. "HTTP/1.1 401 Unauthorized\r\n"
  18511. "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  18512. "Content-Length: 0\r\n\r\n");
  18513. // The client retries with credentials, and the request finally succeeds.
  18514. mock_writes3.emplace_back(
  18515. "GET / HTTP/1.1\r\n"
  18516. "Host: www.example.org\r\n"
  18517. "Connection: keep-alive\r\n"
  18518. // Authenticate as user:pass.
  18519. "Authorization: Basic dXNlcjpwYXNz\r\n\r\n");
  18520. mock_reads3.emplace_back(
  18521. "HTTP/1.1 200 OK\r\n"
  18522. "Content-Length: 0\r\n\r\n");
  18523. // The client makes another request. This should reuse the socket with all
  18524. // credentials cached.
  18525. mock_writes3.emplace_back(
  18526. "GET / HTTP/1.1\r\n"
  18527. "Host: www.example.org\r\n"
  18528. "Connection: keep-alive\r\n"
  18529. // Authenticate as user:pass.
  18530. "Authorization: Basic dXNlcjpwYXNz\r\n\r\n");
  18531. mock_reads3.emplace_back(
  18532. "HTTP/1.1 200 OK\r\n"
  18533. "Content-Length: 0\r\n\r\n");
  18534. StaticSocketDataProvider data3(mock_reads3, mock_writes3);
  18535. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  18536. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy3);
  18537. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin3);
  18538. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18539. // Start the request.
  18540. TestCompletionCallback callback;
  18541. auto trans =
  18542. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18543. int rv = callback.GetResult(
  18544. trans->Start(&request, callback.callback(), NetLogWithSource()));
  18545. // Handle the proxy client certificate challenge.
  18546. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  18547. SSLCertRequestInfo* cert_request_info =
  18548. trans->GetResponseInfo()->cert_request_info.get();
  18549. ASSERT_TRUE(cert_request_info);
  18550. EXPECT_TRUE(cert_request_info->is_proxy);
  18551. EXPECT_EQ(cert_request_info->host_and_port,
  18552. cert_request_info_proxy->host_and_port);
  18553. rv = callback.GetResult(trans->RestartWithCertificate(
  18554. identity_proxy->certificate(), identity_proxy->ssl_private_key(),
  18555. callback.callback()));
  18556. // Handle the proxy HTTP auth challenge.
  18557. ASSERT_THAT(rv, IsOk());
  18558. EXPECT_EQ(407, trans->GetResponseInfo()->headers->response_code());
  18559. EXPECT_TRUE(
  18560. CheckBasicSecureProxyAuth(trans->GetResponseInfo()->auth_challenge));
  18561. rv = callback.GetResult(trans->RestartWithAuth(
  18562. AuthCredentials(u"proxyuser", u"proxypass"), callback.callback()));
  18563. // Handle the origin client certificate challenge.
  18564. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  18565. cert_request_info = trans->GetResponseInfo()->cert_request_info.get();
  18566. ASSERT_TRUE(cert_request_info);
  18567. EXPECT_FALSE(cert_request_info->is_proxy);
  18568. EXPECT_EQ(cert_request_info->host_and_port,
  18569. cert_request_info_origin->host_and_port);
  18570. rv = callback.GetResult(trans->RestartWithCertificate(
  18571. identity_origin->certificate(), identity_origin->ssl_private_key(),
  18572. callback.callback()));
  18573. // Handle the origin HTTP auth challenge.
  18574. ASSERT_THAT(rv, IsOk());
  18575. EXPECT_EQ(401, trans->GetResponseInfo()->headers->response_code());
  18576. EXPECT_TRUE(
  18577. CheckBasicSecureServerAuth(trans->GetResponseInfo()->auth_challenge));
  18578. rv = callback.GetResult(trans->RestartWithAuth(
  18579. AuthCredentials(u"user", u"pass"), callback.callback()));
  18580. // The request completes.
  18581. ASSERT_THAT(rv, IsOk());
  18582. EXPECT_EQ(200, trans->GetResponseInfo()->headers->response_code());
  18583. // Make a second request. This time all credentials are cached.
  18584. trans =
  18585. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18586. ASSERT_THAT(callback.GetResult(trans->Start(&request, callback.callback(),
  18587. NetLogWithSource())),
  18588. IsOk());
  18589. EXPECT_EQ(200, trans->GetResponseInfo()->headers->response_code());
  18590. }
  18591. // Test the proxy and origin server each requesting both TLS client certificates
  18592. // and HTTP auth and each HTTP auth closing the connection. This is a regression
  18593. // test for https://crbug.com/946406.
  18594. TEST_F(HttpNetworkTransactionTest, AuthEverythingWithConnectClose) {
  18595. // Note these hosts must match the CheckBasic*Auth() functions.
  18596. session_deps_.proxy_resolution_service =
  18597. ConfiguredProxyResolutionService::CreateFixedForTest(
  18598. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  18599. auto cert_request_info_proxy = base::MakeRefCounted<SSLCertRequestInfo>();
  18600. cert_request_info_proxy->host_and_port = HostPortPair("myproxy", 70);
  18601. std::unique_ptr<FakeClientCertIdentity> identity_proxy =
  18602. FakeClientCertIdentity::CreateFromCertAndKeyFiles(
  18603. GetTestCertsDirectory(), "client_1.pem", "client_1.pk8");
  18604. ASSERT_TRUE(identity_proxy);
  18605. auto cert_request_info_origin = base::MakeRefCounted<SSLCertRequestInfo>();
  18606. cert_request_info_origin->host_and_port =
  18607. HostPortPair("www.example.org", 443);
  18608. std::unique_ptr<FakeClientCertIdentity> identity_origin =
  18609. FakeClientCertIdentity::CreateFromCertAndKeyFiles(
  18610. GetTestCertsDirectory(), "client_2.pem", "client_2.pk8");
  18611. ASSERT_TRUE(identity_origin);
  18612. HttpRequestInfo request;
  18613. request.method = "GET";
  18614. request.url = GURL("https://www.example.org/");
  18615. request.traffic_annotation =
  18616. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18617. // First, the client connects to the proxy, which requests a client
  18618. // certificate.
  18619. SSLSocketDataProvider ssl_proxy1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  18620. ssl_proxy1.cert_request_info = cert_request_info_proxy.get();
  18621. ssl_proxy1.expected_send_client_cert = false;
  18622. StaticSocketDataProvider data1;
  18623. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  18624. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy1);
  18625. // The client responds with a certificate on a new connection. The handshake
  18626. // succeeds.
  18627. SSLSocketDataProvider ssl_proxy2(ASYNC, OK);
  18628. ssl_proxy2.expected_send_client_cert = true;
  18629. ssl_proxy2.expected_client_cert = identity_proxy->certificate();
  18630. // The client attempts an HTTP CONNECT, but the proxy requests basic auth.
  18631. std::vector<MockWrite> mock_writes2;
  18632. std::vector<MockRead> mock_reads2;
  18633. mock_writes2.emplace_back(
  18634. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18635. "Host: www.example.org:443\r\n"
  18636. "Proxy-Connection: keep-alive\r\n\r\n");
  18637. mock_reads2.emplace_back(
  18638. "HTTP/1.1 407 Proxy Authentication Required\r\n"
  18639. "Content-Length: 0\r\n"
  18640. "Proxy-Connection: close\r\n"
  18641. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n\r\n");
  18642. StaticSocketDataProvider data2(mock_reads2, mock_writes2);
  18643. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  18644. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy2);
  18645. // The client retries with credentials on a new connection.
  18646. SSLSocketDataProvider ssl_proxy3(ASYNC, OK);
  18647. ssl_proxy3.expected_send_client_cert = true;
  18648. ssl_proxy3.expected_client_cert = identity_proxy->certificate();
  18649. std::vector<MockWrite> mock_writes3;
  18650. std::vector<MockRead> mock_reads3;
  18651. mock_writes3.emplace_back(
  18652. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18653. "Host: www.example.org:443\r\n"
  18654. "Proxy-Connection: keep-alive\r\n"
  18655. // Authenticate as proxyuser:proxypass.
  18656. "Proxy-Authorization: Basic cHJveHl1c2VyOnByb3h5cGFzcw==\r\n\r\n");
  18657. mock_reads3.emplace_back("HTTP/1.1 200 Connection Established\r\n\r\n");
  18658. // The origin requests client certificates.
  18659. SSLSocketDataProvider ssl_origin3(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  18660. ssl_origin3.cert_request_info = cert_request_info_origin.get();
  18661. StaticSocketDataProvider data3(mock_reads3, mock_writes3);
  18662. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  18663. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy3);
  18664. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin3);
  18665. // The client responds to the origin client certificate request on a new
  18666. // connection.
  18667. SSLSocketDataProvider ssl_proxy4(ASYNC, OK);
  18668. ssl_proxy4.expected_send_client_cert = true;
  18669. ssl_proxy4.expected_client_cert = identity_proxy->certificate();
  18670. std::vector<MockWrite> mock_writes4;
  18671. std::vector<MockRead> mock_reads4;
  18672. mock_writes4.emplace_back(
  18673. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18674. "Host: www.example.org:443\r\n"
  18675. "Proxy-Connection: keep-alive\r\n"
  18676. // Authenticate as proxyuser:proxypass.
  18677. "Proxy-Authorization: Basic cHJveHl1c2VyOnByb3h5cGFzcw==\r\n\r\n");
  18678. mock_reads4.emplace_back("HTTP/1.1 200 Connection Established\r\n\r\n");
  18679. SSLSocketDataProvider ssl_origin4(ASYNC, OK);
  18680. ssl_origin4.expected_send_client_cert = true;
  18681. ssl_origin4.expected_client_cert = identity_origin->certificate();
  18682. // The client sends the origin HTTP request, which results in another HTTP
  18683. // auth request and closed connection.
  18684. mock_writes4.emplace_back(
  18685. "GET / HTTP/1.1\r\n"
  18686. "Host: www.example.org\r\n"
  18687. "Connection: keep-alive\r\n\r\n");
  18688. mock_reads4.emplace_back(
  18689. "HTTP/1.1 401 Unauthorized\r\n"
  18690. "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"
  18691. "Connection: close\r\n"
  18692. "Content-Length: 0\r\n\r\n");
  18693. StaticSocketDataProvider data4(mock_reads4, mock_writes4);
  18694. session_deps_.socket_factory->AddSocketDataProvider(&data4);
  18695. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy4);
  18696. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin4);
  18697. // The client retries with credentials on a new connection, and the request
  18698. // finally succeeds.
  18699. SSLSocketDataProvider ssl_proxy5(ASYNC, OK);
  18700. ssl_proxy5.expected_send_client_cert = true;
  18701. ssl_proxy5.expected_client_cert = identity_proxy->certificate();
  18702. std::vector<MockWrite> mock_writes5;
  18703. std::vector<MockRead> mock_reads5;
  18704. mock_writes5.emplace_back(
  18705. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18706. "Host: www.example.org:443\r\n"
  18707. "Proxy-Connection: keep-alive\r\n"
  18708. // Authenticate as proxyuser:proxypass.
  18709. "Proxy-Authorization: Basic cHJveHl1c2VyOnByb3h5cGFzcw==\r\n\r\n");
  18710. mock_reads5.emplace_back("HTTP/1.1 200 Connection Established\r\n\r\n");
  18711. SSLSocketDataProvider ssl_origin5(ASYNC, OK);
  18712. ssl_origin5.expected_send_client_cert = true;
  18713. ssl_origin5.expected_client_cert = identity_origin->certificate();
  18714. mock_writes5.emplace_back(
  18715. "GET / HTTP/1.1\r\n"
  18716. "Host: www.example.org\r\n"
  18717. "Connection: keep-alive\r\n"
  18718. // Authenticate as user:pass.
  18719. "Authorization: Basic dXNlcjpwYXNz\r\n\r\n");
  18720. mock_reads5.emplace_back(
  18721. "HTTP/1.1 200 OK\r\n"
  18722. "Connection: close\r\n"
  18723. "Content-Length: 0\r\n\r\n");
  18724. StaticSocketDataProvider data5(mock_reads5, mock_writes5);
  18725. session_deps_.socket_factory->AddSocketDataProvider(&data5);
  18726. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy5);
  18727. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin5);
  18728. // The client makes a second request. This needs yet another connection, but
  18729. // all credentials are cached.
  18730. SSLSocketDataProvider ssl_proxy6(ASYNC, OK);
  18731. ssl_proxy6.expected_send_client_cert = true;
  18732. ssl_proxy6.expected_client_cert = identity_proxy->certificate();
  18733. std::vector<MockWrite> mock_writes6;
  18734. std::vector<MockRead> mock_reads6;
  18735. mock_writes6.emplace_back(
  18736. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18737. "Host: www.example.org:443\r\n"
  18738. "Proxy-Connection: keep-alive\r\n"
  18739. // Authenticate as proxyuser:proxypass.
  18740. "Proxy-Authorization: Basic cHJveHl1c2VyOnByb3h5cGFzcw==\r\n\r\n");
  18741. mock_reads6.emplace_back("HTTP/1.1 200 Connection Established\r\n\r\n");
  18742. SSLSocketDataProvider ssl_origin6(ASYNC, OK);
  18743. ssl_origin6.expected_send_client_cert = true;
  18744. ssl_origin6.expected_client_cert = identity_origin->certificate();
  18745. mock_writes6.emplace_back(
  18746. "GET / HTTP/1.1\r\n"
  18747. "Host: www.example.org\r\n"
  18748. "Connection: keep-alive\r\n"
  18749. // Authenticate as user:pass.
  18750. "Authorization: Basic dXNlcjpwYXNz\r\n\r\n");
  18751. mock_reads6.emplace_back(
  18752. "HTTP/1.1 200 OK\r\n"
  18753. "Connection: close\r\n"
  18754. "Content-Length: 0\r\n\r\n");
  18755. StaticSocketDataProvider data6(mock_reads6, mock_writes6);
  18756. session_deps_.socket_factory->AddSocketDataProvider(&data6);
  18757. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy6);
  18758. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin6);
  18759. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18760. // Start the request.
  18761. TestCompletionCallback callback;
  18762. auto trans =
  18763. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18764. int rv = callback.GetResult(
  18765. trans->Start(&request, callback.callback(), NetLogWithSource()));
  18766. // Handle the proxy client certificate challenge.
  18767. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  18768. SSLCertRequestInfo* cert_request_info =
  18769. trans->GetResponseInfo()->cert_request_info.get();
  18770. ASSERT_TRUE(cert_request_info);
  18771. EXPECT_TRUE(cert_request_info->is_proxy);
  18772. EXPECT_EQ(cert_request_info->host_and_port,
  18773. cert_request_info_proxy->host_and_port);
  18774. rv = callback.GetResult(trans->RestartWithCertificate(
  18775. identity_proxy->certificate(), identity_proxy->ssl_private_key(),
  18776. callback.callback()));
  18777. // Handle the proxy HTTP auth challenge.
  18778. ASSERT_THAT(rv, IsOk());
  18779. EXPECT_EQ(407, trans->GetResponseInfo()->headers->response_code());
  18780. EXPECT_TRUE(
  18781. CheckBasicSecureProxyAuth(trans->GetResponseInfo()->auth_challenge));
  18782. rv = callback.GetResult(trans->RestartWithAuth(
  18783. AuthCredentials(u"proxyuser", u"proxypass"), callback.callback()));
  18784. // Handle the origin client certificate challenge.
  18785. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  18786. cert_request_info = trans->GetResponseInfo()->cert_request_info.get();
  18787. ASSERT_TRUE(cert_request_info);
  18788. EXPECT_FALSE(cert_request_info->is_proxy);
  18789. EXPECT_EQ(cert_request_info->host_and_port,
  18790. cert_request_info_origin->host_and_port);
  18791. rv = callback.GetResult(trans->RestartWithCertificate(
  18792. identity_origin->certificate(), identity_origin->ssl_private_key(),
  18793. callback.callback()));
  18794. // Handle the origin HTTP auth challenge.
  18795. ASSERT_THAT(rv, IsOk());
  18796. EXPECT_EQ(401, trans->GetResponseInfo()->headers->response_code());
  18797. EXPECT_TRUE(
  18798. CheckBasicSecureServerAuth(trans->GetResponseInfo()->auth_challenge));
  18799. rv = callback.GetResult(trans->RestartWithAuth(
  18800. AuthCredentials(u"user", u"pass"), callback.callback()));
  18801. // The request completes.
  18802. ASSERT_THAT(rv, IsOk());
  18803. EXPECT_EQ(200, trans->GetResponseInfo()->headers->response_code());
  18804. // Make a second request. This time all credentials are cached.
  18805. trans =
  18806. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18807. ASSERT_THAT(callback.GetResult(trans->Start(&request, callback.callback(),
  18808. NetLogWithSource())),
  18809. IsOk());
  18810. EXPECT_EQ(200, trans->GetResponseInfo()->headers->response_code());
  18811. }
  18812. // Test the proxy requesting HTTP auth and the server requesting TLS client
  18813. // certificates. This is a regression test for https://crbug.com/946406.
  18814. TEST_F(HttpNetworkTransactionTest, ProxyHTTPAndServerTLSAuth) {
  18815. // Note these hosts must match the CheckBasic*Auth() functions.
  18816. session_deps_.proxy_resolution_service =
  18817. ConfiguredProxyResolutionService::CreateFixedForTest(
  18818. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  18819. auto cert_request_info_origin = base::MakeRefCounted<SSLCertRequestInfo>();
  18820. cert_request_info_origin->host_and_port =
  18821. HostPortPair("www.example.org", 443);
  18822. std::unique_ptr<FakeClientCertIdentity> identity_origin =
  18823. FakeClientCertIdentity::CreateFromCertAndKeyFiles(
  18824. GetTestCertsDirectory(), "client_2.pem", "client_2.pk8");
  18825. ASSERT_TRUE(identity_origin);
  18826. HttpRequestInfo request;
  18827. request.method = "GET";
  18828. request.url = GURL("https://www.example.org/");
  18829. request.traffic_annotation =
  18830. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18831. // The client connects to the proxy. The handshake succeeds.
  18832. SSLSocketDataProvider ssl_proxy1(ASYNC, OK);
  18833. // The client attempts an HTTP CONNECT, but the proxy requests basic auth.
  18834. std::vector<MockWrite> mock_writes1;
  18835. std::vector<MockRead> mock_reads1;
  18836. mock_writes1.emplace_back(
  18837. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18838. "Host: www.example.org:443\r\n"
  18839. "Proxy-Connection: keep-alive\r\n\r\n");
  18840. mock_reads1.emplace_back(
  18841. "HTTP/1.1 407 Proxy Authentication Required\r\n"
  18842. "Content-Length: 0\r\n"
  18843. "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n\r\n");
  18844. // The client retries with credentials, and the request finally succeeds.
  18845. mock_writes1.emplace_back(
  18846. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18847. "Host: www.example.org:443\r\n"
  18848. "Proxy-Connection: keep-alive\r\n"
  18849. // Authenticate as proxyuser:proxypass.
  18850. "Proxy-Authorization: Basic cHJveHl1c2VyOnByb3h5cGFzcw==\r\n\r\n");
  18851. mock_reads1.emplace_back("HTTP/1.1 200 Connection Established\r\n\r\n");
  18852. // The origin requests client certificates.
  18853. SSLSocketDataProvider ssl_origin1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  18854. ssl_origin1.cert_request_info = cert_request_info_origin.get();
  18855. StaticSocketDataProvider data1(mock_reads1, mock_writes1);
  18856. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  18857. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy1);
  18858. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin1);
  18859. // The client responds to the origin client certificate request on a new
  18860. // connection.
  18861. SSLSocketDataProvider ssl_proxy2(ASYNC, OK);
  18862. std::vector<MockWrite> mock_writes2;
  18863. std::vector<MockRead> mock_reads2;
  18864. mock_writes2.emplace_back(
  18865. "CONNECT www.example.org:443 HTTP/1.1\r\n"
  18866. "Host: www.example.org:443\r\n"
  18867. "Proxy-Connection: keep-alive\r\n"
  18868. // Authenticate as proxyuser:proxypass.
  18869. "Proxy-Authorization: Basic cHJveHl1c2VyOnByb3h5cGFzcw==\r\n\r\n");
  18870. mock_reads2.emplace_back("HTTP/1.1 200 Connection Established\r\n\r\n");
  18871. SSLSocketDataProvider ssl_origin2(ASYNC, OK);
  18872. ssl_origin2.expected_send_client_cert = true;
  18873. ssl_origin2.expected_client_cert = identity_origin->certificate();
  18874. // The client sends the origin HTTP request, which succeeds.
  18875. mock_writes2.emplace_back(
  18876. "GET / HTTP/1.1\r\n"
  18877. "Host: www.example.org\r\n"
  18878. "Connection: keep-alive\r\n\r\n");
  18879. mock_reads2.emplace_back(
  18880. "HTTP/1.1 200 OK\r\n"
  18881. "Content-Length: 0\r\n\r\n");
  18882. StaticSocketDataProvider data2(mock_reads2, mock_writes2);
  18883. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  18884. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy2);
  18885. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin2);
  18886. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18887. // Start the request.
  18888. TestCompletionCallback callback;
  18889. auto trans =
  18890. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18891. int rv = callback.GetResult(
  18892. trans->Start(&request, callback.callback(), NetLogWithSource()));
  18893. // Handle the proxy HTTP auth challenge.
  18894. ASSERT_THAT(rv, IsOk());
  18895. EXPECT_EQ(407, trans->GetResponseInfo()->headers->response_code());
  18896. EXPECT_TRUE(
  18897. CheckBasicSecureProxyAuth(trans->GetResponseInfo()->auth_challenge));
  18898. rv = callback.GetResult(trans->RestartWithAuth(
  18899. AuthCredentials(u"proxyuser", u"proxypass"), callback.callback()));
  18900. // Handle the origin client certificate challenge.
  18901. ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  18902. SSLCertRequestInfo* cert_request_info =
  18903. trans->GetResponseInfo()->cert_request_info.get();
  18904. ASSERT_TRUE(cert_request_info);
  18905. EXPECT_FALSE(cert_request_info->is_proxy);
  18906. EXPECT_EQ(cert_request_info->host_and_port,
  18907. cert_request_info_origin->host_and_port);
  18908. rv = callback.GetResult(trans->RestartWithCertificate(
  18909. identity_origin->certificate(), identity_origin->ssl_private_key(),
  18910. callback.callback()));
  18911. // The request completes.
  18912. ASSERT_THAT(rv, IsOk());
  18913. EXPECT_EQ(200, trans->GetResponseInfo()->headers->response_code());
  18914. }
  18915. // Test that socket reuse works with client certificates.
  18916. TEST_F(HttpNetworkTransactionTest, ClientCertSocketReuse) {
  18917. auto cert_request_info = base::MakeRefCounted<SSLCertRequestInfo>();
  18918. cert_request_info->host_and_port = HostPortPair("www.example.org", 443);
  18919. std::unique_ptr<FakeClientCertIdentity> identity =
  18920. FakeClientCertIdentity::CreateFromCertAndKeyFiles(
  18921. GetTestCertsDirectory(), "client_1.pem", "client_1.pk8");
  18922. ASSERT_TRUE(identity);
  18923. HttpRequestInfo request1;
  18924. request1.method = "GET";
  18925. request1.url = GURL("https://www.example.org/a");
  18926. request1.traffic_annotation =
  18927. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18928. HttpRequestInfo request2;
  18929. request2.method = "GET";
  18930. request2.url = GURL("https://www.example.org/b");
  18931. request2.traffic_annotation =
  18932. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  18933. // The first connection results in a client certificate request.
  18934. StaticSocketDataProvider data1;
  18935. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  18936. SSLSocketDataProvider ssl1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED);
  18937. ssl1.cert_request_info = cert_request_info.get();
  18938. ssl1.expected_send_client_cert = false;
  18939. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  18940. // The second connection succeeds and is usable for both requests.
  18941. MockWrite mock_writes[] = {
  18942. MockWrite("GET /a HTTP/1.1\r\n"
  18943. "Host: www.example.org\r\n"
  18944. "Connection: keep-alive\r\n\r\n"),
  18945. MockWrite("GET /b HTTP/1.1\r\n"
  18946. "Host: www.example.org\r\n"
  18947. "Connection: keep-alive\r\n\r\n"),
  18948. };
  18949. MockRead mock_reads[] = {
  18950. MockRead("HTTP/1.1 200 OK\r\n"
  18951. "Content-Length: 0\r\n\r\n"),
  18952. MockRead("HTTP/1.1 200 OK\r\n"
  18953. "Content-Length: 0\r\n\r\n"),
  18954. };
  18955. StaticSocketDataProvider data2(mock_reads, mock_writes);
  18956. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  18957. SSLSocketDataProvider ssl2(ASYNC, OK);
  18958. ssl2.expected_send_client_cert = true;
  18959. ssl2.expected_client_cert = identity->certificate();
  18960. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  18961. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  18962. // Start the first request. It succeeds after providing client certificates.
  18963. TestCompletionCallback callback;
  18964. auto trans =
  18965. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18966. ASSERT_THAT(callback.GetResult(trans->Start(&request1, callback.callback(),
  18967. NetLogWithSource())),
  18968. IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  18969. SSLCertRequestInfo* info = trans->GetResponseInfo()->cert_request_info.get();
  18970. ASSERT_TRUE(info);
  18971. EXPECT_FALSE(info->is_proxy);
  18972. EXPECT_EQ(info->host_and_port, cert_request_info->host_and_port);
  18973. ASSERT_THAT(callback.GetResult(trans->RestartWithCertificate(
  18974. identity->certificate(), identity->ssl_private_key(),
  18975. callback.callback())),
  18976. IsOk());
  18977. EXPECT_EQ(200, trans->GetResponseInfo()->headers->response_code());
  18978. // Make the second request. It completes without requesting client
  18979. // certificates.
  18980. trans =
  18981. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  18982. ASSERT_THAT(callback.GetResult(trans->Start(&request2, callback.callback(),
  18983. NetLogWithSource())),
  18984. IsOk());
  18985. EXPECT_EQ(200, trans->GetResponseInfo()->headers->response_code());
  18986. }
  18987. // Test for kPartitionConnectionsByNetworkIsolationKey. Runs 3 requests in
  18988. // sequence with two different NetworkIsolationKeys, the first and last have the
  18989. // same key, the second a different one. Checks that the requests are
  18990. // partitioned across sockets as expected.
  18991. TEST_F(HttpNetworkTransactionTest, NetworkIsolation) {
  18992. const SchemefulSite kSite1(GURL("http://origin1/"));
  18993. const SchemefulSite kSite2(GURL("http://origin2/"));
  18994. NetworkIsolationKey network_isolation_key1(kSite1, kSite1);
  18995. NetworkIsolationKey network_isolation_key2(kSite2, kSite2);
  18996. for (bool partition_connections : {false, true}) {
  18997. SCOPED_TRACE(partition_connections);
  18998. base::test::ScopedFeatureList feature_list;
  18999. if (partition_connections) {
  19000. feature_list.InitAndEnableFeature(
  19001. features::kPartitionConnectionsByNetworkIsolationKey);
  19002. } else {
  19003. feature_list.InitAndDisableFeature(
  19004. features::kPartitionConnectionsByNetworkIsolationKey);
  19005. }
  19006. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  19007. // Reads and writes for the unpartitioned case, where only one socket is
  19008. // used.
  19009. const MockWrite kUnpartitionedWrites[] = {
  19010. MockWrite("GET /1 HTTP/1.1\r\n"
  19011. "Host: foo.test\r\n"
  19012. "Connection: keep-alive\r\n\r\n"),
  19013. MockWrite("GET /2 HTTP/1.1\r\n"
  19014. "Host: foo.test\r\n"
  19015. "Connection: keep-alive\r\n\r\n"),
  19016. MockWrite("GET /3 HTTP/1.1\r\n"
  19017. "Host: foo.test\r\n"
  19018. "Connection: keep-alive\r\n\r\n"),
  19019. };
  19020. const MockRead kUnpartitionedReads[] = {
  19021. MockRead("HTTP/1.1 200 OK\r\n"
  19022. "Connection: keep-alive\r\n"
  19023. "Content-Length: 1\r\n\r\n"
  19024. "1"),
  19025. MockRead("HTTP/1.1 200 OK\r\n"
  19026. "Connection: keep-alive\r\n"
  19027. "Content-Length: 1\r\n\r\n"
  19028. "2"),
  19029. MockRead("HTTP/1.1 200 OK\r\n"
  19030. "Connection: keep-alive\r\n"
  19031. "Content-Length: 1\r\n\r\n"
  19032. "3"),
  19033. };
  19034. StaticSocketDataProvider unpartitioned_data(kUnpartitionedReads,
  19035. kUnpartitionedWrites);
  19036. // Reads and writes for the partitioned case, where two sockets are used.
  19037. const MockWrite kPartitionedWrites1[] = {
  19038. MockWrite("GET /1 HTTP/1.1\r\n"
  19039. "Host: foo.test\r\n"
  19040. "Connection: keep-alive\r\n\r\n"),
  19041. MockWrite("GET /3 HTTP/1.1\r\n"
  19042. "Host: foo.test\r\n"
  19043. "Connection: keep-alive\r\n\r\n"),
  19044. };
  19045. const MockRead kPartitionedReads1[] = {
  19046. MockRead("HTTP/1.1 200 OK\r\n"
  19047. "Connection: keep-alive\r\n"
  19048. "Content-Length: 1\r\n\r\n"
  19049. "1"),
  19050. MockRead("HTTP/1.1 200 OK\r\n"
  19051. "Connection: keep-alive\r\n"
  19052. "Content-Length: 1\r\n\r\n"
  19053. "3"),
  19054. };
  19055. const MockWrite kPartitionedWrites2[] = {
  19056. MockWrite("GET /2 HTTP/1.1\r\n"
  19057. "Host: foo.test\r\n"
  19058. "Connection: keep-alive\r\n\r\n"),
  19059. };
  19060. const MockRead kPartitionedReads2[] = {
  19061. MockRead("HTTP/1.1 200 OK\r\n"
  19062. "Connection: keep-alive\r\n"
  19063. "Content-Length: 1\r\n\r\n"
  19064. "2"),
  19065. };
  19066. StaticSocketDataProvider partitioned_data1(kPartitionedReads1,
  19067. kPartitionedWrites1);
  19068. StaticSocketDataProvider partitioned_data2(kPartitionedReads2,
  19069. kPartitionedWrites2);
  19070. if (partition_connections) {
  19071. session_deps_.socket_factory->AddSocketDataProvider(&partitioned_data1);
  19072. session_deps_.socket_factory->AddSocketDataProvider(&partitioned_data2);
  19073. } else {
  19074. session_deps_.socket_factory->AddSocketDataProvider(&unpartitioned_data);
  19075. }
  19076. TestCompletionCallback callback;
  19077. HttpRequestInfo request1;
  19078. request1.method = "GET";
  19079. request1.url = GURL("http://foo.test/1");
  19080. request1.traffic_annotation =
  19081. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19082. request1.network_isolation_key = network_isolation_key1;
  19083. auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
  19084. session.get());
  19085. int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  19086. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19087. std::string response_data1;
  19088. EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk());
  19089. EXPECT_EQ("1", response_data1);
  19090. trans1.reset();
  19091. HttpRequestInfo request2;
  19092. request2.method = "GET";
  19093. request2.url = GURL("http://foo.test/2");
  19094. request2.traffic_annotation =
  19095. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19096. request2.network_isolation_key = network_isolation_key2;
  19097. auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
  19098. session.get());
  19099. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  19100. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19101. std::string response_data2;
  19102. EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk());
  19103. EXPECT_EQ("2", response_data2);
  19104. trans2.reset();
  19105. HttpRequestInfo request3;
  19106. request3.method = "GET";
  19107. request3.url = GURL("http://foo.test/3");
  19108. request3.traffic_annotation =
  19109. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19110. request3.network_isolation_key = network_isolation_key1;
  19111. auto trans3 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY,
  19112. session.get());
  19113. rv = trans3->Start(&request3, callback.callback(), NetLogWithSource());
  19114. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19115. std::string response_data3;
  19116. EXPECT_THAT(ReadTransaction(trans3.get(), &response_data3), IsOk());
  19117. EXPECT_EQ("3", response_data3);
  19118. trans3.reset();
  19119. }
  19120. }
  19121. TEST_F(HttpNetworkTransactionTest, NetworkIsolationH2) {
  19122. const SchemefulSite kSite1(GURL("http://origin1/"));
  19123. const SchemefulSite kSite2(GURL("http://origin2/"));
  19124. NetworkIsolationKey network_isolation_key1(kSite1, kSite1);
  19125. NetworkIsolationKey network_isolation_key2(kSite2, kSite2);
  19126. // Whether to use an H2 proxy. When false, uses HTTPS H2 requests without a
  19127. // proxy, when true, uses HTTP requests over an H2 proxy. It's unnecessary to
  19128. // test tunneled HTTPS over an H2 proxy, since that path sets up H2 sessions
  19129. // the same way as the HTTP over H2 proxy case.
  19130. for (bool use_proxy : {false, true}) {
  19131. SCOPED_TRACE(use_proxy);
  19132. if (use_proxy) {
  19133. session_deps_.proxy_resolution_service =
  19134. ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest(
  19135. "HTTPS proxy:443", TRAFFIC_ANNOTATION_FOR_TESTS);
  19136. } else {
  19137. session_deps_.proxy_resolution_service =
  19138. ConfiguredProxyResolutionService::CreateDirect();
  19139. }
  19140. const char* url1 = nullptr;
  19141. const char* url2 = nullptr;
  19142. const char* url3 = nullptr;
  19143. if (use_proxy) {
  19144. url1 = "http://foo.test/1";
  19145. url2 = "http://foo.test/2";
  19146. url3 = "http://foo.test/3";
  19147. } else {
  19148. url1 = "https://foo.test/1";
  19149. url2 = "https://foo.test/2";
  19150. url3 = "https://foo.test/3";
  19151. }
  19152. for (bool partition_connections : {false, true}) {
  19153. SCOPED_TRACE(partition_connections);
  19154. base::test::ScopedFeatureList feature_list;
  19155. if (partition_connections) {
  19156. feature_list.InitAndEnableFeature(
  19157. features::kPartitionConnectionsByNetworkIsolationKey);
  19158. } else {
  19159. feature_list.InitAndDisableFeature(
  19160. features::kPartitionConnectionsByNetworkIsolationKey);
  19161. }
  19162. std::unique_ptr<HttpNetworkSession> session(
  19163. CreateSession(&session_deps_));
  19164. // Reads and writes for the unpartitioned case, where only one socket is
  19165. // used.
  19166. SpdyTestUtil spdy_util;
  19167. spdy::SpdySerializedFrame unpartitioned_req1(
  19168. spdy_util.ConstructSpdyGet(url1, 1, LOWEST));
  19169. spdy::SpdySerializedFrame unpartitioned_response1(
  19170. spdy_util.ConstructSpdyGetReply(nullptr, 0, 1));
  19171. spdy::SpdySerializedFrame unpartitioned_body1(
  19172. spdy_util.ConstructSpdyDataFrame(1, "1", true));
  19173. spdy_util.UpdateWithStreamDestruction(1);
  19174. spdy::SpdySerializedFrame unpartitioned_req2(
  19175. spdy_util.ConstructSpdyGet(url2, 3, LOWEST));
  19176. spdy::SpdySerializedFrame unpartitioned_response2(
  19177. spdy_util.ConstructSpdyGetReply(nullptr, 0, 3));
  19178. spdy::SpdySerializedFrame unpartitioned_body2(
  19179. spdy_util.ConstructSpdyDataFrame(3, "2", true));
  19180. spdy_util.UpdateWithStreamDestruction(3);
  19181. spdy::SpdySerializedFrame unpartitioned_req3(
  19182. spdy_util.ConstructSpdyGet(url3, 5, LOWEST));
  19183. spdy::SpdySerializedFrame unpartitioned_response3(
  19184. spdy_util.ConstructSpdyGetReply(nullptr, 0, 5));
  19185. spdy::SpdySerializedFrame unpartitioned_body3(
  19186. spdy_util.ConstructSpdyDataFrame(5, "3", true));
  19187. const MockWrite kUnpartitionedWrites[] = {
  19188. CreateMockWrite(unpartitioned_req1, 0),
  19189. CreateMockWrite(unpartitioned_req2, 3),
  19190. CreateMockWrite(unpartitioned_req3, 6),
  19191. };
  19192. const MockRead kUnpartitionedReads[] = {
  19193. CreateMockRead(unpartitioned_response1, 1),
  19194. CreateMockRead(unpartitioned_body1, 2),
  19195. CreateMockRead(unpartitioned_response2, 4),
  19196. CreateMockRead(unpartitioned_body2, 5),
  19197. CreateMockRead(unpartitioned_response3, 7),
  19198. CreateMockRead(unpartitioned_body3, 8),
  19199. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 9),
  19200. };
  19201. SequencedSocketData unpartitioned_data(kUnpartitionedReads,
  19202. kUnpartitionedWrites);
  19203. // Reads and writes for the partitioned case, where two sockets are used.
  19204. SpdyTestUtil spdy_util2;
  19205. spdy::SpdySerializedFrame partitioned_req1(
  19206. spdy_util2.ConstructSpdyGet(url1, 1, LOWEST));
  19207. spdy::SpdySerializedFrame partitioned_response1(
  19208. spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1));
  19209. spdy::SpdySerializedFrame partitioned_body1(
  19210. spdy_util2.ConstructSpdyDataFrame(1, "1", true));
  19211. spdy_util2.UpdateWithStreamDestruction(1);
  19212. spdy::SpdySerializedFrame partitioned_req3(
  19213. spdy_util2.ConstructSpdyGet(url3, 3, LOWEST));
  19214. spdy::SpdySerializedFrame partitioned_response3(
  19215. spdy_util2.ConstructSpdyGetReply(nullptr, 0, 3));
  19216. spdy::SpdySerializedFrame partitioned_body3(
  19217. spdy_util2.ConstructSpdyDataFrame(3, "3", true));
  19218. const MockWrite kPartitionedWrites1[] = {
  19219. CreateMockWrite(partitioned_req1, 0),
  19220. CreateMockWrite(partitioned_req3, 3),
  19221. };
  19222. const MockRead kPartitionedReads1[] = {
  19223. CreateMockRead(partitioned_response1, 1),
  19224. CreateMockRead(partitioned_body1, 2),
  19225. CreateMockRead(partitioned_response3, 4),
  19226. CreateMockRead(partitioned_body3, 5),
  19227. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6),
  19228. };
  19229. SpdyTestUtil spdy_util3;
  19230. spdy::SpdySerializedFrame partitioned_req2(
  19231. spdy_util3.ConstructSpdyGet(url2, 1, LOWEST));
  19232. spdy::SpdySerializedFrame partitioned_response2(
  19233. spdy_util3.ConstructSpdyGetReply(nullptr, 0, 1));
  19234. spdy::SpdySerializedFrame partitioned_body2(
  19235. spdy_util3.ConstructSpdyDataFrame(1, "2", true));
  19236. const MockWrite kPartitionedWrites2[] = {
  19237. CreateMockWrite(partitioned_req2, 0),
  19238. };
  19239. const MockRead kPartitionedReads2[] = {
  19240. CreateMockRead(partitioned_response2, 1),
  19241. CreateMockRead(partitioned_body2, 2),
  19242. MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3),
  19243. };
  19244. SequencedSocketData partitioned_data1(kPartitionedReads1,
  19245. kPartitionedWrites1);
  19246. SequencedSocketData partitioned_data2(kPartitionedReads2,
  19247. kPartitionedWrites2);
  19248. // No need to segment SSLDataProviders by whether or not partitioning is
  19249. // enabled.
  19250. SSLSocketDataProvider ssl_data1(ASYNC, OK);
  19251. ssl_data1.next_proto = kProtoHTTP2;
  19252. SSLSocketDataProvider ssl_data2(ASYNC, OK);
  19253. ssl_data2.next_proto = kProtoHTTP2;
  19254. if (partition_connections) {
  19255. session_deps_.socket_factory->AddSocketDataProvider(&partitioned_data1);
  19256. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1);
  19257. session_deps_.socket_factory->AddSocketDataProvider(&partitioned_data2);
  19258. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data2);
  19259. } else {
  19260. session_deps_.socket_factory->AddSocketDataProvider(
  19261. &unpartitioned_data);
  19262. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1);
  19263. }
  19264. TestCompletionCallback callback;
  19265. HttpRequestInfo request1;
  19266. request1.method = "GET";
  19267. request1.url = GURL(url1);
  19268. request1.traffic_annotation =
  19269. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19270. request1.network_isolation_key = network_isolation_key1;
  19271. auto trans1 =
  19272. std::make_unique<HttpNetworkTransaction>(LOWEST, session.get());
  19273. int rv =
  19274. trans1->Start(&request1, callback.callback(), NetLogWithSource());
  19275. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19276. std::string response_data1;
  19277. EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk());
  19278. EXPECT_EQ("1", response_data1);
  19279. trans1.reset();
  19280. HttpRequestInfo request2;
  19281. request2.method = "GET";
  19282. request2.url = GURL(url2);
  19283. request2.traffic_annotation =
  19284. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19285. request2.network_isolation_key = network_isolation_key2;
  19286. auto trans2 =
  19287. std::make_unique<HttpNetworkTransaction>(LOWEST, session.get());
  19288. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  19289. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19290. std::string response_data2;
  19291. EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk());
  19292. EXPECT_EQ("2", response_data2);
  19293. trans2.reset();
  19294. HttpRequestInfo request3;
  19295. request3.method = "GET";
  19296. request3.url = GURL(url3);
  19297. request3.traffic_annotation =
  19298. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19299. request3.network_isolation_key = network_isolation_key1;
  19300. auto trans3 =
  19301. std::make_unique<HttpNetworkTransaction>(LOWEST, session.get());
  19302. rv = trans3->Start(&request3, callback.callback(), NetLogWithSource());
  19303. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19304. std::string response_data3;
  19305. EXPECT_THAT(ReadTransaction(trans3.get(), &response_data3), IsOk());
  19306. EXPECT_EQ("3", response_data3);
  19307. trans3.reset();
  19308. }
  19309. }
  19310. }
  19311. // Preconnect two sockets with different NetworkIsolationKeys when
  19312. // features::kPartitionConnectionsByNetworkIsolationKey is enabled. Then issue a
  19313. // request and make sure the correct socket is used. Loops three times,
  19314. // expecting to use the first preconnect, second preconnect, and neither.
  19315. TEST_F(HttpNetworkTransactionTest, NetworkIsolationPreconnect) {
  19316. base::test::ScopedFeatureList feature_list;
  19317. feature_list.InitAndEnableFeature(
  19318. features::kPartitionConnectionsByNetworkIsolationKey);
  19319. enum class TestCase {
  19320. kUseFirstPreconnect,
  19321. kUseSecondPreconnect,
  19322. kDontUsePreconnect,
  19323. };
  19324. const SchemefulSite kSite1(GURL("http://origin1/"));
  19325. const SchemefulSite kSite2(GURL("http://origin2/"));
  19326. const SchemefulSite kSite3(GURL("http://origin3/"));
  19327. NetworkIsolationKey preconnect1_isolation_key(kSite1, kSite1);
  19328. NetworkIsolationKey preconnect2_isolation_key(kSite2, kSite2);
  19329. NetworkIsolationKey not_preconnected_isolation_key(kSite3, kSite3);
  19330. // Test that only preconnects with
  19331. for (TestCase test_case :
  19332. {TestCase::kUseFirstPreconnect, TestCase::kUseSecondPreconnect,
  19333. TestCase::kDontUsePreconnect}) {
  19334. SpdySessionDependencies session_deps;
  19335. // Make DNS lookups completely synchronously, so preconnects complete
  19336. // immediately.
  19337. session_deps.host_resolver->set_synchronous_mode(true);
  19338. const MockWrite kMockWrites[] = {
  19339. MockWrite(ASYNC, 0,
  19340. "GET / HTTP/1.1\r\n"
  19341. "Host: www.foo.com\r\n"
  19342. "Connection: keep-alive\r\n\r\n"),
  19343. };
  19344. const MockRead kMockReads[] = {
  19345. MockRead(ASYNC, 1,
  19346. "HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"
  19347. "hello"),
  19348. };
  19349. // Used for the socket that will actually be used, which may or may not be
  19350. // one of the preconnects
  19351. SequencedSocketData used_socket_data(MockConnect(SYNCHRONOUS, OK),
  19352. kMockReads, kMockWrites);
  19353. // Used for the preconnects that won't actually be used.
  19354. SequencedSocketData preconnect1_data(MockConnect(SYNCHRONOUS, OK),
  19355. base::span<const MockRead>(),
  19356. base::span<const MockWrite>());
  19357. SequencedSocketData preconnect2_data(MockConnect(SYNCHRONOUS, OK),
  19358. base::span<const MockRead>(),
  19359. base::span<const MockWrite>());
  19360. NetworkIsolationKey network_isolation_key_for_request;
  19361. switch (test_case) {
  19362. case TestCase::kUseFirstPreconnect:
  19363. session_deps.socket_factory->AddSocketDataProvider(&used_socket_data);
  19364. session_deps.socket_factory->AddSocketDataProvider(&preconnect2_data);
  19365. network_isolation_key_for_request = preconnect1_isolation_key;
  19366. break;
  19367. case TestCase::kUseSecondPreconnect:
  19368. session_deps.socket_factory->AddSocketDataProvider(&preconnect1_data);
  19369. session_deps.socket_factory->AddSocketDataProvider(&used_socket_data);
  19370. network_isolation_key_for_request = preconnect2_isolation_key;
  19371. break;
  19372. case TestCase::kDontUsePreconnect:
  19373. session_deps.socket_factory->AddSocketDataProvider(&preconnect1_data);
  19374. session_deps.socket_factory->AddSocketDataProvider(&preconnect2_data);
  19375. session_deps.socket_factory->AddSocketDataProvider(&used_socket_data);
  19376. network_isolation_key_for_request = not_preconnected_isolation_key;
  19377. break;
  19378. }
  19379. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps));
  19380. // Preconnect sockets.
  19381. HttpRequestInfo request;
  19382. request.method = "GET";
  19383. request.url = GURL("http://www.foo.com/");
  19384. request.traffic_annotation =
  19385. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19386. request.network_isolation_key = preconnect1_isolation_key;
  19387. session->http_stream_factory()->PreconnectStreams(1, request);
  19388. request.network_isolation_key = preconnect2_isolation_key;
  19389. session->http_stream_factory()->PreconnectStreams(1, request);
  19390. request.network_isolation_key = network_isolation_key_for_request;
  19391. EXPECT_EQ(2, GetIdleSocketCountInTransportSocketPool(session.get()));
  19392. // Make the request.
  19393. TestCompletionCallback callback;
  19394. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  19395. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  19396. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  19397. rv = callback.WaitForResult();
  19398. EXPECT_THAT(rv, IsOk());
  19399. const HttpResponseInfo* response = trans.GetResponseInfo();
  19400. ASSERT_TRUE(response);
  19401. ASSERT_TRUE(response->headers);
  19402. EXPECT_EQ(200, response->headers->response_code());
  19403. std::string response_data;
  19404. rv = ReadTransaction(&trans, &response_data);
  19405. EXPECT_THAT(rv, IsOk());
  19406. EXPECT_EQ("hello", response_data);
  19407. if (test_case != TestCase::kDontUsePreconnect) {
  19408. EXPECT_EQ(2, GetIdleSocketCountInTransportSocketPool(session.get()));
  19409. } else {
  19410. EXPECT_EQ(3, GetIdleSocketCountInTransportSocketPool(session.get()));
  19411. }
  19412. }
  19413. }
  19414. // Test that the NetworkIsolationKey is passed down to SSLConfig so the session
  19415. // cache is isolated.
  19416. TEST_F(HttpNetworkTransactionTest, NetworkIsolationSSL) {
  19417. base::test::ScopedFeatureList feature_list;
  19418. feature_list.InitWithFeatures(
  19419. {features::kPartitionConnectionsByNetworkIsolationKey,
  19420. features::kPartitionSSLSessionsByNetworkIsolationKey},
  19421. {});
  19422. const SchemefulSite kSite1(GURL("http://origin1/"));
  19423. const SchemefulSite kSite2(GURL("http://origin2/"));
  19424. const NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1);
  19425. const NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2);
  19426. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  19427. // The server always sends Connection: close, so each request goes over a
  19428. // distinct socket.
  19429. const MockWrite kWrites1[] = {
  19430. MockWrite("GET /1 HTTP/1.1\r\n"
  19431. "Host: foo.test\r\n"
  19432. "Connection: keep-alive\r\n\r\n")};
  19433. const MockRead kReads1[] = {
  19434. MockRead("HTTP/1.1 200 OK\r\n"
  19435. "Connection: close\r\n"
  19436. "Content-Length: 1\r\n\r\n"
  19437. "1")};
  19438. const MockWrite kWrites2[] = {
  19439. MockWrite("GET /2 HTTP/1.1\r\n"
  19440. "Host: foo.test\r\n"
  19441. "Connection: keep-alive\r\n\r\n")};
  19442. const MockRead kReads2[] = {
  19443. MockRead("HTTP/1.1 200 OK\r\n"
  19444. "Connection: close\r\n"
  19445. "Content-Length: 1\r\n\r\n"
  19446. "2")};
  19447. const MockWrite kWrites3[] = {
  19448. MockWrite("GET /3 HTTP/1.1\r\n"
  19449. "Host: foo.test\r\n"
  19450. "Connection: keep-alive\r\n\r\n")};
  19451. const MockRead kReads3[] = {
  19452. MockRead("HTTP/1.1 200 OK\r\n"
  19453. "Connection: close\r\n"
  19454. "Content-Length: 1\r\n\r\n"
  19455. "3")};
  19456. StaticSocketDataProvider data1(kReads1, kWrites1);
  19457. StaticSocketDataProvider data2(kReads2, kWrites2);
  19458. StaticSocketDataProvider data3(kReads3, kWrites3);
  19459. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  19460. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  19461. session_deps_.socket_factory->AddSocketDataProvider(&data3);
  19462. SSLSocketDataProvider ssl_data1(ASYNC, OK);
  19463. ssl_data1.expected_host_and_port = HostPortPair("foo.test", 443);
  19464. ssl_data1.expected_network_isolation_key = kNetworkIsolationKey1;
  19465. SSLSocketDataProvider ssl_data2(ASYNC, OK);
  19466. ssl_data2.expected_host_and_port = HostPortPair("foo.test", 443);
  19467. ssl_data2.expected_network_isolation_key = kNetworkIsolationKey2;
  19468. SSLSocketDataProvider ssl_data3(ASYNC, OK);
  19469. ssl_data3.expected_host_and_port = HostPortPair("foo.test", 443);
  19470. ssl_data3.expected_network_isolation_key = kNetworkIsolationKey1;
  19471. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1);
  19472. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data2);
  19473. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data3);
  19474. TestCompletionCallback callback;
  19475. HttpRequestInfo request1;
  19476. request1.method = "GET";
  19477. request1.url = GURL("https://foo.test/1");
  19478. request1.traffic_annotation =
  19479. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19480. request1.network_isolation_key = kNetworkIsolationKey1;
  19481. auto trans1 =
  19482. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19483. int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  19484. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19485. std::string response_data1;
  19486. EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk());
  19487. EXPECT_EQ("1", response_data1);
  19488. trans1.reset();
  19489. HttpRequestInfo request2;
  19490. request2.method = "GET";
  19491. request2.url = GURL("https://foo.test/2");
  19492. request2.traffic_annotation =
  19493. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19494. request2.network_isolation_key = kNetworkIsolationKey2;
  19495. auto trans2 =
  19496. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19497. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  19498. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19499. std::string response_data2;
  19500. EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk());
  19501. EXPECT_EQ("2", response_data2);
  19502. trans2.reset();
  19503. HttpRequestInfo request3;
  19504. request3.method = "GET";
  19505. request3.url = GURL("https://foo.test/3");
  19506. request3.traffic_annotation =
  19507. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19508. request3.network_isolation_key = kNetworkIsolationKey1;
  19509. auto trans3 =
  19510. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19511. rv = trans3->Start(&request3, callback.callback(), NetLogWithSource());
  19512. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19513. std::string response_data3;
  19514. EXPECT_THAT(ReadTransaction(trans3.get(), &response_data3), IsOk());
  19515. EXPECT_EQ("3", response_data3);
  19516. trans3.reset();
  19517. }
  19518. // Test that the NetworkIsolationKey is passed down to SSLConfig so the session
  19519. // cache is isolated, for both origins and proxies.
  19520. TEST_F(HttpNetworkTransactionTest, NetworkIsolationSSLProxy) {
  19521. base::test::ScopedFeatureList feature_list;
  19522. feature_list.InitWithFeatures(
  19523. {features::kPartitionConnectionsByNetworkIsolationKey,
  19524. features::kPartitionSSLSessionsByNetworkIsolationKey},
  19525. {});
  19526. session_deps_.proxy_resolution_service =
  19527. ConfiguredProxyResolutionService::CreateFixedForTest(
  19528. "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS);
  19529. const SchemefulSite kSite1(GURL("http://origin1/"));
  19530. const SchemefulSite kSite2(GURL("http://origin2/"));
  19531. const NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1);
  19532. const NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2);
  19533. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  19534. // Make both a tunneled and non-tunneled request.
  19535. HttpRequestInfo request1;
  19536. request1.method = "GET";
  19537. request1.url = GURL("https://foo.test/1");
  19538. request1.traffic_annotation =
  19539. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19540. request1.network_isolation_key = kNetworkIsolationKey1;
  19541. HttpRequestInfo request2;
  19542. request2.method = "GET";
  19543. request2.url = GURL("http://foo.test/2");
  19544. request2.traffic_annotation =
  19545. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19546. request2.network_isolation_key = kNetworkIsolationKey2;
  19547. const MockWrite kWrites1[] = {
  19548. MockWrite("CONNECT foo.test:443 HTTP/1.1\r\n"
  19549. "Host: foo.test:443\r\n"
  19550. "Proxy-Connection: keep-alive\r\n\r\n"),
  19551. MockWrite("GET /1 HTTP/1.1\r\n"
  19552. "Host: foo.test\r\n"
  19553. "Connection: keep-alive\r\n\r\n")};
  19554. const MockRead kReads1[] = {
  19555. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"),
  19556. MockRead("HTTP/1.1 200 OK\r\n"
  19557. "Connection: close\r\n"
  19558. "Content-Length: 1\r\n\r\n"
  19559. "1")};
  19560. const MockWrite kWrites2[] = {
  19561. MockWrite("GET http://foo.test/2 HTTP/1.1\r\n"
  19562. "Host: foo.test\r\n"
  19563. "Proxy-Connection: keep-alive\r\n\r\n")};
  19564. const MockRead kReads2[] = {
  19565. MockRead("HTTP/1.1 200 OK\r\n"
  19566. "Connection: close\r\n"
  19567. "Content-Length: 1\r\n\r\n"
  19568. "2")};
  19569. StaticSocketDataProvider data1(kReads1, kWrites1);
  19570. StaticSocketDataProvider data2(kReads2, kWrites2);
  19571. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  19572. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  19573. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  19574. SSLSocketDataProvider ssl_proxy1(ASYNC, OK);
  19575. ssl_proxy1.expected_host_and_port = HostPortPair("myproxy", 70);
  19576. ssl_proxy1.expected_network_isolation_key = kNetworkIsolationKey1;
  19577. SSLSocketDataProvider ssl_origin1(ASYNC, OK);
  19578. ssl_origin1.expected_host_and_port = HostPortPair("foo.test", 443);
  19579. ssl_origin1.expected_network_isolation_key = kNetworkIsolationKey1;
  19580. SSLSocketDataProvider ssl_proxy2(ASYNC, OK);
  19581. ssl_proxy2.expected_host_and_port = HostPortPair("myproxy", 70);
  19582. ssl_proxy2.expected_network_isolation_key = kNetworkIsolationKey2;
  19583. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy1);
  19584. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_origin1);
  19585. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_proxy2);
  19586. TestCompletionCallback callback;
  19587. auto trans1 =
  19588. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19589. int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  19590. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19591. std::string response_data1;
  19592. EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk());
  19593. EXPECT_EQ("1", response_data1);
  19594. trans1.reset();
  19595. auto trans2 =
  19596. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19597. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  19598. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19599. std::string response_data2;
  19600. EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk());
  19601. EXPECT_EQ("2", response_data2);
  19602. trans2.reset();
  19603. }
  19604. // Test that SSLConfig changes from SSLConfigService are picked up even when
  19605. // there are live sockets.
  19606. TEST_F(HttpNetworkTransactionTest, SSLConfigChanged) {
  19607. SSLContextConfig ssl_context_config;
  19608. ssl_context_config.version_max = SSL_PROTOCOL_VERSION_TLS1_3;
  19609. auto ssl_config_service =
  19610. std::make_unique<TestSSLConfigService>(ssl_context_config);
  19611. TestSSLConfigService* ssl_config_service_raw = ssl_config_service.get();
  19612. session_deps_.ssl_config_service = std::move(ssl_config_service);
  19613. // Make three requests. Between the second and third, the SSL config will
  19614. // change.
  19615. HttpRequestInfo request1;
  19616. request1.method = "GET";
  19617. request1.url = GURL("https://foo.test/1");
  19618. request1.traffic_annotation =
  19619. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19620. HttpRequestInfo request2;
  19621. request2.method = "GET";
  19622. request2.url = GURL("https://foo.test/2");
  19623. request2.traffic_annotation =
  19624. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19625. HttpRequestInfo request3;
  19626. request3.method = "GET";
  19627. request3.url = GURL("https://foo.test/3");
  19628. request3.traffic_annotation =
  19629. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19630. const MockWrite kWrites1[] = {
  19631. MockWrite("GET /1 HTTP/1.1\r\n"
  19632. "Host: foo.test\r\n"
  19633. "Connection: keep-alive\r\n\r\n"),
  19634. MockWrite("GET /2 HTTP/1.1\r\n"
  19635. "Host: foo.test\r\n"
  19636. "Connection: keep-alive\r\n\r\n"),
  19637. };
  19638. const MockRead kReads1[] = {
  19639. MockRead("HTTP/1.1 200 OK\r\n"
  19640. "Connection: keep-alive\r\n"
  19641. "Content-Length: 1\r\n\r\n"
  19642. "1"),
  19643. MockRead("HTTP/1.1 200 OK\r\n"
  19644. "Connection: keep-alive\r\n"
  19645. "Content-Length: 1\r\n\r\n"
  19646. "2"),
  19647. };
  19648. // The third request goes on a different socket because the SSL config has
  19649. // changed.
  19650. const MockWrite kWrites2[] = {
  19651. MockWrite("GET /3 HTTP/1.1\r\n"
  19652. "Host: foo.test\r\n"
  19653. "Connection: keep-alive\r\n\r\n")};
  19654. const MockRead kReads2[] = {
  19655. MockRead("HTTP/1.1 200 OK\r\n"
  19656. "Connection: keep-alive\r\n"
  19657. "Content-Length: 1\r\n\r\n"
  19658. "3")};
  19659. StaticSocketDataProvider data1(kReads1, kWrites1);
  19660. StaticSocketDataProvider data2(kReads2, kWrites2);
  19661. session_deps_.socket_factory->AddSocketDataProvider(&data1);
  19662. session_deps_.socket_factory->AddSocketDataProvider(&data2);
  19663. SSLSocketDataProvider ssl1(ASYNC, OK);
  19664. ssl1.expected_ssl_version_max = SSL_PROTOCOL_VERSION_TLS1_3;
  19665. SSLSocketDataProvider ssl2(ASYNC, OK);
  19666. ssl2.expected_ssl_version_max = SSL_PROTOCOL_VERSION_TLS1_2;
  19667. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1);
  19668. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2);
  19669. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  19670. TestCompletionCallback callback;
  19671. auto trans1 =
  19672. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19673. int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource());
  19674. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19675. std::string response_data1;
  19676. EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk());
  19677. EXPECT_EQ("1", response_data1);
  19678. trans1.reset();
  19679. auto trans2 =
  19680. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19681. rv = trans2->Start(&request2, callback.callback(), NetLogWithSource());
  19682. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19683. std::string response_data2;
  19684. EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk());
  19685. EXPECT_EQ("2", response_data2);
  19686. trans2.reset();
  19687. ssl_context_config.version_max = SSL_PROTOCOL_VERSION_TLS1_2;
  19688. ssl_config_service_raw->UpdateSSLConfigAndNotify(ssl_context_config);
  19689. auto trans3 =
  19690. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19691. rv = trans3->Start(&request3, callback.callback(), NetLogWithSource());
  19692. EXPECT_THAT(callback.GetResult(rv), IsOk());
  19693. std::string response_data3;
  19694. EXPECT_THAT(ReadTransaction(trans3.get(), &response_data3), IsOk());
  19695. EXPECT_EQ("3", response_data3);
  19696. trans3.reset();
  19697. }
  19698. TEST_F(HttpNetworkTransactionTest, SSLConfigChangedPendingConnect) {
  19699. SSLContextConfig ssl_context_config;
  19700. ssl_context_config.version_max = SSL_PROTOCOL_VERSION_TLS1_3;
  19701. auto ssl_config_service =
  19702. std::make_unique<TestSSLConfigService>(ssl_context_config);
  19703. TestSSLConfigService* ssl_config_service_raw = ssl_config_service.get();
  19704. session_deps_.ssl_config_service = std::move(ssl_config_service);
  19705. HttpRequestInfo request;
  19706. request.method = "GET";
  19707. request.url = GURL("https://foo.test/1");
  19708. request.traffic_annotation =
  19709. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19710. // Make a socket which never connects.
  19711. StaticSocketDataProvider data({}, {});
  19712. session_deps_.socket_factory->AddSocketDataProvider(&data);
  19713. SSLSocketDataProvider ssl_data(SYNCHRONOUS, ERR_IO_PENDING);
  19714. ssl_data.expected_ssl_version_max = SSL_PROTOCOL_VERSION_TLS1_3;
  19715. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data);
  19716. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  19717. TestCompletionCallback callback;
  19718. auto trans =
  19719. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19720. int rv = trans->Start(&request, callback.callback(), NetLogWithSource());
  19721. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  19722. ssl_context_config.version_max = SSL_PROTOCOL_VERSION_TLS1_2;
  19723. ssl_config_service_raw->UpdateSSLConfigAndNotify(ssl_context_config);
  19724. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_NETWORK_CHANGED));
  19725. }
  19726. // Test that HttpNetworkTransaction correctly handles existing sockets when the
  19727. // server requests a client certificate post-handshake (via a TLS
  19728. // renegotiation). This is a regression test for https://crbug.com/829184.
  19729. TEST_F(HttpNetworkTransactionTest, PostHandshakeClientCertWithSockets) {
  19730. const MutableNetworkTrafficAnnotationTag kTrafficAnnotation(
  19731. TRAFFIC_ANNOTATION_FOR_TESTS);
  19732. auto cert_request_info = base::MakeRefCounted<SSLCertRequestInfo>();
  19733. cert_request_info->host_and_port = HostPortPair("foo.test", 443);
  19734. std::unique_ptr<FakeClientCertIdentity> identity =
  19735. FakeClientCertIdentity::CreateFromCertAndKeyFiles(
  19736. GetTestCertsDirectory(), "client_1.pem", "client_1.pk8");
  19737. ASSERT_TRUE(identity);
  19738. // This test will make several requests so that, when the client certificate
  19739. // request comes in, we have a socket in use, an idle socket, and a socket for
  19740. // an unrelated host.
  19741. //
  19742. // First, two long-lived requests which do not complete until after the client
  19743. // certificate request. This arranges for sockets to be in use during the
  19744. // request. They should not be interrupted.
  19745. HttpRequestInfo request_long_lived;
  19746. request_long_lived.method = "GET";
  19747. request_long_lived.url = GURL("https://foo.test/long-lived");
  19748. request_long_lived.traffic_annotation = kTrafficAnnotation;
  19749. HttpRequestInfo request_long_lived_bar;
  19750. request_long_lived_bar.method = "GET";
  19751. request_long_lived_bar.url = GURL("https://bar.test/long-lived");
  19752. request_long_lived_bar.traffic_annotation = kTrafficAnnotation;
  19753. // Next, make a request that needs client certificates.
  19754. HttpRequestInfo request_auth;
  19755. request_auth.method = "GET";
  19756. request_auth.url = GURL("https://foo.test/auth");
  19757. request_auth.traffic_annotation = kTrafficAnnotation;
  19758. // Before responding to the challenge, make a request to an unauthenticated
  19759. // endpoint. This will result in an idle socket when the client certificate
  19760. // challenge is resolved.
  19761. HttpRequestInfo request_unauth;
  19762. request_unauth.method = "GET";
  19763. request_unauth.url = GURL("https://foo.test/unauth");
  19764. request_unauth.traffic_annotation = kTrafficAnnotation;
  19765. // After all the preceding requests complete, end with two additional requests
  19766. // to ensure pre-authentication foo.test sockets are not used and bar.test
  19767. // sockets are unaffected.
  19768. HttpRequestInfo request_post_auth;
  19769. request_post_auth.method = "GET";
  19770. request_post_auth.url = GURL("https://foo.test/post-auth");
  19771. request_post_auth.traffic_annotation = kTrafficAnnotation;
  19772. HttpRequestInfo request_post_auth_bar;
  19773. request_post_auth_bar.method = "GET";
  19774. request_post_auth_bar.url = GURL("https://bar.test/post-auth");
  19775. request_post_auth_bar.traffic_annotation = kTrafficAnnotation;
  19776. // The sockets for /long-lived and /unauth complete their request but are
  19777. // not allocated for /post-auth or /retry because SSL state has since changed.
  19778. const MockWrite kLongLivedWrites[] = {
  19779. MockWrite(ASYNC, 0,
  19780. "GET /long-lived HTTP/1.1\r\n"
  19781. "Host: foo.test\r\n"
  19782. "Connection: keep-alive\r\n\r\n"),
  19783. };
  19784. const MockRead kLongLivedReads[] = {
  19785. // Pause so /long-lived completes after the client presents client
  19786. // certificates.
  19787. MockRead(ASYNC, ERR_IO_PENDING, 1),
  19788. MockRead(ASYNC, 2,
  19789. "HTTP/1.1 200 OK\r\n"
  19790. "Connection: keep-alive\r\n"
  19791. "Content-Length: 10\r\n\r\n"
  19792. "long-lived"),
  19793. };
  19794. SequencedSocketData data_long_lived(kLongLivedReads, kLongLivedWrites);
  19795. SSLSocketDataProvider ssl_long_lived(ASYNC, OK);
  19796. session_deps_.socket_factory->AddSocketDataProvider(&data_long_lived);
  19797. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_long_lived);
  19798. // Requests for bar.test should be unaffected by foo.test and get allocated
  19799. // a single socket.
  19800. const MockWrite kBarWrites[] = {
  19801. MockWrite(ASYNC, 0,
  19802. "GET /long-lived HTTP/1.1\r\n"
  19803. "Host: bar.test\r\n"
  19804. "Connection: keep-alive\r\n\r\n"),
  19805. MockWrite(ASYNC, 3,
  19806. "GET /post-auth HTTP/1.1\r\n"
  19807. "Host: bar.test\r\n"
  19808. "Connection: keep-alive\r\n\r\n"),
  19809. };
  19810. const MockRead kBarReads[] = {
  19811. // Pause on /long-lived so it completes after foo.test's authentication.
  19812. MockRead(ASYNC, ERR_IO_PENDING, 1),
  19813. MockRead(ASYNC, 2,
  19814. "HTTP/1.1 200 OK\r\n"
  19815. "Connection: keep-alive\r\n"
  19816. "Content-Length: 10\r\n\r\n"
  19817. "long-lived"),
  19818. MockRead(ASYNC, 4,
  19819. "HTTP/1.1 200 OK\r\n"
  19820. "Connection: keep-alive\r\n"
  19821. "Content-Length: 9\r\n\r\n"
  19822. "post-auth"),
  19823. };
  19824. SequencedSocketData data_bar(kBarReads, kBarWrites);
  19825. SSLSocketDataProvider ssl_bar(ASYNC, OK);
  19826. session_deps_.socket_factory->AddSocketDataProvider(&data_bar);
  19827. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_bar);
  19828. // Requesting /auth results in a post-handshake client certificate challenge.
  19829. const MockWrite kAuthWrites[] = {
  19830. MockWrite(ASYNC, 0,
  19831. "GET /auth HTTP/1.1\r\n"
  19832. "Host: foo.test\r\n"
  19833. "Connection: keep-alive\r\n\r\n"),
  19834. };
  19835. const MockRead kAuthReads[] = {
  19836. MockRead(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED, 1),
  19837. };
  19838. SequencedSocketData data_auth(kAuthReads, kAuthWrites);
  19839. SSLSocketDataProvider ssl_auth(ASYNC, OK);
  19840. ssl_auth.cert_request_info = cert_request_info.get();
  19841. session_deps_.socket_factory->AddSocketDataProvider(&data_auth);
  19842. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_auth);
  19843. // Requesting /unauth completes.
  19844. const MockWrite kUnauthWrites[] = {
  19845. MockWrite(ASYNC, 0,
  19846. "GET /unauth HTTP/1.1\r\n"
  19847. "Host: foo.test\r\n"
  19848. "Connection: keep-alive\r\n\r\n"),
  19849. };
  19850. const MockRead kUnauthReads[] = {
  19851. MockRead(ASYNC, 1,
  19852. "HTTP/1.1 200 OK\r\n"
  19853. "Connection: keep-alive\r\n"
  19854. "Content-Length: 6\r\n\r\n"
  19855. "unauth"),
  19856. };
  19857. SequencedSocketData data_unauth(kUnauthReads, kUnauthWrites);
  19858. SSLSocketDataProvider ssl_unauth(ASYNC, OK);
  19859. session_deps_.socket_factory->AddSocketDataProvider(&data_unauth);
  19860. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_unauth);
  19861. // When the client certificate is selected, /auth is retried on a new
  19862. // connection. In particular, it should not be retried on |data_unauth|,
  19863. // which would not honor the new client certificate configuration.
  19864. const MockWrite kRetryWrites[] = {
  19865. MockWrite(ASYNC, 0,
  19866. "GET /auth HTTP/1.1\r\n"
  19867. "Host: foo.test\r\n"
  19868. "Connection: keep-alive\r\n\r\n"),
  19869. };
  19870. const MockRead kRetryReads[] = {
  19871. MockRead(ASYNC, 1,
  19872. "HTTP/1.1 200 OK\r\n"
  19873. // Close the connection so we test that /post-auth is not
  19874. // allocated to |data_unauth| or |data_long_lived|.
  19875. "Connection: close\r\n"
  19876. "Content-Length: 4\r\n\r\n"
  19877. "auth"),
  19878. };
  19879. SequencedSocketData data_retry(kRetryReads, kRetryWrites);
  19880. SSLSocketDataProvider ssl_retry(ASYNC, OK);
  19881. ssl_retry.expected_send_client_cert = true;
  19882. ssl_retry.expected_client_cert = identity->certificate();
  19883. session_deps_.socket_factory->AddSocketDataProvider(&data_retry);
  19884. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_retry);
  19885. // /post-auth gets its own socket.
  19886. const MockWrite kPostAuthWrites[] = {
  19887. MockWrite(ASYNC, 0,
  19888. "GET /post-auth HTTP/1.1\r\n"
  19889. "Host: foo.test\r\n"
  19890. "Connection: keep-alive\r\n\r\n"),
  19891. };
  19892. const MockRead kPostAuthReads[] = {
  19893. MockRead(ASYNC, 1,
  19894. "HTTP/1.1 200 OK\r\n"
  19895. "Connection: keep-alive\r\n"
  19896. "Content-Length: 9\r\n\r\n"
  19897. "post-auth"),
  19898. };
  19899. SequencedSocketData data_post_auth(kPostAuthReads, kPostAuthWrites);
  19900. SSLSocketDataProvider ssl_post_auth(ASYNC, OK);
  19901. ssl_post_auth.expected_send_client_cert = true;
  19902. ssl_post_auth.expected_client_cert = identity->certificate();
  19903. session_deps_.socket_factory->AddSocketDataProvider(&data_post_auth);
  19904. session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_post_auth);
  19905. std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_);
  19906. // Start the two long-lived requests.
  19907. TestCompletionCallback callback_long_lived;
  19908. auto trans_long_lived =
  19909. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19910. int rv = trans_long_lived->Start(
  19911. &request_long_lived, callback_long_lived.callback(), NetLogWithSource());
  19912. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  19913. data_long_lived.RunUntilPaused();
  19914. TestCompletionCallback callback_long_lived_bar;
  19915. auto trans_long_lived_bar =
  19916. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19917. rv = trans_long_lived_bar->Start(&request_long_lived_bar,
  19918. callback_long_lived_bar.callback(),
  19919. NetLogWithSource());
  19920. ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
  19921. data_bar.RunUntilPaused();
  19922. // Request /auth. This gives a client certificate challenge.
  19923. TestCompletionCallback callback_auth;
  19924. auto trans_auth =
  19925. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19926. rv = trans_auth->Start(&request_auth, callback_auth.callback(),
  19927. NetLogWithSource());
  19928. EXPECT_THAT(callback_auth.GetResult(rv),
  19929. IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
  19930. // Make an unauthenticated request. This completes.
  19931. TestCompletionCallback callback_unauth;
  19932. auto trans_unauth =
  19933. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19934. rv = trans_unauth->Start(&request_unauth, callback_unauth.callback(),
  19935. NetLogWithSource());
  19936. EXPECT_THAT(callback_unauth.GetResult(rv), IsOk());
  19937. std::string response_unauth;
  19938. EXPECT_THAT(ReadTransaction(trans_unauth.get(), &response_unauth), IsOk());
  19939. EXPECT_EQ("unauth", response_unauth);
  19940. trans_unauth.reset();
  19941. // Complete the authenticated request.
  19942. rv = trans_auth->RestartWithCertificate(identity->certificate(),
  19943. identity->ssl_private_key(),
  19944. callback_auth.callback());
  19945. EXPECT_THAT(callback_auth.GetResult(rv), IsOk());
  19946. std::string response_auth;
  19947. EXPECT_THAT(ReadTransaction(trans_auth.get(), &response_auth), IsOk());
  19948. EXPECT_EQ("auth", response_auth);
  19949. trans_auth.reset();
  19950. // Complete the long-lived requests.
  19951. data_long_lived.Resume();
  19952. EXPECT_THAT(callback_long_lived.GetResult(ERR_IO_PENDING), IsOk());
  19953. std::string response_long_lived;
  19954. EXPECT_THAT(ReadTransaction(trans_long_lived.get(), &response_long_lived),
  19955. IsOk());
  19956. EXPECT_EQ("long-lived", response_long_lived);
  19957. trans_long_lived.reset();
  19958. data_bar.Resume();
  19959. EXPECT_THAT(callback_long_lived_bar.GetResult(ERR_IO_PENDING), IsOk());
  19960. std::string response_long_lived_bar;
  19961. EXPECT_THAT(
  19962. ReadTransaction(trans_long_lived_bar.get(), &response_long_lived_bar),
  19963. IsOk());
  19964. EXPECT_EQ("long-lived", response_long_lived_bar);
  19965. trans_long_lived_bar.reset();
  19966. // Run the post-authentication requests.
  19967. TestCompletionCallback callback_post_auth;
  19968. auto trans_post_auth =
  19969. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19970. rv = trans_post_auth->Start(&request_post_auth, callback_post_auth.callback(),
  19971. NetLogWithSource());
  19972. EXPECT_THAT(callback_post_auth.GetResult(rv), IsOk());
  19973. std::string response_post_auth;
  19974. EXPECT_THAT(ReadTransaction(trans_post_auth.get(), &response_post_auth),
  19975. IsOk());
  19976. EXPECT_EQ("post-auth", response_post_auth);
  19977. trans_post_auth.reset();
  19978. TestCompletionCallback callback_post_auth_bar;
  19979. auto trans_post_auth_bar =
  19980. std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get());
  19981. rv = trans_post_auth_bar->Start(&request_post_auth_bar,
  19982. callback_post_auth_bar.callback(),
  19983. NetLogWithSource());
  19984. EXPECT_THAT(callback_post_auth_bar.GetResult(rv), IsOk());
  19985. std::string response_post_auth_bar;
  19986. EXPECT_THAT(
  19987. ReadTransaction(trans_post_auth_bar.get(), &response_post_auth_bar),
  19988. IsOk());
  19989. EXPECT_EQ("post-auth", response_post_auth_bar);
  19990. trans_post_auth_bar.reset();
  19991. }
  19992. TEST_F(HttpNetworkTransactionTest, RequestWithDnsAliases) {
  19993. // Create a request.
  19994. HttpRequestInfo request;
  19995. request.method = "GET";
  19996. request.url = GURL("http://www.example.org/");
  19997. request.traffic_annotation =
  19998. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  19999. // Add a rule with DNS aliases to the host resolver.
  20000. std::vector<std::string> aliases({"alias1", "alias2", "www.example.org"});
  20001. session_deps_.host_resolver->rules()->AddIPLiteralRuleWithDnsAliases(
  20002. "www.example.org", "127.0.0.1", std::move(aliases));
  20003. // Create a HttpNetworkSession.
  20004. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  20005. // Create a transaction.
  20006. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  20007. // Prepare the expected data to be written and read. The client should send
  20008. // the request below.
  20009. MockWrite data_writes[] = {
  20010. MockWrite("GET / HTTP/1.1\r\n"
  20011. "Host: www.example.org\r\n"
  20012. "Connection: keep-alive\r\n\r\n"),
  20013. };
  20014. // The server should respond with the following.
  20015. MockRead data_reads[] = {
  20016. MockRead("HTTP/1.0 200 OK\r\n"),
  20017. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  20018. MockRead("Content-Length: 100\r\n\r\n"),
  20019. MockRead(SYNCHRONOUS, OK),
  20020. };
  20021. StaticSocketDataProvider data(data_reads, data_writes);
  20022. session_deps_.socket_factory->AddSocketDataProvider(&data);
  20023. TestCompletionCallback callback;
  20024. // Start the transaction.
  20025. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  20026. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  20027. // Wait for completion.
  20028. rv = callback.WaitForResult();
  20029. EXPECT_THAT(rv, IsOk());
  20030. // Get the response info.
  20031. const HttpResponseInfo* response = trans.GetResponseInfo();
  20032. // Verify that the alias list was stored in the response info as expected.
  20033. ASSERT_TRUE(response);
  20034. EXPECT_THAT(response->dns_aliases,
  20035. testing::ElementsAre("alias1", "alias2", "www.example.org"));
  20036. }
  20037. TEST_F(HttpNetworkTransactionTest, RequestWithNoAdditionalDnsAliases) {
  20038. // Create a request.
  20039. HttpRequestInfo request;
  20040. request.method = "GET";
  20041. request.url = GURL("http://www.example.org/");
  20042. request.traffic_annotation =
  20043. net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS);
  20044. // Add a rule without DNS aliases to the host resolver.
  20045. session_deps_.host_resolver->rules()->AddRule("www.example.org", "127.0.0.1");
  20046. // Create a HttpNetworkSession.
  20047. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_));
  20048. // Create a transaction.
  20049. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get());
  20050. // Prepare the expected data to be written and read. The client should send
  20051. // the request below.
  20052. MockWrite data_writes[] = {
  20053. MockWrite("GET / HTTP/1.1\r\n"
  20054. "Host: www.example.org\r\n"
  20055. "Connection: keep-alive\r\n\r\n"),
  20056. };
  20057. // The server should respond with the following.
  20058. MockRead data_reads[] = {
  20059. MockRead("HTTP/1.0 200 OK\r\n"),
  20060. MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"),
  20061. MockRead("Content-Length: 100\r\n\r\n"),
  20062. MockRead(SYNCHRONOUS, OK),
  20063. };
  20064. StaticSocketDataProvider data(data_reads, data_writes);
  20065. session_deps_.socket_factory->AddSocketDataProvider(&data);
  20066. TestCompletionCallback callback;
  20067. // Start the transaction.
  20068. int rv = trans.Start(&request, callback.callback(), NetLogWithSource());
  20069. EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
  20070. // Wait for completion.
  20071. rv = callback.WaitForResult();
  20072. EXPECT_THAT(rv, IsOk());
  20073. // Get the response info.
  20074. const HttpResponseInfo* response = trans.GetResponseInfo();
  20075. // Verify that the alias list was stored in the response info as expected.
  20076. ASSERT_TRUE(response);
  20077. EXPECT_THAT(response->dns_aliases, testing::ElementsAre("www.example.org"));
  20078. }
  20079. } // namespace net