OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "net/websockets/websocket_handshake_handler.h" |
| 6 |
| 7 #include <string> |
| 8 #include <vector> |
| 9 |
| 10 #include "base/basictypes.h" |
| 11 #include "base/string_util.h" |
| 12 #include "googleurl/src/gurl.h" |
| 13 #include "net/http/http_response_headers.h" |
| 14 #include "net/http/http_util.h" |
| 15 #include "testing/gmock/include/gmock/gmock.h" |
| 16 #include "testing/gtest/include/gtest/gtest.h" |
| 17 #include "testing/platform_test.h" |
| 18 |
| 19 namespace net { |
| 20 |
| 21 namespace { |
| 22 |
| 23 TEST(WebSocketHandshakeHandlerSpdy3Test, RequestResponse) { |
| 24 WebSocketHandshakeRequestHandler request_handler; |
| 25 |
| 26 static const char kHandshakeRequestMessage[] = |
| 27 "GET /demo HTTP/1.1\r\n" |
| 28 "Host: example.com\r\n" |
| 29 "Upgrade: websocket\r\n" |
| 30 "Connection: Upgrade\r\n" |
| 31 "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" |
| 32 "Origin: http://example.com\r\n" |
| 33 "Sec-WebSocket-Protocol: sample\r\n" |
| 34 "Sec-WebSocket-Extensions: foo\r\n" |
| 35 "Sec-WebSocket-Version: 13\r\n" |
| 36 "X-Foo: foo\r\n" |
| 37 "\r\n"; |
| 38 |
| 39 EXPECT_TRUE(request_handler.ParseRequest(kHandshakeRequestMessage, |
| 40 strlen(kHandshakeRequestMessage))); |
| 41 EXPECT_EQ(13, request_handler.protocol_version()); |
| 42 |
| 43 GURL url("ws://example.com/demo"); |
| 44 std::string challenge; |
| 45 SpdyHeaderBlock headers; |
| 46 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, |
| 47 &headers, |
| 48 &challenge, |
| 49 3)); |
| 50 |
| 51 EXPECT_EQ(url.path(), headers[":path"]); |
| 52 EXPECT_TRUE(headers.find(":upgrade") == headers.end()); |
| 53 EXPECT_TRUE(headers.find(":Upgrade") == headers.end()); |
| 54 EXPECT_TRUE(headers.find(":connection") == headers.end()); |
| 55 EXPECT_TRUE(headers.find(":Connection") == headers.end()); |
| 56 EXPECT_TRUE(headers.find(":Sec-WebSocket-Key") == headers.end()); |
| 57 EXPECT_TRUE(headers.find(":sec-websocket-key") == headers.end()); |
| 58 EXPECT_TRUE(headers.find(":Sec-WebSocket-Version") == headers.end()); |
| 59 EXPECT_TRUE(headers.find(":sec-webSocket-version") == headers.end()); |
| 60 EXPECT_TRUE(headers.find(":x-foo") == headers.end()); |
| 61 EXPECT_EQ("example.com", headers[":host"]); |
| 62 EXPECT_EQ("http://example.com", headers[":origin"]); |
| 63 EXPECT_EQ("sample", headers[":sec-websocket-protocol"]); |
| 64 EXPECT_EQ("foo", headers[":sec-websocket-extensions"]); |
| 65 EXPECT_EQ("ws", headers[":scheme"]); |
| 66 EXPECT_EQ("WebSocket/13", headers[":version"]); |
| 67 EXPECT_EQ("foo", headers["x-foo"]); |
| 68 |
| 69 static const char expected_challenge[] = "dGhlIHNhbXBsZSBub25jZQ=="; |
| 70 |
| 71 EXPECT_EQ(expected_challenge, challenge); |
| 72 |
| 73 headers.clear(); |
| 74 |
| 75 headers[":status"] = "101 Switching Protocols"; |
| 76 headers[":sec-websocket-protocol"] = "sample"; |
| 77 headers[":sec-websocket-extensions"] = "foo"; |
| 78 headers["x-bar"] = "bar"; |
| 79 |
| 80 WebSocketHandshakeResponseHandler response_handler; |
| 81 response_handler.set_protocol_version(13); |
| 82 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, |
| 83 challenge, |
| 84 3)); |
| 85 EXPECT_TRUE(response_handler.HasResponse()); |
| 86 |
| 87 // Note that order of sec-websocket-* is sensitive with hash_map order. |
| 88 static const char kHandshakeResponseExpectedMessage[] = |
| 89 "HTTP/1.1 101 Switching Protocols\r\n" |
| 90 "Upgrade: websocket\r\n" |
| 91 "Connection: Upgrade\r\n" |
| 92 "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n" |
| 93 "sec-websocket-extensions: foo\r\n" |
| 94 "sec-websocket-protocol: sample\r\n" |
| 95 "x-bar: bar\r\n" |
| 96 "\r\n"; |
| 97 |
| 98 EXPECT_EQ(kHandshakeResponseExpectedMessage, response_handler.GetResponse()); |
| 99 } |
| 100 |
| 101 TEST(WebSocketHandshakeHandlerSpdy3Test, RequestResponseWithCookies) { |
| 102 WebSocketHandshakeRequestHandler request_handler; |
| 103 |
| 104 // Note that websocket won't use multiple headers in request now. |
| 105 static const char kHandshakeRequestMessage[] = |
| 106 "GET /demo HTTP/1.1\r\n" |
| 107 "Host: example.com\r\n" |
| 108 "Upgrade: websocket\r\n" |
| 109 "Connection: Upgrade\r\n" |
| 110 "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" |
| 111 "Origin: http://example.com\r\n" |
| 112 "Sec-WebSocket-Protocol: sample\r\n" |
| 113 "Sec-WebSocket-Extensions: foo\r\n" |
| 114 "Sec-WebSocket-Version: 13\r\n" |
| 115 "Cookie: WK-websocket-test=1; WK-websocket-test-httponly=1\r\n" |
| 116 "\r\n"; |
| 117 |
| 118 EXPECT_TRUE(request_handler.ParseRequest(kHandshakeRequestMessage, |
| 119 strlen(kHandshakeRequestMessage))); |
| 120 EXPECT_EQ(13, request_handler.protocol_version()); |
| 121 |
| 122 GURL url("ws://example.com/demo"); |
| 123 std::string challenge; |
| 124 SpdyHeaderBlock headers; |
| 125 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url, |
| 126 &headers, |
| 127 &challenge, |
| 128 3)); |
| 129 |
| 130 EXPECT_EQ(url.path(), headers[":path"]); |
| 131 EXPECT_TRUE(headers.find(":upgrade") == headers.end()); |
| 132 EXPECT_TRUE(headers.find(":Upgrade") == headers.end()); |
| 133 EXPECT_TRUE(headers.find(":connection") == headers.end()); |
| 134 EXPECT_TRUE(headers.find(":Connection") == headers.end()); |
| 135 EXPECT_TRUE(headers.find(":Sec-WebSocket-Key") == headers.end()); |
| 136 EXPECT_TRUE(headers.find(":sec-websocket-key") == headers.end()); |
| 137 EXPECT_TRUE(headers.find(":Sec-WebSocket-Version") == headers.end()); |
| 138 EXPECT_TRUE(headers.find(":sec-webSocket-version") == headers.end()); |
| 139 EXPECT_TRUE(headers.find(":Cookie") == headers.end()); |
| 140 EXPECT_TRUE(headers.find(":cookie") == headers.end()); |
| 141 EXPECT_EQ("example.com", headers[":host"]); |
| 142 EXPECT_EQ("http://example.com", headers[":origin"]); |
| 143 EXPECT_EQ("sample", headers[":sec-websocket-protocol"]); |
| 144 EXPECT_EQ("foo", headers[":sec-websocket-extensions"]); |
| 145 EXPECT_EQ("ws", headers[":scheme"]); |
| 146 EXPECT_EQ("WebSocket/13", headers[":version"]); |
| 147 EXPECT_EQ("WK-websocket-test=1; WK-websocket-test-httponly=1", |
| 148 headers["cookie"]); |
| 149 |
| 150 const char expected_challenge[] = "dGhlIHNhbXBsZSBub25jZQ=="; |
| 151 |
| 152 EXPECT_EQ(expected_challenge, challenge); |
| 153 |
| 154 headers.clear(); |
| 155 |
| 156 headers[":status"] = "101 Switching Protocols"; |
| 157 headers[":sec-websocket-protocol"] = "sample"; |
| 158 headers[":sec-websocket-extensions"] = "foo"; |
| 159 std::string cookie = "WK-websocket-test=1"; |
| 160 cookie.append(1, '\0'); |
| 161 cookie += "WK-websocket-test-httponly=1; HttpOnly"; |
| 162 headers["set-cookie"] = cookie; |
| 163 |
| 164 |
| 165 WebSocketHandshakeResponseHandler response_handler; |
| 166 response_handler.set_protocol_version(13); |
| 167 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers, |
| 168 challenge, |
| 169 3)); |
| 170 EXPECT_TRUE(response_handler.HasResponse()); |
| 171 |
| 172 // Note that order of sec-websocket-* is sensitive with hash_map order. |
| 173 static const char kHandshakeResponseExpectedMessage[] = |
| 174 "HTTP/1.1 101 Switching Protocols\r\n" |
| 175 "Upgrade: websocket\r\n" |
| 176 "Connection: Upgrade\r\n" |
| 177 "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n" |
| 178 "sec-websocket-extensions: foo\r\n" |
| 179 "sec-websocket-protocol: sample\r\n" |
| 180 "set-cookie: WK-websocket-test=1\r\n" |
| 181 "set-cookie: WK-websocket-test-httponly=1; HttpOnly\r\n" |
| 182 "\r\n"; |
| 183 |
| 184 EXPECT_EQ(kHandshakeResponseExpectedMessage, response_handler.GetResponse()); |
| 185 } |
| 186 |
| 187 } // namespace |
| 188 |
| 189 } // namespace net |
OLD | NEW |