Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(412)

Unified Diff: net/spdy/spdy_session_unittest.cc

Issue 1545403002: Return false when trusted SPDY proxy advertises HTTPS URL (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: ps Created 5 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« net/spdy/spdy_session.cc ('K') | « net/spdy/spdy_session.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/spdy/spdy_session_unittest.cc
diff --git a/net/spdy/spdy_session_unittest.cc b/net/spdy/spdy_session_unittest.cc
index ea8ae113a0cb735a561a57041c5a8ac44d5b8825..0dc4019f2913b8d499391ccaa245ca81bb462767 100644
--- a/net/spdy/spdy_session_unittest.cc
+++ b/net/spdy/spdy_session_unittest.cc
@@ -4842,6 +4842,151 @@ TEST_P(SpdySessionTest, RejectPushedStreamExceedingConcurrencyLimit) {
EXPECT_FALSE(session_);
}
+// Tests that only the HTTP SPDY push requests from trusted SPDY proxies are
bengr 2015/12/29 18:02:33 Shouldn't SPDY push work for same origin pushes ev
tbansal1 2015/12/30 00:00:53 Fixed the comment.
+// accepted.
+TEST_P(SpdySessionTest, TrustedSpdyProxy) {
+ // kDefaultURL should not contain "example2.org".
+ ASSERT_TRUE(std::string(kDefaultURL).find("example2.org") ==
+ std::string::npos);
+ // push_a pushes resources for example2.org which is different from
+ // kDefaultURL. push_a is HTTP, and should be accepted.
+ scoped_ptr<SpdyFrame> push_a(spdy_util_.ConstructSpdyPush(
+ nullptr, 0, 2, 1, "http://www.example2.org/a.dat"));
+ // push_b is HTTPS, and should be refused.
+ scoped_ptr<SpdyFrame> push_b(spdy_util_.ConstructSpdyPush(
+ nullptr, 0, 4, 1, "https://www.example2.org/b.dat"));
+ MockRead reads[] = {
+ MockRead(ASYNC, ERR_IO_PENDING, 1), CreateMockRead(*push_a, 2),
+ MockRead(ASYNC, ERR_IO_PENDING, 3), CreateMockRead(*push_b, 4),
+ MockRead(ASYNC, ERR_IO_PENDING, 6), MockRead(ASYNC, 0, 7),
+ };
+
+ scoped_ptr<SpdyFrame> req(
+ spdy_util_.ConstructSpdyGet(nullptr, 0, false, 1, LOWEST, true));
+ scoped_ptr<SpdyFrame> rst(
+ spdy_util_.ConstructSpdyRstStream(4, RST_STREAM_REFUSED_STREAM));
+ MockWrite writes[] = {
+ CreateMockWrite(*req, 0), CreateMockWrite(*rst, 5),
+ };
+
+ SequencedSocketData data(reads, arraysize(reads), writes, arraysize(writes));
+ session_deps_.socket_factory->AddSocketDataProvider(&data);
+
+ CreateNetworkSession();
bengr 2015/12/29 18:02:33 You should be able to pass in the trusted SPDY pro
tbansal1 2015/12/30 00:00:52 Done.
+ CreateInsecureSpdySession();
+
+ session_->set_trusted_spdy_proxy_for_tests(
+ HostPortPair::FromString("www.example.org:80"));
+
+ base::WeakPtr<SpdyStream> spdy_stream1 = CreateStreamSynchronously(
+ SPDY_REQUEST_RESPONSE_STREAM, session_, test_url_, LOWEST, BoundNetLog());
+ ASSERT_TRUE(spdy_stream1.get() != nullptr);
+ EXPECT_EQ(0u, spdy_stream1->stream_id());
+ test::StreamDelegateDoNothing delegate1(spdy_stream1);
+ spdy_stream1->SetDelegate(&delegate1);
+
+ EXPECT_EQ(0u, session_->num_active_streams());
+ EXPECT_EQ(1u, session_->num_created_streams());
+ EXPECT_EQ(0u, session_->num_pushed_streams());
+ EXPECT_EQ(0u, session_->num_active_pushed_streams());
+
+ scoped_ptr<SpdyHeaderBlock> headers(
+ spdy_util_.ConstructGetHeaderBlock(kDefaultURL));
+ spdy_stream1->SendRequestHeaders(std::move(headers), NO_MORE_DATA_TO_SEND);
+ EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders());
+
+ // Run until 1st stream is activated.
+ EXPECT_EQ(0u, delegate1.stream_id());
+ base::RunLoop().RunUntilIdle();
+ EXPECT_EQ(1u, delegate1.stream_id());
+ EXPECT_EQ(1u, session_->num_active_streams());
+ EXPECT_EQ(0u, session_->num_created_streams());
+ EXPECT_EQ(0u, session_->num_pushed_streams());
+ EXPECT_EQ(0u, session_->num_active_pushed_streams());
+
+ // Run until pushed stream is created.
+ data.Resume();
+ base::RunLoop().RunUntilIdle();
+ EXPECT_EQ(2u, session_->num_active_streams());
+ EXPECT_EQ(0u, session_->num_created_streams());
+ EXPECT_EQ(1u, session_->num_pushed_streams());
+ EXPECT_EQ(1u, session_->num_active_pushed_streams());
+
+ // Reset incoming pushed stream.
+ data.Resume();
+ base::RunLoop().RunUntilIdle();
+ EXPECT_EQ(2u, session_->num_active_streams());
+ EXPECT_EQ(0u, session_->num_created_streams());
+ EXPECT_EQ(1u, session_->num_pushed_streams());
+ EXPECT_EQ(1u, session_->num_active_pushed_streams());
+
+ // Read EOF.
+ data.Resume();
+ base::RunLoop().RunUntilIdle();
+ EXPECT_FALSE(session_);
+}
+
+// Tests that if the SPDY trusted proxy is not set, than push requests for a
bengr 2015/12/29 18:02:33 Test that a push from the same origin should succe
tbansal1 2015/12/30 00:00:53 That's already checked in another existing test: R
+// non-matching domain are refused.
+TEST_P(SpdySessionTest, TrustedSpdyProxyNotSet) {
+ // kDefaultURL should not contain "example2.org".
+ ASSERT_TRUE(std::string(kDefaultURL).find("example2.org") ==
+ std::string::npos);
+ // push_a contains resource for a origin different than kDefaultURL, and
+ // should be refused.
+ scoped_ptr<SpdyFrame> push_a(spdy_util_.ConstructSpdyPush(
+ nullptr, 0, 2, 1, "http://www.example2.org/a.dat"));
+ MockRead reads[] = {
+ MockRead(ASYNC, ERR_IO_PENDING, 1), CreateMockRead(*push_a, 2),
+ MockRead(ASYNC, 0, 4),
+ };
+
+ scoped_ptr<SpdyFrame> req(
+ spdy_util_.ConstructSpdyGet(nullptr, 0, false, 1, LOWEST, true));
+ scoped_ptr<SpdyFrame> rst(
+ spdy_util_.ConstructSpdyRstStream(2, RST_STREAM_REFUSED_STREAM));
+ MockWrite writes[] = {
+ CreateMockWrite(*req, 0), CreateMockWrite(*rst, 3),
+ };
+
+ SequencedSocketData data(reads, arraysize(reads), writes, arraysize(writes));
+ session_deps_.socket_factory->AddSocketDataProvider(&data);
+
+ CreateNetworkSession();
+ CreateInsecureSpdySession();
+
+ base::WeakPtr<SpdyStream> spdy_stream1 = CreateStreamSynchronously(
+ SPDY_REQUEST_RESPONSE_STREAM, session_, test_url_, LOWEST, BoundNetLog());
+ ASSERT_TRUE(spdy_stream1.get() != nullptr);
+ EXPECT_EQ(0u, spdy_stream1->stream_id());
+ test::StreamDelegateDoNothing delegate1(spdy_stream1);
+ spdy_stream1->SetDelegate(&delegate1);
+
+ EXPECT_EQ(0u, session_->num_active_streams());
+ EXPECT_EQ(1u, session_->num_created_streams());
+ EXPECT_EQ(0u, session_->num_pushed_streams());
+ EXPECT_EQ(0u, session_->num_active_pushed_streams());
+
+ scoped_ptr<SpdyHeaderBlock> headers(
+ spdy_util_.ConstructGetHeaderBlock(kDefaultURL));
+ spdy_stream1->SendRequestHeaders(std::move(headers), NO_MORE_DATA_TO_SEND);
+ EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders());
+
+ // Run until 1st stream is activated.
+ EXPECT_EQ(0u, delegate1.stream_id());
+ base::RunLoop().RunUntilIdle();
+ EXPECT_EQ(1u, delegate1.stream_id());
+ EXPECT_EQ(1u, session_->num_active_streams());
+ EXPECT_EQ(0u, session_->num_created_streams());
+ EXPECT_EQ(0u, session_->num_pushed_streams());
+ EXPECT_EQ(0u, session_->num_active_pushed_streams());
+
+ // Read EOF.
+ data.Resume();
+ base::RunLoop().RunUntilIdle();
+ EXPECT_FALSE(session_);
+}
+
TEST_P(SpdySessionTest, IgnoreReservedRemoteStreamsCount) {
// Streams in reserved remote state exist only in HTTP/2.
if (spdy_util_.spdy_version() < HTTP2)
« net/spdy/spdy_session.cc ('K') | « net/spdy/spdy_session.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698