Chromium Code Reviews| Index: net/spdy/spdy_session_unittest.cc |
| diff --git a/net/spdy/spdy_session_unittest.cc b/net/spdy/spdy_session_unittest.cc |
| index ea8ae113a0cb735a561a57041c5a8ac44d5b8825..0dc4019f2913b8d499391ccaa245ca81bb462767 100644 |
| --- a/net/spdy/spdy_session_unittest.cc |
| +++ b/net/spdy/spdy_session_unittest.cc |
| @@ -4842,6 +4842,151 @@ TEST_P(SpdySessionTest, RejectPushedStreamExceedingConcurrencyLimit) { |
| EXPECT_FALSE(session_); |
| } |
| +// Tests that only the HTTP SPDY push requests from trusted SPDY proxies are |
|
bengr
2015/12/29 18:02:33
Shouldn't SPDY push work for same origin pushes ev
tbansal1
2015/12/30 00:00:53
Fixed the comment.
|
| +// accepted. |
| +TEST_P(SpdySessionTest, TrustedSpdyProxy) { |
| + // kDefaultURL should not contain "example2.org". |
| + ASSERT_TRUE(std::string(kDefaultURL).find("example2.org") == |
| + std::string::npos); |
| + // push_a pushes resources for example2.org which is different from |
| + // kDefaultURL. push_a is HTTP, and should be accepted. |
| + scoped_ptr<SpdyFrame> push_a(spdy_util_.ConstructSpdyPush( |
| + nullptr, 0, 2, 1, "http://www.example2.org/a.dat")); |
| + // push_b is HTTPS, and should be refused. |
| + scoped_ptr<SpdyFrame> push_b(spdy_util_.ConstructSpdyPush( |
| + nullptr, 0, 4, 1, "https://www.example2.org/b.dat")); |
| + MockRead reads[] = { |
| + MockRead(ASYNC, ERR_IO_PENDING, 1), CreateMockRead(*push_a, 2), |
| + MockRead(ASYNC, ERR_IO_PENDING, 3), CreateMockRead(*push_b, 4), |
| + MockRead(ASYNC, ERR_IO_PENDING, 6), MockRead(ASYNC, 0, 7), |
| + }; |
| + |
| + scoped_ptr<SpdyFrame> req( |
| + spdy_util_.ConstructSpdyGet(nullptr, 0, false, 1, LOWEST, true)); |
| + scoped_ptr<SpdyFrame> rst( |
| + spdy_util_.ConstructSpdyRstStream(4, RST_STREAM_REFUSED_STREAM)); |
| + MockWrite writes[] = { |
| + CreateMockWrite(*req, 0), CreateMockWrite(*rst, 5), |
| + }; |
| + |
| + SequencedSocketData data(reads, arraysize(reads), writes, arraysize(writes)); |
| + session_deps_.socket_factory->AddSocketDataProvider(&data); |
| + |
| + CreateNetworkSession(); |
|
bengr
2015/12/29 18:02:33
You should be able to pass in the trusted SPDY pro
tbansal1
2015/12/30 00:00:52
Done.
|
| + CreateInsecureSpdySession(); |
| + |
| + session_->set_trusted_spdy_proxy_for_tests( |
| + HostPortPair::FromString("www.example.org:80")); |
| + |
| + base::WeakPtr<SpdyStream> spdy_stream1 = CreateStreamSynchronously( |
| + SPDY_REQUEST_RESPONSE_STREAM, session_, test_url_, LOWEST, BoundNetLog()); |
| + ASSERT_TRUE(spdy_stream1.get() != nullptr); |
| + EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| + test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| + spdy_stream1->SetDelegate(&delegate1); |
| + |
| + EXPECT_EQ(0u, session_->num_active_streams()); |
| + EXPECT_EQ(1u, session_->num_created_streams()); |
| + EXPECT_EQ(0u, session_->num_pushed_streams()); |
| + EXPECT_EQ(0u, session_->num_active_pushed_streams()); |
| + |
| + scoped_ptr<SpdyHeaderBlock> headers( |
| + spdy_util_.ConstructGetHeaderBlock(kDefaultURL)); |
| + spdy_stream1->SendRequestHeaders(std::move(headers), NO_MORE_DATA_TO_SEND); |
| + EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| + |
| + // Run until 1st stream is activated. |
| + EXPECT_EQ(0u, delegate1.stream_id()); |
| + base::RunLoop().RunUntilIdle(); |
| + EXPECT_EQ(1u, delegate1.stream_id()); |
| + EXPECT_EQ(1u, session_->num_active_streams()); |
| + EXPECT_EQ(0u, session_->num_created_streams()); |
| + EXPECT_EQ(0u, session_->num_pushed_streams()); |
| + EXPECT_EQ(0u, session_->num_active_pushed_streams()); |
| + |
| + // Run until pushed stream is created. |
| + data.Resume(); |
| + base::RunLoop().RunUntilIdle(); |
| + EXPECT_EQ(2u, session_->num_active_streams()); |
| + EXPECT_EQ(0u, session_->num_created_streams()); |
| + EXPECT_EQ(1u, session_->num_pushed_streams()); |
| + EXPECT_EQ(1u, session_->num_active_pushed_streams()); |
| + |
| + // Reset incoming pushed stream. |
| + data.Resume(); |
| + base::RunLoop().RunUntilIdle(); |
| + EXPECT_EQ(2u, session_->num_active_streams()); |
| + EXPECT_EQ(0u, session_->num_created_streams()); |
| + EXPECT_EQ(1u, session_->num_pushed_streams()); |
| + EXPECT_EQ(1u, session_->num_active_pushed_streams()); |
| + |
| + // Read EOF. |
| + data.Resume(); |
| + base::RunLoop().RunUntilIdle(); |
| + EXPECT_FALSE(session_); |
| +} |
| + |
| +// Tests that if the SPDY trusted proxy is not set, than push requests for a |
|
bengr
2015/12/29 18:02:33
Test that a push from the same origin should succe
tbansal1
2015/12/30 00:00:53
That's already checked in another existing test: R
|
| +// non-matching domain are refused. |
| +TEST_P(SpdySessionTest, TrustedSpdyProxyNotSet) { |
| + // kDefaultURL should not contain "example2.org". |
| + ASSERT_TRUE(std::string(kDefaultURL).find("example2.org") == |
| + std::string::npos); |
| + // push_a contains resource for a origin different than kDefaultURL, and |
| + // should be refused. |
| + scoped_ptr<SpdyFrame> push_a(spdy_util_.ConstructSpdyPush( |
| + nullptr, 0, 2, 1, "http://www.example2.org/a.dat")); |
| + MockRead reads[] = { |
| + MockRead(ASYNC, ERR_IO_PENDING, 1), CreateMockRead(*push_a, 2), |
| + MockRead(ASYNC, 0, 4), |
| + }; |
| + |
| + scoped_ptr<SpdyFrame> req( |
| + spdy_util_.ConstructSpdyGet(nullptr, 0, false, 1, LOWEST, true)); |
| + scoped_ptr<SpdyFrame> rst( |
| + spdy_util_.ConstructSpdyRstStream(2, RST_STREAM_REFUSED_STREAM)); |
| + MockWrite writes[] = { |
| + CreateMockWrite(*req, 0), CreateMockWrite(*rst, 3), |
| + }; |
| + |
| + SequencedSocketData data(reads, arraysize(reads), writes, arraysize(writes)); |
| + session_deps_.socket_factory->AddSocketDataProvider(&data); |
| + |
| + CreateNetworkSession(); |
| + CreateInsecureSpdySession(); |
| + |
| + base::WeakPtr<SpdyStream> spdy_stream1 = CreateStreamSynchronously( |
| + SPDY_REQUEST_RESPONSE_STREAM, session_, test_url_, LOWEST, BoundNetLog()); |
| + ASSERT_TRUE(spdy_stream1.get() != nullptr); |
| + EXPECT_EQ(0u, spdy_stream1->stream_id()); |
| + test::StreamDelegateDoNothing delegate1(spdy_stream1); |
| + spdy_stream1->SetDelegate(&delegate1); |
| + |
| + EXPECT_EQ(0u, session_->num_active_streams()); |
| + EXPECT_EQ(1u, session_->num_created_streams()); |
| + EXPECT_EQ(0u, session_->num_pushed_streams()); |
| + EXPECT_EQ(0u, session_->num_active_pushed_streams()); |
| + |
| + scoped_ptr<SpdyHeaderBlock> headers( |
| + spdy_util_.ConstructGetHeaderBlock(kDefaultURL)); |
| + spdy_stream1->SendRequestHeaders(std::move(headers), NO_MORE_DATA_TO_SEND); |
| + EXPECT_TRUE(spdy_stream1->HasUrlFromHeaders()); |
| + |
| + // Run until 1st stream is activated. |
| + EXPECT_EQ(0u, delegate1.stream_id()); |
| + base::RunLoop().RunUntilIdle(); |
| + EXPECT_EQ(1u, delegate1.stream_id()); |
| + EXPECT_EQ(1u, session_->num_active_streams()); |
| + EXPECT_EQ(0u, session_->num_created_streams()); |
| + EXPECT_EQ(0u, session_->num_pushed_streams()); |
| + EXPECT_EQ(0u, session_->num_active_pushed_streams()); |
| + |
| + // Read EOF. |
| + data.Resume(); |
| + base::RunLoop().RunUntilIdle(); |
| + EXPECT_FALSE(session_); |
| +} |
| + |
| TEST_P(SpdySessionTest, IgnoreReservedRemoteStreamsCount) { |
| // Streams in reserved remote state exist only in HTTP/2. |
| if (spdy_util_.spdy_version() < HTTP2) |