blob: 504504cbebdb548fffd49517354d5e504c7eacf5 [file] [log] [blame]
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/url_request/url_request_http_job.h"
#include <stdint.h>
#include <cstddef>
#include <memory>
#include <utility>
#include <vector>
#include "base/compiler_specific.h"
#include "base/macros.h"
#include "base/memory/ptr_util.h"
#include "base/memory/ref_counted.h"
#include "base/run_loop.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_split.h"
#include "base/test/bind_test_util.h"
#include "base/test/metrics/histogram_tester.h"
#include "base/test/task_environment.h"
#include "net/base/auth.h"
#include "net/base/isolation_info.h"
#include "net/base/network_isolation_key.h"
#include "net/base/request_priority.h"
#include "net/cert/ct_policy_status.h"
#include "net/cookies/cookie_monster.h"
#include "net/cookies/cookie_store_test_callbacks.h"
#include "net/cookies/cookie_store_test_helpers.h"
#include "net/http/http_transaction_factory.h"
#include "net/http/http_transaction_test_util.h"
#include "net/log/net_log_event_type.h"
#include "net/log/test_net_log.h"
#include "net/log/test_net_log_util.h"
#include "net/net_buildflags.h"
#include "net/proxy_resolution/configured_proxy_resolution_service.h"
#include "net/socket/next_proto.h"
#include "net/socket/socket_test_util.h"
#include "net/test/cert_test_util.h"
#include "net/test/embedded_test_server/default_handlers.h"
#include "net/test/gtest_util.h"
#include "net/test/test_data_directory.h"
#include "net/test/test_with_task_environment.h"
#include "net/traffic_annotation/network_traffic_annotation_test_helper.h"
#include "net/url_request/url_request.h"
#include "net/url_request/url_request_job_factory_impl.h"
#include "net/url_request/url_request_test_util.h"
#include "net/url_request/websocket_handshake_userdata_key.h"
#include "net/websockets/websocket_test_util.h"
#include "testing/gmock/include/gmock/gmock.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "url/gurl.h"
#include "url/url_constants.h"
#if defined(OS_ANDROID)
#include "base/android/jni_android.h"
#include "net/net_test_jni_headers/AndroidNetworkLibraryTestUtil_jni.h"
#endif
using net::test::IsError;
using net::test::IsOk;
namespace net {
namespace {
using ::testing::Return;
const char kSimpleGetMockWrite[] =
"GET / HTTP/1.1\r\n"
"Host: www.example.com\r\n"
"Connection: keep-alive\r\n"
"User-Agent: \r\n"
"Accept-Encoding: gzip, deflate\r\n"
"Accept-Language: en-us,fr\r\n\r\n";
const char kSimpleHeadMockWrite[] =
"HEAD / HTTP/1.1\r\n"
"Host: www.example.com\r\n"
"Connection: keep-alive\r\n"
"User-Agent: \r\n"
"Accept-Encoding: gzip, deflate\r\n"
"Accept-Language: en-us,fr\r\n\r\n";
const char kTrustAnchorRequestHistogram[] =
"Net.Certificate.TrustAnchor.Request";
const char kCTComplianceHistogramName[] =
"Net.CertificateTransparency.RequestComplianceStatus";
const char kCTRequiredHistogramName[] =
"Net.CertificateTransparency.CTRequiredRequestComplianceStatus";
// Inherit from URLRequestHttpJob to expose the priority and some
// other hidden functions.
class TestURLRequestHttpJob : public URLRequestHttpJob {
public:
explicit TestURLRequestHttpJob(URLRequest* request)
: URLRequestHttpJob(request,
request->context()->network_delegate(),
request->context()->http_user_agent_settings()),
use_null_source_stream_(false) {}
~TestURLRequestHttpJob() override = default;
// URLRequestJob implementation:
std::unique_ptr<SourceStream> SetUpSourceStream() override {
if (use_null_source_stream_)
return nullptr;
return URLRequestHttpJob::SetUpSourceStream();
}
void set_use_null_source_stream(bool use_null_source_stream) {
use_null_source_stream_ = use_null_source_stream;
}
using URLRequestHttpJob::SetPriority;
using URLRequestHttpJob::Start;
using URLRequestHttpJob::Kill;
using URLRequestHttpJob::priority;
private:
bool use_null_source_stream_;
DISALLOW_COPY_AND_ASSIGN(TestURLRequestHttpJob);
};
class URLRequestHttpJobSetUpSourceTest : public TestWithTaskEnvironment {
public:
URLRequestHttpJobSetUpSourceTest() : context_(true) {
test_job_interceptor_ = new TestJobInterceptor();
EXPECT_TRUE(test_job_factory_.SetProtocolHandler(
url::kHttpScheme, base::WrapUnique(test_job_interceptor_)));
context_.set_job_factory(&test_job_factory_);
context_.set_client_socket_factory(&socket_factory_);
context_.Init();
}
protected:
MockClientSocketFactory socket_factory_;
// |test_job_interceptor_| is owned by |test_job_factory_|.
TestJobInterceptor* test_job_interceptor_;
URLRequestJobFactoryImpl test_job_factory_;
TestURLRequestContext context_;
TestDelegate delegate_;
};
// Tests that if SetUpSourceStream() returns nullptr, the request fails.
TEST_F(URLRequestHttpJobSetUpSourceTest, SetUpSourceFails) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
std::unique_ptr<URLRequest> request =
context_.CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate_, TRAFFIC_ANNOTATION_FOR_TESTS);
auto job = std::make_unique<TestURLRequestHttpJob>(request.get());
job->set_use_null_source_stream(true);
test_job_interceptor_->set_main_intercept_job(std::move(job));
request->Start();
delegate_.RunUntilComplete();
EXPECT_EQ(ERR_CONTENT_DECODING_INIT_FAILED, delegate_.request_status());
}
// Tests that if there is an unknown content-encoding type, the raw response
// body is passed through.
TEST_F(URLRequestHttpJobSetUpSourceTest, UnknownEncoding) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Encoding: foo, gzip\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
std::unique_ptr<URLRequest> request =
context_.CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate_, TRAFFIC_ANNOTATION_FOR_TESTS);
auto job = std::make_unique<TestURLRequestHttpJob>(request.get());
test_job_interceptor_->set_main_intercept_job(std::move(job));
request->Start();
delegate_.RunUntilComplete();
EXPECT_EQ(OK, delegate_.request_status());
EXPECT_EQ("Test Content", delegate_.data_received());
}
// TaskEnvironment is required to instantiate a
// net::ConfiguredProxyResolutionService, which registers itself as an IP
// Address Observer with the NetworkChangeNotifier.
using URLRequestHttpJobWithProxyTest = TestWithTaskEnvironment;
class URLRequestHttpJobWithProxy {
public:
explicit URLRequestHttpJobWithProxy(
std::unique_ptr<ProxyResolutionService> proxy_resolution_service)
: proxy_resolution_service_(std::move(proxy_resolution_service)),
context_(new TestURLRequestContext(true)) {
context_->set_client_socket_factory(&socket_factory_);
context_->set_network_delegate(&network_delegate_);
context_->set_proxy_resolution_service(proxy_resolution_service_.get());
context_->Init();
}
MockClientSocketFactory socket_factory_;
TestNetworkDelegate network_delegate_;
std::unique_ptr<ProxyResolutionService> proxy_resolution_service_;
std::unique_ptr<TestURLRequestContext> context_;
private:
DISALLOW_COPY_AND_ASSIGN(URLRequestHttpJobWithProxy);
};
// Tests that when proxy is not used, the proxy server is set correctly on the
// URLRequest.
TEST_F(URLRequestHttpJobWithProxyTest, TestFailureWithoutProxy) {
URLRequestHttpJobWithProxy http_job_with_proxy(nullptr);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_CONNECTION_RESET)};
StaticSocketDataProvider socket_data(reads, writes);
http_job_with_proxy.socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
http_job_with_proxy.context_->CreateRequest(
GURL("http://www.example.com"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsError(ERR_CONNECTION_RESET));
EXPECT_EQ(ProxyServer::Direct(), request->proxy_server());
EXPECT_EQ(0, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
// Tests that when one proxy is in use and the connection to the proxy server
// fails, the proxy server is still set correctly on the URLRequest.
TEST_F(URLRequestHttpJobWithProxyTest, TestSuccessfulWithOneProxy) {
const char kSimpleProxyGetMockWrite[] =
"GET http://www.example.com/ HTTP/1.1\r\n"
"Host: www.example.com\r\n"
"Proxy-Connection: keep-alive\r\n"
"User-Agent: \r\n"
"Accept-Encoding: gzip, deflate\r\n"
"Accept-Language: en-us,fr\r\n\r\n";
const ProxyServer proxy_server =
ProxyServer::FromURI("http://origin.net:80", ProxyServer::SCHEME_HTTP);
std::unique_ptr<ProxyResolutionService> proxy_resolution_service =
ConfiguredProxyResolutionService::CreateFixedFromPacResult(
proxy_server.ToPacString(), TRAFFIC_ANNOTATION_FOR_TESTS);
MockWrite writes[] = {MockWrite(kSimpleProxyGetMockWrite)};
MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_CONNECTION_RESET)};
StaticSocketDataProvider socket_data(reads, writes);
URLRequestHttpJobWithProxy http_job_with_proxy(
std::move(proxy_resolution_service));
http_job_with_proxy.socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
http_job_with_proxy.context_->CreateRequest(
GURL("http://www.example.com"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsError(ERR_CONNECTION_RESET));
// When request fails due to proxy connection errors, the proxy server should
// still be set on the |request|.
EXPECT_EQ(proxy_server, request->proxy_server());
EXPECT_EQ(0, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(0, request->GetTotalReceivedBytes());
}
// Tests that when two proxies are in use and the connection to the first proxy
// server fails, the proxy server is set correctly on the URLRequest.
TEST_F(URLRequestHttpJobWithProxyTest,
TestContentLengthSuccessfulRequestWithTwoProxies) {
const ProxyServer proxy_server =
ProxyServer::FromURI("http://origin.net:80", ProxyServer::SCHEME_HTTP);
// Connection to |proxy_server| would fail. Request should be fetched over
// DIRECT.
std::unique_ptr<ProxyResolutionService> proxy_resolution_service =
ConfiguredProxyResolutionService::CreateFixedFromPacResult(
proxy_server.ToPacString() + "; " +
ProxyServer::Direct().ToPacString(),
TRAFFIC_ANNOTATION_FOR_TESTS);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content"), MockRead(ASYNC, OK)};
MockConnect mock_connect_1(SYNCHRONOUS, ERR_CONNECTION_RESET);
StaticSocketDataProvider connect_data_1;
connect_data_1.set_connect_data(mock_connect_1);
StaticSocketDataProvider socket_data(reads, writes);
URLRequestHttpJobWithProxy http_job_with_proxy(
std::move(proxy_resolution_service));
http_job_with_proxy.socket_factory_.AddSocketDataProvider(&connect_data_1);
http_job_with_proxy.socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
http_job_with_proxy.context_->CreateRequest(
GURL("http://www.example.com"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(ProxyServer::Direct(), request->proxy_server());
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
class URLRequestHttpJobTest : public TestWithTaskEnvironment {
protected:
URLRequestHttpJobTest() : context_(true) {
context_.set_http_transaction_factory(&network_layer_);
// The |test_job_factory_| takes ownership of the interceptor.
test_job_interceptor_ = new TestJobInterceptor();
EXPECT_TRUE(test_job_factory_.SetProtocolHandler(
url::kHttpScheme, base::WrapUnique(test_job_interceptor_)));
context_.set_job_factory(&test_job_factory_);
context_.set_net_log(&net_log_);
context_.Init();
req_ =
context_.CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate_, TRAFFIC_ANNOTATION_FOR_TESTS);
}
MockNetworkLayer network_layer_;
// |test_job_interceptor_| is owned by |test_job_factory_|.
TestJobInterceptor* test_job_interceptor_;
URLRequestJobFactoryImpl test_job_factory_;
TestURLRequestContext context_;
TestDelegate delegate_;
RecordingTestNetLog net_log_;
std::unique_ptr<URLRequest> req_;
};
class URLRequestHttpJobWithMockSocketsTest : public TestWithTaskEnvironment {
protected:
URLRequestHttpJobWithMockSocketsTest()
: context_(new TestURLRequestContext(true)) {
context_->set_client_socket_factory(&socket_factory_);
context_->set_network_delegate(&network_delegate_);
context_->Init();
}
MockClientSocketFactory socket_factory_;
TestNetworkDelegate network_delegate_;
std::unique_ptr<TestURLRequestContext> context_;
};
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestContentLengthSuccessfulRequest) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
// Tests a successful HEAD request.
TEST_F(URLRequestHttpJobWithMockSocketsTest, TestSuccessfulHead) {
MockWrite writes[] = {MockWrite(kSimpleHeadMockWrite)};
MockRead reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 0\r\n\r\n")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->set_method("HEAD");
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(0, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
// Similar to above test but tests that even if response body is there in the
// HEAD response stream, it should not be read due to HttpStreamParser's logic.
TEST_F(URLRequestHttpJobWithMockSocketsTest, TestSuccessfulHeadWithContent) {
MockWrite writes[] = {MockWrite(kSimpleHeadMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->set_method("HEAD");
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(0, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads) - 12, request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest, TestSuccessfulCachedHeadRequest) {
const url::Origin kOrigin1 =
url::Origin::Create(GURL("http://www.example.com"));
const IsolationInfo kTestIsolationInfo =
IsolationInfo::CreateForInternalRequest(kOrigin1);
// Cache the response.
{
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("http://www.example.com"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->set_isolation_info(kTestIsolationInfo);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
// Send a HEAD request for the cached response.
{
MockWrite writes[] = {MockWrite(kSimpleHeadMockWrite)};
MockRead reads[] = {
MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 0\r\n\r\n")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("http://www.example.com"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
// Use the cached version.
request->SetLoadFlags(LOAD_SKIP_CACHE_VALIDATION);
request->set_method("HEAD");
request->set_isolation_info(kTestIsolationInfo);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(0, request->received_response_content_length());
EXPECT_EQ(0, request->GetTotalSentBytes());
EXPECT_EQ(0, request->GetTotalReceivedBytes());
}
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestContentLengthSuccessfulHttp09Request) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("Test Content"),
MockRead(net::SYNCHRONOUS, net::OK)};
StaticSocketDataProvider socket_data(reads, base::span<MockWrite>());
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest, TestContentLengthFailedRequest) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 20\r\n\r\n"),
MockRead("Test Content"),
MockRead(net::SYNCHRONOUS, net::ERR_FAILED)};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsError(ERR_FAILED));
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestContentLengthCancelledRequest) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 20\r\n\r\n"),
MockRead("Test Content"),
MockRead(net::SYNCHRONOUS, net::ERR_IO_PENDING)};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
delegate.set_cancel_in_received_data(true);
request->Start();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsError(ERR_ABORTED));
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestRawHeaderSizeSuccessfullRequest) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
const std::string& response_header =
"HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n";
const std::string& content_data = "Test Content";
MockRead reads[] = {MockRead(response_header.c_str()),
MockRead(content_data.c_str()),
MockRead(net::SYNCHRONOUS, net::OK)};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_EQ(OK, delegate.request_status());
EXPECT_EQ(static_cast<int>(content_data.size()),
request->received_response_content_length());
EXPECT_EQ(static_cast<int>(response_header.size()),
request->raw_header_size());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestRawHeaderSizeSuccessfull100ContinueRequest) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
const std::string& continue_header = "HTTP/1.1 100 Continue\r\n\r\n";
const std::string& response_header =
"HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n";
const std::string& content_data = "Test Content";
MockRead reads[] = {
MockRead(continue_header.c_str()), MockRead(response_header.c_str()),
MockRead(content_data.c_str()), MockRead(net::SYNCHRONOUS, net::OK)};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
delegate.RunUntilComplete();
EXPECT_EQ(OK, delegate.request_status());
EXPECT_EQ(static_cast<int>(content_data.size()),
request->received_response_content_length());
EXPECT_EQ(static_cast<int>(continue_header.size() + response_header.size()),
request->raw_header_size());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestRawHeaderSizeFailureTruncatedHeaders) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.0 200 OK\r\n"
"Content-Len"),
MockRead(net::SYNCHRONOUS, net::OK)};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
delegate.set_cancel_in_response_started(true);
request->Start();
base::RunLoop().RunUntilIdle();
EXPECT_EQ(ERR_ABORTED, delegate.request_status());
EXPECT_EQ(0, request->received_response_content_length());
EXPECT_EQ(28, request->raw_header_size());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestRawHeaderSizeSuccessfullContinuiousRead) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
const std::string& header_data =
"HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n";
const std::string& content_data = "Test Content";
std::string single_read_content = header_data;
single_read_content.append(content_data);
MockRead reads[] = {MockRead(single_read_content.c_str())};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_EQ(OK, delegate.request_status());
EXPECT_EQ(static_cast<int>(content_data.size()),
request->received_response_content_length());
EXPECT_EQ(static_cast<int>(header_data.size()), request->raw_header_size());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestNetworkBytesRedirectedRequest) {
MockWrite redirect_writes[] = {
MockWrite("GET / HTTP/1.1\r\n"
"Host: www.redirect.com\r\n"
"Connection: keep-alive\r\n"
"User-Agent: \r\n"
"Accept-Encoding: gzip, deflate\r\n"
"Accept-Language: en-us,fr\r\n\r\n")};
MockRead redirect_reads[] = {
MockRead("HTTP/1.1 302 Found\r\n"
"Location: http://www.example.com\r\n\r\n"),
};
StaticSocketDataProvider redirect_socket_data(redirect_reads,
redirect_writes);
socket_factory_.AddSocketDataProvider(&redirect_socket_data);
MockWrite final_writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead final_reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider final_socket_data(final_reads, final_writes);
socket_factory_.AddSocketDataProvider(&final_socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.redirect.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
ASSERT_TRUE(request->is_pending());
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(12, request->received_response_content_length());
// Should not include the redirect.
EXPECT_EQ(CountWriteBytes(final_writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(final_reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestNetworkBytesCancelledAfterHeaders) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n\r\n")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
delegate.set_cancel_in_response_started(true);
request->Start();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsError(ERR_ABORTED));
EXPECT_EQ(0, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestNetworkBytesCancelledImmediately) {
StaticSocketDataProvider socket_data;
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
request->Cancel();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsError(ERR_ABORTED));
EXPECT_EQ(0, request->received_response_content_length());
EXPECT_EQ(0, request->GetTotalSentBytes());
EXPECT_EQ(0, request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest, TestHttpTimeToFirstByte) {
base::HistogramTester histograms;
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
histograms.ExpectTotalCount("Net.HttpTimeToFirstByte", 0);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
histograms.ExpectTotalCount("Net.HttpTimeToFirstByte", 1);
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpTimeToFirstByteForCancelledTask) {
base::HistogramTester histograms;
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
request->Cancel();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsError(ERR_ABORTED));
histograms.ExpectTotalCount("Net.HttpTimeToFirstByte", 0);
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobSuccessPriorityKeyedTotalTime) {
base::HistogramTester histograms;
for (int priority = 0; priority < net::NUM_PRIORITIES; ++priority) {
for (int request_index = 0; request_index <= priority; ++request_index) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com/"),
static_cast<net::RequestPriority>(priority),
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
}
}
for (int priority = 0; priority < net::NUM_PRIORITIES; ++priority) {
histograms.ExpectTotalCount("Net.HttpJob.TotalTimeSuccess.Priority" +
base::NumberToString(priority),
priority + 1);
}
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobRecordsTrustAnchorHistograms) {
SSLSocketDataProvider ssl_socket_data(net::ASYNC, net::OK);
ssl_socket_data.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
// Simulate a certificate chain issued by "C=US, O=Google Trust Services LLC,
// CN=GTS Root R4". This publicly-trusted root was chosen as it was included
// in 2017 and is not anticipated to be removed from all supported platforms
// for a few decades.
// Note: The actual cert in |cert| does not matter for this testing.
SHA256HashValue leaf_hash = {{0}};
SHA256HashValue intermediate_hash = {{1}};
SHA256HashValue root_hash = {
{0x98, 0x47, 0xe5, 0x65, 0x3e, 0x5e, 0x9e, 0x84, 0x75, 0x16, 0xe5,
0xcb, 0x81, 0x86, 0x06, 0xaa, 0x75, 0x44, 0xa1, 0x9b, 0xe6, 0x7f,
0xd7, 0x36, 0x6d, 0x50, 0x69, 0x88, 0xe8, 0xd8, 0x43, 0x47}};
ssl_socket_data.ssl_info.public_key_hashes.push_back(HashValue(leaf_hash));
ssl_socket_data.ssl_info.public_key_hashes.push_back(
HashValue(intermediate_hash));
ssl_socket_data.ssl_info.public_key_hashes.push_back(HashValue(root_hash));
const base::HistogramBase::Sample kGTSRootR4HistogramID = 486;
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
base::HistogramTester histograms;
histograms.ExpectTotalCount(kTrustAnchorRequestHistogram, 0);
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("https://www.example.com/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
histograms.ExpectTotalCount(kTrustAnchorRequestHistogram, 1);
histograms.ExpectUniqueSample(kTrustAnchorRequestHistogram,
kGTSRootR4HistogramID, 1);
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobDoesNotRecordTrustAnchorHistogramsWhenNoNetworkLoad) {
SSLSocketDataProvider ssl_socket_data(net::ASYNC, net::OK);
ssl_socket_data.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
// Simulate a request loaded from a non-network source, such as a disk
// cache.
ssl_socket_data.ssl_info.public_key_hashes.clear();
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
base::HistogramTester histograms;
histograms.ExpectTotalCount(kTrustAnchorRequestHistogram, 0);
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("https://www.example.com/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
histograms.ExpectTotalCount(kTrustAnchorRequestHistogram, 0);
}
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobRecordsMostSpecificTrustAnchorHistograms) {
SSLSocketDataProvider ssl_socket_data(net::ASYNC, net::OK);
ssl_socket_data.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
// Simulate a certificate chain issued by "C=US, O=Google Trust Services LLC,
// CN=GTS Root R4". This publicly-trusted root was chosen as it was included
// in 2017 and is not anticipated to be removed from all supported platforms
// for a few decades.
// Note: The actual cert in |cert| does not matter for this testing.
SHA256HashValue leaf_hash = {{0}};
SHA256HashValue intermediate_hash = {{1}};
SHA256HashValue gts_root_r3_hash = {
{0x41, 0x79, 0xed, 0xd9, 0x81, 0xef, 0x74, 0x74, 0x77, 0xb4, 0x96,
0x26, 0x40, 0x8a, 0xf4, 0x3d, 0xaa, 0x2c, 0xa7, 0xab, 0x7f, 0x9e,
0x08, 0x2c, 0x10, 0x60, 0xf8, 0x40, 0x96, 0x77, 0x43, 0x48}};
SHA256HashValue gts_root_r4_hash = {
{0x98, 0x47, 0xe5, 0x65, 0x3e, 0x5e, 0x9e, 0x84, 0x75, 0x16, 0xe5,
0xcb, 0x81, 0x86, 0x06, 0xaa, 0x75, 0x44, 0xa1, 0x9b, 0xe6, 0x7f,
0xd7, 0x36, 0x6d, 0x50, 0x69, 0x88, 0xe8, 0xd8, 0x43, 0x47}};
ssl_socket_data.ssl_info.public_key_hashes.push_back(HashValue(leaf_hash));
ssl_socket_data.ssl_info.public_key_hashes.push_back(
HashValue(intermediate_hash));
ssl_socket_data.ssl_info.public_key_hashes.push_back(
HashValue(gts_root_r3_hash));
ssl_socket_data.ssl_info.public_key_hashes.push_back(
HashValue(gts_root_r4_hash));
const base::HistogramBase::Sample kGTSRootR3HistogramID = 485;
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
base::HistogramTester histograms;
histograms.ExpectTotalCount(kTrustAnchorRequestHistogram, 0);
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("https://www.example.com/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
histograms.ExpectTotalCount(kTrustAnchorRequestHistogram, 1);
histograms.ExpectUniqueSample(kTrustAnchorRequestHistogram,
kGTSRootR3HistogramID, 1);
}
namespace {
// An ExpectCTReporter that records the number of times OnExpectCTFailed() was
// called.
class MockExpectCTReporter : public TransportSecurityState::ExpectCTReporter {
public:
MockExpectCTReporter() = default;
~MockExpectCTReporter() override = default;
void OnExpectCTFailed(
const HostPortPair& host_port_pair,
const GURL& report_uri,
base::Time expiration,
const X509Certificate* validated_certificate_chain,
const X509Certificate* served_certificate_chain,
const SignedCertificateTimestampAndStatusList&
signed_certificate_timestamps,
const NetworkIsolationKey& network_isolation_key) override {
num_failures_++;
network_isolation_key_ = network_isolation_key;
}
int num_failures() const { return num_failures_; }
const NetworkIsolationKey& network_isolation_key() const {
return network_isolation_key_;
}
private:
int num_failures_ = 0;
NetworkIsolationKey network_isolation_key_;
};
} // namespace
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobSendsNetworkIsolationKeyWhenProcessingExpectCTHeader) {
SSLSocketDataProvider ssl_socket_data(net::ASYNC, net::OK);
ssl_socket_data.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
ssl_socket_data.ssl_info.is_issued_by_known_root = true;
ssl_socket_data.ssl_info.ct_policy_compliance_required = false;
ssl_socket_data.ssl_info.ct_policy_compliance =
ct::CTPolicyCompliance::CT_POLICY_NOT_DIVERSE_SCTS;
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {
MockRead(
"HTTP/1.1 200 OK\r\n"
"Expect-CT: max-age=100, enforce, report-uri=https://example.test\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
base::HistogramTester histograms;
MockExpectCTReporter reporter;
TransportSecurityState transport_security_state;
transport_security_state.SetExpectCTReporter(&reporter);
context_->set_transport_security_state(&transport_security_state);
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("https://www.example.com/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
IsolationInfo isolation_info = IsolationInfo::CreateTransient();
request->set_isolation_info(isolation_info);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
ASSERT_EQ(1, reporter.num_failures());
EXPECT_EQ(isolation_info.network_isolation_key(),
reporter.network_isolation_key());
}
// Tests that the CT compliance histogram is recorded, even if CT is not
// required.
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobRecordsCTComplianceHistograms) {
SSLSocketDataProvider ssl_socket_data(net::ASYNC, net::OK);
ssl_socket_data.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
ssl_socket_data.ssl_info.is_issued_by_known_root = true;
ssl_socket_data.ssl_info.ct_policy_compliance_required = false;
ssl_socket_data.ssl_info.ct_policy_compliance =
ct::CTPolicyCompliance::CT_POLICY_NOT_DIVERSE_SCTS;
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
base::HistogramTester histograms;
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("https://www.example.com/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
histograms.ExpectUniqueSample(
kCTComplianceHistogramName,
static_cast<int32_t>(ct::CTPolicyCompliance::CT_POLICY_NOT_DIVERSE_SCTS),
1);
// CTRequiredRequestComplianceStatus should *not* have been recorded because
// it is only recorded for requests which are required to be compliant.
histograms.ExpectTotalCount(kCTRequiredHistogramName, 0);
}
// Tests that the CT compliance histograms are not recorded for
// locally-installed trust anchors.
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobDoesNotRecordCTComplianceHistogramsForLocalRoot) {
SSLSocketDataProvider ssl_socket_data(net::ASYNC, net::OK);
ssl_socket_data.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
ssl_socket_data.ssl_info.is_issued_by_known_root = false;
ssl_socket_data.ssl_info.ct_policy_compliance_required = false;
ssl_socket_data.ssl_info.ct_policy_compliance =
ct::CTPolicyCompliance::CT_POLICY_NOT_DIVERSE_SCTS;
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
base::HistogramTester histograms;
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("https://www.example.com/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
histograms.ExpectTotalCount(kCTComplianceHistogramName, 0);
histograms.ExpectTotalCount(kCTRequiredHistogramName, 0);
}
// Tests that the CT compliance histogram is recorded when CT is required but
// not compliant.
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobRecordsCTRequiredHistogram) {
SSLSocketDataProvider ssl_socket_data(net::ASYNC, net::OK);
ssl_socket_data.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
ssl_socket_data.ssl_info.is_issued_by_known_root = true;
ssl_socket_data.ssl_info.ct_policy_compliance_required = true;
ssl_socket_data.ssl_info.ct_policy_compliance =
ct::CTPolicyCompliance::CT_POLICY_NOT_DIVERSE_SCTS;
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
base::HistogramTester histograms;
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("https://www.example.com/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
histograms.ExpectUniqueSample(
kCTComplianceHistogramName,
static_cast<int32_t>(ct::CTPolicyCompliance::CT_POLICY_NOT_DIVERSE_SCTS),
1);
histograms.ExpectUniqueSample(
kCTRequiredHistogramName,
static_cast<int32_t>(ct::CTPolicyCompliance::CT_POLICY_NOT_DIVERSE_SCTS),
1);
}
// Tests that the CT compliance histograms are not recorded when there is an
// unrelated certificate error.
TEST_F(URLRequestHttpJobWithMockSocketsTest,
TestHttpJobDoesNotRecordCTHistogramWithCertError) {
SSLSocketDataProvider ssl_socket_data(net::ASYNC, net::OK);
ssl_socket_data.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem");
ssl_socket_data.ssl_info.is_issued_by_known_root = true;
ssl_socket_data.ssl_info.ct_policy_compliance_required = true;
ssl_socket_data.ssl_info.ct_policy_compliance =
ct::CTPolicyCompliance::CT_POLICY_NOT_DIVERSE_SCTS;
ssl_socket_data.ssl_info.cert_status = net::CERT_STATUS_DATE_INVALID;
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data);
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
base::HistogramTester histograms;
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context_->CreateRequest(
GURL("https://www.example.com/"), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsOk());
histograms.ExpectTotalCount(kCTComplianceHistogramName, 0);
histograms.ExpectTotalCount(kCTRequiredHistogramName, 0);
}
TEST_F(URLRequestHttpJobWithMockSocketsTest, EncodingAdvertisementOnRange) {
MockWrite writes[] = {
MockWrite("GET / HTTP/1.1\r\n"
"Host: www.example.com\r\n"
"Connection: keep-alive\r\n"
"User-Agent: \r\n"
"Accept-Encoding: identity\r\n"
"Accept-Language: en-us,fr\r\n"
"Range: bytes=0-1023\r\n\r\n")};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Accept-Ranges: bytes\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
// Make the extra header to trigger the change in "Accepted-Encoding"
HttpRequestHeaders headers;
headers.SetHeader("Range", "bytes=0-1023");
request->SetExtraRequestHeaders(headers);
request->Start();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithMockSocketsTest, RangeRequestOverrideEncoding) {
MockWrite writes[] = {
MockWrite("GET / HTTP/1.1\r\n"
"Host: www.example.com\r\n"
"Connection: keep-alive\r\n"
"Accept-Encoding: gzip, deflate\r\n"
"User-Agent: \r\n"
"Accept-Language: en-us,fr\r\n"
"Range: bytes=0-1023\r\n\r\n")};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Accept-Ranges: bytes\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
// Explicitly set "Accept-Encoding" to make sure it's not overridden by
// AddExtraHeaders
HttpRequestHeaders headers;
headers.SetHeader("Accept-Encoding", "gzip, deflate");
headers.SetHeader("Range", "bytes=0-1023");
request->SetExtraRequestHeaders(headers);
request->Start();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobTest, TestCancelWhileReadingCookies) {
DelayedCookieMonster cookie_monster;
TestURLRequestContext context(true);
context.set_cookie_store(&cookie_monster);
context.Init();
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context.CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
request->Cancel();
delegate.RunUntilComplete();
EXPECT_THAT(delegate.request_status(), IsError(ERR_ABORTED));
}
// Make sure that SetPriority actually sets the URLRequestHttpJob's
// priority, before start. Other tests handle the after start case.
TEST_F(URLRequestHttpJobTest, SetPriorityBasic) {
auto job = std::make_unique<TestURLRequestHttpJob>(req_.get());
EXPECT_EQ(DEFAULT_PRIORITY, job->priority());
job->SetPriority(LOWEST);
EXPECT_EQ(LOWEST, job->priority());
job->SetPriority(LOW);
EXPECT_EQ(LOW, job->priority());
}
// Make sure that URLRequestHttpJob passes on its priority to its
// transaction on start.
TEST_F(URLRequestHttpJobTest, SetTransactionPriorityOnStart) {
test_job_interceptor_->set_main_intercept_job(
std::make_unique<TestURLRequestHttpJob>(req_.get()));
req_->SetPriority(LOW);
EXPECT_FALSE(network_layer_.last_transaction());
req_->Start();
ASSERT_TRUE(network_layer_.last_transaction());
EXPECT_EQ(LOW, network_layer_.last_transaction()->priority());
}
// Make sure that URLRequestHttpJob passes on its priority updates to
// its transaction.
TEST_F(URLRequestHttpJobTest, SetTransactionPriority) {
test_job_interceptor_->set_main_intercept_job(
std::make_unique<TestURLRequestHttpJob>(req_.get()));
req_->SetPriority(LOW);
req_->Start();
ASSERT_TRUE(network_layer_.last_transaction());
EXPECT_EQ(LOW, network_layer_.last_transaction()->priority());
req_->SetPriority(HIGHEST);
EXPECT_EQ(HIGHEST, network_layer_.last_transaction()->priority());
}
TEST_F(URLRequestHttpJobTest, HSTSInternalRedirectTest) {
// Setup HSTS state.
context_.transport_security_state()->AddHSTS(
"upgrade.test", base::Time::Now() + base::TimeDelta::FromSeconds(10),
true);
ASSERT_TRUE(
context_.transport_security_state()->ShouldUpgradeToSSL("upgrade.test"));
ASSERT_FALSE(context_.transport_security_state()->ShouldUpgradeToSSL(
"no-upgrade.test"));
struct TestCase {
const char* url;
bool upgrade_expected;
const char* url_expected;
} cases[] = {
{"http://upgrade.test/", true, "https://upgrade.test/"},
{"http://upgrade.test:123/", true, "https://upgrade.test:123/"},
{"http://no-upgrade.test/", false, "http://no-upgrade.test/"},
{"http://no-upgrade.test:123/", false, "http://no-upgrade.test:123/"},
#if BUILDFLAG(ENABLE_WEBSOCKETS)
{"ws://upgrade.test/", true, "wss://upgrade.test/"},
{"ws://upgrade.test:123/", true, "wss://upgrade.test:123/"},
{"ws://no-upgrade.test/", false, "ws://no-upgrade.test/"},
{"ws://no-upgrade.test:123/", false, "ws://no-upgrade.test:123/"},
#endif // BUILDFLAG(ENABLE_WEBSOCKETS)
};
for (const auto& test : cases) {
SCOPED_TRACE(test.url);
TestDelegate d;
TestNetworkDelegate network_delegate;
std::unique_ptr<URLRequest> r(context_.CreateRequest(
GURL(test.url), DEFAULT_PRIORITY, &d, TRAFFIC_ANNOTATION_FOR_TESTS));
net_log_.Clear();
r->Start();
d.RunUntilComplete();
if (test.upgrade_expected) {
auto entries = net_log_.GetEntriesWithType(
net::NetLogEventType::URL_REQUEST_REDIRECT_JOB);
int redirects = entries.size();
for (const auto& entry : entries) {
EXPECT_EQ("HSTS", GetStringValueFromParams(entry, "reason"));
}
EXPECT_EQ(1, redirects);
EXPECT_EQ(1, d.received_redirect_count());
EXPECT_EQ(2u, r->url_chain().size());
} else {
EXPECT_EQ(0, d.received_redirect_count());
EXPECT_EQ(1u, r->url_chain().size());
}
EXPECT_EQ(GURL(test.url_expected), r->url());
}
}
TEST_F(URLRequestHttpJobTest, HSTSInternalRedirectCallback) {
EmbeddedTestServer https_test(EmbeddedTestServer::TYPE_HTTPS);
https_test.AddDefaultHandlers(base::FilePath());
ASSERT_TRUE(https_test.Start());
TestURLRequestContext context;
context.transport_security_state()->AddHSTS(
"127.0.0.1", base::Time::Now() + base::TimeDelta::FromSeconds(10), true);
ASSERT_TRUE(
context.transport_security_state()->ShouldUpgradeToSSL("127.0.0.1"));
GURL::Replacements replace_scheme;
replace_scheme.SetSchemeStr("http");
{
GURL url(
https_test.GetURL("/echoheader").ReplaceComponents(replace_scheme));
TestDelegate delegate;
HttpRequestHeaders extra_headers;
extra_headers.SetHeader("X-HSTS-Test", "1");
HttpRawRequestHeaders raw_req_headers;
std::unique_ptr<URLRequest> r(context.CreateRequest(
url, DEFAULT_PRIORITY, &delegate, TRAFFIC_ANNOTATION_FOR_TESTS));
r->SetExtraRequestHeaders(extra_headers);
r->SetRequestHeadersCallback(base::BindRepeating(
&HttpRawRequestHeaders::Assign, base::Unretained(&raw_req_headers)));
r->Start();
delegate.RunUntilRedirect();
EXPECT_FALSE(raw_req_headers.headers().empty());
std::string value;
EXPECT_TRUE(raw_req_headers.FindHeaderForTest("X-HSTS-Test", &value));
EXPECT_EQ("1", value);
EXPECT_EQ("GET /echoheader HTTP/1.1\r\n", raw_req_headers.request_line());
raw_req_headers = HttpRawRequestHeaders();
r->FollowDeferredRedirect(base::nullopt /* removed_headers */,
base::nullopt /* modified_headers */);
delegate.RunUntilComplete();
EXPECT_FALSE(raw_req_headers.headers().empty());
}
{
GURL url(https_test.GetURL("/echoheader?foo=bar")
.ReplaceComponents(replace_scheme));
TestDelegate delegate;
HttpRawRequestHeaders raw_req_headers;
std::unique_ptr<URLRequest> r(context.CreateRequest(
url, DEFAULT_PRIORITY, &delegate, TRAFFIC_ANNOTATION_FOR_TESTS));
r->SetRequestHeadersCallback(base::BindRepeating(
&HttpRawRequestHeaders::Assign, base::Unretained(&raw_req_headers)));
r->Start();
delegate.RunUntilRedirect();
EXPECT_EQ("GET /echoheader?foo=bar HTTP/1.1\r\n",
raw_req_headers.request_line());
}
{
GURL url(
https_test.GetURL("/echoheader#foo").ReplaceComponents(replace_scheme));
TestDelegate delegate;
HttpRawRequestHeaders raw_req_headers;
std::unique_ptr<URLRequest> r(context.CreateRequest(
url, DEFAULT_PRIORITY, &delegate, TRAFFIC_ANNOTATION_FOR_TESTS));
r->SetRequestHeadersCallback(base::BindRepeating(
&HttpRawRequestHeaders::Assign, base::Unretained(&raw_req_headers)));
r->Start();
delegate.RunUntilRedirect();
EXPECT_EQ("GET /echoheader HTTP/1.1\r\n", raw_req_headers.request_line());
}
}
class URLRequestHttpJobWithBrotliSupportTest : public TestWithTaskEnvironment {
protected:
URLRequestHttpJobWithBrotliSupportTest()
: context_(new TestURLRequestContext(true)) {
auto params = std::make_unique<HttpNetworkSession::Params>();
context_->set_enable_brotli(true);
context_->set_http_network_session_params(std::move(params));
context_->set_client_socket_factory(&socket_factory_);
context_->Init();
}
MockClientSocketFactory socket_factory_;
std::unique_ptr<TestURLRequestContext> context_;
};
TEST_F(URLRequestHttpJobWithBrotliSupportTest, NoBrotliAdvertisementOverHttp) {
MockWrite writes[] = {MockWrite(kSimpleGetMockWrite)};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("http://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
TEST_F(URLRequestHttpJobWithBrotliSupportTest, BrotliAdvertisement) {
net::SSLSocketDataProvider ssl_socket_data_provider(net::ASYNC, net::OK);
ssl_socket_data_provider.next_proto = kProtoHTTP11;
ssl_socket_data_provider.ssl_info.cert =
ImportCertFromFile(GetTestCertsDirectory(), "unittest.selfsigned.der");
ASSERT_TRUE(ssl_socket_data_provider.ssl_info.cert);
socket_factory_.AddSSLSocketDataProvider(&ssl_socket_data_provider);
MockWrite writes[] = {
MockWrite("GET / HTTP/1.1\r\n"
"Host: www.example.com\r\n"
"Connection: keep-alive\r\n"
"User-Agent: \r\n"
"Accept-Encoding: gzip, deflate, br\r\n"
"Accept-Language: en-us,fr\r\n\r\n")};
MockRead reads[] = {MockRead("HTTP/1.1 200 OK\r\n"
"Content-Length: 12\r\n\r\n"),
MockRead("Test Content")};
StaticSocketDataProvider socket_data(reads, writes);
socket_factory_.AddSocketDataProvider(&socket_data);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_->CreateRequest(GURL("https://www.example.com"), DEFAULT_PRIORITY,
&delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate.request_status(), IsOk());
EXPECT_EQ(12, request->received_response_content_length());
EXPECT_EQ(CountWriteBytes(writes), request->GetTotalSentBytes());
EXPECT_EQ(CountReadBytes(reads), request->GetTotalReceivedBytes());
}
#if defined(OS_ANDROID)
TEST_F(URLRequestHttpJobTest, AndroidCleartextPermittedTest) {
context_.set_check_cleartext_permitted(true);
static constexpr struct TestCase {
const char* url;
bool cleartext_permitted;
bool should_block;
int expected_per_host_call_count;
int expected_default_call_count;
} kTestCases[] = {
{"http://unblocked.test/", true, false, 1, 0},
{"https://unblocked.test/", true, false, 0, 0},
{"http://blocked.test/", false, true, 1, 0},
{"https://blocked.test/", false, false, 0, 0},
// If determining the per-host cleartext policy causes an
// IllegalArgumentException (because the hostname is invalid),
// the default configuration should be applied, and the
// exception should not cause a JNI error.
{"http://./", false, true, 1, 1},
{"http://./", true, false, 1, 1},
// Even if the host name would be considered invalid, https
// schemes should not trigger cleartext policy checks.
{"https://./", false, false, 0, 0},
};
JNIEnv* env = base::android::AttachCurrentThread();
for (const TestCase& test : kTestCases) {
Java_AndroidNetworkLibraryTestUtil_setUpSecurityPolicyForTesting(
env, test.cleartext_permitted);
TestDelegate delegate;
std::unique_ptr<URLRequest> request =
context_.CreateRequest(GURL(test.url), DEFAULT_PRIORITY, &delegate,
TRAFFIC_ANNOTATION_FOR_TESTS);
request->Start();
delegate.RunUntilComplete();
if (test.should_block) {
EXPECT_THAT(delegate.request_status(),
IsError(ERR_CLEARTEXT_NOT_PERMITTED));
} else {
// Should fail since there's no test server running
EXPECT_THAT(delegate.request_status(), IsError(ERR_FAILED));
}
EXPECT_EQ(
Java_AndroidNetworkLibraryTestUtil_getPerHostCleartextCheckCount(env),
test.expected_per_host_call_count);
EXPECT_EQ(
Java_AndroidNetworkLibraryTestUtil_getDefaultCleartextCheckCount(env),
test.expected_default_call_count);
}
}
#endif
#if BUILDFLAG(ENABLE_WEBSOCKETS)
class URLRequestHttpJobWebSocketTest : public TestWithTaskEnvironment {
protected:
URLRequestHttpJobWebSocketTest() : context_(true) {
context_.set_network_delegate(&network_delegate_);
context_.set_client_socket_factory(&socket_factory_);
context_.Init();
req_ =
context_.CreateRequest(GURL("ws://www.example.org"), DEFAULT_PRIORITY,
&delegate_, TRAFFIC_ANNOTATION_FOR_TESTS);
}
// A Network Delegate is required for the WebSocketHandshakeStreamBase
// object to be passed on to the HttpNetworkTransaction.
TestNetworkDelegate network_delegate_;
TestURLRequestContext context_;
MockClientSocketFactory socket_factory_;
TestDelegate delegate_;
std::unique_ptr<URLRequest> req_;
};
TEST_F(URLRequestHttpJobWebSocketTest, RejectedWithoutCreateHelper) {
req_->Start();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate_.request_status(), IsError(ERR_DISALLOWED_URL_SCHEME));
}
TEST_F(URLRequestHttpJobWebSocketTest, CreateHelperPassedThrough) {
HttpRequestHeaders headers;
headers.SetHeader("Connection", "Upgrade");
headers.SetHeader("Upgrade", "websocket");
headers.SetHeader("Origin", "http://www.example.org");
headers.SetHeader("Sec-WebSocket-Version", "13");
req_->SetExtraRequestHeaders(headers);
MockWrite writes[] = {
MockWrite("GET / HTTP/1.1\r\n"
"Host: www.example.org\r\n"
"Connection: Upgrade\r\n"
"Upgrade: websocket\r\n"
"Origin: http://www.example.org\r\n"
"Sec-WebSocket-Version: 13\r\n"
"User-Agent: \r\n"
"Accept-Encoding: gzip, deflate\r\n"
"Accept-Language: en-us,fr\r\n"
"Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
"Sec-WebSocket-Extensions: permessage-deflate; "
"client_max_window_bits\r\n\r\n")};
MockRead reads[] = {
MockRead("HTTP/1.1 101 Switching Protocols\r\n"
"Upgrade: websocket\r\n"
"Connection: Upgrade\r\n"
"Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n"),
MockRead(ASYNC, 0)};
StaticSocketDataProvider data(reads, writes);
socket_factory_.AddSocketDataProvider(&data);
auto websocket_stream_create_helper =
std::make_unique<TestWebSocketHandshakeStreamCreateHelper>();
req_->SetUserData(kWebSocketHandshakeUserDataKey,
std::move(websocket_stream_create_helper));
req_->SetLoadFlags(LOAD_DISABLE_CACHE);
req_->Start();
base::RunLoop().RunUntilIdle();
EXPECT_THAT(delegate_.request_status(), IsOk());
EXPECT_TRUE(delegate_.response_completed());
EXPECT_TRUE(data.AllWriteDataConsumed());
EXPECT_TRUE(data.AllReadDataConsumed());
}
#endif // BUILDFLAG(ENABLE_WEBSOCKETS)
bool SetAllCookies(CookieMonster* cm, const CookieList& list) {
DCHECK(cm);
ResultSavingCookieCallback<CookieAccessResult> callback;
cm->SetAllCookiesAsync(list, callback.MakeCallback());
callback.WaitUntilDone();
return callback.result().status.IsInclude();
}
bool CreateAndSetCookie(CookieStore* cs,
const GURL& url,
const std::string& cookie_line) {
auto cookie = CanonicalCookie::Create(url, cookie_line, base::Time::Now(),
base::nullopt);
if (!cookie)
return false;
DCHECK(cs);
ResultSavingCookieCallback<CookieAccessResult> callback;
cs->SetCanonicalCookieAsync(std::move(cookie), url,
CookieOptions::MakeAllInclusive(),
callback.MakeCallback());
callback.WaitUntilDone();
return callback.result().status.IsInclude();
}
void RunRequest(TestURLRequestContext* context, const GURL& url) {
TestDelegate delegate;
std::unique_ptr<URLRequest> request = context->CreateRequest(
url, DEFAULT_PRIORITY, &delegate, TRAFFIC_ANNOTATION_FOR_TESTS);
// Make this a laxly same-site context to allow setting
// SameSite=Lax-by-default cookies.
request->set_site_for_cookies(SiteForCookies::FromUrl(url));
request->Start();
delegate.RunUntilComplete();
}
} // namespace
TEST_F(URLRequestHttpJobTest, CookieSchemeRequestSchemeHistogram) {
base::HistogramTester histograms;
const std::string test_histogram = "Cookie.CookieSchemeRequestScheme";
CookieMonster cm(nullptr, nullptr);
TestURLRequestContext context(true);
context.set_cookie_store(&cm);
context.Init();
// Secure set cookie marked as Unset source scheme.
// Using port 7 because it fails the transaction without sending a request and
// prevents a timeout due to the fake addresses. Because we only need the
// headers to be generated (and thus the histogram filled) and not actually
// sent this is acceptable.
GURL nonsecure_url_for_unset1("http://unset1.example:7");
GURL secure_url_for_unset1("https://unset1.example:7");
// Normally the source scheme would be set by
// CookieMonster::SetCanonicalCookie(), however we're using SetAllCookies() to
// bypass the source scheme check in order to test the kUnset state which
// would normally only happen during an existing cookie DB version upgrade.
std::unique_ptr<CanonicalCookie> unset_cookie1 = CanonicalCookie::Create(
secure_url_for_unset1, "NoSourceSchemeHttps=val", base::Time::Now(),
base::nullopt /* server_time */);
unset_cookie1->SetSourceScheme(net::CookieSourceScheme::kUnset);
CookieList list1 = {*unset_cookie1};
EXPECT_TRUE(SetAllCookies(&cm, list1));
RunRequest(&context, nonsecure_url_for_unset1);
histograms.ExpectBucketCount(
test_histogram,
URLRequestHttpJob::CookieRequestScheme::kUnsetCookieScheme, 1);
RunRequest(&context, secure_url_for_unset1);
histograms.ExpectBucketCount(
test_histogram,
URLRequestHttpJob::CookieRequestScheme::kUnsetCookieScheme, 2);
// Nonsecure set cookie marked as unset source scheme.
GURL nonsecure_url_for_unset2("http://unset2.example:7");
GURL secure_url_for_unset2("https://unset2.example:7");
std::unique_ptr<CanonicalCookie> unset_cookie2 = CanonicalCookie::Create(
nonsecure_url_for_unset2, "NoSourceSchemeHttp=val", base::Time::Now(),
base::nullopt /* server_time */);
unset_cookie2->SetSourceScheme(net::CookieSourceScheme::kUnset);
CookieList list2 = {*unset_cookie2};
EXPECT_TRUE(SetAllCookies(&cm, list2));
RunRequest(&context, nonsecure_url_for_unset2);
histograms.ExpectBucketCount(
test_histogram,
URLRequestHttpJob::CookieRequestScheme::kUnsetCookieScheme, 3);
RunRequest(&context, secure_url_for_unset2);
histograms.ExpectBucketCount(
test_histogram,
URLRequestHttpJob::CookieRequestScheme::kUnsetCookieScheme, 4);
// Secure set cookie with source scheme marked appropriately.
GURL nonsecure_url_for_secure_set("http://secureset.example:7");
GURL secure_url_for_secure_set("https://secureset.example:7");
EXPECT_TRUE(
CreateAndSetCookie(&cm, secure_url_for_secure_set, "SecureScheme=val"));
RunRequest(&context, nonsecure_url_for_secure_set);
histograms.ExpectBucketCount(
test_histogram,
URLRequestHttpJob::CookieRequestScheme::kSecureSetNonsecureRequest, 1);
RunRequest(&context, secure_url_for_secure_set);
histograms.ExpectBucketCount(
test_histogram,
URLRequestHttpJob::CookieRequestScheme::kSecureSetSecureRequest, 1);
// Nonsecure set cookie with source scheme marked appropriately.
GURL nonsecure_url_for_nonsecure_set("http://nonsecureset.example:7");
GURL secure_url_for_nonsecure_set("https://nonsecureset.example:7");
EXPECT_TRUE(CreateAndSetCookie(&cm, nonsecure_url_for_nonsecure_set,
"NonSecureScheme=val"));
RunRequest(&context, nonsecure_url_for_nonsecure_set);
histograms.ExpectBucketCount(
test_histogram,
URLRequestHttpJob::CookieRequestScheme::kNonsecureSetNonsecureRequest, 1);
RunRequest(&context, secure_url_for_nonsecure_set);
histograms.ExpectBucketCount(
test_histogram,
URLRequestHttpJob::CookieRequestScheme::kNonsecureSetSecureRequest, 1);
}
} // namespace net