| // Copyright 2012 The Chromium Authors | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #include <algorithm> | 
 | #include <ostream> | 
 | #include <string> | 
 | #include <utility> | 
 | #include <vector> | 
 |  | 
 | #include "base/bind.h" | 
 | #include "base/compiler_specific.h" | 
 | #include "base/memory/raw_ptr.h" | 
 | #include "base/run_loop.h" | 
 | #include "base/strings/strcat.h" | 
 | #include "base/strings/string_number_conversions.h" | 
 | #include "base/strings/string_piece.h" | 
 | #include "base/strings/stringprintf.h" | 
 | #include "base/test/metrics/histogram_tester.h" | 
 | #include "base/test/scoped_feature_list.h" | 
 | #include "net/base/chunked_upload_data_stream.h" | 
 | #include "net/base/completion_once_callback.h" | 
 | #include "net/base/features.h" | 
 | #include "net/base/ip_endpoint.h" | 
 | #include "net/base/mock_network_change_notifier.h" | 
 | #include "net/base/network_anonymization_key.h" | 
 | #include "net/base/schemeful_site.h" | 
 | #include "net/base/test_completion_callback.h" | 
 | #include "net/base/test_proxy_delegate.h" | 
 | #include "net/cert/ct_policy_enforcer.h" | 
 | #include "net/cert/mock_cert_verifier.h" | 
 | #include "net/dns/mock_host_resolver.h" | 
 | #include "net/http/http_auth_handler_factory.h" | 
 | #include "net/http/http_network_session.h" | 
 | #include "net/http/http_network_transaction.h" | 
 | #include "net/http/http_proxy_connect_job.h" | 
 | #include "net/http/http_server_properties.h" | 
 | #include "net/http/http_stream.h" | 
 | #include "net/http/http_stream_factory.h" | 
 | #include "net/http/http_transaction_test_util.h" | 
 | #include "net/http/test_upload_data_stream_not_allow_http1.h" | 
 | #include "net/http/transport_security_state.h" | 
 | #include "net/log/net_log.h" | 
 | #include "net/log/net_log_event_type.h" | 
 | #include "net/log/test_net_log.h" | 
 | #include "net/log/test_net_log_util.h" | 
 | #include "net/proxy_resolution/configured_proxy_resolution_service.h" | 
 | #include "net/proxy_resolution/proxy_config_service_fixed.h" | 
 | #include "net/proxy_resolution/proxy_resolver.h" | 
 | #include "net/quic/crypto/proof_verifier_chromium.h" | 
 | #include "net/quic/mock_crypto_client_stream_factory.h" | 
 | #include "net/quic/mock_quic_context.h" | 
 | #include "net/quic/mock_quic_data.h" | 
 | #include "net/quic/quic_chromium_alarm_factory.h" | 
 | #include "net/quic/quic_http_stream.h" | 
 | #include "net/quic/quic_http_utils.h" | 
 | #include "net/quic/quic_stream_factory_peer.h" | 
 | #include "net/quic/quic_test_packet_maker.h" | 
 | #include "net/quic/test_task_runner.h" | 
 | #include "net/socket/client_socket_factory.h" | 
 | #include "net/socket/mock_client_socket_pool_manager.h" | 
 | #include "net/socket/next_proto.h" | 
 | #include "net/socket/socket_performance_watcher.h" | 
 | #include "net/socket/socket_performance_watcher_factory.h" | 
 | #include "net/socket/socket_test_util.h" | 
 | #include "net/spdy/spdy_test_util_common.h" | 
 | #include "net/ssl/ssl_config_service_defaults.h" | 
 | #include "net/test/cert_test_util.h" | 
 | #include "net/test/gtest_util.h" | 
 | #include "net/test/test_data_directory.h" | 
 | #include "net/test/test_with_task_environment.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/core/crypto/quic_decrypter.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/core/crypto/quic_encrypter.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/core/quic_framer.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/core/quic_utils.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/platform/api/quic_test.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/test_tools/crypto_test_utils.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/test_tools/mock_clock.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/test_tools/mock_random.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/test_tools/quic_spdy_session_peer.h" | 
 | #include "net/third_party/quiche/src/quiche/quic/test_tools/quic_test_utils.h" | 
 | #include "net/third_party/quiche/src/quiche/spdy/core/spdy_frame_builder.h" | 
 | #include "net/third_party/quiche/src/quiche/spdy/core/spdy_framer.h" | 
 | #include "net/traffic_annotation/network_traffic_annotation_test_helper.h" | 
 | #include "net/url_request/static_http_user_agent_settings.h" | 
 | #include "net/url_request/url_request.h" | 
 | #include "net/url_request/url_request_job_factory.h" | 
 | #include "net/url_request/url_request_test_util.h" | 
 | #include "net/websockets/websocket_test_util.h" | 
 | #include "testing/gmock/include/gmock/gmock.h" | 
 | #include "testing/gtest/include/gtest/gtest.h" | 
 | #include "testing/platform_test.h" | 
 | #include "url/gurl.h" | 
 |  | 
 | using ::testing::ElementsAre; | 
 | using ::testing::Key; | 
 |  | 
 | namespace net::test { | 
 |  | 
 | namespace { | 
 |  | 
 | enum DestinationType { | 
 |   // In pooling tests with two requests for different origins to the same | 
 |   // destination, the destination should be | 
 |   SAME_AS_FIRST,   // the same as the first origin, | 
 |   SAME_AS_SECOND,  // the same as the second origin, or | 
 |   DIFFERENT,       // different from both. | 
 | }; | 
 |  | 
 | const char kDefaultServerHostName[] = "mail.example.org"; | 
 | const char kDifferentHostname[] = "different.example.com"; | 
 |  | 
 | struct TestParams { | 
 |   quic::ParsedQuicVersion version; | 
 |   bool client_headers_include_h2_stream_dependency; | 
 |   bool enable_quic_priority_incremental_support; | 
 | }; | 
 |  | 
 | // Used by ::testing::PrintToStringParamName(). | 
 | std::string PrintToString(const TestParams& p) { | 
 |   return base::StrCat( | 
 |       {ParsedQuicVersionToString(p.version), "_", | 
 |        (p.client_headers_include_h2_stream_dependency ? "" : "No"), | 
 |        "Dependency", "_", | 
 |        (p.enable_quic_priority_incremental_support ? "" : "No"), | 
 |        "Incremental"}); | 
 | } | 
 |  | 
 | // Run QuicNetworkTransactionWithDestinationTest instances with all value | 
 | // combinations of version and destination_type. | 
 | struct PoolingTestParams { | 
 |   quic::ParsedQuicVersion version; | 
 |   DestinationType destination_type; | 
 |   bool client_headers_include_h2_stream_dependency; | 
 | }; | 
 |  | 
 | // Used by ::testing::PrintToStringParamName(). | 
 | std::string PrintToString(const PoolingTestParams& p) { | 
 |   const char* destination_string = ""; | 
 |   switch (p.destination_type) { | 
 |     case SAME_AS_FIRST: | 
 |       destination_string = "SAME_AS_FIRST"; | 
 |       break; | 
 |     case SAME_AS_SECOND: | 
 |       destination_string = "SAME_AS_SECOND"; | 
 |       break; | 
 |     case DIFFERENT: | 
 |       destination_string = "DIFFERENT"; | 
 |       break; | 
 |   } | 
 |   return base::StrCat( | 
 |       {ParsedQuicVersionToString(p.version), "_", destination_string, "_", | 
 |        (p.client_headers_include_h2_stream_dependency ? "" : "No"), | 
 |        "Dependency"}); | 
 | } | 
 |  | 
 | std::string GenerateQuicAltSvcHeaderValue( | 
 |     const quic::ParsedQuicVersionVector& versions, | 
 |     std::string host, | 
 |     uint16_t port) { | 
 |   std::string value; | 
 |   std::string version_string; | 
 |   bool first_version = true; | 
 |   for (const auto& version : versions) { | 
 |     if (first_version) { | 
 |       first_version = false; | 
 |     } else { | 
 |       value.append(", "); | 
 |     } | 
 |     value.append(base::StrCat({quic::AlpnForVersion(version), "=\"", host, ":", | 
 |                                base::NumberToString(port), "\""})); | 
 |   } | 
 |   return value; | 
 | } | 
 |  | 
 | std::string GenerateQuicAltSvcHeaderValue( | 
 |     const quic::ParsedQuicVersionVector& versions, | 
 |     uint16_t port) { | 
 |   return GenerateQuicAltSvcHeaderValue(versions, "", port); | 
 | } | 
 |  | 
 | std::string GenerateQuicAltSvcHeader( | 
 |     const quic::ParsedQuicVersionVector& versions) { | 
 |   std::string altsvc_header = "Alt-Svc: "; | 
 |   altsvc_header.append(GenerateQuicAltSvcHeaderValue(versions, 443)); | 
 |   altsvc_header.append("\r\n"); | 
 |   return altsvc_header; | 
 | } | 
 |  | 
 | std::vector<TestParams> GetTestParams() { | 
 |   std::vector<TestParams> params; | 
 |   quic::ParsedQuicVersionVector all_supported_versions = | 
 |       quic::AllSupportedVersions(); | 
 |   for (const quic::ParsedQuicVersion& version : all_supported_versions) { | 
 |     params.push_back(TestParams{version, false, false}); | 
 |     params.push_back(TestParams{version, false, true}); | 
 |     params.push_back(TestParams{version, true, false}); | 
 |     params.push_back(TestParams{version, true, true}); | 
 |   } | 
 |   return params; | 
 | } | 
 |  | 
 | std::vector<PoolingTestParams> GetPoolingTestParams() { | 
 |   std::vector<PoolingTestParams> params; | 
 |   quic::ParsedQuicVersionVector all_supported_versions = | 
 |       quic::AllSupportedVersions(); | 
 |   for (const quic::ParsedQuicVersion& version : all_supported_versions) { | 
 |     params.push_back(PoolingTestParams{version, SAME_AS_FIRST, false}); | 
 |     params.push_back(PoolingTestParams{version, SAME_AS_FIRST, true}); | 
 |     params.push_back(PoolingTestParams{version, SAME_AS_SECOND, false}); | 
 |     params.push_back(PoolingTestParams{version, SAME_AS_SECOND, true}); | 
 |     params.push_back(PoolingTestParams{version, DIFFERENT, false}); | 
 |     params.push_back(PoolingTestParams{version, DIFFERENT, true}); | 
 |   } | 
 |   return params; | 
 | } | 
 |  | 
 | std::string ConstructDataFrameForVersion(base::StringPiece body, | 
 |                                          quic::ParsedQuicVersion version) { | 
 |   if (!version.HasIetfQuicFrames()) { | 
 |     return std::string(body); | 
 |   } | 
 |   quiche::QuicheBuffer buffer = quic::HttpEncoder::SerializeDataFrameHeader( | 
 |       body.size(), quiche::SimpleBufferAllocator::Get()); | 
 |   return base::StrCat({base::StringPiece(buffer.data(), buffer.size()), body}); | 
 | } | 
 |  | 
 | }  // namespace | 
 |  | 
 | class TestSocketPerformanceWatcher : public SocketPerformanceWatcher { | 
 |  public: | 
 |   TestSocketPerformanceWatcher(bool* should_notify_updated_rtt, | 
 |                                bool* rtt_notification_received) | 
 |       : should_notify_updated_rtt_(should_notify_updated_rtt), | 
 |         rtt_notification_received_(rtt_notification_received) {} | 
 |  | 
 |   TestSocketPerformanceWatcher(const TestSocketPerformanceWatcher&) = delete; | 
 |   TestSocketPerformanceWatcher& operator=(const TestSocketPerformanceWatcher&) = | 
 |       delete; | 
 |  | 
 |   ~TestSocketPerformanceWatcher() override = default; | 
 |  | 
 |   bool ShouldNotifyUpdatedRTT() const override { | 
 |     return *should_notify_updated_rtt_; | 
 |   } | 
 |  | 
 |   void OnUpdatedRTTAvailable(const base::TimeDelta& rtt) override { | 
 |     *rtt_notification_received_ = true; | 
 |   } | 
 |  | 
 |   void OnConnectionChanged() override {} | 
 |  | 
 |  private: | 
 |   raw_ptr<bool> should_notify_updated_rtt_; | 
 |   raw_ptr<bool> rtt_notification_received_; | 
 | }; | 
 |  | 
 | class TestSocketPerformanceWatcherFactory | 
 |     : public SocketPerformanceWatcherFactory { | 
 |  public: | 
 |   TestSocketPerformanceWatcherFactory() = default; | 
 |  | 
 |   TestSocketPerformanceWatcherFactory( | 
 |       const TestSocketPerformanceWatcherFactory&) = delete; | 
 |   TestSocketPerformanceWatcherFactory& operator=( | 
 |       const TestSocketPerformanceWatcherFactory&) = delete; | 
 |  | 
 |   ~TestSocketPerformanceWatcherFactory() override = default; | 
 |  | 
 |   // SocketPerformanceWatcherFactory implementation: | 
 |   std::unique_ptr<SocketPerformanceWatcher> CreateSocketPerformanceWatcher( | 
 |       const Protocol protocol, | 
 |       const AddressList& /* address_list */) override { | 
 |     if (protocol != PROTOCOL_QUIC) { | 
 |       return nullptr; | 
 |     } | 
 |     ++watcher_count_; | 
 |     return std::make_unique<TestSocketPerformanceWatcher>( | 
 |         &should_notify_updated_rtt_, &rtt_notification_received_); | 
 |   } | 
 |  | 
 |   size_t watcher_count() const { return watcher_count_; } | 
 |  | 
 |   bool rtt_notification_received() const { return rtt_notification_received_; } | 
 |  | 
 |   void set_should_notify_updated_rtt(bool should_notify_updated_rtt) { | 
 |     should_notify_updated_rtt_ = should_notify_updated_rtt; | 
 |   } | 
 |  | 
 |  private: | 
 |   size_t watcher_count_ = 0u; | 
 |   bool should_notify_updated_rtt_ = true; | 
 |   bool rtt_notification_received_ = false; | 
 | }; | 
 |  | 
 | class QuicNetworkTransactionTest | 
 |     : public PlatformTest, | 
 |       public ::testing::WithParamInterface<TestParams>, | 
 |       public WithTaskEnvironment { | 
 |  protected: | 
 |   QuicNetworkTransactionTest() | 
 |       : version_(GetParam().version), | 
 |         client_headers_include_h2_stream_dependency_( | 
 |             GetParam().client_headers_include_h2_stream_dependency), | 
 |         supported_versions_(quic::test::SupportedVersions(version_)), | 
 |         client_maker_(std::make_unique<QuicTestPacketMaker>( | 
 |             version_, | 
 |             quic::QuicUtils::CreateRandomConnectionId( | 
 |                 context_.random_generator()), | 
 |             context_.clock(), | 
 |             kDefaultServerHostName, | 
 |             quic::Perspective::IS_CLIENT, | 
 |             client_headers_include_h2_stream_dependency_, | 
 |             true)), | 
 |         server_maker_(version_, | 
 |                       quic::QuicUtils::CreateRandomConnectionId( | 
 |                           context_.random_generator()), | 
 |                       context_.clock(), | 
 |                       kDefaultServerHostName, | 
 |                       quic::Perspective::IS_SERVER, | 
 |                       false), | 
 |         quic_task_runner_( | 
 |             base::MakeRefCounted<TestTaskRunner>(context_.mock_clock())), | 
 |         ssl_config_service_(std::make_unique<SSLConfigServiceDefaults>()), | 
 |         proxy_resolution_service_( | 
 |             ConfiguredProxyResolutionService::CreateDirect()), | 
 |         auth_handler_factory_(HttpAuthHandlerFactory::CreateDefault()), | 
 |         http_server_properties_(std::make_unique<HttpServerProperties>()), | 
 |         ssl_data_(ASYNC, OK) { | 
 |     scoped_feature_list_.InitWithFeatureState( | 
 |         features::kPriorityIncremental, | 
 |         GetParam().enable_quic_priority_incremental_support); | 
 |     FLAGS_quic_enable_http3_grease_randomness = false; | 
 |     request_.method = "GET"; | 
 |     std::string url("https://"); | 
 |     url.append(kDefaultServerHostName); | 
 |     request_.url = GURL(url); | 
 |     request_.load_flags = 0; | 
 |     request_.traffic_annotation = | 
 |         net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |     context_.AdvanceTime(quic::QuicTime::Delta::FromMilliseconds(20)); | 
 |  | 
 |     scoped_refptr<X509Certificate> cert( | 
 |         ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |     verify_details_.cert_verify_result.verified_cert = cert; | 
 |     verify_details_.cert_verify_result.is_issued_by_known_root = true; | 
 |     crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); | 
 |   } | 
 |  | 
 |   void SetUp() override { | 
 |     NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |     base::RunLoop().RunUntilIdle(); | 
 |   } | 
 |  | 
 |   void TearDown() override { | 
 |     NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |     // Empty the current queue. | 
 |     base::RunLoop().RunUntilIdle(); | 
 |     PlatformTest::TearDown(); | 
 |     NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |     base::RunLoop().RunUntilIdle(); | 
 |     session_.reset(); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientConnectionClosePacket(uint64_t num) { | 
 |     return client_maker_->MakeConnectionClosePacket( | 
 |         num, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!"); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructServerConnectionClosePacket(uint64_t num) { | 
 |     return server_maker_.MakeConnectionClosePacket( | 
 |         num, false, quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, "Time to panic!"); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerGoAwayPacket( | 
 |       uint64_t num, | 
 |       quic::QuicErrorCode error_code, | 
 |       std::string reason_phrase) { | 
 |     return server_maker_.MakeGoAwayPacket(num, error_code, reason_phrase); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckPacket( | 
 |       uint64_t packet_number, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received) { | 
 |     return client_maker_->MakeAckPacket(packet_number, largest_received, | 
 |                                         smallest_received); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckAndRstPacket( | 
 |       uint64_t num, | 
 |       quic::QuicStreamId stream_id, | 
 |       quic::QuicRstStreamErrorCode error_code, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received) { | 
 |     return client_maker_->MakeAckAndRstPacket( | 
 |         num, false, stream_id, error_code, largest_received, smallest_received); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientRstPacket( | 
 |       uint64_t num, | 
 |       quic::QuicStreamId stream_id, | 
 |       quic::QuicRstStreamErrorCode error_code) { | 
 |     return client_maker_->MakeRstPacket(num, false, stream_id, error_code, | 
 |                                         /*include_stop_sending_if_v99=*/true); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientAckAndConnectionClosePacket( | 
 |       uint64_t num, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received, | 
 |       quic::QuicErrorCode quic_error, | 
 |       const std::string& quic_error_details, | 
 |       uint64_t frame_type) { | 
 |     return client_maker_->MakeAckAndConnectionClosePacket( | 
 |         num, false, largest_received, smallest_received, quic_error, | 
 |         quic_error_details, frame_type); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerRstPacket( | 
 |       uint64_t num, | 
 |       bool include_version, | 
 |       quic::QuicStreamId stream_id, | 
 |       quic::QuicRstStreamErrorCode error_code) { | 
 |     return server_maker_.MakeRstPacket(num, include_version, stream_id, | 
 |                                        error_code); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicReceivedPacket> ConstructInitialSettingsPacket( | 
 |       uint64_t packet_number) { | 
 |     return client_maker_->MakeInitialSettingsPacket(packet_number); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicReceivedPacket> ConstructServerAckPacket( | 
 |       uint64_t packet_number, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received) { | 
 |     return server_maker_.MakeAckPacket(packet_number, largest_received, | 
 |                                        smallest_received); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicReceivedPacket> ConstructClientPriorityPacket( | 
 |       uint64_t packet_number, | 
 |       bool should_include_version, | 
 |       quic::QuicStreamId id, | 
 |       quic::QuicStreamId parent_stream_id, | 
 |       RequestPriority request_priority) { | 
 |     return client_maker_->MakePriorityPacket( | 
 |         packet_number, should_include_version, id, parent_stream_id, | 
 |         ConvertRequestPriorityToQuicPriority(request_priority)); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientPriorityFramesPacket( | 
 |       uint64_t packet_number, | 
 |       bool should_include_version, | 
 |       const std::vector<QuicTestPacketMaker::Http2StreamDependency>& | 
 |           priority_frames) { | 
 |     return client_maker_->MakeMultiplePriorityFramesPacket( | 
 |         packet_number, should_include_version, priority_frames); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientAckAndPriorityFramesPacket( | 
 |       uint64_t packet_number, | 
 |       bool should_include_version, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received, | 
 |       const std::vector<QuicTestPacketMaker::Http2StreamDependency>& | 
 |           priority_frames) { | 
 |     return client_maker_->MakeAckAndMultiplePriorityFramesPacket( | 
 |         packet_number, should_include_version, largest_received, | 
 |         smallest_received, priority_frames); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicReceivedPacket> ConstructClientAckAndPriorityPacket( | 
 |       uint64_t packet_number, | 
 |       bool should_include_version, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received, | 
 |       quic::QuicStreamId id, | 
 |       quic::QuicStreamId parent_stream_id, | 
 |       RequestPriority request_priority) { | 
 |     return client_maker_->MakeAckAndPriorityPacket( | 
 |         packet_number, should_include_version, largest_received, | 
 |         smallest_received, id, parent_stream_id, | 
 |         ConvertRequestPriorityToQuicPriority(request_priority)); | 
 |   } | 
 |  | 
 |   // Uses default QuicTestPacketMaker. | 
 |   spdy::Http2HeaderBlock GetRequestHeaders(const std::string& method, | 
 |                                            const std::string& scheme, | 
 |                                            const std::string& path) { | 
 |     return GetRequestHeaders(method, scheme, path, client_maker_.get()); | 
 |   } | 
 |  | 
 |   // Uses customized QuicTestPacketMaker. | 
 |   spdy::Http2HeaderBlock GetRequestHeaders(const std::string& method, | 
 |                                            const std::string& scheme, | 
 |                                            const std::string& path, | 
 |                                            QuicTestPacketMaker* maker) { | 
 |     return maker->GetRequestHeaders(method, scheme, path); | 
 |   } | 
 |  | 
 |   spdy::Http2HeaderBlock ConnectRequestHeaders(const std::string& host_port) { | 
 |     return client_maker_->ConnectRequestHeaders(host_port); | 
 |   } | 
 |  | 
 |   spdy::Http2HeaderBlock GetResponseHeaders(const std::string& status) { | 
 |     return server_maker_.GetResponseHeaders(status); | 
 |   } | 
 |  | 
 |   // Appends alt_svc headers in the response headers. | 
 |   spdy::Http2HeaderBlock GetResponseHeaders(const std::string& status, | 
 |                                             const std::string& alt_svc) { | 
 |     return server_maker_.GetResponseHeaders(status, alt_svc); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerDataPacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId stream_id, | 
 |       bool should_include_version, | 
 |       bool fin, | 
 |       absl::string_view data) { | 
 |     return server_maker_.MakeDataPacket(packet_number, stream_id, | 
 |                                         should_include_version, fin, data); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientDataPacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId stream_id, | 
 |       bool should_include_version, | 
 |       bool fin, | 
 |       absl::string_view data) { | 
 |     return client_maker_->MakeDataPacket(packet_number, stream_id, | 
 |                                          should_include_version, fin, data); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckAndDataPacket( | 
 |       uint64_t packet_number, | 
 |       bool include_version, | 
 |       quic::QuicStreamId stream_id, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received, | 
 |       bool fin, | 
 |       absl::string_view data) { | 
 |     return client_maker_->MakeAckAndDataPacket(packet_number, include_version, | 
 |                                                stream_id, largest_received, | 
 |                                                smallest_received, fin, data); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckDataAndRst( | 
 |       uint64_t packet_number, | 
 |       bool include_version, | 
 |       quic::QuicStreamId stream_id, | 
 |       quic::QuicRstStreamErrorCode error_code, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received, | 
 |       quic::QuicStreamId data_id, | 
 |       bool fin, | 
 |       absl::string_view data) { | 
 |     return client_maker_->MakeAckDataAndRst( | 
 |         packet_number, include_version, stream_id, error_code, largest_received, | 
 |         smallest_received, data_id, fin, data); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientRequestHeadersPacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId stream_id, | 
 |       bool should_include_version, | 
 |       bool fin, | 
 |       spdy::Http2HeaderBlock headers, | 
 |       bool should_include_priority_frame = true) { | 
 |     return ConstructClientRequestHeadersPacket( | 
 |         packet_number, stream_id, should_include_version, fin, | 
 |         std::move(headers), 0, should_include_priority_frame); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientRequestHeadersPacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId stream_id, | 
 |       bool should_include_version, | 
 |       bool fin, | 
 |       spdy::Http2HeaderBlock headers, | 
 |       quic::QuicStreamId parent_stream_id, | 
 |       bool should_include_priority_frame = true) { | 
 |     return ConstructClientRequestHeadersPacket( | 
 |         packet_number, stream_id, should_include_version, fin, DEFAULT_PRIORITY, | 
 |         std::move(headers), parent_stream_id, should_include_priority_frame); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientRequestHeadersPacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId stream_id, | 
 |       bool should_include_version, | 
 |       bool fin, | 
 |       RequestPriority request_priority, | 
 |       spdy::Http2HeaderBlock headers, | 
 |       quic::QuicStreamId parent_stream_id, | 
 |       bool should_include_priority_frame = true) { | 
 |     spdy::SpdyPriority priority = | 
 |         ConvertRequestPriorityToQuicPriority(request_priority); | 
 |     return client_maker_->MakeRequestHeadersPacket( | 
 |         packet_number, stream_id, should_include_version, fin, priority, | 
 |         std::move(headers), parent_stream_id, nullptr, | 
 |         should_include_priority_frame); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicReceivedPacket> ConstructClientPriorityPacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId id, | 
 |       RequestPriority request_priority) { | 
 |     spdy::SpdyPriority spdy_priority = | 
 |         ConvertRequestPriorityToQuicPriority(request_priority); | 
 |     return client_maker_->MakePriorityPacket(packet_number, true, id, 0, | 
 |                                              spdy_priority); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicReceivedPacket> | 
 |   ConstructClientRequestHeadersAndDataFramesPacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId stream_id, | 
 |       bool should_include_version, | 
 |       bool fin, | 
 |       RequestPriority request_priority, | 
 |       spdy::Http2HeaderBlock headers, | 
 |       quic::QuicStreamId parent_stream_id, | 
 |       size_t* spdy_headers_frame_length, | 
 |       const std::vector<std::string>& data_writes) { | 
 |     spdy::SpdyPriority priority = | 
 |         ConvertRequestPriorityToQuicPriority(request_priority); | 
 |     return client_maker_->MakeRequestHeadersAndMultipleDataFramesPacket( | 
 |         packet_number, stream_id, should_include_version, fin, priority, | 
 |         std::move(headers), parent_stream_id, spdy_headers_frame_length, | 
 |         data_writes); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerPushPromisePacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId stream_id, | 
 |       quic::QuicStreamId promised_stream_id, | 
 |       bool should_include_version, | 
 |       spdy::Http2HeaderBlock headers) { | 
 |     return server_maker_.MakePushPromisePacket( | 
 |         packet_number, stream_id, promised_stream_id, should_include_version, | 
 |         false, std::move(headers), nullptr); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructServerResponseHeadersPacket(uint64_t packet_number, | 
 |                                        quic::QuicStreamId stream_id, | 
 |                                        bool should_include_version, | 
 |                                        bool fin, | 
 |                                        spdy::Http2HeaderBlock headers) { | 
 |     return server_maker_.MakeResponseHeadersPacket(packet_number, stream_id, | 
 |                                                    should_include_version, fin, | 
 |                                                    std::move(headers), nullptr); | 
 |   } | 
 |  | 
 |   std::string ConstructDataFrame(base::StringPiece body) { | 
 |     return ConstructDataFrameForVersion(body, version_); | 
 |   } | 
 |  | 
 |   void CreateSession(const quic::ParsedQuicVersionVector& supported_versions) { | 
 |     session_params_.enable_quic = true; | 
 |     context_.params()->supported_versions = supported_versions; | 
 |     context_.params()->headers_include_h2_stream_dependency = | 
 |         client_headers_include_h2_stream_dependency_; | 
 |  | 
 |     session_context_.quic_context = &context_; | 
 |     session_context_.client_socket_factory = &socket_factory_; | 
 |     session_context_.quic_crypto_client_stream_factory = | 
 |         &crypto_client_stream_factory_; | 
 |     session_context_.host_resolver = &host_resolver_; | 
 |     session_context_.cert_verifier = &cert_verifier_; | 
 |     session_context_.transport_security_state = &transport_security_state_; | 
 |     session_context_.ct_policy_enforcer = &ct_policy_enforcer_; | 
 |     session_context_.socket_performance_watcher_factory = | 
 |         &test_socket_performance_watcher_factory_; | 
 |     session_context_.proxy_resolution_service = proxy_resolution_service_.get(); | 
 |     session_context_.ssl_config_service = ssl_config_service_.get(); | 
 |     session_context_.http_auth_handler_factory = auth_handler_factory_.get(); | 
 |     session_context_.http_server_properties = http_server_properties_.get(); | 
 |     session_context_.net_log = NetLog::Get(); | 
 |  | 
 |     session_ = | 
 |         std::make_unique<HttpNetworkSession>(session_params_, session_context_); | 
 |     session_->quic_stream_factory() | 
 |         ->set_is_quic_known_to_work_on_current_network(true); | 
 |     SpdySessionPoolPeer spdy_pool_peer(session_->spdy_session_pool()); | 
 |     spdy_pool_peer.SetEnableSendingInitialData(false); | 
 |   } | 
 |  | 
 |   void CreateSession() { return CreateSession(supported_versions_); } | 
 |  | 
 |   void CheckWasQuicResponse(HttpNetworkTransaction* trans, | 
 |                             const std::string& status_line, | 
 |                             const quic::ParsedQuicVersion& version) { | 
 |     const HttpResponseInfo* response = trans->GetResponseInfo(); | 
 |     ASSERT_TRUE(response != nullptr); | 
 |     ASSERT_TRUE(response->headers.get() != nullptr); | 
 |     EXPECT_EQ(status_line, response->headers->GetStatusLine()); | 
 |     EXPECT_TRUE(response->was_fetched_via_spdy); | 
 |     EXPECT_TRUE(response->was_alpn_negotiated); | 
 |     auto connection_info = | 
 |         QuicHttpStream::ConnectionInfoFromQuicVersion(version); | 
 |     if (connection_info == response->connection_info) { | 
 |       return; | 
 |     } | 
 |     // QUIC v1 and QUIC v2 are considered a match, because they have the same | 
 |     // ALPN token. | 
 |     if ((connection_info == HttpResponseInfo::CONNECTION_INFO_QUIC_RFC_V1 || | 
 |          connection_info == HttpResponseInfo::CONNECTION_INFO_QUIC_2_DRAFT_8) && | 
 |         (response->connection_info == | 
 |              HttpResponseInfo::CONNECTION_INFO_QUIC_RFC_V1 || | 
 |          response->connection_info == | 
 |              HttpResponseInfo::CONNECTION_INFO_QUIC_2_DRAFT_8)) { | 
 |       return; | 
 |     } | 
 |  | 
 |     // They do not match.  This EXPECT_EQ will fail and print useful | 
 |     // information. | 
 |     EXPECT_EQ(connection_info, response->connection_info); | 
 |   } | 
 |  | 
 |   void CheckWasQuicResponse(HttpNetworkTransaction* trans, | 
 |                             const std::string& status_line) { | 
 |     CheckWasQuicResponse(trans, status_line, version_); | 
 |   } | 
 |  | 
 |   void CheckWasQuicResponse(HttpNetworkTransaction* trans) { | 
 |     CheckWasQuicResponse(trans, "HTTP/1.1 200", version_); | 
 |   } | 
 |  | 
 |   void CheckResponsePort(HttpNetworkTransaction* trans, uint16_t port) { | 
 |     const HttpResponseInfo* response = trans->GetResponseInfo(); | 
 |     ASSERT_TRUE(response != nullptr); | 
 |     EXPECT_EQ(port, response->remote_endpoint.port()); | 
 |   } | 
 |  | 
 |   void CheckWasHttpResponse(HttpNetworkTransaction* trans) { | 
 |     const HttpResponseInfo* response = trans->GetResponseInfo(); | 
 |     ASSERT_TRUE(response != nullptr); | 
 |     ASSERT_TRUE(response->headers.get() != nullptr); | 
 |     EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); | 
 |     EXPECT_FALSE(response->was_fetched_via_spdy); | 
 |     EXPECT_FALSE(response->was_alpn_negotiated); | 
 |     EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP1_1, | 
 |               response->connection_info); | 
 |   } | 
 |  | 
 |   void CheckWasSpdyResponse(HttpNetworkTransaction* trans) { | 
 |     const HttpResponseInfo* response = trans->GetResponseInfo(); | 
 |     ASSERT_TRUE(response != nullptr); | 
 |     ASSERT_TRUE(response->headers.get() != nullptr); | 
 |     EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); | 
 |     EXPECT_TRUE(response->was_fetched_via_spdy); | 
 |     EXPECT_TRUE(response->was_alpn_negotiated); | 
 |     EXPECT_EQ(HttpResponseInfo::CONNECTION_INFO_HTTP2, | 
 |               response->connection_info); | 
 |   } | 
 |  | 
 |   void CheckResponseData(HttpNetworkTransaction* trans, | 
 |                          const std::string& expected) { | 
 |     std::string response_data; | 
 |     ASSERT_THAT(ReadTransaction(trans, &response_data), IsOk()); | 
 |     EXPECT_EQ(expected, response_data); | 
 |   } | 
 |  | 
 |   void RunTransaction(HttpNetworkTransaction* trans) { | 
 |     TestCompletionCallback callback; | 
 |     int rv = trans->Start(&request_, callback.callback(), net_log_with_source_); | 
 |     EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |     EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   } | 
 |  | 
 |   void SendRequestAndExpectHttpResponse(const std::string& expected) { | 
 |     HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |     RunTransaction(&trans); | 
 |     CheckWasHttpResponse(&trans); | 
 |     CheckResponseData(&trans, expected); | 
 |   } | 
 |  | 
 |   void SendRequestAndExpectHttpResponseFromProxy(const std::string& expected, | 
 |                                                  bool used_proxy, | 
 |                                                  uint16_t port) { | 
 |     HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |     RunTransaction(&trans); | 
 |     CheckWasHttpResponse(&trans); | 
 |     CheckResponsePort(&trans, port); | 
 |     CheckResponseData(&trans, expected); | 
 |     if (used_proxy) { | 
 |       EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_https()); | 
 |     } else { | 
 |       EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_direct()); | 
 |     } | 
 |   } | 
 |   void SendRequestAndExpectQuicResponse(const std::string& expected, | 
 |                                         const std::string& status_line) { | 
 |     SendRequestAndExpectQuicResponseMaybeFromProxy(expected, false, 443, | 
 |                                                    status_line); | 
 |   } | 
 |  | 
 |   void SendRequestAndExpectQuicResponse(const std::string& expected) { | 
 |     SendRequestAndExpectQuicResponseMaybeFromProxy(expected, false, 443); | 
 |   } | 
 |  | 
 |   void SendRequestAndExpectQuicResponseFromProxyOnPort( | 
 |       const std::string& expected, | 
 |       uint16_t port) { | 
 |     SendRequestAndExpectQuicResponseMaybeFromProxy(expected, true, port); | 
 |   } | 
 |  | 
 |   void AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::HandshakeMode handshake_mode, | 
 |       const NetworkAnonymizationKey& network_anonymization_key = | 
 |           NetworkAnonymizationKey()) { | 
 |     crypto_client_stream_factory_.set_handshake_mode(handshake_mode); | 
 |     url::SchemeHostPort server(request_.url); | 
 |     AlternativeService alternative_service(kProtoQUIC, server.host(), 443); | 
 |     base::Time expiration = base::Time::Now() + base::Days(1); | 
 |     http_server_properties_->SetQuicAlternativeService( | 
 |         server, network_anonymization_key, alternative_service, expiration, | 
 |         supported_versions_); | 
 |   } | 
 |  | 
 |   void AddQuicRemoteAlternativeServiceMapping( | 
 |       MockCryptoClientStream::HandshakeMode handshake_mode, | 
 |       const HostPortPair& alternative) { | 
 |     crypto_client_stream_factory_.set_handshake_mode(handshake_mode); | 
 |     url::SchemeHostPort server(request_.url); | 
 |     AlternativeService alternative_service(kProtoQUIC, alternative.host(), | 
 |                                            alternative.port()); | 
 |     base::Time expiration = base::Time::Now() + base::Days(1); | 
 |     http_server_properties_->SetQuicAlternativeService( | 
 |         server, NetworkAnonymizationKey(), alternative_service, expiration, | 
 |         supported_versions_); | 
 |   } | 
 |  | 
 |   void ExpectBrokenAlternateProtocolMapping( | 
 |       const NetworkAnonymizationKey& network_anonymization_key = | 
 |           NetworkAnonymizationKey()) { | 
 |     const url::SchemeHostPort server(request_.url); | 
 |     const AlternativeServiceInfoVector alternative_service_info_vector = | 
 |         http_server_properties_->GetAlternativeServiceInfos( | 
 |             server, network_anonymization_key); | 
 |     EXPECT_EQ(1u, alternative_service_info_vector.size()); | 
 |     EXPECT_TRUE(http_server_properties_->IsAlternativeServiceBroken( | 
 |         alternative_service_info_vector[0].alternative_service(), | 
 |         network_anonymization_key)); | 
 |   } | 
 |  | 
 |   void ExpectQuicAlternateProtocolMapping( | 
 |       const NetworkAnonymizationKey& network_anonymization_key = | 
 |           NetworkAnonymizationKey()) { | 
 |     const url::SchemeHostPort server(request_.url); | 
 |     const AlternativeServiceInfoVector alternative_service_info_vector = | 
 |         http_server_properties_->GetAlternativeServiceInfos( | 
 |             server, network_anonymization_key); | 
 |     EXPECT_EQ(1u, alternative_service_info_vector.size()); | 
 |     EXPECT_EQ( | 
 |         kProtoQUIC, | 
 |         alternative_service_info_vector[0].alternative_service().protocol); | 
 |     EXPECT_FALSE(http_server_properties_->IsAlternativeServiceBroken( | 
 |         alternative_service_info_vector[0].alternative_service(), | 
 |         network_anonymization_key)); | 
 |   } | 
 |  | 
 |   void AddHangingNonAlternateProtocolSocketData() { | 
 |     auto hanging_data = std::make_unique<StaticSocketDataProvider>(); | 
 |     MockConnect hanging_connect(SYNCHRONOUS, ERR_IO_PENDING); | 
 |     hanging_data->set_connect_data(hanging_connect); | 
 |     hanging_data_.push_back(std::move(hanging_data)); | 
 |     socket_factory_.AddSocketDataProvider(hanging_data_.back().get()); | 
 |   } | 
 |  | 
 |   void SetUpTestForRetryConnectionOnAlternateNetwork() { | 
 |     context_.params()->migrate_sessions_on_network_change_v2 = true; | 
 |     context_.params()->migrate_sessions_early_v2 = true; | 
 |     context_.params()->retry_on_alternate_network_before_handshake = true; | 
 |     scoped_mock_change_notifier_ = | 
 |         std::make_unique<ScopedMockNetworkChangeNotifier>(); | 
 |     MockNetworkChangeNotifier* mock_ncn = | 
 |         scoped_mock_change_notifier_->mock_network_change_notifier(); | 
 |     mock_ncn->ForceNetworkHandlesSupported(); | 
 |     mock_ncn->SetConnectedNetworksList( | 
 |         {kDefaultNetworkForTests, kNewNetworkForTests}); | 
 |   } | 
 |  | 
 |   // Adds a new socket data provider for an HTTP request, and runs a request, | 
 |   // expecting it to be used. | 
 |   void AddHttpDataAndRunRequest() { | 
 |     MockWrite http_writes[] = { | 
 |         MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |         MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |         MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |     MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                              MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                              MockRead(SYNCHRONOUS, 5, "http used"), | 
 |                              // Connection closed. | 
 |                              MockRead(SYNCHRONOUS, OK, 6)}; | 
 |     SequencedSocketData http_data(http_reads, http_writes); | 
 |     socket_factory_.AddSocketDataProvider(&http_data); | 
 |     SSLSocketDataProvider ssl_data(ASYNC, OK); | 
 |     socket_factory_.AddSSLSocketDataProvider(&ssl_data); | 
 |     SendRequestAndExpectHttpResponse("http used"); | 
 |     EXPECT_TRUE(http_data.AllWriteDataConsumed()); | 
 |     EXPECT_TRUE(http_data.AllReadDataConsumed()); | 
 |   } | 
 |  | 
 |   // Adds a new socket data provider for a QUIC request, and runs a request, | 
 |   // expecting it to be used. The new QUIC session is not closed. | 
 |   void AddQuicDataAndRunRequest() { | 
 |     QuicTestPacketMaker client_maker( | 
 |         version_, | 
 |         quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |         context_.clock(), kDefaultServerHostName, quic::Perspective::IS_CLIENT, | 
 |         client_headers_include_h2_stream_dependency_, true); | 
 |     QuicTestPacketMaker server_maker( | 
 |         version_, | 
 |         quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |         context_.clock(), kDefaultServerHostName, quic::Perspective::IS_SERVER, | 
 |         false); | 
 |     MockQuicData quic_data(version_); | 
 |     int packet_number = 1; | 
 |     client_maker.SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |     if (VersionUsesHttp3(version_.transport_version)) { | 
 |       quic_data.AddWrite( | 
 |           SYNCHRONOUS, client_maker.MakeInitialSettingsPacket(packet_number++)); | 
 |     } | 
 |     quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker.MakeRequestHeadersPacket( | 
 |             packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             true, true, ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY), | 
 |             GetRequestHeaders("GET", "https", "/", &client_maker), 0, nullptr)); | 
 |     client_maker.SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |     quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |     quic_data.AddRead( | 
 |         ASYNC, server_maker.MakeResponseHeadersPacket( | 
 |                    1, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                    false, server_maker.GetResponseHeaders("200"), nullptr)); | 
 |     quic_data.AddRead( | 
 |         ASYNC, server_maker.MakeDataPacket( | 
 |                    2, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                    true, ConstructDataFrame("quic used"))); | 
 |     // Don't care about the final ack. | 
 |     quic_data.AddWrite(SYNCHRONOUS, ERR_IO_PENDING); | 
 |     // No more data to read. | 
 |     quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); | 
 |     quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |     HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |     TestCompletionCallback callback; | 
 |     int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |     EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |     // Pump the message loop to get the request started. | 
 |     base::RunLoop().RunUntilIdle(); | 
 |     // Explicitly confirm the handshake. | 
 |     crypto_client_stream_factory_.last_stream() | 
 |         ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |     ASSERT_FALSE(quic_data.AllReadDataConsumed()); | 
 |     quic_data.Resume(); | 
 |  | 
 |     // Run the QUIC session to completion. | 
 |     base::RunLoop().RunUntilIdle(); | 
 |  | 
 |     EXPECT_TRUE(quic_data.AllReadDataConsumed()); | 
 |   } | 
 |  | 
 |   quic::QuicStreamId GetNthClientInitiatedBidirectionalStreamId(int n) const { | 
 |     return quic::test::GetNthClientInitiatedBidirectionalStreamId( | 
 |         version_.transport_version, n); | 
 |   } | 
 |  | 
 |   quic::QuicStreamId GetNthServerInitiatedUnidirectionalStreamId(int n) const { | 
 |     return quic::test::GetNthServerInitiatedUnidirectionalStreamId( | 
 |         version_.transport_version, n); | 
 |   } | 
 |  | 
 |   quic::QuicStreamId GetQpackDecoderStreamId() const { | 
 |     return quic::test::GetNthClientInitiatedUnidirectionalStreamId( | 
 |         version_.transport_version, 1); | 
 |   } | 
 |  | 
 |   std::string StreamCancellationQpackDecoderInstruction(int n) const { | 
 |     return StreamCancellationQpackDecoderInstruction(n, true); | 
 |   } | 
 |  | 
 |   std::string StreamCancellationQpackDecoderInstruction( | 
 |       int n, | 
 |       bool create_stream) const { | 
 |     const quic::QuicStreamId cancelled_stream_id = | 
 |         GetNthClientInitiatedBidirectionalStreamId(n); | 
 |     EXPECT_LT(cancelled_stream_id, 63u); | 
 |  | 
 |     const char opcode = 0x40; | 
 |     if (create_stream) { | 
 |       return {0x03, static_cast<char>(opcode | cancelled_stream_id)}; | 
 |     } else { | 
 |       return {static_cast<char>(opcode | cancelled_stream_id)}; | 
 |     } | 
 |   } | 
 |  | 
 |   static void AddCertificate(SSLSocketDataProvider* ssl_data) { | 
 |     ssl_data->ssl_info.cert = | 
 |         ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); | 
 |     ASSERT_TRUE(ssl_data->ssl_info.cert); | 
 |   } | 
 |  | 
 |   void SendRequestAndExpectQuicResponseMaybeFromProxy( | 
 |       const std::string& expected, | 
 |       bool used_proxy, | 
 |       uint16_t port, | 
 |       const std::string& status_line, | 
 |       const quic::ParsedQuicVersion& version) { | 
 |     HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |     RunTransaction(&trans); | 
 |     CheckWasQuicResponse(&trans, status_line, version); | 
 |     CheckResponsePort(&trans, port); | 
 |     CheckResponseData(&trans, expected); | 
 |     if (used_proxy) { | 
 |       EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic()); | 
 |  | 
 |       // DNS aliases should be empty when using a proxy. | 
 |       EXPECT_TRUE(trans.GetResponseInfo()->dns_aliases.empty()); | 
 |     } else { | 
 |       EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_direct()); | 
 |     } | 
 |   } | 
 |  | 
 |   // Verify that the set of QUIC protocols in `alt_svc_info_vector` and | 
 |   // `supported_versions` is the same.  Since QUICv1 and QUICv2 have the same | 
 |   // ALPN token "h3", they cannot be distinguished when parsing ALPN, so | 
 |   // consider them equal.  This is accomplished by comparing the set of ALPN | 
 |   // strings (instead of comparing the set of ParsedQuicVersion entities). | 
 |   static void VerifyQuicVersionsInAlternativeServices( | 
 |       const AlternativeServiceInfoVector& alt_svc_info_vector, | 
 |       const quic::ParsedQuicVersionVector& supported_versions) { | 
 |     // Process supported versions. | 
 |     std::set<std::string> supported_alpn; | 
 |     for (const auto& version : supported_versions) { | 
 |       if (version.AlpnDeferToRFCv1()) { | 
 |         // These versions currently do not support Alt-Svc. | 
 |         return; | 
 |       } | 
 |       supported_alpn.insert(quic::ParsedQuicVersionToString(version)); | 
 |     } | 
 |  | 
 |     // Versions that support the legacy Google-specific Alt-Svc format are sent | 
 |     // in a single Alt-Svc entry, therefore they are accumulated in a single | 
 |     // AlternativeServiceInfo, whereas more recent versions all have their own | 
 |     // Alt-Svc entry and AlternativeServiceInfo entry.  Flatten to compare. | 
 |     std::set<std::string> alt_svc_negotiated_alpn; | 
 |     for (const auto& alt_svc_info : alt_svc_info_vector) { | 
 |       EXPECT_EQ(kProtoQUIC, alt_svc_info.alternative_service().protocol); | 
 |       for (const auto& version : alt_svc_info.advertised_versions()) { | 
 |         alt_svc_negotiated_alpn.insert( | 
 |             quic::ParsedQuicVersionToString(version)); | 
 |       } | 
 |     } | 
 |  | 
 |     // Compare. | 
 |     EXPECT_EQ(alt_svc_negotiated_alpn, supported_alpn); | 
 |   } | 
 |  | 
 |   const quic::ParsedQuicVersion version_; | 
 |   const std::string alt_svc_header_ = | 
 |       GenerateQuicAltSvcHeader({version_}) + "\r\n"; | 
 |   const bool client_headers_include_h2_stream_dependency_; | 
 |   base::test::ScopedFeatureList scoped_feature_list_; | 
 |   quic::ParsedQuicVersionVector supported_versions_; | 
 |   quic::test::QuicFlagSaver flags_;  // Save/restore all QUIC flag values. | 
 |   MockQuicContext context_; | 
 |   std::unique_ptr<QuicTestPacketMaker> client_maker_; | 
 |   QuicTestPacketMaker server_maker_; | 
 |   scoped_refptr<TestTaskRunner> quic_task_runner_; | 
 |   std::unique_ptr<HttpNetworkSession> session_; | 
 |   MockClientSocketFactory socket_factory_; | 
 |   ProofVerifyDetailsChromium verify_details_; | 
 |   MockCryptoClientStreamFactory crypto_client_stream_factory_; | 
 |   MockHostResolver host_resolver_{/*default_result=*/MockHostResolverBase:: | 
 |                                       RuleResolver::GetLocalhostResult()}; | 
 |   MockCertVerifier cert_verifier_; | 
 |   TransportSecurityState transport_security_state_; | 
 |   DefaultCTPolicyEnforcer ct_policy_enforcer_; | 
 |   TestSocketPerformanceWatcherFactory test_socket_performance_watcher_factory_; | 
 |   std::unique_ptr<SSLConfigServiceDefaults> ssl_config_service_; | 
 |   std::unique_ptr<ProxyResolutionService> proxy_resolution_service_; | 
 |   std::unique_ptr<HttpAuthHandlerFactory> auth_handler_factory_; | 
 |   std::unique_ptr<HttpServerProperties> http_server_properties_; | 
 |   HttpNetworkSessionParams session_params_; | 
 |   HttpNetworkSessionContext session_context_; | 
 |   HttpRequestInfo request_; | 
 |   NetLogWithSource net_log_with_source_{ | 
 |       NetLogWithSource::Make(NetLogSourceType::NONE)}; | 
 |   RecordingNetLogObserver net_log_observer_; | 
 |   std::vector<std::unique_ptr<StaticSocketDataProvider>> hanging_data_; | 
 |   SSLSocketDataProvider ssl_data_; | 
 |   std::unique_ptr<ScopedMockNetworkChangeNotifier> scoped_mock_change_notifier_; | 
 |  | 
 |  private: | 
 |   void SendRequestAndExpectQuicResponseMaybeFromProxy( | 
 |       const std::string& expected, | 
 |       bool used_proxy, | 
 |       uint16_t port, | 
 |       const std::string& status_line) { | 
 |     SendRequestAndExpectQuicResponseMaybeFromProxy(expected, used_proxy, port, | 
 |                                                    status_line, version_); | 
 |   } | 
 |  | 
 |   void SendRequestAndExpectQuicResponseMaybeFromProxy( | 
 |       const std::string& expected, | 
 |       bool used_proxy, | 
 |       uint16_t port) { | 
 |     SendRequestAndExpectQuicResponseMaybeFromProxy(expected, used_proxy, port, | 
 |                                                    "HTTP/1.1 200", version_); | 
 |   } | 
 | }; | 
 |  | 
 | INSTANTIATE_TEST_SUITE_P(VersionIncludeStreamDependencySequence, | 
 |                          QuicNetworkTransactionTest, | 
 |                          ::testing::ValuesIn(GetTestParams()), | 
 |                          ::testing::PrintToStringParamName()); | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, WriteErrorHandshakeConfirmed) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   base::HistogramTester histograms; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |   crypto_client_stream_factory_.set_handshake_mode( | 
 |       MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   if (VersionUsesHttp3(version_.transport_version)) | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1)); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, ERR_INTERNET_DISCONNECTED); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |  | 
 |   histograms.ExpectBucketCount("Net.QuicSession.WriteError", | 
 |                                -ERR_INTERNET_DISCONNECTED, 1); | 
 |   histograms.ExpectBucketCount("Net.QuicSession.WriteError.HandshakeConfirmed", | 
 |                                -ERR_INTERNET_DISCONNECTED, 1); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, WriteErrorHandshakeConfirmedAsync) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   base::HistogramTester histograms; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |   crypto_client_stream_factory_.set_handshake_mode( | 
 |       MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   if (VersionUsesHttp3(version_.transport_version)) | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1)); | 
 |   mock_quic_data.AddWrite(ASYNC, ERR_INTERNET_DISCONNECTED); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |  | 
 |   histograms.ExpectBucketCount("Net.QuicSession.WriteError", | 
 |                                -ERR_INTERNET_DISCONNECTED, 1); | 
 |   histograms.ExpectBucketCount("Net.QuicSession.WriteError.HandshakeConfirmed", | 
 |                                -ERR_INTERNET_DISCONNECTED, 1); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, SocketWatcherEnabled) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |   test_socket_performance_watcher_factory_.set_should_notify_updated_rtt(true); | 
 |  | 
 |   EXPECT_FALSE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |   EXPECT_TRUE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, SocketWatcherDisabled) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |   test_socket_performance_watcher_factory_.set_should_notify_updated_rtt(false); | 
 |  | 
 |   EXPECT_FALSE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |   EXPECT_FALSE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ForceQuic) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   // Check that the NetLog was filled reasonably. | 
 |   auto entries = net_log_observer_.GetEntries(); | 
 |   EXPECT_LT(0u, entries.size()); | 
 |  | 
 |   // Check that we logged a QUIC_SESSION_PACKET_RECEIVED. | 
 |   int pos = ExpectLogContainsSomewhere( | 
 |       entries, 0, NetLogEventType::QUIC_SESSION_PACKET_RECEIVED, | 
 |       NetLogEventPhase::NONE); | 
 |   EXPECT_LT(0, pos); | 
 |  | 
 |   // ... and also a TYPE_QUIC_SESSION_PACKET_SENT. | 
 |   pos = ExpectLogContainsSomewhere(entries, 0, | 
 |                                    NetLogEventType::QUIC_SESSION_PACKET_SENT, | 
 |                                    NetLogEventPhase::NONE); | 
 |   EXPECT_LT(0, pos); | 
 |  | 
 |   // ... and also a TYPE_QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED. | 
 |   pos = ExpectLogContainsSomewhere( | 
 |       entries, 0, | 
 |       NetLogEventType::QUIC_SESSION_UNAUTHENTICATED_PACKET_HEADER_RECEIVED, | 
 |       NetLogEventPhase::NONE); | 
 |   EXPECT_LT(0, pos); | 
 |  | 
 |   EXPECT_EQ(1, GetIntegerValueFromParams(entries[pos], "packet_number")); | 
 |  | 
 |   // ... and also a TYPE_QUIC_SESSION_PACKET_AUTHENTICATED. | 
 |   pos = ExpectLogContainsSomewhere( | 
 |       entries, 0, NetLogEventType::QUIC_SESSION_PACKET_AUTHENTICATED, | 
 |       NetLogEventPhase::NONE); | 
 |   EXPECT_LT(0, pos); | 
 |  | 
 |   // ... and also a QUIC_SESSION_STREAM_FRAME_RECEIVED. | 
 |   pos = ExpectLogContainsSomewhere( | 
 |       entries, 0, NetLogEventType::QUIC_SESSION_STREAM_FRAME_RECEIVED, | 
 |       NetLogEventPhase::NONE); | 
 |   EXPECT_LT(0, pos); | 
 |  | 
 |   int log_stream_id = GetIntegerValueFromParams(entries[pos], "stream_id"); | 
 |   if (quic::VersionUsesHttp3(version_.transport_version)) { | 
 |     EXPECT_EQ(GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               static_cast<quic::QuicStreamId>(log_stream_id)); | 
 |   } else { | 
 |     EXPECT_EQ(quic::QuicUtils::GetHeadersStreamId(version_.transport_version), | 
 |               static_cast<quic::QuicStreamId>(log_stream_id)); | 
 |   } | 
 | } | 
 |  | 
 | // Regression test for https://crbug.com/1043531. | 
 | TEST_P(QuicNetworkTransactionTest, ResetOnEmptyResponseHeaders) { | 
 |   if (!quic::VersionUsesHttp3(version_.transport_version)) { | 
 |     return; | 
 |   } | 
 |  | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int write_packet_num = 1; | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructInitialSettingsPacket(write_packet_num++)); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           write_packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, GetRequestHeaders("GET", "https", "/"))); | 
 |  | 
 |   const quic::QuicStreamId request_stream_id = | 
 |       GetNthClientInitiatedBidirectionalStreamId(0); | 
 |   spdy::Http2HeaderBlock empty_response_headers; | 
 |   const std::string response_data = server_maker_.QpackEncodeHeaders( | 
 |       request_stream_id, std::move(empty_response_headers), nullptr); | 
 |   uint64_t read_packet_num = 1; | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket(read_packet_num++, request_stream_id, | 
 |                                        false, false, response_data)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       ASYNC, ConstructClientAckDataAndRst( | 
 |                  write_packet_num++, true, request_stream_id, | 
 |                  quic::QUIC_STREAM_GENERAL_PROTOCOL_ERROR, 1, 1, | 
 |                  GetQpackDecoderStreamId(), false, | 
 |                  StreamCancellationQpackDecoderInstruction(request_stream_id))); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(net::ERR_QUIC_PROTOCOL_ERROR)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, LargeResponseHeaders) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   spdy::Http2HeaderBlock response_headers = GetResponseHeaders("200"); | 
 |   response_headers["key1"] = std::string(30000, 'A'); | 
 |   response_headers["key2"] = std::string(30000, 'A'); | 
 |   response_headers["key3"] = std::string(30000, 'A'); | 
 |   response_headers["key4"] = std::string(30000, 'A'); | 
 |   response_headers["key5"] = std::string(30000, 'A'); | 
 |   response_headers["key6"] = std::string(30000, 'A'); | 
 |   response_headers["key7"] = std::string(30000, 'A'); | 
 |   response_headers["key8"] = std::string(30000, 'A'); | 
 |   quic::QuicStreamId stream_id; | 
 |   std::string response_data; | 
 |   if (quic::VersionUsesHttp3(version_.transport_version)) { | 
 |     stream_id = GetNthClientInitiatedBidirectionalStreamId(0); | 
 |     response_data = server_maker_.QpackEncodeHeaders( | 
 |         stream_id, std::move(response_headers), nullptr); | 
 |   } else { | 
 |     stream_id = quic::QuicUtils::GetHeadersStreamId(version_.transport_version); | 
 |     spdy::SpdyHeadersIR headers_frame( | 
 |         GetNthClientInitiatedBidirectionalStreamId(0), | 
 |         std::move(response_headers)); | 
 |     spdy::SpdyFramer response_framer(spdy::SpdyFramer::ENABLE_COMPRESSION); | 
 |     spdy::SpdySerializedFrame spdy_frame = | 
 |         response_framer.SerializeFrame(headers_frame); | 
 |     response_data = std::string(spdy_frame.data(), spdy_frame.size()); | 
 |   } | 
 |  | 
 |   uint64_t packet_number = 1; | 
 |   size_t chunk_size = 1200; | 
 |   for (size_t offset = 0; offset < response_data.length(); | 
 |        offset += chunk_size) { | 
 |     size_t len = std::min(chunk_size, response_data.length() - offset); | 
 |     mock_quic_data.AddRead( | 
 |         ASYNC, ConstructServerDataPacket( | 
 |                    packet_number++, stream_id, false, false, | 
 |                    absl::string_view(response_data.data() + offset, len))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  packet_number, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  false, true, ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddWrite(ASYNC, ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddWrite( | 
 |       ASYNC, ConstructClientAckPacket(packet_num++, packet_number, 3)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, TooLargeResponseHeaders) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |  | 
 |   spdy::Http2HeaderBlock response_headers = GetResponseHeaders("200"); | 
 |   response_headers["key1"] = std::string(30000, 'A'); | 
 |   response_headers["key2"] = std::string(30000, 'A'); | 
 |   response_headers["key3"] = std::string(30000, 'A'); | 
 |   response_headers["key4"] = std::string(30000, 'A'); | 
 |   response_headers["key5"] = std::string(30000, 'A'); | 
 |   response_headers["key6"] = std::string(30000, 'A'); | 
 |   response_headers["key7"] = std::string(30000, 'A'); | 
 |   response_headers["key8"] = std::string(30000, 'A'); | 
 |   response_headers["key9"] = std::string(30000, 'A'); | 
 |  | 
 |   quic::QuicStreamId stream_id; | 
 |   std::string response_data; | 
 |   if (quic::VersionUsesHttp3(version_.transport_version)) { | 
 |     stream_id = GetNthClientInitiatedBidirectionalStreamId(0); | 
 |     response_data = server_maker_.QpackEncodeHeaders( | 
 |         stream_id, std::move(response_headers), nullptr); | 
 |   } else { | 
 |     stream_id = quic::QuicUtils::GetHeadersStreamId(version_.transport_version); | 
 |     spdy::SpdyHeadersIR headers_frame( | 
 |         GetNthClientInitiatedBidirectionalStreamId(0), | 
 |         std::move(response_headers)); | 
 |     spdy::SpdyFramer response_framer(spdy::SpdyFramer::ENABLE_COMPRESSION); | 
 |     spdy::SpdySerializedFrame spdy_frame = | 
 |         response_framer.SerializeFrame(headers_frame); | 
 |     response_data = std::string(spdy_frame.data(), spdy_frame.size()); | 
 |   } | 
 |  | 
 |   uint64_t packet_number = 1; | 
 |   size_t chunk_size = 1200; | 
 |   for (size_t offset = 0; offset < response_data.length(); | 
 |        offset += chunk_size) { | 
 |     size_t len = std::min(chunk_size, response_data.length() - offset); | 
 |     mock_quic_data.AddRead( | 
 |         ASYNC, ConstructServerDataPacket( | 
 |                    packet_number++, stream_id, false, false, | 
 |                    absl::string_view(response_data.data() + offset, len))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  packet_number, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  false, true, ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddWrite(ASYNC, ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddWrite( | 
 |       ASYNC, ConstructClientAckAndRstPacket( | 
 |                  packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  quic::QUIC_HEADERS_TOO_LARGE, packet_number, 3)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, RedirectMultipleLocations) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |  | 
 |   spdy::Http2HeaderBlock response_headers = GetResponseHeaders("301"); | 
 |   response_headers.AppendValueOrAddHeader("location", "https://example1.test"); | 
 |   response_headers.AppendValueOrAddHeader("location", "https://example2.test"); | 
 |  | 
 |   if (quic::VersionUsesHttp3(version_.transport_version)) { | 
 |     const quic::QuicStreamId stream_id = | 
 |         GetNthClientInitiatedBidirectionalStreamId(0); | 
 |     const std::string response_data = server_maker_.QpackEncodeHeaders( | 
 |         stream_id, std::move(response_headers), nullptr); | 
 |     ASSERT_LT(response_data.size(), 1200u); | 
 |     mock_quic_data.AddRead( | 
 |         ASYNC, ConstructServerDataPacket(/*packet_number=*/1, stream_id, | 
 |                                          /*should_include_version=*/false, | 
 |                                          /*fin=*/true, response_data)); | 
 |   } else { | 
 |     const quic::QuicStreamId stream_id = | 
 |         quic::QuicUtils::GetHeadersStreamId(version_.transport_version); | 
 |     spdy::SpdyHeadersIR headers_frame( | 
 |         GetNthClientInitiatedBidirectionalStreamId(0), | 
 |         std::move(response_headers)); | 
 |     spdy::SpdyFramer response_framer(spdy::SpdyFramer::ENABLE_COMPRESSION); | 
 |     spdy::SpdySerializedFrame spdy_frame = | 
 |         response_framer.SerializeFrame(headers_frame); | 
 |     const std::string response_data = | 
 |         std::string(spdy_frame.data(), spdy_frame.size()); | 
 |     ASSERT_LT(response_data.size(), 1200u); | 
 |     mock_quic_data.AddRead( | 
 |         ASYNC, ConstructServerDataPacket(/*packet_number=*/1, stream_id, | 
 |                                          /*should_include_version=*/false, | 
 |                                          /*fin=*/false, response_data)); | 
 |   } | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       ASYNC, ConstructClientAckAndRstPacket( | 
 |                  packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  quic::QUIC_STREAM_CANCELLED, | 
 |                  /*largest_received=*/1, /*smallest_received=*/1)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   ASSERT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ForceQuicForAll) { | 
 |   context_.params()->origins_to_force_quic_on.insert(HostPortPair()); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |   EXPECT_TRUE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 | } | 
 |  | 
 | // Regression test for https://crbug.com/695225 | 
 | TEST_P(QuicNetworkTransactionTest, 408Response) { | 
 |   context_.params()->origins_to_force_quic_on.insert(HostPortPair()); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("408"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!", "HTTP/1.1 408"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxy) { | 
 |   session_params_.enable_quic = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC mail.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "http", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   EXPECT_FALSE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 |   // There is no need to set up an alternate protocol job, because | 
 |   // no attempt will be made to speak to the proxy over TCP. | 
 |  | 
 |   request_.url = GURL("http://mail.example.org/"); | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 70); | 
 |   EXPECT_TRUE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 | } | 
 |  | 
 | // Regression test for https://crbug.com/492458.  Test that for an HTTP | 
 | // connection through a QUIC proxy, the certificate exhibited by the proxy is | 
 | // checked against the proxy hostname, not the origin hostname. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyWithCert) { | 
 |   const std::string origin_host = "mail.example.com"; | 
 |   const std::string proxy_host = "www.example.org"; | 
 |  | 
 |   session_params_.enable_quic = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC " + proxy_host + ":70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   client_maker_->set_hostname(origin_host); | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "http", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   scoped_refptr<X509Certificate> cert( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   ASSERT_TRUE(cert.get()); | 
 |   // This certificate is valid for the proxy, but not for the origin. | 
 |   EXPECT_TRUE(cert->VerifyNameMatch(proxy_host)); | 
 |   EXPECT_FALSE(cert->VerifyNameMatch(origin_host)); | 
 |   ProofVerifyDetailsChromium verify_details; | 
 |   verify_details.cert_verify_result.verified_cert = cert; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); | 
 |   ProofVerifyDetailsChromium verify_details2; | 
 |   verify_details2.cert_verify_result.verified_cert = cert; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details2); | 
 |  | 
 |   request_.url = GURL("http://" + origin_host); | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |   SendRequestAndExpectQuicResponseFromProxyOnPort("hello!", 70); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, AlternativeServicesDifferentHost) { | 
 |   context_.params()->allow_remote_alt_svc = true; | 
 |   HostPortPair origin("www.example.org", 443); | 
 |   HostPortPair alternative("mail.example.org", 443); | 
 |  | 
 |   base::FilePath certs_dir = GetTestCertsDirectory(); | 
 |   scoped_refptr<X509Certificate> cert( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   ASSERT_TRUE(cert.get()); | 
 |   // TODO(rch): the connection should be "to" the origin, so if the cert is | 
 |   // valid for the origin but not the alternative, that should work too. | 
 |   EXPECT_TRUE(cert->VerifyNameMatch(origin.host())); | 
 |   EXPECT_TRUE(cert->VerifyNameMatch(alternative.host())); | 
 |   ProofVerifyDetailsChromium verify_details; | 
 |   verify_details.cert_verify_result.verified_cert = cert; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); | 
 |  | 
 |   client_maker_->set_hostname(origin.host()); | 
 |   MockQuicData mock_quic_data(version_); | 
 |  | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   request_.url = GURL("https://" + origin.host()); | 
 |   AddQuicRemoteAlternativeServiceMapping( | 
 |       MockCryptoClientStream::CONFIRM_HANDSHAKE, alternative); | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, DoNotUseQuicForUnsupportedVersion) { | 
 |   quic::ParsedQuicVersion unsupported_version = | 
 |       quic::ParsedQuicVersion::Unsupported(); | 
 |   // Add support for another QUIC version besides |version_|. Also find an | 
 |   // unsupported version. | 
 |   for (const quic::ParsedQuicVersion& version : quic::AllSupportedVersions()) { | 
 |     if (version == version_) | 
 |       continue; | 
 |     if (supported_versions_.size() != 2) { | 
 |       supported_versions_.push_back(version); | 
 |       continue; | 
 |     } | 
 |     unsupported_version = version; | 
 |     break; | 
 |   } | 
 |   ASSERT_EQ(2u, supported_versions_.size()); | 
 |   ASSERT_NE(quic::ParsedQuicVersion::Unsupported(), unsupported_version); | 
 |  | 
 |   // Set up alternative service to use QUIC with a version that is not | 
 |   // supported. | 
 |   url::SchemeHostPort server(request_.url); | 
 |   AlternativeService alternative_service(kProtoQUIC, kDefaultServerHostName, | 
 |                                          443); | 
 |   base::Time expiration = base::Time::Now() + base::Days(1); | 
 |   http_server_properties_->SetQuicAlternativeService( | 
 |       server, NetworkAnonymizationKey(), alternative_service, expiration, | 
 |       {unsupported_version}); | 
 |  | 
 |   AlternativeServiceInfoVector alt_svc_info_vector = | 
 |       http_server_properties_->GetAlternativeServiceInfos( | 
 |           server, NetworkAnonymizationKey()); | 
 |   EXPECT_EQ(1u, alt_svc_info_vector.size()); | 
 |   EXPECT_EQ(kProtoQUIC, alt_svc_info_vector[0].alternative_service().protocol); | 
 |   EXPECT_EQ(1u, alt_svc_info_vector[0].advertised_versions().size()); | 
 |   EXPECT_EQ(unsupported_version, | 
 |             alt_svc_info_vector[0].advertised_versions()[0]); | 
 |  | 
 |   // First request should still be sent via TCP as the QUIC version advertised | 
 |   // in the stored AlternativeService is not supported by the client. However, | 
 |   // the response from the server will advertise new Alt-Svc with supported | 
 |   // versions. | 
 |   std::string altsvc_header = GenerateQuicAltSvcHeader(supported_versions_); | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), | 
 |       MockRead(altsvc_header.c_str()), | 
 |       MockRead("\r\n"), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // Second request should be sent via QUIC as a new list of verions supported | 
 |   // by the client has been advertised by the server. | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(supported_versions_); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   // Check alternative service list is updated with new versions. | 
 |   alt_svc_info_vector = | 
 |       session_->http_server_properties()->GetAlternativeServiceInfos( | 
 |           server, NetworkAnonymizationKey()); | 
 |   VerifyQuicVersionsInAlternativeServices(alt_svc_info_vector, | 
 |                                           supported_versions_); | 
 | } | 
 |  | 
 | // Regression test for https://crbug.com/546991. | 
 | // The server might not be able to serve a request on an alternative connection, | 
 | // and might send a 421 Misdirected Request response status to indicate this. | 
 | // HttpNetworkTransaction should reset the request and retry without using | 
 | // alternative services. | 
 | TEST_P(QuicNetworkTransactionTest, RetryMisdirectedRequest) { | 
 |   // Set up alternative service to use QUIC. | 
 |   // Note that |origins_to_force_quic_on| cannot be used in this test, because | 
 |   // that overrides |enable_alternative_services|. | 
 |   url::SchemeHostPort server(request_.url); | 
 |   AlternativeService alternative_service(kProtoQUIC, kDefaultServerHostName, | 
 |                                          443); | 
 |   base::Time expiration = base::Time::Now() + base::Days(1); | 
 |   http_server_properties_->SetQuicAlternativeService( | 
 |       server, NetworkAnonymizationKey(), alternative_service, expiration, | 
 |       supported_versions_); | 
 |  | 
 |   // First try: The alternative job uses QUIC and reports an HTTP 421 | 
 |   // Misdirected Request error.  The main job uses TCP, but |http_data| below is | 
 |   // paused at Connect(), so it will never exit the socket pool. This ensures | 
 |   // that the alternate job always wins the race and keeps whether the | 
 |   // |http_data| exits the socket pool before the main job is aborted | 
 |   // deterministic. The first main job gets aborted without the socket pool ever | 
 |   // dispensing the socket, making it available for the second try. | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  GetResponseHeaders("421"))); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Second try: The main job uses TCP, and there is no alternate job. Once the | 
 |   // Connect() is unblocked, |http_data| will leave the socket pool, binding to | 
 |   // the main job of the second request. It then succeeds over HTTP/1.1. | 
 |   // Note that if there was an alternative QUIC Job created for the second try, | 
 |   // that would read these data, and would fail with ERR_QUIC_PROTOCOL_ERROR. | 
 |   // Therefore this test ensures that no alternative Job is created on retry. | 
 |   MockWrite writes[] = {MockWrite(ASYNC, 0, "GET / HTTP/1.1\r\n"), | 
 |                         MockWrite(ASYNC, 1, "Host: mail.example.org\r\n"), | 
 |                         MockWrite(ASYNC, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |   MockRead reads[] = {MockRead(ASYNC, 3, "HTTP/1.1 200 OK\r\n\r\n"), | 
 |                       MockRead(ASYNC, 4, "hello!"), MockRead(ASYNC, OK, 5)}; | 
 |   SequencedSocketData http_data(MockConnect(ASYNC, ERR_IO_PENDING) /* pause */, | 
 |                                 reads, writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |  | 
 |   // Run until |mock_quic_data| has failed and |http_data| has paused. | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // |mock_quic_data| must have run to completion. | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   // Now that the QUIC data has been consumed, unblock |http_data|. | 
 |   http_data.socket()->OnConnectComplete(MockConnect()); | 
 |  | 
 |   // The retry logic must hide the 421 status. The transaction succeeds on | 
 |   // |http_data|. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   CheckWasHttpResponse(&trans); | 
 |   CheckResponsePort(&trans, 443); | 
 |   CheckResponseData(&trans, "hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ForceQuicWithErrorConnecting) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data1(version_); | 
 |   if (VersionUsesHttp3(version_.transport_version)) | 
 |     mock_quic_data1.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1)); | 
 |   mock_quic_data1.AddRead(ASYNC, ERR_SOCKET_NOT_CONNECTED); | 
 |   client_maker_->Reset(); | 
 |   MockQuicData mock_quic_data2(version_); | 
 |   if (VersionUsesHttp3(version_.transport_version)) | 
 |     mock_quic_data2.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1)); | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); | 
 |   mock_quic_data2.AddRead(ASYNC, ERR_SOCKET_NOT_CONNECTED); | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); | 
 |  | 
 |   mock_quic_data1.AddSocketDataToFactory(&socket_factory_); | 
 |   mock_quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   EXPECT_EQ(0U, test_socket_performance_watcher_factory_.watcher_count()); | 
 |   for (size_t i = 0; i < 2; ++i) { | 
 |     HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |     TestCompletionCallback callback; | 
 |     int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |     EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |     EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_CLOSED)); | 
 |     EXPECT_EQ(1 + i, test_socket_performance_watcher_factory_.watcher_count()); | 
 |  | 
 |     NetErrorDetails details; | 
 |     trans.PopulateNetErrorDetails(&details); | 
 |     EXPECT_EQ(quic::QUIC_PACKET_READ_ERROR, details.quic_connection_error); | 
 |   } | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, DoNotForceQuicForHttps) { | 
 |   // Attempt to "force" quic on 443, which will not be honored. | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("www.google.com:443")); | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&data); | 
 |   SSLSocketDataProvider ssl(ASYNC, OK); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   EXPECT_EQ(0U, test_socket_performance_watcher_factory_.watcher_count()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceForQuic) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, UseIetfAlternativeServiceForQuic) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   std::string alt_svc_header = | 
 |       "Alt-Svc: " + quic::AlpnForVersion(version_) + "=\":443\"\r\n\r\n"; | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | // Much like above, but makes sure NetworkAnonymizationKey is respected. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        UseAlternativeServiceForQuicWithNetworkAnonymizationKey) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitWithFeatures( | 
 |       // enabled_features | 
 |       {features::kPartitionHttpServerPropertiesByNetworkIsolationKey, | 
 |        features::kPartitionConnectionsByNetworkIsolationKey}, | 
 |       // disabled_features | 
 |       {}); | 
 |   // Since HttpServerProperties caches the feature value, have to create a new | 
 |   // one. | 
 |   http_server_properties_ = std::make_unique<HttpServerProperties>(); | 
 |  | 
 |   const SchemefulSite kSite1(GURL("https://foo.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey1(kSite1, kSite1); | 
 |  | 
 |   const SchemefulSite kSite2(GURL("https://bar.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey2(kSite2, kSite2); | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   AddCertificate(&ssl_data_); | 
 |  | 
 |   // Request with empty NetworkAnonymizationKey. | 
 |   StaticSocketDataProvider http_data1(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data1); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // First request with kNetworkIsolationKey1. | 
 |   StaticSocketDataProvider http_data2(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data2); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // Request with kNetworkIsolationKey2. | 
 |   StaticSocketDataProvider http_data3(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data3); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // Second request with kNetworkIsolationKey1, can finally use QUIC, since | 
 |   // alternative service infrmation has been received in this context before. | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   // This is first so that the test fails if alternative service info is | 
 |   // written with the right NetworkAnonymizationKey, but always queried with an | 
 |   // empty one. | 
 |   request_.network_isolation_key = NetworkIsolationKey(); | 
 |   request_.network_anonymization_key = NetworkAnonymizationKey(); | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   request_.network_isolation_key = kNetworkIsolationKey1; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey1; | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   request_.network_isolation_key = kNetworkIsolationKey2; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey2; | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |  | 
 |   // Only use QUIC when using a NetworkAnonymizationKey which has been used when | 
 |   // alternative service information was received. | 
 |   request_.network_isolation_key = kNetworkIsolationKey1; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey1; | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceWithVersionForQuic1) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   // Both client and server supports two QUIC versions: | 
 |   // Client supports |supported_versions_[0]| and |supported_versions_[1]|, | 
 |   // server supports |version_| and |advertised_version_2|. | 
 |   // Only |version_| (same as |supported_versions_[0]|) is supported by both. | 
 |   // The QuicStreamFactoy will pick up |version_|, which is verified as the | 
 |   // PacketMakers are using |version_|. | 
 |  | 
 |   // Compare ALPN strings instead of ParsedQuicVersions because QUIC v1 and v2 | 
 |   // have the same ALPN string. | 
 |   ASSERT_EQ(1u, supported_versions_.size()); | 
 |   ASSERT_EQ(supported_versions_[0], version_); | 
 |   quic::ParsedQuicVersion advertised_version_2 = | 
 |       quic::ParsedQuicVersion::Unsupported(); | 
 |   for (const quic::ParsedQuicVersion& version : quic::AllSupportedVersions()) { | 
 |     if (quic::AlpnForVersion(version) == quic::AlpnForVersion(version_)) { | 
 |       continue; | 
 |     } | 
 |     if (supported_versions_.size() != 2) { | 
 |       supported_versions_.push_back(version); | 
 |       continue; | 
 |     } | 
 |     if (supported_versions_.size() == 2 && | 
 |         quic::AlpnForVersion(supported_versions_[1]) == | 
 |             quic::AlpnForVersion(version)) { | 
 |       continue; | 
 |     } | 
 |     advertised_version_2 = version; | 
 |     break; | 
 |   } | 
 |   ASSERT_EQ(2u, supported_versions_.size()); | 
 |   ASSERT_NE(quic::ParsedQuicVersion::Unsupported(), advertised_version_2); | 
 |  | 
 |   std::string QuicAltSvcWithVersionHeader = | 
 |       base::StringPrintf("Alt-Svc: %s=\":443\", %s=\":443\"\r\n\r\n", | 
 |                          quic::AlpnForVersion(advertised_version_2).c_str(), | 
 |                          quic::AlpnForVersion(version_).c_str()); | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), | 
 |       MockRead(QuicAltSvcWithVersionHeader.c_str()), MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(supported_versions_); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        PickQuicVersionWhenMultipleVersionsAreSupported) { | 
 |   // Client and server both support more than one QUIC_VERSION. | 
 |   // Client prefers |version_|, and then common_version_2. | 
 |   // Server prefers common_version_2, and then |version_|. | 
 |   // We should honor the server's preference. | 
 |   // The picked version is verified via checking the version used by the | 
 |   // TestPacketMakers and the response. | 
 |  | 
 |   // Find an alternative commonly supported version other than |version_|. | 
 |   quic::ParsedQuicVersion common_version_2 = | 
 |       quic::ParsedQuicVersion::Unsupported(); | 
 |   for (const quic::ParsedQuicVersion& version : quic::AllSupportedVersions()) { | 
 |     if (version != version_ && !version.AlpnDeferToRFCv1()) { | 
 |       common_version_2 = version; | 
 |       break; | 
 |     } | 
 |   } | 
 |   ASSERT_NE(common_version_2, quic::ParsedQuicVersion::Unsupported()); | 
 |  | 
 |   // Setting up client's preference list: {|version_|, |common_version_2|}. | 
 |   supported_versions_.clear(); | 
 |   supported_versions_.push_back(version_); | 
 |   supported_versions_.push_back(common_version_2); | 
 |  | 
 |   // Setting up server's Alt-Svc header in the following preference order: | 
 |   // |common_version_2|, |version_|. | 
 |   std::string QuicAltSvcWithVersionHeader; | 
 |   quic::ParsedQuicVersion picked_version = | 
 |       quic::ParsedQuicVersion::Unsupported(); | 
 |   QuicAltSvcWithVersionHeader = | 
 |       "Alt-Svc: " + quic::AlpnForVersion(common_version_2) + | 
 |       "=\":443\"; ma=3600, " + quic::AlpnForVersion(version_) + | 
 |       "=\":443\"; ma=3600\r\n\r\n"; | 
 |   picked_version = common_version_2;  // Use server's preference. | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), | 
 |       MockRead(QuicAltSvcWithVersionHeader.c_str()), MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(picked_version); | 
 |  | 
 |   // Reset QuicTestPacket makers as the version picked may not be |version_|. | 
 |   client_maker_ = std::make_unique<QuicTestPacketMaker>( | 
 |       picked_version, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), kDefaultServerHostName, quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   QuicTestPacketMaker server_maker( | 
 |       picked_version, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), kDefaultServerHostName, quic::Perspective::IS_SERVER, | 
 |       false); | 
 |  | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(picked_version.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |  | 
 |   quic::QuicStreamId client_stream_0 = | 
 |       quic::test::GetNthClientInitiatedBidirectionalStreamId( | 
 |           picked_version.transport_version, 0); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientRequestHeadersPacket( | 
 |                               packet_num++, client_stream_0, true, true, | 
 |                               GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead(ASYNC, | 
 |                          server_maker.MakeResponseHeadersPacket( | 
 |                              1, client_stream_0, false, false, | 
 |                              server_maker.GetResponseHeaders("200"), nullptr)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, server_maker.MakeDataPacket( | 
 |                  2, client_stream_0, false, true, | 
 |                  ConstructDataFrameForVersion("hello!", picked_version))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(supported_versions_); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponseMaybeFromProxy( | 
 |       "hello!", false, 443, "HTTP/1.1 200", picked_version); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, SetAlternativeServiceWithScheme) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   std::string alt_svc_header = base::StrCat( | 
 |       {"Alt-Svc: ", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, "foo.example.com", 443), ",", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, 444), "\r\n\r\n"}); | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |   // Send https request, ignore alternative service advertising if response | 
 |   // header advertises alternative service for mail.example.org. | 
 |   request_.url = GURL("https://mail.example.org:443"); | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   HttpServerProperties* http_server_properties = | 
 |       session_->http_server_properties(); | 
 |   url::SchemeHostPort http_server("http", "mail.example.org", 443); | 
 |   url::SchemeHostPort https_server("https", "mail.example.org", 443); | 
 |   // Check alternative service is set for the correct origin. | 
 |   EXPECT_EQ(2u, http_server_properties | 
 |                     ->GetAlternativeServiceInfos(https_server, | 
 |                                                  NetworkAnonymizationKey()) | 
 |                     .size()); | 
 |   EXPECT_TRUE( | 
 |       http_server_properties | 
 |           ->GetAlternativeServiceInfos(http_server, NetworkAnonymizationKey()) | 
 |           .empty()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, DoNotGetAltSvcForDifferentOrigin) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   std::string alt_svc_header = base::StrCat( | 
 |       {"Alt-Svc: ", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, "foo.example.com", 443), ",", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, 444), "\r\n\r\n"}); | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   AddCertificate(&ssl_data_); | 
 |  | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // Send https request and set alternative services if response header | 
 |   // advertises alternative service for mail.example.org. | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   HttpServerProperties* http_server_properties = | 
 |       session_->http_server_properties(); | 
 |  | 
 |   const url::SchemeHostPort https_server(request_.url); | 
 |   // Check alternative service is set. | 
 |   EXPECT_EQ(2u, http_server_properties | 
 |                     ->GetAlternativeServiceInfos(https_server, | 
 |                                                  NetworkAnonymizationKey()) | 
 |                     .size()); | 
 |  | 
 |   // Send http request to the same origin but with diffrent scheme, should not | 
 |   // use QUIC. | 
 |   request_.url = GURL("http://mail.example.org:443"); | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        StoreMutuallySupportedVersionsWhenProcessAltSvc) { | 
 |   // Add support for another QUIC version besides |version_|. | 
 |   for (const quic::ParsedQuicVersion& version : quic::AllSupportedVersions()) { | 
 |     if (version != version_) { | 
 |       supported_versions_.push_back(version); | 
 |       break; | 
 |     } | 
 |   } | 
 |  | 
 |   std::string altsvc_header = GenerateQuicAltSvcHeader(supported_versions_); | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), | 
 |       MockRead(altsvc_header.c_str()), | 
 |       MockRead("\r\n"), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(supported_versions_); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   // Alt-Svc header contains all possible versions, so alternative services | 
 |   // should contain all of |supported_versions_|. | 
 |   const url::SchemeHostPort https_server(request_.url); | 
 |   const AlternativeServiceInfoVector alt_svc_info_vector = | 
 |       session_->http_server_properties()->GetAlternativeServiceInfos( | 
 |           https_server, NetworkAnonymizationKey()); | 
 |   VerifyQuicVersionsInAlternativeServices(alt_svc_info_vector, | 
 |                                           supported_versions_); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceAllSupportedVersion) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   std::string altsvc_header = base::StringPrintf( | 
 |       "Alt-Svc: %s=\":443\"\r\n\r\n", quic::AlpnForVersion(version_).c_str()); | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, GoAwayWithConnectionMigrationOnPortsOnly) { | 
 |   if (version_.HasIetfQuicFrames()) { | 
 |     // GoAway is not available under version 99 | 
 |     return; | 
 |   } | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   // Read a GoAway packet with | 
 |   // quic::QuicErrorCode: quic::QUIC_ERROR_MIGRATING_PORT from the peer. | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, | 
 |                          ConstructServerGoAwayPacket( | 
 |                              2, quic::QUIC_ERROR_MIGRATING_PORT, | 
 |                              "connection migration with port change only")); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket( | 
 |                        3, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        true, ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndRstPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           quic::QUIC_STREAM_CANCELLED, 3, 3)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   // Check whether this transaction is correctly marked as received a go-away | 
 |   // because of migrating port. | 
 |   NetErrorDetails details; | 
 |   EXPECT_FALSE(details.quic_port_migration_detected); | 
 |   trans.PopulateNetErrorDetails(&details); | 
 |   EXPECT_TRUE(details.quic_port_migration_detected); | 
 | } | 
 |  | 
 | // This test verifies that a new QUIC connection will be attempted on the | 
 | // alternate network if the original QUIC connection fails with idle timeout | 
 | // before handshake is confirmed.  If TCP succeeds and QUIC fails on the | 
 | // alternate network as well, QUIC is marked as broken and the brokenness will | 
 | // not expire when default network changes. | 
 | // TODO(fayang): Add time driven idle network detection test. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        DISABLED_QuicFailsOnBothNetworksWhileTCPSucceeds) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   if (version_.UsesTls()) { | 
 |     // QUIC with TLS1.3 handshake doesn't support 0-rtt. | 
 |     return; | 
 |   } | 
 |   SetUpTestForRetryConnectionOnAlternateNetwork(); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // Hanging read | 
 |   int packet_num = 1; | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++));  // CHLO | 
 |   // Retransmit the handshake messages. | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   // After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT. | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeConnectionClosePacket( | 
 |                          packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, | 
 |                          "No recent network activity after 4s. Timeout:4s")); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Add successful TCP data so that TCP job will succeed. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "TCP succeeds"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // Add data for the second QUIC connection to fail. | 
 |   MockQuicData quic_data2(version_); | 
 |   quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING); | 
 |   quic_data2.AddWrite(SYNCHRONOUS, ERR_ADDRESS_UNREACHABLE);  // Write error. | 
 |   quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Resolve the host resolution synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   // Use a TestTaskRunner to avoid waiting in real time for timeouts. | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |   // Add alternate protocol mapping to race QUIC and TCP. | 
 |   // QUIC connection requires handshake to be confirmed and sends CHLO to the | 
 |   // peer. | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   // Request will be served with TCP job. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   CheckResponseData(&trans, "TCP succeeds"); | 
 |  | 
 |   // Fast forward to idle timeout the original connection. A new connection will | 
 |   // be kicked off on the alternate network. | 
 |   quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4)); | 
 |   ASSERT_TRUE(quic_data.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   // Run the message loop to execute posted tasks, which will report job status. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // Verify that QUIC is marked as broken. | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 |  | 
 |   // Deliver a message to notify the new network becomes default, the brokenness | 
 |   // will not expire as QUIC is broken on both networks. | 
 |   scoped_mock_change_notifier_->mock_network_change_notifier() | 
 |       ->NotifyNetworkMadeDefault(kNewNetworkForTests); | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 |  | 
 |   ASSERT_TRUE(quic_data2.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(quic_data2.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // This test verifies that a new QUIC connection will be attempted on the | 
 | // alternate network if the original QUIC connection fails with idle timeout | 
 | // before handshake is confirmed. If TCP succeeds and QUIC succeeds on the | 
 | // alternate network, QUIC is marked as broken. The brokenness will expire when | 
 | // the default network changes. | 
 | // TODO(fayang): Add time driven idle network detection test. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        DISABLED_RetryOnAlternateNetworkWhileTCPSucceeds) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   if (version_.UsesTls()) { | 
 |     // QUIC with TLS1.3 handshake doesn't support 0-rtt. | 
 |     return; | 
 |   } | 
 |  | 
 |   SetUpTestForRetryConnectionOnAlternateNetwork(); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // Hanging read | 
 |   int packet_num = 1; | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++));  // CHLO | 
 |   // Retransmit the handshake messages. | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   // After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT. | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeConnectionClosePacket( | 
 |                          packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, | 
 |                          "No recent network activity after 4s. Timeout:4s")); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Add successful TCP data so that TCP job will succeed. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "TCP succeeds"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // Quic connection will be retried on the alternate network after the initial | 
 |   // one fails on the default network. | 
 |   MockQuicData quic_data2(version_); | 
 |   quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // Handing read. | 
 |   quic_data2.AddWrite(SYNCHRONOUS, | 
 |                       client_maker_->MakeDummyCHLOPacket(1));  // CHLO | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   if (VersionUsesHttp3(version_.transport_version)) | 
 |     quic_data2.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(2)); | 
 |   quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Resolve the host resolution synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   // Use a TestTaskRunner to avoid waiting in real time for timeouts. | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |   // Add alternate protocol mapping to race QUIC and TCP. | 
 |   // QUIC connection requires handshake to be confirmed and sends CHLO to the | 
 |   // peer. | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   // Request will be served with TCP job. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   CheckResponseData(&trans, "TCP succeeds"); | 
 |  | 
 |   // Fast forward to idle timeout the original connection. A new connection will | 
 |   // be kicked off on the alternate network. | 
 |   quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4)); | 
 |   ASSERT_TRUE(quic_data.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   // The second connection hasn't finish handshake, verify that QUIC is not | 
 |   // marked as broken. | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |   // Explicitly confirm the handshake on the second connection. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   // Run message loop to execute posted tasks, which will notify JoController | 
 |   // about the orphaned job status. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // Verify that QUIC is marked as broken. | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 |  | 
 |   // Deliver a message to notify the new network becomes default, the previous | 
 |   // brokenness will be clear as the brokenness is bond with old default | 
 |   // network. | 
 |   scoped_mock_change_notifier_->mock_network_change_notifier() | 
 |       ->NotifyNetworkMadeDefault(kNewNetworkForTests); | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |  | 
 |   ASSERT_TRUE(quic_data2.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(quic_data2.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Much like above test, but verifies NetworkIsolationKeys are respected. | 
 | // TODO(fayang): Add time driven idle network detection test. | 
 | TEST_P( | 
 |     QuicNetworkTransactionTest, | 
 |     DISABLED_RetryOnAlternateNetworkWhileTCPSucceedsWithNetworkIsolationKey) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   if (version_.UsesTls()) { | 
 |     // QUIC with TLS1.3 handshake doesn't support 0-rtt. | 
 |     return; | 
 |   } | 
 |  | 
 |   const SchemefulSite kSite1(GURL("https://foo.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey1(kSite1, kSite1); | 
 |   const SchemefulSite kSite2(GURL("https://bar.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey2(kSite2, kSite2); | 
 |  | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitWithFeatures( | 
 |       // enabled_features | 
 |       {features::kPartitionHttpServerPropertiesByNetworkIsolationKey, | 
 |        // Need to partition connections by NetworkAnonymizationKey for | 
 |        // QuicSessionAliasKey to include NetworkIsolationKeys. | 
 |        features::kPartitionConnectionsByNetworkIsolationKey}, | 
 |       // disabled_features | 
 |       {}); | 
 |   // Since HttpServerProperties caches the feature value, have to create a new | 
 |   // one. | 
 |   http_server_properties_ = std::make_unique<HttpServerProperties>(); | 
 |  | 
 |   SetUpTestForRetryConnectionOnAlternateNetwork(); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // Hanging read | 
 |   int packet_num = 1; | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++));  // CHLO | 
 |   // Retransmit the handshake messages. | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   // After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT. | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeConnectionClosePacket( | 
 |                          packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, | 
 |                          "No recent network activity after 4s. Timeout:4s")); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Add successful TCP data so that TCP job will succeed. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "TCP succeeds"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // Quic connection will be retried on the alternate network after the initial | 
 |   // one fails on the default network. | 
 |   MockQuicData quic_data2(version_); | 
 |   quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // Handing read. | 
 |   quic_data2.AddWrite(SYNCHRONOUS, | 
 |                       client_maker_->MakeDummyCHLOPacket(1));  // CHLO | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   if (VersionUsesHttp3(version_.transport_version)) | 
 |     quic_data2.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(2)); | 
 |   quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Resolve the host resolution synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   // Use a TestTaskRunner to avoid waiting in real time for timeouts. | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |   // Add alternate protocol mapping to race QUIC and TCP. | 
 |   // QUIC connection requires handshake to be confirmed and sends CHLO to the | 
 |   // peer. | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT, | 
 |       kNetworkAnonymizationKey1); | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT, | 
 |       kNetworkAnonymizationKey2); | 
 |  | 
 |   request_.network_isolation_key = kNetworkIsolationKey1; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey1; | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   // Request will be served with TCP job. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   CheckResponseData(&trans, "TCP succeeds"); | 
 |  | 
 |   // Fast forward to idle timeout the original connection. A new connection will | 
 |   // be kicked off on the alternate network. | 
 |   quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4)); | 
 |   ASSERT_TRUE(quic_data.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   // The second connection hasn't finish handshake, verify that QUIC is not | 
 |   // marked as broken. | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey1); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey2); | 
 |   // Explicitly confirm the handshake on the second connection. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   // Run message loop to execute posted tasks, which will notify JoController | 
 |   // about the orphaned job status. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // Verify that QUIC is marked as broken for kNetworkIsolationKey1 only. | 
 |   ExpectBrokenAlternateProtocolMapping(kNetworkAnonymizationKey1); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey2); | 
 |  | 
 |   // Deliver a message to notify the new network becomes default, the previous | 
 |   // brokenness will be clear as the brokenness is bond with old default | 
 |   // network. | 
 |   scoped_mock_change_notifier_->mock_network_change_notifier() | 
 |       ->NotifyNetworkMadeDefault(kNewNetworkForTests); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey1); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey2); | 
 |  | 
 |   ASSERT_TRUE(quic_data2.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(quic_data2.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // This test verifies that a new QUIC connection will be attempted on the | 
 | // alternate network if the original QUIC connection fails with idle timeout | 
 | // before handshake is confirmed. If TCP doesn't succeed but QUIC on the | 
 | // alternative network succeeds, QUIC is not marked as broken. | 
 | // TODO(fayang): Add time driven idle network detection test. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        DISABLED_RetryOnAlternateNetworkWhileTCPHanging) { | 
 |   if (version_.UsesTls()) { | 
 |     // QUIC with TLS1.3 handshake doesn't support 0-rtt. | 
 |     return; | 
 |   } | 
 |  | 
 |   SetUpTestForRetryConnectionOnAlternateNetwork(); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // Hanging read | 
 |   int packet_num = 1; | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++));  // CHLO | 
 |   // Retransmit the handshake messages. | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeDummyCHLOPacket(packet_num++)); | 
 |   // After timeout, connection will be closed with QUIC_NETWORK_IDLE_TIMEOUT. | 
 |   quic_data.AddWrite(SYNCHRONOUS, | 
 |                      client_maker_->MakeConnectionClosePacket( | 
 |                          packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, | 
 |                          "No recent network activity after 4s. Timeout:4s")); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Add hanging TCP data so that TCP job will never succeeded. | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   // Quic connection will then be retried on the alternate network. | 
 |   MockQuicData quic_data2(version_); | 
 |   packet_num = 1; | 
 |   quic_data2.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       client_maker_->MakeDummyCHLOPacket(packet_num++));  // CHLO | 
 |  | 
 |   const std::string body = "hello!"; | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data2.AddWrite(SYNCHRONOUS, | 
 |                         ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   quic_data2.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   quic_data2.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   quic_data2.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame(body))); | 
 |   quic_data2.AddWrite(SYNCHRONOUS, | 
 |                       ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Resolve the host resolution synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   // Use a TestTaskRunner to avoid waiting in real time for timeouts. | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |   // Add alternate protocol mapping to race QUIC and TCP. | 
 |   // QUIC connection requires handshake to be confirmed and sends CHLO to the | 
 |   // peer. | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // Fast forward to idle timeout the original connection. A new connection will | 
 |   // be kicked off on the alternate network. | 
 |   quic_task_runner_->FastForwardBy(quic::QuicTime::Delta::FromSeconds(4)); | 
 |   ASSERT_TRUE(quic_data.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   // Verify that QUIC is not marked as broken. | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |   // Explicitly confirm the handshake on the second connection. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   // Read the response. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   CheckResponseData(&trans, body); | 
 |   // Verify that QUIC is not marked as broken. | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |  | 
 |   // Deliver a message to notify the new network becomes default. | 
 |   scoped_mock_change_notifier_->mock_network_change_notifier() | 
 |       ->NotifyNetworkMadeDefault(kNewNetworkForTests); | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |   ASSERT_TRUE(quic_data2.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(quic_data2.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Verify that if a QUIC connection times out, the QuicHttpStream will | 
 | // return QUIC_PROTOCOL_ERROR. | 
 | TEST_P(QuicNetworkTransactionTest, TimeoutAfterHandshakeConfirmed) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   context_.params()->idle_connection_timeout = base::Seconds(5); | 
 |   // Turn off port migration to avoid dealing with unnecessary complexity in | 
 |   // this test. | 
 |   context_.params()->allow_port_migration = false; | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   spdy::SpdyPriority priority = | 
 |       ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); | 
 |  | 
 |   client_maker_->set_save_packet_frames(true); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       client_maker_->MakeRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, priority, GetRequestHeaders("GET", "https", "/"), 0, nullptr)); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 1 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 2 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         2, packet_num++, true)); | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 3 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |  | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        client_maker_->MakeConnectionClosePacket( | 
 |                            packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, | 
 |                            "No recent network activity after 4s. Timeout:4s")); | 
 |   } else { | 
 |     // Settings were sent in the request packet so there is only 1 packet to | 
 |     // retransmit. | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 1 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 2 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 3 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |  | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        client_maker_->MakeConnectionClosePacket( | 
 |                            packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, | 
 |                            "No recent network activity after 4s. Timeout:4s")); | 
 |   } | 
 |  | 
 |   quic_data.AddRead(ASYNC, ERR_IO_PENDING); | 
 |   quic_data.AddRead(ASYNC, OK); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   // Use a TestTaskRunner to avoid waiting in real time for timeouts. | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   quic_task_runner_->RunUntilIdle(); | 
 |  | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 | } | 
 |  | 
 | // TODO(fayang): Add time driven TOO_MANY_RTOS test. | 
 |  | 
 | // Verify that if a QUIC protocol error occurs after the handshake is confirmed | 
 | // the request fails with QUIC_PROTOCOL_ERROR. | 
 | TEST_P(QuicNetworkTransactionTest, ProtocolErrorAfterHandshakeConfirmed) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |   // Peer sending data from an non-existing stream causes this end to raise | 
 |   // error and close connection. | 
 |   quic_data.AddRead( | 
 |       ASYNC, ConstructServerRstPacket( | 
 |                  1, false, GetNthClientInitiatedBidirectionalStreamId(47), | 
 |                  quic::QUIC_STREAM_LAST_ERROR)); | 
 |   std::string quic_error_details = "Data for nonexistent stream"; | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndConnectionClosePacket( | 
 |           packet_num++, 1, 1, | 
 |           version_.HasIetfQuicFrames() ? quic::QUIC_HTTP_STREAM_WRONG_DIRECTION | 
 |                                        : quic::QUIC_INVALID_STREAM_ID, | 
 |           quic_error_details, | 
 |           version_.HasIetfQuicFrames() ? quic::IETF_STOP_SENDING | 
 |                                        : quic::IETF_RST_STREAM)); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   ASSERT_FALSE(quic_data.AllReadDataConsumed()); | 
 |   quic_data.Resume(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |   ASSERT_TRUE(quic_data.AllReadDataConsumed()); | 
 |  | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC | 
 | // connection times out, then QUIC will be marked as broken and the request | 
 | // retried over TCP. | 
 | TEST_P(QuicNetworkTransactionTest, TimeoutAfterHandshakeConfirmedThenBroken2) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   context_.params()->idle_connection_timeout = base::Seconds(5); | 
 |   // Turn off port migration to avoid dealing with unnecessary complexity in | 
 |   // this test. | 
 |   context_.params()->allow_port_migration = false; | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   spdy::SpdyPriority priority = | 
 |       ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); | 
 |  | 
 |   client_maker_->set_save_packet_frames(true); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        client_maker_->MakeInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       client_maker_->MakeRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, priority, GetRequestHeaders("GET", "https", "/"), 0, nullptr)); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 1 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |  | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 2 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         2, packet_num++, true)); | 
 |  | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 3 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |  | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        client_maker_->MakeConnectionClosePacket( | 
 |                            packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, | 
 |                            "No recent network activity after 4s. Timeout:4s")); | 
 |   } else { | 
 |     // Settings were sent in the request packet so there is only 1 packet to | 
 |     // retransmit. | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 1 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 2 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |     // QuicConnection::OnRetransmissionTimeout skips a packet number when | 
 |     // sending PTO packets. | 
 |     packet_num++; | 
 |     // PTO 3 | 
 |     quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeRetransmissionPacket( | 
 |                                         1, packet_num++, true)); | 
 |  | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        client_maker_->MakeConnectionClosePacket( | 
 |                            packet_num++, true, quic::QUIC_NETWORK_IDLE_TIMEOUT, | 
 |                            "No recent network activity after 4s. Timeout:4s")); | 
 |   } | 
 |  | 
 |   quic_data.AddRead(ASYNC, ERR_IO_PENDING); | 
 |   quic_data.AddRead(ASYNC, OK); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // After that fails, it will be resent via TCP. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "hello world"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   // Use a TestTaskRunner to avoid waiting in real time for timeouts. | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   quic_task_runner_->RunUntilIdle(); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |  | 
 |   // Let the transaction proceed which will result in QUIC being marked | 
 |   // as broken and the request falling back to TCP. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |   ASSERT_FALSE(http_data.AllReadDataConsumed()); | 
 |  | 
 |   // Read the response body over TCP. | 
 |   CheckResponseData(&trans, "hello world"); | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 |   ASSERT_TRUE(http_data.AllWriteDataConsumed()); | 
 |   ASSERT_TRUE(http_data.AllReadDataConsumed()); | 
 | } | 
 |  | 
 | // Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC | 
 | // protocol error occurs after the handshake is confirmed, the request | 
 | // retried over TCP and the QUIC will be marked as broken. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        ProtocolErrorAfterHandshakeConfirmedThenBroken) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   context_.params()->idle_connection_timeout = base::Seconds(5); | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |  | 
 |   // Peer sending data from an non-existing stream causes this end to raise | 
 |   // error and close connection. | 
 |   quic_data.AddRead( | 
 |       ASYNC, ConstructServerRstPacket( | 
 |                  1, false, GetNthClientInitiatedBidirectionalStreamId(47), | 
 |                  quic::QUIC_STREAM_LAST_ERROR)); | 
 |   std::string quic_error_details = "Data for nonexistent stream"; | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndConnectionClosePacket( | 
 |           packet_num++, 1, 1, | 
 |           version_.HasIetfQuicFrames() ? quic::QUIC_HTTP_STREAM_WRONG_DIRECTION | 
 |                                        : quic::QUIC_INVALID_STREAM_ID, | 
 |           quic_error_details, | 
 |           version_.HasIetfQuicFrames() ? quic::IETF_STOP_SENDING | 
 |                                        : quic::IETF_RST_STREAM)); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // After that fails, it will be resent via TCP. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "hello world"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   quic_data.Resume(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |  | 
 |   // Let the transaction proceed which will result in QUIC being marked | 
 |   // as broken and the request falling back to TCP. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |   ASSERT_FALSE(http_data.AllReadDataConsumed()); | 
 |  | 
 |   // Read the response body over TCP. | 
 |   CheckResponseData(&trans, "hello world"); | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 |   ASSERT_TRUE(http_data.AllWriteDataConsumed()); | 
 |   ASSERT_TRUE(http_data.AllReadDataConsumed()); | 
 | } | 
 |  | 
 | // Much like above test, but verifies that NetworkAnonymizationKey is respected. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        ProtocolErrorAfterHandshakeConfirmedThenBrokenWithNetworkIsolationKey) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   const SchemefulSite kSite1(GURL("https://foo.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey1(kSite1, kSite1); | 
 |   const SchemefulSite kSite2(GURL("https://bar.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey2(kSite2, kSite2); | 
 |  | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitWithFeatures( | 
 |       // enabled_features | 
 |       {features::kPartitionHttpServerPropertiesByNetworkIsolationKey, | 
 |        features::kPartitionConnectionsByNetworkIsolationKey}, | 
 |       // disabled_features | 
 |       {}); | 
 |   // Since HttpServerProperties caches the feature value, have to create a new | 
 |   // one. | 
 |   http_server_properties_ = std::make_unique<HttpServerProperties>(); | 
 |  | 
 |   context_.params()->idle_connection_timeout = base::Seconds(5); | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   uint64_t packet_number = 1; | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        ConstructInitialSettingsPacket(packet_number++)); | 
 |   } | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |  | 
 |   // Peer sending data from an non-existing stream causes this end to raise | 
 |   // error and close connection. | 
 |   quic_data.AddRead( | 
 |       ASYNC, ConstructServerRstPacket( | 
 |                  1, false, GetNthClientInitiatedBidirectionalStreamId(47), | 
 |                  quic::QUIC_STREAM_LAST_ERROR)); | 
 |   std::string quic_error_details = "Data for nonexistent stream"; | 
 |   quic::QuicErrorCode quic_error_code = quic::QUIC_INVALID_STREAM_ID; | 
 |   if (version_.HasIetfQuicFrames()) { | 
 |     quic_error_code = quic::QUIC_HTTP_STREAM_WRONG_DIRECTION; | 
 |   } | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndConnectionClosePacket( | 
 |           packet_number++, 1, 1, quic_error_code, quic_error_details, | 
 |           version_.HasIetfQuicFrames() ? quic::IETF_STOP_SENDING | 
 |                                        : quic::IETF_RST_STREAM)); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // After that fails, it will be resent via TCP. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "hello world"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT, | 
 |                                   kNetworkAnonymizationKey1); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT, | 
 |                                   kNetworkAnonymizationKey2); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   request_.network_isolation_key = kNetworkIsolationKey1; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey1; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   quic_data.Resume(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   // Let the transaction proceed which will result in QUIC being marked | 
 |   // as broken and the request falling back to TCP. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |   ASSERT_FALSE(http_data.AllReadDataConsumed()); | 
 |  | 
 |   // Read the response body over TCP. | 
 |   CheckResponseData(&trans, "hello world"); | 
 |   ASSERT_TRUE(http_data.AllWriteDataConsumed()); | 
 |   ASSERT_TRUE(http_data.AllReadDataConsumed()); | 
 |  | 
 |   // The alternative service shouldhave been marked as broken under | 
 |   // kNetworkIsolationKey1 but not kNetworkIsolationKey2. | 
 |   ExpectBrokenAlternateProtocolMapping(kNetworkAnonymizationKey1); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey2); | 
 |  | 
 |   // Subsequent requests using kNetworkIsolationKey1 should not use QUIC. | 
 |   AddHttpDataAndRunRequest(); | 
 |   // Requests using other NetworkIsolationKeys can still use QUIC. | 
 |   request_.network_isolation_key = kNetworkIsolationKey2; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey2; | 
 |  | 
 |   AddQuicDataAndRunRequest(); | 
 |  | 
 |   // The last two requests should not have changed the alternative service | 
 |   // mappings. | 
 |   ExpectBrokenAlternateProtocolMapping(kNetworkAnonymizationKey1); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey2); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        ProtocolErrorAfterHandshakeConfirmedThenBrokenWithUseDnsHttpsSvcbAlpn) { | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitWithFeatures( | 
 |       // enabled_features | 
 |       {features::kUseDnsHttpsSvcbAlpn}, | 
 |       // disabled_features | 
 |       {}); | 
 |   context_.params()->idle_connection_timeout = base::Seconds(5); | 
 |  | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |  | 
 |   // Peer sending data from an non-existing stream causes this end to raise | 
 |   // error and close connection. | 
 |   quic_data.AddRead( | 
 |       ASYNC, ConstructServerRstPacket( | 
 |                  1, false, GetNthClientInitiatedBidirectionalStreamId(47), | 
 |                  quic::QUIC_STREAM_LAST_ERROR)); | 
 |   std::string quic_error_details = "Data for nonexistent stream"; | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndConnectionClosePacket( | 
 |           packet_num++, 1, 1, | 
 |           version_.HasIetfQuicFrames() ? quic::QUIC_HTTP_STREAM_WRONG_DIRECTION | 
 |                                        : quic::QUIC_INVALID_STREAM_ID, | 
 |           quic_error_details, | 
 |           version_.HasIetfQuicFrames() ? quic::IETF_STOP_SENDING | 
 |                                        : quic::IETF_RST_STREAM)); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // After that fails, it will be resent via TCP. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "hello world"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   HostResolverEndpointResult endpoint_result1; | 
 |   endpoint_result1.ip_endpoints = {IPEndPoint(IPAddress::IPv4Localhost(), 0)}; | 
 |   endpoint_result1.metadata.supported_protocol_alpns = { | 
 |       quic::QuicVersionLabelToString(quic::CreateQuicVersionLabel(version_))}; | 
 |   HostResolverEndpointResult endpoint_result2; | 
 |   endpoint_result2.ip_endpoints = {IPEndPoint(IPAddress::IPv4Localhost(), 0)}; | 
 |   std::vector<HostResolverEndpointResult> endpoints; | 
 |   endpoints.push_back(endpoint_result1); | 
 |   endpoints.push_back(endpoint_result2); | 
 |   host_resolver_.rules()->AddRule( | 
 |       "mail.example.org", | 
 |       MockHostResolverBase::RuleResolver::RuleResult( | 
 |           std::move(endpoints), | 
 |           /*aliases=*/std::set<std::string>{"mail.example.org"})); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   quic_data.Resume(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |  | 
 |   // Let the transaction proceed which will result in QUIC being marked | 
 |   // as broken and the request falling back to TCP. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |   ASSERT_FALSE(http_data.AllReadDataConsumed()); | 
 |  | 
 |   // Read the response body over TCP. | 
 |   CheckResponseData(&trans, "hello world"); | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 |   ASSERT_TRUE(http_data.AllWriteDataConsumed()); | 
 |   ASSERT_TRUE(http_data.AllReadDataConsumed()); | 
 | } | 
 |  | 
 | // Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC | 
 | // request is reset from, then QUIC will be marked as broken and the request | 
 | // retried over TCP. | 
 | TEST_P(QuicNetworkTransactionTest, ResetAfterHandshakeConfirmedThenBroken) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   // The request will initially go out over QUIC. | 
 |   MockQuicData quic_data(version_); | 
 |   spdy::SpdyPriority priority = | 
 |       ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data.AddWrite(SYNCHRONOUS, | 
 |                        ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       client_maker_->MakeRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, priority, GetRequestHeaders("GET", "https", "/"), 0, nullptr)); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |  | 
 |   quic_data.AddRead(ASYNC, | 
 |                     ConstructServerRstPacket( | 
 |                         1, false, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                         quic::QUIC_HEADERS_TOO_LARGE)); | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker_->MakeAckRstAndDataPacket( | 
 |             packet_num++, true, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             quic::QUIC_HEADERS_TOO_LARGE, 1, 1, GetQpackDecoderStreamId(), | 
 |             false, StreamCancellationQpackDecoderInstruction(0))); | 
 |   } | 
 |  | 
 |   quic_data.AddRead(ASYNC, OK); | 
 |   quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // After that fails, it will be resent via TCP. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "hello world"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Pump the message loop to get the request started. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   quic_data.Resume(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |  | 
 |   // Let the transaction proceed which will result in QUIC being marked | 
 |   // as broken and the request falling back to TCP. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   ASSERT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |   ASSERT_FALSE(http_data.AllReadDataConsumed()); | 
 |  | 
 |   // Read the response body over TCP. | 
 |   CheckResponseData(&trans, "hello world"); | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 |   ASSERT_TRUE(http_data.AllWriteDataConsumed()); | 
 |   ASSERT_TRUE(http_data.AllReadDataConsumed()); | 
 | } | 
 |  | 
 | // Verify that when an origin has two alt-svc advertisements, one local and one | 
 | // remote, that when the local is broken the request will go over QUIC via | 
 | // the remote Alt-Svc. | 
 | // This is a regression test for crbug/825646. | 
 | TEST_P(QuicNetworkTransactionTest, RemoteAltSvcWorkingWhileLocalAltSvcBroken) { | 
 |   context_.params()->allow_remote_alt_svc = true; | 
 |  | 
 |   GURL origin1 = request_.url;  // mail.example.org | 
 |   GURL origin2("https://www.example.org/"); | 
 |   ASSERT_NE(origin1.host(), origin2.host()); | 
 |  | 
 |   scoped_refptr<X509Certificate> cert( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   ASSERT_TRUE(cert->VerifyNameMatch("www.example.org")); | 
 |   ASSERT_TRUE(cert->VerifyNameMatch("mail.example.org")); | 
 |  | 
 |   ProofVerifyDetailsChromium verify_details; | 
 |   verify_details.cert_verify_result.verified_cert = cert; | 
 |   verify_details.cert_verify_result.is_issued_by_known_root = true; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |   MockQuicData mock_quic_data2(version_); | 
 |   mock_quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // Set up alternative service for |origin1|. | 
 |   AlternativeService local_alternative(kProtoQUIC, "mail.example.org", 443); | 
 |   AlternativeService remote_alternative(kProtoQUIC, "www.example.org", 443); | 
 |   base::Time expiration = base::Time::Now() + base::Days(1); | 
 |   AlternativeServiceInfoVector alternative_services; | 
 |   alternative_services.push_back( | 
 |       AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( | 
 |           local_alternative, expiration, | 
 |           context_.params()->supported_versions)); | 
 |   alternative_services.push_back( | 
 |       AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( | 
 |           remote_alternative, expiration, | 
 |           context_.params()->supported_versions)); | 
 |   http_server_properties_->SetAlternativeServices(url::SchemeHostPort(origin1), | 
 |                                                   NetworkAnonymizationKey(), | 
 |                                                   alternative_services); | 
 |  | 
 |   http_server_properties_->MarkAlternativeServiceBroken( | 
 |       local_alternative, NetworkAnonymizationKey()); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | // Verify that when multiple alternatives are broken, | 
 | // ALTERNATE_PROTOCOL_USAGE_BROKEN is only logged once. | 
 | // This is a regression test for crbug/1024613. | 
 | TEST_P(QuicNetworkTransactionTest, BrokenAlternativeOnlyRecordedOnce) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   base::HistogramTester histogram_tester; | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   GURL origin1 = request_.url;  // mail.example.org | 
 |  | 
 |   scoped_refptr<X509Certificate> cert( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   ASSERT_TRUE(cert->VerifyNameMatch("mail.example.org")); | 
 |  | 
 |   ProofVerifyDetailsChromium verify_details; | 
 |   verify_details.cert_verify_result.verified_cert = cert; | 
 |   verify_details.cert_verify_result.is_issued_by_known_root = true; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // Set up alternative service for |origin1|. | 
 |   AlternativeService local_alternative(kProtoQUIC, "mail.example.org", 443); | 
 |   base::Time expiration = base::Time::Now() + base::Days(1); | 
 |   AlternativeServiceInfoVector alternative_services; | 
 |   alternative_services.push_back( | 
 |       AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( | 
 |           local_alternative, expiration, | 
 |           context_.params()->supported_versions)); | 
 |   alternative_services.push_back( | 
 |       AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( | 
 |           local_alternative, expiration, | 
 |           context_.params()->supported_versions)); | 
 |   http_server_properties_->SetAlternativeServices(url::SchemeHostPort(origin1), | 
 |                                                   NetworkAnonymizationKey(), | 
 |                                                   alternative_services); | 
 |  | 
 |   http_server_properties_->MarkAlternativeServiceBroken( | 
 |       local_alternative, NetworkAnonymizationKey()); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |  | 
 |   histogram_tester.ExpectBucketCount("Net.AlternateProtocolUsage", | 
 |                                      ALTERNATE_PROTOCOL_USAGE_BROKEN, 1); | 
 | } | 
 |  | 
 | // Verify that with retry_without_alt_svc_on_quic_errors enabled, if a QUIC | 
 | // request is reset from, then QUIC will be marked as broken and the request | 
 | // retried over TCP. Then, subsequent requests will go over a new TCP | 
 | // connection instead of going back to the broken QUIC connection. | 
 | // This is a regression tests for crbug/731303. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        ResetPooledAfterHandshakeConfirmedThenBroken) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   context_.params()->allow_remote_alt_svc = true; | 
 |  | 
 |   GURL origin1 = request_.url; | 
 |   GURL origin2("https://www.example.org/"); | 
 |   ASSERT_NE(origin1.host(), origin2.host()); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |  | 
 |   scoped_refptr<X509Certificate> cert( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   ASSERT_TRUE(cert->VerifyNameMatch("www.example.org")); | 
 |   ASSERT_TRUE(cert->VerifyNameMatch("mail.example.org")); | 
 |  | 
 |   ProofVerifyDetailsChromium verify_details; | 
 |   verify_details.cert_verify_result.verified_cert = cert; | 
 |   verify_details.cert_verify_result.is_issued_by_known_root = true; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); | 
 |  | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   // First request. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |  | 
 |   // Second request will go over the pooled QUIC connection, but will be | 
 |   // reset by the server. | 
 |   QuicTestPacketMaker client_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin2.host(), quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   QuicTestPacketMaker server_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin2.host(), quic::Perspective::IS_SERVER, false); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           true, GetRequestHeaders("GET", "https", "/", &client_maker2), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerRstPacket( | 
 |                  3, false, GetNthClientInitiatedBidirectionalStreamId(1), | 
 |                  quic::QUIC_HEADERS_TOO_LARGE)); | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker_->MakeAckRstAndDataPacket( | 
 |             packet_num++, /*include_version=*/true, | 
 |             GetNthClientInitiatedBidirectionalStreamId(1), | 
 |             quic::QUIC_HEADERS_TOO_LARGE, 3, 2, GetQpackDecoderStreamId(), | 
 |             /*fin=*/false, StreamCancellationQpackDecoderInstruction(1))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // After that fails, it will be resent via TCP. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: www.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "hello world"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // Then the next request to the second origin will be sent over TCP. | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   // Set up alternative service for |origin1|. | 
 |   base::Time expiration = base::Time::Now() + base::Days(1); | 
 |   AlternativeService alternative1(kProtoQUIC, origin1.host(), 443); | 
 |   http_server_properties_->SetQuicAlternativeService( | 
 |       url::SchemeHostPort(origin1), NetworkAnonymizationKey(), alternative1, | 
 |       expiration, supported_versions_); | 
 |  | 
 |   // Set up alternative service for |origin2|. | 
 |   AlternativeService alternative2(kProtoQUIC, origin2.host(), 443); | 
 |   http_server_properties_->SetQuicAlternativeService( | 
 |       url::SchemeHostPort(origin2), NetworkAnonymizationKey(), alternative2, | 
 |       expiration, supported_versions_); | 
 |  | 
 |   // First request opens connection to |destination1| | 
 |   // with quic::QuicServerId.host() == origin1.host(). | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   // Second request pools to existing connection with same destination, | 
 |   // because certificate matches, even though quic::QuicServerId is different. | 
 |   // After it is reset, it will fail back to TCP and mark QUIC as broken. | 
 |   request_.url = origin2; | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   EXPECT_FALSE(http_server_properties_->IsAlternativeServiceBroken( | 
 |       alternative1, NetworkAnonymizationKey())) | 
 |       << alternative1.ToString(); | 
 |   EXPECT_TRUE(http_server_properties_->IsAlternativeServiceBroken( | 
 |       alternative2, NetworkAnonymizationKey())) | 
 |       << alternative2.ToString(); | 
 |  | 
 |   // The third request should use a new TCP connection, not the broken | 
 |   // QUIC connection. | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        DoNotUseAlternativeServiceQuicUnsupportedVersion) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   std::string altsvc_header = | 
 |       base::StringPrintf("Alt-Svc: quic=\":443\"; v=\"%u\"\r\n\r\n", | 
 |                          version_.transport_version - 1); | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(altsvc_header.c_str()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 | } | 
 |  | 
 | // When multiple alternative services are advertised, HttpStreamFactory should | 
 | // select the alternative service which uses existing QUIC session if available. | 
 | // If no existing QUIC session can be used, use the first alternative service | 
 | // from the list. | 
 | TEST_P(QuicNetworkTransactionTest, UseExistingAlternativeServiceForQuic) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   context_.params()->allow_remote_alt_svc = true; | 
 |   std::string alt_svc_header = base::StrCat( | 
 |       {"Alt-Svc: ", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, "foo.example.org", 443), ",", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, 444), "\r\n\r\n"}); | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // First QUIC request data. | 
 |   // Open a session to foo.example.org:443 using the first entry of the | 
 |   // alternative service list. | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |  | 
 |   std::string alt_svc_list = base::StrCat( | 
 |       {GenerateQuicAltSvcHeaderValue({version_}, "mail.example.org", 444), ",", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, "foo.example.org", 443), ",", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, "bar.example.org", 445)}); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200", alt_svc_list))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |  | 
 |   // Second QUIC request data. | 
 |   // Connection pooling, using existing session, no need to include version | 
 |   // as version negotiation has been completed. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           true, GetRequestHeaders("GET", "https", "/"), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 4, 3)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | // Pool to existing session with matching quic::QuicServerId | 
 | // even if alternative service destination is different. | 
 | TEST_P(QuicNetworkTransactionTest, PoolByOrigin) { | 
 |   context_.params()->allow_remote_alt_svc = true; | 
 |   MockQuicData mock_quic_data(version_); | 
 |  | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   // First request. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |  | 
 |   // Second request. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           true, GetRequestHeaders("GET", "https", "/"), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 4, 3)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   const char destination1[] = "first.example.com"; | 
 |   const char destination2[] = "second.example.com"; | 
 |  | 
 |   // Set up alternative service entry to destination1. | 
 |   url::SchemeHostPort server(request_.url); | 
 |   AlternativeService alternative_service(kProtoQUIC, destination1, 443); | 
 |   base::Time expiration = base::Time::Now() + base::Days(1); | 
 |   http_server_properties_->SetQuicAlternativeService( | 
 |       server, NetworkAnonymizationKey(), alternative_service, expiration, | 
 |       supported_versions_); | 
 |   // First request opens connection to |destination1| | 
 |   // with quic::QuicServerId.host() == kDefaultServerHostName. | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   // Set up alternative service entry to a different destination. | 
 |   alternative_service = AlternativeService(kProtoQUIC, destination2, 443); | 
 |   http_server_properties_->SetQuicAlternativeService( | 
 |       server, NetworkAnonymizationKey(), alternative_service, expiration, | 
 |       supported_versions_); | 
 |   // Second request pools to existing connection with same quic::QuicServerId, | 
 |   // even though alternative service destination is different. | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | // Pool to existing session with matching destination and matching certificate | 
 | // even if origin is different, and even if the alternative service with | 
 | // matching destination is not the first one on the list. | 
 | TEST_P(QuicNetworkTransactionTest, PoolByDestination) { | 
 |   context_.params()->allow_remote_alt_svc = true; | 
 |   GURL origin1 = request_.url; | 
 |   GURL origin2("https://www.example.org/"); | 
 |   ASSERT_NE(origin1.host(), origin2.host()); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |  | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   // First request. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |  | 
 |   // Second request. | 
 |   QuicTestPacketMaker client_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin2.host(), quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   QuicTestPacketMaker server_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin2.host(), quic::Perspective::IS_SERVER, false); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           true, GetRequestHeaders("GET", "https", "/", &client_maker2), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 4, 3)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   const char destination1[] = "first.example.com"; | 
 |   const char destination2[] = "second.example.com"; | 
 |  | 
 |   // Set up alternative service for |origin1|. | 
 |   AlternativeService alternative_service1(kProtoQUIC, destination1, 443); | 
 |   base::Time expiration = base::Time::Now() + base::Days(1); | 
 |   http_server_properties_->SetQuicAlternativeService( | 
 |       url::SchemeHostPort(origin1), NetworkAnonymizationKey(), | 
 |       alternative_service1, expiration, supported_versions_); | 
 |  | 
 |   // Set up multiple alternative service entries for |origin2|, | 
 |   // the first one with a different destination as for |origin1|, | 
 |   // the second one with the same.  The second one should be used, | 
 |   // because the request can be pooled to that one. | 
 |   AlternativeService alternative_service2(kProtoQUIC, destination2, 443); | 
 |   AlternativeServiceInfoVector alternative_services; | 
 |   alternative_services.push_back( | 
 |       AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( | 
 |           alternative_service2, expiration, | 
 |           context_.params()->supported_versions)); | 
 |   alternative_services.push_back( | 
 |       AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( | 
 |           alternative_service1, expiration, | 
 |           context_.params()->supported_versions)); | 
 |   http_server_properties_->SetAlternativeServices(url::SchemeHostPort(origin2), | 
 |                                                   NetworkAnonymizationKey(), | 
 |                                                   alternative_services); | 
 |   // First request opens connection to |destination1| | 
 |   // with quic::QuicServerId.host() == origin1.host(). | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   // Second request pools to existing connection with same destination, | 
 |   // because certificate matches, even though quic::QuicServerId is different. | 
 |   request_.url = origin2; | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | // Multiple origins have listed the same alternative services. When there's a | 
 | // existing QUIC session opened by a request to other origin, | 
 | // if the cert is valid, should select this QUIC session to make the request | 
 | // if this is also the first existing QUIC session. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        UseSharedExistingAlternativeServiceForQuicWithValidCert) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   context_.params()->allow_remote_alt_svc = true; | 
 |   // Default cert is valid for *.example.org | 
 |  | 
 |   // HTTP data for request to www.example.org. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world from www.example.org"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // HTTP data for request to mail.example.org. | 
 |   std::string alt_svc_header2 = base::StrCat( | 
 |       {"Alt-Svc: ", GenerateQuicAltSvcHeaderValue({version_}, 444), ",", | 
 |        GenerateQuicAltSvcHeaderValue({version_}, "www.example.org", 443), | 
 |        "\r\n\r\n"}); | 
 |   MockRead http_reads2[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header2.data()), | 
 |       MockRead("hello world from mail.example.org"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data2(http_reads2, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data2); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   QuicTestPacketMaker client_maker( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), "mail.example.org", quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   server_maker_.set_hostname("www.example.org"); | 
 |   client_maker_->set_hostname("www.example.org"); | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   // First QUIC request data. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello from mail QUIC!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   // Second QUIC request data. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           true, GetRequestHeaders("GET", "https", "/", &client_maker), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(1), false, true, | 
 |                  ConstructDataFrame("hello from mail QUIC!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 4, 3)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   // Send two HTTP requests, responses set up alt-svc lists for the origins. | 
 |   request_.url = GURL("https://www.example.org/"); | 
 |   SendRequestAndExpectHttpResponse("hello world from www.example.org"); | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   SendRequestAndExpectHttpResponse("hello world from mail.example.org"); | 
 |  | 
 |   // Open a QUIC session to mail.example.org:443 when making request | 
 |   // to mail.example.org. | 
 |   request_.url = GURL("https://www.example.org/"); | 
 |   SendRequestAndExpectQuicResponse("hello from mail QUIC!"); | 
 |  | 
 |   // Uses the existing QUIC session when making request to www.example.org. | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   SendRequestAndExpectQuicResponse("hello from mail QUIC!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, AlternativeServiceDifferentPort) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   std::string alt_svc_header = | 
 |       base::StrCat({"Alt-Svc: ", GenerateQuicAltSvcHeaderValue({version_}, 137), | 
 |                     "\r\n\r\n"}); | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |  | 
 |   url::SchemeHostPort http_server("https", kDefaultServerHostName, 443); | 
 |   AlternativeServiceInfoVector alternative_service_info_vector = | 
 |       http_server_properties_->GetAlternativeServiceInfos( | 
 |           http_server, NetworkAnonymizationKey()); | 
 |   ASSERT_EQ(1u, alternative_service_info_vector.size()); | 
 |   const AlternativeService alternative_service = | 
 |       alternative_service_info_vector[0].alternative_service(); | 
 |   EXPECT_EQ(kProtoQUIC, alternative_service.protocol); | 
 |   EXPECT_EQ(kDefaultServerHostName, alternative_service.host); | 
 |   EXPECT_EQ(137, alternative_service.port); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ConfirmAlternativeService) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   AlternativeService alternative_service(kProtoQUIC, | 
 |                                          HostPortPair::FromURL(request_.url)); | 
 |   http_server_properties_->MarkAlternativeServiceRecentlyBroken( | 
 |       alternative_service, NetworkAnonymizationKey()); | 
 |   EXPECT_TRUE(http_server_properties_->WasAlternativeServiceRecentlyBroken( | 
 |       alternative_service, NetworkAnonymizationKey())); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   mock_quic_data.Resume(); | 
 |  | 
 |   EXPECT_FALSE(http_server_properties_->WasAlternativeServiceRecentlyBroken( | 
 |       alternative_service, NetworkAnonymizationKey())); | 
 |   EXPECT_NE(nullptr, http_server_properties_->GetServerNetworkStats( | 
 |                          url::SchemeHostPort("https", request_.url.host(), 443), | 
 |                          NetworkAnonymizationKey())); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        ConfirmAlternativeServiceWithNetworkIsolationKey) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   const SchemefulSite kSite1(GURL("https://foo.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey1(kSite1, kSite1); | 
 |   const SchemefulSite kSite2(GURL("https://bar.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey2(kSite2, kSite2); | 
 |  | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitWithFeatures( | 
 |       // enabled_features | 
 |       {features::kPartitionHttpServerPropertiesByNetworkIsolationKey, | 
 |        features::kPartitionConnectionsByNetworkIsolationKey}, | 
 |       // disabled_features | 
 |       {}); | 
 |   // Since HttpServerProperties caches the feature value, have to create a new | 
 |   // one. | 
 |   http_server_properties_ = std::make_unique<HttpServerProperties>(); | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AlternativeService alternative_service(kProtoQUIC, | 
 |                                          HostPortPair::FromURL(request_.url)); | 
 |   http_server_properties_->MarkAlternativeServiceRecentlyBroken( | 
 |       alternative_service, kNetworkAnonymizationKey1); | 
 |   http_server_properties_->MarkAlternativeServiceRecentlyBroken( | 
 |       alternative_service, kNetworkAnonymizationKey2); | 
 |   EXPECT_TRUE(http_server_properties_->WasAlternativeServiceRecentlyBroken( | 
 |       alternative_service, kNetworkAnonymizationKey1)); | 
 |   EXPECT_TRUE(http_server_properties_->WasAlternativeServiceRecentlyBroken( | 
 |       alternative_service, kNetworkAnonymizationKey2)); | 
 |  | 
 |   request_.network_isolation_key = kNetworkIsolationKey1; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey1; | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   mock_quic_data.Resume(); | 
 |  | 
 |   EXPECT_FALSE(http_server_properties_->WasAlternativeServiceRecentlyBroken( | 
 |       alternative_service, kNetworkAnonymizationKey1)); | 
 |   EXPECT_NE(nullptr, http_server_properties_->GetServerNetworkStats( | 
 |                          url::SchemeHostPort("https", request_.url.host(), 443), | 
 |                          kNetworkAnonymizationKey1)); | 
 |   EXPECT_TRUE(http_server_properties_->WasAlternativeServiceRecentlyBroken( | 
 |       alternative_service, kNetworkAnonymizationKey2)); | 
 |   EXPECT_EQ(nullptr, http_server_properties_->GetServerNetworkStats( | 
 |                          url::SchemeHostPort("https", request_.url.host(), 443), | 
 |                          kNetworkAnonymizationKey2)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, UseAlternativeServiceForQuicForHttps) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, 0);  // EOF | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   // TODO(rtenneti): Test QUIC over HTTPS, GetSSLInfo(). | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, HungAlternativeService) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   crypto_client_stream_factory_.set_handshake_mode( | 
 |       MockCryptoClientStream::COLD_START); | 
 |  | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET / HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "hello world"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |  | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // The QUIC transaction will not be allowed to complete. | 
 |   MockWrite quic_writes[] = {MockWrite(SYNCHRONOUS, ERR_IO_PENDING, 1)}; | 
 |   MockRead quic_reads[] = { | 
 |       MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0), | 
 |   }; | 
 |   SequencedSocketData quic_data(quic_reads, quic_writes); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data); | 
 |  | 
 |   // The HTTP transaction will complete. | 
 |   SequencedSocketData http_data2(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data2); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // Run the first request. | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   ASSERT_TRUE(http_data.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(http_data.AllWriteDataConsumed()); | 
 |  | 
 |   // Now run the second request in which the QUIC socket hangs, | 
 |   // and verify the the transaction continues over HTTP. | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   ASSERT_TRUE(http_data2.AllReadDataConsumed()); | 
 |   ASSERT_TRUE(http_data2.AllWriteDataConsumed()); | 
 |   ASSERT_TRUE(quic_data.AllReadDataConsumed()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithHttpRace) { | 
 |   MockQuicData mock_quic_data(version_); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   EXPECT_THAT(trans.Start(&request_, callback.callback(), net_log_with_source_), | 
 |               IsError(ERR_IO_PENDING)); | 
 |   // Complete host resolution in next message loop so that QUIC job could | 
 |   // proceed. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   ASSERT_FALSE(mock_quic_data.AllReadDataConsumed()); | 
 |   mock_quic_data.Resume(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   CheckWasQuicResponse(&trans); | 
 |   CheckResponseData(&trans, "hello!"); | 
 |  | 
 |   EXPECT_EQ(nullptr, http_server_properties_->GetServerNetworkStats( | 
 |                          url::SchemeHostPort("https", request_.url.host(), 443), | 
 |                          NetworkAnonymizationKey())); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithNoHttpRace) { | 
 |   MockQuicData mock_quic_data(version_); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_number = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, client_maker_->MakeInitialSettingsPacket(packet_number++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_number++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   EXPECT_THAT(trans.Start(&request_, callback.callback(), net_log_with_source_), | 
 |               IsError(ERR_IO_PENDING)); | 
 |   // Complete host resolution in next message loop so that QUIC job could | 
 |   // proceed. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   ASSERT_FALSE(mock_quic_data.AllReadDataConsumed()); | 
 |   mock_quic_data.Resume(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   CheckWasQuicResponse(&trans); | 
 |   CheckResponseData(&trans, "hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithProxy) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   // Since we are using a proxy, the QUIC job will not succeed. | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, "GET http://mail.example.org/ HTTP/1.1\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 1, "Host: mail.example.org\r\n"), | 
 |       MockWrite(SYNCHRONOUS, 2, "Proxy-Connection: keep-alive\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, 3, "HTTP/1.1 200 OK\r\n"), | 
 |                            MockRead(SYNCHRONOUS, 4, alt_svc_header_.data()), | 
 |                            MockRead(SYNCHRONOUS, 5, "hello world"), | 
 |                            MockRead(SYNCHRONOUS, OK, 6)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   request_.url = GURL("http://mail.example.org/"); | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithConfirmationRequired) { | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   CheckWasQuicResponse(&trans); | 
 |   CheckResponseData(&trans, "hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithTooEarlyResponse) { | 
 |   uint64_t packet_number = 1; | 
 |   MockQuicData mock_quic_data(version_); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, client_maker_->MakeInitialSettingsPacket(packet_number++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("425"))); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientAckAndDataPacket( | 
 |             packet_number++, false, GetQpackDecoderStreamId(), 1, 1, false, | 
 |             StreamCancellationQpackDecoderInstruction(0))); | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             client_maker_->MakeRstPacket( | 
 |                                 packet_number++, false, | 
 |                                 GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                                 quic::QUIC_STREAM_CANCELLED)); | 
 |   } else { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientAckAndRstPacket( | 
 |             packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             quic::QUIC_STREAM_CANCELLED, 1, 1)); | 
 |   } | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_number++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           true, GetRequestHeaders("GET", "https", "/"), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  3, GetNthClientInitiatedBidirectionalStreamId(1), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_number++, 3, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Confirm the handshake after the 425 Too Early. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // The handshake hasn't been confirmed yet, so the retry should not have | 
 |   // succeeded. | 
 |   EXPECT_FALSE(callback.have_result()); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   CheckWasQuicResponse(&trans); | 
 |   CheckResponseData(&trans, "hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ZeroRTTWithMultipleTooEarlyResponse) { | 
 |   uint64_t packet_number = 1; | 
 |   MockQuicData mock_quic_data(version_); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, client_maker_->MakeInitialSettingsPacket(packet_number++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("425"))); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientAckAndDataPacket( | 
 |             packet_number++, false, GetQpackDecoderStreamId(), 1, 1, false, | 
 |             StreamCancellationQpackDecoderInstruction(0))); | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             client_maker_->MakeRstPacket( | 
 |                                 packet_number++, false, | 
 |                                 GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                                 quic::QUIC_STREAM_CANCELLED)); | 
 |   } else { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientAckAndRstPacket( | 
 |             packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             quic::QUIC_STREAM_CANCELLED, 1, 1)); | 
 |   } | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_number++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           true, GetRequestHeaders("GET", "https", "/"), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("425"))); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientAckAndDataPacket( | 
 |             packet_number++, false, GetQpackDecoderStreamId(), 2, 1, false, | 
 |             StreamCancellationQpackDecoderInstruction(1, false))); | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             client_maker_->MakeRstPacket( | 
 |                                 packet_number++, false, | 
 |                                 GetNthClientInitiatedBidirectionalStreamId(1), | 
 |                                 quic::QUIC_STREAM_CANCELLED)); | 
 |   } else { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientAckAndRstPacket( | 
 |             packet_number++, GetNthClientInitiatedBidirectionalStreamId(1), | 
 |             quic::QUIC_STREAM_CANCELLED, 2, 1)); | 
 |   } | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner_.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Confirm the handshake after the 425 Too Early. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // The handshake hasn't been confirmed yet, so the retry should not have | 
 |   // succeeded. | 
 |   EXPECT_FALSE(callback.have_result()); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |   const HttpResponseInfo* response = trans.GetResponseInfo(); | 
 |   ASSERT_TRUE(response != nullptr); | 
 |   ASSERT_TRUE(response->headers.get() != nullptr); | 
 |   EXPECT_EQ("HTTP/1.1 425", response->headers->GetStatusLine()); | 
 |   EXPECT_TRUE(response->was_fetched_via_spdy); | 
 |   EXPECT_TRUE(response->was_alpn_negotiated); | 
 |   EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_), | 
 |             response->connection_info); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        LogGranularQuicErrorCodeOnQuicProtocolErrorLocal) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   // Read a close connection packet with | 
 |   // quic::QuicErrorCode: quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED from the peer. | 
 |   mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1)); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |  | 
 |   NetErrorDetails details; | 
 |   EXPECT_EQ(quic::QUIC_NO_ERROR, details.quic_connection_error); | 
 |  | 
 |   trans.PopulateNetErrorDetails(&details); | 
 |   // Verify the error code logged is what sent by the peer. | 
 |   EXPECT_EQ(quic::QUIC_CRYPTO_VERSION_NOT_SUPPORTED, | 
 |             details.quic_connection_error); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        LogGranularQuicErrorCodeOnQuicProtocolErrorRemote) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   // Peer sending data from an non-existing stream causes this end to raise | 
 |   // error and close connection. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerRstPacket( | 
 |                  1, false, GetNthClientInitiatedBidirectionalStreamId(47), | 
 |                  quic::QUIC_STREAM_LAST_ERROR)); | 
 |   std::string quic_error_details = "Data for nonexistent stream"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndConnectionClosePacket( | 
 |           packet_num++, 1, 1, | 
 |           version_.HasIetfQuicFrames() ? quic::QUIC_HTTP_STREAM_WRONG_DIRECTION | 
 |                                        : quic::QUIC_INVALID_STREAM_ID, | 
 |           quic_error_details, | 
 |           version_.HasIetfQuicFrames() ? quic::IETF_STOP_SENDING | 
 |                                        : quic::IETF_RST_STREAM)); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |   NetErrorDetails details; | 
 |   EXPECT_EQ(quic::QUIC_NO_ERROR, details.quic_connection_error); | 
 |  | 
 |   trans.PopulateNetErrorDetails(&details); | 
 |   EXPECT_EQ(version_.HasIetfQuicFrames() | 
 |                 ? quic::QUIC_HTTP_STREAM_WRONG_DIRECTION | 
 |                 : quic::QUIC_INVALID_STREAM_ID, | 
 |             details.quic_connection_error); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, RstStreamErrorHandling) { | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   // Read the response headers, then a RST_STREAM frame. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerRstPacket( | 
 |                  2, false, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  quic::QUIC_STREAM_CANCELLED)); | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker_->MakeAckRstAndDataPacket( | 
 |             packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             quic::QUIC_STREAM_CANCELLED, 2, 1, GetQpackDecoderStreamId(), false, | 
 |             StreamCancellationQpackDecoderInstruction(0))); | 
 |   } else { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   } | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more read data. | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   // Read the headers. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   const HttpResponseInfo* response = trans.GetResponseInfo(); | 
 |   ASSERT_TRUE(response != nullptr); | 
 |   ASSERT_TRUE(response->headers.get() != nullptr); | 
 |   EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); | 
 |   EXPECT_TRUE(response->was_fetched_via_spdy); | 
 |   EXPECT_TRUE(response->was_alpn_negotiated); | 
 |   EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_), | 
 |             response->connection_info); | 
 |  | 
 |   std::string response_data; | 
 |   ASSERT_EQ(ERR_QUIC_PROTOCOL_ERROR, ReadTransaction(&trans, &response_data)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, RstStreamBeforeHeaders) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerRstPacket( | 
 |                  1, false, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  quic::QUIC_STREAM_CANCELLED)); | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker_->MakeAckRstAndDataPacket( | 
 |             packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             quic::QUIC_STREAM_CANCELLED, 1, 1, GetQpackDecoderStreamId(), false, | 
 |             StreamCancellationQpackDecoderInstruction(0))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more read data. | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   // Read the headers. | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocol) { | 
 |   // Alternate-protocol job | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> close( | 
 |       ConstructServerConnectionClosePacket(1)); | 
 |   MockRead quic_reads[] = { | 
 |       MockRead(ASYNC, close->data(), close->length()), | 
 |       MockRead(ASYNC, ERR_IO_PENDING),  // No more data to read | 
 |       MockRead(ASYNC, OK),              // EOF | 
 |   }; | 
 |   StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data); | 
 |  | 
 |   // Main job which will succeed even though the alternate job fails. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); | 
 |   SendRequestAndExpectHttpResponse("hello from http"); | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        BrokenAlternateProtocolWithNetworkIsolationKey) { | 
 |   const SchemefulSite kSite1(GURL("https://foo.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey1(kSite1, kSite1); | 
 |   const SchemefulSite kSite2(GURL("https://bar.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey2(kSite2, kSite2); | 
 |  | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitWithFeatures( | 
 |       // enabled_features | 
 |       {features::kPartitionHttpServerPropertiesByNetworkIsolationKey, | 
 |        features::kPartitionConnectionsByNetworkIsolationKey}, | 
 |       // disabled_features | 
 |       {}); | 
 |   // Since HttpServerProperties caches the feature value, have to create a new | 
 |   // one. | 
 |   http_server_properties_ = std::make_unique<HttpServerProperties>(); | 
 |  | 
 |   // Alternate-protocol job | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> close( | 
 |       ConstructServerConnectionClosePacket(1)); | 
 |   MockRead quic_reads[] = { | 
 |       MockRead(ASYNC, close->data(), close->length()), | 
 |       MockRead(ASYNC, ERR_IO_PENDING),  // No more data to read | 
 |       MockRead(ASYNC, OK),              // EOF | 
 |   }; | 
 |   StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data); | 
 |  | 
 |   // Main job which will succeed even though the alternate job fails. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT, | 
 |       kNetworkAnonymizationKey1); | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT, | 
 |       kNetworkAnonymizationKey2); | 
 |   request_.network_isolation_key = kNetworkIsolationKey1; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey1; | 
 |   SendRequestAndExpectHttpResponse("hello from http"); | 
 |  | 
 |   ExpectBrokenAlternateProtocolMapping(kNetworkAnonymizationKey1); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey2); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocolReadError) { | 
 |   // Alternate-protocol job | 
 |   MockRead quic_reads[] = { | 
 |       MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), | 
 |   }; | 
 |   StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data); | 
 |  | 
 |   // Main job which will succeed even though the alternate job fails. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); | 
 |   SendRequestAndExpectHttpResponse("hello from http"); | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, NoBrokenAlternateProtocolIfTcpFails) { | 
 |   // Alternate-protocol job will fail when the session attempts to read. | 
 |   MockRead quic_reads[] = { | 
 |       MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), | 
 |   }; | 
 |   StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data); | 
 |  | 
 |   // Main job will also fail. | 
 |   MockRead http_reads[] = { | 
 |       MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), | 
 |   }; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   http_data.set_connect_data(MockConnect(ASYNC, ERR_SOCKET_NOT_CONNECTED)); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_SOCKET_NOT_CONNECTED)); | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, DelayTCPOnStartWithQuicSupportOnSameIP) { | 
 |   // Tests that TCP job is delayed and QUIC job does not require confirmation | 
 |   // if QUIC was recently supported on the same IP on start. | 
 |  | 
 |   // Set QUIC support on the last IP address, which is same with the local IP | 
 |   // address. Require confirmation mode will be turned off immediately when | 
 |   // local IP address is sorted out after we configure the UDP socket. | 
 |   http_server_properties_->SetLastLocalAddressWhenQuicWorked( | 
 |       IPAddress(192, 0, 2, 33)); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   int packet_number = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_number++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Pause. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_number++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |   // No HTTP data is mocked as TCP job never starts in this case. | 
 |  | 
 |   CreateSession(); | 
 |   // QuicStreamFactory by default requires confirmation on construction. | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   // Stall host resolution so that QUIC job will not succeed synchronously. | 
 |   // Socket will not be configured immediately and QUIC support is not sorted | 
 |   // out, TCP job will still be delayed as server properties indicates QUIC | 
 |   // support on last IP address. | 
 |   host_resolver_.set_synchronous_mode(false); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   EXPECT_THAT(trans.Start(&request_, callback.callback(), net_log_with_source_), | 
 |               IsError(ERR_IO_PENDING)); | 
 |   // Complete host resolution in next message loop so that QUIC job could | 
 |   // proceed. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |  | 
 |   ASSERT_FALSE(mock_quic_data.AllReadDataConsumed()); | 
 |   mock_quic_data.Resume(); | 
 |  | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   CheckWasQuicResponse(&trans); | 
 |   CheckResponseData(&trans, "hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        DelayTCPOnStartWithQuicSupportOnDifferentIP) { | 
 |   // Tests that TCP job is delayed and QUIC job requires confirmation if QUIC | 
 |   // was recently supported on a different IP address on start. | 
 |  | 
 |   // Set QUIC support on the last IP address, which is different with the local | 
 |   // IP address. Require confirmation mode will remain when local IP address is | 
 |   // sorted out after we configure the UDP socket. | 
 |   http_server_properties_->SetLastLocalAddressWhenQuicWorked( | 
 |       IPAddress(1, 2, 3, 4)); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_ZERO_RTT); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |   // No HTTP data is mocked as TCP job will be delayed and never starts. | 
 |  | 
 |   CreateSession(); | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   // Stall host resolution so that QUIC job could not proceed and unblocks TCP. | 
 |   // Socket will not be configured immediately and QUIC support is not sorted | 
 |   // out, TCP job will still be delayed as server properties indicates QUIC | 
 |   // support on last IP address. | 
 |   host_resolver_.set_synchronous_mode(false); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   EXPECT_THAT(trans.Start(&request_, callback.callback(), net_log_with_source_), | 
 |               IsError(ERR_IO_PENDING)); | 
 |  | 
 |   // Complete host resolution in next message loop so that QUIC job could | 
 |   // proceed. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Explicitly confirm the handshake so that QUIC job could succeed. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsOk()); | 
 |  | 
 |   CheckWasQuicResponse(&trans); | 
 |   CheckResponseData(&trans, "hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, NetErrorDetailsSetBeforeHandshake) { | 
 |   // Test that NetErrorDetails is correctly populated, even if the | 
 |   // handshake has not yet been confirmed and no stream has been created. | 
 |  | 
 |   // QUIC job will pause. When resumed, it will fail. | 
 |   MockQuicData mock_quic_data(version_); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Main job will also fail. | 
 |   MockRead http_reads[] = { | 
 |       MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), | 
 |   }; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   http_data.set_connect_data(MockConnect(ASYNC, ERR_SOCKET_NOT_CONNECTED)); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   // Require handshake confirmation to ensure that no QUIC streams are | 
 |   // created, and to ensure that the TCP job does not wait for the QUIC | 
 |   // job to fail before it starts. | 
 |   session_->quic_stream_factory()->set_is_quic_known_to_work_on_current_network( | 
 |       false); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   // Allow the TCP job to fail. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Now let the QUIC job fail. | 
 |   mock_quic_data.Resume(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |   ExpectQuicAlternateProtocolMapping(); | 
 |   NetErrorDetails details; | 
 |   trans.PopulateNetErrorDetails(&details); | 
 |   EXPECT_EQ(quic::QUIC_PACKET_READ_ERROR, details.quic_connection_error); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, FailedZeroRttBrokenAlternateProtocol) { | 
 |   // Alternate-protocol job | 
 |   MockRead quic_reads[] = { | 
 |       MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), | 
 |   }; | 
 |   StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data); | 
 |  | 
 |   // Second Alternate-protocol job which will race with the TCP job. | 
 |   StaticSocketDataProvider quic_data2(quic_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data2); | 
 |  | 
 |   // Final job that will proceed when the QUIC job fails. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello from http"); | 
 |  | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 |  | 
 |   EXPECT_TRUE(quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        FailedZeroRttBrokenAlternateProtocolWithNetworkIsolationKey) { | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitWithFeatures( | 
 |       // enabled_features | 
 |       {features::kPartitionHttpServerPropertiesByNetworkIsolationKey, | 
 |        features::kPartitionConnectionsByNetworkIsolationKey}, | 
 |       // disabled_features | 
 |       {}); | 
 |   // Since HttpServerProperties caches the feature value, have to create a new | 
 |   // one. | 
 |   http_server_properties_ = std::make_unique<HttpServerProperties>(); | 
 |  | 
 |   const SchemefulSite kSite1(GURL("https://foo.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey1(kSite1, kSite1); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey1(kSite1, kSite1); | 
 |   const SchemefulSite kSite2(GURL("https://bar.test/")); | 
 |   const net::NetworkIsolationKey kNetworkIsolationKey2(kSite2, kSite2); | 
 |   const net::NetworkAnonymizationKey kNetworkAnonymizationKey2(kSite2, kSite2); | 
 |  | 
 |   // Alternate-protocol job | 
 |   MockRead quic_reads[] = { | 
 |       MockRead(ASYNC, ERR_SOCKET_NOT_CONNECTED), | 
 |   }; | 
 |   StaticSocketDataProvider quic_data(quic_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data); | 
 |  | 
 |   // Second Alternate-protocol job which will race with the TCP job. | 
 |   StaticSocketDataProvider quic_data2(quic_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data2); | 
 |  | 
 |   // Final job that will proceed when the QUIC job fails. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT, | 
 |                                   kNetworkAnonymizationKey1); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::ZERO_RTT, | 
 |                                   kNetworkAnonymizationKey2); | 
 |  | 
 |   request_.network_isolation_key = kNetworkIsolationKey1; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey1; | 
 |   SendRequestAndExpectHttpResponse("hello from http"); | 
 |   EXPECT_TRUE(quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   ExpectBrokenAlternateProtocolMapping(kNetworkAnonymizationKey1); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey2); | 
 |  | 
 |   // Subsequent requests using kNetworkIsolationKey1 should not use QUIC. | 
 |   AddHttpDataAndRunRequest(); | 
 |   // Requests using other NetworkIsolationKeys can still use QUIC. | 
 |   request_.network_isolation_key = kNetworkIsolationKey2; | 
 |   request_.network_anonymization_key = kNetworkAnonymizationKey2; | 
 |  | 
 |   AddQuicDataAndRunRequest(); | 
 |  | 
 |   // The last two requests should not have changed the alternative service | 
 |   // mappings. | 
 |   ExpectBrokenAlternateProtocolMapping(kNetworkAnonymizationKey1); | 
 |   ExpectQuicAlternateProtocolMapping(kNetworkAnonymizationKey2); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, BrokenAlternateProtocolOnConnectFailure) { | 
 |   // Alternate-protocol job will fail before creating a QUIC session. | 
 |   StaticSocketDataProvider quic_data; | 
 |   quic_data.set_connect_data(MockConnect(SYNCHRONOUS, ERR_CONNECTION_FAILED)); | 
 |   socket_factory_.AddSocketDataProvider(&quic_data); | 
 |  | 
 |   // Main job which will succeed even though the alternate job fails. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello from http"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::COLD_START); | 
 |   SendRequestAndExpectHttpResponse("hello from http"); | 
 |  | 
 |   ExpectBrokenAlternateProtocolMapping(); | 
 | } | 
 |  | 
 | // TODO(crbug.com/1347664): This test is failing on various platforms. | 
 | TEST_P(QuicNetworkTransactionTest, DISABLED_ConnectionCloseDuringConnect) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   MockQuicData mock_quic_data(version_); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeDummyCHLOPacket(1)); | 
 |   mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1)); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // When the QUIC connection fails, we will try the request again over HTTP. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   // TODO(rch): Check if we need a 0RTT version of ConnectionCloseDuringConnect | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, ConnectionCloseDuringConnectProxy) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   MockQuicData mock_quic_data(version_); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, client_maker_->MakeDummyCHLOPacket(1)); | 
 |   mock_quic_data.AddRead(ASYNC, ConstructServerConnectionClosePacket(1)); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, ConstructClientRequestHeadersPacket( | 
 |                        1, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |                        true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, ConstructClientAckPacket(2, 1, 1)); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // When the QUIC connection fails, we will try the request again over HTTP. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   TestProxyDelegate test_proxy_delegate; | 
 |   const HostPortPair host_port_pair("myproxy.org", 443); | 
 |  | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC myproxy.org:443; HTTPS myproxy.org:443", | 
 |           TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |   proxy_resolution_service_->SetProxyDelegate(&test_proxy_delegate); | 
 |   request_.url = GURL("http://mail.example.org/"); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("myproxy.org", "192.168.0.1", ""); | 
 |  | 
 |   CreateSession(); | 
 |   crypto_client_stream_factory_.set_handshake_mode( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); | 
 |   SendRequestAndExpectHttpResponseFromProxy("hello world", true, 443); | 
 |   EXPECT_THAT(session_->proxy_resolution_service()->proxy_retry_info(), | 
 |               ElementsAre(Key("quic://myproxy.org:443"))); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, SecureResourceOverSecureQuic) { | 
 |   client_maker_->set_hostname("www.example.org"); | 
 |   EXPECT_FALSE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more read data. | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   request_.url = GURL("https://www.example.org:443"); | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |   EXPECT_TRUE( | 
 |       test_socket_performance_watcher_factory_.rtt_notification_received()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, QuicUpload) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   if (!VersionUsesHttp3(version_.transport_version)) | 
 |     mock_quic_data.AddRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED); | 
 |   else | 
 |     mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, ERR_FAILED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   /*MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0)}; | 
 |   //MockWrite writes[] = {MockWrite(SYNCHRONOUS, ERR_FAILED, 1)}; | 
 |   MockWrite writes[] = {}; | 
 |   SequencedSocketData socket_data(reads, writes); | 
 |   socket_factory_.AddSocketDataProvider(&socket_data);*/ | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |   request_.method = "POST"; | 
 |   ChunkedUploadDataStream upload_data(0); | 
 |   upload_data.AppendData("1", 1, true); | 
 |  | 
 |   request_.upload_data_stream = &upload_data; | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   EXPECT_NE(OK, callback.WaitForResult()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, QuicUploadWriteError) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   ScopedMockNetworkChangeNotifier network_change_notifier; | 
 |   MockNetworkChangeNotifier* mock_ncn = | 
 |       network_change_notifier.mock_network_change_notifier(); | 
 |   mock_ncn->ForceNetworkHandlesSupported(); | 
 |   mock_ncn->SetConnectedNetworksList( | 
 |       {kDefaultNetworkForTests, kNewNetworkForTests}); | 
 |  | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |   context_.params()->migrate_sessions_on_network_change_v2 = true; | 
 |  | 
 |   MockQuicData socket_data(version_); | 
 |   socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     socket_data.AddWrite(SYNCHRONOUS, | 
 |                          ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   socket_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, GetRequestHeaders("POST", "https", "/"))); | 
 |   socket_data.AddWrite(SYNCHRONOUS, ERR_FAILED); | 
 |   socket_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   MockQuicData socket_data2(version_); | 
 |   socket_data2.AddConnect(SYNCHRONOUS, ERR_ADDRESS_INVALID); | 
 |   socket_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |   request_.method = "POST"; | 
 |   ChunkedUploadDataStream upload_data(0); | 
 |  | 
 |   request_.upload_data_stream = &upload_data; | 
 |  | 
 |   auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, | 
 |                                                         session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans->Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   upload_data.AppendData("1", 1, true); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   EXPECT_NE(OK, callback.WaitForResult()); | 
 |   trans.reset(); | 
 |   session_.reset(); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, RetryAfterAsyncNoBufferSpace) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData socket_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     socket_data.AddWrite(SYNCHRONOUS, | 
 |                          ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE); | 
 |   socket_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   socket_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   socket_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   socket_data.AddWrite(SYNCHRONOUS, | 
 |                        ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   socket_data.AddWrite(SYNCHRONOUS, | 
 |                        client_maker_->MakeAckAndConnectionClosePacket( | 
 |                            packet_num++, false, 2, 1, | 
 |                            quic::QUIC_CONNECTION_CANCELLED, "net error", 0)); | 
 |  | 
 |   socket_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |   session_.reset(); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, RetryAfterSynchronousNoBufferSpace) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData socket_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     socket_data.AddWrite(SYNCHRONOUS, | 
 |                          ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   socket_data.AddWrite(SYNCHRONOUS, ERR_NO_BUFFER_SPACE); | 
 |   socket_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   socket_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   socket_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   socket_data.AddWrite(SYNCHRONOUS, | 
 |                        ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   socket_data.AddWrite(SYNCHRONOUS, | 
 |                        client_maker_->MakeAckAndConnectionClosePacket( | 
 |                            packet_num++, false, 2, 1, | 
 |                            quic::QUIC_CONNECTION_CANCELLED, "net error", 0)); | 
 |  | 
 |   socket_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |   session_.reset(); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, MaxRetriesAfterAsyncNoBufferSpace) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData socket_data(version_); | 
 |   socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   if (VersionUsesHttp3(version_.transport_version)) | 
 |     socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1)); | 
 |   for (int i = 0; i < 13; ++i) {  // 12 retries then one final failure. | 
 |     socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE); | 
 |   } | 
 |   socket_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |   // Use a TestTaskRunner to avoid waiting in real time for timeouts. | 
 |   QuicStreamFactoryPeer::SetTaskRunner(session_->quic_stream_factory(), | 
 |                                        quic_task_runner_.get()); | 
 |  | 
 |   quic::QuicTime start = context_.clock()->Now(); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   while (!callback.have_result()) { | 
 |     base::RunLoop().RunUntilIdle(); | 
 |     quic_task_runner_->RunUntilIdle(); | 
 |   } | 
 |   ASSERT_TRUE(callback.have_result()); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |   EXPECT_TRUE(socket_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | 
 |   // Backoff should take between 4 - 5 seconds. | 
 |   EXPECT_TRUE(context_.clock()->Now() - start > | 
 |               quic::QuicTime::Delta::FromSeconds(4)); | 
 |   EXPECT_TRUE(context_.clock()->Now() - start < | 
 |               quic::QuicTime::Delta::FromSeconds(5)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, MaxRetriesAfterSynchronousNoBufferSpace) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData socket_data(version_); | 
 |   socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   if (VersionUsesHttp3(version_.transport_version)) | 
 |     socket_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket(1)); | 
 |   for (int i = 0; i < 13; ++i) {  // 12 retries then one final failure. | 
 |     socket_data.AddWrite(ASYNC, ERR_NO_BUFFER_SPACE); | 
 |   } | 
 |   socket_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |   // Use a TestTaskRunner to avoid waiting in real time for timeouts. | 
 |   QuicStreamFactoryPeer::SetTaskRunner(session_->quic_stream_factory(), | 
 |                                        quic_task_runner_.get()); | 
 |  | 
 |   quic::QuicTime start = context_.clock()->Now(); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   while (!callback.have_result()) { | 
 |     base::RunLoop().RunUntilIdle(); | 
 |     quic_task_runner_->RunUntilIdle(); | 
 |   } | 
 |   ASSERT_TRUE(callback.have_result()); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |   EXPECT_TRUE(socket_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | 
 |   // Backoff should take between 4 - 5 seconds. | 
 |   EXPECT_TRUE(context_.clock()->Now() - start > | 
 |               quic::QuicTime::Delta::FromSeconds(4)); | 
 |   EXPECT_TRUE(context_.clock()->Now() - start < | 
 |               quic::QuicTime::Delta::FromSeconds(5)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, NoMigrationForMsgTooBig) { | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |   const std::string error_details = base::StrCat( | 
 |       {"Write failed with error: ", base::NumberToString(ERR_MSG_TOO_BIG), " (", | 
 |        strerror(ERR_MSG_TOO_BIG), ")"}); | 
 |  | 
 |   MockQuicData socket_data(version_); | 
 |   socket_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     socket_data.AddWrite(SYNCHRONOUS, | 
 |                          ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   socket_data.AddWrite(SYNCHRONOUS, ERR_MSG_TOO_BIG); | 
 |   // Connection close packet will be sent for MSG_TOO_BIG. | 
 |   socket_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       client_maker_->MakeConnectionClosePacket( | 
 |           packet_num + 1, true, quic::QUIC_PACKET_WRITE_ERROR, error_details)); | 
 |   socket_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   ASSERT_TRUE(callback.have_result()); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |   EXPECT_TRUE(socket_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Adds coverage to catch regression such as https://crbug.com/622043 | 
 | TEST_P(QuicNetworkTransactionTest, QuicServerPush) { | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     return; | 
 |   } | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   uint64_t client_packet_number = 1; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerPushPromisePacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  GetRequestHeaders("GET", "https", "/pushed.jpg"))); | 
 |   const bool should_send_priority_packet = | 
 |       client_headers_include_h2_stream_dependency_ && | 
 |       !VersionUsesHttp3(version_.transport_version); | 
 |   if (should_send_priority_packet) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientAckAndPriorityPacket( | 
 |               client_packet_number++, false, | 
 |               /*largest_received=*/1, /*smallest_received=*/1, | 
 |               GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |               GetNthClientInitiatedBidirectionalStreamId(0), DEFAULT_PRIORITY)); | 
 |   } | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   if (!should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1)); | 
 |   } | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  false, GetResponseHeaders("200"))); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 3, 1)); | 
 |   } | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   if (!should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 4, 3)); | 
 |   } | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  5, GetNthServerInitiatedUnidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("and hello!"))); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 5, 3)); | 
 |   } | 
 |   if (!VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructClientAckAndRstPacket( | 
 |                                 client_packet_number++, | 
 |                                 GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |                                 quic::QUIC_RST_ACKNOWLEDGEMENT, 5, 5)); | 
 |   } else { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, client_maker_->MakeAckAndPriorityUpdatePacket( | 
 |                          client_packet_number++, true, 5, 5, 3, | 
 |                          GetNthServerInitiatedUnidirectionalStreamId(0))); | 
 |   } | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // PUSH_PROMISE handling in the http layer gets exercised here. | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/pushed.jpg"); | 
 |   SendRequestAndExpectQuicResponse("and hello!"); | 
 |  | 
 |   // Check that the NetLog was filled reasonably. | 
 |   auto entries = net_log_observer_.GetEntries(); | 
 |   EXPECT_LT(0u, entries.size()); | 
 |  | 
 |   // Check that we logged a QUIC_HTTP_STREAM_ADOPTED_PUSH_STREAM | 
 |   int pos = ExpectLogContainsSomewhere( | 
 |       entries, 0, NetLogEventType::QUIC_HTTP_STREAM_ADOPTED_PUSH_STREAM, | 
 |       NetLogEventPhase::NONE); | 
 |   EXPECT_LT(0, pos); | 
 | } | 
 |  | 
 | // Checks that if the same resource is pushed using two different | 
 | // NetworkIsolationKeys, both pushed resources are tracked independently, and | 
 | // NetworkIsolationKeys are respected. | 
 | TEST_P(QuicNetworkTransactionTest, QuicServerPushRespectsNetworkIsolationKey) { | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     return; | 
 |   } | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitAndEnableFeature( | 
 |       features::kPartitionConnectionsByNetworkIsolationKey); | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data1(version_); | 
 |   uint64_t client_packet_number1 = 1; | 
 |   mock_quic_data1.AddWrite( | 
 |       SYNCHRONOUS, ConstructClientRequestHeadersPacket( | 
 |                        client_packet_number1++, | 
 |                        GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |                        true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, ConstructServerPushPromisePacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  GetRequestHeaders("GET", "https", "/pushed.jpg"))); | 
 |   const bool should_send_priority_packet = | 
 |       client_headers_include_h2_stream_dependency_ && | 
 |       !VersionUsesHttp3(version_.transport_version); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data1.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientAckAndPriorityPacket( | 
 |             client_packet_number1++, false, | 
 |             /*largest_received=*/1, /*smallest_received=*/1, | 
 |             GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |             GetNthClientInitiatedBidirectionalStreamId(0), DEFAULT_PRIORITY)); | 
 |   } | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   if (!should_send_priority_packet) { | 
 |     mock_quic_data1.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number1++, 2, 1)); | 
 |   } | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  false, GetResponseHeaders("200"))); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data1.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number1++, 3, 1)); | 
 |   } | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello1"))); | 
 |   if (!should_send_priority_packet) { | 
 |     mock_quic_data1.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number1++, 4, 3)); | 
 |   } | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  5, GetNthServerInitiatedUnidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("and hello1"))); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data1.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number1++, 5, 3)); | 
 |   } | 
 |   if (!VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data1.AddWrite(SYNCHRONOUS, | 
 |                              ConstructClientAckAndRstPacket( | 
 |                                  client_packet_number1++, | 
 |                                  GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |                                  quic::QUIC_RST_ACKNOWLEDGEMENT, 5, 5)); | 
 |   } else { | 
 |     mock_quic_data1.AddWrite( | 
 |         SYNCHRONOUS, client_maker_->MakeAckAndPriorityUpdatePacket( | 
 |                          client_packet_number1++, true, 5, 5, 3, | 
 |                          GetNthServerInitiatedUnidirectionalStreamId(0))); | 
 |   } | 
 |   mock_quic_data1.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data1.AddRead(ASYNC, 0);               // EOF | 
 |   mock_quic_data1.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   QuicTestPacketMaker client_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), kDefaultServerHostName, quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   QuicTestPacketMaker server_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), kDefaultServerHostName, quic::Perspective::IS_SERVER, | 
 |       false); | 
 |   MockQuicData mock_quic_data2(version_); | 
 |   uint64_t client_packet_number2 = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data2.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker2.MakeInitialSettingsPacket(client_packet_number2++)); | 
 |   } | 
 |   mock_quic_data2.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       client_maker2.MakeRequestHeadersPacket( | 
 |           client_packet_number2++, | 
 |           GetNthClientInitiatedBidirectionalStreamId(0), true, true, | 
 |           ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY), | 
 |           GetRequestHeaders("GET", "https", "/"), 0, nullptr)); | 
 |   mock_quic_data2.AddRead( | 
 |       ASYNC, server_maker2.MakePushPromisePacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  GetNthServerInitiatedUnidirectionalStreamId(0), false, false, | 
 |                  GetRequestHeaders("GET", "https", "/pushed.jpg"), nullptr)); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data2.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker2.MakeAckAndPriorityPacket( | 
 |             client_packet_number2++, false, | 
 |             /*largest_received=*/1, /*smallest_received=*/1, | 
 |             GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |             GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY))); | 
 |   } | 
 |   mock_quic_data2.AddRead( | 
 |       ASYNC, server_maker2.MakeResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"), nullptr)); | 
 |   if (!should_send_priority_packet) { | 
 |     mock_quic_data2.AddWrite(SYNCHRONOUS, client_maker2.MakeAckPacket( | 
 |                                               client_packet_number2++, 2, 1)); | 
 |   } | 
 |   mock_quic_data2.AddRead( | 
 |       ASYNC, server_maker2.MakeResponseHeadersPacket( | 
 |                  3, GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  false, GetResponseHeaders("200"), nullptr)); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data2.AddWrite(SYNCHRONOUS, client_maker2.MakeAckPacket( | 
 |                                               client_packet_number2++, 3, 1)); | 
 |   } | 
 |   mock_quic_data2.AddRead( | 
 |       ASYNC, server_maker2.MakeDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello2"))); | 
 |   if (!should_send_priority_packet) { | 
 |     mock_quic_data2.AddWrite(SYNCHRONOUS, client_maker2.MakeAckPacket( | 
 |                                               client_packet_number2++, 4, 3)); | 
 |   } | 
 |   mock_quic_data2.AddRead( | 
 |       ASYNC, server_maker2.MakeDataPacket( | 
 |                  5, GetNthServerInitiatedUnidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("and hello2"))); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data2.AddWrite(SYNCHRONOUS, client_maker2.MakeAckPacket( | 
 |                                               client_packet_number2++, 5, 3)); | 
 |   } | 
 |   if (!VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data2.AddWrite(SYNCHRONOUS, | 
 |                              client_maker2.MakeAckAndRstPacket( | 
 |                                  client_packet_number2++, false, | 
 |                                  GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |                                  quic::QUIC_RST_ACKNOWLEDGEMENT, 5, 5)); | 
 |   } else { | 
 |     mock_quic_data2.AddWrite( | 
 |         SYNCHRONOUS, client_maker2.MakeAckAndPriorityUpdatePacket( | 
 |                          client_packet_number2++, true, 5, 5, 3, | 
 |                          GetNthServerInitiatedUnidirectionalStreamId(0))); | 
 |   } | 
 |   mock_quic_data2.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data2.AddRead(ASYNC, 0);               // EOF | 
 |   mock_quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   scoped_refptr<X509Certificate> cert( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   verify_details_.cert_verify_result.verified_cert = cert; | 
 |   verify_details_.cert_verify_result.is_issued_by_known_root = true; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); | 
 |  | 
 |   // The non-alternate protocol jobs need to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". Use "AddTcpSocketDataProvider()", as | 
 |   // the connection requests may or may not actually make it to the socket | 
 |   // factory, there may or may not be a TCP connection made in between the two | 
 |   // QUIC connection attempts. | 
 |   StaticSocketDataProvider hanging_data1; | 
 |   hanging_data1.set_connect_data(MockConnect(SYNCHRONOUS, ERR_IO_PENDING)); | 
 |   socket_factory_.AddTcpSocketDataProvider(&hanging_data1); | 
 |   StaticSocketDataProvider hanging_data2; | 
 |   hanging_data2.set_connect_data(MockConnect(SYNCHRONOUS, ERR_IO_PENDING)); | 
 |   socket_factory_.AddTcpSocketDataProvider(&hanging_data2); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   NetworkIsolationKey network_isolation_key1 = | 
 |       NetworkIsolationKey::CreateTransient(); | 
 |   NetworkIsolationKey network_isolation_key2 = | 
 |       NetworkIsolationKey::CreateTransient(); | 
 |   NetworkAnonymizationKey network_anonymization_key1 = | 
 |       net::NetworkAnonymizationKey::CreateFromNetworkIsolationKey( | 
 |           network_isolation_key1); | 
 |   NetworkAnonymizationKey network_anonymization_key2 = | 
 |       net::NetworkAnonymizationKey::CreateFromNetworkIsolationKey( | 
 |           network_isolation_key2); | 
 |  | 
 |   // Creates the first QUIC session, and triggers the first push. | 
 |   request_.network_isolation_key = network_isolation_key1; | 
 |   request_.network_anonymization_key = network_anonymization_key1; | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello1"); | 
 |  | 
 |   // Use a different NIK, which creates another QUIC session, triggering a | 
 |   // second push, | 
 |   request_.network_isolation_key = network_isolation_key2; | 
 |   request_.network_anonymization_key = network_anonymization_key2; | 
 |   SendRequestAndExpectQuicResponse("hello2"); | 
 |  | 
 |   // Use the second NIK again, should receive the push body from the second | 
 |   // session. | 
 |   request_.url = GURL("https://mail.example.org/pushed.jpg"); | 
 |   SendRequestAndExpectQuicResponse("and hello2"); | 
 |  | 
 |   // Use the first NIK again, should receive the push body from the first | 
 |   // session. | 
 |   request_.network_isolation_key = network_isolation_key1; | 
 |   request_.network_anonymization_key = network_anonymization_key1; | 
 |   SendRequestAndExpectQuicResponse("and hello1"); | 
 | } | 
 |  | 
 | // Regression test for http://crbug.com/719461 in which a promised stream | 
 | // is closed before the pushed headers arrive, but after the connection | 
 | // is closed and before the callbacks are executed. | 
 | TEST_P(QuicNetworkTransactionTest, CancelServerPushAfterConnectionClose) { | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     return; | 
 |   } | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   uint64_t client_packet_number = 1; | 
 |   // First request: GET https://mail.example.org/ | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, GetRequestHeaders("GET", "https", "/"))); | 
 |   // Server promise for: https://mail.example.org/pushed.jpg | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerPushPromisePacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  GetRequestHeaders("GET", "https", "/pushed.jpg"))); | 
 |   const bool should_send_priority_packet = | 
 |       client_headers_include_h2_stream_dependency_ && | 
 |       !VersionUsesHttp3(version_.transport_version); | 
 |   if (should_send_priority_packet) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientAckAndPriorityPacket( | 
 |               client_packet_number++, false, | 
 |               /*largest_received=*/1, /*smallest_received=*/1, | 
 |               GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |               GetNthClientInitiatedBidirectionalStreamId(0), DEFAULT_PRIORITY)); | 
 |   } | 
 |   // Response headers for first request. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   if (!should_send_priority_packet) { | 
 |     // Client ACKs the response headers. | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1)); | 
 |   } | 
 |   // Response body for first request. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  3, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   if (should_send_priority_packet) { | 
 |     // Client ACKs the response headers. | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 3, 1)); | 
 |   } | 
 |   // Write error for the third request. | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, ERR_FAILED); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // Send a request which triggers a push promise from the server. | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   // Start a push transaction that will be cancelled after the connection | 
 |   // is closed, but before the callback is executed. | 
 |   request_.url = GURL("https://mail.example.org/pushed.jpg"); | 
 |   auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, | 
 |                                                          session_.get()); | 
 |   TestCompletionCallback callback2; | 
 |   int rv = trans2->Start(&request_, callback2.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // Cause the connection to close on a write error. | 
 |   HttpRequestInfo request3; | 
 |   request3.method = "GET"; | 
 |   request3.url = GURL("https://mail.example.org/"); | 
 |   request3.load_flags = 0; | 
 |   request3.traffic_annotation = | 
 |       net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |   HttpNetworkTransaction trans3(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback3; | 
 |   EXPECT_THAT( | 
 |       trans3.Start(&request3, callback3.callback(), net_log_with_source_), | 
 |       IsError(ERR_IO_PENDING)); | 
 |  | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // When |trans2| is destroyed, the underlying stream will be closed. | 
 |   EXPECT_FALSE(callback2.have_result()); | 
 |   trans2 = nullptr; | 
 |  | 
 |   EXPECT_THAT(callback3.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, QuicForceHolBlocking) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |  | 
 |   int write_packet_index = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_index++)); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersAndDataFramesPacket( | 
 |           write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, DEFAULT_PRIORITY, GetRequestHeaders("POST", "https", "/"), | 
 |           0, nullptr, {ConstructDataFrame("1")})); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |  | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(write_packet_index++, 2, 1)); | 
 |  | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |   request_.method = "POST"; | 
 |   ChunkedUploadDataStream upload_data(0); | 
 |   upload_data.AppendData("1", 1, true); | 
 |  | 
 |   request_.upload_data_stream = &upload_data; | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, HostInAllowlist) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   session_params_.quic_host_allowlist.insert("mail.example.org"); | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, HostNotInAllowlist) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   session_params_.quic_host_allowlist.insert("mail.example.com"); | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 | } | 
 |  | 
 | class QuicNetworkTransactionWithDestinationTest | 
 |     : public PlatformTest, | 
 |       public ::testing::WithParamInterface<PoolingTestParams>, | 
 |       public WithTaskEnvironment { | 
 |  protected: | 
 |   QuicNetworkTransactionWithDestinationTest() | 
 |       : version_(GetParam().version), | 
 |         client_headers_include_h2_stream_dependency_( | 
 |             GetParam().client_headers_include_h2_stream_dependency), | 
 |         supported_versions_(quic::test::SupportedVersions(version_)), | 
 |         destination_type_(GetParam().destination_type), | 
 |         ssl_config_service_(std::make_unique<SSLConfigServiceDefaults>()), | 
 |         proxy_resolution_service_( | 
 |             ConfiguredProxyResolutionService::CreateDirect()), | 
 |         auth_handler_factory_(HttpAuthHandlerFactory::CreateDefault()), | 
 |         ssl_data_(ASYNC, OK) { | 
 |     FLAGS_quic_enable_http3_grease_randomness = false; | 
 |   } | 
 |  | 
 |   void SetUp() override { | 
 |     NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |     base::RunLoop().RunUntilIdle(); | 
 |  | 
 |     HttpNetworkSessionParams session_params; | 
 |     session_params.enable_quic = true; | 
 |     context_.params()->allow_remote_alt_svc = true; | 
 |     context_.params()->supported_versions = supported_versions_; | 
 |     context_.params()->headers_include_h2_stream_dependency = | 
 |         client_headers_include_h2_stream_dependency_; | 
 |  | 
 |     HttpNetworkSessionContext session_context; | 
 |  | 
 |     context_.AdvanceTime(quic::QuicTime::Delta::FromMilliseconds(20)); | 
 |  | 
 |     crypto_client_stream_factory_.set_handshake_mode( | 
 |         MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |     session_context.quic_crypto_client_stream_factory = | 
 |         &crypto_client_stream_factory_; | 
 |  | 
 |     session_context.quic_context = &context_; | 
 |     session_context.client_socket_factory = &socket_factory_; | 
 |     session_context.host_resolver = &host_resolver_; | 
 |     session_context.cert_verifier = &cert_verifier_; | 
 |     session_context.transport_security_state = &transport_security_state_; | 
 |     session_context.ct_policy_enforcer = &ct_policy_enforcer_; | 
 |     session_context.socket_performance_watcher_factory = | 
 |         &test_socket_performance_watcher_factory_; | 
 |     session_context.ssl_config_service = ssl_config_service_.get(); | 
 |     session_context.proxy_resolution_service = proxy_resolution_service_.get(); | 
 |     session_context.http_auth_handler_factory = auth_handler_factory_.get(); | 
 |     session_context.http_server_properties = &http_server_properties_; | 
 |  | 
 |     session_ = | 
 |         std::make_unique<HttpNetworkSession>(session_params, session_context); | 
 |     session_->quic_stream_factory() | 
 |         ->set_is_quic_known_to_work_on_current_network(false); | 
 |   } | 
 |  | 
 |   void TearDown() override { | 
 |     NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |     // Empty the current queue. | 
 |     base::RunLoop().RunUntilIdle(); | 
 |     PlatformTest::TearDown(); | 
 |     NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |     base::RunLoop().RunUntilIdle(); | 
 |     session_.reset(); | 
 |   } | 
 |  | 
 |   void SetQuicAlternativeService(const std::string& origin) { | 
 |     HostPortPair destination; | 
 |     switch (destination_type_) { | 
 |       case SAME_AS_FIRST: | 
 |         destination = HostPortPair(origin1_, 443); | 
 |         break; | 
 |       case SAME_AS_SECOND: | 
 |         destination = HostPortPair(origin2_, 443); | 
 |         break; | 
 |       case DIFFERENT: | 
 |         destination = HostPortPair(kDifferentHostname, 443); | 
 |         break; | 
 |     } | 
 |     AlternativeService alternative_service(kProtoQUIC, destination); | 
 |     base::Time expiration = base::Time::Now() + base::Days(1); | 
 |     http_server_properties_.SetQuicAlternativeService( | 
 |         url::SchemeHostPort("https", origin, 443), NetworkAnonymizationKey(), | 
 |         alternative_service, expiration, supported_versions_); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientRequestHeadersPacket(uint64_t packet_number, | 
 |                                       quic::QuicStreamId stream_id, | 
 |                                       bool should_include_version, | 
 |                                       quic::QuicStreamId parent_stream_id, | 
 |                                       QuicTestPacketMaker* maker) { | 
 |     spdy::SpdyPriority priority = | 
 |         ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); | 
 |     spdy::Http2HeaderBlock headers( | 
 |         maker->GetRequestHeaders("GET", "https", "/")); | 
 |     return maker->MakeRequestHeadersPacket( | 
 |         packet_number, stream_id, should_include_version, true, priority, | 
 |         std::move(headers), parent_stream_id, nullptr); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructClientRequestHeadersPacket(uint64_t packet_number, | 
 |                                       quic::QuicStreamId stream_id, | 
 |                                       bool should_include_version, | 
 |                                       QuicTestPacketMaker* maker) { | 
 |     return ConstructClientRequestHeadersPacket( | 
 |         packet_number, stream_id, should_include_version, 0, maker); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> | 
 |   ConstructServerResponseHeadersPacket(uint64_t packet_number, | 
 |                                        quic::QuicStreamId stream_id, | 
 |                                        QuicTestPacketMaker* maker) { | 
 |     spdy::Http2HeaderBlock headers(maker->GetResponseHeaders("200")); | 
 |     return maker->MakeResponseHeadersPacket(packet_number, stream_id, false, | 
 |                                             false, std::move(headers), nullptr); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructServerDataPacket( | 
 |       uint64_t packet_number, | 
 |       quic::QuicStreamId stream_id, | 
 |       QuicTestPacketMaker* maker) { | 
 |     return maker->MakeDataPacket( | 
 |         packet_number, stream_id, false, true, | 
 |         ConstructDataFrameForVersion("hello", version_)); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicEncryptedPacket> ConstructClientAckPacket( | 
 |       uint64_t packet_number, | 
 |       uint64_t largest_received, | 
 |       uint64_t smallest_received, | 
 |       QuicTestPacketMaker* maker) { | 
 |     return maker->MakeAckPacket(packet_number, largest_received, | 
 |                                 smallest_received); | 
 |   } | 
 |  | 
 |   std::unique_ptr<quic::QuicReceivedPacket> ConstructInitialSettingsPacket( | 
 |       uint64_t packet_number, | 
 |       QuicTestPacketMaker* maker) { | 
 |     return maker->MakeInitialSettingsPacket(packet_number); | 
 |   } | 
 |  | 
 |   void AddRefusedSocketData() { | 
 |     auto refused_data = std::make_unique<StaticSocketDataProvider>(); | 
 |     MockConnect refused_connect(SYNCHRONOUS, ERR_CONNECTION_REFUSED); | 
 |     refused_data->set_connect_data(refused_connect); | 
 |     socket_factory_.AddSocketDataProvider(refused_data.get()); | 
 |     static_socket_data_provider_vector_.push_back(std::move(refused_data)); | 
 |   } | 
 |  | 
 |   void AddHangingSocketData() { | 
 |     auto hanging_data = std::make_unique<StaticSocketDataProvider>(); | 
 |     MockConnect hanging_connect(SYNCHRONOUS, ERR_IO_PENDING); | 
 |     hanging_data->set_connect_data(hanging_connect); | 
 |     socket_factory_.AddSocketDataProvider(hanging_data.get()); | 
 |     static_socket_data_provider_vector_.push_back(std::move(hanging_data)); | 
 |     socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |   } | 
 |  | 
 |   bool AllDataConsumed() { | 
 |     for (const auto& socket_data_ptr : static_socket_data_provider_vector_) { | 
 |       if (!socket_data_ptr->AllReadDataConsumed() || | 
 |           !socket_data_ptr->AllWriteDataConsumed()) { | 
 |         return false; | 
 |       } | 
 |     } | 
 |     return true; | 
 |   } | 
 |  | 
 |   void SendRequestAndExpectQuicResponse(const std::string& host) { | 
 |     HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |     HttpRequestInfo request; | 
 |     std::string url("https://"); | 
 |     url.append(host); | 
 |     request.url = GURL(url); | 
 |     request.load_flags = 0; | 
 |     request.method = "GET"; | 
 |     request.traffic_annotation = | 
 |         net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |     TestCompletionCallback callback; | 
 |     int rv = trans.Start(&request, callback.callback(), net_log_with_source_); | 
 |     EXPECT_THAT(callback.GetResult(rv), IsOk()); | 
 |  | 
 |     std::string response_data; | 
 |     ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); | 
 |     EXPECT_EQ("hello", response_data); | 
 |  | 
 |     const HttpResponseInfo* response = trans.GetResponseInfo(); | 
 |     ASSERT_TRUE(response != nullptr); | 
 |     ASSERT_TRUE(response->headers.get() != nullptr); | 
 |     EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); | 
 |     EXPECT_TRUE(response->was_fetched_via_spdy); | 
 |     EXPECT_TRUE(response->was_alpn_negotiated); | 
 |     EXPECT_EQ(QuicHttpStream::ConnectionInfoFromQuicVersion(version_), | 
 |               response->connection_info); | 
 |     EXPECT_EQ(443, response->remote_endpoint.port()); | 
 |   } | 
 |  | 
 |   quic::QuicStreamId GetNthClientInitiatedBidirectionalStreamId(int n) { | 
 |     return quic::test::GetNthClientInitiatedBidirectionalStreamId( | 
 |         version_.transport_version, n); | 
 |   } | 
 |  | 
 |   quic::test::QuicFlagSaver flags_;  // Save/restore all QUIC flag values. | 
 |   const quic::ParsedQuicVersion version_; | 
 |   const bool client_headers_include_h2_stream_dependency_; | 
 |   quic::ParsedQuicVersionVector supported_versions_; | 
 |   DestinationType destination_type_; | 
 |   std::string origin1_; | 
 |   std::string origin2_; | 
 |   MockQuicContext context_; | 
 |   std::unique_ptr<HttpNetworkSession> session_; | 
 |   MockClientSocketFactory socket_factory_; | 
 |   MockHostResolver host_resolver_{/*default_result=*/MockHostResolverBase:: | 
 |                                       RuleResolver::GetLocalhostResult()}; | 
 |   MockCertVerifier cert_verifier_; | 
 |   TransportSecurityState transport_security_state_; | 
 |   DefaultCTPolicyEnforcer ct_policy_enforcer_; | 
 |   TestSocketPerformanceWatcherFactory test_socket_performance_watcher_factory_; | 
 |   std::unique_ptr<SSLConfigServiceDefaults> ssl_config_service_; | 
 |   std::unique_ptr<ProxyResolutionService> proxy_resolution_service_; | 
 |   std::unique_ptr<HttpAuthHandlerFactory> auth_handler_factory_; | 
 |   HttpServerProperties http_server_properties_; | 
 |   NetLogWithSource net_log_with_source_{ | 
 |       NetLogWithSource::Make(NetLogSourceType::NONE)}; | 
 |   MockCryptoClientStreamFactory crypto_client_stream_factory_; | 
 |   std::vector<std::unique_ptr<StaticSocketDataProvider>> | 
 |       static_socket_data_provider_vector_; | 
 |   SSLSocketDataProvider ssl_data_; | 
 | }; | 
 |  | 
 | INSTANTIATE_TEST_SUITE_P(VersionIncludeStreamDependencySequence, | 
 |                          QuicNetworkTransactionWithDestinationTest, | 
 |                          ::testing::ValuesIn(GetPoolingTestParams()), | 
 |                          ::testing::PrintToStringParamName()); | 
 |  | 
 | // A single QUIC request fails because the certificate does not match the origin | 
 | // hostname, regardless of whether it matches the alternative service hostname. | 
 | TEST_P(QuicNetworkTransactionWithDestinationTest, InvalidCertificate) { | 
 |   if (destination_type_ == DIFFERENT) | 
 |     return; | 
 |  | 
 |   GURL url("https://mail.example.com/"); | 
 |   origin1_ = url.host(); | 
 |  | 
 |   // Not used for requests, but this provides a test case where the certificate | 
 |   // is valid for the hostname of the alternative service. | 
 |   origin2_ = "mail.example.org"; | 
 |  | 
 |   SetQuicAlternativeService(origin1_); | 
 |  | 
 |   scoped_refptr<X509Certificate> cert( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   ASSERT_FALSE(cert->VerifyNameMatch(origin1_)); | 
 |   ASSERT_TRUE(cert->VerifyNameMatch(origin2_)); | 
 |  | 
 |   ProofVerifyDetailsChromium verify_details; | 
 |   verify_details.cert_verify_result.verified_cert = cert; | 
 |   verify_details.cert_verify_result.is_issued_by_known_root = true; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddRefusedSocketData(); | 
 |  | 
 |   HttpRequestInfo request; | 
 |   request.url = url; | 
 |   request.traffic_annotation = | 
 |       net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED)); | 
 |  | 
 |   EXPECT_TRUE(AllDataConsumed()); | 
 | } | 
 |  | 
 | // First request opens QUIC session to alternative service.  Second request | 
 | // pools to it, because destination matches and certificate is valid, even | 
 | // though quic::QuicServerId is different. | 
 | TEST_P(QuicNetworkTransactionWithDestinationTest, PoolIfCertificateValid) { | 
 |   origin1_ = "mail.example.org"; | 
 |   origin2_ = "news.example.org"; | 
 |  | 
 |   SetQuicAlternativeService(origin1_); | 
 |   SetQuicAlternativeService(origin2_); | 
 |  | 
 |   scoped_refptr<X509Certificate> cert( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   ASSERT_TRUE(cert->VerifyNameMatch(origin1_)); | 
 |   ASSERT_TRUE(cert->VerifyNameMatch(origin2_)); | 
 |   ASSERT_FALSE(cert->VerifyNameMatch(kDifferentHostname)); | 
 |  | 
 |   ProofVerifyDetailsChromium verify_details; | 
 |   verify_details.cert_verify_result.verified_cert = cert; | 
 |   verify_details.cert_verify_result.is_issued_by_known_root = true; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details); | 
 |  | 
 |   QuicTestPacketMaker client_maker( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin1_, quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   QuicTestPacketMaker server_maker( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin1_, quic::Perspective::IS_SERVER, false); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket( | 
 |                                              packet_num++, &client_maker)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           &client_maker)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, | 
 |       ConstructServerResponseHeadersPacket( | 
 |           1, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, | 
 |       ConstructServerDataPacket( | 
 |           2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker)); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, ConstructClientAckPacket(packet_num++, 2, 1, &client_maker)); | 
 |  | 
 |   client_maker.set_hostname(origin2_); | 
 |   server_maker.set_hostname(origin2_); | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           GetNthClientInitiatedBidirectionalStreamId(0), &client_maker)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, | 
 |       ConstructServerResponseHeadersPacket( | 
 |           3, GetNthClientInitiatedBidirectionalStreamId(1), &server_maker)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, | 
 |       ConstructServerDataPacket( | 
 |           4, GetNthClientInitiatedBidirectionalStreamId(1), &server_maker)); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, ConstructClientAckPacket(packet_num++, 4, 3, &client_maker)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingSocketData(); | 
 |   AddHangingSocketData(); | 
 |  | 
 |   auto quic_task_runner = | 
 |       base::MakeRefCounted<TestTaskRunner>(context_.mock_clock()); | 
 |   QuicStreamFactoryPeer::SetAlarmFactory( | 
 |       session_->quic_stream_factory(), | 
 |       std::make_unique<QuicChromiumAlarmFactory>(quic_task_runner.get(), | 
 |                                                  context_.clock())); | 
 |  | 
 |   SendRequestAndExpectQuicResponse(origin1_); | 
 |   SendRequestAndExpectQuicResponse(origin2_); | 
 |  | 
 |   EXPECT_TRUE(AllDataConsumed()); | 
 | } | 
 |  | 
 | // First request opens QUIC session to alternative service.  Second request does | 
 | // not pool to it, even though destination matches, because certificate is not | 
 | // valid.  Instead, a new QUIC session is opened to the same destination with a | 
 | // different quic::QuicServerId. | 
 | TEST_P(QuicNetworkTransactionWithDestinationTest, | 
 |        DoNotPoolIfCertificateInvalid) { | 
 |   origin1_ = "news.example.org"; | 
 |   origin2_ = "mail.example.com"; | 
 |  | 
 |   SetQuicAlternativeService(origin1_); | 
 |   SetQuicAlternativeService(origin2_); | 
 |  | 
 |   scoped_refptr<X509Certificate> cert1( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem")); | 
 |   ASSERT_TRUE(cert1->VerifyNameMatch(origin1_)); | 
 |   ASSERT_FALSE(cert1->VerifyNameMatch(origin2_)); | 
 |   ASSERT_FALSE(cert1->VerifyNameMatch(kDifferentHostname)); | 
 |  | 
 |   scoped_refptr<X509Certificate> cert2( | 
 |       ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); | 
 |   ASSERT_TRUE(cert2->VerifyNameMatch(origin2_)); | 
 |   ASSERT_FALSE(cert2->VerifyNameMatch(kDifferentHostname)); | 
 |  | 
 |   ProofVerifyDetailsChromium verify_details1; | 
 |   verify_details1.cert_verify_result.verified_cert = cert1; | 
 |   verify_details1.cert_verify_result.is_issued_by_known_root = true; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details1); | 
 |  | 
 |   ProofVerifyDetailsChromium verify_details2; | 
 |   verify_details2.cert_verify_result.verified_cert = cert2; | 
 |   verify_details2.cert_verify_result.is_issued_by_known_root = true; | 
 |   crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details2); | 
 |  | 
 |   QuicTestPacketMaker client_maker1( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin1_, quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   QuicTestPacketMaker server_maker1( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin1_, quic::Perspective::IS_SERVER, false); | 
 |  | 
 |   MockQuicData mock_quic_data1(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data1.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket( | 
 |                                               packet_num++, &client_maker1)); | 
 |   } | 
 |   mock_quic_data1.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           &client_maker1)); | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, | 
 |       ConstructServerResponseHeadersPacket( | 
 |           1, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker1)); | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, | 
 |       ConstructServerDataPacket( | 
 |           2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker1)); | 
 |   mock_quic_data1.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckPacket(packet_num++, 2, 1, &client_maker1)); | 
 |   mock_quic_data1.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data1.AddRead(ASYNC, 0);               // EOF | 
 |  | 
 |   mock_quic_data1.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   QuicTestPacketMaker client_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin2_, quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   QuicTestPacketMaker server_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), origin2_, quic::Perspective::IS_SERVER, false); | 
 |  | 
 |   MockQuicData mock_quic_data2(version_); | 
 |   int packet_num2 = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data2.AddWrite(SYNCHRONOUS, ConstructInitialSettingsPacket( | 
 |                                               packet_num2++, &client_maker2)); | 
 |   } | 
 |   mock_quic_data2.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num2++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           &client_maker2)); | 
 |   mock_quic_data2.AddRead( | 
 |       ASYNC, | 
 |       ConstructServerResponseHeadersPacket( | 
 |           1, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker2)); | 
 |   mock_quic_data2.AddRead( | 
 |       ASYNC, | 
 |       ConstructServerDataPacket( | 
 |           2, GetNthClientInitiatedBidirectionalStreamId(0), &server_maker2)); | 
 |   mock_quic_data2.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckPacket(packet_num2++, 2, 1, &client_maker2)); | 
 |   mock_quic_data2.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data2.AddRead(ASYNC, 0);               // EOF | 
 |  | 
 |   mock_quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   SendRequestAndExpectQuicResponse(origin1_); | 
 |   SendRequestAndExpectQuicResponse(origin2_); | 
 |  | 
 |   EXPECT_TRUE(AllDataConsumed()); | 
 | } | 
 |  | 
 | // crbug.com/705109 - this confirms that matching request with a body | 
 | // triggers a crash (pre-fix). | 
 | TEST_P(QuicNetworkTransactionTest, QuicServerPushMatchesRequestWithBody) { | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     return; | 
 |   } | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   uint64_t client_packet_number = 1; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerPushPromisePacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  GetRequestHeaders("GET", "https", "/pushed.jpg"))); | 
 |  | 
 |   const bool should_send_priority_packet = | 
 |       client_headers_include_h2_stream_dependency_ && | 
 |       !VersionUsesHttp3(version_.transport_version); | 
 |   if (should_send_priority_packet) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientAckAndPriorityPacket( | 
 |               client_packet_number++, false, | 
 |               /*largest_received=*/1, /*smallest_received=*/1, | 
 |               GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |               GetNthClientInitiatedBidirectionalStreamId(0), DEFAULT_PRIORITY)); | 
 |   } | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   if (!should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 2, 1)); | 
 |   } | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  false, GetResponseHeaders("200"))); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 3, 1)); | 
 |   } | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   if (!should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 4, 3)); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  5, GetNthServerInitiatedUnidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("and hello!"))); | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 5, 3)); | 
 |   } | 
 |  | 
 |   // Because the matching request has a body, we will see the push | 
 |   // stream get cancelled, and the matching request go out on the | 
 |   // wire. | 
 |   if (should_send_priority_packet) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientRstPacket(client_packet_number++, | 
 |                                  GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |                                  quic::QUIC_STREAM_CANCELLED)); | 
 |   } else { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructClientAckAndRstPacket( | 
 |                                 client_packet_number++, | 
 |                                 GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |                                 quic::QUIC_STREAM_CANCELLED, 5, 5)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersAndDataFramesPacket( | 
 |           client_packet_number++, GetNthClientInitiatedBidirectionalStreamId(1), | 
 |           false, true, DEFAULT_PRIORITY, | 
 |           GetRequestHeaders("GET", "https", "/pushed.jpg"), | 
 |           GetNthServerInitiatedUnidirectionalStreamId(0), nullptr, | 
 |           {ConstructDataFrame("1")})); | 
 |  | 
 |   // We see the same response as for the earlier pushed and cancelled | 
 |   // stream. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  6, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  7, GetNthClientInitiatedBidirectionalStreamId(1), false, true, | 
 |                  ConstructDataFrame("and hello!"))); | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, ConstructClientAckPacket(client_packet_number++, 7, 6)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // PUSH_PROMISE handling in the http layer gets exercised here. | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/pushed.jpg"); | 
 |   ChunkedUploadDataStream upload_data(0); | 
 |   upload_data.AppendData("1", 1, true); | 
 |   request_.upload_data_stream = &upload_data; | 
 |   SendRequestAndExpectQuicResponse("and hello!"); | 
 | } | 
 |  | 
 | // Regression test for https://crbug.com/797825: If pushed headers describe a | 
 | // valid URL with empty hostname, then X509Certificate::VerifyHostname() must | 
 | // not be called (otherwise a DCHECK fails). | 
 | TEST_P(QuicNetworkTransactionTest, QuicServerPushWithEmptyHostname) { | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     return; | 
 |   } | 
 |   spdy::Http2HeaderBlock pushed_request_headers; | 
 |   pushed_request_headers[":authority"] = ""; | 
 |   pushed_request_headers[":method"] = "GET"; | 
 |   pushed_request_headers[":path"] = "/"; | 
 |   pushed_request_headers[":scheme"] = "nosuchscheme"; | 
 |  | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |  | 
 |   int packet_num = 1; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerPushPromisePacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                  GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  std::move(pushed_request_headers))); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndRstPacket( | 
 |           packet_num++, GetNthServerInitiatedUnidirectionalStreamId(0), | 
 |           quic::QUIC_INVALID_PROMISE_URL, 1, 1)); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, GetNthServerInitiatedUnidirectionalStreamId(0), false, | 
 |                  false, GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 3, 1)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |  | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // PUSH_PROMISE handling in the http layer gets exercised here. | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Performs an HTTPS/1.1 request over QUIC proxy tunnel. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyConnectHttpsServer) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |  | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), 0, false)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   const char get_request[] = | 
 |       "GET / HTTP/1.1\r\n" | 
 |       "Host: mail.example.org\r\n" | 
 |       "Connection: keep-alive\r\n\r\n"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndDataPacket( | 
 |           packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, | 
 |           1, false, ConstructDataFrame(get_request))); | 
 |  | 
 |   const char get_response[] = | 
 |       "HTTP/1.1 200 OK\r\n" | 
 |       "Content-Length: 10\r\n\r\n"; | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  ConstructDataFrame(get_response))); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket( | 
 |                        3, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        false, ConstructDataFrame("0123456789"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 3, 2)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientDataPacket( | 
 |                          packet_num++, GetQpackDecoderStreamId(), true, false, | 
 |                          StreamCancellationQpackDecoderInstruction(0))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRstPacket(packet_num++, | 
 |                                GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                                quic::QUIC_STREAM_CANCELLED)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   RunTransaction(&trans); | 
 |   CheckWasHttpResponse(&trans); | 
 |   CheckResponsePort(&trans, 70); | 
 |   CheckResponseData(&trans, "0123456789"); | 
 |   EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic()); | 
 |  | 
 |   // DNS aliases should be empty when using a proxy. | 
 |   EXPECT_TRUE(trans.GetResponseInfo()->dns_aliases.empty()); | 
 |  | 
 |   // Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC | 
 |   // proxy socket to disconnect. | 
 |   NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |  | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Performs an HTTP/2 request over QUIC proxy tunnel. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyConnectSpdyServer) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |  | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), 0, false)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   SpdyTestUtil spdy_util; | 
 |  | 
 |   spdy::SpdySerializedFrame get_frame = | 
 |       spdy_util.ConstructSpdyGet("https://mail.example.org/", 1, LOWEST); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndDataPacket( | 
 |           packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, | 
 |           1, false, ConstructDataFrame({get_frame.data(), get_frame.size()}))); | 
 |   spdy::SpdySerializedFrame resp_frame = | 
 |       spdy_util.ConstructSpdyGetReply(nullptr, 0, 1); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  ConstructDataFrame({resp_frame.data(), resp_frame.size()}))); | 
 |  | 
 |   spdy::SpdySerializedFrame data_frame = | 
 |       spdy_util.ConstructSpdyDataFrame(1, "0123456789", true); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, | 
 |       ConstructServerDataPacket( | 
 |           3, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |           ConstructDataFrame({data_frame.data(), data_frame.size()}))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 3, 2)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientDataPacket( | 
 |                          packet_num++, GetQpackDecoderStreamId(), true, false, | 
 |                          StreamCancellationQpackDecoderInstruction(0))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRstPacket(packet_num++, | 
 |                                GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                                quic::QUIC_STREAM_CANCELLED)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   SSLSocketDataProvider ssl_data(ASYNC, OK); | 
 |   ssl_data.next_proto = kProtoHTTP2; | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   RunTransaction(&trans); | 
 |   CheckWasSpdyResponse(&trans); | 
 |   CheckResponsePort(&trans, 70); | 
 |   CheckResponseData(&trans, "0123456789"); | 
 |   EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic()); | 
 |  | 
 |   // Causes MockSSLClientSocket to disconproxyconnecthttpnect, which causes the | 
 |   // underlying QUIC proxy socket to disconnect. | 
 |   NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |  | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Make two HTTP/1.1 requests to the same host over a QUIC proxy tunnel and | 
 | // check that the proxy socket is reused for the second request. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyConnectReuseTransportSocket) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int write_packet_index = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_index++)); | 
 |  | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               write_packet_index++, | 
 |               GetNthClientInitiatedBidirectionalStreamId(0), DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), 0, false)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   const char get_request_1[] = | 
 |       "GET / HTTP/1.1\r\n" | 
 |       "Host: mail.example.org\r\n" | 
 |       "Connection: keep-alive\r\n\r\n"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, ConstructClientAckAndDataPacket( | 
 |                        write_packet_index++, false, | 
 |                        GetNthClientInitiatedBidirectionalStreamId(0), 1, 1, | 
 |                        false, ConstructDataFrame(get_request_1))); | 
 |  | 
 |   const char get_response_1[] = | 
 |       "HTTP/1.1 200 OK\r\n" | 
 |       "Content-Length: 10\r\n\r\n"; | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  ConstructDataFrame(get_response_1))); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket( | 
 |                        3, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        false, ConstructDataFrame("0123456789"))); | 
 |  | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(write_packet_index++, 3, 2)); | 
 |  | 
 |   const char get_request_2[] = | 
 |       "GET /2 HTTP/1.1\r\n" | 
 |       "Host: mail.example.org\r\n" | 
 |       "Connection: keep-alive\r\n\r\n"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientDataPacket( | 
 |           write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           false, false, ConstructDataFrame(get_request_2))); | 
 |  | 
 |   const char get_response_2[] = | 
 |       "HTTP/1.1 200 OK\r\n" | 
 |       "Content-Length: 7\r\n\r\n"; | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  ConstructDataFrame(get_response_2))); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket( | 
 |                        5, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        false, ConstructDataFrame("0123456"))); | 
 |  | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(write_packet_index++, 5, 4)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientDataPacket( | 
 |                          write_packet_index++, GetQpackDecoderStreamId(), true, | 
 |                          false, StreamCancellationQpackDecoderInstruction(0))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRstPacket(write_packet_index++, | 
 |                                GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                                quic::QUIC_STREAM_CANCELLED)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   HttpNetworkTransaction trans_1(DEFAULT_PRIORITY, session_.get()); | 
 |   RunTransaction(&trans_1); | 
 |   CheckWasHttpResponse(&trans_1); | 
 |   CheckResponsePort(&trans_1, 70); | 
 |   CheckResponseData(&trans_1, "0123456789"); | 
 |   EXPECT_TRUE(trans_1.GetResponseInfo()->proxy_server.is_quic()); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/2"); | 
 |   HttpNetworkTransaction trans_2(DEFAULT_PRIORITY, session_.get()); | 
 |   RunTransaction(&trans_2); | 
 |   CheckWasHttpResponse(&trans_2); | 
 |   CheckResponsePort(&trans_2, 70); | 
 |   CheckResponseData(&trans_2, "0123456"); | 
 |   EXPECT_TRUE(trans_2.GetResponseInfo()->proxy_server.is_quic()); | 
 |  | 
 |   // Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC | 
 |   // proxy socket to disconnect. | 
 |   NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |  | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Make an HTTP/1.1 request to one host and an HTTP/2 request to a different | 
 | // host over a QUIC proxy tunnel. Check that the QUIC session to the proxy | 
 | // server is reused for the second request. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyConnectReuseQuicSession) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |  | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |  | 
 |   // CONNECT request and response for first request | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), 0, false)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   // GET request, response, and data over QUIC tunnel for first request | 
 |   const char get_request[] = | 
 |       "GET / HTTP/1.1\r\n" | 
 |       "Host: mail.example.org\r\n" | 
 |       "Connection: keep-alive\r\n\r\n"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndDataPacket( | 
 |           packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(0), 1, | 
 |           1, false, ConstructDataFrame(get_request))); | 
 |  | 
 |   const char get_response[] = | 
 |       "HTTP/1.1 200 OK\r\n" | 
 |       "Content-Length: 10\r\n\r\n"; | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  ConstructDataFrame(get_response))); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket( | 
 |                        3, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        false, ConstructDataFrame("0123456789"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 3, 2)); | 
 |  | 
 |   // CONNECT request and response for second request | 
 |   if (VersionUsesHttp3(version_.transport_version) && | 
 |       base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientPriorityPacket( | 
 |             packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), | 
 |             DEFAULT_PRIORITY)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("different.example.org:443"), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0), false)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  4, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   // GET request, response, and data over QUIC tunnel for second request | 
 |   SpdyTestUtil spdy_util; | 
 |   spdy::SpdySerializedFrame get_frame = | 
 |       spdy_util.ConstructSpdyGet("https://different.example.org/", 1, LOWEST); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndDataPacket( | 
 |           packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(1), 4, | 
 |           4, false, ConstructDataFrame({get_frame.data(), get_frame.size()}))); | 
 |  | 
 |   spdy::SpdySerializedFrame resp_frame = | 
 |       spdy_util.ConstructSpdyGetReply(nullptr, 0, 1); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  5, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  ConstructDataFrame({resp_frame.data(), resp_frame.size()}))); | 
 |  | 
 |   spdy::SpdySerializedFrame data_frame = | 
 |       spdy_util.ConstructSpdyDataFrame(1, "0123456", true); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  6, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  ConstructDataFrame({data_frame.data(), data_frame.size()}))); | 
 |  | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 6, 5)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientDataPacket( | 
 |                          packet_num++, GetQpackDecoderStreamId(), true, false, | 
 |                          StreamCancellationQpackDecoderInstruction(0))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRstPacket(packet_num++, | 
 |                                GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                                quic::QUIC_STREAM_CANCELLED)); | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientDataPacket( | 
 |                          packet_num++, GetQpackDecoderStreamId(), true, false, | 
 |                          StreamCancellationQpackDecoderInstruction(1, false))); | 
 |   } | 
 |  | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRstPacket(packet_num++, | 
 |                                GetNthClientInitiatedBidirectionalStreamId(1), | 
 |                                quic::QUIC_STREAM_CANCELLED)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   SSLSocketDataProvider ssl_data(ASYNC, OK); | 
 |   ssl_data.next_proto = kProtoHTTP2; | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   HttpNetworkTransaction trans_1(DEFAULT_PRIORITY, session_.get()); | 
 |   RunTransaction(&trans_1); | 
 |   CheckWasHttpResponse(&trans_1); | 
 |   CheckResponsePort(&trans_1, 70); | 
 |   CheckResponseData(&trans_1, "0123456789"); | 
 |   EXPECT_TRUE(trans_1.GetResponseInfo()->proxy_server.is_quic()); | 
 |  | 
 |   request_.url = GURL("https://different.example.org/"); | 
 |   HttpNetworkTransaction trans_2(DEFAULT_PRIORITY, session_.get()); | 
 |   RunTransaction(&trans_2); | 
 |   CheckWasSpdyResponse(&trans_2); | 
 |   CheckResponsePort(&trans_2, 70); | 
 |   CheckResponseData(&trans_2, "0123456"); | 
 |   EXPECT_TRUE(trans_2.GetResponseInfo()->proxy_server.is_quic()); | 
 |  | 
 |   // Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC | 
 |   // proxy socket to disconnect. | 
 |   NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |  | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Sends a CONNECT request to a QUIC proxy and receive a 500 response. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyConnectFailure) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |  | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), 0, false)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  GetResponseHeaders("500"))); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndRstPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           quic::QUIC_STREAM_CANCELLED, 1, 1)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_EQ(ERR_IO_PENDING, rv); | 
 |   EXPECT_EQ(ERR_TUNNEL_CONNECTION_FAILED, callback.WaitForResult()); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Sends a CONNECT request to a QUIC proxy and get a UDP socket read error. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyQuicConnectionError) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), 0, false)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_EQ(ERR_IO_PENDING, rv); | 
 |   EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Sends an HTTP/1.1 request over QUIC proxy tunnel and gets a bad cert from the | 
 | // host. Retries request and succeeds. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyConnectBadCertificate) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |  | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), 0, false)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientAckAndDataPacket( | 
 |                          packet_num++, false, GetQpackDecoderStreamId(), 1, 1, | 
 |                          false, StreamCancellationQpackDecoderInstruction(0))); | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientRstPacket(packet_num++, | 
 |                                  GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                                  quic::QUIC_STREAM_CANCELLED)); | 
 |   } else { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientAckAndRstPacket( | 
 |             packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             quic::QUIC_STREAM_CANCELLED, 1, 1)); | 
 |   } | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version) && | 
 |       base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         ConstructClientPriorityPacket( | 
 |             packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), | 
 |             DEFAULT_PRIORITY)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), | 
 |           GetNthClientInitiatedBidirectionalStreamId(0), false)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   const char get_request[] = | 
 |       "GET / HTTP/1.1\r\n" | 
 |       "Host: mail.example.org\r\n" | 
 |       "Connection: keep-alive\r\n\r\n"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndDataPacket( | 
 |           packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(1), 2, | 
 |           2, false, ConstructDataFrame(get_request))); | 
 |   const char get_response[] = | 
 |       "HTTP/1.1 200 OK\r\n" | 
 |       "Content-Length: 10\r\n\r\n"; | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  3, GetNthClientInitiatedBidirectionalStreamId(1), false, false, | 
 |                  ConstructDataFrame(get_response))); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket( | 
 |                        4, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |                        false, ConstructDataFrame("0123456789"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 4, 3)); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientDataPacket( | 
 |                          packet_num++, GetQpackDecoderStreamId(), true, false, | 
 |                          StreamCancellationQpackDecoderInstruction(1, false))); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRstPacket(packet_num++, | 
 |                                GetNthClientInitiatedBidirectionalStreamId(1), | 
 |                                quic::QUIC_STREAM_CANCELLED)); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   SSLSocketDataProvider ssl_data_bad_cert(ASYNC, ERR_CERT_AUTHORITY_INVALID); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_bad_cert); | 
 |  | 
 |   SSLSocketDataProvider ssl_data(ASYNC, OK); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_EQ(ERR_IO_PENDING, rv); | 
 |   EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, callback.WaitForResult()); | 
 |  | 
 |   rv = trans.RestartIgnoringLastError(callback.callback()); | 
 |   EXPECT_EQ(ERR_IO_PENDING, rv); | 
 |   EXPECT_EQ(OK, callback.WaitForResult()); | 
 |  | 
 |   CheckWasHttpResponse(&trans); | 
 |   CheckResponsePort(&trans, 70); | 
 |   CheckResponseData(&trans, "0123456789"); | 
 |   EXPECT_TRUE(trans.GetResponseInfo()->proxy_server.is_quic()); | 
 |  | 
 |   // Causes MockSSLClientSocket to disconnect, which causes the underlying QUIC | 
 |   // proxy socket to disconnect. | 
 |   NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); | 
 |  | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Checks if a request's specified "user-agent" header shows up correctly in the | 
 | // CONNECT request to a QUIC proxy. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyUserAgent) { | 
 |   const char kConfiguredUserAgent[] = "Configured User-Agent"; | 
 |   const char kRequestUserAgent[] = "Request User-Agent"; | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |  | 
 |   spdy::Http2HeaderBlock headers = | 
 |       ConnectRequestHeaders("mail.example.org:443"); | 
 |   headers["user-agent"] = kConfiguredUserAgent; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           std::move(headers), 0, false)); | 
 |   // Return an error, so the transaction stops here (this test isn't interested | 
 |   // in the rest). | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   StaticHttpUserAgentSettings http_user_agent_settings( | 
 |       std::string() /* accept_language */, kConfiguredUserAgent); | 
 |   session_context_.http_user_agent_settings = &http_user_agent_settings; | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   request_.extra_headers.SetHeader(HttpRequestHeaders::kUserAgent, | 
 |                                    kRequestUserAgent); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_EQ(ERR_IO_PENDING, rv); | 
 |   EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Makes sure the CONNECT request packet for a QUIC proxy contains the correct | 
 | // HTTP/2 stream dependency and weights given the request priority. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyRequestPriority) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   const RequestPriority request_priority = MEDIUM; | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |     if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           ConstructClientPriorityPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               DEFAULT_PRIORITY)); | 
 |     } | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           false, | 
 |           VersionUsesHttp3(version_.transport_version) | 
 |               ? DEFAULT_PRIORITY | 
 |               : HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |           ConnectRequestHeaders("mail.example.org:443"), 0, false)); | 
 |   // Return an error, so the transaction stops here (this test isn't interested | 
 |   // in the rest). | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   HttpNetworkTransaction trans(request_priority, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_EQ(ERR_IO_PENDING, rv); | 
 |   EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Makes sure the CONNECT request packet for a QUIC proxy contains the correct | 
 | // HTTP/2 stream dependency and weights given the request priority. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyMultipleRequestsError) { | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   const RequestPriority kRequestPriority = MEDIUM; | 
 |   const RequestPriority kRequestPriority2 = LOWEST; | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(ASYNC, ConstructInitialSettingsPacket(1)); | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, ERR_FAILED); | 
 |   } else { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructClientRequestHeadersPacket( | 
 |                          1, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |                          false, HttpProxyConnectJob::kH2QuicTunnelPriority, | 
 |                          ConnectRequestHeaders("mail.example.org:443"), 0)); | 
 |   } | 
 |   // This should never be reached. | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_FAILED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Second connection attempt just fails - result doesn't really matter. | 
 |   MockQuicData mock_quic_data2(version_); | 
 |   mock_quic_data2.AddConnect(SYNCHRONOUS, ERR_FAILED); | 
 |   mock_quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   int original_max_sockets_per_group = | 
 |       ClientSocketPoolManager::max_sockets_per_group( | 
 |           HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL); | 
 |   ClientSocketPoolManager::set_max_sockets_per_group( | 
 |       HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, 1); | 
 |   int original_max_sockets_per_pool = | 
 |       ClientSocketPoolManager::max_sockets_per_pool( | 
 |           HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL); | 
 |   ClientSocketPoolManager::set_max_sockets_per_pool( | 
 |       HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, 1); | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   HttpNetworkTransaction trans(kRequestPriority, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_EQ(ERR_IO_PENDING, rv); | 
 |  | 
 |   HttpRequestInfo request2; | 
 |   request2.url = GURL("https://mail.example.org/some/other/path/"); | 
 |   request2.traffic_annotation = | 
 |       net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   HttpNetworkTransaction trans2(kRequestPriority2, session_.get()); | 
 |   TestCompletionCallback callback2; | 
 |   int rv2 = trans2.Start(&request2, callback2.callback(), net_log_with_source_); | 
 |   EXPECT_EQ(ERR_IO_PENDING, rv2); | 
 |  | 
 |   EXPECT_EQ(ERR_QUIC_PROTOCOL_ERROR, callback.WaitForResult()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 |  | 
 |   EXPECT_EQ(ERR_FAILED, callback2.WaitForResult()); | 
 |  | 
 |   ClientSocketPoolManager::set_max_sockets_per_pool( | 
 |       HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, | 
 |       original_max_sockets_per_pool); | 
 |   ClientSocketPoolManager::set_max_sockets_per_group( | 
 |       HttpNetworkSession::SocketPoolType::NORMAL_SOCKET_POOL, | 
 |       original_max_sockets_per_group); | 
 | } | 
 |  | 
 | // Test the request-challenge-retry sequence for basic auth, over a QUIC | 
 | // connection when setting up a QUIC proxy tunnel. | 
 | TEST_P(QuicNetworkTransactionTest, QuicProxyAuth) { | 
 |   const std::u16string kBaz(u"baz"); | 
 |   const std::u16string kFoo(u"foo"); | 
 |  | 
 |   // On the second pass, the body read of the auth challenge is synchronous, so | 
 |   // IsConnectedAndIdle returns false.  The socket should still be drained and | 
 |   // reused. See http://crbug.com/544255. | 
 |   for (int i = 0; i < 2; ++i) { | 
 |     QuicTestPacketMaker client_maker( | 
 |         version_, | 
 |         quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |         context_.clock(), kDefaultServerHostName, quic::Perspective::IS_CLIENT, | 
 |         client_headers_include_h2_stream_dependency_, true); | 
 |     QuicTestPacketMaker server_maker( | 
 |         version_, | 
 |         quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |         context_.clock(), kDefaultServerHostName, quic::Perspective::IS_SERVER, | 
 |         false); | 
 |  | 
 |     session_params_.enable_quic = true; | 
 |     session_params_.enable_quic_proxies_for_https_urls = true; | 
 |     proxy_resolution_service_ = | 
 |         ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |             "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |     MockQuicData mock_quic_data(version_); | 
 |  | 
 |     int packet_num = 1; | 
 |     if (VersionUsesHttp3(version_.transport_version)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, client_maker.MakeInitialSettingsPacket(packet_num++)); | 
 |  | 
 |       if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |         mock_quic_data.AddWrite( | 
 |             SYNCHRONOUS, client_maker.MakePriorityPacket( | 
 |                              packet_num++, true, | 
 |                              GetNthClientInitiatedBidirectionalStreamId(0), 0, | 
 |                              quic::QuicStreamPriority::kDefaultUrgency)); | 
 |       } | 
 |     } | 
 |  | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker.MakeRequestHeadersPacket( | 
 |             packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |             false, | 
 |             VersionUsesHttp3(version_.transport_version) | 
 |                 ? quic::QuicStreamPriority::kDefaultUrgency | 
 |                 : ConvertRequestPriorityToQuicPriority( | 
 |                       HttpProxyConnectJob::kH2QuicTunnelPriority), | 
 |             client_maker.ConnectRequestHeaders("mail.example.org:443"), 0, | 
 |             nullptr, false)); | 
 |  | 
 |     spdy::Http2HeaderBlock headers = server_maker.GetResponseHeaders("407"); | 
 |     headers["proxy-authenticate"] = "Basic realm=\"MyRealm1\""; | 
 |     headers["content-length"] = "10"; | 
 |     mock_quic_data.AddRead( | 
 |         ASYNC, server_maker.MakeResponseHeadersPacket( | 
 |                    1, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                    false, std::move(headers), nullptr)); | 
 |  | 
 |     if (i == 0) { | 
 |       mock_quic_data.AddRead( | 
 |           ASYNC, server_maker.MakeDataPacket( | 
 |                      2, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                      false, "0123456789")); | 
 |     } else { | 
 |       mock_quic_data.AddRead( | 
 |           SYNCHRONOUS, server_maker.MakeDataPacket( | 
 |                            2, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                            false, false, "0123456789")); | 
 |     } | 
 |  | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             client_maker.MakeAckPacket(packet_num++, 2, 1)); | 
 |  | 
 |     if (VersionUsesHttp3(version_.transport_version)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker.MakeDataPacket( | 
 |               packet_num++, GetQpackDecoderStreamId(), | 
 |               /* should_include_version = */ true, | 
 |               /* fin = */ false, StreamCancellationQpackDecoderInstruction(0))); | 
 |     } | 
 |  | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker.MakeRstPacket( | 
 |             packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             quic::QUIC_STREAM_CANCELLED, | 
 |             /*include_stop_sending_if_v99=*/true)); | 
 |  | 
 |     if (VersionUsesHttp3(version_.transport_version) && | 
 |         base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker.MakePriorityPacket( | 
 |               packet_num++, true, GetNthClientInitiatedBidirectionalStreamId(1), | 
 |               0, quic::QuicStreamPriority::kDefaultUrgency)); | 
 |     } | 
 |  | 
 |     headers = client_maker.ConnectRequestHeaders("mail.example.org:443"); | 
 |     headers["proxy-authorization"] = "Basic Zm9vOmJheg=="; | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker.MakeRequestHeadersPacket( | 
 |             packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |             false, | 
 |             VersionUsesHttp3(version_.transport_version) | 
 |                 ? quic::QuicStreamPriority::kDefaultUrgency | 
 |                 : ConvertRequestPriorityToQuicPriority( | 
 |                       HttpProxyConnectJob::kH2QuicTunnelPriority), | 
 |             std::move(headers), GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             nullptr, false)); | 
 |  | 
 |     // Response to wrong password | 
 |     headers = server_maker.GetResponseHeaders("407"); | 
 |     headers["proxy-authenticate"] = "Basic realm=\"MyRealm1\""; | 
 |     headers["content-length"] = "10"; | 
 |     mock_quic_data.AddRead( | 
 |         ASYNC, server_maker.MakeResponseHeadersPacket( | 
 |                    3, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |                    false, std::move(headers), nullptr)); | 
 |     mock_quic_data.AddRead(SYNCHRONOUS, | 
 |                            ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |     if (VersionUsesHttp3(version_.transport_version)) { | 
 |       mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker.MakeAckAndDataPacket( | 
 |               packet_num++, false, GetQpackDecoderStreamId(), 3, 3, false, | 
 |               StreamCancellationQpackDecoderInstruction(1, false))); | 
 |       mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                               client_maker.MakeRstPacket( | 
 |                                   packet_num++, false, | 
 |                                   GetNthClientInitiatedBidirectionalStreamId(1), | 
 |                                   quic::QUIC_STREAM_CANCELLED)); | 
 |     } else { | 
 |       mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                               client_maker.MakeAckAndRstPacket( | 
 |                                   packet_num++, false, | 
 |                                   GetNthClientInitiatedBidirectionalStreamId(1), | 
 |                                   quic::QUIC_STREAM_CANCELLED, 3, 3)); | 
 |     } | 
 |  | 
 |     mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |     mock_quic_data.GetSequencedSocketData()->set_busy_before_sync_reads(true); | 
 |  | 
 |     CreateSession(); | 
 |  | 
 |     request_.url = GURL("https://mail.example.org/"); | 
 |     // Ensure that proxy authentication is attempted even | 
 |     // when privacy mode is enabled. | 
 |     request_.privacy_mode = PRIVACY_MODE_ENABLED; | 
 |     { | 
 |       HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |       RunTransaction(&trans); | 
 |  | 
 |       const HttpResponseInfo* response = trans.GetResponseInfo(); | 
 |       ASSERT_TRUE(response != nullptr); | 
 |       ASSERT_TRUE(response->headers.get() != nullptr); | 
 |       EXPECT_EQ("HTTP/1.1 407", response->headers->GetStatusLine()); | 
 |       EXPECT_TRUE(response->headers->IsKeepAlive()); | 
 |       EXPECT_EQ(407, response->headers->response_code()); | 
 |       EXPECT_EQ(10, response->headers->GetContentLength()); | 
 |       EXPECT_EQ(HttpVersion(1, 1), response->headers->GetHttpVersion()); | 
 |       absl::optional<AuthChallengeInfo> auth_challenge = | 
 |           response->auth_challenge; | 
 |       ASSERT_TRUE(auth_challenge.has_value()); | 
 |       EXPECT_TRUE(auth_challenge->is_proxy); | 
 |       EXPECT_EQ("https://proxy.example.org:70", | 
 |                 auth_challenge->challenger.Serialize()); | 
 |       EXPECT_EQ("MyRealm1", auth_challenge->realm); | 
 |       EXPECT_EQ("basic", auth_challenge->scheme); | 
 |  | 
 |       TestCompletionCallback callback; | 
 |       int rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBaz), | 
 |                                      callback.callback()); | 
 |       EXPECT_EQ(ERR_IO_PENDING, rv); | 
 |       EXPECT_EQ(OK, callback.WaitForResult()); | 
 |  | 
 |       response = trans.GetResponseInfo(); | 
 |       ASSERT_TRUE(response != nullptr); | 
 |       ASSERT_TRUE(response->headers.get() != nullptr); | 
 |       EXPECT_EQ("HTTP/1.1 407", response->headers->GetStatusLine()); | 
 |       EXPECT_TRUE(response->headers->IsKeepAlive()); | 
 |       EXPECT_EQ(407, response->headers->response_code()); | 
 |       EXPECT_EQ(10, response->headers->GetContentLength()); | 
 |       EXPECT_EQ(HttpVersion(1, 1), response->headers->GetHttpVersion()); | 
 |       auth_challenge = response->auth_challenge; | 
 |       ASSERT_TRUE(auth_challenge.has_value()); | 
 |       EXPECT_TRUE(auth_challenge->is_proxy); | 
 |       EXPECT_EQ("https://proxy.example.org:70", | 
 |                 auth_challenge->challenger.Serialize()); | 
 |       EXPECT_EQ("MyRealm1", auth_challenge->realm); | 
 |       EXPECT_EQ("basic", auth_challenge->scheme); | 
 |     } | 
 |     // HttpNetworkTransaction is torn down now that it's out of scope, causing | 
 |     // the QUIC stream to be cleaned up (since the proxy socket cannot be | 
 |     // reused because it's not connected). | 
 |     EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |     EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 |   } | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, QuicServerPushUpdatesPriority) { | 
 |   // Only run this test if HTTP/2 stream dependency info is sent by client (sent | 
 |   // in HEADERS frames for requests and PRIORITY frames). | 
 |   if (!client_headers_include_h2_stream_dependency_) { | 
 |     return; | 
 |   } | 
 |  | 
 |   if (quic::VersionUsesHttp3(version_.transport_version)) { | 
 |     // HTTP/3 currently doesn't support PRIORITY. | 
 |     return; | 
 |   } | 
 |  | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   const quic::QuicStreamId client_stream_0 = | 
 |       GetNthClientInitiatedBidirectionalStreamId(0); | 
 |   const quic::QuicStreamId client_stream_1 = | 
 |       GetNthClientInitiatedBidirectionalStreamId(1); | 
 |   const quic::QuicStreamId client_stream_2 = | 
 |       GetNthClientInitiatedBidirectionalStreamId(2); | 
 |   const quic::QuicStreamId push_stream_0 = | 
 |       GetNthServerInitiatedUnidirectionalStreamId(0); | 
 |   const quic::QuicStreamId push_stream_1 = | 
 |       GetNthServerInitiatedUnidirectionalStreamId(1); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |  | 
 |   // Client sends "GET" requests for "/0.png", "/1.png", "/2.png". | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, ConstructClientRequestHeadersPacket( | 
 |                        packet_num++, client_stream_0, true, true, HIGHEST, | 
 |                        GetRequestHeaders("GET", "https", "/0.jpg"), 0)); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, client_stream_1, true, true, MEDIUM, | 
 |           GetRequestHeaders("GET", "https", "/1.jpg"), client_stream_0)); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, client_stream_2, true, true, MEDIUM, | 
 |           GetRequestHeaders("GET", "https", "/2.jpg"), client_stream_1)); | 
 |  | 
 |   // Server replies "OK" for the three requests. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, client_stream_0, false, false, GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  2, client_stream_1, false, false, GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  3, client_stream_2, false, false, GetResponseHeaders("200"))); | 
 |  | 
 |   // Server sends two push promises associated with |client_stream_0|; client | 
 |   // responds with a PRIORITY frame after each to notify server of HTTP/2 stream | 
 |   // dependency info for each push promise stream. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerPushPromisePacket( | 
 |                  4, client_stream_0, push_stream_0, false, | 
 |                  GetRequestHeaders("GET", "https", "/pushed_0.jpg"))); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndPriorityFramesPacket( | 
 |           packet_num++, false, 4, 3, | 
 |           {{push_stream_0, client_stream_2, | 
 |             ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY)}})); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerPushPromisePacket( | 
 |                  5, client_stream_0, push_stream_1, false, | 
 |                  GetRequestHeaders("GET", "https", "/pushed_1.jpg"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckAndPriorityPacket( | 
 |                               packet_num++, false, | 
 |                               /*largest_received=*/5, /*smallest_received=*/4, | 
 |                               push_stream_1, push_stream_0, DEFAULT_PRIORITY)); | 
 |  | 
 |   // Server sends the response headers for the two push promises. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  6, push_stream_0, false, false, GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  7, push_stream_1, false, false, GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 7, 5)); | 
 |  | 
 |   // Request for "pushed_0.jpg" matches |push_stream_0|. |push_stream_0|'s | 
 |   // priority updates to match the request's priority. Client sends PRIORITY | 
 |   // frames to inform server of new HTTP/2 stream dependencies. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientPriorityFramesPacket( | 
 |           packet_num++, false, | 
 |           {{push_stream_1, client_stream_2, | 
 |             ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY)}, | 
 |            {push_stream_0, client_stream_0, | 
 |             ConvertRequestPriorityToQuicPriority(HIGHEST)}})); | 
 |  | 
 |   // Server sends data for the three requests and the two push promises. | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket(8, client_stream_0, false, true, | 
 |                                        ConstructDataFrame("hello 0!"))); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket(9, client_stream_1, false, true, | 
 |                                              ConstructDataFrame("hello 1!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 9, 8)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket(10, client_stream_2, false, true, | 
 |                                        ConstructDataFrame("hello 2!"))); | 
 |   mock_quic_data.AddRead(SYNCHRONOUS, ConstructServerDataPacket( | 
 |                                           11, push_stream_0, false, true, | 
 |                                           ConstructDataFrame("and hello 0!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 11, 10)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket(12, push_stream_1, false, true, | 
 |                                        ConstructDataFrame("and hello 1!"))); | 
 |  | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/0.jpg"); | 
 |   HttpNetworkTransaction trans_0(HIGHEST, session_.get()); | 
 |   TestCompletionCallback callback_0; | 
 |   EXPECT_EQ(ERR_IO_PENDING, trans_0.Start(&request_, callback_0.callback(), | 
 |                                           net_log_with_source_)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/1.jpg"); | 
 |   HttpNetworkTransaction trans_1(MEDIUM, session_.get()); | 
 |   TestCompletionCallback callback_1; | 
 |   EXPECT_EQ(ERR_IO_PENDING, trans_1.Start(&request_, callback_1.callback(), | 
 |                                           net_log_with_source_)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/2.jpg"); | 
 |   HttpNetworkTransaction trans_2(MEDIUM, session_.get()); | 
 |   TestCompletionCallback callback_2; | 
 |   EXPECT_EQ(ERR_IO_PENDING, trans_2.Start(&request_, callback_2.callback(), | 
 |                                           net_log_with_source_)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   // Client makes request that matches resource pushed in |pushed_stream_0|. | 
 |   request_.url = GURL("https://mail.example.org/pushed_0.jpg"); | 
 |   HttpNetworkTransaction trans_3(HIGHEST, session_.get()); | 
 |   TestCompletionCallback callback_3; | 
 |   EXPECT_EQ(ERR_IO_PENDING, trans_3.Start(&request_, callback_3.callback(), | 
 |                                           net_log_with_source_)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   EXPECT_TRUE(callback_0.have_result()); | 
 |   EXPECT_EQ(OK, callback_0.WaitForResult()); | 
 |   EXPECT_TRUE(callback_1.have_result()); | 
 |   EXPECT_EQ(OK, callback_1.WaitForResult()); | 
 |   EXPECT_TRUE(callback_2.have_result()); | 
 |   EXPECT_EQ(OK, callback_2.WaitForResult()); | 
 |  | 
 |   CheckResponseData(&trans_0, "hello 0!");      // Closes stream 5 | 
 |   CheckResponseData(&trans_1, "hello 1!");      // Closes stream 7 | 
 |   CheckResponseData(&trans_2, "hello 2!");      // Closes strema 9 | 
 |   CheckResponseData(&trans_3, "and hello 0!");  // Closes stream 2, sends RST | 
 |  | 
 |   mock_quic_data.Resume(); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Test that NetworkAnonymizationKey is respected by QUIC connections, when | 
 | // kPartitionConnectionsByNetworkIsolationKey is enabled. | 
 | TEST_P(QuicNetworkTransactionTest, NetworkIsolation) { | 
 |   const SchemefulSite kSite1(GURL("http://origin1/")); | 
 |   const SchemefulSite kSite2(GURL("http://origin2/")); | 
 |   NetworkIsolationKey network_isolation_key1(kSite1, kSite1); | 
 |   NetworkIsolationKey network_isolation_key2(kSite2, kSite2); | 
 |   NetworkAnonymizationKey network_anonymization_key1(kSite1, kSite1); | 
 |   NetworkAnonymizationKey network_anonymization_key2(kSite2, kSite2); | 
 |  | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   // Whether to use an H2 proxy. When false, uses HTTPS H2 requests without a | 
 |   // proxy, when true, uses HTTP requests over an H2 proxy. It's unnecessary to | 
 |   // test tunneled HTTPS over an H2 proxy, since that path sets up H2 sessions | 
 |   // the same way as the HTTP over H2 proxy case. | 
 |   for (bool use_proxy : {false, true}) { | 
 |     SCOPED_TRACE(use_proxy); | 
 |  | 
 |     if (use_proxy) { | 
 |       proxy_resolution_service_ = | 
 |           ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |               "QUIC mail.example.org:443", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |     } else { | 
 |       proxy_resolution_service_ = | 
 |           ConfiguredProxyResolutionService::CreateDirect(); | 
 |     } | 
 |  | 
 |     GURL url1; | 
 |     GURL url2; | 
 |     GURL url3; | 
 |     if (use_proxy) { | 
 |       url1 = GURL("http://mail.example.org/1"); | 
 |       url2 = GURL("http://mail.example.org/2"); | 
 |       url3 = GURL("http://mail.example.org/3"); | 
 |     } else { | 
 |       url1 = GURL("https://mail.example.org/1"); | 
 |       url2 = GURL("https://mail.example.org/2"); | 
 |       url3 = GURL("https://mail.example.org/3"); | 
 |     } | 
 |  | 
 |     for (bool partition_connections : {false, true}) { | 
 |       SCOPED_TRACE(partition_connections); | 
 |  | 
 |       base::test::ScopedFeatureList feature_list; | 
 |       if (partition_connections) { | 
 |         feature_list.InitAndEnableFeature( | 
 |             features::kPartitionConnectionsByNetworkIsolationKey); | 
 |       } else { | 
 |         feature_list.InitAndDisableFeature( | 
 |             features::kPartitionConnectionsByNetworkIsolationKey); | 
 |       } | 
 |  | 
 |       // Reads and writes for the unpartitioned case, where only one socket is | 
 |       // used. | 
 |  | 
 |       context_.params()->origins_to_force_quic_on.insert( | 
 |           HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |       MockQuicData unpartitioned_mock_quic_data(version_); | 
 |       QuicTestPacketMaker client_maker1( | 
 |           version_, | 
 |           quic::QuicUtils::CreateRandomConnectionId( | 
 |               context_.random_generator()), | 
 |           context_.clock(), kDefaultServerHostName, | 
 |           quic::Perspective::IS_CLIENT, | 
 |           client_headers_include_h2_stream_dependency_, true); | 
 |       QuicTestPacketMaker server_maker1( | 
 |           version_, | 
 |           quic::QuicUtils::CreateRandomConnectionId( | 
 |               context_.random_generator()), | 
 |           context_.clock(), kDefaultServerHostName, | 
 |           quic::Perspective::IS_SERVER, false); | 
 |  | 
 |       int packet_num = 1; | 
 |       if (VersionUsesHttp3(version_.transport_version)) { | 
 |         unpartitioned_mock_quic_data.AddWrite( | 
 |             SYNCHRONOUS, client_maker1.MakeInitialSettingsPacket(packet_num++)); | 
 |       } | 
 |  | 
 |       unpartitioned_mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker1.MakeRequestHeadersPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |               true, ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY), | 
 |               GetRequestHeaders("GET", url1.scheme(), "/1"), 0, nullptr)); | 
 |       unpartitioned_mock_quic_data.AddRead( | 
 |           ASYNC, server_maker1.MakeResponseHeadersPacket( | 
 |                      1, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                      false, GetResponseHeaders("200"), nullptr)); | 
 |       unpartitioned_mock_quic_data.AddRead( | 
 |           ASYNC, server_maker1.MakeDataPacket( | 
 |                      2, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                      true, ConstructDataFrame("1"))); | 
 |       unpartitioned_mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |  | 
 |       unpartitioned_mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker1.MakeRequestHeadersPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(1), | 
 |               false, true, | 
 |               ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY), | 
 |               GetRequestHeaders("GET", url2.scheme(), "/2"), 0, nullptr)); | 
 |       unpartitioned_mock_quic_data.AddRead( | 
 |           ASYNC, server_maker1.MakeResponseHeadersPacket( | 
 |                      3, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |                      false, GetResponseHeaders("200"), nullptr)); | 
 |       unpartitioned_mock_quic_data.AddRead( | 
 |           ASYNC, server_maker1.MakeDataPacket( | 
 |                      4, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |                      true, ConstructDataFrame("2"))); | 
 |       unpartitioned_mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, ConstructClientAckPacket(packet_num++, 4, 3)); | 
 |  | 
 |       unpartitioned_mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker1.MakeRequestHeadersPacket( | 
 |               packet_num++, GetNthClientInitiatedBidirectionalStreamId(2), | 
 |               false, true, | 
 |               ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY), | 
 |               GetRequestHeaders("GET", url3.scheme(), "/3"), 0, nullptr)); | 
 |       unpartitioned_mock_quic_data.AddRead( | 
 |           ASYNC, server_maker1.MakeResponseHeadersPacket( | 
 |                      5, GetNthClientInitiatedBidirectionalStreamId(2), false, | 
 |                      false, GetResponseHeaders("200"), nullptr)); | 
 |       unpartitioned_mock_quic_data.AddRead( | 
 |           ASYNC, server_maker1.MakeDataPacket( | 
 |                      6, GetNthClientInitiatedBidirectionalStreamId(2), false, | 
 |                      true, ConstructDataFrame("3"))); | 
 |       unpartitioned_mock_quic_data.AddWrite( | 
 |           SYNCHRONOUS, ConstructClientAckPacket(packet_num++, 6, 5)); | 
 |  | 
 |       unpartitioned_mock_quic_data.AddRead(SYNCHRONOUS, ERR_IO_PENDING); | 
 |  | 
 |       // Reads and writes for the partitioned case, where two sockets are used. | 
 |  | 
 |       MockQuicData partitioned_mock_quic_data1(version_); | 
 |       QuicTestPacketMaker client_maker2( | 
 |           version_, | 
 |           quic::QuicUtils::CreateRandomConnectionId( | 
 |               context_.random_generator()), | 
 |           context_.clock(), kDefaultServerHostName, | 
 |           quic::Perspective::IS_CLIENT, | 
 |           client_headers_include_h2_stream_dependency_, true); | 
 |       QuicTestPacketMaker server_maker2( | 
 |           version_, | 
 |           quic::QuicUtils::CreateRandomConnectionId( | 
 |               context_.random_generator()), | 
 |           context_.clock(), kDefaultServerHostName, | 
 |           quic::Perspective::IS_SERVER, false); | 
 |  | 
 |       int packet_num2 = 1; | 
 |       if (VersionUsesHttp3(version_.transport_version)) { | 
 |         partitioned_mock_quic_data1.AddWrite( | 
 |             SYNCHRONOUS, | 
 |             client_maker2.MakeInitialSettingsPacket(packet_num2++)); | 
 |       } | 
 |  | 
 |       partitioned_mock_quic_data1.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker2.MakeRequestHeadersPacket( | 
 |               packet_num2++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               true, true, | 
 |               ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY), | 
 |               GetRequestHeaders("GET", url1.scheme(), "/1"), 0, nullptr)); | 
 |       partitioned_mock_quic_data1.AddRead( | 
 |           ASYNC, server_maker2.MakeResponseHeadersPacket( | 
 |                      1, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                      false, GetResponseHeaders("200"), nullptr)); | 
 |       partitioned_mock_quic_data1.AddRead( | 
 |           ASYNC, server_maker2.MakeDataPacket( | 
 |                      2, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                      true, ConstructDataFrame("1"))); | 
 |       partitioned_mock_quic_data1.AddWrite( | 
 |           SYNCHRONOUS, client_maker2.MakeAckPacket(packet_num2++, 2, 1)); | 
 |  | 
 |       partitioned_mock_quic_data1.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker2.MakeRequestHeadersPacket( | 
 |               packet_num2++, GetNthClientInitiatedBidirectionalStreamId(1), | 
 |               false, true, | 
 |               ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY), | 
 |               GetRequestHeaders("GET", url3.scheme(), "/3"), 0, nullptr)); | 
 |       partitioned_mock_quic_data1.AddRead( | 
 |           ASYNC, server_maker2.MakeResponseHeadersPacket( | 
 |                      3, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |                      false, GetResponseHeaders("200"), nullptr)); | 
 |       partitioned_mock_quic_data1.AddRead( | 
 |           ASYNC, server_maker2.MakeDataPacket( | 
 |                      4, GetNthClientInitiatedBidirectionalStreamId(1), false, | 
 |                      true, ConstructDataFrame("3"))); | 
 |       partitioned_mock_quic_data1.AddWrite( | 
 |           SYNCHRONOUS, client_maker2.MakeAckPacket(packet_num2++, 4, 3)); | 
 |  | 
 |       partitioned_mock_quic_data1.AddRead(SYNCHRONOUS, ERR_IO_PENDING); | 
 |  | 
 |       MockQuicData partitioned_mock_quic_data2(version_); | 
 |       QuicTestPacketMaker client_maker3( | 
 |           version_, | 
 |           quic::QuicUtils::CreateRandomConnectionId( | 
 |               context_.random_generator()), | 
 |           context_.clock(), kDefaultServerHostName, | 
 |           quic::Perspective::IS_CLIENT, | 
 |           client_headers_include_h2_stream_dependency_, true); | 
 |       QuicTestPacketMaker server_maker3( | 
 |           version_, | 
 |           quic::QuicUtils::CreateRandomConnectionId( | 
 |               context_.random_generator()), | 
 |           context_.clock(), kDefaultServerHostName, | 
 |           quic::Perspective::IS_SERVER, false); | 
 |  | 
 |       int packet_num3 = 1; | 
 |       if (VersionUsesHttp3(version_.transport_version)) { | 
 |         partitioned_mock_quic_data2.AddWrite( | 
 |             SYNCHRONOUS, | 
 |             client_maker3.MakeInitialSettingsPacket(packet_num3++)); | 
 |       } | 
 |  | 
 |       partitioned_mock_quic_data2.AddWrite( | 
 |           SYNCHRONOUS, | 
 |           client_maker3.MakeRequestHeadersPacket( | 
 |               packet_num3++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |               true, true, | 
 |               ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY), | 
 |               GetRequestHeaders("GET", url2.scheme(), "/2"), 0, nullptr)); | 
 |       partitioned_mock_quic_data2.AddRead( | 
 |           ASYNC, server_maker3.MakeResponseHeadersPacket( | 
 |                      1, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                      false, GetResponseHeaders("200"), nullptr)); | 
 |       partitioned_mock_quic_data2.AddRead( | 
 |           ASYNC, server_maker3.MakeDataPacket( | 
 |                      2, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                      true, ConstructDataFrame("2"))); | 
 |       partitioned_mock_quic_data2.AddWrite( | 
 |           SYNCHRONOUS, client_maker3.MakeAckPacket(packet_num3++, 2, 1)); | 
 |  | 
 |       partitioned_mock_quic_data2.AddRead(SYNCHRONOUS, ERR_IO_PENDING); | 
 |  | 
 |       if (partition_connections) { | 
 |         partitioned_mock_quic_data1.AddSocketDataToFactory(&socket_factory_); | 
 |         partitioned_mock_quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |       } else { | 
 |         unpartitioned_mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |       } | 
 |  | 
 |       CreateSession(); | 
 |  | 
 |       TestCompletionCallback callback; | 
 |       HttpRequestInfo request1; | 
 |       request1.method = "GET"; | 
 |       request1.url = GURL(url1); | 
 |       request1.traffic_annotation = | 
 |           net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |       request1.network_isolation_key = network_isolation_key1; | 
 |       request1.network_anonymization_key = network_anonymization_key1; | 
 |       HttpNetworkTransaction trans1(LOWEST, session_.get()); | 
 |       int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource()); | 
 |       EXPECT_THAT(callback.GetResult(rv), IsOk()); | 
 |       std::string response_data1; | 
 |       EXPECT_THAT(ReadTransaction(&trans1, &response_data1), IsOk()); | 
 |       EXPECT_EQ("1", response_data1); | 
 |  | 
 |       HttpRequestInfo request2; | 
 |       request2.method = "GET"; | 
 |       request2.url = GURL(url2); | 
 |       request2.traffic_annotation = | 
 |           net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |       request2.network_isolation_key = network_isolation_key2; | 
 |       request2.network_anonymization_key = network_anonymization_key2; | 
 |       HttpNetworkTransaction trans2(LOWEST, session_.get()); | 
 |       rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); | 
 |       EXPECT_THAT(callback.GetResult(rv), IsOk()); | 
 |       std::string response_data2; | 
 |       EXPECT_THAT(ReadTransaction(&trans2, &response_data2), IsOk()); | 
 |       EXPECT_EQ("2", response_data2); | 
 |  | 
 |       HttpRequestInfo request3; | 
 |       request3.method = "GET"; | 
 |       request3.url = GURL(url3); | 
 |       request3.traffic_annotation = | 
 |           net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |       request3.network_isolation_key = network_isolation_key1; | 
 |       request3.network_anonymization_key = network_anonymization_key1; | 
 |  | 
 |       HttpNetworkTransaction trans3(LOWEST, session_.get()); | 
 |       rv = trans3.Start(&request3, callback.callback(), NetLogWithSource()); | 
 |       EXPECT_THAT(callback.GetResult(rv), IsOk()); | 
 |       std::string response_data3; | 
 |       EXPECT_THAT(ReadTransaction(&trans3, &response_data3), IsOk()); | 
 |       EXPECT_EQ("3", response_data3); | 
 |  | 
 |       if (partition_connections) { | 
 |         EXPECT_TRUE(partitioned_mock_quic_data1.AllReadDataConsumed()); | 
 |         EXPECT_TRUE(partitioned_mock_quic_data1.AllWriteDataConsumed()); | 
 |         EXPECT_TRUE(partitioned_mock_quic_data2.AllReadDataConsumed()); | 
 |         EXPECT_TRUE(partitioned_mock_quic_data2.AllWriteDataConsumed()); | 
 |       } else { | 
 |         EXPECT_TRUE(unpartitioned_mock_quic_data.AllReadDataConsumed()); | 
 |         EXPECT_TRUE(unpartitioned_mock_quic_data.AllWriteDataConsumed()); | 
 |       } | 
 |     } | 
 |   } | 
 | } | 
 |  | 
 | // Test that two requests to the same origin over QUIC tunnels use different | 
 | // QUIC sessions if their NetworkIsolationKeys don't match, and | 
 | // kPartitionConnectionsByNetworkIsolationKey is enabled. | 
 | TEST_P(QuicNetworkTransactionTest, NetworkIsolationTunnel) { | 
 |   base::test::ScopedFeatureList feature_list; | 
 |   feature_list.InitAndEnableFeature( | 
 |       features::kPartitionConnectionsByNetworkIsolationKey); | 
 |  | 
 |   session_params_.enable_quic = true; | 
 |   session_params_.enable_quic_proxies_for_https_urls = true; | 
 |   proxy_resolution_service_ = | 
 |       ConfiguredProxyResolutionService::CreateFixedFromPacResultForTest( | 
 |           "QUIC proxy.example.org:70", TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |  | 
 |   const char kGetRequest[] = | 
 |       "GET / HTTP/1.1\r\n" | 
 |       "Host: mail.example.org\r\n" | 
 |       "Connection: keep-alive\r\n\r\n"; | 
 |   const char kGetResponse[] = | 
 |       "HTTP/1.1 200 OK\r\n" | 
 |       "Content-Length: 10\r\n\r\n"; | 
 |  | 
 |   std::unique_ptr<MockQuicData> mock_quic_data[2] = { | 
 |       std::make_unique<MockQuicData>(version_), | 
 |       std::make_unique<MockQuicData>(version_)}; | 
 |  | 
 |   for (int index : {0, 1}) { | 
 |     QuicTestPacketMaker client_maker( | 
 |         version_, | 
 |         quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |         context_.clock(), kDefaultServerHostName, quic::Perspective::IS_CLIENT, | 
 |         client_headers_include_h2_stream_dependency_, true); | 
 |     QuicTestPacketMaker server_maker( | 
 |         version_, | 
 |         quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |         context_.clock(), kDefaultServerHostName, quic::Perspective::IS_SERVER, | 
 |         false); | 
 |  | 
 |     int packet_num = 1; | 
 |     if (VersionUsesHttp3(version_.transport_version)) { | 
 |       mock_quic_data[index]->AddWrite( | 
 |           SYNCHRONOUS, client_maker.MakeInitialSettingsPacket(packet_num++)); | 
 |  | 
 |       if (base::FeatureList::IsEnabled(features::kPriorityIncremental)) { | 
 |         mock_quic_data[index]->AddWrite( | 
 |             SYNCHRONOUS, client_maker.MakePriorityPacket( | 
 |                              packet_num++, true, | 
 |                              GetNthClientInitiatedBidirectionalStreamId(0), 0, | 
 |                              quic::QuicStreamPriority::kDefaultUrgency)); | 
 |       } | 
 |     } | 
 |  | 
 |     std::cout << "MakeRequestHeadersPacket\n"; | 
 |     mock_quic_data[index]->AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker.MakeRequestHeadersPacket( | 
 |             packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |             false, | 
 |             VersionUsesHttp3(version_.transport_version) | 
 |                 ? quic::QuicStreamPriority::kDefaultUrgency | 
 |                 : ConvertRequestPriorityToQuicPriority( | 
 |                       HttpProxyConnectJob::kH2QuicTunnelPriority), | 
 |             ConnectRequestHeaders("mail.example.org:443"), 0, nullptr, false)); | 
 |     mock_quic_data[index]->AddRead( | 
 |         ASYNC, server_maker.MakeResponseHeadersPacket( | 
 |                    1, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                    false, GetResponseHeaders("200"), nullptr)); | 
 |  | 
 |     mock_quic_data[index]->AddWrite( | 
 |         SYNCHRONOUS, | 
 |         client_maker.MakeAckAndDataPacket( | 
 |             packet_num++, false, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |             1, 1, false, ConstructDataFrame(kGetRequest))); | 
 |  | 
 |     mock_quic_data[index]->AddRead( | 
 |         ASYNC, server_maker.MakeDataPacket( | 
 |                    2, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                    false, ConstructDataFrame(kGetResponse))); | 
 |     mock_quic_data[index]->AddRead( | 
 |         SYNCHRONOUS, server_maker.MakeDataPacket( | 
 |                          3, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |                          false, false, ConstructDataFrame("0123456789"))); | 
 |     mock_quic_data[index]->AddWrite( | 
 |         SYNCHRONOUS, client_maker.MakeAckPacket(packet_num++, 3, 2)); | 
 |     mock_quic_data[index]->AddRead(SYNCHRONOUS, | 
 |                                    ERR_IO_PENDING);  // No more data to read | 
 |  | 
 |     mock_quic_data[index]->AddSocketDataToFactory(&socket_factory_); | 
 |   } | 
 |  | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |   SSLSocketDataProvider ssl_data2(ASYNC, OK); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data2); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.url = GURL("https://mail.example.org/"); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   RunTransaction(&trans); | 
 |   CheckResponseData(&trans, "0123456789"); | 
 |  | 
 |   HttpRequestInfo request2; | 
 |   const SchemefulSite kSite1(GURL("http://origin1/")); | 
 |   request_.network_isolation_key = NetworkIsolationKey(kSite1, kSite1); | 
 |   request_.network_anonymization_key = NetworkAnonymizationKey(kSite1, kSite1); | 
 |   HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session_.get()); | 
 |   RunTransaction(&trans2); | 
 |   CheckResponseData(&trans2, "0123456789"); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data[0]->AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data[0]->AllWriteDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data[1]->AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data[1]->AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, AllowHTTP1FalseProhibitsH1) { | 
 |   MockRead http_reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING), | 
 |                            MockRead(ASYNC, OK)}; | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   request_.method = "POST"; | 
 |   UploadDataStreamNotAllowHTTP1 upload_data(""); | 
 |   request_.upload_data_stream = &upload_data; | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_H2_OR_QUIC_REQUIRED)); | 
 | } | 
 |  | 
 | // Confirm mock class UploadDataStreamNotAllowHTTP1 can upload content over | 
 | // QUIC. | 
 | TEST_P(QuicNetworkTransactionTest, AllowHTTP1MockTest) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int write_packet_index = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_index++)); | 
 |   } | 
 |   const std::string upload_content = "foo"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersAndDataFramesPacket( | 
 |           write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, DEFAULT_PRIORITY, GetRequestHeaders("POST", "https", "/"), | 
 |           0, nullptr, {ConstructDataFrame(upload_content)})); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |  | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |  | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(write_packet_index++, 2, 1)); | 
 |  | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // The non-alternate protocol job needs to hang in order to guarantee that | 
 |   // the alternate-protocol job will "win". | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |   request_.method = "POST"; | 
 |   UploadDataStreamNotAllowHTTP1 upload_data(upload_content); | 
 |   request_.upload_data_stream = &upload_data; | 
 |  | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 | } | 
 |  | 
 | // TODO(crbug.com/1347664): This test is failing on various platforms. | 
 | TEST_P(QuicNetworkTransactionTest, DISABLED_AllowHTTP1UploadPauseAndResume) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Hanging read | 
 |   int write_packet_index = 1; | 
 |   mock_quic_data.AddWrite( | 
 |       ASYNC, client_maker_->MakeDummyCHLOPacket(write_packet_index++)); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_index++)); | 
 |   } | 
 |   const std::string upload_content = "foo"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersAndDataFramesPacket( | 
 |           write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, DEFAULT_PRIORITY, GetRequestHeaders("POST", "https", "/"), | 
 |           0, nullptr, {ConstructDataFrame(upload_content)})); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerResponseHeadersPacket( | 
 |                        1, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        false, GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket( | 
 |                        2, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        true, ConstructDataFrame("hello!"))); | 
 |  | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(write_packet_index++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |   SequencedSocketData* socket_data = mock_quic_data.GetSequencedSocketData(); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); | 
 |  | 
 |   // Set up request. | 
 |   request_.method = "POST"; | 
 |   UploadDataStreamNotAllowHTTP1 upload_data(upload_content); | 
 |   request_.upload_data_stream = &upload_data; | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   // Resume QUIC job | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   socket_data->Resume(); | 
 |  | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   CheckResponseData(&trans, "hello!"); | 
 | } | 
 |  | 
 | // TODO(crbug.com/1347664): This test is failing on various platforms. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        DISABLED_AllowHTTP1UploadFailH1AndResumeQuic) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   // This test confirms failed main job should not bother quic job. | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("1.1 Body"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // Hanging read | 
 |   int write_packet_index = 1; | 
 |   mock_quic_data.AddWrite( | 
 |       ASYNC, client_maker_->MakeDummyCHLOPacket(write_packet_index++)); | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite( | 
 |         SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_index++)); | 
 |   } | 
 |   const std::string upload_content = "foo"; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersAndDataFramesPacket( | 
 |           write_packet_index++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, DEFAULT_PRIORITY, GetRequestHeaders("POST", "https", "/"), | 
 |           0, nullptr, {ConstructDataFrame(upload_content)})); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerResponseHeadersPacket( | 
 |                        1, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        false, GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       SYNCHRONOUS, ConstructServerDataPacket( | 
 |                        2, GetNthClientInitiatedBidirectionalStreamId(0), false, | 
 |                        true, ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(write_packet_index++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |   SequencedSocketData* socket_data = mock_quic_data.GetSequencedSocketData(); | 
 |  | 
 |   // This packet won't be read because AllowHTTP1:false doesn't allow H/1 | 
 |   // connection. | 
 |   MockRead http_reads2[] = {MockRead("HTTP/1.1 200 OK\r\n")}; | 
 |   StaticSocketDataProvider http_data2(http_reads2, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data2); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   // Send the first request via TCP and set up alternative service (QUIC) for | 
 |   // the origin. | 
 |   SendRequestAndExpectHttpResponse("1.1 Body"); | 
 |  | 
 |   // Settings to resume main H/1 job quickly while pausing quic job. | 
 |   AddQuicAlternateProtocolMapping( | 
 |       MockCryptoClientStream::COLD_START_WITH_CHLO_SENT); | 
 |   ServerNetworkStats stats1; | 
 |   stats1.srtt = base::Microseconds(10); | 
 |   http_server_properties_->SetServerNetworkStats( | 
 |       url::SchemeHostPort(request_.url), NetworkAnonymizationKey(), stats1); | 
 |  | 
 |   // Set up request. | 
 |   request_.method = "POST"; | 
 |   UploadDataStreamNotAllowHTTP1 upload_data(upload_content); | 
 |   request_.upload_data_stream = &upload_data; | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   // Confirm TCP job was resumed. | 
 |   // We can not check its failure because HttpStreamFactory::JobController. | 
 |   // main_job_net_error is not exposed. | 
 |   while (socket_factory_.mock_data().next_index() < 3u) | 
 |     base::RunLoop().RunUntilIdle(); | 
 |   // Resume QUIC job. | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   socket_data->Resume(); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |   CheckResponseData(&trans, "hello!"); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, IncorrectHttp3GoAway) { | 
 |   if (!version_.HasIetfQuicFrames()) { | 
 |     return; | 
 |   } | 
 |  | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int write_packet_number = 1; | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_number++)); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           write_packet_number++, GetNthClientInitiatedBidirectionalStreamId(0), | 
 |           true, true, GetRequestHeaders("GET", "https", "/"))); | 
 |  | 
 |   int read_packet_number = 1; | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, server_maker_.MakeInitialSettingsPacket(read_packet_number++)); | 
 |   // The GOAWAY frame sent by the server MUST have a stream ID corresponding to | 
 |   // a client-initiated bidirectional stream.  Any other kind of stream ID | 
 |   // should cause the client to close the connection. | 
 |   quic::GoAwayFrame goaway{3}; | 
 |   auto goaway_buffer = quic::HttpEncoder::SerializeGoAwayFrame(goaway); | 
 |   const quic::QuicStreamId control_stream_id = | 
 |       quic::QuicUtils::GetFirstUnidirectionalStreamId( | 
 |           version_.transport_version, quic::Perspective::IS_SERVER); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket(read_packet_number++, control_stream_id, | 
 |                                        false, false, goaway_buffer)); | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientAckAndConnectionClosePacket( | 
 |           write_packet_number++, 2, 4, quic::QUIC_HTTP_GOAWAY_INVALID_STREAM_ID, | 
 |           "GOAWAY with invalid stream ID", 0)); | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // In order for a new QUIC session to be established via alternate-protocol | 
 |   // without racing an HTTP connection, we need the host resolution to happen | 
 |   // synchronously.  Of course, even though QUIC *could* perform a 0-RTT | 
 |   // connection to the the server, in this test we require confirmation | 
 |   // before encrypting so the HTTP job will still start. | 
 |   host_resolver_.set_synchronous_mode(true); | 
 |   host_resolver_.rules()->AddIPLiteralRule("mail.example.org", "192.168.0.1", | 
 |                                            ""); | 
 |  | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |  | 
 |   HttpNetworkTransaction trans(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback; | 
 |   int rv = trans.Start(&request_, callback.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   crypto_client_stream_factory_.last_stream() | 
 |       ->NotifySessionOneRttKeyAvailable(); | 
 |   EXPECT_THAT(callback.WaitForResult(), IsError(ERR_QUIC_PROTOCOL_ERROR)); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |  | 
 |   NetErrorDetails details; | 
 |   trans.PopulateNetErrorDetails(&details); | 
 |   EXPECT_THAT(details.quic_connection_error, | 
 |               quic::test::IsError(quic::QUIC_HTTP_GOAWAY_INVALID_STREAM_ID)); | 
 | } | 
 |  | 
 | TEST_P(QuicNetworkTransactionTest, RetryOnHttp3GoAway) { | 
 |   if (!version_.HasIetfQuicFrames()) { | 
 |     return; | 
 |   } | 
 |  | 
 |   MockQuicData mock_quic_data1(version_); | 
 |   int write_packet_number1 = 1; | 
 |   mock_quic_data1.AddWrite( | 
 |       SYNCHRONOUS, ConstructInitialSettingsPacket(write_packet_number1++)); | 
 |   const quic::QuicStreamId stream_id1 = | 
 |       GetNthClientInitiatedBidirectionalStreamId(0); | 
 |   mock_quic_data1.AddWrite(SYNCHRONOUS, | 
 |                            ConstructClientRequestHeadersPacket( | 
 |                                write_packet_number1++, stream_id1, true, true, | 
 |                                GetRequestHeaders("GET", "https", "/"))); | 
 |   const quic::QuicStreamId stream_id2 = | 
 |       GetNthClientInitiatedBidirectionalStreamId(1); | 
 |   mock_quic_data1.AddWrite(SYNCHRONOUS, | 
 |                            ConstructClientRequestHeadersPacket( | 
 |                                write_packet_number1++, stream_id2, true, true, | 
 |                                GetRequestHeaders("GET", "https", "/foo"))); | 
 |  | 
 |   int read_packet_number1 = 1; | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, server_maker_.MakeInitialSettingsPacket(read_packet_number1++)); | 
 |  | 
 |   // GOAWAY with stream_id2 informs the client that stream_id2 (and streams with | 
 |   // larger IDs) have not been processed and can safely be retried. | 
 |   quic::GoAwayFrame goaway{stream_id2}; | 
 |   auto goaway_buffer = quic::HttpEncoder::SerializeGoAwayFrame(goaway); | 
 |   const quic::QuicStreamId control_stream_id = | 
 |       quic::QuicUtils::GetFirstUnidirectionalStreamId( | 
 |           version_.transport_version, quic::Perspective::IS_SERVER); | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, ConstructServerDataPacket(read_packet_number1++, control_stream_id, | 
 |                                        false, false, goaway_buffer)); | 
 |   mock_quic_data1.AddWrite( | 
 |       ASYNC, ConstructClientAckPacket(write_packet_number1++, 2, 1)); | 
 |  | 
 |   // Response to first request is accepted after GOAWAY. | 
 |   mock_quic_data1.AddRead(ASYNC, ConstructServerResponseHeadersPacket( | 
 |                                      read_packet_number1++, stream_id1, false, | 
 |                                      false, GetResponseHeaders("200"))); | 
 |   mock_quic_data1.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  read_packet_number1++, stream_id1, false, true, | 
 |                  ConstructDataFrame("response on the first connection"))); | 
 |   mock_quic_data1.AddWrite( | 
 |       ASYNC, ConstructClientAckPacket(write_packet_number1++, 4, 1)); | 
 |   // Make socket hang to make sure connection stays in connection pool. | 
 |   // This should not prevent the retry from opening a new connection. | 
 |   mock_quic_data1.AddRead(ASYNC, ERR_IO_PENDING); | 
 |   mock_quic_data1.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |   mock_quic_data1.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   // Second request is retried on a new connection. | 
 |   MockQuicData mock_quic_data2(version_); | 
 |   QuicTestPacketMaker client_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), kDefaultServerHostName, quic::Perspective::IS_CLIENT, | 
 |       client_headers_include_h2_stream_dependency_, true); | 
 |   int write_packet_number2 = 1; | 
 |   mock_quic_data2.AddWrite(SYNCHRONOUS, client_maker2.MakeInitialSettingsPacket( | 
 |                                             write_packet_number2++)); | 
 |   spdy::SpdyPriority priority = | 
 |       ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); | 
 |   mock_quic_data2.AddWrite( | 
 |       SYNCHRONOUS, client_maker2.MakeRequestHeadersPacket( | 
 |                        write_packet_number2++, stream_id1, true, true, priority, | 
 |                        GetRequestHeaders("GET", "https", "/foo"), 0, nullptr)); | 
 |  | 
 |   QuicTestPacketMaker server_maker2( | 
 |       version_, | 
 |       quic::QuicUtils::CreateRandomConnectionId(context_.random_generator()), | 
 |       context_.clock(), kDefaultServerHostName, quic::Perspective::IS_SERVER, | 
 |       false); | 
 |   int read_packet_number2 = 1; | 
 |   mock_quic_data2.AddRead(ASYNC, | 
 |                           server_maker2.MakeResponseHeadersPacket( | 
 |                               read_packet_number2++, stream_id1, false, false, | 
 |                               GetResponseHeaders("200"), nullptr)); | 
 |   mock_quic_data2.AddRead( | 
 |       ASYNC, server_maker2.MakeDataPacket( | 
 |                  read_packet_number2++, stream_id1, false, true, | 
 |                  ConstructDataFrame("response on the second connection"))); | 
 |   mock_quic_data2.AddWrite( | 
 |       ASYNC, client_maker2.MakeAckPacket(write_packet_number2++, 2, 1)); | 
 |   mock_quic_data2.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data2.AddRead(ASYNC, 0);               // EOF | 
 |   mock_quic_data2.AddSocketDataToFactory(&socket_factory_); | 
 |  | 
 |   AddHangingNonAlternateProtocolSocketData(); | 
 |   CreateSession(); | 
 |   AddQuicAlternateProtocolMapping(MockCryptoClientStream::CONFIRM_HANDSHAKE); | 
 |  | 
 |   HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback1; | 
 |   int rv = trans1.Start(&request_, callback1.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   HttpRequestInfo request2; | 
 |   request2.method = "GET"; | 
 |   std::string url("https://"); | 
 |   url.append(kDefaultServerHostName); | 
 |   url.append("/foo"); | 
 |   request2.url = GURL(url); | 
 |   request2.load_flags = 0; | 
 |   request2.traffic_annotation = | 
 |       net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |   HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session_.get()); | 
 |   TestCompletionCallback callback2; | 
 |   rv = trans2.Start(&request2, callback2.callback(), net_log_with_source_); | 
 |   EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |  | 
 |   EXPECT_THAT(callback1.WaitForResult(), IsOk()); | 
 |   CheckResponseData(&trans1, "response on the first connection"); | 
 |  | 
 |   EXPECT_THAT(callback2.WaitForResult(), IsOk()); | 
 |   CheckResponseData(&trans2, "response on the second connection"); | 
 |  | 
 |   mock_quic_data1.Resume(); | 
 |   mock_quic_data2.Resume(); | 
 |   EXPECT_TRUE(mock_quic_data1.AllWriteDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data1.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data2.AllWriteDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data2.AllReadDataConsumed()); | 
 | } | 
 |  | 
 | // TODO(yoichio):  Add the TCP job reuse case. See crrev.com/c/2174099. | 
 |  | 
 | #if BUILDFLAG(ENABLE_WEBSOCKETS) | 
 |  | 
 | // This test verifies that when there is an HTTP/3 connection open to a server, | 
 | // a WebSocket request does not use it, but instead opens a new connection with | 
 | // HTTP/1. | 
 | TEST_P(QuicNetworkTransactionTest, WebsocketOpensNewConnectionWithHttp1) { | 
 |   context_.params()->origins_to_force_quic_on.insert( | 
 |       HostPortPair::FromString("mail.example.org:443")); | 
 |   context_.params()->retry_without_alt_svc_on_quic_errors = false; | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |  | 
 |   client_maker_->SetEncryptionLevel(quic::ENCRYPTION_FORWARD_SECURE); | 
 |  | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |  | 
 |   spdy::SpdyPriority priority = | 
 |       ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); | 
 |  | 
 |   // The request will initially go out over HTTP/3. | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       client_maker_->MakeRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, priority, GetRequestHeaders("GET", "https", "/"), 0, nullptr)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, server_maker_.MakeResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  server_maker_.GetResponseHeaders("200"), nullptr)); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, server_maker_.MakeDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read. | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockWrite http_writes[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, | 
 |                 "GET / HTTP/1.1\r\n" | 
 |                 "Host: mail.example.org\r\n" | 
 |                 "Connection: Upgrade\r\n" | 
 |                 "Upgrade: websocket\r\n" | 
 |                 "Origin: http://mail.example.org\r\n" | 
 |                 "Sec-WebSocket-Version: 13\r\n" | 
 |                 "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" | 
 |                 "Sec-WebSocket-Extensions: permessage-deflate; " | 
 |                 "client_max_window_bits\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads[] = { | 
 |       MockRead(SYNCHRONOUS, 1, | 
 |                "HTTP/1.1 101 Switching Protocols\r\n" | 
 |                "Upgrade: websocket\r\n" | 
 |                "Connection: Upgrade\r\n" | 
 |                "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")}; | 
 |  | 
 |   SequencedSocketData http_data(http_reads, http_writes); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   TestCompletionCallback callback1; | 
 |   HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session_.get()); | 
 |   int rv = trans1.Start(&request_, callback1.callback(), net_log_with_source_); | 
 |   ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   rv = callback1.WaitForResult(); | 
 |   ASSERT_THAT(rv, IsOk()); | 
 |  | 
 |   const HttpResponseInfo* response = trans1.GetResponseInfo(); | 
 |   ASSERT_TRUE(response->headers); | 
 |   EXPECT_TRUE(response->was_fetched_via_spdy); | 
 |   EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); | 
 |  | 
 |   std::string response_data; | 
 |   rv = ReadTransaction(&trans1, &response_data); | 
 |   EXPECT_THAT(rv, IsOk()); | 
 |   EXPECT_EQ("hello!", response_data); | 
 |  | 
 |   HttpRequestInfo request2; | 
 |   request2.method = "GET"; | 
 |   request2.url = GURL("wss://mail.example.org/"); | 
 |   request2.traffic_annotation = | 
 |       net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |   EXPECT_TRUE(HostPortPair::FromURL(request_.url) | 
 |                   .Equals(HostPortPair::FromURL(request2.url))); | 
 |   request2.extra_headers.SetHeader("Connection", "Upgrade"); | 
 |   request2.extra_headers.SetHeader("Upgrade", "websocket"); | 
 |   request2.extra_headers.SetHeader("Origin", "http://mail.example.org"); | 
 |   request2.extra_headers.SetHeader("Sec-WebSocket-Version", "13"); | 
 |  | 
 |   TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; | 
 |  | 
 |   HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session_.get()); | 
 |   trans2.SetWebSocketHandshakeStreamCreateHelper( | 
 |       &websocket_stream_create_helper); | 
 |  | 
 |   TestCompletionCallback callback2; | 
 |   rv = trans2.Start(&request2, callback2.callback(), net_log_with_source_); | 
 |   ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   rv = callback2.WaitForResult(); | 
 |   ASSERT_THAT(rv, IsOk()); | 
 |  | 
 |   ASSERT_FALSE(mock_quic_data.AllReadDataConsumed()); | 
 |   mock_quic_data.Resume(); | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | // Much like above, but for Alt-Svc QUIC. | 
 | TEST_P(QuicNetworkTransactionTest, | 
 |        WebsocketOpensNewConnectionWithHttp1AfterAltSvcQuic) { | 
 |   if (version_.AlpnDeferToRFCv1()) { | 
 |     // These versions currently do not support Alt-Svc. | 
 |     return; | 
 |   } | 
 |   MockRead http_reads[] = { | 
 |       MockRead("HTTP/1.1 200 OK\r\n"), MockRead(alt_svc_header_.data()), | 
 |       MockRead("hello world"), | 
 |       MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), | 
 |       MockRead(ASYNC, OK)}; | 
 |  | 
 |   StaticSocketDataProvider http_data(http_reads, base::span<MockWrite>()); | 
 |   socket_factory_.AddSocketDataProvider(&http_data); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockQuicData mock_quic_data(version_); | 
 |   int packet_num = 1; | 
 |   if (VersionUsesHttp3(version_.transport_version)) { | 
 |     mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                             ConstructInitialSettingsPacket(packet_num++)); | 
 |   } | 
 |   mock_quic_data.AddWrite( | 
 |       SYNCHRONOUS, | 
 |       ConstructClientRequestHeadersPacket( | 
 |           packet_num++, GetNthClientInitiatedBidirectionalStreamId(0), true, | 
 |           true, GetRequestHeaders("GET", "https", "/"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerResponseHeadersPacket( | 
 |                  1, GetNthClientInitiatedBidirectionalStreamId(0), false, false, | 
 |                  GetResponseHeaders("200"))); | 
 |   mock_quic_data.AddRead( | 
 |       ASYNC, ConstructServerDataPacket( | 
 |                  2, GetNthClientInitiatedBidirectionalStreamId(0), false, true, | 
 |                  ConstructDataFrame("hello!"))); | 
 |   mock_quic_data.AddWrite(SYNCHRONOUS, | 
 |                           ConstructClientAckPacket(packet_num++, 2, 1)); | 
 |   mock_quic_data.AddRead(ASYNC, ERR_IO_PENDING);  // No more data to read | 
 |   mock_quic_data.AddRead(ASYNC, ERR_CONNECTION_CLOSED); | 
 |  | 
 |   mock_quic_data.AddSocketDataToFactory(&socket_factory_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   MockWrite http_writes2[] = { | 
 |       MockWrite(SYNCHRONOUS, 0, | 
 |                 "GET / HTTP/1.1\r\n" | 
 |                 "Host: mail.example.org\r\n" | 
 |                 "Connection: Upgrade\r\n" | 
 |                 "Upgrade: websocket\r\n" | 
 |                 "Origin: http://mail.example.org\r\n" | 
 |                 "Sec-WebSocket-Version: 13\r\n" | 
 |                 "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" | 
 |                 "Sec-WebSocket-Extensions: permessage-deflate; " | 
 |                 "client_max_window_bits\r\n\r\n")}; | 
 |  | 
 |   MockRead http_reads2[] = { | 
 |       MockRead(SYNCHRONOUS, 1, | 
 |                "HTTP/1.1 101 Switching Protocols\r\n" | 
 |                "Upgrade: websocket\r\n" | 
 |                "Connection: Upgrade\r\n" | 
 |                "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")}; | 
 |  | 
 |   SequencedSocketData http_data2(http_reads2, http_writes2); | 
 |   socket_factory_.AddSocketDataProvider(&http_data2); | 
 |   AddCertificate(&ssl_data_); | 
 |   socket_factory_.AddSSLSocketDataProvider(&ssl_data_); | 
 |  | 
 |   CreateSession(); | 
 |  | 
 |   SendRequestAndExpectHttpResponse("hello world"); | 
 |   SendRequestAndExpectQuicResponse("hello!"); | 
 |  | 
 |   HttpRequestInfo request2; | 
 |   request2.method = "GET"; | 
 |   request2.url = GURL("wss://mail.example.org/"); | 
 |   request2.traffic_annotation = | 
 |       net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); | 
 |   EXPECT_TRUE(HostPortPair::FromURL(request_.url) | 
 |                   .Equals(HostPortPair::FromURL(request2.url))); | 
 |   request2.extra_headers.SetHeader("Connection", "Upgrade"); | 
 |   request2.extra_headers.SetHeader("Upgrade", "websocket"); | 
 |   request2.extra_headers.SetHeader("Origin", "http://mail.example.org"); | 
 |   request2.extra_headers.SetHeader("Sec-WebSocket-Version", "13"); | 
 |  | 
 |   TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; | 
 |  | 
 |   HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session_.get()); | 
 |   trans2.SetWebSocketHandshakeStreamCreateHelper( | 
 |       &websocket_stream_create_helper); | 
 |  | 
 |   TestCompletionCallback callback2; | 
 |   int rv = trans2.Start(&request2, callback2.callback(), net_log_with_source_); | 
 |   ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); | 
 |   rv = callback2.WaitForResult(); | 
 |   ASSERT_THAT(rv, IsOk()); | 
 |   ASSERT_FALSE(mock_quic_data.AllReadDataConsumed()); | 
 |   mock_quic_data.Resume(); | 
 |   // Run the QUIC session to completion. | 
 |   base::RunLoop().RunUntilIdle(); | 
 |  | 
 |   EXPECT_TRUE(mock_quic_data.AllReadDataConsumed()); | 
 |   EXPECT_TRUE(mock_quic_data.AllWriteDataConsumed()); | 
 | } | 
 |  | 
 | #endif  // BUILDFLAG(ENABLE_WEBSOCKETS) | 
 |  | 
 | }  // namespace net::test |