2015-01-18 15:50:20 +01:00
|
|
|
package nghttp2
|
|
|
|
|
|
|
|
import (
|
2015-01-25 07:36:14 +01:00
|
|
|
"crypto/tls"
|
2015-01-18 15:50:20 +01:00
|
|
|
"fmt"
|
|
|
|
"github.com/bradfitz/http2"
|
2015-01-19 13:24:18 +01:00
|
|
|
"github.com/bradfitz/http2/hpack"
|
2015-01-20 14:55:01 +01:00
|
|
|
"io"
|
2015-01-19 14:20:56 +01:00
|
|
|
"io/ioutil"
|
2015-01-18 15:50:20 +01:00
|
|
|
"net/http"
|
2015-01-21 17:43:56 +01:00
|
|
|
"syscall"
|
2015-01-18 15:50:20 +01:00
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH1H2PlainGET tests whether simple HTTP/2 GET request works.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1PlainGET(t *testing.T) {
|
2015-01-18 15:50:20 +01:00
|
|
|
st := newServerTester(nil, t, noopHandler)
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
2015-01-20 14:25:56 +01:00
|
|
|
name: "TestH2H1PlainGET",
|
2015-01-18 15:50:20 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-18 15:50:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
want := 200
|
|
|
|
if res.status != want {
|
|
|
|
t.Errorf("status = %v; want %v", res.status, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1AddXff tests that server generates X-Forwarded-For header
|
|
|
|
// field when forwarding request to backend.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1AddXff(t *testing.T) {
|
2015-01-18 15:50:20 +01:00
|
|
|
st := newServerTester([]string{"--add-x-forwarded-for"}, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
xff := r.Header.Get("X-Forwarded-For")
|
|
|
|
want := "127.0.0.1"
|
|
|
|
if xff != want {
|
|
|
|
t.Errorf("X-Forwarded-For = %v; want %v", xff, want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
_, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1AddXff",
|
2015-01-18 15:50:20 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-18 15:50:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1AddXff2 tests that server appends X-Forwarded-For header
|
|
|
|
// field to existing one when forwarding request to backend.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1AddXff2(t *testing.T) {
|
2015-01-18 15:50:20 +01:00
|
|
|
st := newServerTester([]string{"--add-x-forwarded-for"}, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
xff := r.Header.Get("X-Forwarded-For")
|
|
|
|
want := "host, 127.0.0.1"
|
|
|
|
if xff != want {
|
|
|
|
t.Errorf("X-Forwarded-For = %v; want %v", xff, want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
_, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1AddXff2",
|
2015-01-19 13:24:18 +01:00
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("x-forwarded-for", "host"),
|
2015-01-18 15:50:20 +01:00
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-18 15:50:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1StripXff tests that --strip-incoming-x-forwarded-for
|
|
|
|
// option.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1StripXff(t *testing.T) {
|
2015-01-18 15:50:20 +01:00
|
|
|
st := newServerTester([]string{"--strip-incoming-x-forwarded-for"}, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if xff, found := r.Header["X-Forwarded-For"]; found {
|
|
|
|
t.Errorf("X-Forwarded-For = %v; want nothing", xff)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
_, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1StripXff1",
|
2015-01-19 13:24:18 +01:00
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("x-forwarded-for", "host"),
|
2015-01-18 15:50:20 +01:00
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-18 15:50:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1StripAddXff tests that --strip-incoming-x-forwarded-for and
|
|
|
|
// --add-x-forwarded-for options.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1StripAddXff(t *testing.T) {
|
2015-01-18 15:50:20 +01:00
|
|
|
args := []string{
|
|
|
|
"--strip-incoming-x-forwarded-for",
|
|
|
|
"--add-x-forwarded-for",
|
|
|
|
}
|
|
|
|
st := newServerTester(args, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
xff := r.Header.Get("X-Forwarded-For")
|
|
|
|
want := "127.0.0.1"
|
|
|
|
if xff != want {
|
|
|
|
t.Errorf("X-Forwarded-For = %v; want %v", xff, want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
_, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1StripAddXff",
|
2015-01-19 13:24:18 +01:00
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("x-forwarded-for", "host"),
|
2015-01-18 15:50:20 +01:00
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-18 15:50:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1BadRequestCL tests that server rejects request whose
|
|
|
|
// content-length header field value does not match its request body
|
|
|
|
// size.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1BadRequestCL(t *testing.T) {
|
2015-01-18 15:50:20 +01:00
|
|
|
st := newServerTester(nil, t, noopHandler)
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
// we set content-length: 1024, but the actual request body is
|
|
|
|
// 3 bytes.
|
|
|
|
res, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1BadRequestCL",
|
2015-01-18 15:50:20 +01:00
|
|
|
method: "POST",
|
2015-01-19 13:24:18 +01:00
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("content-length", "1024"),
|
2015-01-18 15:50:20 +01:00
|
|
|
},
|
|
|
|
body: []byte("foo"),
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-18 15:50:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
want := http2.ErrCodeProtocol
|
|
|
|
if res.errCode != want {
|
|
|
|
t.Errorf("res.errCode = %v; want %v", res.errCode, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1BadResponseCL tests that server returns error when
|
|
|
|
// content-length response header field value does not match its
|
|
|
|
// response body size.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1BadResponseCL(t *testing.T) {
|
2015-01-18 15:50:20 +01:00
|
|
|
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// we set content-length: 1024, but only send 3 bytes.
|
|
|
|
w.Header().Add("Content-Length", "1024")
|
|
|
|
w.Write([]byte("foo"))
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1BadResponseCL",
|
2015-01-18 15:50:20 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-18 15:50:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
want := http2.ErrCodeProtocol
|
|
|
|
if res.errCode != want {
|
|
|
|
t.Errorf("res.errCode = %v; want %v", res.errCode, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1LocationRewrite tests location header field rewriting
|
|
|
|
// works.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1LocationRewrite(t *testing.T) {
|
2015-01-18 15:50:20 +01:00
|
|
|
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
// TODO we cannot get st.ts's port number here.. 8443
|
|
|
|
// is just a place holder. We ignore it on rewrite.
|
|
|
|
w.Header().Add("Location", "http://127.0.0.1:8443/p/q?a=b#fragment")
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1LocationRewrite",
|
2015-01-18 15:50:20 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-18 15:50:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
want := fmt.Sprintf("http://127.0.0.1:%v/p/q?a=b#fragment", serverPort)
|
|
|
|
if got := res.header.Get("Location"); got != want {
|
|
|
|
t.Errorf("Location: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
2015-01-19 14:20:56 +01:00
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1ChunkedRequestBody tests that chunked request body works.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1ChunkedRequestBody(t *testing.T) {
|
2015-01-19 14:20:56 +01:00
|
|
|
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
want := "[chunked]"
|
|
|
|
if got := fmt.Sprint(r.TransferEncoding); got != want {
|
|
|
|
t.Errorf("Transfer-Encoding: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error reading r.body: %v", err)
|
2015-01-19 14:20:56 +01:00
|
|
|
}
|
|
|
|
want = "foo"
|
|
|
|
if got := string(body); got != want {
|
|
|
|
t.Errorf("body: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
_, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1ChunkedRequestBody",
|
2015-01-19 14:20:56 +01:00
|
|
|
method: "POST",
|
|
|
|
body: []byte("foo"),
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-19 14:20:56 +01:00
|
|
|
}
|
|
|
|
}
|
2015-01-19 14:40:37 +01:00
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1MultipleRequestCL tests that server rejects request with
|
|
|
|
// multiple Content-Length request header fields.
|
2015-01-20 14:56:36 +01:00
|
|
|
func TestH2H1MultipleRequestCL(t *testing.T) {
|
2015-01-20 14:31:21 +01:00
|
|
|
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
t.Errorf("server should not forward bad request")
|
|
|
|
})
|
2015-01-19 14:40:37 +01:00
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
2015-01-20 14:56:36 +01:00
|
|
|
name: "TestH2H1MultipleRequestCL",
|
2015-01-19 14:40:37 +01:00
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("content-length", "1"),
|
2015-01-23 16:07:28 +01:00
|
|
|
pair("content-length", "1"),
|
2015-01-19 14:40:37 +01:00
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-19 14:40:37 +01:00
|
|
|
}
|
|
|
|
want := 400
|
|
|
|
if got := res.status; got != want {
|
|
|
|
t.Errorf("status: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1InvalidRequestCL tests that server rejects request with
|
|
|
|
// Content-Length which cannot be parsed as a number.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H1InvalidRequestCL(t *testing.T) {
|
2015-01-20 14:31:21 +01:00
|
|
|
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
t.Errorf("server should not forward bad request")
|
|
|
|
})
|
2015-01-19 14:40:37 +01:00
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H1InvalidRequestCL",
|
2015-01-19 14:40:37 +01:00
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("content-length", ""),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-19 14:40:37 +01:00
|
|
|
}
|
|
|
|
want := 400
|
|
|
|
if got := res.status; got != want {
|
2015-01-20 15:26:09 +01:00
|
|
|
t.Errorf("status: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1ConnectFailure tests that server handles the situation that
|
|
|
|
// connection attempt to HTTP/1 backend failed.
|
2015-01-20 15:26:09 +01:00
|
|
|
func TestH2H1ConnectFailure(t *testing.T) {
|
|
|
|
st := newServerTester(nil, t, noopHandler)
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
// shutdown backend server to simulate backend connect failure
|
|
|
|
st.ts.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
|
|
|
name: "TestH2H1ConnectFailure",
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
|
|
|
}
|
2015-01-21 15:08:13 +01:00
|
|
|
want := 503
|
2015-01-20 15:26:09 +01:00
|
|
|
if got := res.status; got != want {
|
2015-01-19 14:40:37 +01:00
|
|
|
t.Errorf("status: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
2015-01-19 16:45:51 +01:00
|
|
|
|
2015-01-23 16:17:11 +01:00
|
|
|
// TestH2H1AssembleCookies tests that crumbled cookies in HTTP/2
|
|
|
|
// request is assembled into 1 when forwarding to HTTP/1 backend link.
|
|
|
|
func TestH2H1AssembleCookies(t *testing.T) {
|
|
|
|
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if got, want := r.Header.Get("Cookie"), "alpha; bravo; charlie"; got != want {
|
|
|
|
t.Errorf("Cookie: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
|
|
|
name: "TestH2H1AssembleCookies",
|
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("cookie", "alpha"),
|
|
|
|
pair("cookie", "bravo"),
|
|
|
|
pair("cookie", "charlie"),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
|
|
|
}
|
|
|
|
if got, want := res.status, 200; got != want {
|
|
|
|
t.Errorf("status: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-24 08:02:03 +01:00
|
|
|
// TestH2H1TETrailer tests that server accepts TE request header field
|
|
|
|
// if it has trailer only.
|
|
|
|
func TestH2H1TETrailer(t *testing.T) {
|
|
|
|
st := newServerTester(nil, t, noopHandler)
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
|
|
|
name: "TestH2H1TETrailer",
|
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("te", "trailer"),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
|
|
|
}
|
|
|
|
if got, want := res.status, 200; got != want {
|
|
|
|
t.Errorf("status: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestH2H1TEGzip tests that server reset stream if TE request
|
|
|
|
// header field contains gzip.
|
|
|
|
func TestH2H1TEGzip(t *testing.T) {
|
|
|
|
st := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
t.Error("server should not forward bad request")
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
|
|
|
name: "TestH2H1TEGzip",
|
|
|
|
header: []hpack.HeaderField{
|
|
|
|
pair("te", "gzip"),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
|
|
|
}
|
|
|
|
if got, want := res.errCode, http2.ErrCodeProtocol; got != want {
|
|
|
|
t.Errorf("res.errCode = %v; want %v", res.errCode, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-25 07:36:14 +01:00
|
|
|
func TestH2H1SNI(t *testing.T) {
|
|
|
|
st := newServerTesterTLSConfig([]string{"--subcert=" + testDir + "/alt-server.key:" + testDir + "/alt-server.crt"}, t, noopHandler, &tls.Config{
|
|
|
|
ServerName: "alt-domain",
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
tlsConn := st.conn.(*tls.Conn)
|
|
|
|
connState := tlsConn.ConnectionState()
|
|
|
|
cert := connState.PeerCertificates[0]
|
|
|
|
|
|
|
|
if got, want := cert.Subject.CommonName, "alt-domain"; got != want {
|
|
|
|
t.Errorf("CommonName: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H1GracefulShutdown tests graceful shutdown.
|
2015-01-21 17:43:56 +01:00
|
|
|
func TestH2H1GracefulShutdown(t *testing.T) {
|
|
|
|
st := newServerTester(nil, t, noopHandler)
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
fmt.Fprint(st.conn, "PRI * HTTP/2.0\r\n\r\nSM\r\n\r\n")
|
|
|
|
if err := st.fr.WriteSettings(); err != nil {
|
|
|
|
t.Fatalf("st.fr.WriteSettings(): %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
header := []hpack.HeaderField{
|
|
|
|
pair(":method", "GET"),
|
|
|
|
pair(":scheme", "http"),
|
|
|
|
pair(":authority", st.authority),
|
|
|
|
pair(":path", "/"),
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, h := range header {
|
|
|
|
_ = st.enc.WriteField(h)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := st.fr.WriteHeaders(http2.HeadersFrameParam{
|
|
|
|
StreamID: 1,
|
|
|
|
EndStream: false,
|
|
|
|
EndHeaders: true,
|
|
|
|
BlockFragment: st.headerBlkBuf.Bytes(),
|
|
|
|
}); err != nil {
|
|
|
|
t.Fatalf("st.fr.WriteHeaders(): %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// send SIGQUIT signal to nghttpx to perform graceful shutdown
|
|
|
|
st.cmd.Process.Signal(syscall.SIGQUIT)
|
|
|
|
|
|
|
|
// after signal, finish request body
|
|
|
|
if err := st.fr.WriteData(1, true, nil); err != nil {
|
|
|
|
t.Fatalf("st.fr.WriteData(): %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
numGoAway := 0
|
|
|
|
|
|
|
|
for {
|
|
|
|
fr, err := st.readFrame()
|
|
|
|
if err != nil {
|
|
|
|
if err == io.EOF {
|
|
|
|
want := 2
|
|
|
|
if got := numGoAway; got != want {
|
|
|
|
t.Fatalf("numGoAway: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
t.Fatalf("st.readFrame(): %v", err)
|
|
|
|
}
|
|
|
|
switch f := fr.(type) {
|
|
|
|
case *http2.GoAwayFrame:
|
|
|
|
numGoAway += 1
|
|
|
|
want := http2.ErrCodeNo
|
|
|
|
if got := f.ErrCode; got != want {
|
|
|
|
t.Fatalf("f.ErrCode(%v): %v; want %v", numGoAway, got, want)
|
|
|
|
}
|
|
|
|
switch numGoAway {
|
|
|
|
case 1:
|
|
|
|
want := (uint32(1) << 31) - 1
|
|
|
|
if got := f.LastStreamID; got != want {
|
|
|
|
t.Fatalf("f.LastStreamID(%v): %v; want %v", numGoAway, got, want)
|
|
|
|
}
|
|
|
|
case 2:
|
|
|
|
want := uint32(1)
|
|
|
|
if got := f.LastStreamID; got != want {
|
|
|
|
t.Fatalf("f.LastStreamID(%v): %v; want %v", numGoAway, got, want)
|
|
|
|
}
|
|
|
|
case 3:
|
|
|
|
t.Fatalf("too many GOAWAYs received")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H2MultipleResponseCL tests that server returns error if
|
|
|
|
// multiple Content-Length response header fields are received.
|
2015-01-20 14:56:36 +01:00
|
|
|
func TestH2H2MultipleResponseCL(t *testing.T) {
|
2015-01-19 16:45:51 +01:00
|
|
|
st := newServerTester([]string{"--http2-bridge"}, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Add("content-length", "1")
|
2015-01-23 16:07:28 +01:00
|
|
|
w.Header().Add("content-length", "1")
|
2015-01-19 16:45:51 +01:00
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
2015-01-20 14:56:36 +01:00
|
|
|
name: "TestH2H2MultipleResponseCL",
|
2015-01-19 16:45:51 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-19 16:45:51 +01:00
|
|
|
}
|
|
|
|
want := 502
|
|
|
|
if got := res.status; got != want {
|
|
|
|
t.Errorf("status: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H2InvalidResponseCL tests that server returns error if
|
|
|
|
// Content-Length response header field value cannot be parsed as a
|
|
|
|
// number.
|
2015-01-19 16:59:09 +01:00
|
|
|
func TestH2H2InvalidResponseCL(t *testing.T) {
|
2015-01-19 16:45:51 +01:00
|
|
|
st := newServerTester([]string{"--http2-bridge"}, t, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
w.Header().Add("content-length", "")
|
|
|
|
})
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
2015-01-19 16:59:09 +01:00
|
|
|
name: "TestH2H2InvalidResponseCL",
|
2015-01-19 16:45:51 +01:00
|
|
|
})
|
|
|
|
if err != nil {
|
2015-01-20 14:59:09 +01:00
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
2015-01-19 16:45:51 +01:00
|
|
|
}
|
|
|
|
want := 502
|
|
|
|
if got := res.status; got != want {
|
|
|
|
t.Errorf("status: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|
2015-01-20 17:03:56 +01:00
|
|
|
|
2015-01-23 16:01:14 +01:00
|
|
|
// TestH2H2ConnectFailure tests that server handles the situation that
|
|
|
|
// connection attempt to HTTP/2 backend failed.
|
2015-01-21 15:30:48 +01:00
|
|
|
func TestH2H2ConnectFailure(t *testing.T) {
|
|
|
|
st := newServerTester([]string{"--http2-bridge"}, t, noopHandler)
|
|
|
|
defer st.Close()
|
|
|
|
|
|
|
|
// simulate backend connect attempt failure
|
|
|
|
st.ts.Close()
|
|
|
|
|
|
|
|
res, err := st.http2(requestParam{
|
|
|
|
name: "TestH2H2ConnectFailure",
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Error st.http2() = %v", err)
|
|
|
|
}
|
|
|
|
want := 503
|
|
|
|
if got := res.status; got != want {
|
|
|
|
t.Errorf("status: %v; want %v", got, want)
|
|
|
|
}
|
|
|
|
}
|