blob: 064bdcfb36021265a74979d9439480cdf239ade7 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/websockets/websocket_handshake_handler.h"
#include <string>
#include "net/socket/next_proto.h"
#include "net/spdy/spdy_header_block.h"
#include "net/spdy/spdy_websocket_test_util.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "url/gurl.h"
namespace net {
namespace {
class WebSocketHandshakeHandlerSpdyTest
: public ::testing::Test,
public ::testing::WithParamInterface<NextProto> {
protected:
WebSocketHandshakeHandlerSpdyTest() : spdy_util_(GetParam()) {}
SpdyWebSocketTestUtil spdy_util_;
};
INSTANTIATE_TEST_CASE_P(
NextProto,
WebSocketHandshakeHandlerSpdyTest,
testing::Values(kProtoDeprecatedSPDY2,
kProtoSPDY3, kProtoSPDY31, kProtoSPDY4));
TEST_P(WebSocketHandshakeHandlerSpdyTest, RequestResponse) {
WebSocketHandshakeRequestHandler request_handler;
static const char kHandshakeRequestMessage[] =
"GET /demo HTTP/1.1\r\n"
"Host: example.com\r\n"
"Upgrade: websocket\r\n"
"Connection: Upgrade\r\n"
"Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
"Origin: http://example.com\r\n"
"Sec-WebSocket-Protocol: sample\r\n"
"Sec-WebSocket-Extensions: foo\r\n"
"Sec-WebSocket-Version: 13\r\n"
"\r\n";
EXPECT_TRUE(request_handler.ParseRequest(kHandshakeRequestMessage,
strlen(kHandshakeRequestMessage)));
GURL url("ws://example.com/demo");
std::string challenge;
SpdyHeaderBlock headers;
ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url,
&headers,
&challenge,
spdy_util_.spdy_version()));
EXPECT_EQ(url.path(), spdy_util_.GetHeader(headers, "path"));
EXPECT_TRUE(spdy_util_.GetHeader(headers, "upgrade").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "Upgrade").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "connection").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "Connection").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "Sec-WebSocket-Key").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "sec-websocket-key").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "Sec-WebSocket-Version").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "sec-webSocket-version").empty());
EXPECT_EQ("example.com", spdy_util_.GetHeader(headers, "host"));
EXPECT_EQ("http://example.com", spdy_util_.GetHeader(headers, "origin"));
EXPECT_EQ("sample", spdy_util_.GetHeader(headers, "sec-websocket-protocol"));
EXPECT_EQ("foo", spdy_util_.GetHeader(headers, "sec-websocket-extensions"));
EXPECT_EQ("ws", spdy_util_.GetHeader(headers, "scheme"));
EXPECT_EQ("WebSocket/13", spdy_util_.GetHeader(headers, "version"));
static const char expected_challenge[] = "dGhlIHNhbXBsZSBub25jZQ==";
EXPECT_EQ(expected_challenge, challenge);
headers.clear();
spdy_util_.SetHeader("status", "101 Switching Protocols", &headers);
spdy_util_.SetHeader("sec-websocket-protocol", "sample", &headers);
spdy_util_.SetHeader("sec-websocket-extensions", "foo", &headers);
WebSocketHandshakeResponseHandler response_handler;
EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(
headers, challenge, spdy_util_.spdy_version()));
EXPECT_TRUE(response_handler.HasResponse());
// Note that order of sec-websocket-* is sensitive with hash_map order.
static const char kHandshakeResponseExpectedMessage[] =
"HTTP/1.1 101 Switching Protocols\r\n"
"Upgrade: websocket\r\n"
"Connection: Upgrade\r\n"
"Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n"
"sec-websocket-extensions: foo\r\n"
"sec-websocket-protocol: sample\r\n"
"\r\n";
EXPECT_EQ(kHandshakeResponseExpectedMessage, response_handler.GetResponse());
}
TEST_P(WebSocketHandshakeHandlerSpdyTest, RequestResponseWithCookies) {
WebSocketHandshakeRequestHandler request_handler;
// Note that websocket won't use multiple headers in request now.
static const char kHandshakeRequestMessage[] =
"GET /demo HTTP/1.1\r\n"
"Host: example.com\r\n"
"Upgrade: websocket\r\n"
"Connection: Upgrade\r\n"
"Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
"Origin: http://example.com\r\n"
"Sec-WebSocket-Protocol: sample\r\n"
"Sec-WebSocket-Extensions: foo\r\n"
"Sec-WebSocket-Version: 13\r\n"
"Cookie: WK-websocket-test=1; WK-websocket-test-httponly=1\r\n"
"\r\n";
EXPECT_TRUE(request_handler.ParseRequest(kHandshakeRequestMessage,
strlen(kHandshakeRequestMessage)));
GURL url("ws://example.com/demo");
std::string challenge;
SpdyHeaderBlock headers;
ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url,
&headers,
&challenge,
spdy_util_.spdy_version()));
EXPECT_EQ(url.path(), spdy_util_.GetHeader(headers, "path"));
EXPECT_TRUE(spdy_util_.GetHeader(headers, "upgrade").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "Upgrade").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "connection").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "Connection").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "Sec-WebSocket-Key").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "sec-websocket-key").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "Sec-WebSocket-Version").empty());
EXPECT_TRUE(spdy_util_.GetHeader(headers, "sec-webSocket-version").empty());
EXPECT_EQ("example.com", spdy_util_.GetHeader(headers, "host"));
EXPECT_EQ("http://example.com", spdy_util_.GetHeader(headers, "origin"));
EXPECT_EQ("sample", spdy_util_.GetHeader(headers, "sec-websocket-protocol"));
EXPECT_EQ("foo", spdy_util_.GetHeader(headers, "sec-websocket-extensions"));
EXPECT_EQ("ws", spdy_util_.GetHeader(headers, "scheme"));
EXPECT_EQ("WebSocket/13", spdy_util_.GetHeader(headers, "version"));
EXPECT_EQ("WK-websocket-test=1; WK-websocket-test-httponly=1",
headers["cookie"]);
const char expected_challenge[] = "dGhlIHNhbXBsZSBub25jZQ==";
EXPECT_EQ(expected_challenge, challenge);
headers.clear();
spdy_util_.SetHeader("status", "101 Switching Protocols", &headers);
spdy_util_.SetHeader("sec-websocket-protocol", "sample", &headers);
spdy_util_.SetHeader("sec-websocket-extensions", "foo", &headers);
std::string cookie = "WK-websocket-test=1";
cookie.append(1, '\0');
cookie += "WK-websocket-test-httponly=1; HttpOnly";
headers["set-cookie"] = cookie;
WebSocketHandshakeResponseHandler response_handler;
EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(
headers, challenge, spdy_util_.spdy_version()));
EXPECT_TRUE(response_handler.HasResponse());
// Note that order of sec-websocket-* is sensitive with hash_map order.
static const char kHandshakeResponseExpectedMessage[] =
"HTTP/1.1 101 Switching Protocols\r\n"
"Upgrade: websocket\r\n"
"Connection: Upgrade\r\n"
"Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n"
"sec-websocket-extensions: foo\r\n"
"sec-websocket-protocol: sample\r\n"
"set-cookie: WK-websocket-test=1\r\n"
"set-cookie: WK-websocket-test-httponly=1; HttpOnly\r\n"
"\r\n";
EXPECT_EQ(kHandshakeResponseExpectedMessage, response_handler.GetResponse());
}
} // namespace
} // namespace net