%% Copyright (c) 2015, Loïc Hoguin <[email protected]>
%%
%% Permission to use, copy, modify, and/or distribute this software for any
%% purpose with or without fee is hereby granted, provided that the above
%% copyright notice and this permission notice appear in all copies.
%%
%% THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
%% WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
%% MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
%% ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
%% WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
%% ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
%% OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
-module(spdy_SUITE).
-compile(export_all).
-import(ct_helper, [doc/1]).
%% ct.
all() -> [{group, spdy31}].
groups() -> [{spdy31, [parallel], ct_helper:all(?MODULE)}].
%% Helper functions.
wait() ->
receive after 500 -> ok end.
down() ->
receive {gun_down, _, _, _, _, _} ->
ok
after 5000 ->
exit(timeout)
end.
not_down() ->
receive {gun_down, _, _, _, _, _} ->
exit(down)
after 0 ->
ok
end.
do_req_resp(ConnPid, ServerPid, ServerStreamID) ->
StreamRef = gun:get(ConnPid, "/"),
spdy_server:send(ServerPid, [
{syn_reply, ServerStreamID, false, <<"200">>, <<"HTTP/1.1">>, []},
{data, ServerStreamID, true, <<"Hello world!">>}
]),
receive {gun_response, _, StreamRef, _, _, _} ->
ok
after 5000 ->
exit(timeout)
end,
ok.
%% SPDY/3.1 test suite.
goaway_on_close(_) ->
doc("Send a GOAWAY when the client closes the connection (spdy-protocol-draft3-1 2.1)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
gun:close(ConnPid),
wait(),
[{goaway, 0, ok}] = spdy_server:stop(ServerPid),
down().
goaway_on_shutdown(_) ->
doc("Send a GOAWAY when the client closes the connection (spdy-protocol-draft3-1 2.1)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
gun:shutdown(ConnPid),
wait(),
[{goaway, 0, ok}] = spdy_server:stop(ServerPid),
down().
%% @todo This probably applies to HEADERS frame or SYN_STREAM from server push.
reject_data_on_non_existing_stream(_) ->
doc("DATA frames received for non-existing streams must be rejected with "
"an INVALID_STREAM stream error. (spdy-protocol-draft3-1 2.2.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
spdy_server:send(ServerPid, [
{data, 1, true, <<"Hello world!">>}
]),
wait(),
[{rst_stream, 1, invalid_stream}] = spdy_server:stop(ServerPid).
%% @todo This probably applies to HEADERS frame or SYN_STREAM from server push.
ignore_data_on_non_existing_stream_after_goaway(_) ->
%% Note: this is not explicitly written in the specification.
%% However the HTTP/2 draft tells us that we can discard frames
%% with identifiers higher than the identified last stream,
%% which falls under this case. (draft-ietf-httpbis-http2-17 6.8)
doc("DATA frames received for non-existing streams after a GOAWAY has been "
"sent must be ignored. (spdy-protocol-draft3-1 2.2.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
gun:shutdown(ConnPid),
spdy_server:send(ServerPid, [
{data, 1, true, <<"Hello world!">>}
]),
wait(),
[{goaway, 0, ok}] = spdy_server:stop(ServerPid),
down().
%% @todo This probably applies to HEADERS frame or SYN_STREAM from server push.
reject_data_before_syn_reply(_) ->
doc("A DATA frame received before a SYN_REPLY must be rejected "
"with a PROTOCOL_ERROR stream error. (spdy-protocol-draft3-1 2.2.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
spdy_server:send(ServerPid, [
{data, 1, true, <<"Hello world!">>},
{syn_reply, 1, false, <<"200">>, <<"HTTP/1.1">>, []}
]),
wait(),
[_, {rst_stream, 1, protocol_error}] = spdy_server:stop(ServerPid).
streamid_is_odd(_) ->
doc("Client-initiated Stream-ID must be an odd number. (spdy-protocol-draft3-1 2.3.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
[do_req_resp(ConnPid, ServerPid, N) || N <- lists:seq(1, 5, 2)],
Rec = spdy_server:stop(ServerPid),
true = length(Rec) =:= length([ok || {syn_stream, StreamID, _, _, _, _, _, _, _, _, _, _} <- Rec, StreamID rem 2 =:= 1]).
reject_streamid_0(_) ->
doc("The Stream-ID 0 is not valid and must be rejected with a PROTOCOL_ERROR session error. (spdy-protocol-draft3-1 2.3.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
spdy_server:send(ServerPid, [
{syn_stream, 0, 1, true, true, 0, <<"GET">>, <<"https">>, ["localhost:", integer_to_binary(Port)], "/a", <<"HTTP/1.1">>, []},
{syn_reply, 1, true, <<"200">>, <<"HTTP/1.1">>, []}
]),
wait(),
[_, {goaway, 0, protocol_error}] = spdy_server:stop(ServerPid),
down().
streamid_increases_monotonically(_) ->
doc("The Stream-ID must increase monotonically. (spdy-protocol-draft3-1 2.3.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
Expected = [1, 3, 5, 7, 9],
[do_req_resp(ConnPid, ServerPid, N) || N <- Expected],
wait(),
Rec = spdy_server:stop(ServerPid),
Expected = [StreamID || {syn_stream, StreamID, _, _, _, _, _, _, _, _, _, _} <- Rec].
streamid_does_not_wrap(_) ->
doc("Stream-ID must not wrap. Reconnect when all Stream-IDs are exhausted. (spdy-protocol-draft3-1 2.3.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
MaxClientStreamID = 2147483647,
sys:replace_state(ConnPid, fun({loop, State}) ->
%% Replace the next stream_id value to the maximum allowed value.
{loop, setelement(11, State, setelement(9, element(11, State), MaxClientStreamID))}
end),
do_req_resp(ConnPid, ServerPid, MaxClientStreamID),
%% Gun has exhausted all Stream-IDs and should now reconnect.
{ok, spdy} = gun:await_up(ConnPid),
%% Check that the next request is on a new connection.
_ = gun:get(ConnPid, "/"),
[{syn_stream, 1, _, _, _, _, _, _, _, _, _, _}] = spdy_server:stop(ServerPid).
reject_syn_stream_decreasing_streamid(_) ->
doc("Reject a decreasing Stream-ID with a PROTOCOL_ERROR session error. (spdy-protocol-draft3-1 2.3.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
Host = ["localhost:", integer_to_binary(Port)],
spdy_server:send(ServerPid, [
{syn_stream, 2, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/a", <<"HTTP/1.1">>, []},
{syn_stream, 6, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/b", <<"HTTP/1.1">>, []},
{syn_stream, 4, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/c", <<"HTTP/1.1">>, []},
{syn_reply, 1, true, <<"200">>, <<"HTTP/1.1">>, []}
]),
wait(),
[_, {goaway, 0, protocol_error}] = spdy_server:stop(ServerPid),
down().
reject_stream_duplicate_streamid(_) ->
doc("Reject duplicate Stream-ID with a PROTOCOL_ERROR session error. (spdy-protocol-draft3-1 2.3.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
Host = ["localhost:", integer_to_binary(Port)],
spdy_server:send(ServerPid, [
{syn_stream, 2, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/a", <<"HTTP/1.1">>, []},
{syn_stream, 2, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/b", <<"HTTP/1.1">>, []},
{syn_reply, 1, true, <<"200">>, <<"HTTP/1.1">>, []}
]),
wait(),
[_, {goaway, 2, protocol_error}] = spdy_server:stop(ServerPid),
down().
dont_send_frames_after_flag_fin(_) ->
doc("Do not send frames after sending FLAG_FIN. (spdy-protocol-draft3-1 2.3.6)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
%% Send a POST frame with no content header so that Gun sets FLAG_FIN,
%% then try sending data. Gun should reject this second call.
StreamRef = gun:post(ConnPid, "/", []),
gun:data(ConnPid, StreamRef, false, <<"Hello world!">>),
receive {gun_error, ConnPid, StreamRef, _} ->
ok
after 5000 ->
exit(timeout)
end,
wait(),
[{syn_stream, _, _, _, _, _, _, _, _, _, _, _}] = spdy_server:stop(ServerPid).
allow_window_update_after_flag_fin(_) ->
doc("WINDOW_UPDATE is allowed when the stream is half-closed. (spdy-protocol-draft3-1 2.3.6)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
spdy_server:send(ServerPid, [
{window_update, 1, 1024}
]),
wait(),
[{syn_stream, _, _, _, _, _, _, _, _, _, _, _}] = spdy_server:stop(ServerPid).
%% @todo This probably applies to HEADERS frame or SYN_STREAM from server push.
reject_data_on_half_closed_stream(_) ->
doc("Data frames sent on a half-closed stream must be rejected "
"with a STREAM_ALREADY_CLOSED stream error. (spdy-protocol-draft3-1 2.3.6)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
%% Send a POST frame with a content header so that Gun leaves this
%% stream alive after the server sends the reply.
_ = gun:post(ConnPid, "/", [{<<"content-length">>, <<"5">>}]),
spdy_server:send(ServerPid, [
{syn_reply, 1, true, <<"200">>, <<"HTTP/1.1">>, []},
{data, 1, true, <<"Hello world!">>}
]),
wait(),
[_, {rst_stream, 1, stream_already_closed}] = spdy_server:stop(ServerPid).
%% @todo This probably applies to HEADERS frame or SYN_STREAM from server push.
reject_data_on_closed_stream(_) ->
doc("Data frames sent on a closed stream must be rejected "
"with a PROTOCOL_ERROR stream error. (spdy-protocol-draft3-1 2.3.7)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
%% Send a GET frame so that the stream is closed when the server replies.
_ = gun:get(ConnPid, "/"),
spdy_server:send(ServerPid, [
{syn_reply, 1, true, <<"200">>, <<"HTTP/1.1">>, []},
{data, 1, true, <<"Hello world!">>}
]),
wait(),
[_, {rst_stream, 1, protocol_error}] = spdy_server:stop(ServerPid).
%% @todo We need to test that we do the right thing when the server sends a GOAWAY.
goaway_last_good_streamid(_) ->
doc("The GOAWAY frame must contain the Stream-ID of the last recently "
"received stream from the remote endpoint. (spdy-protocol-draft3-1 2.4.1)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
Host = ["localhost:", integer_to_binary(Port)],
spdy_server:send(ServerPid, [
{syn_stream, 2, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/a", <<"HTTP/1.1">>, []},
{syn_stream, 4, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/c", <<"HTTP/1.1">>, []},
{syn_stream, 6, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/b", <<"HTTP/1.1">>, []},
{syn_reply, 0, true, <<"200">>, <<"HTTP/1.1">>, []}
]),
wait(),
[_, {goaway, 6, protocol_error}] = spdy_server:stop(ServerPid),
down().
dont_send_rst_stream_on_rst_stream(_) ->
doc("An endpoint must not send an RST_STREAM in response to an RST_STREAM. (spdy-protocol-draft3-1 2.4.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
spdy_server:send(ServerPid, [
{rst_stream, 1, refused_stream}
]),
wait(),
%% No RST_STREAM was received; only SYN_STREAM.
[_] = spdy_server:stop(ServerPid),
not_down().
coalesce_multiple_identical_rst_stream(_) ->
doc("Do not send multiple identical RST_STREAM in succession. (spdy-protocol-draft3-1 2.4.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
spdy_server:send(ServerPid, [
{data, 1, true, <<"Hello ">>},
{data, 1, true, <<"world!">>}
]),
wait(),
[{rst_stream, 1, invalid_stream}] = spdy_server:stop(ServerPid).
%% @todo I am not sure how to adequately test that we don't send bad flags.
syn_stream_ignore_unknown_flags(_) ->
%% Note: this is not explicitly written in the specification.
%% However the HTTP/2 draft tells us to ignore unknown flags.
%% (draft-ietf-httpbis-http2-17 4.1)
doc("Unknown flags must be ignored. (spdy-protocol-draft3-1 2.6.1)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
%% Build a SYN_STREAM frame with all flag bits set to 1.
<< Before:32/bits, _:8, After/bits >> = iolist_to_binary(cow_spdy:syn_stream(cow_spdy:deflate_init(),
2, 1, true, true, 0, <<"GET">>, <<"https">>, ["localhost:", integer_to_binary(Port)], "/a", <<"HTTP/1.1">>, [])),
Frame = << Before/bits, 1:1, 1:1, 1:1, 1:1, 1:1, 1:1, 1:1, 1:1, After/bits >>,
spdy_server:send_raw(ServerPid, Frame),
wait(),
[_] = spdy_server:stop(ServerPid).
reject_associated_to_streamid_0(_) ->
doc("A non-zero Associated-To-Stream-ID sent by the server must "
"be rejected with a PROTOCOL_ERROR session error. (spdy-protocol-draft3-1 2.6.1)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
Host = ["localhost:", integer_to_binary(Port)],
spdy_server:send(ServerPid, [
{syn_stream, 2, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/a", <<"HTTP/1.1">>, []},
{syn_stream, 4, 1, true, true, 0, <<"GET">>, <<"https">>, Host, "/c", <<"HTTP/1.1">>, []},
{syn_stream, 6, 0, true, true, 0, <<"GET">>, <<"https">>, Host, "/b", <<"HTTP/1.1">>, []},
{syn_reply, 1, true, <<"200">>, <<"HTTP/1.1">>, []}
]),
wait(),
[_, {goaway, 4, protocol_error}] = spdy_server:stop(ServerPid),
down().
syn_reply_ignore_unknown_flags(_) ->
%% Note: this is not explicitly written in the specification.
%% However the HTTP/2 draft tells us to ignore unknown flags.
%% (draft-ietf-httpbis-http2-17 4.1)
doc("Unknown flags must be ignored. (spdy-protocol-draft3-1 2.6.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
%% Build a SYN_REPLY frame with all flag bits set to 1.
<< Before:32/bits, _:8, After/bits >> = iolist_to_binary(cow_spdy:syn_reply(cow_spdy:deflate_init(),
1, true, <<"200">>, <<"HTTP/1.1">>, [])),
Frame = << Before/bits, 1:1, 1:1, 1:1, 1:1, 1:1, 1:1, 1:1, 1:1, After/bits >>,
spdy_server:send_raw(ServerPid, Frame),
wait(),
[_] = spdy_server:stop(ServerPid).
reject_duplicate_syn_reply(_) ->
doc("Reception of multiple SYN_REPLY for the same Stream-ID must "
"be rejected with a STREAM_IN_USE stream error. (spdy-protocol-draft3-1 2.6.2)"),
{ok, ServerPid, Port} = spdy_server:start_link(),
{ok, ConnPid} = gun:open("localhost", Port, #{transport=>ssl}),
{ok, spdy} = gun:await_up(ConnPid),
_ = gun:get(ConnPid, "/"),
Host = ["localhost:", integer_to_binary(Port)],
spdy_server:send(ServerPid, [
{syn_reply, 1, false, <<"200">>, <<"HTTP/1.1">>, []},
{syn_reply, 1, false, <<"200">>, <<"HTTP/1.1">>, []}
]),
wait(),
[_, {rst_stream, 1, stream_in_use}] = spdy_server:stop(ServerPid).