9 "github.com/bradfitz/http2"
10 "github.com/bradfitz/http2/hpack"
11 "github.com/tatsuhiro-t/go-nghttp2"
12 "golang.org/x/net/spdy"
28 serverBin = buildDir + "/src/nghttpx"
30 testDir = buildDir + "/integration-tests"
33 func pair(name, value string) hpack.HeaderField {
34 return hpack.HeaderField{
40 type serverTester struct {
41 args []string // command-line arguments
42 cmd *exec.Cmd // test frontend server process, which is test subject
43 url string // test frontend server URL
45 ts *httptest.Server // backend server
46 frontendHost string // frontend server host
47 backendHost string // backend server host
48 conn net.Conn // connection to frontend server
49 h2PrefaceSent bool // HTTP/2 preface was sent in conn
50 nextStreamID uint32 // next stream ID
51 fr *http2.Framer // HTTP/2 framer
52 spdyFr *spdy.Framer // SPDY/3.1 framer
53 headerBlkBuf bytes.Buffer // buffer to store encoded header block
54 enc *hpack.Encoder // HTTP/2 HPACK encoder
55 header http.Header // received header fields
56 dec *hpack.Decoder // HTTP/2 HPACK decoder
57 authority string // server's host:port
58 frCh chan http2.Frame // used for incoming HTTP/2 frame
59 spdyFrCh chan spdy.Frame // used for incoming SPDY frame
63 // newServerTester creates test context for plain TCP frontend
65 func newServerTester(args []string, t *testing.T, handler http.HandlerFunc) *serverTester {
66 return newServerTesterInternal(args, t, handler, false, nil)
69 // newServerTester creates test context for TLS frontend connection.
70 func newServerTesterTLS(args []string, t *testing.T, handler http.HandlerFunc) *serverTester {
71 return newServerTesterInternal(args, t, handler, true, nil)
74 // newServerTester creates test context for TLS frontend connection
75 // with given clientConfig
76 func newServerTesterTLSConfig(args []string, t *testing.T, handler http.HandlerFunc, clientConfig *tls.Config) *serverTester {
77 return newServerTesterInternal(args, t, handler, true, clientConfig)
80 // newServerTesterInternal creates test context. If frontendTLS is
81 // true, set up TLS frontend connection.
82 func newServerTesterInternal(args []string, t *testing.T, handler http.HandlerFunc, frontendTLS bool, clientConfig *tls.Config) *serverTester {
83 ts := httptest.NewUnstartedServer(handler)
86 for _, k := range args {
88 case "--http2-bridge":
93 nghttp2.ConfigureServer(ts.Config, &nghttp2.Server{})
94 // According to httptest/server.go, we have to set
95 // NextProtos separately for ts.TLS. NextProtos set
96 // in nghttp2.ConfigureServer is effectively ignored.
97 ts.TLS = new(tls.Config)
98 ts.TLS.NextProtos = append(ts.TLS.NextProtos, "h2-14")
100 args = append(args, "-k")
107 args = append(args, testDir+"/server.key", testDir+"/server.crt")
109 args = append(args, "--frontend-no-tls")
112 backendURL, err := url.Parse(ts.URL)
114 t.Fatalf("Error parsing URL from httptest.Server: %v", err)
117 // URL.Host looks like "127.0.0.1:8080", but we want
119 b := "-b" + strings.Replace(backendURL.Host, ":", ",", -1)
120 args = append(args, fmt.Sprintf("-f127.0.0.1,%v", serverPort), b,
121 "--errorlog-file="+testDir+"/log.txt", "-LINFO")
123 authority := fmt.Sprintf("127.0.0.1:%v", serverPort)
126 cmd: exec.Command(serverBin, args...),
129 url: fmt.Sprintf("%v://%v", scheme, authority),
130 frontendHost: fmt.Sprintf("127.0.0.1:%v", serverPort),
131 backendHost: backendURL.Host,
133 authority: authority,
134 frCh: make(chan http2.Frame),
135 spdyFrCh: make(chan spdy.Frame),
136 errCh: make(chan error),
139 if err := st.cmd.Start(); err != nil {
140 st.t.Fatalf("Error starting %v: %v", serverBin, err)
148 var tlsConfig *tls.Config
149 if clientConfig == nil {
150 tlsConfig = new(tls.Config)
152 tlsConfig = clientConfig
154 tlsConfig.InsecureSkipVerify = true
155 tlsConfig.NextProtos = []string{"h2-14", "spdy/3.1"}
156 conn, err = tls.Dial("tcp", authority, tlsConfig)
158 conn, err = net.Dial("tcp", authority)
164 st.t.Fatalf("Error server is not responding too long; server command-line arguments may be invalid")
166 time.Sleep(150 * time.Millisecond)
170 tlsConn := conn.(*tls.Conn)
171 cs := tlsConn.ConnectionState()
172 if !cs.NegotiatedProtocolIsMutual {
174 st.t.Fatalf("Error negotiated next protocol is not mutual")
181 st.fr = http2.NewFramer(st.conn, st.conn)
182 spdyFr, err := spdy.NewFramer(st.conn, st.conn)
185 st.t.Fatalf("Error spdy.NewFramer: %v", err)
188 st.enc = hpack.NewEncoder(&st.headerBlkBuf)
189 st.dec = hpack.NewDecoder(4096, func(f hpack.HeaderField) {
190 st.header.Add(f.Name, f.Value)
196 func (st *serverTester) Close() {
201 st.cmd.Process.Kill()
209 func (st *serverTester) readFrame() (http2.Frame, error) {
211 f, err := st.fr.ReadFrame()
222 case err := <-st.errCh:
224 case <-time.After(5 * time.Second):
225 return nil, errors.New("timeout waiting for frame")
229 func (st *serverTester) readSpdyFrame() (spdy.Frame, error) {
231 f, err := st.spdyFr.ReadFrame()
240 case f := <-st.spdyFrCh:
242 case err := <-st.errCh:
244 case <-time.After(2 * time.Second):
245 return nil, errors.New("timeout waiting for frame")
249 type requestParam struct {
250 name string // name for this request to identify the request in log easily
251 streamID uint32 // stream ID, automatically assigned if 0
252 method string // method, defaults to GET
253 scheme string // scheme, defaults to http
254 authority string // authority, defaults to backend server address
255 path string // path, defaults to /
256 header []hpack.HeaderField // additional request header fields
257 body []byte // request body
260 func (st *serverTester) http1(rp requestParam) (*serverResponse, error) {
268 body = bytes.NewBuffer(rp.body)
270 req, err := http.NewRequest(method, st.url, body)
274 for _, h := range rp.header {
275 req.Header.Add(h.Name, h.Value)
277 req.Header.Add("Test-Case", rp.name)
279 if err := req.Write(st.conn); err != nil {
282 resp, err := http.ReadResponse(bufio.NewReader(st.conn), req)
286 respBody, err := ioutil.ReadAll(resp.Body)
292 res := &serverResponse{
293 status: resp.StatusCode,
296 connClose: resp.Close,
302 func (st *serverTester) spdy(rp requestParam) (*serverResponse, error) {
303 res := &serverResponse{}
306 if rp.streamID != 0 {
307 id = spdy.StreamId(rp.streamID)
308 if id >= spdy.StreamId(st.nextStreamID) && id%2 == 1 {
309 st.nextStreamID = uint32(id) + 2
312 id = spdy.StreamId(st.nextStreamID)
327 if rp.authority != "" {
336 header := make(http.Header)
337 header.Add(":method", method)
338 header.Add(":scheme", scheme)
339 header.Add(":host", host)
340 header.Add(":path", path)
341 header.Add(":version", "HTTP/1.1")
342 header.Add("test-case", rp.name)
343 for _, h := range rp.header {
344 header.Add(h.Name, h.Value)
347 var synStreamFlags spdy.ControlFlags
348 if len(rp.body) == 0 {
349 synStreamFlags = spdy.ControlFlagFin
351 if err := st.spdyFr.WriteFrame(&spdy.SynStreamFrame{
352 CFHeader: spdy.ControlFrameHeader{
353 Flags: synStreamFlags,
361 if len(rp.body) != 0 {
362 if err := st.spdyFr.WriteFrame(&spdy.DataFrame{
364 Flags: spdy.DataFlagFin,
373 fr, err := st.readSpdyFrame()
377 switch f := fr.(type) {
378 case *spdy.SynReplyFrame:
379 if f.StreamId != id {
382 res.header = cloneHeader(f.Headers)
383 if _, err := fmt.Sscan(res.header.Get(":status"), &res.status); err != nil {
384 return res, fmt.Errorf("Error parsing status code: %v", err)
386 if f.CFHeader.Flags&spdy.ControlFlagFin != 0 {
389 case *spdy.DataFrame:
390 if f.StreamId != id {
393 res.body = append(res.body, f.Data...)
394 if f.Flags&spdy.DataFlagFin != 0 {
397 case *spdy.RstStreamFrame:
398 if f.StreamId != id {
401 res.spdyRstErrCode = f.Status
403 case *spdy.GoAwayFrame:
404 if f.Status == spdy.GoAwayOK {
407 res.spdyGoAwayErrCode = f.Status
414 func (st *serverTester) http2(rp requestParam) (*serverResponse, error) {
415 st.headerBlkBuf.Reset()
416 st.header = make(http.Header)
419 if rp.streamID != 0 {
421 if id >= st.nextStreamID && id%2 == 1 {
422 st.nextStreamID = id + 2
429 if !st.h2PrefaceSent {
430 st.h2PrefaceSent = true
431 fmt.Fprint(st.conn, "PRI * HTTP/2.0\r\n\r\nSM\r\n\r\n")
432 if err := st.fr.WriteSettings(); err != nil {
437 res := &serverResponse{
441 streams := make(map[uint32]*serverResponse)
448 _ = st.enc.WriteField(pair(":method", method))
454 _ = st.enc.WriteField(pair(":scheme", scheme))
456 authority := st.authority
457 if rp.authority != "" {
458 authority = rp.authority
460 _ = st.enc.WriteField(pair(":authority", authority))
466 _ = st.enc.WriteField(pair(":path", path))
468 _ = st.enc.WriteField(pair("test-case", rp.name))
470 for _, h := range rp.header {
471 _ = st.enc.WriteField(h)
474 err := st.fr.WriteHeaders(http2.HeadersFrameParam{
476 EndStream: len(rp.body) == 0,
478 BlockFragment: st.headerBlkBuf.Bytes(),
484 if len(rp.body) != 0 {
485 // TODO we assume rp.body fits in 1 frame
486 if err := st.fr.WriteData(id, true, rp.body); err != nil {
493 fr, err := st.readFrame()
497 switch f := fr.(type) {
498 case *http2.HeadersFrame:
499 _, err := st.dec.Write(f.HeaderBlockFragment())
503 sr, ok := streams[f.FrameHeader.StreamID]
505 st.header = make(http.Header)
508 sr.header = cloneHeader(st.header)
510 status, err = strconv.Atoi(sr.header.Get(":status"))
512 return res, fmt.Errorf("Error parsing status code: %v", err)
516 if streamEnded(res, streams, sr) {
520 case *http2.PushPromiseFrame:
521 _, err := st.dec.Write(f.HeaderBlockFragment())
525 sr := &serverResponse{
526 streamID: f.PromiseID,
527 reqHeader: cloneHeader(st.header),
529 streams[sr.streamID] = sr
530 case *http2.DataFrame:
531 sr, ok := streams[f.FrameHeader.StreamID]
535 sr.body = append(sr.body, f.Data()...)
537 if streamEnded(res, streams, sr) {
541 case *http2.RSTStreamFrame:
542 sr, ok := streams[f.FrameHeader.StreamID]
546 sr.errCode = f.ErrCode
547 if streamEnded(res, streams, sr) {
550 case *http2.GoAwayFrame:
551 if f.ErrCode == http2.ErrCodeNo {
554 res.errCode = f.ErrCode
557 case *http2.SettingsFrame:
561 if err := st.fr.WriteSettingsAck(); err != nil {
566 sort.Sort(ByStreamID(res.pushResponse))
570 func streamEnded(mainSr *serverResponse, streams map[uint32]*serverResponse, sr *serverResponse) bool {
571 delete(streams, sr.streamID)
572 if mainSr.streamID != sr.streamID {
573 mainSr.pushResponse = append(mainSr.pushResponse, sr)
575 return len(streams) == 0
578 type serverResponse struct {
579 status int // HTTP status code
580 header http.Header // response header fields
581 body []byte // response body
582 streamID uint32 // stream ID in HTTP/2
583 errCode http2.ErrCode // error code received in HTTP/2 RST_STREAM or GOAWAY
584 connErr bool // true if HTTP/2 connection error
585 spdyGoAwayErrCode spdy.GoAwayStatus // status code received in SPDY RST_STREAM
586 spdyRstErrCode spdy.RstStreamStatus // status code received in SPDY GOAWAY
587 connClose bool // Conection: close is included in response header in HTTP/1 test
588 reqHeader http.Header // http request header, currently only sotres pushed request header
589 pushResponse []*serverResponse // pushed response
592 type ByStreamID []*serverResponse
594 func (b ByStreamID) Len() int {
598 func (b ByStreamID) Swap(i, j int) {
599 b[i], b[j] = b[j], b[i]
602 func (b ByStreamID) Less(i, j int) bool {
603 return b[i].streamID < b[j].streamID
606 func cloneHeader(h http.Header) http.Header {
607 h2 := make(http.Header, len(h))
608 for k, vv := range h {
609 vv2 := make([]string, len(vv))
616 func noopHandler(w http.ResponseWriter, r *http.Request) {}