Extract SIGPIPE ignoring code to a common place.
[chromium-blink-merge.git] / net / websockets / websocket_handshake_handler_spdy3_unittest.cc
blob3baa12b6a2d24b38e0a2d09d63e646674cdd8f1c
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/websockets/websocket_handshake_handler.h"
7 #include <string>
8 #include <vector>
10 #include "base/basictypes.h"
11 #include "base/string_util.h"
12 #include "googleurl/src/gurl.h"
13 #include "net/http/http_response_headers.h"
14 #include "net/http/http_util.h"
15 #include "testing/gmock/include/gmock/gmock.h"
16 #include "testing/gtest/include/gtest/gtest.h"
17 #include "testing/platform_test.h"
19 namespace net {
21 namespace {
23 TEST(WebSocketHandshakeHandlerSpdy3Test, RequestResponse) {
24 WebSocketHandshakeRequestHandler request_handler;
26 static const char kHandshakeRequestMessage[] =
27 "GET /demo HTTP/1.1\r\n"
28 "Host: example.com\r\n"
29 "Upgrade: websocket\r\n"
30 "Connection: Upgrade\r\n"
31 "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
32 "Origin: http://example.com\r\n"
33 "Sec-WebSocket-Protocol: sample\r\n"
34 "Sec-WebSocket-Extensions: foo\r\n"
35 "Sec-WebSocket-Version: 13\r\n"
36 "X-Foo: foo\r\n"
37 "\r\n";
39 EXPECT_TRUE(request_handler.ParseRequest(kHandshakeRequestMessage,
40 strlen(kHandshakeRequestMessage)));
41 EXPECT_EQ(13, request_handler.protocol_version());
43 GURL url("ws://example.com/demo");
44 std::string challenge;
45 SpdyHeaderBlock headers;
46 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url,
47 &headers,
48 &challenge,
49 3));
51 EXPECT_EQ(url.path(), headers[":path"]);
52 EXPECT_TRUE(headers.find(":upgrade") == headers.end());
53 EXPECT_TRUE(headers.find(":Upgrade") == headers.end());
54 EXPECT_TRUE(headers.find(":connection") == headers.end());
55 EXPECT_TRUE(headers.find(":Connection") == headers.end());
56 EXPECT_TRUE(headers.find(":Sec-WebSocket-Key") == headers.end());
57 EXPECT_TRUE(headers.find(":sec-websocket-key") == headers.end());
58 EXPECT_TRUE(headers.find(":Sec-WebSocket-Version") == headers.end());
59 EXPECT_TRUE(headers.find(":sec-webSocket-version") == headers.end());
60 EXPECT_TRUE(headers.find(":x-foo") == headers.end());
61 EXPECT_EQ("example.com", headers[":host"]);
62 EXPECT_EQ("http://example.com", headers[":origin"]);
63 EXPECT_EQ("sample", headers[":sec-websocket-protocol"]);
64 EXPECT_EQ("foo", headers[":sec-websocket-extensions"]);
65 EXPECT_EQ("ws", headers[":scheme"]);
66 EXPECT_EQ("WebSocket/13", headers[":version"]);
67 EXPECT_EQ("foo", headers["x-foo"]);
69 static const char expected_challenge[] = "dGhlIHNhbXBsZSBub25jZQ==";
71 EXPECT_EQ(expected_challenge, challenge);
73 headers.clear();
75 headers[":status"] = "101 Switching Protocols";
76 headers[":sec-websocket-protocol"] = "sample";
77 headers[":sec-websocket-extensions"] = "foo";
78 headers["x-bar"] = "bar";
80 WebSocketHandshakeResponseHandler response_handler;
81 response_handler.set_protocol_version(13);
82 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers,
83 challenge,
84 3));
85 EXPECT_TRUE(response_handler.HasResponse());
87 // Note that order of sec-websocket-* is sensitive with hash_map order.
88 static const char kHandshakeResponseExpectedMessage[] =
89 "HTTP/1.1 101 Switching Protocols\r\n"
90 "Upgrade: websocket\r\n"
91 "Connection: Upgrade\r\n"
92 "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n"
93 "sec-websocket-extensions: foo\r\n"
94 "sec-websocket-protocol: sample\r\n"
95 "x-bar: bar\r\n"
96 "\r\n";
98 EXPECT_EQ(kHandshakeResponseExpectedMessage, response_handler.GetResponse());
101 TEST(WebSocketHandshakeHandlerSpdy3Test, RequestResponseWithCookies) {
102 WebSocketHandshakeRequestHandler request_handler;
104 // Note that websocket won't use multiple headers in request now.
105 static const char kHandshakeRequestMessage[] =
106 "GET /demo HTTP/1.1\r\n"
107 "Host: example.com\r\n"
108 "Upgrade: websocket\r\n"
109 "Connection: Upgrade\r\n"
110 "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n"
111 "Origin: http://example.com\r\n"
112 "Sec-WebSocket-Protocol: sample\r\n"
113 "Sec-WebSocket-Extensions: foo\r\n"
114 "Sec-WebSocket-Version: 13\r\n"
115 "Cookie: WK-websocket-test=1; WK-websocket-test-httponly=1\r\n"
116 "\r\n";
118 EXPECT_TRUE(request_handler.ParseRequest(kHandshakeRequestMessage,
119 strlen(kHandshakeRequestMessage)));
120 EXPECT_EQ(13, request_handler.protocol_version());
122 GURL url("ws://example.com/demo");
123 std::string challenge;
124 SpdyHeaderBlock headers;
125 ASSERT_TRUE(request_handler.GetRequestHeaderBlock(url,
126 &headers,
127 &challenge,
128 3));
130 EXPECT_EQ(url.path(), headers[":path"]);
131 EXPECT_TRUE(headers.find(":upgrade") == headers.end());
132 EXPECT_TRUE(headers.find(":Upgrade") == headers.end());
133 EXPECT_TRUE(headers.find(":connection") == headers.end());
134 EXPECT_TRUE(headers.find(":Connection") == headers.end());
135 EXPECT_TRUE(headers.find(":Sec-WebSocket-Key") == headers.end());
136 EXPECT_TRUE(headers.find(":sec-websocket-key") == headers.end());
137 EXPECT_TRUE(headers.find(":Sec-WebSocket-Version") == headers.end());
138 EXPECT_TRUE(headers.find(":sec-webSocket-version") == headers.end());
139 EXPECT_TRUE(headers.find(":Cookie") == headers.end());
140 EXPECT_TRUE(headers.find(":cookie") == headers.end());
141 EXPECT_EQ("example.com", headers[":host"]);
142 EXPECT_EQ("http://example.com", headers[":origin"]);
143 EXPECT_EQ("sample", headers[":sec-websocket-protocol"]);
144 EXPECT_EQ("foo", headers[":sec-websocket-extensions"]);
145 EXPECT_EQ("ws", headers[":scheme"]);
146 EXPECT_EQ("WebSocket/13", headers[":version"]);
147 EXPECT_EQ("WK-websocket-test=1; WK-websocket-test-httponly=1",
148 headers["cookie"]);
150 const char expected_challenge[] = "dGhlIHNhbXBsZSBub25jZQ==";
152 EXPECT_EQ(expected_challenge, challenge);
154 headers.clear();
156 headers[":status"] = "101 Switching Protocols";
157 headers[":sec-websocket-protocol"] = "sample";
158 headers[":sec-websocket-extensions"] = "foo";
159 std::string cookie = "WK-websocket-test=1";
160 cookie.append(1, '\0');
161 cookie += "WK-websocket-test-httponly=1; HttpOnly";
162 headers["set-cookie"] = cookie;
165 WebSocketHandshakeResponseHandler response_handler;
166 response_handler.set_protocol_version(13);
167 EXPECT_TRUE(response_handler.ParseResponseHeaderBlock(headers,
168 challenge,
169 3));
170 EXPECT_TRUE(response_handler.HasResponse());
172 // Note that order of sec-websocket-* is sensitive with hash_map order.
173 static const char kHandshakeResponseExpectedMessage[] =
174 "HTTP/1.1 101 Switching Protocols\r\n"
175 "Upgrade: websocket\r\n"
176 "Connection: Upgrade\r\n"
177 "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n"
178 "sec-websocket-extensions: foo\r\n"
179 "sec-websocket-protocol: sample\r\n"
180 "set-cookie: WK-websocket-test=1\r\n"
181 "set-cookie: WK-websocket-test-httponly=1; HttpOnly\r\n"
182 "\r\n";
184 EXPECT_EQ(kHandshakeResponseExpectedMessage, response_handler.GetResponse());
187 } // namespace
189 } // namespace net