| package http2interop |
| |
| import ( |
| "crypto/tls" |
| "fmt" |
| "io" |
| "log" |
| ) |
| |
| const ( |
| Preface = "PRI * HTTP/2.0\r\n\r\nSM\r\n\r\n" |
| ) |
| |
| func parseFrame(r io.Reader) (Frame, error) { |
| fh := FrameHeader{} |
| if err := fh.Parse(r); err != nil { |
| return nil, err |
| } |
| var f Frame |
| switch fh.Type { |
| case PingFrameType: |
| f = &PingFrame{ |
| Header: fh, |
| } |
| case SettingsFrameType: |
| f = &SettingsFrame{ |
| Header: fh, |
| } |
| default: |
| f = &UnknownFrame{ |
| Header: fh, |
| } |
| } |
| if err := f.ParsePayload(r); err != nil { |
| return nil, err |
| } |
| |
| return f, nil |
| } |
| |
| func streamFrame(w io.Writer, f Frame) error { |
| raw, err := f.MarshalBinary() |
| if err != nil { |
| return err |
| } |
| if _, err := w.Write(raw); err != nil { |
| return err |
| } |
| return nil |
| } |
| |
| func getHttp2Conn(addr string) (*tls.Conn, error) { |
| config := &tls.Config{ |
| InsecureSkipVerify: true, |
| NextProtos: []string{"h2"}, |
| } |
| |
| conn, err := tls.Dial("tcp", addr, config) |
| if err != nil { |
| return nil, err |
| } |
| |
| return conn, nil |
| } |
| |
| func testClientShortSettings(addr string, length int) error { |
| c, err := getHttp2Conn(addr) |
| if err != nil { |
| return err |
| } |
| defer c.Close() |
| |
| if _, err := c.Write([]byte(Preface)); err != nil { |
| return err |
| } |
| |
| // Bad, settings, non multiple of 6 |
| sf := &UnknownFrame{ |
| Header: FrameHeader{ |
| Type: SettingsFrameType, |
| }, |
| Data: make([]byte, length), |
| } |
| if err := streamFrame(c, sf); err != nil { |
| return err |
| } |
| |
| for { |
| frame, err := parseFrame(c) |
| if err != nil { |
| return err |
| } |
| log.Println(frame) |
| } |
| |
| return nil |
| } |
| |
| func testClientPrefaceWithStreamId(addr string) error { |
| c, err := getHttp2Conn(addr) |
| if err != nil { |
| return err |
| } |
| defer c.Close() |
| |
| // Good so far |
| if _, err := c.Write([]byte(Preface)); err != nil { |
| return err |
| } |
| |
| // Bad, settings do not have ids |
| sf := &SettingsFrame{ |
| Header: FrameHeader{ |
| StreamID: 1, |
| }, |
| } |
| if err := streamFrame(c, sf); err != nil { |
| return err |
| } |
| |
| for { |
| frame, err := parseFrame(c) |
| if err != nil { |
| return err |
| } |
| log.Println(frame) |
| } |
| |
| return nil |
| } |
| |
| func testUnknownFrameType(addr string) error { |
| c, err := getHttp2Conn(addr) |
| if err != nil { |
| return err |
| } |
| defer c.Close() |
| |
| if _, err := c.Write([]byte(Preface)); err != nil { |
| return err |
| } |
| |
| // Send some settings, which are part of the client preface |
| sf := &SettingsFrame{} |
| if err := streamFrame(c, sf); err != nil { |
| return err |
| } |
| |
| // Write a bunch of invalid frame types. |
| for ft := ContinuationFrameType + 1; ft != 0; ft++ { |
| fh := &UnknownFrame{ |
| Header: FrameHeader{ |
| Type: ft, |
| }, |
| } |
| if err := streamFrame(c, fh); err != nil { |
| return err |
| } |
| } |
| |
| pf := &PingFrame{ |
| Data: []byte("01234567"), |
| } |
| if err := streamFrame(c, pf); err != nil { |
| return err |
| } |
| |
| for { |
| frame, err := parseFrame(c) |
| if err != nil { |
| return err |
| } |
| if npf, ok := frame.(*PingFrame); !ok { |
| continue |
| } else { |
| if string(npf.Data) != string(pf.Data) || npf.Header.Flags&PING_ACK == 0 { |
| return fmt.Errorf("Bad ping %+v", *npf) |
| } |
| return nil |
| } |
| } |
| |
| return nil |
| } |
| |
| func testShortPreface(addr string, prefacePrefix string) error { |
| c, err := getHttp2Conn(addr) |
| if err != nil { |
| return err |
| } |
| defer c.Close() |
| |
| if _, err := c.Write([]byte(prefacePrefix)); err != nil { |
| return err |
| } |
| |
| buf := make([]byte, 256) |
| for ; err == nil; _, err = c.Read(buf) { |
| } |
| // TODO: maybe check for a GOAWAY? |
| return err |
| } |
| |
| func testTLSMaxVersion(addr string, version uint16) error { |
| config := &tls.Config{ |
| InsecureSkipVerify: true, |
| NextProtos: []string{"h2"}, |
| MaxVersion: version, |
| } |
| conn, err := tls.Dial("tcp", addr, config) |
| if err != nil { |
| return err |
| } |
| defer conn.Close() |
| |
| buf := make([]byte, 256) |
| if n, err := conn.Read(buf); err != nil { |
| if n != 0 { |
| return fmt.Errorf("Expected no bytes to be read, but was %d", n) |
| } |
| return err |
| } |
| return nil |
| } |
| |
| func testTLSApplicationProtocol(addr string) error { |
| config := &tls.Config{ |
| InsecureSkipVerify: true, |
| NextProtos: []string{"h2c"}, |
| } |
| conn, err := tls.Dial("tcp", addr, config) |
| if err != nil { |
| return err |
| } |
| defer conn.Close() |
| |
| buf := make([]byte, 256) |
| if n, err := conn.Read(buf); err != nil { |
| if n != 0 { |
| return fmt.Errorf("Expected no bytes to be read, but was %d", n) |
| } |
| return err |
| } |
| return nil |
| } |