|
| 1 | +#if KESTREL |
| 2 | +using System; |
| 3 | +using System.Linq; |
| 4 | +using System.Net; |
| 5 | +using System.Net.Http; |
| 6 | +using System.Threading.Tasks; |
| 7 | +using Microsoft.AspNetCore.Builder; |
| 8 | +using Microsoft.AspNetCore.Hosting; |
| 9 | +using Microsoft.AspNetCore.Http; |
| 10 | +using Microsoft.AspNetCore.Server.Kestrel.Core; |
| 11 | +using Xunit; |
| 12 | +using Xunit.Abstractions; |
| 13 | + |
| 14 | +namespace StackExchange.Utils.Tests |
| 15 | +{ |
| 16 | + public class Http2Tests : IClassFixture<Http2Tests.Http2Server> |
| 17 | + { |
| 18 | + private readonly Http2Server _server; |
| 19 | + private readonly ITestOutputHelper _log; |
| 20 | + private void Log(string message) => _log.WriteLine(message); |
| 21 | + public Http2Tests(ITestOutputHelper log, Http2Server server) |
| 22 | + { |
| 23 | + _server = server ?? throw new ArgumentNullException(nameof(server)); |
| 24 | + _log = log ?? throw new ArgumentNullException(nameof(log)); |
| 25 | + } |
| 26 | + |
| 27 | + [Theory] |
| 28 | + // non-TLS http1: should work (returning 1.1) |
| 29 | + [InlineData(HttpProtocols.Http1, false, false, null, "1.1", "HTTP/1.1")] |
| 30 | + [InlineData(HttpProtocols.Http1, false, false, "1.1", "1.1", "HTTP/1.1")] |
| 31 | + [InlineData(HttpProtocols.Http1, false, false, "2.0", "1.1", "HTTP/1.1")] |
| 32 | + |
| 33 | + // non-TLS http2 without the global override: should always fail |
| 34 | + [InlineData(HttpProtocols.Http2, false, false, null, "1.1", "HTTP/1.1", true)] |
| 35 | + [InlineData(HttpProtocols.Http2, false, false, "1.1", "1.1", "HTTP/1.1", true)] |
| 36 | + [InlineData(HttpProtocols.Http2, false, false, "2.0", "2.0", "HTTP/2", true)] |
| 37 | + |
| 38 | + // non-TLS http2 with the global override: should work if we specify http2 |
| 39 | + [InlineData(HttpProtocols.Http2, false, true, null, "1.1", "HTTP/1.1", true)] |
| 40 | + [InlineData(HttpProtocols.Http2, false, true, "1.1", "1.1", "HTTP/1.1", true)] |
| 41 | + [InlineData(HttpProtocols.Http2, false, true, "2.0", "2.0", "HTTP/2")] |
| 42 | + |
| 43 | + // non-TLS http* without the global override: should work, server prefers 1.1 |
| 44 | + [InlineData(HttpProtocols.Http1AndHttp2, false, false, null, "1.1", "HTTP/1.1")] |
| 45 | + [InlineData(HttpProtocols.Http1AndHttp2, false, false, "1.1", "1.1", "HTTP/1.1")] |
| 46 | + [InlineData(HttpProtocols.Http1AndHttp2, false, false, "2.0", "1.1", "HTTP/1.1")] |
| 47 | + |
| 48 | + // non-TLS http* with the global override: should work for 1.1; with 2, client and server argue |
| 49 | + [InlineData(HttpProtocols.Http1AndHttp2, false, true, null, "1.1", "HTTP/1.1")] |
| 50 | + [InlineData(HttpProtocols.Http1AndHttp2, false, true, "1.1", "1.1", "HTTP/1.1")] |
| 51 | + [InlineData(HttpProtocols.Http1AndHttp2, false, true, "2.0", "2.0", "HTTP/2", true)] |
| 52 | + |
| 53 | + // TLS http1: should always work, but http2 attempt is ignored |
| 54 | + [InlineData(HttpProtocols.Http1, true, false, null, "1.1", "HTTP/1.1")] |
| 55 | + [InlineData(HttpProtocols.Http1, true, false, "1.1", "1.1", "HTTP/1.1")] |
| 56 | + [InlineData(HttpProtocols.Http1, true, false, "2.0", "1.1", "HTTP/1.1")] |
| 57 | + |
| 58 | + // TLS http2: should work as long as we actually send http2 |
| 59 | + [InlineData(HttpProtocols.Http2, true, false, null, "1.1", "HTTP/1.1", true)] |
| 60 | + [InlineData(HttpProtocols.Http2, true, false, "1.1", "1.1", "HTTP/1.1", true)] |
| 61 | + [InlineData(HttpProtocols.Http2, true, false, "2.0", "2.0", "HTTP/2")] |
| 62 | + |
| 63 | + // TLS http*: should always work |
| 64 | + [InlineData(HttpProtocols.Http1AndHttp2, true, false, null, "1.1", "HTTP/1.1")] |
| 65 | + [InlineData(HttpProtocols.Http1AndHttp2, true, false, "1.1", "1.1", "HTTP/1.1")] |
| 66 | + [InlineData(HttpProtocols.Http1AndHttp2, true, false, "2.0", "2.0", "HTTP/2")] |
| 67 | + public async Task UsesVersion(HttpProtocols protocols, bool tls, bool allowUnencryptedHttp2, string specified, string expectedVersion, string expectedResponse, bool failure = false) |
| 68 | + { |
| 69 | + bool oldMode = HttpSettings.GlobalAllowUnencryptedHttp2; |
| 70 | + try |
| 71 | + { |
| 72 | + HttpSettings.GlobalAllowUnencryptedHttp2 = allowUnencryptedHttp2; |
| 73 | + |
| 74 | + var uri = _server.GetUri(protocols, tls); |
| 75 | + Log($"Server is on {uri}; specifying: '{specified}'"); |
| 76 | + var request = Http.Request(uri, new HttpSettings { |
| 77 | + ServerCertificateCustomValidationCallback = HttpClientHandler.DangerousAcceptAnyServerCertificateValidator |
| 78 | + }); |
| 79 | + if (specified is object) request = request.WithProtocolVersion(new Version(specified)); |
| 80 | + HttpCallResponse<string> result; |
| 81 | + try |
| 82 | + { |
| 83 | + result = await request.ExpectString().GetAsync(); |
| 84 | + } |
| 85 | + catch(Exception ex) |
| 86 | + { |
| 87 | + if (failure) |
| 88 | + { |
| 89 | + Log(ex.ToString()); |
| 90 | + return; |
| 91 | + } |
| 92 | + else |
| 93 | + { |
| 94 | + throw; |
| 95 | + } |
| 96 | + } |
| 97 | + |
| 98 | + Log($"As sent: {result?.RawRequest?.Version}, received: {result?.RawResponse?.Version}"); |
| 99 | + |
| 100 | + if (failure) |
| 101 | + { |
| 102 | + Assert.NotNull(result.Error); |
| 103 | + Log(result.Error.ToString()); |
| 104 | + } |
| 105 | + else |
| 106 | + { |
| 107 | + Assert.Null(result.Error); |
| 108 | + Assert.Equal(expectedVersion, result.RawResponse?.Version?.ToString()); |
| 109 | + Assert.Equal(expectedResponse, result.Data); |
| 110 | + } |
| 111 | + } |
| 112 | + finally |
| 113 | + { |
| 114 | + HttpSettings.GlobalAllowUnencryptedHttp2 = oldMode; |
| 115 | + } |
| 116 | + } |
| 117 | + |
| 118 | + public class Http2Server : IDisposable |
| 119 | + { |
| 120 | + private readonly IWebHost _host; |
| 121 | + |
| 122 | + private readonly int[] _ports = Enumerable.Range(10123, 6).ToArray(); |
| 123 | + |
| 124 | + public string GetUri(HttpProtocols protocols, bool tls) |
| 125 | + { |
| 126 | + var index = protocols switch |
| 127 | + { |
| 128 | + HttpProtocols.Http1 => tls ? 3 : 0, |
| 129 | + HttpProtocols.Http2 => tls ? 4 : 1, |
| 130 | + HttpProtocols.Http1AndHttp2 => tls ? 5 : 2, |
| 131 | + _ => throw new ArgumentOutOfRangeException(nameof(protocols)), |
| 132 | + }; |
| 133 | + return $"{(tls ? "https" : "http")}://localhost:{_ports[index]}/"; |
| 134 | + } |
| 135 | + public Task WaitForShutdownAsync() => _host.WaitForShutdownAsync(); |
| 136 | + |
| 137 | + public Http2Server() |
| 138 | + { |
| 139 | + _host = new WebHostBuilder() |
| 140 | + .UseKestrel(options => { |
| 141 | + options.ListenLocalhost(_ports[0], listenOptions => |
| 142 | + { |
| 143 | + listenOptions.Protocols = HttpProtocols.Http1; |
| 144 | + }); |
| 145 | + options.ListenLocalhost(_ports[1], listenOptions => |
| 146 | + { |
| 147 | + listenOptions.Protocols = HttpProtocols.Http2; |
| 148 | + }); |
| 149 | + options.ListenLocalhost(_ports[2], listenOptions => |
| 150 | + { |
| 151 | + listenOptions.Protocols = HttpProtocols.Http1AndHttp2; |
| 152 | + }); |
| 153 | + options.ListenLocalhost(_ports[3], listenOptions => |
| 154 | + { |
| 155 | + listenOptions.Protocols = HttpProtocols.Http1; |
| 156 | + listenOptions.UseHttps("certificate.pfx"); |
| 157 | + }); |
| 158 | + options.ListenLocalhost(_ports[4], listenOptions => |
| 159 | + { |
| 160 | + listenOptions.Protocols = HttpProtocols.Http2; |
| 161 | + listenOptions.UseHttps("certificate.pfx"); |
| 162 | + }); |
| 163 | + options.ListenLocalhost(_ports[5], listenOptions => |
| 164 | + { |
| 165 | + listenOptions.Protocols = HttpProtocols.Http1AndHttp2; |
| 166 | + listenOptions.UseHttps("certificate.pfx"); |
| 167 | + }); |
| 168 | + }) |
| 169 | + .Configure(app => { |
| 170 | + app.Run(context => context.Response.WriteAsync(context.Request.Protocol)); |
| 171 | + }) |
| 172 | + .Build(); |
| 173 | + _ = _host.RunAsync(); |
| 174 | + } |
| 175 | + void IDisposable.Dispose() |
| 176 | + => _ = _host.StopAsync(); |
| 177 | + } |
| 178 | + } |
| 179 | +} |
| 180 | +#endif |
0 commit comments