| // NOTE: This file should be saved as UTF-8 w/ BOM |
| #include <httplib.h> |
| #include <signal.h> |
| |
| #ifndef _WIN32 |
| #include <arpa/inet.h> |
| #include <curl/curl.h> |
| #include <netinet/in.h> |
| #include <sys/socket.h> |
| #include <unistd.h> |
| #endif |
| #include <gtest/gtest.h> |
| |
| #include <atomic> |
| #include <chrono> |
| #include <cstdio> |
| #include <fstream> |
| #include <future> |
| #include <limits> |
| #include <memory> |
| #include <sstream> |
| #include <stdexcept> |
| #include <thread> |
| #include <type_traits> |
| #include <vector> |
| |
| #define SERVER_CERT_FILE "./cert.pem" |
| #define SERVER_CERT2_FILE "./cert2.pem" |
| #define SERVER_PRIVATE_KEY_FILE "./key.pem" |
| #define CA_CERT_FILE "./ca-bundle.crt" |
| #define CLIENT_CA_CERT_FILE "./rootCA.cert.pem" |
| #define CLIENT_CA_CERT_DIR "." |
| #define CLIENT_CERT_FILE "./client.cert.pem" |
| #define CLIENT_PRIVATE_KEY_FILE "./client.key.pem" |
| #define CLIENT_ENCRYPTED_CERT_FILE "./client_encrypted.cert.pem" |
| #define CLIENT_ENCRYPTED_PRIVATE_KEY_FILE "./client_encrypted.key.pem" |
| #define CLIENT_ENCRYPTED_PRIVATE_KEY_PASS "test012!" |
| #define SERVER_ENCRYPTED_CERT_FILE "./cert_encrypted.pem" |
| #define SERVER_ENCRYPTED_PRIVATE_KEY_FILE "./key_encrypted.pem" |
| #define SERVER_ENCRYPTED_PRIVATE_KEY_PASS "test123!" |
| |
| using namespace std; |
| using namespace httplib; |
| |
| const char *HOST = "localhost"; |
| const int PORT = 1234; |
| |
| const string LONG_QUERY_VALUE = string(25000, '@'); |
| const string LONG_QUERY_URL = "/long-query-value?key=" + LONG_QUERY_VALUE; |
| |
| const string TOO_LONG_QUERY_VALUE = string(35000, '@'); |
| const string TOO_LONG_QUERY_URL = |
| "/too-long-query-value?key=" + TOO_LONG_QUERY_VALUE; |
| |
| const std::string JSON_DATA = "{\"hello\":\"world\"}"; |
| |
| const string LARGE_DATA = string(1024 * 1024 * 100, '@'); // 100MB |
| |
| FormData &get_file_value(std::vector<FormData> &items, const char *key) { |
| auto it = std::find_if(items.begin(), items.end(), [&](const FormData &file) { |
| return file.name == key; |
| }); |
| #ifdef CPPHTTPLIB_NO_EXCEPTIONS |
| return *it; |
| #else |
| if (it != items.end()) { return *it; } |
| throw std::runtime_error("invalid multipart form data name error"); |
| #endif |
| } |
| |
| static void read_file(const std::string &path, std::string &out) { |
| std::ifstream fs(path, std::ios_base::binary); |
| if (!fs) throw std::runtime_error("File not found: " + path); |
| fs.seekg(0, std::ios_base::end); |
| auto size = fs.tellg(); |
| fs.seekg(0); |
| out.resize(static_cast<size_t>(size)); |
| fs.read(&out[0], static_cast<std::streamsize>(size)); |
| } |
| |
| class UnixSocketTest : public ::testing::Test { |
| protected: |
| void TearDown() override { std::remove(pathname_.c_str()); } |
| |
| void client_GET(const std::string &addr) { |
| httplib::Client cli{addr}; |
| cli.set_address_family(AF_UNIX); |
| ASSERT_TRUE(cli.is_valid()); |
| |
| const auto &result = cli.Get(pattern_); |
| ASSERT_TRUE(result) << "error: " << result.error(); |
| |
| const auto &resp = result.value(); |
| EXPECT_EQ(resp.status, StatusCode::OK_200); |
| EXPECT_EQ(resp.body, content_); |
| } |
| |
| const std::string pathname_{"./httplib-server.sock"}; |
| const std::string pattern_{"/hi"}; |
| const std::string content_{"Hello World!"}; |
| }; |
| |
| TEST_F(UnixSocketTest, pathname) { |
| httplib::Server svr; |
| svr.Get(pattern_, [&](const httplib::Request &, httplib::Response &res) { |
| res.set_content(content_, "text/plain"); |
| }); |
| |
| std::thread t{[&] { |
| ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); |
| }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ASSERT_TRUE(svr.is_running()); |
| |
| client_GET(pathname_); |
| } |
| |
| #if defined(__linux__) || \ |
| /* __APPLE__ */ (defined(SOL_LOCAL) && defined(SO_PEERPID)) |
| TEST_F(UnixSocketTest, PeerPid) { |
| httplib::Server svr; |
| std::string remote_port_val; |
| svr.Get(pattern_, [&](const httplib::Request &req, httplib::Response &res) { |
| res.set_content(content_, "text/plain"); |
| remote_port_val = req.get_header_value("REMOTE_PORT"); |
| }); |
| |
| std::thread t{[&] { |
| ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); |
| }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ASSERT_TRUE(svr.is_running()); |
| |
| client_GET(pathname_); |
| EXPECT_EQ(std::to_string(getpid()), remote_port_val); |
| } |
| #endif |
| |
| #ifdef __linux__ |
| TEST_F(UnixSocketTest, abstract) { |
| constexpr char svr_path[]{"\x00httplib-server.sock"}; |
| const std::string abstract_addr{svr_path, sizeof(svr_path) - 1}; |
| |
| httplib::Server svr; |
| svr.Get(pattern_, [&](const httplib::Request &, httplib::Response &res) { |
| res.set_content(content_, "text/plain"); |
| }); |
| |
| std::thread t{[&] { |
| ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(abstract_addr, 80)); |
| }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ASSERT_TRUE(svr.is_running()); |
| |
| client_GET(abstract_addr); |
| } |
| #endif |
| |
| TEST_F(UnixSocketTest, HostHeaderAutoSet) { |
| httplib::Server svr; |
| std::string received_host_header; |
| |
| svr.Get(pattern_, [&](const httplib::Request &req, httplib::Response &res) { |
| // Capture the Host header sent by the client |
| auto host_iter = req.headers.find("Host"); |
| if (host_iter != req.headers.end()) { |
| received_host_header = host_iter->second; |
| } |
| res.set_content(content_, "text/plain"); |
| }); |
| |
| std::thread t{[&] { |
| ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); |
| }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ASSERT_TRUE(svr.is_running()); |
| |
| // Test that Host header is automatically set to "localhost" for Unix socket |
| // connections |
| httplib::Client cli{pathname_}; |
| cli.set_address_family(AF_UNIX); |
| ASSERT_TRUE(cli.is_valid()); |
| |
| const auto &result = cli.Get(pattern_); |
| ASSERT_TRUE(result) << "error: " << result.error(); |
| |
| const auto &resp = result.value(); |
| EXPECT_EQ(resp.status, StatusCode::OK_200); |
| EXPECT_EQ(resp.body, content_); |
| |
| // Verify that Host header was automatically set to "localhost" |
| EXPECT_EQ(received_host_header, "localhost"); |
| } |
| |
| #ifndef _WIN32 |
| TEST(SocketStream, wait_writable_UNIX) { |
| int fds[2]; |
| ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_STREAM, 0, fds)); |
| |
| const auto asSocketStream = [&](socket_t fd, |
| std::function<bool(Stream &)> func) { |
| return detail::process_client_socket( |
| fd, 0, 0, 0, 0, 0, std::chrono::steady_clock::time_point::min(), func); |
| }; |
| asSocketStream(fds[0], [&](Stream &s0) { |
| EXPECT_EQ(s0.socket(), fds[0]); |
| EXPECT_TRUE(s0.wait_writable()); |
| |
| EXPECT_EQ(0, close(fds[1])); |
| EXPECT_FALSE(s0.wait_writable()); |
| |
| return true; |
| }); |
| EXPECT_EQ(0, close(fds[0])); |
| } |
| |
| TEST(SocketStream, wait_writable_INET) { |
| sockaddr_in addr; |
| memset(&addr, 0, sizeof(addr)); |
| addr.sin_family = AF_INET; |
| addr.sin_port = htons(PORT + 1); |
| addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); |
| |
| int disconnected_svr_sock = -1; |
| std::thread svr{[&] { |
| const int s = socket(AF_INET, SOCK_STREAM, 0); |
| ASSERT_LE(0, s); |
| ASSERT_EQ(0, ::bind(s, reinterpret_cast<sockaddr *>(&addr), sizeof(addr))); |
| ASSERT_EQ(0, listen(s, 1)); |
| ASSERT_LE(0, disconnected_svr_sock = accept(s, nullptr, nullptr)); |
| ASSERT_EQ(0, close(s)); |
| }}; |
| std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
| |
| std::thread cli{[&] { |
| const int s = socket(AF_INET, SOCK_STREAM, 0); |
| ASSERT_LE(0, s); |
| ASSERT_EQ(0, connect(s, reinterpret_cast<sockaddr *>(&addr), sizeof(addr))); |
| ASSERT_EQ(0, close(s)); |
| }}; |
| cli.join(); |
| svr.join(); |
| ASSERT_NE(disconnected_svr_sock, -1); |
| |
| const auto asSocketStream = [&](socket_t fd, |
| std::function<bool(Stream &)> func) { |
| return detail::process_client_socket( |
| fd, 0, 0, 0, 0, 0, std::chrono::steady_clock::time_point::min(), func); |
| }; |
| asSocketStream(disconnected_svr_sock, [&](Stream &ss) { |
| EXPECT_EQ(ss.socket(), disconnected_svr_sock); |
| EXPECT_FALSE(ss.wait_writable()); |
| |
| return true; |
| }); |
| |
| ASSERT_EQ(0, close(disconnected_svr_sock)); |
| } |
| #endif // #ifndef _WIN32 |
| |
| TEST(ClientTest, MoveConstructible) { |
| EXPECT_FALSE(std::is_copy_constructible<Client>::value); |
| EXPECT_TRUE(std::is_nothrow_move_constructible<Client>::value); |
| } |
| |
| TEST(ClientTest, MoveAssignable) { |
| EXPECT_FALSE(std::is_copy_assignable<Client>::value); |
| EXPECT_TRUE(std::is_nothrow_move_assignable<Client>::value); |
| } |
| |
| #ifdef _WIN32 |
| TEST(StartupTest, WSAStartup) { |
| WSADATA wsaData; |
| int ret = WSAStartup(0x0002, &wsaData); |
| ASSERT_EQ(0, ret); |
| } |
| #endif |
| |
| TEST(DecodePathTest, PercentCharacter) { |
| EXPECT_EQ( |
| decode_path_component( |
| R"(descrip=Gastos%20%C3%A1%C3%A9%C3%AD%C3%B3%C3%BA%C3%B1%C3%91%206)"), |
| u8"descrip=Gastos áéíóúñÑ 6"); |
| } |
| |
| TEST(DecodePathTest, PercentCharacterNUL) { |
| string expected; |
| expected.push_back('x'); |
| expected.push_back('\0'); |
| expected.push_back('x'); |
| |
| EXPECT_EQ(decode_path_component("x%00x"), expected); |
| } |
| |
| TEST(EncodeQueryParamTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'()"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(unescapedCharacters), "-_.!~*'()"); |
| } |
| |
| TEST(EncodeQueryParamTest, ParseReservedCharactersTest) { |
| string reservedCharacters = ";,/?:@&=+$"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(reservedCharacters), |
| "%3B%2C%2F%3F%3A%40%26%3D%2B%24"); |
| } |
| |
| TEST(EncodeQueryParamTest, TestUTF8Characters) { |
| string chineseCharacters = u8"中国語"; |
| string russianCharacters = u8"дом"; |
| string brazilianCharacters = u8"óculos"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(chineseCharacters), |
| "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(russianCharacters), |
| "%D0%B4%D0%BE%D0%BC"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(brazilianCharacters), "%C3%B3culos"); |
| } |
| |
| TEST(EncodeUriComponentTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'()"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(unescapedCharacters), "-_.!~*'()"); |
| } |
| |
| TEST(EncodeUriComponentTest, ParseReservedCharactersTest) { |
| string reservedCharacters = ";,/?:@&=+$"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(reservedCharacters), |
| "%3B%2C%2F%3F%3A%40%26%3D%2B%24"); |
| } |
| |
| TEST(EncodeUriComponentTest, TestUTF8Characters) { |
| string chineseCharacters = u8"中国語"; |
| string russianCharacters = u8"дом"; |
| string brazilianCharacters = u8"óculos"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(chineseCharacters), |
| "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(russianCharacters), |
| "%D0%B4%D0%BE%D0%BC"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(brazilianCharacters), "%C3%B3culos"); |
| } |
| |
| TEST(EncodeUriComponentTest, TestPathComponentEncoding) { |
| // Issue #2082 use case: encoding path component with ampersand |
| string pathWithAmpersand = "Piri Tommy Villiers - on & on"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(pathWithAmpersand), |
| "Piri%20Tommy%20Villiers%20-%20on%20%26%20on"); |
| } |
| |
| TEST(EncodeUriTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'()"; |
| |
| EXPECT_EQ(httplib::encode_uri(unescapedCharacters), "-_.!~*'()"); |
| } |
| |
| TEST(EncodeUriTest, ParseReservedCharactersTest) { |
| string reservedCharacters = ";,/?:@&=+$#"; |
| |
| EXPECT_EQ(httplib::encode_uri(reservedCharacters), ";,/?:@&=+$#"); |
| } |
| |
| TEST(EncodeUriTest, TestUTF8Characters) { |
| string chineseCharacters = u8"中国語"; |
| string russianCharacters = u8"дом"; |
| string brazilianCharacters = u8"óculos"; |
| |
| EXPECT_EQ(httplib::encode_uri(chineseCharacters), |
| "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); |
| |
| EXPECT_EQ(httplib::encode_uri(russianCharacters), "%D0%B4%D0%BE%D0%BC"); |
| |
| EXPECT_EQ(httplib::encode_uri(brazilianCharacters), "%C3%B3culos"); |
| } |
| |
| TEST(EncodeUriTest, TestCompleteUri) { |
| string uri = |
| "https://example.com/path/to/resource?query=value¶m=test#fragment"; |
| |
| EXPECT_EQ( |
| httplib::encode_uri(uri), |
| "https://example.com/path/to/resource?query=value¶m=test#fragment"); |
| } |
| |
| TEST(EncodeUriTest, TestUriWithSpacesAndSpecialChars) { |
| string uri = |
| "https://example.com/path with spaces/file name.html?q=hello world"; |
| |
| EXPECT_EQ(httplib::encode_uri(uri), |
| "https://example.com/path%20with%20spaces/" |
| "file%20name.html?q=hello%20world"); |
| } |
| |
| TEST(DecodeUriComponentTest, ParseEncodedChararactersTest) { |
| string encodedString = "%3B%2C%2F%3F%3A%40%26%3D%2B%24"; |
| |
| EXPECT_EQ(httplib::decode_uri_component(encodedString), ";,/?:@&=+$"); |
| } |
| |
| TEST(DecodeUriComponentTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'()"; |
| |
| EXPECT_EQ(httplib::decode_uri_component(unescapedCharacters), "-_.!~*'()"); |
| } |
| |
| TEST(DecodeUriComponentTest, TestUTF8Characters) { |
| string encodedChinese = "%E4%B8%AD%E5%9B%BD%E8%AA%9E"; |
| string encodedRussian = "%D0%B4%D0%BE%D0%BC"; |
| string encodedBrazilian = "%C3%B3culos"; |
| |
| EXPECT_EQ(httplib::decode_uri_component(encodedChinese), u8"中国語"); |
| EXPECT_EQ(httplib::decode_uri_component(encodedRussian), u8"дом"); |
| EXPECT_EQ(httplib::decode_uri_component(encodedBrazilian), u8"óculos"); |
| } |
| |
| TEST(DecodeUriComponentTest, TestPathComponentDecoding) { |
| string encodedPath = "Piri%20Tommy%20Villiers%20-%20on%20%26%20on"; |
| |
| EXPECT_EQ(httplib::decode_uri_component(encodedPath), |
| "Piri Tommy Villiers - on & on"); |
| } |
| |
| TEST(DecodeUriTest, ParseEncodedChararactersTest) { |
| string encodedString = "%20%22%3C%3E%5C%5E%60%7B%7D%7C"; |
| |
| EXPECT_EQ(httplib::decode_uri(encodedString), " \"<>\\^`{}|"); |
| } |
| |
| TEST(DecodeUriTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'();,/?:@&=+$#"; |
| |
| EXPECT_EQ(httplib::decode_uri(unescapedCharacters), "-_.!~*'();,/?:@&=+$#"); |
| } |
| |
| TEST(DecodeUriTest, TestUTF8Characters) { |
| string encodedChinese = "%E4%B8%AD%E5%9B%BD%E8%AA%9E"; |
| string encodedRussian = "%D0%B4%D0%BE%D0%BC"; |
| string encodedBrazilian = "%C3%B3culos"; |
| |
| EXPECT_EQ(httplib::decode_uri(encodedChinese), u8"中国語"); |
| EXPECT_EQ(httplib::decode_uri(encodedRussian), u8"дом"); |
| EXPECT_EQ(httplib::decode_uri(encodedBrazilian), u8"óculos"); |
| } |
| |
| TEST(DecodeUriTest, TestCompleteUri) { |
| string encodedUri = "https://example.com/path%20with%20spaces/" |
| "file%20name.html?q=hello%20world"; |
| |
| EXPECT_EQ( |
| httplib::decode_uri(encodedUri), |
| "https://example.com/path with spaces/file name.html?q=hello world"); |
| } |
| |
| TEST(DecodeUriTest, TestRoundTripWithEncodeUri) { |
| string original = |
| "https://example.com/path with spaces/file name.html?q=hello world"; |
| string encoded = httplib::encode_uri(original); |
| string decoded = httplib::decode_uri(encoded); |
| |
| EXPECT_EQ(decoded, original); |
| } |
| |
| TEST(DecodeUriComponentTest, TestRoundTripWithEncodeUriComponent) { |
| string original = "Piri Tommy Villiers - on & on"; |
| string encoded = httplib::encode_uri_component(original); |
| string decoded = httplib::decode_uri_component(encoded); |
| |
| EXPECT_EQ(decoded, original); |
| } |
| |
| TEST(TrimTests, TrimStringTests) { |
| EXPECT_EQ("abc", detail::trim_copy("abc")); |
| EXPECT_EQ("abc", detail::trim_copy(" abc ")); |
| EXPECT_TRUE(detail::trim_copy("").empty()); |
| } |
| |
| TEST(ParseAcceptHeaderTest, BasicAcceptParsing) { |
| // Simple case without quality values |
| std::vector<std::string> result1; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html,application/json,text/plain", result1)); |
| EXPECT_EQ(result1.size(), 3U); |
| EXPECT_EQ(result1[0], "text/html"); |
| EXPECT_EQ(result1[1], "application/json"); |
| EXPECT_EQ(result1[2], "text/plain"); |
| |
| // With quality values |
| std::vector<std::string> result2; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html;q=0.9,application/json;q=1.0,text/plain;q=0.8", result2)); |
| EXPECT_EQ(result2.size(), 3U); |
| EXPECT_EQ(result2[0], "application/json"); // highest q value |
| EXPECT_EQ(result2[1], "text/html"); |
| EXPECT_EQ(result2[2], "text/plain"); // lowest q value |
| } |
| |
| TEST(ParseAcceptHeaderTest, MixedQualityValues) { |
| // Mixed with and without quality values |
| std::vector<std::string> result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html,application/json;q=0.5,text/plain;q=0.8", result)); |
| EXPECT_EQ(result.size(), 3U); |
| EXPECT_EQ(result[0], "text/html"); // no q value means 1.0 |
| EXPECT_EQ(result[1], "text/plain"); // q=0.8 |
| EXPECT_EQ(result[2], "application/json"); // q=0.5 |
| } |
| |
| TEST(ParseAcceptHeaderTest, EdgeCases) { |
| // Empty header |
| std::vector<std::string> empty_result; |
| EXPECT_TRUE(detail::parse_accept_header("", empty_result)); |
| EXPECT_TRUE(empty_result.empty()); |
| |
| // Single type |
| std::vector<std::string> single_result; |
| EXPECT_TRUE(detail::parse_accept_header("application/json", single_result)); |
| EXPECT_EQ(single_result.size(), 1U); |
| EXPECT_EQ(single_result[0], "application/json"); |
| |
| // Wildcard types |
| std::vector<std::string> wildcard_result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/*;q=0.5,*/*;q=0.1,application/json", wildcard_result)); |
| EXPECT_EQ(wildcard_result.size(), 3U); |
| EXPECT_EQ(wildcard_result[0], "application/json"); |
| EXPECT_EQ(wildcard_result[1], "text/*"); |
| EXPECT_EQ(wildcard_result[2], "*/*"); |
| } |
| |
| TEST(ParseAcceptHeaderTest, RealWorldExamples) { |
| // Common browser Accept header |
| std::vector<std::string> browser_result; |
| EXPECT_TRUE( |
| detail::parse_accept_header("text/html,application/xhtml+xml,application/" |
| "xml;q=0.9,image/webp,image/apng,*/*;q=0.8", |
| browser_result)); |
| EXPECT_EQ(browser_result.size(), 6U); |
| EXPECT_EQ(browser_result[0], "text/html"); // q=1.0 (default) |
| EXPECT_EQ(browser_result[1], "application/xhtml+xml"); // q=1.0 (default) |
| EXPECT_EQ(browser_result[2], "image/webp"); // q=1.0 (default) |
| EXPECT_EQ(browser_result[3], "image/apng"); // q=1.0 (default) |
| EXPECT_EQ(browser_result[4], "application/xml"); // q=0.9 |
| EXPECT_EQ(browser_result[5], "*/*"); // q=0.8 |
| |
| // API client header |
| std::vector<std::string> api_result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "application/json;q=0.9,application/xml;q=0.8,text/plain;q=0.1", |
| api_result)); |
| EXPECT_EQ(api_result.size(), 3U); |
| EXPECT_EQ(api_result[0], "application/json"); |
| EXPECT_EQ(api_result[1], "application/xml"); |
| EXPECT_EQ(api_result[2], "text/plain"); |
| } |
| |
| TEST(ParseAcceptHeaderTest, SpecialCases) { |
| // Quality value with 3 decimal places |
| std::vector<std::string> decimal_result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html;q=0.123,application/json;q=0.456", decimal_result)); |
| EXPECT_EQ(decimal_result.size(), 2U); |
| EXPECT_EQ(decimal_result[0], "application/json"); // Higher q value |
| EXPECT_EQ(decimal_result[1], "text/html"); |
| |
| // Zero quality (should still be included but with lowest priority) |
| std::vector<std::string> zero_q_result; |
| EXPECT_TRUE(detail::parse_accept_header("text/html;q=0,application/json;q=1", |
| zero_q_result)); |
| EXPECT_EQ(zero_q_result.size(), 2U); |
| EXPECT_EQ(zero_q_result[0], "application/json"); // q=1 |
| EXPECT_EQ(zero_q_result[1], "text/html"); // q=0 |
| |
| // No spaces around commas |
| std::vector<std::string> no_space_result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html;q=0.9,application/json;q=0.8,text/plain;q=0.7", |
| no_space_result)); |
| EXPECT_EQ(no_space_result.size(), 3U); |
| EXPECT_EQ(no_space_result[0], "text/html"); |
| EXPECT_EQ(no_space_result[1], "application/json"); |
| EXPECT_EQ(no_space_result[2], "text/plain"); |
| } |
| |
| TEST(ParseAcceptHeaderTest, InvalidCases) { |
| std::vector<std::string> result; |
| |
| // Invalid quality value (> 1.0) |
| EXPECT_FALSE( |
| detail::parse_accept_header("text/html;q=1.5,application/json", result)); |
| |
| // Invalid quality value (< 0.0) |
| EXPECT_FALSE( |
| detail::parse_accept_header("text/html;q=-0.1,application/json", result)); |
| |
| // Invalid quality value (not a number) |
| EXPECT_FALSE(detail::parse_accept_header( |
| "text/html;q=invalid,application/json", result)); |
| |
| // Empty quality value |
| EXPECT_FALSE( |
| detail::parse_accept_header("text/html;q=,application/json", result)); |
| |
| // Invalid media type format (no slash and not wildcard) |
| EXPECT_FALSE( |
| detail::parse_accept_header("invalidtype,application/json", result)); |
| |
| // Empty media type |
| result.clear(); |
| EXPECT_FALSE(detail::parse_accept_header(",application/json", result)); |
| |
| // Only commas |
| result.clear(); |
| EXPECT_FALSE(detail::parse_accept_header(",,,", result)); |
| |
| // Valid cases should still work |
| EXPECT_TRUE(detail::parse_accept_header("*/*", result)); |
| EXPECT_EQ(result.size(), 1U); |
| EXPECT_EQ(result[0], "*/*"); |
| |
| EXPECT_TRUE(detail::parse_accept_header("*", result)); |
| EXPECT_EQ(result.size(), 1U); |
| EXPECT_EQ(result[0], "*"); |
| |
| EXPECT_TRUE(detail::parse_accept_header("text/*", result)); |
| EXPECT_EQ(result.size(), 1U); |
| EXPECT_EQ(result[0], "text/*"); |
| } |
| |
| TEST(ParseAcceptHeaderTest, ContentTypesPopulatedAndInvalidHeaderHandling) { |
| Server svr; |
| |
| svr.Get("/accept_ok", [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.accept_content_types.size(), 3U); |
| EXPECT_EQ(req.accept_content_types[0], "application/json"); |
| EXPECT_EQ(req.accept_content_types[1], "text/html"); |
| EXPECT_EQ(req.accept_content_types[2], "*/*"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| svr.Get("/accept_bad_request", [&](const Request & /*req*/, Response &res) { |
| EXPECT_TRUE(false); |
| res.set_content("bad request", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| { |
| auto res = |
| cli.Get("/accept_ok", |
| {{"Accept", "application/json, text/html;q=0.8, */*;q=0.1"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| auto res = cli.Get("/accept_bad_request", |
| {{"Accept", "text/html;q=abc,application/json"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } |
| } |
| |
| TEST(DivideTest, DivideStringTests) { |
| auto divide = [](const std::string &str, char d) { |
| std::string lhs; |
| std::string rhs; |
| |
| detail::divide(str, d, |
| [&](const char *lhs_data, std::size_t lhs_size, |
| const char *rhs_data, std::size_t rhs_size) { |
| lhs.assign(lhs_data, lhs_size); |
| rhs.assign(rhs_data, rhs_size); |
| }); |
| |
| return std::make_pair(std::move(lhs), std::move(rhs)); |
| }; |
| |
| { |
| const auto res = divide("", '='); |
| EXPECT_EQ(res.first, ""); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide("=", '='); |
| EXPECT_EQ(res.first, ""); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide(" ", '='); |
| EXPECT_EQ(res.first, " "); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide("a", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide("a=", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide("=b", '='); |
| EXPECT_EQ(res.first, ""); |
| EXPECT_EQ(res.second, "b"); |
| } |
| |
| { |
| const auto res = divide("a=b", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, "b"); |
| } |
| |
| { |
| const auto res = divide("a=b=", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, "b="); |
| } |
| |
| { |
| const auto res = divide("a=b=c", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, "b=c"); |
| } |
| } |
| |
| TEST(SplitTest, ParseQueryString) { |
| string s = "key1=val1&key2=val2&key3=val3"; |
| Params dic; |
| |
| detail::split(s.c_str(), s.c_str() + s.size(), '&', |
| [&](const char *b, const char *e) { |
| string key, val; |
| detail::split(b, e, '=', [&](const char *b2, const char *e2) { |
| if (key.empty()) { |
| key.assign(b2, e2); |
| } else { |
| val.assign(b2, e2); |
| } |
| }); |
| dic.emplace(key, val); |
| }); |
| |
| EXPECT_EQ("val1", dic.find("key1")->second); |
| EXPECT_EQ("val2", dic.find("key2")->second); |
| EXPECT_EQ("val3", dic.find("key3")->second); |
| } |
| |
| TEST(SplitTest, ParseInvalidQueryTests) { |
| |
| { |
| string s = " "; |
| Params dict; |
| detail::parse_query_text(s, dict); |
| EXPECT_TRUE(dict.empty()); |
| } |
| |
| { |
| string s = " = ="; |
| Params dict; |
| detail::parse_query_text(s, dict); |
| EXPECT_TRUE(dict.empty()); |
| } |
| } |
| |
| TEST(ParseQueryTest, ParseQueryString) { |
| { |
| std::string s = "key1=val1&key2=val2&key3=val3"; |
| Params dic; |
| |
| detail::parse_query_text(s, dic); |
| |
| EXPECT_EQ("val1", dic.find("key1")->second); |
| EXPECT_EQ("val2", dic.find("key2")->second); |
| EXPECT_EQ("val3", dic.find("key3")->second); |
| } |
| |
| { |
| std::string s = "key1&key2=val1&key3=val1=val2&key4=val1=val2=val3"; |
| Params dic; |
| |
| detail::parse_query_text(s, dic); |
| |
| EXPECT_EQ("", dic.find("key1")->second); |
| EXPECT_EQ("val1", dic.find("key2")->second); |
| EXPECT_EQ("val1=val2", dic.find("key3")->second); |
| EXPECT_EQ("val1=val2=val3", dic.find("key4")->second); |
| } |
| } |
| |
| TEST(ParamsToQueryTest, ConvertParamsToQuery) { |
| Params dic; |
| |
| EXPECT_EQ(detail::params_to_query_str(dic), ""); |
| |
| dic.emplace("key1", "val1"); |
| |
| EXPECT_EQ(detail::params_to_query_str(dic), "key1=val1"); |
| |
| dic.emplace("key2", "val2"); |
| dic.emplace("key3", "val3"); |
| |
| EXPECT_EQ(detail::params_to_query_str(dic), "key1=val1&key2=val2&key3=val3"); |
| } |
| |
| TEST(ParseMultipartBoundaryTest, DefaultValue) { |
| string content_type = "multipart/form-data; boundary=something"; |
| string boundary; |
| auto ret = detail::parse_multipart_boundary(content_type, boundary); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(boundary, "something"); |
| } |
| |
| TEST(ParseMultipartBoundaryTest, ValueWithQuote) { |
| string content_type = "multipart/form-data; boundary=\"gc0pJq0M:08jU534c0p\""; |
| string boundary; |
| auto ret = detail::parse_multipart_boundary(content_type, boundary); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(boundary, "gc0pJq0M:08jU534c0p"); |
| } |
| |
| TEST(ParseMultipartBoundaryTest, ValueWithCharset) { |
| string content_type = |
| "multipart/mixed; boundary=THIS_STRING_SEPARATES;charset=UTF-8"; |
| string boundary; |
| auto ret = detail::parse_multipart_boundary(content_type, boundary); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(boundary, "THIS_STRING_SEPARATES"); |
| } |
| |
| TEST(ParseMultipartBoundaryTest, ValueWithQuotesAndCharset) { |
| string content_type = |
| "multipart/mixed; boundary=\"cpp-httplib-multipart-data\"; charset=UTF-8"; |
| string boundary; |
| auto ret = detail::parse_multipart_boundary(content_type, boundary); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(boundary, "cpp-httplib-multipart-data"); |
| } |
| |
| TEST(GetHeaderValueTest, DefaultValue) { |
| Headers headers = {{"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value(headers, "Content-Type", "text/plain", 0); |
| EXPECT_STREQ("text/plain", val); |
| } |
| |
| TEST(GetHeaderValueTest, DefaultValueInt) { |
| Headers headers = {{"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value_u64(headers, "Content-Length", 100, 0); |
| EXPECT_EQ(100ull, val); |
| } |
| |
| TEST(GetHeaderValueTest, RegularValue) { |
| Headers headers = {{"Content-Type", "text/html"}, {"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value(headers, "Content-Type", "text/plain", 0); |
| EXPECT_STREQ("text/html", val); |
| } |
| |
| TEST(GetHeaderValueTest, RegularValueWithDifferentCase) { |
| Headers headers = {{"Content-Type", "text/html"}, {"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value(headers, "content-type", "text/plain", 0); |
| EXPECT_STREQ("text/html", val); |
| } |
| |
| TEST(GetHeaderValueTest, SetContent) { |
| Response res; |
| |
| res.set_content("html", "text/html"); |
| EXPECT_EQ("text/html", res.get_header_value("Content-Type")); |
| |
| res.set_content("text", "text/plain"); |
| EXPECT_EQ(1U, res.get_header_value_count("Content-Type")); |
| EXPECT_EQ("text/plain", res.get_header_value("Content-Type")); |
| } |
| |
| TEST(GetHeaderValueTest, RegularValueInt) { |
| Headers headers = {{"Content-Length", "100"}, {"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value_u64(headers, "Content-Length", 0, 0); |
| EXPECT_EQ(100ull, val); |
| } |
| |
| TEST(GetHeaderValueTest, RegularInvalidValueInt) { |
| Headers headers = {{"Content-Length", "x"}}; |
| auto is_invalid_value = false; |
| auto val = detail::get_header_value_u64(headers, "Content-Length", 0, 0, |
| is_invalid_value); |
| EXPECT_EQ(0ull, val); |
| EXPECT_TRUE(is_invalid_value); |
| } |
| |
| TEST(GetHeaderValueTest, Range) { |
| { |
| Headers headers = {make_range_header({{1, -1}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=1-", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{-1, 1}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=-1", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, 10}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=1-10", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, 10}, {100, -1}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=1-10, 100-", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, 10}, {100, 200}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=1-10, 100-200", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{0, 0}, {-1, 1}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=0-0, -1", val); |
| } |
| } |
| |
| TEST(ParseHeaderValueTest, Range) { |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=1-", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(1u, ranges.size()); |
| EXPECT_EQ(1u, ranges[0].first); |
| EXPECT_EQ(-1, ranges[0].second); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=-1", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(1u, ranges.size()); |
| EXPECT_EQ(-1, ranges[0].first); |
| EXPECT_EQ(1u, ranges[0].second); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=1-10", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(1u, ranges.size()); |
| EXPECT_EQ(1u, ranges[0].first); |
| EXPECT_EQ(10u, ranges[0].second); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=10-1", ranges); |
| EXPECT_FALSE(ret); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=1-10, 100-", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(2u, ranges.size()); |
| EXPECT_EQ(1u, ranges[0].first); |
| EXPECT_EQ(10u, ranges[0].second); |
| EXPECT_EQ(100u, ranges[1].first); |
| EXPECT_EQ(-1, ranges[1].second); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = |
| detail::parse_range_header("bytes=1-10, 100-200, 300-400", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(3u, ranges.size()); |
| EXPECT_EQ(1u, ranges[0].first); |
| EXPECT_EQ(10u, ranges[0].second); |
| EXPECT_EQ(100u, ranges[1].first); |
| EXPECT_EQ(200u, ranges[1].second); |
| EXPECT_EQ(300u, ranges[2].first); |
| EXPECT_EQ(400u, ranges[2].second); |
| } |
| |
| { |
| Ranges ranges; |
| |
| EXPECT_FALSE(detail::parse_range_header("bytes", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=0", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=-", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes= ", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=,", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=,,", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=,,,", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=a-b", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=1-0", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=0--1", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=0- 1", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=0 -1", ranges)); |
| EXPECT_TRUE(ranges.empty()); |
| } |
| } |
| |
| TEST(ParseAcceptEncoding1, AcceptEncoding) { |
| Request req; |
| req.set_header("Accept-Encoding", "gzip"); |
| |
| Response res; |
| res.set_header("Content-Type", "text/plain"); |
| |
| auto ret = detail::encoding_type(req, res); |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Gzip); |
| #else |
| EXPECT_TRUE(ret == detail::EncodingType::None); |
| #endif |
| } |
| |
| TEST(ParseAcceptEncoding2, AcceptEncoding) { |
| Request req; |
| req.set_header("Accept-Encoding", "gzip, deflate, br, zstd"); |
| |
| Response res; |
| res.set_header("Content-Type", "text/plain"); |
| |
| auto ret = detail::encoding_type(req, res); |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Brotli); |
| #elif CPPHTTPLIB_ZLIB_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Gzip); |
| #elif CPPHTTPLIB_ZSTD_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Zstd); |
| #else |
| EXPECT_TRUE(ret == detail::EncodingType::None); |
| #endif |
| } |
| |
| TEST(ParseAcceptEncoding3, AcceptEncoding) { |
| Request req; |
| req.set_header("Accept-Encoding", |
| "br;q=1.0, gzip;q=0.8, zstd;q=0.8, *;q=0.1"); |
| |
| Response res; |
| res.set_header("Content-Type", "text/plain"); |
| |
| auto ret = detail::encoding_type(req, res); |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Brotli); |
| #elif CPPHTTPLIB_ZLIB_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Gzip); |
| #elif CPPHTTPLIB_ZSTD_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Zstd); |
| #else |
| EXPECT_TRUE(ret == detail::EncodingType::None); |
| #endif |
| } |
| |
| TEST(BufferStreamTest, read) { |
| detail::BufferStream strm1; |
| Stream &strm = strm1; |
| |
| EXPECT_EQ(5, strm.write("hello")); |
| |
| char buf[512]; |
| EXPECT_EQ(2, strm.read(buf, 2)); |
| EXPECT_EQ('h', buf[0]); |
| EXPECT_EQ('e', buf[1]); |
| |
| EXPECT_EQ(2, strm.read(buf, 2)); |
| EXPECT_EQ('l', buf[0]); |
| EXPECT_EQ('l', buf[1]); |
| |
| EXPECT_EQ(1, strm.read(buf, 1)); |
| EXPECT_EQ('o', buf[0]); |
| |
| EXPECT_EQ(0, strm.read(buf, 1)); |
| } |
| |
| TEST(HostnameToIPConversionTest, HTTPWatch_Online) { |
| auto host = "www.httpwatch.com"; |
| |
| auto ip = hosted_at(host); |
| EXPECT_EQ("23.96.13.243", ip); |
| |
| std::vector<std::string> addrs; |
| hosted_at(host, addrs); |
| EXPECT_EQ(1u, addrs.size()); |
| } |
| |
| #if 0 // It depends on each test environment... |
| TEST(HostnameToIPConversionTest, YouTube_Online) { |
| auto host = "www.youtube.com"; |
| |
| std::vector<std::string> addrs; |
| hosted_at(host, addrs); |
| |
| EXPECT_EQ(20u, addrs.size()); |
| |
| auto it = std::find(addrs.begin(), addrs.end(), "2607:f8b0:4006:809::200e"); |
| EXPECT_TRUE(it != addrs.end()); |
| } |
| #endif |
| |
| class ChunkedEncodingTest : public ::testing::Test { |
| protected: |
| ChunkedEncodingTest() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| cli_.set_connection_timeout(2); |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| read_file("./image.jpg", image_data_); |
| |
| svr_.Get("/hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| svr_.Get( |
| "/chunked", [this](const httplib::Request &, httplib::Response &res) { |
| res.set_chunked_content_provider( |
| "image/jpeg", [this](size_t offset, httplib::DataSink &sink) { |
| size_t remaining = image_data_.size() - offset; |
| if (remaining == 0) { |
| sink.done(); |
| } else { |
| constexpr size_t CHUNK_SIZE = 1024; |
| size_t send_size = std::min(CHUNK_SIZE, remaining); |
| sink.write(&image_data_[offset], send_size); |
| |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| return true; |
| }); |
| }); |
| |
| t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| if (!request_threads_.empty()) { |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| for (auto &t : request_threads_) { |
| t.join(); |
| } |
| } |
| t_.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| std::vector<thread> request_threads_; |
| std::string image_data_; |
| }; |
| |
| TEST_F(ChunkedEncodingTest, NormalGet) { |
| auto res = cli_.Get("/chunked"); |
| ASSERT_TRUE(res); |
| |
| std::string out; |
| read_file("./image.jpg", out); |
| |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(out, res->body); |
| } |
| |
| TEST_F(ChunkedEncodingTest, WithContentReceiver) { |
| std::string body; |
| auto res = cli_.Get("/chunked", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| ASSERT_TRUE(res); |
| |
| std::string out; |
| read_file("./image.jpg", out); |
| |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(out, body); |
| } |
| |
| TEST_F(ChunkedEncodingTest, WithResponseHandlerAndContentReceiver) { |
| std::string body; |
| auto res = cli_.Get( |
| "/chunked", |
| [&](const Response &response) { |
| EXPECT_EQ(StatusCode::OK_200, response.status); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| ASSERT_TRUE(res); |
| |
| std::string out; |
| read_file("./image.jpg", out); |
| |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(out, body); |
| } |
| |
| TEST(RangeTest, FromHTTPBin_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpbin.org"; |
| auto path = std::string{"/range/32"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/32"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(5); |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, -1}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("bcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, 10}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("bcdefghijk", res->body); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{0, 31}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{0, -1}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{0, 32}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| } |
| } |
| |
| TEST(GetAddrInfoDanglingRefTest, LongTimeout) { |
| auto host = "unresolvableaddress.local"; |
| auto path = std::string{"/"}; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(1); |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_FALSE(res); |
| } |
| |
| std::this_thread::sleep_for(std::chrono::seconds(8)); |
| } |
| |
| TEST(ConnectionErrorTest, InvalidHost) { |
| auto host = "-abcde.com"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| |
| TEST(ConnectionErrorTest, InvalidHost2) { |
| auto host = "httpbin.org/"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| |
| TEST(ConnectionErrorTest, InvalidHostCheckResultErrorToString) { |
| auto host = "httpbin.org/"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| stringstream s; |
| s << "error code: " << res.error(); |
| EXPECT_EQ("error code: Could not establish connection (2)", s.str()); |
| } |
| |
| TEST(ConnectionErrorTest, InvalidPort) { |
| auto host = "localhost"; |
| auto port = 44380; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host, port); |
| #else |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_TRUE(Error::Connection == res.error() || |
| Error::ConnectionTimeout == res.error()); |
| } |
| |
| TEST(ConnectionErrorTest, Timeout_Online) { |
| auto host = "google.com"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| auto port = 44380; |
| SSLClient cli(host, port); |
| #else |
| auto port = 8080; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| // only probe one address type so that the error reason |
| // correlates to the timed-out IPv4, not the unsupported |
| // IPv6 connection attempt |
| cli.set_address_family(AF_INET); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::ConnectionTimeout, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancel_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpbin.org"; |
| auto path = std::string{"/range/32"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/32"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = cli.Get(path, [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayload_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpbin.org"; |
| auto path = std::string{"/range/32"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/32"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| |
| auto res = cli.Get(path, [](uint64_t, uint64_t) { return false; }); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayload_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpbin.org"; |
| auto path = std::string{"/range/65536"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/65536"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| uint32_t count = 0; |
| auto res = |
| cli.Get(path, [&count](uint64_t, uint64_t) { return (count++ == 0); }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancelPost) { |
| Server svr; |
| |
| svr.Post("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayloadPost) { |
| Server svr; |
| |
| svr.Post("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayloadPost) { |
| Server svr; |
| |
| svr.Post("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(LARGE_DATA, "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancelPut) { |
| Server svr; |
| |
| svr.Put("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayloadPut) { |
| Server svr; |
| |
| svr.Put("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayloadPut) { |
| Server svr; |
| |
| svr.Put("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(LARGE_DATA, "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancelPatch) { |
| Server svr; |
| |
| svr.Patch("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayloadPatch) { |
| Server svr; |
| |
| svr.Patch("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayloadPatch) { |
| Server svr; |
| |
| svr.Patch("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(LARGE_DATA, "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancelDelete) { |
| Server svr; |
| |
| svr.Delete("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayloadDelete) { |
| Server svr; |
| |
| svr.Delete("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayloadDelete) { |
| Server svr; |
| |
| svr.Delete("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(LARGE_DATA, "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| static std::string remove_whitespace(const std::string &input) { |
| std::string output; |
| output.reserve(input.size()); |
| std::copy_if(input.begin(), input.end(), std::back_inserter(output), |
| [](unsigned char c) { return !std::isspace(c); }); |
| return output; |
| } |
| |
| TEST(BaseAuthTest, FromHTTPWatch_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpbin.org"; |
| auto path = std::string{"/basic-auth/hello/world"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/basic-auth/hello/world"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| { |
| auto res = |
| cli.Get(path, {make_basic_authentication_header("hello", "world")}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", |
| remove_whitespace(res->body)); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| cli.set_basic_auth("hello", "world"); |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", |
| remove_whitespace(res->body)); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| cli.set_basic_auth("hello", "bad"); |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| { |
| cli.set_basic_auth("bad", "world"); |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(DigestAuthTest, FromHTTPWatch_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpbin.org"; |
| auto unauth_path = std::string{"/digest-auth/auth/hello/world"}; |
| auto paths = std::vector<std::string>{ |
| "/digest-auth/auth/hello/world/MD5", |
| "/digest-auth/auth/hello/world/SHA-256", |
| "/digest-auth/auth/hello/world/SHA-512", |
| "/digest-auth/auth-int/hello/world/MD5", |
| }; |
| #else |
| auto host = "nghttp2.org"; |
| auto unauth_path = std::string{"/httpbin/digest-auth/auth/hello/world"}; |
| auto paths = std::vector<std::string>{ |
| "/httpbin/digest-auth/auth/hello/world/MD5", |
| "/httpbin/digest-auth/auth/hello/world/SHA-256", |
| "/httpbin/digest-auth/auth/hello/world/SHA-512", |
| "/httpbin/digest-auth/auth-int/hello/world/MD5", |
| }; |
| #endif |
| |
| auto port = 443; |
| SSLClient cli(host, port); |
| |
| { |
| auto res = cli.Get(unauth_path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| { |
| |
| cli.set_digest_auth("hello", "world"); |
| for (const auto &path : paths) { |
| auto res = cli.Get(path.c_str()); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", |
| remove_whitespace(res->body)); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| cli.set_digest_auth("hello", "bad"); |
| for (const auto &path : paths) { |
| auto res = cli.Get(path.c_str()); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| // NOTE: Until httpbin.org fixes issue #46, the following test is commented |
| // out. Please see https://httpbin.org/digest-auth/auth/hello/world |
| // cli.set_digest_auth("bad", "world"); |
| // for (const auto& path : paths) { |
| // auto res = cli.Get(path.c_str()); |
| // ASSERT_TRUE(res); |
| // EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| // } |
| } |
| } |
| #endif |
| |
| TEST(SpecifyServerIPAddressTest, AnotherHostname_Online) { |
| auto host = "google.com"; |
| auto another_host = "example.com"; |
| auto wrong_ip = "0.0.0.0"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_hostname_addr_map({{another_host, wrong_ip}}); |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SpecifyServerIPAddressTest, RealHostname_Online) { |
| auto host = "google.com"; |
| auto wrong_ip = "0.0.0.0"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_hostname_addr_map({{host, wrong_ip}}); |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| |
| TEST(AbsoluteRedirectTest, Redirect_Online) { |
| auto host = "nghttp2.org"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_follow_location(true); |
| auto res = cli.Get("/httpbin/absolute-redirect/3"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(RedirectTest, Redirect_Online) { |
| auto host = "nghttp2.org"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_follow_location(true); |
| auto res = cli.Get("/httpbin/redirect/3"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(RelativeRedirectTest, Redirect_Online) { |
| auto host = "nghttp2.org"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_follow_location(true); |
| auto res = cli.Get("/httpbin/relative-redirect/3"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(TooManyRedirectTest, Redirect_Online) { |
| auto host = "nghttp2.org"; |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_follow_location(true); |
| auto res = cli.Get("/httpbin/redirect/21"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::ExceedRedirectCount, res.error()); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(YahooRedirectTest, Redirect_Online) { |
| Client cli("yahoo.com"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("https://www.yahoo.com/", res->location); |
| } |
| |
| // Previously "nghttp2.org" "/httpbin/redirect-to" |
| #define REDIR_HOST "httpbingo.org" |
| #define REDIR_PATH "/redirect-to" |
| |
| TEST(HttpsToHttpRedirectTest, Redirect_Online) { |
| SSLClient cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| auto res = |
| cli.Get(REDIR_PATH "?url=http%3A%2F%2Fexample.com&status_code=302"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpsToHttpRedirectTest2, Redirect_Online) { |
| SSLClient cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| |
| Params params; |
| params.emplace("url", "http://example.com"); |
| params.emplace("status_code", "302"); |
| |
| auto res = cli.Get(REDIR_PATH, params, Headers{}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpsToHttpRedirectTest3, Redirect_Online) { |
| SSLClient cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| |
| Params params; |
| params.emplace("url", "http://example.com"); |
| |
| auto res = cli.Get(REDIR_PATH "?status_code=302", params, Headers{}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(UrlWithSpace, Redirect_Online) { |
| SSLClient cli("edge.forgecdn.net"); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/files/2595/310/Neat 1.4-17.jar"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(18527U, res->get_header_value_u64("Content-Length")); |
| } |
| |
| #endif |
| |
| #if !defined(_WIN32) && !defined(_WIN64) |
| TEST(ReceiveSignals, Signal) { |
| auto setupSignalHandlers = []() { |
| struct sigaction act; |
| |
| sigemptyset(&act.sa_mask); |
| act.sa_flags = SA_SIGINFO; |
| act.sa_sigaction = [](int sig, siginfo_t *, void *) { |
| switch (sig) { |
| case SIGINT: |
| default: break; |
| } |
| }; |
| ::sigaction(SIGINT, &act, nullptr); |
| }; |
| |
| Server svr; |
| int port = 0; |
| auto thread = std::thread([&]() { |
| setupSignalHandlers(); |
| port = svr.bind_to_any_port("localhost"); |
| svr.listen_after_bind(); |
| }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| ASSERT_TRUE(svr.is_running()); |
| pthread_kill(thread.native_handle(), SIGINT); |
| std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
| ASSERT_TRUE(svr.is_running()); |
| } |
| #endif |
| |
| TEST(RedirectToDifferentPort, Redirect) { |
| Server svr1; |
| svr1.Get("/1", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| int svr1_port = 0; |
| auto thread1 = std::thread([&]() { |
| svr1_port = svr1.bind_to_any_port("localhost"); |
| svr1.listen_after_bind(); |
| }); |
| |
| Server svr2; |
| svr2.Get("/2", [&](const Request & /*req*/, Response &res) { |
| res.set_redirect("http://localhost:" + std::to_string(svr1_port) + "/1"); |
| }); |
| |
| int svr2_port = 0; |
| auto thread2 = std::thread([&]() { |
| svr2_port = svr2.bind_to_any_port("localhost"); |
| svr2.listen_after_bind(); |
| }); |
| auto se = detail::scope_exit([&] { |
| svr2.stop(); |
| thread2.join(); |
| svr1.stop(); |
| thread1.join(); |
| ASSERT_FALSE(svr2.is_running()); |
| ASSERT_FALSE(svr1.is_running()); |
| }); |
| |
| svr1.wait_until_ready(); |
| svr2.wait_until_ready(); |
| |
| Client cli("localhost", svr2_port); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/2"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| TEST(RedirectFromPageWithContent, Redirect) { |
| Server svr; |
| |
| svr.Get("/1", [&](const Request & /*req*/, Response &res) { |
| res.set_content("___", "text/plain"); |
| res.set_redirect("/2"); |
| }); |
| |
| svr.Get("/2", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto th = std::thread([&]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| th.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli("localhost", PORT); |
| cli.set_follow_location(true); |
| |
| std::string body; |
| auto res = cli.Get("/1", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", body); |
| } |
| |
| { |
| Client cli("localhost", PORT); |
| |
| std::string body; |
| auto res = cli.Get("/1", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Found_302, res->status); |
| EXPECT_EQ("___", body); |
| } |
| } |
| |
| TEST(RedirectFromPageWithContentIP6, Redirect) { |
| Server svr; |
| |
| svr.Get("/1", [&](const Request & /*req*/, Response &res) { |
| res.set_content("___", "text/plain"); |
| // res.set_redirect("/2"); |
| res.set_redirect("http://[::1]:1234/2"); |
| }); |
| |
| svr.Get("/2", [&](const Request &req, Response &res) { |
| auto host_header = req.headers.find("Host"); |
| ASSERT_TRUE(host_header != req.headers.end()); |
| EXPECT_EQ("[::1]:1234", host_header->second); |
| |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto th = std::thread([&]() { svr.listen("::1", 1234); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| th.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| // When IPV6 support isn't available svr.listen("::1", 1234) never |
| // actually starts anything, so the condition !svr.is_running() will |
| // always remain true, and the loop never stops. |
| // This basically counts how many milliseconds have passed since the |
| // call to svr.listen(), and if after 5 seconds nothing started yet |
| // aborts the test. |
| for (unsigned int milliseconds = 0; !svr.is_running(); milliseconds++) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(1)); |
| ASSERT_LT(milliseconds, 5000U); |
| } |
| |
| { |
| Client cli("http://[::1]:1234"); |
| cli.set_follow_location(true); |
| |
| std::string body; |
| auto res = cli.Get("/1", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", body); |
| } |
| |
| { |
| Client cli("http://[::1]:1234"); |
| |
| std::string body; |
| auto res = cli.Get("/1", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Found_302, res->status); |
| EXPECT_EQ("___", body); |
| } |
| } |
| |
| TEST(PathUrlEncodeTest, PathUrlEncode) { |
| Server svr; |
| |
| svr.Get("/foo", [](const Request &req, Response &res) { |
| auto a = req.params.find("a"); |
| if (a != req.params.end()) { |
| res.set_content((*a).second, "text/plain"); |
| res.status = StatusCode::OK_200; |
| } else { |
| res.status = StatusCode::BadRequest_400; |
| } |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_path_encode(false); |
| |
| auto res = cli.Get("/foo?a=explicitly+encoded"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| // This expects it back with a space, as the `+` won't have been |
| // url-encoded, and server-side the params get decoded turning `+` |
| // into spaces. |
| EXPECT_EQ("explicitly encoded", res->body); |
| } |
| } |
| |
| TEST(PathUrlEncodeTest, IncludePercentEncodingLF) { |
| Server svr; |
| |
| svr.Get("/", [](const Request &req, Response &) { |
| EXPECT_EQ("\x0A", req.get_param_value("something")); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_path_encode(false); |
| |
| auto res = cli.Get("/?something=%0A"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(BindServerTest, DISABLED_BindDualStack) { |
| Server svr; |
| |
| svr.Get("/1", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen("::", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli("127.0.0.1", PORT); |
| |
| auto res = cli.Get("/1"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| { |
| Client cli("::1", PORT); |
| |
| auto res = cli.Get("/1"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| } |
| |
| TEST(BindServerTest, BindAndListenSeparately) { |
| Server svr; |
| int port = svr.bind_to_any_port("0.0.0.0"); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(port > 0); |
| svr.stop(); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(BindServerTest, BindAndListenSeparatelySSL) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, |
| CLIENT_CA_CERT_DIR); |
| int port = svr.bind_to_any_port("0.0.0.0"); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(port > 0); |
| svr.stop(); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(BindServerTest, BindAndListenSeparatelySSLEncryptedKey) { |
| SSLServer svr(SERVER_ENCRYPTED_CERT_FILE, SERVER_ENCRYPTED_PRIVATE_KEY_FILE, |
| nullptr, nullptr, SERVER_ENCRYPTED_PRIVATE_KEY_PASS); |
| int port = svr.bind_to_any_port("0.0.0.0"); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(port > 0); |
| svr.stop(); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| X509 *readCertificate(const std::string &strFileName) { |
| std::ifstream inStream(strFileName); |
| std::string strCertPEM((std::istreambuf_iterator<char>(inStream)), |
| std::istreambuf_iterator<char>()); |
| |
| if (strCertPEM.empty()) return (nullptr); |
| |
| BIO *pbCert = BIO_new(BIO_s_mem()); |
| BIO_write(pbCert, strCertPEM.c_str(), (int)strCertPEM.size()); |
| X509 *pCert = PEM_read_bio_X509(pbCert, NULL, 0, NULL); |
| BIO_free(pbCert); |
| |
| return (pCert); |
| } |
| |
| EVP_PKEY *readPrivateKey(const std::string &strFileName) { |
| std::ifstream inStream(strFileName); |
| std::string strPrivateKeyPEM((std::istreambuf_iterator<char>(inStream)), |
| std::istreambuf_iterator<char>()); |
| |
| if (strPrivateKeyPEM.empty()) return (nullptr); |
| |
| BIO *pbPrivKey = BIO_new(BIO_s_mem()); |
| BIO_write(pbPrivKey, strPrivateKeyPEM.c_str(), (int)strPrivateKeyPEM.size()); |
| EVP_PKEY *pPrivateKey = PEM_read_bio_PrivateKey(pbPrivKey, NULL, NULL, NULL); |
| BIO_free(pbPrivKey); |
| |
| return (pPrivateKey); |
| } |
| |
| TEST(BindServerTest, UpdateCerts) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); |
| int port = svr.bind_to_any_port("0.0.0.0"); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(port > 0); |
| |
| X509 *cert = readCertificate(SERVER_CERT_FILE); |
| X509 *ca_cert = readCertificate(CLIENT_CA_CERT_FILE); |
| EVP_PKEY *key = readPrivateKey(SERVER_PRIVATE_KEY_FILE); |
| |
| ASSERT_TRUE(cert != nullptr); |
| ASSERT_TRUE(ca_cert != nullptr); |
| ASSERT_TRUE(key != nullptr); |
| |
| X509_STORE *cert_store = X509_STORE_new(); |
| |
| X509_STORE_add_cert(cert_store, ca_cert); |
| |
| svr.update_certs(cert, key, cert_store); |
| |
| ASSERT_TRUE(svr.is_valid()); |
| svr.stop(); |
| |
| X509_free(cert); |
| X509_free(ca_cert); |
| EVP_PKEY_free(key); |
| } |
| #endif |
| |
| TEST(ErrorHandlerTest, ContentLength) { |
| Server svr; |
| |
| svr.set_error_handler([](const Request & /*req*/, Response &res) { |
| res.status = StatusCode::OK_200; |
| res.set_content("abcdefghijklmnopqrstuvwxyz", |
| "text/html"); // <= Content-Length still 13 |
| }); |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!\n", "text/plain"); |
| res.status = 524; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); |
| } |
| } |
| |
| #ifndef CPPHTTPLIB_NO_EXCEPTIONS |
| TEST(ExceptionTest, WithoutExceptionHandler) { |
| Server svr; |
| |
| svr.Get("/exception", [&](const Request & /*req*/, Response & /*res*/) { |
| throw std::runtime_error("exception..."); |
| }); |
| |
| svr.Get("/unknown", [&](const Request & /*req*/, Response & /*res*/) { |
| throw std::runtime_error("exception\r\n..."); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| { |
| auto res = cli.Get("/exception"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| ASSERT_TRUE(res->has_header("EXCEPTION_WHAT")); |
| EXPECT_EQ("exception...", res->get_header_value("EXCEPTION_WHAT")); |
| } |
| |
| { |
| auto res = cli.Get("/unknown"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| ASSERT_TRUE(res->has_header("EXCEPTION_WHAT")); |
| EXPECT_EQ("exception\\r\\n...", res->get_header_value("EXCEPTION_WHAT")); |
| } |
| } |
| |
| TEST(ExceptionTest, WithExceptionHandler) { |
| Server svr; |
| |
| svr.set_exception_handler([](const Request & /*req*/, Response &res, |
| std::exception_ptr ep) { |
| EXPECT_FALSE(ep == nullptr); |
| try { |
| std::rethrow_exception(ep); |
| } catch (std::exception &e) { |
| EXPECT_EQ("abc", std::string(e.what())); |
| } catch (...) {} |
| res.status = StatusCode::InternalServerError_500; |
| res.set_content("abcdefghijklmnopqrstuvwxyz", |
| "text/html"); // <= Content-Length still 13 at this point |
| }); |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!\n", "text/plain"); |
| throw std::runtime_error("abc"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| for (size_t i = 0; i < 10; i++) { |
| Client cli(HOST, PORT); |
| |
| for (size_t j = 0; j < 100; j++) { |
| auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); |
| } |
| |
| cli.set_keep_alive(true); |
| |
| for (size_t j = 0; j < 100; j++) { |
| auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); |
| } |
| } |
| } |
| |
| TEST(ExceptionTest, AndErrorHandler) { |
| Server svr; |
| |
| svr.set_error_handler([](const Request & /*req*/, Response &res) { |
| if (res.body.empty()) { res.set_content("NOT_FOUND", "text/html"); } |
| }); |
| |
| svr.set_exception_handler( |
| [](const Request & /*req*/, Response &res, std::exception_ptr ep) { |
| EXPECT_FALSE(ep == nullptr); |
| try { |
| std::rethrow_exception(ep); |
| } catch (std::exception &e) { |
| res.set_content(e.what(), "text/html"); |
| } catch (...) {} |
| res.status = StatusCode::InternalServerError_500; |
| }); |
| |
| svr.Get("/exception", [](const Request & /*req*/, Response & /*res*/) { |
| throw std::runtime_error("EXCEPTION"); |
| }); |
| |
| svr.Get("/error", [](const Request & /*req*/, Response &res) { |
| res.set_content("ERROR", "text/html"); |
| res.status = StatusCode::InternalServerError_500; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| { |
| auto res = cli.Get("/exception"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("EXCEPTION", res->body); |
| } |
| |
| { |
| auto res = cli.Get("/error"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| EXPECT_EQ("ERROR", res->body); |
| } |
| |
| { |
| auto res = cli.Get("/invalid"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| EXPECT_EQ("NOT_FOUND", res->body); |
| } |
| } |
| #endif |
| |
| TEST(NoContentTest, ContentLength) { |
| Server svr; |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.status = StatusCode::NoContent_204; |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NoContent_204, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| } |
| } |
| |
| TEST(RoutingHandlerTest, PreAndPostRoutingHandlers) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| #else |
| Server svr; |
| #endif |
| |
| svr.set_pre_routing_handler([](const Request &req, Response &res) { |
| if (req.path == "/routing_handler") { |
| res.set_header("PRE_ROUTING", "on"); |
| res.set_content("Routing Handler", "text/plain"); |
| return httplib::Server::HandlerResponse::Handled; |
| } |
| return httplib::Server::HandlerResponse::Unhandled; |
| }); |
| |
| svr.set_error_handler([](const Request & /*req*/, Response &res) { |
| res.set_content("Error", "text/html"); |
| }); |
| |
| svr.set_post_routing_handler([](const Request &req, Response &res) { |
| if (req.path == "/routing_handler") { |
| res.set_header("POST_ROUTING", "on"); |
| } |
| }); |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!\n", "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| #else |
| Client cli(HOST, PORT); |
| #endif |
| |
| auto res = cli.Get("/routing_handler"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Routing Handler", res->body); |
| EXPECT_EQ(1U, res->get_header_value_count("PRE_ROUTING")); |
| EXPECT_EQ("on", res->get_header_value("PRE_ROUTING")); |
| EXPECT_EQ(1U, res->get_header_value_count("POST_ROUTING")); |
| EXPECT_EQ("on", res->get_header_value("POST_ROUTING")); |
| } |
| |
| { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| #else |
| Client cli(HOST, PORT); |
| #endif |
| |
| auto res = cli.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!\n", res->body); |
| EXPECT_EQ(0U, res->get_header_value_count("PRE_ROUTING")); |
| EXPECT_EQ(0U, res->get_header_value_count("POST_ROUTING")); |
| } |
| |
| { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| #else |
| Client cli(HOST, PORT); |
| #endif |
| |
| auto res = cli.Get("/aaa"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| EXPECT_EQ("Error", res->body); |
| EXPECT_EQ(0U, res->get_header_value_count("PRE_ROUTING")); |
| EXPECT_EQ(0U, res->get_header_value_count("POST_ROUTING")); |
| } |
| } |
| |
| TEST(RequestHandlerTest, PreRequestHandler) { |
| auto route_path = "/user/:user"; |
| |
| Server svr; |
| |
| svr.Get("/hi", [](const Request &, Response &res) { |
| res.set_content("hi", "text/plain"); |
| }); |
| |
| svr.Get(route_path, [](const Request &req, Response &res) { |
| res.set_content(req.path_params.at("user"), "text/plain"); |
| }); |
| |
| svr.set_pre_request_handler([&](const Request &req, Response &res) { |
| if (req.matched_route == route_path) { |
| auto user = req.path_params.at("user"); |
| if (user != "john") { |
| res.status = StatusCode::Forbidden_403; |
| res.set_content("error", "text/html"); |
| return Server::HandlerResponse::Handled; |
| } |
| } |
| return Server::HandlerResponse::Unhandled; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| { |
| auto res = cli.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("hi", res->body); |
| } |
| |
| { |
| auto res = cli.Get("/user/john"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("john", res->body); |
| } |
| |
| { |
| auto res = cli.Get("/user/invalid-user"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Forbidden_403, res->status); |
| EXPECT_EQ("error", res->body); |
| } |
| } |
| |
| TEST(InvalidFormatTest, StatusCode) { |
| Server svr; |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!\n", "text/plain"); |
| res.status = 9999; // Status should be a three-digit code... |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/hi"); |
| ASSERT_FALSE(res); |
| } |
| } |
| |
| TEST(URLFragmentTest, WithFragment) { |
| Server svr; |
| |
| svr.Get("/hi", [](const Request &req, Response & /*res*/) { |
| EXPECT_TRUE(req.target == "/hi"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/hi#key1=val1=key2=val2"); |
| EXPECT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli.Get("/hi%23key1=val1=key2=val2"); |
| EXPECT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| } |
| |
| TEST(HeaderWriter, SetHeaderWriter) { |
| Server svr; |
| |
| svr.set_header_writer([](Stream &strm, Headers &hdrs) { |
| hdrs.emplace("CustomServerHeader", "CustomServerValue"); |
| return detail::write_headers(strm, hdrs); |
| }); |
| svr.Get("/hi", [](const Request &req, Response &res) { |
| auto it = req.headers.find("CustomClientHeader"); |
| EXPECT_TRUE(it != req.headers.end()); |
| EXPECT_EQ(it->second, "CustomClientValue"); |
| res.set_content("Hello World!\n", "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_header_writer([](Stream &strm, Headers &hdrs) { |
| hdrs.emplace("CustomClientHeader", "CustomClientValue"); |
| return detail::write_headers(strm, hdrs); |
| }); |
| |
| auto res = cli.Get("/hi"); |
| EXPECT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| auto it = res->headers.find("CustomServerHeader"); |
| EXPECT_TRUE(it != res->headers.end()); |
| EXPECT_EQ(it->second, "CustomServerValue"); |
| } |
| } |
| |
| class ServerTest : public ::testing::Test { |
| protected: |
| ServerTest() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| svr_.set_mount_point("/", "./www"); |
| svr_.set_mount_point("/mount", "./www2"); |
| svr_.set_file_extension_and_mimetype_mapping("abcde", "text/abcde"); |
| |
| svr_.Get("/hi", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }) |
| .Get("/file_content", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_file_content("./www/dir/test.html"); |
| }) |
| .Get("/file_content_with_content_type", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_file_content("./www/file", "text/plain"); |
| }) |
| .Get("/invalid_file_content", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_file_content("./www/dir/invalid_file_path"); |
| }) |
| .Get("/http_response_splitting", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_header("a", "1\r\nSet-Cookie: a=1"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a", "1\nSet-Cookie: a=1"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a", "1\rSet-Cookie: a=1"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a\r\nb", "0"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a\rb", "0"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a\nb", "0"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_redirect("1\r\nSet-Cookie: a=1"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("Location")); |
| }) |
| .Get("/slow", |
| [&](const Request & /*req*/, Response &res) { |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| res.set_content("slow", "text/plain"); |
| }) |
| #if 0 |
| .Post("/slowpost", |
| [&](const Request & /*req*/, Response &res) { |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| res.set_content("slow", "text/plain"); |
| }) |
| #endif |
| .Get("/remote_addr", |
| [&](const Request &req, Response &res) { |
| auto remote_addr = req.headers.find("REMOTE_ADDR")->second; |
| EXPECT_TRUE(req.has_header("REMOTE_PORT")); |
| EXPECT_EQ(req.remote_addr, req.get_header_value("REMOTE_ADDR")); |
| EXPECT_EQ(req.remote_port, |
| std::stoi(req.get_header_value("REMOTE_PORT"))); |
| res.set_content(remote_addr.c_str(), "text/plain"); |
| }) |
| .Get("/local_addr", |
| [&](const Request &req, Response &res) { |
| EXPECT_TRUE(req.has_header("LOCAL_PORT")); |
| EXPECT_TRUE(req.has_header("LOCAL_ADDR")); |
| auto local_addr = req.get_header_value("LOCAL_ADDR"); |
| auto local_port = req.get_header_value("LOCAL_PORT"); |
| EXPECT_EQ(req.local_addr, local_addr); |
| EXPECT_EQ(req.local_port, std::stoi(local_port)); |
| res.set_content(local_addr.append(":").append(local_port), |
| "text/plain"); |
| }) |
| .Get("/endwith%", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }) |
| .Get("/a\\+\\+b", |
| [&](const Request &req, Response &res) { |
| ASSERT_TRUE(req.has_param("a +b")); |
| auto val = req.get_param_value("a +b"); |
| res.set_content(val, "text/plain"); |
| }) |
| .Get("/", [&](const Request & /*req*/, |
| Response &res) { res.set_redirect("/hi"); }) |
| .Post("/1", |
| [](const Request & /*req*/, Response &res) { |
| res.set_redirect("/2", StatusCode::SeeOther_303); |
| }) |
| .Get("/2", |
| [](const Request & /*req*/, Response &res) { |
| res.set_content("redirected.", "text/plain"); |
| res.status = StatusCode::OK_200; |
| }) |
| .Post("/person", |
| [&](const Request &req, Response &res) { |
| if (req.has_param("name") && req.has_param("note")) { |
| persons_[req.get_param_value("name")] = |
| req.get_param_value("note"); |
| } else { |
| res.status = StatusCode::BadRequest_400; |
| } |
| }) |
| .Put("/person", |
| [&](const Request &req, Response &res) { |
| if (req.has_param("name") && req.has_param("note")) { |
| persons_[req.get_param_value("name")] = |
| req.get_param_value("note"); |
| } else { |
| res.status = StatusCode::BadRequest_400; |
| } |
| }) |
| .Get("/person/(.*)", |
| [&](const Request &req, Response &res) { |
| string name = req.matches[1]; |
| if (persons_.find(name) != persons_.end()) { |
| auto note = persons_[name]; |
| res.set_content(note, "text/plain"); |
| } else { |
| res.status = StatusCode::NotFound_404; |
| } |
| }) |
| .Delete("/person", |
| [&](const Request &req, Response &res) { |
| if (req.has_param("name")) { |
| string name = req.get_param_value("name"); |
| if (persons_.find(name) != persons_.end()) { |
| persons_.erase(name); |
| res.set_content("DELETED", "text/plain"); |
| } else { |
| res.status = StatusCode::NotFound_404; |
| } |
| } else { |
| res.status = StatusCode::BadRequest_400; |
| } |
| }) |
| .Post("/x-www-form-urlencoded-json", |
| [&](const Request &req, Response &res) { |
| auto json = req.get_param_value("json"); |
| ASSERT_EQ(JSON_DATA, json); |
| res.set_content(json, "appliation/json"); |
| res.status = StatusCode::OK_200; |
| }) |
| .Get("/streamed-chunked", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_chunked_content_provider( |
| "text/plain", [](size_t /*offset*/, DataSink &sink) { |
| sink.os << "123"; |
| sink.os << "456"; |
| sink.os << "789"; |
| sink.done(); |
| return true; |
| }); |
| }) |
| .Get("/streamed-chunked2", |
| [&](const Request & /*req*/, Response &res) { |
| auto i = new int(0); |
| res.set_chunked_content_provider( |
| "text/plain", |
| [i](size_t /*offset*/, DataSink &sink) { |
| switch (*i) { |
| case 0: sink.os << "123"; break; |
| case 1: sink.os << "456"; break; |
| case 2: sink.os << "789"; break; |
| case 3: sink.done(); break; |
| } |
| (*i)++; |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_TRUE(success); |
| delete i; |
| }); |
| }) |
| .Get("/streamed-chunked-with-trailer", |
| [&](const Request & /*req*/, Response &res) { |
| auto i = new int(0); |
| res.set_header("Trailer", "Dummy1, Dummy2"); |
| res.set_chunked_content_provider( |
| "text/plain", |
| [i](size_t /*offset*/, DataSink &sink) { |
| switch (*i) { |
| case 0: sink.os << "123"; break; |
| case 1: sink.os << "456"; break; |
| case 2: sink.os << "789"; break; |
| case 3: { |
| sink.done_with_trailer( |
| {{"Dummy1", "DummyVal1"}, {"Dummy2", "DummyVal2"}}); |
| } break; |
| } |
| (*i)++; |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_TRUE(success); |
| delete i; |
| }); |
| }) |
| .Get("/streamed", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content_provider( |
| 6, "text/plain", |
| [](size_t offset, size_t /*length*/, DataSink &sink) { |
| sink.os << (offset < 3 ? "a" : "b"); |
| return true; |
| }); |
| }) |
| .Get("/streamed-with-range", |
| [&](const Request &req, Response &res) { |
| auto data = new std::string("abcdefg"); |
| res.set_content_provider( |
| data->size(), "text/plain", |
| [data](size_t offset, size_t length, DataSink &sink) { |
| size_t DATA_CHUNK_SIZE = 4; |
| const auto &d = *data; |
| auto out_len = |
| std::min(static_cast<size_t>(length), DATA_CHUNK_SIZE); |
| auto ret = |
| sink.write(&d[static_cast<size_t>(offset)], out_len); |
| EXPECT_TRUE(ret); |
| return true; |
| }, |
| [data, &req](bool success) { |
| EXPECT_EQ(success, !req.has_param("error")); |
| delete data; |
| }); |
| }) |
| .Get("/streamed-cancel", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content_provider( |
| size_t(-1), "text/plain", |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.os << "data_chunk"; |
| return true; |
| }); |
| }) |
| .Get("/regex-with-delimiter", |
| [&](const Request &req, Response & /*res*/) { |
| ASSERT_TRUE(req.has_param("key")); |
| EXPECT_EQ("^(?.*(value))", req.get_param_value("key")); |
| }) |
| .Get("/with-range", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("abcdefg", "text/plain"); |
| }) |
| .Get("/test-start-time", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_NE(req.start_time_, |
| std::chrono::steady_clock::time_point::min()); |
| }) |
| .Get("/with-range-customized-response", |
| [&](const Request & /*req*/, Response &res) { |
| res.status = StatusCode::BadRequest_400; |
| res.set_content(JSON_DATA, "application/json"); |
| }) |
| .Post("/chunked", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(req.body, "dechunked post body"); |
| }) |
| .Post("/large-chunked", |
| [&](const Request &req, Response & /*res*/) { |
| std::string expected(6 * 30 * 1024u, 'a'); |
| EXPECT_EQ(req.body, expected); |
| }) |
| .Post("/multipart", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(4u, req.form.get_field_count("text1") + |
| req.form.get_field_count("text2") + |
| req.form.get_field_count("file3") + |
| req.form.get_field_count("file4")); |
| EXPECT_EQ(2u, req.form.get_file_count("file1") + |
| req.form.get_file_count("file2")); |
| ASSERT_TRUE(!req.form.has_file("???")); |
| ASSERT_TRUE(!req.form.has_field("???")); |
| ASSERT_TRUE(req.body.empty()); |
| |
| { |
| const auto &text = req.form.get_field("text1"); |
| EXPECT_EQ("text default", text); |
| } |
| |
| { |
| const auto &text = req.form.get_field("text2"); |
| EXPECT_EQ("aωb", text); |
| } |
| |
| { |
| const auto &file = req.form.get_file("file1"); |
| EXPECT_EQ("hello.txt", file.filename); |
| EXPECT_EQ("text/plain", file.content_type); |
| EXPECT_EQ("h\ne\n\nl\nl\no\n", file.content); |
| } |
| |
| { |
| const auto &file = req.form.get_file("file2"); |
| EXPECT_EQ("world.json", file.filename); |
| EXPECT_EQ("application/json", file.content_type); |
| EXPECT_EQ("{\n \"world\", true\n}\n", file.content); |
| } |
| |
| { |
| const auto &text = req.form.get_field("file3"); |
| EXPECT_EQ(0u, text.size()); |
| } |
| |
| { |
| const auto &text = req.form.get_field("file4"); |
| EXPECT_EQ(0u, text.size()); |
| } |
| }) |
| .Post("/multipart/multi_file_values", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(3u, req.form.get_field_count("text") + |
| req.form.get_field_count("multi_text1")); |
| EXPECT_EQ(2u, req.form.get_file_count("multi_file1")); |
| ASSERT_TRUE(!req.form.has_file("???")); |
| ASSERT_TRUE(!req.form.has_field("???")); |
| ASSERT_TRUE(req.body.empty()); |
| |
| { |
| const auto &text = req.form.get_field("text"); |
| EXPECT_EQ("default text", text); |
| } |
| { |
| const auto &text1_values = req.form.get_fields("multi_text1"); |
| EXPECT_EQ(2u, text1_values.size()); |
| EXPECT_EQ("aaaaa", text1_values[0]); |
| EXPECT_EQ("bbbbb", text1_values[1]); |
| } |
| |
| { |
| const auto &file1_values = req.form.get_files("multi_file1"); |
| EXPECT_EQ(2u, file1_values.size()); |
| auto file1 = file1_values[0]; |
| EXPECT_EQ(file1.filename, "hello.txt"); |
| EXPECT_EQ(file1.content_type, "text/plain"); |
| EXPECT_EQ("h\ne\n\nl\nl\no\n", file1.content); |
| |
| auto file2 = file1_values[1]; |
| EXPECT_EQ(file2.filename, "world.json"); |
| EXPECT_EQ(file2.content_type, "application/json"); |
| EXPECT_EQ("{\n \"world\", true\n}\n", file2.content); |
| } |
| }) |
| .Post("/empty", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_EQ("text/plain", req.get_header_value("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| res.set_content("empty", "text/plain"); |
| }) |
| .Post("/empty-no-content-type", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_FALSE(req.has_header("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| res.set_content("empty-no-content-type", "text/plain"); |
| }) |
| .Post("/path-only", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_EQ("", req.get_header_value("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| res.set_content("path-only", "text/plain"); |
| }) |
| .Post("/path-headers-only", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_EQ("", req.get_header_value("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| EXPECT_EQ("world", req.get_header_value("hello")); |
| EXPECT_EQ("world2", req.get_header_value("hello2")); |
| res.set_content("path-headers-only", "text/plain"); |
| }) |
| .Post("/post-large", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, LARGE_DATA); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Put("/empty-no-content-type", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_FALSE(req.has_header("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| res.set_content("empty-no-content-type", "text/plain"); |
| }) |
| .Put("/put", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, "PUT"); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Put("/put-large", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, LARGE_DATA); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Patch("/patch", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, "PATCH"); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Delete("/delete", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("DELETE", "text/plain"); |
| }) |
| .Delete("/delete-body", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, "content"); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Options(R"(\*)", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_header("Allow", "GET, POST, HEAD, OPTIONS"); |
| }) |
| .Get("/request-target", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ("/request-target?aaa=bbb&ccc=ddd", req.target); |
| EXPECT_EQ("bbb", req.get_param_value("aaa")); |
| EXPECT_EQ("ddd", req.get_param_value("ccc")); |
| }) |
| .Get("/long-query-value", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(LONG_QUERY_URL, req.target); |
| EXPECT_EQ(LONG_QUERY_VALUE, req.get_param_value("key")); |
| }) |
| .Get("/too-long-query-value", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(TOO_LONG_QUERY_URL, req.target); |
| EXPECT_EQ(TOO_LONG_QUERY_VALUE, req.get_param_value("key")); |
| }) |
| .Get("/array-param", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(3u, req.get_param_value_count("array")); |
| EXPECT_EQ("value1", req.get_param_value("array", 0)); |
| EXPECT_EQ("value2", req.get_param_value("array", 1)); |
| EXPECT_EQ("value3", req.get_param_value("array", 2)); |
| }) |
| .Post("/validate-no-multiple-headers", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(1u, req.get_header_value_count("Content-Length")); |
| EXPECT_EQ("5", req.get_header_value("Content-Length")); |
| }) |
| .Post("/content_receiver", |
| [&](const Request &req, Response &res, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_EQ(5u, items.size()); |
| |
| { |
| const auto &file = get_file_value(items, "text1"); |
| EXPECT_TRUE(file.filename.empty()); |
| EXPECT_EQ("text default", file.content); |
| } |
| |
| { |
| const auto &file = get_file_value(items, "text2"); |
| EXPECT_TRUE(file.filename.empty()); |
| EXPECT_EQ("aωb", file.content); |
| } |
| |
| { |
| const auto &file = get_file_value(items, "file1"); |
| EXPECT_EQ("hello.txt", file.filename); |
| EXPECT_EQ("text/plain", file.content_type); |
| EXPECT_EQ("h\ne\n\nl\nl\no\n", file.content); |
| } |
| |
| { |
| const auto &file = get_file_value(items, "file2"); |
| EXPECT_EQ("world.json", file.filename); |
| EXPECT_EQ("application/json", file.content_type); |
| EXPECT_EQ(R"({\n "world": true\n}\n)", file.content); |
| } |
| |
| { |
| const auto &file = get_file_value(items, "file3"); |
| EXPECT_TRUE(file.filename.empty()); |
| EXPECT_EQ("application/octet-stream", file.content_type); |
| EXPECT_EQ(0u, file.content.size()); |
| } |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| EXPECT_EQ(7U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| EXPECT_EQ(body, "content"); |
| res.set_content(body, "text/plain"); |
| } |
| }) |
| .Put("/content_receiver", |
| [&](const Request & /*req*/, Response &res, |
| const ContentReader &content_reader) { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| EXPECT_EQ(body, "content"); |
| res.set_content(body, "text/plain"); |
| }) |
| .Patch("/content_receiver", |
| [&](const Request & /*req*/, Response &res, |
| const ContentReader &content_reader) { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| EXPECT_EQ(body, "content"); |
| res.set_content(body, "text/plain"); |
| }) |
| .Post("/query-string-and-body", |
| [&](const Request &req, Response & /*res*/) { |
| ASSERT_TRUE(req.has_param("key")); |
| EXPECT_EQ(req.get_param_value("key"), "value"); |
| EXPECT_EQ(req.body, "content"); |
| }) |
| .Get("/last-request", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ("close", req.get_header_value("Connection")); |
| }) |
| .Get(R"(/redirect/(\d+))", |
| [&](const Request &req, Response &res) { |
| auto num = std::stoi(req.matches[1]) + 1; |
| std::string url = "/redirect/" + std::to_string(num); |
| res.set_redirect(url); |
| }) |
| .Post("/binary", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(4U, req.body.size()); |
| EXPECT_EQ("application/octet-stream", |
| req.get_header_value("Content-Type")); |
| EXPECT_EQ("4", req.get_header_value("Content-Length")); |
| res.set_content(req.body, "application/octet-stream"); |
| }) |
| .Put("/binary", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(4U, req.body.size()); |
| EXPECT_EQ("application/octet-stream", |
| req.get_header_value("Content-Type")); |
| EXPECT_EQ("4", req.get_header_value("Content-Length")); |
| res.set_content(req.body, "application/octet-stream"); |
| }) |
| .Patch("/binary", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(4U, req.body.size()); |
| EXPECT_EQ("application/octet-stream", |
| req.get_header_value("Content-Type")); |
| EXPECT_EQ("4", req.get_header_value("Content-Length")); |
| res.set_content(req.body, "application/octet-stream"); |
| }) |
| .Delete("/binary", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(4U, req.body.size()); |
| EXPECT_EQ("application/octet-stream", |
| req.get_header_value("Content-Type")); |
| EXPECT_EQ("4", req.get_header_value("Content-Length")); |
| res.set_content(req.body, "application/octet-stream"); |
| }) |
| .Get("/issue1772", |
| [&](const Request & /*req*/, Response &res) { |
| res.status = 401; |
| res.set_header("WWW-Authenticate", "Basic realm=123456"); |
| }) |
| .Delete("/issue609", |
| [](const httplib::Request &, httplib::Response &res, |
| const httplib::ContentReader &) { |
| res.set_content("ok", "text/plain"); |
| }) |
| #if defined(CPPHTTPLIB_ZLIB_SUPPORT) || defined(CPPHTTPLIB_BROTLI_SUPPORT) || \ |
| defined(CPPHTTPLIB_ZSTD_SUPPORT) |
| .Get("/compress", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content( |
| "12345678901234567890123456789012345678901234567890123456789" |
| "01234567890123456789012345678901234567890", |
| "text/plain"); |
| }) |
| .Get("/nocompress", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content( |
| "12345678901234567890123456789012345678901234567890123456789" |
| "01234567890123456789012345678901234567890", |
| "application/octet-stream"); |
| }) |
| .Post("/compress-multipart", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(2u, req.form.fields.size()); |
| ASSERT_TRUE(!req.form.has_field("???")); |
| |
| { |
| const auto &text = req.form.get_field("key1"); |
| EXPECT_EQ("test", text); |
| } |
| |
| { |
| const auto &text = req.form.get_field("key2"); |
| EXPECT_EQ("--abcdefg123", text); |
| } |
| }) |
| #endif |
| ; |
| |
| persons_["john"] = "programmer"; |
| |
| t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| if (!request_threads_.empty()) { |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| for (auto &t : request_threads_) { |
| t.join(); |
| } |
| } |
| t_.join(); |
| } |
| |
| map<string, string> persons_; |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| std::vector<thread> request_threads_; |
| }; |
| |
| TEST_F(ServerTest, GetMethod200) { |
| auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("HTTP/1.1", res->version); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("OK", res->reason); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ(1U, res->get_header_value_count("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| void performance_test(const char *host) { |
| auto port = 1234; |
| |
| Server svr; |
| |
| svr.Get("/benchmark", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Benchmark Response", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&]() { svr.listen(host, port); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(host, port); |
| |
| auto start = std::chrono::high_resolution_clock::now(); |
| |
| auto res = cli.Get("/benchmark"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| auto end = std::chrono::high_resolution_clock::now(); |
| |
| auto elapsed = |
| std::chrono::duration_cast<std::chrono::milliseconds>(end - start) |
| .count(); |
| |
| EXPECT_LE(elapsed, 5) << "Performance is too slow: " << elapsed |
| << "ms (Issue #1777)"; |
| } |
| |
| TEST(BenchmarkTest, localhost) { performance_test("localhost"); } |
| |
| TEST(BenchmarkTest, v6) { performance_test("::1"); } |
| |
| TEST_F(ServerTest, GetEmptyFile) { |
| auto res = cli_.Get("/empty_file"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ(0, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_EQ("", res->body); |
| } |
| |
| TEST_F(ServerTest, GetFileContent) { |
| auto res = cli_.Get("/file_content"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ(9, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetFileContentWithRange) { |
| auto res = cli_.Get("/file_content", {{make_range_header({{1, 3}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("bytes 1-3/9", res->get_header_value("Content-Range")); |
| EXPECT_EQ(3, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_EQ("est", res->body); |
| } |
| |
| TEST_F(ServerTest, GetFileContentWithContentType) { |
| auto res = cli_.Get("/file_content_with_content_type"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ(5, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_EQ("file\n", res->body); |
| } |
| |
| TEST_F(ServerTest, GetInvalidFileContent) { |
| auto res = cli_.Get("/invalid_file_content"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethod200withPercentEncoding) { |
| auto res = cli_.Get("/%68%69"); // auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("HTTP/1.1", res->version); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ(1U, res->get_header_value_count("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethod302) { |
| auto res = cli_.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Found_302, res->status); |
| EXPECT_EQ("/hi", res->get_header_value("Location")); |
| } |
| |
| TEST_F(ServerTest, GetMethod302Redirect) { |
| cli_.set_follow_location(true); |
| auto res = cli_.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ("/hi", res->location); |
| } |
| |
| TEST_F(ServerTest, GetMethod404) { |
| auto res = cli_.Get("/invalid"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, HeadMethod200) { |
| auto res = cli_.Head("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST_F(ServerTest, HeadMethod200Static) { |
| auto res = cli_.Head("/mount/dir/index.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ(104, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST_F(ServerTest, HeadMethod404) { |
| auto res = cli_.Head("/invalid"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST_F(ServerTest, GetMethodPersonJohn) { |
| auto res = cli_.Get("/person/john"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("programmer", res->body); |
| } |
| |
| TEST_F(ServerTest, PostMethod1) { |
| auto res = cli_.Get("/person/john1"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| res = cli_.Post("/person", "name=john1¬e=coder", |
| "application/x-www-form-urlencoded"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john1"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("coder", res->body); |
| } |
| |
| TEST_F(ServerTest, PostMethod2) { |
| auto res = cli_.Get("/person/john2"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john2"); |
| params.emplace("note", "coder"); |
| |
| res = cli_.Post("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john2"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("coder", res->body); |
| } |
| |
| TEST_F(ServerTest, PutMethod3) { |
| auto res = cli_.Get("/person/john3"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john3"); |
| params.emplace("note", "coder"); |
| |
| res = cli_.Put("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john3"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("coder", res->body); |
| } |
| |
| TEST_F(ServerTest, DeleteMethod1) { |
| auto res = cli_.Get("/person/john4"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john4"); |
| params.emplace("note", "coder"); |
| |
| res = cli_.Post("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john4"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("coder", res->body); |
| |
| Params delete_params; |
| delete_params.emplace("name", "john4"); |
| |
| res = cli_.Delete("/person", delete_params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("DELETED", res->body); |
| |
| res = cli_.Get("/person/john4"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, DeleteMethod2) { |
| auto res = cli_.Get("/person/john5"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john5"); |
| params.emplace("note", "developer"); |
| |
| res = cli_.Post("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john5"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("developer", res->body); |
| |
| Params delete_params; |
| delete_params.emplace("name", "john5"); |
| |
| Headers headers; |
| headers.emplace("Custom-Header", "test-value"); |
| |
| res = cli_.Delete("/person", headers, delete_params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("DELETED", res->body); |
| |
| res = cli_.Get("/person/john5"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, DeleteMethod3) { |
| auto res = cli_.Get("/person/john6"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john6"); |
| params.emplace("note", "tester"); |
| |
| res = cli_.Post("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john6"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("tester", res->body); |
| |
| Params delete_params; |
| delete_params.emplace("name", "john6"); |
| |
| Headers headers; |
| headers.emplace("Custom-Header", "test-value"); |
| |
| res = cli_.Delete("/person", headers, delete_params, nullptr); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("DELETED", res->body); |
| |
| res = cli_.Get("/person/john6"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, PostWwwFormUrlEncodedJson) { |
| Params params; |
| params.emplace("json", JSON_DATA); |
| |
| auto res = cli_.Post("/x-www-form-urlencoded-json", params); |
| |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(JSON_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, PostEmptyContent) { |
| auto res = cli_.Post("/empty", "", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("empty", res->body); |
| } |
| |
| TEST_F(ServerTest, PostEmptyContentWithNoContentType) { |
| auto res = cli_.Post("/empty-no-content-type"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("empty-no-content-type", res->body); |
| } |
| |
| TEST_F(ServerTest, PostPathOnly) { |
| auto res = cli_.Post("/path-only"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("path-only", res->body); |
| } |
| |
| TEST_F(ServerTest, PostPathAndHeadersOnly) { |
| auto res = cli_.Post("/path-headers-only", |
| Headers({{"hello", "world"}, {"hello2", "world2"}})); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("path-headers-only", res->body); |
| } |
| |
| TEST_F(ServerTest, PostLarge) { |
| auto res = cli_.Post("/post-large", LARGE_DATA, "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(LARGE_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, PutEmptyContentWithNoContentType) { |
| auto res = cli_.Put("/empty-no-content-type"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("empty-no-content-type", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodDir) { |
| auto res = cli_.Get("/dir/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| |
| auto body = R"(<html> |
| <head> |
| </head> |
| <body> |
| <a href="/dir/test.html">Test</a> |
| <a href="/hi">hi</a> |
| </body> |
| </html> |
| )"; |
| EXPECT_EQ(body, res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodDirTest) { |
| auto res = cli_.Get("/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodDirTestWithDoubleDots) { |
| auto res = cli_.Get("/dir/../dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodInvalidPath) { |
| auto res = cli_.Get("/dir/../test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDir) { |
| auto res = cli_.Get("/../www/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDir2) { |
| auto res = cli_.Get("/dir/../../www/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodDirMountTest) { |
| auto res = cli_.Get("/mount/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodDirMountTestWithDoubleDots) { |
| auto res = cli_.Get("/mount/dir/../dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodInvalidMountPath) { |
| auto res = cli_.Get("/mount/dir/../test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodEmbeddedNUL) { |
| auto res = cli_.Get("/mount/dir/test.html%00.js"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDirMount) { |
| auto res = cli_.Get("/mount/../www2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDirMount2) { |
| auto res = cli_.Get("/mount/dir/../../www2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDirMountWithBackslash) { |
| auto res = cli_.Get("/mount/%2e%2e%5c/www2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, PostMethod303) { |
| auto res = cli_.Post("/1", "body", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::SeeOther_303, res->status); |
| EXPECT_EQ("/2", res->get_header_value("Location")); |
| } |
| |
| TEST_F(ServerTest, PostMethod303Redirect) { |
| cli_.set_follow_location(true); |
| auto res = cli_.Post("/1", "body", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("redirected.", res->body); |
| EXPECT_EQ("/2", res->location); |
| } |
| |
| TEST_F(ServerTest, UserDefinedMIMETypeMapping) { |
| auto res = cli_.Get("/dir/test.abcde"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); |
| EXPECT_EQ("abcde", res->body); |
| } |
| |
| TEST_F(ServerTest, StaticFileRange) { |
| auto res = cli_.Get("/dir/test.abcde", {{make_range_header({{2, 3}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); |
| EXPECT_EQ("2", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 2-3/5", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("cd"), res->body); |
| } |
| |
| TEST_F(ServerTest, StaticFileRanges) { |
| auto res = |
| cli_.Get("/dir/test.abcde", {{make_range_header({{1, 2}, {4, -1}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_TRUE( |
| res->get_header_value("Content-Type") |
| .find( |
| "multipart/byteranges; boundary=--cpp-httplib-multipart-data-") == |
| 0); |
| EXPECT_EQ("266", res->get_header_value("Content-Length")); |
| } |
| |
| TEST_F(ServerTest, StaticFileRangeHead) { |
| auto res = cli_.Head("/dir/test.abcde", {{make_range_header({{2, 3}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); |
| EXPECT_EQ("2", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 2-3/5", res->get_header_value("Content-Range")); |
| } |
| |
| TEST_F(ServerTest, StaticFileRangeBigFile) { |
| auto res = cli_.Get("/dir/1MB.txt", {{make_range_header({{-1, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("5", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 1048571-1048575/1048576", |
| res->get_header_value("Content-Range")); |
| EXPECT_EQ("LAST\n", res->body); |
| } |
| |
| TEST_F(ServerTest, StaticFileRangeBigFile2) { |
| auto res = cli_.Get("/dir/1MB.txt", {{make_range_header({{1, 4097}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("4097", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 1-4097/1048576", res->get_header_value("Content-Range")); |
| } |
| |
| TEST_F(ServerTest, StaticFileBigFile) { |
| auto res = cli_.Get("/dir/1MB.txt"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("1048576", res->get_header_value("Content-Length")); |
| } |
| |
| TEST_F(ServerTest, InvalidBaseDirMount) { |
| EXPECT_EQ(false, svr_.set_mount_point("invalid_mount_point", "./www3")); |
| } |
| |
| TEST_F(ServerTest, Binary) { |
| std::vector<char> binary{0x00, 0x01, 0x02, 0x03}; |
| |
| auto res = cli_.Post("/binary", binary.data(), binary.size(), |
| "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Put("/binary", binary.data(), binary.size(), |
| "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Patch("/binary", binary.data(), binary.size(), |
| "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Delete("/binary", binary.data(), binary.size(), |
| "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, BinaryString) { |
| auto binary = std::string("\x00\x01\x02\x03", 4); |
| |
| auto res = cli_.Post("/binary", binary, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Put("/binary", binary, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Patch("/binary", binary, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Delete("/binary", binary, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, EmptyRequest) { |
| auto res = cli_.Get(""); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| |
| TEST_F(ServerTest, LongRequest) { |
| std::string request; |
| for (size_t i = 0; i < 545; i++) { |
| request += "/TooLongRequest"; |
| } |
| request += "OK"; |
| |
| auto res = cli_.Get(request.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, TooLongRequest) { |
| std::string request; |
| for (size_t i = 0; i < 546; i++) { |
| request += "/TooLongRequest"; |
| } |
| request += "_NG"; |
| |
| auto res = cli_.Get(request.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::UriTooLong_414, res->status); |
| } |
| |
| TEST_F(ServerTest, AlmostTooLongRequest) { |
| // test for #2046 - URI length check shouldn't include other content on req |
| // line URI is max URI length, minus 14 other chars in req line (GET, space, |
| // leading /, space, HTTP/1.1) |
| std::string request = |
| "/" + string(CPPHTTPLIB_REQUEST_URI_MAX_LENGTH - 14, 'A'); |
| |
| auto res = cli_.Get(request.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, LongHeader) { |
| Request req; |
| req.method = "GET"; |
| req.path = "/hi"; |
| |
| std::string host_and_port; |
| host_and_port += HOST; |
| host_and_port += ":"; |
| host_and_port += std::to_string(PORT); |
| |
| req.headers.emplace("Host", host_and_port.c_str()); |
| req.headers.emplace("Accept", "*/*"); |
| req.headers.emplace("User-Agent", "cpp-httplib/0.1"); |
| |
| req.headers.emplace( |
| "Header-Name", |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@"); |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, LongQueryValue) { |
| auto res = cli_.Get(LONG_QUERY_URL.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::UriTooLong_414, res->status); |
| } |
| |
| TEST_F(ServerTest, TooLongQueryValue) { |
| auto res = cli_.Get(TOO_LONG_QUERY_URL.c_str()); |
| |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::Read, res.error()); |
| } |
| |
| TEST_F(ServerTest, TooLongHeader) { |
| Request req; |
| req.method = "GET"; |
| req.path = "/hi"; |
| |
| std::string host_and_port; |
| host_and_port += HOST; |
| host_and_port += ":"; |
| host_and_port += std::to_string(PORT); |
| |
| req.headers.emplace("Host", host_and_port.c_str()); |
| req.headers.emplace("Accept", "*/*"); |
| req.headers.emplace("User-Agent", "cpp-httplib/0.1"); |
| |
| req.headers.emplace( |
| "Header-Name", |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@"); |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, HeaderCountAtLimit) { |
| // Test with headers just under the 100 limit |
| httplib::Headers headers; |
| |
| // Add 95 custom headers (the client will add Host, User-Agent, Accept, etc.) |
| // This should keep us just under the 100 header limit |
| for (int i = 0; i < 95; i++) { |
| std::string name = "X-Test-Header-" + std::to_string(i); |
| std::string value = "value" + std::to_string(i); |
| headers.emplace(name, value); |
| } |
| |
| // This should work fine as we're under the limit |
| auto res = cli_.Get("/hi", headers); |
| EXPECT_TRUE(res); |
| if (res) { EXPECT_EQ(StatusCode::OK_200, res->status); } |
| } |
| |
| TEST_F(ServerTest, HeaderCountExceedsLimit) { |
| // Test with many headers to exceed the 100 limit |
| httplib::Headers headers; |
| |
| // Add 150 headers to definitely exceed the 100 limit |
| for (int i = 0; i < 150; i++) { |
| std::string name = "X-Test-Header-" + std::to_string(i); |
| std::string value = "value" + std::to_string(i); |
| headers.emplace(name, value); |
| } |
| |
| // This should fail due to exceeding header count limit |
| auto res = cli_.Get("/hi", headers); |
| |
| // The request should either fail or return 400 Bad Request |
| if (res) { |
| // If we get a response, it should be 400 Bad Request |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } else { |
| // Or the request should fail entirely |
| EXPECT_FALSE(res); |
| } |
| } |
| |
| TEST_F(ServerTest, PercentEncoding) { |
| auto res = cli_.Get("/e%6edwith%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PercentEncodingUnicode) { |
| auto res = cli_.Get("/e%u006edwith%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, InvalidPercentEncoding) { |
| auto res = cli_.Get("/%endwith%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, InvalidPercentEncodingUnicode) { |
| auto res = cli_.Get("/%uendwith%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, EndWithPercentCharacterInQuery) { |
| auto res = cli_.Get("/hello?aaa=bbb%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, PlusSignEncoding) { |
| auto res = cli_.Get("/a+%2Bb?a %2bb=a %2Bb"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("a +b", res->body); |
| } |
| |
| TEST_F(ServerTest, HeaderCountSecurityTest) { |
| // This test simulates a potential DoS attack using many headers |
| // to verify our security fix prevents memory exhaustion |
| |
| httplib::Headers attack_headers; |
| |
| // Attempt to add many headers like an attacker would (200 headers to far |
| // exceed limit) |
| for (int i = 0; i < 200; i++) { |
| std::string name = "X-Attack-Header-" + std::to_string(i); |
| std::string value = "attack_payload_" + std::to_string(i); |
| attack_headers.emplace(name, value); |
| } |
| |
| // Try to POST with excessive headers |
| auto res = cli_.Post("/", attack_headers, "test_data", "text/plain"); |
| |
| // Should either fail or return 400 Bad Request due to security limit |
| if (res) { |
| // If we get a response, it should be 400 Bad Request |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } else { |
| // Request failed, which is the expected behavior for DoS protection |
| EXPECT_FALSE(res); |
| } |
| } |
| |
| TEST_F(ServerTest, MultipartFormData) { |
| UploadFormDataItems items = { |
| {"text1", "text default", "", ""}, |
| {"text2", "aωb", "", ""}, |
| {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, |
| {"file2", "{\n \"world\", true\n}\n", "world.json", "application/json"}, |
| {"file3", "", "", "application/octet-stream"}, |
| {"file4", "", "", " application/json tmp-string "}}; |
| |
| auto res = cli_.Post("/multipart", items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, MultipartFormDataMultiFileValues) { |
| UploadFormDataItems items = { |
| {"text", "default text", "", ""}, |
| |
| {"multi_text1", "aaaaa", "", ""}, |
| {"multi_text1", "bbbbb", "", ""}, |
| |
| {"multi_file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, |
| {"multi_file1", "{\n \"world\", true\n}\n", "world.json", |
| "application/json"}, |
| }; |
| |
| auto res = cli_.Post("/multipart/multi_file_values", items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, CaseInsensitiveHeaderName) { |
| auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("content-type")); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| TEST_F(ServerTest, CaseInsensitiveTransferEncoding) { |
| Request req; |
| req.method = "POST"; |
| req.path = "/chunked"; |
| |
| std::string host_and_port; |
| host_and_port += HOST; |
| host_and_port += ":"; |
| host_and_port += std::to_string(PORT); |
| |
| req.headers.emplace("Host", host_and_port.c_str()); |
| req.headers.emplace("Accept", "*/*"); |
| req.headers.emplace("User-Agent", "cpp-httplib/0.1"); |
| req.headers.emplace("Content-Type", "text/plain"); |
| req.headers.emplace("Content-Length", "0"); |
| req.headers.emplace( |
| "Transfer-Encoding", |
| "Chunked"); // Note, "Chunked" rather than typical "chunked". |
| |
| // Client does not chunk, so make a chunked body manually. |
| req.body = "4\r\ndech\r\nf\r\nunked post body\r\n0\r\n\r\n"; |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GetStreamed2) { |
| auto res = cli_.Get("/streamed", {{make_range_header({{2, 3}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("2", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 2-3/6", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("ab"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamed) { |
| auto res = cli_.Get("/streamed"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("6", res->get_header_value("Content-Length")); |
| EXPECT_EQ(std::string("aaabbb"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRange1) { |
| auto res = cli_.Get("/streamed-with-range", {{make_range_header({{3, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("3", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 3-5/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("def"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRange2) { |
| auto res = cli_.Get("/streamed-with-range", {{make_range_header({{1, -1}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("6", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 1-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("bcdefg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangeSuffix1) { |
| auto res = cli_.Get("/streamed-with-range", {{"Range", "bytes=-3"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("3", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 4-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("efg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangeSuffix2) { |
| auto res = cli_.Get("/streamed-with-range?error", {{"Range", "bytes=-9999"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(0U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangeError) { |
| auto res = cli_.Get("/streamed-with-range", |
| {{"Range", "bytes=92233720368547758079223372036854775806-" |
| "92233720368547758079223372036854775807"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(0U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetRangeWithMaxLongLength) { |
| auto res = cli_.Get( |
| "/with-range", |
| {{"Range", "bytes=0-" + std::to_string(std::numeric_limits<long>::max())}, |
| {"Accept-Encoding", ""}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("7", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 0-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("abcdefg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetRangeWithZeroToInfinite) { |
| auto res = cli_.Get("/with-range", { |
| {"Range", "bytes=0-"}, |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("7", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 0-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("abcdefg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangeMultipart) { |
| auto res = |
| cli_.Get("/streamed-with-range", {{make_range_header({{1, 2}, {4, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("267", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(267U, res->body.size()); |
| |
| // Check that both range contents are present |
| EXPECT_TRUE(res->body.find("bc\r\n") != std::string::npos); |
| EXPECT_TRUE(res->body.find("ef\r\n") != std::string::npos); |
| |
| // Check that Content-Range headers are present for both ranges |
| EXPECT_TRUE(res->body.find("Content-Range: bytes 1-2/7") != |
| std::string::npos); |
| EXPECT_TRUE(res->body.find("Content-Range: bytes 4-5/7") != |
| std::string::npos); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithTooManyRanges) { |
| Ranges ranges; |
| for (size_t i = 0; i < CPPHTTPLIB_RANGE_MAX_COUNT + 1; i++) { |
| ranges.emplace_back(0, -1); |
| } |
| |
| auto res = |
| cli_.Get("/streamed-with-range?error", {{make_range_header(ranges)}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(0U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithOverwrapping) { |
| auto res = |
| cli_.Get("/streamed-with-range", {{make_range_header({{1, 4}, {2, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ(5U, res->body.size()); |
| |
| // Check that overlapping ranges are coalesced into a single range |
| EXPECT_EQ("bcdef", res->body); |
| EXPECT_EQ("bytes 1-5/7", res->get_header_value("Content-Range")); |
| |
| // Should be single range, not multipart |
| EXPECT_TRUE(res->has_header("Content-Range")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithNonAscendingRanges) { |
| auto res = |
| cli_.Get("/streamed-with-range", {{make_range_header({{4, 5}, {0, 2}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ(268U, res->body.size()); |
| |
| // Check that both range contents are present |
| EXPECT_TRUE(res->body.find("ef\r\n") != std::string::npos); |
| EXPECT_TRUE(res->body.find("abc\r\n") != std::string::npos); |
| |
| // Check that Content-Range headers are present for both ranges |
| EXPECT_TRUE(res->body.find("Content-Range: bytes 4-5/7") != |
| std::string::npos); |
| EXPECT_TRUE(res->body.find("Content-Range: bytes 0-2/7") != |
| std::string::npos); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithDuplicateRanges) { |
| auto res = |
| cli_.Get("/streamed-with-range", {{make_range_header({{0, 2}, {0, 2}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ(269U, res->body.size()); |
| |
| // Check that both duplicate range contents are present |
| size_t first_abc = res->body.find("abc\r\n"); |
| EXPECT_TRUE(first_abc != std::string::npos); |
| size_t second_abc = res->body.find("abc\r\n", first_abc + 1); |
| EXPECT_TRUE(second_abc != std::string::npos); |
| |
| // Check that Content-Range headers are present for both ranges |
| size_t first_range = res->body.find("Content-Range: bytes 0-2/7"); |
| EXPECT_TRUE(first_range != std::string::npos); |
| size_t second_range = |
| res->body.find("Content-Range: bytes 0-2/7", first_range + 1); |
| EXPECT_TRUE(second_range != std::string::npos); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangesMoreThanTwoOverwrapping) { |
| auto res = cli_.Get("/streamed-with-range?error", |
| {{make_range_header({{0, 1}, {1, 2}, {2, 3}, {3, 4}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(0U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetStreamedEndless) { |
| uint64_t offset = 0; |
| auto res = cli_.Get("/streamed-cancel", |
| [&](const char * /*data*/, uint64_t data_length) { |
| if (offset < 100) { |
| offset += data_length; |
| return true; |
| } |
| return false; |
| }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, ClientStop) { |
| std::atomic_size_t count{4}; |
| std::vector<std::thread> threads; |
| |
| for (auto i = count.load(); i != 0; --i) { |
| threads.emplace_back([&]() { |
| auto res = cli_.Get("/streamed-cancel", |
| [&](const char *, uint64_t) { return true; }); |
| |
| --count; |
| |
| ASSERT_TRUE(!res); |
| EXPECT_TRUE(res.error() == Error::Canceled || |
| res.error() == Error::Read || res.error() == Error::Write); |
| }); |
| } |
| |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| while (count != 0) { |
| cli_.stop(); |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| for (auto &t : threads) { |
| t.join(); |
| } |
| } |
| |
| TEST_F(ServerTest, GetWithRange1) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{3, 5}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("3", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 3-5/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("def"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRange2) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{1, -1}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("6", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 1-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("bcdefg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRange3) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{0, 0}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("1", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 0-0/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("a"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRange4) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{-1, 2}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("2", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 5-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("fg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRange5) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{0, 5}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("6", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 0-5/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("abcdef"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeOffsetGreaterThanContent) { |
| auto res = cli_.Get("/with-range", {{make_range_header({{10000, 20000}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeMultipart) { |
| auto res = cli_.Get("/with-range", {{make_range_header({{1, 2}, {4, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("267", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(267U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeMultipartOffsetGreaterThanContent) { |
| auto res = |
| cli_.Get("/with-range", {{make_range_header({{-1, 2}, {10000, 30000}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeCustomizedResponse) { |
| auto res = cli_.Get("/with-range-customized-response", |
| {{make_range_header({{1, 2}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| EXPECT_EQ(true, res->has_header("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(JSON_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeMultipartCustomizedResponseMultipleRange) { |
| auto res = cli_.Get("/with-range-customized-response", |
| {{make_range_header({{1, 2}, {4, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| EXPECT_EQ(true, res->has_header("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(JSON_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, Issue1772) { |
| auto res = cli_.Get("/issue1772", {{make_range_header({{1000, -1}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| TEST_F(ServerTest, Issue609) { |
| auto res = cli_.Delete("/issue609"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("ok"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunked) { |
| auto res = cli_.Get("/streamed-chunked"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunked2) { |
| auto res = cli_.Get("/streamed-chunked2"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunkedWithTrailer) { |
| auto res = cli_.Get("/streamed-chunked-with-trailer"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| |
| EXPECT_TRUE(res->has_header("Trailer")); |
| EXPECT_EQ(1U, res->get_header_value_count("Trailer")); |
| EXPECT_EQ(std::string("Dummy1, Dummy2"), res->get_header_value("Trailer")); |
| |
| // Trailers are now stored separately from headers (security fix) |
| EXPECT_EQ(2U, res->trailers.size()); |
| EXPECT_TRUE(res->has_trailer("Dummy1")); |
| EXPECT_TRUE(res->has_trailer("Dummy2")); |
| EXPECT_FALSE(res->has_trailer("Dummy3")); |
| EXPECT_EQ(std::string("DummyVal1"), res->get_trailer_value("Dummy1")); |
| EXPECT_EQ(std::string("DummyVal2"), res->get_trailer_value("Dummy2")); |
| |
| // Verify trailers are NOT in headers (security verification) |
| EXPECT_EQ(std::string(""), res->get_header_value("Dummy1")); |
| EXPECT_EQ(std::string(""), res->get_header_value("Dummy2")); |
| } |
| |
| TEST_F(ServerTest, LargeChunkedPost) { |
| Request req; |
| req.method = "POST"; |
| req.path = "/large-chunked"; |
| |
| std::string host_and_port; |
| host_and_port += HOST; |
| host_and_port += ":"; |
| host_and_port += std::to_string(PORT); |
| |
| req.headers.emplace("Host", host_and_port.c_str()); |
| req.headers.emplace("Accept", "*/*"); |
| req.headers.emplace("User-Agent", "cpp-httplib/0.1"); |
| req.headers.emplace("Content-Type", "text/plain"); |
| req.headers.emplace("Content-Length", "0"); |
| req.headers.emplace("Transfer-Encoding", "chunked"); |
| |
| std::string long_string(30 * 1024u, 'a'); |
| std::string chunk = "7800\r\n" + long_string + "\r\n"; |
| |
| // Attempt to make a large enough post to exceed OS buffers, to test that |
| // the server handles short reads if the full chunk data isn't available. |
| req.body = chunk + chunk + chunk + chunk + chunk + chunk + "0\r\n\r\n"; |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodRemoteAddr) { |
| auto res = cli_.Get("/remote_addr"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_TRUE(res->body == "::1" || res->body == "127.0.0.1"); |
| } |
| |
| TEST_F(ServerTest, GetMethodLocalAddr) { |
| auto res = cli_.Get("/local_addr"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_TRUE(res->body == std::string("::1:").append(to_string(PORT)) || |
| res->body == std::string("127.0.0.1:").append(to_string(PORT))); |
| } |
| |
| TEST_F(ServerTest, HTTPResponseSplitting) { |
| auto res = cli_.Get("/http_response_splitting"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, SlowRequest) { |
| request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); |
| request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); |
| request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); |
| } |
| |
| #if 0 |
| TEST_F(ServerTest, SlowPost) { |
| char buffer[64 * 1024]; |
| memset(buffer, 0x42, sizeof(buffer)); |
| |
| auto res = cli_.Post( |
| "/slowpost", 64 * 1024 * 1024, |
| [&](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| auto ret = sink.write(buffer, sizeof(buffer)); |
| EXPECT_TRUE(ret); |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, SlowPostFail) { |
| char buffer[64 * 1024]; |
| memset(buffer, 0x42, sizeof(buffer)); |
| |
| cli_.set_write_timeout(std::chrono::seconds(0)); |
| auto res = cli_.Post( |
| "/slowpost", 64 * 1024 * 1024, |
| [&](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.write(buffer, sizeof(buffer)); |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Write, res.error()); |
| } |
| #endif |
| |
| TEST_F(ServerTest, Put) { |
| auto res = cli_.Put("/put", "PUT", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PutWithContentProvider) { |
| auto res = cli_.Put( |
| "/put", 3, |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.os << "PUT"; |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PostWithContentProviderAbort) { |
| auto res = cli_.Post( |
| "/post", 42, |
| [](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) { |
| return false; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, PutWithContentProviderWithoutLength) { |
| auto res = cli_.Put( |
| "/put", |
| [](size_t /*offset*/, DataSink &sink) { |
| sink.os << "PUT"; |
| sink.done(); |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PostWithContentProviderWithoutLengthAbort) { |
| auto res = cli_.Post( |
| "/post", [](size_t /*offset*/, DataSink & /*sink*/) { return false; }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| TEST_F(ServerTest, PutWithContentProviderWithGzip) { |
| cli_.set_compress(true); |
| auto res = cli_.Put( |
| "/put", 3, |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.os << "PUT"; |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PostWithContentProviderWithGzipAbort) { |
| cli_.set_compress(true); |
| auto res = cli_.Post( |
| "/post", 42, |
| [](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) { |
| return false; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, PutWithContentProviderWithoutLengthWithGzip) { |
| cli_.set_compress(true); |
| auto res = cli_.Put( |
| "/put", |
| [](size_t /*offset*/, DataSink &sink) { |
| sink.os << "PUT"; |
| sink.done(); |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PostWithContentProviderWithoutLengthWithGzipAbort) { |
| cli_.set_compress(true); |
| auto res = cli_.Post( |
| "/post", [](size_t /*offset*/, DataSink & /*sink*/) { return false; }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, PutLargeFileWithGzip) { |
| cli_.set_compress(true); |
| auto res = cli_.Put("/put-large", LARGE_DATA, "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(LARGE_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, PutLargeFileWithGzip2) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| std::string s = std::string("https://") + HOST + ":" + std::to_string(PORT); |
| Client cli(s.c_str()); |
| cli.enable_server_certificate_verification(false); |
| #else |
| std::string s = std::string("http://") + HOST + ":" + std::to_string(PORT); |
| Client cli(s.c_str()); |
| #endif |
| cli.set_compress(true); |
| |
| auto res = cli.Put("/put-large", LARGE_DATA, "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(LARGE_DATA, res->body); |
| // The compressed size should be less than a 10th of the original. May vary |
| // depending on the zlib library. |
| EXPECT_LT(res.get_request_header_value_u64("Content-Length"), |
| static_cast<uint64_t>(10 * 1024 * 1024)); |
| EXPECT_EQ("gzip", res.get_request_header_value("Content-Encoding")); |
| } |
| |
| TEST_F(ServerTest, PutContentWithDeflate) { |
| cli_.set_compress(false); |
| Headers headers; |
| headers.emplace("Content-Encoding", "deflate"); |
| // PUT in deflate format: |
| auto res = cli_.Put("/put", headers, |
| "\170\234\013\010\015\001\0\001\361\0\372", "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunkedWithGzip) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| |
| auto res = cli_.Get("/streamed-chunked", headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunkedWithGzip2) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| |
| auto res = cli_.Get("/streamed-chunked2", headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, SplitDelimiterInPathRegex) { |
| auto res = cli_.Get("/regex-with-delimiter?key=^(?.*(value))"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(GzipDecompressor, ChunkedDecompression) { |
| std::string data; |
| for (size_t i = 0; i < 32 * 1024; ++i) { |
| data.push_back(static_cast<char>('a' + i % 26)); |
| } |
| |
| std::string compressed_data; |
| { |
| httplib::detail::gzip_compressor compressor; |
| bool result = compressor.compress( |
| data.data(), data.size(), |
| /*last=*/true, |
| [&](const char *compressed_data_chunk, size_t compressed_data_size) { |
| compressed_data.insert(compressed_data.size(), compressed_data_chunk, |
| compressed_data_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::gzip_decompressor decompressor; |
| |
| // Chunk size is chosen specifically to have a decompressed chunk size equal |
| // to 16384 bytes 16384 bytes is the size of decompressor output buffer |
| size_t chunk_size = 130; |
| for (size_t chunk_begin = 0; chunk_begin < compressed_data.size(); |
| chunk_begin += chunk_size) { |
| size_t current_chunk_size = |
| std::min(compressed_data.size() - chunk_begin, chunk_size); |
| bool result = decompressor.decompress( |
| compressed_data.data() + chunk_begin, current_chunk_size, |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| } |
| ASSERT_EQ(data, decompressed_data); |
| } |
| |
| TEST(GzipDecompressor, DeflateDecompression) { |
| std::string original_text = "Raw deflate without gzip"; |
| unsigned char data[32] = {0x78, 0x9C, 0x0B, 0x4A, 0x2C, 0x57, 0x48, 0x49, |
| 0x4D, 0xCB, 0x49, 0x2C, 0x49, 0x55, 0x28, 0xCF, |
| 0x2C, 0xC9, 0xC8, 0x2F, 0x2D, 0x51, 0x48, 0xAF, |
| 0xCA, 0x2C, 0x00, 0x00, 0x6F, 0x98, 0x09, 0x2E}; |
| std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::gzip_decompressor decompressor; |
| |
| bool result = decompressor.decompress( |
| compressed_data.data(), compressed_data.size(), |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| ASSERT_EQ(original_text, decompressed_data); |
| } |
| |
| TEST(GzipDecompressor, DeflateDecompressionTrailingBytes) { |
| std::string original_text = "Raw deflate without gzip"; |
| unsigned char data[40] = {0x78, 0x9C, 0x0B, 0x4A, 0x2C, 0x57, 0x48, 0x49, |
| 0x4D, 0xCB, 0x49, 0x2C, 0x49, 0x55, 0x28, 0xCF, |
| 0x2C, 0xC9, 0xC8, 0x2F, 0x2D, 0x51, 0x48, 0xAF, |
| 0xCA, 0x2C, 0x00, 0x00, 0x6F, 0x98, 0x09, 0x2E, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; |
| std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::gzip_decompressor decompressor; |
| |
| bool result = decompressor.decompress( |
| compressed_data.data(), compressed_data.size(), |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| ASSERT_EQ(original_text, decompressed_data); |
| } |
| |
| #ifdef _WIN32 |
| TEST(GzipDecompressor, LargeRandomData) { |
| |
| // prepare large random data that is difficult to be compressed and is |
| // expected to have large size even when compressed |
| std::random_device seed_gen; |
| std::mt19937 random(seed_gen()); |
| constexpr auto large_size_byte = 4294967296UL; // 4GiB |
| constexpr auto data_size = large_size_byte + 134217728UL; // + 128MiB |
| std::vector<std::uint32_t> data(data_size / sizeof(std::uint32_t)); |
| std::generate(data.begin(), data.end(), [&]() { return random(); }); |
| |
| // compress data over 4GiB |
| std::string compressed_data; |
| compressed_data.reserve(large_size_byte + 536870912UL); // + 512MiB reserved |
| httplib::detail::gzip_compressor compressor; |
| auto result = compressor.compress(reinterpret_cast<const char *>(data.data()), |
| data.size() * sizeof(std::uint32_t), true, |
| [&](const char *data, size_t size) { |
| compressed_data.insert( |
| compressed_data.size(), data, size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| |
| // FIXME: compressed data size is expected to be greater than 4GiB, |
| // but there is no guarantee |
| // ASSERT_TRUE(compressed_data.size() >= large_size_byte); |
| |
| // decompress data over 4GiB |
| std::string decompressed_data; |
| decompressed_data.reserve(data_size); |
| httplib::detail::gzip_decompressor decompressor; |
| result = decompressor.decompress( |
| compressed_data.data(), compressed_data.size(), |
| [&](const char *data, size_t size) { |
| decompressed_data.insert(decompressed_data.size(), data, size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| |
| // compare |
| ASSERT_EQ(data_size, decompressed_data.size()); |
| ASSERT_TRUE(std::memcmp(data.data(), decompressed_data.data(), data_size) == |
| 0); |
| } |
| #endif |
| #endif |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| TEST_F(ServerTest, GetStreamedChunkedWithBrotli) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "br"); |
| |
| auto res = cli_.Get("/streamed-chunked", headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunkedWithBrotli2) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "br"); |
| |
| auto res = cli_.Get("/streamed-chunked2", headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| #endif |
| |
| TEST_F(ServerTest, Patch) { |
| auto res = cli_.Patch("/patch", "PATCH", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PATCH", res->body); |
| } |
| |
| TEST_F(ServerTest, Delete) { |
| auto res = cli_.Delete("/delete"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("DELETE", res->body); |
| } |
| |
| TEST_F(ServerTest, DeleteContentReceiver) { |
| auto res = cli_.Delete("/delete-body", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("content", res->body); |
| } |
| |
| TEST_F(ServerTest, Options) { |
| auto res = cli_.Options("*"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("GET, POST, HEAD, OPTIONS", res->get_header_value("Allow")); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST_F(ServerTest, URL) { |
| auto res = cli_.Get("/request-target?aaa=bbb&ccc=ddd"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, ArrayParam) { |
| auto res = cli_.Get("/array-param?array=value1&array=value2&array=value3"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoMultipleHeaders) { |
| Headers headers = {{"Content-Length", "5"}}; |
| auto res = cli_.Post("/validate-no-multiple-headers", headers, "hello", |
| "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PostContentReceiver) { |
| auto res = cli_.Post("/content_receiver", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("content", res->body); |
| } |
| |
| TEST_F(ServerTest, PostMultipartFileContentReceiver) { |
| UploadFormDataItems items = { |
| {"text1", "text default", "", ""}, |
| {"text2", "aωb", "", ""}, |
| {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, |
| {"file2", R"({\n "world": true\n}\n)", "world.json", "application/json"}, |
| {"file3", "", "", "application/octet-stream"}, |
| }; |
| |
| auto res = cli_.Post("/content_receiver", items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PostMultipartPlusBoundary) { |
| UploadFormDataItems items = { |
| {"text1", "text default", "", ""}, |
| {"text2", "aωb", "", ""}, |
| {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, |
| {"file2", R"({\n "world": true\n}\n)", "world.json", "application/json"}, |
| {"file3", "", "", "application/octet-stream"}, |
| }; |
| |
| auto boundary = std::string("+++++"); |
| |
| std::string body; |
| |
| for (const auto &item : items) { |
| body += "--" + boundary + "\r\n"; |
| body += "Content-Disposition: form-data; name=\"" + item.name + "\""; |
| if (!item.filename.empty()) { |
| body += "; filename=\"" + item.filename + "\""; |
| } |
| body += "\r\n"; |
| if (!item.content_type.empty()) { |
| body += "Content-Type: " + item.content_type + "\r\n"; |
| } |
| body += "\r\n"; |
| body += item.content + "\r\n"; |
| } |
| body += "--" + boundary + "--\r\n"; |
| |
| std::string content_type = "multipart/form-data; boundary=" + boundary; |
| auto res = cli_.Post("/content_receiver", body, content_type.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PostContentReceiverGzip) { |
| cli_.set_compress(true); |
| auto res = cli_.Post("/content_receiver", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("content", res->body); |
| } |
| |
| TEST_F(ServerTest, PutContentReceiver) { |
| auto res = cli_.Put("/content_receiver", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("content", res->body); |
| } |
| |
| TEST_F(ServerTest, PatchContentReceiver) { |
| auto res = cli_.Patch("/content_receiver", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("content", res->body); |
| } |
| |
| template <typename ClientType> |
| void TestWithHeadersAndContentReceiver( |
| ClientType &cli, |
| std::function<Result(ClientType &, const std::string &, const Headers &, |
| const std::string &, const std::string &, |
| ContentReceiver, DownloadProgress)> |
| request_func) { |
| Headers headers; |
| headers.emplace("X-Custom-Header", "test-value"); |
| |
| std::string received_body; |
| auto res = request_func( |
| cli, "/content_receiver", headers, "content", "application/json", |
| [&](const char *data, size_t data_length) { |
| received_body.append(data, data_length); |
| return true; |
| }, |
| nullptr); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("content", received_body); |
| } |
| |
| TEST_F(ServerTest, PostWithHeadersAndContentReceiver) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiver<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Post(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| TEST_F(ServerTest, PutWithHeadersAndContentReceiver) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiver<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Put(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| TEST_F(ServerTest, PatchWithHeadersAndContentReceiver) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiver<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Patch(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| template <typename ClientType> |
| void TestWithHeadersAndContentReceiverWithProgress( |
| ClientType &cli, |
| std::function<Result(ClientType &, const std::string &, const Headers &, |
| const std::string &, const std::string &, |
| ContentReceiver, DownloadProgress)> |
| request_func) { |
| Headers headers; |
| headers.emplace("X-Test-Header", "progress-test"); |
| |
| std::string received_body; |
| auto progress_called = false; |
| |
| auto res = request_func( |
| cli, "/content_receiver", headers, "content", "text/plain", |
| [&](const char *data, size_t data_length) { |
| received_body.append(data, data_length); |
| return true; |
| }, |
| [&](uint64_t /*current*/, uint64_t /*total*/) { |
| progress_called = true; |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("content", received_body); |
| EXPECT_TRUE(progress_called); |
| } |
| |
| TEST_F(ServerTest, PostWithHeadersAndContentReceiverWithProgress) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverWithProgress<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Post(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| TEST_F(ServerTest, PutWithHeadersAndContentReceiverWithProgress) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverWithProgress<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Put(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| TEST_F(ServerTest, PatchWithHeadersAndContentReceiverWithProgress) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverWithProgress<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Patch(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| template <typename ClientType> |
| void TestWithHeadersAndContentReceiverError( |
| ClientType &cli, std::function<Result(ClientType &, const std::string &, |
| const Headers &, const std::string &, |
| const std::string &, ContentReceiver)> |
| request_func) { |
| Headers headers; |
| headers.emplace("X-Error-Test", "true"); |
| |
| std::string received_body; |
| auto receiver_failed = false; |
| |
| auto res = |
| request_func(cli, "/content_receiver", headers, "content", "text/plain", |
| [&](const char *data, size_t data_length) { |
| received_body.append(data, data_length); |
| receiver_failed = true; |
| return false; |
| }); |
| |
| ASSERT_FALSE(res); |
| EXPECT_TRUE(receiver_failed); |
| } |
| |
| TEST_F(ServerTest, PostWithHeadersAndContentReceiverError) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverError<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver) { |
| return cli.Post(path, headers, body, content_type, receiver); |
| }); |
| } |
| |
| TEST_F(ServerTest, PuttWithHeadersAndContentReceiverError) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverError<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver) { |
| return cli.Put(path, headers, body, content_type, receiver); |
| }); |
| } |
| |
| TEST_F(ServerTest, PatchWithHeadersAndContentReceiverError) { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverError<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver) { |
| return cli.Patch(path, headers, body, content_type, receiver); |
| }); |
| } |
| |
| TEST_F(ServerTest, PostQueryStringAndBody) { |
| auto res = |
| cli_.Post("/query-string-and-body?key=value", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, HTTP2Magic) { |
| Request req; |
| req.method = "PRI"; |
| req.path = "*"; |
| req.body = "SM"; |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } |
| |
| TEST_F(ServerTest, KeepAlive) { |
| auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| |
| res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| |
| res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| |
| res = cli_.Get("/not-exist"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| |
| res = cli_.Post("/empty", "", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("empty", res->body); |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| |
| res = cli_.Post( |
| "/empty", 0, [&](size_t, size_t, DataSink &) { return true; }, |
| "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("empty", res->body); |
| |
| cli_.set_keep_alive(false); |
| res = cli_.Get("/last-request"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| } |
| |
| TEST_F(ServerTest, TooManyRedirect) { |
| cli_.set_follow_location(true); |
| auto res = cli_.Get("/redirect/0"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::ExceedRedirectCount, res.error()); |
| } |
| |
| TEST_F(ServerTest, StartTime) { auto res = cli_.Get("/test-start-time"); } |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| TEST_F(ServerTest, Gzip) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("33", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GzipWithoutAcceptEncoding) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", ""); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GzipWithContentReceiver) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| std::string body; |
| auto res = cli_.Get("/compress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("33", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GzipWithoutDecompressing) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| |
| cli_.set_decompress(false); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("33", res->get_header_value("Content-Length")); |
| EXPECT_EQ(33U, res->body.size()); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GzipWithContentReceiverWithoutAcceptEncoding) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", ""); |
| |
| std::string body; |
| auto res = cli_.Get("/compress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoGzip) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| auto res = cli_.Get("/nocompress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(false, res->has_header("Content-Encoding")); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoGzipWithContentReceiver) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| std::string body; |
| auto res = cli_.Get("/nocompress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(false, res->has_header("Content-Encoding")); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, MultipartFormDataGzip) { |
| UploadFormDataItems items = { |
| {"key1", "test", "", ""}, |
| {"key2", "--abcdefg123", "", ""}, |
| }; |
| |
| cli_.set_compress(true); |
| auto res = cli_.Post("/compress-multipart", items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| TEST_F(ServerTest, Brotli) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "br"); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("br", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("19", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_ZSTD_SUPPORT |
| TEST_F(ServerTest, Zstd) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, ZstdWithoutAcceptEncoding) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", ""); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, ZstdWithContentReceiver) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| std::string body; |
| auto res = cli_.Get("/compress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, ZstdWithoutDecompressing) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| |
| cli_.set_decompress(false); |
| auto res = cli_.Get("/compress", headers); |
| |
| unsigned char compressed[26] = {0x28, 0xb5, 0x2f, 0xfd, 0x20, 0x64, 0x8d, |
| 0x00, 0x00, 0x50, 0x31, 0x32, 0x33, 0x34, |
| 0x35, 0x36, 0x37, 0x38, 0x39, 0x30, 0x01, |
| 0x00, 0xd7, 0xa9, 0x20, 0x01}; |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(26U, res->body.size()); |
| EXPECT_TRUE(std::memcmp(compressed, res->body.data(), sizeof(compressed)) == |
| 0); |
| } |
| |
| TEST_F(ServerTest, ZstdWithContentReceiverWithoutAcceptEncoding) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", ""); |
| |
| std::string body; |
| auto res = cli_.Get("/compress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoZstd) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| auto res = cli_.Get("/nocompress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(false, res->has_header("Content-Encoding")); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoZstdWithContentReceiver) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| std::string body; |
| auto res = cli_.Get("/nocompress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(false, res->has_header("Content-Encoding")); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| // TODO: How to enable zstd ?? |
| TEST_F(ServerTest, MultipartFormDataZstd) { |
| UploadFormDataItems items = { |
| {"key1", "test", "", ""}, |
| {"key2", "--abcdefg123", "", ""}, |
| }; |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| |
| cli_.set_compress(true); |
| auto res = cli_.Post("/compress-multipart", headers, items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PutWithContentProviderWithZstd) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| |
| cli_.set_compress(true); |
| auto res = cli_.Put( |
| "/put", headers, 3, |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.os << "PUT"; |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| // Pre-compression logging tests |
| TEST_F(ServerTest, PreCompressionLogging) { |
| // Test data for compression (matches the actual /compress endpoint content) |
| const std::string test_content = |
| "123456789012345678901234567890123456789012345678901234567890123456789012" |
| "3456789012345678901234567890"; |
| |
| // Variables to capture logging data |
| std::string pre_compression_body; |
| std::string pre_compression_content_type; |
| std::string pre_compression_content_encoding; |
| |
| std::string post_compression_body; |
| std::string post_compression_content_type; |
| std::string post_compression_content_encoding; |
| |
| // Set up pre-compression logger |
| svr_.set_pre_compression_logger([&](const Request & /*req*/, |
| const Response &res) { |
| pre_compression_body = res.body; |
| pre_compression_content_type = res.get_header_value("Content-Type"); |
| pre_compression_content_encoding = res.get_header_value("Content-Encoding"); |
| }); |
| |
| // Set up post-compression logger |
| svr_.set_logger([&](const Request & /*req*/, const Response &res) { |
| post_compression_body = res.body; |
| post_compression_content_type = res.get_header_value("Content-Type"); |
| post_compression_content_encoding = |
| res.get_header_value("Content-Encoding"); |
| }); |
| |
| // Test with gzip compression |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip"); |
| |
| auto res = cli_.Get("/compress", headers); |
| |
| // Verify response was compressed |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| |
| // Verify pre-compression logger captured uncompressed content |
| EXPECT_EQ(test_content, pre_compression_body); |
| EXPECT_EQ("text/plain", pre_compression_content_type); |
| EXPECT_TRUE(pre_compression_content_encoding |
| .empty()); // No encoding header before compression |
| |
| // Verify post-compression logger captured compressed content |
| EXPECT_NE(test_content, |
| post_compression_body); // Should be different after compression |
| EXPECT_EQ("text/plain", post_compression_content_type); |
| EXPECT_EQ("gzip", post_compression_content_encoding); |
| |
| // Verify compressed content is smaller |
| EXPECT_LT(post_compression_body.size(), pre_compression_body.size()); |
| } |
| |
| TEST_F(ServerTest, PreCompressionLoggingWithBrotli) { |
| const std::string test_content = |
| "123456789012345678901234567890123456789012345678901234567890123456789012" |
| "3456789012345678901234567890"; |
| |
| std::string pre_compression_body; |
| std::string post_compression_body; |
| |
| svr_.set_pre_compression_logger( |
| [&](const Request & /*req*/, const Response &res) { |
| pre_compression_body = res.body; |
| }); |
| |
| svr_.set_logger([&](const Request & /*req*/, const Response &res) { |
| post_compression_body = res.body; |
| }); |
| |
| Headers headers; |
| headers.emplace("Accept-Encoding", "br"); |
| |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("br", res->get_header_value("Content-Encoding")); |
| |
| // Verify pre-compression content is uncompressed |
| EXPECT_EQ(test_content, pre_compression_body); |
| |
| // Verify post-compression content is compressed |
| EXPECT_NE(test_content, post_compression_body); |
| EXPECT_LT(post_compression_body.size(), pre_compression_body.size()); |
| } |
| |
| TEST_F(ServerTest, PreCompressionLoggingWithoutCompression) { |
| const std::string test_content = |
| "123456789012345678901234567890123456789012345678901234567890123456789012" |
| "3456789012345678901234567890"; |
| |
| std::string pre_compression_body; |
| std::string post_compression_body; |
| |
| svr_.set_pre_compression_logger( |
| [&](const Request & /*req*/, const Response &res) { |
| pre_compression_body = res.body; |
| }); |
| |
| svr_.set_logger([&](const Request & /*req*/, const Response &res) { |
| post_compression_body = res.body; |
| }); |
| |
| // Request without compression (use /nocompress endpoint) |
| Headers headers; |
| auto res = cli_.Get("/nocompress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| |
| // Pre-compression logger should not be called when no compression is applied |
| EXPECT_TRUE( |
| pre_compression_body.empty()); // Pre-compression logger not called |
| EXPECT_EQ( |
| test_content, |
| post_compression_body); // Post-compression logger captures final content |
| } |
| |
| TEST_F(ServerTest, PreCompressionLoggingOnlyPreLogger) { |
| const std::string test_content = |
| "123456789012345678901234567890123456789012345678901234567890123456789012" |
| "3456789012345678901234567890"; |
| |
| std::string pre_compression_body; |
| bool pre_logger_called = false; |
| |
| // Set only pre-compression logger |
| svr_.set_pre_compression_logger( |
| [&](const Request & /*req*/, const Response &res) { |
| pre_compression_body = res.body; |
| pre_logger_called = true; |
| }); |
| |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip"); |
| |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| |
| // Verify pre-compression logger was called |
| EXPECT_TRUE(pre_logger_called); |
| EXPECT_EQ(test_content, pre_compression_body); |
| } |
| |
| TEST(ZstdDecompressor, ChunkedDecompression) { |
| std::string data; |
| for (size_t i = 0; i < 32 * 1024; ++i) { |
| data.push_back(static_cast<char>('a' + i % 26)); |
| } |
| |
| std::string compressed_data; |
| { |
| httplib::detail::zstd_compressor compressor; |
| bool result = compressor.compress( |
| data.data(), data.size(), |
| /*last=*/true, |
| [&](const char *compressed_data_chunk, size_t compressed_data_size) { |
| compressed_data.insert(compressed_data.size(), compressed_data_chunk, |
| compressed_data_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::zstd_decompressor decompressor; |
| |
| // Chunk size is chosen specifically to have a decompressed chunk size equal |
| // to 16384 bytes 16384 bytes is the size of decompressor output buffer |
| size_t chunk_size = 130; |
| for (size_t chunk_begin = 0; chunk_begin < compressed_data.size(); |
| chunk_begin += chunk_size) { |
| size_t current_chunk_size = |
| std::min(compressed_data.size() - chunk_begin, chunk_size); |
| bool result = decompressor.decompress( |
| compressed_data.data() + chunk_begin, current_chunk_size, |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| } |
| ASSERT_EQ(data, decompressed_data); |
| } |
| |
| TEST(ZstdDecompressor, Decompress) { |
| std::string original_text = "Compressed with ZSTD"; |
| unsigned char data[29] = {0x28, 0xb5, 0x2f, 0xfd, 0x20, 0x14, 0xa1, 0x00, |
| 0x00, 0x43, 0x6f, 0x6d, 0x70, 0x72, 0x65, 0x73, |
| 0x73, 0x65, 0x64, 0x20, 0x77, 0x69, 0x74, 0x68, |
| 0x20, 0x5a, 0x53, 0x54, 0x44}; |
| std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::zstd_decompressor decompressor; |
| |
| bool result = decompressor.decompress( |
| compressed_data.data(), compressed_data.size(), |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| ASSERT_EQ(original_text, decompressed_data); |
| } |
| #endif |
| |
| // Sends a raw request to a server listening at HOST:PORT. |
| static bool send_request(time_t read_timeout_sec, const std::string &req, |
| std::string *resp = nullptr) { |
| auto error = Error::Success; |
| |
| auto client_sock = detail::create_client_socket( |
| HOST, "", PORT, AF_UNSPEC, false, false, nullptr, |
| /*connection_timeout_sec=*/5, 0, |
| /*read_timeout_sec=*/5, 0, |
| /*write_timeout_sec=*/5, 0, std::string(), error); |
| |
| if (client_sock == INVALID_SOCKET) { return false; } |
| |
| auto ret = detail::process_client_socket( |
| client_sock, read_timeout_sec, 0, 0, 0, 0, |
| std::chrono::steady_clock::time_point::min(), [&](Stream &strm) { |
| if (req.size() != |
| static_cast<size_t>(strm.write(req.data(), req.size()))) { |
| return false; |
| } |
| |
| char buf[512]; |
| |
| detail::stream_line_reader line_reader(strm, buf, sizeof(buf)); |
| while (line_reader.getline()) { |
| if (resp) { *resp += line_reader.ptr(); } |
| } |
| return true; |
| }); |
| |
| detail::close_socket(client_sock); |
| |
| return ret; |
| } |
| |
| TEST(ServerRequestParsingTest, TrimWhitespaceFromHeaderValues) { |
| Server svr; |
| std::string header_value; |
| svr.Get("/validate-ws-in-headers", [&](const Request &req, Response &res) { |
| header_value = req.get_header_value("foo"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Only space and horizontal tab are whitespace. Make sure other whitespace- |
| // like characters are not treated the same - use vertical tab and escape. |
| const std::string req = "GET /validate-ws-in-headers HTTP/1.1\r\n" |
| "foo: \t \v bar \x1B\t \r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| std::string res; |
| ASSERT_TRUE(send_request(5, req, &res)); |
| EXPECT_EQ(header_value, ""); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", res.substr(0, 24)); |
| } |
| |
| // Sends a raw request and verifies that there isn't a crash or exception. |
| static void test_raw_request(const std::string &req, |
| std::string *out = nullptr) { |
| Server svr; |
| svr.Get("/hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| svr.Put("/put_hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| svr.Get("/header_field_value_check", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| // Server read timeout must be longer than the client read timeout for the |
| // bug to reproduce, probably to force the server to process a request |
| // without a trailing blank line. |
| const time_t client_read_timeout_sec = 1; |
| svr.set_read_timeout(std::chrono::seconds(client_read_timeout_sec + 1)); |
| bool listen_thread_ok = false; |
| thread t = thread([&] { listen_thread_ok = svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| EXPECT_TRUE(listen_thread_ok); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| ASSERT_TRUE(send_request(client_read_timeout_sec, req, out)); |
| } |
| |
| TEST(ServerRequestParsingTest, ReadHeadersRegexComplexity) { |
| // A certain header line causes an exception if the header property is parsed |
| // naively with a single regex. This occurs with libc++ but not libstdc++. |
| test_raw_request( |
| "GET /hi HTTP/1.1\r\n" |
| " : " |
| " " |
| " "); |
| } |
| |
| TEST(ServerRequestParsingTest, ReadHeadersRegexComplexity2) { |
| // A certain header line causes an exception if the header property *name* is |
| // parsed with a regular expression starting with "(.+?):" - this is a non- |
| // greedy matcher and requires backtracking when there are a lot of ":" |
| // characters. |
| // This occurs with libc++ but not libstdc++. |
| test_raw_request( |
| "GET /hi HTTP/1.1\r\n" |
| ":-:::::::::::::::::::::::::::-::::::::::::::::::::::::@-&&&&&&&&&&&" |
| "--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&" |
| "&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-:::::" |
| "::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-::::::::::::::::::::::::" |
| ":::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::" |
| "::::::::-:::::::::::::::::@-&&&&&&&--:::::::-::::::::::::::::::::::" |
| ":::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::" |
| "::::::::::-:::::::::::::::::@-&&&&&::::::::::::-:::::::::::::::::@-" |
| "&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::::::" |
| ":@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::" |
| "::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::@-&&" |
| "&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@" |
| "::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&" |
| "--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&" |
| "&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&" |
| "&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&" |
| "&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@" |
| "-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::" |
| "::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::" |
| ":::::@-&&&&&&&&&&&::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-::::::" |
| ":::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::" |
| "::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-" |
| ":::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&---&&:&" |
| "&&.0------------:-:::::::::::::::::::::::::::::-:::::::::::::::::@-" |
| "&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::::::" |
| ":@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::" |
| "::::@-&&&&&&&&&&&---&&:&&&.0------------O--------\rH PUTHTTP/1.1\r\n" |
| "&&&%%%"); |
| } |
| |
| TEST(ServerRequestParsingTest, ExcessiveWhitespaceInUnparsableHeaderLine) { |
| // Make sure this doesn't crash the server. |
| // In a previous version of the header line regex, the "\r" rendered the line |
| // unparsable and the regex engine repeatedly backtracked, trying to look for |
| // a new position where the leading white space ended and the field value |
| // began. |
| // The crash occurs with libc++ but not libstdc++. |
| test_raw_request("GET /hi HTTP/1.1\r\n" |
| "a:" + |
| std::string(2000, ' ') + '\r' + std::string(20, 'z') + |
| "\r\n" |
| "\r\n"); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidFirstChunkLengthInRequest) { |
| std::string out; |
| |
| test_raw_request("PUT /put_hi HTTP/1.1\r\n" |
| "Content-Type: text/plain\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "\r\n" |
| "nothex\r\n", |
| &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidSecondChunkLengthInRequest) { |
| std::string out; |
| |
| test_raw_request("PUT /put_hi HTTP/1.1\r\n" |
| "Content-Type: text/plain\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "\r\n" |
| "3\r\n" |
| "xyz\r\n" |
| "NaN\r\n", |
| &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, ChunkLengthTooHighInRequest) { |
| std::string out; |
| |
| test_raw_request("PUT /put_hi HTTP/1.1\r\n" |
| "Content-Type: text/plain\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "\r\n" |
| // Length is too large for 64 bits. |
| "1ffffffffffffffff\r\n" |
| "xyz\r\n", |
| &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidHeaderTextWithExtraCR) { |
| test_raw_request("GET /hi HTTP/1.1\r\n" |
| "Content-Type: text/plain\r\n\r"); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidSpaceInURL) { |
| std::string out; |
| test_raw_request("GET /h i HTTP/1.1\r\n\r\n", &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidFieldValueContains_CR_LF_NUL) { |
| std::string out; |
| std::string request( |
| "GET /header_field_value_check HTTP/1.1\r\nTest: [\r\x00\n]\r\n\r\n", 55); |
| test_raw_request(request, &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidFieldValueContains_LF) { |
| std::string out; |
| std::string request( |
| "GET /header_field_value_check HTTP/1.1\r\nTest: [\n\n\n]\r\n\r\n", 55); |
| test_raw_request(request, &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidFieldNameContains_PreceedingSpaces) { |
| std::string out; |
| std::string request( |
| "GET /header_field_value_check HTTP/1.1\r\n Test: val\r\n\r\n", 55); |
| test_raw_request(request, &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, EmptyFieldValue) { |
| std::string out; |
| |
| test_raw_request("GET /header_field_value_check HTTP/1.1\r\n" |
| "Test: \r\n\r\n", |
| &out); |
| EXPECT_EQ("HTTP/1.1 200 OK", out.substr(0, 15)); |
| } |
| |
| TEST(ServerStopTest, StopServerWithChunkedTransmission) { |
| Server svr; |
| |
| svr.Get("/events", [](const Request & /*req*/, Response &res) { |
| res.set_header("Cache-Control", "no-cache"); |
| res.set_chunked_content_provider( |
| "text/event-stream", [](size_t offset, DataSink &sink) { |
| std::string s = "data:"; |
| s += std::to_string(offset); |
| s += "\n\n"; |
| auto ret = sink.write(s.data(), s.size()); |
| EXPECT_TRUE(ret); |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| return true; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| svr.wait_until_ready(); |
| |
| Client client(HOST, PORT); |
| const Headers headers = {{"Accept", "text/event-stream"}}; |
| |
| auto get_thread = std::thread([&client, &headers]() { |
| auto res = client.Get( |
| "/events", headers, |
| [](const char * /*data*/, size_t /*len*/) -> bool { return true; }); |
| }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| get_thread.join(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| // Give GET time to get a few messages. |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| } |
| |
| TEST(ServerStopTest, ClientAccessAfterServerDown) { |
| httplib::Server svr; |
| svr.Post("/hi", |
| [&](const httplib::Request & /*req*/, httplib::Response &res) { |
| res.status = StatusCode::OK_200; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Post("/hi", "data", "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| |
| res = cli.Post("/hi", "data", "text/plain"); |
| ASSERT_FALSE(res); |
| } |
| |
| TEST(ServerStopTest, ListenFailure) { |
| Server svr; |
| auto t = thread([&]() { |
| auto ret = svr.listen("????", PORT); |
| EXPECT_FALSE(ret); |
| }); |
| svr.wait_until_ready(); |
| svr.stop(); |
| t.join(); |
| } |
| |
| TEST(ServerStopTest, Decommision) { |
| Server svr; |
| |
| svr.Get("/hi", [&](const Request &, Response &res) { res.body = "hi..."; }); |
| |
| for (int i = 0; i < 4; i++) { |
| auto is_even = !(i % 2); |
| |
| std::thread t{[&] { |
| try { |
| std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
| |
| if (is_even) { |
| throw std::runtime_error("Some thing that happens to go wrong."); |
| } |
| |
| svr.listen(HOST, PORT); |
| } catch (...) { svr.decommission(); } |
| }}; |
| |
| svr.wait_until_ready(); |
| |
| // Server is up |
| { |
| Client cli(HOST, PORT); |
| auto res = cli.Get("/hi"); |
| if (is_even) { |
| EXPECT_FALSE(res); |
| } else { |
| EXPECT_TRUE(res); |
| EXPECT_EQ("hi...", res->body); |
| } |
| } |
| |
| svr.stop(); |
| t.join(); |
| |
| // Server is down... |
| { |
| Client cli(HOST, PORT); |
| auto res = cli.Get("/hi"); |
| EXPECT_FALSE(res); |
| } |
| } |
| } |
| |
| // Helper function for string body upload progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestStringBodyUploadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call, |
| const string &body) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| bool progress_called = false; |
| |
| auto res = |
| client_call(cli, body, [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| progress_called = true; |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_TRUE(progress_called); |
| } |
| |
| TEST(UploadProgressTest, PostStringBodyBasic) { |
| TestStringBodyUploadProgress( |
| [](Server &svr) { |
| svr.Post("/test", [](const Request & /*req*/, Response &res) { |
| res.set_content("received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &body, UploadProgress progress_callback) { |
| return cli.Post("/test", body, "text/plain", progress_callback); |
| }, |
| "test data for upload progress"); |
| } |
| |
| TEST(UploadProgressTest, PutStringBodyBasic) { |
| TestStringBodyUploadProgress( |
| [](Server &svr) { |
| svr.Put("/test", [](const Request & /*req*/, Response &res) { |
| res.set_content("put received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &body, UploadProgress progress_callback) { |
| return cli.Put("/test", body, "text/plain", progress_callback); |
| }, |
| "put test data for upload progress"); |
| } |
| |
| TEST(UploadProgressTest, PatchStringBodyBasic) { |
| TestStringBodyUploadProgress( |
| [](Server &svr) { |
| svr.Patch("/test", [](const Request & /*req*/, Response &res) { |
| res.set_content("patch received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &body, UploadProgress progress_callback) { |
| return cli.Patch("/test", body, "text/plain", progress_callback); |
| }, |
| "patch test data for upload progress"); |
| } |
| |
| // Helper function for content provider upload progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestContentProviderUploadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| |
| auto res = |
| client_call(cli, [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_FALSE(progress_values.empty()); |
| } |
| |
| TEST(UploadProgressTest, PostContentProviderProgress) { |
| TestContentProviderUploadProgress( |
| [](Server &svr) { |
| svr.Post("/test", [](const Request & /*req*/, Response &res) { |
| res.set_content("provider received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, UploadProgress progress_callback) { |
| return cli.Post( |
| "/test", 10, |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) -> bool { |
| sink.os << "test data"; |
| return true; |
| }, |
| "text/plain", progress_callback); |
| }); |
| } |
| |
| // Helper function for multipart upload progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestMultipartUploadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call, |
| const string &endpoint) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| |
| UploadFormDataItems items = { |
| {"field1", "value1", "", ""}, |
| {"field2", "longer value for progress tracking test", "", ""}, |
| {"file1", "file content data for upload progress", "test.txt", |
| "text/plain"}}; |
| |
| auto res = client_call(cli, endpoint, items, |
| [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_FALSE(progress_values.empty()); |
| } |
| |
| TEST(UploadProgressTest, PostMultipartProgress) { |
| TestMultipartUploadProgress( |
| [](Server &svr) { |
| svr.Post("/multipart", [](const Request &req, Response &res) { |
| EXPECT_TRUE(!req.form.files.empty() || !req.form.fields.empty()); |
| res.set_content("multipart received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &endpoint, const UploadFormDataItems &items, |
| UploadProgress progress_callback) { |
| return cli.Post(endpoint, items, progress_callback); |
| }, |
| "/multipart"); |
| } |
| |
| // Helper function for basic download progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestBasicDownloadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call, const string &endpoint, |
| size_t expected_content_size) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| |
| auto res = client_call(cli, endpoint, |
| [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_FALSE(progress_values.empty()); |
| EXPECT_EQ(expected_content_size, res->body.size()); |
| } |
| |
| TEST(DownloadProgressTest, GetBasic) { |
| TestBasicDownloadProgress( |
| [](Server &svr) { |
| svr.Get("/download", [](const Request & /*req*/, Response &res) { |
| string content(1000, 'D'); |
| res.set_content(content, "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &endpoint, |
| DownloadProgress progress_callback) { |
| return cli.Get(endpoint, progress_callback); |
| }, |
| "/download", 1000u); |
| } |
| |
| // Helper function for content receiver download progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestContentReceiverDownloadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call, |
| const string &endpoint, |
| size_t expected_content_size) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| string received_body; |
| |
| auto res = client_call( |
| cli, endpoint, |
| [&](const char *data, size_t data_length) -> bool { |
| received_body.append(data, data_length); |
| return true; |
| }, |
| [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_FALSE(progress_values.empty()); |
| EXPECT_EQ(expected_content_size, received_body.size()); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST(DownloadProgressTest, GetWithContentReceiver) { |
| TestContentReceiverDownloadProgress( |
| [](Server &svr) { |
| svr.Get("/download-receiver", |
| [](const Request & /*req*/, Response &res) { |
| string content(2000, 'R'); |
| res.set_content(content, "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &endpoint, ContentReceiver content_receiver, |
| DownloadProgress progress_callback) { |
| return cli.Get(endpoint, content_receiver, progress_callback); |
| }, |
| "/download-receiver", 2000u); |
| } |
| |
| TEST(StreamingTest, NoContentLengthStreaming) { |
| Server svr; |
| |
| svr.Get("/stream", [](const Request & /*req*/, Response &res) { |
| res.set_content_provider("text/plain", [](size_t offset, DataSink &sink) { |
| if (offset < 6) { |
| sink.os << (offset < 3 ? "a" : "b"); |
| } else { |
| sink.done(); |
| } |
| return true; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto listen_se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client client(HOST, PORT); |
| |
| auto get_thread = std::thread([&client]() { |
| std::string s; |
| auto res = |
| client.Get("/stream", [&s](const char *data, size_t len) -> bool { |
| s += std::string(data, len); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("aaabbb", s); |
| }); |
| auto get_se = detail::scope_exit([&] { get_thread.join(); }); |
| |
| // Give GET time to get a few messages. |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| } |
| |
| TEST(MountTest, Unmount) { |
| Server svr; |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| svr.set_mount_point("/mount2", "./www2"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| |
| res = cli.Get("/mount2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| svr.set_mount_point("/", "./www"); |
| |
| res = cli.Get("/dir/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| svr.remove_mount_point("/"); |
| res = cli.Get("/dir/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| |
| svr.remove_mount_point("/mount2"); |
| res = cli.Get("/mount2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST(MountTest, Redicect) { |
| Server svr; |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.set_mount_point("/", "./www"); |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get("/dir/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli.Get("/dir"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| res = cli.Get("/file"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli.Get("/file/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/dir"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(MountTest, MultibytesPathName) { |
| Server svr; |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.set_mount_point("/", "./www"); |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get(u8"/日本語Dir/日本語File.txt"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(u8"日本語コンテンツ", res->body); |
| } |
| |
| TEST(KeepAliveTest, ReadTimeout) { |
| Server svr; |
| |
| svr.Get("/a", [&](const Request & /*req*/, Response &res) { |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| res.set_content("a", "text/plain"); |
| }); |
| |
| svr.Get("/b", [&](const Request & /*req*/, Response &res) { |
| res.set_content("b", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| cli.set_keep_alive(true); |
| cli.set_read_timeout(std::chrono::seconds(1)); |
| |
| auto resa = cli.Get("/a"); |
| ASSERT_FALSE(resa); |
| EXPECT_EQ(Error::Read, resa.error()); |
| |
| auto resb = cli.Get("/b"); |
| ASSERT_TRUE(resb); |
| EXPECT_EQ(StatusCode::OK_200, resb->status); |
| EXPECT_EQ("b", resb->body); |
| } |
| |
| TEST(KeepAliveTest, MaxCount) { |
| size_t keep_alive_max_count = 3; |
| |
| Server svr; |
| svr.set_keep_alive_max_count(keep_alive_max_count); |
| |
| svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_keep_alive(true); |
| |
| for (size_t i = 0; i < 5; i++) { |
| auto result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| if (i == keep_alive_max_count - 1) { |
| EXPECT_EQ("close", result->get_header_value("Connection")); |
| } else { |
| EXPECT_FALSE(result->has_header("Connection")); |
| } |
| } |
| } |
| |
| TEST(KeepAliveTest, Issue1041) { |
| Server svr; |
| svr.set_keep_alive_timeout(3); |
| |
| svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_keep_alive(true); |
| |
| auto result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| std::this_thread::sleep_for(std::chrono::seconds(5)); |
| |
| result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| } |
| |
| TEST(KeepAliveTest, Issue1959) { |
| Server svr; |
| svr.set_keep_alive_timeout(5); |
| |
| svr.Get("/a", [&](const Request & /*req*/, Response &res) { |
| res.set_content("a", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| if (!svr.is_running()) return; |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| cli.set_keep_alive(true); |
| |
| using namespace std::chrono; |
| auto start = steady_clock::now(); |
| |
| cli.Get("/a"); |
| |
| svr.stop(); |
| listen_thread.join(); |
| |
| auto end = steady_clock::now(); |
| auto elapsed = duration_cast<milliseconds>(end - start).count(); |
| |
| EXPECT_LT(elapsed, 5000); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(KeepAliveTest, SSLClientReconnection) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| svr.set_keep_alive_timeout(1); |
| |
| svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_keep_alive(true); |
| |
| auto result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| |
| // Recoonect |
| result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| } |
| |
| TEST(KeepAliveTest, SSLClientReconnectionPost) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| svr.set_keep_alive_timeout(1); |
| std::string content = "reconnect"; |
| |
| svr.Post("/hi", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_keep_alive(true); |
| |
| auto result = cli.Post( |
| "/hi", content.size(), |
| [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.write(content.c_str(), content.size()); |
| return true; |
| }, |
| "text/plain"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(200, result->status); |
| |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| |
| // Recoonect |
| result = cli.Post( |
| "/hi", content.size(), |
| [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.write(content.c_str(), content.size()); |
| return true; |
| }, |
| "text/plain"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(200, result->status); |
| |
| result = cli.Post( |
| "/hi", content.size(), |
| [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.write(content.c_str(), content.size()); |
| return true; |
| }, |
| "text/plain"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(200, result->status); |
| } |
| |
| TEST(SNI_AutoDetectionTest, SNI_Logic) { |
| { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/sni", [&](const Request &req, Response &res) { |
| std::string expected; |
| if (req.ssl) { |
| if (const char *sni = |
| SSL_get_servername(req.ssl, TLSEXT_NAMETYPE_host_name)) { |
| expected = sni; |
| } |
| } |
| EXPECT_EQ(expected, req.get_param_value("expected")); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| SSLClient cli("localhost", PORT); |
| cli.enable_server_certificate_verification(false); |
| auto res = cli.Get("/sni?expected=localhost"); |
| ASSERT_TRUE(res); |
| } |
| |
| { |
| SSLClient cli("::1", PORT); |
| cli.enable_server_certificate_verification(false); |
| auto res = cli.Get("/sni?expected="); |
| ASSERT_TRUE(res); |
| } |
| } |
| } |
| #endif |
| |
| TEST(ClientProblemDetectionTest, ContentProvider) { |
| Server svr; |
| |
| size_t content_length = 1024 * 1024; |
| |
| svr.Get("/hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content_provider( |
| content_length, "text/plain", |
| [&](size_t offset, size_t length, DataSink &sink) { |
| auto out_len = std::min(length, static_cast<size_t>(1024)); |
| std::string out(out_len, '@'); |
| sink.write(out.data(), out_len); |
| return offset < 4096; |
| }, |
| [](bool success) { ASSERT_FALSE(success); }); |
| }); |
| |
| svr.Get("/empty", [&](const Request & /*req*/, Response &res) { |
| res.set_content_provider( |
| 0, "text/plain", |
| [&](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) -> bool { |
| EXPECT_TRUE(false); |
| return true; |
| }, |
| [](bool success) { ASSERT_FALSE(success); }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| { |
| auto res = cli.Get("/hi", [&](const char * /*data*/, |
| size_t /*data_length*/) { return false; }); |
| ASSERT_FALSE(res); |
| } |
| |
| { |
| auto res = cli.Get("/empty", [&](const char * /*data*/, |
| size_t /*data_length*/) { return false; }); |
| ASSERT_TRUE(res); |
| } |
| } |
| |
| TEST(ErrorHandlerWithContentProviderTest, ErrorHandler) { |
| Server svr; |
| |
| svr.set_error_handler([](Request const &, Response &res) -> void { |
| res.set_chunked_content_provider( |
| "text/plain", [](std::size_t const, DataSink &sink) -> bool { |
| sink.os << "hello"; |
| sink.os << "world"; |
| sink.done(); |
| return true; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| EXPECT_EQ("helloworld", res->body); |
| } |
| |
| TEST(LongPollingTest, ClientCloseDetection) { |
| Server svr; |
| |
| svr.Get("/events", [&](const Request & /*req*/, Response &res) { |
| res.set_chunked_content_provider( |
| "text/plain", [](std::size_t const, DataSink &sink) -> bool { |
| EXPECT_TRUE(sink.is_writable()); // the socket is alive |
| sink.os << "hello"; |
| |
| auto count = 10; |
| while (count > 0 && sink.is_writable()) { |
| this_thread::sleep_for(chrono::milliseconds(10)); |
| count--; |
| } |
| EXPECT_FALSE(sink.is_writable()); // the socket is closed |
| return true; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get("/events", [&](const char *data, size_t data_length) { |
| EXPECT_EQ("hello", string(data, data_length)); |
| return false; // close the socket immediately. |
| }); |
| |
| ASSERT_FALSE(res); |
| } |
| |
| TEST(GetWithParametersTest, GetWithParameters) { |
| Server svr; |
| |
| svr.Get("/", [&](const Request &req, Response &) { |
| EXPECT_EQ("world", req.get_param_value("hello")); |
| EXPECT_EQ("world2", req.get_param_value("hello2")); |
| EXPECT_EQ("world3", req.get_param_value("hello3")); |
| }); |
| |
| svr.Get("/params", [&](const Request &req, Response &) { |
| EXPECT_EQ("world", req.get_param_value("hello")); |
| EXPECT_EQ("world2", req.get_param_value("hello2")); |
| EXPECT_EQ("world3", req.get_param_value("hello3")); |
| }); |
| |
| svr.Get(R"(/resources/([a-z0-9\\-]+))", [&](const Request &req, Response &) { |
| EXPECT_EQ("resource-id", req.matches[1]); |
| EXPECT_EQ("foo", req.get_param_value("param1")); |
| EXPECT_EQ("bar", req.get_param_value("param2")); |
| }); |
| |
| svr.Get("/users/:id", [&](const Request &req, Response &) { |
| EXPECT_EQ("user-id", req.path_params.at("id")); |
| EXPECT_EQ("foo", req.get_param_value("param1")); |
| EXPECT_EQ("bar", req.get_param_value("param2")); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| Params params; |
| params.emplace("hello", "world"); |
| params.emplace("hello2", "world2"); |
| params.emplace("hello3", "world3"); |
| auto res = cli.Get("/", params, Headers{}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/params?hello=world&hello2=world2&hello3=world3"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/resources/resource-id?param1=foo¶m2=bar"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/users/user-id?param1=foo¶m2=bar"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(GetWithParametersTest, GetWithParameters2) { |
| Server svr; |
| |
| svr.Get("/", [&](const Request &req, Response &res) { |
| auto text = req.get_param_value("hello"); |
| res.set_content(text, "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| Params params; |
| params.emplace("hello", "world"); |
| |
| std::string body; |
| auto res = cli.Get("/", params, Headers{}, |
| [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("world", body); |
| } |
| |
| TEST(ClientDefaultHeadersTest, DefaultHeaders_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpbin.org"; |
| auto path = std::string{"/range/32"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/32"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_default_headers({make_range_header({{1, 10}})}); |
| cli.set_connection_timeout(5); |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("bcdefghijk", res->body); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| } |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("bcdefghijk", res->body); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| } |
| } |
| |
| TEST(ServerDefaultHeadersTest, DefaultHeaders) { |
| Server svr; |
| svr.set_default_headers({{"Hello", "World"}}); |
| |
| svr.Get("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get("/"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("ok", res->body); |
| EXPECT_EQ("World", res->get_header_value("Hello")); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(KeepAliveTest, ReadTimeoutSSL) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/a", [&](const Request & /*req*/, Response &res) { |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| res.set_content("a", "text/plain"); |
| }); |
| |
| svr.Get("/b", [&](const Request & /*req*/, Response &res) { |
| res.set_content("b", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli("localhost", PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_keep_alive(true); |
| cli.set_read_timeout(std::chrono::seconds(1)); |
| |
| auto resa = cli.Get("/a"); |
| ASSERT_TRUE(!resa); |
| EXPECT_EQ(Error::Read, resa.error()); |
| |
| auto resb = cli.Get("/b"); |
| ASSERT_TRUE(resb); |
| EXPECT_EQ(StatusCode::OK_200, resb->status); |
| EXPECT_EQ("b", resb->body); |
| } |
| #endif |
| |
| class ServerTestWithAI_PASSIVE : public ::testing::Test { |
| protected: |
| ServerTestWithAI_PASSIVE() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| svr_.Get("/hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| t_ = thread( |
| [&]() { ASSERT_TRUE(svr_.listen(std::string(), PORT, AI_PASSIVE)); }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| t_.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| }; |
| |
| TEST_F(ServerTestWithAI_PASSIVE, GetMethod200) { |
| auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| class ServerUpDownTest : public ::testing::Test { |
| protected: |
| ServerUpDownTest() : cli_(HOST, PORT) {} |
| |
| virtual void SetUp() { |
| t_ = thread([&]() { |
| svr_.bind_to_any_port(HOST); |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| ASSERT_TRUE(svr_.listen_after_bind()); |
| }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| t_.join(); |
| } |
| |
| Client cli_; |
| Server svr_; |
| thread t_; |
| }; |
| |
| TEST_F(ServerUpDownTest, QuickStartStop) { |
| // Should not crash, especially when run with |
| // --gtest_filter=ServerUpDownTest.QuickStartStop --gtest_repeat=1000 |
| } |
| |
| class PayloadMaxLengthTest : public ::testing::Test { |
| protected: |
| PayloadMaxLengthTest() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| svr_.set_payload_max_length(8); |
| |
| svr_.Post("/test", [&](const Request & /*req*/, Response &res) { |
| res.set_content("test", "text/plain"); |
| }); |
| |
| t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| t_.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| }; |
| |
| TEST_F(PayloadMaxLengthTest, ExceedLimit) { |
| auto res = cli_.Post("/test", "123456789", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); |
| |
| res = cli_.Post("/test", "12345678", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(PayloadMaxLengthTest, ChunkedEncodingSecurityTest) { |
| // Test chunked encoding with payload exceeding the 8-byte limit |
| std::string large_chunked_data(16, 'A'); // 16 bytes, exceeds 8-byte limit |
| |
| auto res = cli_.Post("/test", large_chunked_data, "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); |
| } |
| |
| TEST_F(PayloadMaxLengthTest, ChunkedEncodingWithinLimit) { |
| // Test chunked encoding with payload within the 8-byte limit |
| std::string small_chunked_data(4, 'B'); // 4 bytes, within 8-byte limit |
| |
| auto res = cli_.Post("/test", small_chunked_data, "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(PayloadMaxLengthTest, RawSocketChunkedTest) { |
| // Test using send_request to send chunked data exceeding payload limit |
| std::string chunked_request = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + std::to_string(PORT) + |
| "\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "Connection: close\r\n" |
| "\r\n" |
| "a\r\n" // 10 bytes chunk (exceeds 8-byte limit) |
| "0123456789\r\n" |
| "0\r\n" // End chunk |
| "\r\n"; |
| |
| std::string response; |
| bool result = send_request(1, chunked_request, &response); |
| |
| if (!result) { |
| // If send_request fails, it might be because the server closed the |
| // connection due to payload limit enforcement, which is acceptable |
| SUCCEED() |
| << "Server rejected oversized chunked request (connection closed)"; |
| } else { |
| // If we got a response, check if it's an error response or connection was |
| // closed early Short response length indicates connection was closed due to |
| // payload limit |
| if (response.length() <= 10) { |
| SUCCEED() << "Server closed connection for oversized chunked request"; |
| } else { |
| // Check for error status codes |
| EXPECT_TRUE(response.find("413") != std::string::npos || |
| response.find("Payload Too Large") != std::string::npos || |
| response.find("400") != std::string::npos); |
| } |
| } |
| } |
| |
| TEST_F(PayloadMaxLengthTest, NoContentLengthPayloadLimit) { |
| // Test request without Content-Length header exceeding payload limit |
| std::string request_without_content_length = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + |
| std::to_string(PORT) + |
| "\r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| // Add payload exceeding the 8-byte limit |
| std::string large_payload(16, 'X'); // 16 bytes, exceeds 8-byte limit |
| request_without_content_length += large_payload; |
| |
| std::string response; |
| bool result = send_request(1, request_without_content_length, &response); |
| |
| if (!result) { |
| // If send_request fails, server likely closed connection due to payload |
| // limit |
| SUCCEED() << "Server rejected oversized request without Content-Length " |
| "(connection closed)"; |
| } else { |
| // Check if server responded with error or closed connection early |
| if (response.length() <= 10) { |
| SUCCEED() << "Server closed connection for oversized request without " |
| "Content-Length"; |
| } else { |
| // Check for error status codes |
| EXPECT_TRUE(response.find("413") != std::string::npos || |
| response.find("Payload Too Large") != std::string::npos || |
| response.find("400") != std::string::npos); |
| } |
| } |
| } |
| |
| TEST_F(PayloadMaxLengthTest, NoContentLengthWithinLimit) { |
| // Test request without Content-Length header within payload limit |
| std::string request_without_content_length = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + |
| std::to_string(PORT) + |
| "\r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| // Add payload within the 8-byte limit |
| std::string small_payload(4, 'Y'); // 4 bytes, within 8-byte limit |
| request_without_content_length += small_payload; |
| |
| std::string response; |
| bool result = send_request(1, request_without_content_length, &response); |
| |
| // For requests without Content-Length, the server may have different behavior |
| // The key is that it should not reject due to payload limit for small |
| // payloads |
| if (result) { |
| // Check for any HTTP response (success or error, but not connection closed) |
| if (response.length() > 10) { |
| SUCCEED() |
| << "Server processed request without Content-Length within limit"; |
| } else { |
| // Short response might indicate connection closed, which is acceptable |
| SUCCEED() << "Server closed connection for request without " |
| "Content-Length (acceptable behavior)"; |
| } |
| } else { |
| // Connection failure might be due to protocol requirements |
| SUCCEED() << "Connection issue with request without Content-Length " |
| "(environment-specific)"; |
| } |
| } |
| |
| class LargePayloadMaxLengthTest : public ::testing::Test { |
| protected: |
| LargePayloadMaxLengthTest() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| // Set 10MB payload limit |
| const size_t LARGE_PAYLOAD_LIMIT = 10 * 1024 * 1024; // 10MB |
| svr_.set_payload_max_length(LARGE_PAYLOAD_LIMIT); |
| |
| svr_.Post("/test", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Large payload test", "text/plain"); |
| }); |
| |
| t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| t_.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| }; |
| |
| TEST_F(LargePayloadMaxLengthTest, ChunkedEncodingWithin10MB) { |
| // Test chunked encoding with payload within 10MB limit |
| std::string medium_payload(5 * 1024 * 1024, |
| 'A'); // 5MB payload, within 10MB limit |
| |
| auto res = cli_.Post("/test", medium_payload, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(LargePayloadMaxLengthTest, ChunkedEncodingExceeds10MB) { |
| // Test chunked encoding with payload exceeding 10MB limit |
| std::string large_payload(12 * 1024 * 1024, |
| 'B'); // 12MB payload, exceeds 10MB limit |
| |
| auto res = cli_.Post("/test", large_payload, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); |
| } |
| |
| TEST_F(LargePayloadMaxLengthTest, NoContentLengthWithin10MB) { |
| // Test request without Content-Length header within 10MB limit |
| std::string request_without_content_length = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + |
| std::to_string(PORT) + |
| "\r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| // Add 1MB payload (within 10MB limit) |
| std::string medium_payload(1024 * 1024, 'C'); // 1MB payload |
| request_without_content_length += medium_payload; |
| |
| std::string response; |
| bool result = send_request(5, request_without_content_length, &response); |
| |
| if (result) { |
| // Should get a proper HTTP response for payloads within limit |
| if (response.length() > 10) { |
| SUCCEED() << "Server processed 1MB request without Content-Length within " |
| "10MB limit"; |
| } else { |
| SUCCEED() << "Server closed connection (acceptable behavior for no " |
| "Content-Length)"; |
| } |
| } else { |
| SUCCEED() << "Connection issue with 1MB payload (environment-specific)"; |
| } |
| } |
| |
| TEST_F(LargePayloadMaxLengthTest, NoContentLengthExceeds10MB) { |
| // Test request without Content-Length header exceeding 10MB limit |
| std::string request_without_content_length = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + |
| std::to_string(PORT) + |
| "\r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| // Add 12MB payload (exceeds 10MB limit) |
| std::string large_payload(12 * 1024 * 1024, 'D'); // 12MB payload |
| request_without_content_length += large_payload; |
| |
| std::string response; |
| bool result = send_request(10, request_without_content_length, &response); |
| |
| if (!result) { |
| // Server should close connection due to payload limit |
| SUCCEED() << "Server rejected 12MB request without Content-Length " |
| "(connection closed)"; |
| } else { |
| // Check for error response |
| if (response.length() <= 10) { |
| SUCCEED() |
| << "Server closed connection for 12MB request exceeding 10MB limit"; |
| } else { |
| EXPECT_TRUE(response.find("413") != std::string::npos || |
| response.find("Payload Too Large") != std::string::npos || |
| response.find("400") != std::string::npos); |
| } |
| } |
| } |
| |
| TEST(HostAndPortPropertiesTest, NoSSL) { |
| httplib::Client cli("www.google.com", 1234); |
| ASSERT_EQ("www.google.com", cli.host()); |
| ASSERT_EQ(1234, cli.port()); |
| } |
| |
| TEST(HostAndPortPropertiesTest, NoSSLWithSimpleAPI) { |
| httplib::Client cli("www.google.com:1234"); |
| ASSERT_EQ("www.google.com", cli.host()); |
| ASSERT_EQ(1234, cli.port()); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(HostAndPortPropertiesTest, SSL) { |
| httplib::SSLClient cli("www.google.com"); |
| ASSERT_EQ("www.google.com", cli.host()); |
| ASSERT_EQ(443, cli.port()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(SSLClientTest, UpdateCAStore) { |
| httplib::SSLClient httplib_client("www.google.com"); |
| auto ca_store_1 = X509_STORE_new(); |
| X509_STORE_load_locations(ca_store_1, "/etc/ssl/certs/ca-certificates.crt", |
| nullptr); |
| httplib_client.set_ca_cert_store(ca_store_1); |
| |
| auto ca_store_2 = X509_STORE_new(); |
| X509_STORE_load_locations(ca_store_2, "/etc/ssl/certs/ca-certificates.crt", |
| nullptr); |
| httplib_client.set_ca_cert_store(ca_store_2); |
| } |
| |
| TEST(SSLClientTest, ServerNameIndication_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpbin.org"; |
| auto path = std::string{"/get"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/get"}; |
| #endif |
| |
| SSLClient cli(host, 443); |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerificationError_Online) { |
| // Use a site that will cause SSL verification failure due to self-signed cert |
| SSLClient cli("self-signed.badssl.com", 443); |
| cli.enable_server_certificate_verification(true); |
| auto res = cli.Get("/"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::SSLServerVerification, res.error()); |
| |
| // For SSL server verification errors, ssl_error should be 0, only |
| // ssl_openssl_error should be set |
| EXPECT_EQ(0, res.ssl_error()); |
| |
| // Verify OpenSSL error is captured for SSLServerVerification |
| // This occurs when SSL_get_verify_result() returns a verification failure |
| EXPECT_EQ(static_cast<unsigned long>(X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT), |
| res.ssl_openssl_error()); |
| } |
| |
| TEST(SSLClientTest, ServerHostnameVerificationError_Online) { |
| // Use a site where hostname doesn't match the certificate |
| // badssl.com provides wrong.host.badssl.com which has cert for *.badssl.com |
| SSLClient cli("wrong.host.badssl.com", 443); |
| cli.enable_server_certificate_verification(true); |
| cli.enable_server_hostname_verification(true); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| |
| EXPECT_EQ(Error::SSLServerHostnameVerification, res.error()); |
| |
| // For SSL hostname verification errors, ssl_error should be 0, only |
| // ssl_openssl_error should be set |
| EXPECT_EQ(0, res.ssl_error()); |
| |
| // Verify OpenSSL error is captured for SSLServerHostnameVerification |
| // This occurs when verify_host() fails due to hostname mismatch |
| EXPECT_EQ(static_cast<unsigned long>(X509_V_ERR_HOSTNAME_MISMATCH), |
| res.ssl_openssl_error()); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerification1_Online) { |
| Client cli("https://google.com"); |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerification2_Online) { |
| SSLClient cli("google.com"); |
| cli.set_ca_cert_path(CA_CERT_FILE); |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerification3_Online) { |
| SSLClient cli("google.com"); |
| cli.enable_server_certificate_verification(true); |
| cli.set_ca_cert_path("hello"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::SSLLoadingCerts, res.error()); |
| |
| // For SSL_CTX operations, ssl_error should be 0, only ssl_openssl_error |
| // should be set |
| EXPECT_EQ(0, res.ssl_error()); |
| |
| // Verify OpenSSL error is captured for SSLLoadingCerts |
| // This error occurs when SSL_CTX_load_verify_locations() fails |
| // > openssl errstr 0x80000002 |
| // error:80000002:system library::No such file or directory |
| // > openssl errstr 0xA000126 |
| // error:0A000126:SSL routines::unexpected eof while reading |
| EXPECT_TRUE(res.ssl_openssl_error() == 0x80000002 || |
| res.ssl_openssl_error() == 0xA000126); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerification4) { |
| SSLServer svr(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| svr.stop(); |
| ASSERT_TRUE(true); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen("127.0.0.1", PORT)); }); |
| auto se = detail::scope_exit([&] { |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli("127.0.0.1", PORT); |
| cli.set_ca_cert_path(SERVER_CERT2_FILE); |
| cli.enable_server_certificate_verification(true); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerification5_Online) { |
| std::string cert; |
| read_file(CA_CERT_FILE, cert); |
| |
| SSLClient cli("google.com"); |
| cli.load_ca_cert_store(cert.data(), cert.size()); |
| const auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerification6_Online) { |
| // clang-format off |
| static constexpr char cert[] = |
| "GlobalSign Root CA\n" |
| "==================\n" |
| "-----BEGIN CERTIFICATE-----\n" |
| "MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUx\n" |
| "GTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jvb3QgQ0ExGzAZBgNVBAMTEkds\n" |
| "b2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAwMDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNV\n" |
| "BAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYD\n" |
| "VQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDa\n" |
| "DuaZjc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavpxy0Sy6sc\n" |
| "THAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp1Wrjsok6Vjk4bwY8iGlb\n" |
| "Kk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdGsnUOhugZitVtbNV4FpWi6cgKOOvyJBNP\n" |
| "c1STE4U6G7weNLWLBYy5d4ux2x8gkasJU26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrX\n" |
| "gzT/LCrBbBlDSgeF59N89iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV\n" |
| "HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0BAQUF\n" |
| "AAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOzyj1hTdNGCbM+w6Dj\n" |
| "Y1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE38NflNUVyRRBnMRddWQVDf9VMOyG\n" |
| "j/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymPAbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhH\n" |
| "hm4qxFYxldBniYUr+WymXUadDKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveC\n" |
| "X4XSQRjbgbMEHMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A==\n" |
| "-----END CERTIFICATE-----\n"; |
| // clang-format on |
| |
| SSLClient cli("google.com"); |
| cli.load_ca_cert_store(cert, sizeof(cert)); |
| const auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SSLClientTest, WildcardHostNameMatch_Online) { |
| SSLClient cli("www.youtube.com"); |
| |
| cli.set_ca_cert_path(CA_CERT_FILE); |
| cli.enable_server_certificate_verification(true); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientTest, Issue2004_Online) { |
| Client client("https://google.com"); |
| client.set_follow_location(true); |
| |
| auto res = client.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| auto body = res->body; |
| EXPECT_EQ(body.substr(0, 15), "<!doctype html>"); |
| } |
| |
| TEST(SSLClientTest, ErrorReportingWhenInvalid) { |
| // Create SSLClient with invalid cert/key to make is_valid() return false |
| SSLClient cli("localhost", 8080, "nonexistent_cert.pem", |
| "nonexistent_key.pem"); |
| |
| // is_valid() should be false due to cert loading failure |
| ASSERT_FALSE(cli.is_valid()); |
| |
| auto res = cli.Get("/"); |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::SSLConnection, res.error()); |
| } |
| |
| TEST(SSLClientTest, Issue2251_SwappedClientCertAndKey) { |
| // Test for Issue #2251: SSL error not properly reported when client cert |
| // and key paths are swapped or mismatched |
| // This simulates the scenario where user accidentally swaps the cert and key |
| // files |
| |
| // Using client cert file as private key and vice versa (completely wrong) |
| SSLClient cli("localhost", 8080, "client.key.pem", "client.cert.pem"); |
| |
| // Should fail validation due to cert/key mismatch |
| ASSERT_FALSE(cli.is_valid()); |
| |
| // Attempt to make a request should fail with proper error |
| auto res = cli.Get("/"); |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::SSLConnection, res.error()); |
| |
| // SSL error should be recorded in the Result object (this is the key fix for |
| // Issue #2251) |
| auto openssl_error = res.ssl_openssl_error(); |
| EXPECT_NE(0u, openssl_error); |
| } |
| |
| TEST(SSLClientTest, Issue2251_ClientCertFileNotMatchingKey) { |
| // Another variant: using valid file paths but with mismatched cert/key pair |
| // This tests the case where files exist but contain incompatible key material |
| |
| // Using client cert with wrong key (cert2 key) |
| SSLClient cli("localhost", 8080, "client.cert.pem", "key.pem"); |
| |
| // Should fail validation |
| ASSERT_FALSE(cli.is_valid()); |
| |
| auto res = cli.Get("/"); |
| ASSERT_FALSE(res); |
| // Must report error properly, not appear as success |
| EXPECT_EQ(Error::SSLConnection, res.error()); |
| |
| // OpenSSL error should be captured in Result |
| EXPECT_NE(0u, res.ssl_openssl_error()); |
| } |
| |
| #if 0 |
| TEST(SSLClientTest, SetInterfaceWithINET6) { |
| auto cli = std::make_shared<httplib::Client>("https://httpbin.org"); |
| ASSERT_TRUE(cli != nullptr); |
| |
| cli->set_address_family(AF_INET6); |
| cli->set_interface("en0"); |
| |
| auto res = cli->Get("/get"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| void ClientCertPresent( |
| const std::string &client_cert_file, |
| const std::string &client_private_key_file, |
| const std::string &client_encrypted_private_key_pass = std::string()) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, |
| CLIENT_CA_CERT_DIR); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &req, Response &res) { |
| res.set_content("test", "text/plain"); |
| |
| auto peer_cert = SSL_get_peer_certificate(req.ssl); |
| ASSERT_TRUE(peer_cert != nullptr); |
| |
| auto subject_name = X509_get_subject_name(peer_cert); |
| ASSERT_TRUE(subject_name != nullptr); |
| |
| std::string common_name; |
| { |
| char name[BUFSIZ]; |
| auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName, |
| name, sizeof(name)); |
| common_name.assign(name, static_cast<size_t>(name_len)); |
| } |
| |
| EXPECT_EQ("Common Name", common_name); |
| |
| X509_free(peer_cert); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, client_cert_file, client_private_key_file, |
| client_encrypted_private_key_pass); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientServerTest, ClientCertPresent) { |
| ClientCertPresent(CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| } |
| |
| TEST(SSLClientServerTest, ClientEncryptedCertPresent) { |
| ClientCertPresent(CLIENT_ENCRYPTED_CERT_FILE, |
| CLIENT_ENCRYPTED_PRIVATE_KEY_FILE, |
| CLIENT_ENCRYPTED_PRIVATE_KEY_PASS); |
| } |
| |
| #if !defined(_WIN32) || defined(OPENSSL_USE_APPLINK) |
| void MemoryClientCertPresent( |
| const std::string &client_cert_file, |
| const std::string &client_private_key_file, |
| const std::string &client_encrypted_private_key_pass = std::string()) { |
| auto f = fopen(SERVER_CERT_FILE, "r+"); |
| auto server_cert = PEM_read_X509(f, nullptr, nullptr, nullptr); |
| fclose(f); |
| |
| f = fopen(SERVER_PRIVATE_KEY_FILE, "r+"); |
| auto server_private_key = PEM_read_PrivateKey(f, nullptr, nullptr, nullptr); |
| fclose(f); |
| |
| f = fopen(CLIENT_CA_CERT_FILE, "r+"); |
| auto client_cert = PEM_read_X509(f, nullptr, nullptr, nullptr); |
| auto client_ca_cert_store = X509_STORE_new(); |
| X509_STORE_add_cert(client_ca_cert_store, client_cert); |
| X509_free(client_cert); |
| fclose(f); |
| |
| f = fopen(client_cert_file.c_str(), "r+"); |
| client_cert = PEM_read_X509(f, nullptr, nullptr, nullptr); |
| fclose(f); |
| |
| f = fopen(client_private_key_file.c_str(), "r+"); |
| auto client_private_key = PEM_read_PrivateKey( |
| f, nullptr, nullptr, (void *)client_encrypted_private_key_pass.c_str()); |
| fclose(f); |
| |
| SSLServer svr(server_cert, server_private_key, client_ca_cert_store); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &req, Response &res) { |
| res.set_content("test", "text/plain"); |
| |
| auto peer_cert = SSL_get_peer_certificate(req.ssl); |
| ASSERT_TRUE(peer_cert != nullptr); |
| |
| auto subject_name = X509_get_subject_name(peer_cert); |
| ASSERT_TRUE(subject_name != nullptr); |
| |
| std::string common_name; |
| { |
| char name[BUFSIZ]; |
| auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName, |
| name, sizeof(name)); |
| common_name.assign(name, static_cast<size_t>(name_len)); |
| } |
| |
| EXPECT_EQ("Common Name", common_name); |
| |
| X509_free(peer_cert); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, client_cert, client_private_key, |
| client_encrypted_private_key_pass); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| X509_free(server_cert); |
| EVP_PKEY_free(server_private_key); |
| X509_free(client_cert); |
| EVP_PKEY_free(client_private_key); |
| } |
| |
| TEST(SSLClientServerTest, MemoryClientCertPresent) { |
| MemoryClientCertPresent(CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| } |
| |
| TEST(SSLClientServerTest, MemoryClientEncryptedCertPresent) { |
| MemoryClientCertPresent(CLIENT_ENCRYPTED_CERT_FILE, |
| CLIENT_ENCRYPTED_PRIVATE_KEY_FILE, |
| CLIENT_ENCRYPTED_PRIVATE_KEY_PASS); |
| } |
| #endif |
| |
| TEST(SSLClientServerTest, ClientCertMissing) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, |
| CLIENT_CA_CERT_DIR); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &) { ASSERT_TRUE(false); }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::SSLServerVerification, res.error()); |
| |
| // For SSL server verification errors, ssl_error should be 0, only |
| // ssl_openssl_error should be set |
| EXPECT_EQ(0, res.ssl_error()); |
| |
| // Verify OpenSSL error is captured for SSLServerVerification |
| // Note: This test may have different error codes depending on the exact |
| // verification failure |
| EXPECT_NE(0UL, res.ssl_openssl_error()); |
| } |
| |
| TEST(SSLClientServerTest, TrustDirOptional) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientServerTest, SSLConnectTimeout) { |
| class NoListenSSLServer : public SSLServer { |
| public: |
| NoListenSSLServer(const char *cert_path, const char *private_key_path, |
| const char *client_ca_cert_file_path, |
| const char *client_ca_cert_dir_path = nullptr) |
| : SSLServer(cert_path, private_key_path, client_ca_cert_file_path, |
| client_ca_cert_dir_path), |
| stop_(false) {} |
| |
| std::atomic_bool stop_; |
| |
| private: |
| bool process_and_close_socket(socket_t /*sock*/) override { |
| // Don't create SSL context |
| while (!stop_.load()) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
| } |
| return true; |
| } |
| }; |
| NoListenSSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, |
| CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop_ = true; |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(1); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::SSLConnection, res.error()); |
| EXPECT_EQ(SSL_ERROR_WANT_READ, res.ssl_error()); |
| } |
| |
| TEST(SSLClientServerTest, CustomizeServerSSLCtx) { |
| auto setup_ssl_ctx_callback = [](SSL_CTX &ssl_ctx) { |
| SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_COMPRESSION); |
| SSL_CTX_set_options(&ssl_ctx, |
| SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION); |
| SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_SSLv2); |
| SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_SSLv3); |
| SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_TLSv1); |
| SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_TLSv1_1); |
| auto ciphers = "ECDHE-RSA-AES128-SHA256:" |
| "ECDHE-DSS-AES128-SHA256:" |
| "ECDHE-RSA-AES256-SHA256:" |
| "ECDHE-DSS-AES256-SHA256:"; |
| SSL_CTX_set_cipher_list(&ssl_ctx, ciphers); |
| if (SSL_CTX_use_certificate_chain_file(&ssl_ctx, SERVER_CERT_FILE) != 1 || |
| SSL_CTX_use_PrivateKey_file(&ssl_ctx, SERVER_PRIVATE_KEY_FILE, |
| SSL_FILETYPE_PEM) != 1) { |
| return false; |
| } |
| SSL_CTX_load_verify_locations(&ssl_ctx, CLIENT_CA_CERT_FILE, |
| CLIENT_CA_CERT_DIR); |
| SSL_CTX_set_verify( |
| &ssl_ctx, |
| SSL_VERIFY_PEER | |
| SSL_VERIFY_FAIL_IF_NO_PEER_CERT, // SSL_VERIFY_CLIENT_ONCE, |
| nullptr); |
| return true; |
| }; |
| |
| SSLServer svr(setup_ssl_ctx_callback); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &req, Response &res) { |
| res.set_content("test", "text/plain"); |
| |
| auto peer_cert = SSL_get_peer_certificate(req.ssl); |
| ASSERT_TRUE(peer_cert != nullptr); |
| |
| auto subject_name = X509_get_subject_name(peer_cert); |
| ASSERT_TRUE(subject_name != nullptr); |
| |
| std::string common_name; |
| { |
| char name[BUFSIZ]; |
| auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName, |
| name, sizeof(name)); |
| common_name.assign(name, static_cast<size_t>(name_len)); |
| } |
| |
| EXPECT_EQ("Common Name", common_name); |
| |
| X509_free(peer_cert); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientServerTest, ClientCAListSentToClient) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // Set up a handler to verify client certificate is present |
| bool client_cert_verified = false; |
| svr.Get("/test", [&](const Request & /*req*/, Response &res) { |
| // Verify that client certificate was provided |
| client_cert_verified = true; |
| res.set_content("success", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Client with certificate |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_TRUE(client_cert_verified); |
| EXPECT_EQ("success", res->body); |
| } |
| |
| TEST(SSLClientServerTest, ClientCAListSetInContext) { |
| // Test that when client CA cert file is provided, |
| // SSL_CTX_set_client_CA_list is called and the CA list is properly set |
| |
| // Create a server with client authentication |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // We can't directly access the SSL_CTX from SSLServer to verify, |
| // but we can test that the server properly requests client certificates |
| // and accepts valid ones from the specified CA |
| |
| bool handler_called = false; |
| svr.Get("/test", [&](const Request &req, Response &res) { |
| handler_called = true; |
| |
| // Verify that a client certificate was provided |
| auto peer_cert = SSL_get_peer_certificate(req.ssl); |
| ASSERT_TRUE(peer_cert != nullptr); |
| |
| // Get the issuer name |
| auto issuer_name = X509_get_issuer_name(peer_cert); |
| ASSERT_TRUE(issuer_name != nullptr); |
| |
| char issuer_buf[256]; |
| X509_NAME_oneline(issuer_name, issuer_buf, sizeof(issuer_buf)); |
| |
| // The client certificate should be issued by our test CA |
| std::string issuer_str(issuer_buf); |
| EXPECT_TRUE(issuer_str.find("Root CA Name") != std::string::npos); |
| |
| X509_free(peer_cert); |
| res.set_content("authenticated", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Connect with a client certificate issued by the CA |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_TRUE(handler_called); |
| EXPECT_EQ("authenticated", res->body); |
| } |
| |
| TEST(SSLClientServerTest, ClientCAListLoadErrorRecorded) { |
| // Test 1: Valid CA file - no error should be recorded |
| { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, |
| CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // With valid setup, last_ssl_error should be 0 |
| EXPECT_EQ(0, svr.ssl_last_error()); |
| } |
| |
| // Test 2: Invalid CA file content |
| // When SSL_load_client_CA_file fails, last_ssl_error_ should be set |
| { |
| // Create a temporary file with completely invalid content |
| const char *temp_invalid_ca = "./temp_invalid_ca_for_test.txt"; |
| { |
| std::ofstream ofs(temp_invalid_ca); |
| ofs << "This is not a certificate file at all\n"; |
| ofs << "Just plain text content\n"; |
| } |
| |
| // Create server with invalid CA file |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, temp_invalid_ca); |
| |
| // Clean up temporary file |
| std::remove(temp_invalid_ca); |
| |
| // When there's an SSL error (from either SSL_CTX_load_verify_locations |
| // or SSL_load_client_CA_file), last_ssl_error_ should be non-zero |
| // Note: SSL_CTX_load_verify_locations typically fails first, |
| // but our error handling code path is still exercised |
| if (!svr.is_valid()) { EXPECT_NE(0, svr.ssl_last_error()); } |
| } |
| } |
| |
| TEST(SSLClientServerTest, ClientCAListFromX509Store) { |
| // Test SSL server using X509_STORE constructor with client CA certificates |
| // This test verifies that Phase 2 implementation correctly extracts CA names |
| // from an X509_STORE and sets them in the SSL context |
| |
| // Load the CA certificate into memory |
| auto bio = BIO_new_file(CLIENT_CA_CERT_FILE, "r"); |
| ASSERT_NE(nullptr, bio); |
| |
| auto ca_cert = PEM_read_bio_X509(bio, nullptr, nullptr, nullptr); |
| BIO_free(bio); |
| ASSERT_NE(nullptr, ca_cert); |
| |
| // Create an X509_STORE and add the CA certificate |
| auto store = X509_STORE_new(); |
| ASSERT_NE(nullptr, store); |
| ASSERT_EQ(1, X509_STORE_add_cert(store, ca_cert)); |
| |
| // Load server certificate and private key |
| auto cert_bio = BIO_new_file(SERVER_CERT_FILE, "r"); |
| ASSERT_NE(nullptr, cert_bio); |
| auto server_cert = PEM_read_bio_X509(cert_bio, nullptr, nullptr, nullptr); |
| BIO_free(cert_bio); |
| ASSERT_NE(nullptr, server_cert); |
| |
| auto key_bio = BIO_new_file(SERVER_PRIVATE_KEY_FILE, "r"); |
| ASSERT_NE(nullptr, key_bio); |
| auto server_key = PEM_read_bio_PrivateKey(key_bio, nullptr, nullptr, nullptr); |
| BIO_free(key_bio); |
| ASSERT_NE(nullptr, server_key); |
| |
| // Create SSLServer with X509_STORE constructor |
| // Note: X509_STORE ownership is transferred to SSL_CTX |
| SSLServer svr(server_cert, server_key, store); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // No SSL error should be recorded for valid setup |
| EXPECT_EQ(0, svr.ssl_last_error()); |
| |
| // Set up server endpoints |
| svr.Get("/test-x509store", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| // Start server in a thread |
| auto server_thread = thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| // Connect with client certificate (using constructor with paths) |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| |
| auto res = cli.Get("/test-x509store"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_EQ("ok", res->body); |
| |
| // Clean up |
| X509_free(server_cert); |
| EVP_PKEY_free(server_key); |
| X509_free(ca_cert); |
| |
| svr.stop(); |
| server_thread.join(); |
| } |
| |
| // Disabled due to the out-of-memory problem on GitHub Actions Workflows |
| TEST(SSLClientServerTest, DISABLED_LargeDataTransfer) { |
| |
| // prepare large data |
| std::random_device seed_gen; |
| std::mt19937 random(seed_gen()); |
| constexpr auto large_size_byte = 2147483648UL + 1048576UL; // 2GiB + 1MiB |
| std::vector<std::uint32_t> binary(large_size_byte / sizeof(std::uint32_t)); |
| std::generate(binary.begin(), binary.end(), [&random]() { return random(); }); |
| |
| // server |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Post("/binary", [&](const Request &req, Response &res) { |
| EXPECT_EQ(large_size_byte, req.body.size()); |
| EXPECT_EQ(0, std::memcmp(binary.data(), req.body.data(), large_size_byte)); |
| res.set_content(req.body, "application/octet-stream"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // client POST |
| SSLClient cli("localhost", PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_read_timeout(std::chrono::seconds(100)); |
| cli.set_write_timeout(std::chrono::seconds(100)); |
| auto res = cli.Post("/binary", reinterpret_cast<char *>(binary.data()), |
| large_size_byte, "application/octet-stream"); |
| |
| // compare |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(large_size_byte, res->body.size()); |
| EXPECT_EQ(0, std::memcmp(binary.data(), res->body.data(), large_size_byte)); |
| } |
| #endif |
| |
| #ifdef _WIN32 |
| TEST(CleanupTest, WSACleanup) { |
| int ret = WSACleanup(); |
| ASSERT_EQ(0, ret); |
| } |
| #endif |
| |
| #ifndef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(NoSSLSupport, SimpleInterface) { |
| ASSERT_ANY_THROW(Client cli("https://yahoo.com")); |
| } |
| #endif |
| |
| #ifndef CPPHTTPLIB_NO_EXCEPTIONS |
| TEST(InvalidScheme, SimpleInterface) { |
| ASSERT_ANY_THROW(Client cli("scheme://yahoo.com")); |
| } |
| #endif |
| |
| TEST(NoScheme, SimpleInterface) { |
| Client cli("yahoo.com:80"); |
| ASSERT_TRUE(cli.is_valid()); |
| } |
| |
| TEST(SendAPI, SimpleInterface_Online) { |
| Client cli("http://yahoo.com"); |
| |
| Request req; |
| req.method = "GET"; |
| req.path = "/"; |
| auto res = cli.send(req); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SendAPI, WithParamsInRequest) { |
| Server svr; |
| |
| svr.Get("/", [&](const Request &req, Response & /*res*/) { |
| EXPECT_TRUE(req.has_param("test")); |
| EXPECT_EQ("test_value", req.get_param_value("test")); |
| }); |
| |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| { |
| Request req; |
| req.method = "GET"; |
| req.path = "/"; |
| req.params.emplace("test", "test_value"); |
| auto res = cli.send(req); |
| ASSERT_TRUE(res); |
| } |
| { |
| auto res = cli.Get("/", {{"test", "test_value"}}, Headers{}); |
| ASSERT_TRUE(res); |
| } |
| } |
| |
| TEST(ClientImplMethods, GetSocketTest) { |
| httplib::Server svr; |
| svr.Get("/", [&](const httplib::Request & /*req*/, httplib::Response &res) { |
| res.status = StatusCode::OK_200; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen("127.0.0.1", 3333); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| httplib::Client cli("http://127.0.0.1:3333"); |
| cli.set_keep_alive(true); |
| |
| // Use the behavior of cpp-httplib of opening the connection |
| // only when the first request happens. If that changes, |
| // this test would be obsolete. |
| |
| EXPECT_EQ(cli.socket(), INVALID_SOCKET); |
| |
| // This also implicitly tests the server. But other tests would fail much |
| // earlier than this one to be considered. |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_TRUE(cli.socket() != INVALID_SOCKET); |
| } |
| } |
| |
| // Disabled due to out-of-memory problem on GitHub Actions |
| #ifdef _WIN64 |
| TEST(ServerLargeContentTest, DISABLED_SendLargeContent) { |
| // allocate content size larger than 2GB in memory |
| const size_t content_size = 2LL * 1024LL * 1024LL * 1024LL + 1LL; |
| char *content = (char *)malloc(content_size); |
| ASSERT_TRUE(content); |
| |
| Server svr; |
| svr.Get("/foo", |
| [=](const httplib::Request & /*req*/, httplib::Response &res) { |
| res.set_content(content, content_size, "application/octet-stream"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| if (content) free(content); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Get("/foo"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(content_size, res->body.length()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(YahooRedirectTest2, SimpleInterface_Online) { |
| Client cli("http://yahoo.com"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("https://www.yahoo.com/", res->location); |
| } |
| |
| TEST(YahooRedirectTest3, SimpleInterface_Online) { |
| Client cli("https://yahoo.com"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("https://www.yahoo.com/", res->location); |
| } |
| |
| TEST(YahooRedirectTest3, NewResultInterface_Online) { |
| Client cli("https://yahoo.com"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_FALSE(!res); |
| ASSERT_TRUE(res); |
| ASSERT_FALSE(res == nullptr); |
| ASSERT_TRUE(res != nullptr); |
| EXPECT_EQ(Error::Success, res.error()); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res.value().status); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, (*res).status); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(Error::Success, res.error()); |
| EXPECT_EQ(StatusCode::OK_200, res.value().status); |
| EXPECT_EQ(StatusCode::OK_200, (*res).status); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("https://www.yahoo.com/", res->location); |
| } |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| TEST(DecodeWithChunkedEncoding, BrotliEncoding_Online) { |
| Client cli("https://cdnjs.cloudflare.com"); |
| auto res = |
| cli.Get("/ajax/libs/jquery/3.5.1/jquery.js", {{"Accept-Encoding", "br"}}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(287630U, res->body.size()); |
| EXPECT_EQ("application/javascript; charset=utf-8", |
| res->get_header_value("Content-Type")); |
| } |
| #endif |
| |
| // Previously "https://nghttp2.org" "/httpbin/redirect-to" |
| #undef REDIR_HOST // Silence compiler warning |
| #define REDIR_HOST "https://httpbingo.org" |
| |
| TEST(HttpsToHttpRedirectTest, SimpleInterface_Online) { |
| Client cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| auto res = |
| cli.Get(REDIR_PATH "?url=http%3A%2F%2Fexample.com&status_code=302"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpsToHttpRedirectTest2, SimpleInterface_Online) { |
| Client cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| |
| Params params; |
| params.emplace("url", "http://example.com"); |
| params.emplace("status_code", "302"); |
| |
| auto res = cli.Get(REDIR_PATH, params, Headers{}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpsToHttpRedirectTest3, SimpleInterface_Online) { |
| Client cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| |
| Params params; |
| params.emplace("url", "http://example.com"); |
| |
| auto res = cli.Get(REDIR_PATH "?status_code=302", params, Headers{}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpToHttpsRedirectTest, CertFile) { |
| Server svr; |
| ASSERT_TRUE(svr.is_valid()); |
| svr.Get("/index", [&](const Request &, Response &res) { |
| res.set_redirect("https://127.0.0.1:1235/index"); |
| svr.stop(); |
| }); |
| |
| SSLServer ssl_svr(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(ssl_svr.is_valid()); |
| ssl_svr.Get("/index", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| ssl_svr.stop(); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen("127.0.0.1", PORT)); }); |
| thread t2 = thread([&]() { ASSERT_TRUE(ssl_svr.listen("127.0.0.1", 1235)); }); |
| auto se = detail::scope_exit([&] { |
| t2.join(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ssl_svr.wait_until_ready(); |
| |
| Client cli("127.0.0.1", PORT); |
| cli.set_ca_cert_path(SERVER_CERT2_FILE); |
| cli.enable_server_certificate_verification(true); |
| cli.set_follow_location(true); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/index"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientRedirectTest, CertFile) { |
| SSLServer ssl_svr1(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(ssl_svr1.is_valid()); |
| ssl_svr1.Get("/index", [&](const Request &, Response &res) { |
| res.set_redirect("https://127.0.0.1:1235/index"); |
| ssl_svr1.stop(); |
| }); |
| |
| SSLServer ssl_svr2(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(ssl_svr2.is_valid()); |
| ssl_svr2.Get("/index", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| ssl_svr2.stop(); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(ssl_svr1.listen("127.0.0.1", PORT)); }); |
| thread t2 = |
| thread([&]() { ASSERT_TRUE(ssl_svr2.listen("127.0.0.1", 1235)); }); |
| auto se = detail::scope_exit([&] { |
| t2.join(); |
| t.join(); |
| ASSERT_FALSE(ssl_svr1.is_running()); |
| }); |
| |
| ssl_svr1.wait_until_ready(); |
| ssl_svr2.wait_until_ready(); |
| |
| SSLClient cli("127.0.0.1", PORT); |
| std::string cert; |
| read_file(SERVER_CERT2_FILE, cert); |
| cli.load_ca_cert_store(cert.c_str(), cert.size()); |
| cli.enable_server_certificate_verification(true); |
| cli.set_follow_location(true); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/index"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(MultipartFormDataTest, LargeData) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Post("/post", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_TRUE(std::string(items[0].name) == "document"); |
| EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); |
| EXPECT_TRUE(items[0].filename == "2MB_data"); |
| EXPECT_TRUE(items[0].content_type == "application/octet-stream"); |
| |
| EXPECT_TRUE(items[1].name == "hello"); |
| EXPECT_TRUE(items[1].content == "world"); |
| EXPECT_TRUE(items[1].filename == ""); |
| EXPECT_TRUE(items[1].content_type == ""); |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| } |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| std::string data(1024 * 1024 * 2, '.'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| auto res = cli.Post("/post", items); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, DataProviderItems) { |
| |
| std::random_device seed_gen; |
| std::mt19937 random(seed_gen()); |
| |
| std::string rand1; |
| rand1.resize(1000); |
| std::generate(rand1.begin(), rand1.end(), [&]() { return random(); }); |
| |
| std::string rand2; |
| rand2.resize(3000); |
| std::generate(rand2.begin(), rand2.end(), [&]() { return random(); }); |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Post("/post-none", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| ASSERT_FALSE(req.is_multipart_form_data()); |
| |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_EQ(body, ""); |
| }); |
| |
| svr.Post("/post-items", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| ASSERT_TRUE(req.is_multipart_form_data()); |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(items.size() == 2); |
| |
| EXPECT_EQ(std::string(items[0].name), "name1"); |
| EXPECT_EQ(items[0].content, "Testing123"); |
| EXPECT_EQ(items[0].filename, "filename1"); |
| EXPECT_EQ(items[0].content_type, "application/octet-stream"); |
| |
| EXPECT_EQ(items[1].name, "name2"); |
| EXPECT_EQ(items[1].content, "Testing456"); |
| EXPECT_EQ(items[1].filename, ""); |
| EXPECT_EQ(items[1].content_type, ""); |
| }); |
| |
| svr.Post("/post-providers", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| ASSERT_TRUE(req.is_multipart_form_data()); |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(items.size() == 2); |
| |
| EXPECT_EQ(items[0].name, "name3"); |
| EXPECT_EQ(items[0].content, rand1); |
| EXPECT_EQ(items[0].filename, "filename3"); |
| EXPECT_EQ(items[0].content_type, ""); |
| |
| EXPECT_EQ(items[1].name, "name4"); |
| EXPECT_EQ(items[1].content, rand2); |
| EXPECT_EQ(items[1].filename, "filename4"); |
| EXPECT_EQ(items[1].content_type, ""); |
| }); |
| |
| svr.Post("/post-both", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| ASSERT_TRUE(req.is_multipart_form_data()); |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(items.size() == 4); |
| |
| EXPECT_EQ(std::string(items[0].name), "name1"); |
| EXPECT_EQ(items[0].content, "Testing123"); |
| EXPECT_EQ(items[0].filename, "filename1"); |
| EXPECT_EQ(items[0].content_type, "application/octet-stream"); |
| |
| EXPECT_EQ(items[1].name, "name2"); |
| EXPECT_EQ(items[1].content, "Testing456"); |
| EXPECT_EQ(items[1].filename, ""); |
| EXPECT_EQ(items[1].content_type, ""); |
| |
| EXPECT_EQ(items[2].name, "name3"); |
| EXPECT_EQ(items[2].content, rand1); |
| EXPECT_EQ(items[2].filename, "filename3"); |
| EXPECT_EQ(items[2].content_type, ""); |
| |
| EXPECT_EQ(items[3].name, "name4"); |
| EXPECT_EQ(items[3].content, rand2); |
| EXPECT_EQ(items[3].filename, "filename4"); |
| EXPECT_EQ(items[3].content_type, ""); |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"name1", "Testing123", "filename1", "application/octet-stream"}, |
| {"name2", "Testing456", "", ""}, // not a file |
| }; |
| |
| { |
| auto res = cli.Post("/post-none", {}, {}, {}); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| FormDataProviderItems providers; |
| |
| { |
| auto res = |
| cli.Post("/post-items", {}, items, providers); // empty providers |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| providers.push_back({"name3", |
| [&](size_t offset, httplib::DataSink &sink) -> bool { |
| // test the offset is given correctly at each step |
| if (!offset) |
| sink.os.write(rand1.data(), 30); |
| else if (offset == 30) |
| sink.os.write(rand1.data() + 30, 300); |
| else if (offset == 330) |
| sink.os.write(rand1.data() + 330, 670); |
| else if (offset == rand1.size()) |
| sink.done(); |
| return true; |
| }, |
| "filename3", |
| {}}); |
| |
| providers.push_back({"name4", |
| [&](size_t offset, httplib::DataSink &sink) -> bool { |
| // test the offset is given correctly at each step |
| if (!offset) |
| sink.os.write(rand2.data(), 2000); |
| else if (offset == 2000) |
| sink.os.write(rand2.data() + 2000, 1); |
| else if (offset == 2001) |
| sink.os.write(rand2.data() + 2001, 999); |
| else if (offset == rand2.size()) |
| sink.done(); |
| return true; |
| }, |
| "filename4", |
| {}}); |
| |
| { |
| auto res = cli.Post("/post-providers", {}, {}, providers); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| auto res = cli.Post("/post-both", {}, items, providers); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| } |
| |
| TEST(MultipartFormDataTest, BadHeader) { |
| Server svr; |
| svr.Post("/post", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| const std::string body = |
| "This is the preamble. It is to be ignored, though it\r\n" |
| "is a handy place for composition agents to include an\r\n" |
| "explanatory note to non-MIME conformant readers.\r\n" |
| "\r\n" |
| "\r\n" |
| "--simple boundary\r\n" |
| "Content-Disposition: form-data; name=\"field1\"\r\n" |
| ": BAD...\r\n" |
| "\r\n" |
| "value1\r\n" |
| "--simple boundary\r\n" |
| "Content-Disposition: form-data; name=\"field2\"; " |
| "filename=\"example.txt\"\r\n" |
| "\r\n" |
| "value2\r\n" |
| "--simple boundary--\r\n" |
| "This is the epilogue. It is also to be ignored.\r\n"; |
| |
| std::string content_type = |
| R"(multipart/form-data; boundary="simple boundary")"; |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Post("/post", body, content_type.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } |
| |
| TEST(MultipartFormDataTest, WithPreamble) { |
| Server svr; |
| svr.Post("/post", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| const std::string body = |
| "This is the preamble. It is to be ignored, though it\r\n" |
| "is a handy place for composition agents to include an\r\n" |
| "explanatory note to non-MIME conformant readers.\r\n" |
| "\r\n" |
| "\r\n" |
| "--simple boundary\r\n" |
| "Content-Disposition: form-data; name=\"field1\"\r\n" |
| "\r\n" |
| "value1\r\n" |
| "--simple boundary\r\n" |
| "Content-Disposition: form-data; name=\"field2\"; " |
| "filename=\"example.txt\"\r\n" |
| "\r\n" |
| "value2\r\n" |
| "--simple boundary--\r\n" |
| "This is the epilogue. It is also to be ignored.\r\n"; |
| |
| std::string content_type = |
| R"(multipart/form-data; boundary="simple boundary")"; |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Post("/post", body, content_type.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(MultipartFormDataTest, PostCustomBoundary) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Post("/post_customboundary", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_TRUE(std::string(items[0].name) == "document"); |
| EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); |
| EXPECT_TRUE(items[0].filename == "2MB_data"); |
| EXPECT_TRUE(items[0].content_type == "application/octet-stream"); |
| |
| EXPECT_TRUE(items[1].name == "hello"); |
| EXPECT_TRUE(items[1].content == "world"); |
| EXPECT_TRUE(items[1].filename == ""); |
| EXPECT_TRUE(items[1].content_type == ""); |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| } |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| std::string data(1024 * 1024 * 2, '.'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| auto res = cli.Post("/post_customboundary", {}, items, "abc-abc"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, PostInvalidBoundaryChars) { |
| std::string data(1024 * 1024 * 2, '&'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| for (const char &c : " \t\r\n") { |
| auto res = |
| cli.Post("/invalid_boundary", {}, items, string("abc123").append(1, c)); |
| ASSERT_EQ(Error::UnsupportedMultipartBoundaryChars, res.error()); |
| ASSERT_FALSE(res); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, PutFormData) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Put("/put", [&](const Request &req, const Response & /*res*/, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_TRUE(std::string(items[0].name) == "document"); |
| EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); |
| EXPECT_TRUE(items[0].filename == "2MB_data"); |
| EXPECT_TRUE(items[0].content_type == "application/octet-stream"); |
| |
| EXPECT_TRUE(items[1].name == "hello"); |
| EXPECT_TRUE(items[1].content == "world"); |
| EXPECT_TRUE(items[1].filename == ""); |
| EXPECT_TRUE(items[1].content_type == ""); |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| } |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| std::string data(1024 * 1024 * 2, '&'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| auto res = cli.Put("/put", items); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, PutFormDataCustomBoundary) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Put("/put_customboundary", |
| [&](const Request &req, const Response & /*res*/, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_TRUE(std::string(items[0].name) == "document"); |
| EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); |
| EXPECT_TRUE(items[0].filename == "2MB_data"); |
| EXPECT_TRUE(items[0].content_type == "application/octet-stream"); |
| |
| EXPECT_TRUE(items[1].name == "hello"); |
| EXPECT_TRUE(items[1].content == "world"); |
| EXPECT_TRUE(items[1].filename == ""); |
| EXPECT_TRUE(items[1].content_type == ""); |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| } |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| std::string data(1024 * 1024 * 2, '&'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| auto res = cli.Put("/put_customboundary", {}, items, "abc-abc_"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, PutInvalidBoundaryChars) { |
| std::string data(1024 * 1024 * 2, '&'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| for (const char &c : " \t\r\n") { |
| auto res = cli.Put("/put", {}, items, string("abc123").append(1, c)); |
| ASSERT_EQ(Error::UnsupportedMultipartBoundaryChars, res.error()); |
| ASSERT_FALSE(res); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, AlternateFilename) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &res) { |
| ASSERT_EQ(2u, req.form.files.size()); |
| ASSERT_EQ(1u, req.form.fields.size()); |
| |
| // Test files |
| const auto &file1 = req.form.get_file("file1"); |
| ASSERT_EQ("file1", file1.name); |
| ASSERT_EQ("A.txt", file1.filename); |
| ASSERT_EQ("text/plain", file1.content_type); |
| ASSERT_EQ("Content of a.txt.\r\n", file1.content); |
| |
| const auto &file2 = req.form.get_file("file2"); |
| ASSERT_EQ("file2", file2.name); |
| ASSERT_EQ("a.html", file2.filename); |
| ASSERT_EQ("text/html", file2.content_type); |
| ASSERT_EQ("<!DOCTYPE html><title>Content of a.html.</title>\r\n", |
| file2.content); |
| |
| // Test text field |
| const auto &text = req.form.get_field("text"); |
| ASSERT_EQ("text default", text); |
| |
| res.set_content("ok", "text/plain"); |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=--------\r\n" |
| "Content-Length: 399\r\n" |
| "\r\n" |
| "----------\r\n" |
| "Content-Disposition: form-data; name=\"text\"\r\n" |
| "\r\n" |
| "text default\r\n" |
| "----------\r\n" |
| "Content-Disposition: form-data; filename*=\"UTF-8''%41.txt\"; " |
| "filename=\"a.txt\"; name=\"file1\"\r\n" |
| "Content-Type: text/plain\r\n" |
| "\r\n" |
| "Content of a.txt.\r\n" |
| "\r\n" |
| "----------\r\n" |
| "Content-Disposition: form-data; name=\"file2\" ;filename = " |
| "\"a.html\"\r\n" |
| "Content-Type: text/html\r\n" |
| "\r\n" |
| "<!DOCTYPE html><title>Content of a.html.</title>\r\n" |
| "\r\n" |
| "------------\r\n"; |
| |
| ASSERT_TRUE(send_request(1, req)); |
| } |
| |
| TEST(MultipartFormDataTest, CloseDelimiterWithoutCRLF) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &) { |
| ASSERT_EQ(2u, req.form.fields.size()); |
| |
| const auto &text1 = req.form.get_field("text1"); |
| ASSERT_EQ("text1", text1); |
| |
| const auto &text2 = req.form.get_field("text2"); |
| ASSERT_EQ("text2", text2); |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=--------\r\n" |
| "Content-Length: 146\r\n" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text1\"\r\n" |
| "\r\n" |
| "text1" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text2\"\r\n" |
| "\r\n" |
| "text2" |
| "\r\n------------"; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("200", response.substr(9, 3)); |
| } |
| |
| TEST(MultipartFormDataTest, ContentLength) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &) { |
| ASSERT_EQ(2u, req.form.fields.size()); |
| |
| const auto &text1 = req.form.get_field("text1"); |
| ASSERT_EQ("text1", text1); |
| |
| const auto &text2 = req.form.get_field("text2"); |
| ASSERT_EQ("text2", text2); |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=--------\r\n" |
| "Content-Length: 167\r\n" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text1\"\r\n" |
| "Content-Length: 5\r\n" |
| "\r\n" |
| "text1" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text2\"\r\n" |
| "\r\n" |
| "text2" |
| "\r\n------------\r\n"; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("200", response.substr(9, 3)); |
| } |
| |
| TEST(MultipartFormDataTest, AccessPartHeaders) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &) { |
| ASSERT_EQ(2u, req.form.fields.size()); |
| |
| const auto &text1 = req.form.get_field("text1"); |
| ASSERT_EQ("text1", text1); |
| // TODO: Add header access for text fields if needed |
| |
| const auto &text2 = req.form.get_field("text2"); |
| ASSERT_EQ("text2", text2); |
| // TODO: Header access for text fields needs to be implemented |
| // auto &headers = it->second.headers; |
| // ASSERT_EQ(3U, headers.size()); |
| // auto custom_header = headers.find("x-whatever"); |
| // ASSERT_TRUE(custom_header != headers.end()); |
| // ASSERT_NE("customvalue", custom_header->second); |
| // ASSERT_EQ("CustomValue", custom_header->second); |
| // ASSERT_TRUE(headers.find("X-Test") == headers.end()); // text1 header |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=--------\r\n" |
| "Content-Length: 232\r\n" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text1\"\r\n" |
| "Content-Length: 5\r\n" |
| "X-Test: 1\r\n" |
| "\r\n" |
| "text1" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text2\"\r\n" |
| "Content-Type: text/plain\r\n" |
| "X-Whatever: CustomValue\r\n" |
| "\r\n" |
| "text2" |
| "\r\n------------\r\n" |
| "That should be disregarded. Not even read"; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("200", response.substr(9, 3)); |
| } |
| #endif |
| |
| TEST(MultipartFormDataTest, LargeHeader) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &) { |
| ASSERT_EQ(1u, req.form.fields.size()); |
| |
| const auto &text = req.form.get_field("name1"); |
| ASSERT_EQ("text1", text); |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto boundary = std::string("cpp-httplib-multipart-data"); |
| std::string content = "--" + boundary + |
| "\r\n" |
| "Content-Disposition: form-data; name=\"name1\"\r\n" |
| "\r\n" |
| "text1\r\n" |
| "--" + |
| boundary + "--\r\n"; |
| std::string header_prefix = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=" + |
| boundary + |
| "\r\n" |
| "Content-Length: " + |
| std::to_string(content.size()) + |
| "\r\n" |
| "Dummy-Header: "; |
| std::string header_suffix = "\r\n" |
| "\r\n"; |
| size_t read_buff_size = 1024u * 4; // SocketStream::read_buff_size_ |
| size_t header_dummy_size = |
| read_buff_size - |
| (header_prefix.size() + header_suffix.size() + boundary.size() / 2); |
| auto header_dummy = std::string(header_dummy_size, '@'); |
| auto req = header_prefix + header_dummy + header_suffix + content; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("200", response.substr(9, 3)); |
| } |
| |
| TEST(TaskQueueTest, IncreaseAtomicInteger) { |
| static constexpr unsigned int number_of_tasks{1000000}; |
| std::atomic_uint count{0}; |
| std::unique_ptr<TaskQueue> task_queue{ |
| new ThreadPool{CPPHTTPLIB_THREAD_POOL_COUNT}}; |
| |
| for (unsigned int i = 0; i < number_of_tasks; ++i) { |
| auto queued = task_queue->enqueue( |
| [&count] { count.fetch_add(1, std::memory_order_relaxed); }); |
| EXPECT_TRUE(queued); |
| } |
| |
| EXPECT_NO_THROW(task_queue->shutdown()); |
| EXPECT_EQ(number_of_tasks, count.load()); |
| } |
| |
| TEST(TaskQueueTest, IncreaseAtomicIntegerWithQueueLimit) { |
| static constexpr unsigned int number_of_tasks{1000000}; |
| static constexpr unsigned int qlimit{2}; |
| unsigned int queued_count{0}; |
| std::atomic_uint count{0}; |
| std::unique_ptr<TaskQueue> task_queue{ |
| new ThreadPool{/*num_threads=*/1, qlimit}}; |
| |
| for (unsigned int i = 0; i < number_of_tasks; ++i) { |
| if (task_queue->enqueue( |
| [&count] { count.fetch_add(1, std::memory_order_relaxed); })) { |
| queued_count++; |
| } |
| } |
| |
| EXPECT_NO_THROW(task_queue->shutdown()); |
| EXPECT_EQ(queued_count, count.load()); |
| EXPECT_TRUE(queued_count <= number_of_tasks); |
| EXPECT_TRUE(queued_count >= qlimit); |
| } |
| |
| TEST(TaskQueueTest, MaxQueuedRequests) { |
| static constexpr unsigned int qlimit{3}; |
| std::unique_ptr<TaskQueue> task_queue{new ThreadPool{1, qlimit}}; |
| std::condition_variable sem_cv; |
| std::mutex sem_mtx; |
| int credits = 0; |
| bool queued; |
| |
| /* Fill up the queue with tasks that will block until we give them credits to |
| * complete. */ |
| for (unsigned int n = 0; n <= qlimit;) { |
| queued = task_queue->enqueue([&sem_mtx, &sem_cv, &credits] { |
| std::unique_lock<std::mutex> lock(sem_mtx); |
| while (credits <= 0) { |
| sem_cv.wait(lock); |
| } |
| /* Consume the credit and signal the test code if they are all gone. */ |
| if (--credits == 0) { sem_cv.notify_one(); } |
| }); |
| |
| if (n < qlimit) { |
| /* The first qlimit enqueues must succeed. */ |
| EXPECT_TRUE(queued); |
| } else { |
| /* The last one will succeed only when the worker thread |
| * starts and dequeues the first blocking task. Although |
| * not necessary for the correctness of this test, we sleep for |
| * a short while to avoid busy waiting. */ |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| if (queued) { n++; } |
| } |
| |
| /* Further enqueues must fail since the queue is full. */ |
| for (auto i = 0; i < 4; i++) { |
| queued = task_queue->enqueue([] {}); |
| EXPECT_FALSE(queued); |
| } |
| |
| /* Give the credits to allow the previous tasks to complete. */ |
| { |
| std::unique_lock<std::mutex> lock(sem_mtx); |
| credits += qlimit + 1; |
| } |
| sem_cv.notify_all(); |
| |
| /* Wait for all the credits to be consumed. */ |
| { |
| std::unique_lock<std::mutex> lock(sem_mtx); |
| while (credits > 0) { |
| sem_cv.wait(lock); |
| } |
| } |
| |
| /* Check that we are able again to enqueue at least qlimit tasks. */ |
| for (unsigned int i = 0; i < qlimit; i++) { |
| queued = task_queue->enqueue([] {}); |
| EXPECT_TRUE(queued); |
| } |
| |
| EXPECT_NO_THROW(task_queue->shutdown()); |
| } |
| |
| TEST(RedirectTest, RedirectToUrlWithQueryParameters) { |
| Server svr; |
| |
| svr.Get("/", [](const Request & /*req*/, Response &res) { |
| res.set_redirect(R"(/hello?key=val%26key2%3Dval2)"); |
| }); |
| |
| svr.Get("/hello", [](const Request &req, Response &res) { |
| res.set_content(req.get_param_value("key"), "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("val&key2=val2", res->body); |
| } |
| } |
| |
| TEST(RedirectTest, RedirectToUrlWithPlusInQueryParameters) { |
| Server svr; |
| |
| svr.Get("/", [](const Request & /*req*/, Response &res) { |
| res.set_redirect(R"(/hello?key=AByz09+~-._%20%26%3F%C3%BC%2B)"); |
| }); |
| |
| svr.Get("/hello", [](const Request &req, Response &res) { |
| res.set_content(req.get_param_value("key"), "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("AByz09 ~-._ &?ü+", res->body); |
| } |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(RedirectTest, Issue2185_Online) { |
| SSLClient client("github.com"); |
| client.set_follow_location(true); |
| |
| auto res = client.Get("/Coollab-Art/Coollab/releases/download/1.1.1_UI-Scale/" |
| "Coollab-Windows.zip"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(9920427U, res->body.size()); |
| } |
| #endif |
| |
| TEST(VulnerabilityTest, CRLFInjection) { |
| Server svr; |
| |
| svr.Post("/test1", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello 1", "text/plain"); |
| }); |
| |
| svr.Delete("/test2", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello 2", "text/plain"); |
| }); |
| |
| svr.Put("/test3", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello 3", "text/plain"); |
| }); |
| |
| svr.Patch("/test4", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello 4", "text/plain"); |
| }); |
| |
| svr.set_logger([](const Request &req, const Response & /*res*/) { |
| for (const auto &x : req.headers) { |
| auto key = x.first; |
| EXPECT_STRNE("evil", key.c_str()); |
| } |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| cli.Post("/test1", "A=B", |
| "application/x-www-form-urlencoded\r\nevil: hello1"); |
| cli.Delete("/test2", "A=B", "text/plain\r\nevil: hello2"); |
| cli.Put("/test3", "text", "text/plain\r\nevil: hello3"); |
| cli.Patch("/test4", "content", "text/plain\r\nevil: hello4"); |
| } |
| } |
| |
| TEST(PathParamsTest, StaticMatch) { |
| const auto pattern = "/users/all"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/all"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = {}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, StaticMismatch) { |
| const auto pattern = "/users/all"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/1"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, SingleParamInTheMiddle) { |
| const auto pattern = "/users/:id/subscriptions"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/42/subscriptions"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = {{"id", "42"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, SingleParamInTheEnd) { |
| const auto pattern = "/users/:id"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/24"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = {{"id", "24"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, SingleParamInTheEndTrailingSlash) { |
| const auto pattern = "/users/:id/"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/42/"; |
| ASSERT_TRUE(matcher.match(request)); |
| std::unordered_map<std::string, std::string> expected_params = {{"id", "42"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, EmptyParam) { |
| const auto pattern = "/users/:id/"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users//"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = {{"id", ""}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, FragmentMismatch) { |
| const auto pattern = "/users/:id/"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/admins/24/"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, ExtraFragments) { |
| const auto pattern = "/users/:id"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/42/subscriptions"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, MissingTrailingParam) { |
| const auto pattern = "/users/:id"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, MissingParamInTheMiddle) { |
| const auto pattern = "/users/:id/subscriptions"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/subscriptions"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, MultipleParams) { |
| const auto pattern = "/users/:userid/subscriptions/:subid"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/42/subscriptions/2"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = { |
| {"userid", "42"}, {"subid", "2"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, SequenceOfParams) { |
| const auto pattern = "/values/:x/:y/:z"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/values/1/2/3"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = { |
| {"x", "1"}, {"y", "2"}, {"z", "3"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, SemicolonInTheMiddleIsNotAParam) { |
| const auto pattern = "/prefix:suffix"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/prefix:suffix"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| const std::unordered_map<std::string, std::string> expected_params = {}; |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(UniversalClientImplTest, Ipv6LiteralAddress) { |
| // If ipv6 regex working, regex match codepath is taken. |
| // else port will default to 80 in Client impl |
| int clientImplMagicPort = 80; |
| int port = 4321; |
| // above ports must be different to avoid false negative |
| EXPECT_NE(clientImplMagicPort, port); |
| |
| std::string ipV6TestURL = "http://[ff06::c3]"; |
| |
| Client cli(ipV6TestURL + ":" + std::to_string(port), CLIENT_CERT_FILE, |
| CLIENT_PRIVATE_KEY_FILE); |
| EXPECT_EQ(cli.port(), port); |
| } |
| |
| TEST(FileSystemTest, FileAndDirExistenceCheck) { |
| auto file_path = "./www/dir/index.html"; |
| auto dir_path = "./www/dir"; |
| |
| detail::FileStat stat_file(file_path); |
| EXPECT_TRUE(stat_file.is_file()); |
| EXPECT_FALSE(stat_file.is_dir()); |
| |
| detail::FileStat stat_dir(dir_path); |
| EXPECT_FALSE(stat_dir.is_file()); |
| EXPECT_TRUE(stat_dir.is_dir()); |
| } |
| |
| TEST(MakeHostAndPortStringTest, VariousPatterns) { |
| // IPv4 with default HTTP port (80) |
| EXPECT_EQ("example.com", |
| detail::make_host_and_port_string("example.com", 80, false)); |
| |
| // IPv4 with default HTTPS port (443) |
| EXPECT_EQ("example.com", |
| detail::make_host_and_port_string("example.com", 443, true)); |
| |
| // IPv4 with non-default HTTP port |
| EXPECT_EQ("example.com:8080", |
| detail::make_host_and_port_string("example.com", 8080, false)); |
| |
| // IPv4 with non-default HTTPS port |
| EXPECT_EQ("example.com:8443", |
| detail::make_host_and_port_string("example.com", 8443, true)); |
| |
| // IPv6 with default HTTP port (80) |
| EXPECT_EQ("[::1]", detail::make_host_and_port_string("::1", 80, false)); |
| |
| // IPv6 with default HTTPS port (443) |
| EXPECT_EQ("[::1]", detail::make_host_and_port_string("::1", 443, true)); |
| |
| // IPv6 with non-default HTTP port |
| EXPECT_EQ("[::1]:8080", |
| detail::make_host_and_port_string("::1", 8080, false)); |
| |
| // IPv6 with non-default HTTPS port |
| EXPECT_EQ("[::1]:8443", detail::make_host_and_port_string("::1", 8443, true)); |
| |
| // IPv6 full address with default port |
| EXPECT_EQ("[2001:0db8:85a3:0000:0000:8a2e:0370:7334]", |
| detail::make_host_and_port_string( |
| "2001:0db8:85a3:0000:0000:8a2e:0370:7334", 443, true)); |
| |
| // IPv6 full address with non-default port |
| EXPECT_EQ("[2001:0db8:85a3:0000:0000:8a2e:0370:7334]:9000", |
| detail::make_host_and_port_string( |
| "2001:0db8:85a3:0000:0000:8a2e:0370:7334", 9000, false)); |
| |
| // IPv6 localhost with non-default port |
| EXPECT_EQ("[::1]:3000", |
| detail::make_host_and_port_string("::1", 3000, false)); |
| |
| // IPv6 with zone ID (link-local address) with default port |
| EXPECT_EQ("[fe80::1%eth0]", |
| detail::make_host_and_port_string("fe80::1%eth0", 80, false)); |
| |
| // IPv6 with zone ID (link-local address) with non-default port |
| EXPECT_EQ("[fe80::1%eth0]:8080", |
| detail::make_host_and_port_string("fe80::1%eth0", 8080, false)); |
| |
| // Edge case: Port 443 with is_ssl=false (should add port) |
| EXPECT_EQ("example.com:443", |
| detail::make_host_and_port_string("example.com", 443, false)); |
| |
| // Edge case: Port 80 with is_ssl=true (should add port) |
| EXPECT_EQ("example.com:80", |
| detail::make_host_and_port_string("example.com", 80, true)); |
| |
| // IPv6 edge case: Port 443 with is_ssl=false (should add port) |
| EXPECT_EQ("[::1]:443", detail::make_host_and_port_string("::1", 443, false)); |
| |
| // IPv6 edge case: Port 80 with is_ssl=true (should add port) |
| EXPECT_EQ("[::1]:80", detail::make_host_and_port_string("::1", 80, true)); |
| |
| // Security fix: Already bracketed IPv6 should not get double brackets |
| EXPECT_EQ("[::1]", detail::make_host_and_port_string("[::1]", 80, false)); |
| EXPECT_EQ("[::1]", detail::make_host_and_port_string("[::1]", 443, true)); |
| EXPECT_EQ("[::1]:8080", |
| detail::make_host_and_port_string("[::1]", 8080, false)); |
| EXPECT_EQ("[2001:db8::1]:8080", |
| detail::make_host_and_port_string("[2001:db8::1]", 8080, false)); |
| EXPECT_EQ("[fe80::1%eth0]", |
| detail::make_host_and_port_string("[fe80::1%eth0]", 80, false)); |
| EXPECT_EQ("[fe80::1%eth0]:8080", |
| detail::make_host_and_port_string("[fe80::1%eth0]", 8080, false)); |
| |
| // Edge case: Empty host (should return as-is) |
| EXPECT_EQ("", detail::make_host_and_port_string("", 80, false)); |
| |
| // Edge case: Colon in hostname (non-IPv6) - will be treated as IPv6 |
| // This is a known limitation but shouldn't crash |
| EXPECT_EQ("[host:name]", |
| detail::make_host_and_port_string("host:name", 80, false)); |
| |
| // Port number edge cases (no validation, but should not crash) |
| EXPECT_EQ("example.com:0", |
| detail::make_host_and_port_string("example.com", 0, false)); |
| EXPECT_EQ("example.com:-1", |
| detail::make_host_and_port_string("example.com", -1, false)); |
| EXPECT_EQ("example.com:65535", |
| detail::make_host_and_port_string("example.com", 65535, false)); |
| EXPECT_EQ("example.com:65536", |
| detail::make_host_and_port_string("example.com", 65536, false)); |
| } |
| |
| TEST(DirtyDataRequestTest, HeadFieldValueContains_CR_LF_NUL) { |
| Server svr; |
| |
| svr.Get("/test", [&](const Request & /*req*/, Response &res) { |
| EXPECT_EQ(res.status, 400); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.Get("/test", {{"Test", "_\n\r_\n\r_"}}); |
| } |
| |
| TEST(InvalidHeaderCharsTest, is_field_name) { |
| EXPECT_TRUE(detail::fields::is_field_name("exampleToken")); |
| EXPECT_TRUE(detail::fields::is_field_name("token123")); |
| EXPECT_TRUE(detail::fields::is_field_name("!#$%&'*+-.^_`|~")); |
| |
| EXPECT_FALSE(detail::fields::is_field_name("example token")); |
| EXPECT_FALSE(detail::fields::is_field_name(" example_token")); |
| EXPECT_FALSE(detail::fields::is_field_name("example_token ")); |
| EXPECT_FALSE(detail::fields::is_field_name("token@123")); |
| EXPECT_FALSE(detail::fields::is_field_name("")); |
| EXPECT_FALSE(detail::fields::is_field_name("example\rtoken")); |
| EXPECT_FALSE(detail::fields::is_field_name("example\ntoken")); |
| EXPECT_FALSE(detail::fields::is_field_name(std::string("\0", 1))); |
| EXPECT_FALSE(detail::fields::is_field_name("example\ttoken")); |
| } |
| |
| TEST(InvalidHeaderCharsTest, is_field_value) { |
| EXPECT_TRUE(detail::fields::is_field_value("exampleToken")); |
| EXPECT_TRUE(detail::fields::is_field_value("token123")); |
| EXPECT_TRUE(detail::fields::is_field_value("!#$%&'*+-.^_`|~")); |
| |
| EXPECT_TRUE(detail::fields::is_field_value("example token")); |
| EXPECT_FALSE(detail::fields::is_field_value(" example_token")); |
| EXPECT_FALSE(detail::fields::is_field_value("example_token ")); |
| EXPECT_TRUE(detail::fields::is_field_value("token@123")); |
| EXPECT_TRUE(detail::fields::is_field_value("")); |
| EXPECT_FALSE(detail::fields::is_field_value("example\rtoken")); |
| EXPECT_FALSE(detail::fields::is_field_value("example\ntoken")); |
| EXPECT_FALSE(detail::fields::is_field_value(std::string("\0", 1))); |
| EXPECT_TRUE(detail::fields::is_field_value("example\ttoken")); |
| |
| EXPECT_TRUE(detail::fields::is_field_value("0")); |
| } |
| |
| TEST(InvalidHeaderCharsTest, OnServer) { |
| Server svr; |
| |
| svr.Get("/test_name", [&](const Request &req, Response &res) { |
| std::string header = "Not Set"; |
| if (req.has_param("header")) { header = req.get_param_value("header"); } |
| |
| res.set_header(header, "value"); |
| res.set_content("Page Content Page Content", "text/plain"); |
| }); |
| |
| svr.Get("/test_value", [&](const Request &req, Response &res) { |
| std::string header = "Not Set"; |
| if (req.has_param("header")) { header = req.get_param_value("header"); } |
| |
| res.set_header("X-Test", header); |
| res.set_content("Page Content Page Content", "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| { |
| auto res = cli.Get( |
| R"(/test_name?header=Value%00%0d%0aHEADER_KEY%3aHEADER_VALUE%0d%0a%0d%0aBODY_BODY_BODY)"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Page Content Page Content", res->body); |
| EXPECT_FALSE(res->has_header("HEADER_KEY")); |
| } |
| { |
| auto res = cli.Get( |
| R"(/test_value?header=Value%00%0d%0aHEADER_KEY%3aHEADER_VALUE%0d%0a%0d%0aBODY_BODY_BODY)"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Page Content Page Content", res->body); |
| EXPECT_FALSE(res->has_header("HEADER_KEY")); |
| } |
| } |
| |
| TEST(InvalidHeaderValueTest, InvalidContentLength) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &, Response &) { handled = true; }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_FALSE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Length: x\r\n" |
| "\r\n"; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("HTTP/1.1 400 Bad Request", |
| response.substr(0, response.find("\r\n"))); |
| } |
| |
| #ifndef _WIN32 |
| TEST(Expect100ContinueTest, ServerClosesConnection) { |
| static constexpr char reject[] = "Unauthorized"; |
| static constexpr char accept[] = "Upload accepted"; |
| constexpr size_t total_size = 10 * 1024 * 1024 * 1024ULL; |
| |
| Server svr; |
| |
| svr.set_expect_100_continue_handler( |
| [](const Request & /*req*/, Response &res) { |
| res.status = StatusCode::Unauthorized_401; |
| res.set_content(reject, "text/plain"); |
| return res.status; |
| }); |
| svr.Post("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(accept, "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| const auto curl = std::unique_ptr<CURL, decltype(&curl_easy_cleanup)>{ |
| curl_easy_init(), &curl_easy_cleanup}; |
| ASSERT_NE(curl, nullptr); |
| |
| curl_easy_setopt(curl.get(), CURLOPT_URL, HOST); |
| curl_easy_setopt(curl.get(), CURLOPT_PORT, PORT); |
| curl_easy_setopt(curl.get(), CURLOPT_POST, 1L); |
| auto list = std::unique_ptr<curl_slist, decltype(&curl_slist_free_all)>{ |
| curl_slist_append(nullptr, "Content-Type: application/octet-stream"), |
| &curl_slist_free_all}; |
| ASSERT_NE(list, nullptr); |
| curl_easy_setopt(curl.get(), CURLOPT_HTTPHEADER, list.get()); |
| |
| struct read_data { |
| size_t read_size; |
| size_t total_size; |
| } data = {0, total_size}; |
| using read_callback_t = |
| size_t (*)(char *ptr, size_t size, size_t nmemb, void *userdata); |
| read_callback_t read_callback = [](char *ptr, size_t size, size_t nmemb, |
| void *userdata) -> size_t { |
| read_data *data = (read_data *)userdata; |
| |
| if (!userdata || data->read_size >= data->total_size) { return 0; } |
| |
| std::fill_n(ptr, size * nmemb, 'A'); |
| data->read_size += size * nmemb; |
| return size * nmemb; |
| }; |
| curl_easy_setopt(curl.get(), CURLOPT_READDATA, data); |
| curl_easy_setopt(curl.get(), CURLOPT_READFUNCTION, read_callback); |
| |
| std::vector<char> buffer; |
| curl_easy_setopt(curl.get(), CURLOPT_WRITEDATA, &buffer); |
| using write_callback_t = |
| size_t (*)(char *ptr, size_t size, size_t nmemb, void *userdata); |
| write_callback_t write_callback = [](char *ptr, size_t size, size_t nmemb, |
| void *userdata) -> size_t { |
| std::vector<char> *buffer = (std::vector<char> *)userdata; |
| buffer->reserve(buffer->size() + size * nmemb + 1); |
| buffer->insert(buffer->end(), (char *)ptr, (char *)ptr + size * nmemb); |
| return size * nmemb; |
| }; |
| curl_easy_setopt(curl.get(), CURLOPT_WRITEFUNCTION, write_callback); |
| |
| { |
| const auto res = curl_easy_perform(curl.get()); |
| ASSERT_EQ(res, CURLE_OK); |
| } |
| |
| { |
| auto response_code = long{}; |
| const auto res = |
| curl_easy_getinfo(curl.get(), CURLINFO_RESPONSE_CODE, &response_code); |
| ASSERT_EQ(res, CURLE_OK); |
| ASSERT_EQ(response_code, StatusCode::Unauthorized_401); |
| } |
| |
| { |
| auto dl = curl_off_t{}; |
| const auto res = |
| curl_easy_getinfo(curl.get(), CURLINFO_SIZE_DOWNLOAD_T, &dl); |
| ASSERT_EQ(res, CURLE_OK); |
| ASSERT_EQ(dl, (curl_off_t)sizeof reject - 1); |
| } |
| |
| { |
| buffer.push_back('\0'); |
| ASSERT_STRCASEEQ(buffer.data(), reject); |
| } |
| } |
| } |
| #endif |
| |
| template <typename S, typename C> |
| inline void max_timeout_test(S &svr, C &cli, time_t timeout, time_t threshold) { |
| svr.Get("/stream", [&](const Request &, Response &res) { |
| auto data = new std::string("01234567890123456789"); |
| |
| res.set_content_provider( |
| data->size(), "text/plain", |
| [&, data](size_t offset, size_t length, DataSink &sink) { |
| const size_t DATA_CHUNK_SIZE = 4; |
| const auto &d = *data; |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| sink.write(&d[offset], std::min(length, DATA_CHUNK_SIZE)); |
| return true; |
| }, |
| [data](bool success) { |
| EXPECT_FALSE(success); |
| delete data; |
| }); |
| }); |
| |
| svr.Get("/stream_without_length", [&](const Request &, Response &res) { |
| auto i = new size_t(0); |
| |
| res.set_content_provider( |
| "text/plain", |
| [i](size_t, DataSink &sink) { |
| if (*i < 5) { |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| sink.write("abcd", 4); |
| (*i)++; |
| } else { |
| sink.done(); |
| } |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_FALSE(success); |
| delete i; |
| }); |
| }); |
| |
| svr.Get("/chunked", [&](const Request &, Response &res) { |
| auto i = new size_t(0); |
| |
| res.set_chunked_content_provider( |
| "text/plain", |
| [i](size_t, DataSink &sink) { |
| if (*i < 5) { |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| sink.os << "abcd"; |
| (*i)++; |
| } else { |
| sink.done(); |
| } |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_FALSE(success); |
| delete i; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| cli.set_max_timeout(std::chrono::milliseconds(timeout)); |
| |
| { |
| auto start = std::chrono::steady_clock::now(); |
| |
| auto res = cli.Get("/stream"); |
| |
| auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( |
| std::chrono::steady_clock::now() - start) |
| .count(); |
| |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::Read, res.error()); |
| EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) |
| << "Timeout exceeded by " << (elapsed - timeout) << "ms"; |
| } |
| |
| { |
| auto start = std::chrono::steady_clock::now(); |
| |
| auto res = cli.Get("/stream_without_length"); |
| |
| auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( |
| std::chrono::steady_clock::now() - start) |
| .count(); |
| |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::Read, res.error()); |
| EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) |
| << "Timeout exceeded by " << (elapsed - timeout) << "ms"; |
| } |
| |
| { |
| auto start = std::chrono::steady_clock::now(); |
| |
| auto res = cli.Get("/chunked", [&](const char *data, size_t data_length) { |
| EXPECT_EQ("abcd", string(data, data_length)); |
| return true; |
| }); |
| |
| auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( |
| std::chrono::steady_clock::now() - start) |
| .count(); |
| |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::Read, res.error()); |
| EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) |
| << "Timeout exceeded by " << (elapsed - timeout) << "ms"; |
| } |
| } |
| |
| TEST(MaxTimeoutTest, ContentStream) { |
| time_t timeout = 2000; |
| time_t threshold = 200; |
| |
| Server svr; |
| Client cli("localhost", PORT); |
| max_timeout_test(svr, cli, timeout, threshold); |
| } |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| TEST(MaxTimeoutTest, ContentStreamSSL) { |
| time_t timeout = 2000; |
| time_t threshold = 1200; // SSL_shutdown is slow on some operating systems. |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| SSLClient cli("localhost", PORT); |
| cli.enable_server_certificate_verification(false); |
| |
| max_timeout_test(svr, cli, timeout, threshold); |
| } |
| #endif |
| |
| class EventDispatcher { |
| public: |
| EventDispatcher() {} |
| |
| bool wait_event(DataSink *sink) { |
| unique_lock<mutex> lk(m_); |
| int id = id_; |
| |
| // Wait with timeout to prevent hanging if client disconnects |
| if (!cv_.wait_for(lk, std::chrono::seconds(5), |
| [&] { return cid_ == id; })) { |
| return false; // Timeout occurred |
| } |
| |
| sink->write(message_.data(), message_.size()); |
| return true; |
| } |
| |
| void send_event(const string &message) { |
| lock_guard<mutex> lk(m_); |
| cid_ = id_++; |
| message_ = message; |
| cv_.notify_all(); |
| } |
| |
| private: |
| mutex m_; |
| condition_variable cv_; |
| atomic_int id_{0}; |
| atomic_int cid_{-1}; |
| string message_; |
| }; |
| |
| TEST(ClientInThreadTest, Issue2068) { |
| EventDispatcher ed; |
| |
| Server svr; |
| svr.Get("/event1", [&](const Request & /*req*/, Response &res) { |
| res.set_chunked_content_provider("text/event-stream", |
| [&](size_t /*offset*/, DataSink &sink) { |
| return ed.wait_event(&sink); |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); |
| |
| svr.wait_until_ready(); |
| |
| thread event_thread([&] { |
| int id = 0; |
| while (svr.is_running()) { |
| this_thread::sleep_for(chrono::milliseconds(500)); |
| |
| std::stringstream ss; |
| ss << "data: " << id << "\n\n"; |
| ed.send_event(ss.str()); |
| id++; |
| } |
| }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| |
| listen_thread.join(); |
| event_thread.join(); |
| |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| { |
| auto client = detail::make_unique<Client>(HOST, PORT); |
| client->set_read_timeout(std::chrono::minutes(10)); |
| |
| std::atomic<bool> stop{false}; |
| |
| std::thread t([&] { |
| client->Get("/event1", |
| [&](const char *, size_t) -> bool { return !stop; }); |
| }); |
| |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| stop = true; |
| client->stop(); |
| |
| t.join(); |
| |
| // Reset client after thread has finished |
| client.reset(); |
| } |
| } |
| |
| TEST(HeaderSmugglingTest, ChunkedTrailerHeadersMerged) { |
| Server svr; |
| |
| svr.Get("/", [](const Request &req, Response &res) { |
| EXPECT_EQ(2U, req.trailers.size()); |
| |
| EXPECT_FALSE(req.has_trailer("[invalid key...]")); |
| |
| // Denied |
| EXPECT_FALSE(req.has_trailer("Content-Length")); |
| EXPECT_FALSE(req.has_trailer("X-Forwarded-For")); |
| |
| // Accepted |
| EXPECT_TRUE(req.has_trailer("X-Hello")); |
| EXPECT_EQ(req.get_trailer_value("X-Hello"), "hello"); |
| |
| EXPECT_TRUE(req.has_trailer("X-World")); |
| EXPECT_EQ(req.get_trailer_value("X-World"), "world"); |
| |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| const std::string req = "GET / HTTP/1.1\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "Trailer: X-Hello, X-World, X-AAA, X-BBB\r\n" |
| "\r\n" |
| "0\r\n" |
| "Content-Length: 10\r\n" |
| "Host: internal.local\r\n" |
| "Content-Type: malicious/content\r\n" |
| "Cookie: any\r\n" |
| "Set-Cookie: any\r\n" |
| "X-Forwarded-For: attacker.com\r\n" |
| "X-Real-Ip: 1.1.1.1\r\n" |
| "X-Hello: hello\r\n" |
| "X-World: world\r\n" |
| "\r\n"; |
| |
| std::string res; |
| ASSERT_TRUE(send_request(1, req, &res)); |
| } |