| // NOTE: This file should be saved as UTF-8 w/ BOM |
| #include <httplib.h> |
| #include <signal.h> |
| |
| #ifndef _WIN32 |
| #include <arpa/inet.h> |
| #include <ctime> |
| #include <curl/curl.h> |
| #include <netinet/in.h> |
| #include <sys/socket.h> |
| #include <sys/time.h> |
| #include <unistd.h> |
| #endif |
| #include <gtest/gtest.h> |
| |
| #include <algorithm> |
| #include <atomic> |
| #include <chrono> |
| #include <cstdio> |
| #include <fstream> |
| #include <future> |
| #include <limits> |
| #include <memory> |
| #include <sstream> |
| #include <stdexcept> |
| #include <thread> |
| #include <type_traits> |
| #include <vector> |
| |
| #if __cplusplus >= 202002L |
| inline std::string u8_to_string(const char8_t *s) { |
| return std::string(reinterpret_cast<const char *>(s)); |
| } |
| #define U8(x) u8_to_string(u8##x) |
| #else |
| #define U8(x) u8##x |
| #endif |
| |
| #define SERVER_CERT_FILE "./cert.pem" |
| #define SERVER_CERT2_FILE "./cert2.pem" |
| #define SERVER_PRIVATE_KEY_FILE "./key.pem" |
| #define CA_CERT_FILE "./ca-bundle.crt" |
| #define CLIENT_CA_CERT_FILE "./rootCA.cert.pem" |
| #define CLIENT_CA_CERT_DIR "." |
| #define CLIENT_CERT_FILE "./client.cert.pem" |
| #define CLIENT_PRIVATE_KEY_FILE "./client.key.pem" |
| #define CLIENT_ENCRYPTED_CERT_FILE "./client_encrypted.cert.pem" |
| #define CLIENT_ENCRYPTED_PRIVATE_KEY_FILE "./client_encrypted.key.pem" |
| #define CLIENT_ENCRYPTED_PRIVATE_KEY_PASS "test012!" |
| #define SERVER_ENCRYPTED_CERT_FILE "./cert_encrypted.pem" |
| #define SERVER_ENCRYPTED_PRIVATE_KEY_FILE "./key_encrypted.pem" |
| #define SERVER_ENCRYPTED_PRIVATE_KEY_PASS "test123!" |
| |
| using namespace std; |
| using namespace httplib; |
| |
| const char *HOST = "localhost"; |
| const int PORT = 1234; |
| |
| const string LONG_QUERY_VALUE = string(25000, '@'); |
| const string LONG_QUERY_URL = "/long-query-value?key=" + LONG_QUERY_VALUE; |
| |
| const string TOO_LONG_QUERY_VALUE = string(35000, '@'); |
| const string TOO_LONG_QUERY_URL = |
| "/too-long-query-value?key=" + TOO_LONG_QUERY_VALUE; |
| |
| const std::string JSON_DATA = "{\"hello\":\"world\"}"; |
| |
| const string LARGE_DATA = string(1024 * 1024 * 100, '@'); // 100MB |
| |
| FormData &get_file_value(std::vector<FormData> &items, const char *key) { |
| auto it = std::find_if(items.begin(), items.end(), [&](const FormData &file) { |
| return file.name == key; |
| }); |
| #ifdef CPPHTTPLIB_NO_EXCEPTIONS |
| return *it; |
| #else |
| if (it != items.end()) { return *it; } |
| throw std::runtime_error("invalid multipart form data name error"); |
| #endif |
| } |
| |
| static void read_file(const std::string &path, std::string &out) { |
| std::ifstream fs(path, std::ios_base::binary); |
| if (!fs) throw std::runtime_error("File not found: " + path); |
| fs.seekg(0, std::ios_base::end); |
| auto size = fs.tellg(); |
| fs.seekg(0); |
| out.resize(static_cast<size_t>(size)); |
| fs.read(&out[0], static_cast<std::streamsize>(size)); |
| } |
| |
| void performance_test(const char *host) { |
| Server svr; |
| |
| svr.Get("/benchmark", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Benchmark Response", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&]() { svr.listen(host, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(host, PORT); |
| |
| // Warm-up request to establish connection and resolve DNS |
| auto warmup_res = cli.Get("/benchmark"); |
| ASSERT_TRUE(warmup_res); // Ensure server is responding correctly |
| |
| // Run multiple trials and collect timings |
| const int num_trials = 20; |
| std::vector<int64_t> timings; |
| timings.reserve(num_trials); |
| |
| for (int i = 0; i < num_trials; i++) { |
| auto start = std::chrono::high_resolution_clock::now(); |
| auto res = cli.Get("/benchmark"); |
| auto end = std::chrono::high_resolution_clock::now(); |
| |
| auto elapsed = |
| std::chrono::duration_cast<std::chrono::milliseconds>(end - start) |
| .count(); |
| |
| // Assertions after timing measurement to avoid overhead |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| timings.push_back(elapsed); |
| } |
| |
| // Calculate 25th percentile (lower quartile) |
| std::sort(timings.begin(), timings.end()); |
| auto p25 = timings[num_trials / 4]; |
| |
| // Format timings for output |
| std::ostringstream timings_str; |
| timings_str << "["; |
| for (size_t i = 0; i < timings.size(); i++) { |
| if (i > 0) timings_str << ", "; |
| timings_str << timings[i]; |
| } |
| timings_str << "]"; |
| |
| // Localhost HTTP GET should be fast even in CI environments |
| EXPECT_LE(p25, 5) << "25th percentile performance is too slow: " << p25 |
| << "ms (Issue #1777). Timings: " << timings_str.str(); |
| } |
| |
| TEST(BenchmarkTest, localhost) { performance_test("localhost"); } |
| |
| TEST(BenchmarkTest, v6) { performance_test("::1"); } |
| |
| class UnixSocketTest : public ::testing::Test { |
| protected: |
| void TearDown() override { std::remove(pathname_.c_str()); } |
| |
| void client_GET(const std::string &addr) { |
| httplib::Client cli{addr}; |
| cli.set_address_family(AF_UNIX); |
| ASSERT_TRUE(cli.is_valid()); |
| |
| const auto &result = cli.Get(pattern_); |
| ASSERT_TRUE(result) << "error: " << result.error(); |
| |
| const auto &resp = result.value(); |
| EXPECT_EQ(resp.status, StatusCode::OK_200); |
| EXPECT_EQ(resp.body, content_); |
| } |
| |
| const std::string pathname_{"./httplib-server.sock"}; |
| const std::string pattern_{"/hi"}; |
| const std::string content_{"Hello World!"}; |
| }; |
| |
| TEST_F(UnixSocketTest, pathname) { |
| httplib::Server svr; |
| svr.Get(pattern_, [&](const httplib::Request &, httplib::Response &res) { |
| res.set_content(content_, "text/plain"); |
| }); |
| |
| std::thread t{[&] { |
| ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); |
| }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ASSERT_TRUE(svr.is_running()); |
| |
| client_GET(pathname_); |
| } |
| |
| #if defined(__linux__) || \ |
| /* __APPLE__ */ (defined(SOL_LOCAL) && defined(SO_PEERPID)) |
| TEST_F(UnixSocketTest, PeerPid) { |
| httplib::Server svr; |
| std::string remote_port_val; |
| svr.Get(pattern_, [&](const httplib::Request &req, httplib::Response &res) { |
| res.set_content(content_, "text/plain"); |
| remote_port_val = std::to_string(req.remote_port); |
| }); |
| |
| std::thread t{[&] { |
| ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); |
| }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ASSERT_TRUE(svr.is_running()); |
| |
| client_GET(pathname_); |
| EXPECT_EQ(std::to_string(getpid()), remote_port_val); |
| } |
| #endif |
| |
| #ifdef __linux__ |
| TEST_F(UnixSocketTest, abstract) { |
| constexpr char svr_path[]{"\x00httplib-server.sock"}; |
| const std::string abstract_addr{svr_path, sizeof(svr_path) - 1}; |
| |
| httplib::Server svr; |
| svr.Get(pattern_, [&](const httplib::Request &, httplib::Response &res) { |
| res.set_content(content_, "text/plain"); |
| }); |
| |
| std::thread t{[&] { |
| ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(abstract_addr, 80)); |
| }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ASSERT_TRUE(svr.is_running()); |
| |
| client_GET(abstract_addr); |
| } |
| #endif |
| |
| TEST_F(UnixSocketTest, HostHeaderAutoSet) { |
| httplib::Server svr; |
| std::string received_host_header; |
| |
| svr.Get(pattern_, [&](const httplib::Request &req, httplib::Response &res) { |
| // Capture the Host header sent by the client |
| auto host_iter = req.headers.find("Host"); |
| if (host_iter != req.headers.end()) { |
| received_host_header = host_iter->second; |
| } |
| res.set_content(content_, "text/plain"); |
| }); |
| |
| std::thread t{[&] { |
| ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); |
| }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ASSERT_TRUE(svr.is_running()); |
| |
| // Test that Host header is automatically set to "localhost" for Unix socket |
| // connections |
| httplib::Client cli{pathname_}; |
| cli.set_address_family(AF_UNIX); |
| ASSERT_TRUE(cli.is_valid()); |
| |
| const auto &result = cli.Get(pattern_); |
| ASSERT_TRUE(result) << "error: " << result.error(); |
| |
| const auto &resp = result.value(); |
| EXPECT_EQ(resp.status, StatusCode::OK_200); |
| EXPECT_EQ(resp.body, content_); |
| |
| // Verify that Host header was automatically set to "localhost" |
| EXPECT_EQ(received_host_header, "localhost"); |
| } |
| |
| #ifndef _WIN32 |
| TEST(SocketStream, wait_writable_UNIX) { |
| int fds[2]; |
| ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_STREAM, 0, fds)); |
| |
| const auto asSocketStream = [&](socket_t fd, |
| std::function<bool(Stream &)> func) { |
| return detail::process_client_socket( |
| fd, 0, 0, 0, 0, 0, std::chrono::steady_clock::time_point::min(), func); |
| }; |
| asSocketStream(fds[0], [&](Stream &s0) { |
| EXPECT_EQ(s0.socket(), fds[0]); |
| EXPECT_TRUE(s0.wait_writable()); |
| |
| EXPECT_EQ(0, close(fds[1])); |
| EXPECT_FALSE(s0.wait_writable()); |
| |
| return true; |
| }); |
| EXPECT_EQ(0, close(fds[0])); |
| } |
| |
| TEST(SocketStream, wait_writable_INET) { |
| sockaddr_in addr; |
| memset(&addr, 0, sizeof(addr)); |
| addr.sin_family = AF_INET; |
| addr.sin_port = htons(PORT + 1); |
| addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); |
| |
| int disconnected_svr_sock = -1; |
| std::thread svr{[&] { |
| const int s = socket(AF_INET, SOCK_STREAM, 0); |
| ASSERT_LE(0, s); |
| ASSERT_EQ(0, ::bind(s, reinterpret_cast<sockaddr *>(&addr), sizeof(addr))); |
| ASSERT_EQ(0, listen(s, 1)); |
| ASSERT_LE(0, disconnected_svr_sock = accept(s, nullptr, nullptr)); |
| ASSERT_EQ(0, close(s)); |
| }}; |
| std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
| |
| std::thread cli{[&] { |
| const int s = socket(AF_INET, SOCK_STREAM, 0); |
| ASSERT_LE(0, s); |
| ASSERT_EQ(0, connect(s, reinterpret_cast<sockaddr *>(&addr), sizeof(addr))); |
| ASSERT_EQ(0, close(s)); |
| }}; |
| cli.join(); |
| svr.join(); |
| ASSERT_NE(disconnected_svr_sock, -1); |
| |
| const auto asSocketStream = [&](socket_t fd, |
| std::function<bool(Stream &)> func) { |
| return detail::process_client_socket( |
| fd, 0, 0, 0, 0, 0, std::chrono::steady_clock::time_point::min(), func); |
| }; |
| asSocketStream(disconnected_svr_sock, [&](Stream &ss) { |
| EXPECT_EQ(ss.socket(), disconnected_svr_sock); |
| EXPECT_FALSE(ss.wait_writable()); |
| |
| return true; |
| }); |
| |
| ASSERT_EQ(0, close(disconnected_svr_sock)); |
| } |
| #endif // #ifndef _WIN32 |
| |
| TEST(ClientTest, MoveConstructible) { |
| EXPECT_FALSE(std::is_copy_constructible<Client>::value); |
| EXPECT_TRUE(std::is_nothrow_move_constructible<Client>::value); |
| } |
| |
| TEST(ClientTest, MoveAssignable) { |
| EXPECT_FALSE(std::is_copy_assignable<Client>::value); |
| EXPECT_TRUE(std::is_nothrow_move_assignable<Client>::value); |
| } |
| |
| #ifdef _WIN32 |
| TEST(StartupTest, WSAStartup) { |
| WSADATA wsaData; |
| int ret = WSAStartup(0x0002, &wsaData); |
| ASSERT_EQ(0, ret); |
| } |
| #endif |
| |
| TEST(DecodePathTest, PercentCharacter) { |
| EXPECT_EQ( |
| decode_path_component( |
| R"(descrip=Gastos%20%C3%A1%C3%A9%C3%AD%C3%B3%C3%BA%C3%B1%C3%91%206)"), |
| U8("descrip=Gastos áéíóúñÑ 6")); |
| } |
| |
| TEST(DecodePathTest, PercentCharacterNUL) { |
| string expected; |
| expected.push_back('x'); |
| expected.push_back('\0'); |
| expected.push_back('x'); |
| |
| EXPECT_EQ(decode_path_component("x%00x"), expected); |
| } |
| |
| TEST(EncodeQueryParamTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'()"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(unescapedCharacters), "-_.!~*'()"); |
| } |
| |
| TEST(EncodeQueryParamTest, ParseReservedCharactersTest) { |
| string reservedCharacters = ";,/?:@&=+$"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(reservedCharacters), |
| "%3B%2C%2F%3F%3A%40%26%3D%2B%24"); |
| } |
| |
| TEST(ClientQueryOrder, PreserveOrder) { |
| // This test reproduces Issue #2259: client may reorder query parameters |
| // when sending a GET request. The expected behavior is that the client |
| // preserves the original query string order when the caller supplied it |
| // as part of the path. |
| Server svr; |
| svr.Get("/", [&](const Request &req, Response &res) { |
| // Echo back the raw target so the test can assert ordering |
| res.set_content(req.target, "text/plain"); |
| }); |
| |
| std::thread t{[&] { svr.listen(HOST, PORT); }}; |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| ASSERT_TRUE(cli.is_valid()); |
| |
| const std::string original = "/?z=1&y=2&x=3&c=7&b=8&a=9"; |
| auto res = cli.Get(original); |
| ASSERT_TRUE(res); |
| |
| // Expect the echoed target to exactly match the original path (order |
| // preserved) |
| EXPECT_EQ(res->body, original); |
| } |
| |
| TEST(EncodeQueryParamTest, TestUTF8Characters) { |
| string chineseCharacters = U8("中国語"); |
| string russianCharacters = U8("дом"); |
| string brazilianCharacters = U8("óculos"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(chineseCharacters), |
| "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(russianCharacters), |
| "%D0%B4%D0%BE%D0%BC"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(brazilianCharacters), "%C3%B3culos"); |
| } |
| |
| TEST(EncodeUriComponentTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'()"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(unescapedCharacters), "-_.!~*'()"); |
| } |
| |
| TEST(EncodeUriComponentTest, ParseReservedCharactersTest) { |
| string reservedCharacters = ";,/?:@&=+$"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(reservedCharacters), |
| "%3B%2C%2F%3F%3A%40%26%3D%2B%24"); |
| } |
| |
| TEST(EncodeUriComponentTest, TestUTF8Characters) { |
| string chineseCharacters = U8("中国語"); |
| string russianCharacters = U8("дом"); |
| string brazilianCharacters = U8("óculos"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(chineseCharacters), |
| "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(russianCharacters), |
| "%D0%B4%D0%BE%D0%BC"); |
| |
| EXPECT_EQ(httplib::encode_uri_component(brazilianCharacters), "%C3%B3culos"); |
| } |
| |
| TEST(EncodeUriComponentTest, TestPathComponentEncoding) { |
| // Issue #2082 use case: encoding path component with ampersand |
| string pathWithAmpersand = "Piri Tommy Villiers - on & on"; |
| |
| EXPECT_EQ(httplib::encode_uri_component(pathWithAmpersand), |
| "Piri%20Tommy%20Villiers%20-%20on%20%26%20on"); |
| } |
| |
| TEST(EncodeUriTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'()"; |
| |
| EXPECT_EQ(httplib::encode_uri(unescapedCharacters), "-_.!~*'()"); |
| } |
| |
| TEST(EncodeUriTest, ParseReservedCharactersTest) { |
| string reservedCharacters = ";,/?:@&=+$#"; |
| |
| EXPECT_EQ(httplib::encode_uri(reservedCharacters), ";,/?:@&=+$#"); |
| } |
| |
| TEST(EncodeUriTest, TestUTF8Characters) { |
| string chineseCharacters = U8("中国語"); |
| string russianCharacters = U8("дом"); |
| string brazilianCharacters = U8("óculos"); |
| |
| EXPECT_EQ(httplib::encode_uri(chineseCharacters), |
| "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); |
| |
| EXPECT_EQ(httplib::encode_uri(russianCharacters), "%D0%B4%D0%BE%D0%BC"); |
| |
| EXPECT_EQ(httplib::encode_uri(brazilianCharacters), "%C3%B3culos"); |
| } |
| |
| TEST(EncodeUriTest, TestCompleteUri) { |
| string uri = |
| "https://example.com/path/to/resource?query=value¶m=test#fragment"; |
| |
| EXPECT_EQ( |
| httplib::encode_uri(uri), |
| "https://example.com/path/to/resource?query=value¶m=test#fragment"); |
| } |
| |
| TEST(EncodeUriTest, TestUriWithSpacesAndSpecialChars) { |
| string uri = |
| "https://example.com/path with spaces/file name.html?q=hello world"; |
| |
| EXPECT_EQ(httplib::encode_uri(uri), |
| "https://example.com/path%20with%20spaces/" |
| "file%20name.html?q=hello%20world"); |
| } |
| |
| TEST(DecodeUriComponentTest, ParseEncodedChararactersTest) { |
| string encodedString = "%3B%2C%2F%3F%3A%40%26%3D%2B%24"; |
| |
| EXPECT_EQ(httplib::decode_uri_component(encodedString), ";,/?:@&=+$"); |
| } |
| |
| TEST(DecodeUriComponentTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'()"; |
| |
| EXPECT_EQ(httplib::decode_uri_component(unescapedCharacters), "-_.!~*'()"); |
| } |
| |
| TEST(DecodeUriComponentTest, TestUTF8Characters) { |
| string encodedChinese = "%E4%B8%AD%E5%9B%BD%E8%AA%9E"; |
| string encodedRussian = "%D0%B4%D0%BE%D0%BC"; |
| string encodedBrazilian = "%C3%B3culos"; |
| |
| EXPECT_EQ(httplib::decode_uri_component(encodedChinese), U8("中国語")); |
| EXPECT_EQ(httplib::decode_uri_component(encodedRussian), U8("дом")); |
| EXPECT_EQ(httplib::decode_uri_component(encodedBrazilian), U8("óculos")); |
| } |
| |
| TEST(DecodeUriComponentTest, TestPathComponentDecoding) { |
| string encodedPath = "Piri%20Tommy%20Villiers%20-%20on%20%26%20on"; |
| |
| EXPECT_EQ(httplib::decode_uri_component(encodedPath), |
| "Piri Tommy Villiers - on & on"); |
| } |
| |
| TEST(DecodeUriTest, ParseEncodedChararactersTest) { |
| string encodedString = "%20%22%3C%3E%5C%5E%60%7B%7D%7C"; |
| |
| EXPECT_EQ(httplib::decode_uri(encodedString), " \"<>\\^`{}|"); |
| } |
| |
| TEST(DecodeUriTest, ParseUnescapedChararactersTest) { |
| string unescapedCharacters = "-_.!~*'();,/?:@&=+$#"; |
| |
| EXPECT_EQ(httplib::decode_uri(unescapedCharacters), "-_.!~*'();,/?:@&=+$#"); |
| } |
| |
| TEST(DecodeUriTest, TestUTF8Characters) { |
| string encodedChinese = "%E4%B8%AD%E5%9B%BD%E8%AA%9E"; |
| string encodedRussian = "%D0%B4%D0%BE%D0%BC"; |
| string encodedBrazilian = "%C3%B3culos"; |
| |
| EXPECT_EQ(httplib::decode_uri(encodedChinese), U8("中国語")); |
| EXPECT_EQ(httplib::decode_uri(encodedRussian), U8("дом")); |
| EXPECT_EQ(httplib::decode_uri(encodedBrazilian), U8("óculos")); |
| } |
| |
| TEST(DecodeUriTest, TestCompleteUri) { |
| string encodedUri = "https://example.com/path%20with%20spaces/" |
| "file%20name.html?q=hello%20world"; |
| |
| EXPECT_EQ( |
| httplib::decode_uri(encodedUri), |
| "https://example.com/path with spaces/file name.html?q=hello world"); |
| } |
| |
| TEST(DecodeUriTest, TestRoundTripWithEncodeUri) { |
| string original = |
| "https://example.com/path with spaces/file name.html?q=hello world"; |
| string encoded = httplib::encode_uri(original); |
| string decoded = httplib::decode_uri(encoded); |
| |
| EXPECT_EQ(decoded, original); |
| } |
| |
| TEST(DecodeUriComponentTest, TestRoundTripWithEncodeUriComponent) { |
| string original = "Piri Tommy Villiers - on & on"; |
| string encoded = httplib::encode_uri_component(original); |
| string decoded = httplib::decode_uri_component(encoded); |
| |
| EXPECT_EQ(decoded, original); |
| } |
| |
| TEST(TrimTests, TrimStringTests) { |
| EXPECT_EQ("abc", detail::trim_copy("abc")); |
| EXPECT_EQ("abc", detail::trim_copy(" abc ")); |
| EXPECT_TRUE(detail::trim_copy("").empty()); |
| } |
| |
| TEST(ParseAcceptHeaderTest, BasicAcceptParsing) { |
| // Simple case without quality values |
| std::vector<std::string> result1; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html,application/json,text/plain", result1)); |
| EXPECT_EQ(result1.size(), 3U); |
| EXPECT_EQ(result1[0], "text/html"); |
| EXPECT_EQ(result1[1], "application/json"); |
| EXPECT_EQ(result1[2], "text/plain"); |
| |
| // With quality values |
| std::vector<std::string> result2; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html;q=0.9,application/json;q=1.0,text/plain;q=0.8", result2)); |
| EXPECT_EQ(result2.size(), 3U); |
| EXPECT_EQ(result2[0], "application/json"); // highest q value |
| EXPECT_EQ(result2[1], "text/html"); |
| EXPECT_EQ(result2[2], "text/plain"); // lowest q value |
| } |
| |
| TEST(ParseAcceptHeaderTest, MixedQualityValues) { |
| // Mixed with and without quality values |
| std::vector<std::string> result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html,application/json;q=0.5,text/plain;q=0.8", result)); |
| EXPECT_EQ(result.size(), 3U); |
| EXPECT_EQ(result[0], "text/html"); // no q value means 1.0 |
| EXPECT_EQ(result[1], "text/plain"); // q=0.8 |
| EXPECT_EQ(result[2], "application/json"); // q=0.5 |
| } |
| |
| TEST(ParseAcceptHeaderTest, EdgeCases) { |
| // Empty header |
| std::vector<std::string> empty_result; |
| EXPECT_TRUE(detail::parse_accept_header("", empty_result)); |
| EXPECT_TRUE(empty_result.empty()); |
| |
| // Single type |
| std::vector<std::string> single_result; |
| EXPECT_TRUE(detail::parse_accept_header("application/json", single_result)); |
| EXPECT_EQ(single_result.size(), 1U); |
| EXPECT_EQ(single_result[0], "application/json"); |
| |
| // Wildcard types |
| std::vector<std::string> wildcard_result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/*;q=0.5,*/*;q=0.1,application/json", wildcard_result)); |
| EXPECT_EQ(wildcard_result.size(), 3U); |
| EXPECT_EQ(wildcard_result[0], "application/json"); |
| EXPECT_EQ(wildcard_result[1], "text/*"); |
| EXPECT_EQ(wildcard_result[2], "*/*"); |
| } |
| |
| TEST(ParseAcceptHeaderTest, RealWorldExamples) { |
| // Common browser Accept header |
| std::vector<std::string> browser_result; |
| EXPECT_TRUE( |
| detail::parse_accept_header("text/html,application/xhtml+xml,application/" |
| "xml;q=0.9,image/webp,image/apng,*/*;q=0.8", |
| browser_result)); |
| EXPECT_EQ(browser_result.size(), 6U); |
| EXPECT_EQ(browser_result[0], "text/html"); // q=1.0 (default) |
| EXPECT_EQ(browser_result[1], "application/xhtml+xml"); // q=1.0 (default) |
| EXPECT_EQ(browser_result[2], "image/webp"); // q=1.0 (default) |
| EXPECT_EQ(browser_result[3], "image/apng"); // q=1.0 (default) |
| EXPECT_EQ(browser_result[4], "application/xml"); // q=0.9 |
| EXPECT_EQ(browser_result[5], "*/*"); // q=0.8 |
| |
| // API client header |
| std::vector<std::string> api_result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "application/json;q=0.9,application/xml;q=0.8,text/plain;q=0.1", |
| api_result)); |
| EXPECT_EQ(api_result.size(), 3U); |
| EXPECT_EQ(api_result[0], "application/json"); |
| EXPECT_EQ(api_result[1], "application/xml"); |
| EXPECT_EQ(api_result[2], "text/plain"); |
| } |
| |
| TEST(ParseAcceptHeaderTest, SpecialCases) { |
| // Quality value with 3 decimal places |
| std::vector<std::string> decimal_result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html;q=0.123,application/json;q=0.456", decimal_result)); |
| EXPECT_EQ(decimal_result.size(), 2U); |
| EXPECT_EQ(decimal_result[0], "application/json"); // Higher q value |
| EXPECT_EQ(decimal_result[1], "text/html"); |
| |
| // Zero quality (should still be included but with lowest priority) |
| std::vector<std::string> zero_q_result; |
| EXPECT_TRUE(detail::parse_accept_header("text/html;q=0,application/json;q=1", |
| zero_q_result)); |
| EXPECT_EQ(zero_q_result.size(), 2U); |
| EXPECT_EQ(zero_q_result[0], "application/json"); // q=1 |
| EXPECT_EQ(zero_q_result[1], "text/html"); // q=0 |
| |
| // No spaces around commas |
| std::vector<std::string> no_space_result; |
| EXPECT_TRUE(detail::parse_accept_header( |
| "text/html;q=0.9,application/json;q=0.8,text/plain;q=0.7", |
| no_space_result)); |
| EXPECT_EQ(no_space_result.size(), 3U); |
| EXPECT_EQ(no_space_result[0], "text/html"); |
| EXPECT_EQ(no_space_result[1], "application/json"); |
| EXPECT_EQ(no_space_result[2], "text/plain"); |
| } |
| |
| TEST(ParseAcceptHeaderTest, InvalidCases) { |
| std::vector<std::string> result; |
| |
| // Invalid quality value (> 1.0) |
| EXPECT_FALSE( |
| detail::parse_accept_header("text/html;q=1.5,application/json", result)); |
| |
| // Invalid quality value (< 0.0) |
| EXPECT_FALSE( |
| detail::parse_accept_header("text/html;q=-0.1,application/json", result)); |
| |
| // Invalid quality value (not a number) |
| EXPECT_FALSE(detail::parse_accept_header( |
| "text/html;q=invalid,application/json", result)); |
| |
| // Empty quality value |
| EXPECT_FALSE( |
| detail::parse_accept_header("text/html;q=,application/json", result)); |
| |
| // Invalid media type format (no slash and not wildcard) |
| EXPECT_FALSE( |
| detail::parse_accept_header("invalidtype,application/json", result)); |
| |
| // Empty media type |
| result.clear(); |
| EXPECT_FALSE(detail::parse_accept_header(",application/json", result)); |
| |
| // Only commas |
| result.clear(); |
| EXPECT_FALSE(detail::parse_accept_header(",,,", result)); |
| |
| // Valid cases should still work |
| EXPECT_TRUE(detail::parse_accept_header("*/*", result)); |
| EXPECT_EQ(result.size(), 1U); |
| EXPECT_EQ(result[0], "*/*"); |
| |
| EXPECT_TRUE(detail::parse_accept_header("*", result)); |
| EXPECT_EQ(result.size(), 1U); |
| EXPECT_EQ(result[0], "*"); |
| |
| EXPECT_TRUE(detail::parse_accept_header("text/*", result)); |
| EXPECT_EQ(result.size(), 1U); |
| EXPECT_EQ(result[0], "text/*"); |
| } |
| |
| TEST(ParseAcceptHeaderTest, ContentTypesPopulatedAndInvalidHeaderHandling) { |
| Server svr; |
| |
| svr.Get("/accept_ok", [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.accept_content_types.size(), 3U); |
| EXPECT_EQ(req.accept_content_types[0], "application/json"); |
| EXPECT_EQ(req.accept_content_types[1], "text/html"); |
| EXPECT_EQ(req.accept_content_types[2], "*/*"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| svr.Get("/accept_bad_request", [&](const Request & /*req*/, Response &res) { |
| EXPECT_TRUE(false); |
| res.set_content("bad request", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| { |
| auto res = |
| cli.Get("/accept_ok", |
| {{"Accept", "application/json, text/html;q=0.8, */*;q=0.1"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| auto res = cli.Get("/accept_bad_request", |
| {{"Accept", "text/html;q=abc,application/json"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } |
| } |
| |
| TEST(DivideTest, DivideStringTests) { |
| auto divide = [](const std::string &str, char d) { |
| std::string lhs; |
| std::string rhs; |
| |
| detail::divide(str, d, |
| [&](const char *lhs_data, std::size_t lhs_size, |
| const char *rhs_data, std::size_t rhs_size) { |
| lhs.assign(lhs_data, lhs_size); |
| rhs.assign(rhs_data, rhs_size); |
| }); |
| |
| return std::make_pair(std::move(lhs), std::move(rhs)); |
| }; |
| |
| { |
| const auto res = divide("", '='); |
| EXPECT_EQ(res.first, ""); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide("=", '='); |
| EXPECT_EQ(res.first, ""); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide(" ", '='); |
| EXPECT_EQ(res.first, " "); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide("a", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide("a=", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, ""); |
| } |
| |
| { |
| const auto res = divide("=b", '='); |
| EXPECT_EQ(res.first, ""); |
| EXPECT_EQ(res.second, "b"); |
| } |
| |
| { |
| const auto res = divide("a=b", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, "b"); |
| } |
| |
| { |
| const auto res = divide("a=b=", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, "b="); |
| } |
| |
| { |
| const auto res = divide("a=b=c", '='); |
| EXPECT_EQ(res.first, "a"); |
| EXPECT_EQ(res.second, "b=c"); |
| } |
| } |
| |
| TEST(SplitTest, ParseQueryString) { |
| string s = "key1=val1&key2=val2&key3=val3"; |
| Params dic; |
| |
| detail::split(s.c_str(), s.c_str() + s.size(), '&', |
| [&](const char *b, const char *e) { |
| string key, val; |
| detail::split(b, e, '=', [&](const char *b2, const char *e2) { |
| if (key.empty()) { |
| key.assign(b2, e2); |
| } else { |
| val.assign(b2, e2); |
| } |
| }); |
| dic.emplace(key, val); |
| }); |
| |
| EXPECT_EQ("val1", dic.find("key1")->second); |
| EXPECT_EQ("val2", dic.find("key2")->second); |
| EXPECT_EQ("val3", dic.find("key3")->second); |
| } |
| |
| TEST(SplitTest, ParseInvalidQueryTests) { |
| |
| { |
| string s = " "; |
| Params dict; |
| detail::parse_query_text(s, dict); |
| EXPECT_TRUE(dict.empty()); |
| } |
| |
| { |
| string s = " = ="; |
| Params dict; |
| detail::parse_query_text(s, dict); |
| EXPECT_TRUE(dict.empty()); |
| } |
| } |
| |
| TEST(ParseQueryTest, ParseQueryString) { |
| { |
| std::string s = "key1=val1&key2=val2&key3=val3"; |
| Params dic; |
| |
| detail::parse_query_text(s, dic); |
| |
| EXPECT_EQ("val1", dic.find("key1")->second); |
| EXPECT_EQ("val2", dic.find("key2")->second); |
| EXPECT_EQ("val3", dic.find("key3")->second); |
| } |
| |
| { |
| std::string s = "key1&key2=val1&key3=val1=val2&key4=val1=val2=val3"; |
| Params dic; |
| |
| detail::parse_query_text(s, dic); |
| |
| EXPECT_EQ("", dic.find("key1")->second); |
| EXPECT_EQ("val1", dic.find("key2")->second); |
| EXPECT_EQ("val1=val2", dic.find("key3")->second); |
| EXPECT_EQ("val1=val2=val3", dic.find("key4")->second); |
| } |
| } |
| |
| TEST(ParamsToQueryTest, ConvertParamsToQuery) { |
| Params dic; |
| |
| EXPECT_EQ(detail::params_to_query_str(dic), ""); |
| |
| dic.emplace("key1", "val1"); |
| |
| EXPECT_EQ(detail::params_to_query_str(dic), "key1=val1"); |
| |
| dic.emplace("key2", "val2"); |
| dic.emplace("key3", "val3"); |
| |
| EXPECT_EQ(detail::params_to_query_str(dic), "key1=val1&key2=val2&key3=val3"); |
| } |
| |
| TEST(ParseMultipartBoundaryTest, DefaultValue) { |
| string content_type = "multipart/form-data; boundary=something"; |
| string boundary; |
| auto ret = detail::parse_multipart_boundary(content_type, boundary); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(boundary, "something"); |
| } |
| |
| TEST(ParseMultipartBoundaryTest, ValueWithQuote) { |
| string content_type = "multipart/form-data; boundary=\"gc0pJq0M:08jU534c0p\""; |
| string boundary; |
| auto ret = detail::parse_multipart_boundary(content_type, boundary); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(boundary, "gc0pJq0M:08jU534c0p"); |
| } |
| |
| TEST(ParseMultipartBoundaryTest, ValueWithCharset) { |
| string content_type = |
| "multipart/mixed; boundary=THIS_STRING_SEPARATES;charset=UTF-8"; |
| string boundary; |
| auto ret = detail::parse_multipart_boundary(content_type, boundary); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(boundary, "THIS_STRING_SEPARATES"); |
| } |
| |
| TEST(ParseMultipartBoundaryTest, ValueWithQuotesAndCharset) { |
| string content_type = |
| "multipart/mixed; boundary=\"cpp-httplib-multipart-data\"; charset=UTF-8"; |
| string boundary; |
| auto ret = detail::parse_multipart_boundary(content_type, boundary); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(boundary, "cpp-httplib-multipart-data"); |
| } |
| |
| TEST(GetHeaderValueTest, DefaultValue) { |
| Headers headers = {{"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value(headers, "Content-Type", "text/plain", 0); |
| EXPECT_STREQ("text/plain", val); |
| } |
| |
| TEST(GetHeaderValueTest, DefaultValueInt) { |
| Headers headers = {{"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value_u64(headers, "Content-Length", 100, 0); |
| EXPECT_EQ(100ull, val); |
| } |
| |
| TEST(GetHeaderValueTest, RegularValue) { |
| Headers headers = {{"Content-Type", "text/html"}, {"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value(headers, "Content-Type", "text/plain", 0); |
| EXPECT_STREQ("text/html", val); |
| } |
| |
| TEST(GetHeaderValueTest, RegularValueWithDifferentCase) { |
| Headers headers = {{"Content-Type", "text/html"}, {"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value(headers, "content-type", "text/plain", 0); |
| EXPECT_STREQ("text/html", val); |
| } |
| |
| TEST(GetHeaderValueTest, SetContent) { |
| Response res; |
| |
| res.set_content("html", "text/html"); |
| EXPECT_EQ("text/html", res.get_header_value("Content-Type")); |
| |
| res.set_content("text", "text/plain"); |
| EXPECT_EQ(1U, res.get_header_value_count("Content-Type")); |
| EXPECT_EQ("text/plain", res.get_header_value("Content-Type")); |
| } |
| |
| TEST(GetHeaderValueTest, RegularValueInt) { |
| Headers headers = {{"Content-Length", "100"}, {"Dummy", "Dummy"}}; |
| auto val = detail::get_header_value_u64(headers, "Content-Length", 0, 0); |
| EXPECT_EQ(100ull, val); |
| } |
| |
| TEST(GetHeaderValueTest, RegularInvalidValueInt) { |
| Headers headers = {{"Content-Length", "x"}}; |
| auto is_invalid_value = false; |
| auto val = detail::get_header_value_u64(headers, "Content-Length", 0, 0, |
| is_invalid_value); |
| EXPECT_EQ(0ull, val); |
| EXPECT_TRUE(is_invalid_value); |
| } |
| |
| TEST(GetHeaderValueTest, Range) { |
| { |
| Headers headers = {make_range_header({{1, -1}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=1-", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{-1, 1}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=-1", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, 10}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=1-10", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, 10}, {100, -1}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=1-10, 100-", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, 10}, {100, 200}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=1-10, 100-200", val); |
| } |
| |
| { |
| Headers headers = {make_range_header({{0, 0}, {-1, 1}})}; |
| auto val = detail::get_header_value(headers, "Range", 0, 0); |
| EXPECT_STREQ("bytes=0-0, -1", val); |
| } |
| } |
| |
| TEST(ParseHeaderValueTest, Range) { |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=1-", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(1u, ranges.size()); |
| EXPECT_EQ(1u, ranges[0].first); |
| EXPECT_EQ(-1, ranges[0].second); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=-1", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(1u, ranges.size()); |
| EXPECT_EQ(-1, ranges[0].first); |
| EXPECT_EQ(1u, ranges[0].second); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=1-10", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(1u, ranges.size()); |
| EXPECT_EQ(1u, ranges[0].first); |
| EXPECT_EQ(10u, ranges[0].second); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=10-1", ranges); |
| EXPECT_FALSE(ret); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = detail::parse_range_header("bytes=1-10, 100-", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(2u, ranges.size()); |
| EXPECT_EQ(1u, ranges[0].first); |
| EXPECT_EQ(10u, ranges[0].second); |
| EXPECT_EQ(100u, ranges[1].first); |
| EXPECT_EQ(-1, ranges[1].second); |
| } |
| |
| { |
| Ranges ranges; |
| auto ret = |
| detail::parse_range_header("bytes=1-10, 100-200, 300-400", ranges); |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(3u, ranges.size()); |
| EXPECT_EQ(1u, ranges[0].first); |
| EXPECT_EQ(10u, ranges[0].second); |
| EXPECT_EQ(100u, ranges[1].first); |
| EXPECT_EQ(200u, ranges[1].second); |
| EXPECT_EQ(300u, ranges[2].first); |
| EXPECT_EQ(400u, ranges[2].second); |
| } |
| |
| { |
| Ranges ranges; |
| |
| EXPECT_FALSE(detail::parse_range_header("bytes", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=0", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=-", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes= ", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=,", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=,,", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=,,,", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=a-b", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=1-0", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=0--1", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=0- 1", ranges)); |
| EXPECT_FALSE(detail::parse_range_header("bytes=0 -1", ranges)); |
| EXPECT_TRUE(ranges.empty()); |
| } |
| } |
| |
| TEST(ParseAcceptEncoding1, AcceptEncoding) { |
| Request req; |
| req.set_header("Accept-Encoding", "gzip"); |
| |
| Response res; |
| res.set_header("Content-Type", "text/plain"); |
| |
| auto ret = detail::encoding_type(req, res); |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Gzip); |
| #else |
| EXPECT_TRUE(ret == detail::EncodingType::None); |
| #endif |
| } |
| |
| TEST(ParseAcceptEncoding2, AcceptEncoding) { |
| Request req; |
| req.set_header("Accept-Encoding", "gzip, deflate, br, zstd"); |
| |
| Response res; |
| res.set_header("Content-Type", "text/plain"); |
| |
| auto ret = detail::encoding_type(req, res); |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Brotli); |
| #elif CPPHTTPLIB_ZLIB_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Gzip); |
| #elif CPPHTTPLIB_ZSTD_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Zstd); |
| #else |
| EXPECT_TRUE(ret == detail::EncodingType::None); |
| #endif |
| } |
| |
| TEST(ParseAcceptEncoding3, AcceptEncoding) { |
| Request req; |
| req.set_header("Accept-Encoding", |
| "br;q=1.0, gzip;q=0.8, zstd;q=0.8, *;q=0.1"); |
| |
| Response res; |
| res.set_header("Content-Type", "text/plain"); |
| |
| auto ret = detail::encoding_type(req, res); |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Brotli); |
| #elif CPPHTTPLIB_ZLIB_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Gzip); |
| #elif CPPHTTPLIB_ZSTD_SUPPORT |
| EXPECT_TRUE(ret == detail::EncodingType::Zstd); |
| #else |
| EXPECT_TRUE(ret == detail::EncodingType::None); |
| #endif |
| } |
| |
| TEST(BufferStreamTest, read) { |
| detail::BufferStream strm1; |
| Stream &strm = strm1; |
| |
| EXPECT_EQ(5, strm.write("hello")); |
| |
| char buf[512]; |
| EXPECT_EQ(2, strm.read(buf, 2)); |
| EXPECT_EQ('h', buf[0]); |
| EXPECT_EQ('e', buf[1]); |
| |
| EXPECT_EQ(2, strm.read(buf, 2)); |
| EXPECT_EQ('l', buf[0]); |
| EXPECT_EQ('l', buf[1]); |
| |
| EXPECT_EQ(1, strm.read(buf, 1)); |
| EXPECT_EQ('o', buf[0]); |
| |
| EXPECT_EQ(0, strm.read(buf, 1)); |
| } |
| |
| TEST(HostnameToIPConversionTest, HTTPWatch_Online) { |
| auto host = "www.httpwatch.com"; |
| |
| auto ip = hosted_at(host); |
| EXPECT_EQ("23.96.13.243", ip); |
| |
| std::vector<std::string> addrs; |
| hosted_at(host, addrs); |
| EXPECT_EQ(1u, addrs.size()); |
| } |
| |
| #if 0 // It depends on each test environment... |
| TEST(HostnameToIPConversionTest, YouTube_Online) { |
| auto host = "www.youtube.com"; |
| |
| std::vector<std::string> addrs; |
| hosted_at(host, addrs); |
| |
| EXPECT_EQ(20u, addrs.size()); |
| |
| auto it = std::find(addrs.begin(), addrs.end(), "2607:f8b0:4006:809::200e"); |
| EXPECT_TRUE(it != addrs.end()); |
| } |
| #endif |
| |
| class ChunkedEncodingTest : public ::testing::Test { |
| protected: |
| ChunkedEncodingTest() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| cli_.set_connection_timeout(2); |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| read_file("./image.jpg", image_data_); |
| |
| svr_.Get("/hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| svr_.Get( |
| "/chunked", [this](const httplib::Request &, httplib::Response &res) { |
| res.set_chunked_content_provider( |
| "image/jpeg", [this](size_t offset, httplib::DataSink &sink) { |
| size_t remaining = image_data_.size() - offset; |
| if (remaining == 0) { |
| sink.done(); |
| } else { |
| constexpr size_t CHUNK_SIZE = 1024; |
| size_t send_size = std::min(CHUNK_SIZE, remaining); |
| sink.write(&image_data_[offset], send_size); |
| |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| return true; |
| }); |
| }); |
| |
| t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| if (!request_threads_.empty()) { |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| for (auto &t : request_threads_) { |
| t.join(); |
| } |
| } |
| t_.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| std::vector<thread> request_threads_; |
| std::string image_data_; |
| }; |
| |
| TEST_F(ChunkedEncodingTest, NormalGet) { |
| auto res = cli_.Get("/chunked"); |
| ASSERT_TRUE(res); |
| |
| std::string out; |
| read_file("./image.jpg", out); |
| |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(out, res->body); |
| } |
| |
| TEST_F(ChunkedEncodingTest, WithContentReceiver) { |
| std::string body; |
| auto res = cli_.Get("/chunked", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| ASSERT_TRUE(res); |
| |
| std::string out; |
| read_file("./image.jpg", out); |
| |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(out, body); |
| } |
| |
| TEST_F(ChunkedEncodingTest, WithResponseHandlerAndContentReceiver) { |
| std::string body; |
| auto res = cli_.Get( |
| "/chunked", |
| [&](const Response &response) { |
| EXPECT_EQ(StatusCode::OK_200, response.status); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| ASSERT_TRUE(res); |
| |
| std::string out; |
| read_file("./image.jpg", out); |
| |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(out, body); |
| } |
| |
| TEST(RangeTest, FromHTTPBin_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpcan.org"; |
| auto path = std::string{"/range/32"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/32"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(5); |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, -1}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("bcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{1, 10}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("bcdefghijk", res->body); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{0, 31}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{0, -1}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Headers headers = {make_range_header({{0, 32}})}; |
| auto res = cli.Get(path, headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| } |
| } |
| |
| TEST(GetAddrInfoDanglingRefTest, LongTimeout) { |
| auto host = "unresolvableaddress.local"; |
| auto path = std::string{"/"}; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(1); |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_FALSE(res); |
| } |
| |
| std::this_thread::sleep_for(std::chrono::seconds(8)); |
| } |
| |
| TEST(ConnectionErrorTest, InvalidHost) { |
| auto host = "-abcde.com"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| |
| TEST(ConnectionErrorTest, InvalidHost2) { |
| auto host = "httpcan.org/"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| |
| TEST(ConnectionErrorTest, InvalidHostCheckResultErrorToString) { |
| auto host = "httpcan.org/"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| stringstream s; |
| s << "error code: " << res.error(); |
| EXPECT_EQ("error code: Could not establish connection (2)", s.str()); |
| } |
| |
| TEST(ConnectionErrorTest, InvalidPort) { |
| auto host = "localhost"; |
| auto port = 44380; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host, port); |
| #else |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_TRUE(Error::Connection == res.error() || |
| Error::ConnectionTimeout == res.error()); |
| } |
| |
| TEST(ConnectionErrorTest, Timeout_Online) { |
| auto host = "google.com"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| auto port = 44380; |
| SSLClient cli(host, port); |
| #else |
| auto port = 8080; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(2)); |
| |
| // only probe one address type so that the error reason |
| // correlates to the timed-out IPv4, not the unsupported |
| // IPv6 connection attempt |
| cli.set_address_family(AF_INET); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::ConnectionTimeout, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancel_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpcan.org"; |
| auto path = std::string{"/range/32"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/32"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = cli.Get(path, [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayload_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpcan.org"; |
| auto path = std::string{"/range/32"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/32"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| |
| auto res = cli.Get(path, [](uint64_t, uint64_t) { return false; }); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayload_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpcan.org"; |
| auto path = std::string{"/range/65536"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/65536"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| uint32_t count = 0; |
| auto res = |
| cli.Get(path, [&count](uint64_t, uint64_t) { return (count++ == 0); }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancelPost) { |
| Server svr; |
| |
| svr.Post("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayloadPost) { |
| Server svr; |
| |
| svr.Post("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayloadPost) { |
| Server svr; |
| |
| svr.Post("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(LARGE_DATA, "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancelPut) { |
| Server svr; |
| |
| svr.Put("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayloadPut) { |
| Server svr; |
| |
| svr.Put("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayloadPut) { |
| Server svr; |
| |
| svr.Put("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(LARGE_DATA, "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancelPatch) { |
| Server svr; |
| |
| svr.Patch("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayloadPatch) { |
| Server svr; |
| |
| svr.Patch("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayloadPatch) { |
| Server svr; |
| |
| svr.Patch("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(LARGE_DATA, "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, NoCancelDelete) { |
| Server svr; |
| |
| svr.Delete("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return true; }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(CancelTest, WithCancelSmallPayloadDelete) { |
| Server svr; |
| |
| svr.Delete("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST(CancelTest, WithCancelLargePayloadDelete) { |
| Server svr; |
| |
| svr.Delete("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(LARGE_DATA, "text/plain"); |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_connection_timeout(std::chrono::seconds(5)); |
| |
| auto res = |
| cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), |
| "application/json", [](uint64_t, uint64_t) { return false; }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| static std::string remove_whitespace(const std::string &input) { |
| std::string output; |
| output.reserve(input.size()); |
| std::copy_if(input.begin(), input.end(), std::back_inserter(output), |
| [](unsigned char c) { return !std::isspace(c); }); |
| return output; |
| } |
| |
| TEST(BaseAuthTest, FromHTTPWatch_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpcan.org"; |
| auto path = std::string{"/basic-auth/hello/world"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/basic-auth/hello/world"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| auto port = 443; |
| SSLClient cli(host, port); |
| #else |
| auto port = 80; |
| Client cli(host, port); |
| #endif |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| { |
| auto res = |
| cli.Get(path, {make_basic_authentication_header("hello", "world")}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", |
| remove_whitespace(res->body)); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| cli.set_basic_auth("hello", "world"); |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", |
| remove_whitespace(res->body)); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| cli.set_basic_auth("hello", "bad"); |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| { |
| cli.set_basic_auth("bad", "world"); |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(DigestAuthTest, FromHTTPWatch_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpcan.org"; |
| auto unauth_path = std::string{"/digest-auth/auth/hello/world"}; |
| auto paths = std::vector<std::string>{ |
| "/digest-auth/auth/hello/world/MD5", |
| "/digest-auth/auth/hello/world/SHA-256", |
| "/digest-auth/auth/hello/world/SHA-512", |
| }; |
| #else |
| auto host = "nghttp2.org"; |
| auto unauth_path = std::string{"/httpbin/digest-auth/auth/hello/world"}; |
| auto paths = std::vector<std::string>{ |
| "/httpbin/digest-auth/auth/hello/world/MD5", |
| "/httpbin/digest-auth/auth/hello/world/SHA-256", |
| "/httpbin/digest-auth/auth/hello/world/SHA-512", |
| "/httpbin/digest-auth/auth-int/hello/world/MD5", |
| }; |
| #endif |
| |
| auto port = 443; |
| SSLClient cli(host, port); |
| |
| { |
| auto res = cli.Get(unauth_path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| { |
| |
| cli.set_digest_auth("hello", "world"); |
| for (const auto &path : paths) { |
| auto res = cli.Get(path.c_str()); |
| ASSERT_TRUE(res); |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| std::string algo(path.substr(path.rfind('/') + 1)); |
| EXPECT_EQ( |
| remove_whitespace("{\"algorithm\":\"" + algo + |
| "\",\"authenticated\":true,\"user\":\"hello\"}\n"), |
| remove_whitespace(res->body)); |
| #else |
| EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", |
| remove_whitespace(res->body)); |
| #endif |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| cli.set_digest_auth("hello", "bad"); |
| for (const auto &path : paths) { |
| auto res = cli.Get(path.c_str()); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| #endif |
| } |
| } |
| |
| #endif |
| |
| TEST(SpecifyServerIPAddressTest, AnotherHostname_Online) { |
| auto host = "google.com"; |
| auto another_host = "example.com"; |
| auto wrong_ip = "0.0.0.0"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_hostname_addr_map({{another_host, wrong_ip}}); |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SpecifyServerIPAddressTest, RealHostname_Online) { |
| auto host = "google.com"; |
| auto wrong_ip = "0.0.0.0"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_hostname_addr_map({{host, wrong_ip}}); |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| |
| TEST(AbsoluteRedirectTest, Redirect_Online) { |
| auto host = "nghttp2.org"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_follow_location(true); |
| auto res = cli.Get("/httpbin/absolute-redirect/3"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(RedirectTest, Redirect_Online) { |
| auto host = "nghttp2.org"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_follow_location(true); |
| auto res = cli.Get("/httpbin/redirect/3"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(RelativeRedirectTest, Redirect_Online) { |
| auto host = "nghttp2.org"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_follow_location(true); |
| auto res = cli.Get("/httpbin/relative-redirect/3"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(TooManyRedirectTest, Redirect_Online) { |
| auto host = "nghttp2.org"; |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_follow_location(true); |
| auto res = cli.Get("/httpbin/redirect/21"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::ExceedRedirectCount, res.error()); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(YahooRedirectTest, Redirect_Online) { |
| Client cli("yahoo.com"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("https://www.yahoo.com/", res->location); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| // Previously "nghttp2.org" "/httpbin/redirect-to" |
| #define REDIR_HOST "httpbingo.org" |
| #define REDIR_PATH "/redirect-to" |
| |
| TEST(HttpsToHttpRedirectTest, Redirect_Online) { |
| SSLClient cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| auto res = |
| cli.Get(REDIR_PATH "?url=http%3A%2F%2Fexample.com&status_code=302"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpsToHttpRedirectTest2, Redirect_Online) { |
| SSLClient cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| |
| Params params; |
| params.emplace("url", "http://example.com"); |
| params.emplace("status_code", "302"); |
| |
| auto res = cli.Get(REDIR_PATH, params, Headers{}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpsToHttpRedirectTest3, Redirect_Online) { |
| SSLClient cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| |
| Params params; |
| params.emplace("url", "http://example.com"); |
| |
| auto res = cli.Get(REDIR_PATH "?status_code=302", params, Headers{}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(UrlWithSpace, Redirect_Online) { |
| SSLClient cli("edge.forgecdn.net"); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/files/2595/310/Neat 1.4-17.jar"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(18527U, res->get_header_value_u64("Content-Length")); |
| } |
| #endif |
| |
| #if !defined(_WIN32) && !defined(_WIN64) |
| TEST(ReceiveSignals, Signal) { |
| auto setupSignalHandlers = []() { |
| struct sigaction act; |
| |
| sigemptyset(&act.sa_mask); |
| act.sa_flags = SA_SIGINFO; |
| act.sa_sigaction = [](int sig, siginfo_t *, void *) { |
| switch (sig) { |
| case SIGINT: |
| default: break; |
| } |
| }; |
| ::sigaction(SIGINT, &act, nullptr); |
| }; |
| |
| Server svr; |
| int port = 0; |
| auto thread = std::thread([&]() { |
| setupSignalHandlers(); |
| port = svr.bind_to_any_port(HOST); |
| svr.listen_after_bind(); |
| }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| ASSERT_TRUE(svr.is_running()); |
| pthread_kill(thread.native_handle(), SIGINT); |
| std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
| ASSERT_TRUE(svr.is_running()); |
| } |
| #endif |
| |
| TEST(RedirectToDifferentPort, Redirect) { |
| Server svr1; |
| svr1.Get("/1", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| int svr1_port = 0; |
| auto thread1 = std::thread([&]() { |
| svr1_port = svr1.bind_to_any_port(HOST); |
| svr1.listen_after_bind(); |
| }); |
| |
| Server svr2; |
| svr2.Get("/2", [&](const Request & /*req*/, Response &res) { |
| res.set_redirect("http://localhost:" + std::to_string(svr1_port) + "/1"); |
| }); |
| |
| int svr2_port = 0; |
| auto thread2 = std::thread([&]() { |
| svr2_port = svr2.bind_to_any_port(HOST); |
| svr2.listen_after_bind(); |
| }); |
| auto se = detail::scope_exit([&] { |
| svr2.stop(); |
| thread2.join(); |
| svr1.stop(); |
| thread1.join(); |
| ASSERT_FALSE(svr2.is_running()); |
| ASSERT_FALSE(svr1.is_running()); |
| }); |
| |
| svr1.wait_until_ready(); |
| svr2.wait_until_ready(); |
| |
| Client cli("localhost", svr2_port); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/2"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| TEST(RedirectFromPageWithContent, Redirect) { |
| Server svr; |
| |
| svr.Get("/1", [&](const Request & /*req*/, Response &res) { |
| res.set_content("___", "text/plain"); |
| res.set_redirect("/2"); |
| }); |
| |
| svr.Get("/2", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto th = std::thread([&]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| th.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli("localhost", PORT); |
| cli.set_follow_location(true); |
| |
| std::string body; |
| auto res = cli.Get("/1", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", body); |
| } |
| |
| { |
| Client cli("localhost", PORT); |
| |
| std::string body; |
| auto res = cli.Get("/1", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Found_302, res->status); |
| EXPECT_EQ("___", body); |
| } |
| } |
| |
| TEST(RedirectFromPageWithContentIP6, Redirect) { |
| Server svr; |
| |
| svr.Get("/1", [&](const Request & /*req*/, Response &res) { |
| res.set_content("___", "text/plain"); |
| // res.set_redirect("/2"); |
| res.set_redirect("http://[::1]:1234/2"); |
| }); |
| |
| svr.Get("/2", [&](const Request &req, Response &res) { |
| auto host_header = req.headers.find("Host"); |
| ASSERT_TRUE(host_header != req.headers.end()); |
| EXPECT_EQ("[::1]:1234", host_header->second); |
| |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto th = std::thread([&]() { svr.listen("::1", 1234); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| th.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| // When IPV6 support isn't available svr.listen("::1", 1234) never |
| // actually starts anything, so the condition !svr.is_running() will |
| // always remain true, and the loop never stops. |
| // This basically counts how many milliseconds have passed since the |
| // call to svr.listen(), and if after 5 seconds nothing started yet |
| // aborts the test. |
| for (unsigned int milliseconds = 0; !svr.is_running(); milliseconds++) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(1)); |
| ASSERT_LT(milliseconds, 5000U); |
| } |
| |
| { |
| Client cli("http://[::1]:1234"); |
| cli.set_follow_location(true); |
| |
| std::string body; |
| auto res = cli.Get("/1", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", body); |
| } |
| |
| { |
| Client cli("http://[::1]:1234"); |
| |
| std::string body; |
| auto res = cli.Get("/1", [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Found_302, res->status); |
| EXPECT_EQ("___", body); |
| } |
| } |
| |
| TEST(PathUrlEncodeTest, PathUrlEncode) { |
| Server svr; |
| |
| svr.Get("/foo", [](const Request &req, Response &res) { |
| auto a = req.params.find("a"); |
| if (a != req.params.end()) { |
| res.set_content((*a).second, "text/plain"); |
| res.status = StatusCode::OK_200; |
| } else { |
| res.status = StatusCode::BadRequest_400; |
| } |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_path_encode(false); |
| |
| auto res = cli.Get("/foo?a=explicitly+encoded"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| // This expects it back with a space, as the `+` won't have been |
| // url-encoded, and server-side the params get decoded turning `+` |
| // into spaces. |
| EXPECT_EQ("explicitly encoded", res->body); |
| } |
| } |
| |
| TEST(PathUrlEncodeTest, IncludePercentEncodingLF) { |
| Server svr; |
| |
| svr.Get("/", [](const Request &req, Response &) { |
| EXPECT_EQ("\x0A", req.get_param_value("something")); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_path_encode(false); |
| |
| auto res = cli.Get("/?something=%0A"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(BindServerTest, DISABLED_BindDualStack) { |
| Server svr; |
| |
| svr.Get("/1", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen("::", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli("127.0.0.1", PORT); |
| |
| auto res = cli.Get("/1"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| { |
| Client cli("::1", PORT); |
| |
| auto res = cli.Get("/1"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| } |
| |
| TEST(BindServerTest, BindAndListenSeparately) { |
| Server svr; |
| int port = svr.bind_to_any_port("0.0.0.0"); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(port > 0); |
| svr.stop(); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(BindServerTest, BindAndListenSeparatelySSL) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, |
| CLIENT_CA_CERT_DIR); |
| int port = svr.bind_to_any_port("0.0.0.0"); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(port > 0); |
| svr.stop(); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(BindServerTest, BindAndListenSeparatelySSLEncryptedKey) { |
| SSLServer svr(SERVER_ENCRYPTED_CERT_FILE, SERVER_ENCRYPTED_PRIVATE_KEY_FILE, |
| nullptr, nullptr, SERVER_ENCRYPTED_PRIVATE_KEY_PASS); |
| int port = svr.bind_to_any_port("0.0.0.0"); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(port > 0); |
| svr.stop(); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| X509 *readCertificate(const std::string &strFileName) { |
| std::ifstream inStream(strFileName); |
| std::string strCertPEM((std::istreambuf_iterator<char>(inStream)), |
| std::istreambuf_iterator<char>()); |
| |
| if (strCertPEM.empty()) return (nullptr); |
| |
| BIO *pbCert = BIO_new(BIO_s_mem()); |
| BIO_write(pbCert, strCertPEM.c_str(), (int)strCertPEM.size()); |
| X509 *pCert = PEM_read_bio_X509(pbCert, NULL, 0, NULL); |
| BIO_free(pbCert); |
| |
| return (pCert); |
| } |
| |
| EVP_PKEY *readPrivateKey(const std::string &strFileName) { |
| std::ifstream inStream(strFileName); |
| std::string strPrivateKeyPEM((std::istreambuf_iterator<char>(inStream)), |
| std::istreambuf_iterator<char>()); |
| |
| if (strPrivateKeyPEM.empty()) return (nullptr); |
| |
| BIO *pbPrivKey = BIO_new(BIO_s_mem()); |
| BIO_write(pbPrivKey, strPrivateKeyPEM.c_str(), (int)strPrivateKeyPEM.size()); |
| EVP_PKEY *pPrivateKey = PEM_read_bio_PrivateKey(pbPrivKey, NULL, NULL, NULL); |
| BIO_free(pbPrivKey); |
| |
| return (pPrivateKey); |
| } |
| |
| TEST(BindServerTest, UpdateCerts) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); |
| int port = svr.bind_to_any_port("0.0.0.0"); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(port > 0); |
| |
| X509 *cert = readCertificate(SERVER_CERT_FILE); |
| X509 *ca_cert = readCertificate(CLIENT_CA_CERT_FILE); |
| EVP_PKEY *key = readPrivateKey(SERVER_PRIVATE_KEY_FILE); |
| |
| ASSERT_TRUE(cert != nullptr); |
| ASSERT_TRUE(ca_cert != nullptr); |
| ASSERT_TRUE(key != nullptr); |
| |
| X509_STORE *cert_store = X509_STORE_new(); |
| |
| X509_STORE_add_cert(cert_store, ca_cert); |
| |
| svr.update_certs(cert, key, cert_store); |
| |
| ASSERT_TRUE(svr.is_valid()); |
| svr.stop(); |
| |
| X509_free(cert); |
| X509_free(ca_cert); |
| EVP_PKEY_free(key); |
| } |
| |
| // Test that SSLServer(X509*, EVP_PKEY*, X509_STORE*) constructor sets |
| // client CA list correctly for TLS handshake |
| TEST(SSLClientServerTest, X509ConstructorSetsClientCAList) { |
| X509 *cert = readCertificate(SERVER_CERT_FILE); |
| X509 *ca_cert = readCertificate(CLIENT_CA_CERT_FILE); |
| EVP_PKEY *key = readPrivateKey(SERVER_PRIVATE_KEY_FILE); |
| |
| ASSERT_TRUE(cert != nullptr); |
| ASSERT_TRUE(ca_cert != nullptr); |
| ASSERT_TRUE(key != nullptr); |
| |
| X509_STORE *cert_store = X509_STORE_new(); |
| X509_STORE_add_cert(cert_store, ca_cert); |
| |
| // Use X509-based constructor (deprecated but should still work correctly) |
| #pragma GCC diagnostic push |
| #pragma GCC diagnostic ignored "-Wdeprecated-declarations" |
| SSLServer svr(cert, key, cert_store); |
| #pragma GCC diagnostic pop |
| |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // Verify that client CA list is set in SSL_CTX |
| auto ssl_ctx = static_cast<SSL_CTX *>(svr.tls_context()); |
| ASSERT_TRUE(ssl_ctx != nullptr); |
| |
| STACK_OF(X509_NAME) *ca_list = SSL_CTX_get_client_CA_list(ssl_ctx); |
| ASSERT_TRUE(ca_list != nullptr); |
| EXPECT_GT(sk_X509_NAME_num(ca_list), 0); |
| |
| X509_free(cert); |
| X509_free(ca_cert); |
| EVP_PKEY_free(key); |
| } |
| |
| // Test that update_certs() updates client CA list correctly |
| TEST(SSLClientServerTest, UpdateCertsSetsClientCAList) { |
| // Start with file-based constructor |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // Initially no client CA list should be set |
| auto ssl_ctx = static_cast<SSL_CTX *>(svr.tls_context()); |
| ASSERT_TRUE(ssl_ctx != nullptr); |
| |
| STACK_OF(X509_NAME) *ca_list_before = SSL_CTX_get_client_CA_list(ssl_ctx); |
| int count_before = ca_list_before ? sk_X509_NAME_num(ca_list_before) : 0; |
| EXPECT_EQ(0, count_before); |
| |
| // Now update with client CA |
| X509 *cert = readCertificate(SERVER_CERT_FILE); |
| X509 *ca_cert = readCertificate(CLIENT_CA_CERT_FILE); |
| EVP_PKEY *key = readPrivateKey(SERVER_PRIVATE_KEY_FILE); |
| |
| ASSERT_TRUE(cert != nullptr); |
| ASSERT_TRUE(ca_cert != nullptr); |
| ASSERT_TRUE(key != nullptr); |
| |
| X509_STORE *cert_store = X509_STORE_new(); |
| X509_STORE_add_cert(cert_store, ca_cert); |
| |
| #pragma GCC diagnostic push |
| #pragma GCC diagnostic ignored "-Wdeprecated-declarations" |
| svr.update_certs(cert, key, cert_store); |
| #pragma GCC diagnostic pop |
| |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // Now client CA list should be set |
| STACK_OF(X509_NAME) *ca_list_after = SSL_CTX_get_client_CA_list(ssl_ctx); |
| ASSERT_TRUE(ca_list_after != nullptr); |
| EXPECT_GT(sk_X509_NAME_num(ca_list_after), 0); |
| |
| X509_free(cert); |
| X509_free(ca_cert); |
| EVP_PKEY_free(key); |
| } |
| #endif |
| |
| TEST(ErrorHandlerTest, ContentLength) { |
| Server svr; |
| |
| svr.set_error_handler([](const Request & /*req*/, Response &res) { |
| res.status = StatusCode::OK_200; |
| res.set_content("abcdefghijklmnopqrstuvwxyz", |
| "text/html"); // <= Content-Length still 13 |
| }); |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!\n", "text/plain"); |
| res.status = 524; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); |
| } |
| } |
| |
| #ifndef CPPHTTPLIB_NO_EXCEPTIONS |
| TEST(ExceptionTest, WithoutExceptionHandler) { |
| Server svr; |
| |
| svr.Get("/exception", [&](const Request & /*req*/, Response & /*res*/) { |
| throw std::runtime_error("exception..."); |
| }); |
| |
| svr.Get("/unknown", [&](const Request & /*req*/, Response & /*res*/) { |
| throw std::runtime_error("exception\r\n..."); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| { |
| auto res = cli.Get("/exception"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| ASSERT_TRUE(res->has_header("EXCEPTION_WHAT")); |
| EXPECT_EQ("exception...", res->get_header_value("EXCEPTION_WHAT")); |
| } |
| |
| { |
| auto res = cli.Get("/unknown"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| ASSERT_TRUE(res->has_header("EXCEPTION_WHAT")); |
| EXPECT_EQ("exception\\r\\n...", res->get_header_value("EXCEPTION_WHAT")); |
| } |
| } |
| |
| TEST(ExceptionTest, WithExceptionHandler) { |
| Server svr; |
| |
| svr.set_exception_handler([](const Request & /*req*/, Response &res, |
| std::exception_ptr ep) { |
| EXPECT_FALSE(ep == nullptr); |
| try { |
| std::rethrow_exception(ep); |
| } catch (std::exception &e) { |
| EXPECT_EQ("abc", std::string(e.what())); |
| } catch (...) {} |
| res.status = StatusCode::InternalServerError_500; |
| res.set_content("abcdefghijklmnopqrstuvwxyz", |
| "text/html"); // <= Content-Length still 13 at this point |
| }); |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!\n", "text/plain"); |
| throw std::runtime_error("abc"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| for (size_t i = 0; i < 10; i++) { |
| Client cli(HOST, PORT); |
| |
| for (size_t j = 0; j < 100; j++) { |
| auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); |
| } |
| |
| cli.set_keep_alive(true); |
| |
| for (size_t j = 0; j < 100; j++) { |
| auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); |
| } |
| } |
| } |
| |
| TEST(ExceptionTest, AndErrorHandler) { |
| Server svr; |
| |
| svr.set_error_handler([](const Request & /*req*/, Response &res) { |
| if (res.body.empty()) { res.set_content("NOT_FOUND", "text/html"); } |
| }); |
| |
| svr.set_exception_handler( |
| [](const Request & /*req*/, Response &res, std::exception_ptr ep) { |
| EXPECT_FALSE(ep == nullptr); |
| try { |
| std::rethrow_exception(ep); |
| } catch (std::exception &e) { |
| res.set_content(e.what(), "text/html"); |
| } catch (...) {} |
| res.status = StatusCode::InternalServerError_500; |
| }); |
| |
| svr.Get("/exception", [](const Request & /*req*/, Response & /*res*/) { |
| throw std::runtime_error("EXCEPTION"); |
| }); |
| |
| svr.Get("/error", [](const Request & /*req*/, Response &res) { |
| res.set_content("ERROR", "text/html"); |
| res.status = StatusCode::InternalServerError_500; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| { |
| auto res = cli.Get("/exception"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("EXCEPTION", res->body); |
| } |
| |
| { |
| auto res = cli.Get("/error"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::InternalServerError_500, res->status); |
| EXPECT_EQ("ERROR", res->body); |
| } |
| |
| { |
| auto res = cli.Get("/invalid"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| EXPECT_EQ("NOT_FOUND", res->body); |
| } |
| } |
| #endif |
| |
| TEST(NoContentTest, ContentLength) { |
| Server svr; |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.status = StatusCode::NoContent_204; |
| }); |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NoContent_204, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| } |
| } |
| |
| TEST(RoutingHandlerTest, PreAndPostRoutingHandlers) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| #else |
| Server svr; |
| #endif |
| |
| svr.set_pre_routing_handler([](const Request &req, Response &res) { |
| if (req.path == "/routing_handler") { |
| res.set_header("PRE_ROUTING", "on"); |
| res.set_content("Routing Handler", "text/plain"); |
| return httplib::Server::HandlerResponse::Handled; |
| } |
| return httplib::Server::HandlerResponse::Unhandled; |
| }); |
| |
| svr.set_error_handler([](const Request & /*req*/, Response &res) { |
| res.set_content("Error", "text/html"); |
| }); |
| |
| svr.set_post_routing_handler([](const Request &req, Response &res) { |
| if (req.path == "/routing_handler") { |
| res.set_header("POST_ROUTING", "on"); |
| } |
| }); |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!\n", "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| #else |
| Client cli(HOST, PORT); |
| #endif |
| |
| auto res = cli.Get("/routing_handler"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Routing Handler", res->body); |
| EXPECT_EQ(1U, res->get_header_value_count("PRE_ROUTING")); |
| EXPECT_EQ("on", res->get_header_value("PRE_ROUTING")); |
| EXPECT_EQ(1U, res->get_header_value_count("POST_ROUTING")); |
| EXPECT_EQ("on", res->get_header_value("POST_ROUTING")); |
| } |
| |
| { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| #else |
| Client cli(HOST, PORT); |
| #endif |
| |
| auto res = cli.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!\n", res->body); |
| EXPECT_EQ(0U, res->get_header_value_count("PRE_ROUTING")); |
| EXPECT_EQ(0U, res->get_header_value_count("POST_ROUTING")); |
| } |
| |
| { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| #else |
| Client cli(HOST, PORT); |
| #endif |
| |
| auto res = cli.Get("/aaa"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| EXPECT_EQ("Error", res->body); |
| EXPECT_EQ(0U, res->get_header_value_count("PRE_ROUTING")); |
| EXPECT_EQ(0U, res->get_header_value_count("POST_ROUTING")); |
| } |
| } |
| |
| TEST(RequestHandlerTest, PreRequestHandler) { |
| auto route_path = "/user/:user"; |
| |
| Server svr; |
| |
| svr.Get("/hi", [](const Request &, Response &res) { |
| res.set_content("hi", "text/plain"); |
| }); |
| |
| svr.Get(route_path, [](const Request &req, Response &res) { |
| res.set_content(req.path_params.at("user"), "text/plain"); |
| }); |
| |
| svr.set_pre_request_handler([&](const Request &req, Response &res) { |
| if (req.matched_route == route_path) { |
| auto user = req.path_params.at("user"); |
| if (user != "john") { |
| res.status = StatusCode::Forbidden_403; |
| res.set_content("error", "text/html"); |
| return Server::HandlerResponse::Handled; |
| } |
| } |
| return Server::HandlerResponse::Unhandled; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| { |
| auto res = cli.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("hi", res->body); |
| } |
| |
| { |
| auto res = cli.Get("/user/john"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("john", res->body); |
| } |
| |
| { |
| auto res = cli.Get("/user/invalid-user"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Forbidden_403, res->status); |
| EXPECT_EQ("error", res->body); |
| } |
| } |
| |
| TEST(InvalidFormatTest, StatusCode) { |
| Server svr; |
| |
| svr.Get("/hi", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!\n", "text/plain"); |
| res.status = 9999; // Status should be a three-digit code... |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/hi"); |
| ASSERT_FALSE(res); |
| } |
| } |
| |
| TEST(URLFragmentTest, WithFragment) { |
| Server svr; |
| |
| svr.Get("/hi", [](const Request &req, Response & /*res*/) { |
| EXPECT_TRUE(req.target == "/hi"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/hi#key1=val1=key2=val2"); |
| EXPECT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli.Get("/hi%23key1=val1=key2=val2"); |
| EXPECT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| } |
| |
| TEST(HeaderWriter, SetHeaderWriter) { |
| Server svr; |
| |
| svr.set_header_writer([](Stream &strm, Headers &hdrs) { |
| hdrs.emplace("CustomServerHeader", "CustomServerValue"); |
| return detail::write_headers(strm, hdrs); |
| }); |
| svr.Get("/hi", [](const Request &req, Response &res) { |
| auto it = req.headers.find("CustomClientHeader"); |
| EXPECT_TRUE(it != req.headers.end()); |
| EXPECT_EQ(it->second, "CustomClientValue"); |
| res.set_content("Hello World!\n", "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_header_writer([](Stream &strm, Headers &hdrs) { |
| hdrs.emplace("CustomClientHeader", "CustomClientValue"); |
| return detail::write_headers(strm, hdrs); |
| }); |
| |
| auto res = cli.Get("/hi"); |
| EXPECT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| auto it = res->headers.find("CustomServerHeader"); |
| EXPECT_TRUE(it != res->headers.end()); |
| EXPECT_EQ(it->second, "CustomServerValue"); |
| } |
| } |
| |
| class ServerTest : public ::testing::Test { |
| protected: |
| ServerTest() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| svr_.set_mount_point("/", "./www"); |
| svr_.set_mount_point("/mount", "./www2"); |
| svr_.set_file_extension_and_mimetype_mapping("abcde", "text/abcde"); |
| |
| svr_.Get("/hi", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }) |
| .Get("/file_content", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_file_content("./www/dir/test.html"); |
| }) |
| .Get("/file_content_with_content_type", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_file_content("./www/file", "text/plain"); |
| }) |
| .Get("/invalid_file_content", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_file_content("./www/dir/invalid_file_path"); |
| }) |
| .Get("/http_response_splitting", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_header("a", "1\r\nSet-Cookie: a=1"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a", "1\nSet-Cookie: a=1"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a", "1\rSet-Cookie: a=1"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a\r\nb", "0"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a\rb", "0"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_header("a\nb", "0"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("a")); |
| |
| res.set_redirect("1\r\nSet-Cookie: a=1"); |
| EXPECT_EQ(0U, res.headers.size()); |
| EXPECT_FALSE(res.has_header("Location")); |
| }) |
| .Get("/slow", |
| [&](const Request & /*req*/, Response &res) { |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| res.set_content("slow", "text/plain"); |
| }) |
| #if 0 |
| .Post("/slowpost", |
| [&](const Request & /*req*/, Response &res) { |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| res.set_content("slow", "text/plain"); |
| }) |
| #endif |
| .Get("/remote_addr", |
| [&](const Request &req, Response &res) { |
| ASSERT_FALSE(req.has_header("REMOTE_ADDR")); |
| ASSERT_FALSE(req.has_header("REMOTE_PORT")); |
| ASSERT_ANY_THROW(req.get_header_value("REMOTE_ADDR")); |
| ASSERT_ANY_THROW(req.get_header_value("REMOTE_PORT")); |
| res.set_content(req.remote_addr, "text/plain"); |
| }) |
| .Get("/local_addr", |
| [&](const Request &req, Response &res) { |
| ASSERT_FALSE(req.has_header("LOCAL_ADDR")); |
| ASSERT_FALSE(req.has_header("LOCAL_PORT")); |
| ASSERT_ANY_THROW(req.get_header_value("LOCAL_ADDR")); |
| ASSERT_ANY_THROW(req.get_header_value("LOCAL_PORT")); |
| auto local_addr = req.local_addr; |
| auto local_port = std::to_string(req.local_port); |
| res.set_content(local_addr.append(":").append(local_port), |
| "text/plain"); |
| }) |
| .Get("/endwith%", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }) |
| .Get("/a\\+\\+b", |
| [&](const Request &req, Response &res) { |
| ASSERT_TRUE(req.has_param("a +b")); |
| auto val = req.get_param_value("a +b"); |
| res.set_content(val, "text/plain"); |
| }) |
| .Get("/", [&](const Request & /*req*/, |
| Response &res) { res.set_redirect("/hi"); }) |
| .Post("/1", |
| [](const Request & /*req*/, Response &res) { |
| res.set_redirect("/2", StatusCode::SeeOther_303); |
| }) |
| .Get("/2", |
| [](const Request & /*req*/, Response &res) { |
| res.set_content("redirected.", "text/plain"); |
| res.status = StatusCode::OK_200; |
| }) |
| .Post("/person", |
| [&](const Request &req, Response &res) { |
| if (req.has_param("name") && req.has_param("note")) { |
| persons_[req.get_param_value("name")] = |
| req.get_param_value("note"); |
| } else { |
| res.status = StatusCode::BadRequest_400; |
| } |
| }) |
| .Put("/person", |
| [&](const Request &req, Response &res) { |
| if (req.has_param("name") && req.has_param("note")) { |
| persons_[req.get_param_value("name")] = |
| req.get_param_value("note"); |
| } else { |
| res.status = StatusCode::BadRequest_400; |
| } |
| }) |
| .Get("/person/(.*)", |
| [&](const Request &req, Response &res) { |
| string name = req.matches[1]; |
| if (persons_.find(name) != persons_.end()) { |
| auto note = persons_[name]; |
| res.set_content(note, "text/plain"); |
| } else { |
| res.status = StatusCode::NotFound_404; |
| } |
| }) |
| .Delete("/person", |
| [&](const Request &req, Response &res) { |
| if (req.has_param("name")) { |
| string name = req.get_param_value("name"); |
| if (persons_.find(name) != persons_.end()) { |
| persons_.erase(name); |
| res.set_content("DELETED", "text/plain"); |
| } else { |
| res.status = StatusCode::NotFound_404; |
| } |
| } else { |
| res.status = StatusCode::BadRequest_400; |
| } |
| }) |
| .Post("/x-www-form-urlencoded-json", |
| [&](const Request &req, Response &res) { |
| auto json = req.get_param_value("json"); |
| ASSERT_EQ(JSON_DATA, json); |
| res.set_content(json, "appliation/json"); |
| res.status = StatusCode::OK_200; |
| }) |
| .Get("/streamed-chunked", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_chunked_content_provider( |
| "text/plain", [](size_t /*offset*/, DataSink &sink) { |
| sink.os << "123"; |
| sink.os << "456"; |
| sink.os << "789"; |
| sink.done(); |
| return true; |
| }); |
| }) |
| .Get("/streamed-chunked-with-prohibited-trailer", |
| [&](const Request & /*req*/, Response &res) { |
| auto i = new int(0); |
| // Declare both a prohibited trailer (Content-Length) and an |
| // allowed one |
| res.set_header("Trailer", "Content-Length, X-Allowed"); |
| |
| res.set_chunked_content_provider( |
| "text/plain", |
| [i](size_t /*offset*/, DataSink &sink) { |
| switch (*i) { |
| case 0: sink.os << "123"; break; |
| case 1: sink.os << "456"; break; |
| case 2: sink.os << "789"; break; |
| case 3: { |
| sink.done_with_trailer( |
| {{"Content-Length", "5"}, {"X-Allowed", "yes"}}); |
| } break; |
| } |
| (*i)++; |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_TRUE(success); |
| delete i; |
| }); |
| }) |
| .Get("/streamed-chunked2", |
| [&](const Request & /*req*/, Response &res) { |
| auto i = new int(0); |
| res.set_chunked_content_provider( |
| "text/plain", |
| [i](size_t /*offset*/, DataSink &sink) { |
| switch (*i) { |
| case 0: sink.os << "123"; break; |
| case 1: sink.os << "456"; break; |
| case 2: sink.os << "789"; break; |
| case 3: sink.done(); break; |
| } |
| (*i)++; |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_TRUE(success); |
| delete i; |
| }); |
| }) |
| .Get("/streamed-chunked-with-trailer", |
| [&](const Request & /*req*/, Response &res) { |
| auto i = new int(0); |
| res.set_header("Trailer", "Dummy1, Dummy2"); |
| res.set_chunked_content_provider( |
| "text/plain", |
| [i](size_t /*offset*/, DataSink &sink) { |
| switch (*i) { |
| case 0: sink.os << "123"; break; |
| case 1: sink.os << "456"; break; |
| case 2: sink.os << "789"; break; |
| case 3: { |
| sink.done_with_trailer( |
| {{"Dummy1", "DummyVal1"}, {"Dummy2", "DummyVal2"}}); |
| } break; |
| } |
| (*i)++; |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_TRUE(success); |
| delete i; |
| }); |
| }) |
| .Get("/streamed", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content_provider( |
| 6, "text/plain", |
| [](size_t offset, size_t /*length*/, DataSink &sink) { |
| sink.os << (offset < 3 ? "a" : "b"); |
| return true; |
| }); |
| }) |
| .Get("/streamed-with-range", |
| [&](const Request &req, Response &res) { |
| auto data = new std::string("abcdefg"); |
| res.set_content_provider( |
| data->size(), "text/plain", |
| [data](size_t offset, size_t length, DataSink &sink) { |
| size_t DATA_CHUNK_SIZE = 4; |
| const auto &d = *data; |
| auto out_len = |
| std::min(static_cast<size_t>(length), DATA_CHUNK_SIZE); |
| auto ret = |
| sink.write(&d[static_cast<size_t>(offset)], out_len); |
| EXPECT_TRUE(ret); |
| return true; |
| }, |
| [data, &req](bool success) { |
| EXPECT_EQ(success, !req.has_param("error")); |
| delete data; |
| }); |
| }) |
| .Get("/streamed-cancel", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content_provider( |
| size_t(-1), "text/plain", |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.os << "data_chunk"; |
| return true; |
| }); |
| }) |
| .Get("/regex-with-delimiter", |
| [&](const Request &req, Response & /*res*/) { |
| ASSERT_TRUE(req.has_param("key")); |
| EXPECT_EQ("^(?.*(value))", req.get_param_value("key")); |
| }) |
| .Get("/with-range", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("abcdefg", "text/plain"); |
| }) |
| .Get("/test-start-time", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_NE(req.start_time_, |
| std::chrono::steady_clock::time_point::min()); |
| }) |
| .Get("/with-range-customized-response", |
| [&](const Request & /*req*/, Response &res) { |
| res.status = StatusCode::BadRequest_400; |
| res.set_content(JSON_DATA, "application/json"); |
| }) |
| .Post("/chunked", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(req.body, "dechunked post body"); |
| }) |
| .Post("/large-chunked", |
| [&](const Request &req, Response & /*res*/) { |
| std::string expected(6 * 30 * 1024u, 'a'); |
| EXPECT_EQ(req.body, expected); |
| }) |
| .Post("/multipart", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(4u, req.form.get_field_count("text1") + |
| req.form.get_field_count("text2") + |
| req.form.get_field_count("file3") + |
| req.form.get_field_count("file4")); |
| EXPECT_EQ(2u, req.form.get_file_count("file1") + |
| req.form.get_file_count("file2")); |
| ASSERT_TRUE(!req.form.has_file("???")); |
| ASSERT_TRUE(!req.form.has_field("???")); |
| ASSERT_TRUE(req.body.empty()); |
| |
| { |
| const auto &text = req.form.get_field("text1"); |
| EXPECT_EQ("text default", text); |
| } |
| |
| { |
| const auto &text = req.form.get_field("text2"); |
| EXPECT_EQ("aωb", text); |
| } |
| |
| { |
| const auto &file = req.form.get_file("file1"); |
| EXPECT_EQ("hello.txt", file.filename); |
| EXPECT_EQ("text/plain", file.content_type); |
| EXPECT_EQ("h\ne\n\nl\nl\no\n", file.content); |
| } |
| |
| { |
| const auto &file = req.form.get_file("file2"); |
| EXPECT_EQ("world.json", file.filename); |
| EXPECT_EQ("application/json", file.content_type); |
| EXPECT_EQ("{\n \"world\", true\n}\n", file.content); |
| } |
| |
| { |
| const auto &text = req.form.get_field("file3"); |
| EXPECT_EQ(0u, text.size()); |
| } |
| |
| { |
| const auto &text = req.form.get_field("file4"); |
| EXPECT_EQ(0u, text.size()); |
| } |
| }) |
| .Post("/multipart/multi_file_values", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(3u, req.form.get_field_count("text") + |
| req.form.get_field_count("multi_text1")); |
| EXPECT_EQ(2u, req.form.get_file_count("multi_file1")); |
| ASSERT_TRUE(!req.form.has_file("???")); |
| ASSERT_TRUE(!req.form.has_field("???")); |
| ASSERT_TRUE(req.body.empty()); |
| |
| { |
| const auto &text = req.form.get_field("text"); |
| EXPECT_EQ("default text", text); |
| } |
| { |
| const auto &text1_values = req.form.get_fields("multi_text1"); |
| EXPECT_EQ(2u, text1_values.size()); |
| EXPECT_EQ("aaaaa", text1_values[0]); |
| EXPECT_EQ("bbbbb", text1_values[1]); |
| } |
| |
| { |
| const auto &file1_values = req.form.get_files("multi_file1"); |
| EXPECT_EQ(2u, file1_values.size()); |
| auto file1 = file1_values[0]; |
| EXPECT_EQ(file1.filename, "hello.txt"); |
| EXPECT_EQ(file1.content_type, "text/plain"); |
| EXPECT_EQ("h\ne\n\nl\nl\no\n", file1.content); |
| |
| auto file2 = file1_values[1]; |
| EXPECT_EQ(file2.filename, "world.json"); |
| EXPECT_EQ(file2.content_type, "application/json"); |
| EXPECT_EQ("{\n \"world\", true\n}\n", file2.content); |
| } |
| }) |
| .Post("/empty", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_EQ("text/plain", req.get_header_value("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| res.set_content("empty", "text/plain"); |
| }) |
| .Post("/empty-no-content-type", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_FALSE(req.has_header("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| res.set_content("empty-no-content-type", "text/plain"); |
| }) |
| .Post("/path-only", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_EQ("", req.get_header_value("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| res.set_content("path-only", "text/plain"); |
| }) |
| .Post("/path-headers-only", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_EQ("", req.get_header_value("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| EXPECT_EQ("world", req.get_header_value("hello")); |
| EXPECT_EQ("world2", req.get_header_value("hello2")); |
| res.set_content("path-headers-only", "text/plain"); |
| }) |
| .Post("/post-large", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, LARGE_DATA); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Post("/post-loopback", |
| [&](const Request &, Response &res, |
| ContentReader const &content_reader) { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| res.set_content(body, "text/plain"); |
| }) |
| .Put("/put-loopback", |
| [&](const Request &, Response &res, |
| ContentReader const &content_reader) { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| res.set_content(body, "text/plain"); |
| }) |
| .Patch("/patch-loopback", |
| [&](const Request &, Response &res, |
| ContentReader const &content_reader) { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| res.set_content(body, "text/plain"); |
| }) |
| .Put("/empty-no-content-type", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, ""); |
| EXPECT_FALSE(req.has_header("Content-Type")); |
| EXPECT_EQ("0", req.get_header_value("Content-Length")); |
| res.set_content("empty-no-content-type", "text/plain"); |
| }) |
| .Put("/put", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, "PUT"); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Put("/put-large", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, LARGE_DATA); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Patch("/patch", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, "PATCH"); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Delete("/delete", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("DELETE", "text/plain"); |
| }) |
| .Delete("/delete-body", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(req.body, "content"); |
| res.set_content(req.body, "text/plain"); |
| }) |
| .Options(R"(\*)", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_header("Allow", "GET, POST, HEAD, OPTIONS"); |
| }) |
| .Get("/request-target", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ("/request-target?aaa=bbb&ccc=ddd", req.target); |
| EXPECT_EQ("bbb", req.get_param_value("aaa")); |
| EXPECT_EQ("ddd", req.get_param_value("ccc")); |
| }) |
| .Get("/long-query-value", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(LONG_QUERY_URL, req.target); |
| EXPECT_EQ(LONG_QUERY_VALUE, req.get_param_value("key")); |
| }) |
| .Get("/too-long-query-value", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(TOO_LONG_QUERY_URL, req.target); |
| EXPECT_EQ(TOO_LONG_QUERY_VALUE, req.get_param_value("key")); |
| }) |
| .Get("/array-param", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(3u, req.get_param_value_count("array")); |
| EXPECT_EQ("value1", req.get_param_value("array", 0)); |
| EXPECT_EQ("value2", req.get_param_value("array", 1)); |
| EXPECT_EQ("value3", req.get_param_value("array", 2)); |
| }) |
| .Post("/validate-no-multiple-headers", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(1u, req.get_header_value_count("Content-Length")); |
| EXPECT_EQ("5", req.get_header_value("Content-Length")); |
| }) |
| .Post("/content_receiver", |
| [&](const Request &req, Response &res, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_EQ(5u, items.size()); |
| |
| { |
| const auto &file = get_file_value(items, "text1"); |
| EXPECT_TRUE(file.filename.empty()); |
| EXPECT_EQ("text default", file.content); |
| } |
| |
| { |
| const auto &file = get_file_value(items, "text2"); |
| EXPECT_TRUE(file.filename.empty()); |
| EXPECT_EQ("aωb", file.content); |
| } |
| |
| { |
| const auto &file = get_file_value(items, "file1"); |
| EXPECT_EQ("hello.txt", file.filename); |
| EXPECT_EQ("text/plain", file.content_type); |
| EXPECT_EQ("h\ne\n\nl\nl\no\n", file.content); |
| } |
| |
| { |
| const auto &file = get_file_value(items, "file2"); |
| EXPECT_EQ("world.json", file.filename); |
| EXPECT_EQ("application/json", file.content_type); |
| EXPECT_EQ(R"({\n "world": true\n}\n)", file.content); |
| } |
| |
| { |
| const auto &file = get_file_value(items, "file3"); |
| EXPECT_TRUE(file.filename.empty()); |
| EXPECT_EQ("application/octet-stream", file.content_type); |
| EXPECT_EQ(0u, file.content.size()); |
| } |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| EXPECT_EQ(7U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| EXPECT_EQ(body, "content"); |
| res.set_content(body, "text/plain"); |
| } |
| }) |
| .Put("/content_receiver", |
| [&](const Request & /*req*/, Response &res, |
| const ContentReader &content_reader) { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| EXPECT_EQ(body, "content"); |
| res.set_content(body, "text/plain"); |
| }) |
| .Patch("/content_receiver", |
| [&](const Request & /*req*/, Response &res, |
| const ContentReader &content_reader) { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| EXPECT_EQ(body, "content"); |
| res.set_content(body, "text/plain"); |
| }) |
| .Post("/query-string-and-body", |
| [&](const Request &req, Response & /*res*/) { |
| ASSERT_TRUE(req.has_param("key")); |
| EXPECT_EQ(req.get_param_value("key"), "value"); |
| EXPECT_EQ(req.body, "content"); |
| }) |
| .Get("/last-request", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ("close", req.get_header_value("Connection")); |
| }) |
| .Get(R"(/redirect/(\d+))", |
| [&](const Request &req, Response &res) { |
| auto num = std::stoi(req.matches[1]) + 1; |
| std::string url = "/redirect/" + std::to_string(num); |
| res.set_redirect(url); |
| }) |
| .Post("/binary", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(4U, req.body.size()); |
| EXPECT_EQ("application/octet-stream", |
| req.get_header_value("Content-Type")); |
| EXPECT_EQ("4", req.get_header_value("Content-Length")); |
| res.set_content(req.body, "application/octet-stream"); |
| }) |
| .Put("/binary", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(4U, req.body.size()); |
| EXPECT_EQ("application/octet-stream", |
| req.get_header_value("Content-Type")); |
| EXPECT_EQ("4", req.get_header_value("Content-Length")); |
| res.set_content(req.body, "application/octet-stream"); |
| }) |
| .Patch("/binary", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(4U, req.body.size()); |
| EXPECT_EQ("application/octet-stream", |
| req.get_header_value("Content-Type")); |
| EXPECT_EQ("4", req.get_header_value("Content-Length")); |
| res.set_content(req.body, "application/octet-stream"); |
| }) |
| .Delete("/binary", |
| [&](const Request &req, Response &res) { |
| EXPECT_EQ(4U, req.body.size()); |
| EXPECT_EQ("application/octet-stream", |
| req.get_header_value("Content-Type")); |
| EXPECT_EQ("4", req.get_header_value("Content-Length")); |
| res.set_content(req.body, "application/octet-stream"); |
| }) |
| .Get("/issue1772", |
| [&](const Request & /*req*/, Response &res) { |
| res.status = 401; |
| res.set_header("WWW-Authenticate", "Basic realm=123456"); |
| }) |
| .Delete("/issue609", |
| [](const httplib::Request &, httplib::Response &res, |
| const httplib::ContentReader &) { |
| res.set_content("ok", "text/plain"); |
| }) |
| #if defined(CPPHTTPLIB_ZLIB_SUPPORT) || defined(CPPHTTPLIB_BROTLI_SUPPORT) || \ |
| defined(CPPHTTPLIB_ZSTD_SUPPORT) |
| .Get("/compress", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content( |
| "12345678901234567890123456789012345678901234567890123456789" |
| "01234567890123456789012345678901234567890", |
| "text/plain"); |
| }) |
| .Get("/nocompress", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content( |
| "12345678901234567890123456789012345678901234567890123456789" |
| "01234567890123456789012345678901234567890", |
| "application/octet-stream"); |
| }) |
| .Post("/compress-multipart", |
| [&](const Request &req, Response & /*res*/) { |
| EXPECT_EQ(2u, req.form.fields.size()); |
| ASSERT_TRUE(!req.form.has_field("???")); |
| |
| { |
| const auto &text = req.form.get_field("key1"); |
| EXPECT_EQ("test", text); |
| } |
| |
| { |
| const auto &text = req.form.get_field("key2"); |
| EXPECT_EQ("--abcdefg123", text); |
| } |
| }) |
| #endif |
| ; |
| |
| persons_["john"] = "programmer"; |
| |
| t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| if (!request_threads_.empty()) { |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| for (auto &t : request_threads_) { |
| t.join(); |
| } |
| } |
| t_.join(); |
| } |
| |
| map<string, string> persons_; |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| std::vector<thread> request_threads_; |
| }; |
| |
| TEST_F(ServerTest, GetMethod200) { |
| auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("HTTP/1.1", res->version); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("OK", res->reason); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ(1U, res->get_header_value_count("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| TEST_F(ServerTest, GetEmptyFile) { |
| auto res = cli_.Get("/empty_file"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ(0, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_EQ("", res->body); |
| } |
| |
| TEST_F(ServerTest, GetFileContent) { |
| auto res = cli_.Get("/file_content"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ(9, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetFileContentWithRange) { |
| auto res = cli_.Get("/file_content", {{make_range_header({{1, 3}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("bytes 1-3/9", res->get_header_value("Content-Range")); |
| EXPECT_EQ(3, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_EQ("est", res->body); |
| } |
| |
| TEST_F(ServerTest, GetFileContentWithContentType) { |
| auto res = cli_.Get("/file_content_with_content_type"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ(5, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_EQ("file\n", res->body); |
| } |
| |
| TEST_F(ServerTest, GetInvalidFileContent) { |
| auto res = cli_.Get("/invalid_file_content"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethod200withPercentEncoding) { |
| auto res = cli_.Get("/%68%69"); // auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("HTTP/1.1", res->version); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ(1U, res->get_header_value_count("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethod302) { |
| auto res = cli_.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Found_302, res->status); |
| EXPECT_EQ("/hi", res->get_header_value("Location")); |
| } |
| |
| TEST_F(ServerTest, GetMethod302Redirect) { |
| cli_.set_follow_location(true); |
| auto res = cli_.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_EQ("/hi", res->location); |
| } |
| |
| TEST_F(ServerTest, GetMethod404) { |
| auto res = cli_.Get("/invalid"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, HeadMethod200) { |
| auto res = cli_.Head("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST_F(ServerTest, HeadMethod200Static) { |
| auto res = cli_.Head("/mount/dir/index.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ(104, std::stoi(res->get_header_value("Content-Length"))); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST_F(ServerTest, HeadMethod404) { |
| auto res = cli_.Head("/invalid"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST_F(ServerTest, GetMethodPersonJohn) { |
| auto res = cli_.Get("/person/john"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("programmer", res->body); |
| } |
| |
| TEST_F(ServerTest, PostMethod1) { |
| auto res = cli_.Get("/person/john1"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| res = cli_.Post("/person", "name=john1¬e=coder", |
| "application/x-www-form-urlencoded"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john1"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("coder", res->body); |
| } |
| |
| TEST_F(ServerTest, PostMethod2) { |
| auto res = cli_.Get("/person/john2"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john2"); |
| params.emplace("note", "coder"); |
| |
| res = cli_.Post("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john2"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("coder", res->body); |
| } |
| |
| TEST_F(ServerTest, PutMethod3) { |
| auto res = cli_.Get("/person/john3"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john3"); |
| params.emplace("note", "coder"); |
| |
| res = cli_.Put("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john3"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("coder", res->body); |
| } |
| |
| TEST_F(ServerTest, DeleteMethod1) { |
| auto res = cli_.Get("/person/john4"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john4"); |
| params.emplace("note", "coder"); |
| |
| res = cli_.Post("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john4"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("coder", res->body); |
| |
| Params delete_params; |
| delete_params.emplace("name", "john4"); |
| |
| res = cli_.Delete("/person", delete_params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("DELETED", res->body); |
| |
| res = cli_.Get("/person/john4"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, DeleteMethod2) { |
| auto res = cli_.Get("/person/john5"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john5"); |
| params.emplace("note", "developer"); |
| |
| res = cli_.Post("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john5"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("developer", res->body); |
| |
| Params delete_params; |
| delete_params.emplace("name", "john5"); |
| |
| Headers headers; |
| headers.emplace("Custom-Header", "test-value"); |
| |
| res = cli_.Delete("/person", headers, delete_params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("DELETED", res->body); |
| |
| res = cli_.Get("/person/john5"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, DeleteMethod3) { |
| auto res = cli_.Get("/person/john6"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| |
| Params params; |
| params.emplace("name", "john6"); |
| params.emplace("note", "tester"); |
| |
| res = cli_.Post("/person", params); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli_.Get("/person/john6"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); |
| ASSERT_EQ("tester", res->body); |
| |
| Params delete_params; |
| delete_params.emplace("name", "john6"); |
| |
| Headers headers; |
| headers.emplace("Custom-Header", "test-value"); |
| |
| res = cli_.Delete("/person", headers, delete_params, nullptr); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("DELETED", res->body); |
| |
| res = cli_.Get("/person/john6"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, PostWwwFormUrlEncodedJson) { |
| Params params; |
| params.emplace("json", JSON_DATA); |
| |
| auto res = cli_.Post("/x-www-form-urlencoded-json", params); |
| |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(JSON_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, PostEmptyContent) { |
| auto res = cli_.Post("/empty", "", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("empty", res->body); |
| } |
| |
| TEST_F(ServerTest, PostEmptyContentWithNoContentType) { |
| auto res = cli_.Post("/empty-no-content-type"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("empty-no-content-type", res->body); |
| } |
| |
| TEST_F(ServerTest, PostPathOnly) { |
| auto res = cli_.Post("/path-only"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("path-only", res->body); |
| } |
| |
| TEST_F(ServerTest, PostPathAndHeadersOnly) { |
| auto res = cli_.Post("/path-headers-only", |
| Headers({{"hello", "world"}, {"hello2", "world2"}})); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("path-headers-only", res->body); |
| } |
| |
| TEST_F(ServerTest, PostLarge) { |
| auto res = cli_.Post("/post-large", LARGE_DATA, "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(LARGE_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, PutEmptyContentWithNoContentType) { |
| auto res = cli_.Put("/empty-no-content-type"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("empty-no-content-type", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodDir) { |
| auto res = cli_.Get("/dir/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| |
| auto body = R"(<html> |
| <head> |
| </head> |
| <body> |
| <a href="/dir/test.html">Test</a> |
| <a href="/hi">hi</a> |
| </body> |
| </html> |
| )"; |
| EXPECT_EQ(body, res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodDirTest) { |
| auto res = cli_.Get("/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodDirTestWithDoubleDots) { |
| auto res = cli_.Get("/dir/../dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodInvalidPath) { |
| auto res = cli_.Get("/dir/../test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDir) { |
| auto res = cli_.Get("/../www/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDir2) { |
| auto res = cli_.Get("/dir/../../www/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodDirMountTest) { |
| auto res = cli_.Get("/mount/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodDirMountTestWithDoubleDots) { |
| auto res = cli_.Get("/mount/dir/../dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/html", res->get_header_value("Content-Type")); |
| EXPECT_EQ("test.html", res->body); |
| } |
| |
| TEST_F(ServerTest, GetMethodInvalidMountPath) { |
| auto res = cli_.Get("/mount/dir/../test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodEmbeddedNUL) { |
| auto res = cli_.Get("/mount/dir/test.html%00.js"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDirMount) { |
| auto res = cli_.Get("/mount/../www2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDirMount2) { |
| auto res = cli_.Get("/mount/dir/../../www2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodOutOfBaseDirMountWithBackslash) { |
| auto res = cli_.Get("/mount/%2e%2e%5c/www2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, PostMethod303) { |
| auto res = cli_.Post("/1", "body", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::SeeOther_303, res->status); |
| EXPECT_EQ("/2", res->get_header_value("Location")); |
| } |
| |
| TEST_F(ServerTest, PostMethod303Redirect) { |
| cli_.set_follow_location(true); |
| auto res = cli_.Post("/1", "body", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("redirected.", res->body); |
| EXPECT_EQ("/2", res->location); |
| } |
| |
| TEST_F(ServerTest, UserDefinedMIMETypeMapping) { |
| auto res = cli_.Get("/dir/test.abcde"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); |
| EXPECT_EQ("abcde", res->body); |
| } |
| |
| TEST_F(ServerTest, StaticFileRange) { |
| auto res = cli_.Get("/dir/test.abcde", {{make_range_header({{2, 3}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); |
| EXPECT_EQ("2", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 2-3/5", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("cd"), res->body); |
| } |
| |
| TEST_F(ServerTest, StaticFileRanges) { |
| auto res = |
| cli_.Get("/dir/test.abcde", {{make_range_header({{1, 2}, {4, -1}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_TRUE( |
| res->get_header_value("Content-Type") |
| .find( |
| "multipart/byteranges; boundary=--cpp-httplib-multipart-data-") == |
| 0); |
| EXPECT_EQ("266", res->get_header_value("Content-Length")); |
| } |
| |
| TEST_F(ServerTest, StaticFileRangeHead) { |
| auto res = cli_.Head("/dir/test.abcde", {{make_range_header({{2, 3}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); |
| EXPECT_EQ("2", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 2-3/5", res->get_header_value("Content-Range")); |
| } |
| |
| TEST_F(ServerTest, StaticFileRangeBigFile) { |
| auto res = cli_.Get("/dir/1MB.txt", {{make_range_header({{-1, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("5", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 1048571-1048575/1048576", |
| res->get_header_value("Content-Range")); |
| EXPECT_EQ("LAST\n", res->body); |
| } |
| |
| TEST_F(ServerTest, StaticFileRangeBigFile2) { |
| auto res = cli_.Get("/dir/1MB.txt", {{make_range_header({{1, 4097}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("4097", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 1-4097/1048576", res->get_header_value("Content-Range")); |
| } |
| |
| TEST_F(ServerTest, StaticFileBigFile) { |
| auto res = cli_.Get("/dir/1MB.txt"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("1048576", res->get_header_value("Content-Length")); |
| } |
| |
| TEST_F(ServerTest, InvalidBaseDirMount) { |
| EXPECT_EQ(false, svr_.set_mount_point("invalid_mount_point", "./www3")); |
| } |
| |
| TEST_F(ServerTest, Binary) { |
| std::vector<char> binary{0x00, 0x01, 0x02, 0x03}; |
| |
| auto res = cli_.Post("/binary", binary.data(), binary.size(), |
| "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Put("/binary", binary.data(), binary.size(), |
| "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Patch("/binary", binary.data(), binary.size(), |
| "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Delete("/binary", binary.data(), binary.size(), |
| "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, BinaryString) { |
| auto binary = std::string("\x00\x01\x02\x03", 4); |
| |
| auto res = cli_.Post("/binary", binary, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Put("/binary", binary, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Patch("/binary", binary, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| |
| res = cli_.Delete("/binary", binary, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(4U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, EmptyRequest) { |
| auto res = cli_.Get(""); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| |
| TEST_F(ServerTest, LongRequest) { |
| std::string request; |
| for (size_t i = 0; i < 545; i++) { |
| request += "/TooLongRequest"; |
| } |
| request += "OK"; |
| |
| auto res = cli_.Get(request.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, TooLongRequest) { |
| std::string request; |
| for (size_t i = 0; i < 546; i++) { |
| request += "/TooLongRequest"; |
| } |
| request += "_NG"; |
| |
| auto start = std::chrono::high_resolution_clock::now(); |
| |
| cli_.set_keep_alive(true); |
| auto res = cli_.Get(request.c_str()); |
| |
| auto end = std::chrono::high_resolution_clock::now(); |
| auto elapsed = |
| std::chrono::duration_cast<std::chrono::milliseconds>(end - start) |
| .count(); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::UriTooLong_414, res->status); |
| EXPECT_LE(elapsed, 100); |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| EXPECT_FALSE(cli_.is_socket_open()); |
| } |
| |
| TEST_F(ServerTest, AlmostTooLongRequest) { |
| // test for #2046 - URI length check shouldn't include other content on req |
| // line URI is max URI length, minus 14 other chars in req line (GET, space, |
| // leading /, space, HTTP/1.1) |
| std::string request = |
| "/" + string(CPPHTTPLIB_REQUEST_URI_MAX_LENGTH - 14, 'A'); |
| |
| auto res = cli_.Get(request.c_str()); |
| |
| ASSERT_TRUE(res) << "Error: " << to_string(res.error()); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, LongHeader) { |
| Request req; |
| req.method = "GET"; |
| req.path = "/hi"; |
| |
| std::string host_and_port; |
| host_and_port += HOST; |
| host_and_port += ":"; |
| host_and_port += std::to_string(PORT); |
| |
| req.headers.emplace("Host", host_and_port.c_str()); |
| req.headers.emplace("Accept", "*/*"); |
| req.headers.emplace("User-Agent", "cpp-httplib/0.1"); |
| |
| req.headers.emplace( |
| "Header-Name", |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@"); |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, LongQueryValue) { |
| auto start = std::chrono::high_resolution_clock::now(); |
| |
| cli_.set_keep_alive(true); |
| auto res = cli_.Get(LONG_QUERY_URL.c_str()); |
| |
| auto end = std::chrono::high_resolution_clock::now(); |
| auto elapsed = |
| std::chrono::duration_cast<std::chrono::milliseconds>(end - start) |
| .count(); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::UriTooLong_414, res->status); |
| EXPECT_LE(elapsed, 100); |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| EXPECT_FALSE(cli_.is_socket_open()); |
| } |
| |
| TEST_F(ServerTest, TooLongQueryValue) { |
| auto res = cli_.Get(TOO_LONG_QUERY_URL.c_str()); |
| |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::Read, res.error()); |
| } |
| |
| TEST_F(ServerTest, TooLongHeader) { |
| Request req; |
| req.method = "GET"; |
| req.path = "/hi"; |
| |
| std::string host_and_port; |
| host_and_port += HOST; |
| host_and_port += ":"; |
| host_and_port += std::to_string(PORT); |
| |
| req.headers.emplace("Host", host_and_port.c_str()); |
| req.headers.emplace("Accept", "*/*"); |
| req.headers.emplace("User-Agent", "cpp-httplib/0.1"); |
| |
| req.headers.emplace( |
| "Header-Name", |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" |
| "@@@@@@@@@@@@@@@@@"); |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, HeaderCountAtLimit) { |
| // Test with headers just under the 100 limit |
| httplib::Headers headers; |
| |
| // Add 95 custom headers (the client will add Host, User-Agent, Accept, etc.) |
| // This should keep us just under the 100 header limit |
| for (int i = 0; i < 95; i++) { |
| std::string name = "X-Test-Header-" + std::to_string(i); |
| std::string value = "value" + std::to_string(i); |
| headers.emplace(name, value); |
| } |
| |
| // This should work fine as we're under the limit |
| auto res = cli_.Get("/hi", headers); |
| EXPECT_TRUE(res); |
| if (res) { EXPECT_EQ(StatusCode::OK_200, res->status); } |
| } |
| |
| TEST_F(ServerTest, HeaderCountExceedsLimit) { |
| // Test with many headers to exceed the 100 limit |
| httplib::Headers headers; |
| |
| // Add 150 headers to definitely exceed the 100 limit |
| for (int i = 0; i < 150; i++) { |
| std::string name = "X-Test-Header-" + std::to_string(i); |
| std::string value = "value" + std::to_string(i); |
| headers.emplace(name, value); |
| } |
| |
| // This should fail due to exceeding header count limit |
| cli_.set_keep_alive(true); |
| auto res = cli_.Get("/hi", headers); |
| |
| // The request should either fail or return 400 Bad Request |
| if (res) { |
| // If we get a response, it should be 400 Bad Request |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } else { |
| // Or the request should fail entirely |
| EXPECT_FALSE(res); |
| } |
| |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| EXPECT_FALSE(cli_.is_socket_open()); |
| } |
| |
| TEST_F(ServerTest, PercentEncoding) { |
| auto res = cli_.Get("/e%6edwith%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PercentEncodingUnicode) { |
| auto res = cli_.Get("/e%u006edwith%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, InvalidPercentEncoding) { |
| auto res = cli_.Get("/%endwith%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, InvalidPercentEncodingUnicode) { |
| auto res = cli_.Get("/%uendwith%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, EndWithPercentCharacterInQuery) { |
| auto res = cli_.Get("/hello?aaa=bbb%"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST_F(ServerTest, PlusSignEncoding) { |
| auto res = cli_.Get("/a+%2Bb?a %2bb=a %2Bb"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("a +b", res->body); |
| } |
| |
| TEST_F(ServerTest, HeaderCountSecurityTest) { |
| // This test simulates a potential DoS attack using many headers |
| // to verify our security fix prevents memory exhaustion |
| |
| httplib::Headers attack_headers; |
| |
| // Attempt to add many headers like an attacker would (200 headers to far |
| // exceed limit) |
| for (int i = 0; i < 200; i++) { |
| std::string name = "X-Attack-Header-" + std::to_string(i); |
| std::string value = "attack_payload_" + std::to_string(i); |
| attack_headers.emplace(name, value); |
| } |
| |
| // Try to POST with excessive headers |
| cli_.set_keep_alive(true); |
| auto res = cli_.Post("/", attack_headers, "test_data", "text/plain"); |
| |
| // Should either fail or return 400 Bad Request due to security limit |
| if (res) { |
| // If we get a response, it should be 400 Bad Request |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } else { |
| // Request failed, which is the expected behavior for DoS protection |
| EXPECT_FALSE(res); |
| } |
| |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| EXPECT_FALSE(cli_.is_socket_open()); |
| } |
| |
| TEST_F(ServerTest, MultipartFormData) { |
| UploadFormDataItems items = { |
| {"text1", "text default", "", ""}, |
| {"text2", "aωb", "", ""}, |
| {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, |
| {"file2", "{\n \"world\", true\n}\n", "world.json", "application/json"}, |
| {"file3", "", "", "application/octet-stream"}, |
| {"file4", "", "", " application/json tmp-string "}}; |
| |
| auto res = cli_.Post("/multipart", items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, MultipartFormDataMultiFileValues) { |
| UploadFormDataItems items = { |
| {"text", "default text", "", ""}, |
| |
| {"multi_text1", "aaaaa", "", ""}, |
| {"multi_text1", "bbbbb", "", ""}, |
| |
| {"multi_file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, |
| {"multi_file1", "{\n \"world\", true\n}\n", "world.json", |
| "application/json"}, |
| }; |
| |
| auto res = cli_.Post("/multipart/multi_file_values", items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, CaseInsensitiveHeaderName) { |
| auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("content-type")); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| TEST_F(ServerTest, CaseInsensitiveTransferEncoding) { |
| Request req; |
| req.method = "POST"; |
| req.path = "/chunked"; |
| |
| std::string host_and_port; |
| host_and_port += HOST; |
| host_and_port += ":"; |
| host_and_port += std::to_string(PORT); |
| |
| req.headers.emplace("Host", host_and_port.c_str()); |
| req.headers.emplace("Accept", "*/*"); |
| req.headers.emplace("User-Agent", "cpp-httplib/0.1"); |
| req.headers.emplace("Content-Type", "text/plain"); |
| req.headers.emplace("Content-Length", "0"); |
| req.headers.emplace( |
| "Transfer-Encoding", |
| "Chunked"); // Note, "Chunked" rather than typical "chunked". |
| |
| // Client does not chunk, so make a chunked body manually. |
| req.body = "4\r\ndech\r\nf\r\nunked post body\r\n0\r\n\r\n"; |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GetStreamed2) { |
| auto res = cli_.Get("/streamed", {{make_range_header({{2, 3}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("2", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 2-3/6", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("ab"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamed) { |
| auto res = cli_.Get("/streamed"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("6", res->get_header_value("Content-Length")); |
| EXPECT_EQ(std::string("aaabbb"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRange1) { |
| auto res = cli_.Get("/streamed-with-range", {{make_range_header({{3, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("3", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 3-5/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("def"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRange2) { |
| auto res = cli_.Get("/streamed-with-range", {{make_range_header({{1, -1}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("6", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 1-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("bcdefg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangeSuffix1) { |
| auto res = cli_.Get("/streamed-with-range", {{"Range", "bytes=-3"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("3", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 4-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("efg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangeSuffix2) { |
| auto res = cli_.Get("/streamed-with-range?error", {{"Range", "bytes=-9999"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(0U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangeError) { |
| auto res = cli_.Get("/streamed-with-range", |
| {{"Range", "bytes=92233720368547758079223372036854775806-" |
| "92233720368547758079223372036854775807"}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(0U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetRangeWithMaxLongLength) { |
| auto res = cli_.Get( |
| "/with-range", |
| {{"Range", "bytes=0-" + std::to_string(std::numeric_limits<long>::max())}, |
| {"Accept-Encoding", ""}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("7", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 0-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("abcdefg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetRangeWithZeroToInfinite) { |
| auto res = cli_.Get("/with-range", { |
| {"Range", "bytes=0-"}, |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("7", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 0-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("abcdefg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangeMultipart) { |
| auto res = |
| cli_.Get("/streamed-with-range", {{make_range_header({{1, 2}, {4, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("267", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(267U, res->body.size()); |
| |
| // Check that both range contents are present |
| EXPECT_TRUE(res->body.find("bc\r\n") != std::string::npos); |
| EXPECT_TRUE(res->body.find("ef\r\n") != std::string::npos); |
| |
| // Check that Content-Range headers are present for both ranges |
| EXPECT_TRUE(res->body.find("Content-Range: bytes 1-2/7") != |
| std::string::npos); |
| EXPECT_TRUE(res->body.find("Content-Range: bytes 4-5/7") != |
| std::string::npos); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithTooManyRanges) { |
| Ranges ranges; |
| for (size_t i = 0; i < CPPHTTPLIB_RANGE_MAX_COUNT + 1; i++) { |
| ranges.emplace_back(0, -1); |
| } |
| |
| auto res = |
| cli_.Get("/streamed-with-range?error", {{make_range_header(ranges)}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(0U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithOverwrapping) { |
| auto res = |
| cli_.Get("/streamed-with-range", {{make_range_header({{1, 4}, {2, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ(5U, res->body.size()); |
| |
| // Check that overlapping ranges are coalesced into a single range |
| EXPECT_EQ("bcdef", res->body); |
| EXPECT_EQ("bytes 1-5/7", res->get_header_value("Content-Range")); |
| |
| // Should be single range, not multipart |
| EXPECT_TRUE(res->has_header("Content-Range")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithNonAscendingRanges) { |
| auto res = |
| cli_.Get("/streamed-with-range", {{make_range_header({{4, 5}, {0, 2}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ(268U, res->body.size()); |
| |
| // Check that both range contents are present |
| EXPECT_TRUE(res->body.find("ef\r\n") != std::string::npos); |
| EXPECT_TRUE(res->body.find("abc\r\n") != std::string::npos); |
| |
| // Check that Content-Range headers are present for both ranges |
| EXPECT_TRUE(res->body.find("Content-Range: bytes 4-5/7") != |
| std::string::npos); |
| EXPECT_TRUE(res->body.find("Content-Range: bytes 0-2/7") != |
| std::string::npos); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithDuplicateRanges) { |
| auto res = |
| cli_.Get("/streamed-with-range", {{make_range_header({{0, 2}, {0, 2}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ(269U, res->body.size()); |
| |
| // Check that both duplicate range contents are present |
| size_t first_abc = res->body.find("abc\r\n"); |
| EXPECT_TRUE(first_abc != std::string::npos); |
| size_t second_abc = res->body.find("abc\r\n", first_abc + 1); |
| EXPECT_TRUE(second_abc != std::string::npos); |
| |
| // Check that Content-Range headers are present for both ranges |
| size_t first_range = res->body.find("Content-Range: bytes 0-2/7"); |
| EXPECT_TRUE(first_range != std::string::npos); |
| size_t second_range = |
| res->body.find("Content-Range: bytes 0-2/7", first_range + 1); |
| EXPECT_TRUE(second_range != std::string::npos); |
| } |
| |
| TEST_F(ServerTest, GetStreamedWithRangesMoreThanTwoOverwrapping) { |
| auto res = cli_.Get("/streamed-with-range?error", |
| {{make_range_header({{0, 1}, {1, 2}, {2, 3}, {3, 4}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| EXPECT_EQ("0", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(0U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetStreamedEndless) { |
| uint64_t offset = 0; |
| auto res = cli_.Get("/streamed-cancel", |
| [&](const char * /*data*/, uint64_t data_length) { |
| if (offset < 100) { |
| offset += data_length; |
| return true; |
| } |
| return false; |
| }); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, ClientStop) { |
| std::atomic_size_t count{4}; |
| std::vector<std::thread> threads; |
| |
| for (auto i = count.load(); i != 0; --i) { |
| threads.emplace_back([&]() { |
| auto res = cli_.Get("/streamed-cancel", |
| [&](const char *, uint64_t) { return true; }); |
| |
| --count; |
| |
| ASSERT_TRUE(!res); |
| EXPECT_TRUE(res.error() == Error::Canceled || |
| res.error() == Error::Read || res.error() == Error::Write); |
| }); |
| } |
| |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| while (count != 0) { |
| cli_.stop(); |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| for (auto &t : threads) { |
| t.join(); |
| } |
| } |
| |
| TEST_F(ServerTest, GetWithRange1) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{3, 5}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("3", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 3-5/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("def"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRange2) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{1, -1}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("6", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 1-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("bcdefg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRange3) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{0, 0}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("1", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 0-0/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("a"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRange4) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{-1, 2}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("2", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 5-6/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("fg"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRange5) { |
| auto res = cli_.Get("/with-range", { |
| make_range_header({{0, 5}}), |
| {"Accept-Encoding", ""}, |
| }); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("6", res->get_header_value("Content-Length")); |
| EXPECT_EQ(true, res->has_header("Content-Range")); |
| EXPECT_EQ("bytes 0-5/7", res->get_header_value("Content-Range")); |
| EXPECT_EQ(std::string("abcdef"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeOffsetGreaterThanContent) { |
| auto res = cli_.Get("/with-range", {{make_range_header({{10000, 20000}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeMultipart) { |
| auto res = cli_.Get("/with-range", {{make_range_header({{1, 2}, {4, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| EXPECT_EQ("267", res->get_header_value("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(267U, res->body.size()); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeMultipartOffsetGreaterThanContent) { |
| auto res = |
| cli_.Get("/with-range", {{make_range_header({{-1, 2}, {10000, 30000}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeCustomizedResponse) { |
| auto res = cli_.Get("/with-range-customized-response", |
| {{make_range_header({{1, 2}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| EXPECT_EQ(true, res->has_header("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(JSON_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, GetWithRangeMultipartCustomizedResponseMultipleRange) { |
| auto res = cli_.Get("/with-range-customized-response", |
| {{make_range_header({{1, 2}, {4, 5}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| EXPECT_EQ(true, res->has_header("Content-Length")); |
| EXPECT_EQ(false, res->has_header("Content-Range")); |
| EXPECT_EQ(JSON_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, Issue1772) { |
| auto res = cli_.Get("/issue1772", {{make_range_header({{1000, -1}})}}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::Unauthorized_401, res->status); |
| } |
| |
| TEST_F(ServerTest, Issue609) { |
| auto res = cli_.Delete("/issue609"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("ok"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunked) { |
| auto res = cli_.Get("/streamed-chunked"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunked2) { |
| auto res = cli_.Get("/streamed-chunked2"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunkedWithTrailer) { |
| auto res = cli_.Get("/streamed-chunked-with-trailer"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| |
| EXPECT_TRUE(res->has_header("Trailer")); |
| EXPECT_EQ(1U, res->get_header_value_count("Trailer")); |
| EXPECT_EQ(std::string("Dummy1, Dummy2"), res->get_header_value("Trailer")); |
| |
| // Trailers are now stored separately from headers (security fix) |
| EXPECT_EQ(2U, res->trailers.size()); |
| EXPECT_TRUE(res->has_trailer("Dummy1")); |
| EXPECT_TRUE(res->has_trailer("Dummy2")); |
| EXPECT_FALSE(res->has_trailer("Dummy3")); |
| EXPECT_EQ(std::string("DummyVal1"), res->get_trailer_value("Dummy1")); |
| EXPECT_EQ(std::string("DummyVal2"), res->get_trailer_value("Dummy2")); |
| |
| // Verify trailers are NOT in headers (security verification) |
| EXPECT_EQ(std::string(""), res->get_header_value("Dummy1")); |
| EXPECT_EQ(std::string(""), res->get_header_value("Dummy2")); |
| } |
| |
| TEST_F(ServerTest, LargeChunkedPost) { |
| Request req; |
| req.method = "POST"; |
| req.path = "/large-chunked"; |
| |
| std::string host_and_port; |
| host_and_port += HOST; |
| host_and_port += ":"; |
| host_and_port += std::to_string(PORT); |
| |
| req.headers.emplace("Host", host_and_port.c_str()); |
| req.headers.emplace("Accept", "*/*"); |
| req.headers.emplace("User-Agent", "cpp-httplib/0.1"); |
| req.headers.emplace("Content-Type", "text/plain"); |
| req.headers.emplace("Content-Length", "0"); |
| req.headers.emplace("Transfer-Encoding", "chunked"); |
| |
| std::string long_string(30 * 1024u, 'a'); |
| std::string chunk = "7800\r\n" + long_string + "\r\n"; |
| |
| // Attempt to make a large enough post to exceed OS buffers, to test that |
| // the server handles short reads if the full chunk data isn't available. |
| req.body = chunk + chunk + chunk + chunk + chunk + chunk + "0\r\n\r\n"; |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GetMethodRemoteAddr) { |
| auto res = cli_.Get("/remote_addr"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_TRUE(res->body == "::1" || res->body == "127.0.0.1"); |
| } |
| |
| TEST_F(ServerTest, GetMethodLocalAddr) { |
| auto res = cli_.Get("/local_addr"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_TRUE(res->body == std::string("::1:").append(to_string(PORT)) || |
| res->body == std::string("127.0.0.1:").append(to_string(PORT))); |
| } |
| |
| TEST_F(ServerTest, HTTPResponseSplitting) { |
| auto res = cli_.Get("/http_response_splitting"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, SlowRequest) { |
| request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); |
| request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); |
| request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); |
| } |
| |
| #if 0 |
| TEST_F(ServerTest, SlowPost) { |
| char buffer[64 * 1024]; |
| memset(buffer, 0x42, sizeof(buffer)); |
| |
| auto res = cli_.Post( |
| "/slowpost", 64 * 1024 * 1024, |
| [&](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| auto ret = sink.write(buffer, sizeof(buffer)); |
| EXPECT_TRUE(ret); |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, SlowPostFail) { |
| char buffer[64 * 1024]; |
| memset(buffer, 0x42, sizeof(buffer)); |
| |
| cli_.set_write_timeout(std::chrono::seconds(0)); |
| auto res = cli_.Post( |
| "/slowpost", 64 * 1024 * 1024, |
| [&](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.write(buffer, sizeof(buffer)); |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Write, res.error()); |
| } |
| #endif |
| |
| TEST_F(ServerTest, Put) { |
| auto res = cli_.Put("/put", "PUT", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PutWithContentProvider) { |
| auto res = cli_.Put( |
| "/put", 3, |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.os << "PUT"; |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PostWithContentProviderAbort) { |
| auto res = cli_.Post( |
| "/post", 42, |
| [](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) { |
| return false; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, PutWithContentProviderWithoutLength) { |
| auto res = cli_.Put( |
| "/put", |
| [](size_t /*offset*/, DataSink &sink) { |
| sink.os << "PUT"; |
| sink.done(); |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PostWithContentProviderWithoutLengthAbort) { |
| auto res = cli_.Post( |
| "/post", [](size_t /*offset*/, DataSink & /*sink*/) { return false; }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, PostLoopBack) { |
| std::string body; |
| auto res = cli_.Post( |
| "/post-loopback", 9, |
| [](size_t /*offset*/, size_t length, DataSink &sink) { |
| EXPECT_EQ(9u, length); |
| sink.write("123", 3); |
| sink.write("456", 3); |
| sink.write("789", 3); |
| return true; |
| }, |
| "text/plain", |
| [&body](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("123456789", body); |
| } |
| |
| TEST_F(ServerTest, PutLoopBack) { |
| std::string body; |
| auto res = cli_.Put( |
| "/put-loopback", 9, |
| [](size_t /*offset*/, size_t length, DataSink &sink) { |
| EXPECT_EQ(9u, length); |
| sink.write("123", 3); |
| sink.write("456", 3); |
| sink.write("789", 3); |
| return true; |
| }, |
| "text/plain", |
| [&body](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("123456789", body); |
| } |
| |
| TEST_F(ServerTest, PatchLoopBack) { |
| std::string body; |
| auto res = cli_.Patch( |
| "/patch-loopback", 9, |
| [](size_t /*offset*/, size_t length, DataSink &sink) { |
| EXPECT_EQ(9u, length); |
| sink.write("123", 3); |
| sink.write("456", 3); |
| sink.write("789", 3); |
| return true; |
| }, |
| "text/plain", |
| [&body](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("123456789", body); |
| } |
| |
| TEST_F(ServerTest, PostLoopBackWithoutRequestContentLength) { |
| std::string body; |
| auto res = cli_.Post( |
| "/post-loopback", |
| [](size_t /*offset*/, DataSink &sink) { |
| sink.write("123", 3); |
| sink.write("456", 3); |
| sink.write("789", 3); |
| sink.done(); |
| return true; |
| }, |
| "text/plain", |
| [&body](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("123456789", body); |
| } |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| TEST_F(ServerTest, PutWithContentProviderWithGzip) { |
| cli_.set_compress(true); |
| auto res = cli_.Put( |
| "/put", 3, |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.os << "PUT"; |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PostWithContentProviderWithGzipAbort) { |
| cli_.set_compress(true); |
| auto res = cli_.Post( |
| "/post", 42, |
| [](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) { |
| return false; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, PutWithContentProviderWithoutLengthWithGzip) { |
| cli_.set_compress(true); |
| auto res = cli_.Put( |
| "/put", |
| [](size_t /*offset*/, DataSink &sink) { |
| sink.os << "PUT"; |
| sink.done(); |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, PostWithContentProviderWithoutLengthWithGzipAbort) { |
| cli_.set_compress(true); |
| auto res = cli_.Post( |
| "/post", [](size_t /*offset*/, DataSink & /*sink*/) { return false; }, |
| "text/plain"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::Canceled, res.error()); |
| } |
| |
| TEST_F(ServerTest, PutLargeFileWithGzip) { |
| cli_.set_compress(true); |
| auto res = cli_.Put("/put-large", LARGE_DATA, "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(LARGE_DATA, res->body); |
| } |
| |
| TEST_F(ServerTest, PutLargeFileWithGzip2) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| std::string s = std::string("https://") + HOST + ":" + std::to_string(PORT); |
| Client cli(s.c_str()); |
| cli.enable_server_certificate_verification(false); |
| #else |
| std::string s = std::string("http://") + HOST + ":" + std::to_string(PORT); |
| Client cli(s.c_str()); |
| #endif |
| cli.set_compress(true); |
| |
| auto res = cli.Put("/put-large", LARGE_DATA, "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(LARGE_DATA, res->body); |
| // The compressed size should be less than a 10th of the original. May vary |
| // depending on the zlib library. |
| EXPECT_LT(res.get_request_header_value_u64("Content-Length"), |
| static_cast<uint64_t>(10 * 1024 * 1024)); |
| EXPECT_EQ("gzip", res.get_request_header_value("Content-Encoding")); |
| } |
| |
| TEST_F(ServerTest, PutContentWithDeflate) { |
| cli_.set_compress(false); |
| Headers headers; |
| headers.emplace("Content-Encoding", "deflate"); |
| // PUT in deflate format: |
| auto res = cli_.Put("/put", headers, |
| "\170\234\013\010\015\001\0\001\361\0\372", "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunkedWithGzip) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| |
| auto res = cli_.Get("/streamed-chunked", headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunkedWithGzip2) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| |
| auto res = cli_.Get("/streamed-chunked2", headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, SplitDelimiterInPathRegex) { |
| auto res = cli_.Get("/regex-with-delimiter?key=^(?.*(value))"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(GzipDecompressor, ChunkedDecompression) { |
| std::string data; |
| for (size_t i = 0; i < 32 * 1024; ++i) { |
| data.push_back(static_cast<char>('a' + i % 26)); |
| } |
| |
| std::string compressed_data; |
| { |
| httplib::detail::gzip_compressor compressor; |
| bool result = compressor.compress( |
| data.data(), data.size(), |
| /*last=*/true, |
| [&](const char *compressed_data_chunk, size_t compressed_data_size) { |
| compressed_data.insert(compressed_data.size(), compressed_data_chunk, |
| compressed_data_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::gzip_decompressor decompressor; |
| |
| // Chunk size is chosen specifically to have a decompressed chunk size equal |
| // to 16384 bytes 16384 bytes is the size of decompressor output buffer |
| size_t chunk_size = 130; |
| for (size_t chunk_begin = 0; chunk_begin < compressed_data.size(); |
| chunk_begin += chunk_size) { |
| size_t current_chunk_size = |
| std::min(compressed_data.size() - chunk_begin, chunk_size); |
| bool result = decompressor.decompress( |
| compressed_data.data() + chunk_begin, current_chunk_size, |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| } |
| ASSERT_EQ(data, decompressed_data); |
| } |
| |
| TEST(GzipDecompressor, DeflateDecompression) { |
| std::string original_text = "Raw deflate without gzip"; |
| unsigned char data[32] = {0x78, 0x9C, 0x0B, 0x4A, 0x2C, 0x57, 0x48, 0x49, |
| 0x4D, 0xCB, 0x49, 0x2C, 0x49, 0x55, 0x28, 0xCF, |
| 0x2C, 0xC9, 0xC8, 0x2F, 0x2D, 0x51, 0x48, 0xAF, |
| 0xCA, 0x2C, 0x00, 0x00, 0x6F, 0x98, 0x09, 0x2E}; |
| std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::gzip_decompressor decompressor; |
| |
| bool result = decompressor.decompress( |
| compressed_data.data(), compressed_data.size(), |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| ASSERT_EQ(original_text, decompressed_data); |
| } |
| |
| TEST(GzipDecompressor, DeflateDecompressionTrailingBytes) { |
| std::string original_text = "Raw deflate without gzip"; |
| unsigned char data[40] = {0x78, 0x9C, 0x0B, 0x4A, 0x2C, 0x57, 0x48, 0x49, |
| 0x4D, 0xCB, 0x49, 0x2C, 0x49, 0x55, 0x28, 0xCF, |
| 0x2C, 0xC9, 0xC8, 0x2F, 0x2D, 0x51, 0x48, 0xAF, |
| 0xCA, 0x2C, 0x00, 0x00, 0x6F, 0x98, 0x09, 0x2E, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; |
| std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::gzip_decompressor decompressor; |
| |
| bool result = decompressor.decompress( |
| compressed_data.data(), compressed_data.size(), |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| ASSERT_EQ(original_text, decompressed_data); |
| } |
| |
| #ifdef _WIN32 |
| TEST(GzipDecompressor, LargeRandomData) { |
| |
| // prepare large random data that is difficult to be compressed and is |
| // expected to have large size even when compressed |
| std::random_device seed_gen; |
| std::mt19937 random(seed_gen()); |
| constexpr auto large_size_byte = 4294967296UL; // 4GiB |
| constexpr auto data_size = large_size_byte + 134217728UL; // + 128MiB |
| std::vector<std::uint32_t> data(data_size / sizeof(std::uint32_t)); |
| std::generate(data.begin(), data.end(), [&]() { return random(); }); |
| |
| // compress data over 4GiB |
| std::string compressed_data; |
| compressed_data.reserve(large_size_byte + 536870912UL); // + 512MiB reserved |
| httplib::detail::gzip_compressor compressor; |
| auto result = compressor.compress(reinterpret_cast<const char *>(data.data()), |
| data.size() * sizeof(std::uint32_t), true, |
| [&](const char *data, size_t size) { |
| compressed_data.insert( |
| compressed_data.size(), data, size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| |
| // FIXME: compressed data size is expected to be greater than 4GiB, |
| // but there is no guarantee |
| // ASSERT_TRUE(compressed_data.size() >= large_size_byte); |
| |
| // decompress data over 4GiB |
| std::string decompressed_data; |
| decompressed_data.reserve(data_size); |
| httplib::detail::gzip_decompressor decompressor; |
| result = decompressor.decompress( |
| compressed_data.data(), compressed_data.size(), |
| [&](const char *data, size_t size) { |
| decompressed_data.insert(decompressed_data.size(), data, size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| |
| // compare |
| ASSERT_EQ(data_size, decompressed_data.size()); |
| ASSERT_TRUE(std::memcmp(data.data(), decompressed_data.data(), data_size) == |
| 0); |
| } |
| #endif |
| #endif |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| TEST_F(ServerTest, GetStreamedChunkedWithBrotli) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "br"); |
| |
| auto res = cli_.Get("/streamed-chunked", headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| |
| TEST_F(ServerTest, GetStreamedChunkedWithBrotli2) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "br"); |
| |
| auto res = cli_.Get("/streamed-chunked2", headers); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(std::string("123456789"), res->body); |
| } |
| #endif |
| |
| TEST_F(ServerTest, Patch) { |
| auto res = cli_.Patch("/patch", "PATCH", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PATCH", res->body); |
| } |
| |
| TEST_F(ServerTest, Delete) { |
| auto res = cli_.Delete("/delete"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("DELETE", res->body); |
| } |
| |
| TEST_F(ServerTest, DeleteContentReceiver) { |
| auto res = cli_.Delete("/delete-body", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("content", res->body); |
| } |
| |
| TEST_F(ServerTest, Options) { |
| auto res = cli_.Options("*"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("GET, POST, HEAD, OPTIONS", res->get_header_value("Allow")); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST_F(ServerTest, URL) { |
| auto res = cli_.Get("/request-target?aaa=bbb&ccc=ddd"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, ArrayParam) { |
| auto res = cli_.Get("/array-param?array=value1&array=value2&array=value3"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoMultipleHeaders) { |
| Headers headers = {{"Content-Length", "5"}}; |
| auto res = cli_.Post("/validate-no-multiple-headers", headers, "hello", |
| "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PostContentReceiver) { |
| auto res = cli_.Post("/content_receiver", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("content", res->body); |
| } |
| |
| TEST_F(ServerTest, PostMultipartFileContentReceiver) { |
| UploadFormDataItems items = { |
| {"text1", "text default", "", ""}, |
| {"text2", "aωb", "", ""}, |
| {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, |
| {"file2", R"({\n "world": true\n}\n)", "world.json", "application/json"}, |
| {"file3", "", "", "application/octet-stream"}, |
| }; |
| |
| auto res = cli_.Post("/content_receiver", items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PostMultipartPlusBoundary) { |
| UploadFormDataItems items = { |
| {"text1", "text default", "", ""}, |
| {"text2", "aωb", "", ""}, |
| {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, |
| {"file2", R"({\n "world": true\n}\n)", "world.json", "application/json"}, |
| {"file3", "", "", "application/octet-stream"}, |
| }; |
| |
| auto boundary = std::string("+++++"); |
| |
| std::string body; |
| |
| for (const auto &item : items) { |
| body += "--" + boundary + "\r\n"; |
| body += "Content-Disposition: form-data; name=\"" + item.name + "\""; |
| if (!item.filename.empty()) { |
| body += "; filename=\"" + item.filename + "\""; |
| } |
| body += "\r\n"; |
| if (!item.content_type.empty()) { |
| body += "Content-Type: " + item.content_type + "\r\n"; |
| } |
| body += "\r\n"; |
| body += item.content + "\r\n"; |
| } |
| body += "--" + boundary + "--\r\n"; |
| |
| std::string content_type = "multipart/form-data; boundary=" + boundary; |
| auto res = cli_.Post("/content_receiver", body, content_type.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PostContentReceiverGzip) { |
| cli_.set_compress(true); |
| auto res = cli_.Post("/content_receiver", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("content", res->body); |
| } |
| |
| TEST_F(ServerTest, PutContentReceiver) { |
| auto res = cli_.Put("/content_receiver", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("content", res->body); |
| } |
| |
| TEST_F(ServerTest, PatchContentReceiver) { |
| auto res = cli_.Patch("/content_receiver", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ("content", res->body); |
| } |
| |
| template <typename ClientType> |
| void TestWithHeadersAndContentReceiver( |
| ClientType &cli, |
| std::function<Result(ClientType &, const std::string &, const Headers &, |
| const std::string &, const std::string &, |
| ContentReceiver, DownloadProgress)> |
| request_func) { |
| Headers headers; |
| headers.emplace("X-Custom-Header", "test-value"); |
| |
| std::string received_body; |
| auto res = request_func( |
| cli, "/content_receiver", headers, "content", "application/json", |
| [&](const char *data, size_t data_length) { |
| received_body.append(data, data_length); |
| return true; |
| }, |
| nullptr); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("content", received_body); |
| } |
| |
| TEST_F(ServerTest, PostWithHeadersAndContentReceiver) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiver<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Post(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| TEST_F(ServerTest, PutWithHeadersAndContentReceiver) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiver<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Put(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| TEST_F(ServerTest, PatchWithHeadersAndContentReceiver) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiver<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Patch(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| template <typename ClientType> |
| void TestWithHeadersAndContentReceiverWithProgress( |
| ClientType &cli, |
| std::function<Result(ClientType &, const std::string &, const Headers &, |
| const std::string &, const std::string &, |
| ContentReceiver, DownloadProgress)> |
| request_func) { |
| Headers headers; |
| headers.emplace("X-Test-Header", "progress-test"); |
| |
| std::string received_body; |
| auto progress_called = false; |
| |
| auto res = request_func( |
| cli, "/content_receiver", headers, "content", "text/plain", |
| [&](const char *data, size_t data_length) { |
| received_body.append(data, data_length); |
| return true; |
| }, |
| [&](uint64_t /*current*/, uint64_t /*total*/) { |
| progress_called = true; |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("content", received_body); |
| EXPECT_TRUE(progress_called); |
| } |
| |
| TEST_F(ServerTest, PostWithHeadersAndContentReceiverWithProgress) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverWithProgress<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Post(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| TEST_F(ServerTest, PutWithHeadersAndContentReceiverWithProgress) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverWithProgress<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Put(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| TEST_F(ServerTest, PatchWithHeadersAndContentReceiverWithProgress) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverWithProgress<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver, DownloadProgress progress) { |
| return cli.Patch(path, headers, body, content_type, receiver, progress); |
| }); |
| } |
| |
| template <typename ClientType> |
| void TestWithHeadersAndContentReceiverError( |
| ClientType &cli, std::function<Result(ClientType &, const std::string &, |
| const Headers &, const std::string &, |
| const std::string &, ContentReceiver)> |
| request_func) { |
| Headers headers; |
| headers.emplace("X-Error-Test", "true"); |
| |
| std::string received_body; |
| auto receiver_failed = false; |
| |
| auto res = |
| request_func(cli, "/content_receiver", headers, "content", "text/plain", |
| [&](const char *data, size_t data_length) { |
| received_body.append(data, data_length); |
| receiver_failed = true; |
| return false; |
| }); |
| |
| ASSERT_FALSE(res); |
| EXPECT_TRUE(receiver_failed); |
| } |
| |
| TEST_F(ServerTest, PostWithHeadersAndContentReceiverError) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverError<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver) { |
| return cli.Post(path, headers, body, content_type, receiver); |
| }); |
| } |
| |
| TEST_F(ServerTest, PuttWithHeadersAndContentReceiverError) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverError<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver) { |
| return cli.Put(path, headers, body, content_type, receiver); |
| }); |
| } |
| |
| TEST_F(ServerTest, PatchWithHeadersAndContentReceiverError) { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| using ClientT = SSLClient; |
| #else |
| using ClientT = Client; |
| #endif |
| TestWithHeadersAndContentReceiverError<ClientT>( |
| cli_, [](ClientT &cli, const std::string &path, const Headers &headers, |
| const std::string &body, const std::string &content_type, |
| ContentReceiver receiver) { |
| return cli.Patch(path, headers, body, content_type, receiver); |
| }); |
| } |
| |
| TEST_F(ServerTest, PostQueryStringAndBody) { |
| auto res = |
| cli_.Post("/query-string-and-body?key=value", "content", "text/plain"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, HTTP2Magic) { |
| Request req; |
| req.method = "PRI"; |
| req.path = "*"; |
| req.body = "SM"; |
| |
| auto res = std::make_shared<Response>(); |
| auto error = Error::Success; |
| auto ret = cli_.send(req, *res, error); |
| |
| ASSERT_TRUE(ret); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } |
| |
| TEST_F(ServerTest, KeepAlive) { |
| auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| |
| res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| |
| res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| |
| res = cli_.Get("/not-exist"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| |
| res = cli_.Post("/empty", "", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("empty", res->body); |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| |
| res = cli_.Post( |
| "/empty", 0, [&](size_t, size_t, DataSink &) { return true; }, |
| "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("empty", res->body); |
| |
| cli_.set_keep_alive(false); |
| res = cli_.Get("/last-request"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| } |
| |
| TEST_F(ServerTest, TooManyRedirect) { |
| cli_.set_follow_location(true); |
| auto res = cli_.Get("/redirect/0"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::ExceedRedirectCount, res.error()); |
| } |
| |
| TEST_F(ServerTest, BadRequestLineCancelsKeepAlive) { |
| Request req; |
| req.method = "FOOBAR"; |
| req.path = "/hi"; |
| |
| cli_.set_keep_alive(true); |
| auto res = cli_.send(req); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| EXPECT_EQ("close", res->get_header_value("Connection")); |
| EXPECT_FALSE(cli_.is_socket_open()); |
| } |
| |
| TEST_F(ServerTest, StartTime) { auto res = cli_.Get("/test-start-time"); } |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| TEST_F(ServerTest, Gzip) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("33", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GzipWithoutAcceptEncoding) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", ""); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GzipWithContentReceiver) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| std::string body; |
| auto res = cli_.Get("/compress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("33", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GzipWithoutDecompressing) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| |
| cli_.set_decompress(false); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("33", res->get_header_value("Content-Length")); |
| EXPECT_EQ(33U, res->body.size()); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, GzipWithContentReceiverWithoutAcceptEncoding) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", ""); |
| |
| std::string body; |
| auto res = cli_.Get("/compress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoGzip) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| auto res = cli_.Get("/nocompress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(false, res->has_header("Content-Encoding")); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoGzipWithContentReceiver) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip, deflate"); |
| std::string body; |
| auto res = cli_.Get("/nocompress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(false, res->has_header("Content-Encoding")); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, MultipartFormDataGzip) { |
| UploadFormDataItems items = { |
| {"key1", "test", "", ""}, |
| {"key2", "--abcdefg123", "", ""}, |
| }; |
| |
| cli_.set_compress(true); |
| auto res = cli_.Post("/compress-multipart", items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| TEST_F(ServerTest, Brotli) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "br"); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("br", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("19", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_ZSTD_SUPPORT |
| TEST_F(ServerTest, Zstd) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, ZstdWithoutAcceptEncoding) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", ""); |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, ZstdWithContentReceiver) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| std::string body; |
| auto res = cli_.Get("/compress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, ZstdWithoutDecompressing) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| |
| cli_.set_decompress(false); |
| auto res = cli_.Get("/compress", headers); |
| |
| unsigned char compressed[26] = {0x28, 0xb5, 0x2f, 0xfd, 0x20, 0x64, 0x8d, |
| 0x00, 0x00, 0x50, 0x31, 0x32, 0x33, 0x34, |
| 0x35, 0x36, 0x37, 0x38, 0x39, 0x30, 0x01, |
| 0x00, 0xd7, 0xa9, 0x20, 0x01}; |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("26", res->get_header_value("Content-Length")); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_EQ(26U, res->body.size()); |
| EXPECT_TRUE(std::memcmp(compressed, res->body.data(), sizeof(compressed)) == |
| 0); |
| } |
| |
| TEST_F(ServerTest, ZstdWithContentReceiverWithoutAcceptEncoding) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", ""); |
| |
| std::string body; |
| auto res = cli_.Get("/compress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoZstd) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| auto res = cli_.Get("/nocompress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(false, res->has_header("Content-Encoding")); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| res->body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, NoZstdWithContentReceiver) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| std::string body; |
| auto res = cli_.Get("/nocompress", headers, |
| [&](const char *data, uint64_t data_length) { |
| EXPECT_EQ(100U, data_length); |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(false, res->has_header("Content-Encoding")); |
| EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); |
| EXPECT_EQ("100", res->get_header_value("Content-Length")); |
| EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" |
| "7890123456789012345678901234567890", |
| body); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| // TODO: How to enable zstd ?? |
| TEST_F(ServerTest, MultipartFormDataZstd) { |
| UploadFormDataItems items = { |
| {"key1", "test", "", ""}, |
| {"key2", "--abcdefg123", "", ""}, |
| }; |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| |
| cli_.set_compress(true); |
| auto res = cli_.Post("/compress-multipart", headers, items); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(ServerTest, PutWithContentProviderWithZstd) { |
| Headers headers; |
| headers.emplace("Accept-Encoding", "zstd"); |
| |
| cli_.set_compress(true); |
| auto res = cli_.Put( |
| "/put", headers, 3, |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.os << "PUT"; |
| return true; |
| }, |
| "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("PUT", res->body); |
| } |
| |
| // Pre-compression logging tests |
| TEST_F(ServerTest, PreCompressionLogging) { |
| // Test data for compression (matches the actual /compress endpoint content) |
| const std::string test_content = |
| "123456789012345678901234567890123456789012345678901234567890123456789012" |
| "3456789012345678901234567890"; |
| |
| // Variables to capture logging data |
| std::string pre_compression_body; |
| std::string pre_compression_content_type; |
| std::string pre_compression_content_encoding; |
| |
| std::string post_compression_body; |
| std::string post_compression_content_type; |
| std::string post_compression_content_encoding; |
| |
| // Set up pre-compression logger |
| svr_.set_pre_compression_logger([&](const Request & /*req*/, |
| const Response &res) { |
| pre_compression_body = res.body; |
| pre_compression_content_type = res.get_header_value("Content-Type"); |
| pre_compression_content_encoding = res.get_header_value("Content-Encoding"); |
| }); |
| |
| // Set up post-compression logger |
| svr_.set_logger([&](const Request & /*req*/, const Response &res) { |
| post_compression_body = res.body; |
| post_compression_content_type = res.get_header_value("Content-Type"); |
| post_compression_content_encoding = |
| res.get_header_value("Content-Encoding"); |
| }); |
| |
| // Test with gzip compression |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip"); |
| |
| auto res = cli_.Get("/compress", headers); |
| |
| // Verify response was compressed |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| |
| // Verify pre-compression logger captured uncompressed content |
| EXPECT_EQ(test_content, pre_compression_body); |
| EXPECT_EQ("text/plain", pre_compression_content_type); |
| EXPECT_TRUE(pre_compression_content_encoding |
| .empty()); // No encoding header before compression |
| |
| // Verify post-compression logger captured compressed content |
| EXPECT_NE(test_content, |
| post_compression_body); // Should be different after compression |
| EXPECT_EQ("text/plain", post_compression_content_type); |
| EXPECT_EQ("gzip", post_compression_content_encoding); |
| |
| // Verify compressed content is smaller |
| EXPECT_LT(post_compression_body.size(), pre_compression_body.size()); |
| } |
| |
| TEST_F(ServerTest, PreCompressionLoggingWithBrotli) { |
| const std::string test_content = |
| "123456789012345678901234567890123456789012345678901234567890123456789012" |
| "3456789012345678901234567890"; |
| |
| std::string pre_compression_body; |
| std::string post_compression_body; |
| |
| svr_.set_pre_compression_logger( |
| [&](const Request & /*req*/, const Response &res) { |
| pre_compression_body = res.body; |
| }); |
| |
| svr_.set_logger([&](const Request & /*req*/, const Response &res) { |
| post_compression_body = res.body; |
| }); |
| |
| Headers headers; |
| headers.emplace("Accept-Encoding", "br"); |
| |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("br", res->get_header_value("Content-Encoding")); |
| |
| // Verify pre-compression content is uncompressed |
| EXPECT_EQ(test_content, pre_compression_body); |
| |
| // Verify post-compression content is compressed |
| EXPECT_NE(test_content, post_compression_body); |
| EXPECT_LT(post_compression_body.size(), pre_compression_body.size()); |
| } |
| |
| TEST_F(ServerTest, PreCompressionLoggingWithoutCompression) { |
| const std::string test_content = |
| "123456789012345678901234567890123456789012345678901234567890123456789012" |
| "3456789012345678901234567890"; |
| |
| std::string pre_compression_body; |
| std::string post_compression_body; |
| |
| svr_.set_pre_compression_logger( |
| [&](const Request & /*req*/, const Response &res) { |
| pre_compression_body = res.body; |
| }); |
| |
| svr_.set_logger([&](const Request & /*req*/, const Response &res) { |
| post_compression_body = res.body; |
| }); |
| |
| // Request without compression (use /nocompress endpoint) |
| Headers headers; |
| auto res = cli_.Get("/nocompress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); |
| |
| // Pre-compression logger should not be called when no compression is applied |
| EXPECT_TRUE( |
| pre_compression_body.empty()); // Pre-compression logger not called |
| EXPECT_EQ( |
| test_content, |
| post_compression_body); // Post-compression logger captures final content |
| } |
| |
| TEST_F(ServerTest, PreCompressionLoggingOnlyPreLogger) { |
| const std::string test_content = |
| "123456789012345678901234567890123456789012345678901234567890123456789012" |
| "3456789012345678901234567890"; |
| |
| std::string pre_compression_body; |
| bool pre_logger_called = false; |
| |
| // Set only pre-compression logger |
| svr_.set_pre_compression_logger( |
| [&](const Request & /*req*/, const Response &res) { |
| pre_compression_body = res.body; |
| pre_logger_called = true; |
| }); |
| |
| Headers headers; |
| headers.emplace("Accept-Encoding", "gzip"); |
| |
| auto res = cli_.Get("/compress", headers); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); |
| |
| // Verify pre-compression logger was called |
| EXPECT_TRUE(pre_logger_called); |
| EXPECT_EQ(test_content, pre_compression_body); |
| } |
| |
| TEST_F(ServerTest, SendLargeBodyAfterRequestLineError) { |
| { |
| // Test with Expect: 100-continue header - success case |
| // Server returns 100 Continue, client sends body, server returns 200 OK |
| Request req; |
| req.method = "POST"; |
| req.path = "/post-large"; |
| req.set_header("Expect", "100-continue"); |
| req.body = LARGE_DATA; |
| |
| Response res; |
| auto error = Error::Success; |
| |
| cli_.set_keep_alive(true); |
| auto ret = cli_.send(req, res, error); |
| |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(StatusCode::OK_200, res.status); |
| EXPECT_EQ(LARGE_DATA, res.body); |
| } |
| |
| { |
| // Test with Expect: 100-continue header - error case |
| // Client should not send the body when server returns an error |
| Request req; |
| req.method = "POST"; |
| req.path = "/post-large?q=" + LONG_QUERY_VALUE; |
| req.set_header("Expect", "100-continue"); |
| req.body = LARGE_DATA; |
| |
| Response res; |
| auto error = Error::Success; |
| |
| auto start = std::chrono::high_resolution_clock::now(); |
| cli_.set_keep_alive(true); |
| auto ret = cli_.send(req, res, error); |
| auto end = std::chrono::high_resolution_clock::now(); |
| |
| auto elapsed = |
| std::chrono::duration_cast<std::chrono::milliseconds>(end - start) |
| .count(); |
| |
| // With Expect: 100-continue, request completes successfully but with error |
| EXPECT_TRUE(ret); |
| EXPECT_EQ(StatusCode::UriTooLong_414, res.status); |
| EXPECT_EQ("close", res.get_header_value("Connection")); |
| EXPECT_FALSE(cli_.is_socket_open()); |
| EXPECT_LE(elapsed, 200); |
| } |
| |
| { |
| // Send an extra GET request to ensure error recovery without hanging |
| Request req; |
| req.method = "GET"; |
| req.path = "/hi"; |
| |
| auto start = std::chrono::high_resolution_clock::now(); |
| auto res = cli_.send(req); |
| auto end = std::chrono::high_resolution_clock::now(); |
| |
| auto elapsed = |
| std::chrono::duration_cast<std::chrono::milliseconds>(end - start) |
| .count(); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("Hello World!", res->body); |
| EXPECT_LE(elapsed, 500); |
| } |
| } |
| |
| TEST(ZstdDecompressor, ChunkedDecompression) { |
| std::string data; |
| for (size_t i = 0; i < 32 * 1024; ++i) { |
| data.push_back(static_cast<char>('a' + i % 26)); |
| } |
| |
| std::string compressed_data; |
| { |
| httplib::detail::zstd_compressor compressor; |
| bool result = compressor.compress( |
| data.data(), data.size(), |
| /*last=*/true, |
| [&](const char *compressed_data_chunk, size_t compressed_data_size) { |
| compressed_data.insert(compressed_data.size(), compressed_data_chunk, |
| compressed_data_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::zstd_decompressor decompressor; |
| |
| // Chunk size is chosen specifically to have a decompressed chunk size equal |
| // to 16384 bytes 16384 bytes is the size of decompressor output buffer |
| size_t chunk_size = 130; |
| for (size_t chunk_begin = 0; chunk_begin < compressed_data.size(); |
| chunk_begin += chunk_size) { |
| size_t current_chunk_size = |
| std::min(compressed_data.size() - chunk_begin, chunk_size); |
| bool result = decompressor.decompress( |
| compressed_data.data() + chunk_begin, current_chunk_size, |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| } |
| ASSERT_EQ(data, decompressed_data); |
| } |
| |
| TEST(ZstdDecompressor, Decompress) { |
| std::string original_text = "Compressed with ZSTD"; |
| unsigned char data[29] = {0x28, 0xb5, 0x2f, 0xfd, 0x20, 0x14, 0xa1, 0x00, |
| 0x00, 0x43, 0x6f, 0x6d, 0x70, 0x72, 0x65, 0x73, |
| 0x73, 0x65, 0x64, 0x20, 0x77, 0x69, 0x74, 0x68, |
| 0x20, 0x5a, 0x53, 0x54, 0x44}; |
| std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); |
| |
| std::string decompressed_data; |
| { |
| httplib::detail::zstd_decompressor decompressor; |
| |
| bool result = decompressor.decompress( |
| compressed_data.data(), compressed_data.size(), |
| [&](const char *decompressed_data_chunk, |
| size_t decompressed_data_chunk_size) { |
| decompressed_data.insert(decompressed_data.size(), |
| decompressed_data_chunk, |
| decompressed_data_chunk_size); |
| return true; |
| }); |
| ASSERT_TRUE(result); |
| } |
| ASSERT_EQ(original_text, decompressed_data); |
| } |
| #endif |
| |
| // Sends a raw request to a server listening at HOST:PORT. |
| static bool send_request(time_t read_timeout_sec, const std::string &req, |
| std::string *resp = nullptr) { |
| auto error = Error::Success; |
| |
| auto client_sock = detail::create_client_socket( |
| HOST, "", PORT, AF_UNSPEC, false, false, nullptr, |
| /*connection_timeout_sec=*/5, 0, |
| /*read_timeout_sec=*/5, 0, |
| /*write_timeout_sec=*/5, 0, std::string(), error); |
| |
| if (client_sock == INVALID_SOCKET) { return false; } |
| |
| auto ret = detail::process_client_socket( |
| client_sock, read_timeout_sec, 0, 0, 0, 0, |
| std::chrono::steady_clock::time_point::min(), [&](Stream &strm) { |
| if (req.size() != |
| static_cast<size_t>(strm.write(req.data(), req.size()))) { |
| return false; |
| } |
| |
| char buf[512]; |
| |
| detail::stream_line_reader line_reader(strm, buf, sizeof(buf)); |
| while (line_reader.getline()) { |
| if (resp) { *resp += line_reader.ptr(); } |
| } |
| return true; |
| }); |
| |
| detail::close_socket(client_sock); |
| |
| return ret; |
| } |
| |
| TEST(ServerRequestParsingTest, TrimWhitespaceFromHeaderValues) { |
| Server svr; |
| std::string header_value; |
| svr.Get("/validate-ws-in-headers", [&](const Request &req, Response &res) { |
| header_value = req.get_header_value("foo"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Only space and horizontal tab are whitespace. Make sure other whitespace- |
| // like characters are not treated the same - use vertical tab and escape. |
| const std::string req = "GET /validate-ws-in-headers HTTP/1.1\r\n" |
| "foo: \t \v bar \x1B\t \r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| std::string res; |
| ASSERT_TRUE(send_request(5, req, &res)); |
| EXPECT_EQ(header_value, ""); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", res.substr(0, 24)); |
| } |
| |
| // Sends a raw request and verifies that there isn't a crash or exception. |
| static void test_raw_request(const std::string &req, |
| std::string *out = nullptr) { |
| Server svr; |
| svr.Get("/hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| svr.Put("/put_hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| svr.Get("/header_field_value_check", |
| [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| // Server read timeout must be longer than the client read timeout for the |
| // bug to reproduce, probably to force the server to process a request |
| // without a trailing blank line. |
| const time_t client_read_timeout_sec = 1; |
| svr.set_read_timeout(std::chrono::seconds(client_read_timeout_sec + 1)); |
| bool listen_thread_ok = false; |
| thread t = thread([&] { listen_thread_ok = svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| EXPECT_TRUE(listen_thread_ok); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| ASSERT_TRUE(send_request(client_read_timeout_sec, req, out)); |
| } |
| |
| TEST(ServerRequestParsingTest, ReadHeadersRegexComplexity) { |
| // A certain header line causes an exception if the header property is parsed |
| // naively with a single regex. This occurs with libc++ but not libstdc++. |
| test_raw_request( |
| "GET /hi HTTP/1.1\r\n" |
| " : " |
| " " |
| " "); |
| } |
| |
| TEST(ServerRequestParsingTest, ReadHeadersRegexComplexity2) { |
| // A certain header line causes an exception if the header property *name* is |
| // parsed with a regular expression starting with "(.+?):" - this is a non- |
| // greedy matcher and requires backtracking when there are a lot of ":" |
| // characters. |
| // This occurs with libc++ but not libstdc++. |
| test_raw_request( |
| "GET /hi HTTP/1.1\r\n" |
| ":-:::::::::::::::::::::::::::-::::::::::::::::::::::::@-&&&&&&&&&&&" |
| "--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&" |
| "&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-:::::" |
| "::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-::::::::::::::::::::::::" |
| ":::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::" |
| "::::::::-:::::::::::::::::@-&&&&&&&--:::::::-::::::::::::::::::::::" |
| ":::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::" |
| "::::::::::-:::::::::::::::::@-&&&&&::::::::::::-:::::::::::::::::@-" |
| "&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::::::" |
| ":@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::" |
| "::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::@-&&" |
| "&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@" |
| "::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&" |
| "--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&" |
| "&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&" |
| "&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&" |
| "&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@" |
| "-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::" |
| "::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::" |
| ":::::@-&&&&&&&&&&&::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-::::::" |
| ":::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::" |
| "::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-" |
| ":::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&---&&:&" |
| "&&.0------------:-:::::::::::::::::::::::::::::-:::::::::::::::::@-" |
| "&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::::::" |
| ":@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::" |
| "::::@-&&&&&&&&&&&---&&:&&&.0------------O--------\rH PUTHTTP/1.1\r\n" |
| "&&&%%%"); |
| } |
| |
| TEST(ServerRequestParsingTest, ExcessiveWhitespaceInUnparsableHeaderLine) { |
| // Make sure this doesn't crash the server. |
| // In a previous version of the header line regex, the "\r" rendered the line |
| // unparsable and the regex engine repeatedly backtracked, trying to look for |
| // a new position where the leading white space ended and the field value |
| // began. |
| // The crash occurs with libc++ but not libstdc++. |
| test_raw_request("GET /hi HTTP/1.1\r\n" |
| "a:" + |
| std::string(2000, ' ') + '\r' + std::string(20, 'z') + |
| "\r\n" |
| "\r\n"); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidFirstChunkLengthInRequest) { |
| std::string out; |
| |
| test_raw_request("PUT /put_hi HTTP/1.1\r\n" |
| "Content-Type: text/plain\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "\r\n" |
| "nothex\r\n", |
| &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidSecondChunkLengthInRequest) { |
| std::string out; |
| |
| test_raw_request("PUT /put_hi HTTP/1.1\r\n" |
| "Content-Type: text/plain\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "\r\n" |
| "3\r\n" |
| "xyz\r\n" |
| "NaN\r\n", |
| &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, ChunkLengthTooHighInRequest) { |
| std::string out; |
| |
| test_raw_request("PUT /put_hi HTTP/1.1\r\n" |
| "Content-Type: text/plain\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "\r\n" |
| // Length is too large for 64 bits. |
| "1ffffffffffffffff\r\n" |
| "xyz\r\n", |
| &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidHeaderTextWithExtraCR) { |
| test_raw_request("GET /hi HTTP/1.1\r\n" |
| "Content-Type: text/plain\r\n\r"); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidSpaceInURL) { |
| std::string out; |
| test_raw_request("GET /h i HTTP/1.1\r\n\r\n", &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, RemoteAddrSetOnBadRequest) { |
| Server svr; |
| |
| svr.set_error_handler([&](const Request &req, Response & /*res*/) { |
| EXPECT_TRUE(!req.remote_addr.empty()); |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Send an invalid request line to trigger Bad Request |
| const std::string bad_req = "BADMETHOD / HTTP/1.1\r\nHost: localhost\r\n\r\n"; |
| std::string out; |
| ASSERT_TRUE(send_request(5, bad_req, &out)); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidFieldValueContains_CR_LF_NUL) { |
| std::string out; |
| std::string request( |
| "GET /header_field_value_check HTTP/1.1\r\nTest: [\r\x00\n]\r\n\r\n", 55); |
| test_raw_request(request, &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidFieldValueContains_LF) { |
| std::string out; |
| std::string request( |
| "GET /header_field_value_check HTTP/1.1\r\nTest: [\n\n\n]\r\n\r\n", 55); |
| test_raw_request(request, &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, InvalidFieldNameContains_PreceedingSpaces) { |
| std::string out; |
| std::string request( |
| "GET /header_field_value_check HTTP/1.1\r\n Test: val\r\n\r\n", 55); |
| test_raw_request(request, &out); |
| EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); |
| } |
| |
| TEST(ServerRequestParsingTest, EmptyFieldValue) { |
| std::string out; |
| |
| test_raw_request("GET /header_field_value_check HTTP/1.1\r\n" |
| "Test: \r\n\r\n", |
| &out); |
| EXPECT_EQ("HTTP/1.1 200 OK", out.substr(0, 15)); |
| } |
| |
| TEST(ServerStopTest, StopServerWithChunkedTransmission) { |
| Server svr; |
| |
| svr.Get("/events", [](const Request & /*req*/, Response &res) { |
| res.set_header("Cache-Control", "no-cache"); |
| res.set_chunked_content_provider( |
| "text/event-stream", [](size_t offset, DataSink &sink) { |
| std::string s = "data:"; |
| s += std::to_string(offset); |
| s += "\n\n"; |
| auto ret = sink.write(s.data(), s.size()); |
| EXPECT_TRUE(ret); |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| return true; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| svr.wait_until_ready(); |
| |
| Client client(HOST, PORT); |
| const Headers headers = {{"Accept", "text/event-stream"}}; |
| |
| auto get_thread = std::thread([&client, &headers]() { |
| auto res = client.Get( |
| "/events", headers, |
| [](const char * /*data*/, size_t /*len*/) -> bool { return true; }); |
| }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| get_thread.join(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| // Give GET time to get a few messages. |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| } |
| |
| TEST(ServerStopTest, ClientAccessAfterServerDown) { |
| httplib::Server svr; |
| svr.Post("/hi", |
| [&](const httplib::Request & /*req*/, httplib::Response &res) { |
| res.status = StatusCode::OK_200; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Post("/hi", "data", "text/plain"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| |
| res = cli.Post("/hi", "data", "text/plain"); |
| ASSERT_FALSE(res); |
| } |
| |
| TEST(ServerStopTest, ListenFailure) { |
| Server svr; |
| auto t = thread([&]() { |
| auto ret = svr.listen("????", PORT); |
| EXPECT_FALSE(ret); |
| }); |
| svr.wait_until_ready(); |
| svr.stop(); |
| t.join(); |
| } |
| |
| TEST(ServerStopTest, Decommision) { |
| Server svr; |
| |
| svr.Get("/hi", [&](const Request &, Response &res) { res.body = "hi..."; }); |
| |
| for (int i = 0; i < 4; i++) { |
| auto is_even = !(i % 2); |
| |
| std::thread t{[&] { |
| try { |
| std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
| |
| if (is_even) { |
| throw std::runtime_error("Some thing that happens to go wrong."); |
| } |
| |
| svr.listen(HOST, PORT); |
| } catch (...) { svr.decommission(); } |
| }}; |
| |
| svr.wait_until_ready(); |
| |
| // Server is up |
| { |
| Client cli(HOST, PORT); |
| auto res = cli.Get("/hi"); |
| if (is_even) { |
| EXPECT_FALSE(res); |
| } else { |
| EXPECT_TRUE(res); |
| EXPECT_EQ("hi...", res->body); |
| } |
| } |
| |
| svr.stop(); |
| t.join(); |
| |
| // Server is down... |
| { |
| Client cli(HOST, PORT); |
| auto res = cli.Get("/hi"); |
| EXPECT_FALSE(res); |
| } |
| } |
| } |
| |
| // Helper function for string body upload progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestStringBodyUploadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call, |
| const string &body) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| bool progress_called = false; |
| |
| auto res = |
| client_call(cli, body, [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| progress_called = true; |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_TRUE(progress_called); |
| } |
| |
| TEST(UploadProgressTest, PostStringBodyBasic) { |
| TestStringBodyUploadProgress( |
| [](Server &svr) { |
| svr.Post("/test", [](const Request & /*req*/, Response &res) { |
| res.set_content("received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &body, UploadProgress progress_callback) { |
| return cli.Post("/test", body, "text/plain", progress_callback); |
| }, |
| "test data for upload progress"); |
| } |
| |
| TEST(UploadProgressTest, PutStringBodyBasic) { |
| TestStringBodyUploadProgress( |
| [](Server &svr) { |
| svr.Put("/test", [](const Request & /*req*/, Response &res) { |
| res.set_content("put received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &body, UploadProgress progress_callback) { |
| return cli.Put("/test", body, "text/plain", progress_callback); |
| }, |
| "put test data for upload progress"); |
| } |
| |
| TEST(UploadProgressTest, PatchStringBodyBasic) { |
| TestStringBodyUploadProgress( |
| [](Server &svr) { |
| svr.Patch("/test", [](const Request & /*req*/, Response &res) { |
| res.set_content("patch received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &body, UploadProgress progress_callback) { |
| return cli.Patch("/test", body, "text/plain", progress_callback); |
| }, |
| "patch test data for upload progress"); |
| } |
| |
| // Helper function for content provider upload progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestContentProviderUploadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| |
| auto res = |
| client_call(cli, [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_FALSE(progress_values.empty()); |
| } |
| |
| TEST(UploadProgressTest, PostContentProviderProgress) { |
| TestContentProviderUploadProgress( |
| [](Server &svr) { |
| svr.Post("/test", [](const Request & /*req*/, Response &res) { |
| res.set_content("provider received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, UploadProgress progress_callback) { |
| return cli.Post( |
| "/test", 10, |
| [](size_t /*offset*/, size_t /*length*/, DataSink &sink) -> bool { |
| sink.os << "test data"; |
| return true; |
| }, |
| "text/plain", progress_callback); |
| }); |
| } |
| |
| // Helper function for multipart upload progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestMultipartUploadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call, |
| const string &endpoint) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| |
| UploadFormDataItems items = { |
| {"field1", "value1", "", ""}, |
| {"field2", "longer value for progress tracking test", "", ""}, |
| {"file1", "file content data for upload progress", "test.txt", |
| "text/plain"}}; |
| |
| auto res = client_call(cli, endpoint, items, |
| [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_FALSE(progress_values.empty()); |
| } |
| |
| TEST(UploadProgressTest, PostMultipartProgress) { |
| TestMultipartUploadProgress( |
| [](Server &svr) { |
| svr.Post("/multipart", [](const Request &req, Response &res) { |
| EXPECT_TRUE(!req.form.files.empty() || !req.form.fields.empty()); |
| res.set_content("multipart received", "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &endpoint, const UploadFormDataItems &items, |
| UploadProgress progress_callback) { |
| return cli.Post(endpoint, items, progress_callback); |
| }, |
| "/multipart"); |
| } |
| |
| // Helper function for basic download progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestBasicDownloadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call, const string &endpoint, |
| size_t expected_content_size) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| |
| auto res = client_call(cli, endpoint, |
| [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_FALSE(progress_values.empty()); |
| EXPECT_EQ(expected_content_size, res->body.size()); |
| } |
| |
| TEST(DownloadProgressTest, GetBasic) { |
| TestBasicDownloadProgress( |
| [](Server &svr) { |
| svr.Get("/download", [](const Request & /*req*/, Response &res) { |
| string content(1000, 'D'); |
| res.set_content(content, "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &endpoint, |
| DownloadProgress progress_callback) { |
| return cli.Get(endpoint, progress_callback); |
| }, |
| "/download", 1000u); |
| } |
| |
| // Helper function for content receiver download progress tests |
| template <typename SetupHandler, typename ClientCall> |
| void TestContentReceiverDownloadProgress(SetupHandler &&setup_handler, |
| ClientCall &&client_call, |
| const string &endpoint, |
| size_t expected_content_size) { |
| Server svr; |
| setup_handler(svr); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| vector<uint64_t> progress_values; |
| string received_body; |
| |
| auto res = client_call( |
| cli, endpoint, |
| [&](const char *data, size_t data_length) -> bool { |
| received_body.append(data, data_length); |
| return true; |
| }, |
| [&](uint64_t current, uint64_t /*total*/) -> bool { |
| progress_values.push_back(current); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_FALSE(progress_values.empty()); |
| EXPECT_EQ(expected_content_size, received_body.size()); |
| EXPECT_TRUE(res->body.empty()); |
| } |
| |
| TEST(DownloadProgressTest, GetWithContentReceiver) { |
| TestContentReceiverDownloadProgress( |
| [](Server &svr) { |
| svr.Get("/download-receiver", |
| [](const Request & /*req*/, Response &res) { |
| string content(2000, 'R'); |
| res.set_content(content, "text/plain"); |
| }); |
| }, |
| [](Client &cli, const string &endpoint, ContentReceiver content_receiver, |
| DownloadProgress progress_callback) { |
| return cli.Get(endpoint, content_receiver, progress_callback); |
| }, |
| "/download-receiver", 2000u); |
| } |
| |
| TEST(StreamingTest, NoContentLengthStreaming) { |
| Server svr; |
| |
| svr.Get("/stream", [](const Request & /*req*/, Response &res) { |
| res.set_content_provider("text/plain", [](size_t offset, DataSink &sink) { |
| if (offset < 6) { |
| sink.os << (offset < 3 ? "a" : "b"); |
| } else { |
| sink.done(); |
| } |
| return true; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto listen_se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client client(HOST, PORT); |
| |
| auto get_thread = std::thread([&client]() { |
| std::string s; |
| auto res = |
| client.Get("/stream", [&s](const char *data, size_t len) -> bool { |
| s += std::string(data, len); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("aaabbb", s); |
| }); |
| auto get_se = detail::scope_exit([&] { get_thread.join(); }); |
| |
| // Give GET time to get a few messages. |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| } |
| |
| TEST(MountTest, Unmount) { |
| Server svr; |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| svr.set_mount_point("/mount2", "./www2"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| |
| res = cli.Get("/mount2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| svr.set_mount_point("/", "./www"); |
| |
| res = cli.Get("/dir/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| svr.remove_mount_point("/"); |
| res = cli.Get("/dir/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| |
| svr.remove_mount_point("/mount2"); |
| res = cli.Get("/mount2/dir/test.html"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| } |
| |
| TEST(MountTest, Redicect) { |
| Server svr; |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.set_mount_point("/", "./www"); |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get("/dir/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli.Get("/dir"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| res = cli.Get("/file"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| res = cli.Get("/file/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/dir"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(MountTest, MultibytesPathName) { |
| Server svr; |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.set_mount_point("/", "./www"); |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get(U8("/日本語Dir/日本語File.txt")); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(U8("日本語コンテンツ"), res->body); |
| } |
| |
| TEST(KeepAliveTest, ReadTimeout) { |
| Server svr; |
| |
| svr.Get("/a", [&](const Request & /*req*/, Response &res) { |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| res.set_content("a", "text/plain"); |
| }); |
| |
| svr.Get("/b", [&](const Request & /*req*/, Response &res) { |
| res.set_content("b", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| cli.set_keep_alive(true); |
| cli.set_read_timeout(std::chrono::seconds(1)); |
| |
| auto resa = cli.Get("/a"); |
| ASSERT_FALSE(resa); |
| EXPECT_EQ(Error::Read, resa.error()); |
| |
| auto resb = cli.Get("/b"); |
| ASSERT_TRUE(resb); |
| EXPECT_EQ(StatusCode::OK_200, resb->status); |
| EXPECT_EQ("b", resb->body); |
| } |
| |
| TEST(KeepAliveTest, MaxCount) { |
| size_t keep_alive_max_count = 3; |
| |
| Server svr; |
| svr.set_keep_alive_max_count(keep_alive_max_count); |
| |
| svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_keep_alive(true); |
| |
| for (size_t i = 0; i < 5; i++) { |
| auto result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| if (i == keep_alive_max_count - 1) { |
| EXPECT_EQ("close", result->get_header_value("Connection")); |
| } else { |
| EXPECT_FALSE(result->has_header("Connection")); |
| } |
| } |
| } |
| |
| TEST(KeepAliveTest, Issue1041) { |
| Server svr; |
| svr.set_keep_alive_timeout(3); |
| |
| svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.set_keep_alive(true); |
| |
| auto result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| std::this_thread::sleep_for(std::chrono::seconds(5)); |
| |
| result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| } |
| |
| TEST(KeepAliveTest, Issue1959) { |
| Server svr; |
| svr.set_keep_alive_timeout(5); |
| |
| svr.Get("/a", [&](const Request & /*req*/, Response &res) { |
| res.set_content("a", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| if (!svr.is_running()) return; |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| cli.set_keep_alive(true); |
| |
| using namespace std::chrono; |
| auto start = steady_clock::now(); |
| |
| cli.Get("/a"); |
| |
| svr.stop(); |
| listen_thread.join(); |
| |
| auto end = steady_clock::now(); |
| auto elapsed = duration_cast<milliseconds>(end - start).count(); |
| |
| EXPECT_LT(elapsed, 5000); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(KeepAliveTest, SSLClientReconnection) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| svr.set_keep_alive_timeout(1); |
| |
| svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_keep_alive(true); |
| |
| auto result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| |
| // Recoonect |
| result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| |
| result = cli.Get("/hi"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(StatusCode::OK_200, result->status); |
| } |
| |
| TEST(KeepAliveTest, SSLClientReconnectionPost) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| svr.set_keep_alive_timeout(1); |
| std::string content = "reconnect"; |
| |
| svr.Post("/hi", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_keep_alive(true); |
| |
| auto result = cli.Post( |
| "/hi", content.size(), |
| [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.write(content.c_str(), content.size()); |
| return true; |
| }, |
| "text/plain"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(200, result->status); |
| |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| |
| // Recoonect |
| result = cli.Post( |
| "/hi", content.size(), |
| [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.write(content.c_str(), content.size()); |
| return true; |
| }, |
| "text/plain"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(200, result->status); |
| |
| result = cli.Post( |
| "/hi", content.size(), |
| [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { |
| sink.write(content.c_str(), content.size()); |
| return true; |
| }, |
| "text/plain"); |
| ASSERT_TRUE(result); |
| EXPECT_EQ(200, result->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SNI_AutoDetectionTest, SNI_Logic) { |
| using namespace httplib::tls; |
| |
| { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/sni", [&](const Request &req, Response &res) { |
| std::string expected; |
| if (req.ssl) { |
| // Use backend-agnostic TLS API to get SNI |
| if (const char *sni = tls_get_sni(const_cast<void *>(req.ssl))) { |
| expected = sni; |
| } |
| } |
| EXPECT_EQ(expected, req.get_param_value("expected")); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| SSLClient cli("localhost", PORT); |
| cli.enable_server_certificate_verification(false); |
| auto res = cli.Get("/sni?expected=localhost"); |
| ASSERT_TRUE(res); |
| } |
| |
| { |
| SSLClient cli("::1", PORT); |
| cli.enable_server_certificate_verification(false); |
| auto res = cli.Get("/sni?expected="); |
| |
| // NOTE: This may fail if the server is listening on IPv4 only |
| // (e.g., when localhost resolves to 127.0.0.1 only) |
| if (res) { |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } else { |
| EXPECT_EQ(Error::Connection, res.error()); |
| } |
| } |
| } |
| } |
| #endif |
| |
| TEST(ClientProblemDetectionTest, ContentProvider) { |
| Server svr; |
| |
| size_t content_length = 1024 * 1024; |
| |
| svr.Get("/hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content_provider( |
| content_length, "text/plain", |
| [&](size_t offset, size_t length, DataSink &sink) { |
| auto out_len = std::min(length, static_cast<size_t>(1024)); |
| std::string out(out_len, '@'); |
| sink.write(out.data(), out_len); |
| return offset < 4096; |
| }, |
| [](bool success) { ASSERT_FALSE(success); }); |
| }); |
| |
| svr.Get("/empty", [&](const Request & /*req*/, Response &res) { |
| res.set_content_provider( |
| 0, "text/plain", |
| [&](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) -> bool { |
| EXPECT_TRUE(false); |
| return true; |
| }, |
| [](bool success) { ASSERT_FALSE(success); }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| { |
| auto res = cli.Get("/hi", [&](const char * /*data*/, |
| size_t /*data_length*/) { return false; }); |
| ASSERT_FALSE(res); |
| } |
| |
| { |
| auto res = cli.Get("/empty", [&](const char * /*data*/, |
| size_t /*data_length*/) { return false; }); |
| ASSERT_TRUE(res); |
| } |
| } |
| |
| TEST(ErrorHandlerWithContentProviderTest, ErrorHandler) { |
| Server svr; |
| |
| svr.set_error_handler([](Request const &, Response &res) -> void { |
| res.set_chunked_content_provider( |
| "text/plain", [](std::size_t const, DataSink &sink) -> bool { |
| sink.os << "hello"; |
| sink.os << "world"; |
| sink.done(); |
| return true; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::NotFound_404, res->status); |
| EXPECT_EQ("helloworld", res->body); |
| } |
| |
| TEST(LongPollingTest, ClientCloseDetection) { |
| Server svr; |
| |
| svr.Get("/events", [&](const Request & /*req*/, Response &res) { |
| res.set_chunked_content_provider( |
| "text/plain", [](std::size_t const, DataSink &sink) -> bool { |
| EXPECT_TRUE(sink.is_writable()); // the socket is alive |
| sink.os << "hello"; |
| |
| auto count = 10; |
| while (count > 0 && sink.is_writable()) { |
| this_thread::sleep_for(chrono::milliseconds(10)); |
| count--; |
| } |
| EXPECT_FALSE(sink.is_writable()); // the socket is closed |
| return true; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get("/events", [&](const char *data, size_t data_length) { |
| EXPECT_EQ("hello", string(data, data_length)); |
| return false; // close the socket immediately. |
| }); |
| |
| ASSERT_FALSE(res); |
| } |
| |
| TEST(GetWithParametersTest, GetWithParameters) { |
| Server svr; |
| |
| svr.Get("/", [&](const Request &req, Response &) { |
| EXPECT_EQ("world", req.get_param_value("hello")); |
| EXPECT_EQ("world2", req.get_param_value("hello2")); |
| EXPECT_EQ("world3", req.get_param_value("hello3")); |
| }); |
| |
| svr.Get("/params", [&](const Request &req, Response &) { |
| EXPECT_EQ("world", req.get_param_value("hello")); |
| EXPECT_EQ("world2", req.get_param_value("hello2")); |
| EXPECT_EQ("world3", req.get_param_value("hello3")); |
| }); |
| |
| svr.Get(R"(/resources/([a-z0-9\\-]+))", [&](const Request &req, Response &) { |
| EXPECT_EQ("resource-id", req.matches[1]); |
| EXPECT_EQ("foo", req.get_param_value("param1")); |
| EXPECT_EQ("bar", req.get_param_value("param2")); |
| }); |
| |
| svr.Get("/users/:id", [&](const Request &req, Response &) { |
| EXPECT_EQ("user-id", req.path_params.at("id")); |
| EXPECT_EQ("foo", req.get_param_value("param1")); |
| EXPECT_EQ("bar", req.get_param_value("param2")); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| Params params; |
| params.emplace("hello", "world"); |
| params.emplace("hello2", "world2"); |
| params.emplace("hello3", "world3"); |
| auto res = cli.Get("/", params, Headers{}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/params?hello=world&hello2=world2&hello3=world3"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/resources/resource-id?param1=foo¶m2=bar"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| Client cli(HOST, PORT); |
| |
| auto res = cli.Get("/users/user-id?param1=foo¶m2=bar"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(GetWithParametersTest, GetWithParameters2) { |
| Server svr; |
| |
| svr.Get("/", [&](const Request &req, Response &res) { |
| auto text = req.get_param_value("hello"); |
| res.set_content(text, "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| Params params; |
| params.emplace("hello", "world"); |
| |
| std::string body; |
| auto res = cli.Get("/", params, Headers{}, |
| [&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("world", body); |
| } |
| |
| TEST(ClientDefaultHeadersTest, DefaultHeaders_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpcan.org"; |
| auto path = std::string{"/range/32"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/range/32"}; |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli(host); |
| #else |
| Client cli(host); |
| #endif |
| |
| cli.set_default_headers({make_range_header({{1, 10}})}); |
| cli.set_connection_timeout(5); |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("bcdefghijk", res->body); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| } |
| |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ("bcdefghijk", res->body); |
| EXPECT_EQ(StatusCode::PartialContent_206, res->status); |
| } |
| } |
| |
| TEST(ServerDefaultHeadersTest, DefaultHeaders) { |
| Server svr; |
| svr.set_default_headers({{"Hello", "World"}}); |
| |
| svr.Get("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", PORT); |
| |
| auto res = cli.Get("/"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("ok", res->body); |
| EXPECT_EQ("World", res->get_header_value("Hello")); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(KeepAliveTest, ReadTimeoutSSL) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/a", [&](const Request & /*req*/, Response &res) { |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| res.set_content("a", "text/plain"); |
| }); |
| |
| svr.Get("/b", [&](const Request & /*req*/, Response &res) { |
| res.set_content("b", "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli("localhost", PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_keep_alive(true); |
| cli.set_read_timeout(std::chrono::seconds(1)); |
| |
| auto resa = cli.Get("/a"); |
| ASSERT_TRUE(!resa); |
| EXPECT_EQ(Error::Read, resa.error()); |
| |
| auto resb = cli.Get("/b"); |
| ASSERT_TRUE(resb); |
| EXPECT_EQ(StatusCode::OK_200, resb->status); |
| EXPECT_EQ("b", resb->body); |
| } |
| #endif |
| |
| class ServerTestWithAI_PASSIVE : public ::testing::Test { |
| protected: |
| ServerTestWithAI_PASSIVE() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| svr_.Get("/hi", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| |
| t_ = thread( |
| [&]() { ASSERT_TRUE(svr_.listen(std::string(), PORT, AI_PASSIVE)); }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| t_.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| }; |
| |
| TEST_F(ServerTestWithAI_PASSIVE, GetMethod200) { |
| auto res = cli_.Get("/hi"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); |
| EXPECT_EQ("Hello World!", res->body); |
| } |
| |
| class ServerUpDownTest : public ::testing::Test { |
| protected: |
| ServerUpDownTest() : cli_(HOST, PORT) {} |
| |
| virtual void SetUp() { |
| t_ = thread([&]() { |
| svr_.bind_to_any_port(HOST); |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| ASSERT_TRUE(svr_.listen_after_bind()); |
| }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| t_.join(); |
| } |
| |
| Client cli_; |
| Server svr_; |
| thread t_; |
| }; |
| |
| TEST_F(ServerUpDownTest, QuickStartStop) { |
| // Should not crash, especially when run with |
| // --gtest_filter=ServerUpDownTest.QuickStartStop --gtest_repeat=1000 |
| } |
| |
| class PayloadMaxLengthTest : public ::testing::Test { |
| protected: |
| PayloadMaxLengthTest() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| svr_.set_payload_max_length(8); |
| |
| svr_.Post("/test", [&](const Request & /*req*/, Response &res) { |
| res.set_content("test", "text/plain"); |
| }); |
| |
| t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); |
| |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| t_.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| }; |
| |
| TEST_F(PayloadMaxLengthTest, ExceedLimit) { |
| auto res = cli_.Post("/test", "123456789", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); |
| |
| res = cli_.Post("/test", "12345678", "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(PayloadMaxLengthTest, ChunkedEncodingSecurityTest) { |
| // Test chunked encoding with payload exceeding the 8-byte limit |
| std::string large_chunked_data(16, 'A'); // 16 bytes, exceeds 8-byte limit |
| |
| auto res = cli_.Post("/test", large_chunked_data, "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); |
| } |
| |
| TEST_F(PayloadMaxLengthTest, ChunkedEncodingWithinLimit) { |
| // Test chunked encoding with payload within the 8-byte limit |
| std::string small_chunked_data(4, 'B'); // 4 bytes, within 8-byte limit |
| |
| auto res = cli_.Post("/test", small_chunked_data, "text/plain"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(PayloadMaxLengthTest, RawSocketChunkedTest) { |
| // Test using send_request to send chunked data exceeding payload limit |
| std::string chunked_request = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + std::to_string(PORT) + |
| "\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "Connection: close\r\n" |
| "\r\n" |
| "a\r\n" // 10 bytes chunk (exceeds 8-byte limit) |
| "0123456789\r\n" |
| "0\r\n" // End chunk |
| "\r\n"; |
| |
| std::string response; |
| bool result = send_request(1, chunked_request, &response); |
| |
| if (!result) { |
| // If send_request fails, it might be because the server closed the |
| // connection due to payload limit enforcement, which is acceptable |
| SUCCEED() |
| << "Server rejected oversized chunked request (connection closed)"; |
| } else { |
| // If we got a response, check if it's an error response or connection was |
| // closed early Short response length indicates connection was closed due to |
| // payload limit |
| if (response.length() <= 10) { |
| SUCCEED() << "Server closed connection for oversized chunked request"; |
| } else { |
| // Check for error status codes |
| EXPECT_TRUE(response.find("413") != std::string::npos || |
| response.find("Payload Too Large") != std::string::npos || |
| response.find("400") != std::string::npos); |
| } |
| } |
| } |
| |
| TEST_F(PayloadMaxLengthTest, NoContentLengthPayloadLimit) { |
| // Test request without Content-Length header exceeding payload limit |
| std::string request_without_content_length = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + |
| std::to_string(PORT) + |
| "\r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| // Add payload exceeding the 8-byte limit |
| std::string large_payload(16, 'X'); // 16 bytes, exceeds 8-byte limit |
| request_without_content_length += large_payload; |
| |
| std::string response; |
| bool result = send_request(1, request_without_content_length, &response); |
| |
| if (!result) { |
| // If send_request fails, server likely closed connection due to payload |
| // limit |
| SUCCEED() << "Server rejected oversized request without Content-Length " |
| "(connection closed)"; |
| } else { |
| // Check if server responded with error or closed connection early |
| if (response.length() <= 10) { |
| SUCCEED() << "Server closed connection for oversized request without " |
| "Content-Length"; |
| } else { |
| // Check for error status codes |
| EXPECT_TRUE(response.find("413") != std::string::npos || |
| response.find("Payload Too Large") != std::string::npos || |
| response.find("400") != std::string::npos); |
| } |
| } |
| } |
| |
| TEST_F(PayloadMaxLengthTest, NoContentLengthWithinLimit) { |
| // Test request without Content-Length header within payload limit |
| std::string request_without_content_length = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + |
| std::to_string(PORT) + |
| "\r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| // Add payload within the 8-byte limit |
| std::string small_payload(4, 'Y'); // 4 bytes, within 8-byte limit |
| request_without_content_length += small_payload; |
| |
| std::string response; |
| bool result = send_request(1, request_without_content_length, &response); |
| |
| // For requests without Content-Length, the server may have different behavior |
| // The key is that it should not reject due to payload limit for small |
| // payloads |
| if (result) { |
| // Check for any HTTP response (success or error, but not connection closed) |
| if (response.length() > 10) { |
| SUCCEED() |
| << "Server processed request without Content-Length within limit"; |
| } else { |
| // Short response might indicate connection closed, which is acceptable |
| SUCCEED() << "Server closed connection for request without " |
| "Content-Length (acceptable behavior)"; |
| } |
| } else { |
| // Connection failure might be due to protocol requirements |
| SUCCEED() << "Connection issue with request without Content-Length " |
| "(environment-specific)"; |
| } |
| } |
| |
| class LargePayloadMaxLengthTest : public ::testing::Test { |
| protected: |
| LargePayloadMaxLengthTest() |
| : cli_(HOST, PORT) |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| , |
| svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) |
| #endif |
| { |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| cli_.enable_server_certificate_verification(false); |
| #endif |
| } |
| |
| virtual void SetUp() { |
| // Set 10MB payload limit |
| const size_t LARGE_PAYLOAD_LIMIT = 10 * 1024 * 1024; // 10MB |
| svr_.set_payload_max_length(LARGE_PAYLOAD_LIMIT); |
| |
| svr_.Post("/test", [&](const Request & /*req*/, Response &res) { |
| res.set_content("Large payload test", "text/plain"); |
| }); |
| |
| t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); |
| svr_.wait_until_ready(); |
| } |
| |
| virtual void TearDown() { |
| svr_.stop(); |
| t_.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| SSLClient cli_; |
| SSLServer svr_; |
| #else |
| Client cli_; |
| Server svr_; |
| #endif |
| thread t_; |
| }; |
| |
| TEST_F(LargePayloadMaxLengthTest, ChunkedEncodingWithin10MB) { |
| // Test chunked encoding with payload within 10MB limit |
| std::string medium_payload(5 * 1024 * 1024, |
| 'A'); // 5MB payload, within 10MB limit |
| |
| auto res = cli_.Post("/test", medium_payload, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST_F(LargePayloadMaxLengthTest, ChunkedEncodingExceeds10MB) { |
| // Test chunked encoding with payload exceeding 10MB limit |
| std::string large_payload(12 * 1024 * 1024, |
| 'B'); // 12MB payload, exceeds 10MB limit |
| |
| auto res = cli_.Post("/test", large_payload, "application/octet-stream"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); |
| } |
| |
| TEST_F(LargePayloadMaxLengthTest, NoContentLengthWithin10MB) { |
| // Test request without Content-Length header within 10MB limit |
| std::string request_without_content_length = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + |
| std::to_string(PORT) + |
| "\r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| // Add 1MB payload (within 10MB limit) |
| std::string medium_payload(1024 * 1024, 'C'); // 1MB payload |
| request_without_content_length += medium_payload; |
| |
| std::string response; |
| bool result = send_request(5, request_without_content_length, &response); |
| |
| if (result) { |
| // Should get a proper HTTP response for payloads within limit |
| if (response.length() > 10) { |
| SUCCEED() << "Server processed 1MB request without Content-Length within " |
| "10MB limit"; |
| } else { |
| SUCCEED() << "Server closed connection (acceptable behavior for no " |
| "Content-Length)"; |
| } |
| } else { |
| SUCCEED() << "Connection issue with 1MB payload (environment-specific)"; |
| } |
| } |
| |
| TEST_F(LargePayloadMaxLengthTest, NoContentLengthExceeds10MB) { |
| // Test request without Content-Length header exceeding 10MB limit |
| std::string request_without_content_length = "POST /test HTTP/1.1\r\n" |
| "Host: " + |
| std::string(HOST) + ":" + |
| std::to_string(PORT) + |
| "\r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| // Add 12MB payload (exceeds 10MB limit) |
| std::string large_payload(12 * 1024 * 1024, 'D'); // 12MB payload |
| request_without_content_length += large_payload; |
| |
| std::string response; |
| bool result = send_request(10, request_without_content_length, &response); |
| |
| if (!result) { |
| // Server should close connection due to payload limit |
| SUCCEED() << "Server rejected 12MB request without Content-Length " |
| "(connection closed)"; |
| } else { |
| // Check for error response |
| if (response.length() <= 10) { |
| SUCCEED() |
| << "Server closed connection for 12MB request exceeding 10MB limit"; |
| } else { |
| EXPECT_TRUE(response.find("413") != std::string::npos || |
| response.find("Payload Too Large") != std::string::npos || |
| response.find("400") != std::string::npos); |
| } |
| } |
| } |
| |
| TEST(HostAndPortPropertiesTest, NoSSL) { |
| httplib::Client cli("www.google.com", 1234); |
| ASSERT_EQ("www.google.com", cli.host()); |
| ASSERT_EQ(1234, cli.port()); |
| } |
| |
| TEST(HostAndPortPropertiesTest, NoSSLWithSimpleAPI) { |
| httplib::Client cli("www.google.com:1234"); |
| ASSERT_EQ("www.google.com", cli.host()); |
| ASSERT_EQ(1234, cli.port()); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(HostAndPortPropertiesTest, SSL) { |
| httplib::SSLClient cli("www.google.com"); |
| ASSERT_EQ("www.google.com", cli.host()); |
| ASSERT_EQ(443, cli.port()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, UpdateCAStoreWithPem) { |
| // Test updating CA store multiple times using PEM-based load_ca_cert_store |
| // This is the backend-agnostic equivalent of UpdateCAStore test |
| std::string cert; |
| read_file(CA_CERT_FILE, cert); |
| |
| httplib::SSLClient httplib_client("www.google.com"); |
| |
| // Load CA store first time |
| httplib_client.load_ca_cert_store(cert.data(), cert.size()); |
| |
| // Load CA store second time (update) |
| httplib_client.load_ca_cert_store(cert.data(), cert.size()); |
| |
| // Verify client is still valid and can make connections |
| httplib_client.enable_server_certificate_verification(true); |
| auto res = httplib_client.Get("/"); |
| ASSERT_TRUE(res); |
| // Google may return 200 or 301 depending on various factors |
| EXPECT_TRUE(res->status == StatusCode::OK_200 || |
| res->status == StatusCode::MovedPermanently_301); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, ServerNameIndication_Online) { |
| #ifdef CPPHTTPLIB_DEFAULT_HTTPBIN |
| auto host = "httpcan.org"; |
| auto path = std::string{"/get"}; |
| #else |
| auto host = "nghttp2.org"; |
| auto path = std::string{"/httpbin/get"}; |
| #endif |
| |
| SSLClient cli(host, 443); |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, ServerCertificateVerificationError_Online) { |
| // Use a site that will cause SSL verification failure due to self-signed cert |
| SSLClient cli("self-signed.badssl.com", 443); |
| cli.enable_server_certificate_verification(true); |
| auto res = cli.Get("/"); |
| |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::SSLServerVerification, res.error()); |
| |
| // Verify backend error is captured for SSLServerVerification |
| // This occurs when certificate verification fails |
| // OpenSSL: X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT (18) |
| // Mbed TLS: MBEDTLS_X509_BADCERT_NOT_TRUSTED or similar flags |
| EXPECT_NE(0UL, res.ssl_backend_error()); |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| // For OpenSSL, ssl_error is 0 for verification errors |
| EXPECT_EQ(0, res.ssl_error()); |
| EXPECT_EQ(static_cast<unsigned long>(X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT), |
| res.ssl_openssl_error()); |
| #endif |
| } |
| |
| TEST(SSLClientTest, ServerHostnameVerificationError_Online) { |
| // Use a site where hostname doesn't match the certificate |
| // badssl.com provides wrong.host.badssl.com which has cert for *.badssl.com |
| SSLClient cli("wrong.host.badssl.com", 443); |
| cli.enable_server_certificate_verification(true); |
| cli.enable_server_hostname_verification(true); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| |
| // The error type depends on when hostname verification occurs: |
| // - OpenSSL: SSLServerHostnameVerification (post-handshake verification) |
| // - Mbed TLS: SSLServerVerification (during handshake) |
| EXPECT_TRUE(res.error() == Error::SSLServerHostnameVerification || |
| res.error() == Error::SSLServerVerification); |
| |
| // Verify backend error is captured for hostname verification failure |
| EXPECT_NE(0UL, res.ssl_backend_error()); |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| // For OpenSSL, ssl_error is 0 for verification errors |
| EXPECT_EQ(0, res.ssl_error()); |
| EXPECT_EQ(static_cast<unsigned long>(X509_V_ERR_HOSTNAME_MISMATCH), |
| res.ssl_openssl_error()); |
| #endif |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, ServerCertificateVerification1_Online) { |
| Client cli("https://google.com"); |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, ServerCertificateVerification2_Online) { |
| SSLClient cli("google.com"); |
| cli.set_ca_cert_path(CA_CERT_FILE); |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, ServerCertificateVerification3_Online) { |
| SSLClient cli("google.com"); |
| cli.enable_server_certificate_verification(true); |
| cli.set_ca_cert_path("hello"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::SSLLoadingCerts, res.error()); |
| |
| // For SSL_CTX operations, ssl_error should be 0, only ssl_backend_error |
| // should be set |
| EXPECT_EQ(0, res.ssl_error()); |
| |
| // Verify backend error is captured for SSLLoadingCerts |
| // This error occurs when loading CA certificates fails |
| EXPECT_NE(0UL, res.ssl_backend_error()); |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| // OpenSSL specific error codes: |
| // > openssl errstr 0x80000002 |
| // error:80000002:system library::No such file or directory |
| // > openssl errstr 0xA000126 |
| // error:0A000126:SSL routines::unexpected eof while reading |
| EXPECT_TRUE(res.ssl_openssl_error() == 0x80000002 || |
| res.ssl_openssl_error() == 0xA000126); |
| #endif |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, ServerCertificateVerification4) { |
| SSLServer svr(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| svr.stop(); |
| ASSERT_TRUE(true); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen("127.0.0.1", PORT)); }); |
| auto se = detail::scope_exit([&] { |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli("127.0.0.1", PORT); |
| cli.set_ca_cert_path(SERVER_CERT2_FILE); |
| cli.enable_server_certificate_verification(true); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerification5_Online) { |
| std::string cert; |
| read_file(CA_CERT_FILE, cert); |
| |
| SSLClient cli("google.com"); |
| cli.load_ca_cert_store(cert.data(), cert.size()); |
| const auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SSLClientTest, ServerCertificateVerification6_Online) { |
| // clang-format off |
| static constexpr char cert[] = |
| "GlobalSign Root CA\n" |
| "==================\n" |
| "-----BEGIN CERTIFICATE-----\n" |
| "MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUx\n" |
| "GTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jvb3QgQ0ExGzAZBgNVBAMTEkds\n" |
| "b2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAwMDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNV\n" |
| "BAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYD\n" |
| "VQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDa\n" |
| "DuaZjc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavpxy0Sy6sc\n" |
| "THAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp1Wrjsok6Vjk4bwY8iGlb\n" |
| "Kk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdGsnUOhugZitVtbNV4FpWi6cgKOOvyJBNP\n" |
| "c1STE4U6G7weNLWLBYy5d4ux2x8gkasJU26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrX\n" |
| "gzT/LCrBbBlDSgeF59N89iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV\n" |
| "HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0BAQUF\n" |
| "AAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOzyj1hTdNGCbM+w6Dj\n" |
| "Y1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE38NflNUVyRRBnMRddWQVDf9VMOyG\n" |
| "j/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymPAbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhH\n" |
| "hm4qxFYxldBniYUr+WymXUadDKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveC\n" |
| "X4XSQRjbgbMEHMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A==\n" |
| "-----END CERTIFICATE-----\n"; |
| // clang-format on |
| |
| SSLClient cli("google.com"); |
| cli.load_ca_cert_store(cert, sizeof(cert)); |
| const auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SSLClientTest, Issue2004_Online) { |
| Client client("https://google.com"); |
| client.set_follow_location(true); |
| |
| auto res = client.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| |
| auto body = res->body; |
| EXPECT_EQ(body.substr(0, 15), "<!doctype html>"); |
| } |
| |
| TEST(SSLClientTest, ErrorReportingWhenInvalid) { |
| // Create SSLClient with invalid cert/key to make is_valid() return false |
| SSLClient cli("localhost", 8080, "nonexistent_cert.pem", |
| "nonexistent_key.pem"); |
| |
| // is_valid() should be false due to cert loading failure |
| ASSERT_FALSE(cli.is_valid()); |
| |
| auto res = cli.Get("/"); |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::SSLConnection, res.error()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, WildcardHostNameMatch_Online) { |
| SSLClient cli("www.youtube.com"); |
| |
| cli.set_ca_cert_path(CA_CERT_FILE); |
| cli.enable_server_certificate_verification(true); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientTest, Issue2251_SwappedClientCertAndKey) { |
| // Test for Issue #2251: SSL error not properly reported when client cert |
| // and key paths are swapped or mismatched |
| // This simulates the scenario where user accidentally swaps the cert and key |
| // files |
| |
| // Using client cert file as private key and vice versa (completely wrong) |
| SSLClient cli("localhost", 8080, "client.key.pem", "client.cert.pem"); |
| |
| // Should fail validation due to cert/key mismatch |
| ASSERT_FALSE(cli.is_valid()); |
| |
| // Attempt to make a request should fail with proper error |
| auto res = cli.Get("/"); |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::SSLConnection, res.error()); |
| |
| // SSL error should be recorded in the Result object (this is the key fix for |
| // Issue #2251) |
| auto backend_error = res.ssl_backend_error(); |
| EXPECT_NE(0u, backend_error); |
| } |
| |
| // Backend-agnostic test using abstract TLS API |
| // Tests cert/key mismatch detection at the TLS context level |
| TEST(TlsApiTest, ClientCertKeyMismatch) { |
| using namespace httplib::tls; |
| |
| // Create client context |
| auto ctx = tls_create_client_context(); |
| ASSERT_NE(nullptr, ctx); |
| |
| // Try to set mismatched cert/key (client.cert.pem with key.pem from cert2) |
| // The behavior differs by backend: |
| // - OpenSSL: tls_set_client_cert_file returns false immediately |
| // - Mbed TLS: succeeds here but fails during handshake |
| bool result = |
| tls_set_client_cert_file(ctx, "client.cert.pem", "key.pem", nullptr); |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| // OpenSSL checks key consistency in SSL_CTX_use_PrivateKey_file |
| // by calling SSL_CTX_check_private_key internally after loading. |
| EXPECT_FALSE(result); |
| auto err = tls_get_error(); |
| EXPECT_NE(0u, err); |
| #endif |
| |
| #ifdef CPPHTTPLIB_MBEDTLS_SUPPORT |
| // Mbed TLS doesn't perform cert/key consistency check until handshake. |
| // The mismatch is tested at connection time by |
| // Issue2251_SwappedClientCertAndKey |
| EXPECT_TRUE(result); |
| #endif |
| |
| tls_free_context(ctx); |
| } |
| #endif |
| |
| #if 0 |
| TEST(SSLClientTest, SetInterfaceWithINET6) { |
| auto cli = std::make_shared<httplib::Client>("https://httpcan.org"); |
| ASSERT_TRUE(cli != nullptr); |
| |
| cli->set_address_family(AF_INET6); |
| cli->set_interface("en0"); |
| |
| auto res = cli->Get("/get"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| // ClientCertPresent uses tls_get_peer_cert() - works with all TLS backends |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| void ClientCertPresent( |
| const std::string &client_cert_file, |
| const std::string &client_private_key_file, |
| const std::string &client_encrypted_private_key_pass = std::string()) { |
| using namespace httplib::tls; |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, |
| CLIENT_CA_CERT_DIR); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &req, Response &res) { |
| res.set_content("test", "text/plain"); |
| |
| // Cast away const for tls_get_peer_cert (session is not modified) |
| auto peer_cert = tls_get_peer_cert(const_cast<void *>(req.ssl)); |
| ASSERT_TRUE(peer_cert != nullptr); |
| |
| std::string common_name = tls_get_cert_subject_cn(peer_cert); |
| EXPECT_EQ("Common Name", common_name); |
| |
| tls_free_cert(peer_cert); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, client_cert_file, client_private_key_file, |
| client_encrypted_private_key_pass); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientServerTest, ClientCertPresent) { |
| ClientCertPresent(CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| } |
| |
| TEST(SSLClientServerTest, ClientEncryptedCertPresent) { |
| ClientCertPresent(CLIENT_ENCRYPTED_CERT_FILE, |
| CLIENT_ENCRYPTED_PRIVATE_KEY_FILE, |
| CLIENT_ENCRYPTED_PRIVATE_KEY_PASS); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| // PEM memory-based constructor tests (works with all TLS backends) |
| void PemMemoryClientCertPresent( |
| const std::string &client_cert_file, |
| const std::string &client_private_key_file, |
| const std::string &client_encrypted_private_key_pass = std::string()) { |
| // Read PEM files into memory |
| std::string server_cert_pem, server_key_pem; |
| std::string client_ca_pem; |
| std::string client_cert_pem, client_key_pem; |
| |
| read_file(SERVER_CERT_FILE, server_cert_pem); |
| read_file(SERVER_PRIVATE_KEY_FILE, server_key_pem); |
| read_file(CLIENT_CA_CERT_FILE, client_ca_pem); |
| read_file(client_cert_file, client_cert_pem); |
| read_file(client_private_key_file, client_key_pem); |
| |
| // Create server with PEM memory |
| SSLServer::PemMemory server_pem = { |
| server_cert_pem.c_str(), |
| server_cert_pem.size(), |
| server_key_pem.c_str(), |
| server_key_pem.size(), |
| client_ca_pem.c_str(), |
| client_ca_pem.size(), |
| nullptr // no password for server key |
| }; |
| SSLServer svr(server_pem); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Create client with PEM memory |
| const char *password = client_encrypted_private_key_pass.empty() |
| ? nullptr |
| : client_encrypted_private_key_pass.c_str(); |
| SSLClient::PemMemory client_pem = { |
| client_cert_pem.c_str(), client_cert_pem.size(), client_key_pem.c_str(), |
| client_key_pem.size(), password}; |
| SSLClient cli(HOST, PORT, client_pem); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientServerTest, PemMemoryClientCertPresent) { |
| PemMemoryClientCertPresent(CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| } |
| |
| TEST(SSLClientServerTest, PemMemoryClientEncryptedCertPresent) { |
| PemMemoryClientCertPresent(CLIENT_ENCRYPTED_CERT_FILE, |
| CLIENT_ENCRYPTED_PRIVATE_KEY_FILE, |
| CLIENT_ENCRYPTED_PRIVATE_KEY_PASS); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientServerTest, ClientCertMissing) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, |
| CLIENT_CA_CERT_DIR); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &) { ASSERT_TRUE(false); }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(!res); |
| // When client cert is missing and server requires it, connection fails |
| // Error type depends on backend implementation |
| EXPECT_TRUE(res.error() == Error::SSLServerVerification || |
| res.error() == Error::SSLConnection); |
| |
| // Verify backend error is captured |
| // Note: This test may have different error codes depending on the exact |
| // verification failure |
| EXPECT_NE(0UL, res.ssl_backend_error()); |
| } |
| |
| TEST(SSLClientServerTest, TrustDirOptional) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientServerTest, SSLConnectTimeout) { |
| class NoListenSSLServer : public SSLServer { |
| public: |
| NoListenSSLServer(const char *cert_path, const char *private_key_path, |
| const char *client_ca_cert_file_path, |
| const char *client_ca_cert_dir_path = nullptr) |
| : SSLServer(cert_path, private_key_path, client_ca_cert_file_path, |
| client_ca_cert_dir_path), |
| stop_(false) {} |
| |
| std::atomic_bool stop_; |
| |
| private: |
| bool process_and_close_socket(socket_t /*sock*/) override { |
| // Don't create SSL context |
| while (!stop_.load()) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(100)); |
| } |
| return true; |
| } |
| }; |
| NoListenSSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, |
| CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop_ = true; |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(1); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(!res); |
| EXPECT_EQ(Error::SSLConnection, res.error()); |
| // Timeout results in WantRead error code (maps to backend-specific value) |
| EXPECT_NE(0, res.ssl_error()); |
| } |
| #endif |
| |
| // Backend-agnostic equivalent of CustomizeServerSSLCtx test |
| // Uses void* callback constructor and detail::tls API |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientServerTest, CustomizeServerSSLCtxGeneric) { |
| using namespace httplib::tls; |
| |
| auto setup_callback = [](void *ctx) { |
| // Load server certificate and key using backend-agnostic API |
| if (!tls_set_server_cert_file(static_cast<tls_ctx_t>(ctx), SERVER_CERT_FILE, |
| SERVER_PRIVATE_KEY_FILE, nullptr)) { |
| return false; |
| } |
| // Set up client certificate verification |
| if (!tls_set_client_ca_file(static_cast<tls_ctx_t>(ctx), |
| CLIENT_CA_CERT_FILE, CLIENT_CA_CERT_DIR)) { |
| return false; |
| } |
| tls_set_verify_client(static_cast<tls_ctx_t>(ctx), true); |
| return true; |
| }; |
| |
| SSLServer svr(setup_callback); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [&](const Request &req, Response &res) { |
| res.set_content("test", "text/plain"); |
| |
| // Get peer certificate using backend-agnostic API |
| // Note: req.ssl is const void*, need const_cast for API compatibility |
| auto peer_cert = tls_get_peer_cert(const_cast<tls_session_t>(req.ssl)); |
| ASSERT_TRUE(peer_cert != nullptr); |
| |
| // Verify common name using backend-agnostic API |
| auto common_name = tls_get_cert_subject_cn(peer_cert); |
| EXPECT_EQ("Common Name", common_name); |
| |
| tls_free_cert(peer_cert); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| // mbedTLS-specific callback constructor test |
| // Tests that the void* callback can customize TLS settings via MbedTlsContext |
| #ifdef CPPHTTPLIB_MBEDTLS_SUPPORT |
| TEST(SSLClientServerTest, CustomizeServerSSLCtxMbedTLS) { |
| using namespace httplib::tls; |
| |
| // Track if callback was invoked |
| bool callback_invoked = false; |
| |
| // The callback receives void* ctx which is actually MbedTlsContext* |
| // We can access the mbedtls_ssl_config via the context |
| auto setup_callback = [&callback_invoked](void *ctx) { |
| callback_invoked = true; |
| |
| // Cast to MbedTlsContext* to access the ssl config |
| auto *mbedtls_ctx = static_cast<httplib::MbedTlsContext *>(ctx); |
| mbedtls_ssl_config *conf = &mbedtls_ctx->conf; |
| |
| // Use static variables to hold certificate data (simplified for test) |
| static mbedtls_x509_crt own_cert; |
| static mbedtls_pk_context own_key; |
| static mbedtls_x509_crt ca_chain; |
| static bool initialized = false; |
| |
| if (!initialized) { |
| mbedtls_x509_crt_init(&own_cert); |
| mbedtls_pk_init(&own_key); |
| mbedtls_x509_crt_init(&ca_chain); |
| |
| // Load server certificate |
| if (mbedtls_x509_crt_parse_file(&own_cert, SERVER_CERT_FILE) != 0) { |
| return false; |
| } |
| // Load server private key |
| if (mbedtls_pk_parse_keyfile(&own_key, SERVER_PRIVATE_KEY_FILE, nullptr |
| #if MBEDTLS_VERSION_MAJOR >= 3 |
| , |
| mbedtls_ctr_drbg_random, nullptr |
| #endif |
| ) != 0) { |
| return false; |
| } |
| // Load CA chain for client verification |
| if (mbedtls_x509_crt_parse_file(&ca_chain, CLIENT_CA_CERT_FILE) != 0) { |
| return false; |
| } |
| initialized = true; |
| } |
| |
| // Configure the SSL config |
| mbedtls_ssl_conf_own_cert(conf, &own_cert, &own_key); |
| mbedtls_ssl_conf_ca_chain(conf, &ca_chain, nullptr); |
| mbedtls_ssl_conf_authmode(conf, MBEDTLS_SSL_VERIFY_REQUIRED); |
| |
| // Set minimum TLS version using mbedTLS native API |
| #if MBEDTLS_VERSION_MAJOR >= 3 |
| mbedtls_ssl_conf_min_tls_version(conf, MBEDTLS_SSL_VERSION_TLS1_2); |
| #else |
| mbedtls_ssl_conf_min_version(conf, MBEDTLS_SSL_MAJOR_VERSION_3, |
| MBEDTLS_SSL_MINOR_VERSION_3); |
| #endif |
| |
| return true; |
| }; |
| |
| SSLServer svr(setup_callback); |
| ASSERT_TRUE(svr.is_valid()); |
| ASSERT_TRUE(callback_invoked); |
| |
| svr.Get("/test", [&](const Request &req, Response &res) { |
| res.set_content("test", "text/plain"); |
| |
| // Get peer certificate using backend-agnostic API |
| auto peer_cert = tls_get_peer_cert(const_cast<tls_session_t>(req.ssl)); |
| ASSERT_TRUE(peer_cert != nullptr); |
| |
| auto common_name = tls_get_cert_subject_cn(peer_cert); |
| EXPECT_EQ("Common Name", common_name); |
| |
| tls_free_cert(peer_cert); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientServerTest, ClientCAListSentToClient) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // Set up a handler to verify client certificate is present |
| bool client_cert_verified = false; |
| svr.Get("/test", [&](const Request & /*req*/, Response &res) { |
| // Verify that client certificate was provided |
| client_cert_verified = true; |
| res.set_content("success", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Client with certificate |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_TRUE(client_cert_verified); |
| EXPECT_EQ("success", res->body); |
| } |
| #endif |
| |
| // ClientCAListSetInContext uses tls_get_peer_cert() - works with all TLS |
| // backends |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientServerTest, ClientCAListSetInContext) { |
| using namespace httplib::tls; |
| |
| // Test that when client CA cert file is provided, |
| // the server properly requests and validates client certificates |
| |
| // Create a server with client authentication |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| bool handler_called = false; |
| svr.Get("/test", [&](const Request &req, Response &res) { |
| handler_called = true; |
| |
| // Verify that a client certificate was provided |
| // Cast away const for tls_get_peer_cert (session is not modified) |
| auto peer_cert = tls_get_peer_cert(const_cast<void *>(req.ssl)); |
| ASSERT_TRUE(peer_cert != nullptr); |
| |
| // Get the issuer name |
| std::string issuer_str = tls_get_cert_issuer_name(peer_cert); |
| ASSERT_FALSE(issuer_str.empty()); |
| |
| // The client certificate should be issued by our test CA |
| EXPECT_TRUE(issuer_str.find("Root CA Name") != std::string::npos); |
| |
| tls_free_cert(peer_cert); |
| res.set_content("authenticated", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Connect with a client certificate issued by the CA |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_TRUE(handler_called); |
| EXPECT_EQ("authenticated", res->body); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(TlsCertIntrospectionTest, GetCertSANs) { |
| using namespace httplib::tls; |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [](const Request &, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| bool cert_checked = false; |
| cli.set_server_certificate_verifier( |
| [&](tls_session_t session, tls_cert_t peer_cert) -> bool { |
| (void)session; |
| if (peer_cert) { |
| std::vector<TlsSanEntry> sans; |
| bool result = tls_get_cert_sans(peer_cert, sans); |
| // tls_get_cert_sans should return true even if no SANs exist |
| EXPECT_TRUE(result); |
| // Test certificate may or may not have SANs - just verify the API |
| // works If SANs exist, verify the types are valid |
| for (const auto &san : sans) { |
| EXPECT_TRUE(san.type == SanType::DNS || san.type == SanType::IP || |
| san.type == SanType::EMAIL || |
| san.type == SanType::URI || san.type == SanType::OTHER); |
| EXPECT_FALSE(san.value.empty()); |
| } |
| cert_checked = true; |
| } |
| return true; |
| }); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(cert_checked); |
| } |
| |
| TEST(TlsCertIntrospectionTest, GetCertValidity) { |
| using namespace httplib::tls; |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [](const Request &, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| bool validity_checked = false; |
| cli.set_server_certificate_verifier( |
| [&](tls_session_t session, tls_cert_t peer_cert) -> bool { |
| (void)session; |
| if (peer_cert) { |
| time_t not_before = 0, not_after = 0; |
| bool result = tls_get_cert_validity(peer_cert, not_before, not_after); |
| EXPECT_TRUE(result); |
| // Verify that not_before < now < not_after for a valid cert |
| time_t now = time(nullptr); |
| EXPECT_LT(not_before, now); |
| EXPECT_GT(not_after, now); |
| validity_checked = true; |
| } |
| return true; |
| }); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(validity_checked); |
| } |
| |
| TEST(TlsCertIntrospectionTest, GetCertSerial) { |
| using namespace httplib::tls; |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [](const Request &, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| bool serial_checked = false; |
| cli.set_server_certificate_verifier( |
| [&](tls_session_t session, tls_cert_t peer_cert) -> bool { |
| (void)session; |
| if (peer_cert) { |
| std::string serial = tls_get_cert_serial(peer_cert); |
| EXPECT_FALSE(serial.empty()); |
| // Serial should be a hex string |
| for (char c : serial) { |
| EXPECT_TRUE((c >= '0' && c <= '9') || (c >= 'A' && c <= 'F') || |
| (c >= 'a' && c <= 'f')); |
| } |
| serial_checked = true; |
| } |
| return true; |
| }); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| EXPECT_TRUE(serial_checked); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientServerTest, ClientCAListLoadErrorRecorded) { |
| // Test 1: Valid CA file - no error should be recorded |
| { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, |
| CLIENT_CA_CERT_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // With valid setup, last_ssl_error should be 0 |
| EXPECT_EQ(0, svr.ssl_last_error()); |
| } |
| |
| // Test 2: Invalid CA file content |
| // When SSL_load_client_CA_file fails, last_ssl_error_ should be set |
| { |
| // Create a temporary file with completely invalid content |
| const char *temp_invalid_ca = "./temp_invalid_ca_for_test.txt"; |
| { |
| std::ofstream ofs(temp_invalid_ca); |
| ofs << "This is not a certificate file at all\n"; |
| ofs << "Just plain text content\n"; |
| } |
| |
| // Create server with invalid CA file |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, temp_invalid_ca); |
| |
| // Clean up temporary file |
| std::remove(temp_invalid_ca); |
| |
| // When there's an SSL error (from either SSL_CTX_load_verify_locations |
| // or SSL_load_client_CA_file), last_ssl_error_ should be non-zero |
| // Note: SSL_CTX_load_verify_locations typically fails first, |
| // but our error handling code path is still exercised |
| if (!svr.is_valid()) { EXPECT_NE(0, svr.ssl_last_error()); } |
| } |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(TlsVerifyCallbackExTest, ExtendedCallback) { |
| using namespace httplib::tls; |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Get("/test", [](const Request &, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| SSLClient cli(HOST, PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_connection_timeout(30); |
| |
| int callback_count = 0; |
| bool saw_leaf_cert = false; |
| |
| // Use the new extended callback via the context directly |
| // Note: This tests the internal API, real usage would be through |
| // set_server_certificate_verifier |
| cli.set_server_certificate_verifier( |
| [&](tls_session_t session, tls_cert_t peer_cert) -> bool { |
| (void)session; |
| if (peer_cert) { |
| callback_count++; |
| // We should see at least one certificate (the leaf) |
| std::string cn = tls_get_cert_subject_cn(peer_cert); |
| if (!cn.empty()) { saw_leaf_cert = true; } |
| } |
| return true; |
| }); |
| |
| auto res = cli.Get("/test"); |
| ASSERT_TRUE(res); |
| EXPECT_GT(callback_count, 0); |
| EXPECT_TRUE(saw_leaf_cert); |
| } |
| |
| TEST(TlsVerifyErrorTest, GetVerifyErrorString) { |
| using namespace httplib::tls; |
| |
| // Test that tls_verify_error_string returns empty for success |
| std::string success_str = tls_verify_error_string(0); |
| EXPECT_TRUE(success_str.empty()); |
| |
| // Test that tls_verify_error_string returns non-empty for error codes |
| // Using a common error code (certificate expired) |
| std::string error_str = |
| tls_verify_error_string(10); // X509_V_ERR_CERT_HAS_EXPIRED |
| EXPECT_FALSE(error_str.empty()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(CryptoHashTest, BasicHashing) { |
| namespace crypto = httplib::crypto; |
| |
| // Test MD5 |
| std::string md5_result = crypto::hash(crypto::HashAlgorithm::MD5, "hello"); |
| EXPECT_EQ("5d41402abc4b2a76b9719d911017c592", md5_result); |
| |
| // Test SHA256 |
| std::string sha256_result = |
| crypto::hash(crypto::HashAlgorithm::SHA256, "hello"); |
| EXPECT_EQ("2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824", |
| sha256_result); |
| |
| // Test SHA512 |
| std::string sha512_result = |
| crypto::hash(crypto::HashAlgorithm::SHA512, "hello"); |
| EXPECT_EQ( |
| "9b71d224bd62f3785d96d46ad3ea3d73319bfbc2890caadae2dff72519673ca72323c3d9" |
| "9ba5c11d7c7acc6e14b8c5da0c4663475c2e5c3adef46f73bcdec043", |
| sha512_result); |
| } |
| |
| TEST(CryptoHashTest, HashSize) { |
| namespace crypto = httplib::crypto; |
| |
| EXPECT_EQ(16u, crypto::hash_size(crypto::HashAlgorithm::MD5)); |
| EXPECT_EQ(20u, crypto::hash_size(crypto::HashAlgorithm::SHA1)); |
| EXPECT_EQ(32u, crypto::hash_size(crypto::HashAlgorithm::SHA256)); |
| EXPECT_EQ(48u, crypto::hash_size(crypto::HashAlgorithm::SHA384)); |
| EXPECT_EQ(64u, crypto::hash_size(crypto::HashAlgorithm::SHA512)); |
| } |
| |
| TEST(CryptoHashTest, HashRaw) { |
| namespace crypto = httplib::crypto; |
| |
| std::vector<uint8_t> digest; |
| bool result = |
| crypto::hash_raw(crypto::HashAlgorithm::SHA256, "test", 4, digest); |
| EXPECT_TRUE(result); |
| EXPECT_EQ(32u, digest.size()); |
| |
| // Verify first few bytes match known SHA256 of "test" |
| // SHA256("test") = |
| // 9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08 |
| EXPECT_EQ(0x9f, digest[0]); |
| EXPECT_EQ(0x86, digest[1]); |
| EXPECT_EQ(0xd0, digest[2]); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientServerTest, ClientCAListFromPem) { |
| // Test SSL server using PemMemory constructor with client CA certificates |
| // This is the backend-agnostic equivalent of ClientCAListFromX509Store test |
| |
| // Read PEM files |
| std::string server_cert_pem, server_key_pem, client_ca_pem; |
| read_file(SERVER_CERT_FILE, server_cert_pem); |
| read_file(SERVER_PRIVATE_KEY_FILE, server_key_pem); |
| read_file(CLIENT_CA_CERT_FILE, client_ca_pem); |
| |
| // Create SSLServer with PemMemory constructor including client CA |
| SSLServer::PemMemory server_pem = { |
| server_cert_pem.c_str(), |
| server_cert_pem.size(), |
| server_key_pem.c_str(), |
| server_key_pem.size(), |
| client_ca_pem.c_str(), |
| client_ca_pem.size(), |
| nullptr // no password for server key |
| }; |
| SSLServer svr(server_pem); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| // No SSL error should be recorded for valid setup |
| EXPECT_EQ(0, svr.ssl_last_error()); |
| |
| // Set up server endpoints |
| svr.Get("/test-pem-ca", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| // Start server in a thread |
| auto server_thread = thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| // Connect with client certificate (using constructor with paths) |
| SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); |
| cli.enable_server_certificate_verification(false); |
| |
| auto res = cli.Get("/test-pem-ca"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(200, res->status); |
| EXPECT_EQ("ok", res->body); |
| |
| svr.stop(); |
| server_thread.join(); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_OPENSSL_SUPPORT |
| // Disabled due to the out-of-memory problem on GitHub Actions Workflows |
| TEST(SSLClientServerTest, DISABLED_LargeDataTransfer) { |
| |
| // prepare large data |
| std::random_device seed_gen; |
| std::mt19937 random(seed_gen()); |
| constexpr auto large_size_byte = 2147483648UL + 1048576UL; // 2GiB + 1MiB |
| std::vector<std::uint32_t> binary(large_size_byte / sizeof(std::uint32_t)); |
| std::generate(binary.begin(), binary.end(), [&random]() { return random(); }); |
| |
| // server |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(svr.is_valid()); |
| |
| svr.Post("/binary", [&](const Request &req, Response &res) { |
| EXPECT_EQ(large_size_byte, req.body.size()); |
| EXPECT_EQ(0, std::memcmp(binary.data(), req.body.data(), large_size_byte)); |
| res.set_content(req.body, "application/octet-stream"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // client POST |
| SSLClient cli("localhost", PORT); |
| cli.enable_server_certificate_verification(false); |
| cli.set_read_timeout(std::chrono::seconds(100)); |
| cli.set_write_timeout(std::chrono::seconds(100)); |
| auto res = cli.Post("/binary", reinterpret_cast<char *>(binary.data()), |
| large_size_byte, "application/octet-stream"); |
| |
| // compare |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(large_size_byte, res->body.size()); |
| EXPECT_EQ(0, std::memcmp(binary.data(), res->body.data(), large_size_byte)); |
| } |
| #endif |
| |
| #ifdef _WIN32 |
| TEST(CleanupTest, WSACleanup) { |
| int ret = WSACleanup(); |
| ASSERT_EQ(0, ret); |
| } |
| #endif |
| |
| #ifndef CPPHTTPLIB_SSL_ENABLED |
| TEST(NoSSLSupport, SimpleInterface) { |
| ASSERT_ANY_THROW(Client cli("https://yahoo.com")); |
| } |
| #endif |
| |
| #ifndef CPPHTTPLIB_NO_EXCEPTIONS |
| TEST(InvalidScheme, SimpleInterface) { |
| ASSERT_ANY_THROW(Client cli("scheme://yahoo.com")); |
| } |
| #endif |
| |
| TEST(NoScheme, SimpleInterface) { |
| Client cli("yahoo.com:80"); |
| ASSERT_TRUE(cli.is_valid()); |
| } |
| |
| TEST(SendAPI, SimpleInterface_Online) { |
| Client cli("http://yahoo.com"); |
| |
| Request req; |
| req.method = "GET"; |
| req.path = "/"; |
| auto res = cli.send(req); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| } |
| |
| TEST(SendAPI, WithParamsInRequest) { |
| Server svr; |
| |
| svr.Get("/", [&](const Request &req, Response & /*res*/) { |
| EXPECT_TRUE(req.has_param("test")); |
| EXPECT_EQ("test_value", req.get_param_value("test")); |
| }); |
| |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| { |
| Request req; |
| req.method = "GET"; |
| req.path = "/"; |
| req.params.emplace("test", "test_value"); |
| auto res = cli.send(req); |
| ASSERT_TRUE(res); |
| } |
| { |
| auto res = cli.Get("/", {{"test", "test_value"}}, Headers{}); |
| ASSERT_TRUE(res); |
| } |
| } |
| |
| TEST(ClientImplMethods, GetSocketTest) { |
| httplib::Server svr; |
| svr.Get("/", [&](const httplib::Request & /*req*/, httplib::Response &res) { |
| res.status = StatusCode::OK_200; |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen("127.0.0.1", 3333); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| httplib::Client cli("http://127.0.0.1:3333"); |
| cli.set_keep_alive(true); |
| |
| // Use the behavior of cpp-httplib of opening the connection |
| // only when the first request happens. If that changes, |
| // this test would be obsolete. |
| |
| EXPECT_EQ(cli.socket(), INVALID_SOCKET); |
| |
| // This also implicitly tests the server. But other tests would fail much |
| // earlier than this one to be considered. |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| ASSERT_TRUE(cli.socket() != INVALID_SOCKET); |
| } |
| } |
| |
| // Disabled due to out-of-memory problem on GitHub Actions |
| #ifdef _WIN64 |
| TEST(ServerLargeContentTest, DISABLED_SendLargeContent) { |
| // allocate content size larger than 2GB in memory |
| const size_t content_size = 2LL * 1024LL * 1024LL * 1024LL + 1LL; |
| char *content = (char *)malloc(content_size); |
| ASSERT_TRUE(content); |
| |
| Server svr; |
| svr.Get("/foo", |
| [=](const httplib::Request & /*req*/, httplib::Response &res) { |
| res.set_content(content, content_size, "application/octet-stream"); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| if (content) free(content); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Get("/foo"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(content_size, res->body.length()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(YahooRedirectTest2, SimpleInterface_Online) { |
| Client cli("http://yahoo.com"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("https://www.yahoo.com/", res->location); |
| } |
| |
| TEST(YahooRedirectTest3, SimpleInterface_Online) { |
| Client cli("https://yahoo.com"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("https://www.yahoo.com/", res->location); |
| } |
| |
| TEST(YahooRedirectTest3, NewResultInterface_Online) { |
| Client cli("https://yahoo.com"); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| ASSERT_FALSE(!res); |
| ASSERT_TRUE(res); |
| ASSERT_FALSE(res == nullptr); |
| ASSERT_TRUE(res != nullptr); |
| EXPECT_EQ(Error::Success, res.error()); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res.value().status); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, (*res).status); |
| EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); |
| |
| cli.set_follow_location(true); |
| res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(Error::Success, res.error()); |
| EXPECT_EQ(StatusCode::OK_200, res.value().status); |
| EXPECT_EQ(StatusCode::OK_200, (*res).status); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("https://www.yahoo.com/", res->location); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| TEST(DecodeWithChunkedEncoding, BrotliEncoding_Online) { |
| Client cli("https://cdnjs.cloudflare.com"); |
| auto res = |
| cli.Get("/ajax/libs/jquery/3.5.1/jquery.js", {{"Accept-Encoding", "br"}}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(287630U, res->body.size()); |
| EXPECT_EQ("application/javascript; charset=utf-8", |
| res->get_header_value("Content-Type")); |
| } |
| #endif |
| |
| // Previously "https://nghttp2.org" "/httpbin/redirect-to" |
| #undef REDIR_HOST // Silence compiler warning |
| #define REDIR_HOST "https://httpbingo.org" |
| |
| TEST(HttpsToHttpRedirectTest, SimpleInterface_Online) { |
| Client cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| auto res = |
| cli.Get(REDIR_PATH "?url=http%3A%2F%2Fexample.com&status_code=302"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpsToHttpRedirectTest2, SimpleInterface_Online) { |
| Client cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| |
| Params params; |
| params.emplace("url", "http://example.com"); |
| params.emplace("status_code", "302"); |
| |
| auto res = cli.Get(REDIR_PATH, params, Headers{}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(HttpsToHttpRedirectTest3, SimpleInterface_Online) { |
| Client cli(REDIR_HOST); |
| cli.set_follow_location(true); |
| |
| Params params; |
| params.emplace("url", "http://example.com"); |
| |
| auto res = cli.Get(REDIR_PATH "?status_code=302", params, Headers{}); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(HttpToHttpsRedirectTest, CertFile) { |
| Server svr; |
| ASSERT_TRUE(svr.is_valid()); |
| svr.Get("/index", [&](const Request &, Response &res) { |
| res.set_redirect("https://127.0.0.1:1235/index"); |
| svr.stop(); |
| }); |
| |
| SSLServer ssl_svr(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(ssl_svr.is_valid()); |
| ssl_svr.Get("/index", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| ssl_svr.stop(); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(svr.listen("127.0.0.1", PORT)); }); |
| thread t2 = thread([&]() { ASSERT_TRUE(ssl_svr.listen("127.0.0.1", 1235)); }); |
| auto se = detail::scope_exit([&] { |
| t2.join(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| ssl_svr.wait_until_ready(); |
| |
| Client cli("127.0.0.1", PORT); |
| cli.set_ca_cert_path(SERVER_CERT2_FILE); |
| cli.enable_server_certificate_verification(true); |
| cli.set_follow_location(true); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/index"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(SSLClientRedirectTest, CertFile) { |
| SSLServer ssl_svr1(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(ssl_svr1.is_valid()); |
| ssl_svr1.Get("/index", [&](const Request &, Response &res) { |
| res.set_redirect("https://127.0.0.1:1235/index"); |
| ssl_svr1.stop(); |
| }); |
| |
| SSLServer ssl_svr2(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); |
| ASSERT_TRUE(ssl_svr2.is_valid()); |
| ssl_svr2.Get("/index", [&](const Request &, Response &res) { |
| res.set_content("test", "text/plain"); |
| ssl_svr2.stop(); |
| }); |
| |
| thread t = thread([&]() { ASSERT_TRUE(ssl_svr1.listen("127.0.0.1", PORT)); }); |
| thread t2 = |
| thread([&]() { ASSERT_TRUE(ssl_svr2.listen("127.0.0.1", 1235)); }); |
| auto se = detail::scope_exit([&] { |
| t2.join(); |
| t.join(); |
| ASSERT_FALSE(ssl_svr1.is_running()); |
| }); |
| |
| ssl_svr1.wait_until_ready(); |
| ssl_svr2.wait_until_ready(); |
| |
| SSLClient cli("127.0.0.1", PORT); |
| std::string cert; |
| read_file(SERVER_CERT2_FILE, cert); |
| cli.load_ca_cert_store(cert.c_str(), cert.size()); |
| cli.enable_server_certificate_verification(true); |
| cli.set_follow_location(true); |
| cli.set_connection_timeout(30); |
| |
| auto res = cli.Get("/index"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| TEST(MultipartFormDataTest, LargeData) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Post("/post", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_TRUE(std::string(items[0].name) == "document"); |
| EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); |
| EXPECT_TRUE(items[0].filename == "2MB_data"); |
| EXPECT_TRUE(items[0].content_type == "application/octet-stream"); |
| |
| EXPECT_TRUE(items[1].name == "hello"); |
| EXPECT_TRUE(items[1].content == "world"); |
| EXPECT_TRUE(items[1].filename == ""); |
| EXPECT_TRUE(items[1].content_type == ""); |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| } |
| }); |
| |
| auto t = std::thread([&]() { svr.listen(HOST, 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| std::string data(1024 * 1024 * 2, '.'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| auto res = cli.Post("/post", items); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, DataProviderItems) { |
| |
| std::random_device seed_gen; |
| std::mt19937 random(seed_gen()); |
| |
| std::string rand1; |
| rand1.resize(1000); |
| std::generate(rand1.begin(), rand1.end(), [&]() { return random(); }); |
| |
| std::string rand2; |
| rand2.resize(3000); |
| std::generate(rand2.begin(), rand2.end(), [&]() { return random(); }); |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Post("/post-none", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| ASSERT_FALSE(req.is_multipart_form_data()); |
| |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_EQ(body, ""); |
| }); |
| |
| svr.Post("/post-items", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| ASSERT_TRUE(req.is_multipart_form_data()); |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(items.size() == 2); |
| |
| EXPECT_EQ(std::string(items[0].name), "name1"); |
| EXPECT_EQ(items[0].content, "Testing123"); |
| EXPECT_EQ(items[0].filename, "filename1"); |
| EXPECT_EQ(items[0].content_type, "application/octet-stream"); |
| |
| EXPECT_EQ(items[1].name, "name2"); |
| EXPECT_EQ(items[1].content, "Testing456"); |
| EXPECT_EQ(items[1].filename, ""); |
| EXPECT_EQ(items[1].content_type, ""); |
| }); |
| |
| svr.Post("/post-providers", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| ASSERT_TRUE(req.is_multipart_form_data()); |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(items.size() == 2); |
| |
| EXPECT_EQ(items[0].name, "name3"); |
| EXPECT_EQ(items[0].content, rand1); |
| EXPECT_EQ(items[0].filename, "filename3"); |
| EXPECT_EQ(items[0].content_type, ""); |
| |
| EXPECT_EQ(items[1].name, "name4"); |
| EXPECT_EQ(items[1].content, rand2); |
| EXPECT_EQ(items[1].filename, "filename4"); |
| EXPECT_EQ(items[1].content_type, ""); |
| }); |
| |
| svr.Post("/post-both", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| ASSERT_TRUE(req.is_multipart_form_data()); |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| ASSERT_TRUE(items.size() == 4); |
| |
| EXPECT_EQ(std::string(items[0].name), "name1"); |
| EXPECT_EQ(items[0].content, "Testing123"); |
| EXPECT_EQ(items[0].filename, "filename1"); |
| EXPECT_EQ(items[0].content_type, "application/octet-stream"); |
| |
| EXPECT_EQ(items[1].name, "name2"); |
| EXPECT_EQ(items[1].content, "Testing456"); |
| EXPECT_EQ(items[1].filename, ""); |
| EXPECT_EQ(items[1].content_type, ""); |
| |
| EXPECT_EQ(items[2].name, "name3"); |
| EXPECT_EQ(items[2].content, rand1); |
| EXPECT_EQ(items[2].filename, "filename3"); |
| EXPECT_EQ(items[2].content_type, ""); |
| |
| EXPECT_EQ(items[3].name, "name4"); |
| EXPECT_EQ(items[3].content, rand2); |
| EXPECT_EQ(items[3].filename, "filename4"); |
| EXPECT_EQ(items[3].content_type, ""); |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"name1", "Testing123", "filename1", "application/octet-stream"}, |
| {"name2", "Testing456", "", ""}, // not a file |
| }; |
| |
| { |
| auto res = cli.Post("/post-none", {}, {}, {}); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| FormDataProviderItems providers; |
| |
| { |
| auto res = |
| cli.Post("/post-items", {}, items, providers); // empty providers |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| providers.push_back({"name3", |
| [&](size_t offset, httplib::DataSink &sink) -> bool { |
| // test the offset is given correctly at each step |
| if (!offset) |
| sink.os.write(rand1.data(), 30); |
| else if (offset == 30) |
| sink.os.write(rand1.data() + 30, 300); |
| else if (offset == 330) |
| sink.os.write(rand1.data() + 330, 670); |
| else if (offset == rand1.size()) |
| sink.done(); |
| return true; |
| }, |
| "filename3", |
| {}}); |
| |
| providers.push_back({"name4", |
| [&](size_t offset, httplib::DataSink &sink) -> bool { |
| // test the offset is given correctly at each step |
| if (!offset) |
| sink.os.write(rand2.data(), 2000); |
| else if (offset == 2000) |
| sink.os.write(rand2.data() + 2000, 1); |
| else if (offset == 2001) |
| sink.os.write(rand2.data() + 2001, 999); |
| else if (offset == rand2.size()) |
| sink.done(); |
| return true; |
| }, |
| "filename4", |
| {}}); |
| |
| { |
| auto res = cli.Post("/post-providers", {}, {}, providers); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| { |
| auto res = cli.Post("/post-both", {}, items, providers); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| } |
| |
| TEST(MultipartFormDataTest, BadHeader) { |
| Server svr; |
| svr.Post("/post", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| const std::string body = |
| "This is the preamble. It is to be ignored, though it\r\n" |
| "is a handy place for composition agents to include an\r\n" |
| "explanatory note to non-MIME conformant readers.\r\n" |
| "\r\n" |
| "\r\n" |
| "--simple boundary\r\n" |
| "Content-Disposition: form-data; name=\"field1\"\r\n" |
| ": BAD...\r\n" |
| "\r\n" |
| "value1\r\n" |
| "--simple boundary\r\n" |
| "Content-Disposition: form-data; name=\"field2\"; " |
| "filename=\"example.txt\"\r\n" |
| "\r\n" |
| "value2\r\n" |
| "--simple boundary--\r\n" |
| "This is the epilogue. It is also to be ignored.\r\n"; |
| |
| std::string content_type = |
| R"(multipart/form-data; boundary="simple boundary")"; |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Post("/post", body, content_type.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } |
| |
| TEST(MultipartFormDataTest, WithPreamble) { |
| Server svr; |
| svr.Post("/post", [&](const Request & /*req*/, Response &res) { |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| const std::string body = |
| "This is the preamble. It is to be ignored, though it\r\n" |
| "is a handy place for composition agents to include an\r\n" |
| "explanatory note to non-MIME conformant readers.\r\n" |
| "\r\n" |
| "\r\n" |
| "--simple boundary\r\n" |
| "Content-Disposition: form-data; name=\"field1\"\r\n" |
| "\r\n" |
| "value1\r\n" |
| "--simple boundary\r\n" |
| "Content-Disposition: form-data; name=\"field2\"; " |
| "filename=\"example.txt\"\r\n" |
| "\r\n" |
| "value2\r\n" |
| "--simple boundary--\r\n" |
| "This is the epilogue. It is also to be ignored.\r\n"; |
| |
| std::string content_type = |
| R"(multipart/form-data; boundary="simple boundary")"; |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Post("/post", body, content_type.c_str()); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| |
| TEST(MultipartFormDataTest, PostCustomBoundary) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Post("/post_customboundary", [&](const Request &req, Response & /*res*/, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_TRUE(std::string(items[0].name) == "document"); |
| EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); |
| EXPECT_TRUE(items[0].filename == "2MB_data"); |
| EXPECT_TRUE(items[0].content_type == "application/octet-stream"); |
| |
| EXPECT_TRUE(items[1].name == "hello"); |
| EXPECT_TRUE(items[1].content == "world"); |
| EXPECT_TRUE(items[1].filename == ""); |
| EXPECT_TRUE(items[1].content_type == ""); |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| } |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| std::string data(1024 * 1024 * 2, '.'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| auto res = cli.Post("/post_customboundary", {}, items, "abc-abc"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, PostInvalidBoundaryChars) { |
| std::string data(1024 * 1024 * 2, '&'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| for (const char &c : " \t\r\n") { |
| auto res = |
| cli.Post("/invalid_boundary", {}, items, string("abc123").append(1, c)); |
| ASSERT_EQ(Error::UnsupportedMultipartBoundaryChars, res.error()); |
| ASSERT_FALSE(res); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, PutFormData) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Put("/put", [&](const Request &req, const Response & /*res*/, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_TRUE(std::string(items[0].name) == "document"); |
| EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); |
| EXPECT_TRUE(items[0].filename == "2MB_data"); |
| EXPECT_TRUE(items[0].content_type == "application/octet-stream"); |
| |
| EXPECT_TRUE(items[1].name == "hello"); |
| EXPECT_TRUE(items[1].content == "world"); |
| EXPECT_TRUE(items[1].filename == ""); |
| EXPECT_TRUE(items[1].content_type == ""); |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| } |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| std::string data(1024 * 1024 * 2, '&'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| auto res = cli.Put("/put", items); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, PutFormDataCustomBoundary) { |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Put("/put_customboundary", |
| [&](const Request &req, const Response & /*res*/, |
| const ContentReader &content_reader) { |
| if (req.is_multipart_form_data()) { |
| std::vector<FormData> items; |
| content_reader( |
| [&](const FormData &file) { |
| items.push_back(file); |
| return true; |
| }, |
| [&](const char *data, size_t data_length) { |
| items.back().content.append(data, data_length); |
| return true; |
| }); |
| |
| EXPECT_TRUE(std::string(items[0].name) == "document"); |
| EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); |
| EXPECT_TRUE(items[0].filename == "2MB_data"); |
| EXPECT_TRUE(items[0].content_type == "application/octet-stream"); |
| |
| EXPECT_TRUE(items[1].name == "hello"); |
| EXPECT_TRUE(items[1].content == "world"); |
| EXPECT_TRUE(items[1].filename == ""); |
| EXPECT_TRUE(items[1].content_type == ""); |
| } else { |
| std::string body; |
| content_reader([&](const char *data, size_t data_length) { |
| body.append(data, data_length); |
| return true; |
| }); |
| } |
| }); |
| |
| auto t = std::thread([&]() { svr.listen("localhost", 8080); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| std::string data(1024 * 1024 * 2, '&'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| auto res = cli.Put("/put_customboundary", {}, items, "abc-abc_"); |
| ASSERT_TRUE(res); |
| ASSERT_EQ(StatusCode::OK_200, res->status); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, PutInvalidBoundaryChars) { |
| std::string data(1024 * 1024 * 2, '&'); |
| std::stringstream buffer; |
| buffer << data; |
| |
| Client cli("https://localhost:8080"); |
| cli.enable_server_certificate_verification(false); |
| |
| UploadFormDataItems items{ |
| {"document", buffer.str(), "2MB_data", "application/octet-stream"}, |
| {"hello", "world", "", ""}, |
| }; |
| |
| for (const char &c : " \t\r\n") { |
| auto res = cli.Put("/put", {}, items, string("abc123").append(1, c)); |
| ASSERT_EQ(Error::UnsupportedMultipartBoundaryChars, res.error()); |
| ASSERT_FALSE(res); |
| } |
| } |
| |
| TEST(MultipartFormDataTest, AlternateFilename) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &res) { |
| ASSERT_EQ(2u, req.form.files.size()); |
| ASSERT_EQ(1u, req.form.fields.size()); |
| |
| // Test files |
| const auto &file1 = req.form.get_file("file1"); |
| ASSERT_EQ("file1", file1.name); |
| ASSERT_EQ("A.txt", file1.filename); |
| ASSERT_EQ("text/plain", file1.content_type); |
| ASSERT_EQ("Content of a.txt.\r\n", file1.content); |
| |
| const auto &file2 = req.form.get_file("file2"); |
| ASSERT_EQ("file2", file2.name); |
| ASSERT_EQ("a.html", file2.filename); |
| ASSERT_EQ("text/html", file2.content_type); |
| ASSERT_EQ("<!DOCTYPE html><title>Content of a.html.</title>\r\n", |
| file2.content); |
| |
| // Test text field |
| const auto &text = req.form.get_field("text"); |
| ASSERT_EQ("text default", text); |
| |
| res.set_content("ok", "text/plain"); |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=--------\r\n" |
| "Content-Length: 399\r\n" |
| "\r\n" |
| "----------\r\n" |
| "Content-Disposition: form-data; name=\"text\"\r\n" |
| "\r\n" |
| "text default\r\n" |
| "----------\r\n" |
| "Content-Disposition: form-data; filename*=\"UTF-8''%41.txt\"; " |
| "filename=\"a.txt\"; name=\"file1\"\r\n" |
| "Content-Type: text/plain\r\n" |
| "\r\n" |
| "Content of a.txt.\r\n" |
| "\r\n" |
| "----------\r\n" |
| "Content-Disposition: form-data; name=\"file2\" ;filename = " |
| "\"a.html\"\r\n" |
| "Content-Type: text/html\r\n" |
| "\r\n" |
| "<!DOCTYPE html><title>Content of a.html.</title>\r\n" |
| "\r\n" |
| "------------\r\n"; |
| |
| ASSERT_TRUE(send_request(1, req)); |
| } |
| |
| TEST(MultipartFormDataTest, CloseDelimiterWithoutCRLF) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &) { |
| ASSERT_EQ(2u, req.form.fields.size()); |
| |
| const auto &text1 = req.form.get_field("text1"); |
| ASSERT_EQ("text1", text1); |
| |
| const auto &text2 = req.form.get_field("text2"); |
| ASSERT_EQ("text2", text2); |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=--------\r\n" |
| "Content-Length: 146\r\n" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text1\"\r\n" |
| "\r\n" |
| "text1" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text2\"\r\n" |
| "\r\n" |
| "text2" |
| "\r\n------------"; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("200", response.substr(9, 3)); |
| } |
| |
| TEST(MultipartFormDataTest, ContentLength) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &) { |
| ASSERT_EQ(2u, req.form.fields.size()); |
| |
| const auto &text1 = req.form.get_field("text1"); |
| ASSERT_EQ("text1", text1); |
| |
| const auto &text2 = req.form.get_field("text2"); |
| ASSERT_EQ("text2", text2); |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=--------\r\n" |
| "Content-Length: 167\r\n" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text1\"\r\n" |
| "Content-Length: 5\r\n" |
| "\r\n" |
| "text1" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text2\"\r\n" |
| "\r\n" |
| "text2" |
| "\r\n------------\r\n"; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("200", response.substr(9, 3)); |
| } |
| |
| TEST(MultipartFormDataTest, AccessPartHeaders) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &) { |
| ASSERT_EQ(2u, req.form.fields.size()); |
| |
| const auto &text1 = req.form.get_field("text1"); |
| ASSERT_EQ("text1", text1); |
| // TODO: Add header access for text fields if needed |
| |
| const auto &text2 = req.form.get_field("text2"); |
| ASSERT_EQ("text2", text2); |
| // TODO: Header access for text fields needs to be implemented |
| // auto &headers = it->second.headers; |
| // ASSERT_EQ(3U, headers.size()); |
| // auto custom_header = headers.find("x-whatever"); |
| // ASSERT_TRUE(custom_header != headers.end()); |
| // ASSERT_NE("customvalue", custom_header->second); |
| // ASSERT_EQ("CustomValue", custom_header->second); |
| // ASSERT_TRUE(headers.find("X-Test") == headers.end()); // text1 header |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=--------\r\n" |
| "Content-Length: 232\r\n" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text1\"\r\n" |
| "Content-Length: 5\r\n" |
| "X-Test: 1\r\n" |
| "\r\n" |
| "text1" |
| "\r\n----------\r\n" |
| "Content-Disposition: form-data; name=\"text2\"\r\n" |
| "Content-Type: text/plain\r\n" |
| "X-Whatever: CustomValue\r\n" |
| "\r\n" |
| "text2" |
| "\r\n------------\r\n" |
| "That should be disregarded. Not even read"; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("200", response.substr(9, 3)); |
| } |
| #endif |
| |
| TEST(MultipartFormDataTest, LargeHeader) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &req, Response &) { |
| ASSERT_EQ(1u, req.form.fields.size()); |
| |
| const auto &text = req.form.get_field("name1"); |
| ASSERT_EQ("text1", text); |
| |
| handled = true; |
| }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_TRUE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto boundary = std::string("cpp-httplib-multipart-data"); |
| std::string content = "--" + boundary + |
| "\r\n" |
| "Content-Disposition: form-data; name=\"name1\"\r\n" |
| "\r\n" |
| "text1\r\n" |
| "--" + |
| boundary + "--\r\n"; |
| std::string header_prefix = "POST /test HTTP/1.1\r\n" |
| "Content-Type: multipart/form-data;boundary=" + |
| boundary + |
| "\r\n" |
| "Content-Length: " + |
| std::to_string(content.size()) + |
| "\r\n" |
| "Dummy-Header: "; |
| std::string header_suffix = "\r\n" |
| "\r\n"; |
| size_t read_buff_size = 1024u * 4; // SocketStream::read_buff_size_ |
| size_t header_dummy_size = |
| read_buff_size - |
| (header_prefix.size() + header_suffix.size() + boundary.size() / 2); |
| auto header_dummy = std::string(header_dummy_size, '@'); |
| auto req = header_prefix + header_dummy + header_suffix + content; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("200", response.substr(9, 3)); |
| } |
| |
| TEST(TaskQueueTest, IncreaseAtomicInteger) { |
| static constexpr unsigned int number_of_tasks{1000000}; |
| std::atomic_uint count{0}; |
| std::unique_ptr<TaskQueue> task_queue{ |
| new ThreadPool{CPPHTTPLIB_THREAD_POOL_COUNT}}; |
| |
| for (unsigned int i = 0; i < number_of_tasks; ++i) { |
| auto queued = task_queue->enqueue( |
| [&count] { count.fetch_add(1, std::memory_order_relaxed); }); |
| EXPECT_TRUE(queued); |
| } |
| |
| EXPECT_NO_THROW(task_queue->shutdown()); |
| EXPECT_EQ(number_of_tasks, count.load()); |
| } |
| |
| TEST(TaskQueueTest, IncreaseAtomicIntegerWithQueueLimit) { |
| static constexpr unsigned int number_of_tasks{1000000}; |
| static constexpr unsigned int qlimit{2}; |
| unsigned int queued_count{0}; |
| std::atomic_uint count{0}; |
| std::unique_ptr<TaskQueue> task_queue{ |
| new ThreadPool{/*num_threads=*/1, qlimit}}; |
| |
| for (unsigned int i = 0; i < number_of_tasks; ++i) { |
| if (task_queue->enqueue( |
| [&count] { count.fetch_add(1, std::memory_order_relaxed); })) { |
| queued_count++; |
| } |
| } |
| |
| EXPECT_NO_THROW(task_queue->shutdown()); |
| EXPECT_EQ(queued_count, count.load()); |
| EXPECT_TRUE(queued_count <= number_of_tasks); |
| EXPECT_TRUE(queued_count >= qlimit); |
| } |
| |
| TEST(TaskQueueTest, MaxQueuedRequests) { |
| static constexpr unsigned int qlimit{3}; |
| std::unique_ptr<TaskQueue> task_queue{new ThreadPool{1, qlimit}}; |
| std::condition_variable sem_cv; |
| std::mutex sem_mtx; |
| int credits = 0; |
| bool queued; |
| |
| /* Fill up the queue with tasks that will block until we give them credits to |
| * complete. */ |
| for (unsigned int n = 0; n <= qlimit;) { |
| queued = task_queue->enqueue([&sem_mtx, &sem_cv, &credits] { |
| std::unique_lock<std::mutex> lock(sem_mtx); |
| while (credits <= 0) { |
| sem_cv.wait(lock); |
| } |
| /* Consume the credit and signal the test code if they are all gone. */ |
| if (--credits == 0) { sem_cv.notify_one(); } |
| }); |
| |
| if (n < qlimit) { |
| /* The first qlimit enqueues must succeed. */ |
| EXPECT_TRUE(queued); |
| } else { |
| /* The last one will succeed only when the worker thread |
| * starts and dequeues the first blocking task. Although |
| * not necessary for the correctness of this test, we sleep for |
| * a short while to avoid busy waiting. */ |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| if (queued) { n++; } |
| } |
| |
| /* Further enqueues must fail since the queue is full. */ |
| for (auto i = 0; i < 4; i++) { |
| queued = task_queue->enqueue([] {}); |
| EXPECT_FALSE(queued); |
| } |
| |
| /* Give the credits to allow the previous tasks to complete. */ |
| { |
| std::unique_lock<std::mutex> lock(sem_mtx); |
| credits += qlimit + 1; |
| } |
| sem_cv.notify_all(); |
| |
| /* Wait for all the credits to be consumed. */ |
| { |
| std::unique_lock<std::mutex> lock(sem_mtx); |
| while (credits > 0) { |
| sem_cv.wait(lock); |
| } |
| } |
| |
| /* Check that we are able again to enqueue at least qlimit tasks. */ |
| for (unsigned int i = 0; i < qlimit; i++) { |
| queued = task_queue->enqueue([] {}); |
| EXPECT_TRUE(queued); |
| } |
| |
| EXPECT_NO_THROW(task_queue->shutdown()); |
| } |
| |
| TEST(RedirectTest, RedirectToUrlWithQueryParameters) { |
| Server svr; |
| |
| svr.Get("/", [](const Request & /*req*/, Response &res) { |
| res.set_redirect(R"(/hello?key=val%26key2%3Dval2)"); |
| }); |
| |
| svr.Get("/hello", [](const Request &req, Response &res) { |
| res.set_content(req.get_param_value("key"), "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("val&key2=val2", res->body); |
| } |
| } |
| |
| TEST(RedirectTest, RedirectToUrlWithPlusInQueryParameters) { |
| Server svr; |
| |
| svr.Get("/", [](const Request & /*req*/, Response &res) { |
| res.set_redirect(R"(/hello?key=AByz09+~-._%20%26%3F%C3%BC%2B)"); |
| }); |
| |
| svr.Get("/hello", [](const Request &req, Response &res) { |
| res.set_content(req.get_param_value("key"), "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/"); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ("AByz09 ~-._ &?ü+", res->body); |
| } |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(RedirectTest, Issue2185_Online) { |
| SSLClient client("github.com"); |
| client.set_follow_location(true); |
| |
| auto res = client.Get("/Coollab-Art/Coollab/releases/download/1.1.1_UI-Scale/" |
| "Coollab-Windows.zip"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(9920427U, res->body.size()); |
| } |
| #endif |
| |
| TEST(VulnerabilityTest, CRLFInjection) { |
| Server svr; |
| |
| svr.Post("/test1", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello 1", "text/plain"); |
| }); |
| |
| svr.Delete("/test2", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello 2", "text/plain"); |
| }); |
| |
| svr.Put("/test3", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello 3", "text/plain"); |
| }); |
| |
| svr.Patch("/test4", [](const Request & /*req*/, Response &res) { |
| res.set_content("Hello 4", "text/plain"); |
| }); |
| |
| svr.set_logger([](const Request &req, const Response & /*res*/) { |
| for (const auto &x : req.headers) { |
| auto key = x.first; |
| EXPECT_STRNE("evil", key.c_str()); |
| } |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| Client cli(HOST, PORT); |
| |
| cli.Post("/test1", "A=B", |
| "application/x-www-form-urlencoded\r\nevil: hello1"); |
| cli.Delete("/test2", "A=B", "text/plain\r\nevil: hello2"); |
| cli.Put("/test3", "text", "text/plain\r\nevil: hello3"); |
| cli.Patch("/test4", "content", "text/plain\r\nevil: hello4"); |
| } |
| } |
| |
| TEST(VulnerabilityTest, CRLFInjectionInHeaders) { |
| auto server_thread = std::thread([] { |
| auto srv = ::socket(AF_INET, SOCK_STREAM, 0); |
| default_socket_options(srv); |
| |
| sockaddr_in addr{}; |
| addr.sin_family = AF_INET; |
| addr.sin_port = htons(PORT + 1); |
| ::inet_pton(AF_INET, "127.0.0.1", &addr.sin_addr); |
| ::bind(srv, reinterpret_cast<sockaddr *>(&addr), sizeof(addr)); |
| ::listen(srv, 1); |
| |
| sockaddr_in cli_addr{}; |
| socklen_t cli_len = sizeof(cli_addr); |
| auto cli = ::accept(srv, reinterpret_cast<sockaddr *>(&cli_addr), &cli_len); |
| |
| detail::set_socket_opt_time(cli, SOL_SOCKET, SO_RCVTIMEO, 1, 0); |
| |
| std::string buf_all; |
| char buf[2048]; |
| ssize_t n; |
| |
| while ((n = ::recv(cli, buf, sizeof(buf), 0)) > 0) { |
| buf_all.append(buf, static_cast<size_t>(n)); |
| |
| size_t pos; |
| while ((pos = buf_all.find("\r\n\r\n")) != std::string::npos) { |
| auto request_block = buf_all.substr(0, pos + 4); // include separator |
| |
| auto e = request_block.find("\r\n"); |
| if (e != std::string::npos) { |
| auto request_line = request_block.substr(0, e); |
| std::string msg = |
| "CRLF injection detected in request line: '" + request_line + "'"; |
| EXPECT_FALSE(true) << msg; |
| } |
| |
| std::string resp = "HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\nHello"; |
| |
| ::send(cli, |
| #ifdef _WIN32 |
| static_cast<const char *>(resp.c_str()), |
| static_cast<int>(resp.size()), |
| #else |
| resp.c_str(), resp.size(), |
| #endif |
| 0); |
| |
| buf_all.erase(0, pos + 4); |
| } |
| } |
| |
| detail::close_socket(cli); |
| detail::close_socket(srv); |
| }); |
| |
| std::this_thread::sleep_for(std::chrono::milliseconds(200)); |
| |
| auto cli = Client("127.0.0.1", PORT + 1); |
| |
| auto headers = Headers{ |
| {"A", "B\r\n\r\nGET /pwned HTTP/1.1\r\nHost: 127.0.0.1:1234\r\n\r\n"}, |
| {"Connection", "keep-alive"}}; |
| |
| auto res = cli.Get("/hi", headers); |
| EXPECT_FALSE(res); |
| EXPECT_EQ(Error::InvalidHeaders, res.error()); |
| |
| server_thread.join(); |
| } |
| |
| TEST(PathParamsTest, StaticMatch) { |
| const auto pattern = "/users/all"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/all"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = {}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, StaticMismatch) { |
| const auto pattern = "/users/all"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/1"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, SingleParamInTheMiddle) { |
| const auto pattern = "/users/:id/subscriptions"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/42/subscriptions"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = {{"id", "42"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, SingleParamInTheEnd) { |
| const auto pattern = "/users/:id"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/24"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = {{"id", "24"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, SingleParamInTheEndTrailingSlash) { |
| const auto pattern = "/users/:id/"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/42/"; |
| ASSERT_TRUE(matcher.match(request)); |
| std::unordered_map<std::string, std::string> expected_params = {{"id", "42"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, EmptyParam) { |
| const auto pattern = "/users/:id/"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users//"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = {{"id", ""}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, FragmentMismatch) { |
| const auto pattern = "/users/:id/"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/admins/24/"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, ExtraFragments) { |
| const auto pattern = "/users/:id"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/42/subscriptions"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, MissingTrailingParam) { |
| const auto pattern = "/users/:id"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, MissingParamInTheMiddle) { |
| const auto pattern = "/users/:id/subscriptions"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/subscriptions"; |
| ASSERT_FALSE(matcher.match(request)); |
| } |
| |
| TEST(PathParamsTest, MultipleParams) { |
| const auto pattern = "/users/:userid/subscriptions/:subid"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/users/42/subscriptions/2"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = { |
| {"userid", "42"}, {"subid", "2"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, SequenceOfParams) { |
| const auto pattern = "/values/:x/:y/:z"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/values/1/2/3"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| std::unordered_map<std::string, std::string> expected_params = { |
| {"x", "1"}, {"y", "2"}, {"z", "3"}}; |
| |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(PathParamsTest, SemicolonInTheMiddleIsNotAParam) { |
| const auto pattern = "/prefix:suffix"; |
| detail::PathParamsMatcher matcher(pattern); |
| |
| Request request; |
| request.path = "/prefix:suffix"; |
| ASSERT_TRUE(matcher.match(request)); |
| |
| const std::unordered_map<std::string, std::string> expected_params = {}; |
| EXPECT_EQ(request.path_params, expected_params); |
| } |
| |
| TEST(UniversalClientImplTest, Ipv6LiteralAddress) { |
| // If ipv6 regex working, regex match codepath is taken. |
| // else port will default to 80 in Client impl |
| int clientImplMagicPort = 80; |
| int port = 4321; |
| // above ports must be different to avoid false negative |
| EXPECT_NE(clientImplMagicPort, port); |
| |
| std::string ipV6TestURL = "http://[ff06::c3]"; |
| |
| Client cli(ipV6TestURL + ":" + std::to_string(port), CLIENT_CERT_FILE, |
| CLIENT_PRIVATE_KEY_FILE); |
| EXPECT_EQ(cli.port(), port); |
| } |
| |
| TEST(FileSystemTest, FileAndDirExistenceCheck) { |
| auto file_path = "./www/dir/index.html"; |
| auto dir_path = "./www/dir"; |
| |
| detail::FileStat stat_file(file_path); |
| EXPECT_TRUE(stat_file.is_file()); |
| EXPECT_FALSE(stat_file.is_dir()); |
| |
| detail::FileStat stat_dir(dir_path); |
| EXPECT_FALSE(stat_dir.is_file()); |
| EXPECT_TRUE(stat_dir.is_dir()); |
| } |
| |
| TEST(MakeHostAndPortStringTest, VariousPatterns) { |
| // IPv4 with default HTTP port (80) |
| EXPECT_EQ("example.com", |
| detail::make_host_and_port_string("example.com", 80, false)); |
| |
| // IPv4 with default HTTPS port (443) |
| EXPECT_EQ("example.com", |
| detail::make_host_and_port_string("example.com", 443, true)); |
| |
| // IPv4 with non-default HTTP port |
| EXPECT_EQ("example.com:8080", |
| detail::make_host_and_port_string("example.com", 8080, false)); |
| |
| // IPv4 with non-default HTTPS port |
| EXPECT_EQ("example.com:8443", |
| detail::make_host_and_port_string("example.com", 8443, true)); |
| |
| // IPv6 with default HTTP port (80) |
| EXPECT_EQ("[::1]", detail::make_host_and_port_string("::1", 80, false)); |
| |
| // IPv6 with default HTTPS port (443) |
| EXPECT_EQ("[::1]", detail::make_host_and_port_string("::1", 443, true)); |
| |
| // IPv6 with non-default HTTP port |
| EXPECT_EQ("[::1]:8080", |
| detail::make_host_and_port_string("::1", 8080, false)); |
| |
| // IPv6 with non-default HTTPS port |
| EXPECT_EQ("[::1]:8443", detail::make_host_and_port_string("::1", 8443, true)); |
| |
| // IPv6 full address with default port |
| EXPECT_EQ("[2001:0db8:85a3:0000:0000:8a2e:0370:7334]", |
| detail::make_host_and_port_string( |
| "2001:0db8:85a3:0000:0000:8a2e:0370:7334", 443, true)); |
| |
| // IPv6 full address with non-default port |
| EXPECT_EQ("[2001:0db8:85a3:0000:0000:8a2e:0370:7334]:9000", |
| detail::make_host_and_port_string( |
| "2001:0db8:85a3:0000:0000:8a2e:0370:7334", 9000, false)); |
| |
| // IPv6 localhost with non-default port |
| EXPECT_EQ("[::1]:3000", |
| detail::make_host_and_port_string("::1", 3000, false)); |
| |
| // IPv6 with zone ID (link-local address) with default port |
| EXPECT_EQ("[fe80::1%eth0]", |
| detail::make_host_and_port_string("fe80::1%eth0", 80, false)); |
| |
| // IPv6 with zone ID (link-local address) with non-default port |
| EXPECT_EQ("[fe80::1%eth0]:8080", |
| detail::make_host_and_port_string("fe80::1%eth0", 8080, false)); |
| |
| // Edge case: Port 443 with is_ssl=false (should add port) |
| EXPECT_EQ("example.com:443", |
| detail::make_host_and_port_string("example.com", 443, false)); |
| |
| // Edge case: Port 80 with is_ssl=true (should add port) |
| EXPECT_EQ("example.com:80", |
| detail::make_host_and_port_string("example.com", 80, true)); |
| |
| // IPv6 edge case: Port 443 with is_ssl=false (should add port) |
| EXPECT_EQ("[::1]:443", detail::make_host_and_port_string("::1", 443, false)); |
| |
| // IPv6 edge case: Port 80 with is_ssl=true (should add port) |
| EXPECT_EQ("[::1]:80", detail::make_host_and_port_string("::1", 80, true)); |
| |
| // Security fix: Already bracketed IPv6 should not get double brackets |
| EXPECT_EQ("[::1]", detail::make_host_and_port_string("[::1]", 80, false)); |
| EXPECT_EQ("[::1]", detail::make_host_and_port_string("[::1]", 443, true)); |
| EXPECT_EQ("[::1]:8080", |
| detail::make_host_and_port_string("[::1]", 8080, false)); |
| EXPECT_EQ("[2001:db8::1]:8080", |
| detail::make_host_and_port_string("[2001:db8::1]", 8080, false)); |
| EXPECT_EQ("[fe80::1%eth0]", |
| detail::make_host_and_port_string("[fe80::1%eth0]", 80, false)); |
| EXPECT_EQ("[fe80::1%eth0]:8080", |
| detail::make_host_and_port_string("[fe80::1%eth0]", 8080, false)); |
| |
| // Edge case: Empty host (should return as-is) |
| EXPECT_EQ("", detail::make_host_and_port_string("", 80, false)); |
| |
| // Edge case: Colon in hostname (non-IPv6) - will be treated as IPv6 |
| // This is a known limitation but shouldn't crash |
| EXPECT_EQ("[host:name]", |
| detail::make_host_and_port_string("host:name", 80, false)); |
| |
| // Port number edge cases (no validation, but should not crash) |
| EXPECT_EQ("example.com:0", |
| detail::make_host_and_port_string("example.com", 0, false)); |
| EXPECT_EQ("example.com:-1", |
| detail::make_host_and_port_string("example.com", -1, false)); |
| EXPECT_EQ("example.com:65535", |
| detail::make_host_and_port_string("example.com", 65535, false)); |
| EXPECT_EQ("example.com:65536", |
| detail::make_host_and_port_string("example.com", 65536, false)); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(SSLClientHostHeaderTest, Issue2301_Online) { |
| httplib::SSLClient cli("roblox.com", 443); |
| cli.set_follow_location(true); |
| |
| auto res = cli.Get("/"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| } |
| #endif |
| |
| TEST(DirtyDataRequestTest, HeadFieldValueContains_CR_LF_NUL) { |
| Server svr; |
| |
| svr.Get("/test", [&](const Request & /*req*/, Response &res) { |
| EXPECT_EQ(res.status, 400); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| cli.Get("/test", {{"Test", "_\n\r_\n\r_"}}); |
| } |
| |
| TEST(InvalidHeaderCharsTest, is_field_name) { |
| EXPECT_TRUE(detail::fields::is_field_name("exampleToken")); |
| EXPECT_TRUE(detail::fields::is_field_name("token123")); |
| EXPECT_TRUE(detail::fields::is_field_name("!#$%&'*+-.^_`|~")); |
| |
| EXPECT_FALSE(detail::fields::is_field_name("example token")); |
| EXPECT_FALSE(detail::fields::is_field_name(" example_token")); |
| EXPECT_FALSE(detail::fields::is_field_name("example_token ")); |
| EXPECT_FALSE(detail::fields::is_field_name("token@123")); |
| EXPECT_FALSE(detail::fields::is_field_name("")); |
| EXPECT_FALSE(detail::fields::is_field_name("example\rtoken")); |
| EXPECT_FALSE(detail::fields::is_field_name("example\ntoken")); |
| EXPECT_FALSE(detail::fields::is_field_name(std::string("\0", 1))); |
| EXPECT_FALSE(detail::fields::is_field_name("example\ttoken")); |
| } |
| |
| TEST(InvalidHeaderCharsTest, is_field_value) { |
| EXPECT_TRUE(detail::fields::is_field_value("exampleToken")); |
| EXPECT_TRUE(detail::fields::is_field_value("token123")); |
| EXPECT_TRUE(detail::fields::is_field_value("!#$%&'*+-.^_`|~")); |
| |
| EXPECT_TRUE(detail::fields::is_field_value("example token")); |
| EXPECT_FALSE(detail::fields::is_field_value(" example_token")); |
| EXPECT_FALSE(detail::fields::is_field_value("example_token ")); |
| EXPECT_TRUE(detail::fields::is_field_value("token@123")); |
| EXPECT_TRUE(detail::fields::is_field_value("")); |
| EXPECT_FALSE(detail::fields::is_field_value("example\rtoken")); |
| EXPECT_FALSE(detail::fields::is_field_value("example\ntoken")); |
| EXPECT_FALSE(detail::fields::is_field_value(std::string("\0", 1))); |
| EXPECT_TRUE(detail::fields::is_field_value("example\ttoken")); |
| |
| EXPECT_TRUE(detail::fields::is_field_value("0")); |
| } |
| |
| TEST(InvalidHeaderCharsTest, OnServer) { |
| Server svr; |
| |
| svr.Get("/test_name", [&](const Request &req, Response &res) { |
| std::string header = "Not Set"; |
| if (req.has_param("header")) { header = req.get_param_value("header"); } |
| |
| res.set_header(header, "value"); |
| res.set_content("Page Content Page Content", "text/plain"); |
| }); |
| |
| svr.Get("/test_value", [&](const Request &req, Response &res) { |
| std::string header = "Not Set"; |
| if (req.has_param("header")) { header = req.get_param_value("header"); } |
| |
| res.set_header("X-Test", header); |
| res.set_content("Page Content Page Content", "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| { |
| auto res = cli.Get( |
| R"(/test_name?header=Value%00%0d%0aHEADER_KEY%3aHEADER_VALUE%0d%0a%0d%0aBODY_BODY_BODY)"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Page Content Page Content", res->body); |
| EXPECT_FALSE(res->has_header("HEADER_KEY")); |
| } |
| { |
| auto res = cli.Get( |
| R"(/test_value?header=Value%00%0d%0aHEADER_KEY%3aHEADER_VALUE%0d%0a%0d%0aBODY_BODY_BODY)"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ("Page Content Page Content", res->body); |
| EXPECT_FALSE(res->has_header("HEADER_KEY")); |
| } |
| } |
| |
| TEST(InvalidHeaderValueTest, InvalidContentLength) { |
| auto handled = false; |
| |
| Server svr; |
| svr.Post("/test", [&](const Request &, Response &) { handled = true; }); |
| |
| thread t = thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| ASSERT_FALSE(handled); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| auto req = "POST /test HTTP/1.1\r\n" |
| "Content-Length: x\r\n" |
| "\r\n"; |
| |
| std::string response; |
| ASSERT_TRUE(send_request(1, req, &response)); |
| ASSERT_EQ("HTTP/1.1 400 Bad Request", |
| response.substr(0, response.find("\r\n"))); |
| } |
| |
| #ifndef _WIN32 |
| TEST(Expect100ContinueTest, ServerClosesConnection) { |
| static constexpr char reject[] = "Unauthorized"; |
| static constexpr char accept[] = "Upload accepted"; |
| constexpr size_t total_size = 10 * 1024 * 1024 * 1024ULL; |
| |
| Server svr; |
| |
| svr.set_expect_100_continue_handler( |
| [](const Request & /*req*/, Response &res) { |
| res.status = StatusCode::Unauthorized_401; |
| res.set_content(reject, "text/plain"); |
| return res.status; |
| }); |
| svr.Post("/", [&](const Request & /*req*/, Response &res) { |
| res.set_content(accept, "text/plain"); |
| }); |
| |
| auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| { |
| const auto curl = std::unique_ptr<CURL, decltype(&curl_easy_cleanup)>{ |
| curl_easy_init(), &curl_easy_cleanup}; |
| ASSERT_NE(curl, nullptr); |
| |
| curl_easy_setopt(curl.get(), CURLOPT_URL, HOST); |
| curl_easy_setopt(curl.get(), CURLOPT_PORT, PORT); |
| curl_easy_setopt(curl.get(), CURLOPT_POST, 1L); |
| auto list = std::unique_ptr<curl_slist, decltype(&curl_slist_free_all)>{ |
| curl_slist_append(nullptr, "Content-Type: application/octet-stream"), |
| &curl_slist_free_all}; |
| ASSERT_NE(list, nullptr); |
| curl_easy_setopt(curl.get(), CURLOPT_HTTPHEADER, list.get()); |
| |
| struct read_data { |
| size_t read_size; |
| size_t total_size; |
| } data = {0, total_size}; |
| using read_callback_t = |
| size_t (*)(char *ptr, size_t size, size_t nmemb, void *userdata); |
| read_callback_t read_callback = [](char *ptr, size_t size, size_t nmemb, |
| void *userdata) -> size_t { |
| read_data *data = (read_data *)userdata; |
| |
| if (!userdata || data->read_size >= data->total_size) { return 0; } |
| |
| std::fill_n(ptr, size * nmemb, 'A'); |
| data->read_size += size * nmemb; |
| return size * nmemb; |
| }; |
| curl_easy_setopt(curl.get(), CURLOPT_READDATA, data); |
| curl_easy_setopt(curl.get(), CURLOPT_READFUNCTION, read_callback); |
| |
| std::vector<char> buffer; |
| curl_easy_setopt(curl.get(), CURLOPT_WRITEDATA, &buffer); |
| using write_callback_t = |
| size_t (*)(char *ptr, size_t size, size_t nmemb, void *userdata); |
| write_callback_t write_callback = [](char *ptr, size_t size, size_t nmemb, |
| void *userdata) -> size_t { |
| std::vector<char> *buffer = (std::vector<char> *)userdata; |
| buffer->reserve(buffer->size() + size * nmemb + 1); |
| buffer->insert(buffer->end(), (char *)ptr, (char *)ptr + size * nmemb); |
| return size * nmemb; |
| }; |
| curl_easy_setopt(curl.get(), CURLOPT_WRITEFUNCTION, write_callback); |
| |
| { |
| const auto res = curl_easy_perform(curl.get()); |
| ASSERT_EQ(res, CURLE_OK); |
| } |
| |
| { |
| auto response_code = long{}; |
| const auto res = |
| curl_easy_getinfo(curl.get(), CURLINFO_RESPONSE_CODE, &response_code); |
| ASSERT_EQ(res, CURLE_OK); |
| ASSERT_EQ(response_code, StatusCode::Unauthorized_401); |
| } |
| |
| { |
| auto dl = curl_off_t{}; |
| const auto res = |
| curl_easy_getinfo(curl.get(), CURLINFO_SIZE_DOWNLOAD_T, &dl); |
| ASSERT_EQ(res, CURLE_OK); |
| ASSERT_EQ(dl, (curl_off_t)sizeof reject - 1); |
| } |
| |
| { |
| buffer.push_back('\0'); |
| ASSERT_STRCASEEQ(buffer.data(), reject); |
| } |
| } |
| } |
| #endif |
| |
| template <typename S, typename C> |
| inline void max_timeout_test(S &svr, C &cli, time_t timeout, time_t threshold) { |
| svr.Get("/stream", [&](const Request &, Response &res) { |
| auto data = new std::string("01234567890123456789"); |
| |
| res.set_content_provider( |
| data->size(), "text/plain", |
| [&, data](size_t offset, size_t length, DataSink &sink) { |
| const size_t DATA_CHUNK_SIZE = 4; |
| const auto &d = *data; |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| sink.write(&d[offset], std::min(length, DATA_CHUNK_SIZE)); |
| return true; |
| }, |
| [data](bool success) { |
| EXPECT_FALSE(success); |
| delete data; |
| }); |
| }); |
| |
| svr.Get("/stream_without_length", [&](const Request &, Response &res) { |
| auto i = new size_t(0); |
| |
| res.set_content_provider( |
| "text/plain", |
| [i](size_t, DataSink &sink) { |
| if (*i < 5) { |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| sink.write("abcd", 4); |
| (*i)++; |
| } else { |
| sink.done(); |
| } |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_FALSE(success); |
| delete i; |
| }); |
| }); |
| |
| svr.Get("/chunked", [&](const Request &, Response &res) { |
| auto i = new size_t(0); |
| |
| res.set_chunked_content_provider( |
| "text/plain", |
| [i](size_t, DataSink &sink) { |
| if (*i < 5) { |
| std::this_thread::sleep_for(std::chrono::seconds(1)); |
| sink.os << "abcd"; |
| (*i)++; |
| } else { |
| sink.done(); |
| } |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_FALSE(success); |
| delete i; |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| cli.set_max_timeout(std::chrono::milliseconds(timeout)); |
| |
| { |
| auto start = std::chrono::steady_clock::now(); |
| |
| auto res = cli.Get("/stream"); |
| |
| auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( |
| std::chrono::steady_clock::now() - start) |
| .count(); |
| |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::Read, res.error()); |
| EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) |
| << "Timeout exceeded by " << (elapsed - timeout) << "ms"; |
| } |
| |
| { |
| auto start = std::chrono::steady_clock::now(); |
| |
| auto res = cli.Get("/stream_without_length"); |
| |
| auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( |
| std::chrono::steady_clock::now() - start) |
| .count(); |
| |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::Read, res.error()); |
| EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) |
| << "Timeout exceeded by " << (elapsed - timeout) << "ms"; |
| } |
| |
| { |
| auto start = std::chrono::steady_clock::now(); |
| |
| auto res = cli.Get("/chunked", [&](const char *data, size_t data_length) { |
| EXPECT_EQ("abcd", string(data, data_length)); |
| return true; |
| }); |
| |
| auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( |
| std::chrono::steady_clock::now() - start) |
| .count(); |
| |
| ASSERT_FALSE(res); |
| EXPECT_EQ(Error::Read, res.error()); |
| EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) |
| << "Timeout exceeded by " << (elapsed - timeout) << "ms"; |
| } |
| } |
| |
| TEST(MaxTimeoutTest, ContentStream) { |
| time_t timeout = 2000; |
| time_t threshold = 200; |
| |
| Server svr; |
| Client cli("localhost", PORT); |
| max_timeout_test(svr, cli, timeout, threshold); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(MaxTimeoutTest, ContentStreamSSL) { |
| time_t timeout = 2000; |
| time_t threshold = 1200; // SSL_shutdown is slow on some operating systems. |
| |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| SSLClient cli("localhost", PORT); |
| cli.enable_server_certificate_verification(false); |
| |
| max_timeout_test(svr, cli, timeout, threshold); |
| } |
| #endif |
| |
| class EventDispatcher { |
| public: |
| EventDispatcher() {} |
| |
| bool wait_event(DataSink *sink) { |
| unique_lock<mutex> lk(m_); |
| int id = id_; |
| |
| // Wait with timeout to prevent hanging if client disconnects |
| if (!cv_.wait_for(lk, std::chrono::seconds(5), |
| [&] { return cid_ == id; })) { |
| return false; // Timeout occurred |
| } |
| |
| sink->write(message_.data(), message_.size()); |
| return true; |
| } |
| |
| void send_event(const string &message) { |
| lock_guard<mutex> lk(m_); |
| cid_ = id_++; |
| message_ = message; |
| cv_.notify_all(); |
| } |
| |
| private: |
| mutex m_; |
| condition_variable cv_; |
| atomic_int id_{0}; |
| atomic_int cid_{-1}; |
| string message_; |
| }; |
| |
| TEST(ClientInThreadTest, Issue2068) { |
| EventDispatcher ed; |
| |
| Server svr; |
| svr.Get("/event1", [&](const Request & /*req*/, Response &res) { |
| res.set_chunked_content_provider("text/event-stream", |
| [&](size_t /*offset*/, DataSink &sink) { |
| return ed.wait_event(&sink); |
| }); |
| }); |
| |
| auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); |
| |
| svr.wait_until_ready(); |
| |
| thread event_thread([&] { |
| int id = 0; |
| while (svr.is_running()) { |
| this_thread::sleep_for(chrono::milliseconds(500)); |
| |
| std::stringstream ss; |
| ss << "data: " << id << "\n\n"; |
| ed.send_event(ss.str()); |
| id++; |
| } |
| }); |
| |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| |
| listen_thread.join(); |
| event_thread.join(); |
| |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| { |
| auto client = detail::make_unique<Client>(HOST, PORT); |
| client->set_read_timeout(std::chrono::minutes(10)); |
| |
| std::atomic<bool> stop{false}; |
| |
| std::thread t([&] { |
| client->Get("/event1", |
| [&](const char *, size_t) -> bool { return !stop; }); |
| }); |
| |
| std::this_thread::sleep_for(std::chrono::seconds(2)); |
| stop = true; |
| client->stop(); |
| |
| t.join(); |
| |
| // Reset client after thread has finished |
| client.reset(); |
| } |
| } |
| |
| TEST(HeaderSmugglingTest, ChunkedTrailerHeadersMerged) { |
| Server svr; |
| |
| svr.Get("/", [](const Request &req, Response &res) { |
| EXPECT_EQ(2U, req.trailers.size()); |
| |
| EXPECT_FALSE(req.has_trailer("[invalid key...]")); |
| |
| // Denied |
| EXPECT_FALSE(req.has_trailer("Content-Length")); |
| EXPECT_FALSE(req.has_trailer("X-Forwarded-For")); |
| |
| // Accepted |
| EXPECT_TRUE(req.has_trailer("X-Hello")); |
| EXPECT_EQ(req.get_trailer_value("X-Hello"), "hello"); |
| |
| EXPECT_TRUE(req.has_trailer("X-World")); |
| EXPECT_EQ(req.get_trailer_value("X-World"), "world"); |
| |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| const std::string req = "GET / HTTP/1.1\r\n" |
| "Transfer-Encoding: chunked\r\n" |
| "Trailer: X-Hello, X-World, X-AAA, X-BBB\r\n" |
| "\r\n" |
| "0\r\n" |
| "Content-Length: 10\r\n" |
| "Host: internal.local\r\n" |
| "Content-Type: malicious/content\r\n" |
| "Cookie: any\r\n" |
| "Set-Cookie: any\r\n" |
| "X-Forwarded-For: attacker.com\r\n" |
| "X-Real-Ip: 1.1.1.1\r\n" |
| "X-Hello: hello\r\n" |
| "X-World: world\r\n" |
| "\r\n"; |
| |
| std::string res; |
| ASSERT_TRUE(send_request(1, req, &res)); |
| } |
| |
| TEST(ForwardedHeadersTest, NoProxiesSetting) { |
| Server svr; |
| |
| std::string observed_remote_addr; |
| std::string observed_xff; |
| |
| svr.Get("/ip", [&](const Request &req, Response &res) { |
| observed_remote_addr = req.remote_addr; |
| observed_xff = req.get_header_value("X-Forwarded-For"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Get("/ip", {{"X-Forwarded-For", "203.0.113.66"}}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| EXPECT_EQ(observed_xff, "203.0.113.66"); |
| EXPECT_TRUE(observed_remote_addr == "::1" || |
| observed_remote_addr == "127.0.0.1"); |
| } |
| |
| TEST(ForwardedHeadersTest, NoForwardedHeaders) { |
| Server svr; |
| |
| svr.set_trusted_proxies({"203.0.113.66"}); |
| |
| std::string observed_remote_addr; |
| std::string observed_xff; |
| |
| svr.Get("/ip", [&](const Request &req, Response &res) { |
| observed_remote_addr = req.remote_addr; |
| observed_xff = req.get_header_value("X-Forwarded-For"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Get("/ip"); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| EXPECT_EQ(observed_xff, ""); |
| EXPECT_TRUE(observed_remote_addr == "::1" || |
| observed_remote_addr == "127.0.0.1"); |
| } |
| |
| TEST(ForwardedHeadersTest, SingleTrustedProxy_UsesIPBeforeTrusted) { |
| Server svr; |
| |
| svr.set_trusted_proxies({"203.0.113.66"}); |
| |
| std::string observed_remote_addr; |
| std::string observed_xff; |
| |
| svr.Get("/ip", [&](const Request &req, Response &res) { |
| observed_remote_addr = req.remote_addr; |
| observed_xff = req.get_header_value("X-Forwarded-For"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| auto res = |
| cli.Get("/ip", {{"X-Forwarded-For", "198.51.100.23, 203.0.113.66"}}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| EXPECT_EQ(observed_xff, "198.51.100.23, 203.0.113.66"); |
| EXPECT_EQ(observed_remote_addr, "198.51.100.23"); |
| } |
| |
| TEST(ForwardedHeadersTest, MultipleTrustedProxies_UsesClientIP) { |
| Server svr; |
| |
| svr.set_trusted_proxies({"203.0.113.66", "192.0.2.45"}); |
| |
| std::string observed_remote_addr; |
| std::string observed_xff; |
| |
| svr.Get("/ip", [&](const Request &req, Response &res) { |
| observed_remote_addr = req.remote_addr; |
| observed_xff = req.get_header_value("X-Forwarded-For"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Get( |
| "/ip", {{"X-Forwarded-For", "198.51.100.23, 203.0.113.66, 192.0.2.45"}}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| EXPECT_EQ(observed_xff, "198.51.100.23, 203.0.113.66, 192.0.2.45"); |
| EXPECT_EQ(observed_remote_addr, "198.51.100.23"); |
| } |
| |
| TEST(ForwardedHeadersTest, TrustedProxyNotInHeader_UsesFirstFromXFF) { |
| Server svr; |
| |
| svr.set_trusted_proxies({"192.0.2.45"}); |
| |
| std::string observed_remote_addr; |
| std::string observed_xff; |
| |
| svr.Get("/ip", [&](const Request &req, Response &res) { |
| observed_remote_addr = req.remote_addr; |
| observed_xff = req.get_header_value("X-Forwarded-For"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| auto res = |
| cli.Get("/ip", {{"X-Forwarded-For", "198.51.100.23, 198.51.100.24"}}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| EXPECT_EQ(observed_xff, "198.51.100.23, 198.51.100.24"); |
| EXPECT_EQ(observed_remote_addr, "198.51.100.23"); |
| } |
| |
| TEST(ForwardedHeadersTest, LastHopTrusted_SelectsImmediateLeftIP) { |
| Server svr; |
| |
| svr.set_trusted_proxies({"192.0.2.45"}); |
| |
| std::string observed_remote_addr; |
| std::string observed_xff; |
| |
| svr.Get("/ip", [&](const Request &req, Response &res) { |
| observed_remote_addr = req.remote_addr; |
| observed_xff = req.get_header_value("X-Forwarded-For"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| auto res = cli.Get( |
| "/ip", {{"X-Forwarded-For", "198.51.100.23, 203.0.113.66, 192.0.2.45"}}); |
| |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| |
| EXPECT_EQ(observed_xff, "198.51.100.23, 203.0.113.66, 192.0.2.45"); |
| EXPECT_EQ(observed_remote_addr, "203.0.113.66"); |
| } |
| |
| TEST(ForwardedHeadersTest, HandlesWhitespaceAroundIPs) { |
| Server svr; |
| |
| svr.set_trusted_proxies({"192.0.2.45"}); |
| |
| std::string observed_remote_addr; |
| std::string observed_xff; |
| |
| svr.Get("/ip", [&](const Request &req, Response &res) { |
| observed_remote_addr = req.remote_addr; |
| observed_xff = req.get_header_value("X-Forwarded-For"); |
| res.set_content("ok", "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| std::string raw_req = |
| "GET /ip HTTP/1.1\r\n" |
| "Host: localhost\r\n" |
| "X-Forwarded-For: 198.51.100.23 , 203.0.113.66 , 192.0.2.45 \r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| std::string out; |
| ASSERT_TRUE(send_request(5, raw_req, &out)); |
| EXPECT_EQ("HTTP/1.1 200 OK", out.substr(0, 15)); |
| |
| // Header parser trims surrounding whitespace of the header value |
| EXPECT_EQ(observed_xff, "198.51.100.23 , 203.0.113.66 , 192.0.2.45"); |
| EXPECT_EQ(observed_remote_addr, "203.0.113.66"); |
| } |
| |
| TEST(ServerRequestParsingTest, RequestWithoutContentLengthOrTransferEncoding) { |
| Server svr; |
| |
| svr.Post("/post", [&](const Request &req, Response &res) { |
| res.set_content(req.body, "text/plain"); |
| }); |
| |
| svr.Put("/put", [&](const Request &req, Response &res) { |
| res.set_content(req.body, "text/plain"); |
| }); |
| |
| svr.Patch("/patch", [&](const Request &req, Response &res) { |
| res.set_content(req.body, "text/plain"); |
| }); |
| |
| svr.Delete("/delete", [&](const Request &req, Response &res) { |
| res.set_content(req.body, "text/plain"); |
| }); |
| |
| thread t = thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| std::string resp; |
| |
| // POST without Content-Length |
| ASSERT_TRUE(send_request(5, |
| "POST /post HTTP/1.1\r\n" |
| "Host: localhost\r\n" |
| "Connection: close\r\n" |
| "\r\n", |
| &resp)); |
| EXPECT_TRUE(resp.find("HTTP/1.1 200 OK") == 0); |
| |
| // PUT without Content-Length |
| resp.clear(); |
| ASSERT_TRUE(send_request(5, |
| "PUT /put HTTP/1.1\r\n" |
| "Host: localhost\r\n" |
| "Connection: close\r\n" |
| "\r\n", |
| &resp)); |
| EXPECT_TRUE(resp.find("HTTP/1.1 200 OK") == 0); |
| |
| // PATCH without Content-Length |
| resp.clear(); |
| ASSERT_TRUE(send_request(5, |
| "PATCH /patch HTTP/1.1\r\n" |
| "Host: localhost\r\n" |
| "Connection: close\r\n" |
| "\r\n", |
| &resp)); |
| EXPECT_TRUE(resp.find("HTTP/1.1 200 OK") == 0); |
| |
| // DELETE without Content-Length |
| resp.clear(); |
| ASSERT_TRUE(send_request(5, |
| "DELETE /delete HTTP/1.1\r\n" |
| "Host: localhost\r\n" |
| "Connection: close\r\n" |
| "\r\n", |
| &resp)); |
| EXPECT_TRUE(resp.find("HTTP/1.1 200 OK") == 0); |
| } |
| |
| //============================================================================== |
| // open_stream() Tests |
| //============================================================================== |
| |
| inline std::string read_all(ClientImpl::StreamHandle &handle) { |
| std::string result; |
| char buf[8192]; |
| ssize_t n; |
| while ((n = handle.read(buf, sizeof(buf))) > 0) { |
| result.append(buf, static_cast<size_t>(n)); |
| } |
| return result; |
| } |
| |
| // Mock stream for unit tests |
| class MockStream : public Stream { |
| public: |
| std::string data; |
| size_t pos = 0; |
| ssize_t error_after = -1; // -1 = no error |
| |
| explicit MockStream(const std::string &d, ssize_t err = -1) |
| : data(d), error_after(err) {} |
| bool is_readable() const override { return true; } |
| bool wait_readable() const override { return true; } |
| bool wait_writable() const override { return true; } |
| ssize_t read(char *ptr, size_t size) override { |
| if (error_after >= 0 && pos >= static_cast<size_t>(error_after)) return -1; |
| if (pos >= data.size()) return 0; |
| size_t limit = |
| error_after >= 0 ? static_cast<size_t>(error_after) : data.size(); |
| size_t to_read = std::min(size, std::min(data.size() - pos, limit - pos)); |
| std::memcpy(ptr, data.data() + pos, to_read); |
| pos += to_read; |
| return static_cast<ssize_t>(to_read); |
| } |
| ssize_t write(const char *, size_t) override { return -1; } |
| void get_remote_ip_and_port(std::string &ip, int &port) const override { |
| ip = "127.0.0.1"; |
| port = 0; |
| } |
| void get_local_ip_and_port(std::string &ip, int &port) const override { |
| ip = "127.0.0.1"; |
| port = 0; |
| } |
| socket_t socket() const override { return INVALID_SOCKET; } |
| time_t duration() const override { return 0; } |
| }; |
| |
| TEST(StreamHandleTest, Basic) { |
| ClientImpl::StreamHandle handle; |
| EXPECT_FALSE(handle.is_valid()); |
| handle.response = detail::make_unique<Response>(); |
| handle.error = Error::Connection; |
| EXPECT_FALSE(handle.is_valid()); |
| handle.error = Error::Success; |
| EXPECT_TRUE(handle.is_valid()); |
| } |
| |
| TEST(BodyReaderTest, Basic) { |
| MockStream stream("Hello, World!"); |
| detail::BodyReader reader; |
| reader.stream = &stream; |
| reader.content_length = 13; |
| char buf[32]; |
| EXPECT_EQ(13, reader.read(buf, sizeof(buf))); |
| EXPECT_EQ(0, reader.read(buf, sizeof(buf))); |
| EXPECT_TRUE(reader.eof); |
| } |
| |
| TEST(BodyReaderTest, NoStream) { |
| detail::BodyReader reader; |
| char buf[32]; |
| EXPECT_EQ(-1, reader.read(buf, sizeof(buf))); |
| EXPECT_EQ(Error::Connection, reader.last_error); |
| } |
| |
| TEST(BodyReaderTest, Error) { |
| MockStream stream("Hello, World!", 5); |
| detail::BodyReader reader; |
| reader.stream = &stream; |
| reader.content_length = 13; |
| char buf[32]; |
| EXPECT_EQ(5, reader.read(buf, sizeof(buf))); |
| EXPECT_EQ(-1, reader.read(buf, sizeof(buf))); |
| EXPECT_EQ(Error::Read, reader.last_error); |
| } |
| |
| // Memory buffer mode removed: StreamHandle reads only from socket streams. |
| // Mock-based StreamHandle tests relying on private internals are removed. |
| |
| class OpenStreamTest : public ::testing::Test { |
| protected: |
| void SetUp() override { |
| svr_.Get("/hello", [](const Request &, Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| svr_.Get("/large", [](const Request &, Response &res) { |
| res.set_content(std::string(10000, 'X'), "text/plain"); |
| }); |
| svr_.Get("/chunked", [](const Request &, Response &res) { |
| res.set_chunked_content_provider("text/plain", |
| [](size_t offset, DataSink &sink) { |
| if (offset < 15) { |
| sink.write("chunk", 5); |
| return true; |
| } |
| sink.done(); |
| return true; |
| }); |
| }); |
| svr_.Get("/compressible", [](const Request &, Response &res) { |
| res.set_chunked_content_provider("text/plain", [](size_t offset, |
| DataSink &sink) { |
| if (offset < 100 * 1024) { |
| std::string chunk(std::min(size_t(8192), 100 * 1024 - offset), 'A'); |
| sink.write(chunk.data(), chunk.size()); |
| return true; |
| } |
| sink.done(); |
| return true; |
| }); |
| }); |
| svr_.Get("/streamed-chunked-with-prohibited-trailer", |
| [](const Request & /*req*/, Response &res) { |
| auto i = new int(0); |
| res.set_header("Trailer", "Content-Length, X-Allowed"); |
| res.set_chunked_content_provider( |
| "text/plain", |
| [i](size_t /*offset*/, DataSink &sink) { |
| switch (*i) { |
| case 0: sink.os << "123"; break; |
| case 1: sink.os << "456"; break; |
| case 2: sink.os << "789"; break; |
| case 3: { |
| sink.done_with_trailer( |
| {{"Content-Length", "5"}, {"X-Allowed", "yes"}}); |
| } break; |
| } |
| (*i)++; |
| return true; |
| }, |
| [i](bool success) { |
| EXPECT_TRUE(success); |
| delete i; |
| }); |
| }); |
| // Echo headers endpoint for header-related tests |
| svr_.Get("/echo-headers", [](const Request &req, Response &res) { |
| std::string body; |
| for (const auto &h : req.headers) { |
| body.append(h.first); |
| body.push_back(':'); |
| body.append(h.second); |
| body.push_back('\n'); |
| } |
| res.set_content(body, "text/plain"); |
| }); |
| svr_.Post("/echo-headers", [](const Request &req, Response &res) { |
| std::string body; |
| for (const auto &h : req.headers) { |
| body.append(h.first); |
| body.push_back(':'); |
| body.append(h.second); |
| body.push_back('\n'); |
| } |
| res.set_content(body, "text/plain"); |
| }); |
| thread_ = std::thread([this]() { svr_.listen("127.0.0.1", 8787); }); |
| svr_.wait_until_ready(); |
| } |
| void TearDown() override { |
| svr_.stop(); |
| if (thread_.joinable()) thread_.join(); |
| } |
| Server svr_; |
| std::thread thread_; |
| }; |
| |
| TEST_F(OpenStreamTest, Basic) { |
| Client cli("127.0.0.1", 8787); |
| auto handle = cli.open_stream("GET", "/hello"); |
| EXPECT_TRUE(handle.is_valid()); |
| EXPECT_EQ("Hello World!", read_all(handle)); |
| } |
| |
| TEST_F(OpenStreamTest, SmallBuffer) { |
| Client cli("127.0.0.1", 8787); |
| auto handle = cli.open_stream("GET", "/hello"); |
| std::string result; |
| char buf[4]; |
| ssize_t n; |
| while ((n = handle.read(buf, sizeof(buf))) > 0) |
| result.append(buf, static_cast<size_t>(n)); |
| EXPECT_EQ("Hello World!", result); |
| } |
| |
| TEST_F(OpenStreamTest, DefaultHeaders) { |
| Client cli("127.0.0.1", 8787); |
| |
| // open_stream GET should include Host, User-Agent and Accept-Encoding |
| { |
| auto handle = cli.open_stream("GET", "/echo-headers"); |
| ASSERT_TRUE(handle.is_valid()); |
| auto body = read_all(handle); |
| EXPECT_NE(body.find("Host:127.0.0.1:8787"), std::string::npos); |
| EXPECT_NE(body.find("User-Agent:cpp-httplib/" CPPHTTPLIB_VERSION), |
| std::string::npos); |
| EXPECT_NE(body.find("Accept-Encoding:"), std::string::npos); |
| } |
| |
| // open_stream POST with body and no explicit content_type should NOT add |
| // text/plain Content-Type (behavior differs from non-streaming path), but |
| // should include Content-Length |
| { |
| auto handle = cli.open_stream("POST", "/echo-headers", {}, {}, "hello", ""); |
| ASSERT_TRUE(handle.is_valid()); |
| auto body = read_all(handle); |
| EXPECT_EQ(body.find("Content-Type: text/plain"), std::string::npos); |
| EXPECT_NE(body.find("Content-Length:5"), std::string::npos); |
| } |
| |
| // open_stream POST with explicit Content-Type should preserve it |
| { |
| auto handle = cli.open_stream("POST", "/echo-headers", {}, |
| {{"Content-Type", "application/custom"}}, |
| "{}", "application/custom"); |
| ASSERT_TRUE(handle.is_valid()); |
| auto body = read_all(handle); |
| EXPECT_NE(body.find("Content-Type:application/custom"), std::string::npos); |
| } |
| |
| // User-specified User-Agent must not be overwritten for stream API |
| { |
| auto handle = cli.open_stream("GET", "/echo-headers", {}, |
| {{"User-Agent", "MyAgent/1.2"}}); |
| ASSERT_TRUE(handle.is_valid()); |
| auto body = read_all(handle); |
| EXPECT_NE(body.find("User-Agent:MyAgent/1.2"), std::string::npos); |
| } |
| } |
| |
| TEST_F(OpenStreamTest, Large) { |
| Client cli("127.0.0.1", 8787); |
| auto handle = cli.open_stream("GET", "/large"); |
| EXPECT_EQ(10000u, read_all(handle).size()); |
| } |
| |
| TEST_F(OpenStreamTest, ConnectionError) { |
| Client cli("127.0.0.1", 9999); |
| auto handle = cli.open_stream("GET", "/hello"); |
| EXPECT_FALSE(handle.is_valid()); |
| } |
| |
| TEST_F(OpenStreamTest, Chunked) { |
| Client cli("127.0.0.1", 8787); |
| auto handle = cli.open_stream("GET", "/chunked"); |
| EXPECT_TRUE(handle.response && handle.response->get_header_value( |
| "Transfer-Encoding") == "chunked"); |
| EXPECT_EQ("chunkchunkchunk", read_all(handle)); |
| } |
| |
| TEST_F(OpenStreamTest, ProhibitedTrailersAreIgnored_Stream) { |
| Client cli("127.0.0.1", 8787); |
| auto handle = |
| cli.open_stream("GET", "/streamed-chunked-with-prohibited-trailer"); |
| ASSERT_TRUE(handle.is_valid()); |
| |
| // Consume body to allow trailers to be received/parsed |
| auto body = read_all(handle); |
| |
| // Explicitly parse trailers (ensure trailers are available for assertion) |
| handle.parse_trailers_if_needed(); |
| EXPECT_EQ(std::string("123456789"), body); |
| |
| // The response should include a Trailer header declaring both names |
| ASSERT_TRUE(handle.response); |
| EXPECT_TRUE(handle.response->has_header("Trailer")); |
| EXPECT_EQ(std::string("Content-Length, X-Allowed"), |
| handle.response->get_header_value("Trailer")); |
| |
| // Prohibited trailer must not be present |
| EXPECT_FALSE(handle.response->has_trailer("Content-Length")); |
| // Allowed trailer should be present |
| EXPECT_TRUE(handle.response->has_trailer("X-Allowed")); |
| EXPECT_EQ(std::string("yes"), |
| handle.response->get_trailer_value("X-Allowed")); |
| |
| // Verify trailers are NOT present as regular headers |
| EXPECT_EQ(std::string(""), |
| handle.response->get_header_value("Content-Length")); |
| EXPECT_EQ(std::string(""), handle.response->get_header_value("X-Allowed")); |
| } |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| TEST_F(OpenStreamTest, Gzip) { |
| Client cli("127.0.0.1", 8787); |
| auto handle = cli.open_stream("GET", "/compressible", {}, |
| {{"Accept-Encoding", "gzip"}}); |
| EXPECT_EQ("gzip", handle.response->get_header_value("Content-Encoding")); |
| EXPECT_EQ(100u * 1024u, read_all(handle).size()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| TEST_F(OpenStreamTest, Brotli) { |
| Client cli("127.0.0.1", 8787); |
| auto handle = |
| cli.open_stream("GET", "/compressible", {}, {{"Accept-Encoding", "br"}}); |
| EXPECT_EQ("br", handle.response->get_header_value("Content-Encoding")); |
| EXPECT_EQ(100u * 1024u, read_all(handle).size()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_ZSTD_SUPPORT |
| TEST_F(OpenStreamTest, Zstd) { |
| Client cli("127.0.0.1", 8787); |
| auto handle = cli.open_stream("GET", "/compressible", {}, |
| {{"Accept-Encoding", "zstd"}}); |
| EXPECT_EQ("zstd", handle.response->get_header_value("Content-Encoding")); |
| EXPECT_EQ(100u * 1024u, read_all(handle).size()); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| class SSLOpenStreamTest : public ::testing::Test { |
| protected: |
| SSLOpenStreamTest() : svr_("cert.pem", "key.pem") {} |
| void SetUp() override { |
| svr_.Get("/hello", [](const Request &, Response &res) { |
| res.set_content("Hello SSL World!", "text/plain"); |
| }); |
| svr_.Get("/chunked", [](const Request &, Response &res) { |
| res.set_chunked_content_provider("text/plain", |
| [](size_t offset, DataSink &sink) { |
| if (offset < 15) { |
| sink.write("chunk", 5); |
| return true; |
| } |
| sink.done(); |
| return true; |
| }); |
| }); |
| svr_.Post("/echo", [](const Request &req, Response &res) { |
| res.set_content(req.body, req.get_header_value("Content-Type")); |
| }); |
| svr_.Post("/chunked-response", [](const Request &req, Response &res) { |
| std::string body = req.body; |
| res.set_chunked_content_provider( |
| "text/plain", [body](size_t offset, DataSink &sink) { |
| if (offset < body.size()) { |
| sink.write(body.data() + offset, body.size() - offset); |
| } |
| sink.done(); |
| return true; |
| }); |
| }); |
| thread_ = std::thread([this]() { svr_.listen("127.0.0.1", 8788); }); |
| svr_.wait_until_ready(); |
| } |
| void TearDown() override { |
| svr_.stop(); |
| if (thread_.joinable()) thread_.join(); |
| } |
| SSLServer svr_; |
| std::thread thread_; |
| }; |
| |
| TEST_F(SSLOpenStreamTest, Basic) { |
| SSLClient cli("127.0.0.1", 8788); |
| cli.enable_server_certificate_verification(false); |
| auto handle = cli.open_stream("GET", "/hello"); |
| ASSERT_TRUE(handle.is_valid()); |
| EXPECT_EQ("Hello SSL World!", read_all(handle)); |
| } |
| |
| TEST_F(SSLOpenStreamTest, Chunked) { |
| SSLClient cli("127.0.0.1", 8788); |
| cli.enable_server_certificate_verification(false); |
| |
| auto handle = cli.open_stream("GET", "/chunked"); |
| |
| ASSERT_TRUE(handle.is_valid()) << "Error: " << static_cast<int>(handle.error); |
| EXPECT_TRUE(handle.response && handle.response->get_header_value( |
| "Transfer-Encoding") == "chunked"); |
| |
| auto body = read_all(handle); |
| EXPECT_EQ("chunkchunkchunk", body); |
| } |
| |
| TEST_F(SSLOpenStreamTest, Post) { |
| SSLClient cli("127.0.0.1", 8788); |
| cli.enable_server_certificate_verification(false); |
| |
| auto handle = |
| cli.open_stream("POST", "/echo", {}, {}, "Hello SSL POST", "text/plain"); |
| |
| ASSERT_TRUE(handle.is_valid()) << "Error: " << static_cast<int>(handle.error); |
| EXPECT_EQ(200, handle.response->status); |
| |
| auto body = read_all(handle); |
| EXPECT_EQ("Hello SSL POST", body); |
| } |
| |
| TEST_F(SSLOpenStreamTest, PostChunked) { |
| SSLClient cli("127.0.0.1", 8788); |
| cli.enable_server_certificate_verification(false); |
| |
| auto handle = cli.open_stream("POST", "/chunked-response", {}, {}, |
| "Chunked SSL Data", "text/plain"); |
| |
| ASSERT_TRUE(handle.is_valid()); |
| EXPECT_EQ(200, handle.response->status); |
| |
| auto body = read_all(handle); |
| EXPECT_EQ("Chunked SSL Data", body); |
| } |
| #endif // CPPHTTPLIB_SSL_ENABLED |
| |
| //============================================================================== |
| // Parity Tests: ensure streaming and non-streaming APIs produce identical |
| // results for various scenarios. |
| //============================================================================== |
| |
| TEST(ParityTest, GetVsOpenStream) { |
| Server svr; |
| |
| const std::string path = "/parity"; |
| const std::string content = "Parity test content: hello world"; |
| |
| svr.Get(path, [&](const Request & /*req*/, Response &res) { |
| res.set_content(content, "text/plain"); |
| }); |
| |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // Non-stream path |
| auto r1 = cli.Get(path); |
| ASSERT_TRUE(r1); |
| EXPECT_EQ(StatusCode::OK_200, r1->status); |
| |
| // Stream path |
| auto h = cli.open_stream("GET", path); |
| ASSERT_TRUE(h.is_valid()); |
| |
| EXPECT_EQ(r1->body, read_all(h)); |
| } |
| |
| // Helper to compress data with provided compressor type T |
| template <typename Compressor> |
| static std::string compress_payload_for_parity(const std::string &in) { |
| std::string out; |
| Compressor compressor; |
| bool ok = compressor.compress(in.data(), in.size(), /*last=*/true, |
| [&](const char *data, size_t n) { |
| out.append(data, n); |
| return true; |
| }); |
| EXPECT_TRUE(ok); |
| return out; |
| } |
| |
| // Helper function for compression parity tests |
| template <typename Compressor> |
| static void test_compression_parity(const std::string &original, |
| const std::string &path, |
| const std::string &encoding) { |
| const std::string compressed = |
| compress_payload_for_parity<Compressor>(original); |
| |
| Server svr; |
| |
| svr.Get(path, [&](const Request & /*req*/, Response &res) { |
| res.set_content(compressed, "application/octet-stream"); |
| res.set_header("Content-Encoding", encoding); |
| }); |
| |
| auto t = std::thread([&] { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| t.join(); |
| ASSERT_FALSE(svr.is_running()); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // Non-streaming |
| { |
| auto res = cli.Get(path); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::OK_200, res->status); |
| EXPECT_EQ(original, res->body); |
| } |
| |
| // Streaming |
| { |
| auto h = cli.open_stream("GET", path); |
| ASSERT_TRUE(h.is_valid()); |
| EXPECT_EQ(original, read_all(h)); |
| } |
| } |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| TEST(ParityTest, Gzip) { |
| test_compression_parity<detail::gzip_compressor>( |
| "The quick brown fox jumps over the lazy dog", "/parity-gzip", "gzip"); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_BROTLI_SUPPORT |
| TEST(ParityTest, Brotli) { |
| test_compression_parity<detail::brotli_compressor>( |
| "Hello, brotli parity test payload", "/parity-br", "br"); |
| } |
| #endif |
| |
| #ifdef CPPHTTPLIB_ZSTD_SUPPORT |
| TEST(ParityTest, Zstd) { |
| test_compression_parity<detail::zstd_compressor>( |
| "Zstandard parity test payload", "/parity-zstd", "zstd"); |
| } |
| #endif |
| |
| //============================================================================== |
| // New Stream API Tests |
| //============================================================================== |
| |
| inline std::string read_body(httplib::stream::Result &result) { |
| std::string body; |
| while (result.next()) { |
| body.append(result.data(), result.size()); |
| } |
| return body; |
| } |
| |
| TEST(ClientConnectionTest, Basic) { |
| httplib::ClientConnection conn; |
| EXPECT_FALSE(conn.is_open()); |
| conn.sock = 1; |
| EXPECT_TRUE(conn.is_open()); |
| httplib::ClientConnection conn2(std::move(conn)); |
| EXPECT_EQ(INVALID_SOCKET, conn.sock); |
| conn2.sock = INVALID_SOCKET; |
| } |
| |
| // Unified test server for all stream::* tests |
| class StreamApiTest : public ::testing::Test { |
| protected: |
| void SetUp() override { |
| svr_.Get("/hello", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello World!", "text/plain"); |
| }); |
| svr_.Get("/echo-params", |
| [](const httplib::Request &req, httplib::Response &res) { |
| std::string r; |
| for (const auto &p : req.params) { |
| if (!r.empty()) r += "&"; |
| r += p.first + "=" + p.second; |
| } |
| res.set_content(r, "text/plain"); |
| }); |
| svr_.Post("/echo", [](const httplib::Request &req, httplib::Response &res) { |
| res.set_content(req.body, req.get_header_value("Content-Type")); |
| }); |
| svr_.Post("/echo-headers", |
| [](const httplib::Request &req, httplib::Response &res) { |
| std::string r; |
| for (const auto &h : req.headers) |
| r += h.first + ": " + h.second + "\n"; |
| res.set_content(r, "text/plain"); |
| }); |
| svr_.Post("/echo-params", |
| [](const httplib::Request &req, httplib::Response &res) { |
| std::string r = "params:"; |
| for (const auto &p : req.params) |
| r += p.first + "=" + p.second + ";"; |
| res.set_content(r + " body:" + req.body, "text/plain"); |
| }); |
| svr_.Post("/large", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content(std::string(100 * 1024, 'X'), "application/octet-stream"); |
| }); |
| svr_.Put("/echo", [](const httplib::Request &req, httplib::Response &res) { |
| res.set_content("PUT:" + req.body, "text/plain"); |
| }); |
| svr_.Patch("/echo", |
| [](const httplib::Request &req, httplib::Response &res) { |
| res.set_content("PATCH:" + req.body, "text/plain"); |
| }); |
| svr_.Delete( |
| "/resource", [](const httplib::Request &req, httplib::Response &res) { |
| res.set_content(req.body.empty() ? "Deleted" : "Deleted:" + req.body, |
| "text/plain"); |
| }); |
| svr_.Get("/head-test", |
| [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("body for HEAD", "text/plain"); |
| }); |
| svr_.Options("/options", |
| [](const httplib::Request &, httplib::Response &res) { |
| res.set_header("Allow", "GET, POST, PUT, DELETE, OPTIONS"); |
| }); |
| thread_ = std::thread([this]() { svr_.listen(HOST, PORT); }); |
| svr_.wait_until_ready(); |
| } |
| void TearDown() override { |
| svr_.stop(); |
| if (thread_.joinable()) thread_.join(); |
| } |
| httplib::Server svr_; |
| std::thread thread_; |
| }; |
| |
| // stream::Get tests |
| TEST_F(StreamApiTest, GetBasic) { |
| httplib::Client cli(HOST, PORT); |
| auto result = httplib::stream::Get(cli, "/hello"); |
| ASSERT_TRUE(result.is_valid()); |
| EXPECT_EQ(200, result.status()); |
| EXPECT_EQ("Hello World!", read_body(result)); |
| } |
| |
| TEST_F(StreamApiTest, GetWithParams) { |
| httplib::Client cli(HOST, PORT); |
| httplib::Params params{{"foo", "bar"}}; |
| auto result = httplib::stream::Get(cli, "/echo-params", params); |
| ASSERT_TRUE(result.is_valid()); |
| EXPECT_TRUE(read_body(result).find("foo=bar") != std::string::npos); |
| } |
| |
| TEST_F(StreamApiTest, GetConnectionError) { |
| httplib::Client cli(HOST, 9999); |
| EXPECT_FALSE(httplib::stream::Get(cli, "/hello").is_valid()); |
| } |
| |
| TEST_F(StreamApiTest, Get404) { |
| httplib::Client cli(HOST, PORT); |
| auto result = httplib::stream::Get(cli, "/nonexistent"); |
| EXPECT_TRUE(result.is_valid()); |
| EXPECT_EQ(404, result.status()); |
| } |
| |
| // stream::Post tests |
| TEST_F(StreamApiTest, PostBasic) { |
| httplib::Client cli(HOST, PORT); |
| auto result = httplib::stream::Post(cli, "/echo", R"({"key":"value"})", |
| "application/json"); |
| ASSERT_TRUE(result.is_valid()); |
| EXPECT_EQ("application/json", result.get_header_value("Content-Type")); |
| EXPECT_EQ(R"({"key":"value"})", read_body(result)); |
| } |
| |
| TEST_F(StreamApiTest, PostWithHeaders) { |
| httplib::Client cli(HOST, PORT); |
| httplib::Headers headers{{"X-Custom", "value"}}; |
| auto result = httplib::stream::Post(cli, "/echo-headers", headers, "body", |
| "text/plain"); |
| EXPECT_TRUE(read_body(result).find("X-Custom: value") != std::string::npos); |
| } |
| |
| TEST_F(StreamApiTest, PostWithParams) { |
| httplib::Client cli(HOST, PORT); |
| httplib::Params params{{"k", "v"}}; |
| auto result = |
| httplib::stream::Post(cli, "/echo-params", params, "data", "text/plain"); |
| auto body = read_body(result); |
| EXPECT_TRUE(body.find("k=v") != std::string::npos); |
| EXPECT_TRUE(body.find("body:data") != std::string::npos); |
| } |
| |
| TEST_F(StreamApiTest, PostLarge) { |
| httplib::Client cli(HOST, PORT); |
| auto result = httplib::stream::Post(cli, "/large", "", "text/plain"); |
| size_t total = 0; |
| while (result.next()) { |
| total += result.size(); |
| } |
| EXPECT_EQ(100u * 1024u, total); |
| } |
| |
| // stream::Put/Patch tests |
| TEST_F(StreamApiTest, PutAndPatch) { |
| httplib::Client cli(HOST, PORT); |
| auto put = httplib::stream::Put(cli, "/echo", "test", "text/plain"); |
| EXPECT_EQ("PUT:test", read_body(put)); |
| auto patch = httplib::stream::Patch(cli, "/echo", "test", "text/plain"); |
| EXPECT_EQ("PATCH:test", read_body(patch)); |
| } |
| |
| // stream::Delete tests |
| TEST_F(StreamApiTest, Delete) { |
| httplib::Client cli(HOST, PORT); |
| auto del1 = httplib::stream::Delete(cli, "/resource"); |
| EXPECT_EQ("Deleted", read_body(del1)); |
| auto del2 = httplib::stream::Delete(cli, "/resource", "data", "text/plain"); |
| EXPECT_EQ("Deleted:data", read_body(del2)); |
| } |
| |
| // stream::Head/Options tests |
| TEST_F(StreamApiTest, HeadAndOptions) { |
| httplib::Client cli(HOST, PORT); |
| auto head = httplib::stream::Head(cli, "/head-test"); |
| EXPECT_TRUE(head.is_valid()); |
| EXPECT_FALSE(head.get_header_value("Content-Length").empty()); |
| |
| auto opts = httplib::stream::Options(cli, "/options"); |
| EXPECT_EQ("GET, POST, PUT, DELETE, OPTIONS", opts.get_header_value("Allow")); |
| } |
| |
| // SSL stream::* tests |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| class SSLStreamApiTest : public ::testing::Test { |
| protected: |
| void SetUp() override { |
| svr_.Get("/hello", [](const httplib::Request &, httplib::Response &res) { |
| res.set_content("Hello SSL!", "text/plain"); |
| }); |
| svr_.Post("/echo", [](const httplib::Request &req, httplib::Response &res) { |
| res.set_content(req.body, "text/plain"); |
| }); |
| thread_ = std::thread([this]() { svr_.listen("127.0.0.1", 8803); }); |
| svr_.wait_until_ready(); |
| } |
| void TearDown() override { |
| svr_.stop(); |
| if (thread_.joinable()) thread_.join(); |
| } |
| httplib::SSLServer svr_{"cert.pem", "key.pem"}; |
| std::thread thread_; |
| }; |
| |
| TEST_F(SSLStreamApiTest, GetAndPost) { |
| httplib::SSLClient cli("127.0.0.1", 8803); |
| cli.enable_server_certificate_verification(false); |
| auto get = httplib::stream::Get(cli, "/hello"); |
| EXPECT_EQ("Hello SSL!", read_body(get)); |
| auto post = httplib::stream::Post(cli, "/echo", "test", "text/plain"); |
| EXPECT_EQ("test", read_body(post)); |
| } |
| #endif |
| |
| // Tests for Error::Timeout and Error::ConnectionClosed error types |
| // These errors are set in SocketStream/SSLSocketStream and propagated through |
| // BodyReader |
| |
| TEST(ErrorHandlingTest, StreamReadTimeout) { |
| // Test that read timeout during streaming is detected |
| // Use a large content-length response where server delays mid-stream |
| Server svr; |
| |
| svr.Get("/slow-stream", [](const Request &, Response &res) { |
| // Send a large response with delay in the middle |
| res.set_content_provider( |
| 1000, // content_length |
| "text/plain", [](size_t offset, size_t /*length*/, DataSink &sink) { |
| if (offset < 100) { |
| // Send first 100 bytes immediately |
| std::string data(100, 'A'); |
| sink.write(data.c_str(), data.size()); |
| return true; |
| } |
| // Then delay longer than client timeout |
| std::this_thread::sleep_for(std::chrono::seconds(3)); |
| std::string data(900, 'B'); |
| sink.write(data.c_str(), data.size()); |
| return true; |
| }); |
| }); |
| |
| auto port = 8091; |
| std::thread t([&]() { svr.listen("localhost", port); }); |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", port); |
| cli.set_read_timeout(1, 0); // 1 second timeout |
| |
| auto handle = cli.open_stream("GET", "/slow-stream"); |
| ASSERT_TRUE(handle.is_valid()); |
| |
| char buf[256]; |
| ssize_t total = 0; |
| ssize_t n; |
| bool got_error = false; |
| |
| while ((n = handle.read(buf, sizeof(buf))) > 0) { |
| total += n; |
| } |
| |
| if (n < 0) { |
| got_error = true; |
| // Should be timeout or read error |
| EXPECT_TRUE(handle.get_read_error() == Error::Timeout || |
| handle.get_read_error() == Error::Read) |
| << "Actual error: " << to_string(handle.get_read_error()); |
| } |
| |
| // Either we got an error, or we got less data than expected |
| EXPECT_TRUE(got_error || total < 1000) |
| << "Expected timeout but got all " << total << " bytes"; |
| |
| svr.stop(); |
| t.join(); |
| } |
| |
| TEST(ErrorHandlingTest, StreamConnectionClosed) { |
| // Test connection closed detection via BodyReader |
| Server svr; |
| std::atomic<bool> close_now{false}; |
| |
| svr.Get("/will-close", [&](const Request &, Response &res) { |
| res.set_content_provider( |
| 10000, // Large content_length that we won't fully send |
| "text/plain", [&](size_t offset, size_t /*length*/, DataSink &sink) { |
| if (offset < 100) { |
| std::string data(100, 'X'); |
| sink.write(data.c_str(), data.size()); |
| return true; |
| } |
| // Wait for signal then abort |
| while (!close_now) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| return false; // Abort - server will close connection |
| }); |
| }); |
| |
| auto port = 8092; |
| std::thread t([&]() { svr.listen("localhost", port); }); |
| svr.wait_until_ready(); |
| |
| Client cli("localhost", port); |
| auto handle = cli.open_stream("GET", "/will-close"); |
| ASSERT_TRUE(handle.is_valid()); |
| |
| char buf[256]; |
| ssize_t n = handle.read(buf, sizeof(buf)); // First read |
| EXPECT_GT(n, 0) << "First read should succeed"; |
| |
| // Signal server to close |
| close_now = true; |
| |
| // Keep reading until error or EOF |
| while ((n = handle.read(buf, sizeof(buf))) > 0) { |
| // Keep reading |
| } |
| |
| // Should get an error since content_length wasn't satisfied |
| if (n < 0) { |
| EXPECT_TRUE(handle.get_read_error() == Error::ConnectionClosed || |
| handle.get_read_error() == Error::Read) |
| << "Actual error: " << to_string(handle.get_read_error()); |
| } |
| |
| svr.stop(); |
| t.join(); |
| } |
| |
| #ifdef CPPHTTPLIB_SSL_ENABLED |
| TEST(ErrorHandlingTest, SSLStreamReadTimeout) { |
| // Test that read timeout during SSL streaming is detected |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| |
| svr.Get("/slow-stream", [](const Request &, Response &res) { |
| res.set_content_provider( |
| 1000, "text/plain", |
| [](size_t offset, size_t /*length*/, DataSink &sink) { |
| if (offset < 100) { |
| std::string data(100, 'A'); |
| sink.write(data.c_str(), data.size()); |
| return true; |
| } |
| std::this_thread::sleep_for(std::chrono::seconds(3)); |
| std::string data(900, 'B'); |
| sink.write(data.c_str(), data.size()); |
| return true; |
| }); |
| }); |
| |
| auto port = 8093; |
| std::thread t([&]() { svr.listen("localhost", port); }); |
| svr.wait_until_ready(); |
| |
| SSLClient cli("localhost", port); |
| cli.enable_server_certificate_verification(false); |
| cli.set_read_timeout(1, 0); // 1 second timeout |
| |
| auto handle = cli.open_stream("GET", "/slow-stream"); |
| ASSERT_TRUE(handle.is_valid()); |
| |
| char buf[256]; |
| ssize_t total = 0; |
| ssize_t n; |
| bool got_error = false; |
| |
| while ((n = handle.read(buf, sizeof(buf))) > 0) { |
| total += n; |
| } |
| |
| if (n < 0) { |
| got_error = true; |
| EXPECT_TRUE(handle.get_read_error() == Error::Timeout || |
| handle.get_read_error() == Error::Read) |
| << "Actual error: " << to_string(handle.get_read_error()); |
| } |
| |
| EXPECT_TRUE(got_error || total < 1000) |
| << "Expected timeout but got all " << total << " bytes"; |
| |
| svr.stop(); |
| t.join(); |
| } |
| |
| TEST(ErrorHandlingTest, SSLStreamConnectionClosed) { |
| // Test SSL connection closed detection |
| SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); |
| std::atomic<bool> close_now{false}; |
| |
| svr.Get("/will-close", [&](const Request &, Response &res) { |
| res.set_content_provider( |
| 10000, "text/plain", |
| [&](size_t offset, size_t /*length*/, DataSink &sink) { |
| if (offset < 100) { |
| std::string data(100, 'X'); |
| sink.write(data.c_str(), data.size()); |
| return true; |
| } |
| while (!close_now) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| return false; |
| }); |
| }); |
| |
| auto port = 8094; |
| std::thread t([&]() { svr.listen("localhost", port); }); |
| svr.wait_until_ready(); |
| |
| SSLClient cli("localhost", port); |
| cli.enable_server_certificate_verification(false); |
| auto handle = cli.open_stream("GET", "/will-close"); |
| ASSERT_TRUE(handle.is_valid()); |
| |
| char buf[256]; |
| ssize_t n = handle.read(buf, sizeof(buf)); // First read |
| EXPECT_GT(n, 0); |
| |
| // Signal server to close |
| close_now = true; |
| |
| while ((n = handle.read(buf, sizeof(buf))) > 0) { |
| // Keep reading |
| } |
| |
| if (n < 0) { |
| EXPECT_TRUE(handle.get_read_error() == Error::ConnectionClosed || |
| handle.get_read_error() == Error::Read) |
| << "Actual error: " << to_string(handle.get_read_error()); |
| } |
| |
| svr.stop(); |
| t.join(); |
| } |
| #endif |
| |
| TEST(ETagTest, StaticFileETagAndIfNoneMatch) { |
| using namespace httplib; |
| |
| // Create a test file |
| const char *fname = "etag_testfile.txt"; |
| const char *content = "etag-content"; |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen("localhost", PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // First request: should get 200 with ETag header |
| auto res1 = cli.Get("/static/etag_testfile.txt"); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| ASSERT_TRUE(res1->has_header("ETag")); |
| std::string etag = res1->get_header_value("ETag"); |
| EXPECT_FALSE(etag.empty()); |
| |
| // Verify ETag format: W/"hex-hex" |
| ASSERT_GE(etag.length(), 5u); // Minimum: W/"" |
| EXPECT_EQ('W', etag[0]); |
| EXPECT_EQ('/', etag[1]); |
| EXPECT_EQ('"', etag[2]); |
| EXPECT_EQ('"', etag.back()); |
| |
| // Exact match: expect 304 Not Modified |
| Headers h2 = {{"If-None-Match", etag}}; |
| auto res2 = cli.Get("/static/etag_testfile.txt", h2); |
| ASSERT_TRUE(res2); |
| EXPECT_EQ(304, res2->status); |
| |
| // Wildcard match: expect 304 Not Modified |
| Headers h3 = {{"If-None-Match", "*"}}; |
| auto res3 = cli.Get("/static/etag_testfile.txt", h3); |
| ASSERT_TRUE(res3); |
| EXPECT_EQ(304, res3->status); |
| |
| // Non-matching ETag: expect 200 |
| Headers h4 = {{"If-None-Match", "W/\"deadbeef\""}}; |
| auto res4 = cli.Get("/static/etag_testfile.txt", h4); |
| ASSERT_TRUE(res4); |
| EXPECT_EQ(200, res4->status); |
| |
| // Multiple ETags with one matching: expect 304 |
| Headers h5 = {{"If-None-Match", "W/\"other\", " + etag + ", W/\"another\""}}; |
| auto res5 = cli.Get("/static/etag_testfile.txt", h5); |
| ASSERT_TRUE(res5); |
| EXPECT_EQ(304, res5->status); |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| |
| TEST(ETagTest, StaticFileETagIfNoneMatchStarNotFound) { |
| using namespace httplib; |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // Send If-None-Match: * to a non-existent file |
| Headers h = {{"If-None-Match", "*"}}; |
| auto res = cli.Get("/static/etag_testfile_notfound.txt", h); |
| ASSERT_TRUE(res); |
| EXPECT_EQ(404, res->status); |
| |
| svr.stop(); |
| t.join(); |
| } |
| |
| TEST(ETagTest, LastModifiedAndIfModifiedSince) { |
| using namespace httplib; |
| |
| // Create a test file |
| const char *fname = "ims_testfile.txt"; |
| const char *content = "if-modified-since-test"; |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // First request: should get 200 with Last-Modified header |
| auto res1 = cli.Get("/static/ims_testfile.txt"); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| ASSERT_TRUE(res1->has_header("Last-Modified")); |
| std::string last_modified = res1->get_header_value("Last-Modified"); |
| EXPECT_FALSE(last_modified.empty()); |
| |
| // If-Modified-Since with same time: expect 304 |
| Headers h2 = {{"If-Modified-Since", last_modified}}; |
| auto res2 = cli.Get("/static/ims_testfile.txt", h2); |
| ASSERT_TRUE(res2); |
| EXPECT_EQ(304, res2->status); |
| |
| // If-Modified-Since with future time: expect 304 |
| Headers h3 = {{"If-Modified-Since", "Sun, 01 Jan 2099 00:00:00 GMT"}}; |
| auto res3 = cli.Get("/static/ims_testfile.txt", h3); |
| ASSERT_TRUE(res3); |
| EXPECT_EQ(304, res3->status); |
| |
| // If-Modified-Since with past time: expect 200 |
| Headers h4 = {{"If-Modified-Since", "Sun, 01 Jan 2000 00:00:00 GMT"}}; |
| auto res4 = cli.Get("/static/ims_testfile.txt", h4); |
| ASSERT_TRUE(res4); |
| EXPECT_EQ(200, res4->status); |
| |
| // If-None-Match takes precedence over If-Modified-Since |
| // (send matching ETag with old If-Modified-Since -> should still be 304) |
| ASSERT_TRUE(res1->has_header("ETag")); |
| std::string etag = res1->get_header_value("ETag"); |
| Headers h5 = {{"If-None-Match", etag}, |
| {"If-Modified-Since", "Sun, 01 Jan 2000 00:00:00 GMT"}}; |
| auto res5 = cli.Get("/static/ims_testfile.txt", h5); |
| ASSERT_TRUE(res5); |
| EXPECT_EQ(304, res5->status); |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| |
| TEST(ETagTest, VaryAcceptEncodingWithCompression) { |
| using namespace httplib; |
| |
| Server svr; |
| |
| // Endpoint that returns compressible content |
| svr.Get("/compressible", [](const Request &, Response &res) { |
| // Return a large enough body to trigger compression |
| std::string body(1000, 'a'); |
| res.set_content(body, "text/plain"); |
| }); |
| |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // Request with gzip support: should get Vary header when compressed |
| cli.set_compress(true); |
| auto res1 = cli.Get("/compressible"); |
| ASSERT_TRUE(res1); |
| EXPECT_EQ(200, res1->status); |
| |
| // If Content-Encoding is set, Vary should also be set |
| if (res1->has_header("Content-Encoding")) { |
| EXPECT_TRUE(res1->has_header("Vary")); |
| EXPECT_EQ("Accept-Encoding", res1->get_header_value("Vary")); |
| } |
| |
| // Request without Accept-Encoding header: should not have compression |
| Headers h_no_compress; |
| auto res2 = cli.Get("/compressible", h_no_compress); |
| ASSERT_TRUE(res2); |
| EXPECT_EQ(200, res2->status); |
| |
| // Verify Vary header is present when compression is applied |
| // (the exact behavior depends on server configuration) |
| |
| svr.stop(); |
| t.join(); |
| } |
| |
| TEST(ETagTest, IfRangeWithETag) { |
| using namespace httplib; |
| |
| // Create a test file with known content |
| const char *fname = "if_range_testfile.txt"; |
| const std::string content = "0123456789ABCDEFGHIJ"; // 20 bytes |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // First request: get ETag |
| auto res1 = cli.Get("/static/if_range_testfile.txt"); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| ASSERT_TRUE(res1->has_header("ETag")); |
| std::string etag = res1->get_header_value("ETag"); |
| |
| // RFC 9110 Section 13.1.5: If-Range requires strong ETag comparison. |
| // Since our server generates weak ETags (W/"..."), If-Range with our |
| // ETag should NOT result in partial content - it should return full content. |
| Headers h2 = {{"Range", "bytes=0-4"}, {"If-Range", etag}}; |
| auto res2 = cli.Get("/static/if_range_testfile.txt", h2); |
| ASSERT_TRUE(res2); |
| // Weak ETag in If-Range -> full content (200), not partial (206) |
| EXPECT_EQ(200, res2->status); |
| EXPECT_EQ(content, res2->body); |
| EXPECT_FALSE(res2->has_header("Content-Range")); |
| |
| // Range request with non-matching If-Range (ETag): should get 200 (full |
| // content) |
| Headers h3 = {{"Range", "bytes=0-4"}, {"If-Range", "W/\"wrong-etag\""}}; |
| auto res3 = cli.Get("/static/if_range_testfile.txt", h3); |
| ASSERT_TRUE(res3); |
| EXPECT_EQ(200, res3->status); |
| EXPECT_EQ(content, res3->body); |
| EXPECT_FALSE(res3->has_header("Content-Range")); |
| |
| // Range request with strong ETag (hypothetical - our server doesn't generate |
| // strong ETags, but if client sends a strong ETag that doesn't match, it |
| // should return full content) |
| Headers h4 = {{"Range", "bytes=0-4"}, {"If-Range", "\"strong-etag\""}}; |
| auto res4 = cli.Get("/static/if_range_testfile.txt", h4); |
| ASSERT_TRUE(res4); |
| EXPECT_EQ(200, res4->status); |
| EXPECT_EQ(content, res4->body); |
| EXPECT_FALSE(res4->has_header("Content-Range")); |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| |
| TEST(ETagTest, IfRangeWithDate) { |
| using namespace httplib; |
| |
| // Create a test file |
| const char *fname = "if_range_date_testfile.txt"; |
| const std::string content = "ABCDEFGHIJ0123456789"; // 20 bytes |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // First request: get Last-Modified |
| auto res1 = cli.Get("/static/if_range_date_testfile.txt"); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| ASSERT_TRUE(res1->has_header("Last-Modified")); |
| std::string last_modified = res1->get_header_value("Last-Modified"); |
| |
| // Range request with matching If-Range (date): should get 206 |
| Headers h2 = {{"Range", "bytes=5-9"}, {"If-Range", last_modified}}; |
| auto res2 = cli.Get("/static/if_range_date_testfile.txt", h2); |
| ASSERT_TRUE(res2); |
| EXPECT_EQ(206, res2->status); |
| EXPECT_EQ("FGHIJ", res2->body); |
| |
| // Range request with old If-Range date: should get 200 (full content) |
| Headers h3 = {{"Range", "bytes=5-9"}, |
| {"If-Range", "Sun, 01 Jan 2000 00:00:00 GMT"}}; |
| auto res3 = cli.Get("/static/if_range_date_testfile.txt", h3); |
| ASSERT_TRUE(res3); |
| EXPECT_EQ(200, res3->status); |
| EXPECT_EQ(content, res3->body); |
| |
| // Range request with future If-Range date: should get 206 |
| Headers h4 = {{"Range", "bytes=0-4"}, |
| {"If-Range", "Sun, 01 Jan 2099 00:00:00 GMT"}}; |
| auto res4 = cli.Get("/static/if_range_date_testfile.txt", h4); |
| ASSERT_TRUE(res4); |
| EXPECT_EQ(206, res4->status); |
| EXPECT_EQ("ABCDE", res4->body); |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| TEST(ETagTest, MalformedIfNoneMatchAndWhitespace) { |
| using namespace httplib; |
| |
| const char *fname = "etag_malformed.txt"; |
| const char *content = "malformed-etag"; |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // baseline: should get 200 and an ETag |
| auto res1 = cli.Get("/static/etag_malformed.txt"); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| ASSERT_TRUE(res1->has_header("ETag")); |
| |
| // Malformed ETag value (missing quotes) should be treated as non-matching |
| Headers h_bad = {{"If-None-Match", "W/noquotes"}}; |
| auto res_bad = cli.Get("/static/etag_malformed.txt", h_bad); |
| ASSERT_TRUE(res_bad); |
| EXPECT_EQ(200, res_bad->status); |
| |
| // Whitespace-only header value should be considered invalid / non-matching |
| std::string raw_req = "GET /static/etag_malformed.txt HTTP/1.1\r\n" |
| "Host: localhost\r\n" |
| "If-None-Match: \r\n" |
| "Connection: close\r\n" |
| "\r\n"; |
| |
| std::string out; |
| ASSERT_TRUE(send_request(5, raw_req, &out)); |
| EXPECT_EQ("HTTP/1.1 200 OK", out.substr(0, 15)); |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| |
| TEST(ETagTest, InvalidIfModifiedSinceAndIfRangeDate) { |
| using namespace httplib; |
| |
| const char *fname = "ims_invalid_format.txt"; |
| const char *content = "ims-bad-format"; |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| auto res1 = cli.Get("/static/ims_invalid_format.txt"); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| ASSERT_TRUE(res1->has_header("Last-Modified")); |
| |
| // If-Modified-Since with invalid format should not result in 304 |
| Headers h_bad_date = {{"If-Modified-Since", "not-a-valid-date"}}; |
| auto res_bad = cli.Get("/static/ims_invalid_format.txt", h_bad_date); |
| ASSERT_TRUE(res_bad); |
| EXPECT_EQ(200, res_bad->status); |
| |
| // If-Range with invalid date format should be treated as mismatch -> full |
| // content (200) |
| Headers h_ifrange_bad = {{"Range", "bytes=0-3"}, |
| {"If-Range", "invalid-date"}}; |
| auto res_ifrange = cli.Get("/static/ims_invalid_format.txt", h_ifrange_bad); |
| ASSERT_TRUE(res_ifrange); |
| EXPECT_EQ(200, res_ifrange->status); |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| |
| TEST(ETagTest, IfRangeWithMalformedETag) { |
| using namespace httplib; |
| |
| const char *fname = "ifrange_malformed.txt"; |
| const std::string content = "0123456789"; |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| // First request: get ETag |
| auto res1 = cli.Get("/static/ifrange_malformed.txt"); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| ASSERT_TRUE(res1->has_header("ETag")); |
| |
| // If-Range with malformed ETag (no quotes) should be treated as mismatch -> |
| // full content (200) |
| Headers h_malformed = {{"Range", "bytes=0-4"}, {"If-Range", "W/noquotes"}}; |
| auto res2 = cli.Get("/static/ifrange_malformed.txt", h_malformed); |
| ASSERT_TRUE(res2); |
| EXPECT_EQ(200, res2->status); |
| EXPECT_EQ(content, res2->body); |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| |
| TEST(ETagTest, ExtremeLargeDateValues) { |
| using namespace httplib; |
| |
| const char *fname = "ims_extreme_date.txt"; |
| const char *content = "ims-extreme-date"; |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| auto res1 = cli.Get(std::string("/static/") + fname); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| ASSERT_TRUE(res1->has_header("Last-Modified")); |
| |
| // Extremely large year that may overflow date parsing routines. |
| Headers h_large_date = { |
| {"If-Modified-Since", "Sun, 01 Jan 99999 00:00:00 GMT"}}; |
| auto res_bad = cli.Get(std::string("/static/") + fname, h_large_date); |
| ASSERT_TRUE(res_bad); |
| // Expect server to treat this as invalid/mismatch and return full content |
| EXPECT_EQ(200, res_bad->status); |
| |
| // If-Range with extremely large date should be treated as mismatch -> full |
| // content (200) |
| Headers h_ifrange_large = {{"Range", "bytes=0-3"}, |
| {"If-Range", "Sun, 01 Jan 99999 00:00:00 GMT"}}; |
| auto res_ifrange = cli.Get(std::string("/static/") + fname, h_ifrange_large); |
| ASSERT_TRUE(res_ifrange); |
| EXPECT_EQ(200, res_ifrange->status); |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| |
| TEST(ETagTest, NegativeFileModificationTime) { |
| using namespace httplib; |
| |
| const char *fname = "ims_negative_mtime.txt"; |
| const std::string content = "negative-mtime"; |
| { |
| std::ofstream ofs(fname); |
| ofs << content; |
| ASSERT_TRUE(ofs.good()); |
| } |
| |
| // Try to set file mtime to a negative value. This may fail on some |
| // platforms/filesystems; if it fails, the test will still verify server |
| // behaves safely by performing a regular conditional request. |
| #if defined(__APPLE__) || defined(__linux__) |
| bool set_negative = false; |
| do { |
| struct timeval times[2]; |
| // access time: now |
| times[0].tv_sec = time(nullptr); |
| times[0].tv_usec = 0; |
| // modification time: negative (e.g., -1) |
| times[1].tv_sec = -1; |
| times[1].tv_usec = 0; |
| if (utimes(fname, times) == 0) { set_negative = true; } |
| } while (0); |
| #else |
| bool set_negative = false; |
| #endif |
| |
| Server svr; |
| svr.set_mount_point("/static", "."); |
| auto t = std::thread([&]() { svr.listen(HOST, PORT); }); |
| svr.wait_until_ready(); |
| |
| Client cli(HOST, PORT); |
| |
| auto res1 = cli.Get(std::string("/static/") + fname); |
| ASSERT_TRUE(res1); |
| ASSERT_EQ(200, res1->status); |
| bool has_last_modified = res1->has_header("Last-Modified"); |
| std::string last_modified; |
| if (has_last_modified) { |
| last_modified = res1->get_header_value("Last-Modified"); |
| } |
| |
| if (set_negative) { |
| // If we successfully set a negative mtime, ensure server returns a |
| // Last-Modified string (may be empty or normalized). Send If-Modified-Since |
| // with an old date and ensure server handles it without crash. |
| Headers h_old = {{"If-Modified-Since", "Sun, 01 Jan 1970 00:00:00 GMT"}}; |
| auto res2 = cli.Get(std::string("/static/") + fname, h_old); |
| ASSERT_TRUE(res2); |
| // Behavior may vary; at minimum ensure server responds (200 or 304). |
| EXPECT_TRUE(res2->status == 200 || res2->status == 304); |
| } else { |
| // Could not set negative mtime on this platform; fall back to verifying |
| // that normal invalid/malformed dates are treated safely (non-304). |
| Headers h_bad_date = { |
| {"If-Modified-Since", "Sun, 01 Jan 99999 00:00:00 GMT"}}; |
| auto res_bad = cli.Get(std::string("/static/") + fname, h_bad_date); |
| ASSERT_TRUE(res_bad); |
| EXPECT_EQ(200, res_bad->status); |
| } |
| |
| svr.stop(); |
| t.join(); |
| std::remove(fname); |
| } |
| |
| //============================================================================== |
| // SSE Parsing Tests |
| //============================================================================== |
| |
| class SSEParsingTest : public ::testing::Test { |
| protected: |
| // Test helper that mimics SSE parsing behavior |
| static bool parse_sse_line(const std::string &line, sse::SSEMessage &msg, |
| int &retry_ms) { |
| // Blank line signals end of event |
| if (line.empty() || line == "\r") { return true; } |
| |
| // Lines starting with ':' are comments (ignored) |
| if (!line.empty() && line[0] == ':') { return false; } |
| |
| // Find the colon separator |
| auto colon_pos = line.find(':'); |
| if (colon_pos == std::string::npos) { |
| // Line with no colon is treated as field name with empty value |
| return false; |
| } |
| |
| std::string field = line.substr(0, colon_pos); |
| std::string value; |
| |
| // Value starts after colon, skip optional single space |
| if (colon_pos + 1 < line.size()) { |
| size_t value_start = colon_pos + 1; |
| if (line[value_start] == ' ') { value_start++; } |
| value = line.substr(value_start); |
| // Remove trailing \r if present |
| if (!value.empty() && value.back() == '\r') { value.pop_back(); } |
| } |
| |
| // Handle known fields |
| if (field == "event") { |
| msg.event = value; |
| } else if (field == "data") { |
| // Multiple data lines are concatenated with newlines |
| if (!msg.data.empty()) { msg.data += "\n"; } |
| msg.data += value; |
| } else if (field == "id") { |
| // Empty id is valid (clears the last event ID) |
| msg.id = value; |
| } else if (field == "retry") { |
| // Parse retry interval in milliseconds |
| try { |
| retry_ms = std::stoi(value); |
| } catch (...) { |
| // Invalid retry value, ignore |
| } |
| } |
| // Unknown fields are ignored per SSE spec |
| |
| return false; |
| } |
| }; |
| |
| // Test: Single-line data |
| TEST_F(SSEParsingTest, SingleLineData) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("data: hello", msg, retry_ms)); |
| EXPECT_EQ(msg.data, "hello"); |
| EXPECT_EQ(msg.event, "message"); |
| |
| // Blank line ends event |
| EXPECT_TRUE(parse_sse_line("", msg, retry_ms)); |
| } |
| |
| // Test: Multi-line data |
| TEST_F(SSEParsingTest, MultiLineData) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("data: line1", msg, retry_ms)); |
| EXPECT_FALSE(parse_sse_line("data: line2", msg, retry_ms)); |
| EXPECT_FALSE(parse_sse_line("data: line3", msg, retry_ms)); |
| EXPECT_EQ(msg.data, "line1\nline2\nline3"); |
| } |
| |
| // Test: Custom event types |
| TEST_F(SSEParsingTest, CustomEventType) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("event: update", msg, retry_ms)); |
| EXPECT_FALSE(parse_sse_line("data: payload", msg, retry_ms)); |
| EXPECT_EQ(msg.event, "update"); |
| EXPECT_EQ(msg.data, "payload"); |
| } |
| |
| // Test: Event ID handling |
| TEST_F(SSEParsingTest, EventIdHandling) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("id: 12345", msg, retry_ms)); |
| EXPECT_FALSE(parse_sse_line("data: test", msg, retry_ms)); |
| EXPECT_EQ(msg.id, "12345"); |
| } |
| |
| // Test: Empty event ID (clears last event ID) |
| TEST_F(SSEParsingTest, EmptyEventId) { |
| sse::SSEMessage msg; |
| msg.id = "previous"; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("id:", msg, retry_ms)); |
| EXPECT_EQ(msg.id, ""); |
| } |
| |
| // Test: Retry field parsing |
| TEST_F(SSEParsingTest, RetryFieldParsing) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("retry: 5000", msg, retry_ms)); |
| EXPECT_EQ(retry_ms, 5000); |
| } |
| |
| // Test: Invalid retry value |
| TEST_F(SSEParsingTest, InvalidRetryValue) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("retry: invalid", msg, retry_ms)); |
| EXPECT_EQ(retry_ms, 3000); // Unchanged |
| } |
| |
| // Test: Comments (lines starting with :) |
| TEST_F(SSEParsingTest, CommentsIgnored) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line(": this is a comment", msg, retry_ms)); |
| EXPECT_EQ(msg.data, ""); |
| EXPECT_EQ(msg.event, "message"); |
| } |
| |
| // Test: Colon in value |
| TEST_F(SSEParsingTest, ColonInValue) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("data: hello:world:test", msg, retry_ms)); |
| EXPECT_EQ(msg.data, "hello:world:test"); |
| } |
| |
| // Test: Line with no colon (field name only) |
| TEST_F(SSEParsingTest, FieldNameOnly) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| // According to SSE spec, this is treated as field name with empty value |
| EXPECT_FALSE(parse_sse_line("data", msg, retry_ms)); |
| // Since we don't recognize "data" without colon, data should be empty |
| EXPECT_EQ(msg.data, ""); |
| } |
| |
| // Test: Trailing \r handling |
| TEST_F(SSEParsingTest, TrailingCarriageReturn) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("data: hello\r", msg, retry_ms)); |
| EXPECT_EQ(msg.data, "hello"); |
| } |
| |
| // Test: Unknown fields ignored |
| TEST_F(SSEParsingTest, UnknownFieldsIgnored) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("unknown: value", msg, retry_ms)); |
| EXPECT_EQ(msg.data, ""); |
| EXPECT_EQ(msg.event, "message"); |
| } |
| |
| // Test: Space after colon is optional |
| TEST_F(SSEParsingTest, SpaceAfterColonOptional) { |
| sse::SSEMessage msg1, msg2; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("data: hello", msg1, retry_ms)); |
| EXPECT_FALSE(parse_sse_line("data:hello", msg2, retry_ms)); |
| EXPECT_EQ(msg1.data, "hello"); |
| EXPECT_EQ(msg2.data, "hello"); |
| } |
| |
| // Test: SSEMessage clear |
| TEST_F(SSEParsingTest, MessageClear) { |
| sse::SSEMessage msg; |
| msg.event = "custom"; |
| msg.data = "some data"; |
| msg.id = "123"; |
| |
| msg.clear(); |
| |
| EXPECT_EQ(msg.event, "message"); |
| EXPECT_EQ(msg.data, ""); |
| EXPECT_EQ(msg.id, ""); |
| } |
| |
| // Test: Complete event parsing |
| TEST_F(SSEParsingTest, CompleteEventParsing) { |
| sse::SSEMessage msg; |
| int retry_ms = 3000; |
| |
| EXPECT_FALSE(parse_sse_line("event: notification", msg, retry_ms)); |
| EXPECT_FALSE(parse_sse_line("id: evt-42", msg, retry_ms)); |
| EXPECT_FALSE(parse_sse_line("data: {\"type\":\"alert\"}", msg, retry_ms)); |
| EXPECT_FALSE(parse_sse_line("retry: 1000", msg, retry_ms)); |
| |
| // Blank line ends event |
| EXPECT_TRUE(parse_sse_line("", msg, retry_ms)); |
| |
| EXPECT_EQ(msg.event, "notification"); |
| EXPECT_EQ(msg.id, "evt-42"); |
| EXPECT_EQ(msg.data, "{\"type\":\"alert\"}"); |
| EXPECT_EQ(retry_ms, 1000); |
| } |
| |
| //============================================================================== |
| // Integration Tests with Server |
| //============================================================================== |
| |
| class SSEIntegrationTest : public ::testing::Test { |
| protected: |
| void SetUp() override { |
| stop_server_.store(false); |
| events_.clear(); |
| server_ = httplib::detail::make_unique<Server>(); |
| setup_server(); |
| start_server(); |
| } |
| |
| void TearDown() override { |
| stop_server_.store(true); |
| event_cv_.notify_all(); |
| server_->stop(); |
| if (server_thread_.joinable()) { server_thread_.join(); } |
| } |
| |
| void setup_server() { |
| // Simple SSE endpoint |
| server_->Get("/events", [this](const Request &req, Response &res) { |
| auto last_id = req.get_header_value("Last-Event-ID"); |
| if (!last_id.empty()) { last_received_event_id_ = last_id; } |
| |
| res.set_chunked_content_provider( |
| "text/event-stream", [this](size_t /*offset*/, DataSink &sink) { |
| std::unique_lock<std::mutex> lock(event_mutex_); |
| if (event_cv_.wait_for( |
| lock, std::chrono::milliseconds(200), [this] { |
| return !events_.empty() || stop_server_.load(); |
| })) { |
| if (stop_server_.load()) { return false; } |
| if (!events_.empty()) { |
| std::string event = events_.front(); |
| events_.erase(events_.begin()); |
| sink.write(event.data(), event.size()); |
| return true; |
| } |
| } |
| return !stop_server_.load(); |
| }); |
| }); |
| |
| // Endpoint that returns error |
| server_->Get("/error-endpoint", [](const Request &, Response &res) { |
| res.status = 500; |
| res.set_content("Internal Server Error", "text/plain"); |
| }); |
| |
| // Endpoint for custom event types |
| server_->Get("/custom-events", [](const Request &, Response &res) { |
| res.set_chunked_content_provider( |
| "text/event-stream", [](size_t offset, DataSink &sink) { |
| if (offset == 0) { |
| std::string event = "event: update\ndata: updated\n\n" |
| "event: delete\ndata: deleted\n\n"; |
| sink.write(event.data(), event.size()); |
| } |
| return false; // End stream after sending |
| }); |
| }); |
| } |
| |
| void start_server() { |
| port_ = server_->bind_to_any_port(HOST); |
| server_thread_ = std::thread([this]() { server_->listen_after_bind(); }); |
| |
| // Wait for server to start |
| while (!server_->is_running()) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(10)); |
| } |
| } |
| |
| int get_port() const { return port_; } |
| |
| void send_event(const std::string &event) { |
| std::lock_guard<std::mutex> lock(event_mutex_); |
| events_.push_back(event); |
| event_cv_.notify_all(); |
| } |
| |
| std::unique_ptr<Server> server_; |
| std::thread server_thread_; |
| std::mutex event_mutex_; |
| std::condition_variable event_cv_; |
| std::vector<std::string> events_; |
| std::atomic<bool> stop_server_{false}; |
| std::string last_received_event_id_; |
| int port_ = 0; |
| }; |
| |
| // Test: Successful connection and on_open callback |
| TEST_F(SSEIntegrationTest, SuccessfulConnection) { |
| // Add a simple endpoint that sends one event and closes |
| server_->Get("/simple-event", [](const Request &, Response &res) { |
| res.set_chunked_content_provider( |
| "text/event-stream", [](size_t offset, DataSink &sink) { |
| if (offset == 0) { |
| std::string event = "data: hello\n\n"; |
| sink.write(event.data(), event.size()); |
| } |
| return false; // Close stream after sending |
| }); |
| }); |
| |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/simple-event"); |
| |
| std::atomic<bool> open_called{false}; |
| std::atomic<bool> message_received{false}; |
| |
| sse.on_open([&open_called]() { open_called.store(true); }); |
| |
| sse.on_message([&message_received](const sse::SSEMessage &msg) { |
| if (msg.data == "hello") { message_received.store(true); } |
| }); |
| |
| sse.set_reconnect_interval(100); |
| sse.set_max_reconnect_attempts(1); |
| |
| // Start async |
| sse.start_async(); |
| |
| // Wait for message to be processed |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| |
| sse.stop(); |
| |
| EXPECT_TRUE(open_called.load()); |
| EXPECT_TRUE(message_received.load()); |
| } |
| |
| // Test: on_message callback |
| TEST_F(SSEIntegrationTest, OnMessageCallback) { |
| // Endpoint that sends multiple events then closes |
| server_->Get("/multi-event", [](const Request &, Response &res) { |
| res.set_chunked_content_provider( |
| "text/event-stream", [](size_t offset, DataSink &sink) { |
| if (offset == 0) { |
| std::string events = "data: message1\n\ndata: message2\n\n"; |
| sink.write(events.data(), events.size()); |
| } |
| return false; |
| }); |
| }); |
| |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/multi-event"); |
| |
| std::vector<std::string> received_messages; |
| std::mutex messages_mutex; |
| |
| sse.on_message([&](const sse::SSEMessage &msg) { |
| std::lock_guard<std::mutex> lock(messages_mutex); |
| received_messages.push_back(msg.data); |
| }); |
| |
| sse.set_reconnect_interval(100); |
| sse.set_max_reconnect_attempts(1); |
| sse.start_async(); |
| |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| sse.stop(); |
| |
| std::lock_guard<std::mutex> lock(messages_mutex); |
| EXPECT_GE(received_messages.size(), 2u); |
| if (received_messages.size() >= 2) { |
| EXPECT_EQ(received_messages[0], "message1"); |
| EXPECT_EQ(received_messages[1], "message2"); |
| } |
| } |
| |
| // Test: on_event for specific types |
| TEST_F(SSEIntegrationTest, OnEventForSpecificTypes) { |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/custom-events"); |
| |
| std::atomic<bool> update_received{false}; |
| std::atomic<bool> delete_received{false}; |
| |
| sse.on_event("update", [&update_received](const sse::SSEMessage &msg) { |
| if (msg.data == "updated") { update_received.store(true); } |
| }); |
| |
| sse.on_event("delete", [&delete_received](const sse::SSEMessage &msg) { |
| if (msg.data == "deleted") { delete_received.store(true); } |
| }); |
| |
| sse.set_max_reconnect_attempts(1); |
| sse.start_async(); |
| |
| std::this_thread::sleep_for(std::chrono::milliseconds(300)); |
| sse.stop(); |
| |
| EXPECT_TRUE(update_received.load()); |
| EXPECT_TRUE(delete_received.load()); |
| } |
| |
| // Test: on_error callback on connection failure |
| TEST_F(SSEIntegrationTest, OnErrorCallback) { |
| // Connect to a non-existent port |
| Client client("localhost", 59999); |
| sse::SSEClient sse(client, "/events"); |
| |
| std::atomic<bool> error_called{false}; |
| Error received_error = Error::Success; |
| |
| sse.on_error([&](Error err) { |
| error_called.store(true); |
| received_error = err; |
| }); |
| |
| sse.set_reconnect_interval(50); |
| sse.set_max_reconnect_attempts(1); |
| |
| sse.start_async(); |
| std::this_thread::sleep_for(std::chrono::milliseconds(200)); |
| sse.stop(); |
| |
| EXPECT_TRUE(error_called.load()); |
| EXPECT_NE(received_error, Error::Success); |
| } |
| |
| // Test: Last-Event-ID header sent on reconnect |
| TEST_F(SSEIntegrationTest, LastEventIdHeader) { |
| // Endpoint that sends event with ID |
| server_->Get("/event-with-id", [](const Request &, Response &res) { |
| res.set_chunked_content_provider( |
| "text/event-stream", [](size_t offset, DataSink &sink) { |
| if (offset == 0) { |
| std::string event = "id: evt-123\ndata: test\n\n"; |
| sink.write(event.data(), event.size()); |
| } |
| return false; |
| }); |
| }); |
| |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/event-with-id"); |
| |
| std::atomic<bool> id_received{false}; |
| |
| sse.on_message([&](const sse::SSEMessage &msg) { |
| if (!msg.id.empty()) { id_received.store(true); } |
| }); |
| |
| sse.set_reconnect_interval(100); |
| sse.set_max_reconnect_attempts(1); |
| sse.start_async(); |
| |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| sse.stop(); |
| |
| EXPECT_TRUE(id_received.load()); |
| EXPECT_EQ(sse.last_event_id(), "evt-123"); |
| } |
| |
| // Test: Manual stop |
| TEST_F(SSEIntegrationTest, ManualStop) { |
| // Endpoint that sends one event and stays open briefly |
| std::atomic<bool> handler_running{true}; |
| |
| server_->Get("/stay-open", [&handler_running](const Request &, |
| Response &res) { |
| res.set_chunked_content_provider( |
| "text/event-stream", [&handler_running](size_t offset, DataSink &sink) { |
| if (offset == 0) { |
| std::string event = "data: connected\n\n"; |
| sink.write(event.data(), event.size()); |
| } |
| // Keep connection open while handler_running is true |
| for (int i = 0; i < 10 && handler_running.load(); ++i) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(50)); |
| } |
| return false; |
| }); |
| }); |
| |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/stay-open"); |
| |
| std::atomic<bool> connected{false}; |
| sse.on_open([&connected]() { connected.store(true); }); |
| |
| sse.set_reconnect_interval(100); |
| sse.set_max_reconnect_attempts(1); |
| sse.start_async(); |
| |
| // Wait for connection to establish |
| for (int i = 0; i < 20 && !connected.load(); ++i) { |
| std::this_thread::sleep_for(std::chrono::milliseconds(50)); |
| } |
| EXPECT_TRUE(connected.load()); |
| EXPECT_TRUE(sse.is_connected()); |
| |
| // Signal handler to stop |
| handler_running.store(false); |
| |
| // Stop SSE client |
| sse.stop(); |
| EXPECT_FALSE(sse.is_connected()); |
| } |
| |
| // Test: SSEClient with custom headers |
| TEST_F(SSEIntegrationTest, CustomHeaders) { |
| // Setup a server endpoint that checks for custom header |
| std::atomic<bool> header_received{false}; |
| |
| server_->Get("/header-check", [&](const Request &req, Response &res) { |
| if (req.get_header_value("X-Custom-Header") == "custom-value") { |
| header_received.store(true); |
| } |
| res.set_chunked_content_provider("text/event-stream", |
| [](size_t, DataSink &) { return false; }); |
| }); |
| |
| Client client("localhost", get_port()); |
| Headers headers = {{"X-Custom-Header", "custom-value"}}; |
| sse::SSEClient sse(client, "/header-check", headers); |
| |
| sse.set_max_reconnect_attempts(1); |
| sse.start_async(); |
| |
| std::this_thread::sleep_for(std::chrono::milliseconds(200)); |
| sse.stop(); |
| |
| EXPECT_TRUE(header_received.load()); |
| } |
| |
| // Test: Reconnect interval configuration |
| TEST_F(SSEIntegrationTest, ReconnectIntervalConfiguration) { |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/events"); |
| |
| auto &result = sse.set_reconnect_interval(500); |
| // Builder pattern should return reference to self |
| EXPECT_EQ(&result, &sse); |
| } |
| |
| // Test: Max reconnect attempts |
| TEST_F(SSEIntegrationTest, MaxReconnectAttempts) { |
| // Connect to non-existent port to force reconnects |
| Client client("localhost", 59998); |
| sse::SSEClient sse(client, "/events"); |
| |
| std::atomic<int> error_count{0}; |
| |
| sse.on_error([&](Error) { error_count.fetch_add(1); }); |
| |
| sse.set_reconnect_interval(50); |
| sse.set_max_reconnect_attempts(2); |
| |
| auto start = std::chrono::steady_clock::now(); |
| sse.start(); // Blocking call |
| auto end = std::chrono::steady_clock::now(); |
| |
| // Should have stopped after 2 failed attempts |
| EXPECT_GE(error_count.load(), 2); |
| |
| // Should not have taken too long (max 2 attempts * 50ms + overhead) |
| auto duration = |
| std::chrono::duration_cast<std::chrono::milliseconds>(end - start); |
| #ifdef _WIN32 |
| // Windows is much slower for socket connection failures |
| EXPECT_LT(duration.count(), 7000); |
| #else |
| EXPECT_LT(duration.count(), 1000); |
| #endif |
| } |
| |
| // Test: Multi-line data in integration |
| TEST_F(SSEIntegrationTest, MultiLineDataIntegration) { |
| // Endpoint with multi-line data |
| server_->Get("/multiline-data", [](const Request &, Response &res) { |
| res.set_chunked_content_provider( |
| "text/event-stream", [](size_t offset, DataSink &sink) { |
| if (offset == 0) { |
| std::string event = "data: line1\ndata: line2\ndata: line3\n\n"; |
| sink.write(event.data(), event.size()); |
| } |
| return false; |
| }); |
| }); |
| |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/multiline-data"); |
| |
| std::string received_data; |
| std::mutex data_mutex; |
| |
| sse.on_message([&](const sse::SSEMessage &msg) { |
| std::lock_guard<std::mutex> lock(data_mutex); |
| received_data = msg.data; |
| }); |
| |
| sse.set_reconnect_interval(100); |
| sse.set_max_reconnect_attempts(1); |
| sse.start_async(); |
| |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| sse.stop(); |
| |
| std::lock_guard<std::mutex> lock(data_mutex); |
| EXPECT_EQ(received_data, "line1\nline2\nline3"); |
| } |
| |
| // Test: Auto-reconnect after server disconnection |
| TEST_F(SSEIntegrationTest, AutoReconnectAfterDisconnect) { |
| std::atomic<int> connection_count{0}; |
| std::atomic<int> message_count{0}; |
| |
| // Endpoint that sends one event and closes, forcing reconnect |
| server_->Get("/reconnect-test", |
| [&connection_count](const Request &, Response &res) { |
| connection_count.fetch_add(1); |
| res.set_chunked_content_provider( |
| "text/event-stream", [](size_t offset, DataSink &sink) { |
| if (offset == 0) { |
| std::string event = "data: hello\n\n"; |
| sink.write(event.data(), event.size()); |
| } |
| return false; // Close connection after sending |
| }); |
| }); |
| |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/reconnect-test"); |
| |
| sse.on_message([&message_count](const sse::SSEMessage &) { |
| message_count.fetch_add(1); |
| }); |
| |
| sse.set_reconnect_interval(100); |
| sse.set_max_reconnect_attempts(3); |
| sse.start_async(); |
| |
| // Wait long enough for multiple reconnects |
| std::this_thread::sleep_for(std::chrono::milliseconds(800)); |
| sse.stop(); |
| |
| // Should have connected multiple times (initial + reconnects) |
| EXPECT_GE(connection_count.load(), 2); |
| // Should have received messages from multiple connections |
| EXPECT_GE(message_count.load(), 2); |
| } |
| |
| // Test: Last-Event-ID sent on reconnect |
| TEST_F(SSEIntegrationTest, LastEventIdSentOnReconnect) { |
| std::atomic<int> connection_count{0}; |
| std::vector<std::string> received_last_event_ids; |
| std::mutex id_mutex; |
| |
| // Endpoint that checks Last-Event-ID header and sends event with ID |
| server_->Get("/reconnect-with-id", [&](const Request &req, Response &res) { |
| int conn = connection_count.fetch_add(1); |
| |
| // Capture the Last-Event-ID header from each connection |
| { |
| std::lock_guard<std::mutex> lock(id_mutex); |
| received_last_event_ids.push_back(req.get_header_value("Last-Event-ID")); |
| } |
| |
| res.set_chunked_content_provider( |
| "text/event-stream", [conn](size_t offset, DataSink &sink) { |
| if (offset == 0) { |
| std::string event = |
| "id: event-" + std::to_string(conn) + "\ndata: msg\n\n"; |
| sink.write(event.data(), event.size()); |
| } |
| return false; |
| }); |
| }); |
| |
| Client client("localhost", get_port()); |
| sse::SSEClient sse(client, "/reconnect-with-id"); |
| |
| sse.set_reconnect_interval(100); |
| sse.set_max_reconnect_attempts(3); |
| sse.start_async(); |
| |
| // Wait for at least 2 connections |
| std::this_thread::sleep_for(std::chrono::milliseconds(500)); |
| sse.stop(); |
| |
| // Verify behavior |
| std::lock_guard<std::mutex> lock(id_mutex); |
| EXPECT_GE(received_last_event_ids.size(), 2u); |
| |
| // First connection should have no Last-Event-ID |
| if (!received_last_event_ids.empty()) { |
| EXPECT_EQ(received_last_event_ids[0], ""); |
| } |
| |
| // Second connection should have Last-Event-ID from first connection |
| if (received_last_event_ids.size() >= 2) { |
| EXPECT_EQ(received_last_event_ids[1], "event-0"); |
| } |
| } |
| |
| TEST(Issue2318Test, EmptyHostString) { |
| { |
| httplib::Client cli_empty("", PORT); |
| auto res = cli_empty.Get("/"); |
| ASSERT_FALSE(res); |
| EXPECT_EQ(httplib::Error::Connection, res.error()); |
| } |
| { |
| httplib::Client cli(" ", PORT); |
| auto res = cli.Get("/"); |
| ASSERT_FALSE(res); |
| EXPECT_EQ(httplib::Error::Connection, res.error()); |
| } |
| } |
| |
| #ifdef CPPHTTPLIB_ZLIB_SUPPORT |
| TEST(ZipBombProtectionTest, DecompressedSizeExceedsLimit) { |
| Server svr; |
| |
| // Set a small payload limit (1KB) |
| svr.set_payload_max_length(1024); |
| |
| svr.Post("/test", [&](const Request &req, Response &res) { |
| res.set_content("Body size: " + std::to_string(req.body.size()), |
| "text/plain"); |
| }); |
| |
| auto listen_thread = std::thread([&]() { svr.listen(HOST, PORT); }); |
| auto se = detail::scope_exit([&] { |
| svr.stop(); |
| listen_thread.join(); |
| }); |
| |
| svr.wait_until_ready(); |
| |
| // Create data that compresses well but exceeds limit when decompressed |
| // 8KB of repeated null bytes compresses to a very small size |
| std::string original_data(8 * 1024, '\0'); |
| |
| // Compress the data using gzip |
| std::string compressed_data; |
| detail::gzip_compressor compressor; |
| compressor.compress(original_data.data(), original_data.size(), true, |
| [&](const char *data, size_t size) { |
| compressed_data.append(data, size); |
| return true; |
| }); |
| |
| // Verify compression worked (compressed should be much smaller) |
| ASSERT_LT(compressed_data.size(), original_data.size()); |
| ASSERT_LT(compressed_data.size(), 1024u); // Compressed fits in limit |
| |
| // Send compressed data with Content-Encoding: gzip |
| Client cli(HOST, PORT); |
| Headers headers = {{"Content-Encoding", "gzip"}}; |
| auto res = |
| cli.Post("/test", headers, compressed_data, "application/octet-stream"); |
| |
| // Server should reject because decompressed size (8KB) exceeds limit (1KB) |
| ASSERT_TRUE(res); |
| EXPECT_EQ(StatusCode::BadRequest_400, res->status); |
| } |
| #endif |