avs-device-sdk/AVSCommon/Utils/test/MIMEParserTest.cpp

674 lines
28 KiB
C++

/*
* Copyright 2018 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0/
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
#include <string>
#include <cstring>
#include <future>
#include <vector>
#include <unordered_set>
#include <random>
#include <algorithm>
#include <gmock/gmock.h>
#include "AVSCommon/Utils/Common/Common.h"
#include "AVSCommon/Utils/HTTP2/HTTP2MimeRequestEncoder.h"
#include "AVSCommon/Utils/HTTP2/HTTP2MimeResponseDecoder.h"
#include "AVSCommon/Utils/HTTP2/MockHTTP2MimeRequestEncodeSource.h"
#include "AVSCommon/Utils/HTTP2/MockHTTP2MimeResponseDecodeSink.h"
#include "AVSCommon/Utils/LibcurlUtils/HttpResponseCodes.h"
#include "AVSCommon/Utils/Logger/LoggerUtils.h"
namespace alexaClientSDK {
namespace avsCommon {
namespace test {
using namespace testing;
using namespace avsCommon::utils::http2;
using namespace avsCommon::utils;
using namespace avsCommon::utils::logger;
/// Separator for keys and values in mime part headers.
static const std::string SEPARATOR = ": ";
/// Guideline sizes for test payloads and headers
static const int SMALL{100};
static const int MEDIUM{200};
static const int LARGE{500};
static const int XLARGE{5000};
static const int HEADER_PART_SIZE{10};
/// Boundary test constants
/// Response header prefix used to set boundary for decoder
static const std::string BOUNDARY_HEADER_PREFIX = "content-type:mixed/multipart;boundary=";
/// A test boundary string, copied from a real interaction with AVS.
static const std::string MIME_TEST_BOUNDARY_STRING = "84109348-943b-4446-85e6-e73eda9fac43";
/// The newline characters that MIME parsers expect.
static const std::string MIME_NEWLINE = "\r\n";
/// The double dashes which may occur before and after a boundary string.
static const std::string MIME_BOUNDARY_DASHES = "--";
/// The test boundary string with the preceding dashes.
static const std::string BOUNDARY = MIME_BOUNDARY_DASHES + MIME_TEST_BOUNDARY_STRING;
/// A complete boundary, including the CRLF prefix
static const std::string BOUNDARY_LINE = MIME_NEWLINE + BOUNDARY;
/// Header line without prefix or suffix CRLF.
static const std::string HEADER_LINE = "Content-Type: application/json";
/// JSON payload.
static const std::string TEST_MESSAGE =
"{\"directive\":{\"header\":{\"namespace\":\"SpeechRecognizer\",\"name\":"
"\"StopCapture\",\"messageId\":\"4e5612af-e05c-4611-8910-1e23f47ffb41\"},"
"\"payload\":{}}}";
// The following *_LINES definitions are raw mime text for various test parts. Each one assumes that
// it will be prefixed by a boundary and a CRLF. These get concatenated by constructTestMimeString()
// which provides an initiating boundary and CRLF, and which also inserts a CRLF between each part
// that is added. Leaving out the terminal CRLFs here allows constructTestMimeString() to append a
// pair of dashes to the boundary terminating the last part. Those final dashes are the standard
// syntax for the end of a sequence of mime parts.
/// Normal section with header, test message and terminating boundary
/// @note assumes previous terminating boundary and CRLF in the mime stream that this is appended to.
static const std::string NORMAL_LINES = HEADER_LINE + MIME_NEWLINE + MIME_NEWLINE + TEST_MESSAGE + BOUNDARY_LINE;
/// Normal section preceded by a duplicate boundary (one CRLF between boundaries)
/// @note assumes previous terminating boundary and CRLF in the mime stream that this is appended to.
static const std::string DUPLICATE_BOUNDARY_LINES = BOUNDARY + MIME_NEWLINE + NORMAL_LINES;
/// Normal section preceded by a duplicate boundary and CRLF (two CRLFs between boundaries)
/// @note assumes previous terminating boundary and CRLF in the mime stream that this is appended to.
static const std::string CRLF_DUPLICATE_BOUNDARY_LINES = BOUNDARY_LINE + MIME_NEWLINE + NORMAL_LINES;
/// Normal section preceded by triplicate boundaries (one CRLF between boundaries)
/// @note assumes previous terminating boundary and CRLF in the mime stream that this is appended to.
static const std::string TRIPLICATE_BOUNDARY_LINES = BOUNDARY + MIME_NEWLINE + BOUNDARY + MIME_NEWLINE + NORMAL_LINES;
/// Normal section preceded by triplicate boundaries with trailing CRLF (two CRLFs between boundaries)
/// @note assumes previous terminating boundary and CRLF in the mime stream that this is appended to.
static const std::string CRLF_TRIPLICATE_BOUNDARY_LINES =
BOUNDARY_LINE + MIME_NEWLINE + BOUNDARY_LINE + MIME_NEWLINE + NORMAL_LINES;
class MIMEParserTest : public ::testing::Test {
public:
/// boundary
const std::string boundary{"wooohooo"};
/// payloads
const std::string payload1{"The quick brown fox jumped over the lazy dog"};
const std::string payload2{
"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod "
"tempor incididunt ut labore et dolore magna aliqua.\n Ut enim ad minim "
"veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea "
"commodo consequat.\n Duis aute irure dolor in reprehenderit in "
"voluptate velit esse cillum dolore eu fugiat nulla pariatur.\n "
"Excepteur sint occaecat cupidatat non proident, sunt in culpa qui "
"officia deserunt mollit anim id est laborum."};
const std::string payload3{
"Enim diam vulputate ut pharetra sit amet aliquam id. Viverra accumsan "
"in nisl nisi scelerisque eu. Ipsum nunc aliquet bibendum enim facilisis "
"gravida neque convallis a. Ullamcorper dignissim cras tincidunt "
"lobortis. Mi proin sed libero enim sed faucibus turpis in."};
// Header Keys
const std::string key1{"content-type"};
const std::string key2{"content-type"};
const std::string key3{"xyz-abc"};
const std::string key4{"holy-cow"};
const std::string key5{"x-amzn-id"};
// header Values
const std::string value1{"plain/text"};
const std::string value2{"application/xml"};
const std::string value3{"123243124"};
const std::string value4{"tellmehow"};
const std::string value5{"eg1782ge71g172ge1"};
/// headers
#define BUILD_HEADER(number) key##number + SEPARATOR + value##number
const std::string header1{BUILD_HEADER(1)};
const std::string header2{BUILD_HEADER(2)};
const std::string header3{BUILD_HEADER(3)};
const std::string header4{BUILD_HEADER(4)};
const std::string header5{BUILD_HEADER(5)};
#undef BUILD_HEADER
/// Expected output from encoding the above
const std::string encodedPayload =
"\r\n--wooohooo"
"\r\ncontent-type: application/xml"
"\r\nxyz-abc: 123243124"
"\r\nholy-cow: tellmehow"
"\r\n"
"\r\nThe quick brown fox jumped over the lazy dog"
"\r\n--wooohooo"
"\r\ncontent-type: plain/text"
"\r\nx-amzn-id: eg1782ge71g172ge1"
"\r\n"
"\r\nLorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt "
"ut labore et dolore magna aliqua.\n Ut enim ad minim veniam, quis nostrud exercitation ullamco "
"laboris nisi ut aliquip ex ea commodo consequat.\n Duis aute irure dolor in reprehenderit in "
"voluptate velit esse cillum dolore eu fugiat nulla pariatur.\n Excepteur sint occaecat cupidatat "
"non proident, sunt in culpa qui officia deserunt mollit anim id est laborum."
"\r\n--wooohooo"
"\r\ncontent-type: plain/text"
"\r\n"
"\r\nEnim diam vulputate ut pharetra sit amet aliquam id. Viverra accumsan in nisl nisi "
"scelerisque eu. Ipsum nunc aliquet bibendum enim facilisis gravida neque convallis a. "
"Ullamcorper dignissim cras tincidunt lobortis. Mi proin sed libero enim sed faucibus turpis in."
"\r\n"
"--wooohooo--\r\n";
/// Expected size
const size_t encodedSize = encodedPayload.size();
/// Header sets for each payload
const std::vector<std::string> headers1 = {header2, header3, header4};
const std::vector<std::string> headers2 = {header1, header5};
const std::vector<std::string> headers3 = {header1};
/// Expected header values.
const std::vector<std::multimap<std::string, std::string>> expectedHeaders = {
{{key2, value2}, {key3, value3}, {key4, value4}},
{{key1, value1}, {key5, value5}},
{{key1, value1}}};
/// Expected data (payloads).
const std::vector<std::string> expectedData = {payload1, payload2, payload3};
};
/**
* Test the basic encoding use case with a 3 part MIME request
* Test for correct encoded size, header presence and validity
* of Return status for every call as well as bytes written.
*/
TEST_F(MIMEParserTest, encodingSanityTest) {
/// We choose an arbitrary buffer size
const int bufferSize{25};
std::vector<std::string> data;
data.push_back(payload1);
data.push_back(payload2);
data.push_back(payload3);
std::vector<std::vector<std::string>> headerSets;
headerSets.push_back(headers1);
headerSets.push_back(headers2);
headerSets.push_back(headers3);
auto source = std::make_shared<MockHTTP2MimeRequestEncodeSource>(data, headerSets);
HTTP2MimeRequestEncoder encoder{boundary, source};
/// characters array to store the output, size chosen to be more than
/// the size calculated above
char buf[encodedPayload.size() * 2];
size_t index{0};
size_t lastSize{bufferSize};
HTTP2SendDataResult result{0};
while (result.status == HTTP2SendStatus::CONTINUE) {
result = encoder.onSendData(buf + index, bufferSize);
index += result.size;
// size returned should be bufferSize followed by {0,buffer_size}(last chunk)
if (lastSize < result.size) {
FAIL();
} else {
lastSize = result.size;
}
}
ASSERT_EQ(HTTP2SendStatus::COMPLETE, result.status);
ASSERT_TRUE(strncmp(encodedPayload.c_str(), buf, encodedSize) == 0);
ASSERT_EQ(index, encodedSize);
}
TEST_F(MIMEParserTest, decodingSanityTest) {
/// We choose an arbitrary buffer size
const int bufferSize{25};
/// We need to pass a header with boundary info
const std::string boundaryHeader{BOUNDARY_HEADER_PREFIX + boundary};
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
HTTP2MimeResponseDecoder decoder{sink};
size_t index{0};
HTTP2ReceiveDataStatus status{HTTP2ReceiveDataStatus::SUCCESS};
bool resp = decoder.onReceiveHeaderLine(boundaryHeader);
ASSERT_TRUE(resp);
decoder.onReceiveResponseCode(HTTPResponseCode::SUCCESS_OK);
while (status == HTTP2ReceiveDataStatus::SUCCESS && index < encodedSize) {
auto sizeToSend = (index + bufferSize) > encodedSize ? encodedSize - index : bufferSize;
status = decoder.onReceiveData(encodedPayload.c_str() + index, sizeToSend);
index += sizeToSend;
}
ASSERT_EQ(HTTP2ReceiveDataStatus::SUCCESS, status);
/**
* Test individual MIME parts and headers
* note: header order may have changed
*/
ASSERT_TRUE(3 == sink->m_data.size());
ASSERT_TRUE(3 == sink->m_headers.size());
ASSERT_TRUE(3 == sink->m_headers.at(0).size());
ASSERT_EQ(sink->m_headers, expectedHeaders);
ASSERT_EQ(sink->m_data, expectedData);
}
void runCodecTest(
std::shared_ptr<MockHTTP2MimeRequestEncodeSource> source,
std::shared_ptr<MockHTTP2MimeResponseDecodeSink> sink,
const int bufferSize) {
char buf[XLARGE];
size_t pauseCount{0};
// setup encoder
std::string boundary = createRandomAlphabetString(10);
HTTP2MimeRequestEncoder encoder{boundary, source};
// setup decoder
HTTP2MimeResponseDecoder decoder{sink};
size_t index{0};
HTTP2SendDataResult result{0};
while (result.status == HTTP2SendStatus::CONTINUE || result.status == HTTP2SendStatus::PAUSE) {
result = encoder.onSendData(buf + index, bufferSize);
if (result.status == HTTP2SendStatus::PAUSE) {
pauseCount++;
} else {
std::string chunk(buf, index, result.size);
index += result.size;
}
}
/**
* Since encoding output gives partial chunks in case of PAUSE if some bytes have already been encoded,
* the PAUSE count encountered may not match. However, since we add a PAUSE in the very beginning, that one
* is guaranteed to be received
*/
if (source->m_pauseCount > 0) {
ASSERT_TRUE(pauseCount > 0);
}
auto finalSize = index;
index = 0;
pauseCount = 0;
HTTP2ReceiveDataStatus status{HTTP2ReceiveDataStatus::SUCCESS};
const std::string boundaryHeader{BOUNDARY_HEADER_PREFIX + boundary};
bool resp = decoder.onReceiveHeaderLine(boundaryHeader);
ASSERT_TRUE(resp);
decoder.onReceiveResponseCode(HTTPResponseCode::SUCCESS_OK);
while ((status == HTTP2ReceiveDataStatus::SUCCESS || status == HTTP2ReceiveDataStatus::PAUSE) &&
index < finalSize) {
auto sizeToSend = (index + bufferSize) > finalSize ? finalSize - index : bufferSize;
status = decoder.onReceiveData(buf + index, sizeToSend);
if (status == HTTP2ReceiveDataStatus::PAUSE) {
pauseCount++;
} else {
index += sizeToSend;
}
}
ASSERT_TRUE(sink->hasSameContentAs(source));
ASSERT_EQ(pauseCount, sink->m_pauseCount);
}
TEST_F(MIMEParserTest, singlePayloadSinglePass) {
// Sufficiently large buffer to accommodate payload
const int bufferSize{LARGE};
// setup source
std::vector<std::string> data;
std::vector<std::vector<std::string>> headerSets;
// small single payload
data.push_back(createRandomAlphabetString(SMALL));
std::vector<std::string> headers;
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headerSets.push_back(headers);
auto source = std::make_shared<MockHTTP2MimeRequestEncodeSource>(data, headerSets);
// setup sink
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
// run actual test
runCodecTest(source, sink, bufferSize);
}
TEST_F(MIMEParserTest, singlePayloadMultiplePasses) {
// Medium sized payload and buffer
const int bufferSize{SMALL};
// setup source
std::vector<std::string> data;
std::vector<std::vector<std::string>> headerSets;
// single large payload that cannot fit into buffer ensuring >1 pass
data.push_back(createRandomAlphabetString(LARGE));
std::vector<std::string> headers;
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headerSets.push_back(headers);
auto source = std::make_shared<MockHTTP2MimeRequestEncodeSource>(data, headerSets);
// setup sink
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
// run actual test
runCodecTest(source, sink, bufferSize);
}
TEST_F(MIMEParserTest, multiplePayloadsSinglePass) {
const int bufferSize{LARGE};
std::vector<std::string> data;
std::vector<std::vector<std::string>> headerSets;
// 3 small payloads
for (int i = 0; i < 3; ++i) {
data.push_back(createRandomAlphabetString(SMALL));
std::vector<std::string> headers;
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headerSets.push_back(headers);
}
auto source = std::make_shared<MockHTTP2MimeRequestEncodeSource>(data, headerSets);
// setup sink
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
// run actual test
runCodecTest(source, sink, bufferSize);
}
TEST_F(MIMEParserTest, multiplePayloadsMultiplePasses) {
const int bufferSize{SMALL};
std::vector<std::string> data;
std::vector<std::vector<std::string>> headerSets;
// 3 medium payloads
for (int i = 0; i < 3; ++i) {
data.push_back(createRandomAlphabetString(MEDIUM));
std::vector<std::string> headers;
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headerSets.push_back(headers);
}
auto source = std::make_shared<MockHTTP2MimeRequestEncodeSource>(data, headerSets);
// setup sink
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
// run actual test
runCodecTest(source, sink, bufferSize);
}
/**
* Test feeding mime text including duplicate boundaries that we want to just skip over.
*/
TEST_F(MIMEParserTest, duplicateBoundaries) {
/// We choose an arbitrary buffer size
const int bufferSize{25};
/// We need to pass a header with boundary info
const std::string boundaryHeader{BOUNDARY_HEADER_PREFIX + MIME_TEST_BOUNDARY_STRING};
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
HTTP2MimeResponseDecoder decoder{sink};
std::string testPayload = BOUNDARY_LINE;
for (int i = 0; i < 2; ++i) {
testPayload += MIME_NEWLINE + HEADER_LINE + MIME_NEWLINE + MIME_NEWLINE + createRandomAlphabetString(SMALL) +
BOUNDARY_LINE;
}
testPayload += MIME_NEWLINE + NORMAL_LINES;
testPayload +=
MIME_NEWLINE + HEADER_LINE + MIME_NEWLINE + MIME_NEWLINE + createRandomAlphabetString(SMALL) + BOUNDARY_LINE;
testPayload += MIME_NEWLINE + DUPLICATE_BOUNDARY_LINES;
testPayload +=
MIME_NEWLINE + HEADER_LINE + MIME_NEWLINE + MIME_NEWLINE + createRandomAlphabetString(SMALL) + BOUNDARY_LINE;
testPayload += MIME_NEWLINE + CRLF_DUPLICATE_BOUNDARY_LINES;
testPayload +=
MIME_NEWLINE + HEADER_LINE + MIME_NEWLINE + MIME_NEWLINE + createRandomAlphabetString(SMALL) + BOUNDARY_LINE;
testPayload += MIME_NEWLINE + TRIPLICATE_BOUNDARY_LINES;
testPayload +=
MIME_NEWLINE + HEADER_LINE + MIME_NEWLINE + MIME_NEWLINE + createRandomAlphabetString(SMALL) + BOUNDARY_LINE;
testPayload += MIME_NEWLINE + CRLF_TRIPLICATE_BOUNDARY_LINES;
testPayload +=
MIME_NEWLINE + HEADER_LINE + MIME_NEWLINE + MIME_NEWLINE + createRandomAlphabetString(SMALL) + BOUNDARY_LINE;
testPayload += MIME_BOUNDARY_DASHES;
size_t index{0};
HTTP2ReceiveDataStatus status{HTTP2ReceiveDataStatus::SUCCESS};
bool resp = decoder.onReceiveHeaderLine(boundaryHeader);
decoder.onReceiveResponseCode(HTTPResponseCode::SUCCESS_OK);
while (status == HTTP2ReceiveDataStatus::SUCCESS && index < testPayload.size()) {
auto sizeToSend = (index + bufferSize) > testPayload.size() ? testPayload.size() - index : bufferSize;
status = decoder.onReceiveData(testPayload.c_str() + index, sizeToSend);
index += sizeToSend;
}
ASSERT_EQ(HTTP2ReceiveDataStatus::SUCCESS, status);
ASSERT_TRUE(resp);
/// verify only the 12 messages added above are written to sink(no empty payloads from newlines)
ASSERT_TRUE(12 == sink->m_data.size());
// verify TEST_MESSAGE was correctly decoded
for (int j = 2; j < 12; j += 2) {
ASSERT_EQ(TEST_MESSAGE, sink->m_data.at(j));
}
// negative test
for (int j = 1; j < 12; j += 2) {
ASSERT_NE(TEST_MESSAGE, sink->m_data.at(j));
}
}
TEST_F(MIMEParserTest, testABORT) {
// setup source
std::vector<std::string> data;
std::vector<std::vector<std::string>> headerSets;
// small single payload
data.push_back(createRandomAlphabetString(SMALL));
std::vector<std::string> headers;
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headerSets.push_back(headers);
auto source = std::make_shared<MockHTTP2MimeRequestEncodeSource>(data, headerSets);
source->m_abort = true;
// setup sink
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
sink->m_abort = true;
// setup encoder
std::string boundary = createRandomAlphabetString(10);
HTTP2MimeRequestEncoder encoder{boundary, source};
char buf[LARGE];
// Ensure repeated calls return ABORT
ASSERT_TRUE(encoder.onSendData(buf, SMALL).status == HTTP2SendStatus::ABORT);
source->m_abort = false;
ASSERT_TRUE(encoder.onSendData(buf, SMALL).status == HTTP2SendStatus::ABORT);
// setup decoder
HTTP2MimeResponseDecoder decoder{sink};
decoder.onReceiveResponseCode(HTTPResponseCode::SUCCESS_OK);
// Ensure repeated calls return ABORT
ASSERT_EQ(decoder.onReceiveData(encodedPayload.c_str(), SMALL), HTTP2ReceiveDataStatus::ABORT);
sink->m_abort = false;
ASSERT_EQ(decoder.onReceiveData(encodedPayload.c_str(), SMALL), HTTP2ReceiveDataStatus::ABORT);
}
TEST_F(MIMEParserTest, testPAUSE) {
const int bufferSize{SMALL};
std::vector<std::string> data;
std::vector<std::vector<std::string>> headerSets;
// 3 medium payloads
for (int i = 0; i < 3; ++i) {
data.push_back(createRandomAlphabetString(MEDIUM));
std::vector<std::string> headers;
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headerSets.push_back(headers);
}
// setup slow source
auto source = std::make_shared<MockHTTP2MimeRequestEncodeSource>(data, headerSets);
source->m_slowSource = true;
// setup slow sink
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
sink->m_slowSink = true;
// run actual test
runCodecTest(source, sink, bufferSize);
ASSERT_TRUE(sink->m_pauseCount > 0);
ASSERT_TRUE(source->m_pauseCount > 0);
}
/**
* We test for cases when the amount of data to be encoded/decoded from chunk varies a lot
* between calls
*/
TEST_F(MIMEParserTest, testVariableChunkSizes) {
std::vector<std::string> data;
std::vector<std::vector<std::string>> headerSets;
// 3 medium payloads
for (int i = 0; i < 3; ++i) {
data.push_back(createRandomAlphabetString(MEDIUM));
std::vector<std::string> headers;
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headers.push_back(
{createRandomAlphabetString(HEADER_PART_SIZE) + SEPARATOR + createRandomAlphabetString(HEADER_PART_SIZE)});
headerSets.push_back(headers);
}
// setup source
auto source = std::make_shared<MockHTTP2MimeRequestEncodeSource>(data, headerSets);
// setup sink
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
// sufficiently large buffer
char buf[XLARGE];
// setup encoder
std::string boundary = createRandomAlphabetString(10);
HTTP2MimeRequestEncoder encoder{boundary, source};
// setup decoder
HTTP2MimeResponseDecoder decoder{sink};
size_t index{0};
size_t pauseCount{0};
HTTP2SendDataResult result{0};
while (result.status == HTTP2SendStatus::CONTINUE || result.status == HTTP2SendStatus::PAUSE) {
// We will randomize this size from SMALL/2 to SMALL
int bufferSize{generateRandomNumber(SMALL / 2, SMALL)};
result = encoder.onSendData(buf + index, bufferSize);
if (result.status == HTTP2SendStatus::PAUSE) {
pauseCount++;
} else {
std::string chunk(buf, index, result.size);
index += result.size;
}
}
/**
* Since encoding output gives partial chunks in case of PAUSE if some bytes have already been encoded,
* the PAUSE count encountered may not match. However, since we add a PAUSE in the very beginning, that one
* is guaranteed to be received
*/
if (source->m_pauseCount > 0) {
ASSERT_TRUE(pauseCount > 0);
}
auto finalSize = index;
index = 0;
pauseCount = 0;
HTTP2ReceiveDataStatus status{HTTP2ReceiveDataStatus::SUCCESS};
const std::string boundaryHeader{BOUNDARY_HEADER_PREFIX + boundary};
bool resp = decoder.onReceiveHeaderLine(boundaryHeader);
decoder.onReceiveResponseCode(HTTPResponseCode::SUCCESS_OK);
ASSERT_TRUE(resp);
while ((status == HTTP2ReceiveDataStatus::SUCCESS || status == HTTP2ReceiveDataStatus::PAUSE) &&
index < finalSize) {
// We will randomize this size from SMALL/2 to SMALL
int bufferSize{generateRandomNumber(SMALL / 2, SMALL)};
auto sizeToSend = (index + bufferSize) > finalSize ? finalSize - index : bufferSize;
status = decoder.onReceiveData(buf + index, sizeToSend);
if (status == HTTP2ReceiveDataStatus::PAUSE) {
pauseCount++;
} else {
index += sizeToSend;
}
}
ASSERT_TRUE(sink->hasSameContentAs(source));
ASSERT_EQ(pauseCount, sink->m_pauseCount);
}
/**
* Test one of many prefix use cases.
*
* @param readablePrefix The prefix string to log if there is a failure (some prefixes are unreadable).
* @param prefix The prefix to add to the body to decode.
* @param firstChunkSize The size of the first chunk to pass to the decoder.
* @param numberChunks The number of chunks in which to send the body.
* @param expectSuccess Whether or not to expect the parse to succeed.
*/
static void testPrefixCase(
const std::string& readablePrefix,
const std::string& prefix,
size_t firstChunkSize,
int numberChunks,
bool expectSuccess) {
auto sink = std::make_shared<MockHTTP2MimeResponseDecodeSink>();
HTTP2MimeResponseDecoder decoder{sink};
ASSERT_TRUE(decoder.onReceiveHeaderLine(BOUNDARY_HEADER_PREFIX + MIME_TEST_BOUNDARY_STRING));
ASSERT_TRUE(decoder.onReceiveResponseCode(HTTPResponseCode::SUCCESS_OK));
std::string data = prefix + BOUNDARY + MIME_NEWLINE + NORMAL_LINES + MIME_BOUNDARY_DASHES;
auto writeQuantum = data.length();
HTTP2ReceiveDataStatus status{HTTP2ReceiveDataStatus::SUCCESS};
size_t index{0};
int chunksSent = 0;
if (numberChunks != 1 && firstChunkSize != 0 && firstChunkSize < writeQuantum) {
status = decoder.onReceiveData(data.c_str(), firstChunkSize);
index = firstChunkSize;
writeQuantum -= firstChunkSize;
chunksSent++;
}
if (numberChunks > 1) {
writeQuantum /= (numberChunks - chunksSent);
}
while (status == HTTP2ReceiveDataStatus::SUCCESS && index < data.length() && chunksSent < (numberChunks + 1)) {
auto size = (index + writeQuantum) > data.length() ? data.length() - index : writeQuantum;
status = decoder.onReceiveData(data.c_str() + index, size);
index += size;
chunksSent++;
}
std::string message = "prefix=" + readablePrefix + ", firstChunkSize=" + std::to_string(firstChunkSize) +
", numberChunks=" + std::to_string(numberChunks);
if (expectSuccess) {
ASSERT_EQ(HTTP2ReceiveDataStatus::SUCCESS, status) << message;
ASSERT_EQ(sink->m_data.size(), static_cast<size_t>(1)) << message;
ASSERT_EQ(TEST_MESSAGE, sink->m_data[0]) << message;
} else {
ASSERT_NE(HTTP2ReceiveDataStatus::SUCCESS, status) << message;
}
}
TEST_F(MIMEParserTest, testPrefixCases) {
// Value used to drive testes of first chunk sizes 0 (i.e. none), 1, 2, and 3.
static const int MAX_FIRST_CHUNK_SIZE = 3;
// Value used to drive sending data in 1, 2, 3, 4 or 5 parts.
static const int MAX_CHUNKS = 5;
for (int firstChunkSize = 0; firstChunkSize <= MAX_FIRST_CHUNK_SIZE; firstChunkSize++) {
for (int numberChunks = 1; numberChunks <= MAX_CHUNKS; numberChunks++) {
testPrefixCase("empty", "", firstChunkSize, numberChunks, true);
testPrefixCase("\\r\\n", MIME_NEWLINE, firstChunkSize, numberChunks, true);
testPrefixCase("\\r", "\r", firstChunkSize, numberChunks, false);
testPrefixCase("\\n", "\n", firstChunkSize, numberChunks, false);
testPrefixCase("x", "x", firstChunkSize, numberChunks, false);
}
}
}
} // namespace test
} // namespace avsCommon
} // namespace alexaClientSDK