// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package http_test import ( "bufio" "bytes" "context" "crypto/rand" "encoding/base64" "fmt" "io" "math" "mime/multipart" . "net/http" "net/http/httptest" "net/url" "os" "reflect" "regexp" "strings" "testing" ) func TestQuery(t *testing.T) { req := &Request{Method: "GET"} req.URL, _ = url.Parse("http://www.google.com/search?q=foo&q=bar") if q := req.FormValue("q"); q != "foo" { t.Errorf(`req.FormValue("q") = %q, want "foo"`, q) } } // Issue #25192: Test that ParseForm fails but still parses the form when an URL // containing a semicolon is provided. func TestParseFormSemicolonSeparator(t *testing.T) { for _, method := range []string{"POST", "PATCH", "PUT", "GET"} { req, _ := NewRequest(method, "http://www.google.com/search?q=foo;q=bar&a=1", strings.NewReader("q")) err := req.ParseForm() if err == nil { t.Fatalf(`for method %s, ParseForm expected an error, got success`, method) } wantForm := url.Values{"a": []string{"1"}} if !reflect.DeepEqual(req.Form, wantForm) { t.Fatalf("for method %s, ParseForm expected req.Form = %v, want %v", method, req.Form, wantForm) } } } func TestParseFormQuery(t *testing.T) { req, _ := NewRequest("POST", "http://www.google.com/search?q=foo&q=bar&both=x&prio=1&orphan=nope&empty=not", strings.NewReader("z=post&both=y&prio=2&=nokey&orphan&empty=&")) req.Header.Set("Content-Type", "application/x-www-form-urlencoded; param=value") if q := req.FormValue("q"); q != "foo" { t.Errorf(`req.FormValue("q") = %q, want "foo"`, q) } if z := req.FormValue("z"); z != "post" { t.Errorf(`req.FormValue("z") = %q, want "post"`, z) } if bq, found := req.PostForm["q"]; found { t.Errorf(`req.PostForm["q"] = %q, want no entry in map`, bq) } if bz := req.PostFormValue("z"); bz != "post" { t.Errorf(`req.PostFormValue("z") = %q, want "post"`, bz) } if qs := req.Form["q"]; !reflect.DeepEqual(qs, []string{"foo", "bar"}) { t.Errorf(`req.Form["q"] = %q, want ["foo", "bar"]`, qs) } if both := req.Form["both"]; !reflect.DeepEqual(both, []string{"y", "x"}) { t.Errorf(`req.Form["both"] = %q, want ["y", "x"]`, both) } if prio := req.FormValue("prio"); prio != "2" { t.Errorf(`req.FormValue("prio") = %q, want "2" (from body)`, prio) } if orphan := req.Form["orphan"]; !reflect.DeepEqual(orphan, []string{"", "nope"}) { t.Errorf(`req.FormValue("orphan") = %q, want "" (from body)`, orphan) } if empty := req.Form["empty"]; !reflect.DeepEqual(empty, []string{"", "not"}) { t.Errorf(`req.FormValue("empty") = %q, want "" (from body)`, empty) } if nokey := req.Form[""]; !reflect.DeepEqual(nokey, []string{"nokey"}) { t.Errorf(`req.FormValue("nokey") = %q, want "nokey" (from body)`, nokey) } } // Tests that we only parse the form automatically for certain methods. func TestParseFormQueryMethods(t *testing.T) { for _, method := range []string{"POST", "PATCH", "PUT", "FOO"} { req, _ := NewRequest(method, "http://www.google.com/search", strings.NewReader("foo=bar")) req.Header.Set("Content-Type", "application/x-www-form-urlencoded; param=value") want := "bar" if method == "FOO" { want = "" } if got := req.FormValue("foo"); got != want { t.Errorf(`for method %s, FormValue("foo") = %q; want %q`, method, got, want) } } } func TestParseFormUnknownContentType(t *testing.T) { for _, test := range []struct { name string wantErr string contentType Header }{ {"text", "", Header{"Content-Type": {"text/plain"}}}, // Empty content type is legal - may be treated as // application/octet-stream (RFC 7231, section 3.1.1.5) {"empty", "", Header{}}, {"boundary", "mime: invalid media parameter", Header{"Content-Type": {"text/plain; boundary="}}}, {"unknown", "", Header{"Content-Type": {"application/unknown"}}}, } { t.Run(test.name, func(t *testing.T) { req := &Request{ Method: "POST", Header: test.contentType, Body: io.NopCloser(strings.NewReader("body")), } err := req.ParseForm() switch { case err == nil && test.wantErr != "": t.Errorf("unexpected success; want error %q", test.wantErr) case err != nil && test.wantErr == "": t.Errorf("want success, got error: %v", err) case test.wantErr != "" && test.wantErr != fmt.Sprint(err): t.Errorf("got error %q; want %q", err, test.wantErr) } }, ) } } func TestParseFormInitializeOnError(t *testing.T) { nilBody, _ := NewRequest("POST", "http://www.google.com/search?q=foo", nil) tests := []*Request{ nilBody, {Method: "GET", URL: nil}, } for i, req := range tests { err := req.ParseForm() if req.Form == nil { t.Errorf("%d. Form not initialized, error %v", i, err) } if req.PostForm == nil { t.Errorf("%d. PostForm not initialized, error %v", i, err) } } } func TestMultipartReader(t *testing.T) { tests := []struct { shouldError bool contentType string }{ {false, `multipart/form-data; boundary="foo123"`}, {false, `multipart/mixed; boundary="foo123"`}, {true, `text/plain`}, } for i, test := range tests { req := &Request{ Method: "POST", Header: Header{"Content-Type": {test.contentType}}, Body: io.NopCloser(new(bytes.Buffer)), } multipart, err := req.MultipartReader() if test.shouldError { if err == nil || multipart != nil { t.Errorf("test %d: unexpectedly got nil-error (%v) or non-nil-multipart (%v)", i, err, multipart) } continue } if err != nil || multipart == nil { t.Errorf("test %d: unexpectedly got error (%v) or nil-multipart (%v)", i, err, multipart) } } } // Issue 9305: ParseMultipartForm should populate PostForm too func TestParseMultipartFormPopulatesPostForm(t *testing.T) { postData := `--xxx Content-Disposition: form-data; name="field1" value1 --xxx Content-Disposition: form-data; name="field2" value2 --xxx Content-Disposition: form-data; name="file"; filename="file" Content-Type: application/octet-stream Content-Transfer-Encoding: binary binary data --xxx-- ` req := &Request{ Method: "POST", Header: Header{"Content-Type": {`multipart/form-data; boundary=xxx`}}, Body: io.NopCloser(strings.NewReader(postData)), } initialFormItems := map[string]string{ "language": "Go", "name": "gopher", "skill": "go-ing", "field2": "initial-value2", } req.Form = make(url.Values) for k, v := range initialFormItems { req.Form.Add(k, v) } err := req.ParseMultipartForm(10000) if err != nil { t.Fatalf("unexpected multipart error %v", err) } wantForm := url.Values{ "language": []string{"Go"}, "name": []string{"gopher"}, "skill": []string{"go-ing"}, "field1": []string{"value1"}, "field2": []string{"initial-value2", "value2"}, } if !reflect.DeepEqual(req.Form, wantForm) { t.Fatalf("req.Form = %v, want %v", req.Form, wantForm) } wantPostForm := url.Values{ "field1": []string{"value1"}, "field2": []string{"value2"}, } if !reflect.DeepEqual(req.PostForm, wantPostForm) { t.Fatalf("req.PostForm = %v, want %v", req.PostForm, wantPostForm) } } func TestParseMultipartForm(t *testing.T) { req := &Request{ Method: "POST", Header: Header{"Content-Type": {`multipart/form-data; boundary="foo123"`}}, Body: io.NopCloser(new(bytes.Buffer)), } err := req.ParseMultipartForm(25) if err == nil { t.Error("expected multipart EOF, got nil") } req.Header = Header{"Content-Type": {"text/plain"}} err = req.ParseMultipartForm(25) if err != ErrNotMultipart { t.Error("expected ErrNotMultipart for text/plain") } } // Issue 45789: multipart form should not include directory path in filename func TestParseMultipartFormFilename(t *testing.T) { postData := `--xxx Content-Disposition: form-data; name="file"; filename="../usr/foobar.txt/" Content-Type: text/plain --xxx-- ` req := &Request{ Method: "POST", Header: Header{"Content-Type": {`multipart/form-data; boundary=xxx`}}, Body: io.NopCloser(strings.NewReader(postData)), } _, hdr, err := req.FormFile("file") if err != nil { t.Fatal(err) } if hdr.Filename != "foobar.txt" { t.Errorf("expected only the last element of the path, got %q", hdr.Filename) } } // Issue #40430: Test that if maxMemory for ParseMultipartForm when combined with // the payload size and the internal leeway buffer size of 10MiB overflows, that we // correctly return an error. func TestMaxInt64ForMultipartFormMaxMemoryOverflow(t *testing.T) { defer afterTest(t) payloadSize := 1 << 10 cst := httptest.NewServer(HandlerFunc(func(rw ResponseWriter, req *Request) { // The combination of: // MaxInt64 + payloadSize + (internal spare of 10MiB) // triggers the overflow. See issue https://golang.org/issue/40430/ if err := req.ParseMultipartForm(math.MaxInt64); err != nil { Error(rw, err.Error(), StatusBadRequest) return } })) defer cst.Close() fBuf := new(bytes.Buffer) mw := multipart.NewWriter(fBuf) mf, err := mw.CreateFormFile("file", "myfile.txt") if err != nil { t.Fatal(err) } if _, err := mf.Write(bytes.Repeat([]byte("abc"), payloadSize)); err != nil { t.Fatal(err) } if err := mw.Close(); err != nil { t.Fatal(err) } req, err := NewRequest("POST", cst.URL, fBuf) if err != nil { t.Fatal(err) } req.Header.Set("Content-Type", mw.FormDataContentType()) res, err := cst.Client().Do(req) if err != nil { t.Fatal(err) } res.Body.Close() if g, w := res.StatusCode, StatusOK; g != w { t.Fatalf("Status code mismatch: got %d, want %d", g, w) } } func TestRedirect_h1(t *testing.T) { testRedirect(t, h1Mode) } func TestRedirect_h2(t *testing.T) { testRedirect(t, h2Mode) } func testRedirect(t *testing.T, h2 bool) { defer afterTest(t) cst := newClientServerTest(t, h2, HandlerFunc(func(w ResponseWriter, r *Request) { switch r.URL.Path { case "/": w.Header().Set("Location", "/foo/") w.WriteHeader(StatusSeeOther) case "/foo/": fmt.Fprintf(w, "foo") default: w.WriteHeader(StatusBadRequest) } })) defer cst.close() var end = regexp.MustCompile("/foo/$") r, err := cst.c.Get(cst.ts.URL) if err != nil { t.Fatal(err) } r.Body.Close() url := r.Request.URL.String() if r.StatusCode != 200 || !end.MatchString(url) { t.Fatalf("Get got status %d at %q, want 200 matching /foo/$", r.StatusCode, url) } } func TestSetBasicAuth(t *testing.T) { r, _ := NewRequest("GET", "http://example.com/", nil) r.SetBasicAuth("Aladdin", "open sesame") if g, e := r.Header.Get("Authorization"), "Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ=="; g != e { t.Errorf("got header %q, want %q", g, e) } } func TestMultipartRequest(t *testing.T) { // Test that we can read the values and files of a // multipart request with FormValue and FormFile, // and that ParseMultipartForm can be called multiple times. req := newTestMultipartRequest(t) if err := req.ParseMultipartForm(25); err != nil { t.Fatal("ParseMultipartForm first call:", err) } defer req.MultipartForm.RemoveAll() validateTestMultipartContents(t, req, false) if err := req.ParseMultipartForm(25); err != nil { t.Fatal("ParseMultipartForm second call:", err) } validateTestMultipartContents(t, req, false) } // Issue #25192: Test that ParseMultipartForm fails but still parses the // multi-part form when an URL containing a semicolon is provided. func TestParseMultipartFormSemicolonSeparator(t *testing.T) { req := newTestMultipartRequest(t) req.URL = &url.URL{RawQuery: "q=foo;q=bar"} if err := req.ParseMultipartForm(25); err == nil { t.Fatal("ParseMultipartForm expected error due to invalid semicolon, got nil") } defer req.MultipartForm.RemoveAll() validateTestMultipartContents(t, req, false) } func TestMultipartRequestAuto(t *testing.T) { // Test that FormValue and FormFile automatically invoke // ParseMultipartForm and return the right values. req := newTestMultipartRequest(t) defer func() { if req.MultipartForm != nil { req.MultipartForm.RemoveAll() } }() validateTestMultipartContents(t, req, true) } func TestMissingFileMultipartRequest(t *testing.T) { // Test that FormFile returns an error if // the named file is missing. req := newTestMultipartRequest(t) testMissingFile(t, req) } // Test that FormValue invokes ParseMultipartForm. func TestFormValueCallsParseMultipartForm(t *testing.T) { req, _ := NewRequest("POST", "http://www.google.com/", strings.NewReader("z=post")) req.Header.Set("Content-Type", "application/x-www-form-urlencoded; param=value") if req.Form != nil { t.Fatal("Unexpected request Form, want nil") } req.FormValue("z") if req.Form == nil { t.Fatal("ParseMultipartForm not called by FormValue") } } // Test that FormFile invokes ParseMultipartForm. func TestFormFileCallsParseMultipartForm(t *testing.T) { req := newTestMultipartRequest(t) if req.Form != nil { t.Fatal("Unexpected request Form, want nil") } req.FormFile("") if req.Form == nil { t.Fatal("ParseMultipartForm not called by FormFile") } } // Test that ParseMultipartForm errors if called // after MultipartReader on the same request. func TestParseMultipartFormOrder(t *testing.T) { req := newTestMultipartRequest(t) if _, err := req.MultipartReader(); err != nil { t.Fatalf("MultipartReader: %v", err) } if err := req.ParseMultipartForm(1024); err == nil { t.Fatal("expected an error from ParseMultipartForm after call to MultipartReader") } } // Test that MultipartReader errors if called // after ParseMultipartForm on the same request. func TestMultipartReaderOrder(t *testing.T) { req := newTestMultipartRequest(t) if err := req.ParseMultipartForm(25); err != nil { t.Fatalf("ParseMultipartForm: %v", err) } defer req.MultipartForm.RemoveAll() if _, err := req.MultipartReader(); err == nil { t.Fatal("expected an error from MultipartReader after call to ParseMultipartForm") } } // Test that FormFile errors if called after // MultipartReader on the same request. func TestFormFileOrder(t *testing.T) { req := newTestMultipartRequest(t) if _, err := req.MultipartReader(); err != nil { t.Fatalf("MultipartReader: %v", err) } if _, _, err := req.FormFile(""); err == nil { t.Fatal("expected an error from FormFile after call to MultipartReader") } } var readRequestErrorTests = []struct { in string err string header Header }{ 0: {"GET / HTTP/1.1\r\nheader:foo\r\n\r\n", "", Header{"Header": {"foo"}}}, 1: {"GET / HTTP/1.1\r\nheader:foo\r\n", io.ErrUnexpectedEOF.Error(), nil}, 2: {"", io.EOF.Error(), nil}, 3: { in: "HEAD / HTTP/1.1\r\n\r\n", header: Header{}, }, // Multiple Content-Length values should either be // deduplicated if same or reject otherwise // See Issue 16490. 4: { in: "POST / HTTP/1.1\r\nContent-Length: 10\r\nContent-Length: 0\r\n\r\nGopher hey\r\n", err: "cannot contain multiple Content-Length headers", }, 5: { in: "POST / HTTP/1.1\r\nContent-Length: 10\r\nContent-Length: 6\r\n\r\nGopher\r\n", err: "cannot contain multiple Content-Length headers", }, 6: { in: "PUT / HTTP/1.1\r\nContent-Length: 6 \r\nContent-Length: 6\r\nContent-Length:6\r\n\r\nGopher\r\n", err: "", header: Header{"Content-Length": {"6"}}, }, 7: { in: "PUT / HTTP/1.1\r\nContent-Length: 1\r\nContent-Length: 6 \r\n\r\n", err: "cannot contain multiple Content-Length headers", }, 8: { in: "POST / HTTP/1.1\r\nContent-Length:\r\nContent-Length: 3\r\n\r\n", err: "cannot contain multiple Content-Length headers", }, 9: { in: "HEAD / HTTP/1.1\r\nContent-Length:0\r\nContent-Length: 0\r\n\r\n", header: Header{"Content-Length": {"0"}}, }, 10: { in: "HEAD / HTTP/1.1\r\nHost: foo\r\nHost: bar\r\n\r\n\r\n\r\n", err: "too many Host headers", }, } func TestReadRequestErrors(t *testing.T) { for i, tt := range readRequestErrorTests { req, err := ReadRequest(bufio.NewReader(strings.NewReader(tt.in))) if err == nil { if tt.err != "" { t.Errorf("#%d: got nil err; want %q", i, tt.err) } if !reflect.DeepEqual(tt.header, req.Header) { t.Errorf("#%d: gotHeader: %q wantHeader: %q", i, req.Header, tt.header) } continue } if tt.err == "" || !strings.Contains(err.Error(), tt.err) { t.Errorf("%d: got error = %v; want %v", i, err, tt.err) } } } var newRequestHostTests = []struct { in, out string }{ {"http://www.example.com/", "www.example.com"}, {"http://www.example.com:8080/", "www.example.com:8080"}, {"http://192.168.0.1/", "192.168.0.1"}, {"http://192.168.0.1:8080/", "192.168.0.1:8080"}, {"http://192.168.0.1:/", "192.168.0.1"}, {"http://[fe80::1]/", "[fe80::1]"}, {"http://[fe80::1]:8080/", "[fe80::1]:8080"}, {"http://[fe80::1%25en0]/", "[fe80::1%en0]"}, {"http://[fe80::1%25en0]:8080/", "[fe80::1%en0]:8080"}, {"http://[fe80::1%25en0]:/", "[fe80::1%en0]"}, } func TestNewRequestHost(t *testing.T) { for i, tt := range newRequestHostTests { req, err := NewRequest("GET", tt.in, nil) if err != nil { t.Errorf("#%v: %v", i, err) continue } if req.Host != tt.out { t.Errorf("got %q; want %q", req.Host, tt.out) } } } func TestRequestInvalidMethod(t *testing.T) { _, err := NewRequest("bad method", "http://foo.com/", nil) if err == nil { t.Error("expected error from NewRequest with invalid method") } req, err := NewRequest("GET", "http://foo.example/", nil) if err != nil { t.Fatal(err) } req.Method = "bad method" _, err = DefaultClient.Do(req) if err == nil || !strings.Contains(err.Error(), "invalid method") { t.Errorf("Transport error = %v; want invalid method", err) } req, err = NewRequest("", "http://foo.com/", nil) if err != nil { t.Errorf("NewRequest(empty method) = %v; want nil", err) } else if req.Method != "GET" { t.Errorf("NewRequest(empty method) has method %q; want GET", req.Method) } } func TestNewRequestContentLength(t *testing.T) { readByte := func(r io.Reader) io.Reader { var b [1]byte r.Read(b[:]) return r } tests := []struct { r io.Reader want int64 }{ {bytes.NewReader([]byte("123")), 3}, {bytes.NewBuffer([]byte("1234")), 4}, {strings.NewReader("12345"), 5}, {strings.NewReader(""), 0}, {NoBody, 0}, // Not detected. During Go 1.8 we tried to make these set to -1, but // due to Issue 18117, we keep these returning 0, even though they're // unknown. {struct{ io.Reader }{strings.NewReader("xyz")}, 0}, {io.NewSectionReader(strings.NewReader("x"), 0, 6), 0}, {readByte(io.NewSectionReader(strings.NewReader("xy"), 0, 6)), 0}, } for i, tt := range tests { req, err := NewRequest("POST", "http://localhost/", tt.r) if err != nil { t.Fatal(err) } if req.ContentLength != tt.want { t.Errorf("test[%d]: ContentLength(%T) = %d; want %d", i, tt.r, req.ContentLength, tt.want) } } } var parseHTTPVersionTests = []struct { vers string major, minor int ok bool }{ {"HTTP/0.0", 0, 0, true}, {"HTTP/0.9", 0, 9, true}, {"HTTP/1.0", 1, 0, true}, {"HTTP/1.1", 1, 1, true}, {"HTTP", 0, 0, false}, {"HTTP/one.one", 0, 0, false}, {"HTTP/1.1/", 0, 0, false}, {"HTTP/-1,0", 0, 0, false}, {"HTTP/0,-1", 0, 0, false}, {"HTTP/", 0, 0, false}, {"HTTP/1,1", 0, 0, false}, {"HTTP/+1.1", 0, 0, false}, {"HTTP/1.+1", 0, 0, false}, {"HTTP/0000000001.1", 0, 0, false}, {"HTTP/1.0000000001", 0, 0, false}, {"HTTP/3.14", 0, 0, false}, {"HTTP/12.3", 0, 0, false}, } func TestParseHTTPVersion(t *testing.T) { for _, tt := range parseHTTPVersionTests { major, minor, ok := ParseHTTPVersion(tt.vers) if ok != tt.ok || major != tt.major || minor != tt.minor { type version struct { major, minor int ok bool } t.Errorf("failed to parse %q, expected: %#v, got %#v", tt.vers, version{tt.major, tt.minor, tt.ok}, version{major, minor, ok}) } } } type getBasicAuthTest struct { username, password string ok bool } type basicAuthCredentialsTest struct { username, password string } var getBasicAuthTests = []struct { username, password string ok bool }{ {"Aladdin", "open sesame", true}, {"Aladdin", "open:sesame", true}, {"", "", true}, } func TestGetBasicAuth(t *testing.T) { for _, tt := range getBasicAuthTests { r, _ := NewRequest("GET", "http://example.com/", nil) r.SetBasicAuth(tt.username, tt.password) username, password, ok := r.BasicAuth() if ok != tt.ok || username != tt.username || password != tt.password { t.Errorf("BasicAuth() = %#v, want %#v", getBasicAuthTest{username, password, ok}, getBasicAuthTest{tt.username, tt.password, tt.ok}) } } // Unauthenticated request. r, _ := NewRequest("GET", "http://example.com/", nil) username, password, ok := r.BasicAuth() if ok { t.Errorf("expected false from BasicAuth when the request is unauthenticated") } want := basicAuthCredentialsTest{"", ""} if username != want.username || password != want.password { t.Errorf("expected credentials: %#v when the request is unauthenticated, got %#v", want, basicAuthCredentialsTest{username, password}) } } var parseBasicAuthTests = []struct { header, username, password string ok bool }{ {"Basic " + base64.StdEncoding.EncodeToString([]byte("Aladdin:open sesame")), "Aladdin", "open sesame", true}, // Case doesn't matter: {"BASIC " + base64.StdEncoding.EncodeToString([]byte("Aladdin:open sesame")), "Aladdin", "open sesame", true}, {"basic " + base64.StdEncoding.EncodeToString([]byte("Aladdin:open sesame")), "Aladdin", "open sesame", true}, {"Basic " + base64.StdEncoding.EncodeToString([]byte("Aladdin:open:sesame")), "Aladdin", "open:sesame", true}, {"Basic " + base64.StdEncoding.EncodeToString([]byte(":")), "", "", true}, {"Basic" + base64.StdEncoding.EncodeToString([]byte("Aladdin:open sesame")), "", "", false}, {base64.StdEncoding.EncodeToString([]byte("Aladdin:open sesame")), "", "", false}, {"Basic ", "", "", false}, {"Basic Aladdin:open sesame", "", "", false}, {`Digest username="Aladdin"`, "", "", false}, } func TestParseBasicAuth(t *testing.T) { for _, tt := range parseBasicAuthTests { r, _ := NewRequest("GET", "http://example.com/", nil) r.Header.Set("Authorization", tt.header) username, password, ok := r.BasicAuth() if ok != tt.ok || username != tt.username || password != tt.password { t.Errorf("BasicAuth() = %#v, want %#v", getBasicAuthTest{username, password, ok}, getBasicAuthTest{tt.username, tt.password, tt.ok}) } } } type logWrites struct { t *testing.T dst *[]string } func (l logWrites) WriteByte(c byte) error { l.t.Fatalf("unexpected WriteByte call") return nil } func (l logWrites) Write(p []byte) (n int, err error) { *l.dst = append(*l.dst, string(p)) return len(p), nil } func TestRequestWriteBufferedWriter(t *testing.T) { got := []string{} req, _ := NewRequest("GET", "http://foo.com/", nil) req.Write(logWrites{t, &got}) want := []string{ "GET / HTTP/1.1\r\n", "Host: foo.com\r\n", "User-Agent: " + DefaultUserAgent + "\r\n", "\r\n", } if !reflect.DeepEqual(got, want) { t.Errorf("Writes = %q\n Want = %q", got, want) } } func TestRequestBadHost(t *testing.T) { got := []string{} req, err := NewRequest("GET", "http://foo/after", nil) if err != nil { t.Fatal(err) } req.Host = "foo.com with spaces" req.URL.Host = "foo.com with spaces" req.Write(logWrites{t, &got}) want := []string{ "GET /after HTTP/1.1\r\n", "Host: foo.com\r\n", "User-Agent: " + DefaultUserAgent + "\r\n", "\r\n", } if !reflect.DeepEqual(got, want) { t.Errorf("Writes = %q\n Want = %q", got, want) } } func TestStarRequest(t *testing.T) { req, err := ReadRequest(bufio.NewReader(strings.NewReader("M-SEARCH * HTTP/1.1\r\n\r\n"))) if err != nil { return } if req.ContentLength != 0 { t.Errorf("ContentLength = %d; want 0", req.ContentLength) } if req.Body == nil { t.Errorf("Body = nil; want non-nil") } // Request.Write has Client semantics for Body/ContentLength, // where ContentLength 0 means unknown if Body is non-nil, and // thus chunking will happen unless we change semantics and // signal that we want to serialize it as exactly zero. The // only way to do that for outbound requests is with a nil // Body: clientReq := *req clientReq.Body = nil var out bytes.Buffer if err := clientReq.Write(&out); err != nil { t.Fatal(err) } if strings.Contains(out.String(), "chunked") { t.Error("wrote chunked request; want no body") } back, err := ReadRequest(bufio.NewReader(bytes.NewReader(out.Bytes()))) if err != nil { t.Fatal(err) } // Ignore the Headers (the User-Agent breaks the deep equal, // but we don't care about it) req.Header = nil back.Header = nil if !reflect.DeepEqual(req, back) { t.Errorf("Original request doesn't match Request read back.") t.Logf("Original: %#v", req) t.Logf("Original.URL: %#v", req.URL) t.Logf("Wrote: %s", out.Bytes()) t.Logf("Read back (doesn't match Original): %#v", back) } } type responseWriterJustWriter struct { io.Writer } func (responseWriterJustWriter) Header() Header { panic("should not be called") } func (responseWriterJustWriter) WriteHeader(int) { panic("should not be called") } // delayedEOFReader never returns (n > 0, io.EOF), instead putting // off the io.EOF until a subsequent Read call. type delayedEOFReader struct { r io.Reader } func (dr delayedEOFReader) Read(p []byte) (n int, err error) { n, err = dr.r.Read(p) if n > 0 && err == io.EOF { err = nil } return } func TestIssue10884_MaxBytesEOF(t *testing.T) { dst := io.Discard _, err := io.Copy(dst, MaxBytesReader( responseWriterJustWriter{dst}, io.NopCloser(delayedEOFReader{strings.NewReader("12345")}), 5)) if err != nil { t.Fatal(err) } } // Issue 14981: MaxBytesReader's return error wasn't sticky. It // doesn't technically need to be, but people expected it to be. func TestMaxBytesReaderStickyError(t *testing.T) { isSticky := func(r io.Reader) error { var log bytes.Buffer buf := make([]byte, 1000) var firstErr error for { n, err := r.Read(buf) fmt.Fprintf(&log, "Read(%d) = %d, %v\n", len(buf), n, err) if err == nil { continue } if firstErr == nil { firstErr = err continue } if !reflect.DeepEqual(err, firstErr) { return fmt.Errorf("non-sticky error. got log:\n%s", log.Bytes()) } t.Logf("Got log: %s", log.Bytes()) return nil } } tests := [...]struct { readable int limit int64 }{ 0: {99, 100}, 1: {100, 100}, 2: {101, 100}, } for i, tt := range tests { rc := MaxBytesReader(nil, io.NopCloser(bytes.NewReader(make([]byte, tt.readable))), tt.limit) if err := isSticky(rc); err != nil { t.Errorf("%d. error: %v", i, err) } } } // Issue 45101: maxBytesReader's Read panicked when n < -1. This test // also ensures that Read treats negative limits as equivalent to 0. func TestMaxBytesReaderDifferentLimits(t *testing.T) { const testStr = "1234" tests := [...]struct { limit int64 lenP int wantN int wantErr bool }{ 0: { limit: -123, lenP: 0, wantN: 0, wantErr: false, // Ensure we won't return an error when the limit is negative, but we don't need to read. }, 1: { limit: -100, lenP: 32 * 1024, wantN: 0, wantErr: true, }, 2: { limit: -2, lenP: 1, wantN: 0, wantErr: true, }, 3: { limit: -1, lenP: 2, wantN: 0, wantErr: true, }, 4: { limit: 0, lenP: 3, wantN: 0, wantErr: true, }, 5: { limit: 1, lenP: 4, wantN: 1, wantErr: true, }, 6: { limit: 2, lenP: 5, wantN: 2, wantErr: true, }, 7: { limit: 3, lenP: 2, wantN: 2, wantErr: false, }, 8: { limit: int64(len(testStr)), lenP: len(testStr), wantN: len(testStr), wantErr: false, }, 9: { limit: 100, lenP: 6, wantN: len(testStr), wantErr: false, }, } for i, tt := range tests { rc := MaxBytesReader(nil, io.NopCloser(strings.NewReader(testStr)), tt.limit) n, err := rc.Read(make([]byte, tt.lenP)) if n != tt.wantN { t.Errorf("%d. n: %d, want n: %d", i, n, tt.wantN) } if (err != nil) != tt.wantErr { t.Errorf("%d. error: %v", i, err) } } } func TestWithContextNilURL(t *testing.T) { req, err := NewRequest("POST", "https://golang.org/", nil) if err != nil { t.Fatal(err) } // Issue 20601 req.URL = nil reqCopy := req.WithContext(context.Background()) if reqCopy.URL != nil { t.Error("expected nil URL in cloned request") } } // Ensure that Request.Clone creates a deep copy of TransferEncoding. // See issue 41907. func TestRequestCloneTransferEncoding(t *testing.T) { body := strings.NewReader("body") req, _ := NewRequest("POST", "https://example.org/", body) req.TransferEncoding = []string{ "encoding1", } clonedReq := req.Clone(context.Background()) // modify original after deep copy req.TransferEncoding[0] = "encoding2" if req.TransferEncoding[0] != "encoding2" { t.Error("expected req.TransferEncoding to be changed") } if clonedReq.TransferEncoding[0] != "encoding1" { t.Error("expected clonedReq.TransferEncoding to be unchanged") } } func TestNoPanicOnRoundTripWithBasicAuth_h1(t *testing.T) { testNoPanicWithBasicAuth(t, h1Mode) } func TestNoPanicOnRoundTripWithBasicAuth_h2(t *testing.T) { testNoPanicWithBasicAuth(t, h2Mode) } // Issue 34878: verify we don't panic when including basic auth (Go 1.13 regression) func testNoPanicWithBasicAuth(t *testing.T, h2 bool) { defer afterTest(t) cst := newClientServerTest(t, h2, HandlerFunc(func(w ResponseWriter, r *Request) {})) defer cst.close() u, err := url.Parse(cst.ts.URL) if err != nil { t.Fatal(err) } u.User = url.UserPassword("foo", "bar") req := &Request{ URL: u, Method: "GET", } if _, err := cst.c.Do(req); err != nil { t.Fatalf("Unexpected error: %v", err) } } // verify that NewRequest sets Request.GetBody and that it works func TestNewRequestGetBody(t *testing.T) { tests := []struct { r io.Reader }{ {r: strings.NewReader("hello")}, {r: bytes.NewReader([]byte("hello"))}, {r: bytes.NewBuffer([]byte("hello"))}, } for i, tt := range tests { req, err := NewRequest("POST", "http://foo.tld/", tt.r) if err != nil { t.Errorf("test[%d]: %v", i, err) continue } if req.Body == nil { t.Errorf("test[%d]: Body = nil", i) continue } if req.GetBody == nil { t.Errorf("test[%d]: GetBody = nil", i) continue } slurp1, err := io.ReadAll(req.Body) if err != nil { t.Errorf("test[%d]: ReadAll(Body) = %v", i, err) } newBody, err := req.GetBody() if err != nil { t.Errorf("test[%d]: GetBody = %v", i, err) } slurp2, err := io.ReadAll(newBody) if err != nil { t.Errorf("test[%d]: ReadAll(GetBody()) = %v", i, err) } if string(slurp1) != string(slurp2) { t.Errorf("test[%d]: Body %q != GetBody %q", i, slurp1, slurp2) } } } func testMissingFile(t *testing.T, req *Request) { f, fh, err := req.FormFile("missing") if f != nil { t.Errorf("FormFile file = %v, want nil", f) } if fh != nil { t.Errorf("FormFile file header = %v, want nil", fh) } if err != ErrMissingFile { t.Errorf("FormFile err = %q, want ErrMissingFile", err) } } func newTestMultipartRequest(t *testing.T) *Request { b := strings.NewReader(strings.ReplaceAll(message, "\n", "\r\n")) req, err := NewRequest("POST", "/", b) if err != nil { t.Fatal("NewRequest:", err) } ctype := fmt.Sprintf(`multipart/form-data; boundary="%s"`, boundary) req.Header.Set("Content-type", ctype) return req } func validateTestMultipartContents(t *testing.T, req *Request, allMem bool) { if g, e := req.FormValue("texta"), textaValue; g != e { t.Errorf("texta value = %q, want %q", g, e) } if g, e := req.FormValue("textb"), textbValue; g != e { t.Errorf("textb value = %q, want %q", g, e) } if g := req.FormValue("missing"); g != "" { t.Errorf("missing value = %q, want empty string", g) } assertMem := func(n string, fd multipart.File) { if _, ok := fd.(*os.File); ok { t.Error(n, " is *os.File, should not be") } } fda := testMultipartFile(t, req, "filea", "filea.txt", fileaContents) defer fda.Close() assertMem("filea", fda) fdb := testMultipartFile(t, req, "fileb", "fileb.txt", filebContents) defer fdb.Close() if allMem { assertMem("fileb", fdb) } else { if _, ok := fdb.(*os.File); !ok { t.Errorf("fileb has unexpected underlying type %T", fdb) } } testMissingFile(t, req) } func testMultipartFile(t *testing.T, req *Request, key, expectFilename, expectContent string) multipart.File { f, fh, err := req.FormFile(key) if err != nil { t.Fatalf("FormFile(%q): %q", key, err) } if fh.Filename != expectFilename { t.Errorf("filename = %q, want %q", fh.Filename, expectFilename) } var b bytes.Buffer _, err = io.Copy(&b, f) if err != nil { t.Fatal("copying contents:", err) } if g := b.String(); g != expectContent { t.Errorf("contents = %q, want %q", g, expectContent) } return f } const ( fileaContents = "This is a test file." filebContents = "Another test file." textaValue = "foo" textbValue = "bar" boundary = `MyBoundary` ) const message = ` --MyBoundary Content-Disposition: form-data; name="filea"; filename="filea.txt" Content-Type: text/plain ` + fileaContents + ` --MyBoundary Content-Disposition: form-data; name="fileb"; filename="fileb.txt" Content-Type: text/plain ` + filebContents + ` --MyBoundary Content-Disposition: form-data; name="texta" ` + textaValue + ` --MyBoundary Content-Disposition: form-data; name="textb" ` + textbValue + ` --MyBoundary-- ` func benchmarkReadRequest(b *testing.B, request string) { request = request + "\n" // final \n request = strings.ReplaceAll(request, "\n", "\r\n") // expand \n to \r\n b.SetBytes(int64(len(request))) r := bufio.NewReader(&infiniteReader{buf: []byte(request)}) b.ReportAllocs() b.ResetTimer() for i := 0; i < b.N; i++ { _, err := ReadRequest(r) if err != nil { b.Fatalf("failed to read request: %v", err) } } } // infiniteReader satisfies Read requests as if the contents of buf // loop indefinitely. type infiniteReader struct { buf []byte offset int } func (r *infiniteReader) Read(b []byte) (int, error) { n := copy(b, r.buf[r.offset:]) r.offset = (r.offset + n) % len(r.buf) return n, nil } func BenchmarkReadRequestChrome(b *testing.B) { // https://github.com/felixge/node-http-perf/blob/master/fixtures/get.http benchmarkReadRequest(b, `GET / HTTP/1.1 Host: localhost:8080 Connection: keep-alive Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_2) AppleWebKit/537.17 (KHTML, like Gecko) Chrome/24.0.1312.52 Safari/537.17 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=1.1978842379.1323102373.1323102373.1323102373.1; EPi:NumberOfVisits=1,2012-02-28T13:42:18; CrmSession=5b707226b9563e1bc69084d07a107c98; plushContainerWidth=100%25; plushNoTopMenu=0; hudson_auto_refresh=false `) } func BenchmarkReadRequestCurl(b *testing.B) { // curl http://localhost:8080/ benchmarkReadRequest(b, `GET / HTTP/1.1 User-Agent: curl/7.27.0 Host: localhost:8080 Accept: */* `) } func BenchmarkReadRequestApachebench(b *testing.B) { // ab -n 1 -c 1 http://localhost:8080/ benchmarkReadRequest(b, `GET / HTTP/1.0 Host: localhost:8080 User-Agent: ApacheBench/2.3 Accept: */* `) } func BenchmarkReadRequestSiege(b *testing.B) { // siege -r 1 -c 1 http://localhost:8080/ benchmarkReadRequest(b, `GET / HTTP/1.1 Host: localhost:8080 Accept: */* Accept-Encoding: gzip User-Agent: JoeDog/1.00 [en] (X11; I; Siege 2.70) Connection: keep-alive `) } func BenchmarkReadRequestWrk(b *testing.B) { // wrk -t 1 -r 1 -c 1 http://localhost:8080/ benchmarkReadRequest(b, `GET / HTTP/1.1 Host: localhost:8080 `) } const ( withTLS = true noTLS = false ) func BenchmarkFileAndServer_1KB(b *testing.B) { benchmarkFileAndServer(b, 1<<10) } func BenchmarkFileAndServer_16MB(b *testing.B) { benchmarkFileAndServer(b, 1<<24) } func BenchmarkFileAndServer_64MB(b *testing.B) { benchmarkFileAndServer(b, 1<<26) } func benchmarkFileAndServer(b *testing.B, n int64) { f, err := os.CreateTemp(os.TempDir(), "go-bench-http-file-and-server") if err != nil { b.Fatalf("Failed to create temp file: %v", err) } defer func() { f.Close() os.RemoveAll(f.Name()) }() if _, err := io.CopyN(f, rand.Reader, n); err != nil { b.Fatalf("Failed to copy %d bytes: %v", n, err) } b.Run("NoTLS", func(b *testing.B) { runFileAndServerBenchmarks(b, noTLS, f, n) }) b.Run("TLS", func(b *testing.B) { runFileAndServerBenchmarks(b, withTLS, f, n) }) } func runFileAndServerBenchmarks(b *testing.B, tlsOption bool, f *os.File, n int64) { handler := HandlerFunc(func(rw ResponseWriter, req *Request) { defer req.Body.Close() nc, err := io.Copy(io.Discard, req.Body) if err != nil { panic(err) } if nc != n { panic(fmt.Errorf("Copied %d Wanted %d bytes", nc, n)) } }) var cst *httptest.Server if tlsOption == withTLS { cst = httptest.NewTLSServer(handler) } else { cst = httptest.NewServer(handler) } defer cst.Close() b.ResetTimer() for i := 0; i < b.N; i++ { // Perform some setup. b.StopTimer() if _, err := f.Seek(0, 0); err != nil { b.Fatalf("Failed to seek back to file: %v", err) } b.StartTimer() req, err := NewRequest("PUT", cst.URL, io.NopCloser(f)) if err != nil { b.Fatal(err) } req.ContentLength = n // Prevent mime sniffing by setting the Content-Type. req.Header.Set("Content-Type", "application/octet-stream") res, err := cst.Client().Do(req) if err != nil { b.Fatalf("Failed to make request to backend: %v", err) } res.Body.Close() b.SetBytes(n) } }