diff options
| author | Aldrik Ramaekers <aldrikboy@gmail.com> | 2025-09-27 18:38:35 +0200 |
|---|---|---|
| committer | Aldrik Ramaekers <aldrikboy@gmail.com> | 2025-09-27 18:38:35 +0200 |
| commit | d8c4d84dc75300c6d4d8b0adceafa33741960b92 (patch) | |
| tree | 00e2dfcc5c836d62fccff76c862e6ec3b0a74db8 /libs/cpp-httplib/test/test.cc | |
| parent | fa088bb60692ba02d30d39affa9a31d9e2b688e2 (diff) | |
added http lib, working on AI invoice importing
Diffstat (limited to 'libs/cpp-httplib/test/test.cc')
| -rw-r--r-- | libs/cpp-httplib/test/test.cc | 10830 |
1 files changed, 10830 insertions, 0 deletions
diff --git a/libs/cpp-httplib/test/test.cc b/libs/cpp-httplib/test/test.cc new file mode 100644 index 0000000..a9ac0d1 --- /dev/null +++ b/libs/cpp-httplib/test/test.cc @@ -0,0 +1,10830 @@ +// NOTE: This file should be saved as UTF-8 w/ BOM +#include <httplib.h> +#include <signal.h> + +#ifndef _WIN32 +#include <arpa/inet.h> +#include <curl/curl.h> +#include <netinet/in.h> +#include <sys/socket.h> +#include <unistd.h> +#endif +#include <gtest/gtest.h> + +#include <atomic> +#include <chrono> +#include <fstream> +#include <future> +#include <limits> +#include <memory> +#include <sstream> +#include <stdexcept> +#include <thread> +#include <type_traits> +#include <vector> + +#define SERVER_CERT_FILE "./cert.pem" +#define SERVER_CERT2_FILE "./cert2.pem" +#define SERVER_PRIVATE_KEY_FILE "./key.pem" +#define CA_CERT_FILE "./ca-bundle.crt" +#define CLIENT_CA_CERT_FILE "./rootCA.cert.pem" +#define CLIENT_CA_CERT_DIR "." +#define CLIENT_CERT_FILE "./client.cert.pem" +#define CLIENT_PRIVATE_KEY_FILE "./client.key.pem" +#define CLIENT_ENCRYPTED_CERT_FILE "./client_encrypted.cert.pem" +#define CLIENT_ENCRYPTED_PRIVATE_KEY_FILE "./client_encrypted.key.pem" +#define CLIENT_ENCRYPTED_PRIVATE_KEY_PASS "test012!" +#define SERVER_ENCRYPTED_CERT_FILE "./cert_encrypted.pem" +#define SERVER_ENCRYPTED_PRIVATE_KEY_FILE "./key_encrypted.pem" +#define SERVER_ENCRYPTED_PRIVATE_KEY_PASS "test123!" + +using namespace std; +using namespace httplib; + +const char *HOST = "localhost"; +const int PORT = 1234; + +const string LONG_QUERY_VALUE = string(25000, '@'); +const string LONG_QUERY_URL = "/long-query-value?key=" + LONG_QUERY_VALUE; + +const string TOO_LONG_QUERY_VALUE = string(35000, '@'); +const string TOO_LONG_QUERY_URL = + "/too-long-query-value?key=" + TOO_LONG_QUERY_VALUE; + +const std::string JSON_DATA = "{\"hello\":\"world\"}"; + +const string LARGE_DATA = string(1024 * 1024 * 100, '@'); // 100MB + +FormData &get_file_value(std::vector<FormData> &items, const char *key) { + auto it = std::find_if(items.begin(), items.end(), [&](const FormData &file) { + return file.name == key; + }); +#ifdef CPPHTTPLIB_NO_EXCEPTIONS + return *it; +#else + if (it != items.end()) { return *it; } + throw std::runtime_error("invalid multipart form data name error"); +#endif +} + +static void read_file(const std::string &path, std::string &out) { + std::ifstream fs(path, std::ios_base::binary); + if (!fs) throw std::runtime_error("File not found: " + path); + fs.seekg(0, std::ios_base::end); + auto size = fs.tellg(); + fs.seekg(0); + out.resize(static_cast<size_t>(size)); + fs.read(&out[0], static_cast<std::streamsize>(size)); +} + +class UnixSocketTest : public ::testing::Test { +protected: + void TearDown() override { std::remove(pathname_.c_str()); } + + void client_GET(const std::string &addr) { + httplib::Client cli{addr}; + cli.set_address_family(AF_UNIX); + ASSERT_TRUE(cli.is_valid()); + + const auto &result = cli.Get(pattern_); + ASSERT_TRUE(result) << "error: " << result.error(); + + const auto &resp = result.value(); + EXPECT_EQ(resp.status, StatusCode::OK_200); + EXPECT_EQ(resp.body, content_); + } + + const std::string pathname_{"./httplib-server.sock"}; + const std::string pattern_{"/hi"}; + const std::string content_{"Hello World!"}; +}; + +TEST_F(UnixSocketTest, pathname) { + httplib::Server svr; + svr.Get(pattern_, [&](const httplib::Request &, httplib::Response &res) { + res.set_content(content_, "text/plain"); + }); + + std::thread t{[&] { + ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); + }}; + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + ASSERT_TRUE(svr.is_running()); + + client_GET(pathname_); +} + +#if defined(__linux__) || \ + /* __APPLE__ */ (defined(SOL_LOCAL) && defined(SO_PEERPID)) +TEST_F(UnixSocketTest, PeerPid) { + httplib::Server svr; + std::string remote_port_val; + svr.Get(pattern_, [&](const httplib::Request &req, httplib::Response &res) { + res.set_content(content_, "text/plain"); + remote_port_val = req.get_header_value("REMOTE_PORT"); + }); + + std::thread t{[&] { + ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); + }}; + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + ASSERT_TRUE(svr.is_running()); + + client_GET(pathname_); + EXPECT_EQ(std::to_string(getpid()), remote_port_val); +} +#endif + +#ifdef __linux__ +TEST_F(UnixSocketTest, abstract) { + constexpr char svr_path[]{"\x00httplib-server.sock"}; + const std::string abstract_addr{svr_path, sizeof(svr_path) - 1}; + + httplib::Server svr; + svr.Get(pattern_, [&](const httplib::Request &, httplib::Response &res) { + res.set_content(content_, "text/plain"); + }); + + std::thread t{[&] { + ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(abstract_addr, 80)); + }}; + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + ASSERT_TRUE(svr.is_running()); + + client_GET(abstract_addr); +} +#endif + +TEST_F(UnixSocketTest, HostHeaderAutoSet) { + httplib::Server svr; + std::string received_host_header; + + svr.Get(pattern_, [&](const httplib::Request &req, httplib::Response &res) { + // Capture the Host header sent by the client + auto host_iter = req.headers.find("Host"); + if (host_iter != req.headers.end()) { + received_host_header = host_iter->second; + } + res.set_content(content_, "text/plain"); + }); + + std::thread t{[&] { + ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80)); + }}; + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + ASSERT_TRUE(svr.is_running()); + + // Test that Host header is automatically set to "localhost" for Unix socket + // connections + httplib::Client cli{pathname_}; + cli.set_address_family(AF_UNIX); + ASSERT_TRUE(cli.is_valid()); + + const auto &result = cli.Get(pattern_); + ASSERT_TRUE(result) << "error: " << result.error(); + + const auto &resp = result.value(); + EXPECT_EQ(resp.status, StatusCode::OK_200); + EXPECT_EQ(resp.body, content_); + + // Verify that Host header was automatically set to "localhost" + EXPECT_EQ(received_host_header, "localhost"); +} + +#ifndef _WIN32 +TEST(SocketStream, wait_writable_UNIX) { + int fds[2]; + ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_STREAM, 0, fds)); + + const auto asSocketStream = [&](socket_t fd, + std::function<bool(Stream &)> func) { + return detail::process_client_socket( + fd, 0, 0, 0, 0, 0, std::chrono::steady_clock::time_point::min(), func); + }; + asSocketStream(fds[0], [&](Stream &s0) { + EXPECT_EQ(s0.socket(), fds[0]); + EXPECT_TRUE(s0.wait_writable()); + + EXPECT_EQ(0, close(fds[1])); + EXPECT_FALSE(s0.wait_writable()); + + return true; + }); + EXPECT_EQ(0, close(fds[0])); +} + +TEST(SocketStream, wait_writable_INET) { + sockaddr_in addr; + memset(&addr, 0, sizeof(addr)); + addr.sin_family = AF_INET; + addr.sin_port = htons(PORT + 1); + addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); + + int disconnected_svr_sock = -1; + std::thread svr{[&] { + const int s = socket(AF_INET, SOCK_STREAM, 0); + ASSERT_LE(0, s); + ASSERT_EQ(0, ::bind(s, reinterpret_cast<sockaddr *>(&addr), sizeof(addr))); + ASSERT_EQ(0, listen(s, 1)); + ASSERT_LE(0, disconnected_svr_sock = accept(s, nullptr, nullptr)); + ASSERT_EQ(0, close(s)); + }}; + std::this_thread::sleep_for(std::chrono::milliseconds(100)); + + std::thread cli{[&] { + const int s = socket(AF_INET, SOCK_STREAM, 0); + ASSERT_LE(0, s); + ASSERT_EQ(0, connect(s, reinterpret_cast<sockaddr *>(&addr), sizeof(addr))); + ASSERT_EQ(0, close(s)); + }}; + cli.join(); + svr.join(); + ASSERT_NE(disconnected_svr_sock, -1); + + const auto asSocketStream = [&](socket_t fd, + std::function<bool(Stream &)> func) { + return detail::process_client_socket( + fd, 0, 0, 0, 0, 0, std::chrono::steady_clock::time_point::min(), func); + }; + asSocketStream(disconnected_svr_sock, [&](Stream &ss) { + EXPECT_EQ(ss.socket(), disconnected_svr_sock); + EXPECT_FALSE(ss.wait_writable()); + + return true; + }); + + ASSERT_EQ(0, close(disconnected_svr_sock)); +} +#endif // #ifndef _WIN32 + +TEST(ClientTest, MoveConstructible) { + EXPECT_FALSE(std::is_copy_constructible<Client>::value); + EXPECT_TRUE(std::is_nothrow_move_constructible<Client>::value); +} + +TEST(ClientTest, MoveAssignable) { + EXPECT_FALSE(std::is_copy_assignable<Client>::value); + EXPECT_TRUE(std::is_nothrow_move_assignable<Client>::value); +} + +#ifdef _WIN32 +TEST(StartupTest, WSAStartup) { + WSADATA wsaData; + int ret = WSAStartup(0x0002, &wsaData); + ASSERT_EQ(0, ret); +} +#endif + +TEST(DecodePathTest, PercentCharacter) { + EXPECT_EQ( + decode_path_component( + R"(descrip=Gastos%20%C3%A1%C3%A9%C3%AD%C3%B3%C3%BA%C3%B1%C3%91%206)"), + u8"descrip=Gastos áéíóúñÑ 6"); +} + +TEST(DecodePathTest, PercentCharacterNUL) { + string expected; + expected.push_back('x'); + expected.push_back('\0'); + expected.push_back('x'); + + EXPECT_EQ(decode_path_component("x%00x"), expected); +} + +TEST(EncodeQueryParamTest, ParseUnescapedChararactersTest) { + string unescapedCharacters = "-_.!~*'()"; + + EXPECT_EQ(httplib::encode_uri_component(unescapedCharacters), "-_.!~*'()"); +} + +TEST(EncodeQueryParamTest, ParseReservedCharactersTest) { + string reservedCharacters = ";,/?:@&=+$"; + + EXPECT_EQ(httplib::encode_uri_component(reservedCharacters), + "%3B%2C%2F%3F%3A%40%26%3D%2B%24"); +} + +TEST(EncodeQueryParamTest, TestUTF8Characters) { + string chineseCharacters = u8"中国語"; + string russianCharacters = u8"дом"; + string brazilianCharacters = u8"óculos"; + + EXPECT_EQ(httplib::encode_uri_component(chineseCharacters), + "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); + + EXPECT_EQ(httplib::encode_uri_component(russianCharacters), + "%D0%B4%D0%BE%D0%BC"); + + EXPECT_EQ(httplib::encode_uri_component(brazilianCharacters), "%C3%B3culos"); +} + +TEST(EncodeUriComponentTest, ParseUnescapedChararactersTest) { + string unescapedCharacters = "-_.!~*'()"; + + EXPECT_EQ(httplib::encode_uri_component(unescapedCharacters), "-_.!~*'()"); +} + +TEST(EncodeUriComponentTest, ParseReservedCharactersTest) { + string reservedCharacters = ";,/?:@&=+$"; + + EXPECT_EQ(httplib::encode_uri_component(reservedCharacters), + "%3B%2C%2F%3F%3A%40%26%3D%2B%24"); +} + +TEST(EncodeUriComponentTest, TestUTF8Characters) { + string chineseCharacters = u8"中国語"; + string russianCharacters = u8"дом"; + string brazilianCharacters = u8"óculos"; + + EXPECT_EQ(httplib::encode_uri_component(chineseCharacters), + "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); + + EXPECT_EQ(httplib::encode_uri_component(russianCharacters), + "%D0%B4%D0%BE%D0%BC"); + + EXPECT_EQ(httplib::encode_uri_component(brazilianCharacters), "%C3%B3culos"); +} + +TEST(EncodeUriComponentTest, TestPathComponentEncoding) { + // Issue #2082 use case: encoding path component with ampersand + string pathWithAmpersand = "Piri Tommy Villiers - on & on"; + + EXPECT_EQ(httplib::encode_uri_component(pathWithAmpersand), + "Piri%20Tommy%20Villiers%20-%20on%20%26%20on"); +} + +TEST(EncodeUriTest, ParseUnescapedChararactersTest) { + string unescapedCharacters = "-_.!~*'()"; + + EXPECT_EQ(httplib::encode_uri(unescapedCharacters), "-_.!~*'()"); +} + +TEST(EncodeUriTest, ParseReservedCharactersTest) { + string reservedCharacters = ";,/?:@&=+$#"; + + EXPECT_EQ(httplib::encode_uri(reservedCharacters), ";,/?:@&=+$#"); +} + +TEST(EncodeUriTest, TestUTF8Characters) { + string chineseCharacters = u8"中国語"; + string russianCharacters = u8"дом"; + string brazilianCharacters = u8"óculos"; + + EXPECT_EQ(httplib::encode_uri(chineseCharacters), + "%E4%B8%AD%E5%9B%BD%E8%AA%9E"); + + EXPECT_EQ(httplib::encode_uri(russianCharacters), "%D0%B4%D0%BE%D0%BC"); + + EXPECT_EQ(httplib::encode_uri(brazilianCharacters), "%C3%B3culos"); +} + +TEST(EncodeUriTest, TestCompleteUri) { + string uri = + "https://example.com/path/to/resource?query=value¶m=test#fragment"; + + EXPECT_EQ( + httplib::encode_uri(uri), + "https://example.com/path/to/resource?query=value¶m=test#fragment"); +} + +TEST(EncodeUriTest, TestUriWithSpacesAndSpecialChars) { + string uri = + "https://example.com/path with spaces/file name.html?q=hello world"; + + EXPECT_EQ(httplib::encode_uri(uri), + "https://example.com/path%20with%20spaces/" + "file%20name.html?q=hello%20world"); +} + +TEST(DecodeUriComponentTest, ParseEncodedChararactersTest) { + string encodedString = "%3B%2C%2F%3F%3A%40%26%3D%2B%24"; + + EXPECT_EQ(httplib::decode_uri_component(encodedString), ";,/?:@&=+$"); +} + +TEST(DecodeUriComponentTest, ParseUnescapedChararactersTest) { + string unescapedCharacters = "-_.!~*'()"; + + EXPECT_EQ(httplib::decode_uri_component(unescapedCharacters), "-_.!~*'()"); +} + +TEST(DecodeUriComponentTest, TestUTF8Characters) { + string encodedChinese = "%E4%B8%AD%E5%9B%BD%E8%AA%9E"; + string encodedRussian = "%D0%B4%D0%BE%D0%BC"; + string encodedBrazilian = "%C3%B3culos"; + + EXPECT_EQ(httplib::decode_uri_component(encodedChinese), u8"中国語"); + EXPECT_EQ(httplib::decode_uri_component(encodedRussian), u8"дом"); + EXPECT_EQ(httplib::decode_uri_component(encodedBrazilian), u8"óculos"); +} + +TEST(DecodeUriComponentTest, TestPathComponentDecoding) { + string encodedPath = "Piri%20Tommy%20Villiers%20-%20on%20%26%20on"; + + EXPECT_EQ(httplib::decode_uri_component(encodedPath), + "Piri Tommy Villiers - on & on"); +} + +TEST(DecodeUriTest, ParseEncodedChararactersTest) { + string encodedString = "%20%22%3C%3E%5C%5E%60%7B%7D%7C"; + + EXPECT_EQ(httplib::decode_uri(encodedString), " \"<>\\^`{}|"); +} + +TEST(DecodeUriTest, ParseUnescapedChararactersTest) { + string unescapedCharacters = "-_.!~*'();,/?:@&=+$#"; + + EXPECT_EQ(httplib::decode_uri(unescapedCharacters), "-_.!~*'();,/?:@&=+$#"); +} + +TEST(DecodeUriTest, TestUTF8Characters) { + string encodedChinese = "%E4%B8%AD%E5%9B%BD%E8%AA%9E"; + string encodedRussian = "%D0%B4%D0%BE%D0%BC"; + string encodedBrazilian = "%C3%B3culos"; + + EXPECT_EQ(httplib::decode_uri(encodedChinese), u8"中国語"); + EXPECT_EQ(httplib::decode_uri(encodedRussian), u8"дом"); + EXPECT_EQ(httplib::decode_uri(encodedBrazilian), u8"óculos"); +} + +TEST(DecodeUriTest, TestCompleteUri) { + string encodedUri = "https://example.com/path%20with%20spaces/" + "file%20name.html?q=hello%20world"; + + EXPECT_EQ( + httplib::decode_uri(encodedUri), + "https://example.com/path with spaces/file name.html?q=hello world"); +} + +TEST(DecodeUriTest, TestRoundTripWithEncodeUri) { + string original = + "https://example.com/path with spaces/file name.html?q=hello world"; + string encoded = httplib::encode_uri(original); + string decoded = httplib::decode_uri(encoded); + + EXPECT_EQ(decoded, original); +} + +TEST(DecodeUriComponentTest, TestRoundTripWithEncodeUriComponent) { + string original = "Piri Tommy Villiers - on & on"; + string encoded = httplib::encode_uri_component(original); + string decoded = httplib::decode_uri_component(encoded); + + EXPECT_EQ(decoded, original); +} + +TEST(TrimTests, TrimStringTests) { + EXPECT_EQ("abc", detail::trim_copy("abc")); + EXPECT_EQ("abc", detail::trim_copy(" abc ")); + EXPECT_TRUE(detail::trim_copy("").empty()); +} + +TEST(ParseAcceptHeaderTest, BasicAcceptParsing) { + // Simple case without quality values + std::vector<std::string> result1; + EXPECT_TRUE(detail::parse_accept_header( + "text/html,application/json,text/plain", result1)); + EXPECT_EQ(result1.size(), 3U); + EXPECT_EQ(result1[0], "text/html"); + EXPECT_EQ(result1[1], "application/json"); + EXPECT_EQ(result1[2], "text/plain"); + + // With quality values + std::vector<std::string> result2; + EXPECT_TRUE(detail::parse_accept_header( + "text/html;q=0.9,application/json;q=1.0,text/plain;q=0.8", result2)); + EXPECT_EQ(result2.size(), 3U); + EXPECT_EQ(result2[0], "application/json"); // highest q value + EXPECT_EQ(result2[1], "text/html"); + EXPECT_EQ(result2[2], "text/plain"); // lowest q value +} + +TEST(ParseAcceptHeaderTest, MixedQualityValues) { + // Mixed with and without quality values + std::vector<std::string> result; + EXPECT_TRUE(detail::parse_accept_header( + "text/html,application/json;q=0.5,text/plain;q=0.8", result)); + EXPECT_EQ(result.size(), 3U); + EXPECT_EQ(result[0], "text/html"); // no q value means 1.0 + EXPECT_EQ(result[1], "text/plain"); // q=0.8 + EXPECT_EQ(result[2], "application/json"); // q=0.5 +} + +TEST(ParseAcceptHeaderTest, EdgeCases) { + // Empty header + std::vector<std::string> empty_result; + EXPECT_TRUE(detail::parse_accept_header("", empty_result)); + EXPECT_TRUE(empty_result.empty()); + + // Single type + std::vector<std::string> single_result; + EXPECT_TRUE(detail::parse_accept_header("application/json", single_result)); + EXPECT_EQ(single_result.size(), 1U); + EXPECT_EQ(single_result[0], "application/json"); + + // Wildcard types + std::vector<std::string> wildcard_result; + EXPECT_TRUE(detail::parse_accept_header( + "text/*;q=0.5,*/*;q=0.1,application/json", wildcard_result)); + EXPECT_EQ(wildcard_result.size(), 3U); + EXPECT_EQ(wildcard_result[0], "application/json"); + EXPECT_EQ(wildcard_result[1], "text/*"); + EXPECT_EQ(wildcard_result[2], "*/*"); +} + +TEST(ParseAcceptHeaderTest, RealWorldExamples) { + // Common browser Accept header + std::vector<std::string> browser_result; + EXPECT_TRUE( + detail::parse_accept_header("text/html,application/xhtml+xml,application/" + "xml;q=0.9,image/webp,image/apng,*/*;q=0.8", + browser_result)); + EXPECT_EQ(browser_result.size(), 6U); + EXPECT_EQ(browser_result[0], "text/html"); // q=1.0 (default) + EXPECT_EQ(browser_result[1], "application/xhtml+xml"); // q=1.0 (default) + EXPECT_EQ(browser_result[2], "image/webp"); // q=1.0 (default) + EXPECT_EQ(browser_result[3], "image/apng"); // q=1.0 (default) + EXPECT_EQ(browser_result[4], "application/xml"); // q=0.9 + EXPECT_EQ(browser_result[5], "*/*"); // q=0.8 + + // API client header + std::vector<std::string> api_result; + EXPECT_TRUE(detail::parse_accept_header( + "application/json;q=0.9,application/xml;q=0.8,text/plain;q=0.1", + api_result)); + EXPECT_EQ(api_result.size(), 3U); + EXPECT_EQ(api_result[0], "application/json"); + EXPECT_EQ(api_result[1], "application/xml"); + EXPECT_EQ(api_result[2], "text/plain"); +} + +TEST(ParseAcceptHeaderTest, SpecialCases) { + // Quality value with 3 decimal places + std::vector<std::string> decimal_result; + EXPECT_TRUE(detail::parse_accept_header( + "text/html;q=0.123,application/json;q=0.456", decimal_result)); + EXPECT_EQ(decimal_result.size(), 2U); + EXPECT_EQ(decimal_result[0], "application/json"); // Higher q value + EXPECT_EQ(decimal_result[1], "text/html"); + + // Zero quality (should still be included but with lowest priority) + std::vector<std::string> zero_q_result; + EXPECT_TRUE(detail::parse_accept_header("text/html;q=0,application/json;q=1", + zero_q_result)); + EXPECT_EQ(zero_q_result.size(), 2U); + EXPECT_EQ(zero_q_result[0], "application/json"); // q=1 + EXPECT_EQ(zero_q_result[1], "text/html"); // q=0 + + // No spaces around commas + std::vector<std::string> no_space_result; + EXPECT_TRUE(detail::parse_accept_header( + "text/html;q=0.9,application/json;q=0.8,text/plain;q=0.7", + no_space_result)); + EXPECT_EQ(no_space_result.size(), 3U); + EXPECT_EQ(no_space_result[0], "text/html"); + EXPECT_EQ(no_space_result[1], "application/json"); + EXPECT_EQ(no_space_result[2], "text/plain"); +} + +TEST(ParseAcceptHeaderTest, InvalidCases) { + std::vector<std::string> result; + + // Invalid quality value (> 1.0) + EXPECT_FALSE( + detail::parse_accept_header("text/html;q=1.5,application/json", result)); + + // Invalid quality value (< 0.0) + EXPECT_FALSE( + detail::parse_accept_header("text/html;q=-0.1,application/json", result)); + + // Invalid quality value (not a number) + EXPECT_FALSE(detail::parse_accept_header( + "text/html;q=invalid,application/json", result)); + + // Empty quality value + EXPECT_FALSE( + detail::parse_accept_header("text/html;q=,application/json", result)); + + // Invalid media type format (no slash and not wildcard) + EXPECT_FALSE( + detail::parse_accept_header("invalidtype,application/json", result)); + + // Empty media type + result.clear(); + EXPECT_FALSE(detail::parse_accept_header(",application/json", result)); + + // Only commas + result.clear(); + EXPECT_FALSE(detail::parse_accept_header(",,,", result)); + + // Valid cases should still work + EXPECT_TRUE(detail::parse_accept_header("*/*", result)); + EXPECT_EQ(result.size(), 1U); + EXPECT_EQ(result[0], "*/*"); + + EXPECT_TRUE(detail::parse_accept_header("*", result)); + EXPECT_EQ(result.size(), 1U); + EXPECT_EQ(result[0], "*"); + + EXPECT_TRUE(detail::parse_accept_header("text/*", result)); + EXPECT_EQ(result.size(), 1U); + EXPECT_EQ(result[0], "text/*"); +} + +TEST(ParseAcceptHeaderTest, ContentTypesPopulatedAndInvalidHeaderHandling) { + Server svr; + + svr.Get("/accept_ok", [&](const Request &req, Response &res) { + EXPECT_EQ(req.accept_content_types.size(), 3U); + EXPECT_EQ(req.accept_content_types[0], "application/json"); + EXPECT_EQ(req.accept_content_types[1], "text/html"); + EXPECT_EQ(req.accept_content_types[2], "*/*"); + res.set_content("ok", "text/plain"); + }); + + svr.Get("/accept_bad_request", [&](const Request & /*req*/, Response &res) { + EXPECT_TRUE(false); + res.set_content("bad request", "text/plain"); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + { + auto res = + cli.Get("/accept_ok", + {{"Accept", "application/json, text/html;q=0.8, */*;q=0.1"}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + auto res = cli.Get("/accept_bad_request", + {{"Accept", "text/html;q=abc,application/json"}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::BadRequest_400, res->status); + } +} + +TEST(DivideTest, DivideStringTests) { + auto divide = [](const std::string &str, char d) { + std::string lhs; + std::string rhs; + + detail::divide(str, d, + [&](const char *lhs_data, std::size_t lhs_size, + const char *rhs_data, std::size_t rhs_size) { + lhs.assign(lhs_data, lhs_size); + rhs.assign(rhs_data, rhs_size); + }); + + return std::make_pair(std::move(lhs), std::move(rhs)); + }; + + { + const auto res = divide("", '='); + EXPECT_EQ(res.first, ""); + EXPECT_EQ(res.second, ""); + } + + { + const auto res = divide("=", '='); + EXPECT_EQ(res.first, ""); + EXPECT_EQ(res.second, ""); + } + + { + const auto res = divide(" ", '='); + EXPECT_EQ(res.first, " "); + EXPECT_EQ(res.second, ""); + } + + { + const auto res = divide("a", '='); + EXPECT_EQ(res.first, "a"); + EXPECT_EQ(res.second, ""); + } + + { + const auto res = divide("a=", '='); + EXPECT_EQ(res.first, "a"); + EXPECT_EQ(res.second, ""); + } + + { + const auto res = divide("=b", '='); + EXPECT_EQ(res.first, ""); + EXPECT_EQ(res.second, "b"); + } + + { + const auto res = divide("a=b", '='); + EXPECT_EQ(res.first, "a"); + EXPECT_EQ(res.second, "b"); + } + + { + const auto res = divide("a=b=", '='); + EXPECT_EQ(res.first, "a"); + EXPECT_EQ(res.second, "b="); + } + + { + const auto res = divide("a=b=c", '='); + EXPECT_EQ(res.first, "a"); + EXPECT_EQ(res.second, "b=c"); + } +} + +TEST(SplitTest, ParseQueryString) { + string s = "key1=val1&key2=val2&key3=val3"; + Params dic; + + detail::split(s.c_str(), s.c_str() + s.size(), '&', + [&](const char *b, const char *e) { + string key, val; + detail::split(b, e, '=', [&](const char *b2, const char *e2) { + if (key.empty()) { + key.assign(b2, e2); + } else { + val.assign(b2, e2); + } + }); + dic.emplace(key, val); + }); + + EXPECT_EQ("val1", dic.find("key1")->second); + EXPECT_EQ("val2", dic.find("key2")->second); + EXPECT_EQ("val3", dic.find("key3")->second); +} + +TEST(SplitTest, ParseInvalidQueryTests) { + + { + string s = " "; + Params dict; + detail::parse_query_text(s, dict); + EXPECT_TRUE(dict.empty()); + } + + { + string s = " = ="; + Params dict; + detail::parse_query_text(s, dict); + EXPECT_TRUE(dict.empty()); + } +} + +TEST(ParseQueryTest, ParseQueryString) { + { + std::string s = "key1=val1&key2=val2&key3=val3"; + Params dic; + + detail::parse_query_text(s, dic); + + EXPECT_EQ("val1", dic.find("key1")->second); + EXPECT_EQ("val2", dic.find("key2")->second); + EXPECT_EQ("val3", dic.find("key3")->second); + } + + { + std::string s = "key1&key2=val1&key3=val1=val2&key4=val1=val2=val3"; + Params dic; + + detail::parse_query_text(s, dic); + + EXPECT_EQ("", dic.find("key1")->second); + EXPECT_EQ("val1", dic.find("key2")->second); + EXPECT_EQ("val1=val2", dic.find("key3")->second); + EXPECT_EQ("val1=val2=val3", dic.find("key4")->second); + } +} + +TEST(ParamsToQueryTest, ConvertParamsToQuery) { + Params dic; + + EXPECT_EQ(detail::params_to_query_str(dic), ""); + + dic.emplace("key1", "val1"); + + EXPECT_EQ(detail::params_to_query_str(dic), "key1=val1"); + + dic.emplace("key2", "val2"); + dic.emplace("key3", "val3"); + + EXPECT_EQ(detail::params_to_query_str(dic), "key1=val1&key2=val2&key3=val3"); +} + +TEST(ParseMultipartBoundaryTest, DefaultValue) { + string content_type = "multipart/form-data; boundary=something"; + string boundary; + auto ret = detail::parse_multipart_boundary(content_type, boundary); + EXPECT_TRUE(ret); + EXPECT_EQ(boundary, "something"); +} + +TEST(ParseMultipartBoundaryTest, ValueWithQuote) { + string content_type = "multipart/form-data; boundary=\"gc0pJq0M:08jU534c0p\""; + string boundary; + auto ret = detail::parse_multipart_boundary(content_type, boundary); + EXPECT_TRUE(ret); + EXPECT_EQ(boundary, "gc0pJq0M:08jU534c0p"); +} + +TEST(ParseMultipartBoundaryTest, ValueWithCharset) { + string content_type = + "multipart/mixed; boundary=THIS_STRING_SEPARATES;charset=UTF-8"; + string boundary; + auto ret = detail::parse_multipart_boundary(content_type, boundary); + EXPECT_TRUE(ret); + EXPECT_EQ(boundary, "THIS_STRING_SEPARATES"); +} + +TEST(ParseMultipartBoundaryTest, ValueWithQuotesAndCharset) { + string content_type = + "multipart/mixed; boundary=\"cpp-httplib-multipart-data\"; charset=UTF-8"; + string boundary; + auto ret = detail::parse_multipart_boundary(content_type, boundary); + EXPECT_TRUE(ret); + EXPECT_EQ(boundary, "cpp-httplib-multipart-data"); +} + +TEST(GetHeaderValueTest, DefaultValue) { + Headers headers = {{"Dummy", "Dummy"}}; + auto val = detail::get_header_value(headers, "Content-Type", "text/plain", 0); + EXPECT_STREQ("text/plain", val); +} + +TEST(GetHeaderValueTest, DefaultValueInt) { + Headers headers = {{"Dummy", "Dummy"}}; + auto val = detail::get_header_value_u64(headers, "Content-Length", 100, 0); + EXPECT_EQ(100ull, val); +} + +TEST(GetHeaderValueTest, RegularValue) { + Headers headers = {{"Content-Type", "text/html"}, {"Dummy", "Dummy"}}; + auto val = detail::get_header_value(headers, "Content-Type", "text/plain", 0); + EXPECT_STREQ("text/html", val); +} + +TEST(GetHeaderValueTest, RegularValueWithDifferentCase) { + Headers headers = {{"Content-Type", "text/html"}, {"Dummy", "Dummy"}}; + auto val = detail::get_header_value(headers, "content-type", "text/plain", 0); + EXPECT_STREQ("text/html", val); +} + +TEST(GetHeaderValueTest, SetContent) { + Response res; + + res.set_content("html", "text/html"); + EXPECT_EQ("text/html", res.get_header_value("Content-Type")); + + res.set_content("text", "text/plain"); + EXPECT_EQ(1U, res.get_header_value_count("Content-Type")); + EXPECT_EQ("text/plain", res.get_header_value("Content-Type")); +} + +TEST(GetHeaderValueTest, RegularValueInt) { + Headers headers = {{"Content-Length", "100"}, {"Dummy", "Dummy"}}; + auto val = detail::get_header_value_u64(headers, "Content-Length", 0, 0); + EXPECT_EQ(100ull, val); +} + +TEST(GetHeaderValueTest, RegularInvalidValueInt) { + Headers headers = {{"Content-Length", "x"}}; + auto is_invalid_value = false; + auto val = detail::get_header_value_u64(headers, "Content-Length", 0, 0, + is_invalid_value); + EXPECT_EQ(0ull, val); + EXPECT_TRUE(is_invalid_value); +} + +TEST(GetHeaderValueTest, Range) { + { + Headers headers = {make_range_header({{1, -1}})}; + auto val = detail::get_header_value(headers, "Range", 0, 0); + EXPECT_STREQ("bytes=1-", val); + } + + { + Headers headers = {make_range_header({{-1, 1}})}; + auto val = detail::get_header_value(headers, "Range", 0, 0); + EXPECT_STREQ("bytes=-1", val); + } + + { + Headers headers = {make_range_header({{1, 10}})}; + auto val = detail::get_header_value(headers, "Range", 0, 0); + EXPECT_STREQ("bytes=1-10", val); + } + + { + Headers headers = {make_range_header({{1, 10}, {100, -1}})}; + auto val = detail::get_header_value(headers, "Range", 0, 0); + EXPECT_STREQ("bytes=1-10, 100-", val); + } + + { + Headers headers = {make_range_header({{1, 10}, {100, 200}})}; + auto val = detail::get_header_value(headers, "Range", 0, 0); + EXPECT_STREQ("bytes=1-10, 100-200", val); + } + + { + Headers headers = {make_range_header({{0, 0}, {-1, 1}})}; + auto val = detail::get_header_value(headers, "Range", 0, 0); + EXPECT_STREQ("bytes=0-0, -1", val); + } +} + +TEST(ParseHeaderValueTest, Range) { + { + Ranges ranges; + auto ret = detail::parse_range_header("bytes=1-", ranges); + EXPECT_TRUE(ret); + EXPECT_EQ(1u, ranges.size()); + EXPECT_EQ(1u, ranges[0].first); + EXPECT_EQ(-1, ranges[0].second); + } + + { + Ranges ranges; + auto ret = detail::parse_range_header("bytes=-1", ranges); + EXPECT_TRUE(ret); + EXPECT_EQ(1u, ranges.size()); + EXPECT_EQ(-1, ranges[0].first); + EXPECT_EQ(1u, ranges[0].second); + } + + { + Ranges ranges; + auto ret = detail::parse_range_header("bytes=1-10", ranges); + EXPECT_TRUE(ret); + EXPECT_EQ(1u, ranges.size()); + EXPECT_EQ(1u, ranges[0].first); + EXPECT_EQ(10u, ranges[0].second); + } + + { + Ranges ranges; + auto ret = detail::parse_range_header("bytes=10-1", ranges); + EXPECT_FALSE(ret); + } + + { + Ranges ranges; + auto ret = detail::parse_range_header("bytes=1-10, 100-", ranges); + EXPECT_TRUE(ret); + EXPECT_EQ(2u, ranges.size()); + EXPECT_EQ(1u, ranges[0].first); + EXPECT_EQ(10u, ranges[0].second); + EXPECT_EQ(100u, ranges[1].first); + EXPECT_EQ(-1, ranges[1].second); + } + + { + Ranges ranges; + auto ret = + detail::parse_range_header("bytes=1-10, 100-200, 300-400", ranges); + EXPECT_TRUE(ret); + EXPECT_EQ(3u, ranges.size()); + EXPECT_EQ(1u, ranges[0].first); + EXPECT_EQ(10u, ranges[0].second); + EXPECT_EQ(100u, ranges[1].first); + EXPECT_EQ(200u, ranges[1].second); + EXPECT_EQ(300u, ranges[2].first); + EXPECT_EQ(400u, ranges[2].second); + } + + { + Ranges ranges; + + EXPECT_FALSE(detail::parse_range_header("bytes", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=0", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=-", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes= ", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=,", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=,,", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=,,,", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=a-b", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=1-0", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=0--1", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=0- 1", ranges)); + EXPECT_FALSE(detail::parse_range_header("bytes=0 -1", ranges)); + EXPECT_TRUE(ranges.empty()); + } +} + +TEST(ParseAcceptEncoding1, AcceptEncoding) { + Request req; + req.set_header("Accept-Encoding", "gzip"); + + Response res; + res.set_header("Content-Type", "text/plain"); + + auto ret = detail::encoding_type(req, res); + +#ifdef CPPHTTPLIB_ZLIB_SUPPORT + EXPECT_TRUE(ret == detail::EncodingType::Gzip); +#else + EXPECT_TRUE(ret == detail::EncodingType::None); +#endif +} + +TEST(ParseAcceptEncoding2, AcceptEncoding) { + Request req; + req.set_header("Accept-Encoding", "gzip, deflate, br, zstd"); + + Response res; + res.set_header("Content-Type", "text/plain"); + + auto ret = detail::encoding_type(req, res); + +#ifdef CPPHTTPLIB_BROTLI_SUPPORT + EXPECT_TRUE(ret == detail::EncodingType::Brotli); +#elif CPPHTTPLIB_ZLIB_SUPPORT + EXPECT_TRUE(ret == detail::EncodingType::Gzip); +#elif CPPHTTPLIB_ZSTD_SUPPORT + EXPECT_TRUE(ret == detail::EncodingType::Zstd); +#else + EXPECT_TRUE(ret == detail::EncodingType::None); +#endif +} + +TEST(ParseAcceptEncoding3, AcceptEncoding) { + Request req; + req.set_header("Accept-Encoding", + "br;q=1.0, gzip;q=0.8, zstd;q=0.8, *;q=0.1"); + + Response res; + res.set_header("Content-Type", "text/plain"); + + auto ret = detail::encoding_type(req, res); + +#ifdef CPPHTTPLIB_BROTLI_SUPPORT + EXPECT_TRUE(ret == detail::EncodingType::Brotli); +#elif CPPHTTPLIB_ZLIB_SUPPORT + EXPECT_TRUE(ret == detail::EncodingType::Gzip); +#elif CPPHTTPLIB_ZSTD_SUPPORT + EXPECT_TRUE(ret == detail::EncodingType::Zstd); +#else + EXPECT_TRUE(ret == detail::EncodingType::None); +#endif +} + +TEST(BufferStreamTest, read) { + detail::BufferStream strm1; + Stream &strm = strm1; + + EXPECT_EQ(5, strm.write("hello")); + + char buf[512]; + EXPECT_EQ(2, strm.read(buf, 2)); + EXPECT_EQ('h', buf[0]); + EXPECT_EQ('e', buf[1]); + + EXPECT_EQ(2, strm.read(buf, 2)); + EXPECT_EQ('l', buf[0]); + EXPECT_EQ('l', buf[1]); + + EXPECT_EQ(1, strm.read(buf, 1)); + EXPECT_EQ('o', buf[0]); + + EXPECT_EQ(0, strm.read(buf, 1)); +} + +TEST(HostnameToIPConversionTest, HTTPWatch_Online) { + auto host = "www.httpwatch.com"; + + auto ip = hosted_at(host); + EXPECT_EQ("23.96.13.243", ip); + + std::vector<std::string> addrs; + hosted_at(host, addrs); + EXPECT_EQ(1u, addrs.size()); +} + +#if 0 // It depends on each test environment... +TEST(HostnameToIPConversionTest, YouTube_Online) { + auto host = "www.youtube.com"; + + std::vector<std::string> addrs; + hosted_at(host, addrs); + + EXPECT_EQ(20u, addrs.size()); + + auto it = std::find(addrs.begin(), addrs.end(), "2607:f8b0:4006:809::200e"); + EXPECT_TRUE(it != addrs.end()); +} +#endif + +class ChunkedEncodingTest : public ::testing::Test { +protected: + ChunkedEncodingTest() + : cli_(HOST, PORT) +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + , + svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) +#endif + { + cli_.set_connection_timeout(2); +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + cli_.enable_server_certificate_verification(false); +#endif + } + + virtual void SetUp() { + read_file("./image.jpg", image_data_); + + svr_.Get("/hi", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + svr_.Get( + "/chunked", [this](const httplib::Request &, httplib::Response &res) { + res.set_chunked_content_provider( + "image/jpeg", [this](size_t offset, httplib::DataSink &sink) { + size_t remaining = image_data_.size() - offset; + if (remaining == 0) { + sink.done(); + } else { + constexpr size_t CHUNK_SIZE = 1024; + size_t send_size = std::min(CHUNK_SIZE, remaining); + sink.write(&image_data_[offset], send_size); + + std::this_thread::sleep_for(std::chrono::milliseconds(10)); + } + return true; + }); + }); + + t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); + + svr_.wait_until_ready(); + } + + virtual void TearDown() { + svr_.stop(); + if (!request_threads_.empty()) { + std::this_thread::sleep_for(std::chrono::seconds(1)); + for (auto &t : request_threads_) { + t.join(); + } + } + t_.join(); + } + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli_; + SSLServer svr_; +#else + Client cli_; + Server svr_; +#endif + thread t_; + std::vector<thread> request_threads_; + std::string image_data_; +}; + +TEST_F(ChunkedEncodingTest, NormalGet) { + auto res = cli_.Get("/chunked"); + ASSERT_TRUE(res); + + std::string out; + read_file("./image.jpg", out); + + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(out, res->body); +} + +TEST_F(ChunkedEncodingTest, WithContentReceiver) { + std::string body; + auto res = cli_.Get("/chunked", [&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + ASSERT_TRUE(res); + + std::string out; + read_file("./image.jpg", out); + + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(out, body); +} + +TEST_F(ChunkedEncodingTest, WithResponseHandlerAndContentReceiver) { + std::string body; + auto res = cli_.Get( + "/chunked", + [&](const Response &response) { + EXPECT_EQ(StatusCode::OK_200, response.status); + return true; + }, + [&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + ASSERT_TRUE(res); + + std::string out; + read_file("./image.jpg", out); + + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(out, body); +} + +TEST(RangeTest, FromHTTPBin_Online) { +#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN + auto host = "httpbin.org"; + auto path = std::string{"/range/32"}; +#else + auto host = "nghttp2.org"; + auto path = std::string{"/httpbin/range/32"}; +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + auto port = 443; + SSLClient cli(host, port); +#else + auto port = 80; + Client cli(host, port); +#endif + cli.set_connection_timeout(5); + + { + auto res = cli.Get(path); + ASSERT_TRUE(res); + EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + Headers headers = {make_range_header({{1, -1}})}; + auto res = cli.Get(path, headers); + ASSERT_TRUE(res); + EXPECT_EQ("bcdefghijklmnopqrstuvwxyzabcdef", res->body); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + } + + { + Headers headers = {make_range_header({{1, 10}})}; + auto res = cli.Get(path, headers); + ASSERT_TRUE(res); + EXPECT_EQ("bcdefghijk", res->body); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + } + + { + Headers headers = {make_range_header({{0, 31}})}; + auto res = cli.Get(path, headers); + ASSERT_TRUE(res); + EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + Headers headers = {make_range_header({{0, -1}})}; + auto res = cli.Get(path, headers); + ASSERT_TRUE(res); + EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + Headers headers = {make_range_header({{0, 32}})}; + auto res = cli.Get(path, headers); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); + } +} + +TEST(GetAddrInfoDanglingRefTest, LongTimeout) { + auto host = "unresolvableaddress.local"; + auto path = std::string{"/"}; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + auto port = 443; + SSLClient cli(host, port); +#else + auto port = 80; + Client cli(host, port); +#endif + cli.set_connection_timeout(1); + + { + auto res = cli.Get(path); + ASSERT_FALSE(res); + } + + std::this_thread::sleep_for(std::chrono::seconds(8)); +} + +TEST(ConnectionErrorTest, InvalidHost) { + auto host = "-abcde.com"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + auto port = 443; + SSLClient cli(host, port); +#else + auto port = 80; + Client cli(host, port); +#endif + cli.set_connection_timeout(std::chrono::seconds(2)); + + auto res = cli.Get("/"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Connection, res.error()); +} + +TEST(ConnectionErrorTest, InvalidHost2) { + auto host = "httpbin.org/"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + cli.set_connection_timeout(std::chrono::seconds(2)); + + auto res = cli.Get("/"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Connection, res.error()); +} + +TEST(ConnectionErrorTest, InvalidHostCheckResultErrorToString) { + auto host = "httpbin.org/"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + cli.set_connection_timeout(std::chrono::seconds(2)); + + auto res = cli.Get("/"); + ASSERT_TRUE(!res); + stringstream s; + s << "error code: " << res.error(); + EXPECT_EQ("error code: Could not establish connection (2)", s.str()); +} + +TEST(ConnectionErrorTest, InvalidPort) { + auto host = "localhost"; + auto port = 44380; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host, port); +#else + Client cli(host, port); +#endif + cli.set_connection_timeout(std::chrono::seconds(2)); + + auto res = cli.Get("/"); + ASSERT_TRUE(!res); + EXPECT_TRUE(Error::Connection == res.error() || + Error::ConnectionTimeout == res.error()); +} + +TEST(ConnectionErrorTest, Timeout_Online) { + auto host = "google.com"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + auto port = 44380; + SSLClient cli(host, port); +#else + auto port = 8080; + Client cli(host, port); +#endif + cli.set_connection_timeout(std::chrono::seconds(2)); + + // only probe one address type so that the error reason + // correlates to the timed-out IPv4, not the unsupported + // IPv6 connection attempt + cli.set_address_family(AF_INET); + + auto res = cli.Get("/"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::ConnectionTimeout, res.error()); +} + +TEST(CancelTest, NoCancel_Online) { +#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN + auto host = "httpbin.org"; + auto path = std::string{"/range/32"}; +#else + auto host = "nghttp2.org"; + auto path = std::string{"/httpbin/range/32"}; +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + auto port = 443; + SSLClient cli(host, port); +#else + auto port = 80; + Client cli(host, port); +#endif + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = cli.Get(path, [](uint64_t, uint64_t) { return true; }); + ASSERT_TRUE(res); + EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(CancelTest, WithCancelSmallPayload_Online) { +#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN + auto host = "httpbin.org"; + auto path = std::string{"/range/32"}; +#else + auto host = "nghttp2.org"; + auto path = std::string{"/httpbin/range/32"}; +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + auto port = 443; + SSLClient cli(host, port); +#else + auto port = 80; + Client cli(host, port); +#endif + + auto res = cli.Get(path, [](uint64_t, uint64_t) { return false; }); + cli.set_connection_timeout(std::chrono::seconds(5)); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, WithCancelLargePayload_Online) { +#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN + auto host = "httpbin.org"; + auto path = std::string{"/range/65536"}; +#else + auto host = "nghttp2.org"; + auto path = std::string{"/httpbin/range/65536"}; +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + auto port = 443; + SSLClient cli(host, port); +#else + auto port = 80; + Client cli(host, port); +#endif + cli.set_connection_timeout(std::chrono::seconds(5)); + + uint32_t count = 0; + auto res = + cli.Get(path, [&count](uint64_t, uint64_t) { return (count++ == 0); }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, NoCancelPost) { + Server svr; + + svr.Post("/", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return true; }); + ASSERT_TRUE(res); + EXPECT_EQ("Hello World!", res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(CancelTest, WithCancelSmallPayloadPost) { + Server svr; + + svr.Post("/", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return false; }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, WithCancelLargePayloadPost) { + Server svr; + + svr.Post("/", [&](const Request & /*req*/, Response &res) { + res.set_content(LARGE_DATA, "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return false; }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, NoCancelPut) { + Server svr; + + svr.Put("/", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return true; }); + ASSERT_TRUE(res); + EXPECT_EQ("Hello World!", res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(CancelTest, WithCancelSmallPayloadPut) { + Server svr; + + svr.Put("/", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return false; }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, WithCancelLargePayloadPut) { + Server svr; + + svr.Put("/", [&](const Request & /*req*/, Response &res) { + res.set_content(LARGE_DATA, "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return false; }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, NoCancelPatch) { + Server svr; + + svr.Patch("/", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return true; }); + ASSERT_TRUE(res); + EXPECT_EQ("Hello World!", res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(CancelTest, WithCancelSmallPayloadPatch) { + Server svr; + + svr.Patch("/", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return false; }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, WithCancelLargePayloadPatch) { + Server svr; + + svr.Patch("/", [&](const Request & /*req*/, Response &res) { + res.set_content(LARGE_DATA, "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return false; }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, NoCancelDelete) { + Server svr; + + svr.Delete("/", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return true; }); + ASSERT_TRUE(res); + EXPECT_EQ("Hello World!", res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(CancelTest, WithCancelSmallPayloadDelete) { + Server svr; + + svr.Delete("/", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return false; }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST(CancelTest, WithCancelLargePayloadDelete) { + Server svr; + + svr.Delete("/", [&](const Request & /*req*/, Response &res) { + res.set_content(LARGE_DATA, "text/plain"); + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_connection_timeout(std::chrono::seconds(5)); + + auto res = + cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(), + "application/json", [](uint64_t, uint64_t) { return false; }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +static std::string remove_whitespace(const std::string &input) { + std::string output; + output.reserve(input.size()); + std::copy_if(input.begin(), input.end(), std::back_inserter(output), + [](unsigned char c) { return !std::isspace(c); }); + return output; +} + +TEST(BaseAuthTest, FromHTTPWatch_Online) { +#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN + auto host = "httpbin.org"; + auto path = std::string{"/basic-auth/hello/world"}; +#else + auto host = "nghttp2.org"; + auto path = std::string{"/httpbin/basic-auth/hello/world"}; +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + auto port = 443; + SSLClient cli(host, port); +#else + auto port = 80; + Client cli(host, port); +#endif + + { + auto res = cli.Get(path); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Unauthorized_401, res->status); + } + + { + auto res = + cli.Get(path, {make_basic_authentication_header("hello", "world")}); + ASSERT_TRUE(res); + EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", + remove_whitespace(res->body)); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + cli.set_basic_auth("hello", "world"); + auto res = cli.Get(path); + ASSERT_TRUE(res); + EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", + remove_whitespace(res->body)); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + cli.set_basic_auth("hello", "bad"); + auto res = cli.Get(path); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Unauthorized_401, res->status); + } + + { + cli.set_basic_auth("bad", "world"); + auto res = cli.Get(path); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Unauthorized_401, res->status); + } +} + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(DigestAuthTest, FromHTTPWatch_Online) { +#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN + auto host = "httpbin.org"; + auto unauth_path = std::string{"/digest-auth/auth/hello/world"}; + auto paths = std::vector<std::string>{ + "/digest-auth/auth/hello/world/MD5", + "/digest-auth/auth/hello/world/SHA-256", + "/digest-auth/auth/hello/world/SHA-512", + "/digest-auth/auth-int/hello/world/MD5", + }; +#else + auto host = "nghttp2.org"; + auto unauth_path = std::string{"/httpbin/digest-auth/auth/hello/world"}; + auto paths = std::vector<std::string>{ + "/httpbin/digest-auth/auth/hello/world/MD5", + "/httpbin/digest-auth/auth/hello/world/SHA-256", + "/httpbin/digest-auth/auth/hello/world/SHA-512", + "/httpbin/digest-auth/auth-int/hello/world/MD5", + }; +#endif + + auto port = 443; + SSLClient cli(host, port); + + { + auto res = cli.Get(unauth_path); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Unauthorized_401, res->status); + } + + { + + cli.set_digest_auth("hello", "world"); + for (const auto &path : paths) { + auto res = cli.Get(path.c_str()); + ASSERT_TRUE(res); + EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}", + remove_whitespace(res->body)); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + cli.set_digest_auth("hello", "bad"); + for (const auto &path : paths) { + auto res = cli.Get(path.c_str()); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Unauthorized_401, res->status); + } + + // NOTE: Until httpbin.org fixes issue #46, the following test is commented + // out. Please see https://httpbin.org/digest-auth/auth/hello/world + // cli.set_digest_auth("bad", "world"); + // for (const auto& path : paths) { + // auto res = cli.Get(path.c_str()); + // ASSERT_TRUE(res); + // EXPECT_EQ(StatusCode::BadRequest_400, res->status); + // } + } +} +#endif + +TEST(SpecifyServerIPAddressTest, AnotherHostname_Online) { + auto host = "google.com"; + auto another_host = "example.com"; + auto wrong_ip = "0.0.0.0"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + + cli.set_hostname_addr_map({{another_host, wrong_ip}}); + auto res = cli.Get("/"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); +} + +TEST(SpecifyServerIPAddressTest, RealHostname_Online) { + auto host = "google.com"; + auto wrong_ip = "0.0.0.0"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + + cli.set_hostname_addr_map({{host, wrong_ip}}); + auto res = cli.Get("/"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Connection, res.error()); +} + +TEST(AbsoluteRedirectTest, Redirect_Online) { + auto host = "nghttp2.org"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + + cli.set_follow_location(true); + auto res = cli.Get("/httpbin/absolute-redirect/3"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(RedirectTest, Redirect_Online) { + auto host = "nghttp2.org"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + + cli.set_follow_location(true); + auto res = cli.Get("/httpbin/redirect/3"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(RelativeRedirectTest, Redirect_Online) { + auto host = "nghttp2.org"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + + cli.set_follow_location(true); + auto res = cli.Get("/httpbin/relative-redirect/3"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(TooManyRedirectTest, Redirect_Online) { + auto host = "nghttp2.org"; + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + + cli.set_follow_location(true); + auto res = cli.Get("/httpbin/redirect/21"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::ExceedRedirectCount, res.error()); +} + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(YahooRedirectTest, Redirect_Online) { + Client cli("yahoo.com"); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); + + cli.set_follow_location(true); + res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("https://www.yahoo.com/", res->location); +} + +// Previously "nghttp2.org" "/httpbin/redirect-to" +#define REDIR_HOST "httpbingo.org" +#define REDIR_PATH "/redirect-to" + +TEST(HttpsToHttpRedirectTest, Redirect_Online) { + SSLClient cli(REDIR_HOST); + cli.set_follow_location(true); + auto res = + cli.Get(REDIR_PATH "?url=http%3A%2F%2Fexample.com&status_code=302"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(HttpsToHttpRedirectTest2, Redirect_Online) { + SSLClient cli(REDIR_HOST); + cli.set_follow_location(true); + + Params params; + params.emplace("url", "http://example.com"); + params.emplace("status_code", "302"); + + auto res = cli.Get(REDIR_PATH, params, Headers{}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(HttpsToHttpRedirectTest3, Redirect_Online) { + SSLClient cli(REDIR_HOST); + cli.set_follow_location(true); + + Params params; + params.emplace("url", "http://example.com"); + + auto res = cli.Get(REDIR_PATH "?status_code=302", params, Headers{}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(UrlWithSpace, Redirect_Online) { + SSLClient cli("edge.forgecdn.net"); + cli.set_follow_location(true); + + auto res = cli.Get("/files/2595/310/Neat 1.4-17.jar"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(18527U, res->get_header_value_u64("Content-Length")); +} + +#endif + +#if !defined(_WIN32) && !defined(_WIN64) +TEST(ReceiveSignals, Signal) { + auto setupSignalHandlers = []() { + struct sigaction act; + + sigemptyset(&act.sa_mask); + act.sa_flags = SA_SIGINFO; + act.sa_sigaction = [](int sig, siginfo_t *, void *) { + switch (sig) { + case SIGINT: + default: break; + } + }; + ::sigaction(SIGINT, &act, nullptr); + }; + + Server svr; + int port = 0; + auto thread = std::thread([&]() { + setupSignalHandlers(); + port = svr.bind_to_any_port("localhost"); + svr.listen_after_bind(); + }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + ASSERT_TRUE(svr.is_running()); + pthread_kill(thread.native_handle(), SIGINT); + std::this_thread::sleep_for(std::chrono::milliseconds(100)); + ASSERT_TRUE(svr.is_running()); +} +#endif + +TEST(RedirectToDifferentPort, Redirect) { + Server svr1; + svr1.Get("/1", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + int svr1_port = 0; + auto thread1 = std::thread([&]() { + svr1_port = svr1.bind_to_any_port("localhost"); + svr1.listen_after_bind(); + }); + + Server svr2; + svr2.Get("/2", [&](const Request & /*req*/, Response &res) { + res.set_redirect("http://localhost:" + std::to_string(svr1_port) + "/1"); + }); + + int svr2_port = 0; + auto thread2 = std::thread([&]() { + svr2_port = svr2.bind_to_any_port("localhost"); + svr2.listen_after_bind(); + }); + auto se = detail::scope_exit([&] { + svr2.stop(); + thread2.join(); + svr1.stop(); + thread1.join(); + ASSERT_FALSE(svr2.is_running()); + ASSERT_FALSE(svr1.is_running()); + }); + + svr1.wait_until_ready(); + svr2.wait_until_ready(); + + Client cli("localhost", svr2_port); + cli.set_follow_location(true); + + auto res = cli.Get("/2"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("Hello World!", res->body); +} + +TEST(RedirectFromPageWithContent, Redirect) { + Server svr; + + svr.Get("/1", [&](const Request & /*req*/, Response &res) { + res.set_content("___", "text/plain"); + res.set_redirect("/2"); + }); + + svr.Get("/2", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + auto th = std::thread([&]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + th.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli("localhost", PORT); + cli.set_follow_location(true); + + std::string body; + auto res = cli.Get("/1", [&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("Hello World!", body); + } + + { + Client cli("localhost", PORT); + + std::string body; + auto res = cli.Get("/1", [&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Found_302, res->status); + EXPECT_EQ("___", body); + } +} + +TEST(RedirectFromPageWithContentIP6, Redirect) { + Server svr; + + svr.Get("/1", [&](const Request & /*req*/, Response &res) { + res.set_content("___", "text/plain"); + // res.set_redirect("/2"); + res.set_redirect("http://[::1]:1234/2"); + }); + + svr.Get("/2", [&](const Request &req, Response &res) { + auto host_header = req.headers.find("Host"); + ASSERT_TRUE(host_header != req.headers.end()); + EXPECT_EQ("[::1]:1234", host_header->second); + + res.set_content("Hello World!", "text/plain"); + }); + + auto th = std::thread([&]() { svr.listen("::1", 1234); }); + auto se = detail::scope_exit([&] { + svr.stop(); + th.join(); + ASSERT_FALSE(svr.is_running()); + }); + + // When IPV6 support isn't available svr.listen("::1", 1234) never + // actually starts anything, so the condition !svr.is_running() will + // always remain true, and the loop never stops. + // This basically counts how many milliseconds have passed since the + // call to svr.listen(), and if after 5 seconds nothing started yet + // aborts the test. + for (unsigned int milliseconds = 0; !svr.is_running(); milliseconds++) { + std::this_thread::sleep_for(std::chrono::milliseconds(1)); + ASSERT_LT(milliseconds, 5000U); + } + + { + Client cli("http://[::1]:1234"); + cli.set_follow_location(true); + + std::string body; + auto res = cli.Get("/1", [&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("Hello World!", body); + } + + { + Client cli("http://[::1]:1234"); + + std::string body; + auto res = cli.Get("/1", [&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Found_302, res->status); + EXPECT_EQ("___", body); + } +} + +TEST(PathUrlEncodeTest, PathUrlEncode) { + Server svr; + + svr.Get("/foo", [](const Request &req, Response &res) { + auto a = req.params.find("a"); + if (a != req.params.end()) { + res.set_content((*a).second, "text/plain"); + res.status = StatusCode::OK_200; + } else { + res.status = StatusCode::BadRequest_400; + } + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + cli.set_path_encode(false); + + auto res = cli.Get("/foo?a=explicitly+encoded"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + // This expects it back with a space, as the `+` won't have been + // url-encoded, and server-side the params get decoded turning `+` + // into spaces. + EXPECT_EQ("explicitly encoded", res->body); + } +} + +TEST(PathUrlEncodeTest, IncludePercentEncodingLF) { + Server svr; + + svr.Get("/", [](const Request &req, Response &) { + EXPECT_EQ("\x0A", req.get_param_value("something")); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + cli.set_path_encode(false); + + auto res = cli.Get("/?something=%0A"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + } +} + +TEST(BindServerTest, DISABLED_BindDualStack) { + Server svr; + + svr.Get("/1", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + auto thread = std::thread([&]() { svr.listen("::", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli("127.0.0.1", PORT); + + auto res = cli.Get("/1"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("Hello World!", res->body); + } + { + Client cli("::1", PORT); + + auto res = cli.Get("/1"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("Hello World!", res->body); + } +} + +TEST(BindServerTest, BindAndListenSeparately) { + Server svr; + int port = svr.bind_to_any_port("0.0.0.0"); + ASSERT_TRUE(svr.is_valid()); + ASSERT_TRUE(port > 0); + svr.stop(); +} + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(BindServerTest, BindAndListenSeparatelySSL) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, + CLIENT_CA_CERT_DIR); + int port = svr.bind_to_any_port("0.0.0.0"); + ASSERT_TRUE(svr.is_valid()); + ASSERT_TRUE(port > 0); + svr.stop(); +} +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(BindServerTest, BindAndListenSeparatelySSLEncryptedKey) { + SSLServer svr(SERVER_ENCRYPTED_CERT_FILE, SERVER_ENCRYPTED_PRIVATE_KEY_FILE, + nullptr, nullptr, SERVER_ENCRYPTED_PRIVATE_KEY_PASS); + int port = svr.bind_to_any_port("0.0.0.0"); + ASSERT_TRUE(svr.is_valid()); + ASSERT_TRUE(port > 0); + svr.stop(); +} +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +X509 *readCertificate(const std::string &strFileName) { + std::ifstream inStream(strFileName); + std::string strCertPEM((std::istreambuf_iterator<char>(inStream)), + std::istreambuf_iterator<char>()); + + if (strCertPEM.empty()) return (nullptr); + + BIO *pbCert = BIO_new(BIO_s_mem()); + BIO_write(pbCert, strCertPEM.c_str(), (int)strCertPEM.size()); + X509 *pCert = PEM_read_bio_X509(pbCert, NULL, 0, NULL); + BIO_free(pbCert); + + return (pCert); +} + +EVP_PKEY *readPrivateKey(const std::string &strFileName) { + std::ifstream inStream(strFileName); + std::string strPrivateKeyPEM((std::istreambuf_iterator<char>(inStream)), + std::istreambuf_iterator<char>()); + + if (strPrivateKeyPEM.empty()) return (nullptr); + + BIO *pbPrivKey = BIO_new(BIO_s_mem()); + BIO_write(pbPrivKey, strPrivateKeyPEM.c_str(), (int)strPrivateKeyPEM.size()); + EVP_PKEY *pPrivateKey = PEM_read_bio_PrivateKey(pbPrivKey, NULL, NULL, NULL); + BIO_free(pbPrivKey); + + return (pPrivateKey); +} + +TEST(BindServerTest, UpdateCerts) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); + int port = svr.bind_to_any_port("0.0.0.0"); + ASSERT_TRUE(svr.is_valid()); + ASSERT_TRUE(port > 0); + + X509 *cert = readCertificate(SERVER_CERT_FILE); + X509 *ca_cert = readCertificate(CLIENT_CA_CERT_FILE); + EVP_PKEY *key = readPrivateKey(SERVER_PRIVATE_KEY_FILE); + + ASSERT_TRUE(cert != nullptr); + ASSERT_TRUE(ca_cert != nullptr); + ASSERT_TRUE(key != nullptr); + + X509_STORE *cert_store = X509_STORE_new(); + + X509_STORE_add_cert(cert_store, ca_cert); + + svr.update_certs(cert, key, cert_store); + + ASSERT_TRUE(svr.is_valid()); + svr.stop(); + + X509_free(cert); + X509_free(ca_cert); + EVP_PKEY_free(key); +} +#endif + +TEST(ErrorHandlerTest, ContentLength) { + Server svr; + + svr.set_error_handler([](const Request & /*req*/, Response &res) { + res.status = StatusCode::OK_200; + res.set_content("abcdefghijklmnopqrstuvwxyz", + "text/html"); // <= Content-Length still 13 + }); + + svr.Get("/hi", [](const Request & /*req*/, Response &res) { + res.set_content("Hello World!\n", "text/plain"); + res.status = 524; + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + + auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("26", res->get_header_value("Content-Length")); + EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); + } +} + +#ifndef CPPHTTPLIB_NO_EXCEPTIONS +TEST(ExceptionTest, WithoutExceptionHandler) { + Server svr; + + svr.Get("/exception", [&](const Request & /*req*/, Response & /*res*/) { + throw std::runtime_error("exception..."); + }); + + svr.Get("/unknown", [&](const Request & /*req*/, Response & /*res*/) { + throw std::runtime_error("exception\r\n..."); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + { + auto res = cli.Get("/exception"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::InternalServerError_500, res->status); + ASSERT_TRUE(res->has_header("EXCEPTION_WHAT")); + EXPECT_EQ("exception...", res->get_header_value("EXCEPTION_WHAT")); + } + + { + auto res = cli.Get("/unknown"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::InternalServerError_500, res->status); + ASSERT_TRUE(res->has_header("EXCEPTION_WHAT")); + EXPECT_EQ("exception\\r\\n...", res->get_header_value("EXCEPTION_WHAT")); + } +} + +TEST(ExceptionTest, WithExceptionHandler) { + Server svr; + + svr.set_exception_handler([](const Request & /*req*/, Response &res, + std::exception_ptr ep) { + EXPECT_FALSE(ep == nullptr); + try { + std::rethrow_exception(ep); + } catch (std::exception &e) { + EXPECT_EQ("abc", std::string(e.what())); + } catch (...) {} + res.status = StatusCode::InternalServerError_500; + res.set_content("abcdefghijklmnopqrstuvwxyz", + "text/html"); // <= Content-Length still 13 at this point + }); + + svr.Get("/hi", [](const Request & /*req*/, Response &res) { + res.set_content("Hello World!\n", "text/plain"); + throw std::runtime_error("abc"); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + for (size_t i = 0; i < 10; i++) { + Client cli(HOST, PORT); + + for (size_t j = 0; j < 100; j++) { + auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::InternalServerError_500, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("26", res->get_header_value("Content-Length")); + EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); + } + + cli.set_keep_alive(true); + + for (size_t j = 0; j < 100; j++) { + auto res = cli.Get("/hi", {{"Accept-Encoding", ""}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::InternalServerError_500, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("26", res->get_header_value("Content-Length")); + EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body); + } + } +} + +TEST(ExceptionTest, AndErrorHandler) { + Server svr; + + svr.set_error_handler([](const Request & /*req*/, Response &res) { + if (res.body.empty()) { res.set_content("NOT_FOUND", "text/html"); } + }); + + svr.set_exception_handler( + [](const Request & /*req*/, Response &res, std::exception_ptr ep) { + EXPECT_FALSE(ep == nullptr); + try { + std::rethrow_exception(ep); + } catch (std::exception &e) { + res.set_content(e.what(), "text/html"); + } catch (...) {} + res.status = StatusCode::InternalServerError_500; + }); + + svr.Get("/exception", [](const Request & /*req*/, Response & /*res*/) { + throw std::runtime_error("EXCEPTION"); + }); + + svr.Get("/error", [](const Request & /*req*/, Response &res) { + res.set_content("ERROR", "text/html"); + res.status = StatusCode::InternalServerError_500; + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + + { + auto res = cli.Get("/exception"); + ASSERT_TRUE(res); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("EXCEPTION", res->body); + } + + { + auto res = cli.Get("/error"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::InternalServerError_500, res->status); + EXPECT_EQ("ERROR", res->body); + } + + { + auto res = cli.Get("/invalid"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + EXPECT_EQ("NOT_FOUND", res->body); + } +} +#endif + +TEST(NoContentTest, ContentLength) { + Server svr; + + svr.Get("/hi", [](const Request & /*req*/, Response &res) { + res.status = StatusCode::NoContent_204; + }); + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + + auto res = cli.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NoContent_204, res->status); + EXPECT_EQ("0", res->get_header_value("Content-Length")); + } +} + +TEST(RoutingHandlerTest, PreAndPostRoutingHandlers) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(svr.is_valid()); +#else + Server svr; +#endif + + svr.set_pre_routing_handler([](const Request &req, Response &res) { + if (req.path == "/routing_handler") { + res.set_header("PRE_ROUTING", "on"); + res.set_content("Routing Handler", "text/plain"); + return httplib::Server::HandlerResponse::Handled; + } + return httplib::Server::HandlerResponse::Unhandled; + }); + + svr.set_error_handler([](const Request & /*req*/, Response &res) { + res.set_content("Error", "text/html"); + }); + + svr.set_post_routing_handler([](const Request &req, Response &res) { + if (req.path == "/routing_handler") { + res.set_header("POST_ROUTING", "on"); + } + }); + + svr.Get("/hi", [](const Request & /*req*/, Response &res) { + res.set_content("Hello World!\n", "text/plain"); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(HOST, PORT); + cli.enable_server_certificate_verification(false); +#else + Client cli(HOST, PORT); +#endif + + auto res = cli.Get("/routing_handler"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("Routing Handler", res->body); + EXPECT_EQ(1U, res->get_header_value_count("PRE_ROUTING")); + EXPECT_EQ("on", res->get_header_value("PRE_ROUTING")); + EXPECT_EQ(1U, res->get_header_value_count("POST_ROUTING")); + EXPECT_EQ("on", res->get_header_value("POST_ROUTING")); + } + + { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(HOST, PORT); + cli.enable_server_certificate_verification(false); +#else + Client cli(HOST, PORT); +#endif + + auto res = cli.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("Hello World!\n", res->body); + EXPECT_EQ(0U, res->get_header_value_count("PRE_ROUTING")); + EXPECT_EQ(0U, res->get_header_value_count("POST_ROUTING")); + } + + { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(HOST, PORT); + cli.enable_server_certificate_verification(false); +#else + Client cli(HOST, PORT); +#endif + + auto res = cli.Get("/aaa"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + EXPECT_EQ("Error", res->body); + EXPECT_EQ(0U, res->get_header_value_count("PRE_ROUTING")); + EXPECT_EQ(0U, res->get_header_value_count("POST_ROUTING")); + } +} + +TEST(RequestHandlerTest, PreRequestHandler) { + auto route_path = "/user/:user"; + + Server svr; + + svr.Get("/hi", [](const Request &, Response &res) { + res.set_content("hi", "text/plain"); + }); + + svr.Get(route_path, [](const Request &req, Response &res) { + res.set_content(req.path_params.at("user"), "text/plain"); + }); + + svr.set_pre_request_handler([&](const Request &req, Response &res) { + if (req.matched_route == route_path) { + auto user = req.path_params.at("user"); + if (user != "john") { + res.status = StatusCode::Forbidden_403; + res.set_content("error", "text/html"); + return Server::HandlerResponse::Handled; + } + } + return Server::HandlerResponse::Unhandled; + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + { + auto res = cli.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("hi", res->body); + } + + { + auto res = cli.Get("/user/john"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("john", res->body); + } + + { + auto res = cli.Get("/user/invalid-user"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Forbidden_403, res->status); + EXPECT_EQ("error", res->body); + } +} + +TEST(InvalidFormatTest, StatusCode) { + Server svr; + + svr.Get("/hi", [](const Request & /*req*/, Response &res) { + res.set_content("Hello World!\n", "text/plain"); + res.status = 9999; // Status should be a three-digit code... + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + + auto res = cli.Get("/hi"); + ASSERT_FALSE(res); + } +} + +TEST(URLFragmentTest, WithFragment) { + Server svr; + + svr.Get("/hi", [](const Request &req, Response & /*res*/) { + EXPECT_TRUE(req.target == "/hi"); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + + auto res = cli.Get("/hi#key1=val1=key2=val2"); + EXPECT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + + res = cli.Get("/hi%23key1=val1=key2=val2"); + EXPECT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + } +} + +TEST(HeaderWriter, SetHeaderWriter) { + Server svr; + + svr.set_header_writer([](Stream &strm, Headers &hdrs) { + hdrs.emplace("CustomServerHeader", "CustomServerValue"); + return detail::write_headers(strm, hdrs); + }); + svr.Get("/hi", [](const Request &req, Response &res) { + auto it = req.headers.find("CustomClientHeader"); + EXPECT_TRUE(it != req.headers.end()); + EXPECT_EQ(it->second, "CustomClientValue"); + res.set_content("Hello World!\n", "text/plain"); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + cli.set_header_writer([](Stream &strm, Headers &hdrs) { + hdrs.emplace("CustomClientHeader", "CustomClientValue"); + return detail::write_headers(strm, hdrs); + }); + + auto res = cli.Get("/hi"); + EXPECT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + + auto it = res->headers.find("CustomServerHeader"); + EXPECT_TRUE(it != res->headers.end()); + EXPECT_EQ(it->second, "CustomServerValue"); + } +} + +class ServerTest : public ::testing::Test { +protected: + ServerTest() + : cli_(HOST, PORT) +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + , + svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) +#endif + { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + cli_.enable_server_certificate_verification(false); +#endif + } + + virtual void SetUp() { + svr_.set_mount_point("/", "./www"); + svr_.set_mount_point("/mount", "./www2"); + svr_.set_file_extension_and_mimetype_mapping("abcde", "text/abcde"); + + svr_.Get("/hi", + [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }) + .Get("/file_content", + [&](const Request & /*req*/, Response &res) { + res.set_file_content("./www/dir/test.html"); + }) + .Get("/file_content_with_content_type", + [&](const Request & /*req*/, Response &res) { + res.set_file_content("./www/file", "text/plain"); + }) + .Get("/invalid_file_content", + [&](const Request & /*req*/, Response &res) { + res.set_file_content("./www/dir/invalid_file_path"); + }) + .Get("/http_response_splitting", + [&](const Request & /*req*/, Response &res) { + res.set_header("a", "1\r\nSet-Cookie: a=1"); + EXPECT_EQ(0U, res.headers.size()); + EXPECT_FALSE(res.has_header("a")); + + res.set_header("a", "1\nSet-Cookie: a=1"); + EXPECT_EQ(0U, res.headers.size()); + EXPECT_FALSE(res.has_header("a")); + + res.set_header("a", "1\rSet-Cookie: a=1"); + EXPECT_EQ(0U, res.headers.size()); + EXPECT_FALSE(res.has_header("a")); + + res.set_header("a\r\nb", "0"); + EXPECT_EQ(0U, res.headers.size()); + EXPECT_FALSE(res.has_header("a")); + + res.set_header("a\rb", "0"); + EXPECT_EQ(0U, res.headers.size()); + EXPECT_FALSE(res.has_header("a")); + + res.set_header("a\nb", "0"); + EXPECT_EQ(0U, res.headers.size()); + EXPECT_FALSE(res.has_header("a")); + + res.set_redirect("1\r\nSet-Cookie: a=1"); + EXPECT_EQ(0U, res.headers.size()); + EXPECT_FALSE(res.has_header("Location")); + }) + .Get("/slow", + [&](const Request & /*req*/, Response &res) { + std::this_thread::sleep_for(std::chrono::seconds(2)); + res.set_content("slow", "text/plain"); + }) +#if 0 + .Post("/slowpost", + [&](const Request & /*req*/, Response &res) { + std::this_thread::sleep_for(std::chrono::seconds(2)); + res.set_content("slow", "text/plain"); + }) +#endif + .Get("/remote_addr", + [&](const Request &req, Response &res) { + auto remote_addr = req.headers.find("REMOTE_ADDR")->second; + EXPECT_TRUE(req.has_header("REMOTE_PORT")); + EXPECT_EQ(req.remote_addr, req.get_header_value("REMOTE_ADDR")); + EXPECT_EQ(req.remote_port, + std::stoi(req.get_header_value("REMOTE_PORT"))); + res.set_content(remote_addr.c_str(), "text/plain"); + }) + .Get("/local_addr", + [&](const Request &req, Response &res) { + EXPECT_TRUE(req.has_header("LOCAL_PORT")); + EXPECT_TRUE(req.has_header("LOCAL_ADDR")); + auto local_addr = req.get_header_value("LOCAL_ADDR"); + auto local_port = req.get_header_value("LOCAL_PORT"); + EXPECT_EQ(req.local_addr, local_addr); + EXPECT_EQ(req.local_port, std::stoi(local_port)); + res.set_content(local_addr.append(":").append(local_port), + "text/plain"); + }) + .Get("/endwith%", + [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }) + .Get("/a\\+\\+b", + [&](const Request &req, Response &res) { + ASSERT_TRUE(req.has_param("a +b")); + auto val = req.get_param_value("a +b"); + res.set_content(val, "text/plain"); + }) + .Get("/", [&](const Request & /*req*/, + Response &res) { res.set_redirect("/hi"); }) + .Post("/1", + [](const Request & /*req*/, Response &res) { + res.set_redirect("/2", StatusCode::SeeOther_303); + }) + .Get("/2", + [](const Request & /*req*/, Response &res) { + res.set_content("redirected.", "text/plain"); + res.status = StatusCode::OK_200; + }) + .Post("/person", + [&](const Request &req, Response &res) { + if (req.has_param("name") && req.has_param("note")) { + persons_[req.get_param_value("name")] = + req.get_param_value("note"); + } else { + res.status = StatusCode::BadRequest_400; + } + }) + .Put("/person", + [&](const Request &req, Response &res) { + if (req.has_param("name") && req.has_param("note")) { + persons_[req.get_param_value("name")] = + req.get_param_value("note"); + } else { + res.status = StatusCode::BadRequest_400; + } + }) + .Get("/person/(.*)", + [&](const Request &req, Response &res) { + string name = req.matches[1]; + if (persons_.find(name) != persons_.end()) { + auto note = persons_[name]; + res.set_content(note, "text/plain"); + } else { + res.status = StatusCode::NotFound_404; + } + }) + .Delete("/person", + [&](const Request &req, Response &res) { + if (req.has_param("name")) { + string name = req.get_param_value("name"); + if (persons_.find(name) != persons_.end()) { + persons_.erase(name); + res.set_content("DELETED", "text/plain"); + } else { + res.status = StatusCode::NotFound_404; + } + } else { + res.status = StatusCode::BadRequest_400; + } + }) + .Post("/x-www-form-urlencoded-json", + [&](const Request &req, Response &res) { + auto json = req.get_param_value("json"); + ASSERT_EQ(JSON_DATA, json); + res.set_content(json, "appliation/json"); + res.status = StatusCode::OK_200; + }) + .Get("/streamed-chunked", + [&](const Request & /*req*/, Response &res) { + res.set_chunked_content_provider( + "text/plain", [](size_t /*offset*/, DataSink &sink) { + sink.os << "123"; + sink.os << "456"; + sink.os << "789"; + sink.done(); + return true; + }); + }) + .Get("/streamed-chunked2", + [&](const Request & /*req*/, Response &res) { + auto i = new int(0); + res.set_chunked_content_provider( + "text/plain", + [i](size_t /*offset*/, DataSink &sink) { + switch (*i) { + case 0: sink.os << "123"; break; + case 1: sink.os << "456"; break; + case 2: sink.os << "789"; break; + case 3: sink.done(); break; + } + (*i)++; + return true; + }, + [i](bool success) { + EXPECT_TRUE(success); + delete i; + }); + }) + .Get("/streamed-chunked-with-trailer", + [&](const Request & /*req*/, Response &res) { + auto i = new int(0); + res.set_header("Trailer", "Dummy1, Dummy2"); + res.set_chunked_content_provider( + "text/plain", + [i](size_t /*offset*/, DataSink &sink) { + switch (*i) { + case 0: sink.os << "123"; break; + case 1: sink.os << "456"; break; + case 2: sink.os << "789"; break; + case 3: { + sink.done_with_trailer( + {{"Dummy1", "DummyVal1"}, {"Dummy2", "DummyVal2"}}); + } break; + } + (*i)++; + return true; + }, + [i](bool success) { + EXPECT_TRUE(success); + delete i; + }); + }) + .Get("/streamed", + [&](const Request & /*req*/, Response &res) { + res.set_content_provider( + 6, "text/plain", + [](size_t offset, size_t /*length*/, DataSink &sink) { + sink.os << (offset < 3 ? "a" : "b"); + return true; + }); + }) + .Get("/streamed-with-range", + [&](const Request &req, Response &res) { + auto data = new std::string("abcdefg"); + res.set_content_provider( + data->size(), "text/plain", + [data](size_t offset, size_t length, DataSink &sink) { + size_t DATA_CHUNK_SIZE = 4; + const auto &d = *data; + auto out_len = + std::min(static_cast<size_t>(length), DATA_CHUNK_SIZE); + auto ret = + sink.write(&d[static_cast<size_t>(offset)], out_len); + EXPECT_TRUE(ret); + return true; + }, + [data, &req](bool success) { + EXPECT_EQ(success, !req.has_param("error")); + delete data; + }); + }) + .Get("/streamed-cancel", + [&](const Request & /*req*/, Response &res) { + res.set_content_provider( + size_t(-1), "text/plain", + [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + sink.os << "data_chunk"; + return true; + }); + }) + .Get("/regex-with-delimiter", + [&](const Request &req, Response & /*res*/) { + ASSERT_TRUE(req.has_param("key")); + EXPECT_EQ("^(?.*(value))", req.get_param_value("key")); + }) + .Get("/with-range", + [&](const Request & /*req*/, Response &res) { + res.set_content("abcdefg", "text/plain"); + }) + .Get("/test-start-time", + [&](const Request &req, Response & /*res*/) { + EXPECT_NE(req.start_time_, + std::chrono::steady_clock::time_point::min()); + }) + .Get("/with-range-customized-response", + [&](const Request & /*req*/, Response &res) { + res.status = StatusCode::BadRequest_400; + res.set_content(JSON_DATA, "application/json"); + }) + .Post("/chunked", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ(req.body, "dechunked post body"); + }) + .Post("/large-chunked", + [&](const Request &req, Response & /*res*/) { + std::string expected(6 * 30 * 1024u, 'a'); + EXPECT_EQ(req.body, expected); + }) + .Post("/multipart", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ(4u, req.form.get_field_count("text1") + + req.form.get_field_count("text2") + + req.form.get_field_count("file3") + + req.form.get_field_count("file4")); + EXPECT_EQ(2u, req.form.get_file_count("file1") + + req.form.get_file_count("file2")); + ASSERT_TRUE(!req.form.has_file("???")); + ASSERT_TRUE(!req.form.has_field("???")); + ASSERT_TRUE(req.body.empty()); + + { + const auto &text = req.form.get_field("text1"); + EXPECT_EQ("text default", text); + } + + { + const auto &text = req.form.get_field("text2"); + EXPECT_EQ("aωb", text); + } + + { + const auto &file = req.form.get_file("file1"); + EXPECT_EQ("hello.txt", file.filename); + EXPECT_EQ("text/plain", file.content_type); + EXPECT_EQ("h\ne\n\nl\nl\no\n", file.content); + } + + { + const auto &file = req.form.get_file("file2"); + EXPECT_EQ("world.json", file.filename); + EXPECT_EQ("application/json", file.content_type); + EXPECT_EQ("{\n \"world\", true\n}\n", file.content); + } + + { + const auto &text = req.form.get_field("file3"); + EXPECT_EQ(0u, text.size()); + } + + { + const auto &text = req.form.get_field("file4"); + EXPECT_EQ(0u, text.size()); + } + }) + .Post("/multipart/multi_file_values", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ(3u, req.form.get_field_count("text") + + req.form.get_field_count("multi_text1")); + EXPECT_EQ(2u, req.form.get_file_count("multi_file1")); + ASSERT_TRUE(!req.form.has_file("???")); + ASSERT_TRUE(!req.form.has_field("???")); + ASSERT_TRUE(req.body.empty()); + + { + const auto &text = req.form.get_field("text"); + EXPECT_EQ("default text", text); + } + { + const auto &text1_values = req.form.get_fields("multi_text1"); + EXPECT_EQ(2u, text1_values.size()); + EXPECT_EQ("aaaaa", text1_values[0]); + EXPECT_EQ("bbbbb", text1_values[1]); + } + + { + const auto &file1_values = req.form.get_files("multi_file1"); + EXPECT_EQ(2u, file1_values.size()); + auto file1 = file1_values[0]; + EXPECT_EQ(file1.filename, "hello.txt"); + EXPECT_EQ(file1.content_type, "text/plain"); + EXPECT_EQ("h\ne\n\nl\nl\no\n", file1.content); + + auto file2 = file1_values[1]; + EXPECT_EQ(file2.filename, "world.json"); + EXPECT_EQ(file2.content_type, "application/json"); + EXPECT_EQ("{\n \"world\", true\n}\n", file2.content); + } + }) + .Post("/empty", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, ""); + EXPECT_EQ("text/plain", req.get_header_value("Content-Type")); + EXPECT_EQ("0", req.get_header_value("Content-Length")); + res.set_content("empty", "text/plain"); + }) + .Post("/empty-no-content-type", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, ""); + EXPECT_FALSE(req.has_header("Content-Type")); + EXPECT_EQ("0", req.get_header_value("Content-Length")); + res.set_content("empty-no-content-type", "text/plain"); + }) + .Post("/path-only", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, ""); + EXPECT_EQ("", req.get_header_value("Content-Type")); + EXPECT_EQ("0", req.get_header_value("Content-Length")); + res.set_content("path-only", "text/plain"); + }) + .Post("/path-headers-only", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, ""); + EXPECT_EQ("", req.get_header_value("Content-Type")); + EXPECT_EQ("0", req.get_header_value("Content-Length")); + EXPECT_EQ("world", req.get_header_value("hello")); + EXPECT_EQ("world2", req.get_header_value("hello2")); + res.set_content("path-headers-only", "text/plain"); + }) + .Post("/post-large", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, LARGE_DATA); + res.set_content(req.body, "text/plain"); + }) + .Put("/empty-no-content-type", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, ""); + EXPECT_FALSE(req.has_header("Content-Type")); + EXPECT_EQ("0", req.get_header_value("Content-Length")); + res.set_content("empty-no-content-type", "text/plain"); + }) + .Put("/put", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, "PUT"); + res.set_content(req.body, "text/plain"); + }) + .Put("/put-large", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, LARGE_DATA); + res.set_content(req.body, "text/plain"); + }) + .Patch("/patch", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, "PATCH"); + res.set_content(req.body, "text/plain"); + }) + .Delete("/delete", + [&](const Request & /*req*/, Response &res) { + res.set_content("DELETE", "text/plain"); + }) + .Delete("/delete-body", + [&](const Request &req, Response &res) { + EXPECT_EQ(req.body, "content"); + res.set_content(req.body, "text/plain"); + }) + .Options(R"(\*)", + [&](const Request & /*req*/, Response &res) { + res.set_header("Allow", "GET, POST, HEAD, OPTIONS"); + }) + .Get("/request-target", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ("/request-target?aaa=bbb&ccc=ddd", req.target); + EXPECT_EQ("bbb", req.get_param_value("aaa")); + EXPECT_EQ("ddd", req.get_param_value("ccc")); + }) + .Get("/long-query-value", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ(LONG_QUERY_URL, req.target); + EXPECT_EQ(LONG_QUERY_VALUE, req.get_param_value("key")); + }) + .Get("/too-long-query-value", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ(TOO_LONG_QUERY_URL, req.target); + EXPECT_EQ(TOO_LONG_QUERY_VALUE, req.get_param_value("key")); + }) + .Get("/array-param", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ(3u, req.get_param_value_count("array")); + EXPECT_EQ("value1", req.get_param_value("array", 0)); + EXPECT_EQ("value2", req.get_param_value("array", 1)); + EXPECT_EQ("value3", req.get_param_value("array", 2)); + }) + .Post("/validate-no-multiple-headers", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ(1u, req.get_header_value_count("Content-Length")); + EXPECT_EQ("5", req.get_header_value("Content-Length")); + }) + .Post("/content_receiver", + [&](const Request &req, Response &res, + const ContentReader &content_reader) { + if (req.is_multipart_form_data()) { + std::vector<FormData> items; + content_reader( + [&](const FormData &file) { + items.push_back(file); + return true; + }, + [&](const char *data, size_t data_length) { + items.back().content.append(data, data_length); + return true; + }); + + EXPECT_EQ(5u, items.size()); + + { + const auto &file = get_file_value(items, "text1"); + EXPECT_TRUE(file.filename.empty()); + EXPECT_EQ("text default", file.content); + } + + { + const auto &file = get_file_value(items, "text2"); + EXPECT_TRUE(file.filename.empty()); + EXPECT_EQ("aωb", file.content); + } + + { + const auto &file = get_file_value(items, "file1"); + EXPECT_EQ("hello.txt", file.filename); + EXPECT_EQ("text/plain", file.content_type); + EXPECT_EQ("h\ne\n\nl\nl\no\n", file.content); + } + + { + const auto &file = get_file_value(items, "file2"); + EXPECT_EQ("world.json", file.filename); + EXPECT_EQ("application/json", file.content_type); + EXPECT_EQ(R"({\n "world": true\n}\n)", file.content); + } + + { + const auto &file = get_file_value(items, "file3"); + EXPECT_TRUE(file.filename.empty()); + EXPECT_EQ("application/octet-stream", file.content_type); + EXPECT_EQ(0u, file.content.size()); + } + } else { + std::string body; + content_reader([&](const char *data, size_t data_length) { + EXPECT_EQ(7U, data_length); + body.append(data, data_length); + return true; + }); + EXPECT_EQ(body, "content"); + res.set_content(body, "text/plain"); + } + }) + .Put("/content_receiver", + [&](const Request & /*req*/, Response &res, + const ContentReader &content_reader) { + std::string body; + content_reader([&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + EXPECT_EQ(body, "content"); + res.set_content(body, "text/plain"); + }) + .Patch("/content_receiver", + [&](const Request & /*req*/, Response &res, + const ContentReader &content_reader) { + std::string body; + content_reader([&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + EXPECT_EQ(body, "content"); + res.set_content(body, "text/plain"); + }) + .Post("/query-string-and-body", + [&](const Request &req, Response & /*res*/) { + ASSERT_TRUE(req.has_param("key")); + EXPECT_EQ(req.get_param_value("key"), "value"); + EXPECT_EQ(req.body, "content"); + }) + .Get("/last-request", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ("close", req.get_header_value("Connection")); + }) + .Get(R"(/redirect/(\d+))", + [&](const Request &req, Response &res) { + auto num = std::stoi(req.matches[1]) + 1; + std::string url = "/redirect/" + std::to_string(num); + res.set_redirect(url); + }) + .Post("/binary", + [&](const Request &req, Response &res) { + EXPECT_EQ(4U, req.body.size()); + EXPECT_EQ("application/octet-stream", + req.get_header_value("Content-Type")); + EXPECT_EQ("4", req.get_header_value("Content-Length")); + res.set_content(req.body, "application/octet-stream"); + }) + .Put("/binary", + [&](const Request &req, Response &res) { + EXPECT_EQ(4U, req.body.size()); + EXPECT_EQ("application/octet-stream", + req.get_header_value("Content-Type")); + EXPECT_EQ("4", req.get_header_value("Content-Length")); + res.set_content(req.body, "application/octet-stream"); + }) + .Patch("/binary", + [&](const Request &req, Response &res) { + EXPECT_EQ(4U, req.body.size()); + EXPECT_EQ("application/octet-stream", + req.get_header_value("Content-Type")); + EXPECT_EQ("4", req.get_header_value("Content-Length")); + res.set_content(req.body, "application/octet-stream"); + }) + .Delete("/binary", + [&](const Request &req, Response &res) { + EXPECT_EQ(4U, req.body.size()); + EXPECT_EQ("application/octet-stream", + req.get_header_value("Content-Type")); + EXPECT_EQ("4", req.get_header_value("Content-Length")); + res.set_content(req.body, "application/octet-stream"); + }) + .Get("/issue1772", + [&](const Request & /*req*/, Response &res) { + res.status = 401; + res.set_header("WWW-Authenticate", "Basic realm=123456"); + }) + .Delete("/issue609", + [](const httplib::Request &, httplib::Response &res, + const httplib::ContentReader &) { + res.set_content("ok", "text/plain"); + }) +#if defined(CPPHTTPLIB_ZLIB_SUPPORT) || defined(CPPHTTPLIB_BROTLI_SUPPORT) || \ + defined(CPPHTTPLIB_ZSTD_SUPPORT) + .Get("/compress", + [&](const Request & /*req*/, Response &res) { + res.set_content( + "12345678901234567890123456789012345678901234567890123456789" + "01234567890123456789012345678901234567890", + "text/plain"); + }) + .Get("/nocompress", + [&](const Request & /*req*/, Response &res) { + res.set_content( + "12345678901234567890123456789012345678901234567890123456789" + "01234567890123456789012345678901234567890", + "application/octet-stream"); + }) + .Post("/compress-multipart", + [&](const Request &req, Response & /*res*/) { + EXPECT_EQ(2u, req.form.fields.size()); + ASSERT_TRUE(!req.form.has_field("???")); + + { + const auto &text = req.form.get_field("key1"); + EXPECT_EQ("test", text); + } + + { + const auto &text = req.form.get_field("key2"); + EXPECT_EQ("--abcdefg123", text); + } + }) +#endif + ; + + persons_["john"] = "programmer"; + + t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); + + svr_.wait_until_ready(); + } + + virtual void TearDown() { + svr_.stop(); + if (!request_threads_.empty()) { + std::this_thread::sleep_for(std::chrono::seconds(1)); + for (auto &t : request_threads_) { + t.join(); + } + } + t_.join(); + } + + map<string, string> persons_; +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli_; + SSLServer svr_; +#else + Client cli_; + Server svr_; +#endif + thread t_; + std::vector<thread> request_threads_; +}; + +TEST_F(ServerTest, GetMethod200) { + auto res = cli_.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ("HTTP/1.1", res->version); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("OK", res->reason); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ(1U, res->get_header_value_count("Content-Type")); + EXPECT_EQ("Hello World!", res->body); +} + +void performance_test(const char *host) { + auto port = 1234; + + Server svr; + + svr.Get("/benchmark", [&](const Request & /*req*/, Response &res) { + res.set_content("Benchmark Response", "text/plain"); + }); + + auto listen_thread = std::thread([&]() { svr.listen(host, port); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(host, port); + + auto start = std::chrono::high_resolution_clock::now(); + + auto res = cli.Get("/benchmark"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + + auto end = std::chrono::high_resolution_clock::now(); + + auto elapsed = + std::chrono::duration_cast<std::chrono::milliseconds>(end - start) + .count(); + + EXPECT_LE(elapsed, 5) << "Performance is too slow: " << elapsed + << "ms (Issue #1777)"; +} + +TEST(BenchmarkTest, localhost) { performance_test("localhost"); } + +TEST(BenchmarkTest, v6) { performance_test("::1"); } + +TEST_F(ServerTest, GetEmptyFile) { + auto res = cli_.Get("/empty_file"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); + EXPECT_EQ(0, std::stoi(res->get_header_value("Content-Length"))); + EXPECT_EQ("", res->body); +} + +TEST_F(ServerTest, GetFileContent) { + auto res = cli_.Get("/file_content"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ(9, std::stoi(res->get_header_value("Content-Length"))); + EXPECT_EQ("test.html", res->body); +} + +TEST_F(ServerTest, GetFileContentWithRange) { + auto res = cli_.Get("/file_content", {{make_range_header({{1, 3}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("bytes 1-3/9", res->get_header_value("Content-Range")); + EXPECT_EQ(3, std::stoi(res->get_header_value("Content-Length"))); + EXPECT_EQ("est", res->body); +} + +TEST_F(ServerTest, GetFileContentWithContentType) { + auto res = cli_.Get("/file_content_with_content_type"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ(5, std::stoi(res->get_header_value("Content-Length"))); + EXPECT_EQ("file\n", res->body); +} + +TEST_F(ServerTest, GetInvalidFileContent) { + auto res = cli_.Get("/invalid_file_content"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, GetMethod200withPercentEncoding) { + auto res = cli_.Get("/%68%69"); // auto res = cli_.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ("HTTP/1.1", res->version); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ(1U, res->get_header_value_count("Content-Type")); + EXPECT_EQ("Hello World!", res->body); +} + +TEST_F(ServerTest, GetMethod302) { + auto res = cli_.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Found_302, res->status); + EXPECT_EQ("/hi", res->get_header_value("Location")); +} + +TEST_F(ServerTest, GetMethod302Redirect) { + cli_.set_follow_location(true); + auto res = cli_.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("Hello World!", res->body); + EXPECT_EQ("/hi", res->location); +} + +TEST_F(ServerTest, GetMethod404) { + auto res = cli_.Get("/invalid"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, HeadMethod200) { + auto res = cli_.Head("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_TRUE(res->body.empty()); +} + +TEST_F(ServerTest, HeadMethod200Static) { + auto res = cli_.Head("/mount/dir/index.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ(104, std::stoi(res->get_header_value("Content-Length"))); + EXPECT_TRUE(res->body.empty()); +} + +TEST_F(ServerTest, HeadMethod404) { + auto res = cli_.Head("/invalid"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + EXPECT_TRUE(res->body.empty()); +} + +TEST_F(ServerTest, GetMethodPersonJohn) { + auto res = cli_.Get("/person/john"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("programmer", res->body); +} + +TEST_F(ServerTest, PostMethod1) { + auto res = cli_.Get("/person/john1"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); + + res = cli_.Post("/person", "name=john1¬e=coder", + "application/x-www-form-urlencoded"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + + res = cli_.Get("/person/john1"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); + ASSERT_EQ("coder", res->body); +} + +TEST_F(ServerTest, PostMethod2) { + auto res = cli_.Get("/person/john2"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); + + Params params; + params.emplace("name", "john2"); + params.emplace("note", "coder"); + + res = cli_.Post("/person", params); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + + res = cli_.Get("/person/john2"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); + ASSERT_EQ("coder", res->body); +} + +TEST_F(ServerTest, PutMethod3) { + auto res = cli_.Get("/person/john3"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); + + Params params; + params.emplace("name", "john3"); + params.emplace("note", "coder"); + + res = cli_.Put("/person", params); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + + res = cli_.Get("/person/john3"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); + ASSERT_EQ("coder", res->body); +} + +TEST_F(ServerTest, DeleteMethod1) { + auto res = cli_.Get("/person/john4"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); + + Params params; + params.emplace("name", "john4"); + params.emplace("note", "coder"); + + res = cli_.Post("/person", params); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + + res = cli_.Get("/person/john4"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); + ASSERT_EQ("coder", res->body); + + Params delete_params; + delete_params.emplace("name", "john4"); + + res = cli_.Delete("/person", delete_params); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("DELETED", res->body); + + res = cli_.Get("/person/john4"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, DeleteMethod2) { + auto res = cli_.Get("/person/john5"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); + + Params params; + params.emplace("name", "john5"); + params.emplace("note", "developer"); + + res = cli_.Post("/person", params); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + + res = cli_.Get("/person/john5"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); + ASSERT_EQ("developer", res->body); + + Params delete_params; + delete_params.emplace("name", "john5"); + + Headers headers; + headers.emplace("Custom-Header", "test-value"); + + res = cli_.Delete("/person", headers, delete_params); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("DELETED", res->body); + + res = cli_.Get("/person/john5"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, DeleteMethod3) { + auto res = cli_.Get("/person/john6"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); + + Params params; + params.emplace("name", "john6"); + params.emplace("note", "tester"); + + res = cli_.Post("/person", params); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + + res = cli_.Get("/person/john6"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("text/plain", res->get_header_value("Content-Type")); + ASSERT_EQ("tester", res->body); + + Params delete_params; + delete_params.emplace("name", "john6"); + + Headers headers; + headers.emplace("Custom-Header", "test-value"); + + res = cli_.Delete("/person", headers, delete_params, nullptr); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("DELETED", res->body); + + res = cli_.Get("/person/john6"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, PostWwwFormUrlEncodedJson) { + Params params; + params.emplace("json", JSON_DATA); + + auto res = cli_.Post("/x-www-form-urlencoded-json", params); + + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(JSON_DATA, res->body); +} + +TEST_F(ServerTest, PostEmptyContent) { + auto res = cli_.Post("/empty", "", "text/plain"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("empty", res->body); +} + +TEST_F(ServerTest, PostEmptyContentWithNoContentType) { + auto res = cli_.Post("/empty-no-content-type"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("empty-no-content-type", res->body); +} + +TEST_F(ServerTest, PostPathOnly) { + auto res = cli_.Post("/path-only"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("path-only", res->body); +} + +TEST_F(ServerTest, PostPathAndHeadersOnly) { + auto res = cli_.Post("/path-headers-only", + Headers({{"hello", "world"}, {"hello2", "world2"}})); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("path-headers-only", res->body); +} + +TEST_F(ServerTest, PostLarge) { + auto res = cli_.Post("/post-large", LARGE_DATA, "text/plain"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(LARGE_DATA, res->body); +} + +TEST_F(ServerTest, PutEmptyContentWithNoContentType) { + auto res = cli_.Put("/empty-no-content-type"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("empty-no-content-type", res->body); +} + +TEST_F(ServerTest, GetMethodDir) { + auto res = cli_.Get("/dir/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + + auto body = R"(<html> +<head> +</head> +<body> + <a href="/dir/test.html">Test</a> + <a href="/hi">hi</a> +</body> +</html> +)"; + EXPECT_EQ(body, res->body); +} + +TEST_F(ServerTest, GetMethodDirTest) { + auto res = cli_.Get("/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("test.html", res->body); +} + +TEST_F(ServerTest, GetMethodDirTestWithDoubleDots) { + auto res = cli_.Get("/dir/../dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("test.html", res->body); +} + +TEST_F(ServerTest, GetMethodInvalidPath) { + auto res = cli_.Get("/dir/../test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, GetMethodOutOfBaseDir) { + auto res = cli_.Get("/../www/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, GetMethodOutOfBaseDir2) { + auto res = cli_.Get("/dir/../../www/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, GetMethodDirMountTest) { + auto res = cli_.Get("/mount/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("test.html", res->body); +} + +TEST_F(ServerTest, GetMethodDirMountTestWithDoubleDots) { + auto res = cli_.Get("/mount/dir/../dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/html", res->get_header_value("Content-Type")); + EXPECT_EQ("test.html", res->body); +} + +TEST_F(ServerTest, GetMethodInvalidMountPath) { + auto res = cli_.Get("/mount/dir/../test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, GetMethodEmbeddedNUL) { + auto res = cli_.Get("/mount/dir/test.html%00.js"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, GetMethodOutOfBaseDirMount) { + auto res = cli_.Get("/mount/../www2/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, GetMethodOutOfBaseDirMount2) { + auto res = cli_.Get("/mount/dir/../../www2/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, GetMethodOutOfBaseDirMountWithBackslash) { + auto res = cli_.Get("/mount/%2e%2e%5c/www2/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, PostMethod303) { + auto res = cli_.Post("/1", "body", "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::SeeOther_303, res->status); + EXPECT_EQ("/2", res->get_header_value("Location")); +} + +TEST_F(ServerTest, PostMethod303Redirect) { + cli_.set_follow_location(true); + auto res = cli_.Post("/1", "body", "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("redirected.", res->body); + EXPECT_EQ("/2", res->location); +} + +TEST_F(ServerTest, UserDefinedMIMETypeMapping) { + auto res = cli_.Get("/dir/test.abcde"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); + EXPECT_EQ("abcde", res->body); +} + +TEST_F(ServerTest, StaticFileRange) { + auto res = cli_.Get("/dir/test.abcde", {{make_range_header({{2, 3}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); + EXPECT_EQ("2", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 2-3/5", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("cd"), res->body); +} + +TEST_F(ServerTest, StaticFileRanges) { + auto res = + cli_.Get("/dir/test.abcde", {{make_range_header({{1, 2}, {4, -1}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_TRUE( + res->get_header_value("Content-Type") + .find( + "multipart/byteranges; boundary=--cpp-httplib-multipart-data-") == + 0); + EXPECT_EQ("266", res->get_header_value("Content-Length")); +} + +TEST_F(ServerTest, StaticFileRangeHead) { + auto res = cli_.Head("/dir/test.abcde", {{make_range_header({{2, 3}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("text/abcde", res->get_header_value("Content-Type")); + EXPECT_EQ("2", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 2-3/5", res->get_header_value("Content-Range")); +} + +TEST_F(ServerTest, StaticFileRangeBigFile) { + auto res = cli_.Get("/dir/1MB.txt", {{make_range_header({{-1, 5}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("5", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 1048571-1048575/1048576", + res->get_header_value("Content-Range")); + EXPECT_EQ("LAST\n", res->body); +} + +TEST_F(ServerTest, StaticFileRangeBigFile2) { + auto res = cli_.Get("/dir/1MB.txt", {{make_range_header({{1, 4097}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("4097", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 1-4097/1048576", res->get_header_value("Content-Range")); +} + +TEST_F(ServerTest, StaticFileBigFile) { + auto res = cli_.Get("/dir/1MB.txt"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("1048576", res->get_header_value("Content-Length")); +} + +TEST_F(ServerTest, InvalidBaseDirMount) { + EXPECT_EQ(false, svr_.set_mount_point("invalid_mount_point", "./www3")); +} + +TEST_F(ServerTest, Binary) { + std::vector<char> binary{0x00, 0x01, 0x02, 0x03}; + + auto res = cli_.Post("/binary", binary.data(), binary.size(), + "application/octet-stream"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(4U, res->body.size()); + + res = cli_.Put("/binary", binary.data(), binary.size(), + "application/octet-stream"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(4U, res->body.size()); + + res = cli_.Patch("/binary", binary.data(), binary.size(), + "application/octet-stream"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(4U, res->body.size()); + + res = cli_.Delete("/binary", binary.data(), binary.size(), + "application/octet-stream"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(4U, res->body.size()); +} + +TEST_F(ServerTest, BinaryString) { + auto binary = std::string("\x00\x01\x02\x03", 4); + + auto res = cli_.Post("/binary", binary, "application/octet-stream"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(4U, res->body.size()); + + res = cli_.Put("/binary", binary, "application/octet-stream"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(4U, res->body.size()); + + res = cli_.Patch("/binary", binary, "application/octet-stream"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(4U, res->body.size()); + + res = cli_.Delete("/binary", binary, "application/octet-stream"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(4U, res->body.size()); +} + +TEST_F(ServerTest, EmptyRequest) { + auto res = cli_.Get(""); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Connection, res.error()); +} + +TEST_F(ServerTest, LongRequest) { + std::string request; + for (size_t i = 0; i < 545; i++) { + request += "/TooLongRequest"; + } + request += "OK"; + + auto res = cli_.Get(request.c_str()); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, TooLongRequest) { + std::string request; + for (size_t i = 0; i < 546; i++) { + request += "/TooLongRequest"; + } + request += "_NG"; + + auto res = cli_.Get(request.c_str()); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::UriTooLong_414, res->status); +} + +TEST_F(ServerTest, AlmostTooLongRequest) { + // test for #2046 - URI length check shouldn't include other content on req + // line URI is max URI length, minus 14 other chars in req line (GET, space, + // leading /, space, HTTP/1.1) + std::string request = + "/" + string(CPPHTTPLIB_REQUEST_URI_MAX_LENGTH - 14, 'A'); + + auto res = cli_.Get(request.c_str()); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, LongHeader) { + Request req; + req.method = "GET"; + req.path = "/hi"; + + std::string host_and_port; + host_and_port += HOST; + host_and_port += ":"; + host_and_port += std::to_string(PORT); + + req.headers.emplace("Host", host_and_port.c_str()); + req.headers.emplace("Accept", "*/*"); + req.headers.emplace("User-Agent", "cpp-httplib/0.1"); + + req.headers.emplace( + "Header-Name", + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@"); + + auto res = std::make_shared<Response>(); + auto error = Error::Success; + auto ret = cli_.send(req, *res, error); + + ASSERT_TRUE(ret); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, LongQueryValue) { + auto res = cli_.Get(LONG_QUERY_URL.c_str()); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::UriTooLong_414, res->status); +} + +TEST_F(ServerTest, TooLongQueryValue) { + auto res = cli_.Get(TOO_LONG_QUERY_URL.c_str()); + + ASSERT_FALSE(res); + EXPECT_EQ(Error::Read, res.error()); +} + +TEST_F(ServerTest, TooLongHeader) { + Request req; + req.method = "GET"; + req.path = "/hi"; + + std::string host_and_port; + host_and_port += HOST; + host_and_port += ":"; + host_and_port += std::to_string(PORT); + + req.headers.emplace("Host", host_and_port.c_str()); + req.headers.emplace("Accept", "*/*"); + req.headers.emplace("User-Agent", "cpp-httplib/0.1"); + + req.headers.emplace( + "Header-Name", + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@" + "@@@@@@@@@@@@@@@@@"); + + auto res = std::make_shared<Response>(); + auto error = Error::Success; + auto ret = cli_.send(req, *res, error); + + ASSERT_TRUE(ret); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, HeaderCountAtLimit) { + // Test with headers just under the 100 limit + httplib::Headers headers; + + // Add 95 custom headers (the client will add Host, User-Agent, Accept, etc.) + // This should keep us just under the 100 header limit + for (int i = 0; i < 95; i++) { + std::string name = "X-Test-Header-" + std::to_string(i); + std::string value = "value" + std::to_string(i); + headers.emplace(name, value); + } + + // This should work fine as we're under the limit + auto res = cli_.Get("/hi", headers); + EXPECT_TRUE(res); + if (res) { EXPECT_EQ(StatusCode::OK_200, res->status); } +} + +TEST_F(ServerTest, HeaderCountExceedsLimit) { + // Test with many headers to exceed the 100 limit + httplib::Headers headers; + + // Add 150 headers to definitely exceed the 100 limit + for (int i = 0; i < 150; i++) { + std::string name = "X-Test-Header-" + std::to_string(i); + std::string value = "value" + std::to_string(i); + headers.emplace(name, value); + } + + // This should fail due to exceeding header count limit + auto res = cli_.Get("/hi", headers); + + // The request should either fail or return 400 Bad Request + if (res) { + // If we get a response, it should be 400 Bad Request + EXPECT_EQ(StatusCode::BadRequest_400, res->status); + } else { + // Or the request should fail entirely + EXPECT_FALSE(res); + } +} + +TEST_F(ServerTest, PercentEncoding) { + auto res = cli_.Get("/e%6edwith%"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, PercentEncodingUnicode) { + auto res = cli_.Get("/e%u006edwith%"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, InvalidPercentEncoding) { + auto res = cli_.Get("/%endwith%"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, InvalidPercentEncodingUnicode) { + auto res = cli_.Get("/%uendwith%"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, EndWithPercentCharacterInQuery) { + auto res = cli_.Get("/hello?aaa=bbb%"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST_F(ServerTest, PlusSignEncoding) { + auto res = cli_.Get("/a+%2Bb?a %2bb=a %2Bb"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("a +b", res->body); +} + +TEST_F(ServerTest, HeaderCountSecurityTest) { + // This test simulates a potential DoS attack using many headers + // to verify our security fix prevents memory exhaustion + + httplib::Headers attack_headers; + + // Attempt to add many headers like an attacker would (200 headers to far + // exceed limit) + for (int i = 0; i < 200; i++) { + std::string name = "X-Attack-Header-" + std::to_string(i); + std::string value = "attack_payload_" + std::to_string(i); + attack_headers.emplace(name, value); + } + + // Try to POST with excessive headers + auto res = cli_.Post("/", attack_headers, "test_data", "text/plain"); + + // Should either fail or return 400 Bad Request due to security limit + if (res) { + // If we get a response, it should be 400 Bad Request + EXPECT_EQ(StatusCode::BadRequest_400, res->status); + } else { + // Request failed, which is the expected behavior for DoS protection + EXPECT_FALSE(res); + } +} + +TEST_F(ServerTest, MultipartFormData) { + UploadFormDataItems items = { + {"text1", "text default", "", ""}, + {"text2", "aωb", "", ""}, + {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, + {"file2", "{\n \"world\", true\n}\n", "world.json", "application/json"}, + {"file3", "", "", "application/octet-stream"}, + {"file4", "", "", " application/json tmp-string "}}; + + auto res = cli_.Post("/multipart", items); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, MultipartFormDataMultiFileValues) { + UploadFormDataItems items = { + {"text", "default text", "", ""}, + + {"multi_text1", "aaaaa", "", ""}, + {"multi_text1", "bbbbb", "", ""}, + + {"multi_file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, + {"multi_file1", "{\n \"world\", true\n}\n", "world.json", + "application/json"}, + }; + + auto res = cli_.Post("/multipart/multi_file_values", items); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, CaseInsensitiveHeaderName) { + auto res = cli_.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("content-type")); + EXPECT_EQ("Hello World!", res->body); +} + +TEST_F(ServerTest, CaseInsensitiveTransferEncoding) { + Request req; + req.method = "POST"; + req.path = "/chunked"; + + std::string host_and_port; + host_and_port += HOST; + host_and_port += ":"; + host_and_port += std::to_string(PORT); + + req.headers.emplace("Host", host_and_port.c_str()); + req.headers.emplace("Accept", "*/*"); + req.headers.emplace("User-Agent", "cpp-httplib/0.1"); + req.headers.emplace("Content-Type", "text/plain"); + req.headers.emplace("Content-Length", "0"); + req.headers.emplace( + "Transfer-Encoding", + "Chunked"); // Note, "Chunked" rather than typical "chunked". + + // Client does not chunk, so make a chunked body manually. + req.body = "4\r\ndech\r\nf\r\nunked post body\r\n0\r\n\r\n"; + + auto res = std::make_shared<Response>(); + auto error = Error::Success; + auto ret = cli_.send(req, *res, error); + + ASSERT_TRUE(ret); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, GetStreamed2) { + auto res = cli_.Get("/streamed", {{make_range_header({{2, 3}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("2", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 2-3/6", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("ab"), res->body); +} + +TEST_F(ServerTest, GetStreamed) { + auto res = cli_.Get("/streamed"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("6", res->get_header_value("Content-Length")); + EXPECT_EQ(std::string("aaabbb"), res->body); +} + +TEST_F(ServerTest, GetStreamedWithRange1) { + auto res = cli_.Get("/streamed-with-range", {{make_range_header({{3, 5}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("3", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 3-5/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("def"), res->body); +} + +TEST_F(ServerTest, GetStreamedWithRange2) { + auto res = cli_.Get("/streamed-with-range", {{make_range_header({{1, -1}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("6", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 1-6/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("bcdefg"), res->body); +} + +TEST_F(ServerTest, GetStreamedWithRangeSuffix1) { + auto res = cli_.Get("/streamed-with-range", {{"Range", "bytes=-3"}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("3", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 4-6/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("efg"), res->body); +} + +TEST_F(ServerTest, GetStreamedWithRangeSuffix2) { + auto res = cli_.Get("/streamed-with-range?error", {{"Range", "bytes=-9999"}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); + EXPECT_EQ("0", res->get_header_value("Content-Length")); + EXPECT_EQ(false, res->has_header("Content-Range")); + EXPECT_EQ(0U, res->body.size()); +} + +TEST_F(ServerTest, GetStreamedWithRangeError) { + auto res = cli_.Get("/streamed-with-range", + {{"Range", "bytes=92233720368547758079223372036854775806-" + "92233720368547758079223372036854775807"}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); + EXPECT_EQ("0", res->get_header_value("Content-Length")); + EXPECT_EQ(false, res->has_header("Content-Range")); + EXPECT_EQ(0U, res->body.size()); +} + +TEST_F(ServerTest, GetRangeWithMaxLongLength) { + auto res = cli_.Get( + "/with-range", + {{"Range", "bytes=0-" + std::to_string(std::numeric_limits<long>::max())}, + {"Accept-Encoding", ""}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("7", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 0-6/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("abcdefg"), res->body); +} + +TEST_F(ServerTest, GetRangeWithZeroToInfinite) { + auto res = cli_.Get("/with-range", { + {"Range", "bytes=0-"}, + {"Accept-Encoding", ""}, + }); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("7", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 0-6/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("abcdefg"), res->body); +} + +TEST_F(ServerTest, GetStreamedWithRangeMultipart) { + auto res = + cli_.Get("/streamed-with-range", {{make_range_header({{1, 2}, {4, 5}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("267", res->get_header_value("Content-Length")); + EXPECT_EQ(false, res->has_header("Content-Range")); + EXPECT_EQ(267U, res->body.size()); + + // Check that both range contents are present + EXPECT_TRUE(res->body.find("bc\r\n") != std::string::npos); + EXPECT_TRUE(res->body.find("ef\r\n") != std::string::npos); + + // Check that Content-Range headers are present for both ranges + EXPECT_TRUE(res->body.find("Content-Range: bytes 1-2/7") != + std::string::npos); + EXPECT_TRUE(res->body.find("Content-Range: bytes 4-5/7") != + std::string::npos); +} + +TEST_F(ServerTest, GetStreamedWithTooManyRanges) { + Ranges ranges; + for (size_t i = 0; i < CPPHTTPLIB_RANGE_MAX_COUNT + 1; i++) { + ranges.emplace_back(0, -1); + } + + auto res = + cli_.Get("/streamed-with-range?error", {{make_range_header(ranges)}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); + EXPECT_EQ("0", res->get_header_value("Content-Length")); + EXPECT_EQ(false, res->has_header("Content-Range")); + EXPECT_EQ(0U, res->body.size()); +} + +TEST_F(ServerTest, GetStreamedWithOverwrapping) { + auto res = + cli_.Get("/streamed-with-range", {{make_range_header({{1, 4}, {2, 5}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ(5U, res->body.size()); + + // Check that overlapping ranges are coalesced into a single range + EXPECT_EQ("bcdef", res->body); + EXPECT_EQ("bytes 1-5/7", res->get_header_value("Content-Range")); + + // Should be single range, not multipart + EXPECT_TRUE(res->has_header("Content-Range")); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); +} + +TEST_F(ServerTest, GetStreamedWithNonAscendingRanges) { + auto res = + cli_.Get("/streamed-with-range", {{make_range_header({{4, 5}, {0, 2}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ(268U, res->body.size()); + + // Check that both range contents are present + EXPECT_TRUE(res->body.find("ef\r\n") != std::string::npos); + EXPECT_TRUE(res->body.find("abc\r\n") != std::string::npos); + + // Check that Content-Range headers are present for both ranges + EXPECT_TRUE(res->body.find("Content-Range: bytes 4-5/7") != + std::string::npos); + EXPECT_TRUE(res->body.find("Content-Range: bytes 0-2/7") != + std::string::npos); +} + +TEST_F(ServerTest, GetStreamedWithDuplicateRanges) { + auto res = + cli_.Get("/streamed-with-range", {{make_range_header({{0, 2}, {0, 2}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ(269U, res->body.size()); + + // Check that both duplicate range contents are present + size_t first_abc = res->body.find("abc\r\n"); + EXPECT_TRUE(first_abc != std::string::npos); + size_t second_abc = res->body.find("abc\r\n", first_abc + 1); + EXPECT_TRUE(second_abc != std::string::npos); + + // Check that Content-Range headers are present for both ranges + size_t first_range = res->body.find("Content-Range: bytes 0-2/7"); + EXPECT_TRUE(first_range != std::string::npos); + size_t second_range = + res->body.find("Content-Range: bytes 0-2/7", first_range + 1); + EXPECT_TRUE(second_range != std::string::npos); +} + +TEST_F(ServerTest, GetStreamedWithRangesMoreThanTwoOverwrapping) { + auto res = cli_.Get("/streamed-with-range?error", + {{make_range_header({{0, 1}, {1, 2}, {2, 3}, {3, 4}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); + EXPECT_EQ("0", res->get_header_value("Content-Length")); + EXPECT_EQ(false, res->has_header("Content-Range")); + EXPECT_EQ(0U, res->body.size()); +} + +TEST_F(ServerTest, GetStreamedEndless) { + uint64_t offset = 0; + auto res = cli_.Get("/streamed-cancel", + [&](const char * /*data*/, uint64_t data_length) { + if (offset < 100) { + offset += data_length; + return true; + } + return false; + }); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST_F(ServerTest, ClientStop) { + std::atomic_size_t count{4}; + std::vector<std::thread> threads; + + for (auto i = count.load(); i != 0; --i) { + threads.emplace_back([&]() { + auto res = cli_.Get("/streamed-cancel", + [&](const char *, uint64_t) { return true; }); + + --count; + + ASSERT_TRUE(!res); + EXPECT_TRUE(res.error() == Error::Canceled || + res.error() == Error::Read || res.error() == Error::Write); + }); + } + + std::this_thread::sleep_for(std::chrono::seconds(2)); + while (count != 0) { + cli_.stop(); + std::this_thread::sleep_for(std::chrono::milliseconds(10)); + } + for (auto &t : threads) { + t.join(); + } +} + +TEST_F(ServerTest, GetWithRange1) { + auto res = cli_.Get("/with-range", { + make_range_header({{3, 5}}), + {"Accept-Encoding", ""}, + }); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("3", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 3-5/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("def"), res->body); +} + +TEST_F(ServerTest, GetWithRange2) { + auto res = cli_.Get("/with-range", { + make_range_header({{1, -1}}), + {"Accept-Encoding", ""}, + }); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("6", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 1-6/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("bcdefg"), res->body); +} + +TEST_F(ServerTest, GetWithRange3) { + auto res = cli_.Get("/with-range", { + make_range_header({{0, 0}}), + {"Accept-Encoding", ""}, + }); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("1", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 0-0/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("a"), res->body); +} + +TEST_F(ServerTest, GetWithRange4) { + auto res = cli_.Get("/with-range", { + make_range_header({{-1, 2}}), + {"Accept-Encoding", ""}, + }); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("2", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 5-6/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("fg"), res->body); +} + +TEST_F(ServerTest, GetWithRange5) { + auto res = cli_.Get("/with-range", { + make_range_header({{0, 5}}), + {"Accept-Encoding", ""}, + }); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("6", res->get_header_value("Content-Length")); + EXPECT_EQ(true, res->has_header("Content-Range")); + EXPECT_EQ("bytes 0-5/7", res->get_header_value("Content-Range")); + EXPECT_EQ(std::string("abcdef"), res->body); +} + +TEST_F(ServerTest, GetWithRangeOffsetGreaterThanContent) { + auto res = cli_.Get("/with-range", {{make_range_header({{10000, 20000}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); +} + +TEST_F(ServerTest, GetWithRangeMultipart) { + auto res = cli_.Get("/with-range", {{make_range_header({{1, 2}, {4, 5}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + EXPECT_EQ("267", res->get_header_value("Content-Length")); + EXPECT_EQ(false, res->has_header("Content-Range")); + EXPECT_EQ(267U, res->body.size()); +} + +TEST_F(ServerTest, GetWithRangeMultipartOffsetGreaterThanContent) { + auto res = + cli_.Get("/with-range", {{make_range_header({{-1, 2}, {10000, 30000}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status); +} + +TEST_F(ServerTest, GetWithRangeCustomizedResponse) { + auto res = cli_.Get("/with-range-customized-response", + {{make_range_header({{1, 2}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::BadRequest_400, res->status); + EXPECT_EQ(true, res->has_header("Content-Length")); + EXPECT_EQ(false, res->has_header("Content-Range")); + EXPECT_EQ(JSON_DATA, res->body); +} + +TEST_F(ServerTest, GetWithRangeMultipartCustomizedResponseMultipleRange) { + auto res = cli_.Get("/with-range-customized-response", + {{make_range_header({{1, 2}, {4, 5}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::BadRequest_400, res->status); + EXPECT_EQ(true, res->has_header("Content-Length")); + EXPECT_EQ(false, res->has_header("Content-Range")); + EXPECT_EQ(JSON_DATA, res->body); +} + +TEST_F(ServerTest, Issue1772) { + auto res = cli_.Get("/issue1772", {{make_range_header({{1000, -1}})}}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::Unauthorized_401, res->status); +} + +TEST_F(ServerTest, Issue609) { + auto res = cli_.Delete("/issue609"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(std::string("ok"), res->body); +} + +TEST_F(ServerTest, GetStreamedChunked) { + auto res = cli_.Get("/streamed-chunked"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(std::string("123456789"), res->body); +} + +TEST_F(ServerTest, GetStreamedChunked2) { + auto res = cli_.Get("/streamed-chunked2"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(std::string("123456789"), res->body); +} + +TEST_F(ServerTest, GetStreamedChunkedWithTrailer) { + auto res = cli_.Get("/streamed-chunked-with-trailer"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(std::string("123456789"), res->body); + + EXPECT_TRUE(res->has_header("Trailer")); + EXPECT_EQ(1U, res->get_header_value_count("Trailer")); + EXPECT_EQ(std::string("Dummy1, Dummy2"), res->get_header_value("Trailer")); + + // Trailers are now stored separately from headers (security fix) + EXPECT_EQ(2U, res->trailers.size()); + EXPECT_TRUE(res->has_trailer("Dummy1")); + EXPECT_TRUE(res->has_trailer("Dummy2")); + EXPECT_FALSE(res->has_trailer("Dummy3")); + EXPECT_EQ(std::string("DummyVal1"), res->get_trailer_value("Dummy1")); + EXPECT_EQ(std::string("DummyVal2"), res->get_trailer_value("Dummy2")); + + // Verify trailers are NOT in headers (security verification) + EXPECT_EQ(std::string(""), res->get_header_value("Dummy1")); + EXPECT_EQ(std::string(""), res->get_header_value("Dummy2")); +} + +TEST_F(ServerTest, LargeChunkedPost) { + Request req; + req.method = "POST"; + req.path = "/large-chunked"; + + std::string host_and_port; + host_and_port += HOST; + host_and_port += ":"; + host_and_port += std::to_string(PORT); + + req.headers.emplace("Host", host_and_port.c_str()); + req.headers.emplace("Accept", "*/*"); + req.headers.emplace("User-Agent", "cpp-httplib/0.1"); + req.headers.emplace("Content-Type", "text/plain"); + req.headers.emplace("Content-Length", "0"); + req.headers.emplace("Transfer-Encoding", "chunked"); + + std::string long_string(30 * 1024u, 'a'); + std::string chunk = "7800\r\n" + long_string + "\r\n"; + + // Attempt to make a large enough post to exceed OS buffers, to test that + // the server handles short reads if the full chunk data isn't available. + req.body = chunk + chunk + chunk + chunk + chunk + chunk + "0\r\n\r\n"; + + auto res = std::make_shared<Response>(); + auto error = Error::Success; + auto ret = cli_.send(req, *res, error); + + ASSERT_TRUE(ret); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, GetMethodRemoteAddr) { + auto res = cli_.Get("/remote_addr"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_TRUE(res->body == "::1" || res->body == "127.0.0.1"); +} + +TEST_F(ServerTest, GetMethodLocalAddr) { + auto res = cli_.Get("/local_addr"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_TRUE(res->body == std::string("::1:").append(to_string(PORT)) || + res->body == std::string("127.0.0.1:").append(to_string(PORT))); +} + +TEST_F(ServerTest, HTTPResponseSplitting) { + auto res = cli_.Get("/http_response_splitting"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, SlowRequest) { + request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); + request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); + request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); }); +} + +#if 0 +TEST_F(ServerTest, SlowPost) { + char buffer[64 * 1024]; + memset(buffer, 0x42, sizeof(buffer)); + + auto res = cli_.Post( + "/slowpost", 64 * 1024 * 1024, + [&](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + auto ret = sink.write(buffer, sizeof(buffer)); + EXPECT_TRUE(ret); + return true; + }, + "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, SlowPostFail) { + char buffer[64 * 1024]; + memset(buffer, 0x42, sizeof(buffer)); + + cli_.set_write_timeout(std::chrono::seconds(0)); + auto res = cli_.Post( + "/slowpost", 64 * 1024 * 1024, + [&](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + sink.write(buffer, sizeof(buffer)); + return true; + }, + "text/plain"); + + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Write, res.error()); +} +#endif + +TEST_F(ServerTest, Put) { + auto res = cli_.Put("/put", "PUT", "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("PUT", res->body); +} + +TEST_F(ServerTest, PutWithContentProvider) { + auto res = cli_.Put( + "/put", 3, + [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + sink.os << "PUT"; + return true; + }, + "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("PUT", res->body); +} + +TEST_F(ServerTest, PostWithContentProviderAbort) { + auto res = cli_.Post( + "/post", 42, + [](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) { + return false; + }, + "text/plain"); + + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST_F(ServerTest, PutWithContentProviderWithoutLength) { + auto res = cli_.Put( + "/put", + [](size_t /*offset*/, DataSink &sink) { + sink.os << "PUT"; + sink.done(); + return true; + }, + "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("PUT", res->body); +} + +TEST_F(ServerTest, PostWithContentProviderWithoutLengthAbort) { + auto res = cli_.Post( + "/post", [](size_t /*offset*/, DataSink & /*sink*/) { return false; }, + "text/plain"); + + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +#ifdef CPPHTTPLIB_ZLIB_SUPPORT +TEST_F(ServerTest, PutWithContentProviderWithGzip) { + cli_.set_compress(true); + auto res = cli_.Put( + "/put", 3, + [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + sink.os << "PUT"; + return true; + }, + "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("PUT", res->body); +} + +TEST_F(ServerTest, PostWithContentProviderWithGzipAbort) { + cli_.set_compress(true); + auto res = cli_.Post( + "/post", 42, + [](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) { + return false; + }, + "text/plain"); + + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST_F(ServerTest, PutWithContentProviderWithoutLengthWithGzip) { + cli_.set_compress(true); + auto res = cli_.Put( + "/put", + [](size_t /*offset*/, DataSink &sink) { + sink.os << "PUT"; + sink.done(); + return true; + }, + "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("PUT", res->body); +} + +TEST_F(ServerTest, PostWithContentProviderWithoutLengthWithGzipAbort) { + cli_.set_compress(true); + auto res = cli_.Post( + "/post", [](size_t /*offset*/, DataSink & /*sink*/) { return false; }, + "text/plain"); + + ASSERT_TRUE(!res); + EXPECT_EQ(Error::Canceled, res.error()); +} + +TEST_F(ServerTest, PutLargeFileWithGzip) { + cli_.set_compress(true); + auto res = cli_.Put("/put-large", LARGE_DATA, "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(LARGE_DATA, res->body); +} + +TEST_F(ServerTest, PutLargeFileWithGzip2) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + std::string s = std::string("https://") + HOST + ":" + std::to_string(PORT); + Client cli(s.c_str()); + cli.enable_server_certificate_verification(false); +#else + std::string s = std::string("http://") + HOST + ":" + std::to_string(PORT); + Client cli(s.c_str()); +#endif + cli.set_compress(true); + + auto res = cli.Put("/put-large", LARGE_DATA, "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(LARGE_DATA, res->body); + // The compressed size should be less than a 10th of the original. May vary + // depending on the zlib library. + EXPECT_LT(res.get_request_header_value_u64("Content-Length"), + static_cast<uint64_t>(10 * 1024 * 1024)); + EXPECT_EQ("gzip", res.get_request_header_value("Content-Encoding")); +} + +TEST_F(ServerTest, PutContentWithDeflate) { + cli_.set_compress(false); + Headers headers; + headers.emplace("Content-Encoding", "deflate"); + // PUT in deflate format: + auto res = cli_.Put("/put", headers, + "\170\234\013\010\015\001\0\001\361\0\372", "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("PUT", res->body); +} + +TEST_F(ServerTest, GetStreamedChunkedWithGzip) { + Headers headers; + headers.emplace("Accept-Encoding", "gzip, deflate"); + + auto res = cli_.Get("/streamed-chunked", headers); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(std::string("123456789"), res->body); +} + +TEST_F(ServerTest, GetStreamedChunkedWithGzip2) { + Headers headers; + headers.emplace("Accept-Encoding", "gzip, deflate"); + + auto res = cli_.Get("/streamed-chunked2", headers); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(std::string("123456789"), res->body); +} + +TEST_F(ServerTest, SplitDelimiterInPathRegex) { + auto res = cli_.Get("/regex-with-delimiter?key=^(?.*(value))"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(GzipDecompressor, ChunkedDecompression) { + std::string data; + for (size_t i = 0; i < 32 * 1024; ++i) { + data.push_back(static_cast<char>('a' + i % 26)); + } + + std::string compressed_data; + { + httplib::detail::gzip_compressor compressor; + bool result = compressor.compress( + data.data(), data.size(), + /*last=*/true, + [&](const char *compressed_data_chunk, size_t compressed_data_size) { + compressed_data.insert(compressed_data.size(), compressed_data_chunk, + compressed_data_size); + return true; + }); + ASSERT_TRUE(result); + } + + std::string decompressed_data; + { + httplib::detail::gzip_decompressor decompressor; + + // Chunk size is chosen specifically to have a decompressed chunk size equal + // to 16384 bytes 16384 bytes is the size of decompressor output buffer + size_t chunk_size = 130; + for (size_t chunk_begin = 0; chunk_begin < compressed_data.size(); + chunk_begin += chunk_size) { + size_t current_chunk_size = + std::min(compressed_data.size() - chunk_begin, chunk_size); + bool result = decompressor.decompress( + compressed_data.data() + chunk_begin, current_chunk_size, + [&](const char *decompressed_data_chunk, + size_t decompressed_data_chunk_size) { + decompressed_data.insert(decompressed_data.size(), + decompressed_data_chunk, + decompressed_data_chunk_size); + return true; + }); + ASSERT_TRUE(result); + } + } + ASSERT_EQ(data, decompressed_data); +} + +TEST(GzipDecompressor, DeflateDecompression) { + std::string original_text = "Raw deflate without gzip"; + unsigned char data[32] = {0x78, 0x9C, 0x0B, 0x4A, 0x2C, 0x57, 0x48, 0x49, + 0x4D, 0xCB, 0x49, 0x2C, 0x49, 0x55, 0x28, 0xCF, + 0x2C, 0xC9, 0xC8, 0x2F, 0x2D, 0x51, 0x48, 0xAF, + 0xCA, 0x2C, 0x00, 0x00, 0x6F, 0x98, 0x09, 0x2E}; + std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); + + std::string decompressed_data; + { + httplib::detail::gzip_decompressor decompressor; + + bool result = decompressor.decompress( + compressed_data.data(), compressed_data.size(), + [&](const char *decompressed_data_chunk, + size_t decompressed_data_chunk_size) { + decompressed_data.insert(decompressed_data.size(), + decompressed_data_chunk, + decompressed_data_chunk_size); + return true; + }); + ASSERT_TRUE(result); + } + ASSERT_EQ(original_text, decompressed_data); +} + +TEST(GzipDecompressor, DeflateDecompressionTrailingBytes) { + std::string original_text = "Raw deflate without gzip"; + unsigned char data[40] = {0x78, 0x9C, 0x0B, 0x4A, 0x2C, 0x57, 0x48, 0x49, + 0x4D, 0xCB, 0x49, 0x2C, 0x49, 0x55, 0x28, 0xCF, + 0x2C, 0xC9, 0xC8, 0x2F, 0x2D, 0x51, 0x48, 0xAF, + 0xCA, 0x2C, 0x00, 0x00, 0x6F, 0x98, 0x09, 0x2E, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; + std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); + + std::string decompressed_data; + { + httplib::detail::gzip_decompressor decompressor; + + bool result = decompressor.decompress( + compressed_data.data(), compressed_data.size(), + [&](const char *decompressed_data_chunk, + size_t decompressed_data_chunk_size) { + decompressed_data.insert(decompressed_data.size(), + decompressed_data_chunk, + decompressed_data_chunk_size); + return true; + }); + ASSERT_TRUE(result); + } + ASSERT_EQ(original_text, decompressed_data); +} + +#ifdef _WIN32 +TEST(GzipDecompressor, LargeRandomData) { + + // prepare large random data that is difficult to be compressed and is + // expected to have large size even when compressed + std::random_device seed_gen; + std::mt19937 random(seed_gen()); + constexpr auto large_size_byte = 4294967296UL; // 4GiB + constexpr auto data_size = large_size_byte + 134217728UL; // + 128MiB + std::vector<std::uint32_t> data(data_size / sizeof(std::uint32_t)); + std::generate(data.begin(), data.end(), [&]() { return random(); }); + + // compress data over 4GiB + std::string compressed_data; + compressed_data.reserve(large_size_byte + 536870912UL); // + 512MiB reserved + httplib::detail::gzip_compressor compressor; + auto result = compressor.compress(reinterpret_cast<const char *>(data.data()), + data.size() * sizeof(std::uint32_t), true, + [&](const char *data, size_t size) { + compressed_data.insert( + compressed_data.size(), data, size); + return true; + }); + ASSERT_TRUE(result); + + // FIXME: compressed data size is expected to be greater than 4GiB, + // but there is no guarantee + // ASSERT_TRUE(compressed_data.size() >= large_size_byte); + + // decompress data over 4GiB + std::string decompressed_data; + decompressed_data.reserve(data_size); + httplib::detail::gzip_decompressor decompressor; + result = decompressor.decompress( + compressed_data.data(), compressed_data.size(), + [&](const char *data, size_t size) { + decompressed_data.insert(decompressed_data.size(), data, size); + return true; + }); + ASSERT_TRUE(result); + + // compare + ASSERT_EQ(data_size, decompressed_data.size()); + ASSERT_TRUE(std::memcmp(data.data(), decompressed_data.data(), data_size) == + 0); +} +#endif +#endif + +#ifdef CPPHTTPLIB_BROTLI_SUPPORT +TEST_F(ServerTest, GetStreamedChunkedWithBrotli) { + Headers headers; + headers.emplace("Accept-Encoding", "br"); + + auto res = cli_.Get("/streamed-chunked", headers); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(std::string("123456789"), res->body); +} + +TEST_F(ServerTest, GetStreamedChunkedWithBrotli2) { + Headers headers; + headers.emplace("Accept-Encoding", "br"); + + auto res = cli_.Get("/streamed-chunked2", headers); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(std::string("123456789"), res->body); +} +#endif + +TEST_F(ServerTest, Patch) { + auto res = cli_.Patch("/patch", "PATCH", "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("PATCH", res->body); +} + +TEST_F(ServerTest, Delete) { + auto res = cli_.Delete("/delete"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("DELETE", res->body); +} + +TEST_F(ServerTest, DeleteContentReceiver) { + auto res = cli_.Delete("/delete-body", "content", "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("content", res->body); +} + +TEST_F(ServerTest, Options) { + auto res = cli_.Options("*"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("GET, POST, HEAD, OPTIONS", res->get_header_value("Allow")); + EXPECT_TRUE(res->body.empty()); +} + +TEST_F(ServerTest, URL) { + auto res = cli_.Get("/request-target?aaa=bbb&ccc=ddd"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, ArrayParam) { + auto res = cli_.Get("/array-param?array=value1&array=value2&array=value3"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, NoMultipleHeaders) { + Headers headers = {{"Content-Length", "5"}}; + auto res = cli_.Post("/validate-no-multiple-headers", headers, "hello", + "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, PostContentReceiver) { + auto res = cli_.Post("/content_receiver", "content", "text/plain"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("content", res->body); +} + +TEST_F(ServerTest, PostMultipartFileContentReceiver) { + UploadFormDataItems items = { + {"text1", "text default", "", ""}, + {"text2", "aωb", "", ""}, + {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, + {"file2", R"({\n "world": true\n}\n)", "world.json", "application/json"}, + {"file3", "", "", "application/octet-stream"}, + }; + + auto res = cli_.Post("/content_receiver", items); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, PostMultipartPlusBoundary) { + UploadFormDataItems items = { + {"text1", "text default", "", ""}, + {"text2", "aωb", "", ""}, + {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"}, + {"file2", R"({\n "world": true\n}\n)", "world.json", "application/json"}, + {"file3", "", "", "application/octet-stream"}, + }; + + auto boundary = std::string("+++++"); + + std::string body; + + for (const auto &item : items) { + body += "--" + boundary + "\r\n"; + body += "Content-Disposition: form-data; name=\"" + item.name + "\""; + if (!item.filename.empty()) { + body += "; filename=\"" + item.filename + "\""; + } + body += "\r\n"; + if (!item.content_type.empty()) { + body += "Content-Type: " + item.content_type + "\r\n"; + } + body += "\r\n"; + body += item.content + "\r\n"; + } + body += "--" + boundary + "--\r\n"; + + std::string content_type = "multipart/form-data; boundary=" + boundary; + auto res = cli_.Post("/content_receiver", body, content_type.c_str()); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, PostContentReceiverGzip) { + cli_.set_compress(true); + auto res = cli_.Post("/content_receiver", "content", "text/plain"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("content", res->body); +} + +TEST_F(ServerTest, PutContentReceiver) { + auto res = cli_.Put("/content_receiver", "content", "text/plain"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("content", res->body); +} + +TEST_F(ServerTest, PatchContentReceiver) { + auto res = cli_.Patch("/content_receiver", "content", "text/plain"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ("content", res->body); +} + +template <typename ClientType> +void TestWithHeadersAndContentReceiver( + ClientType &cli, + std::function<Result(ClientType &, const std::string &, const Headers &, + const std::string &, const std::string &, + ContentReceiver, DownloadProgress)> + request_func) { + Headers headers; + headers.emplace("X-Custom-Header", "test-value"); + + std::string received_body; + auto res = request_func( + cli, "/content_receiver", headers, "content", "application/json", + [&](const char *data, size_t data_length) { + received_body.append(data, data_length); + return true; + }, + nullptr); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("content", received_body); +} + +TEST_F(ServerTest, PostWithHeadersAndContentReceiver) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiver<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver, DownloadProgress progress) { + return cli.Post(path, headers, body, content_type, receiver, progress); + }); +} + +TEST_F(ServerTest, PutWithHeadersAndContentReceiver) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiver<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver, DownloadProgress progress) { + return cli.Put(path, headers, body, content_type, receiver, progress); + }); +} + +TEST_F(ServerTest, PatchWithHeadersAndContentReceiver) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiver<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver, DownloadProgress progress) { + return cli.Patch(path, headers, body, content_type, receiver, progress); + }); +} + +template <typename ClientType> +void TestWithHeadersAndContentReceiverWithProgress( + ClientType &cli, + std::function<Result(ClientType &, const std::string &, const Headers &, + const std::string &, const std::string &, + ContentReceiver, DownloadProgress)> + request_func) { + Headers headers; + headers.emplace("X-Test-Header", "progress-test"); + + std::string received_body; + auto progress_called = false; + + auto res = request_func( + cli, "/content_receiver", headers, "content", "text/plain", + [&](const char *data, size_t data_length) { + received_body.append(data, data_length); + return true; + }, + [&](uint64_t /*current*/, uint64_t /*total*/) { + progress_called = true; + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("content", received_body); + EXPECT_TRUE(progress_called); +} + +TEST_F(ServerTest, PostWithHeadersAndContentReceiverWithProgress) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiverWithProgress<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver, DownloadProgress progress) { + return cli.Post(path, headers, body, content_type, receiver, progress); + }); +} + +TEST_F(ServerTest, PutWithHeadersAndContentReceiverWithProgress) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiverWithProgress<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver, DownloadProgress progress) { + return cli.Put(path, headers, body, content_type, receiver, progress); + }); +} + +TEST_F(ServerTest, PatchWithHeadersAndContentReceiverWithProgress) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiverWithProgress<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver, DownloadProgress progress) { + return cli.Patch(path, headers, body, content_type, receiver, progress); + }); +} + +template <typename ClientType> +void TestWithHeadersAndContentReceiverError( + ClientType &cli, std::function<Result(ClientType &, const std::string &, + const Headers &, const std::string &, + const std::string &, ContentReceiver)> + request_func) { + Headers headers; + headers.emplace("X-Error-Test", "true"); + + std::string received_body; + auto receiver_failed = false; + + auto res = + request_func(cli, "/content_receiver", headers, "content", "text/plain", + [&](const char *data, size_t data_length) { + received_body.append(data, data_length); + receiver_failed = true; + return false; + }); + + ASSERT_FALSE(res); + EXPECT_TRUE(receiver_failed); +} + +TEST_F(ServerTest, PostWithHeadersAndContentReceiverError) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiverError<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver) { + return cli.Post(path, headers, body, content_type, receiver); + }); +} + +TEST_F(ServerTest, PuttWithHeadersAndContentReceiverError) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiverError<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver) { + return cli.Put(path, headers, body, content_type, receiver); + }); +} + +TEST_F(ServerTest, PatchWithHeadersAndContentReceiverError) { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + using ClientT = SSLClient; +#else + using ClientT = Client; +#endif + TestWithHeadersAndContentReceiverError<ClientT>( + cli_, [](ClientT &cli, const std::string &path, const Headers &headers, + const std::string &body, const std::string &content_type, + ContentReceiver receiver) { + return cli.Patch(path, headers, body, content_type, receiver); + }); +} + +TEST_F(ServerTest, PostQueryStringAndBody) { + auto res = + cli_.Post("/query-string-and-body?key=value", "content", "text/plain"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, HTTP2Magic) { + Request req; + req.method = "PRI"; + req.path = "*"; + req.body = "SM"; + + auto res = std::make_shared<Response>(); + auto error = Error::Success; + auto ret = cli_.send(req, *res, error); + + ASSERT_TRUE(ret); + EXPECT_EQ(StatusCode::BadRequest_400, res->status); +} + +TEST_F(ServerTest, KeepAlive) { + auto res = cli_.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("Hello World!", res->body); + + res = cli_.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("Hello World!", res->body); + + res = cli_.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("Hello World!", res->body); + + res = cli_.Get("/not-exist"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + + res = cli_.Post("/empty", "", "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("empty", res->body); + EXPECT_EQ("close", res->get_header_value("Connection")); + + res = cli_.Post( + "/empty", 0, [&](size_t, size_t, DataSink &) { return true; }, + "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("empty", res->body); + + cli_.set_keep_alive(false); + res = cli_.Get("/last-request"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("close", res->get_header_value("Connection")); +} + +TEST_F(ServerTest, TooManyRedirect) { + cli_.set_follow_location(true); + auto res = cli_.Get("/redirect/0"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::ExceedRedirectCount, res.error()); +} + +TEST_F(ServerTest, StartTime) { auto res = cli_.Get("/test-start-time"); } + +#ifdef CPPHTTPLIB_ZLIB_SUPPORT +TEST_F(ServerTest, Gzip) { + Headers headers; + headers.emplace("Accept-Encoding", "gzip, deflate"); + auto res = cli_.Get("/compress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("33", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, GzipWithoutAcceptEncoding) { + Headers headers; + headers.emplace("Accept-Encoding", ""); + auto res = cli_.Get("/compress", headers); + + ASSERT_TRUE(res); + EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("100", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, GzipWithContentReceiver) { + Headers headers; + headers.emplace("Accept-Encoding", "gzip, deflate"); + std::string body; + auto res = cli_.Get("/compress", headers, + [&](const char *data, uint64_t data_length) { + EXPECT_EQ(100U, data_length); + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("33", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, GzipWithoutDecompressing) { + Headers headers; + headers.emplace("Accept-Encoding", "gzip, deflate"); + + cli_.set_decompress(false); + auto res = cli_.Get("/compress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("33", res->get_header_value("Content-Length")); + EXPECT_EQ(33U, res->body.size()); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, GzipWithContentReceiverWithoutAcceptEncoding) { + Headers headers; + headers.emplace("Accept-Encoding", ""); + + std::string body; + auto res = cli_.Get("/compress", headers, + [&](const char *data, uint64_t data_length) { + EXPECT_EQ(100U, data_length); + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("100", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, NoGzip) { + Headers headers; + headers.emplace("Accept-Encoding", "gzip, deflate"); + auto res = cli_.Get("/nocompress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ(false, res->has_header("Content-Encoding")); + EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); + EXPECT_EQ("100", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, NoGzipWithContentReceiver) { + Headers headers; + headers.emplace("Accept-Encoding", "gzip, deflate"); + std::string body; + auto res = cli_.Get("/nocompress", headers, + [&](const char *data, uint64_t data_length) { + EXPECT_EQ(100U, data_length); + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(false, res->has_header("Content-Encoding")); + EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); + EXPECT_EQ("100", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, MultipartFormDataGzip) { + UploadFormDataItems items = { + {"key1", "test", "", ""}, + {"key2", "--abcdefg123", "", ""}, + }; + + cli_.set_compress(true); + auto res = cli_.Post("/compress-multipart", items); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} +#endif + +#ifdef CPPHTTPLIB_BROTLI_SUPPORT +TEST_F(ServerTest, Brotli) { + Headers headers; + headers.emplace("Accept-Encoding", "br"); + auto res = cli_.Get("/compress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ("br", res->get_header_value("Content-Encoding")); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("19", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} +#endif + +#ifdef CPPHTTPLIB_ZSTD_SUPPORT +TEST_F(ServerTest, Zstd) { + Headers headers; + headers.emplace("Accept-Encoding", "zstd"); + auto res = cli_.Get("/compress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("26", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, ZstdWithoutAcceptEncoding) { + Headers headers; + headers.emplace("Accept-Encoding", ""); + auto res = cli_.Get("/compress", headers); + + ASSERT_TRUE(res); + EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("100", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, ZstdWithContentReceiver) { + Headers headers; + headers.emplace("Accept-Encoding", "zstd"); + std::string body; + auto res = cli_.Get("/compress", headers, + [&](const char *data, uint64_t data_length) { + EXPECT_EQ(100U, data_length); + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("26", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, ZstdWithoutDecompressing) { + Headers headers; + headers.emplace("Accept-Encoding", "zstd"); + + cli_.set_decompress(false); + auto res = cli_.Get("/compress", headers); + + unsigned char compressed[26] = {0x28, 0xb5, 0x2f, 0xfd, 0x20, 0x64, 0x8d, + 0x00, 0x00, 0x50, 0x31, 0x32, 0x33, 0x34, + 0x35, 0x36, 0x37, 0x38, 0x39, 0x30, 0x01, + 0x00, 0xd7, 0xa9, 0x20, 0x01}; + + ASSERT_TRUE(res); + EXPECT_EQ("zstd", res->get_header_value("Content-Encoding")); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("26", res->get_header_value("Content-Length")); + EXPECT_EQ(StatusCode::OK_200, res->status); + ASSERT_EQ(26U, res->body.size()); + EXPECT_TRUE(std::memcmp(compressed, res->body.data(), sizeof(compressed)) == + 0); +} + +TEST_F(ServerTest, ZstdWithContentReceiverWithoutAcceptEncoding) { + Headers headers; + headers.emplace("Accept-Encoding", ""); + + std::string body; + auto res = cli_.Get("/compress", headers, + [&](const char *data, uint64_t data_length) { + EXPECT_EQ(100U, data_length); + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("100", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, NoZstd) { + Headers headers; + headers.emplace("Accept-Encoding", "zstd"); + auto res = cli_.Get("/nocompress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ(false, res->has_header("Content-Encoding")); + EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); + EXPECT_EQ("100", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + res->body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, NoZstdWithContentReceiver) { + Headers headers; + headers.emplace("Accept-Encoding", "zstd"); + std::string body; + auto res = cli_.Get("/nocompress", headers, + [&](const char *data, uint64_t data_length) { + EXPECT_EQ(100U, data_length); + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(false, res->has_header("Content-Encoding")); + EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type")); + EXPECT_EQ("100", res->get_header_value("Content-Length")); + EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456" + "7890123456789012345678901234567890", + body); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +// TODO: How to enable zstd ?? +TEST_F(ServerTest, MultipartFormDataZstd) { + UploadFormDataItems items = { + {"key1", "test", "", ""}, + {"key2", "--abcdefg123", "", ""}, + }; + Headers headers; + headers.emplace("Accept-Encoding", "zstd"); + + cli_.set_compress(true); + auto res = cli_.Post("/compress-multipart", headers, items); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(ServerTest, PutWithContentProviderWithZstd) { + Headers headers; + headers.emplace("Accept-Encoding", "zstd"); + + cli_.set_compress(true); + auto res = cli_.Put( + "/put", headers, 3, + [](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + sink.os << "PUT"; + return true; + }, + "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("PUT", res->body); +} + +// Pre-compression logging tests +TEST_F(ServerTest, PreCompressionLogging) { + // Test data for compression (matches the actual /compress endpoint content) + const std::string test_content = + "123456789012345678901234567890123456789012345678901234567890123456789012" + "3456789012345678901234567890"; + + // Variables to capture logging data + std::string pre_compression_body; + std::string pre_compression_content_type; + std::string pre_compression_content_encoding; + + std::string post_compression_body; + std::string post_compression_content_type; + std::string post_compression_content_encoding; + + // Set up pre-compression logger + svr_.set_pre_compression_logger([&](const Request & /*req*/, + const Response &res) { + pre_compression_body = res.body; + pre_compression_content_type = res.get_header_value("Content-Type"); + pre_compression_content_encoding = res.get_header_value("Content-Encoding"); + }); + + // Set up post-compression logger + svr_.set_logger([&](const Request & /*req*/, const Response &res) { + post_compression_body = res.body; + post_compression_content_type = res.get_header_value("Content-Type"); + post_compression_content_encoding = + res.get_header_value("Content-Encoding"); + }); + + // Test with gzip compression + Headers headers; + headers.emplace("Accept-Encoding", "gzip"); + + auto res = cli_.Get("/compress", headers); + + // Verify response was compressed + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); + + // Verify pre-compression logger captured uncompressed content + EXPECT_EQ(test_content, pre_compression_body); + EXPECT_EQ("text/plain", pre_compression_content_type); + EXPECT_TRUE(pre_compression_content_encoding + .empty()); // No encoding header before compression + + // Verify post-compression logger captured compressed content + EXPECT_NE(test_content, + post_compression_body); // Should be different after compression + EXPECT_EQ("text/plain", post_compression_content_type); + EXPECT_EQ("gzip", post_compression_content_encoding); + + // Verify compressed content is smaller + EXPECT_LT(post_compression_body.size(), pre_compression_body.size()); +} + +TEST_F(ServerTest, PreCompressionLoggingWithBrotli) { + const std::string test_content = + "123456789012345678901234567890123456789012345678901234567890123456789012" + "3456789012345678901234567890"; + + std::string pre_compression_body; + std::string post_compression_body; + + svr_.set_pre_compression_logger( + [&](const Request & /*req*/, const Response &res) { + pre_compression_body = res.body; + }); + + svr_.set_logger([&](const Request & /*req*/, const Response &res) { + post_compression_body = res.body; + }); + + Headers headers; + headers.emplace("Accept-Encoding", "br"); + + auto res = cli_.Get("/compress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("br", res->get_header_value("Content-Encoding")); + + // Verify pre-compression content is uncompressed + EXPECT_EQ(test_content, pre_compression_body); + + // Verify post-compression content is compressed + EXPECT_NE(test_content, post_compression_body); + EXPECT_LT(post_compression_body.size(), pre_compression_body.size()); +} + +TEST_F(ServerTest, PreCompressionLoggingWithoutCompression) { + const std::string test_content = + "123456789012345678901234567890123456789012345678901234567890123456789012" + "3456789012345678901234567890"; + + std::string pre_compression_body; + std::string post_compression_body; + + svr_.set_pre_compression_logger( + [&](const Request & /*req*/, const Response &res) { + pre_compression_body = res.body; + }); + + svr_.set_logger([&](const Request & /*req*/, const Response &res) { + post_compression_body = res.body; + }); + + // Request without compression (use /nocompress endpoint) + Headers headers; + auto res = cli_.Get("/nocompress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_TRUE(res->get_header_value("Content-Encoding").empty()); + + // Pre-compression logger should not be called when no compression is applied + EXPECT_TRUE( + pre_compression_body.empty()); // Pre-compression logger not called + EXPECT_EQ( + test_content, + post_compression_body); // Post-compression logger captures final content +} + +TEST_F(ServerTest, PreCompressionLoggingOnlyPreLogger) { + const std::string test_content = + "123456789012345678901234567890123456789012345678901234567890123456789012" + "3456789012345678901234567890"; + + std::string pre_compression_body; + bool pre_logger_called = false; + + // Set only pre-compression logger + svr_.set_pre_compression_logger( + [&](const Request & /*req*/, const Response &res) { + pre_compression_body = res.body; + pre_logger_called = true; + }); + + Headers headers; + headers.emplace("Accept-Encoding", "gzip"); + + auto res = cli_.Get("/compress", headers); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("gzip", res->get_header_value("Content-Encoding")); + + // Verify pre-compression logger was called + EXPECT_TRUE(pre_logger_called); + EXPECT_EQ(test_content, pre_compression_body); +} + +TEST(ZstdDecompressor, ChunkedDecompression) { + std::string data; + for (size_t i = 0; i < 32 * 1024; ++i) { + data.push_back(static_cast<char>('a' + i % 26)); + } + + std::string compressed_data; + { + httplib::detail::zstd_compressor compressor; + bool result = compressor.compress( + data.data(), data.size(), + /*last=*/true, + [&](const char *compressed_data_chunk, size_t compressed_data_size) { + compressed_data.insert(compressed_data.size(), compressed_data_chunk, + compressed_data_size); + return true; + }); + ASSERT_TRUE(result); + } + + std::string decompressed_data; + { + httplib::detail::zstd_decompressor decompressor; + + // Chunk size is chosen specifically to have a decompressed chunk size equal + // to 16384 bytes 16384 bytes is the size of decompressor output buffer + size_t chunk_size = 130; + for (size_t chunk_begin = 0; chunk_begin < compressed_data.size(); + chunk_begin += chunk_size) { + size_t current_chunk_size = + std::min(compressed_data.size() - chunk_begin, chunk_size); + bool result = decompressor.decompress( + compressed_data.data() + chunk_begin, current_chunk_size, + [&](const char *decompressed_data_chunk, + size_t decompressed_data_chunk_size) { + decompressed_data.insert(decompressed_data.size(), + decompressed_data_chunk, + decompressed_data_chunk_size); + return true; + }); + ASSERT_TRUE(result); + } + } + ASSERT_EQ(data, decompressed_data); +} + +TEST(ZstdDecompressor, Decompress) { + std::string original_text = "Compressed with ZSTD"; + unsigned char data[29] = {0x28, 0xb5, 0x2f, 0xfd, 0x20, 0x14, 0xa1, 0x00, + 0x00, 0x43, 0x6f, 0x6d, 0x70, 0x72, 0x65, 0x73, + 0x73, 0x65, 0x64, 0x20, 0x77, 0x69, 0x74, 0x68, + 0x20, 0x5a, 0x53, 0x54, 0x44}; + std::string compressed_data(data, data + sizeof(data) / sizeof(data[0])); + + std::string decompressed_data; + { + httplib::detail::zstd_decompressor decompressor; + + bool result = decompressor.decompress( + compressed_data.data(), compressed_data.size(), + [&](const char *decompressed_data_chunk, + size_t decompressed_data_chunk_size) { + decompressed_data.insert(decompressed_data.size(), + decompressed_data_chunk, + decompressed_data_chunk_size); + return true; + }); + ASSERT_TRUE(result); + } + ASSERT_EQ(original_text, decompressed_data); +} +#endif + +// Sends a raw request to a server listening at HOST:PORT. +static bool send_request(time_t read_timeout_sec, const std::string &req, + std::string *resp = nullptr) { + auto error = Error::Success; + + auto client_sock = detail::create_client_socket( + HOST, "", PORT, AF_UNSPEC, false, false, nullptr, + /*connection_timeout_sec=*/5, 0, + /*read_timeout_sec=*/5, 0, + /*write_timeout_sec=*/5, 0, std::string(), error); + + if (client_sock == INVALID_SOCKET) { return false; } + + auto ret = detail::process_client_socket( + client_sock, read_timeout_sec, 0, 0, 0, 0, + std::chrono::steady_clock::time_point::min(), [&](Stream &strm) { + if (req.size() != + static_cast<size_t>(strm.write(req.data(), req.size()))) { + return false; + } + + char buf[512]; + + detail::stream_line_reader line_reader(strm, buf, sizeof(buf)); + while (line_reader.getline()) { + if (resp) { *resp += line_reader.ptr(); } + } + return true; + }); + + detail::close_socket(client_sock); + + return ret; +} + +TEST(ServerRequestParsingTest, TrimWhitespaceFromHeaderValues) { + Server svr; + std::string header_value; + svr.Get("/validate-ws-in-headers", [&](const Request &req, Response &res) { + header_value = req.get_header_value("foo"); + res.set_content("ok", "text/plain"); + }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + // Only space and horizontal tab are whitespace. Make sure other whitespace- + // like characters are not treated the same - use vertical tab and escape. + const std::string req = "GET /validate-ws-in-headers HTTP/1.1\r\n" + "foo: \t \v bar \x1B\t \r\n" + "Connection: close\r\n" + "\r\n"; + + std::string res; + ASSERT_TRUE(send_request(5, req, &res)); + EXPECT_EQ(header_value, ""); + EXPECT_EQ("HTTP/1.1 400 Bad Request", res.substr(0, 24)); +} + +// Sends a raw request and verifies that there isn't a crash or exception. +static void test_raw_request(const std::string &req, + std::string *out = nullptr) { + Server svr; + svr.Get("/hi", [&](const Request & /*req*/, Response &res) { + res.set_content("ok", "text/plain"); + }); + svr.Put("/put_hi", [&](const Request & /*req*/, Response &res) { + res.set_content("ok", "text/plain"); + }); + svr.Get("/header_field_value_check", + [&](const Request & /*req*/, Response &res) { + res.set_content("ok", "text/plain"); + }); + + // Server read timeout must be longer than the client read timeout for the + // bug to reproduce, probably to force the server to process a request + // without a trailing blank line. + const time_t client_read_timeout_sec = 1; + svr.set_read_timeout(std::chrono::seconds(client_read_timeout_sec + 1)); + bool listen_thread_ok = false; + thread t = thread([&] { listen_thread_ok = svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + EXPECT_TRUE(listen_thread_ok); + }); + + svr.wait_until_ready(); + + ASSERT_TRUE(send_request(client_read_timeout_sec, req, out)); +} + +TEST(ServerRequestParsingTest, ReadHeadersRegexComplexity) { + // A certain header line causes an exception if the header property is parsed + // naively with a single regex. This occurs with libc++ but not libstdc++. + test_raw_request( + "GET /hi HTTP/1.1\r\n" + " : " + " " + " "); +} + +TEST(ServerRequestParsingTest, ReadHeadersRegexComplexity2) { + // A certain header line causes an exception if the header property *name* is + // parsed with a regular expression starting with "(.+?):" - this is a non- + // greedy matcher and requires backtracking when there are a lot of ":" + // characters. + // This occurs with libc++ but not libstdc++. + test_raw_request( + "GET /hi HTTP/1.1\r\n" + ":-:::::::::::::::::::::::::::-::::::::::::::::::::::::@-&&&&&&&&&&&" + "--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&" + "&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-:::::" + "::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-::::::::::::::::::::::::" + ":::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::" + "::::::::-:::::::::::::::::@-&&&&&&&--:::::::-::::::::::::::::::::::" + ":::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::" + "::::::::::-:::::::::::::::::@-&&&&&::::::::::::-:::::::::::::::::@-" + "&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::::::" + ":@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::" + "::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::@-&&" + "&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@" + "::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&" + "--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&" + "&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&" + "&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&" + "&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@" + "-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::" + "::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::" + ":::::@-&&&&&&&&&&&::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-::::::" + ":::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::" + "::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-" + ":::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&---&&:&" + "&&.0------------:-:::::::::::::::::::::::::::::-:::::::::::::::::@-" + "&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::::::" + ":@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::" + "::::@-&&&&&&&&&&&---&&:&&&.0------------O--------\rH PUTHTTP/1.1\r\n" + "&&&%%%"); +} + +TEST(ServerRequestParsingTest, ExcessiveWhitespaceInUnparsableHeaderLine) { + // Make sure this doesn't crash the server. + // In a previous version of the header line regex, the "\r" rendered the line + // unparsable and the regex engine repeatedly backtracked, trying to look for + // a new position where the leading white space ended and the field value + // began. + // The crash occurs with libc++ but not libstdc++. + test_raw_request("GET /hi HTTP/1.1\r\n" + "a:" + + std::string(2000, ' ') + '\r' + std::string(20, 'z') + + "\r\n" + "\r\n"); +} + +TEST(ServerRequestParsingTest, InvalidFirstChunkLengthInRequest) { + std::string out; + + test_raw_request("PUT /put_hi HTTP/1.1\r\n" + "Content-Type: text/plain\r\n" + "Transfer-Encoding: chunked\r\n" + "\r\n" + "nothex\r\n", + &out); + EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); +} + +TEST(ServerRequestParsingTest, InvalidSecondChunkLengthInRequest) { + std::string out; + + test_raw_request("PUT /put_hi HTTP/1.1\r\n" + "Content-Type: text/plain\r\n" + "Transfer-Encoding: chunked\r\n" + "\r\n" + "3\r\n" + "xyz\r\n" + "NaN\r\n", + &out); + EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); +} + +TEST(ServerRequestParsingTest, ChunkLengthTooHighInRequest) { + std::string out; + + test_raw_request("PUT /put_hi HTTP/1.1\r\n" + "Content-Type: text/plain\r\n" + "Transfer-Encoding: chunked\r\n" + "\r\n" + // Length is too large for 64 bits. + "1ffffffffffffffff\r\n" + "xyz\r\n", + &out); + EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); +} + +TEST(ServerRequestParsingTest, InvalidHeaderTextWithExtraCR) { + test_raw_request("GET /hi HTTP/1.1\r\n" + "Content-Type: text/plain\r\n\r"); +} + +TEST(ServerRequestParsingTest, InvalidSpaceInURL) { + std::string out; + test_raw_request("GET /h i HTTP/1.1\r\n\r\n", &out); + EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); +} + +TEST(ServerRequestParsingTest, InvalidFieldValueContains_CR_LF_NUL) { + std::string out; + std::string request( + "GET /header_field_value_check HTTP/1.1\r\nTest: [\r\x00\n]\r\n\r\n", 55); + test_raw_request(request, &out); + EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); +} + +TEST(ServerRequestParsingTest, InvalidFieldValueContains_LF) { + std::string out; + std::string request( + "GET /header_field_value_check HTTP/1.1\r\nTest: [\n\n\n]\r\n\r\n", 55); + test_raw_request(request, &out); + EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); +} + +TEST(ServerRequestParsingTest, InvalidFieldNameContains_PreceedingSpaces) { + std::string out; + std::string request( + "GET /header_field_value_check HTTP/1.1\r\n Test: val\r\n\r\n", 55); + test_raw_request(request, &out); + EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); +} + +TEST(ServerRequestParsingTest, EmptyFieldValue) { + std::string out; + + test_raw_request("GET /header_field_value_check HTTP/1.1\r\n" + "Test: \r\n\r\n", + &out); + EXPECT_EQ("HTTP/1.1 200 OK", out.substr(0, 15)); +} + +TEST(ServerStopTest, StopServerWithChunkedTransmission) { + Server svr; + + svr.Get("/events", [](const Request & /*req*/, Response &res) { + res.set_header("Cache-Control", "no-cache"); + res.set_chunked_content_provider( + "text/event-stream", [](size_t offset, DataSink &sink) { + std::string s = "data:"; + s += std::to_string(offset); + s += "\n\n"; + auto ret = sink.write(s.data(), s.size()); + EXPECT_TRUE(ret); + std::this_thread::sleep_for(std::chrono::seconds(1)); + return true; + }); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + svr.wait_until_ready(); + + Client client(HOST, PORT); + const Headers headers = {{"Accept", "text/event-stream"}}; + + auto get_thread = std::thread([&client, &headers]() { + auto res = client.Get( + "/events", headers, + [](const char * /*data*/, size_t /*len*/) -> bool { return true; }); + }); + auto se = detail::scope_exit([&] { + svr.stop(); + get_thread.join(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + // Give GET time to get a few messages. + std::this_thread::sleep_for(std::chrono::seconds(2)); +} + +TEST(ServerStopTest, ClientAccessAfterServerDown) { + httplib::Server svr; + svr.Post("/hi", + [&](const httplib::Request & /*req*/, httplib::Response &res) { + res.status = StatusCode::OK_200; + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + svr.wait_until_ready(); + + Client cli(HOST, PORT); + + auto res = cli.Post("/hi", "data", "text/plain"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + + res = cli.Post("/hi", "data", "text/plain"); + ASSERT_FALSE(res); +} + +TEST(ServerStopTest, ListenFailure) { + Server svr; + auto t = thread([&]() { + auto ret = svr.listen("????", PORT); + EXPECT_FALSE(ret); + }); + svr.wait_until_ready(); + svr.stop(); + t.join(); +} + +TEST(ServerStopTest, Decommision) { + Server svr; + + svr.Get("/hi", [&](const Request &, Response &res) { res.body = "hi..."; }); + + for (int i = 0; i < 4; i++) { + auto is_even = !(i % 2); + + std::thread t{[&] { + try { + std::this_thread::sleep_for(std::chrono::milliseconds(100)); + + if (is_even) { + throw std::runtime_error("Some thing that happens to go wrong."); + } + + svr.listen(HOST, PORT); + } catch (...) { svr.decommission(); } + }}; + + svr.wait_until_ready(); + + // Server is up + { + Client cli(HOST, PORT); + auto res = cli.Get("/hi"); + if (is_even) { + EXPECT_FALSE(res); + } else { + EXPECT_TRUE(res); + EXPECT_EQ("hi...", res->body); + } + } + + svr.stop(); + t.join(); + + // Server is down... + { + Client cli(HOST, PORT); + auto res = cli.Get("/hi"); + EXPECT_FALSE(res); + } + } +} + +// Helper function for string body upload progress tests +template <typename SetupHandler, typename ClientCall> +void TestStringBodyUploadProgress(SetupHandler &&setup_handler, + ClientCall &&client_call, + const string &body) { + Server svr; + setup_handler(svr); + + thread t = thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + vector<uint64_t> progress_values; + bool progress_called = false; + + auto res = + client_call(cli, body, [&](uint64_t current, uint64_t /*total*/) -> bool { + progress_values.push_back(current); + progress_called = true; + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(200, res->status); + EXPECT_TRUE(progress_called); +} + +TEST(UploadProgressTest, PostStringBodyBasic) { + TestStringBodyUploadProgress( + [](Server &svr) { + svr.Post("/test", [](const Request & /*req*/, Response &res) { + res.set_content("received", "text/plain"); + }); + }, + [](Client &cli, const string &body, UploadProgress progress_callback) { + return cli.Post("/test", body, "text/plain", progress_callback); + }, + "test data for upload progress"); +} + +TEST(UploadProgressTest, PutStringBodyBasic) { + TestStringBodyUploadProgress( + [](Server &svr) { + svr.Put("/test", [](const Request & /*req*/, Response &res) { + res.set_content("put received", "text/plain"); + }); + }, + [](Client &cli, const string &body, UploadProgress progress_callback) { + return cli.Put("/test", body, "text/plain", progress_callback); + }, + "put test data for upload progress"); +} + +TEST(UploadProgressTest, PatchStringBodyBasic) { + TestStringBodyUploadProgress( + [](Server &svr) { + svr.Patch("/test", [](const Request & /*req*/, Response &res) { + res.set_content("patch received", "text/plain"); + }); + }, + [](Client &cli, const string &body, UploadProgress progress_callback) { + return cli.Patch("/test", body, "text/plain", progress_callback); + }, + "patch test data for upload progress"); +} + +// Helper function for content provider upload progress tests +template <typename SetupHandler, typename ClientCall> +void TestContentProviderUploadProgress(SetupHandler &&setup_handler, + ClientCall &&client_call) { + Server svr; + setup_handler(svr); + + thread t = thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + }); + svr.wait_until_ready(); + + Client cli(HOST, PORT); + vector<uint64_t> progress_values; + + auto res = + client_call(cli, [&](uint64_t current, uint64_t /*total*/) -> bool { + progress_values.push_back(current); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(200, res->status); + EXPECT_FALSE(progress_values.empty()); +} + +TEST(UploadProgressTest, PostContentProviderProgress) { + TestContentProviderUploadProgress( + [](Server &svr) { + svr.Post("/test", [](const Request & /*req*/, Response &res) { + res.set_content("provider received", "text/plain"); + }); + }, + [](Client &cli, UploadProgress progress_callback) { + return cli.Post( + "/test", 10, + [](size_t /*offset*/, size_t /*length*/, DataSink &sink) -> bool { + sink.os << "test data"; + return true; + }, + "text/plain", progress_callback); + }); +} + +// Helper function for multipart upload progress tests +template <typename SetupHandler, typename ClientCall> +void TestMultipartUploadProgress(SetupHandler &&setup_handler, + ClientCall &&client_call, + const string &endpoint) { + Server svr; + setup_handler(svr); + + thread t = thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + }); + svr.wait_until_ready(); + + Client cli(HOST, PORT); + vector<uint64_t> progress_values; + + UploadFormDataItems items = { + {"field1", "value1", "", ""}, + {"field2", "longer value for progress tracking test", "", ""}, + {"file1", "file content data for upload progress", "test.txt", + "text/plain"}}; + + auto res = client_call(cli, endpoint, items, + [&](uint64_t current, uint64_t /*total*/) -> bool { + progress_values.push_back(current); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(200, res->status); + EXPECT_FALSE(progress_values.empty()); +} + +TEST(UploadProgressTest, PostMultipartProgress) { + TestMultipartUploadProgress( + [](Server &svr) { + svr.Post("/multipart", [](const Request &req, Response &res) { + EXPECT_TRUE(!req.form.files.empty() || !req.form.fields.empty()); + res.set_content("multipart received", "text/plain"); + }); + }, + [](Client &cli, const string &endpoint, const UploadFormDataItems &items, + UploadProgress progress_callback) { + return cli.Post(endpoint, items, progress_callback); + }, + "/multipart"); +} + +// Helper function for basic download progress tests +template <typename SetupHandler, typename ClientCall> +void TestBasicDownloadProgress(SetupHandler &&setup_handler, + ClientCall &&client_call, const string &endpoint, + size_t expected_content_size) { + Server svr; + setup_handler(svr); + + thread t = thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + }); + svr.wait_until_ready(); + + Client cli(HOST, PORT); + vector<uint64_t> progress_values; + + auto res = client_call(cli, endpoint, + [&](uint64_t current, uint64_t /*total*/) -> bool { + progress_values.push_back(current); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(200, res->status); + EXPECT_FALSE(progress_values.empty()); + EXPECT_EQ(expected_content_size, res->body.size()); +} + +TEST(DownloadProgressTest, GetBasic) { + TestBasicDownloadProgress( + [](Server &svr) { + svr.Get("/download", [](const Request & /*req*/, Response &res) { + string content(1000, 'D'); + res.set_content(content, "text/plain"); + }); + }, + [](Client &cli, const string &endpoint, + DownloadProgress progress_callback) { + return cli.Get(endpoint, progress_callback); + }, + "/download", 1000u); +} + +// Helper function for content receiver download progress tests +template <typename SetupHandler, typename ClientCall> +void TestContentReceiverDownloadProgress(SetupHandler &&setup_handler, + ClientCall &&client_call, + const string &endpoint, + size_t expected_content_size) { + Server svr; + setup_handler(svr); + + thread t = thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + }); + svr.wait_until_ready(); + + Client cli(HOST, PORT); + vector<uint64_t> progress_values; + string received_body; + + auto res = client_call( + cli, endpoint, + [&](const char *data, size_t data_length) -> bool { + received_body.append(data, data_length); + return true; + }, + [&](uint64_t current, uint64_t /*total*/) -> bool { + progress_values.push_back(current); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(200, res->status); + EXPECT_FALSE(progress_values.empty()); + EXPECT_EQ(expected_content_size, received_body.size()); + EXPECT_TRUE(res->body.empty()); +} + +TEST(DownloadProgressTest, GetWithContentReceiver) { + TestContentReceiverDownloadProgress( + [](Server &svr) { + svr.Get("/download-receiver", + [](const Request & /*req*/, Response &res) { + string content(2000, 'R'); + res.set_content(content, "text/plain"); + }); + }, + [](Client &cli, const string &endpoint, ContentReceiver content_receiver, + DownloadProgress progress_callback) { + return cli.Get(endpoint, content_receiver, progress_callback); + }, + "/download-receiver", 2000u); +} + +TEST(StreamingTest, NoContentLengthStreaming) { + Server svr; + + svr.Get("/stream", [](const Request & /*req*/, Response &res) { + res.set_content_provider("text/plain", [](size_t offset, DataSink &sink) { + if (offset < 6) { + sink.os << (offset < 3 ? "a" : "b"); + } else { + sink.done(); + } + return true; + }); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto listen_se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client client(HOST, PORT); + + auto get_thread = std::thread([&client]() { + std::string s; + auto res = + client.Get("/stream", [&s](const char *data, size_t len) -> bool { + s += std::string(data, len); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("aaabbb", s); + }); + auto get_se = detail::scope_exit([&] { get_thread.join(); }); + + // Give GET time to get a few messages. + std::this_thread::sleep_for(std::chrono::milliseconds(500)); +} + +TEST(MountTest, Unmount) { + Server svr; + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + svr.set_mount_point("/mount2", "./www2"); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + + res = cli.Get("/mount2/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + + svr.set_mount_point("/", "./www"); + + res = cli.Get("/dir/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + + svr.remove_mount_point("/"); + res = cli.Get("/dir/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + + svr.remove_mount_point("/mount2"); + res = cli.Get("/mount2/dir/test.html"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); +} + +TEST(MountTest, Redicect) { + Server svr; + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.set_mount_point("/", "./www"); + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + auto res = cli.Get("/dir/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + + res = cli.Get("/dir"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); + + res = cli.Get("/file"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + + res = cli.Get("/file/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + + cli.set_follow_location(true); + res = cli.Get("/dir"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(MountTest, MultibytesPathName) { + Server svr; + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.set_mount_point("/", "./www"); + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + auto res = cli.Get(u8"/日本語Dir/日本語File.txt"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(u8"日本語コンテンツ", res->body); +} + +TEST(KeepAliveTest, ReadTimeout) { + Server svr; + + svr.Get("/a", [&](const Request & /*req*/, Response &res) { + std::this_thread::sleep_for(std::chrono::seconds(2)); + res.set_content("a", "text/plain"); + }); + + svr.Get("/b", [&](const Request & /*req*/, Response &res) { + res.set_content("b", "text/plain"); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + cli.set_keep_alive(true); + cli.set_read_timeout(std::chrono::seconds(1)); + + auto resa = cli.Get("/a"); + ASSERT_FALSE(resa); + EXPECT_EQ(Error::Read, resa.error()); + + auto resb = cli.Get("/b"); + ASSERT_TRUE(resb); + EXPECT_EQ(StatusCode::OK_200, resb->status); + EXPECT_EQ("b", resb->body); +} + +TEST(KeepAliveTest, MaxCount) { + size_t keep_alive_max_count = 3; + + Server svr; + svr.set_keep_alive_max_count(keep_alive_max_count); + + svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_keep_alive(true); + + for (size_t i = 0; i < 5; i++) { + auto result = cli.Get("/hi"); + ASSERT_TRUE(result); + EXPECT_EQ(StatusCode::OK_200, result->status); + + if (i == keep_alive_max_count - 1) { + EXPECT_EQ("close", result->get_header_value("Connection")); + } else { + EXPECT_FALSE(result->has_header("Connection")); + } + } +} + +TEST(KeepAliveTest, Issue1041) { + Server svr; + svr.set_keep_alive_timeout(3); + + svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.set_keep_alive(true); + + auto result = cli.Get("/hi"); + ASSERT_TRUE(result); + EXPECT_EQ(StatusCode::OK_200, result->status); + + std::this_thread::sleep_for(std::chrono::seconds(5)); + + result = cli.Get("/hi"); + ASSERT_TRUE(result); + EXPECT_EQ(StatusCode::OK_200, result->status); +} + +TEST(KeepAliveTest, Issue1959) { + Server svr; + svr.set_keep_alive_timeout(5); + + svr.Get("/a", [&](const Request & /*req*/, Response &res) { + res.set_content("a", "text/plain"); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + if (!svr.is_running()) return; + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + cli.set_keep_alive(true); + + using namespace std::chrono; + auto start = steady_clock::now(); + + cli.Get("/a"); + + svr.stop(); + listen_thread.join(); + + auto end = steady_clock::now(); + auto elapsed = duration_cast<milliseconds>(end - start).count(); + + EXPECT_LT(elapsed, 5000); +} + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(KeepAliveTest, SSLClientReconnection) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(svr.is_valid()); + svr.set_keep_alive_timeout(1); + + svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli(HOST, PORT); + cli.enable_server_certificate_verification(false); + cli.set_keep_alive(true); + + auto result = cli.Get("/hi"); + ASSERT_TRUE(result); + EXPECT_EQ(StatusCode::OK_200, result->status); + + result = cli.Get("/hi"); + ASSERT_TRUE(result); + EXPECT_EQ(StatusCode::OK_200, result->status); + + std::this_thread::sleep_for(std::chrono::seconds(2)); + + // Recoonect + result = cli.Get("/hi"); + ASSERT_TRUE(result); + EXPECT_EQ(StatusCode::OK_200, result->status); + + result = cli.Get("/hi"); + ASSERT_TRUE(result); + EXPECT_EQ(StatusCode::OK_200, result->status); +} + +TEST(KeepAliveTest, SSLClientReconnectionPost) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(svr.is_valid()); + svr.set_keep_alive_timeout(1); + std::string content = "reconnect"; + + svr.Post("/hi", [](const httplib::Request &, httplib::Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli(HOST, PORT); + cli.enable_server_certificate_verification(false); + cli.set_keep_alive(true); + + auto result = cli.Post( + "/hi", content.size(), + [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + sink.write(content.c_str(), content.size()); + return true; + }, + "text/plain"); + ASSERT_TRUE(result); + EXPECT_EQ(200, result->status); + + std::this_thread::sleep_for(std::chrono::seconds(2)); + + // Recoonect + result = cli.Post( + "/hi", content.size(), + [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + sink.write(content.c_str(), content.size()); + return true; + }, + "text/plain"); + ASSERT_TRUE(result); + EXPECT_EQ(200, result->status); + + result = cli.Post( + "/hi", content.size(), + [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) { + sink.write(content.c_str(), content.size()); + return true; + }, + "text/plain"); + ASSERT_TRUE(result); + EXPECT_EQ(200, result->status); +} + +TEST(SNI_AutoDetectionTest, SNI_Logic) { + { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/sni", [&](const Request &req, Response &res) { + std::string expected; + if (req.ssl) { + if (const char *sni = + SSL_get_servername(req.ssl, TLSEXT_NAMETYPE_host_name)) { + expected = sni; + } + } + EXPECT_EQ(expected, req.get_param_value("expected")); + res.set_content("ok", "text/plain"); + }); + + auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + SSLClient cli("localhost", PORT); + cli.enable_server_certificate_verification(false); + auto res = cli.Get("/sni?expected=localhost"); + ASSERT_TRUE(res); + } + + { + SSLClient cli("::1", PORT); + cli.enable_server_certificate_verification(false); + auto res = cli.Get("/sni?expected="); + ASSERT_TRUE(res); + } + } +} +#endif + +TEST(ClientProblemDetectionTest, ContentProvider) { + Server svr; + + size_t content_length = 1024 * 1024; + + svr.Get("/hi", [&](const Request & /*req*/, Response &res) { + res.set_content_provider( + content_length, "text/plain", + [&](size_t offset, size_t length, DataSink &sink) { + auto out_len = std::min(length, static_cast<size_t>(1024)); + std::string out(out_len, '@'); + sink.write(out.data(), out_len); + return offset < 4096; + }, + [](bool success) { ASSERT_FALSE(success); }); + }); + + svr.Get("/empty", [&](const Request & /*req*/, Response &res) { + res.set_content_provider( + 0, "text/plain", + [&](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) -> bool { + EXPECT_TRUE(false); + return true; + }, + [](bool success) { ASSERT_FALSE(success); }); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + { + auto res = cli.Get("/hi", [&](const char * /*data*/, + size_t /*data_length*/) { return false; }); + ASSERT_FALSE(res); + } + + { + auto res = cli.Get("/empty", [&](const char * /*data*/, + size_t /*data_length*/) { return false; }); + ASSERT_TRUE(res); + } +} + +TEST(ErrorHandlerWithContentProviderTest, ErrorHandler) { + Server svr; + + svr.set_error_handler([](Request const &, Response &res) -> void { + res.set_chunked_content_provider( + "text/plain", [](std::size_t const, DataSink &sink) -> bool { + sink.os << "hello"; + sink.os << "world"; + sink.done(); + return true; + }); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::NotFound_404, res->status); + EXPECT_EQ("helloworld", res->body); +} + +TEST(LongPollingTest, ClientCloseDetection) { + Server svr; + + svr.Get("/events", [&](const Request & /*req*/, Response &res) { + res.set_chunked_content_provider( + "text/plain", [](std::size_t const, DataSink &sink) -> bool { + EXPECT_TRUE(sink.is_writable()); // the socket is alive + sink.os << "hello"; + + auto count = 10; + while (count > 0 && sink.is_writable()) { + this_thread::sleep_for(chrono::milliseconds(10)); + count--; + } + EXPECT_FALSE(sink.is_writable()); // the socket is closed + return true; + }); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + auto res = cli.Get("/events", [&](const char *data, size_t data_length) { + EXPECT_EQ("hello", string(data, data_length)); + return false; // close the socket immediately. + }); + + ASSERT_FALSE(res); +} + +TEST(GetWithParametersTest, GetWithParameters) { + Server svr; + + svr.Get("/", [&](const Request &req, Response &) { + EXPECT_EQ("world", req.get_param_value("hello")); + EXPECT_EQ("world2", req.get_param_value("hello2")); + EXPECT_EQ("world3", req.get_param_value("hello3")); + }); + + svr.Get("/params", [&](const Request &req, Response &) { + EXPECT_EQ("world", req.get_param_value("hello")); + EXPECT_EQ("world2", req.get_param_value("hello2")); + EXPECT_EQ("world3", req.get_param_value("hello3")); + }); + + svr.Get(R"(/resources/([a-z0-9\\-]+))", [&](const Request &req, Response &) { + EXPECT_EQ("resource-id", req.matches[1]); + EXPECT_EQ("foo", req.get_param_value("param1")); + EXPECT_EQ("bar", req.get_param_value("param2")); + }); + + svr.Get("/users/:id", [&](const Request &req, Response &) { + EXPECT_EQ("user-id", req.path_params.at("id")); + EXPECT_EQ("foo", req.get_param_value("param1")); + EXPECT_EQ("bar", req.get_param_value("param2")); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + + Params params; + params.emplace("hello", "world"); + params.emplace("hello2", "world2"); + params.emplace("hello3", "world3"); + auto res = cli.Get("/", params, Headers{}); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + Client cli(HOST, PORT); + + auto res = cli.Get("/params?hello=world&hello2=world2&hello3=world3"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + Client cli(HOST, PORT); + + auto res = cli.Get("/resources/resource-id?param1=foo¶m2=bar"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + } + + { + Client cli(HOST, PORT); + + auto res = cli.Get("/users/user-id?param1=foo¶m2=bar"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + } +} + +TEST(GetWithParametersTest, GetWithParameters2) { + Server svr; + + svr.Get("/", [&](const Request &req, Response &res) { + auto text = req.get_param_value("hello"); + res.set_content(text, "text/plain"); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + Params params; + params.emplace("hello", "world"); + + std::string body; + auto res = cli.Get("/", params, Headers{}, + [&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("world", body); +} + +TEST(ClientDefaultHeadersTest, DefaultHeaders_Online) { +#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN + auto host = "httpbin.org"; + auto path = std::string{"/range/32"}; +#else + auto host = "nghttp2.org"; + auto path = std::string{"/httpbin/range/32"}; +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli(host); +#else + Client cli(host); +#endif + + cli.set_default_headers({make_range_header({{1, 10}})}); + cli.set_connection_timeout(5); + + { + auto res = cli.Get(path); + ASSERT_TRUE(res); + EXPECT_EQ("bcdefghijk", res->body); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + } + + { + auto res = cli.Get(path); + ASSERT_TRUE(res); + EXPECT_EQ("bcdefghijk", res->body); + EXPECT_EQ(StatusCode::PartialContent_206, res->status); + } +} + +TEST(ServerDefaultHeadersTest, DefaultHeaders) { + Server svr; + svr.set_default_headers({{"Hello", "World"}}); + + svr.Get("/", [&](const Request & /*req*/, Response &res) { + res.set_content("ok", "text/plain"); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli("localhost", PORT); + + auto res = cli.Get("/"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("ok", res->body); + EXPECT_EQ("World", res->get_header_value("Hello")); +} + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(KeepAliveTest, ReadTimeoutSSL) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/a", [&](const Request & /*req*/, Response &res) { + std::this_thread::sleep_for(std::chrono::seconds(2)); + res.set_content("a", "text/plain"); + }); + + svr.Get("/b", [&](const Request & /*req*/, Response &res) { + res.set_content("b", "text/plain"); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli("localhost", PORT); + cli.enable_server_certificate_verification(false); + cli.set_keep_alive(true); + cli.set_read_timeout(std::chrono::seconds(1)); + + auto resa = cli.Get("/a"); + ASSERT_TRUE(!resa); + EXPECT_EQ(Error::Read, resa.error()); + + auto resb = cli.Get("/b"); + ASSERT_TRUE(resb); + EXPECT_EQ(StatusCode::OK_200, resb->status); + EXPECT_EQ("b", resb->body); +} +#endif + +class ServerTestWithAI_PASSIVE : public ::testing::Test { +protected: + ServerTestWithAI_PASSIVE() + : cli_(HOST, PORT) +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + , + svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) +#endif + { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + cli_.enable_server_certificate_verification(false); +#endif + } + + virtual void SetUp() { + svr_.Get("/hi", [&](const Request & /*req*/, Response &res) { + res.set_content("Hello World!", "text/plain"); + }); + + t_ = thread( + [&]() { ASSERT_TRUE(svr_.listen(std::string(), PORT, AI_PASSIVE)); }); + + svr_.wait_until_ready(); + } + + virtual void TearDown() { + svr_.stop(); + t_.join(); + } + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli_; + SSLServer svr_; +#else + Client cli_; + Server svr_; +#endif + thread t_; +}; + +TEST_F(ServerTestWithAI_PASSIVE, GetMethod200) { + auto res = cli_.Get("/hi"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("text/plain", res->get_header_value("Content-Type")); + EXPECT_EQ("Hello World!", res->body); +} + +class ServerUpDownTest : public ::testing::Test { +protected: + ServerUpDownTest() : cli_(HOST, PORT) {} + + virtual void SetUp() { + t_ = thread([&]() { + svr_.bind_to_any_port(HOST); + std::this_thread::sleep_for(std::chrono::milliseconds(500)); + ASSERT_TRUE(svr_.listen_after_bind()); + }); + + svr_.wait_until_ready(); + } + + virtual void TearDown() { + svr_.stop(); + t_.join(); + } + + Client cli_; + Server svr_; + thread t_; +}; + +TEST_F(ServerUpDownTest, QuickStartStop) { + // Should not crash, especially when run with + // --gtest_filter=ServerUpDownTest.QuickStartStop --gtest_repeat=1000 +} + +class PayloadMaxLengthTest : public ::testing::Test { +protected: + PayloadMaxLengthTest() + : cli_(HOST, PORT) +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + , + svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) +#endif + { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + cli_.enable_server_certificate_verification(false); +#endif + } + + virtual void SetUp() { + svr_.set_payload_max_length(8); + + svr_.Post("/test", [&](const Request & /*req*/, Response &res) { + res.set_content("test", "text/plain"); + }); + + t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); + + svr_.wait_until_ready(); + } + + virtual void TearDown() { + svr_.stop(); + t_.join(); + } + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli_; + SSLServer svr_; +#else + Client cli_; + Server svr_; +#endif + thread t_; +}; + +TEST_F(PayloadMaxLengthTest, ExceedLimit) { + auto res = cli_.Post("/test", "123456789", "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); + + res = cli_.Post("/test", "12345678", "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(PayloadMaxLengthTest, ChunkedEncodingSecurityTest) { + // Test chunked encoding with payload exceeding the 8-byte limit + std::string large_chunked_data(16, 'A'); // 16 bytes, exceeds 8-byte limit + + auto res = cli_.Post("/test", large_chunked_data, "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); +} + +TEST_F(PayloadMaxLengthTest, ChunkedEncodingWithinLimit) { + // Test chunked encoding with payload within the 8-byte limit + std::string small_chunked_data(4, 'B'); // 4 bytes, within 8-byte limit + + auto res = cli_.Post("/test", small_chunked_data, "text/plain"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(PayloadMaxLengthTest, RawSocketChunkedTest) { + // Test using send_request to send chunked data exceeding payload limit + std::string chunked_request = "POST /test HTTP/1.1\r\n" + "Host: " + + std::string(HOST) + ":" + std::to_string(PORT) + + "\r\n" + "Transfer-Encoding: chunked\r\n" + "Connection: close\r\n" + "\r\n" + "a\r\n" // 10 bytes chunk (exceeds 8-byte limit) + "0123456789\r\n" + "0\r\n" // End chunk + "\r\n"; + + std::string response; + bool result = send_request(1, chunked_request, &response); + + if (!result) { + // If send_request fails, it might be because the server closed the + // connection due to payload limit enforcement, which is acceptable + SUCCEED() + << "Server rejected oversized chunked request (connection closed)"; + } else { + // If we got a response, check if it's an error response or connection was + // closed early Short response length indicates connection was closed due to + // payload limit + if (response.length() <= 10) { + SUCCEED() << "Server closed connection for oversized chunked request"; + } else { + // Check for error status codes + EXPECT_TRUE(response.find("413") != std::string::npos || + response.find("Payload Too Large") != std::string::npos || + response.find("400") != std::string::npos); + } + } +} + +TEST_F(PayloadMaxLengthTest, NoContentLengthPayloadLimit) { + // Test request without Content-Length header exceeding payload limit + std::string request_without_content_length = "POST /test HTTP/1.1\r\n" + "Host: " + + std::string(HOST) + ":" + + std::to_string(PORT) + + "\r\n" + "Connection: close\r\n" + "\r\n"; + + // Add payload exceeding the 8-byte limit + std::string large_payload(16, 'X'); // 16 bytes, exceeds 8-byte limit + request_without_content_length += large_payload; + + std::string response; + bool result = send_request(1, request_without_content_length, &response); + + if (!result) { + // If send_request fails, server likely closed connection due to payload + // limit + SUCCEED() << "Server rejected oversized request without Content-Length " + "(connection closed)"; + } else { + // Check if server responded with error or closed connection early + if (response.length() <= 10) { + SUCCEED() << "Server closed connection for oversized request without " + "Content-Length"; + } else { + // Check for error status codes + EXPECT_TRUE(response.find("413") != std::string::npos || + response.find("Payload Too Large") != std::string::npos || + response.find("400") != std::string::npos); + } + } +} + +TEST_F(PayloadMaxLengthTest, NoContentLengthWithinLimit) { + // Test request without Content-Length header within payload limit + std::string request_without_content_length = "POST /test HTTP/1.1\r\n" + "Host: " + + std::string(HOST) + ":" + + std::to_string(PORT) + + "\r\n" + "Connection: close\r\n" + "\r\n"; + + // Add payload within the 8-byte limit + std::string small_payload(4, 'Y'); // 4 bytes, within 8-byte limit + request_without_content_length += small_payload; + + std::string response; + bool result = send_request(1, request_without_content_length, &response); + + // For requests without Content-Length, the server may have different behavior + // The key is that it should not reject due to payload limit for small + // payloads + if (result) { + // Check for any HTTP response (success or error, but not connection closed) + if (response.length() > 10) { + SUCCEED() + << "Server processed request without Content-Length within limit"; + } else { + // Short response might indicate connection closed, which is acceptable + SUCCEED() << "Server closed connection for request without " + "Content-Length (acceptable behavior)"; + } + } else { + // Connection failure might be due to protocol requirements + SUCCEED() << "Connection issue with request without Content-Length " + "(environment-specific)"; + } +} + +class LargePayloadMaxLengthTest : public ::testing::Test { +protected: + LargePayloadMaxLengthTest() + : cli_(HOST, PORT) +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + , + svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE) +#endif + { +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + cli_.enable_server_certificate_verification(false); +#endif + } + + virtual void SetUp() { + // Set 10MB payload limit + const size_t LARGE_PAYLOAD_LIMIT = 10 * 1024 * 1024; // 10MB + svr_.set_payload_max_length(LARGE_PAYLOAD_LIMIT); + + svr_.Post("/test", [&](const Request & /*req*/, Response &res) { + res.set_content("Large payload test", "text/plain"); + }); + + t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); }); + svr_.wait_until_ready(); + } + + virtual void TearDown() { + svr_.stop(); + t_.join(); + } + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT + SSLClient cli_; + SSLServer svr_; +#else + Client cli_; + Server svr_; +#endif + thread t_; +}; + +TEST_F(LargePayloadMaxLengthTest, ChunkedEncodingWithin10MB) { + // Test chunked encoding with payload within 10MB limit + std::string medium_payload(5 * 1024 * 1024, + 'A'); // 5MB payload, within 10MB limit + + auto res = cli_.Post("/test", medium_payload, "application/octet-stream"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST_F(LargePayloadMaxLengthTest, ChunkedEncodingExceeds10MB) { + // Test chunked encoding with payload exceeding 10MB limit + std::string large_payload(12 * 1024 * 1024, + 'B'); // 12MB payload, exceeds 10MB limit + + auto res = cli_.Post("/test", large_payload, "application/octet-stream"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status); +} + +TEST_F(LargePayloadMaxLengthTest, NoContentLengthWithin10MB) { + // Test request without Content-Length header within 10MB limit + std::string request_without_content_length = "POST /test HTTP/1.1\r\n" + "Host: " + + std::string(HOST) + ":" + + std::to_string(PORT) + + "\r\n" + "Connection: close\r\n" + "\r\n"; + + // Add 1MB payload (within 10MB limit) + std::string medium_payload(1024 * 1024, 'C'); // 1MB payload + request_without_content_length += medium_payload; + + std::string response; + bool result = send_request(5, request_without_content_length, &response); + + if (result) { + // Should get a proper HTTP response for payloads within limit + if (response.length() > 10) { + SUCCEED() << "Server processed 1MB request without Content-Length within " + "10MB limit"; + } else { + SUCCEED() << "Server closed connection (acceptable behavior for no " + "Content-Length)"; + } + } else { + SUCCEED() << "Connection issue with 1MB payload (environment-specific)"; + } +} + +TEST_F(LargePayloadMaxLengthTest, NoContentLengthExceeds10MB) { + // Test request without Content-Length header exceeding 10MB limit + std::string request_without_content_length = "POST /test HTTP/1.1\r\n" + "Host: " + + std::string(HOST) + ":" + + std::to_string(PORT) + + "\r\n" + "Connection: close\r\n" + "\r\n"; + + // Add 12MB payload (exceeds 10MB limit) + std::string large_payload(12 * 1024 * 1024, 'D'); // 12MB payload + request_without_content_length += large_payload; + + std::string response; + bool result = send_request(10, request_without_content_length, &response); + + if (!result) { + // Server should close connection due to payload limit + SUCCEED() << "Server rejected 12MB request without Content-Length " + "(connection closed)"; + } else { + // Check for error response + if (response.length() <= 10) { + SUCCEED() + << "Server closed connection for 12MB request exceeding 10MB limit"; + } else { + EXPECT_TRUE(response.find("413") != std::string::npos || + response.find("Payload Too Large") != std::string::npos || + response.find("400") != std::string::npos); + } + } +} + +TEST(HostAndPortPropertiesTest, NoSSL) { + httplib::Client cli("www.google.com", 1234); + ASSERT_EQ("www.google.com", cli.host()); + ASSERT_EQ(1234, cli.port()); +} + +TEST(HostAndPortPropertiesTest, NoSSLWithSimpleAPI) { + httplib::Client cli("www.google.com:1234"); + ASSERT_EQ("www.google.com", cli.host()); + ASSERT_EQ(1234, cli.port()); +} + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(HostAndPortPropertiesTest, SSL) { + httplib::SSLClient cli("www.google.com"); + ASSERT_EQ("www.google.com", cli.host()); + ASSERT_EQ(443, cli.port()); +} +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(SSLClientTest, UpdateCAStore) { + httplib::SSLClient httplib_client("www.google.com"); + auto ca_store_1 = X509_STORE_new(); + X509_STORE_load_locations(ca_store_1, "/etc/ssl/certs/ca-certificates.crt", + nullptr); + httplib_client.set_ca_cert_store(ca_store_1); + + auto ca_store_2 = X509_STORE_new(); + X509_STORE_load_locations(ca_store_2, "/etc/ssl/certs/ca-certificates.crt", + nullptr); + httplib_client.set_ca_cert_store(ca_store_2); +} + +TEST(SSLClientTest, ServerNameIndication_Online) { +#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN + auto host = "httpbin.org"; + auto path = std::string{"/get"}; +#else + auto host = "nghttp2.org"; + auto path = std::string{"/httpbin/get"}; +#endif + + SSLClient cli(host, 443); + auto res = cli.Get(path); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +TEST(SSLClientTest, ServerCertificateVerificationError_Online) { + // Use a site that will cause SSL verification failure due to self-signed cert + SSLClient cli("self-signed.badssl.com", 443); + cli.enable_server_certificate_verification(true); + auto res = cli.Get("/"); + + ASSERT_TRUE(!res); + EXPECT_EQ(Error::SSLServerVerification, res.error()); + + // For SSL server verification errors, ssl_error should be 0, only + // ssl_openssl_error should be set + EXPECT_EQ(0, res.ssl_error()); + + // Verify OpenSSL error is captured for SSLServerVerification + // This occurs when SSL_get_verify_result() returns a verification failure + EXPECT_EQ(static_cast<unsigned long>(X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT), + res.ssl_openssl_error()); +} + +TEST(SSLClientTest, ServerHostnameVerificationError_Online) { + // Use a site where hostname doesn't match the certificate + // badssl.com provides wrong.host.badssl.com which has cert for *.badssl.com + SSLClient cli("wrong.host.badssl.com", 443); + cli.enable_server_certificate_verification(true); + cli.enable_server_hostname_verification(true); + + auto res = cli.Get("/"); + ASSERT_TRUE(!res); + + EXPECT_EQ(Error::SSLServerHostnameVerification, res.error()); + + // For SSL hostname verification errors, ssl_error should be 0, only + // ssl_openssl_error should be set + EXPECT_EQ(0, res.ssl_error()); + + // Verify OpenSSL error is captured for SSLServerHostnameVerification + // This occurs when verify_host() fails due to hostname mismatch + EXPECT_EQ(static_cast<unsigned long>(X509_V_ERR_HOSTNAME_MISMATCH), + res.ssl_openssl_error()); +} + +TEST(SSLClientTest, ServerCertificateVerification1_Online) { + Client cli("https://google.com"); + auto res = cli.Get("/"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); +} + +TEST(SSLClientTest, ServerCertificateVerification2_Online) { + SSLClient cli("google.com"); + cli.set_ca_cert_path(CA_CERT_FILE); + auto res = cli.Get("/"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); +} + +TEST(SSLClientTest, ServerCertificateVerification3_Online) { + SSLClient cli("google.com"); + cli.enable_server_certificate_verification(true); + cli.set_ca_cert_path("hello"); + + auto res = cli.Get("/"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::SSLLoadingCerts, res.error()); + + // For SSL_CTX operations, ssl_error should be 0, only ssl_openssl_error + // should be set + EXPECT_EQ(0, res.ssl_error()); + + // Verify OpenSSL error is captured for SSLLoadingCerts + // This error occurs when SSL_CTX_load_verify_locations() fails + // > openssl errstr 0x80000002 + // error:80000002:system library::No such file or directory + // > openssl errstr 0xA000126 + // error:0A000126:SSL routines::unexpected eof while reading + EXPECT_TRUE(res.ssl_openssl_error() == 0x80000002 || + res.ssl_openssl_error() == 0xA000126); +} + +TEST(SSLClientTest, ServerCertificateVerification4) { + SSLServer svr(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/test", [&](const Request &, Response &res) { + res.set_content("test", "text/plain"); + svr.stop(); + ASSERT_TRUE(true); + }); + + thread t = thread([&]() { ASSERT_TRUE(svr.listen("127.0.0.1", PORT)); }); + auto se = detail::scope_exit([&] { + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli("127.0.0.1", PORT); + cli.set_ca_cert_path(SERVER_CERT2_FILE); + cli.enable_server_certificate_verification(true); + cli.set_connection_timeout(30); + + auto res = cli.Get("/test"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +TEST(SSLClientTest, ServerCertificateVerification5_Online) { + std::string cert; + read_file(CA_CERT_FILE, cert); + + SSLClient cli("google.com"); + cli.load_ca_cert_store(cert.data(), cert.size()); + const auto res = cli.Get("/"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); +} + +TEST(SSLClientTest, ServerCertificateVerification6_Online) { + // clang-format off + static constexpr char cert[] = + "GlobalSign Root CA\n" + "==================\n" + "-----BEGIN CERTIFICATE-----\n" + "MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUx\n" + "GTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jvb3QgQ0ExGzAZBgNVBAMTEkds\n" + "b2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAwMDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNV\n" + "BAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYD\n" + "VQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDa\n" + "DuaZjc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavpxy0Sy6sc\n" + "THAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp1Wrjsok6Vjk4bwY8iGlb\n" + "Kk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdGsnUOhugZitVtbNV4FpWi6cgKOOvyJBNP\n" + "c1STE4U6G7weNLWLBYy5d4ux2x8gkasJU26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrX\n" + "gzT/LCrBbBlDSgeF59N89iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV\n" + "HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0BAQUF\n" + "AAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOzyj1hTdNGCbM+w6Dj\n" + "Y1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE38NflNUVyRRBnMRddWQVDf9VMOyG\n" + "j/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymPAbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhH\n" + "hm4qxFYxldBniYUr+WymXUadDKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveC\n" + "X4XSQRjbgbMEHMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A==\n" + "-----END CERTIFICATE-----\n"; + // clang-format on + + SSLClient cli("google.com"); + cli.load_ca_cert_store(cert, sizeof(cert)); + const auto res = cli.Get("/"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::MovedPermanently_301, res->status); +} + +TEST(SSLClientTest, WildcardHostNameMatch_Online) { + SSLClient cli("www.youtube.com"); + + cli.set_ca_cert_path(CA_CERT_FILE); + cli.enable_server_certificate_verification(true); + cli.set_follow_location(true); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +TEST(SSLClientTest, Issue2004_Online) { + Client client("https://google.com"); + client.set_follow_location(true); + + auto res = client.Get("/"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + + auto body = res->body; + EXPECT_EQ(body.substr(0, 15), "<!doctype html>"); +} + +#if 0 +TEST(SSLClientTest, SetInterfaceWithINET6) { + auto cli = std::make_shared<httplib::Client>("https://httpbin.org"); + ASSERT_TRUE(cli != nullptr); + + cli->set_address_family(AF_INET6); + cli->set_interface("en0"); + + auto res = cli->Get("/get"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} +#endif + +void ClientCertPresent( + const std::string &client_cert_file, + const std::string &client_private_key_file, + const std::string &client_encrypted_private_key_pass = std::string()) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, + CLIENT_CA_CERT_DIR); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/test", [&](const Request &req, Response &res) { + res.set_content("test", "text/plain"); + + auto peer_cert = SSL_get_peer_certificate(req.ssl); + ASSERT_TRUE(peer_cert != nullptr); + + auto subject_name = X509_get_subject_name(peer_cert); + ASSERT_TRUE(subject_name != nullptr); + + std::string common_name; + { + char name[BUFSIZ]; + auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName, + name, sizeof(name)); + common_name.assign(name, static_cast<size_t>(name_len)); + } + + EXPECT_EQ("Common Name", common_name); + + X509_free(peer_cert); + }); + + thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli(HOST, PORT, client_cert_file, client_private_key_file, + client_encrypted_private_key_pass); + cli.enable_server_certificate_verification(false); + cli.set_connection_timeout(30); + + auto res = cli.Get("/test"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +TEST(SSLClientServerTest, ClientCertPresent) { + ClientCertPresent(CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); +} + +TEST(SSLClientServerTest, ClientEncryptedCertPresent) { + ClientCertPresent(CLIENT_ENCRYPTED_CERT_FILE, + CLIENT_ENCRYPTED_PRIVATE_KEY_FILE, + CLIENT_ENCRYPTED_PRIVATE_KEY_PASS); +} + +#if !defined(_WIN32) || defined(OPENSSL_USE_APPLINK) +void MemoryClientCertPresent( + const std::string &client_cert_file, + const std::string &client_private_key_file, + const std::string &client_encrypted_private_key_pass = std::string()) { + auto f = fopen(SERVER_CERT_FILE, "r+"); + auto server_cert = PEM_read_X509(f, nullptr, nullptr, nullptr); + fclose(f); + + f = fopen(SERVER_PRIVATE_KEY_FILE, "r+"); + auto server_private_key = PEM_read_PrivateKey(f, nullptr, nullptr, nullptr); + fclose(f); + + f = fopen(CLIENT_CA_CERT_FILE, "r+"); + auto client_cert = PEM_read_X509(f, nullptr, nullptr, nullptr); + auto client_ca_cert_store = X509_STORE_new(); + X509_STORE_add_cert(client_ca_cert_store, client_cert); + X509_free(client_cert); + fclose(f); + + f = fopen(client_cert_file.c_str(), "r+"); + client_cert = PEM_read_X509(f, nullptr, nullptr, nullptr); + fclose(f); + + f = fopen(client_private_key_file.c_str(), "r+"); + auto client_private_key = PEM_read_PrivateKey( + f, nullptr, nullptr, (void *)client_encrypted_private_key_pass.c_str()); + fclose(f); + + SSLServer svr(server_cert, server_private_key, client_ca_cert_store); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/test", [&](const Request &req, Response &res) { + res.set_content("test", "text/plain"); + + auto peer_cert = SSL_get_peer_certificate(req.ssl); + ASSERT_TRUE(peer_cert != nullptr); + + auto subject_name = X509_get_subject_name(peer_cert); + ASSERT_TRUE(subject_name != nullptr); + + std::string common_name; + { + char name[BUFSIZ]; + auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName, + name, sizeof(name)); + common_name.assign(name, static_cast<size_t>(name_len)); + } + + EXPECT_EQ("Common Name", common_name); + + X509_free(peer_cert); + }); + + thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli(HOST, PORT, client_cert, client_private_key, + client_encrypted_private_key_pass); + cli.enable_server_certificate_verification(false); + cli.set_connection_timeout(30); + + auto res = cli.Get("/test"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + + X509_free(server_cert); + EVP_PKEY_free(server_private_key); + X509_free(client_cert); + EVP_PKEY_free(client_private_key); +} + +TEST(SSLClientServerTest, MemoryClientCertPresent) { + MemoryClientCertPresent(CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); +} + +TEST(SSLClientServerTest, MemoryClientEncryptedCertPresent) { + MemoryClientCertPresent(CLIENT_ENCRYPTED_CERT_FILE, + CLIENT_ENCRYPTED_PRIVATE_KEY_FILE, + CLIENT_ENCRYPTED_PRIVATE_KEY_PASS); +} +#endif + +TEST(SSLClientServerTest, ClientCertMissing) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE, + CLIENT_CA_CERT_DIR); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/test", [&](const Request &, Response &) { ASSERT_TRUE(false); }); + + thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli(HOST, PORT); + cli.set_connection_timeout(30); + + auto res = cli.Get("/test"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::SSLServerVerification, res.error()); + + // For SSL server verification errors, ssl_error should be 0, only + // ssl_openssl_error should be set + EXPECT_EQ(0, res.ssl_error()); + + // Verify OpenSSL error is captured for SSLServerVerification + // Note: This test may have different error codes depending on the exact + // verification failure + EXPECT_NE(0UL, res.ssl_openssl_error()); +} + +TEST(SSLClientServerTest, TrustDirOptional) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/test", [&](const Request &, Response &res) { + res.set_content("test", "text/plain"); + }); + + thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); + cli.enable_server_certificate_verification(false); + cli.set_connection_timeout(30); + + auto res = cli.Get("/test"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +TEST(SSLClientServerTest, SSLConnectTimeout) { + class NoListenSSLServer : public SSLServer { + public: + NoListenSSLServer(const char *cert_path, const char *private_key_path, + const char *client_ca_cert_file_path, + const char *client_ca_cert_dir_path = nullptr) + : SSLServer(cert_path, private_key_path, client_ca_cert_file_path, + client_ca_cert_dir_path), + stop_(false) {} + + std::atomic_bool stop_; + + private: + bool process_and_close_socket(socket_t /*sock*/) override { + // Don't create SSL context + while (!stop_.load()) { + std::this_thread::sleep_for(std::chrono::milliseconds(100)); + } + return true; + } + }; + NoListenSSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, + CLIENT_CA_CERT_FILE); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/test", [&](const Request &, Response &res) { + res.set_content("test", "text/plain"); + }); + + thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); + auto se = detail::scope_exit([&] { + svr.stop_ = true; + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); + cli.enable_server_certificate_verification(false); + cli.set_connection_timeout(1); + + auto res = cli.Get("/test"); + ASSERT_TRUE(!res); + EXPECT_EQ(Error::SSLConnection, res.error()); + EXPECT_EQ(SSL_ERROR_WANT_READ, res.ssl_error()); +} + +TEST(SSLClientServerTest, CustomizeServerSSLCtx) { + auto setup_ssl_ctx_callback = [](SSL_CTX &ssl_ctx) { + SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_COMPRESSION); + SSL_CTX_set_options(&ssl_ctx, + SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION); + SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_SSLv2); + SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_SSLv3); + SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_TLSv1); + SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_TLSv1_1); + auto ciphers = "ECDHE-RSA-AES128-SHA256:" + "ECDHE-DSS-AES128-SHA256:" + "ECDHE-RSA-AES256-SHA256:" + "ECDHE-DSS-AES256-SHA256:"; + SSL_CTX_set_cipher_list(&ssl_ctx, ciphers); + if (SSL_CTX_use_certificate_chain_file(&ssl_ctx, SERVER_CERT_FILE) != 1 || + SSL_CTX_use_PrivateKey_file(&ssl_ctx, SERVER_PRIVATE_KEY_FILE, + SSL_FILETYPE_PEM) != 1) { + return false; + } + SSL_CTX_load_verify_locations(&ssl_ctx, CLIENT_CA_CERT_FILE, + CLIENT_CA_CERT_DIR); + SSL_CTX_set_verify( + &ssl_ctx, + SSL_VERIFY_PEER | + SSL_VERIFY_FAIL_IF_NO_PEER_CERT, // SSL_VERIFY_CLIENT_ONCE, + nullptr); + return true; + }; + + SSLServer svr(setup_ssl_ctx_callback); + ASSERT_TRUE(svr.is_valid()); + + svr.Get("/test", [&](const Request &req, Response &res) { + res.set_content("test", "text/plain"); + + auto peer_cert = SSL_get_peer_certificate(req.ssl); + ASSERT_TRUE(peer_cert != nullptr); + + auto subject_name = X509_get_subject_name(peer_cert); + ASSERT_TRUE(subject_name != nullptr); + + std::string common_name; + { + char name[BUFSIZ]; + auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName, + name, sizeof(name)); + common_name.assign(name, static_cast<size_t>(name_len)); + } + + EXPECT_EQ("Common Name", common_name); + + X509_free(peer_cert); + }); + + thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE); + cli.enable_server_certificate_verification(false); + cli.set_connection_timeout(30); + + auto res = cli.Get("/test"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +// Disabled due to the out-of-memory problem on GitHub Actions Workflows +TEST(SSLClientServerTest, DISABLED_LargeDataTransfer) { + + // prepare large data + std::random_device seed_gen; + std::mt19937 random(seed_gen()); + constexpr auto large_size_byte = 2147483648UL + 1048576UL; // 2GiB + 1MiB + std::vector<std::uint32_t> binary(large_size_byte / sizeof(std::uint32_t)); + std::generate(binary.begin(), binary.end(), [&random]() { return random(); }); + + // server + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(svr.is_valid()); + + svr.Post("/binary", [&](const Request &req, Response &res) { + EXPECT_EQ(large_size_byte, req.body.size()); + EXPECT_EQ(0, std::memcmp(binary.data(), req.body.data(), large_size_byte)); + res.set_content(req.body, "application/octet-stream"); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + // client POST + SSLClient cli("localhost", PORT); + cli.enable_server_certificate_verification(false); + cli.set_read_timeout(std::chrono::seconds(100)); + cli.set_write_timeout(std::chrono::seconds(100)); + auto res = cli.Post("/binary", reinterpret_cast<char *>(binary.data()), + large_size_byte, "application/octet-stream"); + + // compare + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(large_size_byte, res->body.size()); + EXPECT_EQ(0, std::memcmp(binary.data(), res->body.data(), large_size_byte)); +} +#endif + +#ifdef _WIN32 +TEST(CleanupTest, WSACleanup) { + int ret = WSACleanup(); + ASSERT_EQ(0, ret); +} +#endif + +#ifndef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(NoSSLSupport, SimpleInterface) { + ASSERT_ANY_THROW(Client cli("https://yahoo.com")); +} +#endif + +#ifndef CPPHTTPLIB_NO_EXCEPTIONS +TEST(InvalidScheme, SimpleInterface) { + ASSERT_ANY_THROW(Client cli("scheme://yahoo.com")); +} +#endif + +TEST(NoScheme, SimpleInterface) { + Client cli("yahoo.com:80"); + ASSERT_TRUE(cli.is_valid()); +} + +TEST(SendAPI, SimpleInterface_Online) { + Client cli("http://yahoo.com"); + + Request req; + req.method = "GET"; + req.path = "/"; + auto res = cli.send(req); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); +} + +TEST(SendAPI, WithParamsInRequest) { + Server svr; + + svr.Get("/", [&](const Request &req, Response & /*res*/) { + EXPECT_TRUE(req.has_param("test")); + EXPECT_EQ("test_value", req.get_param_value("test")); + }); + + auto t = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + + { + Request req; + req.method = "GET"; + req.path = "/"; + req.params.emplace("test", "test_value"); + auto res = cli.send(req); + ASSERT_TRUE(res); + } + { + auto res = cli.Get("/", {{"test", "test_value"}}, Headers{}); + ASSERT_TRUE(res); + } +} + +TEST(ClientImplMethods, GetSocketTest) { + httplib::Server svr; + svr.Get("/", [&](const httplib::Request & /*req*/, httplib::Response &res) { + res.status = StatusCode::OK_200; + }); + + auto thread = std::thread([&]() { svr.listen("127.0.0.1", 3333); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + httplib::Client cli("http://127.0.0.1:3333"); + cli.set_keep_alive(true); + + // Use the behavior of cpp-httplib of opening the connection + // only when the first request happens. If that changes, + // this test would be obsolete. + + EXPECT_EQ(cli.socket(), INVALID_SOCKET); + + // This also implicitly tests the server. But other tests would fail much + // earlier than this one to be considered. + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + + EXPECT_EQ(StatusCode::OK_200, res->status); + ASSERT_TRUE(cli.socket() != INVALID_SOCKET); + } +} + +// Disabled due to out-of-memory problem on GitHub Actions +#ifdef _WIN64 +TEST(ServerLargeContentTest, DISABLED_SendLargeContent) { + // allocate content size larger than 2GB in memory + const size_t content_size = 2LL * 1024LL * 1024LL * 1024LL + 1LL; + char *content = (char *)malloc(content_size); + ASSERT_TRUE(content); + + Server svr; + svr.Get("/foo", + [=](const httplib::Request & /*req*/, httplib::Response &res) { + res.set_content(content, content_size, "application/octet-stream"); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + if (content) free(content); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + auto res = cli.Get("/foo"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(content_size, res->body.length()); +} +#endif + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(YahooRedirectTest2, SimpleInterface_Online) { + Client cli("http://yahoo.com"); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); + + cli.set_follow_location(true); + res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("https://www.yahoo.com/", res->location); +} + +TEST(YahooRedirectTest3, SimpleInterface_Online) { + Client cli("https://yahoo.com"); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); + + cli.set_follow_location(true); + res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("https://www.yahoo.com/", res->location); +} + +TEST(YahooRedirectTest3, NewResultInterface_Online) { + Client cli("https://yahoo.com"); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + ASSERT_FALSE(!res); + ASSERT_TRUE(res); + ASSERT_FALSE(res == nullptr); + ASSERT_TRUE(res != nullptr); + EXPECT_EQ(Error::Success, res.error()); + EXPECT_EQ(StatusCode::MovedPermanently_301, res.value().status); + EXPECT_EQ(StatusCode::MovedPermanently_301, (*res).status); + EXPECT_EQ(StatusCode::MovedPermanently_301, res->status); + + cli.set_follow_location(true); + res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(Error::Success, res.error()); + EXPECT_EQ(StatusCode::OK_200, res.value().status); + EXPECT_EQ(StatusCode::OK_200, (*res).status); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("https://www.yahoo.com/", res->location); +} + +#ifdef CPPHTTPLIB_BROTLI_SUPPORT +TEST(DecodeWithChunkedEncoding, BrotliEncoding_Online) { + Client cli("https://cdnjs.cloudflare.com"); + auto res = + cli.Get("/ajax/libs/jquery/3.5.1/jquery.js", {{"Accept-Encoding", "br"}}); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(287630U, res->body.size()); + EXPECT_EQ("application/javascript; charset=utf-8", + res->get_header_value("Content-Type")); +} +#endif + +// Previously "https://nghttp2.org" "/httpbin/redirect-to" +#undef REDIR_HOST // Silence compiler warning +#define REDIR_HOST "https://httpbingo.org" + +TEST(HttpsToHttpRedirectTest, SimpleInterface_Online) { + Client cli(REDIR_HOST); + cli.set_follow_location(true); + auto res = + cli.Get(REDIR_PATH "?url=http%3A%2F%2Fexample.com&status_code=302"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(HttpsToHttpRedirectTest2, SimpleInterface_Online) { + Client cli(REDIR_HOST); + cli.set_follow_location(true); + + Params params; + params.emplace("url", "http://example.com"); + params.emplace("status_code", "302"); + + auto res = cli.Get(REDIR_PATH, params, Headers{}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(HttpsToHttpRedirectTest3, SimpleInterface_Online) { + Client cli(REDIR_HOST); + cli.set_follow_location(true); + + Params params; + params.emplace("url", "http://example.com"); + + auto res = cli.Get(REDIR_PATH "?status_code=302", params, Headers{}); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(HttpToHttpsRedirectTest, CertFile) { + Server svr; + ASSERT_TRUE(svr.is_valid()); + svr.Get("/index", [&](const Request &, Response &res) { + res.set_redirect("https://127.0.0.1:1235/index"); + svr.stop(); + }); + + SSLServer ssl_svr(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(ssl_svr.is_valid()); + ssl_svr.Get("/index", [&](const Request &, Response &res) { + res.set_content("test", "text/plain"); + ssl_svr.stop(); + }); + + thread t = thread([&]() { ASSERT_TRUE(svr.listen("127.0.0.1", PORT)); }); + thread t2 = thread([&]() { ASSERT_TRUE(ssl_svr.listen("127.0.0.1", 1235)); }); + auto se = detail::scope_exit([&] { + t2.join(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + ssl_svr.wait_until_ready(); + + Client cli("127.0.0.1", PORT); + cli.set_ca_cert_path(SERVER_CERT2_FILE); + cli.enable_server_certificate_verification(true); + cli.set_follow_location(true); + cli.set_connection_timeout(30); + + auto res = cli.Get("/index"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +TEST(SSLClientRedirectTest, CertFile) { + SSLServer ssl_svr1(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(ssl_svr1.is_valid()); + ssl_svr1.Get("/index", [&](const Request &, Response &res) { + res.set_redirect("https://127.0.0.1:1235/index"); + ssl_svr1.stop(); + }); + + SSLServer ssl_svr2(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE); + ASSERT_TRUE(ssl_svr2.is_valid()); + ssl_svr2.Get("/index", [&](const Request &, Response &res) { + res.set_content("test", "text/plain"); + ssl_svr2.stop(); + }); + + thread t = thread([&]() { ASSERT_TRUE(ssl_svr1.listen("127.0.0.1", PORT)); }); + thread t2 = + thread([&]() { ASSERT_TRUE(ssl_svr2.listen("127.0.0.1", 1235)); }); + auto se = detail::scope_exit([&] { + t2.join(); + t.join(); + ASSERT_FALSE(ssl_svr1.is_running()); + }); + + ssl_svr1.wait_until_ready(); + ssl_svr2.wait_until_ready(); + + SSLClient cli("127.0.0.1", PORT); + std::string cert; + read_file(SERVER_CERT2_FILE, cert); + cli.load_ca_cert_store(cert.c_str(), cert.size()); + cli.enable_server_certificate_verification(true); + cli.set_follow_location(true); + cli.set_connection_timeout(30); + + auto res = cli.Get("/index"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); +} + +TEST(MultipartFormDataTest, LargeData) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + + svr.Post("/post", [&](const Request &req, Response & /*res*/, + const ContentReader &content_reader) { + if (req.is_multipart_form_data()) { + std::vector<FormData> items; + content_reader( + [&](const FormData &file) { + items.push_back(file); + return true; + }, + [&](const char *data, size_t data_length) { + items.back().content.append(data, data_length); + return true; + }); + + EXPECT_TRUE(std::string(items[0].name) == "document"); + EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); + EXPECT_TRUE(items[0].filename == "2MB_data"); + EXPECT_TRUE(items[0].content_type == "application/octet-stream"); + + EXPECT_TRUE(items[1].name == "hello"); + EXPECT_TRUE(items[1].content == "world"); + EXPECT_TRUE(items[1].filename == ""); + EXPECT_TRUE(items[1].content_type == ""); + } else { + std::string body; + content_reader([&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + } + }); + + auto t = std::thread([&]() { svr.listen("localhost", 8080); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + std::string data(1024 * 1024 * 2, '.'); + std::stringstream buffer; + buffer << data; + + Client cli("https://localhost:8080"); + cli.enable_server_certificate_verification(false); + + UploadFormDataItems items{ + {"document", buffer.str(), "2MB_data", "application/octet-stream"}, + {"hello", "world", "", ""}, + }; + + auto res = cli.Post("/post", items); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + } +} + +TEST(MultipartFormDataTest, DataProviderItems) { + + std::random_device seed_gen; + std::mt19937 random(seed_gen()); + + std::string rand1; + rand1.resize(1000); + std::generate(rand1.begin(), rand1.end(), [&]() { return random(); }); + + std::string rand2; + rand2.resize(3000); + std::generate(rand2.begin(), rand2.end(), [&]() { return random(); }); + + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + + svr.Post("/post-none", [&](const Request &req, Response & /*res*/, + const ContentReader &content_reader) { + ASSERT_FALSE(req.is_multipart_form_data()); + + std::string body; + content_reader([&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + + EXPECT_EQ(body, ""); + }); + + svr.Post("/post-items", [&](const Request &req, Response & /*res*/, + const ContentReader &content_reader) { + ASSERT_TRUE(req.is_multipart_form_data()); + std::vector<FormData> items; + content_reader( + [&](const FormData &file) { + items.push_back(file); + return true; + }, + [&](const char *data, size_t data_length) { + items.back().content.append(data, data_length); + return true; + }); + + ASSERT_TRUE(items.size() == 2); + + EXPECT_EQ(std::string(items[0].name), "name1"); + EXPECT_EQ(items[0].content, "Testing123"); + EXPECT_EQ(items[0].filename, "filename1"); + EXPECT_EQ(items[0].content_type, "application/octet-stream"); + + EXPECT_EQ(items[1].name, "name2"); + EXPECT_EQ(items[1].content, "Testing456"); + EXPECT_EQ(items[1].filename, ""); + EXPECT_EQ(items[1].content_type, ""); + }); + + svr.Post("/post-providers", [&](const Request &req, Response & /*res*/, + const ContentReader &content_reader) { + ASSERT_TRUE(req.is_multipart_form_data()); + std::vector<FormData> items; + content_reader( + [&](const FormData &file) { + items.push_back(file); + return true; + }, + [&](const char *data, size_t data_length) { + items.back().content.append(data, data_length); + return true; + }); + + ASSERT_TRUE(items.size() == 2); + + EXPECT_EQ(items[0].name, "name3"); + EXPECT_EQ(items[0].content, rand1); + EXPECT_EQ(items[0].filename, "filename3"); + EXPECT_EQ(items[0].content_type, ""); + + EXPECT_EQ(items[1].name, "name4"); + EXPECT_EQ(items[1].content, rand2); + EXPECT_EQ(items[1].filename, "filename4"); + EXPECT_EQ(items[1].content_type, ""); + }); + + svr.Post("/post-both", [&](const Request &req, Response & /*res*/, + const ContentReader &content_reader) { + ASSERT_TRUE(req.is_multipart_form_data()); + std::vector<FormData> items; + content_reader( + [&](const FormData &file) { + items.push_back(file); + return true; + }, + [&](const char *data, size_t data_length) { + items.back().content.append(data, data_length); + return true; + }); + + ASSERT_TRUE(items.size() == 4); + + EXPECT_EQ(std::string(items[0].name), "name1"); + EXPECT_EQ(items[0].content, "Testing123"); + EXPECT_EQ(items[0].filename, "filename1"); + EXPECT_EQ(items[0].content_type, "application/octet-stream"); + + EXPECT_EQ(items[1].name, "name2"); + EXPECT_EQ(items[1].content, "Testing456"); + EXPECT_EQ(items[1].filename, ""); + EXPECT_EQ(items[1].content_type, ""); + + EXPECT_EQ(items[2].name, "name3"); + EXPECT_EQ(items[2].content, rand1); + EXPECT_EQ(items[2].filename, "filename3"); + EXPECT_EQ(items[2].content_type, ""); + + EXPECT_EQ(items[3].name, "name4"); + EXPECT_EQ(items[3].content, rand2); + EXPECT_EQ(items[3].filename, "filename4"); + EXPECT_EQ(items[3].content_type, ""); + }); + + auto t = std::thread([&]() { svr.listen("localhost", 8080); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli("https://localhost:8080"); + cli.enable_server_certificate_verification(false); + + UploadFormDataItems items{ + {"name1", "Testing123", "filename1", "application/octet-stream"}, + {"name2", "Testing456", "", ""}, // not a file + }; + + { + auto res = cli.Post("/post-none", {}, {}, {}); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + } + + FormDataProviderItems providers; + + { + auto res = + cli.Post("/post-items", {}, items, providers); // empty providers + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + } + + providers.push_back({"name3", + [&](size_t offset, httplib::DataSink &sink) -> bool { + // test the offset is given correctly at each step + if (!offset) + sink.os.write(rand1.data(), 30); + else if (offset == 30) + sink.os.write(rand1.data() + 30, 300); + else if (offset == 330) + sink.os.write(rand1.data() + 330, 670); + else if (offset == rand1.size()) + sink.done(); + return true; + }, + "filename3", + {}}); + + providers.push_back({"name4", + [&](size_t offset, httplib::DataSink &sink) -> bool { + // test the offset is given correctly at each step + if (!offset) + sink.os.write(rand2.data(), 2000); + else if (offset == 2000) + sink.os.write(rand2.data() + 2000, 1); + else if (offset == 2001) + sink.os.write(rand2.data() + 2001, 999); + else if (offset == rand2.size()) + sink.done(); + return true; + }, + "filename4", + {}}); + + { + auto res = cli.Post("/post-providers", {}, {}, providers); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + } + + { + auto res = cli.Post("/post-both", {}, items, providers); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + } + } +} + +TEST(MultipartFormDataTest, BadHeader) { + Server svr; + svr.Post("/post", [&](const Request & /*req*/, Response &res) { + res.set_content("ok", "text/plain"); + }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + const std::string body = + "This is the preamble. It is to be ignored, though it\r\n" + "is a handy place for composition agents to include an\r\n" + "explanatory note to non-MIME conformant readers.\r\n" + "\r\n" + "\r\n" + "--simple boundary\r\n" + "Content-Disposition: form-data; name=\"field1\"\r\n" + ": BAD...\r\n" + "\r\n" + "value1\r\n" + "--simple boundary\r\n" + "Content-Disposition: form-data; name=\"field2\"; " + "filename=\"example.txt\"\r\n" + "\r\n" + "value2\r\n" + "--simple boundary--\r\n" + "This is the epilogue. It is also to be ignored.\r\n"; + + std::string content_type = + R"(multipart/form-data; boundary="simple boundary")"; + + Client cli(HOST, PORT); + auto res = cli.Post("/post", body, content_type.c_str()); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::BadRequest_400, res->status); +} + +TEST(MultipartFormDataTest, WithPreamble) { + Server svr; + svr.Post("/post", [&](const Request & /*req*/, Response &res) { + res.set_content("ok", "text/plain"); + }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + const std::string body = + "This is the preamble. It is to be ignored, though it\r\n" + "is a handy place for composition agents to include an\r\n" + "explanatory note to non-MIME conformant readers.\r\n" + "\r\n" + "\r\n" + "--simple boundary\r\n" + "Content-Disposition: form-data; name=\"field1\"\r\n" + "\r\n" + "value1\r\n" + "--simple boundary\r\n" + "Content-Disposition: form-data; name=\"field2\"; " + "filename=\"example.txt\"\r\n" + "\r\n" + "value2\r\n" + "--simple boundary--\r\n" + "This is the epilogue. It is also to be ignored.\r\n"; + + std::string content_type = + R"(multipart/form-data; boundary="simple boundary")"; + + Client cli(HOST, PORT); + auto res = cli.Post("/post", body, content_type.c_str()); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); +} + +TEST(MultipartFormDataTest, PostCustomBoundary) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + + svr.Post("/post_customboundary", [&](const Request &req, Response & /*res*/, + const ContentReader &content_reader) { + if (req.is_multipart_form_data()) { + std::vector<FormData> items; + content_reader( + [&](const FormData &file) { + items.push_back(file); + return true; + }, + [&](const char *data, size_t data_length) { + items.back().content.append(data, data_length); + return true; + }); + + EXPECT_TRUE(std::string(items[0].name) == "document"); + EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); + EXPECT_TRUE(items[0].filename == "2MB_data"); + EXPECT_TRUE(items[0].content_type == "application/octet-stream"); + + EXPECT_TRUE(items[1].name == "hello"); + EXPECT_TRUE(items[1].content == "world"); + EXPECT_TRUE(items[1].filename == ""); + EXPECT_TRUE(items[1].content_type == ""); + } else { + std::string body; + content_reader([&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + } + }); + + auto t = std::thread([&]() { svr.listen("localhost", 8080); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + std::string data(1024 * 1024 * 2, '.'); + std::stringstream buffer; + buffer << data; + + Client cli("https://localhost:8080"); + cli.enable_server_certificate_verification(false); + + UploadFormDataItems items{ + {"document", buffer.str(), "2MB_data", "application/octet-stream"}, + {"hello", "world", "", ""}, + }; + + auto res = cli.Post("/post_customboundary", {}, items, "abc-abc"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + } +} + +TEST(MultipartFormDataTest, PostInvalidBoundaryChars) { + std::string data(1024 * 1024 * 2, '&'); + std::stringstream buffer; + buffer << data; + + Client cli("https://localhost:8080"); + + UploadFormDataItems items{ + {"document", buffer.str(), "2MB_data", "application/octet-stream"}, + {"hello", "world", "", ""}, + }; + + for (const char &c : " \t\r\n") { + auto res = + cli.Post("/invalid_boundary", {}, items, string("abc123").append(1, c)); + ASSERT_EQ(Error::UnsupportedMultipartBoundaryChars, res.error()); + ASSERT_FALSE(res); + } +} + +TEST(MultipartFormDataTest, PutFormData) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + + svr.Put("/put", [&](const Request &req, const Response & /*res*/, + const ContentReader &content_reader) { + if (req.is_multipart_form_data()) { + std::vector<FormData> items; + content_reader( + [&](const FormData &file) { + items.push_back(file); + return true; + }, + [&](const char *data, size_t data_length) { + items.back().content.append(data, data_length); + return true; + }); + + EXPECT_TRUE(std::string(items[0].name) == "document"); + EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); + EXPECT_TRUE(items[0].filename == "2MB_data"); + EXPECT_TRUE(items[0].content_type == "application/octet-stream"); + + EXPECT_TRUE(items[1].name == "hello"); + EXPECT_TRUE(items[1].content == "world"); + EXPECT_TRUE(items[1].filename == ""); + EXPECT_TRUE(items[1].content_type == ""); + } else { + std::string body; + content_reader([&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + } + }); + + auto t = std::thread([&]() { svr.listen("localhost", 8080); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + std::string data(1024 * 1024 * 2, '&'); + std::stringstream buffer; + buffer << data; + + Client cli("https://localhost:8080"); + cli.enable_server_certificate_verification(false); + + UploadFormDataItems items{ + {"document", buffer.str(), "2MB_data", "application/octet-stream"}, + {"hello", "world", "", ""}, + }; + + auto res = cli.Put("/put", items); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + } +} + +TEST(MultipartFormDataTest, PutFormDataCustomBoundary) { + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + + svr.Put("/put_customboundary", + [&](const Request &req, const Response & /*res*/, + const ContentReader &content_reader) { + if (req.is_multipart_form_data()) { + std::vector<FormData> items; + content_reader( + [&](const FormData &file) { + items.push_back(file); + return true; + }, + [&](const char *data, size_t data_length) { + items.back().content.append(data, data_length); + return true; + }); + + EXPECT_TRUE(std::string(items[0].name) == "document"); + EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size()); + EXPECT_TRUE(items[0].filename == "2MB_data"); + EXPECT_TRUE(items[0].content_type == "application/octet-stream"); + + EXPECT_TRUE(items[1].name == "hello"); + EXPECT_TRUE(items[1].content == "world"); + EXPECT_TRUE(items[1].filename == ""); + EXPECT_TRUE(items[1].content_type == ""); + } else { + std::string body; + content_reader([&](const char *data, size_t data_length) { + body.append(data, data_length); + return true; + }); + } + }); + + auto t = std::thread([&]() { svr.listen("localhost", 8080); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + std::string data(1024 * 1024 * 2, '&'); + std::stringstream buffer; + buffer << data; + + Client cli("https://localhost:8080"); + cli.enable_server_certificate_verification(false); + + UploadFormDataItems items{ + {"document", buffer.str(), "2MB_data", "application/octet-stream"}, + {"hello", "world", "", ""}, + }; + + auto res = cli.Put("/put_customboundary", {}, items, "abc-abc_"); + ASSERT_TRUE(res); + ASSERT_EQ(StatusCode::OK_200, res->status); + } +} + +TEST(MultipartFormDataTest, PutInvalidBoundaryChars) { + std::string data(1024 * 1024 * 2, '&'); + std::stringstream buffer; + buffer << data; + + Client cli("https://localhost:8080"); + cli.enable_server_certificate_verification(false); + + UploadFormDataItems items{ + {"document", buffer.str(), "2MB_data", "application/octet-stream"}, + {"hello", "world", "", ""}, + }; + + for (const char &c : " \t\r\n") { + auto res = cli.Put("/put", {}, items, string("abc123").append(1, c)); + ASSERT_EQ(Error::UnsupportedMultipartBoundaryChars, res.error()); + ASSERT_FALSE(res); + } +} + +TEST(MultipartFormDataTest, AlternateFilename) { + auto handled = false; + + Server svr; + svr.Post("/test", [&](const Request &req, Response &res) { + ASSERT_EQ(2u, req.form.files.size()); + ASSERT_EQ(1u, req.form.fields.size()); + + // Test files + const auto &file1 = req.form.get_file("file1"); + ASSERT_EQ("file1", file1.name); + ASSERT_EQ("A.txt", file1.filename); + ASSERT_EQ("text/plain", file1.content_type); + ASSERT_EQ("Content of a.txt.\r\n", file1.content); + + const auto &file2 = req.form.get_file("file2"); + ASSERT_EQ("file2", file2.name); + ASSERT_EQ("a.html", file2.filename); + ASSERT_EQ("text/html", file2.content_type); + ASSERT_EQ("<!DOCTYPE html><title>Content of a.html.</title>\r\n", + file2.content); + + // Test text field + const auto &text = req.form.get_field("text"); + ASSERT_EQ("text default", text); + + res.set_content("ok", "text/plain"); + + handled = true; + }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + ASSERT_TRUE(handled); + }); + + svr.wait_until_ready(); + + auto req = "POST /test HTTP/1.1\r\n" + "Content-Type: multipart/form-data;boundary=--------\r\n" + "Content-Length: 399\r\n" + "\r\n" + "----------\r\n" + "Content-Disposition: form-data; name=\"text\"\r\n" + "\r\n" + "text default\r\n" + "----------\r\n" + "Content-Disposition: form-data; filename*=\"UTF-8''%41.txt\"; " + "filename=\"a.txt\"; name=\"file1\"\r\n" + "Content-Type: text/plain\r\n" + "\r\n" + "Content of a.txt.\r\n" + "\r\n" + "----------\r\n" + "Content-Disposition: form-data; name=\"file2\" ;filename = " + "\"a.html\"\r\n" + "Content-Type: text/html\r\n" + "\r\n" + "<!DOCTYPE html><title>Content of a.html.</title>\r\n" + "\r\n" + "------------\r\n"; + + ASSERT_TRUE(send_request(1, req)); +} + +TEST(MultipartFormDataTest, CloseDelimiterWithoutCRLF) { + auto handled = false; + + Server svr; + svr.Post("/test", [&](const Request &req, Response &) { + ASSERT_EQ(2u, req.form.fields.size()); + + const auto &text1 = req.form.get_field("text1"); + ASSERT_EQ("text1", text1); + + const auto &text2 = req.form.get_field("text2"); + ASSERT_EQ("text2", text2); + + handled = true; + }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + ASSERT_TRUE(handled); + }); + + svr.wait_until_ready(); + + auto req = "POST /test HTTP/1.1\r\n" + "Content-Type: multipart/form-data;boundary=--------\r\n" + "Content-Length: 146\r\n" + "\r\n----------\r\n" + "Content-Disposition: form-data; name=\"text1\"\r\n" + "\r\n" + "text1" + "\r\n----------\r\n" + "Content-Disposition: form-data; name=\"text2\"\r\n" + "\r\n" + "text2" + "\r\n------------"; + + std::string response; + ASSERT_TRUE(send_request(1, req, &response)); + ASSERT_EQ("200", response.substr(9, 3)); +} + +TEST(MultipartFormDataTest, ContentLength) { + auto handled = false; + + Server svr; + svr.Post("/test", [&](const Request &req, Response &) { + ASSERT_EQ(2u, req.form.fields.size()); + + const auto &text1 = req.form.get_field("text1"); + ASSERT_EQ("text1", text1); + + const auto &text2 = req.form.get_field("text2"); + ASSERT_EQ("text2", text2); + + handled = true; + }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + ASSERT_TRUE(handled); + }); + + svr.wait_until_ready(); + + auto req = "POST /test HTTP/1.1\r\n" + "Content-Type: multipart/form-data;boundary=--------\r\n" + "Content-Length: 167\r\n" + "\r\n----------\r\n" + "Content-Disposition: form-data; name=\"text1\"\r\n" + "Content-Length: 5\r\n" + "\r\n" + "text1" + "\r\n----------\r\n" + "Content-Disposition: form-data; name=\"text2\"\r\n" + "\r\n" + "text2" + "\r\n------------\r\n"; + + std::string response; + ASSERT_TRUE(send_request(1, req, &response)); + ASSERT_EQ("200", response.substr(9, 3)); +} + +TEST(MultipartFormDataTest, AccessPartHeaders) { + auto handled = false; + + Server svr; + svr.Post("/test", [&](const Request &req, Response &) { + ASSERT_EQ(2u, req.form.fields.size()); + + const auto &text1 = req.form.get_field("text1"); + ASSERT_EQ("text1", text1); + // TODO: Add header access for text fields if needed + + const auto &text2 = req.form.get_field("text2"); + ASSERT_EQ("text2", text2); + // TODO: Header access for text fields needs to be implemented + // auto &headers = it->second.headers; + // ASSERT_EQ(3U, headers.size()); + // auto custom_header = headers.find("x-whatever"); + // ASSERT_TRUE(custom_header != headers.end()); + // ASSERT_NE("customvalue", custom_header->second); + // ASSERT_EQ("CustomValue", custom_header->second); + // ASSERT_TRUE(headers.find("X-Test") == headers.end()); // text1 header + + handled = true; + }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + ASSERT_TRUE(handled); + }); + + svr.wait_until_ready(); + + auto req = "POST /test HTTP/1.1\r\n" + "Content-Type: multipart/form-data;boundary=--------\r\n" + "Content-Length: 232\r\n" + "\r\n----------\r\n" + "Content-Disposition: form-data; name=\"text1\"\r\n" + "Content-Length: 5\r\n" + "X-Test: 1\r\n" + "\r\n" + "text1" + "\r\n----------\r\n" + "Content-Disposition: form-data; name=\"text2\"\r\n" + "Content-Type: text/plain\r\n" + "X-Whatever: CustomValue\r\n" + "\r\n" + "text2" + "\r\n------------\r\n" + "That should be disregarded. Not even read"; + + std::string response; + ASSERT_TRUE(send_request(1, req, &response)); + ASSERT_EQ("200", response.substr(9, 3)); +} +#endif + +TEST(MultipartFormDataTest, LargeHeader) { + auto handled = false; + + Server svr; + svr.Post("/test", [&](const Request &req, Response &) { + ASSERT_EQ(1u, req.form.fields.size()); + + const auto &text = req.form.get_field("name1"); + ASSERT_EQ("text1", text); + + handled = true; + }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + ASSERT_TRUE(handled); + }); + + svr.wait_until_ready(); + + auto boundary = std::string("cpp-httplib-multipart-data"); + std::string content = "--" + boundary + + "\r\n" + "Content-Disposition: form-data; name=\"name1\"\r\n" + "\r\n" + "text1\r\n" + "--" + + boundary + "--\r\n"; + std::string header_prefix = "POST /test HTTP/1.1\r\n" + "Content-Type: multipart/form-data;boundary=" + + boundary + + "\r\n" + "Content-Length: " + + std::to_string(content.size()) + + "\r\n" + "Dummy-Header: "; + std::string header_suffix = "\r\n" + "\r\n"; + size_t read_buff_size = 1024u * 4; // SocketStream::read_buff_size_ + size_t header_dummy_size = + read_buff_size - + (header_prefix.size() + header_suffix.size() + boundary.size() / 2); + auto header_dummy = std::string(header_dummy_size, '@'); + auto req = header_prefix + header_dummy + header_suffix + content; + + std::string response; + ASSERT_TRUE(send_request(1, req, &response)); + ASSERT_EQ("200", response.substr(9, 3)); +} + +TEST(TaskQueueTest, IncreaseAtomicInteger) { + static constexpr unsigned int number_of_tasks{1000000}; + std::atomic_uint count{0}; + std::unique_ptr<TaskQueue> task_queue{ + new ThreadPool{CPPHTTPLIB_THREAD_POOL_COUNT}}; + + for (unsigned int i = 0; i < number_of_tasks; ++i) { + auto queued = task_queue->enqueue( + [&count] { count.fetch_add(1, std::memory_order_relaxed); }); + EXPECT_TRUE(queued); + } + + EXPECT_NO_THROW(task_queue->shutdown()); + EXPECT_EQ(number_of_tasks, count.load()); +} + +TEST(TaskQueueTest, IncreaseAtomicIntegerWithQueueLimit) { + static constexpr unsigned int number_of_tasks{1000000}; + static constexpr unsigned int qlimit{2}; + unsigned int queued_count{0}; + std::atomic_uint count{0}; + std::unique_ptr<TaskQueue> task_queue{ + new ThreadPool{/*num_threads=*/1, qlimit}}; + + for (unsigned int i = 0; i < number_of_tasks; ++i) { + if (task_queue->enqueue( + [&count] { count.fetch_add(1, std::memory_order_relaxed); })) { + queued_count++; + } + } + + EXPECT_NO_THROW(task_queue->shutdown()); + EXPECT_EQ(queued_count, count.load()); + EXPECT_TRUE(queued_count <= number_of_tasks); + EXPECT_TRUE(queued_count >= qlimit); +} + +TEST(TaskQueueTest, MaxQueuedRequests) { + static constexpr unsigned int qlimit{3}; + std::unique_ptr<TaskQueue> task_queue{new ThreadPool{1, qlimit}}; + std::condition_variable sem_cv; + std::mutex sem_mtx; + int credits = 0; + bool queued; + + /* Fill up the queue with tasks that will block until we give them credits to + * complete. */ + for (unsigned int n = 0; n <= qlimit;) { + queued = task_queue->enqueue([&sem_mtx, &sem_cv, &credits] { + std::unique_lock<std::mutex> lock(sem_mtx); + while (credits <= 0) { + sem_cv.wait(lock); + } + /* Consume the credit and signal the test code if they are all gone. */ + if (--credits == 0) { sem_cv.notify_one(); } + }); + + if (n < qlimit) { + /* The first qlimit enqueues must succeed. */ + EXPECT_TRUE(queued); + } else { + /* The last one will succeed only when the worker thread + * starts and dequeues the first blocking task. Although + * not necessary for the correctness of this test, we sleep for + * a short while to avoid busy waiting. */ + std::this_thread::sleep_for(std::chrono::milliseconds(10)); + } + if (queued) { n++; } + } + + /* Further enqueues must fail since the queue is full. */ + for (auto i = 0; i < 4; i++) { + queued = task_queue->enqueue([] {}); + EXPECT_FALSE(queued); + } + + /* Give the credits to allow the previous tasks to complete. */ + { + std::unique_lock<std::mutex> lock(sem_mtx); + credits += qlimit + 1; + } + sem_cv.notify_all(); + + /* Wait for all the credits to be consumed. */ + { + std::unique_lock<std::mutex> lock(sem_mtx); + while (credits > 0) { + sem_cv.wait(lock); + } + } + + /* Check that we are able again to enqueue at least qlimit tasks. */ + for (unsigned int i = 0; i < qlimit; i++) { + queued = task_queue->enqueue([] {}); + EXPECT_TRUE(queued); + } + + EXPECT_NO_THROW(task_queue->shutdown()); +} + +TEST(RedirectTest, RedirectToUrlWithQueryParameters) { + Server svr; + + svr.Get("/", [](const Request & /*req*/, Response &res) { + res.set_redirect(R"(/hello?key=val%26key2%3Dval2)"); + }); + + svr.Get("/hello", [](const Request &req, Response &res) { + res.set_content(req.get_param_value("key"), "text/plain"); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + cli.set_follow_location(true); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("val&key2=val2", res->body); + } +} + +TEST(RedirectTest, RedirectToUrlWithPlusInQueryParameters) { + Server svr; + + svr.Get("/", [](const Request & /*req*/, Response &res) { + res.set_redirect(R"(/hello?key=AByz09+~-._%20%26%3F%C3%BC%2B)"); + }); + + svr.Get("/hello", [](const Request &req, Response &res) { + res.set_content(req.get_param_value("key"), "text/plain"); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + cli.set_follow_location(true); + + auto res = cli.Get("/"); + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ("AByz09 ~-._ &?ü+", res->body); + } +} + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(RedirectTest, Issue2185_Online) { + SSLClient client("github.com"); + client.set_follow_location(true); + + auto res = client.Get("/Coollab-Art/Coollab/releases/download/1.1.1_UI-Scale/" + "Coollab-Windows.zip"); + + ASSERT_TRUE(res); + EXPECT_EQ(StatusCode::OK_200, res->status); + EXPECT_EQ(9920427U, res->body.size()); +} +#endif + +TEST(VulnerabilityTest, CRLFInjection) { + Server svr; + + svr.Post("/test1", [](const Request & /*req*/, Response &res) { + res.set_content("Hello 1", "text/plain"); + }); + + svr.Delete("/test2", [](const Request & /*req*/, Response &res) { + res.set_content("Hello 2", "text/plain"); + }); + + svr.Put("/test3", [](const Request & /*req*/, Response &res) { + res.set_content("Hello 3", "text/plain"); + }); + + svr.Patch("/test4", [](const Request & /*req*/, Response &res) { + res.set_content("Hello 4", "text/plain"); + }); + + svr.set_logger([](const Request &req, const Response & /*res*/) { + for (const auto &x : req.headers) { + auto key = x.first; + EXPECT_STRNE("evil", key.c_str()); + } + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + Client cli(HOST, PORT); + + cli.Post("/test1", "A=B", + "application/x-www-form-urlencoded\r\nevil: hello1"); + cli.Delete("/test2", "A=B", "text/plain\r\nevil: hello2"); + cli.Put("/test3", "text", "text/plain\r\nevil: hello3"); + cli.Patch("/test4", "content", "text/plain\r\nevil: hello4"); + } +} + +TEST(PathParamsTest, StaticMatch) { + const auto pattern = "/users/all"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users/all"; + ASSERT_TRUE(matcher.match(request)); + + std::unordered_map<std::string, std::string> expected_params = {}; + + EXPECT_EQ(request.path_params, expected_params); +} + +TEST(PathParamsTest, StaticMismatch) { + const auto pattern = "/users/all"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users/1"; + ASSERT_FALSE(matcher.match(request)); +} + +TEST(PathParamsTest, SingleParamInTheMiddle) { + const auto pattern = "/users/:id/subscriptions"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users/42/subscriptions"; + ASSERT_TRUE(matcher.match(request)); + + std::unordered_map<std::string, std::string> expected_params = {{"id", "42"}}; + + EXPECT_EQ(request.path_params, expected_params); +} + +TEST(PathParamsTest, SingleParamInTheEnd) { + const auto pattern = "/users/:id"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users/24"; + ASSERT_TRUE(matcher.match(request)); + + std::unordered_map<std::string, std::string> expected_params = {{"id", "24"}}; + + EXPECT_EQ(request.path_params, expected_params); +} + +TEST(PathParamsTest, SingleParamInTheEndTrailingSlash) { + const auto pattern = "/users/:id/"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users/42/"; + ASSERT_TRUE(matcher.match(request)); + std::unordered_map<std::string, std::string> expected_params = {{"id", "42"}}; + + EXPECT_EQ(request.path_params, expected_params); +} + +TEST(PathParamsTest, EmptyParam) { + const auto pattern = "/users/:id/"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users//"; + ASSERT_TRUE(matcher.match(request)); + + std::unordered_map<std::string, std::string> expected_params = {{"id", ""}}; + + EXPECT_EQ(request.path_params, expected_params); +} + +TEST(PathParamsTest, FragmentMismatch) { + const auto pattern = "/users/:id/"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/admins/24/"; + ASSERT_FALSE(matcher.match(request)); +} + +TEST(PathParamsTest, ExtraFragments) { + const auto pattern = "/users/:id"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users/42/subscriptions"; + ASSERT_FALSE(matcher.match(request)); +} + +TEST(PathParamsTest, MissingTrailingParam) { + const auto pattern = "/users/:id"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users"; + ASSERT_FALSE(matcher.match(request)); +} + +TEST(PathParamsTest, MissingParamInTheMiddle) { + const auto pattern = "/users/:id/subscriptions"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users/subscriptions"; + ASSERT_FALSE(matcher.match(request)); +} + +TEST(PathParamsTest, MultipleParams) { + const auto pattern = "/users/:userid/subscriptions/:subid"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/users/42/subscriptions/2"; + ASSERT_TRUE(matcher.match(request)); + + std::unordered_map<std::string, std::string> expected_params = { + {"userid", "42"}, {"subid", "2"}}; + + EXPECT_EQ(request.path_params, expected_params); +} + +TEST(PathParamsTest, SequenceOfParams) { + const auto pattern = "/values/:x/:y/:z"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/values/1/2/3"; + ASSERT_TRUE(matcher.match(request)); + + std::unordered_map<std::string, std::string> expected_params = { + {"x", "1"}, {"y", "2"}, {"z", "3"}}; + + EXPECT_EQ(request.path_params, expected_params); +} + +TEST(PathParamsTest, SemicolonInTheMiddleIsNotAParam) { + const auto pattern = "/prefix:suffix"; + detail::PathParamsMatcher matcher(pattern); + + Request request; + request.path = "/prefix:suffix"; + ASSERT_TRUE(matcher.match(request)); + + const std::unordered_map<std::string, std::string> expected_params = {}; + EXPECT_EQ(request.path_params, expected_params); +} + +TEST(UniversalClientImplTest, Ipv6LiteralAddress) { + // If ipv6 regex working, regex match codepath is taken. + // else port will default to 80 in Client impl + int clientImplMagicPort = 80; + int port = 4321; + // above ports must be different to avoid false negative + EXPECT_NE(clientImplMagicPort, port); + + std::string ipV6TestURL = "http://[ff06::c3]"; + + Client cli(ipV6TestURL + ":" + std::to_string(port), CLIENT_CERT_FILE, + CLIENT_PRIVATE_KEY_FILE); + EXPECT_EQ(cli.port(), port); +} + +TEST(FileSystemTest, FileAndDirExistenceCheck) { + auto file_path = "./www/dir/index.html"; + auto dir_path = "./www/dir"; + + detail::FileStat stat_file(file_path); + EXPECT_TRUE(stat_file.is_file()); + EXPECT_FALSE(stat_file.is_dir()); + + detail::FileStat stat_dir(dir_path); + EXPECT_FALSE(stat_dir.is_file()); + EXPECT_TRUE(stat_dir.is_dir()); +} + +TEST(DirtyDataRequestTest, HeadFieldValueContains_CR_LF_NUL) { + Server svr; + + svr.Get("/test", [&](const Request & /*req*/, Response &res) { + EXPECT_EQ(res.status, 400); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + cli.Get("/test", {{"Test", "_\n\r_\n\r_"}}); +} + +TEST(InvalidHeaderCharsTest, is_field_name) { + EXPECT_TRUE(detail::fields::is_field_name("exampleToken")); + EXPECT_TRUE(detail::fields::is_field_name("token123")); + EXPECT_TRUE(detail::fields::is_field_name("!#$%&'*+-.^_`|~")); + + EXPECT_FALSE(detail::fields::is_field_name("example token")); + EXPECT_FALSE(detail::fields::is_field_name(" example_token")); + EXPECT_FALSE(detail::fields::is_field_name("example_token ")); + EXPECT_FALSE(detail::fields::is_field_name("token@123")); + EXPECT_FALSE(detail::fields::is_field_name("")); + EXPECT_FALSE(detail::fields::is_field_name("example\rtoken")); + EXPECT_FALSE(detail::fields::is_field_name("example\ntoken")); + EXPECT_FALSE(detail::fields::is_field_name(std::string("\0", 1))); + EXPECT_FALSE(detail::fields::is_field_name("example\ttoken")); +} + +TEST(InvalidHeaderCharsTest, is_field_value) { + EXPECT_TRUE(detail::fields::is_field_value("exampleToken")); + EXPECT_TRUE(detail::fields::is_field_value("token123")); + EXPECT_TRUE(detail::fields::is_field_value("!#$%&'*+-.^_`|~")); + + EXPECT_TRUE(detail::fields::is_field_value("example token")); + EXPECT_FALSE(detail::fields::is_field_value(" example_token")); + EXPECT_FALSE(detail::fields::is_field_value("example_token ")); + EXPECT_TRUE(detail::fields::is_field_value("token@123")); + EXPECT_TRUE(detail::fields::is_field_value("")); + EXPECT_FALSE(detail::fields::is_field_value("example\rtoken")); + EXPECT_FALSE(detail::fields::is_field_value("example\ntoken")); + EXPECT_FALSE(detail::fields::is_field_value(std::string("\0", 1))); + EXPECT_TRUE(detail::fields::is_field_value("example\ttoken")); + + EXPECT_TRUE(detail::fields::is_field_value("0")); +} + +TEST(InvalidHeaderCharsTest, OnServer) { + Server svr; + + svr.Get("/test_name", [&](const Request &req, Response &res) { + std::string header = "Not Set"; + if (req.has_param("header")) { header = req.get_param_value("header"); } + + res.set_header(header, "value"); + res.set_content("Page Content Page Content", "text/plain"); + }); + + svr.Get("/test_value", [&](const Request &req, Response &res) { + std::string header = "Not Set"; + if (req.has_param("header")) { header = req.get_param_value("header"); } + + res.set_header("X-Test", header); + res.set_content("Page Content Page Content", "text/plain"); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + Client cli(HOST, PORT); + { + auto res = cli.Get( + R"(/test_name?header=Value%00%0d%0aHEADER_KEY%3aHEADER_VALUE%0d%0a%0d%0aBODY_BODY_BODY)"); + + ASSERT_TRUE(res); + EXPECT_EQ("Page Content Page Content", res->body); + EXPECT_FALSE(res->has_header("HEADER_KEY")); + } + { + auto res = cli.Get( + R"(/test_value?header=Value%00%0d%0aHEADER_KEY%3aHEADER_VALUE%0d%0a%0d%0aBODY_BODY_BODY)"); + + ASSERT_TRUE(res); + EXPECT_EQ("Page Content Page Content", res->body); + EXPECT_FALSE(res->has_header("HEADER_KEY")); + } +} + +TEST(InvalidHeaderValueTest, InvalidContentLength) { + auto handled = false; + + Server svr; + svr.Post("/test", [&](const Request &, Response &) { handled = true; }); + + thread t = thread([&] { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + ASSERT_FALSE(handled); + }); + + svr.wait_until_ready(); + + auto req = "POST /test HTTP/1.1\r\n" + "Content-Length: x\r\n" + "\r\n"; + + std::string response; + ASSERT_TRUE(send_request(1, req, &response)); + ASSERT_EQ("HTTP/1.1 400 Bad Request", + response.substr(0, response.find("\r\n"))); +} + +#ifndef _WIN32 +TEST(Expect100ContinueTest, ServerClosesConnection) { + static constexpr char reject[] = "Unauthorized"; + static constexpr char accept[] = "Upload accepted"; + constexpr size_t total_size = 10 * 1024 * 1024 * 1024ULL; + + Server svr; + + svr.set_expect_100_continue_handler( + [](const Request & /*req*/, Response &res) { + res.status = StatusCode::Unauthorized_401; + res.set_content(reject, "text/plain"); + return res.status; + }); + svr.Post("/", [&](const Request & /*req*/, Response &res) { + res.set_content(accept, "text/plain"); + }); + + auto thread = std::thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + { + const auto curl = std::unique_ptr<CURL, decltype(&curl_easy_cleanup)>{ + curl_easy_init(), &curl_easy_cleanup}; + ASSERT_NE(curl, nullptr); + + curl_easy_setopt(curl.get(), CURLOPT_URL, HOST); + curl_easy_setopt(curl.get(), CURLOPT_PORT, PORT); + curl_easy_setopt(curl.get(), CURLOPT_POST, 1L); + auto list = std::unique_ptr<curl_slist, decltype(&curl_slist_free_all)>{ + curl_slist_append(nullptr, "Content-Type: application/octet-stream"), + &curl_slist_free_all}; + ASSERT_NE(list, nullptr); + curl_easy_setopt(curl.get(), CURLOPT_HTTPHEADER, list.get()); + + struct read_data { + size_t read_size; + size_t total_size; + } data = {0, total_size}; + using read_callback_t = + size_t (*)(char *ptr, size_t size, size_t nmemb, void *userdata); + read_callback_t read_callback = [](char *ptr, size_t size, size_t nmemb, + void *userdata) -> size_t { + read_data *data = (read_data *)userdata; + + if (!userdata || data->read_size >= data->total_size) { return 0; } + + std::fill_n(ptr, size * nmemb, 'A'); + data->read_size += size * nmemb; + return size * nmemb; + }; + curl_easy_setopt(curl.get(), CURLOPT_READDATA, data); + curl_easy_setopt(curl.get(), CURLOPT_READFUNCTION, read_callback); + + std::vector<char> buffer; + curl_easy_setopt(curl.get(), CURLOPT_WRITEDATA, &buffer); + using write_callback_t = + size_t (*)(char *ptr, size_t size, size_t nmemb, void *userdata); + write_callback_t write_callback = [](char *ptr, size_t size, size_t nmemb, + void *userdata) -> size_t { + std::vector<char> *buffer = (std::vector<char> *)userdata; + buffer->reserve(buffer->size() + size * nmemb + 1); + buffer->insert(buffer->end(), (char *)ptr, (char *)ptr + size * nmemb); + return size * nmemb; + }; + curl_easy_setopt(curl.get(), CURLOPT_WRITEFUNCTION, write_callback); + + { + const auto res = curl_easy_perform(curl.get()); + ASSERT_EQ(res, CURLE_OK); + } + + { + auto response_code = long{}; + const auto res = + curl_easy_getinfo(curl.get(), CURLINFO_RESPONSE_CODE, &response_code); + ASSERT_EQ(res, CURLE_OK); + ASSERT_EQ(response_code, StatusCode::Unauthorized_401); + } + + { + auto dl = curl_off_t{}; + const auto res = + curl_easy_getinfo(curl.get(), CURLINFO_SIZE_DOWNLOAD_T, &dl); + ASSERT_EQ(res, CURLE_OK); + ASSERT_EQ(dl, (curl_off_t)sizeof reject - 1); + } + + { + buffer.push_back('\0'); + ASSERT_STRCASEEQ(buffer.data(), reject); + } + } +} +#endif + +template <typename S, typename C> +inline void max_timeout_test(S &svr, C &cli, time_t timeout, time_t threshold) { + svr.Get("/stream", [&](const Request &, Response &res) { + auto data = new std::string("01234567890123456789"); + + res.set_content_provider( + data->size(), "text/plain", + [&, data](size_t offset, size_t length, DataSink &sink) { + const size_t DATA_CHUNK_SIZE = 4; + const auto &d = *data; + std::this_thread::sleep_for(std::chrono::seconds(1)); + sink.write(&d[offset], std::min(length, DATA_CHUNK_SIZE)); + return true; + }, + [data](bool success) { + EXPECT_FALSE(success); + delete data; + }); + }); + + svr.Get("/stream_without_length", [&](const Request &, Response &res) { + auto i = new size_t(0); + + res.set_content_provider( + "text/plain", + [i](size_t, DataSink &sink) { + if (*i < 5) { + std::this_thread::sleep_for(std::chrono::seconds(1)); + sink.write("abcd", 4); + (*i)++; + } else { + sink.done(); + } + return true; + }, + [i](bool success) { + EXPECT_FALSE(success); + delete i; + }); + }); + + svr.Get("/chunked", [&](const Request &, Response &res) { + auto i = new size_t(0); + + res.set_chunked_content_provider( + "text/plain", + [i](size_t, DataSink &sink) { + if (*i < 5) { + std::this_thread::sleep_for(std::chrono::seconds(1)); + sink.os << "abcd"; + (*i)++; + } else { + sink.done(); + } + return true; + }, + [i](bool success) { + EXPECT_FALSE(success); + delete i; + }); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + listen_thread.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + cli.set_max_timeout(std::chrono::milliseconds(timeout)); + + { + auto start = std::chrono::steady_clock::now(); + + auto res = cli.Get("/stream"); + + auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( + std::chrono::steady_clock::now() - start) + .count(); + + ASSERT_FALSE(res); + EXPECT_EQ(Error::Read, res.error()); + EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) + << "Timeout exceeded by " << (elapsed - timeout) << "ms"; + } + + { + auto start = std::chrono::steady_clock::now(); + + auto res = cli.Get("/stream_without_length"); + + auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( + std::chrono::steady_clock::now() - start) + .count(); + + ASSERT_FALSE(res); + EXPECT_EQ(Error::Read, res.error()); + EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) + << "Timeout exceeded by " << (elapsed - timeout) << "ms"; + } + + { + auto start = std::chrono::steady_clock::now(); + + auto res = cli.Get("/chunked", [&](const char *data, size_t data_length) { + EXPECT_EQ("abcd", string(data, data_length)); + return true; + }); + + auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>( + std::chrono::steady_clock::now() - start) + .count(); + + ASSERT_FALSE(res); + EXPECT_EQ(Error::Read, res.error()); + EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold) + << "Timeout exceeded by " << (elapsed - timeout) << "ms"; + } +} + +TEST(MaxTimeoutTest, ContentStream) { + time_t timeout = 2000; + time_t threshold = 200; + + Server svr; + Client cli("localhost", PORT); + max_timeout_test(svr, cli, timeout, threshold); +} + +#ifdef CPPHTTPLIB_OPENSSL_SUPPORT +TEST(MaxTimeoutTest, ContentStreamSSL) { + time_t timeout = 2000; + time_t threshold = 1200; // SSL_shutdown is slow on some operating systems. + + SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE); + + SSLClient cli("localhost", PORT); + cli.enable_server_certificate_verification(false); + + max_timeout_test(svr, cli, timeout, threshold); +} +#endif + +class EventDispatcher { +public: + EventDispatcher() {} + + void wait_event(DataSink *sink) { + unique_lock<mutex> lk(m_); + int id = id_; + cv_.wait(lk, [&] { return cid_ == id; }); + sink->write(message_.data(), message_.size()); + } + + void send_event(const string &message) { + lock_guard<mutex> lk(m_); + cid_ = id_++; + message_ = message; + cv_.notify_all(); + } + +private: + mutex m_; + condition_variable cv_; + atomic_int id_{0}; + atomic_int cid_{-1}; + string message_; +}; + +TEST(ClientInThreadTest, Issue2068) { + EventDispatcher ed; + + Server svr; + svr.Get("/event1", [&](const Request & /*req*/, Response &res) { + res.set_chunked_content_provider("text/event-stream", + [&](size_t /*offset*/, DataSink &sink) { + ed.wait_event(&sink); + return true; + }); + }); + + auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); }); + + svr.wait_until_ready(); + + thread event_thread([&] { + int id = 0; + while (svr.is_running()) { + this_thread::sleep_for(chrono::milliseconds(500)); + + std::stringstream ss; + ss << "data: " << id << "\n\n"; + ed.send_event(ss.str()); + id++; + } + }); + + auto se = detail::scope_exit([&] { + svr.stop(); + + listen_thread.join(); + event_thread.join(); + + ASSERT_FALSE(svr.is_running()); + }); + + { + auto client = detail::make_unique<Client>(HOST, PORT); + client->set_read_timeout(std::chrono::minutes(10)); + + std::atomic<bool> stop{false}; + + std::thread t([&] { + client->Get("/event1", + [&](const char *, size_t) -> bool { return !stop; }); + }); + + std::this_thread::sleep_for(std::chrono::seconds(2)); + stop = true; + client->stop(); + client.reset(); + + t.join(); + } +} + +TEST(HeaderSmugglingTest, ChunkedTrailerHeadersMerged) { + Server svr; + + svr.Get("/", [](const Request &req, Response &res) { + EXPECT_EQ(2U, req.trailers.size()); + + EXPECT_FALSE(req.has_trailer("[invalid key...]")); + + // Denied + EXPECT_FALSE(req.has_trailer("Content-Length")); + EXPECT_FALSE(req.has_trailer("X-Forwarded-For")); + + // Accepted + EXPECT_TRUE(req.has_trailer("X-Hello")); + EXPECT_EQ(req.get_trailer_value("X-Hello"), "hello"); + + EXPECT_TRUE(req.has_trailer("X-World")); + EXPECT_EQ(req.get_trailer_value("X-World"), "world"); + + res.set_content("ok", "text/plain"); + }); + + thread t = thread([&]() { svr.listen(HOST, PORT); }); + auto se = detail::scope_exit([&] { + svr.stop(); + t.join(); + ASSERT_FALSE(svr.is_running()); + }); + + svr.wait_until_ready(); + + const std::string req = "GET / HTTP/1.1\r\n" + "Transfer-Encoding: chunked\r\n" + "Trailer: X-Hello, X-World, X-AAA, X-BBB\r\n" + "\r\n" + "0\r\n" + "Content-Length: 10\r\n" + "Host: internal.local\r\n" + "Content-Type: malicious/content\r\n" + "Cookie: any\r\n" + "Set-Cookie: any\r\n" + "X-Forwarded-For: attacker.com\r\n" + "X-Real-Ip: 1.1.1.1\r\n" + "X-Hello: hello\r\n" + "X-World: world\r\n" + "\r\n"; + + std::string res; + ASSERT_TRUE(send_request(1, req, &res)); +} |
