summaryrefslogtreecommitdiff
path: root/libs/cpp-httplib/test/test.cc
diff options
context:
space:
mode:
authorAldrik Ramaekers <aldrikboy@gmail.com>2025-09-27 18:38:35 +0200
committerAldrik Ramaekers <aldrikboy@gmail.com>2025-09-27 18:38:35 +0200
commitd8c4d84dc75300c6d4d8b0adceafa33741960b92 (patch)
tree00e2dfcc5c836d62fccff76c862e6ec3b0a74db8 /libs/cpp-httplib/test/test.cc
parentfa088bb60692ba02d30d39affa9a31d9e2b688e2 (diff)
added http lib, working on AI invoice importing
Diffstat (limited to 'libs/cpp-httplib/test/test.cc')
-rw-r--r--libs/cpp-httplib/test/test.cc10830
1 files changed, 10830 insertions, 0 deletions
diff --git a/libs/cpp-httplib/test/test.cc b/libs/cpp-httplib/test/test.cc
new file mode 100644
index 0000000..a9ac0d1
--- /dev/null
+++ b/libs/cpp-httplib/test/test.cc
@@ -0,0 +1,10830 @@
+// NOTE: This file should be saved as UTF-8 w/ BOM
+#include <httplib.h>
+#include <signal.h>
+
+#ifndef _WIN32
+#include <arpa/inet.h>
+#include <curl/curl.h>
+#include <netinet/in.h>
+#include <sys/socket.h>
+#include <unistd.h>
+#endif
+#include <gtest/gtest.h>
+
+#include <atomic>
+#include <chrono>
+#include <fstream>
+#include <future>
+#include <limits>
+#include <memory>
+#include <sstream>
+#include <stdexcept>
+#include <thread>
+#include <type_traits>
+#include <vector>
+
+#define SERVER_CERT_FILE "./cert.pem"
+#define SERVER_CERT2_FILE "./cert2.pem"
+#define SERVER_PRIVATE_KEY_FILE "./key.pem"
+#define CA_CERT_FILE "./ca-bundle.crt"
+#define CLIENT_CA_CERT_FILE "./rootCA.cert.pem"
+#define CLIENT_CA_CERT_DIR "."
+#define CLIENT_CERT_FILE "./client.cert.pem"
+#define CLIENT_PRIVATE_KEY_FILE "./client.key.pem"
+#define CLIENT_ENCRYPTED_CERT_FILE "./client_encrypted.cert.pem"
+#define CLIENT_ENCRYPTED_PRIVATE_KEY_FILE "./client_encrypted.key.pem"
+#define CLIENT_ENCRYPTED_PRIVATE_KEY_PASS "test012!"
+#define SERVER_ENCRYPTED_CERT_FILE "./cert_encrypted.pem"
+#define SERVER_ENCRYPTED_PRIVATE_KEY_FILE "./key_encrypted.pem"
+#define SERVER_ENCRYPTED_PRIVATE_KEY_PASS "test123!"
+
+using namespace std;
+using namespace httplib;
+
+const char *HOST = "localhost";
+const int PORT = 1234;
+
+const string LONG_QUERY_VALUE = string(25000, '@');
+const string LONG_QUERY_URL = "/long-query-value?key=" + LONG_QUERY_VALUE;
+
+const string TOO_LONG_QUERY_VALUE = string(35000, '@');
+const string TOO_LONG_QUERY_URL =
+ "/too-long-query-value?key=" + TOO_LONG_QUERY_VALUE;
+
+const std::string JSON_DATA = "{\"hello\":\"world\"}";
+
+const string LARGE_DATA = string(1024 * 1024 * 100, '@'); // 100MB
+
+FormData &get_file_value(std::vector<FormData> &items, const char *key) {
+ auto it = std::find_if(items.begin(), items.end(), [&](const FormData &file) {
+ return file.name == key;
+ });
+#ifdef CPPHTTPLIB_NO_EXCEPTIONS
+ return *it;
+#else
+ if (it != items.end()) { return *it; }
+ throw std::runtime_error("invalid multipart form data name error");
+#endif
+}
+
+static void read_file(const std::string &path, std::string &out) {
+ std::ifstream fs(path, std::ios_base::binary);
+ if (!fs) throw std::runtime_error("File not found: " + path);
+ fs.seekg(0, std::ios_base::end);
+ auto size = fs.tellg();
+ fs.seekg(0);
+ out.resize(static_cast<size_t>(size));
+ fs.read(&out[0], static_cast<std::streamsize>(size));
+}
+
+class UnixSocketTest : public ::testing::Test {
+protected:
+ void TearDown() override { std::remove(pathname_.c_str()); }
+
+ void client_GET(const std::string &addr) {
+ httplib::Client cli{addr};
+ cli.set_address_family(AF_UNIX);
+ ASSERT_TRUE(cli.is_valid());
+
+ const auto &result = cli.Get(pattern_);
+ ASSERT_TRUE(result) << "error: " << result.error();
+
+ const auto &resp = result.value();
+ EXPECT_EQ(resp.status, StatusCode::OK_200);
+ EXPECT_EQ(resp.body, content_);
+ }
+
+ const std::string pathname_{"./httplib-server.sock"};
+ const std::string pattern_{"/hi"};
+ const std::string content_{"Hello World!"};
+};
+
+TEST_F(UnixSocketTest, pathname) {
+ httplib::Server svr;
+ svr.Get(pattern_, [&](const httplib::Request &, httplib::Response &res) {
+ res.set_content(content_, "text/plain");
+ });
+
+ std::thread t{[&] {
+ ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80));
+ }};
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+ ASSERT_TRUE(svr.is_running());
+
+ client_GET(pathname_);
+}
+
+#if defined(__linux__) || \
+ /* __APPLE__ */ (defined(SOL_LOCAL) && defined(SO_PEERPID))
+TEST_F(UnixSocketTest, PeerPid) {
+ httplib::Server svr;
+ std::string remote_port_val;
+ svr.Get(pattern_, [&](const httplib::Request &req, httplib::Response &res) {
+ res.set_content(content_, "text/plain");
+ remote_port_val = req.get_header_value("REMOTE_PORT");
+ });
+
+ std::thread t{[&] {
+ ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80));
+ }};
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+ ASSERT_TRUE(svr.is_running());
+
+ client_GET(pathname_);
+ EXPECT_EQ(std::to_string(getpid()), remote_port_val);
+}
+#endif
+
+#ifdef __linux__
+TEST_F(UnixSocketTest, abstract) {
+ constexpr char svr_path[]{"\x00httplib-server.sock"};
+ const std::string abstract_addr{svr_path, sizeof(svr_path) - 1};
+
+ httplib::Server svr;
+ svr.Get(pattern_, [&](const httplib::Request &, httplib::Response &res) {
+ res.set_content(content_, "text/plain");
+ });
+
+ std::thread t{[&] {
+ ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(abstract_addr, 80));
+ }};
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+ ASSERT_TRUE(svr.is_running());
+
+ client_GET(abstract_addr);
+}
+#endif
+
+TEST_F(UnixSocketTest, HostHeaderAutoSet) {
+ httplib::Server svr;
+ std::string received_host_header;
+
+ svr.Get(pattern_, [&](const httplib::Request &req, httplib::Response &res) {
+ // Capture the Host header sent by the client
+ auto host_iter = req.headers.find("Host");
+ if (host_iter != req.headers.end()) {
+ received_host_header = host_iter->second;
+ }
+ res.set_content(content_, "text/plain");
+ });
+
+ std::thread t{[&] {
+ ASSERT_TRUE(svr.set_address_family(AF_UNIX).listen(pathname_, 80));
+ }};
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+ ASSERT_TRUE(svr.is_running());
+
+ // Test that Host header is automatically set to "localhost" for Unix socket
+ // connections
+ httplib::Client cli{pathname_};
+ cli.set_address_family(AF_UNIX);
+ ASSERT_TRUE(cli.is_valid());
+
+ const auto &result = cli.Get(pattern_);
+ ASSERT_TRUE(result) << "error: " << result.error();
+
+ const auto &resp = result.value();
+ EXPECT_EQ(resp.status, StatusCode::OK_200);
+ EXPECT_EQ(resp.body, content_);
+
+ // Verify that Host header was automatically set to "localhost"
+ EXPECT_EQ(received_host_header, "localhost");
+}
+
+#ifndef _WIN32
+TEST(SocketStream, wait_writable_UNIX) {
+ int fds[2];
+ ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_STREAM, 0, fds));
+
+ const auto asSocketStream = [&](socket_t fd,
+ std::function<bool(Stream &)> func) {
+ return detail::process_client_socket(
+ fd, 0, 0, 0, 0, 0, std::chrono::steady_clock::time_point::min(), func);
+ };
+ asSocketStream(fds[0], [&](Stream &s0) {
+ EXPECT_EQ(s0.socket(), fds[0]);
+ EXPECT_TRUE(s0.wait_writable());
+
+ EXPECT_EQ(0, close(fds[1]));
+ EXPECT_FALSE(s0.wait_writable());
+
+ return true;
+ });
+ EXPECT_EQ(0, close(fds[0]));
+}
+
+TEST(SocketStream, wait_writable_INET) {
+ sockaddr_in addr;
+ memset(&addr, 0, sizeof(addr));
+ addr.sin_family = AF_INET;
+ addr.sin_port = htons(PORT + 1);
+ addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
+
+ int disconnected_svr_sock = -1;
+ std::thread svr{[&] {
+ const int s = socket(AF_INET, SOCK_STREAM, 0);
+ ASSERT_LE(0, s);
+ ASSERT_EQ(0, ::bind(s, reinterpret_cast<sockaddr *>(&addr), sizeof(addr)));
+ ASSERT_EQ(0, listen(s, 1));
+ ASSERT_LE(0, disconnected_svr_sock = accept(s, nullptr, nullptr));
+ ASSERT_EQ(0, close(s));
+ }};
+ std::this_thread::sleep_for(std::chrono::milliseconds(100));
+
+ std::thread cli{[&] {
+ const int s = socket(AF_INET, SOCK_STREAM, 0);
+ ASSERT_LE(0, s);
+ ASSERT_EQ(0, connect(s, reinterpret_cast<sockaddr *>(&addr), sizeof(addr)));
+ ASSERT_EQ(0, close(s));
+ }};
+ cli.join();
+ svr.join();
+ ASSERT_NE(disconnected_svr_sock, -1);
+
+ const auto asSocketStream = [&](socket_t fd,
+ std::function<bool(Stream &)> func) {
+ return detail::process_client_socket(
+ fd, 0, 0, 0, 0, 0, std::chrono::steady_clock::time_point::min(), func);
+ };
+ asSocketStream(disconnected_svr_sock, [&](Stream &ss) {
+ EXPECT_EQ(ss.socket(), disconnected_svr_sock);
+ EXPECT_FALSE(ss.wait_writable());
+
+ return true;
+ });
+
+ ASSERT_EQ(0, close(disconnected_svr_sock));
+}
+#endif // #ifndef _WIN32
+
+TEST(ClientTest, MoveConstructible) {
+ EXPECT_FALSE(std::is_copy_constructible<Client>::value);
+ EXPECT_TRUE(std::is_nothrow_move_constructible<Client>::value);
+}
+
+TEST(ClientTest, MoveAssignable) {
+ EXPECT_FALSE(std::is_copy_assignable<Client>::value);
+ EXPECT_TRUE(std::is_nothrow_move_assignable<Client>::value);
+}
+
+#ifdef _WIN32
+TEST(StartupTest, WSAStartup) {
+ WSADATA wsaData;
+ int ret = WSAStartup(0x0002, &wsaData);
+ ASSERT_EQ(0, ret);
+}
+#endif
+
+TEST(DecodePathTest, PercentCharacter) {
+ EXPECT_EQ(
+ decode_path_component(
+ R"(descrip=Gastos%20%C3%A1%C3%A9%C3%AD%C3%B3%C3%BA%C3%B1%C3%91%206)"),
+ u8"descrip=Gastos áéíóúñÑ 6");
+}
+
+TEST(DecodePathTest, PercentCharacterNUL) {
+ string expected;
+ expected.push_back('x');
+ expected.push_back('\0');
+ expected.push_back('x');
+
+ EXPECT_EQ(decode_path_component("x%00x"), expected);
+}
+
+TEST(EncodeQueryParamTest, ParseUnescapedChararactersTest) {
+ string unescapedCharacters = "-_.!~*'()";
+
+ EXPECT_EQ(httplib::encode_uri_component(unescapedCharacters), "-_.!~*'()");
+}
+
+TEST(EncodeQueryParamTest, ParseReservedCharactersTest) {
+ string reservedCharacters = ";,/?:@&=+$";
+
+ EXPECT_EQ(httplib::encode_uri_component(reservedCharacters),
+ "%3B%2C%2F%3F%3A%40%26%3D%2B%24");
+}
+
+TEST(EncodeQueryParamTest, TestUTF8Characters) {
+ string chineseCharacters = u8"中国語";
+ string russianCharacters = u8"дом";
+ string brazilianCharacters = u8"óculos";
+
+ EXPECT_EQ(httplib::encode_uri_component(chineseCharacters),
+ "%E4%B8%AD%E5%9B%BD%E8%AA%9E");
+
+ EXPECT_EQ(httplib::encode_uri_component(russianCharacters),
+ "%D0%B4%D0%BE%D0%BC");
+
+ EXPECT_EQ(httplib::encode_uri_component(brazilianCharacters), "%C3%B3culos");
+}
+
+TEST(EncodeUriComponentTest, ParseUnescapedChararactersTest) {
+ string unescapedCharacters = "-_.!~*'()";
+
+ EXPECT_EQ(httplib::encode_uri_component(unescapedCharacters), "-_.!~*'()");
+}
+
+TEST(EncodeUriComponentTest, ParseReservedCharactersTest) {
+ string reservedCharacters = ";,/?:@&=+$";
+
+ EXPECT_EQ(httplib::encode_uri_component(reservedCharacters),
+ "%3B%2C%2F%3F%3A%40%26%3D%2B%24");
+}
+
+TEST(EncodeUriComponentTest, TestUTF8Characters) {
+ string chineseCharacters = u8"中国語";
+ string russianCharacters = u8"дом";
+ string brazilianCharacters = u8"óculos";
+
+ EXPECT_EQ(httplib::encode_uri_component(chineseCharacters),
+ "%E4%B8%AD%E5%9B%BD%E8%AA%9E");
+
+ EXPECT_EQ(httplib::encode_uri_component(russianCharacters),
+ "%D0%B4%D0%BE%D0%BC");
+
+ EXPECT_EQ(httplib::encode_uri_component(brazilianCharacters), "%C3%B3culos");
+}
+
+TEST(EncodeUriComponentTest, TestPathComponentEncoding) {
+ // Issue #2082 use case: encoding path component with ampersand
+ string pathWithAmpersand = "Piri Tommy Villiers - on & on";
+
+ EXPECT_EQ(httplib::encode_uri_component(pathWithAmpersand),
+ "Piri%20Tommy%20Villiers%20-%20on%20%26%20on");
+}
+
+TEST(EncodeUriTest, ParseUnescapedChararactersTest) {
+ string unescapedCharacters = "-_.!~*'()";
+
+ EXPECT_EQ(httplib::encode_uri(unescapedCharacters), "-_.!~*'()");
+}
+
+TEST(EncodeUriTest, ParseReservedCharactersTest) {
+ string reservedCharacters = ";,/?:@&=+$#";
+
+ EXPECT_EQ(httplib::encode_uri(reservedCharacters), ";,/?:@&=+$#");
+}
+
+TEST(EncodeUriTest, TestUTF8Characters) {
+ string chineseCharacters = u8"中国語";
+ string russianCharacters = u8"дом";
+ string brazilianCharacters = u8"óculos";
+
+ EXPECT_EQ(httplib::encode_uri(chineseCharacters),
+ "%E4%B8%AD%E5%9B%BD%E8%AA%9E");
+
+ EXPECT_EQ(httplib::encode_uri(russianCharacters), "%D0%B4%D0%BE%D0%BC");
+
+ EXPECT_EQ(httplib::encode_uri(brazilianCharacters), "%C3%B3culos");
+}
+
+TEST(EncodeUriTest, TestCompleteUri) {
+ string uri =
+ "https://example.com/path/to/resource?query=value&param=test#fragment";
+
+ EXPECT_EQ(
+ httplib::encode_uri(uri),
+ "https://example.com/path/to/resource?query=value&param=test#fragment");
+}
+
+TEST(EncodeUriTest, TestUriWithSpacesAndSpecialChars) {
+ string uri =
+ "https://example.com/path with spaces/file name.html?q=hello world";
+
+ EXPECT_EQ(httplib::encode_uri(uri),
+ "https://example.com/path%20with%20spaces/"
+ "file%20name.html?q=hello%20world");
+}
+
+TEST(DecodeUriComponentTest, ParseEncodedChararactersTest) {
+ string encodedString = "%3B%2C%2F%3F%3A%40%26%3D%2B%24";
+
+ EXPECT_EQ(httplib::decode_uri_component(encodedString), ";,/?:@&=+$");
+}
+
+TEST(DecodeUriComponentTest, ParseUnescapedChararactersTest) {
+ string unescapedCharacters = "-_.!~*'()";
+
+ EXPECT_EQ(httplib::decode_uri_component(unescapedCharacters), "-_.!~*'()");
+}
+
+TEST(DecodeUriComponentTest, TestUTF8Characters) {
+ string encodedChinese = "%E4%B8%AD%E5%9B%BD%E8%AA%9E";
+ string encodedRussian = "%D0%B4%D0%BE%D0%BC";
+ string encodedBrazilian = "%C3%B3culos";
+
+ EXPECT_EQ(httplib::decode_uri_component(encodedChinese), u8"中国語");
+ EXPECT_EQ(httplib::decode_uri_component(encodedRussian), u8"дом");
+ EXPECT_EQ(httplib::decode_uri_component(encodedBrazilian), u8"óculos");
+}
+
+TEST(DecodeUriComponentTest, TestPathComponentDecoding) {
+ string encodedPath = "Piri%20Tommy%20Villiers%20-%20on%20%26%20on";
+
+ EXPECT_EQ(httplib::decode_uri_component(encodedPath),
+ "Piri Tommy Villiers - on & on");
+}
+
+TEST(DecodeUriTest, ParseEncodedChararactersTest) {
+ string encodedString = "%20%22%3C%3E%5C%5E%60%7B%7D%7C";
+
+ EXPECT_EQ(httplib::decode_uri(encodedString), " \"<>\\^`{}|");
+}
+
+TEST(DecodeUriTest, ParseUnescapedChararactersTest) {
+ string unescapedCharacters = "-_.!~*'();,/?:@&=+$#";
+
+ EXPECT_EQ(httplib::decode_uri(unescapedCharacters), "-_.!~*'();,/?:@&=+$#");
+}
+
+TEST(DecodeUriTest, TestUTF8Characters) {
+ string encodedChinese = "%E4%B8%AD%E5%9B%BD%E8%AA%9E";
+ string encodedRussian = "%D0%B4%D0%BE%D0%BC";
+ string encodedBrazilian = "%C3%B3culos";
+
+ EXPECT_EQ(httplib::decode_uri(encodedChinese), u8"中国語");
+ EXPECT_EQ(httplib::decode_uri(encodedRussian), u8"дом");
+ EXPECT_EQ(httplib::decode_uri(encodedBrazilian), u8"óculos");
+}
+
+TEST(DecodeUriTest, TestCompleteUri) {
+ string encodedUri = "https://example.com/path%20with%20spaces/"
+ "file%20name.html?q=hello%20world";
+
+ EXPECT_EQ(
+ httplib::decode_uri(encodedUri),
+ "https://example.com/path with spaces/file name.html?q=hello world");
+}
+
+TEST(DecodeUriTest, TestRoundTripWithEncodeUri) {
+ string original =
+ "https://example.com/path with spaces/file name.html?q=hello world";
+ string encoded = httplib::encode_uri(original);
+ string decoded = httplib::decode_uri(encoded);
+
+ EXPECT_EQ(decoded, original);
+}
+
+TEST(DecodeUriComponentTest, TestRoundTripWithEncodeUriComponent) {
+ string original = "Piri Tommy Villiers - on & on";
+ string encoded = httplib::encode_uri_component(original);
+ string decoded = httplib::decode_uri_component(encoded);
+
+ EXPECT_EQ(decoded, original);
+}
+
+TEST(TrimTests, TrimStringTests) {
+ EXPECT_EQ("abc", detail::trim_copy("abc"));
+ EXPECT_EQ("abc", detail::trim_copy(" abc "));
+ EXPECT_TRUE(detail::trim_copy("").empty());
+}
+
+TEST(ParseAcceptHeaderTest, BasicAcceptParsing) {
+ // Simple case without quality values
+ std::vector<std::string> result1;
+ EXPECT_TRUE(detail::parse_accept_header(
+ "text/html,application/json,text/plain", result1));
+ EXPECT_EQ(result1.size(), 3U);
+ EXPECT_EQ(result1[0], "text/html");
+ EXPECT_EQ(result1[1], "application/json");
+ EXPECT_EQ(result1[2], "text/plain");
+
+ // With quality values
+ std::vector<std::string> result2;
+ EXPECT_TRUE(detail::parse_accept_header(
+ "text/html;q=0.9,application/json;q=1.0,text/plain;q=0.8", result2));
+ EXPECT_EQ(result2.size(), 3U);
+ EXPECT_EQ(result2[0], "application/json"); // highest q value
+ EXPECT_EQ(result2[1], "text/html");
+ EXPECT_EQ(result2[2], "text/plain"); // lowest q value
+}
+
+TEST(ParseAcceptHeaderTest, MixedQualityValues) {
+ // Mixed with and without quality values
+ std::vector<std::string> result;
+ EXPECT_TRUE(detail::parse_accept_header(
+ "text/html,application/json;q=0.5,text/plain;q=0.8", result));
+ EXPECT_EQ(result.size(), 3U);
+ EXPECT_EQ(result[0], "text/html"); // no q value means 1.0
+ EXPECT_EQ(result[1], "text/plain"); // q=0.8
+ EXPECT_EQ(result[2], "application/json"); // q=0.5
+}
+
+TEST(ParseAcceptHeaderTest, EdgeCases) {
+ // Empty header
+ std::vector<std::string> empty_result;
+ EXPECT_TRUE(detail::parse_accept_header("", empty_result));
+ EXPECT_TRUE(empty_result.empty());
+
+ // Single type
+ std::vector<std::string> single_result;
+ EXPECT_TRUE(detail::parse_accept_header("application/json", single_result));
+ EXPECT_EQ(single_result.size(), 1U);
+ EXPECT_EQ(single_result[0], "application/json");
+
+ // Wildcard types
+ std::vector<std::string> wildcard_result;
+ EXPECT_TRUE(detail::parse_accept_header(
+ "text/*;q=0.5,*/*;q=0.1,application/json", wildcard_result));
+ EXPECT_EQ(wildcard_result.size(), 3U);
+ EXPECT_EQ(wildcard_result[0], "application/json");
+ EXPECT_EQ(wildcard_result[1], "text/*");
+ EXPECT_EQ(wildcard_result[2], "*/*");
+}
+
+TEST(ParseAcceptHeaderTest, RealWorldExamples) {
+ // Common browser Accept header
+ std::vector<std::string> browser_result;
+ EXPECT_TRUE(
+ detail::parse_accept_header("text/html,application/xhtml+xml,application/"
+ "xml;q=0.9,image/webp,image/apng,*/*;q=0.8",
+ browser_result));
+ EXPECT_EQ(browser_result.size(), 6U);
+ EXPECT_EQ(browser_result[0], "text/html"); // q=1.0 (default)
+ EXPECT_EQ(browser_result[1], "application/xhtml+xml"); // q=1.0 (default)
+ EXPECT_EQ(browser_result[2], "image/webp"); // q=1.0 (default)
+ EXPECT_EQ(browser_result[3], "image/apng"); // q=1.0 (default)
+ EXPECT_EQ(browser_result[4], "application/xml"); // q=0.9
+ EXPECT_EQ(browser_result[5], "*/*"); // q=0.8
+
+ // API client header
+ std::vector<std::string> api_result;
+ EXPECT_TRUE(detail::parse_accept_header(
+ "application/json;q=0.9,application/xml;q=0.8,text/plain;q=0.1",
+ api_result));
+ EXPECT_EQ(api_result.size(), 3U);
+ EXPECT_EQ(api_result[0], "application/json");
+ EXPECT_EQ(api_result[1], "application/xml");
+ EXPECT_EQ(api_result[2], "text/plain");
+}
+
+TEST(ParseAcceptHeaderTest, SpecialCases) {
+ // Quality value with 3 decimal places
+ std::vector<std::string> decimal_result;
+ EXPECT_TRUE(detail::parse_accept_header(
+ "text/html;q=0.123,application/json;q=0.456", decimal_result));
+ EXPECT_EQ(decimal_result.size(), 2U);
+ EXPECT_EQ(decimal_result[0], "application/json"); // Higher q value
+ EXPECT_EQ(decimal_result[1], "text/html");
+
+ // Zero quality (should still be included but with lowest priority)
+ std::vector<std::string> zero_q_result;
+ EXPECT_TRUE(detail::parse_accept_header("text/html;q=0,application/json;q=1",
+ zero_q_result));
+ EXPECT_EQ(zero_q_result.size(), 2U);
+ EXPECT_EQ(zero_q_result[0], "application/json"); // q=1
+ EXPECT_EQ(zero_q_result[1], "text/html"); // q=0
+
+ // No spaces around commas
+ std::vector<std::string> no_space_result;
+ EXPECT_TRUE(detail::parse_accept_header(
+ "text/html;q=0.9,application/json;q=0.8,text/plain;q=0.7",
+ no_space_result));
+ EXPECT_EQ(no_space_result.size(), 3U);
+ EXPECT_EQ(no_space_result[0], "text/html");
+ EXPECT_EQ(no_space_result[1], "application/json");
+ EXPECT_EQ(no_space_result[2], "text/plain");
+}
+
+TEST(ParseAcceptHeaderTest, InvalidCases) {
+ std::vector<std::string> result;
+
+ // Invalid quality value (> 1.0)
+ EXPECT_FALSE(
+ detail::parse_accept_header("text/html;q=1.5,application/json", result));
+
+ // Invalid quality value (< 0.0)
+ EXPECT_FALSE(
+ detail::parse_accept_header("text/html;q=-0.1,application/json", result));
+
+ // Invalid quality value (not a number)
+ EXPECT_FALSE(detail::parse_accept_header(
+ "text/html;q=invalid,application/json", result));
+
+ // Empty quality value
+ EXPECT_FALSE(
+ detail::parse_accept_header("text/html;q=,application/json", result));
+
+ // Invalid media type format (no slash and not wildcard)
+ EXPECT_FALSE(
+ detail::parse_accept_header("invalidtype,application/json", result));
+
+ // Empty media type
+ result.clear();
+ EXPECT_FALSE(detail::parse_accept_header(",application/json", result));
+
+ // Only commas
+ result.clear();
+ EXPECT_FALSE(detail::parse_accept_header(",,,", result));
+
+ // Valid cases should still work
+ EXPECT_TRUE(detail::parse_accept_header("*/*", result));
+ EXPECT_EQ(result.size(), 1U);
+ EXPECT_EQ(result[0], "*/*");
+
+ EXPECT_TRUE(detail::parse_accept_header("*", result));
+ EXPECT_EQ(result.size(), 1U);
+ EXPECT_EQ(result[0], "*");
+
+ EXPECT_TRUE(detail::parse_accept_header("text/*", result));
+ EXPECT_EQ(result.size(), 1U);
+ EXPECT_EQ(result[0], "text/*");
+}
+
+TEST(ParseAcceptHeaderTest, ContentTypesPopulatedAndInvalidHeaderHandling) {
+ Server svr;
+
+ svr.Get("/accept_ok", [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.accept_content_types.size(), 3U);
+ EXPECT_EQ(req.accept_content_types[0], "application/json");
+ EXPECT_EQ(req.accept_content_types[1], "text/html");
+ EXPECT_EQ(req.accept_content_types[2], "*/*");
+ res.set_content("ok", "text/plain");
+ });
+
+ svr.Get("/accept_bad_request", [&](const Request & /*req*/, Response &res) {
+ EXPECT_TRUE(false);
+ res.set_content("bad request", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ {
+ auto res =
+ cli.Get("/accept_ok",
+ {{"Accept", "application/json, text/html;q=0.8, */*;q=0.1"}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ auto res = cli.Get("/accept_bad_request",
+ {{"Accept", "text/html;q=abc,application/json"}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::BadRequest_400, res->status);
+ }
+}
+
+TEST(DivideTest, DivideStringTests) {
+ auto divide = [](const std::string &str, char d) {
+ std::string lhs;
+ std::string rhs;
+
+ detail::divide(str, d,
+ [&](const char *lhs_data, std::size_t lhs_size,
+ const char *rhs_data, std::size_t rhs_size) {
+ lhs.assign(lhs_data, lhs_size);
+ rhs.assign(rhs_data, rhs_size);
+ });
+
+ return std::make_pair(std::move(lhs), std::move(rhs));
+ };
+
+ {
+ const auto res = divide("", '=');
+ EXPECT_EQ(res.first, "");
+ EXPECT_EQ(res.second, "");
+ }
+
+ {
+ const auto res = divide("=", '=');
+ EXPECT_EQ(res.first, "");
+ EXPECT_EQ(res.second, "");
+ }
+
+ {
+ const auto res = divide(" ", '=');
+ EXPECT_EQ(res.first, " ");
+ EXPECT_EQ(res.second, "");
+ }
+
+ {
+ const auto res = divide("a", '=');
+ EXPECT_EQ(res.first, "a");
+ EXPECT_EQ(res.second, "");
+ }
+
+ {
+ const auto res = divide("a=", '=');
+ EXPECT_EQ(res.first, "a");
+ EXPECT_EQ(res.second, "");
+ }
+
+ {
+ const auto res = divide("=b", '=');
+ EXPECT_EQ(res.first, "");
+ EXPECT_EQ(res.second, "b");
+ }
+
+ {
+ const auto res = divide("a=b", '=');
+ EXPECT_EQ(res.first, "a");
+ EXPECT_EQ(res.second, "b");
+ }
+
+ {
+ const auto res = divide("a=b=", '=');
+ EXPECT_EQ(res.first, "a");
+ EXPECT_EQ(res.second, "b=");
+ }
+
+ {
+ const auto res = divide("a=b=c", '=');
+ EXPECT_EQ(res.first, "a");
+ EXPECT_EQ(res.second, "b=c");
+ }
+}
+
+TEST(SplitTest, ParseQueryString) {
+ string s = "key1=val1&key2=val2&key3=val3";
+ Params dic;
+
+ detail::split(s.c_str(), s.c_str() + s.size(), '&',
+ [&](const char *b, const char *e) {
+ string key, val;
+ detail::split(b, e, '=', [&](const char *b2, const char *e2) {
+ if (key.empty()) {
+ key.assign(b2, e2);
+ } else {
+ val.assign(b2, e2);
+ }
+ });
+ dic.emplace(key, val);
+ });
+
+ EXPECT_EQ("val1", dic.find("key1")->second);
+ EXPECT_EQ("val2", dic.find("key2")->second);
+ EXPECT_EQ("val3", dic.find("key3")->second);
+}
+
+TEST(SplitTest, ParseInvalidQueryTests) {
+
+ {
+ string s = " ";
+ Params dict;
+ detail::parse_query_text(s, dict);
+ EXPECT_TRUE(dict.empty());
+ }
+
+ {
+ string s = " = =";
+ Params dict;
+ detail::parse_query_text(s, dict);
+ EXPECT_TRUE(dict.empty());
+ }
+}
+
+TEST(ParseQueryTest, ParseQueryString) {
+ {
+ std::string s = "key1=val1&key2=val2&key3=val3";
+ Params dic;
+
+ detail::parse_query_text(s, dic);
+
+ EXPECT_EQ("val1", dic.find("key1")->second);
+ EXPECT_EQ("val2", dic.find("key2")->second);
+ EXPECT_EQ("val3", dic.find("key3")->second);
+ }
+
+ {
+ std::string s = "key1&key2=val1&key3=val1=val2&key4=val1=val2=val3";
+ Params dic;
+
+ detail::parse_query_text(s, dic);
+
+ EXPECT_EQ("", dic.find("key1")->second);
+ EXPECT_EQ("val1", dic.find("key2")->second);
+ EXPECT_EQ("val1=val2", dic.find("key3")->second);
+ EXPECT_EQ("val1=val2=val3", dic.find("key4")->second);
+ }
+}
+
+TEST(ParamsToQueryTest, ConvertParamsToQuery) {
+ Params dic;
+
+ EXPECT_EQ(detail::params_to_query_str(dic), "");
+
+ dic.emplace("key1", "val1");
+
+ EXPECT_EQ(detail::params_to_query_str(dic), "key1=val1");
+
+ dic.emplace("key2", "val2");
+ dic.emplace("key3", "val3");
+
+ EXPECT_EQ(detail::params_to_query_str(dic), "key1=val1&key2=val2&key3=val3");
+}
+
+TEST(ParseMultipartBoundaryTest, DefaultValue) {
+ string content_type = "multipart/form-data; boundary=something";
+ string boundary;
+ auto ret = detail::parse_multipart_boundary(content_type, boundary);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(boundary, "something");
+}
+
+TEST(ParseMultipartBoundaryTest, ValueWithQuote) {
+ string content_type = "multipart/form-data; boundary=\"gc0pJq0M:08jU534c0p\"";
+ string boundary;
+ auto ret = detail::parse_multipart_boundary(content_type, boundary);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(boundary, "gc0pJq0M:08jU534c0p");
+}
+
+TEST(ParseMultipartBoundaryTest, ValueWithCharset) {
+ string content_type =
+ "multipart/mixed; boundary=THIS_STRING_SEPARATES;charset=UTF-8";
+ string boundary;
+ auto ret = detail::parse_multipart_boundary(content_type, boundary);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(boundary, "THIS_STRING_SEPARATES");
+}
+
+TEST(ParseMultipartBoundaryTest, ValueWithQuotesAndCharset) {
+ string content_type =
+ "multipart/mixed; boundary=\"cpp-httplib-multipart-data\"; charset=UTF-8";
+ string boundary;
+ auto ret = detail::parse_multipart_boundary(content_type, boundary);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(boundary, "cpp-httplib-multipart-data");
+}
+
+TEST(GetHeaderValueTest, DefaultValue) {
+ Headers headers = {{"Dummy", "Dummy"}};
+ auto val = detail::get_header_value(headers, "Content-Type", "text/plain", 0);
+ EXPECT_STREQ("text/plain", val);
+}
+
+TEST(GetHeaderValueTest, DefaultValueInt) {
+ Headers headers = {{"Dummy", "Dummy"}};
+ auto val = detail::get_header_value_u64(headers, "Content-Length", 100, 0);
+ EXPECT_EQ(100ull, val);
+}
+
+TEST(GetHeaderValueTest, RegularValue) {
+ Headers headers = {{"Content-Type", "text/html"}, {"Dummy", "Dummy"}};
+ auto val = detail::get_header_value(headers, "Content-Type", "text/plain", 0);
+ EXPECT_STREQ("text/html", val);
+}
+
+TEST(GetHeaderValueTest, RegularValueWithDifferentCase) {
+ Headers headers = {{"Content-Type", "text/html"}, {"Dummy", "Dummy"}};
+ auto val = detail::get_header_value(headers, "content-type", "text/plain", 0);
+ EXPECT_STREQ("text/html", val);
+}
+
+TEST(GetHeaderValueTest, SetContent) {
+ Response res;
+
+ res.set_content("html", "text/html");
+ EXPECT_EQ("text/html", res.get_header_value("Content-Type"));
+
+ res.set_content("text", "text/plain");
+ EXPECT_EQ(1U, res.get_header_value_count("Content-Type"));
+ EXPECT_EQ("text/plain", res.get_header_value("Content-Type"));
+}
+
+TEST(GetHeaderValueTest, RegularValueInt) {
+ Headers headers = {{"Content-Length", "100"}, {"Dummy", "Dummy"}};
+ auto val = detail::get_header_value_u64(headers, "Content-Length", 0, 0);
+ EXPECT_EQ(100ull, val);
+}
+
+TEST(GetHeaderValueTest, RegularInvalidValueInt) {
+ Headers headers = {{"Content-Length", "x"}};
+ auto is_invalid_value = false;
+ auto val = detail::get_header_value_u64(headers, "Content-Length", 0, 0,
+ is_invalid_value);
+ EXPECT_EQ(0ull, val);
+ EXPECT_TRUE(is_invalid_value);
+}
+
+TEST(GetHeaderValueTest, Range) {
+ {
+ Headers headers = {make_range_header({{1, -1}})};
+ auto val = detail::get_header_value(headers, "Range", 0, 0);
+ EXPECT_STREQ("bytes=1-", val);
+ }
+
+ {
+ Headers headers = {make_range_header({{-1, 1}})};
+ auto val = detail::get_header_value(headers, "Range", 0, 0);
+ EXPECT_STREQ("bytes=-1", val);
+ }
+
+ {
+ Headers headers = {make_range_header({{1, 10}})};
+ auto val = detail::get_header_value(headers, "Range", 0, 0);
+ EXPECT_STREQ("bytes=1-10", val);
+ }
+
+ {
+ Headers headers = {make_range_header({{1, 10}, {100, -1}})};
+ auto val = detail::get_header_value(headers, "Range", 0, 0);
+ EXPECT_STREQ("bytes=1-10, 100-", val);
+ }
+
+ {
+ Headers headers = {make_range_header({{1, 10}, {100, 200}})};
+ auto val = detail::get_header_value(headers, "Range", 0, 0);
+ EXPECT_STREQ("bytes=1-10, 100-200", val);
+ }
+
+ {
+ Headers headers = {make_range_header({{0, 0}, {-1, 1}})};
+ auto val = detail::get_header_value(headers, "Range", 0, 0);
+ EXPECT_STREQ("bytes=0-0, -1", val);
+ }
+}
+
+TEST(ParseHeaderValueTest, Range) {
+ {
+ Ranges ranges;
+ auto ret = detail::parse_range_header("bytes=1-", ranges);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(1u, ranges.size());
+ EXPECT_EQ(1u, ranges[0].first);
+ EXPECT_EQ(-1, ranges[0].second);
+ }
+
+ {
+ Ranges ranges;
+ auto ret = detail::parse_range_header("bytes=-1", ranges);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(1u, ranges.size());
+ EXPECT_EQ(-1, ranges[0].first);
+ EXPECT_EQ(1u, ranges[0].second);
+ }
+
+ {
+ Ranges ranges;
+ auto ret = detail::parse_range_header("bytes=1-10", ranges);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(1u, ranges.size());
+ EXPECT_EQ(1u, ranges[0].first);
+ EXPECT_EQ(10u, ranges[0].second);
+ }
+
+ {
+ Ranges ranges;
+ auto ret = detail::parse_range_header("bytes=10-1", ranges);
+ EXPECT_FALSE(ret);
+ }
+
+ {
+ Ranges ranges;
+ auto ret = detail::parse_range_header("bytes=1-10, 100-", ranges);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(2u, ranges.size());
+ EXPECT_EQ(1u, ranges[0].first);
+ EXPECT_EQ(10u, ranges[0].second);
+ EXPECT_EQ(100u, ranges[1].first);
+ EXPECT_EQ(-1, ranges[1].second);
+ }
+
+ {
+ Ranges ranges;
+ auto ret =
+ detail::parse_range_header("bytes=1-10, 100-200, 300-400", ranges);
+ EXPECT_TRUE(ret);
+ EXPECT_EQ(3u, ranges.size());
+ EXPECT_EQ(1u, ranges[0].first);
+ EXPECT_EQ(10u, ranges[0].second);
+ EXPECT_EQ(100u, ranges[1].first);
+ EXPECT_EQ(200u, ranges[1].second);
+ EXPECT_EQ(300u, ranges[2].first);
+ EXPECT_EQ(400u, ranges[2].second);
+ }
+
+ {
+ Ranges ranges;
+
+ EXPECT_FALSE(detail::parse_range_header("bytes", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=0", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=-", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes= ", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=,", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=,,", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=,,,", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=a-b", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=1-0", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=0--1", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=0- 1", ranges));
+ EXPECT_FALSE(detail::parse_range_header("bytes=0 -1", ranges));
+ EXPECT_TRUE(ranges.empty());
+ }
+}
+
+TEST(ParseAcceptEncoding1, AcceptEncoding) {
+ Request req;
+ req.set_header("Accept-Encoding", "gzip");
+
+ Response res;
+ res.set_header("Content-Type", "text/plain");
+
+ auto ret = detail::encoding_type(req, res);
+
+#ifdef CPPHTTPLIB_ZLIB_SUPPORT
+ EXPECT_TRUE(ret == detail::EncodingType::Gzip);
+#else
+ EXPECT_TRUE(ret == detail::EncodingType::None);
+#endif
+}
+
+TEST(ParseAcceptEncoding2, AcceptEncoding) {
+ Request req;
+ req.set_header("Accept-Encoding", "gzip, deflate, br, zstd");
+
+ Response res;
+ res.set_header("Content-Type", "text/plain");
+
+ auto ret = detail::encoding_type(req, res);
+
+#ifdef CPPHTTPLIB_BROTLI_SUPPORT
+ EXPECT_TRUE(ret == detail::EncodingType::Brotli);
+#elif CPPHTTPLIB_ZLIB_SUPPORT
+ EXPECT_TRUE(ret == detail::EncodingType::Gzip);
+#elif CPPHTTPLIB_ZSTD_SUPPORT
+ EXPECT_TRUE(ret == detail::EncodingType::Zstd);
+#else
+ EXPECT_TRUE(ret == detail::EncodingType::None);
+#endif
+}
+
+TEST(ParseAcceptEncoding3, AcceptEncoding) {
+ Request req;
+ req.set_header("Accept-Encoding",
+ "br;q=1.0, gzip;q=0.8, zstd;q=0.8, *;q=0.1");
+
+ Response res;
+ res.set_header("Content-Type", "text/plain");
+
+ auto ret = detail::encoding_type(req, res);
+
+#ifdef CPPHTTPLIB_BROTLI_SUPPORT
+ EXPECT_TRUE(ret == detail::EncodingType::Brotli);
+#elif CPPHTTPLIB_ZLIB_SUPPORT
+ EXPECT_TRUE(ret == detail::EncodingType::Gzip);
+#elif CPPHTTPLIB_ZSTD_SUPPORT
+ EXPECT_TRUE(ret == detail::EncodingType::Zstd);
+#else
+ EXPECT_TRUE(ret == detail::EncodingType::None);
+#endif
+}
+
+TEST(BufferStreamTest, read) {
+ detail::BufferStream strm1;
+ Stream &strm = strm1;
+
+ EXPECT_EQ(5, strm.write("hello"));
+
+ char buf[512];
+ EXPECT_EQ(2, strm.read(buf, 2));
+ EXPECT_EQ('h', buf[0]);
+ EXPECT_EQ('e', buf[1]);
+
+ EXPECT_EQ(2, strm.read(buf, 2));
+ EXPECT_EQ('l', buf[0]);
+ EXPECT_EQ('l', buf[1]);
+
+ EXPECT_EQ(1, strm.read(buf, 1));
+ EXPECT_EQ('o', buf[0]);
+
+ EXPECT_EQ(0, strm.read(buf, 1));
+}
+
+TEST(HostnameToIPConversionTest, HTTPWatch_Online) {
+ auto host = "www.httpwatch.com";
+
+ auto ip = hosted_at(host);
+ EXPECT_EQ("23.96.13.243", ip);
+
+ std::vector<std::string> addrs;
+ hosted_at(host, addrs);
+ EXPECT_EQ(1u, addrs.size());
+}
+
+#if 0 // It depends on each test environment...
+TEST(HostnameToIPConversionTest, YouTube_Online) {
+ auto host = "www.youtube.com";
+
+ std::vector<std::string> addrs;
+ hosted_at(host, addrs);
+
+ EXPECT_EQ(20u, addrs.size());
+
+ auto it = std::find(addrs.begin(), addrs.end(), "2607:f8b0:4006:809::200e");
+ EXPECT_TRUE(it != addrs.end());
+}
+#endif
+
+class ChunkedEncodingTest : public ::testing::Test {
+protected:
+ ChunkedEncodingTest()
+ : cli_(HOST, PORT)
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ ,
+ svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE)
+#endif
+ {
+ cli_.set_connection_timeout(2);
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ cli_.enable_server_certificate_verification(false);
+#endif
+ }
+
+ virtual void SetUp() {
+ read_file("./image.jpg", image_data_);
+
+ svr_.Get("/hi", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ svr_.Get(
+ "/chunked", [this](const httplib::Request &, httplib::Response &res) {
+ res.set_chunked_content_provider(
+ "image/jpeg", [this](size_t offset, httplib::DataSink &sink) {
+ size_t remaining = image_data_.size() - offset;
+ if (remaining == 0) {
+ sink.done();
+ } else {
+ constexpr size_t CHUNK_SIZE = 1024;
+ size_t send_size = std::min(CHUNK_SIZE, remaining);
+ sink.write(&image_data_[offset], send_size);
+
+ std::this_thread::sleep_for(std::chrono::milliseconds(10));
+ }
+ return true;
+ });
+ });
+
+ t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); });
+
+ svr_.wait_until_ready();
+ }
+
+ virtual void TearDown() {
+ svr_.stop();
+ if (!request_threads_.empty()) {
+ std::this_thread::sleep_for(std::chrono::seconds(1));
+ for (auto &t : request_threads_) {
+ t.join();
+ }
+ }
+ t_.join();
+ }
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli_;
+ SSLServer svr_;
+#else
+ Client cli_;
+ Server svr_;
+#endif
+ thread t_;
+ std::vector<thread> request_threads_;
+ std::string image_data_;
+};
+
+TEST_F(ChunkedEncodingTest, NormalGet) {
+ auto res = cli_.Get("/chunked");
+ ASSERT_TRUE(res);
+
+ std::string out;
+ read_file("./image.jpg", out);
+
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(out, res->body);
+}
+
+TEST_F(ChunkedEncodingTest, WithContentReceiver) {
+ std::string body;
+ auto res = cli_.Get("/chunked", [&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+ ASSERT_TRUE(res);
+
+ std::string out;
+ read_file("./image.jpg", out);
+
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(out, body);
+}
+
+TEST_F(ChunkedEncodingTest, WithResponseHandlerAndContentReceiver) {
+ std::string body;
+ auto res = cli_.Get(
+ "/chunked",
+ [&](const Response &response) {
+ EXPECT_EQ(StatusCode::OK_200, response.status);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+ ASSERT_TRUE(res);
+
+ std::string out;
+ read_file("./image.jpg", out);
+
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(out, body);
+}
+
+TEST(RangeTest, FromHTTPBin_Online) {
+#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN
+ auto host = "httpbin.org";
+ auto path = std::string{"/range/32"};
+#else
+ auto host = "nghttp2.org";
+ auto path = std::string{"/httpbin/range/32"};
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ auto port = 443;
+ SSLClient cli(host, port);
+#else
+ auto port = 80;
+ Client cli(host, port);
+#endif
+ cli.set_connection_timeout(5);
+
+ {
+ auto res = cli.Get(path);
+ ASSERT_TRUE(res);
+ EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ Headers headers = {make_range_header({{1, -1}})};
+ auto res = cli.Get(path, headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ("bcdefghijklmnopqrstuvwxyzabcdef", res->body);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ }
+
+ {
+ Headers headers = {make_range_header({{1, 10}})};
+ auto res = cli.Get(path, headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ("bcdefghijk", res->body);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ }
+
+ {
+ Headers headers = {make_range_header({{0, 31}})};
+ auto res = cli.Get(path, headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ Headers headers = {make_range_header({{0, -1}})};
+ auto res = cli.Get(path, headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ Headers headers = {make_range_header({{0, 32}})};
+ auto res = cli.Get(path, headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status);
+ }
+}
+
+TEST(GetAddrInfoDanglingRefTest, LongTimeout) {
+ auto host = "unresolvableaddress.local";
+ auto path = std::string{"/"};
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ auto port = 443;
+ SSLClient cli(host, port);
+#else
+ auto port = 80;
+ Client cli(host, port);
+#endif
+ cli.set_connection_timeout(1);
+
+ {
+ auto res = cli.Get(path);
+ ASSERT_FALSE(res);
+ }
+
+ std::this_thread::sleep_for(std::chrono::seconds(8));
+}
+
+TEST(ConnectionErrorTest, InvalidHost) {
+ auto host = "-abcde.com";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ auto port = 443;
+ SSLClient cli(host, port);
+#else
+ auto port = 80;
+ Client cli(host, port);
+#endif
+ cli.set_connection_timeout(std::chrono::seconds(2));
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Connection, res.error());
+}
+
+TEST(ConnectionErrorTest, InvalidHost2) {
+ auto host = "httpbin.org/";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+ cli.set_connection_timeout(std::chrono::seconds(2));
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Connection, res.error());
+}
+
+TEST(ConnectionErrorTest, InvalidHostCheckResultErrorToString) {
+ auto host = "httpbin.org/";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+ cli.set_connection_timeout(std::chrono::seconds(2));
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(!res);
+ stringstream s;
+ s << "error code: " << res.error();
+ EXPECT_EQ("error code: Could not establish connection (2)", s.str());
+}
+
+TEST(ConnectionErrorTest, InvalidPort) {
+ auto host = "localhost";
+ auto port = 44380;
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host, port);
+#else
+ Client cli(host, port);
+#endif
+ cli.set_connection_timeout(std::chrono::seconds(2));
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(!res);
+ EXPECT_TRUE(Error::Connection == res.error() ||
+ Error::ConnectionTimeout == res.error());
+}
+
+TEST(ConnectionErrorTest, Timeout_Online) {
+ auto host = "google.com";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ auto port = 44380;
+ SSLClient cli(host, port);
+#else
+ auto port = 8080;
+ Client cli(host, port);
+#endif
+ cli.set_connection_timeout(std::chrono::seconds(2));
+
+ // only probe one address type so that the error reason
+ // correlates to the timed-out IPv4, not the unsupported
+ // IPv6 connection attempt
+ cli.set_address_family(AF_INET);
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::ConnectionTimeout, res.error());
+}
+
+TEST(CancelTest, NoCancel_Online) {
+#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN
+ auto host = "httpbin.org";
+ auto path = std::string{"/range/32"};
+#else
+ auto host = "nghttp2.org";
+ auto path = std::string{"/httpbin/range/32"};
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ auto port = 443;
+ SSLClient cli(host, port);
+#else
+ auto port = 80;
+ Client cli(host, port);
+#endif
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res = cli.Get(path, [](uint64_t, uint64_t) { return true; });
+ ASSERT_TRUE(res);
+ EXPECT_EQ("abcdefghijklmnopqrstuvwxyzabcdef", res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(CancelTest, WithCancelSmallPayload_Online) {
+#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN
+ auto host = "httpbin.org";
+ auto path = std::string{"/range/32"};
+#else
+ auto host = "nghttp2.org";
+ auto path = std::string{"/httpbin/range/32"};
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ auto port = 443;
+ SSLClient cli(host, port);
+#else
+ auto port = 80;
+ Client cli(host, port);
+#endif
+
+ auto res = cli.Get(path, [](uint64_t, uint64_t) { return false; });
+ cli.set_connection_timeout(std::chrono::seconds(5));
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, WithCancelLargePayload_Online) {
+#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN
+ auto host = "httpbin.org";
+ auto path = std::string{"/range/65536"};
+#else
+ auto host = "nghttp2.org";
+ auto path = std::string{"/httpbin/range/65536"};
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ auto port = 443;
+ SSLClient cli(host, port);
+#else
+ auto port = 80;
+ Client cli(host, port);
+#endif
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ uint32_t count = 0;
+ auto res =
+ cli.Get(path, [&count](uint64_t, uint64_t) { return (count++ == 0); });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, NoCancelPost) {
+ Server svr;
+
+ svr.Post("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return true; });
+ ASSERT_TRUE(res);
+ EXPECT_EQ("Hello World!", res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(CancelTest, WithCancelSmallPayloadPost) {
+ Server svr;
+
+ svr.Post("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return false; });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, WithCancelLargePayloadPost) {
+ Server svr;
+
+ svr.Post("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content(LARGE_DATA, "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Post("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return false; });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, NoCancelPut) {
+ Server svr;
+
+ svr.Put("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return true; });
+ ASSERT_TRUE(res);
+ EXPECT_EQ("Hello World!", res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(CancelTest, WithCancelSmallPayloadPut) {
+ Server svr;
+
+ svr.Put("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return false; });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, WithCancelLargePayloadPut) {
+ Server svr;
+
+ svr.Put("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content(LARGE_DATA, "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Put("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return false; });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, NoCancelPatch) {
+ Server svr;
+
+ svr.Patch("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return true; });
+ ASSERT_TRUE(res);
+ EXPECT_EQ("Hello World!", res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(CancelTest, WithCancelSmallPayloadPatch) {
+ Server svr;
+
+ svr.Patch("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return false; });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, WithCancelLargePayloadPatch) {
+ Server svr;
+
+ svr.Patch("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content(LARGE_DATA, "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Patch("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return false; });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, NoCancelDelete) {
+ Server svr;
+
+ svr.Delete("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return true; });
+ ASSERT_TRUE(res);
+ EXPECT_EQ("Hello World!", res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(CancelTest, WithCancelSmallPayloadDelete) {
+ Server svr;
+
+ svr.Delete("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return false; });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST(CancelTest, WithCancelLargePayloadDelete) {
+ Server svr;
+
+ svr.Delete("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content(LARGE_DATA, "text/plain");
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_connection_timeout(std::chrono::seconds(5));
+
+ auto res =
+ cli.Delete("/", Headers(), JSON_DATA.data(), JSON_DATA.size(),
+ "application/json", [](uint64_t, uint64_t) { return false; });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+static std::string remove_whitespace(const std::string &input) {
+ std::string output;
+ output.reserve(input.size());
+ std::copy_if(input.begin(), input.end(), std::back_inserter(output),
+ [](unsigned char c) { return !std::isspace(c); });
+ return output;
+}
+
+TEST(BaseAuthTest, FromHTTPWatch_Online) {
+#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN
+ auto host = "httpbin.org";
+ auto path = std::string{"/basic-auth/hello/world"};
+#else
+ auto host = "nghttp2.org";
+ auto path = std::string{"/httpbin/basic-auth/hello/world"};
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ auto port = 443;
+ SSLClient cli(host, port);
+#else
+ auto port = 80;
+ Client cli(host, port);
+#endif
+
+ {
+ auto res = cli.Get(path);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Unauthorized_401, res->status);
+ }
+
+ {
+ auto res =
+ cli.Get(path, {make_basic_authentication_header("hello", "world")});
+ ASSERT_TRUE(res);
+ EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}",
+ remove_whitespace(res->body));
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ cli.set_basic_auth("hello", "world");
+ auto res = cli.Get(path);
+ ASSERT_TRUE(res);
+ EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}",
+ remove_whitespace(res->body));
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ cli.set_basic_auth("hello", "bad");
+ auto res = cli.Get(path);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Unauthorized_401, res->status);
+ }
+
+ {
+ cli.set_basic_auth("bad", "world");
+ auto res = cli.Get(path);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Unauthorized_401, res->status);
+ }
+}
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(DigestAuthTest, FromHTTPWatch_Online) {
+#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN
+ auto host = "httpbin.org";
+ auto unauth_path = std::string{"/digest-auth/auth/hello/world"};
+ auto paths = std::vector<std::string>{
+ "/digest-auth/auth/hello/world/MD5",
+ "/digest-auth/auth/hello/world/SHA-256",
+ "/digest-auth/auth/hello/world/SHA-512",
+ "/digest-auth/auth-int/hello/world/MD5",
+ };
+#else
+ auto host = "nghttp2.org";
+ auto unauth_path = std::string{"/httpbin/digest-auth/auth/hello/world"};
+ auto paths = std::vector<std::string>{
+ "/httpbin/digest-auth/auth/hello/world/MD5",
+ "/httpbin/digest-auth/auth/hello/world/SHA-256",
+ "/httpbin/digest-auth/auth/hello/world/SHA-512",
+ "/httpbin/digest-auth/auth-int/hello/world/MD5",
+ };
+#endif
+
+ auto port = 443;
+ SSLClient cli(host, port);
+
+ {
+ auto res = cli.Get(unauth_path);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Unauthorized_401, res->status);
+ }
+
+ {
+
+ cli.set_digest_auth("hello", "world");
+ for (const auto &path : paths) {
+ auto res = cli.Get(path.c_str());
+ ASSERT_TRUE(res);
+ EXPECT_EQ("{\"authenticated\":true,\"user\":\"hello\"}",
+ remove_whitespace(res->body));
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ cli.set_digest_auth("hello", "bad");
+ for (const auto &path : paths) {
+ auto res = cli.Get(path.c_str());
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Unauthorized_401, res->status);
+ }
+
+ // NOTE: Until httpbin.org fixes issue #46, the following test is commented
+ // out. Please see https://httpbin.org/digest-auth/auth/hello/world
+ // cli.set_digest_auth("bad", "world");
+ // for (const auto& path : paths) {
+ // auto res = cli.Get(path.c_str());
+ // ASSERT_TRUE(res);
+ // EXPECT_EQ(StatusCode::BadRequest_400, res->status);
+ // }
+ }
+}
+#endif
+
+TEST(SpecifyServerIPAddressTest, AnotherHostname_Online) {
+ auto host = "google.com";
+ auto another_host = "example.com";
+ auto wrong_ip = "0.0.0.0";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+
+ cli.set_hostname_addr_map({{another_host, wrong_ip}});
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::MovedPermanently_301, res->status);
+}
+
+TEST(SpecifyServerIPAddressTest, RealHostname_Online) {
+ auto host = "google.com";
+ auto wrong_ip = "0.0.0.0";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+
+ cli.set_hostname_addr_map({{host, wrong_ip}});
+ auto res = cli.Get("/");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Connection, res.error());
+}
+
+TEST(AbsoluteRedirectTest, Redirect_Online) {
+ auto host = "nghttp2.org";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+
+ cli.set_follow_location(true);
+ auto res = cli.Get("/httpbin/absolute-redirect/3");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(RedirectTest, Redirect_Online) {
+ auto host = "nghttp2.org";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+
+ cli.set_follow_location(true);
+ auto res = cli.Get("/httpbin/redirect/3");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(RelativeRedirectTest, Redirect_Online) {
+ auto host = "nghttp2.org";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+
+ cli.set_follow_location(true);
+ auto res = cli.Get("/httpbin/relative-redirect/3");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(TooManyRedirectTest, Redirect_Online) {
+ auto host = "nghttp2.org";
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+
+ cli.set_follow_location(true);
+ auto res = cli.Get("/httpbin/redirect/21");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::ExceedRedirectCount, res.error());
+}
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(YahooRedirectTest, Redirect_Online) {
+ Client cli("yahoo.com");
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::MovedPermanently_301, res->status);
+
+ cli.set_follow_location(true);
+ res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("https://www.yahoo.com/", res->location);
+}
+
+// Previously "nghttp2.org" "/httpbin/redirect-to"
+#define REDIR_HOST "httpbingo.org"
+#define REDIR_PATH "/redirect-to"
+
+TEST(HttpsToHttpRedirectTest, Redirect_Online) {
+ SSLClient cli(REDIR_HOST);
+ cli.set_follow_location(true);
+ auto res =
+ cli.Get(REDIR_PATH "?url=http%3A%2F%2Fexample.com&status_code=302");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(HttpsToHttpRedirectTest2, Redirect_Online) {
+ SSLClient cli(REDIR_HOST);
+ cli.set_follow_location(true);
+
+ Params params;
+ params.emplace("url", "http://example.com");
+ params.emplace("status_code", "302");
+
+ auto res = cli.Get(REDIR_PATH, params, Headers{});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(HttpsToHttpRedirectTest3, Redirect_Online) {
+ SSLClient cli(REDIR_HOST);
+ cli.set_follow_location(true);
+
+ Params params;
+ params.emplace("url", "http://example.com");
+
+ auto res = cli.Get(REDIR_PATH "?status_code=302", params, Headers{});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(UrlWithSpace, Redirect_Online) {
+ SSLClient cli("edge.forgecdn.net");
+ cli.set_follow_location(true);
+
+ auto res = cli.Get("/files/2595/310/Neat 1.4-17.jar");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(18527U, res->get_header_value_u64("Content-Length"));
+}
+
+#endif
+
+#if !defined(_WIN32) && !defined(_WIN64)
+TEST(ReceiveSignals, Signal) {
+ auto setupSignalHandlers = []() {
+ struct sigaction act;
+
+ sigemptyset(&act.sa_mask);
+ act.sa_flags = SA_SIGINFO;
+ act.sa_sigaction = [](int sig, siginfo_t *, void *) {
+ switch (sig) {
+ case SIGINT:
+ default: break;
+ }
+ };
+ ::sigaction(SIGINT, &act, nullptr);
+ };
+
+ Server svr;
+ int port = 0;
+ auto thread = std::thread([&]() {
+ setupSignalHandlers();
+ port = svr.bind_to_any_port("localhost");
+ svr.listen_after_bind();
+ });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ ASSERT_TRUE(svr.is_running());
+ pthread_kill(thread.native_handle(), SIGINT);
+ std::this_thread::sleep_for(std::chrono::milliseconds(100));
+ ASSERT_TRUE(svr.is_running());
+}
+#endif
+
+TEST(RedirectToDifferentPort, Redirect) {
+ Server svr1;
+ svr1.Get("/1", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ int svr1_port = 0;
+ auto thread1 = std::thread([&]() {
+ svr1_port = svr1.bind_to_any_port("localhost");
+ svr1.listen_after_bind();
+ });
+
+ Server svr2;
+ svr2.Get("/2", [&](const Request & /*req*/, Response &res) {
+ res.set_redirect("http://localhost:" + std::to_string(svr1_port) + "/1");
+ });
+
+ int svr2_port = 0;
+ auto thread2 = std::thread([&]() {
+ svr2_port = svr2.bind_to_any_port("localhost");
+ svr2.listen_after_bind();
+ });
+ auto se = detail::scope_exit([&] {
+ svr2.stop();
+ thread2.join();
+ svr1.stop();
+ thread1.join();
+ ASSERT_FALSE(svr2.is_running());
+ ASSERT_FALSE(svr1.is_running());
+ });
+
+ svr1.wait_until_ready();
+ svr2.wait_until_ready();
+
+ Client cli("localhost", svr2_port);
+ cli.set_follow_location(true);
+
+ auto res = cli.Get("/2");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("Hello World!", res->body);
+}
+
+TEST(RedirectFromPageWithContent, Redirect) {
+ Server svr;
+
+ svr.Get("/1", [&](const Request & /*req*/, Response &res) {
+ res.set_content("___", "text/plain");
+ res.set_redirect("/2");
+ });
+
+ svr.Get("/2", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ auto th = std::thread([&]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ th.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli("localhost", PORT);
+ cli.set_follow_location(true);
+
+ std::string body;
+ auto res = cli.Get("/1", [&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("Hello World!", body);
+ }
+
+ {
+ Client cli("localhost", PORT);
+
+ std::string body;
+ auto res = cli.Get("/1", [&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Found_302, res->status);
+ EXPECT_EQ("___", body);
+ }
+}
+
+TEST(RedirectFromPageWithContentIP6, Redirect) {
+ Server svr;
+
+ svr.Get("/1", [&](const Request & /*req*/, Response &res) {
+ res.set_content("___", "text/plain");
+ // res.set_redirect("/2");
+ res.set_redirect("http://[::1]:1234/2");
+ });
+
+ svr.Get("/2", [&](const Request &req, Response &res) {
+ auto host_header = req.headers.find("Host");
+ ASSERT_TRUE(host_header != req.headers.end());
+ EXPECT_EQ("[::1]:1234", host_header->second);
+
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ auto th = std::thread([&]() { svr.listen("::1", 1234); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ th.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ // When IPV6 support isn't available svr.listen("::1", 1234) never
+ // actually starts anything, so the condition !svr.is_running() will
+ // always remain true, and the loop never stops.
+ // This basically counts how many milliseconds have passed since the
+ // call to svr.listen(), and if after 5 seconds nothing started yet
+ // aborts the test.
+ for (unsigned int milliseconds = 0; !svr.is_running(); milliseconds++) {
+ std::this_thread::sleep_for(std::chrono::milliseconds(1));
+ ASSERT_LT(milliseconds, 5000U);
+ }
+
+ {
+ Client cli("http://[::1]:1234");
+ cli.set_follow_location(true);
+
+ std::string body;
+ auto res = cli.Get("/1", [&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("Hello World!", body);
+ }
+
+ {
+ Client cli("http://[::1]:1234");
+
+ std::string body;
+ auto res = cli.Get("/1", [&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Found_302, res->status);
+ EXPECT_EQ("___", body);
+ }
+}
+
+TEST(PathUrlEncodeTest, PathUrlEncode) {
+ Server svr;
+
+ svr.Get("/foo", [](const Request &req, Response &res) {
+ auto a = req.params.find("a");
+ if (a != req.params.end()) {
+ res.set_content((*a).second, "text/plain");
+ res.status = StatusCode::OK_200;
+ } else {
+ res.status = StatusCode::BadRequest_400;
+ }
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+ cli.set_path_encode(false);
+
+ auto res = cli.Get("/foo?a=explicitly+encoded");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ // This expects it back with a space, as the `+` won't have been
+ // url-encoded, and server-side the params get decoded turning `+`
+ // into spaces.
+ EXPECT_EQ("explicitly encoded", res->body);
+ }
+}
+
+TEST(PathUrlEncodeTest, IncludePercentEncodingLF) {
+ Server svr;
+
+ svr.Get("/", [](const Request &req, Response &) {
+ EXPECT_EQ("\x0A", req.get_param_value("something"));
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+ cli.set_path_encode(false);
+
+ auto res = cli.Get("/?something=%0A");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+}
+
+TEST(BindServerTest, DISABLED_BindDualStack) {
+ Server svr;
+
+ svr.Get("/1", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ auto thread = std::thread([&]() { svr.listen("::", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli("127.0.0.1", PORT);
+
+ auto res = cli.Get("/1");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("Hello World!", res->body);
+ }
+ {
+ Client cli("::1", PORT);
+
+ auto res = cli.Get("/1");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("Hello World!", res->body);
+ }
+}
+
+TEST(BindServerTest, BindAndListenSeparately) {
+ Server svr;
+ int port = svr.bind_to_any_port("0.0.0.0");
+ ASSERT_TRUE(svr.is_valid());
+ ASSERT_TRUE(port > 0);
+ svr.stop();
+}
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(BindServerTest, BindAndListenSeparatelySSL) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE,
+ CLIENT_CA_CERT_DIR);
+ int port = svr.bind_to_any_port("0.0.0.0");
+ ASSERT_TRUE(svr.is_valid());
+ ASSERT_TRUE(port > 0);
+ svr.stop();
+}
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(BindServerTest, BindAndListenSeparatelySSLEncryptedKey) {
+ SSLServer svr(SERVER_ENCRYPTED_CERT_FILE, SERVER_ENCRYPTED_PRIVATE_KEY_FILE,
+ nullptr, nullptr, SERVER_ENCRYPTED_PRIVATE_KEY_PASS);
+ int port = svr.bind_to_any_port("0.0.0.0");
+ ASSERT_TRUE(svr.is_valid());
+ ASSERT_TRUE(port > 0);
+ svr.stop();
+}
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+X509 *readCertificate(const std::string &strFileName) {
+ std::ifstream inStream(strFileName);
+ std::string strCertPEM((std::istreambuf_iterator<char>(inStream)),
+ std::istreambuf_iterator<char>());
+
+ if (strCertPEM.empty()) return (nullptr);
+
+ BIO *pbCert = BIO_new(BIO_s_mem());
+ BIO_write(pbCert, strCertPEM.c_str(), (int)strCertPEM.size());
+ X509 *pCert = PEM_read_bio_X509(pbCert, NULL, 0, NULL);
+ BIO_free(pbCert);
+
+ return (pCert);
+}
+
+EVP_PKEY *readPrivateKey(const std::string &strFileName) {
+ std::ifstream inStream(strFileName);
+ std::string strPrivateKeyPEM((std::istreambuf_iterator<char>(inStream)),
+ std::istreambuf_iterator<char>());
+
+ if (strPrivateKeyPEM.empty()) return (nullptr);
+
+ BIO *pbPrivKey = BIO_new(BIO_s_mem());
+ BIO_write(pbPrivKey, strPrivateKeyPEM.c_str(), (int)strPrivateKeyPEM.size());
+ EVP_PKEY *pPrivateKey = PEM_read_bio_PrivateKey(pbPrivKey, NULL, NULL, NULL);
+ BIO_free(pbPrivKey);
+
+ return (pPrivateKey);
+}
+
+TEST(BindServerTest, UpdateCerts) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE);
+ int port = svr.bind_to_any_port("0.0.0.0");
+ ASSERT_TRUE(svr.is_valid());
+ ASSERT_TRUE(port > 0);
+
+ X509 *cert = readCertificate(SERVER_CERT_FILE);
+ X509 *ca_cert = readCertificate(CLIENT_CA_CERT_FILE);
+ EVP_PKEY *key = readPrivateKey(SERVER_PRIVATE_KEY_FILE);
+
+ ASSERT_TRUE(cert != nullptr);
+ ASSERT_TRUE(ca_cert != nullptr);
+ ASSERT_TRUE(key != nullptr);
+
+ X509_STORE *cert_store = X509_STORE_new();
+
+ X509_STORE_add_cert(cert_store, ca_cert);
+
+ svr.update_certs(cert, key, cert_store);
+
+ ASSERT_TRUE(svr.is_valid());
+ svr.stop();
+
+ X509_free(cert);
+ X509_free(ca_cert);
+ EVP_PKEY_free(key);
+}
+#endif
+
+TEST(ErrorHandlerTest, ContentLength) {
+ Server svr;
+
+ svr.set_error_handler([](const Request & /*req*/, Response &res) {
+ res.status = StatusCode::OK_200;
+ res.set_content("abcdefghijklmnopqrstuvwxyz",
+ "text/html"); // <= Content-Length still 13
+ });
+
+ svr.Get("/hi", [](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!\n", "text/plain");
+ res.status = 524;
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+
+ auto res = cli.Get("/hi", {{"Accept-Encoding", ""}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("26", res->get_header_value("Content-Length"));
+ EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body);
+ }
+}
+
+#ifndef CPPHTTPLIB_NO_EXCEPTIONS
+TEST(ExceptionTest, WithoutExceptionHandler) {
+ Server svr;
+
+ svr.Get("/exception", [&](const Request & /*req*/, Response & /*res*/) {
+ throw std::runtime_error("exception...");
+ });
+
+ svr.Get("/unknown", [&](const Request & /*req*/, Response & /*res*/) {
+ throw std::runtime_error("exception\r\n...");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ {
+ auto res = cli.Get("/exception");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::InternalServerError_500, res->status);
+ ASSERT_TRUE(res->has_header("EXCEPTION_WHAT"));
+ EXPECT_EQ("exception...", res->get_header_value("EXCEPTION_WHAT"));
+ }
+
+ {
+ auto res = cli.Get("/unknown");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::InternalServerError_500, res->status);
+ ASSERT_TRUE(res->has_header("EXCEPTION_WHAT"));
+ EXPECT_EQ("exception\\r\\n...", res->get_header_value("EXCEPTION_WHAT"));
+ }
+}
+
+TEST(ExceptionTest, WithExceptionHandler) {
+ Server svr;
+
+ svr.set_exception_handler([](const Request & /*req*/, Response &res,
+ std::exception_ptr ep) {
+ EXPECT_FALSE(ep == nullptr);
+ try {
+ std::rethrow_exception(ep);
+ } catch (std::exception &e) {
+ EXPECT_EQ("abc", std::string(e.what()));
+ } catch (...) {}
+ res.status = StatusCode::InternalServerError_500;
+ res.set_content("abcdefghijklmnopqrstuvwxyz",
+ "text/html"); // <= Content-Length still 13 at this point
+ });
+
+ svr.Get("/hi", [](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!\n", "text/plain");
+ throw std::runtime_error("abc");
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ for (size_t i = 0; i < 10; i++) {
+ Client cli(HOST, PORT);
+
+ for (size_t j = 0; j < 100; j++) {
+ auto res = cli.Get("/hi", {{"Accept-Encoding", ""}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::InternalServerError_500, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("26", res->get_header_value("Content-Length"));
+ EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body);
+ }
+
+ cli.set_keep_alive(true);
+
+ for (size_t j = 0; j < 100; j++) {
+ auto res = cli.Get("/hi", {{"Accept-Encoding", ""}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::InternalServerError_500, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("26", res->get_header_value("Content-Length"));
+ EXPECT_EQ("abcdefghijklmnopqrstuvwxyz", res->body);
+ }
+ }
+}
+
+TEST(ExceptionTest, AndErrorHandler) {
+ Server svr;
+
+ svr.set_error_handler([](const Request & /*req*/, Response &res) {
+ if (res.body.empty()) { res.set_content("NOT_FOUND", "text/html"); }
+ });
+
+ svr.set_exception_handler(
+ [](const Request & /*req*/, Response &res, std::exception_ptr ep) {
+ EXPECT_FALSE(ep == nullptr);
+ try {
+ std::rethrow_exception(ep);
+ } catch (std::exception &e) {
+ res.set_content(e.what(), "text/html");
+ } catch (...) {}
+ res.status = StatusCode::InternalServerError_500;
+ });
+
+ svr.Get("/exception", [](const Request & /*req*/, Response & /*res*/) {
+ throw std::runtime_error("EXCEPTION");
+ });
+
+ svr.Get("/error", [](const Request & /*req*/, Response &res) {
+ res.set_content("ERROR", "text/html");
+ res.status = StatusCode::InternalServerError_500;
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+
+ {
+ auto res = cli.Get("/exception");
+ ASSERT_TRUE(res);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("EXCEPTION", res->body);
+ }
+
+ {
+ auto res = cli.Get("/error");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::InternalServerError_500, res->status);
+ EXPECT_EQ("ERROR", res->body);
+ }
+
+ {
+ auto res = cli.Get("/invalid");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+ EXPECT_EQ("NOT_FOUND", res->body);
+ }
+}
+#endif
+
+TEST(NoContentTest, ContentLength) {
+ Server svr;
+
+ svr.Get("/hi", [](const Request & /*req*/, Response &res) {
+ res.status = StatusCode::NoContent_204;
+ });
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+
+ auto res = cli.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NoContent_204, res->status);
+ EXPECT_EQ("0", res->get_header_value("Content-Length"));
+ }
+}
+
+TEST(RoutingHandlerTest, PreAndPostRoutingHandlers) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(svr.is_valid());
+#else
+ Server svr;
+#endif
+
+ svr.set_pre_routing_handler([](const Request &req, Response &res) {
+ if (req.path == "/routing_handler") {
+ res.set_header("PRE_ROUTING", "on");
+ res.set_content("Routing Handler", "text/plain");
+ return httplib::Server::HandlerResponse::Handled;
+ }
+ return httplib::Server::HandlerResponse::Unhandled;
+ });
+
+ svr.set_error_handler([](const Request & /*req*/, Response &res) {
+ res.set_content("Error", "text/html");
+ });
+
+ svr.set_post_routing_handler([](const Request &req, Response &res) {
+ if (req.path == "/routing_handler") {
+ res.set_header("POST_ROUTING", "on");
+ }
+ });
+
+ svr.Get("/hi", [](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!\n", "text/plain");
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(HOST, PORT);
+ cli.enable_server_certificate_verification(false);
+#else
+ Client cli(HOST, PORT);
+#endif
+
+ auto res = cli.Get("/routing_handler");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("Routing Handler", res->body);
+ EXPECT_EQ(1U, res->get_header_value_count("PRE_ROUTING"));
+ EXPECT_EQ("on", res->get_header_value("PRE_ROUTING"));
+ EXPECT_EQ(1U, res->get_header_value_count("POST_ROUTING"));
+ EXPECT_EQ("on", res->get_header_value("POST_ROUTING"));
+ }
+
+ {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(HOST, PORT);
+ cli.enable_server_certificate_verification(false);
+#else
+ Client cli(HOST, PORT);
+#endif
+
+ auto res = cli.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("Hello World!\n", res->body);
+ EXPECT_EQ(0U, res->get_header_value_count("PRE_ROUTING"));
+ EXPECT_EQ(0U, res->get_header_value_count("POST_ROUTING"));
+ }
+
+ {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(HOST, PORT);
+ cli.enable_server_certificate_verification(false);
+#else
+ Client cli(HOST, PORT);
+#endif
+
+ auto res = cli.Get("/aaa");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+ EXPECT_EQ("Error", res->body);
+ EXPECT_EQ(0U, res->get_header_value_count("PRE_ROUTING"));
+ EXPECT_EQ(0U, res->get_header_value_count("POST_ROUTING"));
+ }
+}
+
+TEST(RequestHandlerTest, PreRequestHandler) {
+ auto route_path = "/user/:user";
+
+ Server svr;
+
+ svr.Get("/hi", [](const Request &, Response &res) {
+ res.set_content("hi", "text/plain");
+ });
+
+ svr.Get(route_path, [](const Request &req, Response &res) {
+ res.set_content(req.path_params.at("user"), "text/plain");
+ });
+
+ svr.set_pre_request_handler([&](const Request &req, Response &res) {
+ if (req.matched_route == route_path) {
+ auto user = req.path_params.at("user");
+ if (user != "john") {
+ res.status = StatusCode::Forbidden_403;
+ res.set_content("error", "text/html");
+ return Server::HandlerResponse::Handled;
+ }
+ }
+ return Server::HandlerResponse::Unhandled;
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ {
+ auto res = cli.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("hi", res->body);
+ }
+
+ {
+ auto res = cli.Get("/user/john");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("john", res->body);
+ }
+
+ {
+ auto res = cli.Get("/user/invalid-user");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Forbidden_403, res->status);
+ EXPECT_EQ("error", res->body);
+ }
+}
+
+TEST(InvalidFormatTest, StatusCode) {
+ Server svr;
+
+ svr.Get("/hi", [](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!\n", "text/plain");
+ res.status = 9999; // Status should be a three-digit code...
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+
+ auto res = cli.Get("/hi");
+ ASSERT_FALSE(res);
+ }
+}
+
+TEST(URLFragmentTest, WithFragment) {
+ Server svr;
+
+ svr.Get("/hi", [](const Request &req, Response & /*res*/) {
+ EXPECT_TRUE(req.target == "/hi");
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+
+ auto res = cli.Get("/hi#key1=val1=key2=val2");
+ EXPECT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli.Get("/hi%23key1=val1=key2=val2");
+ EXPECT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+ }
+}
+
+TEST(HeaderWriter, SetHeaderWriter) {
+ Server svr;
+
+ svr.set_header_writer([](Stream &strm, Headers &hdrs) {
+ hdrs.emplace("CustomServerHeader", "CustomServerValue");
+ return detail::write_headers(strm, hdrs);
+ });
+ svr.Get("/hi", [](const Request &req, Response &res) {
+ auto it = req.headers.find("CustomClientHeader");
+ EXPECT_TRUE(it != req.headers.end());
+ EXPECT_EQ(it->second, "CustomClientValue");
+ res.set_content("Hello World!\n", "text/plain");
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+ cli.set_header_writer([](Stream &strm, Headers &hdrs) {
+ hdrs.emplace("CustomClientHeader", "CustomClientValue");
+ return detail::write_headers(strm, hdrs);
+ });
+
+ auto res = cli.Get("/hi");
+ EXPECT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+
+ auto it = res->headers.find("CustomServerHeader");
+ EXPECT_TRUE(it != res->headers.end());
+ EXPECT_EQ(it->second, "CustomServerValue");
+ }
+}
+
+class ServerTest : public ::testing::Test {
+protected:
+ ServerTest()
+ : cli_(HOST, PORT)
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ ,
+ svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE)
+#endif
+ {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ cli_.enable_server_certificate_verification(false);
+#endif
+ }
+
+ virtual void SetUp() {
+ svr_.set_mount_point("/", "./www");
+ svr_.set_mount_point("/mount", "./www2");
+ svr_.set_file_extension_and_mimetype_mapping("abcde", "text/abcde");
+
+ svr_.Get("/hi",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ })
+ .Get("/file_content",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_file_content("./www/dir/test.html");
+ })
+ .Get("/file_content_with_content_type",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_file_content("./www/file", "text/plain");
+ })
+ .Get("/invalid_file_content",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_file_content("./www/dir/invalid_file_path");
+ })
+ .Get("/http_response_splitting",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_header("a", "1\r\nSet-Cookie: a=1");
+ EXPECT_EQ(0U, res.headers.size());
+ EXPECT_FALSE(res.has_header("a"));
+
+ res.set_header("a", "1\nSet-Cookie: a=1");
+ EXPECT_EQ(0U, res.headers.size());
+ EXPECT_FALSE(res.has_header("a"));
+
+ res.set_header("a", "1\rSet-Cookie: a=1");
+ EXPECT_EQ(0U, res.headers.size());
+ EXPECT_FALSE(res.has_header("a"));
+
+ res.set_header("a\r\nb", "0");
+ EXPECT_EQ(0U, res.headers.size());
+ EXPECT_FALSE(res.has_header("a"));
+
+ res.set_header("a\rb", "0");
+ EXPECT_EQ(0U, res.headers.size());
+ EXPECT_FALSE(res.has_header("a"));
+
+ res.set_header("a\nb", "0");
+ EXPECT_EQ(0U, res.headers.size());
+ EXPECT_FALSE(res.has_header("a"));
+
+ res.set_redirect("1\r\nSet-Cookie: a=1");
+ EXPECT_EQ(0U, res.headers.size());
+ EXPECT_FALSE(res.has_header("Location"));
+ })
+ .Get("/slow",
+ [&](const Request & /*req*/, Response &res) {
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+ res.set_content("slow", "text/plain");
+ })
+#if 0
+ .Post("/slowpost",
+ [&](const Request & /*req*/, Response &res) {
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+ res.set_content("slow", "text/plain");
+ })
+#endif
+ .Get("/remote_addr",
+ [&](const Request &req, Response &res) {
+ auto remote_addr = req.headers.find("REMOTE_ADDR")->second;
+ EXPECT_TRUE(req.has_header("REMOTE_PORT"));
+ EXPECT_EQ(req.remote_addr, req.get_header_value("REMOTE_ADDR"));
+ EXPECT_EQ(req.remote_port,
+ std::stoi(req.get_header_value("REMOTE_PORT")));
+ res.set_content(remote_addr.c_str(), "text/plain");
+ })
+ .Get("/local_addr",
+ [&](const Request &req, Response &res) {
+ EXPECT_TRUE(req.has_header("LOCAL_PORT"));
+ EXPECT_TRUE(req.has_header("LOCAL_ADDR"));
+ auto local_addr = req.get_header_value("LOCAL_ADDR");
+ auto local_port = req.get_header_value("LOCAL_PORT");
+ EXPECT_EQ(req.local_addr, local_addr);
+ EXPECT_EQ(req.local_port, std::stoi(local_port));
+ res.set_content(local_addr.append(":").append(local_port),
+ "text/plain");
+ })
+ .Get("/endwith%",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ })
+ .Get("/a\\+\\+b",
+ [&](const Request &req, Response &res) {
+ ASSERT_TRUE(req.has_param("a +b"));
+ auto val = req.get_param_value("a +b");
+ res.set_content(val, "text/plain");
+ })
+ .Get("/", [&](const Request & /*req*/,
+ Response &res) { res.set_redirect("/hi"); })
+ .Post("/1",
+ [](const Request & /*req*/, Response &res) {
+ res.set_redirect("/2", StatusCode::SeeOther_303);
+ })
+ .Get("/2",
+ [](const Request & /*req*/, Response &res) {
+ res.set_content("redirected.", "text/plain");
+ res.status = StatusCode::OK_200;
+ })
+ .Post("/person",
+ [&](const Request &req, Response &res) {
+ if (req.has_param("name") && req.has_param("note")) {
+ persons_[req.get_param_value("name")] =
+ req.get_param_value("note");
+ } else {
+ res.status = StatusCode::BadRequest_400;
+ }
+ })
+ .Put("/person",
+ [&](const Request &req, Response &res) {
+ if (req.has_param("name") && req.has_param("note")) {
+ persons_[req.get_param_value("name")] =
+ req.get_param_value("note");
+ } else {
+ res.status = StatusCode::BadRequest_400;
+ }
+ })
+ .Get("/person/(.*)",
+ [&](const Request &req, Response &res) {
+ string name = req.matches[1];
+ if (persons_.find(name) != persons_.end()) {
+ auto note = persons_[name];
+ res.set_content(note, "text/plain");
+ } else {
+ res.status = StatusCode::NotFound_404;
+ }
+ })
+ .Delete("/person",
+ [&](const Request &req, Response &res) {
+ if (req.has_param("name")) {
+ string name = req.get_param_value("name");
+ if (persons_.find(name) != persons_.end()) {
+ persons_.erase(name);
+ res.set_content("DELETED", "text/plain");
+ } else {
+ res.status = StatusCode::NotFound_404;
+ }
+ } else {
+ res.status = StatusCode::BadRequest_400;
+ }
+ })
+ .Post("/x-www-form-urlencoded-json",
+ [&](const Request &req, Response &res) {
+ auto json = req.get_param_value("json");
+ ASSERT_EQ(JSON_DATA, json);
+ res.set_content(json, "appliation/json");
+ res.status = StatusCode::OK_200;
+ })
+ .Get("/streamed-chunked",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_chunked_content_provider(
+ "text/plain", [](size_t /*offset*/, DataSink &sink) {
+ sink.os << "123";
+ sink.os << "456";
+ sink.os << "789";
+ sink.done();
+ return true;
+ });
+ })
+ .Get("/streamed-chunked2",
+ [&](const Request & /*req*/, Response &res) {
+ auto i = new int(0);
+ res.set_chunked_content_provider(
+ "text/plain",
+ [i](size_t /*offset*/, DataSink &sink) {
+ switch (*i) {
+ case 0: sink.os << "123"; break;
+ case 1: sink.os << "456"; break;
+ case 2: sink.os << "789"; break;
+ case 3: sink.done(); break;
+ }
+ (*i)++;
+ return true;
+ },
+ [i](bool success) {
+ EXPECT_TRUE(success);
+ delete i;
+ });
+ })
+ .Get("/streamed-chunked-with-trailer",
+ [&](const Request & /*req*/, Response &res) {
+ auto i = new int(0);
+ res.set_header("Trailer", "Dummy1, Dummy2");
+ res.set_chunked_content_provider(
+ "text/plain",
+ [i](size_t /*offset*/, DataSink &sink) {
+ switch (*i) {
+ case 0: sink.os << "123"; break;
+ case 1: sink.os << "456"; break;
+ case 2: sink.os << "789"; break;
+ case 3: {
+ sink.done_with_trailer(
+ {{"Dummy1", "DummyVal1"}, {"Dummy2", "DummyVal2"}});
+ } break;
+ }
+ (*i)++;
+ return true;
+ },
+ [i](bool success) {
+ EXPECT_TRUE(success);
+ delete i;
+ });
+ })
+ .Get("/streamed",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content_provider(
+ 6, "text/plain",
+ [](size_t offset, size_t /*length*/, DataSink &sink) {
+ sink.os << (offset < 3 ? "a" : "b");
+ return true;
+ });
+ })
+ .Get("/streamed-with-range",
+ [&](const Request &req, Response &res) {
+ auto data = new std::string("abcdefg");
+ res.set_content_provider(
+ data->size(), "text/plain",
+ [data](size_t offset, size_t length, DataSink &sink) {
+ size_t DATA_CHUNK_SIZE = 4;
+ const auto &d = *data;
+ auto out_len =
+ std::min(static_cast<size_t>(length), DATA_CHUNK_SIZE);
+ auto ret =
+ sink.write(&d[static_cast<size_t>(offset)], out_len);
+ EXPECT_TRUE(ret);
+ return true;
+ },
+ [data, &req](bool success) {
+ EXPECT_EQ(success, !req.has_param("error"));
+ delete data;
+ });
+ })
+ .Get("/streamed-cancel",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content_provider(
+ size_t(-1), "text/plain",
+ [](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ sink.os << "data_chunk";
+ return true;
+ });
+ })
+ .Get("/regex-with-delimiter",
+ [&](const Request &req, Response & /*res*/) {
+ ASSERT_TRUE(req.has_param("key"));
+ EXPECT_EQ("^(?.*(value))", req.get_param_value("key"));
+ })
+ .Get("/with-range",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content("abcdefg", "text/plain");
+ })
+ .Get("/test-start-time",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_NE(req.start_time_,
+ std::chrono::steady_clock::time_point::min());
+ })
+ .Get("/with-range-customized-response",
+ [&](const Request & /*req*/, Response &res) {
+ res.status = StatusCode::BadRequest_400;
+ res.set_content(JSON_DATA, "application/json");
+ })
+ .Post("/chunked",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ(req.body, "dechunked post body");
+ })
+ .Post("/large-chunked",
+ [&](const Request &req, Response & /*res*/) {
+ std::string expected(6 * 30 * 1024u, 'a');
+ EXPECT_EQ(req.body, expected);
+ })
+ .Post("/multipart",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ(4u, req.form.get_field_count("text1") +
+ req.form.get_field_count("text2") +
+ req.form.get_field_count("file3") +
+ req.form.get_field_count("file4"));
+ EXPECT_EQ(2u, req.form.get_file_count("file1") +
+ req.form.get_file_count("file2"));
+ ASSERT_TRUE(!req.form.has_file("???"));
+ ASSERT_TRUE(!req.form.has_field("???"));
+ ASSERT_TRUE(req.body.empty());
+
+ {
+ const auto &text = req.form.get_field("text1");
+ EXPECT_EQ("text default", text);
+ }
+
+ {
+ const auto &text = req.form.get_field("text2");
+ EXPECT_EQ("aωb", text);
+ }
+
+ {
+ const auto &file = req.form.get_file("file1");
+ EXPECT_EQ("hello.txt", file.filename);
+ EXPECT_EQ("text/plain", file.content_type);
+ EXPECT_EQ("h\ne\n\nl\nl\no\n", file.content);
+ }
+
+ {
+ const auto &file = req.form.get_file("file2");
+ EXPECT_EQ("world.json", file.filename);
+ EXPECT_EQ("application/json", file.content_type);
+ EXPECT_EQ("{\n \"world\", true\n}\n", file.content);
+ }
+
+ {
+ const auto &text = req.form.get_field("file3");
+ EXPECT_EQ(0u, text.size());
+ }
+
+ {
+ const auto &text = req.form.get_field("file4");
+ EXPECT_EQ(0u, text.size());
+ }
+ })
+ .Post("/multipart/multi_file_values",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ(3u, req.form.get_field_count("text") +
+ req.form.get_field_count("multi_text1"));
+ EXPECT_EQ(2u, req.form.get_file_count("multi_file1"));
+ ASSERT_TRUE(!req.form.has_file("???"));
+ ASSERT_TRUE(!req.form.has_field("???"));
+ ASSERT_TRUE(req.body.empty());
+
+ {
+ const auto &text = req.form.get_field("text");
+ EXPECT_EQ("default text", text);
+ }
+ {
+ const auto &text1_values = req.form.get_fields("multi_text1");
+ EXPECT_EQ(2u, text1_values.size());
+ EXPECT_EQ("aaaaa", text1_values[0]);
+ EXPECT_EQ("bbbbb", text1_values[1]);
+ }
+
+ {
+ const auto &file1_values = req.form.get_files("multi_file1");
+ EXPECT_EQ(2u, file1_values.size());
+ auto file1 = file1_values[0];
+ EXPECT_EQ(file1.filename, "hello.txt");
+ EXPECT_EQ(file1.content_type, "text/plain");
+ EXPECT_EQ("h\ne\n\nl\nl\no\n", file1.content);
+
+ auto file2 = file1_values[1];
+ EXPECT_EQ(file2.filename, "world.json");
+ EXPECT_EQ(file2.content_type, "application/json");
+ EXPECT_EQ("{\n \"world\", true\n}\n", file2.content);
+ }
+ })
+ .Post("/empty",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, "");
+ EXPECT_EQ("text/plain", req.get_header_value("Content-Type"));
+ EXPECT_EQ("0", req.get_header_value("Content-Length"));
+ res.set_content("empty", "text/plain");
+ })
+ .Post("/empty-no-content-type",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, "");
+ EXPECT_FALSE(req.has_header("Content-Type"));
+ EXPECT_EQ("0", req.get_header_value("Content-Length"));
+ res.set_content("empty-no-content-type", "text/plain");
+ })
+ .Post("/path-only",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, "");
+ EXPECT_EQ("", req.get_header_value("Content-Type"));
+ EXPECT_EQ("0", req.get_header_value("Content-Length"));
+ res.set_content("path-only", "text/plain");
+ })
+ .Post("/path-headers-only",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, "");
+ EXPECT_EQ("", req.get_header_value("Content-Type"));
+ EXPECT_EQ("0", req.get_header_value("Content-Length"));
+ EXPECT_EQ("world", req.get_header_value("hello"));
+ EXPECT_EQ("world2", req.get_header_value("hello2"));
+ res.set_content("path-headers-only", "text/plain");
+ })
+ .Post("/post-large",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, LARGE_DATA);
+ res.set_content(req.body, "text/plain");
+ })
+ .Put("/empty-no-content-type",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, "");
+ EXPECT_FALSE(req.has_header("Content-Type"));
+ EXPECT_EQ("0", req.get_header_value("Content-Length"));
+ res.set_content("empty-no-content-type", "text/plain");
+ })
+ .Put("/put",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, "PUT");
+ res.set_content(req.body, "text/plain");
+ })
+ .Put("/put-large",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, LARGE_DATA);
+ res.set_content(req.body, "text/plain");
+ })
+ .Patch("/patch",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, "PATCH");
+ res.set_content(req.body, "text/plain");
+ })
+ .Delete("/delete",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content("DELETE", "text/plain");
+ })
+ .Delete("/delete-body",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(req.body, "content");
+ res.set_content(req.body, "text/plain");
+ })
+ .Options(R"(\*)",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_header("Allow", "GET, POST, HEAD, OPTIONS");
+ })
+ .Get("/request-target",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ("/request-target?aaa=bbb&ccc=ddd", req.target);
+ EXPECT_EQ("bbb", req.get_param_value("aaa"));
+ EXPECT_EQ("ddd", req.get_param_value("ccc"));
+ })
+ .Get("/long-query-value",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ(LONG_QUERY_URL, req.target);
+ EXPECT_EQ(LONG_QUERY_VALUE, req.get_param_value("key"));
+ })
+ .Get("/too-long-query-value",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ(TOO_LONG_QUERY_URL, req.target);
+ EXPECT_EQ(TOO_LONG_QUERY_VALUE, req.get_param_value("key"));
+ })
+ .Get("/array-param",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ(3u, req.get_param_value_count("array"));
+ EXPECT_EQ("value1", req.get_param_value("array", 0));
+ EXPECT_EQ("value2", req.get_param_value("array", 1));
+ EXPECT_EQ("value3", req.get_param_value("array", 2));
+ })
+ .Post("/validate-no-multiple-headers",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ(1u, req.get_header_value_count("Content-Length"));
+ EXPECT_EQ("5", req.get_header_value("Content-Length"));
+ })
+ .Post("/content_receiver",
+ [&](const Request &req, Response &res,
+ const ContentReader &content_reader) {
+ if (req.is_multipart_form_data()) {
+ std::vector<FormData> items;
+ content_reader(
+ [&](const FormData &file) {
+ items.push_back(file);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ items.back().content.append(data, data_length);
+ return true;
+ });
+
+ EXPECT_EQ(5u, items.size());
+
+ {
+ const auto &file = get_file_value(items, "text1");
+ EXPECT_TRUE(file.filename.empty());
+ EXPECT_EQ("text default", file.content);
+ }
+
+ {
+ const auto &file = get_file_value(items, "text2");
+ EXPECT_TRUE(file.filename.empty());
+ EXPECT_EQ("aωb", file.content);
+ }
+
+ {
+ const auto &file = get_file_value(items, "file1");
+ EXPECT_EQ("hello.txt", file.filename);
+ EXPECT_EQ("text/plain", file.content_type);
+ EXPECT_EQ("h\ne\n\nl\nl\no\n", file.content);
+ }
+
+ {
+ const auto &file = get_file_value(items, "file2");
+ EXPECT_EQ("world.json", file.filename);
+ EXPECT_EQ("application/json", file.content_type);
+ EXPECT_EQ(R"({\n "world": true\n}\n)", file.content);
+ }
+
+ {
+ const auto &file = get_file_value(items, "file3");
+ EXPECT_TRUE(file.filename.empty());
+ EXPECT_EQ("application/octet-stream", file.content_type);
+ EXPECT_EQ(0u, file.content.size());
+ }
+ } else {
+ std::string body;
+ content_reader([&](const char *data, size_t data_length) {
+ EXPECT_EQ(7U, data_length);
+ body.append(data, data_length);
+ return true;
+ });
+ EXPECT_EQ(body, "content");
+ res.set_content(body, "text/plain");
+ }
+ })
+ .Put("/content_receiver",
+ [&](const Request & /*req*/, Response &res,
+ const ContentReader &content_reader) {
+ std::string body;
+ content_reader([&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+ EXPECT_EQ(body, "content");
+ res.set_content(body, "text/plain");
+ })
+ .Patch("/content_receiver",
+ [&](const Request & /*req*/, Response &res,
+ const ContentReader &content_reader) {
+ std::string body;
+ content_reader([&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+ EXPECT_EQ(body, "content");
+ res.set_content(body, "text/plain");
+ })
+ .Post("/query-string-and-body",
+ [&](const Request &req, Response & /*res*/) {
+ ASSERT_TRUE(req.has_param("key"));
+ EXPECT_EQ(req.get_param_value("key"), "value");
+ EXPECT_EQ(req.body, "content");
+ })
+ .Get("/last-request",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ("close", req.get_header_value("Connection"));
+ })
+ .Get(R"(/redirect/(\d+))",
+ [&](const Request &req, Response &res) {
+ auto num = std::stoi(req.matches[1]) + 1;
+ std::string url = "/redirect/" + std::to_string(num);
+ res.set_redirect(url);
+ })
+ .Post("/binary",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(4U, req.body.size());
+ EXPECT_EQ("application/octet-stream",
+ req.get_header_value("Content-Type"));
+ EXPECT_EQ("4", req.get_header_value("Content-Length"));
+ res.set_content(req.body, "application/octet-stream");
+ })
+ .Put("/binary",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(4U, req.body.size());
+ EXPECT_EQ("application/octet-stream",
+ req.get_header_value("Content-Type"));
+ EXPECT_EQ("4", req.get_header_value("Content-Length"));
+ res.set_content(req.body, "application/octet-stream");
+ })
+ .Patch("/binary",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(4U, req.body.size());
+ EXPECT_EQ("application/octet-stream",
+ req.get_header_value("Content-Type"));
+ EXPECT_EQ("4", req.get_header_value("Content-Length"));
+ res.set_content(req.body, "application/octet-stream");
+ })
+ .Delete("/binary",
+ [&](const Request &req, Response &res) {
+ EXPECT_EQ(4U, req.body.size());
+ EXPECT_EQ("application/octet-stream",
+ req.get_header_value("Content-Type"));
+ EXPECT_EQ("4", req.get_header_value("Content-Length"));
+ res.set_content(req.body, "application/octet-stream");
+ })
+ .Get("/issue1772",
+ [&](const Request & /*req*/, Response &res) {
+ res.status = 401;
+ res.set_header("WWW-Authenticate", "Basic realm=123456");
+ })
+ .Delete("/issue609",
+ [](const httplib::Request &, httplib::Response &res,
+ const httplib::ContentReader &) {
+ res.set_content("ok", "text/plain");
+ })
+#if defined(CPPHTTPLIB_ZLIB_SUPPORT) || defined(CPPHTTPLIB_BROTLI_SUPPORT) || \
+ defined(CPPHTTPLIB_ZSTD_SUPPORT)
+ .Get("/compress",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content(
+ "12345678901234567890123456789012345678901234567890123456789"
+ "01234567890123456789012345678901234567890",
+ "text/plain");
+ })
+ .Get("/nocompress",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content(
+ "12345678901234567890123456789012345678901234567890123456789"
+ "01234567890123456789012345678901234567890",
+ "application/octet-stream");
+ })
+ .Post("/compress-multipart",
+ [&](const Request &req, Response & /*res*/) {
+ EXPECT_EQ(2u, req.form.fields.size());
+ ASSERT_TRUE(!req.form.has_field("???"));
+
+ {
+ const auto &text = req.form.get_field("key1");
+ EXPECT_EQ("test", text);
+ }
+
+ {
+ const auto &text = req.form.get_field("key2");
+ EXPECT_EQ("--abcdefg123", text);
+ }
+ })
+#endif
+ ;
+
+ persons_["john"] = "programmer";
+
+ t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); });
+
+ svr_.wait_until_ready();
+ }
+
+ virtual void TearDown() {
+ svr_.stop();
+ if (!request_threads_.empty()) {
+ std::this_thread::sleep_for(std::chrono::seconds(1));
+ for (auto &t : request_threads_) {
+ t.join();
+ }
+ }
+ t_.join();
+ }
+
+ map<string, string> persons_;
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli_;
+ SSLServer svr_;
+#else
+ Client cli_;
+ Server svr_;
+#endif
+ thread t_;
+ std::vector<thread> request_threads_;
+};
+
+TEST_F(ServerTest, GetMethod200) {
+ auto res = cli_.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ("HTTP/1.1", res->version);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("OK", res->reason);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ(1U, res->get_header_value_count("Content-Type"));
+ EXPECT_EQ("Hello World!", res->body);
+}
+
+void performance_test(const char *host) {
+ auto port = 1234;
+
+ Server svr;
+
+ svr.Get("/benchmark", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Benchmark Response", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&]() { svr.listen(host, port); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(host, port);
+
+ auto start = std::chrono::high_resolution_clock::now();
+
+ auto res = cli.Get("/benchmark");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+
+ auto end = std::chrono::high_resolution_clock::now();
+
+ auto elapsed =
+ std::chrono::duration_cast<std::chrono::milliseconds>(end - start)
+ .count();
+
+ EXPECT_LE(elapsed, 5) << "Performance is too slow: " << elapsed
+ << "ms (Issue #1777)";
+}
+
+TEST(BenchmarkTest, localhost) { performance_test("localhost"); }
+
+TEST(BenchmarkTest, v6) { performance_test("::1"); }
+
+TEST_F(ServerTest, GetEmptyFile) {
+ auto res = cli_.Get("/empty_file");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type"));
+ EXPECT_EQ(0, std::stoi(res->get_header_value("Content-Length")));
+ EXPECT_EQ("", res->body);
+}
+
+TEST_F(ServerTest, GetFileContent) {
+ auto res = cli_.Get("/file_content");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ(9, std::stoi(res->get_header_value("Content-Length")));
+ EXPECT_EQ("test.html", res->body);
+}
+
+TEST_F(ServerTest, GetFileContentWithRange) {
+ auto res = cli_.Get("/file_content", {{make_range_header({{1, 3}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("bytes 1-3/9", res->get_header_value("Content-Range"));
+ EXPECT_EQ(3, std::stoi(res->get_header_value("Content-Length")));
+ EXPECT_EQ("est", res->body);
+}
+
+TEST_F(ServerTest, GetFileContentWithContentType) {
+ auto res = cli_.Get("/file_content_with_content_type");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ(5, std::stoi(res->get_header_value("Content-Length")));
+ EXPECT_EQ("file\n", res->body);
+}
+
+TEST_F(ServerTest, GetInvalidFileContent) {
+ auto res = cli_.Get("/invalid_file_content");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, GetMethod200withPercentEncoding) {
+ auto res = cli_.Get("/%68%69"); // auto res = cli_.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ("HTTP/1.1", res->version);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ(1U, res->get_header_value_count("Content-Type"));
+ EXPECT_EQ("Hello World!", res->body);
+}
+
+TEST_F(ServerTest, GetMethod302) {
+ auto res = cli_.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Found_302, res->status);
+ EXPECT_EQ("/hi", res->get_header_value("Location"));
+}
+
+TEST_F(ServerTest, GetMethod302Redirect) {
+ cli_.set_follow_location(true);
+ auto res = cli_.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("Hello World!", res->body);
+ EXPECT_EQ("/hi", res->location);
+}
+
+TEST_F(ServerTest, GetMethod404) {
+ auto res = cli_.Get("/invalid");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, HeadMethod200) {
+ auto res = cli_.Head("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_TRUE(res->body.empty());
+}
+
+TEST_F(ServerTest, HeadMethod200Static) {
+ auto res = cli_.Head("/mount/dir/index.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ(104, std::stoi(res->get_header_value("Content-Length")));
+ EXPECT_TRUE(res->body.empty());
+}
+
+TEST_F(ServerTest, HeadMethod404) {
+ auto res = cli_.Head("/invalid");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+ EXPECT_TRUE(res->body.empty());
+}
+
+TEST_F(ServerTest, GetMethodPersonJohn) {
+ auto res = cli_.Get("/person/john");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("programmer", res->body);
+}
+
+TEST_F(ServerTest, PostMethod1) {
+ auto res = cli_.Get("/person/john1");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+
+ res = cli_.Post("/person", "name=john1&note=coder",
+ "application/x-www-form-urlencoded");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli_.Get("/person/john1");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("text/plain", res->get_header_value("Content-Type"));
+ ASSERT_EQ("coder", res->body);
+}
+
+TEST_F(ServerTest, PostMethod2) {
+ auto res = cli_.Get("/person/john2");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+
+ Params params;
+ params.emplace("name", "john2");
+ params.emplace("note", "coder");
+
+ res = cli_.Post("/person", params);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli_.Get("/person/john2");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("text/plain", res->get_header_value("Content-Type"));
+ ASSERT_EQ("coder", res->body);
+}
+
+TEST_F(ServerTest, PutMethod3) {
+ auto res = cli_.Get("/person/john3");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+
+ Params params;
+ params.emplace("name", "john3");
+ params.emplace("note", "coder");
+
+ res = cli_.Put("/person", params);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli_.Get("/person/john3");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("text/plain", res->get_header_value("Content-Type"));
+ ASSERT_EQ("coder", res->body);
+}
+
+TEST_F(ServerTest, DeleteMethod1) {
+ auto res = cli_.Get("/person/john4");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+
+ Params params;
+ params.emplace("name", "john4");
+ params.emplace("note", "coder");
+
+ res = cli_.Post("/person", params);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli_.Get("/person/john4");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("text/plain", res->get_header_value("Content-Type"));
+ ASSERT_EQ("coder", res->body);
+
+ Params delete_params;
+ delete_params.emplace("name", "john4");
+
+ res = cli_.Delete("/person", delete_params);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("DELETED", res->body);
+
+ res = cli_.Get("/person/john4");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, DeleteMethod2) {
+ auto res = cli_.Get("/person/john5");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+
+ Params params;
+ params.emplace("name", "john5");
+ params.emplace("note", "developer");
+
+ res = cli_.Post("/person", params);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli_.Get("/person/john5");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("text/plain", res->get_header_value("Content-Type"));
+ ASSERT_EQ("developer", res->body);
+
+ Params delete_params;
+ delete_params.emplace("name", "john5");
+
+ Headers headers;
+ headers.emplace("Custom-Header", "test-value");
+
+ res = cli_.Delete("/person", headers, delete_params);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("DELETED", res->body);
+
+ res = cli_.Get("/person/john5");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, DeleteMethod3) {
+ auto res = cli_.Get("/person/john6");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+
+ Params params;
+ params.emplace("name", "john6");
+ params.emplace("note", "tester");
+
+ res = cli_.Post("/person", params);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli_.Get("/person/john6");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("text/plain", res->get_header_value("Content-Type"));
+ ASSERT_EQ("tester", res->body);
+
+ Params delete_params;
+ delete_params.emplace("name", "john6");
+
+ Headers headers;
+ headers.emplace("Custom-Header", "test-value");
+
+ res = cli_.Delete("/person", headers, delete_params, nullptr);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("DELETED", res->body);
+
+ res = cli_.Get("/person/john6");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, PostWwwFormUrlEncodedJson) {
+ Params params;
+ params.emplace("json", JSON_DATA);
+
+ auto res = cli_.Post("/x-www-form-urlencoded-json", params);
+
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(JSON_DATA, res->body);
+}
+
+TEST_F(ServerTest, PostEmptyContent) {
+ auto res = cli_.Post("/empty", "", "text/plain");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("empty", res->body);
+}
+
+TEST_F(ServerTest, PostEmptyContentWithNoContentType) {
+ auto res = cli_.Post("/empty-no-content-type");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("empty-no-content-type", res->body);
+}
+
+TEST_F(ServerTest, PostPathOnly) {
+ auto res = cli_.Post("/path-only");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("path-only", res->body);
+}
+
+TEST_F(ServerTest, PostPathAndHeadersOnly) {
+ auto res = cli_.Post("/path-headers-only",
+ Headers({{"hello", "world"}, {"hello2", "world2"}}));
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("path-headers-only", res->body);
+}
+
+TEST_F(ServerTest, PostLarge) {
+ auto res = cli_.Post("/post-large", LARGE_DATA, "text/plain");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(LARGE_DATA, res->body);
+}
+
+TEST_F(ServerTest, PutEmptyContentWithNoContentType) {
+ auto res = cli_.Put("/empty-no-content-type");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("empty-no-content-type", res->body);
+}
+
+TEST_F(ServerTest, GetMethodDir) {
+ auto res = cli_.Get("/dir/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+
+ auto body = R"(<html>
+<head>
+</head>
+<body>
+ <a href="/dir/test.html">Test</a>
+ <a href="/hi">hi</a>
+</body>
+</html>
+)";
+ EXPECT_EQ(body, res->body);
+}
+
+TEST_F(ServerTest, GetMethodDirTest) {
+ auto res = cli_.Get("/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("test.html", res->body);
+}
+
+TEST_F(ServerTest, GetMethodDirTestWithDoubleDots) {
+ auto res = cli_.Get("/dir/../dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("test.html", res->body);
+}
+
+TEST_F(ServerTest, GetMethodInvalidPath) {
+ auto res = cli_.Get("/dir/../test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, GetMethodOutOfBaseDir) {
+ auto res = cli_.Get("/../www/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, GetMethodOutOfBaseDir2) {
+ auto res = cli_.Get("/dir/../../www/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, GetMethodDirMountTest) {
+ auto res = cli_.Get("/mount/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("test.html", res->body);
+}
+
+TEST_F(ServerTest, GetMethodDirMountTestWithDoubleDots) {
+ auto res = cli_.Get("/mount/dir/../dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/html", res->get_header_value("Content-Type"));
+ EXPECT_EQ("test.html", res->body);
+}
+
+TEST_F(ServerTest, GetMethodInvalidMountPath) {
+ auto res = cli_.Get("/mount/dir/../test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, GetMethodEmbeddedNUL) {
+ auto res = cli_.Get("/mount/dir/test.html%00.js");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, GetMethodOutOfBaseDirMount) {
+ auto res = cli_.Get("/mount/../www2/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, GetMethodOutOfBaseDirMount2) {
+ auto res = cli_.Get("/mount/dir/../../www2/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, GetMethodOutOfBaseDirMountWithBackslash) {
+ auto res = cli_.Get("/mount/%2e%2e%5c/www2/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, PostMethod303) {
+ auto res = cli_.Post("/1", "body", "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::SeeOther_303, res->status);
+ EXPECT_EQ("/2", res->get_header_value("Location"));
+}
+
+TEST_F(ServerTest, PostMethod303Redirect) {
+ cli_.set_follow_location(true);
+ auto res = cli_.Post("/1", "body", "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("redirected.", res->body);
+ EXPECT_EQ("/2", res->location);
+}
+
+TEST_F(ServerTest, UserDefinedMIMETypeMapping) {
+ auto res = cli_.Get("/dir/test.abcde");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/abcde", res->get_header_value("Content-Type"));
+ EXPECT_EQ("abcde", res->body);
+}
+
+TEST_F(ServerTest, StaticFileRange) {
+ auto res = cli_.Get("/dir/test.abcde", {{make_range_header({{2, 3}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("text/abcde", res->get_header_value("Content-Type"));
+ EXPECT_EQ("2", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 2-3/5", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("cd"), res->body);
+}
+
+TEST_F(ServerTest, StaticFileRanges) {
+ auto res =
+ cli_.Get("/dir/test.abcde", {{make_range_header({{1, 2}, {4, -1}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_TRUE(
+ res->get_header_value("Content-Type")
+ .find(
+ "multipart/byteranges; boundary=--cpp-httplib-multipart-data-") ==
+ 0);
+ EXPECT_EQ("266", res->get_header_value("Content-Length"));
+}
+
+TEST_F(ServerTest, StaticFileRangeHead) {
+ auto res = cli_.Head("/dir/test.abcde", {{make_range_header({{2, 3}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("text/abcde", res->get_header_value("Content-Type"));
+ EXPECT_EQ("2", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 2-3/5", res->get_header_value("Content-Range"));
+}
+
+TEST_F(ServerTest, StaticFileRangeBigFile) {
+ auto res = cli_.Get("/dir/1MB.txt", {{make_range_header({{-1, 5}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("5", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 1048571-1048575/1048576",
+ res->get_header_value("Content-Range"));
+ EXPECT_EQ("LAST\n", res->body);
+}
+
+TEST_F(ServerTest, StaticFileRangeBigFile2) {
+ auto res = cli_.Get("/dir/1MB.txt", {{make_range_header({{1, 4097}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("4097", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 1-4097/1048576", res->get_header_value("Content-Range"));
+}
+
+TEST_F(ServerTest, StaticFileBigFile) {
+ auto res = cli_.Get("/dir/1MB.txt");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("1048576", res->get_header_value("Content-Length"));
+}
+
+TEST_F(ServerTest, InvalidBaseDirMount) {
+ EXPECT_EQ(false, svr_.set_mount_point("invalid_mount_point", "./www3"));
+}
+
+TEST_F(ServerTest, Binary) {
+ std::vector<char> binary{0x00, 0x01, 0x02, 0x03};
+
+ auto res = cli_.Post("/binary", binary.data(), binary.size(),
+ "application/octet-stream");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(4U, res->body.size());
+
+ res = cli_.Put("/binary", binary.data(), binary.size(),
+ "application/octet-stream");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(4U, res->body.size());
+
+ res = cli_.Patch("/binary", binary.data(), binary.size(),
+ "application/octet-stream");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(4U, res->body.size());
+
+ res = cli_.Delete("/binary", binary.data(), binary.size(),
+ "application/octet-stream");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(4U, res->body.size());
+}
+
+TEST_F(ServerTest, BinaryString) {
+ auto binary = std::string("\x00\x01\x02\x03", 4);
+
+ auto res = cli_.Post("/binary", binary, "application/octet-stream");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(4U, res->body.size());
+
+ res = cli_.Put("/binary", binary, "application/octet-stream");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(4U, res->body.size());
+
+ res = cli_.Patch("/binary", binary, "application/octet-stream");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(4U, res->body.size());
+
+ res = cli_.Delete("/binary", binary, "application/octet-stream");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(4U, res->body.size());
+}
+
+TEST_F(ServerTest, EmptyRequest) {
+ auto res = cli_.Get("");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Connection, res.error());
+}
+
+TEST_F(ServerTest, LongRequest) {
+ std::string request;
+ for (size_t i = 0; i < 545; i++) {
+ request += "/TooLongRequest";
+ }
+ request += "OK";
+
+ auto res = cli_.Get(request.c_str());
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, TooLongRequest) {
+ std::string request;
+ for (size_t i = 0; i < 546; i++) {
+ request += "/TooLongRequest";
+ }
+ request += "_NG";
+
+ auto res = cli_.Get(request.c_str());
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::UriTooLong_414, res->status);
+}
+
+TEST_F(ServerTest, AlmostTooLongRequest) {
+ // test for #2046 - URI length check shouldn't include other content on req
+ // line URI is max URI length, minus 14 other chars in req line (GET, space,
+ // leading /, space, HTTP/1.1)
+ std::string request =
+ "/" + string(CPPHTTPLIB_REQUEST_URI_MAX_LENGTH - 14, 'A');
+
+ auto res = cli_.Get(request.c_str());
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, LongHeader) {
+ Request req;
+ req.method = "GET";
+ req.path = "/hi";
+
+ std::string host_and_port;
+ host_and_port += HOST;
+ host_and_port += ":";
+ host_and_port += std::to_string(PORT);
+
+ req.headers.emplace("Host", host_and_port.c_str());
+ req.headers.emplace("Accept", "*/*");
+ req.headers.emplace("User-Agent", "cpp-httplib/0.1");
+
+ req.headers.emplace(
+ "Header-Name",
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@");
+
+ auto res = std::make_shared<Response>();
+ auto error = Error::Success;
+ auto ret = cli_.send(req, *res, error);
+
+ ASSERT_TRUE(ret);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, LongQueryValue) {
+ auto res = cli_.Get(LONG_QUERY_URL.c_str());
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::UriTooLong_414, res->status);
+}
+
+TEST_F(ServerTest, TooLongQueryValue) {
+ auto res = cli_.Get(TOO_LONG_QUERY_URL.c_str());
+
+ ASSERT_FALSE(res);
+ EXPECT_EQ(Error::Read, res.error());
+}
+
+TEST_F(ServerTest, TooLongHeader) {
+ Request req;
+ req.method = "GET";
+ req.path = "/hi";
+
+ std::string host_and_port;
+ host_and_port += HOST;
+ host_and_port += ":";
+ host_and_port += std::to_string(PORT);
+
+ req.headers.emplace("Host", host_and_port.c_str());
+ req.headers.emplace("Accept", "*/*");
+ req.headers.emplace("User-Agent", "cpp-httplib/0.1");
+
+ req.headers.emplace(
+ "Header-Name",
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"
+ "@@@@@@@@@@@@@@@@@");
+
+ auto res = std::make_shared<Response>();
+ auto error = Error::Success;
+ auto ret = cli_.send(req, *res, error);
+
+ ASSERT_TRUE(ret);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, HeaderCountAtLimit) {
+ // Test with headers just under the 100 limit
+ httplib::Headers headers;
+
+ // Add 95 custom headers (the client will add Host, User-Agent, Accept, etc.)
+ // This should keep us just under the 100 header limit
+ for (int i = 0; i < 95; i++) {
+ std::string name = "X-Test-Header-" + std::to_string(i);
+ std::string value = "value" + std::to_string(i);
+ headers.emplace(name, value);
+ }
+
+ // This should work fine as we're under the limit
+ auto res = cli_.Get("/hi", headers);
+ EXPECT_TRUE(res);
+ if (res) { EXPECT_EQ(StatusCode::OK_200, res->status); }
+}
+
+TEST_F(ServerTest, HeaderCountExceedsLimit) {
+ // Test with many headers to exceed the 100 limit
+ httplib::Headers headers;
+
+ // Add 150 headers to definitely exceed the 100 limit
+ for (int i = 0; i < 150; i++) {
+ std::string name = "X-Test-Header-" + std::to_string(i);
+ std::string value = "value" + std::to_string(i);
+ headers.emplace(name, value);
+ }
+
+ // This should fail due to exceeding header count limit
+ auto res = cli_.Get("/hi", headers);
+
+ // The request should either fail or return 400 Bad Request
+ if (res) {
+ // If we get a response, it should be 400 Bad Request
+ EXPECT_EQ(StatusCode::BadRequest_400, res->status);
+ } else {
+ // Or the request should fail entirely
+ EXPECT_FALSE(res);
+ }
+}
+
+TEST_F(ServerTest, PercentEncoding) {
+ auto res = cli_.Get("/e%6edwith%");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, PercentEncodingUnicode) {
+ auto res = cli_.Get("/e%u006edwith%");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, InvalidPercentEncoding) {
+ auto res = cli_.Get("/%endwith%");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, InvalidPercentEncodingUnicode) {
+ auto res = cli_.Get("/%uendwith%");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, EndWithPercentCharacterInQuery) {
+ auto res = cli_.Get("/hello?aaa=bbb%");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST_F(ServerTest, PlusSignEncoding) {
+ auto res = cli_.Get("/a+%2Bb?a %2bb=a %2Bb");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("a +b", res->body);
+}
+
+TEST_F(ServerTest, HeaderCountSecurityTest) {
+ // This test simulates a potential DoS attack using many headers
+ // to verify our security fix prevents memory exhaustion
+
+ httplib::Headers attack_headers;
+
+ // Attempt to add many headers like an attacker would (200 headers to far
+ // exceed limit)
+ for (int i = 0; i < 200; i++) {
+ std::string name = "X-Attack-Header-" + std::to_string(i);
+ std::string value = "attack_payload_" + std::to_string(i);
+ attack_headers.emplace(name, value);
+ }
+
+ // Try to POST with excessive headers
+ auto res = cli_.Post("/", attack_headers, "test_data", "text/plain");
+
+ // Should either fail or return 400 Bad Request due to security limit
+ if (res) {
+ // If we get a response, it should be 400 Bad Request
+ EXPECT_EQ(StatusCode::BadRequest_400, res->status);
+ } else {
+ // Request failed, which is the expected behavior for DoS protection
+ EXPECT_FALSE(res);
+ }
+}
+
+TEST_F(ServerTest, MultipartFormData) {
+ UploadFormDataItems items = {
+ {"text1", "text default", "", ""},
+ {"text2", "aωb", "", ""},
+ {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"},
+ {"file2", "{\n \"world\", true\n}\n", "world.json", "application/json"},
+ {"file3", "", "", "application/octet-stream"},
+ {"file4", "", "", " application/json tmp-string "}};
+
+ auto res = cli_.Post("/multipart", items);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, MultipartFormDataMultiFileValues) {
+ UploadFormDataItems items = {
+ {"text", "default text", "", ""},
+
+ {"multi_text1", "aaaaa", "", ""},
+ {"multi_text1", "bbbbb", "", ""},
+
+ {"multi_file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"},
+ {"multi_file1", "{\n \"world\", true\n}\n", "world.json",
+ "application/json"},
+ };
+
+ auto res = cli_.Post("/multipart/multi_file_values", items);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, CaseInsensitiveHeaderName) {
+ auto res = cli_.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("content-type"));
+ EXPECT_EQ("Hello World!", res->body);
+}
+
+TEST_F(ServerTest, CaseInsensitiveTransferEncoding) {
+ Request req;
+ req.method = "POST";
+ req.path = "/chunked";
+
+ std::string host_and_port;
+ host_and_port += HOST;
+ host_and_port += ":";
+ host_and_port += std::to_string(PORT);
+
+ req.headers.emplace("Host", host_and_port.c_str());
+ req.headers.emplace("Accept", "*/*");
+ req.headers.emplace("User-Agent", "cpp-httplib/0.1");
+ req.headers.emplace("Content-Type", "text/plain");
+ req.headers.emplace("Content-Length", "0");
+ req.headers.emplace(
+ "Transfer-Encoding",
+ "Chunked"); // Note, "Chunked" rather than typical "chunked".
+
+ // Client does not chunk, so make a chunked body manually.
+ req.body = "4\r\ndech\r\nf\r\nunked post body\r\n0\r\n\r\n";
+
+ auto res = std::make_shared<Response>();
+ auto error = Error::Success;
+ auto ret = cli_.send(req, *res, error);
+
+ ASSERT_TRUE(ret);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, GetStreamed2) {
+ auto res = cli_.Get("/streamed", {{make_range_header({{2, 3}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("2", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 2-3/6", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("ab"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamed) {
+ auto res = cli_.Get("/streamed");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("6", res->get_header_value("Content-Length"));
+ EXPECT_EQ(std::string("aaabbb"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedWithRange1) {
+ auto res = cli_.Get("/streamed-with-range", {{make_range_header({{3, 5}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("3", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 3-5/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("def"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedWithRange2) {
+ auto res = cli_.Get("/streamed-with-range", {{make_range_header({{1, -1}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("6", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 1-6/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("bcdefg"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedWithRangeSuffix1) {
+ auto res = cli_.Get("/streamed-with-range", {{"Range", "bytes=-3"}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("3", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 4-6/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("efg"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedWithRangeSuffix2) {
+ auto res = cli_.Get("/streamed-with-range?error", {{"Range", "bytes=-9999"}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status);
+ EXPECT_EQ("0", res->get_header_value("Content-Length"));
+ EXPECT_EQ(false, res->has_header("Content-Range"));
+ EXPECT_EQ(0U, res->body.size());
+}
+
+TEST_F(ServerTest, GetStreamedWithRangeError) {
+ auto res = cli_.Get("/streamed-with-range",
+ {{"Range", "bytes=92233720368547758079223372036854775806-"
+ "92233720368547758079223372036854775807"}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status);
+ EXPECT_EQ("0", res->get_header_value("Content-Length"));
+ EXPECT_EQ(false, res->has_header("Content-Range"));
+ EXPECT_EQ(0U, res->body.size());
+}
+
+TEST_F(ServerTest, GetRangeWithMaxLongLength) {
+ auto res = cli_.Get(
+ "/with-range",
+ {{"Range", "bytes=0-" + std::to_string(std::numeric_limits<long>::max())},
+ {"Accept-Encoding", ""}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("7", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 0-6/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("abcdefg"), res->body);
+}
+
+TEST_F(ServerTest, GetRangeWithZeroToInfinite) {
+ auto res = cli_.Get("/with-range", {
+ {"Range", "bytes=0-"},
+ {"Accept-Encoding", ""},
+ });
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("7", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 0-6/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("abcdefg"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedWithRangeMultipart) {
+ auto res =
+ cli_.Get("/streamed-with-range", {{make_range_header({{1, 2}, {4, 5}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("267", res->get_header_value("Content-Length"));
+ EXPECT_EQ(false, res->has_header("Content-Range"));
+ EXPECT_EQ(267U, res->body.size());
+
+ // Check that both range contents are present
+ EXPECT_TRUE(res->body.find("bc\r\n") != std::string::npos);
+ EXPECT_TRUE(res->body.find("ef\r\n") != std::string::npos);
+
+ // Check that Content-Range headers are present for both ranges
+ EXPECT_TRUE(res->body.find("Content-Range: bytes 1-2/7") !=
+ std::string::npos);
+ EXPECT_TRUE(res->body.find("Content-Range: bytes 4-5/7") !=
+ std::string::npos);
+}
+
+TEST_F(ServerTest, GetStreamedWithTooManyRanges) {
+ Ranges ranges;
+ for (size_t i = 0; i < CPPHTTPLIB_RANGE_MAX_COUNT + 1; i++) {
+ ranges.emplace_back(0, -1);
+ }
+
+ auto res =
+ cli_.Get("/streamed-with-range?error", {{make_range_header(ranges)}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status);
+ EXPECT_EQ("0", res->get_header_value("Content-Length"));
+ EXPECT_EQ(false, res->has_header("Content-Range"));
+ EXPECT_EQ(0U, res->body.size());
+}
+
+TEST_F(ServerTest, GetStreamedWithOverwrapping) {
+ auto res =
+ cli_.Get("/streamed-with-range", {{make_range_header({{1, 4}, {2, 5}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ(5U, res->body.size());
+
+ // Check that overlapping ranges are coalesced into a single range
+ EXPECT_EQ("bcdef", res->body);
+ EXPECT_EQ("bytes 1-5/7", res->get_header_value("Content-Range"));
+
+ // Should be single range, not multipart
+ EXPECT_TRUE(res->has_header("Content-Range"));
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+}
+
+TEST_F(ServerTest, GetStreamedWithNonAscendingRanges) {
+ auto res =
+ cli_.Get("/streamed-with-range", {{make_range_header({{4, 5}, {0, 2}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ(268U, res->body.size());
+
+ // Check that both range contents are present
+ EXPECT_TRUE(res->body.find("ef\r\n") != std::string::npos);
+ EXPECT_TRUE(res->body.find("abc\r\n") != std::string::npos);
+
+ // Check that Content-Range headers are present for both ranges
+ EXPECT_TRUE(res->body.find("Content-Range: bytes 4-5/7") !=
+ std::string::npos);
+ EXPECT_TRUE(res->body.find("Content-Range: bytes 0-2/7") !=
+ std::string::npos);
+}
+
+TEST_F(ServerTest, GetStreamedWithDuplicateRanges) {
+ auto res =
+ cli_.Get("/streamed-with-range", {{make_range_header({{0, 2}, {0, 2}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ(269U, res->body.size());
+
+ // Check that both duplicate range contents are present
+ size_t first_abc = res->body.find("abc\r\n");
+ EXPECT_TRUE(first_abc != std::string::npos);
+ size_t second_abc = res->body.find("abc\r\n", first_abc + 1);
+ EXPECT_TRUE(second_abc != std::string::npos);
+
+ // Check that Content-Range headers are present for both ranges
+ size_t first_range = res->body.find("Content-Range: bytes 0-2/7");
+ EXPECT_TRUE(first_range != std::string::npos);
+ size_t second_range =
+ res->body.find("Content-Range: bytes 0-2/7", first_range + 1);
+ EXPECT_TRUE(second_range != std::string::npos);
+}
+
+TEST_F(ServerTest, GetStreamedWithRangesMoreThanTwoOverwrapping) {
+ auto res = cli_.Get("/streamed-with-range?error",
+ {{make_range_header({{0, 1}, {1, 2}, {2, 3}, {3, 4}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status);
+ EXPECT_EQ("0", res->get_header_value("Content-Length"));
+ EXPECT_EQ(false, res->has_header("Content-Range"));
+ EXPECT_EQ(0U, res->body.size());
+}
+
+TEST_F(ServerTest, GetStreamedEndless) {
+ uint64_t offset = 0;
+ auto res = cli_.Get("/streamed-cancel",
+ [&](const char * /*data*/, uint64_t data_length) {
+ if (offset < 100) {
+ offset += data_length;
+ return true;
+ }
+ return false;
+ });
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST_F(ServerTest, ClientStop) {
+ std::atomic_size_t count{4};
+ std::vector<std::thread> threads;
+
+ for (auto i = count.load(); i != 0; --i) {
+ threads.emplace_back([&]() {
+ auto res = cli_.Get("/streamed-cancel",
+ [&](const char *, uint64_t) { return true; });
+
+ --count;
+
+ ASSERT_TRUE(!res);
+ EXPECT_TRUE(res.error() == Error::Canceled ||
+ res.error() == Error::Read || res.error() == Error::Write);
+ });
+ }
+
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+ while (count != 0) {
+ cli_.stop();
+ std::this_thread::sleep_for(std::chrono::milliseconds(10));
+ }
+ for (auto &t : threads) {
+ t.join();
+ }
+}
+
+TEST_F(ServerTest, GetWithRange1) {
+ auto res = cli_.Get("/with-range", {
+ make_range_header({{3, 5}}),
+ {"Accept-Encoding", ""},
+ });
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("3", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 3-5/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("def"), res->body);
+}
+
+TEST_F(ServerTest, GetWithRange2) {
+ auto res = cli_.Get("/with-range", {
+ make_range_header({{1, -1}}),
+ {"Accept-Encoding", ""},
+ });
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("6", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 1-6/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("bcdefg"), res->body);
+}
+
+TEST_F(ServerTest, GetWithRange3) {
+ auto res = cli_.Get("/with-range", {
+ make_range_header({{0, 0}}),
+ {"Accept-Encoding", ""},
+ });
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("1", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 0-0/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("a"), res->body);
+}
+
+TEST_F(ServerTest, GetWithRange4) {
+ auto res = cli_.Get("/with-range", {
+ make_range_header({{-1, 2}}),
+ {"Accept-Encoding", ""},
+ });
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("2", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 5-6/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("fg"), res->body);
+}
+
+TEST_F(ServerTest, GetWithRange5) {
+ auto res = cli_.Get("/with-range", {
+ make_range_header({{0, 5}}),
+ {"Accept-Encoding", ""},
+ });
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("6", res->get_header_value("Content-Length"));
+ EXPECT_EQ(true, res->has_header("Content-Range"));
+ EXPECT_EQ("bytes 0-5/7", res->get_header_value("Content-Range"));
+ EXPECT_EQ(std::string("abcdef"), res->body);
+}
+
+TEST_F(ServerTest, GetWithRangeOffsetGreaterThanContent) {
+ auto res = cli_.Get("/with-range", {{make_range_header({{10000, 20000}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status);
+}
+
+TEST_F(ServerTest, GetWithRangeMultipart) {
+ auto res = cli_.Get("/with-range", {{make_range_header({{1, 2}, {4, 5}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ EXPECT_EQ("267", res->get_header_value("Content-Length"));
+ EXPECT_EQ(false, res->has_header("Content-Range"));
+ EXPECT_EQ(267U, res->body.size());
+}
+
+TEST_F(ServerTest, GetWithRangeMultipartOffsetGreaterThanContent) {
+ auto res =
+ cli_.Get("/with-range", {{make_range_header({{-1, 2}, {10000, 30000}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::RangeNotSatisfiable_416, res->status);
+}
+
+TEST_F(ServerTest, GetWithRangeCustomizedResponse) {
+ auto res = cli_.Get("/with-range-customized-response",
+ {{make_range_header({{1, 2}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::BadRequest_400, res->status);
+ EXPECT_EQ(true, res->has_header("Content-Length"));
+ EXPECT_EQ(false, res->has_header("Content-Range"));
+ EXPECT_EQ(JSON_DATA, res->body);
+}
+
+TEST_F(ServerTest, GetWithRangeMultipartCustomizedResponseMultipleRange) {
+ auto res = cli_.Get("/with-range-customized-response",
+ {{make_range_header({{1, 2}, {4, 5}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::BadRequest_400, res->status);
+ EXPECT_EQ(true, res->has_header("Content-Length"));
+ EXPECT_EQ(false, res->has_header("Content-Range"));
+ EXPECT_EQ(JSON_DATA, res->body);
+}
+
+TEST_F(ServerTest, Issue1772) {
+ auto res = cli_.Get("/issue1772", {{make_range_header({{1000, -1}})}});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::Unauthorized_401, res->status);
+}
+
+TEST_F(ServerTest, Issue609) {
+ auto res = cli_.Delete("/issue609");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(std::string("ok"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedChunked) {
+ auto res = cli_.Get("/streamed-chunked");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(std::string("123456789"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedChunked2) {
+ auto res = cli_.Get("/streamed-chunked2");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(std::string("123456789"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedChunkedWithTrailer) {
+ auto res = cli_.Get("/streamed-chunked-with-trailer");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(std::string("123456789"), res->body);
+
+ EXPECT_TRUE(res->has_header("Trailer"));
+ EXPECT_EQ(1U, res->get_header_value_count("Trailer"));
+ EXPECT_EQ(std::string("Dummy1, Dummy2"), res->get_header_value("Trailer"));
+
+ // Trailers are now stored separately from headers (security fix)
+ EXPECT_EQ(2U, res->trailers.size());
+ EXPECT_TRUE(res->has_trailer("Dummy1"));
+ EXPECT_TRUE(res->has_trailer("Dummy2"));
+ EXPECT_FALSE(res->has_trailer("Dummy3"));
+ EXPECT_EQ(std::string("DummyVal1"), res->get_trailer_value("Dummy1"));
+ EXPECT_EQ(std::string("DummyVal2"), res->get_trailer_value("Dummy2"));
+
+ // Verify trailers are NOT in headers (security verification)
+ EXPECT_EQ(std::string(""), res->get_header_value("Dummy1"));
+ EXPECT_EQ(std::string(""), res->get_header_value("Dummy2"));
+}
+
+TEST_F(ServerTest, LargeChunkedPost) {
+ Request req;
+ req.method = "POST";
+ req.path = "/large-chunked";
+
+ std::string host_and_port;
+ host_and_port += HOST;
+ host_and_port += ":";
+ host_and_port += std::to_string(PORT);
+
+ req.headers.emplace("Host", host_and_port.c_str());
+ req.headers.emplace("Accept", "*/*");
+ req.headers.emplace("User-Agent", "cpp-httplib/0.1");
+ req.headers.emplace("Content-Type", "text/plain");
+ req.headers.emplace("Content-Length", "0");
+ req.headers.emplace("Transfer-Encoding", "chunked");
+
+ std::string long_string(30 * 1024u, 'a');
+ std::string chunk = "7800\r\n" + long_string + "\r\n";
+
+ // Attempt to make a large enough post to exceed OS buffers, to test that
+ // the server handles short reads if the full chunk data isn't available.
+ req.body = chunk + chunk + chunk + chunk + chunk + chunk + "0\r\n\r\n";
+
+ auto res = std::make_shared<Response>();
+ auto error = Error::Success;
+ auto ret = cli_.send(req, *res, error);
+
+ ASSERT_TRUE(ret);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, GetMethodRemoteAddr) {
+ auto res = cli_.Get("/remote_addr");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_TRUE(res->body == "::1" || res->body == "127.0.0.1");
+}
+
+TEST_F(ServerTest, GetMethodLocalAddr) {
+ auto res = cli_.Get("/local_addr");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_TRUE(res->body == std::string("::1:").append(to_string(PORT)) ||
+ res->body == std::string("127.0.0.1:").append(to_string(PORT)));
+}
+
+TEST_F(ServerTest, HTTPResponseSplitting) {
+ auto res = cli_.Get("/http_response_splitting");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, SlowRequest) {
+ request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); });
+ request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); });
+ request_threads_.emplace_back([this]() { auto res = cli_.Get("/slow"); });
+}
+
+#if 0
+TEST_F(ServerTest, SlowPost) {
+ char buffer[64 * 1024];
+ memset(buffer, 0x42, sizeof(buffer));
+
+ auto res = cli_.Post(
+ "/slowpost", 64 * 1024 * 1024,
+ [&](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ auto ret = sink.write(buffer, sizeof(buffer));
+ EXPECT_TRUE(ret);
+ return true;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, SlowPostFail) {
+ char buffer[64 * 1024];
+ memset(buffer, 0x42, sizeof(buffer));
+
+ cli_.set_write_timeout(std::chrono::seconds(0));
+ auto res = cli_.Post(
+ "/slowpost", 64 * 1024 * 1024,
+ [&](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ sink.write(buffer, sizeof(buffer));
+ return true;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Write, res.error());
+}
+#endif
+
+TEST_F(ServerTest, Put) {
+ auto res = cli_.Put("/put", "PUT", "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("PUT", res->body);
+}
+
+TEST_F(ServerTest, PutWithContentProvider) {
+ auto res = cli_.Put(
+ "/put", 3,
+ [](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ sink.os << "PUT";
+ return true;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("PUT", res->body);
+}
+
+TEST_F(ServerTest, PostWithContentProviderAbort) {
+ auto res = cli_.Post(
+ "/post", 42,
+ [](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) {
+ return false;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST_F(ServerTest, PutWithContentProviderWithoutLength) {
+ auto res = cli_.Put(
+ "/put",
+ [](size_t /*offset*/, DataSink &sink) {
+ sink.os << "PUT";
+ sink.done();
+ return true;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("PUT", res->body);
+}
+
+TEST_F(ServerTest, PostWithContentProviderWithoutLengthAbort) {
+ auto res = cli_.Post(
+ "/post", [](size_t /*offset*/, DataSink & /*sink*/) { return false; },
+ "text/plain");
+
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+#ifdef CPPHTTPLIB_ZLIB_SUPPORT
+TEST_F(ServerTest, PutWithContentProviderWithGzip) {
+ cli_.set_compress(true);
+ auto res = cli_.Put(
+ "/put", 3,
+ [](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ sink.os << "PUT";
+ return true;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("PUT", res->body);
+}
+
+TEST_F(ServerTest, PostWithContentProviderWithGzipAbort) {
+ cli_.set_compress(true);
+ auto res = cli_.Post(
+ "/post", 42,
+ [](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) {
+ return false;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST_F(ServerTest, PutWithContentProviderWithoutLengthWithGzip) {
+ cli_.set_compress(true);
+ auto res = cli_.Put(
+ "/put",
+ [](size_t /*offset*/, DataSink &sink) {
+ sink.os << "PUT";
+ sink.done();
+ return true;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("PUT", res->body);
+}
+
+TEST_F(ServerTest, PostWithContentProviderWithoutLengthWithGzipAbort) {
+ cli_.set_compress(true);
+ auto res = cli_.Post(
+ "/post", [](size_t /*offset*/, DataSink & /*sink*/) { return false; },
+ "text/plain");
+
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::Canceled, res.error());
+}
+
+TEST_F(ServerTest, PutLargeFileWithGzip) {
+ cli_.set_compress(true);
+ auto res = cli_.Put("/put-large", LARGE_DATA, "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(LARGE_DATA, res->body);
+}
+
+TEST_F(ServerTest, PutLargeFileWithGzip2) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ std::string s = std::string("https://") + HOST + ":" + std::to_string(PORT);
+ Client cli(s.c_str());
+ cli.enable_server_certificate_verification(false);
+#else
+ std::string s = std::string("http://") + HOST + ":" + std::to_string(PORT);
+ Client cli(s.c_str());
+#endif
+ cli.set_compress(true);
+
+ auto res = cli.Put("/put-large", LARGE_DATA, "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(LARGE_DATA, res->body);
+ // The compressed size should be less than a 10th of the original. May vary
+ // depending on the zlib library.
+ EXPECT_LT(res.get_request_header_value_u64("Content-Length"),
+ static_cast<uint64_t>(10 * 1024 * 1024));
+ EXPECT_EQ("gzip", res.get_request_header_value("Content-Encoding"));
+}
+
+TEST_F(ServerTest, PutContentWithDeflate) {
+ cli_.set_compress(false);
+ Headers headers;
+ headers.emplace("Content-Encoding", "deflate");
+ // PUT in deflate format:
+ auto res = cli_.Put("/put", headers,
+ "\170\234\013\010\015\001\0\001\361\0\372", "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("PUT", res->body);
+}
+
+TEST_F(ServerTest, GetStreamedChunkedWithGzip) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip, deflate");
+
+ auto res = cli_.Get("/streamed-chunked", headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(std::string("123456789"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedChunkedWithGzip2) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip, deflate");
+
+ auto res = cli_.Get("/streamed-chunked2", headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(std::string("123456789"), res->body);
+}
+
+TEST_F(ServerTest, SplitDelimiterInPathRegex) {
+ auto res = cli_.Get("/regex-with-delimiter?key=^(?.*(value))");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(GzipDecompressor, ChunkedDecompression) {
+ std::string data;
+ for (size_t i = 0; i < 32 * 1024; ++i) {
+ data.push_back(static_cast<char>('a' + i % 26));
+ }
+
+ std::string compressed_data;
+ {
+ httplib::detail::gzip_compressor compressor;
+ bool result = compressor.compress(
+ data.data(), data.size(),
+ /*last=*/true,
+ [&](const char *compressed_data_chunk, size_t compressed_data_size) {
+ compressed_data.insert(compressed_data.size(), compressed_data_chunk,
+ compressed_data_size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+ }
+
+ std::string decompressed_data;
+ {
+ httplib::detail::gzip_decompressor decompressor;
+
+ // Chunk size is chosen specifically to have a decompressed chunk size equal
+ // to 16384 bytes 16384 bytes is the size of decompressor output buffer
+ size_t chunk_size = 130;
+ for (size_t chunk_begin = 0; chunk_begin < compressed_data.size();
+ chunk_begin += chunk_size) {
+ size_t current_chunk_size =
+ std::min(compressed_data.size() - chunk_begin, chunk_size);
+ bool result = decompressor.decompress(
+ compressed_data.data() + chunk_begin, current_chunk_size,
+ [&](const char *decompressed_data_chunk,
+ size_t decompressed_data_chunk_size) {
+ decompressed_data.insert(decompressed_data.size(),
+ decompressed_data_chunk,
+ decompressed_data_chunk_size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+ }
+ }
+ ASSERT_EQ(data, decompressed_data);
+}
+
+TEST(GzipDecompressor, DeflateDecompression) {
+ std::string original_text = "Raw deflate without gzip";
+ unsigned char data[32] = {0x78, 0x9C, 0x0B, 0x4A, 0x2C, 0x57, 0x48, 0x49,
+ 0x4D, 0xCB, 0x49, 0x2C, 0x49, 0x55, 0x28, 0xCF,
+ 0x2C, 0xC9, 0xC8, 0x2F, 0x2D, 0x51, 0x48, 0xAF,
+ 0xCA, 0x2C, 0x00, 0x00, 0x6F, 0x98, 0x09, 0x2E};
+ std::string compressed_data(data, data + sizeof(data) / sizeof(data[0]));
+
+ std::string decompressed_data;
+ {
+ httplib::detail::gzip_decompressor decompressor;
+
+ bool result = decompressor.decompress(
+ compressed_data.data(), compressed_data.size(),
+ [&](const char *decompressed_data_chunk,
+ size_t decompressed_data_chunk_size) {
+ decompressed_data.insert(decompressed_data.size(),
+ decompressed_data_chunk,
+ decompressed_data_chunk_size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+ }
+ ASSERT_EQ(original_text, decompressed_data);
+}
+
+TEST(GzipDecompressor, DeflateDecompressionTrailingBytes) {
+ std::string original_text = "Raw deflate without gzip";
+ unsigned char data[40] = {0x78, 0x9C, 0x0B, 0x4A, 0x2C, 0x57, 0x48, 0x49,
+ 0x4D, 0xCB, 0x49, 0x2C, 0x49, 0x55, 0x28, 0xCF,
+ 0x2C, 0xC9, 0xC8, 0x2F, 0x2D, 0x51, 0x48, 0xAF,
+ 0xCA, 0x2C, 0x00, 0x00, 0x6F, 0x98, 0x09, 0x2E,
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
+ std::string compressed_data(data, data + sizeof(data) / sizeof(data[0]));
+
+ std::string decompressed_data;
+ {
+ httplib::detail::gzip_decompressor decompressor;
+
+ bool result = decompressor.decompress(
+ compressed_data.data(), compressed_data.size(),
+ [&](const char *decompressed_data_chunk,
+ size_t decompressed_data_chunk_size) {
+ decompressed_data.insert(decompressed_data.size(),
+ decompressed_data_chunk,
+ decompressed_data_chunk_size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+ }
+ ASSERT_EQ(original_text, decompressed_data);
+}
+
+#ifdef _WIN32
+TEST(GzipDecompressor, LargeRandomData) {
+
+ // prepare large random data that is difficult to be compressed and is
+ // expected to have large size even when compressed
+ std::random_device seed_gen;
+ std::mt19937 random(seed_gen());
+ constexpr auto large_size_byte = 4294967296UL; // 4GiB
+ constexpr auto data_size = large_size_byte + 134217728UL; // + 128MiB
+ std::vector<std::uint32_t> data(data_size / sizeof(std::uint32_t));
+ std::generate(data.begin(), data.end(), [&]() { return random(); });
+
+ // compress data over 4GiB
+ std::string compressed_data;
+ compressed_data.reserve(large_size_byte + 536870912UL); // + 512MiB reserved
+ httplib::detail::gzip_compressor compressor;
+ auto result = compressor.compress(reinterpret_cast<const char *>(data.data()),
+ data.size() * sizeof(std::uint32_t), true,
+ [&](const char *data, size_t size) {
+ compressed_data.insert(
+ compressed_data.size(), data, size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+
+ // FIXME: compressed data size is expected to be greater than 4GiB,
+ // but there is no guarantee
+ // ASSERT_TRUE(compressed_data.size() >= large_size_byte);
+
+ // decompress data over 4GiB
+ std::string decompressed_data;
+ decompressed_data.reserve(data_size);
+ httplib::detail::gzip_decompressor decompressor;
+ result = decompressor.decompress(
+ compressed_data.data(), compressed_data.size(),
+ [&](const char *data, size_t size) {
+ decompressed_data.insert(decompressed_data.size(), data, size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+
+ // compare
+ ASSERT_EQ(data_size, decompressed_data.size());
+ ASSERT_TRUE(std::memcmp(data.data(), decompressed_data.data(), data_size) ==
+ 0);
+}
+#endif
+#endif
+
+#ifdef CPPHTTPLIB_BROTLI_SUPPORT
+TEST_F(ServerTest, GetStreamedChunkedWithBrotli) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "br");
+
+ auto res = cli_.Get("/streamed-chunked", headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(std::string("123456789"), res->body);
+}
+
+TEST_F(ServerTest, GetStreamedChunkedWithBrotli2) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "br");
+
+ auto res = cli_.Get("/streamed-chunked2", headers);
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(std::string("123456789"), res->body);
+}
+#endif
+
+TEST_F(ServerTest, Patch) {
+ auto res = cli_.Patch("/patch", "PATCH", "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("PATCH", res->body);
+}
+
+TEST_F(ServerTest, Delete) {
+ auto res = cli_.Delete("/delete");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("DELETE", res->body);
+}
+
+TEST_F(ServerTest, DeleteContentReceiver) {
+ auto res = cli_.Delete("/delete-body", "content", "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("content", res->body);
+}
+
+TEST_F(ServerTest, Options) {
+ auto res = cli_.Options("*");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("GET, POST, HEAD, OPTIONS", res->get_header_value("Allow"));
+ EXPECT_TRUE(res->body.empty());
+}
+
+TEST_F(ServerTest, URL) {
+ auto res = cli_.Get("/request-target?aaa=bbb&ccc=ddd");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, ArrayParam) {
+ auto res = cli_.Get("/array-param?array=value1&array=value2&array=value3");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, NoMultipleHeaders) {
+ Headers headers = {{"Content-Length", "5"}};
+ auto res = cli_.Post("/validate-no-multiple-headers", headers, "hello",
+ "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, PostContentReceiver) {
+ auto res = cli_.Post("/content_receiver", "content", "text/plain");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("content", res->body);
+}
+
+TEST_F(ServerTest, PostMultipartFileContentReceiver) {
+ UploadFormDataItems items = {
+ {"text1", "text default", "", ""},
+ {"text2", "aωb", "", ""},
+ {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"},
+ {"file2", R"({\n "world": true\n}\n)", "world.json", "application/json"},
+ {"file3", "", "", "application/octet-stream"},
+ };
+
+ auto res = cli_.Post("/content_receiver", items);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, PostMultipartPlusBoundary) {
+ UploadFormDataItems items = {
+ {"text1", "text default", "", ""},
+ {"text2", "aωb", "", ""},
+ {"file1", "h\ne\n\nl\nl\no\n", "hello.txt", "text/plain"},
+ {"file2", R"({\n "world": true\n}\n)", "world.json", "application/json"},
+ {"file3", "", "", "application/octet-stream"},
+ };
+
+ auto boundary = std::string("+++++");
+
+ std::string body;
+
+ for (const auto &item : items) {
+ body += "--" + boundary + "\r\n";
+ body += "Content-Disposition: form-data; name=\"" + item.name + "\"";
+ if (!item.filename.empty()) {
+ body += "; filename=\"" + item.filename + "\"";
+ }
+ body += "\r\n";
+ if (!item.content_type.empty()) {
+ body += "Content-Type: " + item.content_type + "\r\n";
+ }
+ body += "\r\n";
+ body += item.content + "\r\n";
+ }
+ body += "--" + boundary + "--\r\n";
+
+ std::string content_type = "multipart/form-data; boundary=" + boundary;
+ auto res = cli_.Post("/content_receiver", body, content_type.c_str());
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, PostContentReceiverGzip) {
+ cli_.set_compress(true);
+ auto res = cli_.Post("/content_receiver", "content", "text/plain");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("content", res->body);
+}
+
+TEST_F(ServerTest, PutContentReceiver) {
+ auto res = cli_.Put("/content_receiver", "content", "text/plain");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("content", res->body);
+}
+
+TEST_F(ServerTest, PatchContentReceiver) {
+ auto res = cli_.Patch("/content_receiver", "content", "text/plain");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ("content", res->body);
+}
+
+template <typename ClientType>
+void TestWithHeadersAndContentReceiver(
+ ClientType &cli,
+ std::function<Result(ClientType &, const std::string &, const Headers &,
+ const std::string &, const std::string &,
+ ContentReceiver, DownloadProgress)>
+ request_func) {
+ Headers headers;
+ headers.emplace("X-Custom-Header", "test-value");
+
+ std::string received_body;
+ auto res = request_func(
+ cli, "/content_receiver", headers, "content", "application/json",
+ [&](const char *data, size_t data_length) {
+ received_body.append(data, data_length);
+ return true;
+ },
+ nullptr);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("content", received_body);
+}
+
+TEST_F(ServerTest, PostWithHeadersAndContentReceiver) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiver<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver, DownloadProgress progress) {
+ return cli.Post(path, headers, body, content_type, receiver, progress);
+ });
+}
+
+TEST_F(ServerTest, PutWithHeadersAndContentReceiver) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiver<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver, DownloadProgress progress) {
+ return cli.Put(path, headers, body, content_type, receiver, progress);
+ });
+}
+
+TEST_F(ServerTest, PatchWithHeadersAndContentReceiver) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiver<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver, DownloadProgress progress) {
+ return cli.Patch(path, headers, body, content_type, receiver, progress);
+ });
+}
+
+template <typename ClientType>
+void TestWithHeadersAndContentReceiverWithProgress(
+ ClientType &cli,
+ std::function<Result(ClientType &, const std::string &, const Headers &,
+ const std::string &, const std::string &,
+ ContentReceiver, DownloadProgress)>
+ request_func) {
+ Headers headers;
+ headers.emplace("X-Test-Header", "progress-test");
+
+ std::string received_body;
+ auto progress_called = false;
+
+ auto res = request_func(
+ cli, "/content_receiver", headers, "content", "text/plain",
+ [&](const char *data, size_t data_length) {
+ received_body.append(data, data_length);
+ return true;
+ },
+ [&](uint64_t /*current*/, uint64_t /*total*/) {
+ progress_called = true;
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("content", received_body);
+ EXPECT_TRUE(progress_called);
+}
+
+TEST_F(ServerTest, PostWithHeadersAndContentReceiverWithProgress) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiverWithProgress<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver, DownloadProgress progress) {
+ return cli.Post(path, headers, body, content_type, receiver, progress);
+ });
+}
+
+TEST_F(ServerTest, PutWithHeadersAndContentReceiverWithProgress) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiverWithProgress<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver, DownloadProgress progress) {
+ return cli.Put(path, headers, body, content_type, receiver, progress);
+ });
+}
+
+TEST_F(ServerTest, PatchWithHeadersAndContentReceiverWithProgress) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiverWithProgress<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver, DownloadProgress progress) {
+ return cli.Patch(path, headers, body, content_type, receiver, progress);
+ });
+}
+
+template <typename ClientType>
+void TestWithHeadersAndContentReceiverError(
+ ClientType &cli, std::function<Result(ClientType &, const std::string &,
+ const Headers &, const std::string &,
+ const std::string &, ContentReceiver)>
+ request_func) {
+ Headers headers;
+ headers.emplace("X-Error-Test", "true");
+
+ std::string received_body;
+ auto receiver_failed = false;
+
+ auto res =
+ request_func(cli, "/content_receiver", headers, "content", "text/plain",
+ [&](const char *data, size_t data_length) {
+ received_body.append(data, data_length);
+ receiver_failed = true;
+ return false;
+ });
+
+ ASSERT_FALSE(res);
+ EXPECT_TRUE(receiver_failed);
+}
+
+TEST_F(ServerTest, PostWithHeadersAndContentReceiverError) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiverError<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver) {
+ return cli.Post(path, headers, body, content_type, receiver);
+ });
+}
+
+TEST_F(ServerTest, PuttWithHeadersAndContentReceiverError) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiverError<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver) {
+ return cli.Put(path, headers, body, content_type, receiver);
+ });
+}
+
+TEST_F(ServerTest, PatchWithHeadersAndContentReceiverError) {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ using ClientT = SSLClient;
+#else
+ using ClientT = Client;
+#endif
+ TestWithHeadersAndContentReceiverError<ClientT>(
+ cli_, [](ClientT &cli, const std::string &path, const Headers &headers,
+ const std::string &body, const std::string &content_type,
+ ContentReceiver receiver) {
+ return cli.Patch(path, headers, body, content_type, receiver);
+ });
+}
+
+TEST_F(ServerTest, PostQueryStringAndBody) {
+ auto res =
+ cli_.Post("/query-string-and-body?key=value", "content", "text/plain");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, HTTP2Magic) {
+ Request req;
+ req.method = "PRI";
+ req.path = "*";
+ req.body = "SM";
+
+ auto res = std::make_shared<Response>();
+ auto error = Error::Success;
+ auto ret = cli_.send(req, *res, error);
+
+ ASSERT_TRUE(ret);
+ EXPECT_EQ(StatusCode::BadRequest_400, res->status);
+}
+
+TEST_F(ServerTest, KeepAlive) {
+ auto res = cli_.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("Hello World!", res->body);
+
+ res = cli_.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("Hello World!", res->body);
+
+ res = cli_.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("Hello World!", res->body);
+
+ res = cli_.Get("/not-exist");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+
+ res = cli_.Post("/empty", "", "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("empty", res->body);
+ EXPECT_EQ("close", res->get_header_value("Connection"));
+
+ res = cli_.Post(
+ "/empty", 0, [&](size_t, size_t, DataSink &) { return true; },
+ "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("empty", res->body);
+
+ cli_.set_keep_alive(false);
+ res = cli_.Get("/last-request");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("close", res->get_header_value("Connection"));
+}
+
+TEST_F(ServerTest, TooManyRedirect) {
+ cli_.set_follow_location(true);
+ auto res = cli_.Get("/redirect/0");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::ExceedRedirectCount, res.error());
+}
+
+TEST_F(ServerTest, StartTime) { auto res = cli_.Get("/test-start-time"); }
+
+#ifdef CPPHTTPLIB_ZLIB_SUPPORT
+TEST_F(ServerTest, Gzip) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip, deflate");
+ auto res = cli_.Get("/compress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("gzip", res->get_header_value("Content-Encoding"));
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("33", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, GzipWithoutAcceptEncoding) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "");
+ auto res = cli_.Get("/compress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_TRUE(res->get_header_value("Content-Encoding").empty());
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("100", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, GzipWithContentReceiver) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip, deflate");
+ std::string body;
+ auto res = cli_.Get("/compress", headers,
+ [&](const char *data, uint64_t data_length) {
+ EXPECT_EQ(100U, data_length);
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("gzip", res->get_header_value("Content-Encoding"));
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("33", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, GzipWithoutDecompressing) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip, deflate");
+
+ cli_.set_decompress(false);
+ auto res = cli_.Get("/compress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("gzip", res->get_header_value("Content-Encoding"));
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("33", res->get_header_value("Content-Length"));
+ EXPECT_EQ(33U, res->body.size());
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, GzipWithContentReceiverWithoutAcceptEncoding) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "");
+
+ std::string body;
+ auto res = cli_.Get("/compress", headers,
+ [&](const char *data, uint64_t data_length) {
+ EXPECT_EQ(100U, data_length);
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_TRUE(res->get_header_value("Content-Encoding").empty());
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("100", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, NoGzip) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip, deflate");
+ auto res = cli_.Get("/nocompress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(false, res->has_header("Content-Encoding"));
+ EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type"));
+ EXPECT_EQ("100", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, NoGzipWithContentReceiver) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip, deflate");
+ std::string body;
+ auto res = cli_.Get("/nocompress", headers,
+ [&](const char *data, uint64_t data_length) {
+ EXPECT_EQ(100U, data_length);
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(false, res->has_header("Content-Encoding"));
+ EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type"));
+ EXPECT_EQ("100", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, MultipartFormDataGzip) {
+ UploadFormDataItems items = {
+ {"key1", "test", "", ""},
+ {"key2", "--abcdefg123", "", ""},
+ };
+
+ cli_.set_compress(true);
+ auto res = cli_.Post("/compress-multipart", items);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+#endif
+
+#ifdef CPPHTTPLIB_BROTLI_SUPPORT
+TEST_F(ServerTest, Brotli) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "br");
+ auto res = cli_.Get("/compress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("br", res->get_header_value("Content-Encoding"));
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("19", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+#endif
+
+#ifdef CPPHTTPLIB_ZSTD_SUPPORT
+TEST_F(ServerTest, Zstd) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "zstd");
+ auto res = cli_.Get("/compress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("zstd", res->get_header_value("Content-Encoding"));
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("26", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, ZstdWithoutAcceptEncoding) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "");
+ auto res = cli_.Get("/compress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_TRUE(res->get_header_value("Content-Encoding").empty());
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("100", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, ZstdWithContentReceiver) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "zstd");
+ std::string body;
+ auto res = cli_.Get("/compress", headers,
+ [&](const char *data, uint64_t data_length) {
+ EXPECT_EQ(100U, data_length);
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("zstd", res->get_header_value("Content-Encoding"));
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("26", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, ZstdWithoutDecompressing) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "zstd");
+
+ cli_.set_decompress(false);
+ auto res = cli_.Get("/compress", headers);
+
+ unsigned char compressed[26] = {0x28, 0xb5, 0x2f, 0xfd, 0x20, 0x64, 0x8d,
+ 0x00, 0x00, 0x50, 0x31, 0x32, 0x33, 0x34,
+ 0x35, 0x36, 0x37, 0x38, 0x39, 0x30, 0x01,
+ 0x00, 0xd7, 0xa9, 0x20, 0x01};
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("zstd", res->get_header_value("Content-Encoding"));
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("26", res->get_header_value("Content-Length"));
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_EQ(26U, res->body.size());
+ EXPECT_TRUE(std::memcmp(compressed, res->body.data(), sizeof(compressed)) ==
+ 0);
+}
+
+TEST_F(ServerTest, ZstdWithContentReceiverWithoutAcceptEncoding) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "");
+
+ std::string body;
+ auto res = cli_.Get("/compress", headers,
+ [&](const char *data, uint64_t data_length) {
+ EXPECT_EQ(100U, data_length);
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_TRUE(res->get_header_value("Content-Encoding").empty());
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("100", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, NoZstd) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "zstd");
+ auto res = cli_.Get("/nocompress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(false, res->has_header("Content-Encoding"));
+ EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type"));
+ EXPECT_EQ("100", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ res->body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, NoZstdWithContentReceiver) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "zstd");
+ std::string body;
+ auto res = cli_.Get("/nocompress", headers,
+ [&](const char *data, uint64_t data_length) {
+ EXPECT_EQ(100U, data_length);
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(false, res->has_header("Content-Encoding"));
+ EXPECT_EQ("application/octet-stream", res->get_header_value("Content-Type"));
+ EXPECT_EQ("100", res->get_header_value("Content-Length"));
+ EXPECT_EQ("123456789012345678901234567890123456789012345678901234567890123456"
+ "7890123456789012345678901234567890",
+ body);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+// TODO: How to enable zstd ??
+TEST_F(ServerTest, MultipartFormDataZstd) {
+ UploadFormDataItems items = {
+ {"key1", "test", "", ""},
+ {"key2", "--abcdefg123", "", ""},
+ };
+ Headers headers;
+ headers.emplace("Accept-Encoding", "zstd");
+
+ cli_.set_compress(true);
+ auto res = cli_.Post("/compress-multipart", headers, items);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(ServerTest, PutWithContentProviderWithZstd) {
+ Headers headers;
+ headers.emplace("Accept-Encoding", "zstd");
+
+ cli_.set_compress(true);
+ auto res = cli_.Put(
+ "/put", headers, 3,
+ [](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ sink.os << "PUT";
+ return true;
+ },
+ "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("PUT", res->body);
+}
+
+// Pre-compression logging tests
+TEST_F(ServerTest, PreCompressionLogging) {
+ // Test data for compression (matches the actual /compress endpoint content)
+ const std::string test_content =
+ "123456789012345678901234567890123456789012345678901234567890123456789012"
+ "3456789012345678901234567890";
+
+ // Variables to capture logging data
+ std::string pre_compression_body;
+ std::string pre_compression_content_type;
+ std::string pre_compression_content_encoding;
+
+ std::string post_compression_body;
+ std::string post_compression_content_type;
+ std::string post_compression_content_encoding;
+
+ // Set up pre-compression logger
+ svr_.set_pre_compression_logger([&](const Request & /*req*/,
+ const Response &res) {
+ pre_compression_body = res.body;
+ pre_compression_content_type = res.get_header_value("Content-Type");
+ pre_compression_content_encoding = res.get_header_value("Content-Encoding");
+ });
+
+ // Set up post-compression logger
+ svr_.set_logger([&](const Request & /*req*/, const Response &res) {
+ post_compression_body = res.body;
+ post_compression_content_type = res.get_header_value("Content-Type");
+ post_compression_content_encoding =
+ res.get_header_value("Content-Encoding");
+ });
+
+ // Test with gzip compression
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip");
+
+ auto res = cli_.Get("/compress", headers);
+
+ // Verify response was compressed
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("gzip", res->get_header_value("Content-Encoding"));
+
+ // Verify pre-compression logger captured uncompressed content
+ EXPECT_EQ(test_content, pre_compression_body);
+ EXPECT_EQ("text/plain", pre_compression_content_type);
+ EXPECT_TRUE(pre_compression_content_encoding
+ .empty()); // No encoding header before compression
+
+ // Verify post-compression logger captured compressed content
+ EXPECT_NE(test_content,
+ post_compression_body); // Should be different after compression
+ EXPECT_EQ("text/plain", post_compression_content_type);
+ EXPECT_EQ("gzip", post_compression_content_encoding);
+
+ // Verify compressed content is smaller
+ EXPECT_LT(post_compression_body.size(), pre_compression_body.size());
+}
+
+TEST_F(ServerTest, PreCompressionLoggingWithBrotli) {
+ const std::string test_content =
+ "123456789012345678901234567890123456789012345678901234567890123456789012"
+ "3456789012345678901234567890";
+
+ std::string pre_compression_body;
+ std::string post_compression_body;
+
+ svr_.set_pre_compression_logger(
+ [&](const Request & /*req*/, const Response &res) {
+ pre_compression_body = res.body;
+ });
+
+ svr_.set_logger([&](const Request & /*req*/, const Response &res) {
+ post_compression_body = res.body;
+ });
+
+ Headers headers;
+ headers.emplace("Accept-Encoding", "br");
+
+ auto res = cli_.Get("/compress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("br", res->get_header_value("Content-Encoding"));
+
+ // Verify pre-compression content is uncompressed
+ EXPECT_EQ(test_content, pre_compression_body);
+
+ // Verify post-compression content is compressed
+ EXPECT_NE(test_content, post_compression_body);
+ EXPECT_LT(post_compression_body.size(), pre_compression_body.size());
+}
+
+TEST_F(ServerTest, PreCompressionLoggingWithoutCompression) {
+ const std::string test_content =
+ "123456789012345678901234567890123456789012345678901234567890123456789012"
+ "3456789012345678901234567890";
+
+ std::string pre_compression_body;
+ std::string post_compression_body;
+
+ svr_.set_pre_compression_logger(
+ [&](const Request & /*req*/, const Response &res) {
+ pre_compression_body = res.body;
+ });
+
+ svr_.set_logger([&](const Request & /*req*/, const Response &res) {
+ post_compression_body = res.body;
+ });
+
+ // Request without compression (use /nocompress endpoint)
+ Headers headers;
+ auto res = cli_.Get("/nocompress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_TRUE(res->get_header_value("Content-Encoding").empty());
+
+ // Pre-compression logger should not be called when no compression is applied
+ EXPECT_TRUE(
+ pre_compression_body.empty()); // Pre-compression logger not called
+ EXPECT_EQ(
+ test_content,
+ post_compression_body); // Post-compression logger captures final content
+}
+
+TEST_F(ServerTest, PreCompressionLoggingOnlyPreLogger) {
+ const std::string test_content =
+ "123456789012345678901234567890123456789012345678901234567890123456789012"
+ "3456789012345678901234567890";
+
+ std::string pre_compression_body;
+ bool pre_logger_called = false;
+
+ // Set only pre-compression logger
+ svr_.set_pre_compression_logger(
+ [&](const Request & /*req*/, const Response &res) {
+ pre_compression_body = res.body;
+ pre_logger_called = true;
+ });
+
+ Headers headers;
+ headers.emplace("Accept-Encoding", "gzip");
+
+ auto res = cli_.Get("/compress", headers);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("gzip", res->get_header_value("Content-Encoding"));
+
+ // Verify pre-compression logger was called
+ EXPECT_TRUE(pre_logger_called);
+ EXPECT_EQ(test_content, pre_compression_body);
+}
+
+TEST(ZstdDecompressor, ChunkedDecompression) {
+ std::string data;
+ for (size_t i = 0; i < 32 * 1024; ++i) {
+ data.push_back(static_cast<char>('a' + i % 26));
+ }
+
+ std::string compressed_data;
+ {
+ httplib::detail::zstd_compressor compressor;
+ bool result = compressor.compress(
+ data.data(), data.size(),
+ /*last=*/true,
+ [&](const char *compressed_data_chunk, size_t compressed_data_size) {
+ compressed_data.insert(compressed_data.size(), compressed_data_chunk,
+ compressed_data_size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+ }
+
+ std::string decompressed_data;
+ {
+ httplib::detail::zstd_decompressor decompressor;
+
+ // Chunk size is chosen specifically to have a decompressed chunk size equal
+ // to 16384 bytes 16384 bytes is the size of decompressor output buffer
+ size_t chunk_size = 130;
+ for (size_t chunk_begin = 0; chunk_begin < compressed_data.size();
+ chunk_begin += chunk_size) {
+ size_t current_chunk_size =
+ std::min(compressed_data.size() - chunk_begin, chunk_size);
+ bool result = decompressor.decompress(
+ compressed_data.data() + chunk_begin, current_chunk_size,
+ [&](const char *decompressed_data_chunk,
+ size_t decompressed_data_chunk_size) {
+ decompressed_data.insert(decompressed_data.size(),
+ decompressed_data_chunk,
+ decompressed_data_chunk_size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+ }
+ }
+ ASSERT_EQ(data, decompressed_data);
+}
+
+TEST(ZstdDecompressor, Decompress) {
+ std::string original_text = "Compressed with ZSTD";
+ unsigned char data[29] = {0x28, 0xb5, 0x2f, 0xfd, 0x20, 0x14, 0xa1, 0x00,
+ 0x00, 0x43, 0x6f, 0x6d, 0x70, 0x72, 0x65, 0x73,
+ 0x73, 0x65, 0x64, 0x20, 0x77, 0x69, 0x74, 0x68,
+ 0x20, 0x5a, 0x53, 0x54, 0x44};
+ std::string compressed_data(data, data + sizeof(data) / sizeof(data[0]));
+
+ std::string decompressed_data;
+ {
+ httplib::detail::zstd_decompressor decompressor;
+
+ bool result = decompressor.decompress(
+ compressed_data.data(), compressed_data.size(),
+ [&](const char *decompressed_data_chunk,
+ size_t decompressed_data_chunk_size) {
+ decompressed_data.insert(decompressed_data.size(),
+ decompressed_data_chunk,
+ decompressed_data_chunk_size);
+ return true;
+ });
+ ASSERT_TRUE(result);
+ }
+ ASSERT_EQ(original_text, decompressed_data);
+}
+#endif
+
+// Sends a raw request to a server listening at HOST:PORT.
+static bool send_request(time_t read_timeout_sec, const std::string &req,
+ std::string *resp = nullptr) {
+ auto error = Error::Success;
+
+ auto client_sock = detail::create_client_socket(
+ HOST, "", PORT, AF_UNSPEC, false, false, nullptr,
+ /*connection_timeout_sec=*/5, 0,
+ /*read_timeout_sec=*/5, 0,
+ /*write_timeout_sec=*/5, 0, std::string(), error);
+
+ if (client_sock == INVALID_SOCKET) { return false; }
+
+ auto ret = detail::process_client_socket(
+ client_sock, read_timeout_sec, 0, 0, 0, 0,
+ std::chrono::steady_clock::time_point::min(), [&](Stream &strm) {
+ if (req.size() !=
+ static_cast<size_t>(strm.write(req.data(), req.size()))) {
+ return false;
+ }
+
+ char buf[512];
+
+ detail::stream_line_reader line_reader(strm, buf, sizeof(buf));
+ while (line_reader.getline()) {
+ if (resp) { *resp += line_reader.ptr(); }
+ }
+ return true;
+ });
+
+ detail::close_socket(client_sock);
+
+ return ret;
+}
+
+TEST(ServerRequestParsingTest, TrimWhitespaceFromHeaderValues) {
+ Server svr;
+ std::string header_value;
+ svr.Get("/validate-ws-in-headers", [&](const Request &req, Response &res) {
+ header_value = req.get_header_value("foo");
+ res.set_content("ok", "text/plain");
+ });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ // Only space and horizontal tab are whitespace. Make sure other whitespace-
+ // like characters are not treated the same - use vertical tab and escape.
+ const std::string req = "GET /validate-ws-in-headers HTTP/1.1\r\n"
+ "foo: \t \v bar \x1B\t \r\n"
+ "Connection: close\r\n"
+ "\r\n";
+
+ std::string res;
+ ASSERT_TRUE(send_request(5, req, &res));
+ EXPECT_EQ(header_value, "");
+ EXPECT_EQ("HTTP/1.1 400 Bad Request", res.substr(0, 24));
+}
+
+// Sends a raw request and verifies that there isn't a crash or exception.
+static void test_raw_request(const std::string &req,
+ std::string *out = nullptr) {
+ Server svr;
+ svr.Get("/hi", [&](const Request & /*req*/, Response &res) {
+ res.set_content("ok", "text/plain");
+ });
+ svr.Put("/put_hi", [&](const Request & /*req*/, Response &res) {
+ res.set_content("ok", "text/plain");
+ });
+ svr.Get("/header_field_value_check",
+ [&](const Request & /*req*/, Response &res) {
+ res.set_content("ok", "text/plain");
+ });
+
+ // Server read timeout must be longer than the client read timeout for the
+ // bug to reproduce, probably to force the server to process a request
+ // without a trailing blank line.
+ const time_t client_read_timeout_sec = 1;
+ svr.set_read_timeout(std::chrono::seconds(client_read_timeout_sec + 1));
+ bool listen_thread_ok = false;
+ thread t = thread([&] { listen_thread_ok = svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ EXPECT_TRUE(listen_thread_ok);
+ });
+
+ svr.wait_until_ready();
+
+ ASSERT_TRUE(send_request(client_read_timeout_sec, req, out));
+}
+
+TEST(ServerRequestParsingTest, ReadHeadersRegexComplexity) {
+ // A certain header line causes an exception if the header property is parsed
+ // naively with a single regex. This occurs with libc++ but not libstdc++.
+ test_raw_request(
+ "GET /hi HTTP/1.1\r\n"
+ " : "
+ " "
+ " ");
+}
+
+TEST(ServerRequestParsingTest, ReadHeadersRegexComplexity2) {
+ // A certain header line causes an exception if the header property *name* is
+ // parsed with a regular expression starting with "(.+?):" - this is a non-
+ // greedy matcher and requires backtracking when there are a lot of ":"
+ // characters.
+ // This occurs with libc++ but not libstdc++.
+ test_raw_request(
+ "GET /hi HTTP/1.1\r\n"
+ ":-:::::::::::::::::::::::::::-::::::::::::::::::::::::@-&&&&&&&&&&&"
+ "--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&"
+ "&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-:::::"
+ "::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-::::::::::::::::::::::::"
+ ":::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::"
+ "::::::::-:::::::::::::::::@-&&&&&&&--:::::::-::::::::::::::::::::::"
+ ":::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::"
+ "::::::::::-:::::::::::::::::@-&&&&&::::::::::::-:::::::::::::::::@-"
+ "&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::::::"
+ ":@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::"
+ "::::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::@-&&"
+ "&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@"
+ "::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&"
+ "--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&"
+ "&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&"
+ "&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@-&&"
+ "&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::::@"
+ "-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::::"
+ "::@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::"
+ ":::::@-&&&&&&&&&&&::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-::::::"
+ ":::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-:::"
+ "::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&--:::::::-"
+ ":::::::::::::::::::::::::::::-:::::::::::::::::@-&&&&&&&&&&&---&&:&"
+ "&&.0------------:-:::::::::::::::::::::::::::::-:::::::::::::::::@-"
+ "&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-::::::::::::::::"
+ ":@-&&&&&&&&&&&--:::::::-:::::::::::::::::::::::::::::-:::::::::::::"
+ "::::@-&&&&&&&&&&&---&&:&&&.0------------O--------\rH PUTHTTP/1.1\r\n"
+ "&&&%%%");
+}
+
+TEST(ServerRequestParsingTest, ExcessiveWhitespaceInUnparsableHeaderLine) {
+ // Make sure this doesn't crash the server.
+ // In a previous version of the header line regex, the "\r" rendered the line
+ // unparsable and the regex engine repeatedly backtracked, trying to look for
+ // a new position where the leading white space ended and the field value
+ // began.
+ // The crash occurs with libc++ but not libstdc++.
+ test_raw_request("GET /hi HTTP/1.1\r\n"
+ "a:" +
+ std::string(2000, ' ') + '\r' + std::string(20, 'z') +
+ "\r\n"
+ "\r\n");
+}
+
+TEST(ServerRequestParsingTest, InvalidFirstChunkLengthInRequest) {
+ std::string out;
+
+ test_raw_request("PUT /put_hi HTTP/1.1\r\n"
+ "Content-Type: text/plain\r\n"
+ "Transfer-Encoding: chunked\r\n"
+ "\r\n"
+ "nothex\r\n",
+ &out);
+ EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24));
+}
+
+TEST(ServerRequestParsingTest, InvalidSecondChunkLengthInRequest) {
+ std::string out;
+
+ test_raw_request("PUT /put_hi HTTP/1.1\r\n"
+ "Content-Type: text/plain\r\n"
+ "Transfer-Encoding: chunked\r\n"
+ "\r\n"
+ "3\r\n"
+ "xyz\r\n"
+ "NaN\r\n",
+ &out);
+ EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24));
+}
+
+TEST(ServerRequestParsingTest, ChunkLengthTooHighInRequest) {
+ std::string out;
+
+ test_raw_request("PUT /put_hi HTTP/1.1\r\n"
+ "Content-Type: text/plain\r\n"
+ "Transfer-Encoding: chunked\r\n"
+ "\r\n"
+ // Length is too large for 64 bits.
+ "1ffffffffffffffff\r\n"
+ "xyz\r\n",
+ &out);
+ EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24));
+}
+
+TEST(ServerRequestParsingTest, InvalidHeaderTextWithExtraCR) {
+ test_raw_request("GET /hi HTTP/1.1\r\n"
+ "Content-Type: text/plain\r\n\r");
+}
+
+TEST(ServerRequestParsingTest, InvalidSpaceInURL) {
+ std::string out;
+ test_raw_request("GET /h i HTTP/1.1\r\n\r\n", &out);
+ EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24));
+}
+
+TEST(ServerRequestParsingTest, InvalidFieldValueContains_CR_LF_NUL) {
+ std::string out;
+ std::string request(
+ "GET /header_field_value_check HTTP/1.1\r\nTest: [\r\x00\n]\r\n\r\n", 55);
+ test_raw_request(request, &out);
+ EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24));
+}
+
+TEST(ServerRequestParsingTest, InvalidFieldValueContains_LF) {
+ std::string out;
+ std::string request(
+ "GET /header_field_value_check HTTP/1.1\r\nTest: [\n\n\n]\r\n\r\n", 55);
+ test_raw_request(request, &out);
+ EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24));
+}
+
+TEST(ServerRequestParsingTest, InvalidFieldNameContains_PreceedingSpaces) {
+ std::string out;
+ std::string request(
+ "GET /header_field_value_check HTTP/1.1\r\n Test: val\r\n\r\n", 55);
+ test_raw_request(request, &out);
+ EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24));
+}
+
+TEST(ServerRequestParsingTest, EmptyFieldValue) {
+ std::string out;
+
+ test_raw_request("GET /header_field_value_check HTTP/1.1\r\n"
+ "Test: \r\n\r\n",
+ &out);
+ EXPECT_EQ("HTTP/1.1 200 OK", out.substr(0, 15));
+}
+
+TEST(ServerStopTest, StopServerWithChunkedTransmission) {
+ Server svr;
+
+ svr.Get("/events", [](const Request & /*req*/, Response &res) {
+ res.set_header("Cache-Control", "no-cache");
+ res.set_chunked_content_provider(
+ "text/event-stream", [](size_t offset, DataSink &sink) {
+ std::string s = "data:";
+ s += std::to_string(offset);
+ s += "\n\n";
+ auto ret = sink.write(s.data(), s.size());
+ EXPECT_TRUE(ret);
+ std::this_thread::sleep_for(std::chrono::seconds(1));
+ return true;
+ });
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ svr.wait_until_ready();
+
+ Client client(HOST, PORT);
+ const Headers headers = {{"Accept", "text/event-stream"}};
+
+ auto get_thread = std::thread([&client, &headers]() {
+ auto res = client.Get(
+ "/events", headers,
+ [](const char * /*data*/, size_t /*len*/) -> bool { return true; });
+ });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ get_thread.join();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ // Give GET time to get a few messages.
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+}
+
+TEST(ServerStopTest, ClientAccessAfterServerDown) {
+ httplib::Server svr;
+ svr.Post("/hi",
+ [&](const httplib::Request & /*req*/, httplib::Response &res) {
+ res.status = StatusCode::OK_200;
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+
+ auto res = cli.Post("/hi", "data", "text/plain");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+
+ res = cli.Post("/hi", "data", "text/plain");
+ ASSERT_FALSE(res);
+}
+
+TEST(ServerStopTest, ListenFailure) {
+ Server svr;
+ auto t = thread([&]() {
+ auto ret = svr.listen("????", PORT);
+ EXPECT_FALSE(ret);
+ });
+ svr.wait_until_ready();
+ svr.stop();
+ t.join();
+}
+
+TEST(ServerStopTest, Decommision) {
+ Server svr;
+
+ svr.Get("/hi", [&](const Request &, Response &res) { res.body = "hi..."; });
+
+ for (int i = 0; i < 4; i++) {
+ auto is_even = !(i % 2);
+
+ std::thread t{[&] {
+ try {
+ std::this_thread::sleep_for(std::chrono::milliseconds(100));
+
+ if (is_even) {
+ throw std::runtime_error("Some thing that happens to go wrong.");
+ }
+
+ svr.listen(HOST, PORT);
+ } catch (...) { svr.decommission(); }
+ }};
+
+ svr.wait_until_ready();
+
+ // Server is up
+ {
+ Client cli(HOST, PORT);
+ auto res = cli.Get("/hi");
+ if (is_even) {
+ EXPECT_FALSE(res);
+ } else {
+ EXPECT_TRUE(res);
+ EXPECT_EQ("hi...", res->body);
+ }
+ }
+
+ svr.stop();
+ t.join();
+
+ // Server is down...
+ {
+ Client cli(HOST, PORT);
+ auto res = cli.Get("/hi");
+ EXPECT_FALSE(res);
+ }
+ }
+}
+
+// Helper function for string body upload progress tests
+template <typename SetupHandler, typename ClientCall>
+void TestStringBodyUploadProgress(SetupHandler &&setup_handler,
+ ClientCall &&client_call,
+ const string &body) {
+ Server svr;
+ setup_handler(svr);
+
+ thread t = thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ vector<uint64_t> progress_values;
+ bool progress_called = false;
+
+ auto res =
+ client_call(cli, body, [&](uint64_t current, uint64_t /*total*/) -> bool {
+ progress_values.push_back(current);
+ progress_called = true;
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(200, res->status);
+ EXPECT_TRUE(progress_called);
+}
+
+TEST(UploadProgressTest, PostStringBodyBasic) {
+ TestStringBodyUploadProgress(
+ [](Server &svr) {
+ svr.Post("/test", [](const Request & /*req*/, Response &res) {
+ res.set_content("received", "text/plain");
+ });
+ },
+ [](Client &cli, const string &body, UploadProgress progress_callback) {
+ return cli.Post("/test", body, "text/plain", progress_callback);
+ },
+ "test data for upload progress");
+}
+
+TEST(UploadProgressTest, PutStringBodyBasic) {
+ TestStringBodyUploadProgress(
+ [](Server &svr) {
+ svr.Put("/test", [](const Request & /*req*/, Response &res) {
+ res.set_content("put received", "text/plain");
+ });
+ },
+ [](Client &cli, const string &body, UploadProgress progress_callback) {
+ return cli.Put("/test", body, "text/plain", progress_callback);
+ },
+ "put test data for upload progress");
+}
+
+TEST(UploadProgressTest, PatchStringBodyBasic) {
+ TestStringBodyUploadProgress(
+ [](Server &svr) {
+ svr.Patch("/test", [](const Request & /*req*/, Response &res) {
+ res.set_content("patch received", "text/plain");
+ });
+ },
+ [](Client &cli, const string &body, UploadProgress progress_callback) {
+ return cli.Patch("/test", body, "text/plain", progress_callback);
+ },
+ "patch test data for upload progress");
+}
+
+// Helper function for content provider upload progress tests
+template <typename SetupHandler, typename ClientCall>
+void TestContentProviderUploadProgress(SetupHandler &&setup_handler,
+ ClientCall &&client_call) {
+ Server svr;
+ setup_handler(svr);
+
+ thread t = thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ });
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ vector<uint64_t> progress_values;
+
+ auto res =
+ client_call(cli, [&](uint64_t current, uint64_t /*total*/) -> bool {
+ progress_values.push_back(current);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(200, res->status);
+ EXPECT_FALSE(progress_values.empty());
+}
+
+TEST(UploadProgressTest, PostContentProviderProgress) {
+ TestContentProviderUploadProgress(
+ [](Server &svr) {
+ svr.Post("/test", [](const Request & /*req*/, Response &res) {
+ res.set_content("provider received", "text/plain");
+ });
+ },
+ [](Client &cli, UploadProgress progress_callback) {
+ return cli.Post(
+ "/test", 10,
+ [](size_t /*offset*/, size_t /*length*/, DataSink &sink) -> bool {
+ sink.os << "test data";
+ return true;
+ },
+ "text/plain", progress_callback);
+ });
+}
+
+// Helper function for multipart upload progress tests
+template <typename SetupHandler, typename ClientCall>
+void TestMultipartUploadProgress(SetupHandler &&setup_handler,
+ ClientCall &&client_call,
+ const string &endpoint) {
+ Server svr;
+ setup_handler(svr);
+
+ thread t = thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ });
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ vector<uint64_t> progress_values;
+
+ UploadFormDataItems items = {
+ {"field1", "value1", "", ""},
+ {"field2", "longer value for progress tracking test", "", ""},
+ {"file1", "file content data for upload progress", "test.txt",
+ "text/plain"}};
+
+ auto res = client_call(cli, endpoint, items,
+ [&](uint64_t current, uint64_t /*total*/) -> bool {
+ progress_values.push_back(current);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(200, res->status);
+ EXPECT_FALSE(progress_values.empty());
+}
+
+TEST(UploadProgressTest, PostMultipartProgress) {
+ TestMultipartUploadProgress(
+ [](Server &svr) {
+ svr.Post("/multipart", [](const Request &req, Response &res) {
+ EXPECT_TRUE(!req.form.files.empty() || !req.form.fields.empty());
+ res.set_content("multipart received", "text/plain");
+ });
+ },
+ [](Client &cli, const string &endpoint, const UploadFormDataItems &items,
+ UploadProgress progress_callback) {
+ return cli.Post(endpoint, items, progress_callback);
+ },
+ "/multipart");
+}
+
+// Helper function for basic download progress tests
+template <typename SetupHandler, typename ClientCall>
+void TestBasicDownloadProgress(SetupHandler &&setup_handler,
+ ClientCall &&client_call, const string &endpoint,
+ size_t expected_content_size) {
+ Server svr;
+ setup_handler(svr);
+
+ thread t = thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ });
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ vector<uint64_t> progress_values;
+
+ auto res = client_call(cli, endpoint,
+ [&](uint64_t current, uint64_t /*total*/) -> bool {
+ progress_values.push_back(current);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(200, res->status);
+ EXPECT_FALSE(progress_values.empty());
+ EXPECT_EQ(expected_content_size, res->body.size());
+}
+
+TEST(DownloadProgressTest, GetBasic) {
+ TestBasicDownloadProgress(
+ [](Server &svr) {
+ svr.Get("/download", [](const Request & /*req*/, Response &res) {
+ string content(1000, 'D');
+ res.set_content(content, "text/plain");
+ });
+ },
+ [](Client &cli, const string &endpoint,
+ DownloadProgress progress_callback) {
+ return cli.Get(endpoint, progress_callback);
+ },
+ "/download", 1000u);
+}
+
+// Helper function for content receiver download progress tests
+template <typename SetupHandler, typename ClientCall>
+void TestContentReceiverDownloadProgress(SetupHandler &&setup_handler,
+ ClientCall &&client_call,
+ const string &endpoint,
+ size_t expected_content_size) {
+ Server svr;
+ setup_handler(svr);
+
+ thread t = thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ });
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ vector<uint64_t> progress_values;
+ string received_body;
+
+ auto res = client_call(
+ cli, endpoint,
+ [&](const char *data, size_t data_length) -> bool {
+ received_body.append(data, data_length);
+ return true;
+ },
+ [&](uint64_t current, uint64_t /*total*/) -> bool {
+ progress_values.push_back(current);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(200, res->status);
+ EXPECT_FALSE(progress_values.empty());
+ EXPECT_EQ(expected_content_size, received_body.size());
+ EXPECT_TRUE(res->body.empty());
+}
+
+TEST(DownloadProgressTest, GetWithContentReceiver) {
+ TestContentReceiverDownloadProgress(
+ [](Server &svr) {
+ svr.Get("/download-receiver",
+ [](const Request & /*req*/, Response &res) {
+ string content(2000, 'R');
+ res.set_content(content, "text/plain");
+ });
+ },
+ [](Client &cli, const string &endpoint, ContentReceiver content_receiver,
+ DownloadProgress progress_callback) {
+ return cli.Get(endpoint, content_receiver, progress_callback);
+ },
+ "/download-receiver", 2000u);
+}
+
+TEST(StreamingTest, NoContentLengthStreaming) {
+ Server svr;
+
+ svr.Get("/stream", [](const Request & /*req*/, Response &res) {
+ res.set_content_provider("text/plain", [](size_t offset, DataSink &sink) {
+ if (offset < 6) {
+ sink.os << (offset < 3 ? "a" : "b");
+ } else {
+ sink.done();
+ }
+ return true;
+ });
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto listen_se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client client(HOST, PORT);
+
+ auto get_thread = std::thread([&client]() {
+ std::string s;
+ auto res =
+ client.Get("/stream", [&s](const char *data, size_t len) -> bool {
+ s += std::string(data, len);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("aaabbb", s);
+ });
+ auto get_se = detail::scope_exit([&] { get_thread.join(); });
+
+ // Give GET time to get a few messages.
+ std::this_thread::sleep_for(std::chrono::milliseconds(500));
+}
+
+TEST(MountTest, Unmount) {
+ Server svr;
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ svr.set_mount_point("/mount2", "./www2");
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+
+ res = cli.Get("/mount2/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+
+ svr.set_mount_point("/", "./www");
+
+ res = cli.Get("/dir/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+
+ svr.remove_mount_point("/");
+ res = cli.Get("/dir/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+
+ svr.remove_mount_point("/mount2");
+ res = cli.Get("/mount2/dir/test.html");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+}
+
+TEST(MountTest, Redicect) {
+ Server svr;
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.set_mount_point("/", "./www");
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ auto res = cli.Get("/dir/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli.Get("/dir");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::MovedPermanently_301, res->status);
+
+ res = cli.Get("/file");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+
+ res = cli.Get("/file/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+
+ cli.set_follow_location(true);
+ res = cli.Get("/dir");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(MountTest, MultibytesPathName) {
+ Server svr;
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.set_mount_point("/", "./www");
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ auto res = cli.Get(u8"/日本語Dir/日本語File.txt");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(u8"日本語コンテンツ", res->body);
+}
+
+TEST(KeepAliveTest, ReadTimeout) {
+ Server svr;
+
+ svr.Get("/a", [&](const Request & /*req*/, Response &res) {
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+ res.set_content("a", "text/plain");
+ });
+
+ svr.Get("/b", [&](const Request & /*req*/, Response &res) {
+ res.set_content("b", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+ cli.set_keep_alive(true);
+ cli.set_read_timeout(std::chrono::seconds(1));
+
+ auto resa = cli.Get("/a");
+ ASSERT_FALSE(resa);
+ EXPECT_EQ(Error::Read, resa.error());
+
+ auto resb = cli.Get("/b");
+ ASSERT_TRUE(resb);
+ EXPECT_EQ(StatusCode::OK_200, resb->status);
+ EXPECT_EQ("b", resb->body);
+}
+
+TEST(KeepAliveTest, MaxCount) {
+ size_t keep_alive_max_count = 3;
+
+ Server svr;
+ svr.set_keep_alive_max_count(keep_alive_max_count);
+
+ svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_keep_alive(true);
+
+ for (size_t i = 0; i < 5; i++) {
+ auto result = cli.Get("/hi");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(StatusCode::OK_200, result->status);
+
+ if (i == keep_alive_max_count - 1) {
+ EXPECT_EQ("close", result->get_header_value("Connection"));
+ } else {
+ EXPECT_FALSE(result->has_header("Connection"));
+ }
+ }
+}
+
+TEST(KeepAliveTest, Issue1041) {
+ Server svr;
+ svr.set_keep_alive_timeout(3);
+
+ svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.set_keep_alive(true);
+
+ auto result = cli.Get("/hi");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(StatusCode::OK_200, result->status);
+
+ std::this_thread::sleep_for(std::chrono::seconds(5));
+
+ result = cli.Get("/hi");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(StatusCode::OK_200, result->status);
+}
+
+TEST(KeepAliveTest, Issue1959) {
+ Server svr;
+ svr.set_keep_alive_timeout(5);
+
+ svr.Get("/a", [&](const Request & /*req*/, Response &res) {
+ res.set_content("a", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ if (!svr.is_running()) return;
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+ cli.set_keep_alive(true);
+
+ using namespace std::chrono;
+ auto start = steady_clock::now();
+
+ cli.Get("/a");
+
+ svr.stop();
+ listen_thread.join();
+
+ auto end = steady_clock::now();
+ auto elapsed = duration_cast<milliseconds>(end - start).count();
+
+ EXPECT_LT(elapsed, 5000);
+}
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(KeepAliveTest, SSLClientReconnection) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(svr.is_valid());
+ svr.set_keep_alive_timeout(1);
+
+ svr.Get("/hi", [](const httplib::Request &, httplib::Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli(HOST, PORT);
+ cli.enable_server_certificate_verification(false);
+ cli.set_keep_alive(true);
+
+ auto result = cli.Get("/hi");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(StatusCode::OK_200, result->status);
+
+ result = cli.Get("/hi");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(StatusCode::OK_200, result->status);
+
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+
+ // Recoonect
+ result = cli.Get("/hi");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(StatusCode::OK_200, result->status);
+
+ result = cli.Get("/hi");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(StatusCode::OK_200, result->status);
+}
+
+TEST(KeepAliveTest, SSLClientReconnectionPost) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(svr.is_valid());
+ svr.set_keep_alive_timeout(1);
+ std::string content = "reconnect";
+
+ svr.Post("/hi", [](const httplib::Request &, httplib::Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli(HOST, PORT);
+ cli.enable_server_certificate_verification(false);
+ cli.set_keep_alive(true);
+
+ auto result = cli.Post(
+ "/hi", content.size(),
+ [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ sink.write(content.c_str(), content.size());
+ return true;
+ },
+ "text/plain");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(200, result->status);
+
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+
+ // Recoonect
+ result = cli.Post(
+ "/hi", content.size(),
+ [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ sink.write(content.c_str(), content.size());
+ return true;
+ },
+ "text/plain");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(200, result->status);
+
+ result = cli.Post(
+ "/hi", content.size(),
+ [&content](size_t /*offset*/, size_t /*length*/, DataSink &sink) {
+ sink.write(content.c_str(), content.size());
+ return true;
+ },
+ "text/plain");
+ ASSERT_TRUE(result);
+ EXPECT_EQ(200, result->status);
+}
+
+TEST(SNI_AutoDetectionTest, SNI_Logic) {
+ {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/sni", [&](const Request &req, Response &res) {
+ std::string expected;
+ if (req.ssl) {
+ if (const char *sni =
+ SSL_get_servername(req.ssl, TLSEXT_NAMETYPE_host_name)) {
+ expected = sni;
+ }
+ }
+ EXPECT_EQ(expected, req.get_param_value("expected"));
+ res.set_content("ok", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ SSLClient cli("localhost", PORT);
+ cli.enable_server_certificate_verification(false);
+ auto res = cli.Get("/sni?expected=localhost");
+ ASSERT_TRUE(res);
+ }
+
+ {
+ SSLClient cli("::1", PORT);
+ cli.enable_server_certificate_verification(false);
+ auto res = cli.Get("/sni?expected=");
+ ASSERT_TRUE(res);
+ }
+ }
+}
+#endif
+
+TEST(ClientProblemDetectionTest, ContentProvider) {
+ Server svr;
+
+ size_t content_length = 1024 * 1024;
+
+ svr.Get("/hi", [&](const Request & /*req*/, Response &res) {
+ res.set_content_provider(
+ content_length, "text/plain",
+ [&](size_t offset, size_t length, DataSink &sink) {
+ auto out_len = std::min(length, static_cast<size_t>(1024));
+ std::string out(out_len, '@');
+ sink.write(out.data(), out_len);
+ return offset < 4096;
+ },
+ [](bool success) { ASSERT_FALSE(success); });
+ });
+
+ svr.Get("/empty", [&](const Request & /*req*/, Response &res) {
+ res.set_content_provider(
+ 0, "text/plain",
+ [&](size_t /*offset*/, size_t /*length*/, DataSink & /*sink*/) -> bool {
+ EXPECT_TRUE(false);
+ return true;
+ },
+ [](bool success) { ASSERT_FALSE(success); });
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ {
+ auto res = cli.Get("/hi", [&](const char * /*data*/,
+ size_t /*data_length*/) { return false; });
+ ASSERT_FALSE(res);
+ }
+
+ {
+ auto res = cli.Get("/empty", [&](const char * /*data*/,
+ size_t /*data_length*/) { return false; });
+ ASSERT_TRUE(res);
+ }
+}
+
+TEST(ErrorHandlerWithContentProviderTest, ErrorHandler) {
+ Server svr;
+
+ svr.set_error_handler([](Request const &, Response &res) -> void {
+ res.set_chunked_content_provider(
+ "text/plain", [](std::size_t const, DataSink &sink) -> bool {
+ sink.os << "hello";
+ sink.os << "world";
+ sink.done();
+ return true;
+ });
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::NotFound_404, res->status);
+ EXPECT_EQ("helloworld", res->body);
+}
+
+TEST(LongPollingTest, ClientCloseDetection) {
+ Server svr;
+
+ svr.Get("/events", [&](const Request & /*req*/, Response &res) {
+ res.set_chunked_content_provider(
+ "text/plain", [](std::size_t const, DataSink &sink) -> bool {
+ EXPECT_TRUE(sink.is_writable()); // the socket is alive
+ sink.os << "hello";
+
+ auto count = 10;
+ while (count > 0 && sink.is_writable()) {
+ this_thread::sleep_for(chrono::milliseconds(10));
+ count--;
+ }
+ EXPECT_FALSE(sink.is_writable()); // the socket is closed
+ return true;
+ });
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ auto res = cli.Get("/events", [&](const char *data, size_t data_length) {
+ EXPECT_EQ("hello", string(data, data_length));
+ return false; // close the socket immediately.
+ });
+
+ ASSERT_FALSE(res);
+}
+
+TEST(GetWithParametersTest, GetWithParameters) {
+ Server svr;
+
+ svr.Get("/", [&](const Request &req, Response &) {
+ EXPECT_EQ("world", req.get_param_value("hello"));
+ EXPECT_EQ("world2", req.get_param_value("hello2"));
+ EXPECT_EQ("world3", req.get_param_value("hello3"));
+ });
+
+ svr.Get("/params", [&](const Request &req, Response &) {
+ EXPECT_EQ("world", req.get_param_value("hello"));
+ EXPECT_EQ("world2", req.get_param_value("hello2"));
+ EXPECT_EQ("world3", req.get_param_value("hello3"));
+ });
+
+ svr.Get(R"(/resources/([a-z0-9\\-]+))", [&](const Request &req, Response &) {
+ EXPECT_EQ("resource-id", req.matches[1]);
+ EXPECT_EQ("foo", req.get_param_value("param1"));
+ EXPECT_EQ("bar", req.get_param_value("param2"));
+ });
+
+ svr.Get("/users/:id", [&](const Request &req, Response &) {
+ EXPECT_EQ("user-id", req.path_params.at("id"));
+ EXPECT_EQ("foo", req.get_param_value("param1"));
+ EXPECT_EQ("bar", req.get_param_value("param2"));
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+
+ Params params;
+ params.emplace("hello", "world");
+ params.emplace("hello2", "world2");
+ params.emplace("hello3", "world3");
+ auto res = cli.Get("/", params, Headers{});
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ Client cli(HOST, PORT);
+
+ auto res = cli.Get("/params?hello=world&hello2=world2&hello3=world3");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ Client cli(HOST, PORT);
+
+ auto res = cli.Get("/resources/resource-id?param1=foo&param2=bar");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ Client cli(HOST, PORT);
+
+ auto res = cli.Get("/users/user-id?param1=foo&param2=bar");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ }
+}
+
+TEST(GetWithParametersTest, GetWithParameters2) {
+ Server svr;
+
+ svr.Get("/", [&](const Request &req, Response &res) {
+ auto text = req.get_param_value("hello");
+ res.set_content(text, "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ Params params;
+ params.emplace("hello", "world");
+
+ std::string body;
+ auto res = cli.Get("/", params, Headers{},
+ [&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("world", body);
+}
+
+TEST(ClientDefaultHeadersTest, DefaultHeaders_Online) {
+#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN
+ auto host = "httpbin.org";
+ auto path = std::string{"/range/32"};
+#else
+ auto host = "nghttp2.org";
+ auto path = std::string{"/httpbin/range/32"};
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli(host);
+#else
+ Client cli(host);
+#endif
+
+ cli.set_default_headers({make_range_header({{1, 10}})});
+ cli.set_connection_timeout(5);
+
+ {
+ auto res = cli.Get(path);
+ ASSERT_TRUE(res);
+ EXPECT_EQ("bcdefghijk", res->body);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ }
+
+ {
+ auto res = cli.Get(path);
+ ASSERT_TRUE(res);
+ EXPECT_EQ("bcdefghijk", res->body);
+ EXPECT_EQ(StatusCode::PartialContent_206, res->status);
+ }
+}
+
+TEST(ServerDefaultHeadersTest, DefaultHeaders) {
+ Server svr;
+ svr.set_default_headers({{"Hello", "World"}});
+
+ svr.Get("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content("ok", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli("localhost", PORT);
+
+ auto res = cli.Get("/");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("ok", res->body);
+ EXPECT_EQ("World", res->get_header_value("Hello"));
+}
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(KeepAliveTest, ReadTimeoutSSL) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/a", [&](const Request & /*req*/, Response &res) {
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+ res.set_content("a", "text/plain");
+ });
+
+ svr.Get("/b", [&](const Request & /*req*/, Response &res) {
+ res.set_content("b", "text/plain");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli("localhost", PORT);
+ cli.enable_server_certificate_verification(false);
+ cli.set_keep_alive(true);
+ cli.set_read_timeout(std::chrono::seconds(1));
+
+ auto resa = cli.Get("/a");
+ ASSERT_TRUE(!resa);
+ EXPECT_EQ(Error::Read, resa.error());
+
+ auto resb = cli.Get("/b");
+ ASSERT_TRUE(resb);
+ EXPECT_EQ(StatusCode::OK_200, resb->status);
+ EXPECT_EQ("b", resb->body);
+}
+#endif
+
+class ServerTestWithAI_PASSIVE : public ::testing::Test {
+protected:
+ ServerTestWithAI_PASSIVE()
+ : cli_(HOST, PORT)
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ ,
+ svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE)
+#endif
+ {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ cli_.enable_server_certificate_verification(false);
+#endif
+ }
+
+ virtual void SetUp() {
+ svr_.Get("/hi", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Hello World!", "text/plain");
+ });
+
+ t_ = thread(
+ [&]() { ASSERT_TRUE(svr_.listen(std::string(), PORT, AI_PASSIVE)); });
+
+ svr_.wait_until_ready();
+ }
+
+ virtual void TearDown() {
+ svr_.stop();
+ t_.join();
+ }
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli_;
+ SSLServer svr_;
+#else
+ Client cli_;
+ Server svr_;
+#endif
+ thread t_;
+};
+
+TEST_F(ServerTestWithAI_PASSIVE, GetMethod200) {
+ auto res = cli_.Get("/hi");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("text/plain", res->get_header_value("Content-Type"));
+ EXPECT_EQ("Hello World!", res->body);
+}
+
+class ServerUpDownTest : public ::testing::Test {
+protected:
+ ServerUpDownTest() : cli_(HOST, PORT) {}
+
+ virtual void SetUp() {
+ t_ = thread([&]() {
+ svr_.bind_to_any_port(HOST);
+ std::this_thread::sleep_for(std::chrono::milliseconds(500));
+ ASSERT_TRUE(svr_.listen_after_bind());
+ });
+
+ svr_.wait_until_ready();
+ }
+
+ virtual void TearDown() {
+ svr_.stop();
+ t_.join();
+ }
+
+ Client cli_;
+ Server svr_;
+ thread t_;
+};
+
+TEST_F(ServerUpDownTest, QuickStartStop) {
+ // Should not crash, especially when run with
+ // --gtest_filter=ServerUpDownTest.QuickStartStop --gtest_repeat=1000
+}
+
+class PayloadMaxLengthTest : public ::testing::Test {
+protected:
+ PayloadMaxLengthTest()
+ : cli_(HOST, PORT)
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ ,
+ svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE)
+#endif
+ {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ cli_.enable_server_certificate_verification(false);
+#endif
+ }
+
+ virtual void SetUp() {
+ svr_.set_payload_max_length(8);
+
+ svr_.Post("/test", [&](const Request & /*req*/, Response &res) {
+ res.set_content("test", "text/plain");
+ });
+
+ t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); });
+
+ svr_.wait_until_ready();
+ }
+
+ virtual void TearDown() {
+ svr_.stop();
+ t_.join();
+ }
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli_;
+ SSLServer svr_;
+#else
+ Client cli_;
+ Server svr_;
+#endif
+ thread t_;
+};
+
+TEST_F(PayloadMaxLengthTest, ExceedLimit) {
+ auto res = cli_.Post("/test", "123456789", "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status);
+
+ res = cli_.Post("/test", "12345678", "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(PayloadMaxLengthTest, ChunkedEncodingSecurityTest) {
+ // Test chunked encoding with payload exceeding the 8-byte limit
+ std::string large_chunked_data(16, 'A'); // 16 bytes, exceeds 8-byte limit
+
+ auto res = cli_.Post("/test", large_chunked_data, "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status);
+}
+
+TEST_F(PayloadMaxLengthTest, ChunkedEncodingWithinLimit) {
+ // Test chunked encoding with payload within the 8-byte limit
+ std::string small_chunked_data(4, 'B'); // 4 bytes, within 8-byte limit
+
+ auto res = cli_.Post("/test", small_chunked_data, "text/plain");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(PayloadMaxLengthTest, RawSocketChunkedTest) {
+ // Test using send_request to send chunked data exceeding payload limit
+ std::string chunked_request = "POST /test HTTP/1.1\r\n"
+ "Host: " +
+ std::string(HOST) + ":" + std::to_string(PORT) +
+ "\r\n"
+ "Transfer-Encoding: chunked\r\n"
+ "Connection: close\r\n"
+ "\r\n"
+ "a\r\n" // 10 bytes chunk (exceeds 8-byte limit)
+ "0123456789\r\n"
+ "0\r\n" // End chunk
+ "\r\n";
+
+ std::string response;
+ bool result = send_request(1, chunked_request, &response);
+
+ if (!result) {
+ // If send_request fails, it might be because the server closed the
+ // connection due to payload limit enforcement, which is acceptable
+ SUCCEED()
+ << "Server rejected oversized chunked request (connection closed)";
+ } else {
+ // If we got a response, check if it's an error response or connection was
+ // closed early Short response length indicates connection was closed due to
+ // payload limit
+ if (response.length() <= 10) {
+ SUCCEED() << "Server closed connection for oversized chunked request";
+ } else {
+ // Check for error status codes
+ EXPECT_TRUE(response.find("413") != std::string::npos ||
+ response.find("Payload Too Large") != std::string::npos ||
+ response.find("400") != std::string::npos);
+ }
+ }
+}
+
+TEST_F(PayloadMaxLengthTest, NoContentLengthPayloadLimit) {
+ // Test request without Content-Length header exceeding payload limit
+ std::string request_without_content_length = "POST /test HTTP/1.1\r\n"
+ "Host: " +
+ std::string(HOST) + ":" +
+ std::to_string(PORT) +
+ "\r\n"
+ "Connection: close\r\n"
+ "\r\n";
+
+ // Add payload exceeding the 8-byte limit
+ std::string large_payload(16, 'X'); // 16 bytes, exceeds 8-byte limit
+ request_without_content_length += large_payload;
+
+ std::string response;
+ bool result = send_request(1, request_without_content_length, &response);
+
+ if (!result) {
+ // If send_request fails, server likely closed connection due to payload
+ // limit
+ SUCCEED() << "Server rejected oversized request without Content-Length "
+ "(connection closed)";
+ } else {
+ // Check if server responded with error or closed connection early
+ if (response.length() <= 10) {
+ SUCCEED() << "Server closed connection for oversized request without "
+ "Content-Length";
+ } else {
+ // Check for error status codes
+ EXPECT_TRUE(response.find("413") != std::string::npos ||
+ response.find("Payload Too Large") != std::string::npos ||
+ response.find("400") != std::string::npos);
+ }
+ }
+}
+
+TEST_F(PayloadMaxLengthTest, NoContentLengthWithinLimit) {
+ // Test request without Content-Length header within payload limit
+ std::string request_without_content_length = "POST /test HTTP/1.1\r\n"
+ "Host: " +
+ std::string(HOST) + ":" +
+ std::to_string(PORT) +
+ "\r\n"
+ "Connection: close\r\n"
+ "\r\n";
+
+ // Add payload within the 8-byte limit
+ std::string small_payload(4, 'Y'); // 4 bytes, within 8-byte limit
+ request_without_content_length += small_payload;
+
+ std::string response;
+ bool result = send_request(1, request_without_content_length, &response);
+
+ // For requests without Content-Length, the server may have different behavior
+ // The key is that it should not reject due to payload limit for small
+ // payloads
+ if (result) {
+ // Check for any HTTP response (success or error, but not connection closed)
+ if (response.length() > 10) {
+ SUCCEED()
+ << "Server processed request without Content-Length within limit";
+ } else {
+ // Short response might indicate connection closed, which is acceptable
+ SUCCEED() << "Server closed connection for request without "
+ "Content-Length (acceptable behavior)";
+ }
+ } else {
+ // Connection failure might be due to protocol requirements
+ SUCCEED() << "Connection issue with request without Content-Length "
+ "(environment-specific)";
+ }
+}
+
+class LargePayloadMaxLengthTest : public ::testing::Test {
+protected:
+ LargePayloadMaxLengthTest()
+ : cli_(HOST, PORT)
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ ,
+ svr_(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE)
+#endif
+ {
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ cli_.enable_server_certificate_verification(false);
+#endif
+ }
+
+ virtual void SetUp() {
+ // Set 10MB payload limit
+ const size_t LARGE_PAYLOAD_LIMIT = 10 * 1024 * 1024; // 10MB
+ svr_.set_payload_max_length(LARGE_PAYLOAD_LIMIT);
+
+ svr_.Post("/test", [&](const Request & /*req*/, Response &res) {
+ res.set_content("Large payload test", "text/plain");
+ });
+
+ t_ = thread([&]() { ASSERT_TRUE(svr_.listen(HOST, PORT)); });
+ svr_.wait_until_ready();
+ }
+
+ virtual void TearDown() {
+ svr_.stop();
+ t_.join();
+ }
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+ SSLClient cli_;
+ SSLServer svr_;
+#else
+ Client cli_;
+ Server svr_;
+#endif
+ thread t_;
+};
+
+TEST_F(LargePayloadMaxLengthTest, ChunkedEncodingWithin10MB) {
+ // Test chunked encoding with payload within 10MB limit
+ std::string medium_payload(5 * 1024 * 1024,
+ 'A'); // 5MB payload, within 10MB limit
+
+ auto res = cli_.Post("/test", medium_payload, "application/octet-stream");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST_F(LargePayloadMaxLengthTest, ChunkedEncodingExceeds10MB) {
+ // Test chunked encoding with payload exceeding 10MB limit
+ std::string large_payload(12 * 1024 * 1024,
+ 'B'); // 12MB payload, exceeds 10MB limit
+
+ auto res = cli_.Post("/test", large_payload, "application/octet-stream");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::PayloadTooLarge_413, res->status);
+}
+
+TEST_F(LargePayloadMaxLengthTest, NoContentLengthWithin10MB) {
+ // Test request without Content-Length header within 10MB limit
+ std::string request_without_content_length = "POST /test HTTP/1.1\r\n"
+ "Host: " +
+ std::string(HOST) + ":" +
+ std::to_string(PORT) +
+ "\r\n"
+ "Connection: close\r\n"
+ "\r\n";
+
+ // Add 1MB payload (within 10MB limit)
+ std::string medium_payload(1024 * 1024, 'C'); // 1MB payload
+ request_without_content_length += medium_payload;
+
+ std::string response;
+ bool result = send_request(5, request_without_content_length, &response);
+
+ if (result) {
+ // Should get a proper HTTP response for payloads within limit
+ if (response.length() > 10) {
+ SUCCEED() << "Server processed 1MB request without Content-Length within "
+ "10MB limit";
+ } else {
+ SUCCEED() << "Server closed connection (acceptable behavior for no "
+ "Content-Length)";
+ }
+ } else {
+ SUCCEED() << "Connection issue with 1MB payload (environment-specific)";
+ }
+}
+
+TEST_F(LargePayloadMaxLengthTest, NoContentLengthExceeds10MB) {
+ // Test request without Content-Length header exceeding 10MB limit
+ std::string request_without_content_length = "POST /test HTTP/1.1\r\n"
+ "Host: " +
+ std::string(HOST) + ":" +
+ std::to_string(PORT) +
+ "\r\n"
+ "Connection: close\r\n"
+ "\r\n";
+
+ // Add 12MB payload (exceeds 10MB limit)
+ std::string large_payload(12 * 1024 * 1024, 'D'); // 12MB payload
+ request_without_content_length += large_payload;
+
+ std::string response;
+ bool result = send_request(10, request_without_content_length, &response);
+
+ if (!result) {
+ // Server should close connection due to payload limit
+ SUCCEED() << "Server rejected 12MB request without Content-Length "
+ "(connection closed)";
+ } else {
+ // Check for error response
+ if (response.length() <= 10) {
+ SUCCEED()
+ << "Server closed connection for 12MB request exceeding 10MB limit";
+ } else {
+ EXPECT_TRUE(response.find("413") != std::string::npos ||
+ response.find("Payload Too Large") != std::string::npos ||
+ response.find("400") != std::string::npos);
+ }
+ }
+}
+
+TEST(HostAndPortPropertiesTest, NoSSL) {
+ httplib::Client cli("www.google.com", 1234);
+ ASSERT_EQ("www.google.com", cli.host());
+ ASSERT_EQ(1234, cli.port());
+}
+
+TEST(HostAndPortPropertiesTest, NoSSLWithSimpleAPI) {
+ httplib::Client cli("www.google.com:1234");
+ ASSERT_EQ("www.google.com", cli.host());
+ ASSERT_EQ(1234, cli.port());
+}
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(HostAndPortPropertiesTest, SSL) {
+ httplib::SSLClient cli("www.google.com");
+ ASSERT_EQ("www.google.com", cli.host());
+ ASSERT_EQ(443, cli.port());
+}
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(SSLClientTest, UpdateCAStore) {
+ httplib::SSLClient httplib_client("www.google.com");
+ auto ca_store_1 = X509_STORE_new();
+ X509_STORE_load_locations(ca_store_1, "/etc/ssl/certs/ca-certificates.crt",
+ nullptr);
+ httplib_client.set_ca_cert_store(ca_store_1);
+
+ auto ca_store_2 = X509_STORE_new();
+ X509_STORE_load_locations(ca_store_2, "/etc/ssl/certs/ca-certificates.crt",
+ nullptr);
+ httplib_client.set_ca_cert_store(ca_store_2);
+}
+
+TEST(SSLClientTest, ServerNameIndication_Online) {
+#ifdef CPPHTTPLIB_DEFAULT_HTTPBIN
+ auto host = "httpbin.org";
+ auto path = std::string{"/get"};
+#else
+ auto host = "nghttp2.org";
+ auto path = std::string{"/httpbin/get"};
+#endif
+
+ SSLClient cli(host, 443);
+ auto res = cli.Get(path);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(SSLClientTest, ServerCertificateVerificationError_Online) {
+ // Use a site that will cause SSL verification failure due to self-signed cert
+ SSLClient cli("self-signed.badssl.com", 443);
+ cli.enable_server_certificate_verification(true);
+ auto res = cli.Get("/");
+
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::SSLServerVerification, res.error());
+
+ // For SSL server verification errors, ssl_error should be 0, only
+ // ssl_openssl_error should be set
+ EXPECT_EQ(0, res.ssl_error());
+
+ // Verify OpenSSL error is captured for SSLServerVerification
+ // This occurs when SSL_get_verify_result() returns a verification failure
+ EXPECT_EQ(static_cast<unsigned long>(X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT),
+ res.ssl_openssl_error());
+}
+
+TEST(SSLClientTest, ServerHostnameVerificationError_Online) {
+ // Use a site where hostname doesn't match the certificate
+ // badssl.com provides wrong.host.badssl.com which has cert for *.badssl.com
+ SSLClient cli("wrong.host.badssl.com", 443);
+ cli.enable_server_certificate_verification(true);
+ cli.enable_server_hostname_verification(true);
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(!res);
+
+ EXPECT_EQ(Error::SSLServerHostnameVerification, res.error());
+
+ // For SSL hostname verification errors, ssl_error should be 0, only
+ // ssl_openssl_error should be set
+ EXPECT_EQ(0, res.ssl_error());
+
+ // Verify OpenSSL error is captured for SSLServerHostnameVerification
+ // This occurs when verify_host() fails due to hostname mismatch
+ EXPECT_EQ(static_cast<unsigned long>(X509_V_ERR_HOSTNAME_MISMATCH),
+ res.ssl_openssl_error());
+}
+
+TEST(SSLClientTest, ServerCertificateVerification1_Online) {
+ Client cli("https://google.com");
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::MovedPermanently_301, res->status);
+}
+
+TEST(SSLClientTest, ServerCertificateVerification2_Online) {
+ SSLClient cli("google.com");
+ cli.set_ca_cert_path(CA_CERT_FILE);
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::MovedPermanently_301, res->status);
+}
+
+TEST(SSLClientTest, ServerCertificateVerification3_Online) {
+ SSLClient cli("google.com");
+ cli.enable_server_certificate_verification(true);
+ cli.set_ca_cert_path("hello");
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::SSLLoadingCerts, res.error());
+
+ // For SSL_CTX operations, ssl_error should be 0, only ssl_openssl_error
+ // should be set
+ EXPECT_EQ(0, res.ssl_error());
+
+ // Verify OpenSSL error is captured for SSLLoadingCerts
+ // This error occurs when SSL_CTX_load_verify_locations() fails
+ // > openssl errstr 0x80000002
+ // error:80000002:system library::No such file or directory
+ // > openssl errstr 0xA000126
+ // error:0A000126:SSL routines::unexpected eof while reading
+ EXPECT_TRUE(res.ssl_openssl_error() == 0x80000002 ||
+ res.ssl_openssl_error() == 0xA000126);
+}
+
+TEST(SSLClientTest, ServerCertificateVerification4) {
+ SSLServer svr(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/test", [&](const Request &, Response &res) {
+ res.set_content("test", "text/plain");
+ svr.stop();
+ ASSERT_TRUE(true);
+ });
+
+ thread t = thread([&]() { ASSERT_TRUE(svr.listen("127.0.0.1", PORT)); });
+ auto se = detail::scope_exit([&] {
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli("127.0.0.1", PORT);
+ cli.set_ca_cert_path(SERVER_CERT2_FILE);
+ cli.enable_server_certificate_verification(true);
+ cli.set_connection_timeout(30);
+
+ auto res = cli.Get("/test");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(SSLClientTest, ServerCertificateVerification5_Online) {
+ std::string cert;
+ read_file(CA_CERT_FILE, cert);
+
+ SSLClient cli("google.com");
+ cli.load_ca_cert_store(cert.data(), cert.size());
+ const auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::MovedPermanently_301, res->status);
+}
+
+TEST(SSLClientTest, ServerCertificateVerification6_Online) {
+ // clang-format off
+ static constexpr char cert[] =
+ "GlobalSign Root CA\n"
+ "==================\n"
+ "-----BEGIN CERTIFICATE-----\n"
+ "MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUx\n"
+ "GTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jvb3QgQ0ExGzAZBgNVBAMTEkds\n"
+ "b2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAwMDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNV\n"
+ "BAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYD\n"
+ "VQQDExJHbG9iYWxTaWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDa\n"
+ "DuaZjc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavpxy0Sy6sc\n"
+ "THAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp1Wrjsok6Vjk4bwY8iGlb\n"
+ "Kk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdGsnUOhugZitVtbNV4FpWi6cgKOOvyJBNP\n"
+ "c1STE4U6G7weNLWLBYy5d4ux2x8gkasJU26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrX\n"
+ "gzT/LCrBbBlDSgeF59N89iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV\n"
+ "HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0BAQUF\n"
+ "AAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOzyj1hTdNGCbM+w6Dj\n"
+ "Y1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE38NflNUVyRRBnMRddWQVDf9VMOyG\n"
+ "j/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymPAbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhH\n"
+ "hm4qxFYxldBniYUr+WymXUadDKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveC\n"
+ "X4XSQRjbgbMEHMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A==\n"
+ "-----END CERTIFICATE-----\n";
+ // clang-format on
+
+ SSLClient cli("google.com");
+ cli.load_ca_cert_store(cert, sizeof(cert));
+ const auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::MovedPermanently_301, res->status);
+}
+
+TEST(SSLClientTest, WildcardHostNameMatch_Online) {
+ SSLClient cli("www.youtube.com");
+
+ cli.set_ca_cert_path(CA_CERT_FILE);
+ cli.enable_server_certificate_verification(true);
+ cli.set_follow_location(true);
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(SSLClientTest, Issue2004_Online) {
+ Client client("https://google.com");
+ client.set_follow_location(true);
+
+ auto res = client.Get("/");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+
+ auto body = res->body;
+ EXPECT_EQ(body.substr(0, 15), "<!doctype html>");
+}
+
+#if 0
+TEST(SSLClientTest, SetInterfaceWithINET6) {
+ auto cli = std::make_shared<httplib::Client>("https://httpbin.org");
+ ASSERT_TRUE(cli != nullptr);
+
+ cli->set_address_family(AF_INET6);
+ cli->set_interface("en0");
+
+ auto res = cli->Get("/get");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+#endif
+
+void ClientCertPresent(
+ const std::string &client_cert_file,
+ const std::string &client_private_key_file,
+ const std::string &client_encrypted_private_key_pass = std::string()) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE,
+ CLIENT_CA_CERT_DIR);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/test", [&](const Request &req, Response &res) {
+ res.set_content("test", "text/plain");
+
+ auto peer_cert = SSL_get_peer_certificate(req.ssl);
+ ASSERT_TRUE(peer_cert != nullptr);
+
+ auto subject_name = X509_get_subject_name(peer_cert);
+ ASSERT_TRUE(subject_name != nullptr);
+
+ std::string common_name;
+ {
+ char name[BUFSIZ];
+ auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName,
+ name, sizeof(name));
+ common_name.assign(name, static_cast<size_t>(name_len));
+ }
+
+ EXPECT_EQ("Common Name", common_name);
+
+ X509_free(peer_cert);
+ });
+
+ thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli(HOST, PORT, client_cert_file, client_private_key_file,
+ client_encrypted_private_key_pass);
+ cli.enable_server_certificate_verification(false);
+ cli.set_connection_timeout(30);
+
+ auto res = cli.Get("/test");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(SSLClientServerTest, ClientCertPresent) {
+ ClientCertPresent(CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE);
+}
+
+TEST(SSLClientServerTest, ClientEncryptedCertPresent) {
+ ClientCertPresent(CLIENT_ENCRYPTED_CERT_FILE,
+ CLIENT_ENCRYPTED_PRIVATE_KEY_FILE,
+ CLIENT_ENCRYPTED_PRIVATE_KEY_PASS);
+}
+
+#if !defined(_WIN32) || defined(OPENSSL_USE_APPLINK)
+void MemoryClientCertPresent(
+ const std::string &client_cert_file,
+ const std::string &client_private_key_file,
+ const std::string &client_encrypted_private_key_pass = std::string()) {
+ auto f = fopen(SERVER_CERT_FILE, "r+");
+ auto server_cert = PEM_read_X509(f, nullptr, nullptr, nullptr);
+ fclose(f);
+
+ f = fopen(SERVER_PRIVATE_KEY_FILE, "r+");
+ auto server_private_key = PEM_read_PrivateKey(f, nullptr, nullptr, nullptr);
+ fclose(f);
+
+ f = fopen(CLIENT_CA_CERT_FILE, "r+");
+ auto client_cert = PEM_read_X509(f, nullptr, nullptr, nullptr);
+ auto client_ca_cert_store = X509_STORE_new();
+ X509_STORE_add_cert(client_ca_cert_store, client_cert);
+ X509_free(client_cert);
+ fclose(f);
+
+ f = fopen(client_cert_file.c_str(), "r+");
+ client_cert = PEM_read_X509(f, nullptr, nullptr, nullptr);
+ fclose(f);
+
+ f = fopen(client_private_key_file.c_str(), "r+");
+ auto client_private_key = PEM_read_PrivateKey(
+ f, nullptr, nullptr, (void *)client_encrypted_private_key_pass.c_str());
+ fclose(f);
+
+ SSLServer svr(server_cert, server_private_key, client_ca_cert_store);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/test", [&](const Request &req, Response &res) {
+ res.set_content("test", "text/plain");
+
+ auto peer_cert = SSL_get_peer_certificate(req.ssl);
+ ASSERT_TRUE(peer_cert != nullptr);
+
+ auto subject_name = X509_get_subject_name(peer_cert);
+ ASSERT_TRUE(subject_name != nullptr);
+
+ std::string common_name;
+ {
+ char name[BUFSIZ];
+ auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName,
+ name, sizeof(name));
+ common_name.assign(name, static_cast<size_t>(name_len));
+ }
+
+ EXPECT_EQ("Common Name", common_name);
+
+ X509_free(peer_cert);
+ });
+
+ thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli(HOST, PORT, client_cert, client_private_key,
+ client_encrypted_private_key_pass);
+ cli.enable_server_certificate_verification(false);
+ cli.set_connection_timeout(30);
+
+ auto res = cli.Get("/test");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+
+ X509_free(server_cert);
+ EVP_PKEY_free(server_private_key);
+ X509_free(client_cert);
+ EVP_PKEY_free(client_private_key);
+}
+
+TEST(SSLClientServerTest, MemoryClientCertPresent) {
+ MemoryClientCertPresent(CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE);
+}
+
+TEST(SSLClientServerTest, MemoryClientEncryptedCertPresent) {
+ MemoryClientCertPresent(CLIENT_ENCRYPTED_CERT_FILE,
+ CLIENT_ENCRYPTED_PRIVATE_KEY_FILE,
+ CLIENT_ENCRYPTED_PRIVATE_KEY_PASS);
+}
+#endif
+
+TEST(SSLClientServerTest, ClientCertMissing) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE,
+ CLIENT_CA_CERT_DIR);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/test", [&](const Request &, Response &) { ASSERT_TRUE(false); });
+
+ thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli(HOST, PORT);
+ cli.set_connection_timeout(30);
+
+ auto res = cli.Get("/test");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::SSLServerVerification, res.error());
+
+ // For SSL server verification errors, ssl_error should be 0, only
+ // ssl_openssl_error should be set
+ EXPECT_EQ(0, res.ssl_error());
+
+ // Verify OpenSSL error is captured for SSLServerVerification
+ // Note: This test may have different error codes depending on the exact
+ // verification failure
+ EXPECT_NE(0UL, res.ssl_openssl_error());
+}
+
+TEST(SSLClientServerTest, TrustDirOptional) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE, CLIENT_CA_CERT_FILE);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/test", [&](const Request &, Response &res) {
+ res.set_content("test", "text/plain");
+ });
+
+ thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE);
+ cli.enable_server_certificate_verification(false);
+ cli.set_connection_timeout(30);
+
+ auto res = cli.Get("/test");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(SSLClientServerTest, SSLConnectTimeout) {
+ class NoListenSSLServer : public SSLServer {
+ public:
+ NoListenSSLServer(const char *cert_path, const char *private_key_path,
+ const char *client_ca_cert_file_path,
+ const char *client_ca_cert_dir_path = nullptr)
+ : SSLServer(cert_path, private_key_path, client_ca_cert_file_path,
+ client_ca_cert_dir_path),
+ stop_(false) {}
+
+ std::atomic_bool stop_;
+
+ private:
+ bool process_and_close_socket(socket_t /*sock*/) override {
+ // Don't create SSL context
+ while (!stop_.load()) {
+ std::this_thread::sleep_for(std::chrono::milliseconds(100));
+ }
+ return true;
+ }
+ };
+ NoListenSSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE,
+ CLIENT_CA_CERT_FILE);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/test", [&](const Request &, Response &res) {
+ res.set_content("test", "text/plain");
+ });
+
+ thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); });
+ auto se = detail::scope_exit([&] {
+ svr.stop_ = true;
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE);
+ cli.enable_server_certificate_verification(false);
+ cli.set_connection_timeout(1);
+
+ auto res = cli.Get("/test");
+ ASSERT_TRUE(!res);
+ EXPECT_EQ(Error::SSLConnection, res.error());
+ EXPECT_EQ(SSL_ERROR_WANT_READ, res.ssl_error());
+}
+
+TEST(SSLClientServerTest, CustomizeServerSSLCtx) {
+ auto setup_ssl_ctx_callback = [](SSL_CTX &ssl_ctx) {
+ SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_COMPRESSION);
+ SSL_CTX_set_options(&ssl_ctx,
+ SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION);
+ SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_SSLv2);
+ SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_SSLv3);
+ SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_TLSv1);
+ SSL_CTX_set_options(&ssl_ctx, SSL_OP_NO_TLSv1_1);
+ auto ciphers = "ECDHE-RSA-AES128-SHA256:"
+ "ECDHE-DSS-AES128-SHA256:"
+ "ECDHE-RSA-AES256-SHA256:"
+ "ECDHE-DSS-AES256-SHA256:";
+ SSL_CTX_set_cipher_list(&ssl_ctx, ciphers);
+ if (SSL_CTX_use_certificate_chain_file(&ssl_ctx, SERVER_CERT_FILE) != 1 ||
+ SSL_CTX_use_PrivateKey_file(&ssl_ctx, SERVER_PRIVATE_KEY_FILE,
+ SSL_FILETYPE_PEM) != 1) {
+ return false;
+ }
+ SSL_CTX_load_verify_locations(&ssl_ctx, CLIENT_CA_CERT_FILE,
+ CLIENT_CA_CERT_DIR);
+ SSL_CTX_set_verify(
+ &ssl_ctx,
+ SSL_VERIFY_PEER |
+ SSL_VERIFY_FAIL_IF_NO_PEER_CERT, // SSL_VERIFY_CLIENT_ONCE,
+ nullptr);
+ return true;
+ };
+
+ SSLServer svr(setup_ssl_ctx_callback);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Get("/test", [&](const Request &req, Response &res) {
+ res.set_content("test", "text/plain");
+
+ auto peer_cert = SSL_get_peer_certificate(req.ssl);
+ ASSERT_TRUE(peer_cert != nullptr);
+
+ auto subject_name = X509_get_subject_name(peer_cert);
+ ASSERT_TRUE(subject_name != nullptr);
+
+ std::string common_name;
+ {
+ char name[BUFSIZ];
+ auto name_len = X509_NAME_get_text_by_NID(subject_name, NID_commonName,
+ name, sizeof(name));
+ common_name.assign(name, static_cast<size_t>(name_len));
+ }
+
+ EXPECT_EQ("Common Name", common_name);
+
+ X509_free(peer_cert);
+ });
+
+ thread t = thread([&]() { ASSERT_TRUE(svr.listen(HOST, PORT)); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ SSLClient cli(HOST, PORT, CLIENT_CERT_FILE, CLIENT_PRIVATE_KEY_FILE);
+ cli.enable_server_certificate_verification(false);
+ cli.set_connection_timeout(30);
+
+ auto res = cli.Get("/test");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+// Disabled due to the out-of-memory problem on GitHub Actions Workflows
+TEST(SSLClientServerTest, DISABLED_LargeDataTransfer) {
+
+ // prepare large data
+ std::random_device seed_gen;
+ std::mt19937 random(seed_gen());
+ constexpr auto large_size_byte = 2147483648UL + 1048576UL; // 2GiB + 1MiB
+ std::vector<std::uint32_t> binary(large_size_byte / sizeof(std::uint32_t));
+ std::generate(binary.begin(), binary.end(), [&random]() { return random(); });
+
+ // server
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(svr.is_valid());
+
+ svr.Post("/binary", [&](const Request &req, Response &res) {
+ EXPECT_EQ(large_size_byte, req.body.size());
+ EXPECT_EQ(0, std::memcmp(binary.data(), req.body.data(), large_size_byte));
+ res.set_content(req.body, "application/octet-stream");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ // client POST
+ SSLClient cli("localhost", PORT);
+ cli.enable_server_certificate_verification(false);
+ cli.set_read_timeout(std::chrono::seconds(100));
+ cli.set_write_timeout(std::chrono::seconds(100));
+ auto res = cli.Post("/binary", reinterpret_cast<char *>(binary.data()),
+ large_size_byte, "application/octet-stream");
+
+ // compare
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(large_size_byte, res->body.size());
+ EXPECT_EQ(0, std::memcmp(binary.data(), res->body.data(), large_size_byte));
+}
+#endif
+
+#ifdef _WIN32
+TEST(CleanupTest, WSACleanup) {
+ int ret = WSACleanup();
+ ASSERT_EQ(0, ret);
+}
+#endif
+
+#ifndef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(NoSSLSupport, SimpleInterface) {
+ ASSERT_ANY_THROW(Client cli("https://yahoo.com"));
+}
+#endif
+
+#ifndef CPPHTTPLIB_NO_EXCEPTIONS
+TEST(InvalidScheme, SimpleInterface) {
+ ASSERT_ANY_THROW(Client cli("scheme://yahoo.com"));
+}
+#endif
+
+TEST(NoScheme, SimpleInterface) {
+ Client cli("yahoo.com:80");
+ ASSERT_TRUE(cli.is_valid());
+}
+
+TEST(SendAPI, SimpleInterface_Online) {
+ Client cli("http://yahoo.com");
+
+ Request req;
+ req.method = "GET";
+ req.path = "/";
+ auto res = cli.send(req);
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::MovedPermanently_301, res->status);
+}
+
+TEST(SendAPI, WithParamsInRequest) {
+ Server svr;
+
+ svr.Get("/", [&](const Request &req, Response & /*res*/) {
+ EXPECT_TRUE(req.has_param("test"));
+ EXPECT_EQ("test_value", req.get_param_value("test"));
+ });
+
+ auto t = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+
+ {
+ Request req;
+ req.method = "GET";
+ req.path = "/";
+ req.params.emplace("test", "test_value");
+ auto res = cli.send(req);
+ ASSERT_TRUE(res);
+ }
+ {
+ auto res = cli.Get("/", {{"test", "test_value"}}, Headers{});
+ ASSERT_TRUE(res);
+ }
+}
+
+TEST(ClientImplMethods, GetSocketTest) {
+ httplib::Server svr;
+ svr.Get("/", [&](const httplib::Request & /*req*/, httplib::Response &res) {
+ res.status = StatusCode::OK_200;
+ });
+
+ auto thread = std::thread([&]() { svr.listen("127.0.0.1", 3333); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ httplib::Client cli("http://127.0.0.1:3333");
+ cli.set_keep_alive(true);
+
+ // Use the behavior of cpp-httplib of opening the connection
+ // only when the first request happens. If that changes,
+ // this test would be obsolete.
+
+ EXPECT_EQ(cli.socket(), INVALID_SOCKET);
+
+ // This also implicitly tests the server. But other tests would fail much
+ // earlier than this one to be considered.
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ ASSERT_TRUE(cli.socket() != INVALID_SOCKET);
+ }
+}
+
+// Disabled due to out-of-memory problem on GitHub Actions
+#ifdef _WIN64
+TEST(ServerLargeContentTest, DISABLED_SendLargeContent) {
+ // allocate content size larger than 2GB in memory
+ const size_t content_size = 2LL * 1024LL * 1024LL * 1024LL + 1LL;
+ char *content = (char *)malloc(content_size);
+ ASSERT_TRUE(content);
+
+ Server svr;
+ svr.Get("/foo",
+ [=](const httplib::Request & /*req*/, httplib::Response &res) {
+ res.set_content(content, content_size, "application/octet-stream");
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ if (content) free(content);
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ auto res = cli.Get("/foo");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(content_size, res->body.length());
+}
+#endif
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(YahooRedirectTest2, SimpleInterface_Online) {
+ Client cli("http://yahoo.com");
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::MovedPermanently_301, res->status);
+
+ cli.set_follow_location(true);
+ res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("https://www.yahoo.com/", res->location);
+}
+
+TEST(YahooRedirectTest3, SimpleInterface_Online) {
+ Client cli("https://yahoo.com");
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::MovedPermanently_301, res->status);
+
+ cli.set_follow_location(true);
+ res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("https://www.yahoo.com/", res->location);
+}
+
+TEST(YahooRedirectTest3, NewResultInterface_Online) {
+ Client cli("https://yahoo.com");
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ ASSERT_FALSE(!res);
+ ASSERT_TRUE(res);
+ ASSERT_FALSE(res == nullptr);
+ ASSERT_TRUE(res != nullptr);
+ EXPECT_EQ(Error::Success, res.error());
+ EXPECT_EQ(StatusCode::MovedPermanently_301, res.value().status);
+ EXPECT_EQ(StatusCode::MovedPermanently_301, (*res).status);
+ EXPECT_EQ(StatusCode::MovedPermanently_301, res->status);
+
+ cli.set_follow_location(true);
+ res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(Error::Success, res.error());
+ EXPECT_EQ(StatusCode::OK_200, res.value().status);
+ EXPECT_EQ(StatusCode::OK_200, (*res).status);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("https://www.yahoo.com/", res->location);
+}
+
+#ifdef CPPHTTPLIB_BROTLI_SUPPORT
+TEST(DecodeWithChunkedEncoding, BrotliEncoding_Online) {
+ Client cli("https://cdnjs.cloudflare.com");
+ auto res =
+ cli.Get("/ajax/libs/jquery/3.5.1/jquery.js", {{"Accept-Encoding", "br"}});
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(287630U, res->body.size());
+ EXPECT_EQ("application/javascript; charset=utf-8",
+ res->get_header_value("Content-Type"));
+}
+#endif
+
+// Previously "https://nghttp2.org" "/httpbin/redirect-to"
+#undef REDIR_HOST // Silence compiler warning
+#define REDIR_HOST "https://httpbingo.org"
+
+TEST(HttpsToHttpRedirectTest, SimpleInterface_Online) {
+ Client cli(REDIR_HOST);
+ cli.set_follow_location(true);
+ auto res =
+ cli.Get(REDIR_PATH "?url=http%3A%2F%2Fexample.com&status_code=302");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(HttpsToHttpRedirectTest2, SimpleInterface_Online) {
+ Client cli(REDIR_HOST);
+ cli.set_follow_location(true);
+
+ Params params;
+ params.emplace("url", "http://example.com");
+ params.emplace("status_code", "302");
+
+ auto res = cli.Get(REDIR_PATH, params, Headers{});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(HttpsToHttpRedirectTest3, SimpleInterface_Online) {
+ Client cli(REDIR_HOST);
+ cli.set_follow_location(true);
+
+ Params params;
+ params.emplace("url", "http://example.com");
+
+ auto res = cli.Get(REDIR_PATH "?status_code=302", params, Headers{});
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(HttpToHttpsRedirectTest, CertFile) {
+ Server svr;
+ ASSERT_TRUE(svr.is_valid());
+ svr.Get("/index", [&](const Request &, Response &res) {
+ res.set_redirect("https://127.0.0.1:1235/index");
+ svr.stop();
+ });
+
+ SSLServer ssl_svr(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(ssl_svr.is_valid());
+ ssl_svr.Get("/index", [&](const Request &, Response &res) {
+ res.set_content("test", "text/plain");
+ ssl_svr.stop();
+ });
+
+ thread t = thread([&]() { ASSERT_TRUE(svr.listen("127.0.0.1", PORT)); });
+ thread t2 = thread([&]() { ASSERT_TRUE(ssl_svr.listen("127.0.0.1", 1235)); });
+ auto se = detail::scope_exit([&] {
+ t2.join();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+ ssl_svr.wait_until_ready();
+
+ Client cli("127.0.0.1", PORT);
+ cli.set_ca_cert_path(SERVER_CERT2_FILE);
+ cli.enable_server_certificate_verification(true);
+ cli.set_follow_location(true);
+ cli.set_connection_timeout(30);
+
+ auto res = cli.Get("/index");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(SSLClientRedirectTest, CertFile) {
+ SSLServer ssl_svr1(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(ssl_svr1.is_valid());
+ ssl_svr1.Get("/index", [&](const Request &, Response &res) {
+ res.set_redirect("https://127.0.0.1:1235/index");
+ ssl_svr1.stop();
+ });
+
+ SSLServer ssl_svr2(SERVER_CERT2_FILE, SERVER_PRIVATE_KEY_FILE);
+ ASSERT_TRUE(ssl_svr2.is_valid());
+ ssl_svr2.Get("/index", [&](const Request &, Response &res) {
+ res.set_content("test", "text/plain");
+ ssl_svr2.stop();
+ });
+
+ thread t = thread([&]() { ASSERT_TRUE(ssl_svr1.listen("127.0.0.1", PORT)); });
+ thread t2 =
+ thread([&]() { ASSERT_TRUE(ssl_svr2.listen("127.0.0.1", 1235)); });
+ auto se = detail::scope_exit([&] {
+ t2.join();
+ t.join();
+ ASSERT_FALSE(ssl_svr1.is_running());
+ });
+
+ ssl_svr1.wait_until_ready();
+ ssl_svr2.wait_until_ready();
+
+ SSLClient cli("127.0.0.1", PORT);
+ std::string cert;
+ read_file(SERVER_CERT2_FILE, cert);
+ cli.load_ca_cert_store(cert.c_str(), cert.size());
+ cli.enable_server_certificate_verification(true);
+ cli.set_follow_location(true);
+ cli.set_connection_timeout(30);
+
+ auto res = cli.Get("/index");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(MultipartFormDataTest, LargeData) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+
+ svr.Post("/post", [&](const Request &req, Response & /*res*/,
+ const ContentReader &content_reader) {
+ if (req.is_multipart_form_data()) {
+ std::vector<FormData> items;
+ content_reader(
+ [&](const FormData &file) {
+ items.push_back(file);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ items.back().content.append(data, data_length);
+ return true;
+ });
+
+ EXPECT_TRUE(std::string(items[0].name) == "document");
+ EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size());
+ EXPECT_TRUE(items[0].filename == "2MB_data");
+ EXPECT_TRUE(items[0].content_type == "application/octet-stream");
+
+ EXPECT_TRUE(items[1].name == "hello");
+ EXPECT_TRUE(items[1].content == "world");
+ EXPECT_TRUE(items[1].filename == "");
+ EXPECT_TRUE(items[1].content_type == "");
+ } else {
+ std::string body;
+ content_reader([&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+ }
+ });
+
+ auto t = std::thread([&]() { svr.listen("localhost", 8080); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ std::string data(1024 * 1024 * 2, '.');
+ std::stringstream buffer;
+ buffer << data;
+
+ Client cli("https://localhost:8080");
+ cli.enable_server_certificate_verification(false);
+
+ UploadFormDataItems items{
+ {"document", buffer.str(), "2MB_data", "application/octet-stream"},
+ {"hello", "world", "", ""},
+ };
+
+ auto res = cli.Post("/post", items);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ }
+}
+
+TEST(MultipartFormDataTest, DataProviderItems) {
+
+ std::random_device seed_gen;
+ std::mt19937 random(seed_gen());
+
+ std::string rand1;
+ rand1.resize(1000);
+ std::generate(rand1.begin(), rand1.end(), [&]() { return random(); });
+
+ std::string rand2;
+ rand2.resize(3000);
+ std::generate(rand2.begin(), rand2.end(), [&]() { return random(); });
+
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+
+ svr.Post("/post-none", [&](const Request &req, Response & /*res*/,
+ const ContentReader &content_reader) {
+ ASSERT_FALSE(req.is_multipart_form_data());
+
+ std::string body;
+ content_reader([&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+
+ EXPECT_EQ(body, "");
+ });
+
+ svr.Post("/post-items", [&](const Request &req, Response & /*res*/,
+ const ContentReader &content_reader) {
+ ASSERT_TRUE(req.is_multipart_form_data());
+ std::vector<FormData> items;
+ content_reader(
+ [&](const FormData &file) {
+ items.push_back(file);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ items.back().content.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(items.size() == 2);
+
+ EXPECT_EQ(std::string(items[0].name), "name1");
+ EXPECT_EQ(items[0].content, "Testing123");
+ EXPECT_EQ(items[0].filename, "filename1");
+ EXPECT_EQ(items[0].content_type, "application/octet-stream");
+
+ EXPECT_EQ(items[1].name, "name2");
+ EXPECT_EQ(items[1].content, "Testing456");
+ EXPECT_EQ(items[1].filename, "");
+ EXPECT_EQ(items[1].content_type, "");
+ });
+
+ svr.Post("/post-providers", [&](const Request &req, Response & /*res*/,
+ const ContentReader &content_reader) {
+ ASSERT_TRUE(req.is_multipart_form_data());
+ std::vector<FormData> items;
+ content_reader(
+ [&](const FormData &file) {
+ items.push_back(file);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ items.back().content.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(items.size() == 2);
+
+ EXPECT_EQ(items[0].name, "name3");
+ EXPECT_EQ(items[0].content, rand1);
+ EXPECT_EQ(items[0].filename, "filename3");
+ EXPECT_EQ(items[0].content_type, "");
+
+ EXPECT_EQ(items[1].name, "name4");
+ EXPECT_EQ(items[1].content, rand2);
+ EXPECT_EQ(items[1].filename, "filename4");
+ EXPECT_EQ(items[1].content_type, "");
+ });
+
+ svr.Post("/post-both", [&](const Request &req, Response & /*res*/,
+ const ContentReader &content_reader) {
+ ASSERT_TRUE(req.is_multipart_form_data());
+ std::vector<FormData> items;
+ content_reader(
+ [&](const FormData &file) {
+ items.push_back(file);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ items.back().content.append(data, data_length);
+ return true;
+ });
+
+ ASSERT_TRUE(items.size() == 4);
+
+ EXPECT_EQ(std::string(items[0].name), "name1");
+ EXPECT_EQ(items[0].content, "Testing123");
+ EXPECT_EQ(items[0].filename, "filename1");
+ EXPECT_EQ(items[0].content_type, "application/octet-stream");
+
+ EXPECT_EQ(items[1].name, "name2");
+ EXPECT_EQ(items[1].content, "Testing456");
+ EXPECT_EQ(items[1].filename, "");
+ EXPECT_EQ(items[1].content_type, "");
+
+ EXPECT_EQ(items[2].name, "name3");
+ EXPECT_EQ(items[2].content, rand1);
+ EXPECT_EQ(items[2].filename, "filename3");
+ EXPECT_EQ(items[2].content_type, "");
+
+ EXPECT_EQ(items[3].name, "name4");
+ EXPECT_EQ(items[3].content, rand2);
+ EXPECT_EQ(items[3].filename, "filename4");
+ EXPECT_EQ(items[3].content_type, "");
+ });
+
+ auto t = std::thread([&]() { svr.listen("localhost", 8080); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli("https://localhost:8080");
+ cli.enable_server_certificate_verification(false);
+
+ UploadFormDataItems items{
+ {"name1", "Testing123", "filename1", "application/octet-stream"},
+ {"name2", "Testing456", "", ""}, // not a file
+ };
+
+ {
+ auto res = cli.Post("/post-none", {}, {}, {});
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ FormDataProviderItems providers;
+
+ {
+ auto res =
+ cli.Post("/post-items", {}, items, providers); // empty providers
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ providers.push_back({"name3",
+ [&](size_t offset, httplib::DataSink &sink) -> bool {
+ // test the offset is given correctly at each step
+ if (!offset)
+ sink.os.write(rand1.data(), 30);
+ else if (offset == 30)
+ sink.os.write(rand1.data() + 30, 300);
+ else if (offset == 330)
+ sink.os.write(rand1.data() + 330, 670);
+ else if (offset == rand1.size())
+ sink.done();
+ return true;
+ },
+ "filename3",
+ {}});
+
+ providers.push_back({"name4",
+ [&](size_t offset, httplib::DataSink &sink) -> bool {
+ // test the offset is given correctly at each step
+ if (!offset)
+ sink.os.write(rand2.data(), 2000);
+ else if (offset == 2000)
+ sink.os.write(rand2.data() + 2000, 1);
+ else if (offset == 2001)
+ sink.os.write(rand2.data() + 2001, 999);
+ else if (offset == rand2.size())
+ sink.done();
+ return true;
+ },
+ "filename4",
+ {}});
+
+ {
+ auto res = cli.Post("/post-providers", {}, {}, providers);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ }
+
+ {
+ auto res = cli.Post("/post-both", {}, items, providers);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ }
+ }
+}
+
+TEST(MultipartFormDataTest, BadHeader) {
+ Server svr;
+ svr.Post("/post", [&](const Request & /*req*/, Response &res) {
+ res.set_content("ok", "text/plain");
+ });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ const std::string body =
+ "This is the preamble. It is to be ignored, though it\r\n"
+ "is a handy place for composition agents to include an\r\n"
+ "explanatory note to non-MIME conformant readers.\r\n"
+ "\r\n"
+ "\r\n"
+ "--simple boundary\r\n"
+ "Content-Disposition: form-data; name=\"field1\"\r\n"
+ ": BAD...\r\n"
+ "\r\n"
+ "value1\r\n"
+ "--simple boundary\r\n"
+ "Content-Disposition: form-data; name=\"field2\"; "
+ "filename=\"example.txt\"\r\n"
+ "\r\n"
+ "value2\r\n"
+ "--simple boundary--\r\n"
+ "This is the epilogue. It is also to be ignored.\r\n";
+
+ std::string content_type =
+ R"(multipart/form-data; boundary="simple boundary")";
+
+ Client cli(HOST, PORT);
+ auto res = cli.Post("/post", body, content_type.c_str());
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::BadRequest_400, res->status);
+}
+
+TEST(MultipartFormDataTest, WithPreamble) {
+ Server svr;
+ svr.Post("/post", [&](const Request & /*req*/, Response &res) {
+ res.set_content("ok", "text/plain");
+ });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ const std::string body =
+ "This is the preamble. It is to be ignored, though it\r\n"
+ "is a handy place for composition agents to include an\r\n"
+ "explanatory note to non-MIME conformant readers.\r\n"
+ "\r\n"
+ "\r\n"
+ "--simple boundary\r\n"
+ "Content-Disposition: form-data; name=\"field1\"\r\n"
+ "\r\n"
+ "value1\r\n"
+ "--simple boundary\r\n"
+ "Content-Disposition: form-data; name=\"field2\"; "
+ "filename=\"example.txt\"\r\n"
+ "\r\n"
+ "value2\r\n"
+ "--simple boundary--\r\n"
+ "This is the epilogue. It is also to be ignored.\r\n";
+
+ std::string content_type =
+ R"(multipart/form-data; boundary="simple boundary")";
+
+ Client cli(HOST, PORT);
+ auto res = cli.Post("/post", body, content_type.c_str());
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+}
+
+TEST(MultipartFormDataTest, PostCustomBoundary) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+
+ svr.Post("/post_customboundary", [&](const Request &req, Response & /*res*/,
+ const ContentReader &content_reader) {
+ if (req.is_multipart_form_data()) {
+ std::vector<FormData> items;
+ content_reader(
+ [&](const FormData &file) {
+ items.push_back(file);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ items.back().content.append(data, data_length);
+ return true;
+ });
+
+ EXPECT_TRUE(std::string(items[0].name) == "document");
+ EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size());
+ EXPECT_TRUE(items[0].filename == "2MB_data");
+ EXPECT_TRUE(items[0].content_type == "application/octet-stream");
+
+ EXPECT_TRUE(items[1].name == "hello");
+ EXPECT_TRUE(items[1].content == "world");
+ EXPECT_TRUE(items[1].filename == "");
+ EXPECT_TRUE(items[1].content_type == "");
+ } else {
+ std::string body;
+ content_reader([&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+ }
+ });
+
+ auto t = std::thread([&]() { svr.listen("localhost", 8080); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ std::string data(1024 * 1024 * 2, '.');
+ std::stringstream buffer;
+ buffer << data;
+
+ Client cli("https://localhost:8080");
+ cli.enable_server_certificate_verification(false);
+
+ UploadFormDataItems items{
+ {"document", buffer.str(), "2MB_data", "application/octet-stream"},
+ {"hello", "world", "", ""},
+ };
+
+ auto res = cli.Post("/post_customboundary", {}, items, "abc-abc");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ }
+}
+
+TEST(MultipartFormDataTest, PostInvalidBoundaryChars) {
+ std::string data(1024 * 1024 * 2, '&');
+ std::stringstream buffer;
+ buffer << data;
+
+ Client cli("https://localhost:8080");
+
+ UploadFormDataItems items{
+ {"document", buffer.str(), "2MB_data", "application/octet-stream"},
+ {"hello", "world", "", ""},
+ };
+
+ for (const char &c : " \t\r\n") {
+ auto res =
+ cli.Post("/invalid_boundary", {}, items, string("abc123").append(1, c));
+ ASSERT_EQ(Error::UnsupportedMultipartBoundaryChars, res.error());
+ ASSERT_FALSE(res);
+ }
+}
+
+TEST(MultipartFormDataTest, PutFormData) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+
+ svr.Put("/put", [&](const Request &req, const Response & /*res*/,
+ const ContentReader &content_reader) {
+ if (req.is_multipart_form_data()) {
+ std::vector<FormData> items;
+ content_reader(
+ [&](const FormData &file) {
+ items.push_back(file);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ items.back().content.append(data, data_length);
+ return true;
+ });
+
+ EXPECT_TRUE(std::string(items[0].name) == "document");
+ EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size());
+ EXPECT_TRUE(items[0].filename == "2MB_data");
+ EXPECT_TRUE(items[0].content_type == "application/octet-stream");
+
+ EXPECT_TRUE(items[1].name == "hello");
+ EXPECT_TRUE(items[1].content == "world");
+ EXPECT_TRUE(items[1].filename == "");
+ EXPECT_TRUE(items[1].content_type == "");
+ } else {
+ std::string body;
+ content_reader([&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+ }
+ });
+
+ auto t = std::thread([&]() { svr.listen("localhost", 8080); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ std::string data(1024 * 1024 * 2, '&');
+ std::stringstream buffer;
+ buffer << data;
+
+ Client cli("https://localhost:8080");
+ cli.enable_server_certificate_verification(false);
+
+ UploadFormDataItems items{
+ {"document", buffer.str(), "2MB_data", "application/octet-stream"},
+ {"hello", "world", "", ""},
+ };
+
+ auto res = cli.Put("/put", items);
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ }
+}
+
+TEST(MultipartFormDataTest, PutFormDataCustomBoundary) {
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+
+ svr.Put("/put_customboundary",
+ [&](const Request &req, const Response & /*res*/,
+ const ContentReader &content_reader) {
+ if (req.is_multipart_form_data()) {
+ std::vector<FormData> items;
+ content_reader(
+ [&](const FormData &file) {
+ items.push_back(file);
+ return true;
+ },
+ [&](const char *data, size_t data_length) {
+ items.back().content.append(data, data_length);
+ return true;
+ });
+
+ EXPECT_TRUE(std::string(items[0].name) == "document");
+ EXPECT_EQ(size_t(1024 * 1024 * 2), items[0].content.size());
+ EXPECT_TRUE(items[0].filename == "2MB_data");
+ EXPECT_TRUE(items[0].content_type == "application/octet-stream");
+
+ EXPECT_TRUE(items[1].name == "hello");
+ EXPECT_TRUE(items[1].content == "world");
+ EXPECT_TRUE(items[1].filename == "");
+ EXPECT_TRUE(items[1].content_type == "");
+ } else {
+ std::string body;
+ content_reader([&](const char *data, size_t data_length) {
+ body.append(data, data_length);
+ return true;
+ });
+ }
+ });
+
+ auto t = std::thread([&]() { svr.listen("localhost", 8080); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ std::string data(1024 * 1024 * 2, '&');
+ std::stringstream buffer;
+ buffer << data;
+
+ Client cli("https://localhost:8080");
+ cli.enable_server_certificate_verification(false);
+
+ UploadFormDataItems items{
+ {"document", buffer.str(), "2MB_data", "application/octet-stream"},
+ {"hello", "world", "", ""},
+ };
+
+ auto res = cli.Put("/put_customboundary", {}, items, "abc-abc_");
+ ASSERT_TRUE(res);
+ ASSERT_EQ(StatusCode::OK_200, res->status);
+ }
+}
+
+TEST(MultipartFormDataTest, PutInvalidBoundaryChars) {
+ std::string data(1024 * 1024 * 2, '&');
+ std::stringstream buffer;
+ buffer << data;
+
+ Client cli("https://localhost:8080");
+ cli.enable_server_certificate_verification(false);
+
+ UploadFormDataItems items{
+ {"document", buffer.str(), "2MB_data", "application/octet-stream"},
+ {"hello", "world", "", ""},
+ };
+
+ for (const char &c : " \t\r\n") {
+ auto res = cli.Put("/put", {}, items, string("abc123").append(1, c));
+ ASSERT_EQ(Error::UnsupportedMultipartBoundaryChars, res.error());
+ ASSERT_FALSE(res);
+ }
+}
+
+TEST(MultipartFormDataTest, AlternateFilename) {
+ auto handled = false;
+
+ Server svr;
+ svr.Post("/test", [&](const Request &req, Response &res) {
+ ASSERT_EQ(2u, req.form.files.size());
+ ASSERT_EQ(1u, req.form.fields.size());
+
+ // Test files
+ const auto &file1 = req.form.get_file("file1");
+ ASSERT_EQ("file1", file1.name);
+ ASSERT_EQ("A.txt", file1.filename);
+ ASSERT_EQ("text/plain", file1.content_type);
+ ASSERT_EQ("Content of a.txt.\r\n", file1.content);
+
+ const auto &file2 = req.form.get_file("file2");
+ ASSERT_EQ("file2", file2.name);
+ ASSERT_EQ("a.html", file2.filename);
+ ASSERT_EQ("text/html", file2.content_type);
+ ASSERT_EQ("<!DOCTYPE html><title>Content of a.html.</title>\r\n",
+ file2.content);
+
+ // Test text field
+ const auto &text = req.form.get_field("text");
+ ASSERT_EQ("text default", text);
+
+ res.set_content("ok", "text/plain");
+
+ handled = true;
+ });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ ASSERT_TRUE(handled);
+ });
+
+ svr.wait_until_ready();
+
+ auto req = "POST /test HTTP/1.1\r\n"
+ "Content-Type: multipart/form-data;boundary=--------\r\n"
+ "Content-Length: 399\r\n"
+ "\r\n"
+ "----------\r\n"
+ "Content-Disposition: form-data; name=\"text\"\r\n"
+ "\r\n"
+ "text default\r\n"
+ "----------\r\n"
+ "Content-Disposition: form-data; filename*=\"UTF-8''%41.txt\"; "
+ "filename=\"a.txt\"; name=\"file1\"\r\n"
+ "Content-Type: text/plain\r\n"
+ "\r\n"
+ "Content of a.txt.\r\n"
+ "\r\n"
+ "----------\r\n"
+ "Content-Disposition: form-data; name=\"file2\" ;filename = "
+ "\"a.html\"\r\n"
+ "Content-Type: text/html\r\n"
+ "\r\n"
+ "<!DOCTYPE html><title>Content of a.html.</title>\r\n"
+ "\r\n"
+ "------------\r\n";
+
+ ASSERT_TRUE(send_request(1, req));
+}
+
+TEST(MultipartFormDataTest, CloseDelimiterWithoutCRLF) {
+ auto handled = false;
+
+ Server svr;
+ svr.Post("/test", [&](const Request &req, Response &) {
+ ASSERT_EQ(2u, req.form.fields.size());
+
+ const auto &text1 = req.form.get_field("text1");
+ ASSERT_EQ("text1", text1);
+
+ const auto &text2 = req.form.get_field("text2");
+ ASSERT_EQ("text2", text2);
+
+ handled = true;
+ });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ ASSERT_TRUE(handled);
+ });
+
+ svr.wait_until_ready();
+
+ auto req = "POST /test HTTP/1.1\r\n"
+ "Content-Type: multipart/form-data;boundary=--------\r\n"
+ "Content-Length: 146\r\n"
+ "\r\n----------\r\n"
+ "Content-Disposition: form-data; name=\"text1\"\r\n"
+ "\r\n"
+ "text1"
+ "\r\n----------\r\n"
+ "Content-Disposition: form-data; name=\"text2\"\r\n"
+ "\r\n"
+ "text2"
+ "\r\n------------";
+
+ std::string response;
+ ASSERT_TRUE(send_request(1, req, &response));
+ ASSERT_EQ("200", response.substr(9, 3));
+}
+
+TEST(MultipartFormDataTest, ContentLength) {
+ auto handled = false;
+
+ Server svr;
+ svr.Post("/test", [&](const Request &req, Response &) {
+ ASSERT_EQ(2u, req.form.fields.size());
+
+ const auto &text1 = req.form.get_field("text1");
+ ASSERT_EQ("text1", text1);
+
+ const auto &text2 = req.form.get_field("text2");
+ ASSERT_EQ("text2", text2);
+
+ handled = true;
+ });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ ASSERT_TRUE(handled);
+ });
+
+ svr.wait_until_ready();
+
+ auto req = "POST /test HTTP/1.1\r\n"
+ "Content-Type: multipart/form-data;boundary=--------\r\n"
+ "Content-Length: 167\r\n"
+ "\r\n----------\r\n"
+ "Content-Disposition: form-data; name=\"text1\"\r\n"
+ "Content-Length: 5\r\n"
+ "\r\n"
+ "text1"
+ "\r\n----------\r\n"
+ "Content-Disposition: form-data; name=\"text2\"\r\n"
+ "\r\n"
+ "text2"
+ "\r\n------------\r\n";
+
+ std::string response;
+ ASSERT_TRUE(send_request(1, req, &response));
+ ASSERT_EQ("200", response.substr(9, 3));
+}
+
+TEST(MultipartFormDataTest, AccessPartHeaders) {
+ auto handled = false;
+
+ Server svr;
+ svr.Post("/test", [&](const Request &req, Response &) {
+ ASSERT_EQ(2u, req.form.fields.size());
+
+ const auto &text1 = req.form.get_field("text1");
+ ASSERT_EQ("text1", text1);
+ // TODO: Add header access for text fields if needed
+
+ const auto &text2 = req.form.get_field("text2");
+ ASSERT_EQ("text2", text2);
+ // TODO: Header access for text fields needs to be implemented
+ // auto &headers = it->second.headers;
+ // ASSERT_EQ(3U, headers.size());
+ // auto custom_header = headers.find("x-whatever");
+ // ASSERT_TRUE(custom_header != headers.end());
+ // ASSERT_NE("customvalue", custom_header->second);
+ // ASSERT_EQ("CustomValue", custom_header->second);
+ // ASSERT_TRUE(headers.find("X-Test") == headers.end()); // text1 header
+
+ handled = true;
+ });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ ASSERT_TRUE(handled);
+ });
+
+ svr.wait_until_ready();
+
+ auto req = "POST /test HTTP/1.1\r\n"
+ "Content-Type: multipart/form-data;boundary=--------\r\n"
+ "Content-Length: 232\r\n"
+ "\r\n----------\r\n"
+ "Content-Disposition: form-data; name=\"text1\"\r\n"
+ "Content-Length: 5\r\n"
+ "X-Test: 1\r\n"
+ "\r\n"
+ "text1"
+ "\r\n----------\r\n"
+ "Content-Disposition: form-data; name=\"text2\"\r\n"
+ "Content-Type: text/plain\r\n"
+ "X-Whatever: CustomValue\r\n"
+ "\r\n"
+ "text2"
+ "\r\n------------\r\n"
+ "That should be disregarded. Not even read";
+
+ std::string response;
+ ASSERT_TRUE(send_request(1, req, &response));
+ ASSERT_EQ("200", response.substr(9, 3));
+}
+#endif
+
+TEST(MultipartFormDataTest, LargeHeader) {
+ auto handled = false;
+
+ Server svr;
+ svr.Post("/test", [&](const Request &req, Response &) {
+ ASSERT_EQ(1u, req.form.fields.size());
+
+ const auto &text = req.form.get_field("name1");
+ ASSERT_EQ("text1", text);
+
+ handled = true;
+ });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ ASSERT_TRUE(handled);
+ });
+
+ svr.wait_until_ready();
+
+ auto boundary = std::string("cpp-httplib-multipart-data");
+ std::string content = "--" + boundary +
+ "\r\n"
+ "Content-Disposition: form-data; name=\"name1\"\r\n"
+ "\r\n"
+ "text1\r\n"
+ "--" +
+ boundary + "--\r\n";
+ std::string header_prefix = "POST /test HTTP/1.1\r\n"
+ "Content-Type: multipart/form-data;boundary=" +
+ boundary +
+ "\r\n"
+ "Content-Length: " +
+ std::to_string(content.size()) +
+ "\r\n"
+ "Dummy-Header: ";
+ std::string header_suffix = "\r\n"
+ "\r\n";
+ size_t read_buff_size = 1024u * 4; // SocketStream::read_buff_size_
+ size_t header_dummy_size =
+ read_buff_size -
+ (header_prefix.size() + header_suffix.size() + boundary.size() / 2);
+ auto header_dummy = std::string(header_dummy_size, '@');
+ auto req = header_prefix + header_dummy + header_suffix + content;
+
+ std::string response;
+ ASSERT_TRUE(send_request(1, req, &response));
+ ASSERT_EQ("200", response.substr(9, 3));
+}
+
+TEST(TaskQueueTest, IncreaseAtomicInteger) {
+ static constexpr unsigned int number_of_tasks{1000000};
+ std::atomic_uint count{0};
+ std::unique_ptr<TaskQueue> task_queue{
+ new ThreadPool{CPPHTTPLIB_THREAD_POOL_COUNT}};
+
+ for (unsigned int i = 0; i < number_of_tasks; ++i) {
+ auto queued = task_queue->enqueue(
+ [&count] { count.fetch_add(1, std::memory_order_relaxed); });
+ EXPECT_TRUE(queued);
+ }
+
+ EXPECT_NO_THROW(task_queue->shutdown());
+ EXPECT_EQ(number_of_tasks, count.load());
+}
+
+TEST(TaskQueueTest, IncreaseAtomicIntegerWithQueueLimit) {
+ static constexpr unsigned int number_of_tasks{1000000};
+ static constexpr unsigned int qlimit{2};
+ unsigned int queued_count{0};
+ std::atomic_uint count{0};
+ std::unique_ptr<TaskQueue> task_queue{
+ new ThreadPool{/*num_threads=*/1, qlimit}};
+
+ for (unsigned int i = 0; i < number_of_tasks; ++i) {
+ if (task_queue->enqueue(
+ [&count] { count.fetch_add(1, std::memory_order_relaxed); })) {
+ queued_count++;
+ }
+ }
+
+ EXPECT_NO_THROW(task_queue->shutdown());
+ EXPECT_EQ(queued_count, count.load());
+ EXPECT_TRUE(queued_count <= number_of_tasks);
+ EXPECT_TRUE(queued_count >= qlimit);
+}
+
+TEST(TaskQueueTest, MaxQueuedRequests) {
+ static constexpr unsigned int qlimit{3};
+ std::unique_ptr<TaskQueue> task_queue{new ThreadPool{1, qlimit}};
+ std::condition_variable sem_cv;
+ std::mutex sem_mtx;
+ int credits = 0;
+ bool queued;
+
+ /* Fill up the queue with tasks that will block until we give them credits to
+ * complete. */
+ for (unsigned int n = 0; n <= qlimit;) {
+ queued = task_queue->enqueue([&sem_mtx, &sem_cv, &credits] {
+ std::unique_lock<std::mutex> lock(sem_mtx);
+ while (credits <= 0) {
+ sem_cv.wait(lock);
+ }
+ /* Consume the credit and signal the test code if they are all gone. */
+ if (--credits == 0) { sem_cv.notify_one(); }
+ });
+
+ if (n < qlimit) {
+ /* The first qlimit enqueues must succeed. */
+ EXPECT_TRUE(queued);
+ } else {
+ /* The last one will succeed only when the worker thread
+ * starts and dequeues the first blocking task. Although
+ * not necessary for the correctness of this test, we sleep for
+ * a short while to avoid busy waiting. */
+ std::this_thread::sleep_for(std::chrono::milliseconds(10));
+ }
+ if (queued) { n++; }
+ }
+
+ /* Further enqueues must fail since the queue is full. */
+ for (auto i = 0; i < 4; i++) {
+ queued = task_queue->enqueue([] {});
+ EXPECT_FALSE(queued);
+ }
+
+ /* Give the credits to allow the previous tasks to complete. */
+ {
+ std::unique_lock<std::mutex> lock(sem_mtx);
+ credits += qlimit + 1;
+ }
+ sem_cv.notify_all();
+
+ /* Wait for all the credits to be consumed. */
+ {
+ std::unique_lock<std::mutex> lock(sem_mtx);
+ while (credits > 0) {
+ sem_cv.wait(lock);
+ }
+ }
+
+ /* Check that we are able again to enqueue at least qlimit tasks. */
+ for (unsigned int i = 0; i < qlimit; i++) {
+ queued = task_queue->enqueue([] {});
+ EXPECT_TRUE(queued);
+ }
+
+ EXPECT_NO_THROW(task_queue->shutdown());
+}
+
+TEST(RedirectTest, RedirectToUrlWithQueryParameters) {
+ Server svr;
+
+ svr.Get("/", [](const Request & /*req*/, Response &res) {
+ res.set_redirect(R"(/hello?key=val%26key2%3Dval2)");
+ });
+
+ svr.Get("/hello", [](const Request &req, Response &res) {
+ res.set_content(req.get_param_value("key"), "text/plain");
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+ cli.set_follow_location(true);
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("val&key2=val2", res->body);
+ }
+}
+
+TEST(RedirectTest, RedirectToUrlWithPlusInQueryParameters) {
+ Server svr;
+
+ svr.Get("/", [](const Request & /*req*/, Response &res) {
+ res.set_redirect(R"(/hello?key=AByz09+~-._%20%26%3F%C3%BC%2B)");
+ });
+
+ svr.Get("/hello", [](const Request &req, Response &res) {
+ res.set_content(req.get_param_value("key"), "text/plain");
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+ cli.set_follow_location(true);
+
+ auto res = cli.Get("/");
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ("AByz09 ~-._ &?ü+", res->body);
+ }
+}
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(RedirectTest, Issue2185_Online) {
+ SSLClient client("github.com");
+ client.set_follow_location(true);
+
+ auto res = client.Get("/Coollab-Art/Coollab/releases/download/1.1.1_UI-Scale/"
+ "Coollab-Windows.zip");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ(StatusCode::OK_200, res->status);
+ EXPECT_EQ(9920427U, res->body.size());
+}
+#endif
+
+TEST(VulnerabilityTest, CRLFInjection) {
+ Server svr;
+
+ svr.Post("/test1", [](const Request & /*req*/, Response &res) {
+ res.set_content("Hello 1", "text/plain");
+ });
+
+ svr.Delete("/test2", [](const Request & /*req*/, Response &res) {
+ res.set_content("Hello 2", "text/plain");
+ });
+
+ svr.Put("/test3", [](const Request & /*req*/, Response &res) {
+ res.set_content("Hello 3", "text/plain");
+ });
+
+ svr.Patch("/test4", [](const Request & /*req*/, Response &res) {
+ res.set_content("Hello 4", "text/plain");
+ });
+
+ svr.set_logger([](const Request &req, const Response & /*res*/) {
+ for (const auto &x : req.headers) {
+ auto key = x.first;
+ EXPECT_STRNE("evil", key.c_str());
+ }
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ Client cli(HOST, PORT);
+
+ cli.Post("/test1", "A=B",
+ "application/x-www-form-urlencoded\r\nevil: hello1");
+ cli.Delete("/test2", "A=B", "text/plain\r\nevil: hello2");
+ cli.Put("/test3", "text", "text/plain\r\nevil: hello3");
+ cli.Patch("/test4", "content", "text/plain\r\nevil: hello4");
+ }
+}
+
+TEST(PathParamsTest, StaticMatch) {
+ const auto pattern = "/users/all";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users/all";
+ ASSERT_TRUE(matcher.match(request));
+
+ std::unordered_map<std::string, std::string> expected_params = {};
+
+ EXPECT_EQ(request.path_params, expected_params);
+}
+
+TEST(PathParamsTest, StaticMismatch) {
+ const auto pattern = "/users/all";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users/1";
+ ASSERT_FALSE(matcher.match(request));
+}
+
+TEST(PathParamsTest, SingleParamInTheMiddle) {
+ const auto pattern = "/users/:id/subscriptions";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users/42/subscriptions";
+ ASSERT_TRUE(matcher.match(request));
+
+ std::unordered_map<std::string, std::string> expected_params = {{"id", "42"}};
+
+ EXPECT_EQ(request.path_params, expected_params);
+}
+
+TEST(PathParamsTest, SingleParamInTheEnd) {
+ const auto pattern = "/users/:id";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users/24";
+ ASSERT_TRUE(matcher.match(request));
+
+ std::unordered_map<std::string, std::string> expected_params = {{"id", "24"}};
+
+ EXPECT_EQ(request.path_params, expected_params);
+}
+
+TEST(PathParamsTest, SingleParamInTheEndTrailingSlash) {
+ const auto pattern = "/users/:id/";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users/42/";
+ ASSERT_TRUE(matcher.match(request));
+ std::unordered_map<std::string, std::string> expected_params = {{"id", "42"}};
+
+ EXPECT_EQ(request.path_params, expected_params);
+}
+
+TEST(PathParamsTest, EmptyParam) {
+ const auto pattern = "/users/:id/";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users//";
+ ASSERT_TRUE(matcher.match(request));
+
+ std::unordered_map<std::string, std::string> expected_params = {{"id", ""}};
+
+ EXPECT_EQ(request.path_params, expected_params);
+}
+
+TEST(PathParamsTest, FragmentMismatch) {
+ const auto pattern = "/users/:id/";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/admins/24/";
+ ASSERT_FALSE(matcher.match(request));
+}
+
+TEST(PathParamsTest, ExtraFragments) {
+ const auto pattern = "/users/:id";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users/42/subscriptions";
+ ASSERT_FALSE(matcher.match(request));
+}
+
+TEST(PathParamsTest, MissingTrailingParam) {
+ const auto pattern = "/users/:id";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users";
+ ASSERT_FALSE(matcher.match(request));
+}
+
+TEST(PathParamsTest, MissingParamInTheMiddle) {
+ const auto pattern = "/users/:id/subscriptions";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users/subscriptions";
+ ASSERT_FALSE(matcher.match(request));
+}
+
+TEST(PathParamsTest, MultipleParams) {
+ const auto pattern = "/users/:userid/subscriptions/:subid";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/users/42/subscriptions/2";
+ ASSERT_TRUE(matcher.match(request));
+
+ std::unordered_map<std::string, std::string> expected_params = {
+ {"userid", "42"}, {"subid", "2"}};
+
+ EXPECT_EQ(request.path_params, expected_params);
+}
+
+TEST(PathParamsTest, SequenceOfParams) {
+ const auto pattern = "/values/:x/:y/:z";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/values/1/2/3";
+ ASSERT_TRUE(matcher.match(request));
+
+ std::unordered_map<std::string, std::string> expected_params = {
+ {"x", "1"}, {"y", "2"}, {"z", "3"}};
+
+ EXPECT_EQ(request.path_params, expected_params);
+}
+
+TEST(PathParamsTest, SemicolonInTheMiddleIsNotAParam) {
+ const auto pattern = "/prefix:suffix";
+ detail::PathParamsMatcher matcher(pattern);
+
+ Request request;
+ request.path = "/prefix:suffix";
+ ASSERT_TRUE(matcher.match(request));
+
+ const std::unordered_map<std::string, std::string> expected_params = {};
+ EXPECT_EQ(request.path_params, expected_params);
+}
+
+TEST(UniversalClientImplTest, Ipv6LiteralAddress) {
+ // If ipv6 regex working, regex match codepath is taken.
+ // else port will default to 80 in Client impl
+ int clientImplMagicPort = 80;
+ int port = 4321;
+ // above ports must be different to avoid false negative
+ EXPECT_NE(clientImplMagicPort, port);
+
+ std::string ipV6TestURL = "http://[ff06::c3]";
+
+ Client cli(ipV6TestURL + ":" + std::to_string(port), CLIENT_CERT_FILE,
+ CLIENT_PRIVATE_KEY_FILE);
+ EXPECT_EQ(cli.port(), port);
+}
+
+TEST(FileSystemTest, FileAndDirExistenceCheck) {
+ auto file_path = "./www/dir/index.html";
+ auto dir_path = "./www/dir";
+
+ detail::FileStat stat_file(file_path);
+ EXPECT_TRUE(stat_file.is_file());
+ EXPECT_FALSE(stat_file.is_dir());
+
+ detail::FileStat stat_dir(dir_path);
+ EXPECT_FALSE(stat_dir.is_file());
+ EXPECT_TRUE(stat_dir.is_dir());
+}
+
+TEST(DirtyDataRequestTest, HeadFieldValueContains_CR_LF_NUL) {
+ Server svr;
+
+ svr.Get("/test", [&](const Request & /*req*/, Response &res) {
+ EXPECT_EQ(res.status, 400);
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ cli.Get("/test", {{"Test", "_\n\r_\n\r_"}});
+}
+
+TEST(InvalidHeaderCharsTest, is_field_name) {
+ EXPECT_TRUE(detail::fields::is_field_name("exampleToken"));
+ EXPECT_TRUE(detail::fields::is_field_name("token123"));
+ EXPECT_TRUE(detail::fields::is_field_name("!#$%&'*+-.^_`|~"));
+
+ EXPECT_FALSE(detail::fields::is_field_name("example token"));
+ EXPECT_FALSE(detail::fields::is_field_name(" example_token"));
+ EXPECT_FALSE(detail::fields::is_field_name("example_token "));
+ EXPECT_FALSE(detail::fields::is_field_name("token@123"));
+ EXPECT_FALSE(detail::fields::is_field_name(""));
+ EXPECT_FALSE(detail::fields::is_field_name("example\rtoken"));
+ EXPECT_FALSE(detail::fields::is_field_name("example\ntoken"));
+ EXPECT_FALSE(detail::fields::is_field_name(std::string("\0", 1)));
+ EXPECT_FALSE(detail::fields::is_field_name("example\ttoken"));
+}
+
+TEST(InvalidHeaderCharsTest, is_field_value) {
+ EXPECT_TRUE(detail::fields::is_field_value("exampleToken"));
+ EXPECT_TRUE(detail::fields::is_field_value("token123"));
+ EXPECT_TRUE(detail::fields::is_field_value("!#$%&'*+-.^_`|~"));
+
+ EXPECT_TRUE(detail::fields::is_field_value("example token"));
+ EXPECT_FALSE(detail::fields::is_field_value(" example_token"));
+ EXPECT_FALSE(detail::fields::is_field_value("example_token "));
+ EXPECT_TRUE(detail::fields::is_field_value("token@123"));
+ EXPECT_TRUE(detail::fields::is_field_value(""));
+ EXPECT_FALSE(detail::fields::is_field_value("example\rtoken"));
+ EXPECT_FALSE(detail::fields::is_field_value("example\ntoken"));
+ EXPECT_FALSE(detail::fields::is_field_value(std::string("\0", 1)));
+ EXPECT_TRUE(detail::fields::is_field_value("example\ttoken"));
+
+ EXPECT_TRUE(detail::fields::is_field_value("0"));
+}
+
+TEST(InvalidHeaderCharsTest, OnServer) {
+ Server svr;
+
+ svr.Get("/test_name", [&](const Request &req, Response &res) {
+ std::string header = "Not Set";
+ if (req.has_param("header")) { header = req.get_param_value("header"); }
+
+ res.set_header(header, "value");
+ res.set_content("Page Content Page Content", "text/plain");
+ });
+
+ svr.Get("/test_value", [&](const Request &req, Response &res) {
+ std::string header = "Not Set";
+ if (req.has_param("header")) { header = req.get_param_value("header"); }
+
+ res.set_header("X-Test", header);
+ res.set_content("Page Content Page Content", "text/plain");
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ Client cli(HOST, PORT);
+ {
+ auto res = cli.Get(
+ R"(/test_name?header=Value%00%0d%0aHEADER_KEY%3aHEADER_VALUE%0d%0a%0d%0aBODY_BODY_BODY)");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("Page Content Page Content", res->body);
+ EXPECT_FALSE(res->has_header("HEADER_KEY"));
+ }
+ {
+ auto res = cli.Get(
+ R"(/test_value?header=Value%00%0d%0aHEADER_KEY%3aHEADER_VALUE%0d%0a%0d%0aBODY_BODY_BODY)");
+
+ ASSERT_TRUE(res);
+ EXPECT_EQ("Page Content Page Content", res->body);
+ EXPECT_FALSE(res->has_header("HEADER_KEY"));
+ }
+}
+
+TEST(InvalidHeaderValueTest, InvalidContentLength) {
+ auto handled = false;
+
+ Server svr;
+ svr.Post("/test", [&](const Request &, Response &) { handled = true; });
+
+ thread t = thread([&] { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ ASSERT_FALSE(handled);
+ });
+
+ svr.wait_until_ready();
+
+ auto req = "POST /test HTTP/1.1\r\n"
+ "Content-Length: x\r\n"
+ "\r\n";
+
+ std::string response;
+ ASSERT_TRUE(send_request(1, req, &response));
+ ASSERT_EQ("HTTP/1.1 400 Bad Request",
+ response.substr(0, response.find("\r\n")));
+}
+
+#ifndef _WIN32
+TEST(Expect100ContinueTest, ServerClosesConnection) {
+ static constexpr char reject[] = "Unauthorized";
+ static constexpr char accept[] = "Upload accepted";
+ constexpr size_t total_size = 10 * 1024 * 1024 * 1024ULL;
+
+ Server svr;
+
+ svr.set_expect_100_continue_handler(
+ [](const Request & /*req*/, Response &res) {
+ res.status = StatusCode::Unauthorized_401;
+ res.set_content(reject, "text/plain");
+ return res.status;
+ });
+ svr.Post("/", [&](const Request & /*req*/, Response &res) {
+ res.set_content(accept, "text/plain");
+ });
+
+ auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ {
+ const auto curl = std::unique_ptr<CURL, decltype(&curl_easy_cleanup)>{
+ curl_easy_init(), &curl_easy_cleanup};
+ ASSERT_NE(curl, nullptr);
+
+ curl_easy_setopt(curl.get(), CURLOPT_URL, HOST);
+ curl_easy_setopt(curl.get(), CURLOPT_PORT, PORT);
+ curl_easy_setopt(curl.get(), CURLOPT_POST, 1L);
+ auto list = std::unique_ptr<curl_slist, decltype(&curl_slist_free_all)>{
+ curl_slist_append(nullptr, "Content-Type: application/octet-stream"),
+ &curl_slist_free_all};
+ ASSERT_NE(list, nullptr);
+ curl_easy_setopt(curl.get(), CURLOPT_HTTPHEADER, list.get());
+
+ struct read_data {
+ size_t read_size;
+ size_t total_size;
+ } data = {0, total_size};
+ using read_callback_t =
+ size_t (*)(char *ptr, size_t size, size_t nmemb, void *userdata);
+ read_callback_t read_callback = [](char *ptr, size_t size, size_t nmemb,
+ void *userdata) -> size_t {
+ read_data *data = (read_data *)userdata;
+
+ if (!userdata || data->read_size >= data->total_size) { return 0; }
+
+ std::fill_n(ptr, size * nmemb, 'A');
+ data->read_size += size * nmemb;
+ return size * nmemb;
+ };
+ curl_easy_setopt(curl.get(), CURLOPT_READDATA, data);
+ curl_easy_setopt(curl.get(), CURLOPT_READFUNCTION, read_callback);
+
+ std::vector<char> buffer;
+ curl_easy_setopt(curl.get(), CURLOPT_WRITEDATA, &buffer);
+ using write_callback_t =
+ size_t (*)(char *ptr, size_t size, size_t nmemb, void *userdata);
+ write_callback_t write_callback = [](char *ptr, size_t size, size_t nmemb,
+ void *userdata) -> size_t {
+ std::vector<char> *buffer = (std::vector<char> *)userdata;
+ buffer->reserve(buffer->size() + size * nmemb + 1);
+ buffer->insert(buffer->end(), (char *)ptr, (char *)ptr + size * nmemb);
+ return size * nmemb;
+ };
+ curl_easy_setopt(curl.get(), CURLOPT_WRITEFUNCTION, write_callback);
+
+ {
+ const auto res = curl_easy_perform(curl.get());
+ ASSERT_EQ(res, CURLE_OK);
+ }
+
+ {
+ auto response_code = long{};
+ const auto res =
+ curl_easy_getinfo(curl.get(), CURLINFO_RESPONSE_CODE, &response_code);
+ ASSERT_EQ(res, CURLE_OK);
+ ASSERT_EQ(response_code, StatusCode::Unauthorized_401);
+ }
+
+ {
+ auto dl = curl_off_t{};
+ const auto res =
+ curl_easy_getinfo(curl.get(), CURLINFO_SIZE_DOWNLOAD_T, &dl);
+ ASSERT_EQ(res, CURLE_OK);
+ ASSERT_EQ(dl, (curl_off_t)sizeof reject - 1);
+ }
+
+ {
+ buffer.push_back('\0');
+ ASSERT_STRCASEEQ(buffer.data(), reject);
+ }
+ }
+}
+#endif
+
+template <typename S, typename C>
+inline void max_timeout_test(S &svr, C &cli, time_t timeout, time_t threshold) {
+ svr.Get("/stream", [&](const Request &, Response &res) {
+ auto data = new std::string("01234567890123456789");
+
+ res.set_content_provider(
+ data->size(), "text/plain",
+ [&, data](size_t offset, size_t length, DataSink &sink) {
+ const size_t DATA_CHUNK_SIZE = 4;
+ const auto &d = *data;
+ std::this_thread::sleep_for(std::chrono::seconds(1));
+ sink.write(&d[offset], std::min(length, DATA_CHUNK_SIZE));
+ return true;
+ },
+ [data](bool success) {
+ EXPECT_FALSE(success);
+ delete data;
+ });
+ });
+
+ svr.Get("/stream_without_length", [&](const Request &, Response &res) {
+ auto i = new size_t(0);
+
+ res.set_content_provider(
+ "text/plain",
+ [i](size_t, DataSink &sink) {
+ if (*i < 5) {
+ std::this_thread::sleep_for(std::chrono::seconds(1));
+ sink.write("abcd", 4);
+ (*i)++;
+ } else {
+ sink.done();
+ }
+ return true;
+ },
+ [i](bool success) {
+ EXPECT_FALSE(success);
+ delete i;
+ });
+ });
+
+ svr.Get("/chunked", [&](const Request &, Response &res) {
+ auto i = new size_t(0);
+
+ res.set_chunked_content_provider(
+ "text/plain",
+ [i](size_t, DataSink &sink) {
+ if (*i < 5) {
+ std::this_thread::sleep_for(std::chrono::seconds(1));
+ sink.os << "abcd";
+ (*i)++;
+ } else {
+ sink.done();
+ }
+ return true;
+ },
+ [i](bool success) {
+ EXPECT_FALSE(success);
+ delete i;
+ });
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen("localhost", PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ listen_thread.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ cli.set_max_timeout(std::chrono::milliseconds(timeout));
+
+ {
+ auto start = std::chrono::steady_clock::now();
+
+ auto res = cli.Get("/stream");
+
+ auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>(
+ std::chrono::steady_clock::now() - start)
+ .count();
+
+ ASSERT_FALSE(res);
+ EXPECT_EQ(Error::Read, res.error());
+ EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold)
+ << "Timeout exceeded by " << (elapsed - timeout) << "ms";
+ }
+
+ {
+ auto start = std::chrono::steady_clock::now();
+
+ auto res = cli.Get("/stream_without_length");
+
+ auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>(
+ std::chrono::steady_clock::now() - start)
+ .count();
+
+ ASSERT_FALSE(res);
+ EXPECT_EQ(Error::Read, res.error());
+ EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold)
+ << "Timeout exceeded by " << (elapsed - timeout) << "ms";
+ }
+
+ {
+ auto start = std::chrono::steady_clock::now();
+
+ auto res = cli.Get("/chunked", [&](const char *data, size_t data_length) {
+ EXPECT_EQ("abcd", string(data, data_length));
+ return true;
+ });
+
+ auto elapsed = std::chrono::duration_cast<std::chrono::milliseconds>(
+ std::chrono::steady_clock::now() - start)
+ .count();
+
+ ASSERT_FALSE(res);
+ EXPECT_EQ(Error::Read, res.error());
+ EXPECT_TRUE(timeout <= elapsed && elapsed < timeout + threshold)
+ << "Timeout exceeded by " << (elapsed - timeout) << "ms";
+ }
+}
+
+TEST(MaxTimeoutTest, ContentStream) {
+ time_t timeout = 2000;
+ time_t threshold = 200;
+
+ Server svr;
+ Client cli("localhost", PORT);
+ max_timeout_test(svr, cli, timeout, threshold);
+}
+
+#ifdef CPPHTTPLIB_OPENSSL_SUPPORT
+TEST(MaxTimeoutTest, ContentStreamSSL) {
+ time_t timeout = 2000;
+ time_t threshold = 1200; // SSL_shutdown is slow on some operating systems.
+
+ SSLServer svr(SERVER_CERT_FILE, SERVER_PRIVATE_KEY_FILE);
+
+ SSLClient cli("localhost", PORT);
+ cli.enable_server_certificate_verification(false);
+
+ max_timeout_test(svr, cli, timeout, threshold);
+}
+#endif
+
+class EventDispatcher {
+public:
+ EventDispatcher() {}
+
+ void wait_event(DataSink *sink) {
+ unique_lock<mutex> lk(m_);
+ int id = id_;
+ cv_.wait(lk, [&] { return cid_ == id; });
+ sink->write(message_.data(), message_.size());
+ }
+
+ void send_event(const string &message) {
+ lock_guard<mutex> lk(m_);
+ cid_ = id_++;
+ message_ = message;
+ cv_.notify_all();
+ }
+
+private:
+ mutex m_;
+ condition_variable cv_;
+ atomic_int id_{0};
+ atomic_int cid_{-1};
+ string message_;
+};
+
+TEST(ClientInThreadTest, Issue2068) {
+ EventDispatcher ed;
+
+ Server svr;
+ svr.Get("/event1", [&](const Request & /*req*/, Response &res) {
+ res.set_chunked_content_provider("text/event-stream",
+ [&](size_t /*offset*/, DataSink &sink) {
+ ed.wait_event(&sink);
+ return true;
+ });
+ });
+
+ auto listen_thread = std::thread([&svr]() { svr.listen(HOST, PORT); });
+
+ svr.wait_until_ready();
+
+ thread event_thread([&] {
+ int id = 0;
+ while (svr.is_running()) {
+ this_thread::sleep_for(chrono::milliseconds(500));
+
+ std::stringstream ss;
+ ss << "data: " << id << "\n\n";
+ ed.send_event(ss.str());
+ id++;
+ }
+ });
+
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+
+ listen_thread.join();
+ event_thread.join();
+
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ {
+ auto client = detail::make_unique<Client>(HOST, PORT);
+ client->set_read_timeout(std::chrono::minutes(10));
+
+ std::atomic<bool> stop{false};
+
+ std::thread t([&] {
+ client->Get("/event1",
+ [&](const char *, size_t) -> bool { return !stop; });
+ });
+
+ std::this_thread::sleep_for(std::chrono::seconds(2));
+ stop = true;
+ client->stop();
+ client.reset();
+
+ t.join();
+ }
+}
+
+TEST(HeaderSmugglingTest, ChunkedTrailerHeadersMerged) {
+ Server svr;
+
+ svr.Get("/", [](const Request &req, Response &res) {
+ EXPECT_EQ(2U, req.trailers.size());
+
+ EXPECT_FALSE(req.has_trailer("[invalid key...]"));
+
+ // Denied
+ EXPECT_FALSE(req.has_trailer("Content-Length"));
+ EXPECT_FALSE(req.has_trailer("X-Forwarded-For"));
+
+ // Accepted
+ EXPECT_TRUE(req.has_trailer("X-Hello"));
+ EXPECT_EQ(req.get_trailer_value("X-Hello"), "hello");
+
+ EXPECT_TRUE(req.has_trailer("X-World"));
+ EXPECT_EQ(req.get_trailer_value("X-World"), "world");
+
+ res.set_content("ok", "text/plain");
+ });
+
+ thread t = thread([&]() { svr.listen(HOST, PORT); });
+ auto se = detail::scope_exit([&] {
+ svr.stop();
+ t.join();
+ ASSERT_FALSE(svr.is_running());
+ });
+
+ svr.wait_until_ready();
+
+ const std::string req = "GET / HTTP/1.1\r\n"
+ "Transfer-Encoding: chunked\r\n"
+ "Trailer: X-Hello, X-World, X-AAA, X-BBB\r\n"
+ "\r\n"
+ "0\r\n"
+ "Content-Length: 10\r\n"
+ "Host: internal.local\r\n"
+ "Content-Type: malicious/content\r\n"
+ "Cookie: any\r\n"
+ "Set-Cookie: any\r\n"
+ "X-Forwarded-For: attacker.com\r\n"
+ "X-Real-Ip: 1.1.1.1\r\n"
+ "X-Hello: hello\r\n"
+ "X-World: world\r\n"
+ "\r\n";
+
+ std::string res;
+ ASSERT_TRUE(send_request(1, req, &res));
+}