QNAM: Fix upload corruptions when server closes connection

This patch fixes several upload corruptions if the server closes the connection
while/before we send data into it. They happen inside multiple places in the HTTP
layer and are explained in the comments.
Corruptions are:
* The upload byte device has an in-flight signal with pending upload data, if
it gets reset (because server closes the connection) then the re-send of the
request was sometimes taking this stale in-flight pending upload data.
* Because some signals were DirectConnection and some were QueuedConnection, there
was a chance that a direct signal overtakes a queued signal. The state machine
then sent data down the socket which was buffered there (and sent later) although
it did not match the current state of the state machine when it was actually sent.
* A socket was seen as being able to have requests sent even though it was not
encrypted yet. This relates to the previous corruption where data is stored inside
the socket's buffer and then sent later.

The included auto test produces all fixed corruptions, I detected no regressions
via the other tests.
This code also adds a bit of sanity checking to protect from possible further
problems.

[ChangeLog][QtNetwork] Fix HTTP(s) upload corruption when server closes connection

Change-Id: I54c883925ec897050941498f139c4b523030432e
Reviewed-by: Peter Hartmann <peter-qt@hartmann.tk>
This commit is contained in:
Markus Goetz 2015-04-10 14:09:53 +02:00 committed by Olivier Goffart (Woboq GmbH)
parent 68c137cc72
commit cff39fba10
9 changed files with 279 additions and 30 deletions

View File

@ -236,6 +236,11 @@ qint64 QNonContiguousByteDeviceByteArrayImpl::size()
return byteArray->size(); return byteArray->size();
} }
qint64 QNonContiguousByteDeviceByteArrayImpl::pos()
{
return currentPosition;
}
QNonContiguousByteDeviceRingBufferImpl::QNonContiguousByteDeviceRingBufferImpl(QSharedPointer<QRingBuffer> rb) QNonContiguousByteDeviceRingBufferImpl::QNonContiguousByteDeviceRingBufferImpl(QSharedPointer<QRingBuffer> rb)
: QNonContiguousByteDevice(), currentPosition(0) : QNonContiguousByteDevice(), currentPosition(0)
{ {
@ -273,6 +278,11 @@ bool QNonContiguousByteDeviceRingBufferImpl::atEnd()
return currentPosition >= size(); return currentPosition >= size();
} }
qint64 QNonContiguousByteDeviceRingBufferImpl::pos()
{
return currentPosition;
}
bool QNonContiguousByteDeviceRingBufferImpl::reset() bool QNonContiguousByteDeviceRingBufferImpl::reset()
{ {
if (resetDisabled) if (resetDisabled)
@ -406,6 +416,14 @@ qint64 QNonContiguousByteDeviceIoDeviceImpl::size()
return device->size() - initialPosition; return device->size() - initialPosition;
} }
qint64 QNonContiguousByteDeviceIoDeviceImpl::pos()
{
if (device->isSequential())
return -1;
return device->pos();
}
QByteDeviceWrappingIoDevice::QByteDeviceWrappingIoDevice(QNonContiguousByteDevice *bd) : QIODevice((QObject*)0) QByteDeviceWrappingIoDevice::QByteDeviceWrappingIoDevice(QNonContiguousByteDevice *bd) : QIODevice((QObject*)0)
{ {
byteDevice = bd; byteDevice = bd;

View File

@ -61,6 +61,7 @@ public:
virtual const char* readPointer(qint64 maximumLength, qint64 &len) = 0; virtual const char* readPointer(qint64 maximumLength, qint64 &len) = 0;
virtual bool advanceReadPointer(qint64 amount) = 0; virtual bool advanceReadPointer(qint64 amount) = 0;
virtual bool atEnd() = 0; virtual bool atEnd() = 0;
virtual qint64 pos() { return -1; }
virtual bool reset() = 0; virtual bool reset() = 0;
void disableReset(); void disableReset();
bool isResetDisabled() { return resetDisabled; } bool isResetDisabled() { return resetDisabled; }
@ -106,6 +107,7 @@ public:
bool atEnd(); bool atEnd();
bool reset(); bool reset();
qint64 size(); qint64 size();
qint64 pos() Q_DECL_OVERRIDE;
protected: protected:
QByteArray* byteArray; QByteArray* byteArray;
qint64 currentPosition; qint64 currentPosition;
@ -121,6 +123,7 @@ public:
bool atEnd(); bool atEnd();
bool reset(); bool reset();
qint64 size(); qint64 size();
qint64 pos() Q_DECL_OVERRIDE;
protected: protected:
QSharedPointer<QRingBuffer> ringBuffer; QSharedPointer<QRingBuffer> ringBuffer;
qint64 currentPosition; qint64 currentPosition;
@ -138,6 +141,7 @@ public:
bool atEnd(); bool atEnd();
bool reset(); bool reset();
qint64 size(); qint64 size();
qint64 pos() Q_DECL_OVERRIDE;
protected: protected:
QIODevice* device; QIODevice* device;
QByteArray* currentReadBuffer; QByteArray* currentReadBuffer;

View File

@ -106,15 +106,19 @@ void QHttpNetworkConnectionChannel::init()
socket->setProxy(QNetworkProxy::NoProxy); socket->setProxy(QNetworkProxy::NoProxy);
#endif #endif
// We want all signals (except the interactive ones) be connected as QueuedConnection
// because else we're falling into cases where we recurse back into the socket code
// and mess up the state. Always going to the event loop (and expecting that when reading/writing)
// is safer.
QObject::connect(socket, SIGNAL(bytesWritten(qint64)), QObject::connect(socket, SIGNAL(bytesWritten(qint64)),
this, SLOT(_q_bytesWritten(qint64)), this, SLOT(_q_bytesWritten(qint64)),
Qt::DirectConnection); Qt::QueuedConnection);
QObject::connect(socket, SIGNAL(connected()), QObject::connect(socket, SIGNAL(connected()),
this, SLOT(_q_connected()), this, SLOT(_q_connected()),
Qt::DirectConnection); Qt::QueuedConnection);
QObject::connect(socket, SIGNAL(readyRead()), QObject::connect(socket, SIGNAL(readyRead()),
this, SLOT(_q_readyRead()), this, SLOT(_q_readyRead()),
Qt::DirectConnection); Qt::QueuedConnection);
// The disconnected() and error() signals may already come // The disconnected() and error() signals may already come
// while calling connectToHost(). // while calling connectToHost().
@ -143,13 +147,13 @@ void QHttpNetworkConnectionChannel::init()
// won't be a sslSocket if encrypt is false // won't be a sslSocket if encrypt is false
QObject::connect(sslSocket, SIGNAL(encrypted()), QObject::connect(sslSocket, SIGNAL(encrypted()),
this, SLOT(_q_encrypted()), this, SLOT(_q_encrypted()),
Qt::DirectConnection); Qt::QueuedConnection);
QObject::connect(sslSocket, SIGNAL(sslErrors(QList<QSslError>)), QObject::connect(sslSocket, SIGNAL(sslErrors(QList<QSslError>)),
this, SLOT(_q_sslErrors(QList<QSslError>)), this, SLOT(_q_sslErrors(QList<QSslError>)),
Qt::DirectConnection); Qt::DirectConnection);
QObject::connect(sslSocket, SIGNAL(encryptedBytesWritten(qint64)), QObject::connect(sslSocket, SIGNAL(encryptedBytesWritten(qint64)),
this, SLOT(_q_encryptedBytesWritten(qint64)), this, SLOT(_q_encryptedBytesWritten(qint64)),
Qt::DirectConnection); Qt::QueuedConnection);
if (ignoreAllSslErrors) if (ignoreAllSslErrors)
sslSocket->ignoreSslErrors(); sslSocket->ignoreSslErrors();
@ -186,8 +190,11 @@ void QHttpNetworkConnectionChannel::close()
// pendingEncrypt must only be true in between connected and encrypted states // pendingEncrypt must only be true in between connected and encrypted states
pendingEncrypt = false; pendingEncrypt = false;
if (socket) if (socket) {
// socket can be 0 since the host lookup is done from qhttpnetworkconnection.cpp while
// there is no socket yet.
socket->close(); socket->close();
}
} }
@ -353,6 +360,14 @@ bool QHttpNetworkConnectionChannel::ensureConnection()
} }
return false; return false;
} }
// This code path for ConnectedState
if (pendingEncrypt) {
// Let's only be really connected when we have received the encrypted() signal. Else the state machine seems to mess up
// and corrupt the things sent to the server.
return false;
}
return true; return true;
} }
@ -659,6 +674,12 @@ bool QHttpNetworkConnectionChannel::isSocketReading() const
void QHttpNetworkConnectionChannel::_q_bytesWritten(qint64 bytes) void QHttpNetworkConnectionChannel::_q_bytesWritten(qint64 bytes)
{ {
Q_UNUSED(bytes); Q_UNUSED(bytes);
if (ssl) {
// In the SSL case we want to send data from encryptedBytesWritten signal since that one
// is the one going down to the actual network, not only into some SSL buffer.
return;
}
// bytes have been written to the socket. write even more of them :) // bytes have been written to the socket. write even more of them :)
if (isSocketWriting()) if (isSocketWriting())
sendRequest(); sendRequest();
@ -734,7 +755,7 @@ void QHttpNetworkConnectionChannel::_q_connected()
// ### FIXME: if the server closes the connection unexpectedly, we shouldn't send the same broken request again! // ### FIXME: if the server closes the connection unexpectedly, we shouldn't send the same broken request again!
//channels[i].reconnectAttempts = 2; //channels[i].reconnectAttempts = 2;
if (pendingEncrypt) { if (ssl || pendingEncrypt) { // FIXME: Didn't work properly with pendingEncrypt only, we should refactor this into an EncrypingState
#ifndef QT_NO_SSL #ifndef QT_NO_SSL
if (connection->sslContext().isNull()) { if (connection->sslContext().isNull()) {
// this socket is making the 1st handshake for this connection, // this socket is making the 1st handshake for this connection,

View File

@ -83,6 +83,8 @@ typedef QPair<QHttpNetworkRequest, QHttpNetworkReply*> HttpMessagePair;
class QHttpNetworkConnectionChannel : public QObject { class QHttpNetworkConnectionChannel : public QObject {
Q_OBJECT Q_OBJECT
public: public:
// TODO: Refactor this to add an EncryptingState (and remove pendingEncrypt).
// Also add an Unconnected state so IdleState does not have double meaning.
enum ChannelState { enum ChannelState {
IdleState = 0, // ready to send request IdleState = 0, // ready to send request
ConnectingState = 1, // connecting to host ConnectingState = 1, // connecting to host

View File

@ -368,6 +368,13 @@ bool QHttpProtocolHandler::sendRequest()
// nothing to read currently, break the loop // nothing to read currently, break the loop
break; break;
} else { } else {
if (m_channel->written != uploadByteDevice->pos()) {
// Sanity check. This was useful in tracking down an upload corruption.
qWarning() << "QHttpProtocolHandler: Internal error in sendRequest. Expected to write at position" << m_channel->written << "but read device is at" << uploadByteDevice->pos();
Q_ASSERT(m_channel->written == uploadByteDevice->pos());
m_connection->d_func()->emitReplyError(m_socket, m_reply, QNetworkReply::ProtocolFailure);
return false;
}
qint64 currentWriteSize = m_socket->write(readPointer, currentReadSize); qint64 currentWriteSize = m_socket->write(readPointer, currentReadSize);
if (currentWriteSize == -1 || currentWriteSize != currentReadSize) { if (currentWriteSize == -1 || currentWriteSize != currentReadSize) {
// socket broke down // socket broke down

View File

@ -187,6 +187,7 @@ protected:
QByteArray m_dataArray; QByteArray m_dataArray;
bool m_atEnd; bool m_atEnd;
qint64 m_size; qint64 m_size;
qint64 m_pos; // to match calls of haveDataSlot with the expected position
public: public:
QNonContiguousByteDeviceThreadForwardImpl(bool aE, qint64 s) QNonContiguousByteDeviceThreadForwardImpl(bool aE, qint64 s)
: QNonContiguousByteDevice(), : QNonContiguousByteDevice(),
@ -194,7 +195,8 @@ public:
m_amount(0), m_amount(0),
m_data(0), m_data(0),
m_atEnd(aE), m_atEnd(aE),
m_size(s) m_size(s),
m_pos(0)
{ {
} }
@ -202,6 +204,11 @@ public:
{ {
} }
qint64 pos() Q_DECL_OVERRIDE
{
return m_pos;
}
const char* readPointer(qint64 maximumLength, qint64 &len) const char* readPointer(qint64 maximumLength, qint64 &len)
{ {
if (m_amount > 0) { if (m_amount > 0) {
@ -229,11 +236,10 @@ public:
m_amount -= a; m_amount -= a;
m_data += a; m_data += a;
m_pos += a;
// To main thread to inform about our state // To main thread to inform about our state. The m_pos will be sent as a sanity check.
emit processedData(a); emit processedData(m_pos, a);
// FIXME possible optimization, already ask user thread for some data
return true; return true;
} }
@ -250,10 +256,21 @@ public:
{ {
m_amount = 0; m_amount = 0;
m_data = 0; m_data = 0;
m_dataArray.clear();
if (wantDataPending) {
// had requested the user thread to send some data (only 1 in-flight at any moment)
wantDataPending = false;
}
// Communicate as BlockingQueuedConnection // Communicate as BlockingQueuedConnection
bool b = false; bool b = false;
emit resetData(&b); emit resetData(&b);
if (b) {
// the reset succeeded, we're at pos 0 again
m_pos = 0;
// the HTTP code will anyway abort the request if !b.
}
return b; return b;
} }
@ -264,8 +281,13 @@ public:
public slots: public slots:
// From user thread: // From user thread:
void haveDataSlot(QByteArray dataArray, bool dataAtEnd, qint64 dataSize) void haveDataSlot(qint64 pos, QByteArray dataArray, bool dataAtEnd, qint64 dataSize)
{ {
if (pos != m_pos) {
// Sometimes when re-sending a request in the qhttpnetwork* layer there is a pending haveData from the
// user thread on the way to us. We need to ignore it since it is the data for the wrong(later) chunk.
return;
}
wantDataPending = false; wantDataPending = false;
m_dataArray = dataArray; m_dataArray = dataArray;
@ -285,7 +307,7 @@ signals:
// to main thread: // to main thread:
void wantData(qint64); void wantData(qint64);
void processedData(qint64); void processedData(qint64 pos, qint64 amount);
void resetData(bool *b); void resetData(bool *b);
}; };

View File

@ -424,6 +424,7 @@ QNetworkReplyHttpImplPrivate::QNetworkReplyHttpImplPrivate()
, synchronous(false) , synchronous(false)
, state(Idle) , state(Idle)
, statusCode(0) , statusCode(0)
, uploadByteDevicePosition(false)
, uploadDeviceChoking(false) , uploadDeviceChoking(false)
, outgoingData(0) , outgoingData(0)
, bytesUploaded(-1) , bytesUploaded(-1)
@ -863,9 +864,9 @@ void QNetworkReplyHttpImplPrivate::postRequest()
q, SLOT(uploadByteDeviceReadyReadSlot()), q, SLOT(uploadByteDeviceReadyReadSlot()),
Qt::QueuedConnection); Qt::QueuedConnection);
// From main thread to user thread: // From user thread to http thread:
QObject::connect(q, SIGNAL(haveUploadData(QByteArray,bool,qint64)), QObject::connect(q, SIGNAL(haveUploadData(qint64,QByteArray,bool,qint64)),
forwardUploadDevice, SLOT(haveDataSlot(QByteArray,bool,qint64)), Qt::QueuedConnection); forwardUploadDevice, SLOT(haveDataSlot(qint64,QByteArray,bool,qint64)), Qt::QueuedConnection);
QObject::connect(uploadByteDevice.data(), SIGNAL(readyRead()), QObject::connect(uploadByteDevice.data(), SIGNAL(readyRead()),
forwardUploadDevice, SIGNAL(readyRead()), forwardUploadDevice, SIGNAL(readyRead()),
Qt::QueuedConnection); Qt::QueuedConnection);
@ -873,8 +874,8 @@ void QNetworkReplyHttpImplPrivate::postRequest()
// From http thread to user thread: // From http thread to user thread:
QObject::connect(forwardUploadDevice, SIGNAL(wantData(qint64)), QObject::connect(forwardUploadDevice, SIGNAL(wantData(qint64)),
q, SLOT(wantUploadDataSlot(qint64))); q, SLOT(wantUploadDataSlot(qint64)));
QObject::connect(forwardUploadDevice, SIGNAL(processedData(qint64)), QObject::connect(forwardUploadDevice,SIGNAL(processedData(qint64, qint64)),
q, SLOT(sentUploadDataSlot(qint64))); q, SLOT(sentUploadDataSlot(qint64,qint64)));
QObject::connect(forwardUploadDevice, SIGNAL(resetData(bool*)), QObject::connect(forwardUploadDevice, SIGNAL(resetData(bool*)),
q, SLOT(resetUploadDataSlot(bool*)), q, SLOT(resetUploadDataSlot(bool*)),
Qt::BlockingQueuedConnection); // this is the only one with BlockingQueued! Qt::BlockingQueuedConnection); // this is the only one with BlockingQueued!
@ -1268,12 +1269,22 @@ void QNetworkReplyHttpImplPrivate::replySslConfigurationChanged(const QSslConfig
void QNetworkReplyHttpImplPrivate::resetUploadDataSlot(bool *r) void QNetworkReplyHttpImplPrivate::resetUploadDataSlot(bool *r)
{ {
*r = uploadByteDevice->reset(); *r = uploadByteDevice->reset();
if (*r) {
// reset our own position which is used for the inter-thread communication
uploadByteDevicePosition = 0;
}
} }
// Coming from QNonContiguousByteDeviceThreadForwardImpl in HTTP thread // Coming from QNonContiguousByteDeviceThreadForwardImpl in HTTP thread
void QNetworkReplyHttpImplPrivate::sentUploadDataSlot(qint64 amount) void QNetworkReplyHttpImplPrivate::sentUploadDataSlot(qint64 pos, qint64 amount)
{ {
if (uploadByteDevicePosition + amount != pos) {
// Sanity check, should not happen.
error(QNetworkReply::UnknownNetworkError, "");
return;
}
uploadByteDevice->advanceReadPointer(amount); uploadByteDevice->advanceReadPointer(amount);
uploadByteDevicePosition += amount;
} }
// Coming from QNonContiguousByteDeviceThreadForwardImpl in HTTP thread // Coming from QNonContiguousByteDeviceThreadForwardImpl in HTTP thread
@ -1298,7 +1309,7 @@ void QNetworkReplyHttpImplPrivate::wantUploadDataSlot(qint64 maxSize)
QByteArray dataArray(data, currentUploadDataLength); QByteArray dataArray(data, currentUploadDataLength);
// Communicate back to HTTP thread // Communicate back to HTTP thread
emit q->haveUploadData(dataArray, uploadByteDevice->atEnd(), uploadByteDevice->size()); emit q->haveUploadData(uploadByteDevicePosition, dataArray, uploadByteDevice->atEnd(), uploadByteDevice->size());
} }
void QNetworkReplyHttpImplPrivate::uploadByteDeviceReadyReadSlot() void QNetworkReplyHttpImplPrivate::uploadByteDeviceReadyReadSlot()

View File

@ -120,7 +120,7 @@ public:
Q_PRIVATE_SLOT(d_func(), void resetUploadDataSlot(bool *r)) Q_PRIVATE_SLOT(d_func(), void resetUploadDataSlot(bool *r))
Q_PRIVATE_SLOT(d_func(), void wantUploadDataSlot(qint64)) Q_PRIVATE_SLOT(d_func(), void wantUploadDataSlot(qint64))
Q_PRIVATE_SLOT(d_func(), void sentUploadDataSlot(qint64)) Q_PRIVATE_SLOT(d_func(), void sentUploadDataSlot(qint64,qint64))
Q_PRIVATE_SLOT(d_func(), void uploadByteDeviceReadyReadSlot()) Q_PRIVATE_SLOT(d_func(), void uploadByteDeviceReadyReadSlot())
Q_PRIVATE_SLOT(d_func(), void emitReplyUploadProgress(qint64, qint64)) Q_PRIVATE_SLOT(d_func(), void emitReplyUploadProgress(qint64, qint64))
Q_PRIVATE_SLOT(d_func(), void _q_cacheSaveDeviceAboutToClose()) Q_PRIVATE_SLOT(d_func(), void _q_cacheSaveDeviceAboutToClose())
@ -144,7 +144,7 @@ signals:
void startHttpRequestSynchronously(); void startHttpRequestSynchronously();
void haveUploadData(QByteArray dataArray, bool dataAtEnd, qint64 dataSize); void haveUploadData(const qint64 pos, QByteArray dataArray, bool dataAtEnd, qint64 dataSize);
}; };
class QNetworkReplyHttpImplPrivate: public QNetworkReplyPrivate class QNetworkReplyHttpImplPrivate: public QNetworkReplyPrivate
@ -195,6 +195,7 @@ public:
// upload // upload
QNonContiguousByteDevice* createUploadByteDevice(); QNonContiguousByteDevice* createUploadByteDevice();
QSharedPointer<QNonContiguousByteDevice> uploadByteDevice; QSharedPointer<QNonContiguousByteDevice> uploadByteDevice;
qint64 uploadByteDevicePosition;
bool uploadDeviceChoking; // if we couldn't readPointer() any data at the moment bool uploadDeviceChoking; // if we couldn't readPointer() any data at the moment
QIODevice *outgoingData; QIODevice *outgoingData;
QSharedPointer<QRingBuffer> outgoingDataBuffer; QSharedPointer<QRingBuffer> outgoingDataBuffer;
@ -283,7 +284,7 @@ public:
// From QNonContiguousByteDeviceThreadForwardImpl in HTTP thread: // From QNonContiguousByteDeviceThreadForwardImpl in HTTP thread:
void resetUploadDataSlot(bool *r); void resetUploadDataSlot(bool *r);
void wantUploadDataSlot(qint64); void wantUploadDataSlot(qint64);
void sentUploadDataSlot(qint64); void sentUploadDataSlot(qint64, qint64);
// From user's QNonContiguousByteDevice // From user's QNonContiguousByteDevice
void uploadByteDeviceReadyReadSlot(); void uploadByteDeviceReadyReadSlot();

View File

@ -457,6 +457,10 @@ private Q_SLOTS:
void putWithRateLimiting(); void putWithRateLimiting();
#ifndef QT_NO_SSL
void putWithServerClosingConnectionImmediately();
#endif
// NOTE: This test must be last! // NOTE: This test must be last!
void parentingRepliesToTheApp(); void parentingRepliesToTheApp();
private: private:
@ -4718,18 +4722,22 @@ void tst_QNetworkReply::ioPostToHttpNoBufferFlag()
class SslServer : public QTcpServer { class SslServer : public QTcpServer {
Q_OBJECT Q_OBJECT
public: public:
SslServer() : socket(0) {}; SslServer() : socket(0), m_ssl(true) {}
void incomingConnection(qintptr socketDescriptor) { void incomingConnection(qintptr socketDescriptor) {
QSslSocket *serverSocket = new QSslSocket; QSslSocket *serverSocket = new QSslSocket;
serverSocket->setParent(this); serverSocket->setParent(this);
if (serverSocket->setSocketDescriptor(socketDescriptor)) { if (serverSocket->setSocketDescriptor(socketDescriptor)) {
connect(serverSocket, SIGNAL(readyRead()), this, SLOT(readyReadSlot()));
if (!m_ssl) {
emit newPlainConnection(serverSocket);
return;
}
QString testDataDir = QFileInfo(QFINDTESTDATA("rfc3252.txt")).absolutePath(); QString testDataDir = QFileInfo(QFINDTESTDATA("rfc3252.txt")).absolutePath();
if (testDataDir.isEmpty()) if (testDataDir.isEmpty())
testDataDir = QCoreApplication::applicationDirPath(); testDataDir = QCoreApplication::applicationDirPath();
connect(serverSocket, SIGNAL(encrypted()), this, SLOT(encryptedSlot())); connect(serverSocket, SIGNAL(encrypted()), this, SLOT(encryptedSlot()));
connect(serverSocket, SIGNAL(readyRead()), this, SLOT(readyReadSlot()));
serverSocket->setProtocol(QSsl::AnyProtocol); serverSocket->setProtocol(QSsl::AnyProtocol);
connect(serverSocket, SIGNAL(sslErrors(QList<QSslError>)), serverSocket, SLOT(ignoreSslErrors())); connect(serverSocket, SIGNAL(sslErrors(QList<QSslError>)), serverSocket, SLOT(ignoreSslErrors()));
serverSocket->setLocalCertificate(testDataDir + "/certs/server.pem"); serverSocket->setLocalCertificate(testDataDir + "/certs/server.pem");
@ -4740,11 +4748,12 @@ public:
} }
} }
signals: signals:
void newEncryptedConnection(); void newEncryptedConnection(QSslSocket *s);
void newPlainConnection(QSslSocket *s);
public slots: public slots:
void encryptedSlot() { void encryptedSlot() {
socket = (QSslSocket*) sender(); socket = (QSslSocket*) sender();
emit newEncryptedConnection(); emit newEncryptedConnection(socket);
} }
void readyReadSlot() { void readyReadSlot() {
// for the incoming sockets, not the server socket // for the incoming sockets, not the server socket
@ -4753,6 +4762,7 @@ public slots:
public: public:
QSslSocket *socket; QSslSocket *socket;
bool m_ssl;
}; };
// very similar to ioPostToHttpUploadProgress but for SSL // very similar to ioPostToHttpUploadProgress but for SSL
@ -4780,7 +4790,7 @@ void tst_QNetworkReply::ioPostToHttpsUploadProgress()
QNetworkReplyPtr reply(manager.post(request, sourceFile)); QNetworkReplyPtr reply(manager.post(request, sourceFile));
QSignalSpy spy(reply.data(), SIGNAL(uploadProgress(qint64,qint64))); QSignalSpy spy(reply.data(), SIGNAL(uploadProgress(qint64,qint64)));
connect(&server, SIGNAL(newEncryptedConnection()), &QTestEventLoop::instance(), SLOT(exitLoop())); connect(&server, SIGNAL(newEncryptedConnection(QSslSocket*)), &QTestEventLoop::instance(), SLOT(exitLoop()));
connect(reply, SIGNAL(sslErrors(QList<QSslError>)), reply.data(), SLOT(ignoreSslErrors())); connect(reply, SIGNAL(sslErrors(QList<QSslError>)), reply.data(), SLOT(ignoreSslErrors()));
// get the request started and the incoming socket connected // get the request started and the incoming socket connected
@ -4788,7 +4798,7 @@ void tst_QNetworkReply::ioPostToHttpsUploadProgress()
QVERIFY(!QTestEventLoop::instance().timeout()); QVERIFY(!QTestEventLoop::instance().timeout());
QTcpSocket *incomingSocket = server.socket; QTcpSocket *incomingSocket = server.socket;
QVERIFY(incomingSocket); QVERIFY(incomingSocket);
disconnect(&server, SIGNAL(newEncryptedConnection()), &QTestEventLoop::instance(), SLOT(exitLoop())); disconnect(&server, SIGNAL(newEncryptedConnection(QSslSocket*)), &QTestEventLoop::instance(), SLOT(exitLoop()));
incomingSocket->setReadBufferSize(1*1024); incomingSocket->setReadBufferSize(1*1024);
@ -7905,6 +7915,159 @@ void tst_QNetworkReply::putWithRateLimiting()
} }
#ifndef QT_NO_SSL
class PutWithServerClosingConnectionImmediatelyHandler: public QObject
{
Q_OBJECT
public:
bool m_parsedHeaders;
QByteArray m_receivedData;
QByteArray m_expectedData;
QSslSocket *m_socket;
PutWithServerClosingConnectionImmediatelyHandler(QSslSocket *s, QByteArray expected) :m_parsedHeaders(false), m_expectedData(expected), m_socket(s)
{
m_socket->setParent(this);
connect(m_socket, SIGNAL(readyRead()), SLOT(readyReadSlot()));
connect(m_socket, SIGNAL(disconnected()), SLOT(disconnectedSlot()));
}
signals:
void correctFileUploadReceived();
void corruptFileUploadReceived();
public slots:
void closeDelayed() {
m_socket->close();
}
void readyReadSlot()
{
QByteArray data = m_socket->readAll();
m_receivedData += data;
if (!m_parsedHeaders && m_receivedData.contains("\r\n\r\n")) {
m_parsedHeaders = true;
QTimer::singleShot(qrand()%10, this, SLOT(closeDelayed())); // simulate random network latency
// This server simulates a web server connection closing, e.g. because of Apaches MaxKeepAliveRequests or KeepAliveTimeout
// In this case QNAM needs to re-send the upload data but it had a bug which then corrupts the upload
// This test catches that.
}
}
void disconnectedSlot()
{
if (m_parsedHeaders) {
//qDebug() << m_receivedData.left(m_receivedData.indexOf("\r\n\r\n"));
m_receivedData = m_receivedData.mid(m_receivedData.indexOf("\r\n\r\n")+4); // check only actual data
}
if (m_receivedData.length() > 0 && !m_expectedData.startsWith(m_receivedData)) {
// We had received some data but it is corrupt!
qDebug() << "CORRUPT" << m_receivedData.count();
// Use this to track down the pattern of the corruption and conclude the source
// QFile a("/tmp/corrupt");
// a.open(QIODevice::WriteOnly);
// a.write(m_receivedData);
// a.close();
// QFile b("/tmp/correct");
// b.open(QIODevice::WriteOnly);
// b.write(m_expectedData);
// b.close();
//exit(1);
emit corruptFileUploadReceived();
} else {
emit correctFileUploadReceived();
}
}
};
class PutWithServerClosingConnectionImmediatelyServer: public SslServer
{
Q_OBJECT
public:
int m_correctUploads;
int m_corruptUploads;
int m_repliesFinished;
int m_expectedReplies;
QByteArray m_expectedData;
PutWithServerClosingConnectionImmediatelyServer() : SslServer(), m_correctUploads(0), m_corruptUploads(0), m_repliesFinished(0), m_expectedReplies(0)
{
QObject::connect(this, SIGNAL(newEncryptedConnection(QSslSocket*)), this, SLOT(createHandlerForConnection(QSslSocket*)));
QObject::connect(this, SIGNAL(newPlainConnection(QSslSocket*)), this, SLOT(createHandlerForConnection(QSslSocket*)));
}
public slots:
void createHandlerForConnection(QSslSocket* s) {
PutWithServerClosingConnectionImmediatelyHandler *handler = new PutWithServerClosingConnectionImmediatelyHandler(s, m_expectedData);
handler->setParent(this);
QObject::connect(handler, SIGNAL(correctFileUploadReceived()), this, SLOT(increaseCorrect()));
QObject::connect(handler, SIGNAL(corruptFileUploadReceived()), this, SLOT(increaseCorrupt()));
}
void increaseCorrect() {
m_correctUploads++;
}
void increaseCorrupt() {
m_corruptUploads++;
}
void replyFinished() {
m_repliesFinished++;
if (m_repliesFinished == m_expectedReplies) {
QTestEventLoop::instance().exitLoop();
}
}
};
void tst_QNetworkReply::putWithServerClosingConnectionImmediately()
{
const int numUploads = 40;
qint64 wantedSize = 512*1024; // 512 kB
QByteArray sourceFile;
for (int i = 0; i < wantedSize; ++i) {
sourceFile += (char)'a' +(i%26);
}
bool withSsl = false;
for (int s = 0; s <= 1; s++) {
withSsl = (s == 1);
// Test also needs to run several times because of 9c2ecf89
for (int j = 0; j < 20; j++) {
// emulate a minimal https server
PutWithServerClosingConnectionImmediatelyServer server;
server.m_ssl = withSsl;
server.m_expectedData = sourceFile;
server.m_expectedReplies = numUploads;
server.listen(QHostAddress(QHostAddress::LocalHost), 0);
for (int i = 0; i < numUploads; i++) {
// create the request
QUrl url = QUrl(QString("http%1://127.0.0.1:%2/file=%3").arg(withSsl ? "s" : "").arg(server.serverPort()).arg(i));
QNetworkRequest request(url);
QNetworkReply *reply = manager.put(request, sourceFile);
connect(reply, SIGNAL(sslErrors(QList<QSslError>)), reply, SLOT(ignoreSslErrors()));
connect(reply, SIGNAL(finished()), &server, SLOT(replyFinished()));
reply->setParent(&server);
}
// get the request started and the incoming socket connected
QTestEventLoop::instance().enterLoop(10);
//qDebug() << "correct=" << server.m_correctUploads << "corrupt=" << server.m_corruptUploads << "expected=" <<numUploads;
// Sanity check because ecause of 9c2ecf89 most replies will error out but we want to make sure at least some of them worked
QVERIFY(server.m_correctUploads > 5);
// Because actually important is that we don't get any corruption:
QCOMPARE(server.m_corruptUploads, 0);
server.close();
}
}
}
#endif
// NOTE: This test must be last testcase in tst_qnetworkreply! // NOTE: This test must be last testcase in tst_qnetworkreply!
void tst_QNetworkReply::parentingRepliesToTheApp() void tst_QNetworkReply::parentingRepliesToTheApp()